source
stringlengths
32
199
text
stringlengths
26
3k
https://en.wikipedia.org/wiki/Alon%20Halevy
Alon Yitzchack Halevy (until 2000: Levy) is an Israeli-American computer scientist and a leading researcher in the area of data integration. He was a research scientist at Google from 2005 to 2015, when he left to become head of Recruit Institute of Technology. He left Recruit in 2018 and joined Facebook AI in 2019. Until 2006, he was a professor of computer science at the University of Washington. He received his PhD from Stanford University in 1993. He is a fellow of the ACM and a winner of the 2006 VLDB 10-year best paper award. He was a Sloan Fellow, and received the Presidential Early Career Award for Scientists and Engineers (PECASE) in 2000. He is the founder of two technology companies, Nimble Technology (now Actuate Corporation) and Transformic Inc. At Google he was involved in Google Fusion Tables. References External links Alon Halevy's blog: http://alonhalevy.blogspot.com/ Fellows of the Association for Computing Machinery Stanford University alumni University of Washington faculty Database researchers American computer scientists Israeli computer scientists Living people Google employees Year of birth missing (living people)
https://en.wikipedia.org/wiki/Quake-Catcher%20Network
The Quake-Catcher Network was an initiative run by the University of Southern California that aimed to use computer-based accelerometers to detect earthquakes. It used the BOINC volunteer computing platform (a form of distributed computing, similar to SETI@home). It supported mobile devices (smartphones and some tablets/laptops) that have a built-in accelerometer. It also supported three external USB devices - the codemercs.com JoyWarrior 24F8, the ONavi sensor, and the MotionNode Accel. In 2011, project scientist Elizabeth Cochran was awarded a Presidential Early Career Award from US President Barack Obama in large part due to her founding of the Quake-Catcher Network project. The Quake Catcher Network project started at Stanford University in 2008, then moved to Caltech, and joined the Southern California Earthquake Center (SCEC) and the Incorporated Research Institutions for Seismology (IRIS) in 2016. The Quake-Catcher Network was discontinued on June 1st 2023 References External links Interactive world map, showing recent earthquakes (day/week/month) – result of QCN Science in society Free science software Volunteer computing projects
https://en.wikipedia.org/wiki/NCCM
NCCM may refer to: National Council of Canadian Muslims in Canada Network configuration and change management in information technology
https://en.wikipedia.org/wiki/Ttcp
The program ttcp (Test TCP) is a utility for measuring network throughput, popular on Unix systems. It measures the network throughput between two systems using the TCP or optionally UDP protocols. It was written by Mike Muuss and Terry Slattery at BRL sometime before December 1984, to compare the performance of TCP stacks by the Computer Systems Research Group (CSRG) of the University of California, Berkeley and Bolt, Beranek and Newman (BBN) to help DARPA decide which version to place in 4.3BSD. Many compatible implementations and derivatives exist including the widely used Iperf. Testing can be done from any platform to any other platform, for example from a Windows machine to a Linux machine, as long as they both have a ttcp application installed. For normal use, ttcp is installed on two machines – one will be the sender, the other the receiver. The receiver is started first and waits for a connection. Once the two connect, the sending machine sends data to the receiver and displays the overall throughput of the network they traverse. The amount of data sent and other options are configurable through command line parameters. The statistics output covers TCP/UDP payload only (not protocol overhead) and is generally displayed by default in KiB/s (kibiBytes per second) instead of kb/s (kilobits per second), but it can be configured to be displayed in other ways on some implementations. The reported throughput is more accurately calculated on the receive side than the transmit side, since the transmit operation may complete before all bytes actually have been transmitted. Implementations and derivatives Originally designed for Unix systems, ttcp has since been ported to and reimplemented on many other systems such as Windows. ttcp The original Unix implementation developed by Mike Muuss and Terry Slattery, version 1.10 dated 1987-09-02. Uses port 2000 by default unless another one is specified with the -p switch. nttcp Developed at Silicon Graphics, the nttcp implementation made several changes that remain in future implementations such as by default using port 5001 instead of 2000, reversing the meaning of the -s switch to sink data by default, and adding the -w window size switch nuttcp Developed at Laboratory for Computational Physics and Fluid Dynamics at Naval Research Lab (LCP & FD at NRL). Provides additional information related to the data transfer such as user, system, and wall-clock time, transmitter and receiver CPU utilization, and loss percentage (for UDP transfers). Iperf Developed by the Distributed Applications Support Team (DAST) at the National Laboratory for Applied Network Research (NLANR). Widely used and ported implementation including additions such as the option for bidirectional traffic. ntttcp Developed by Microsoft, used to profile and measure Windows networking performance. NTttcp is one of the primary tools Microsoft engineering teams leverage to validate network function and utility. ntttcp-for-linux De
https://en.wikipedia.org/wiki/Dexter%20Kozen
Dexter Campbell Kozen (born December 20, 1951) is an American theoretical computer scientist. He is Joseph Newton Pew, Jr. Professor in Engineering at Cornell University. He received his B.A. from Dartmouth College in 1974 and his PhD in computer science in 1977 from Cornell University, where he was advised by Juris Hartmanis. He advised numerous Ph.D. students. He is a Fellow of the Association for Computing Machinery, a Guggenheim Fellow, and has received an Outstanding Innovation Award from IBM Corporation. He has also been named Faculty of the Year by the Association of Computer Science Undergraduates at Cornell. Dexter Kozen was one of the first professors to receive the honor of a professorship at The Radboud Excellence Initiative at Radboud University Nijmegen in the Netherlands. He is known for his work at the intersection of logic and complexity. He is one of the fathers of dynamic logic and developed the version of the modal μ-calculus most used today. Moreover, he has written several textbooks on the theory of computation, automata theory, dynamic logic, and algorithms. Kozen was a guitarist, singer, and songwriter in the band "Harmful if Swallowed". He also holds the position of faculty advisor for Cornell's rugby football club and plays for the Cortland Homer Thundering Herd rugby team. Awards and honors John G. Kemeny Prize in Computing, Dartmouth College)] (1974) Outstanding Innovation Award, IBM Corporation) (1974) Fellow, John Simon Guggenheim Foundation (1991) Prize Nagrode, Polish Ministry of Education, for paper (1993) Stephen and Margery Russell Distinguished Teaching Award, College of Arts and Sciences, Cornell (2001) Prize Nagrode, Polish Ministry of Education, for paper (1993) ACM Fellow, For contributions to theoretical computer science (2003) Fellow, AAAS (2008) 2001 LICS Test-of-Time Award for the paper (2011) Fellow, EATCS (2016) McDowell Award, for groundbreaking contributions to topics ranging from computational complexity to the analysis of algebraic computations to logics of programs and verification (2016) Weiss Presidential Fellow (2018) POPL Distinguished Paper Award for the paper Guarded Kleene algebra with tests: verification of uninterpreted programs in nearly linear time (2020) Alonzo Church Award, for his fundamental work on developing the theory and applications of Kleene Algebra with Tests, an equational system for reasoning about iterative programs, published in the paper References External links Dexter Kozen's homepage Harmful if Swallowed homepage Fellows of the Association for Computing Machinery Fellows of the American Association for the Advancement of Science Living people Theoretical computer scientists Cornell University faculty Cornell University alumni Dartmouth College alumni American computer scientists 1951 births
https://en.wikipedia.org/wiki/Adobe%20Pixel%20Bender
Adobe Pixel Bender, previously codenamed Hydra, is a programming language created by Adobe Systems for the description of image processing algorithms. The syntax is based on GLSL, and a Pixel Bender program is analogous to an OpenGL fragment shader, and is intended to be a loosely typed version of C++. Adobe Systems' Adobe Pixel Bender Toolkit is the IDE for scripting with Pixel Bender. Pixel Bender programs are intended to be used in a number of Adobe products, and was supported by After Effects (through CS5) and Flash Player. The Pixel Bender Toolkit was bundled with Adobe's Creative Suite, and allowed programs to be created and tested. It is available as a free standalone from Adobe's website. In addition to its primary purpose of image processing, Pixel Bender can also be used for general mathematical operations which would benefit from the hardware acceleration that it provides. An example of this is audio processing. See also Stage3D References Pixel Bender Pixel Bender
https://en.wikipedia.org/wiki/Johannes%20Gehrke
Johannes Gehrke is a German computer scientist and the director of Microsoft Research in Redmond and CTO and Head of Machine Learning for the Microsoft Teams Backend. He is an ACM Fellow, an IEEE Fellow, and the recipient of the 2011 IEEE Computer Society Technical Achievement Award. From 1999 to 2015, he was a faculty member in the Department of Computer Science at Cornell University, where at the time of his leaving he was the Tisch University Professor of Computer Science. Gehrke is best known for his contributions to database systems, data mining, and data privacy. He developed some of the fastest data mining algorithms for frequent pattern mining, sequential pattern mining, and decision tree construction and one of the first sensor network query processors which pioneered in-network query processing for wireless sensor networks, and he is known for his work on data privacy. His work on data privacy resulted in a new version of OnTheMap published by the US Census Bureau, the very first public data product published by any official government agency in the world with provable privacy guarantees (using a variant of Differential Privacy). Education Johannes Gehrke studied from 1990 to 1993 computer science at the Karlsruhe Institute of Technology; he received an M.S. degree from the Department of Computer Science at the University of Texas at Austin in 1995 and a PhD from the University of Wisconsin, Madison in 1999 for a thesis in data mining. Career From 1999 to 2015, Gehrke was a professor in the Department of Computer Science at Cornell University. His research group was popularly known as the Big Red Data Group, and he graduated 25 PhD students. From 2005 to 2008, he was Chief Scientist at Fast Search and Transfer. He has been in product groups at Microsoft since 2012, first building Delve and the Office Graph, then building people and feed experiences across all of Microsoft 365, and then serving as chief architect and head of AI of the Microsoft Teams backend. Since 2020, he has a dual role across research and product, managing all of Microsoft Research in Redmond and continuing as CTO and head of AI for the Microsoft Teams backend. Gehrke received a National Science Foundation Career Award, a Sloan Research Fellowship, and a Humboldt Research Award. In 2011, he received the IEEE Computer Society Technical Achievement Award and a Blavatnik Award for Young Scientists. In 2014, he became a Fellow of the Association for Computing Machinery, and in 2020 he was elected an IEEE Fellow. Books Since its second edition, Gehrke has been a co-author of one of the main textbooks on database systems, commonly known as the Cow Book. References External links Johannes Gehrke's homepage at Cornell: http://www.cs.cornell.edu/johannes/ Database research at Cornell University: http://www.cs.cornell.edu/bigreddata/ Johannes Gehrke at DBLP: http://www.informatik.uni-trier.de/~ley/db/indices/a-tree/g/Gehrke:Johannes.html Database researchers Fellows
https://en.wikipedia.org/wiki/Victor%20Brailovsky
Dr Victor Brailovsky (, born 27 December 1935) is a computer scientist, mathematician, aliyah activist and a former Israeli politician. He served as Minister of Science and Technology for six days in 2004. In May 1986 Brailovsky was awarded an Honorary Doctorate Degree from the Open University in England. Biography Brailovsky was born in Moscow in 1935. He was an activist for aliyah and refusenik between 1972 and 1987, and was a Prisoner of Zion between 1981 and 1984. In 1987 he was allowed to immigrate with his family to Israel, where he worked as a professor of mathematics and computer science in Tel-Aviv University. In the 1999 elections he was voted into the Knesset on Shinui's list, and became a member of the Science and Technology and Immigration, Absorption, and Diaspora Affairs committees. Following the 2003 elections, in which Brailovsky retained his seat, Shinui joined Ariel Sharon's government. On 5 March 2003 he was appointed Deputy Minister of Internal Affairs. On 29 November 2004 he became Minister of Science and Technology, replacing fellow Shinui member Ilan Shalgi. However, Shinui pulled out of the government less than a week later, and Brailovsky lost his cabinet post. Following the split in Shinui, Brailovsky joined the Secular Faction (later Hetz). The party failed to cross the electoral threshold in the 2006 elections and he lost his seat. External links 1935 births Mathematicians from Moscow Russian Jews Refuseniks Shinui politicians Hetz (political party) politicians Living people Academic staff of Tel Aviv University Members of the 15th Knesset (1999–2003) Members of the 16th Knesset (2003–2006) Ministers of Science of Israel Soviet emigrants to Israel
https://en.wikipedia.org/wiki/Amiga%201200
The Amiga 1200, or A1200 (code-named "Channel Z"), is a personal computer in the Amiga computer family released by Commodore International, aimed at the home computer market. It was launched on October 21, 1992, at a base price of £399 in the United Kingdom () and $599 in the United States (). History The A1200 was launched a few months after the Amiga 600, using a similar slimline design that replaced the earlier Amiga 500 Plus and Amiga 500. Whereas the A600 used the 16-bit Motorola 68000 of earlier Amigas, the A1200 was built around the 32-bit Motorola 68EC020. Physically, the A1200 is an all-in-one design incorporating the CPU, keyboard, and disk drives (including the option of an internal 2.5" hard disk drive) in one physical unit. The A1200's hardware architecture was later used as the basis for Commodore's Amiga CD32 game console in 1993. Initially, only 30,000 A1200s were available at the UK launch. During the first year of its life the system reportedly sold well, but Commodore ran into cash flow problems and filed for bankruptcy. Worldwide sales figures for the A1200 are unknown, but 95,000 systems were sold in Germany before Commodore's bankruptcy. After Commodore's demise in 1994, the A1200 almost disappeared from the market but was later relaunched by Escom in 1995. The new Escom A1200 was priced at £399, and it came bundled with two games, seven applications and AmigaOS 3.1. It was initially criticized for being priced 150 pounds higher than the Commodore variant that had been sold for two years prior. It also came with a modified PC floppy disk drive that is incompatible with some Amiga software. The A1200 was finally discontinued in 1996 as the parent company folded. The machine is reported to have sold 95,500 units in Germany. Design improvements The A1200 offers a number of advantages over earlier lower-budget Amiga models. It is a 32-bit design; the 68EC020 microprocessor is faster than the 68000 and has 2 MB of RAM as standard. The AGA chipset used in the A1200 is a significant improvement. AGA increases the color palette from 4096 colors to 16.8 million colors with up to 256 on-screen colors normally, and an improved HAM mode allowing 262,144 on-screen colors. The graphics hardware also features improved sprite capacity and faster graphics performance mainly due to faster video memory. Additionally, compared to the A600 the A1200 offers greater expansion possibilities. Popularity and criticism Although it is a significant upgrade, the A1200 did not sell as well as the 500 and proved to be Commodore's last lower-budget model before filing for bankruptcy in 1994. This is mainly because the 1200 failed to repeat the technological advantage over competitors like the first Amiga systems. The AGA chipset was something of a disappointment. Commodore had initially been working on a much-improved version of the original Amiga chipset, codenamed "AAA", but when development fell behind they rushed out the less-improved AGA, fou
https://en.wikipedia.org/wiki/The%20Tony%20Rock%20Project
The Tony Rock Project is a sketch comedy television series that premiered on October 8, 2008 on MyNetworkTV. It stars Tony Rock, John Heffron and Whitney Cummings. It served as the lead-in for Flavor Flav's sitcom, Under One Roof. References External links 2008 American television series debuts 2000s American sketch comedy television series 2009 American television series endings
https://en.wikipedia.org/wiki/ACCU%20%28organisation%29
ACCU, previously known as the Association of C and C++ Users, is a non-profit user group of people interested in software development, dedicated to raising the standard of computer programming. The ACCU publishes two journals and organizes an annual conference. History ACCU was formed in 1987 by Martin Houston. The original name of the organisation was C Users' Group (UK) and this remained the formal name of the organisation until 2011, although it adopted the public name Association of C and C++ Users for the period 1993–2003, and adopted the shorter form ACCU from 2003 onward. As the formal name suggests, the organisation was originally created for people in the United Kingdom. However, the membership is worldwide, predominantly European and North American, but also with members from central and southern America, Australasia, Africa and Asia. Originally, the voluntary association was mainly for C programmers, but it has expanded over time to include all programming languages, especially C++, C#, Java, Perl and Python. Publications The ACCU currently publishes two journals: C Vu is a members-only journal which acts as the association's newsletter and carries book reviews, articles on software development and a number of regular columns such as Student Code Critique and Professionalism in Programming. It was edited by Phil Stubbington from its first issue until 1991. Overload aims to carry more in-depth articles aimed at professional software developers. Topics range from programming and design through to process and management. Overload is available online to members and non-members free of charge. Other journals have been published by ACCU in the past. Accent was the news letter of the Silicon Valley chapter and CAUGers was the news letter of the Acorn special interest group. Overload was originally the journal of ACCU's C++ special interest group, but is no longer language-specific. Local groups The Silicon Valley chapter organized local meetings in San Jose. Local groups were formed in London, Bristol & Bath, Oxford, Cambridge, North East England, Southern England and Zurich. Conference The ACCU is operated by a volunteer committee, elected at an Annual General Meeting during the annual conference each Spring which from 1997 to 2012 took place in Oxford, and for the first time in Bristol in 2013. It attracts speakers from the computing community including David Abrahams, Andrei Alexandrescu, Ross J. Anderson, James Coplien, Tom Gilb, Kevlin Henney, Andrew Koenig, Simon Peyton-Jones, Eric S. Raymond, Guido van Rossum, Greg Stein, Bjarne Stroustrup (the designer and original implementor of C++), Herb Sutter and Daveed Vandevoorde. The UK Python Conference, for the Python programming language, originally started out as a track at the ACCU conference. Standardisation ACCU supports the standardisation process for computer programming languages. ACCU provided financial sponsorship of meetings in the UK for both the Internatio
https://en.wikipedia.org/wiki/OpenBSD
OpenBSD is a security-focused, free and open-source, Unix-like operating system based on the Berkeley Software Distribution (BSD). Theo de Raadt created OpenBSD in 1995 by forking NetBSD 1.0. The OpenBSD project emphasizes portability, standardization, correctness, proactive security, and integrated cryptography. The OpenBSD project maintains portable versions of many subsystems as packages for other operating systems. Because of the project's preferred BSD license, many components are reused in proprietary and corporate-sponsored software projects. The firewall code in Apple's macOS is based on OpenBSD's PF firewall code, Android's Bionic C standard library is based on OpenBSD code, LLVM uses OpenBSD's regular expression library, and Windows 10 uses OpenSSH (OpenBSD Secure Shell) with LibreSSL. The word "open" in the name OpenBSD refers to the availability of the operating system source code on the Internet, although the word "open" in the name OpenSSH means "OpenBSD". It also refers to the wide range of hardware platforms the system supports. History In December 1994, Theo de Raadt, a founding member of the NetBSD project, was asked to resign from the NetBSD core team over disagreements and conflicts with the other members of the NetBSD team. In October 1995, De Raadt founded OpenBSD, a new project forked from NetBSD 1.0. The initial release, OpenBSD 1.2, was made in July 1996, followed by OpenBSD 2.0 in October of the same year. Since then, the project has issued a release every six months, each of which is supported for one year. On 25 July 2007, OpenBSD developer Bob Beck announced the formation of the OpenBSD Foundation, a Canadian non-profit organization formed to "act as a single point of contact for persons and organizations requiring a legal entity to deal with when they wish to support OpenBSD." Usage statistics It is hard to determine how widely OpenBSD is used, because the developers do not publish or collect usage statistics. In September 2005, the BSD Certification Group surveyed 4330 individual BSD users, showing that 32.8% used OpenBSD, behind FreeBSD with 77%, ahead of NetBSD with 16.3% and DragonFly BSD with 2.6%. However, the authors of this survey clarified that it is neither "exhaustive" nor "completely accurate", since the survey was spread mainly through mailing lists, forums and word of mouth. This combined with other factors, like the lack of a control group, a pre-screening process or significant outreach outside of the BSD community, makes the survey unreliable for judging BSD usage globally. Uses Network appliances OpenBSD features a robust TCP/IP networking stack, and can be used as a router or wireless access point. OpenBSD's security enhancements, built-in cryptography, and packet filter make it suitable for security purposes such as firewalls, intrusion-detection systems, and VPN gateways. Several proprietary systems are based on OpenBSD, including devices from Armorlogic (Profense web application f
https://en.wikipedia.org/wiki/Wily%20Tower
is an arcade game released by Irem in 1984. It is a platforming game where you climb around pipes to deactivate power switches for the building's main computer while avoiding robots. You can jump on generators found throughout the levels to send out disrupter pulses and kill the robots. Irem games Action games Arcade video games Arcade-only video games 1984 video games Video games developed in Japan
https://en.wikipedia.org/wiki/File%20sharing
File sharing is the practice of distributing or providing access to digital media, such as computer programs, multimedia (audio, images and video), documents or electronic books. Common methods of storage, transmission and dispersion include removable media, centralized servers on computer networks, Internet-based hyperlinked documents, and the use of distributed peer-to-peer networking. File sharing technologies, such as BitTorrent, are integral to modern media piracy, as well as the sharing of scientific data and other free content. History Files were first exchanged on removable media. Computers were able to access remote files using filesystem mounting, bulletin board systems (1978), Usenet (1979), and FTP servers (1970's). Internet Relay Chat (1988) and Hotline (1997) enabled users to communicate remotely through chat and to exchange files. The mp3 encoding, which was standardized in 1991 and substantially reduced the size of audio files, grew to widespread use in the late 1990s. In 1998, MP3.com and Audiogalaxy were established, the Digital Millennium Copyright Act was unanimously passed, and the first mp3 player devices were launched. In June 1999, Napster was released as an unstructured centralized peer-to-peer system, requiring a central server for indexing and peer discovery. It is generally credited as being the first peer-to-peer file sharing system. In December 1999, Napster was sued by several recording companies and lost in A&M Records, Inc. v. Napster, Inc.. In the case of Napster, it has been ruled that an online service provider could not use the "transitory network transmission" safe harbor in the DMCA if they had control of the network with a server. Gnutella, eDonkey2000, and Freenet were released in 2000, as MP3.com and Napster were facing litigation. Gnutella, released in March, was the first decentralized file-sharing network. In the Gnutella network, all connecting software was considered equal, and therefore the network had no central point of failure. In July, Freenet was released and became the first anonymity network. In September the eDonkey2000 client and server software was released. In March 2001, Kazaa was released. Its FastTrack network was distributed, though, unlike Gnutella, it assigned more traffic to 'supernodes' to increase routing efficiency. The network was proprietary and encrypted, and the Kazaa team made substantial efforts to keep other clients such as Morpheus off of the FastTrack network. In October 2001, the MPAA and the RIAA filed a lawsuit against the developers of Kazaa, Morpheus and Grokster that would lead to the US Supreme Court's MGM Studios, Inc. v. Grokster, Ltd. decision in 2005. Shortly after its loss in court, Napster was shut down to comply with a court order. This drove users to other P2P applications and file sharing continued its growth. The Audiogalaxy Satellite client grew in popularity, and the LimeWire client and BitTorrent protocol were released. Until its decline in 20
https://en.wikipedia.org/wiki/David%20Weinberger
David Weinberger (born 1950) is an American author, technologist, and speaker. Trained as a philosopher, Weinberger's work focuses on how technology — particularly the internet and machine learning — is changing our ideas, with books about the effect of machine learning’s complex models on business strategy and sense of meaning; order and organization in the digital age; the networking of knowledge; the Net's effect on core concepts of self and place; and the shifts in relationships between businesses and their markets. Career Weinberger holds a Ph.D. from the University of Toronto and taught college from 1980-1986 primarily at Stockton University (then known as Stockton State College). From 1986 until the early 2000s he wrote about technology, and became a marketing consultant and executive at several high-tech companies, including Interleaf and Open Text. His best-known book is 2000’s Cluetrain Manifesto (co-authored), a work noted for its early awareness of the Net as social medium. From 1997 through 2003 he was a frequent commentator on National Public Radio's All Things Considered, with about three dozen contributions. In addition, he was a gag writer for the comic strip "Inside Woody Allen" from 1976 to 1983. In 2004 he became a Fellow at Harvard’s Berkman Klein Center for Internet & Society and as of 2023 serves as an affiliation of the center. In 2008 he served as a visiting lecturer at Harvard Law School and co-taught a course on "The Web Difference" with John Palfrey. From 2010 to 2014 he was Co-Director of the Harvard Library Innovation Lab. In 2015, he was a fellow at the Shorenstein Center on Media, Politics and Public Policy at Harvard’s Kennedy School of Government. He is an advisor to Harvard’s MetaLAB metaLAB, and the Harvard Business School Digital Initiative, and other non-commercial and commercial organizations. He continues to teach courses at Harvard Extension School on the effect of technology on ideas. Beginning in 2015, Weinberger turned much of his attention to the philosophical and ethical implications of machine learning, resulting in a series of articles, talks and workshops, and his 2019 book Everyday Chaos. From June 2018 to June 2020, he was embedded in Google’s People + AI Research (PAIR), a machine learning research group located in Cambridge, Massachusetts, as a part-time writer-in-residence. Weinberger has been involved in Internet policy and advocacy. He had the title Senior Internet Advisor to Howard Dean's 2004 presidential campaign, and was on technology policy advisory councils for both of Barack Obama’s presidential campaigns and Hillary Clinton’s 2016 campaign. From 2010-12 he was a Franklin Fellow at the U.S. Department of State, working with the e-Diplomacy Group. He has written and spoken frequently in favor of policies that favor a more open Internet, including in Salon, NPR, We Are the Internet and in a series of video interviews with the Federal Communications Commission. Honors In 2007, T
https://en.wikipedia.org/wiki/Computer%20cluster
A computer cluster is a set of computers that work together so that they can be viewed as a single system. Unlike grid computers, computer clusters have each node set to perform the same task, controlled and scheduled by software. The components of a cluster are usually connected to each other through fast local area networks, with each node (computer used as a server) running its own instance of an operating system. In most circumstances, all of the nodes use the same hardware and the same operating system, although in some setups (e.g. using Open Source Cluster Application Resources (OSCAR)), different operating systems can be used on each computer, or different hardware. Clusters are usually deployed to improve performance and availability over that of a single computer, while typically being much more cost-effective than single computers of comparable speed or availability. Computer clusters emerged as a result of the convergence of a number of computing trends including the availability of low-cost microprocessors, high-speed networks, and software for high-performance distributed computing. They have a wide range of applicability and deployment, ranging from small business clusters with a handful of nodes to some of the fastest supercomputers in the world such as IBM's Sequoia. Prior to the advent of clusters, single-unit fault tolerant mainframes with modular redundancy were employed; but the lower upfront cost of clusters, and increased speed of network fabric has favoured the adoption of clusters. In contrast to high-reliability mainframes, clusters are cheaper to scale out, but also have increased complexity in error handling, as in clusters error modes are not opaque to running programs. Basic concepts The desire to get more computing power and better reliability by orchestrating a number of low-cost commercial off-the-shelf computers has given rise to a variety of architectures and configurations. The computer clustering approach usually (but not always) connects a number of readily available computing nodes (e.g. personal computers used as servers) via a fast local area network. The activities of the computing nodes are orchestrated by "clustering middleware", a software layer that sits atop the nodes and allows the users to treat the cluster as by and large one cohesive computing unit, e.g. via a single system image concept. Computer clustering relies on a centralized management approach which makes the nodes available as orchestrated shared servers. It is distinct from other approaches such as peer-to-peer or grid computing which also use many nodes, but with a far more distributed nature. A computer cluster may be a simple two-node system which just connects two personal computers, or may be a very fast supercomputer. A basic approach to building a cluster is that of a Beowulf cluster which may be built with a few personal computers to produce a cost-effective alternative to traditional high-performance computing. An earl
https://en.wikipedia.org/wiki/BITNET
BITNET was a co-operative U.S. university computer network founded in 1981 by Ira Fuchs at the City University of New York (CUNY) and Greydon Freeman at Yale University. The first network link was between CUNY and Yale. The name BITNET originally meant "Because It's There Network", but it eventually came to mean "Because It's Time Network". A college or university wishing to join BITNET was required to lease a data circuit (phone line) from a site to an existing BITNET node, buy modems for each end of the data circuit, sending one to the connecting point site, and allow other institutions to connect to its site free of charge. In the early 1980s, the National Science Foundation (NSF) had several initiatives running to help spread the benefits of networking. One of these efforts was called CSNET, and it linked together several computer science departments across the country using TCP/IP. Another was a network of regional computer networks that linked up universities in different parts of the country. In 1981, universities came together to form BITNET, which allowed thousands of new users to experience innovations such as email and file transfers for the first time. All of these new networks showed the possibilities of computer networks and helped stoke demand for a robust nationwide network like NSFNET. Technical details BITNET, with Remote Spooling Communications Subsystem (RSCS) and the Network Job Entry (NJE) network protocol, was used for the huge IBM internal network known as VNET. BITNET links originally ran at 9600 bit/s. The BITNET protocols were eventually ported to non-IBM mainframe operating systems, and became particularly widely implemented under VAX/VMS, in addition to DECnet. BITNET featured email and LISTSERV software, but predated the World Wide Web, the common use of FTP, and Gopher. Gateways for the lists made them available on Usenet. BITNET also supported interactive transmission of files and messages to other users. A gateway service called TRICKLE enabled users to request files from Internet FTP servers in 64 Kb UUencoded chunks. The Interchat Relay Network, popularly known as Bitnet Relay, was the network's instant messaging feature. BITNET differed from the Internet in that it was a point-to-point "store and forward" network. That is, email messages and files were transmitted in their entirety from one server to the next until reaching their destination. From this perspective, BITNET was more like UUCPNET. BITNET’s first electronic magazine, VM/COM, began as a University of Maine newsletter and circulated broadly in early 1984. Two email newsletters that began as Bitnet newsletters in the fall of 1987 are known to still be transmitting. They are the Electronic Air and SCUP Email News (formerly SCUP Bitnet News). BITNET's eligibility requirements limited exchange with commercial entities, including IBM itself, which made technical assistance and bug fixes difficult. This became a particular problem when trying to
https://en.wikipedia.org/wiki/Brass%20Eye
Brass Eye is a British satirical television series parodying current affairs news programming. A series of six episodes aired on Channel 4 in 1997, and a further episode in 2001. The series was created and presented by Chris Morris, written by Morris, David Quantick, Peter Baynham, Jane Bussmann, Arthur Mathews, Graham Linehan and Charlie Brooker and directed by Michael Cumming. Overview Originally planned as a spin-off from The Day Today (1994), the pilot (then called Torque tv™) was passed on by the BBC. Channel 4 commissioned a new pilot, which would be called Brass Eye. The name mixes together the titles of two popular current affairs shows, (Brass Tacks and Public Eye). The series satirised media portrayal of social ills, in particular sensationalism, unsubstantiated establishmentarian theory masquerading as fact, and creation of moral panics, and is a sequel to Morris's earlier spoof news programmes On the Hour (1991–92) and The Day Today (1994). The series stars Morris's The Day Today colleague Doon Mackichan, along with Gina McKee, Mark Heap, Amelia Bullmore, Simon Pegg, Julia Davis, Claire Skinner, John Guerrasio, Hugh Dennis, and Kevin Eldon. Original series (1997) "Drugs" The second episode, "Drugs", has been described by Professor Michael Gossop as illustrative of the ease with which anti-drug hysteria can be evoked in the United Kingdom. In the opening scene of this episode, a voiceover tells viewers that there are so many drugs on the streets of Britain that "not even the dealers know them all". An undercover reporter (Morris) asks a purportedly real-life drug dealer in London for various fictitious drugs, including "Triple Sod", "Yellow Bentines" and "Clarky Cat", leaving the dealer puzzled and increasingly irritated until he asks the reporter to leave him alone. He also explains that possession of drugs without physical contact and the exchange of drugs through a mandrill are perfectly legal in English law. One drug mentioned was a fictitious drug called "Cake", described as being from Czechoslovakia, despite the country no longer existing when the episode was screened. The drug purportedly affected an area of the brain called "Shatner's Bassoon" (altering the user's perception of time), while also giving them a bloated neck due to "massive water retention", a "Czech neck", and was frequently referred to as "a made-up drug" during the show. Other celebrities such as Sir Bernard Ingham, Noel Edmonds, and Rolf Harris were shown holding the bright-yellow cake-sized pill as they talked, with Bernard Manning telling viewers a fictitious story about how one girl regurgitated her own pelvis, and recounts that "One young kiddy on Cake cried all the water out of his body. Just imagine how his mother felt. It's a fucking disgrace". David Amess, the Conservative Member of Parliament for Basildon, was fooled into filming an elaborate video warning against the dangers of this drug, and went as far as to ask a question about "Cake" in
https://en.wikipedia.org/wiki/Black%20box
In science, computing, and engineering, a black box is a system which can be viewed in terms of its inputs and outputs (or transfer characteristics), without any knowledge of its internal workings. Its implementation is "opaque" (black). The term can be used to refer to many inner workings, such as those of a transistor, an engine, an algorithm, the human brain, or an institution or government. To analyze an open system with a typical "black box approach", only the behavior of the stimulus/response will be accounted for, to infer the (unknown) box. The usual representation of this black box system is a data flow diagram centered in the box. The opposite of a black box is a system where the inner components or logic are available for inspection, which is most commonly referred to as a white box (sometimes also known as a "clear box" or a "glass box"). History The modern meaning of the term "black box" seems to have entered the English language around 1945. In electronic circuit theory the process of network synthesis from transfer functions, which led to electronic circuits being regarded as "black boxes" characterized by their response to signals applied to their ports, can be traced to Wilhelm Cauer who published his ideas in their most developed form in 1941. Although Cauer did not himself use the term, others who followed him certainly did describe the method as black-box analysis. Vitold Belevitch puts the concept of black-boxes even earlier, attributing the explicit use of two-port networks as black boxes to Franz Breisig in 1921 and argues that 2-terminal components were implicitly treated as black-boxes before that. In cybernetics, a full treatment was given by Ross Ashby in 1956. A black box was described by Norbert Wiener in 1961 as an unknown system that was to be identified using the techniques of system identification. He saw the first step in self-organization as being to be able to copy the output behavior of a black box. Many other engineers, scientists and epistemologists, such as Mario Bunge, used and perfected the black box theory in the 1960s. System theory In systems theory, the black box is an abstraction representing a class of concrete open system which can be viewed solely in terms of its stimuli inputs and output reactions: The understanding of a black box is based on the "explanatory principle", the hypothesis of a causal relation between the input and the output. This principle states that input and output are distinct, that the system has observable (and relatable) inputs and outputs and that the system is black to the observer (non-openable). Recording of observed states An observer makes observations over time. All observations of inputs and outputs of a black box can be written in a table, in which, at each of a sequence of times, the states of the box's various parts, input and output, are recorded. Thus, using an example from Ashby, examining a box that has fallen from a flying saucer might lead to thi
https://en.wikipedia.org/wiki/ARY%20Digital
ARY Digital HD () is a Pakistani television network available in Pakistan. ARY Digital was founded by a Dubai-based holding company Pakistani businessman, Abdul Razzak Yaqoob (ARY). The network is focused towards on Pakistani entertainment dramas, talk shows, web series and culture.The channel also broadcasts religious shows during Islamic events. The channel broadcasts on cable and satellite networks, linear television as well as streaming platforms including YouTube Channel and ARY ZAP. History ARY Digital, formerly known as The Pakistani Channel, was launched in the United Kingdom in 16th September 2000 to cater to the Pakistani community living in the region. It uses Samacom, an uplink provider based in the UAE, as the uplink teleport station. The channel started off with a format similar to PTV Prime and other South Asian channels where it provided slots for soap operas in general while presenting an hourly slot for news headlines. Although flaming political talk shows and dramas were the main priority when it came to programming, the network soon was hailed for its news coverage. The network acquired a license to start broadcasting in Pakistan. In 2002, the ARY Star Gold Quiz Show became the first live show to offer a prize of one kilogram of gold. For the period of its broadcast, participants won over 260 kilograms of gold. In 2005, the network obtained the rights to show Live 8 on its sister music channel, The Musik. The channel also held rights to the Who Wants to Be a Millionaire franchise for Pakistan. On 18 October 2007, most of the ARY news team, covering former Prime Minister Benazir Bhutto's arrival from exile, were killed by one of two explosions. Pictures of the victims were shown live on the news hour and prayers were observed. Bhutto was later escorted safely to an official government house. SD Feed Closure Since July 2021, ARY Digital has been only available in high-definition. The standard definition (SD) broadcast was shutdown 15 August 2021. Specialized programming By 2003, ARY Digital had started up three sister ventures apart from the flagship channel ARY Digital, channels targeting generalized programming. They include ARY News, a news channel; ARY Musik, a youth-oriented music channel, and ARY Qtv, an Islamic network. Availability Continental programming In 2004, ARY Digital divided its broadcasts in such a way, that each continent had different programming at different times, to better facilitate the audience. The channels were split as follows: ARY Digital Asia ARY Digital UAE ARY Digital UK ARY Digital USA ARY Digital Asia The Asian feed of the channel is free-to-air, as channels in the South Asia are usually broadcast without encryption. Unlike other feeds, ARY Digital Asia features a wider variety of local programmes and international shows. Many of which may include foreign programmes including Hollywood, Bollywood and Lollywood movies, American & British TV shows, for example Criminal Minds, 24, Crimina
https://en.wikipedia.org/wiki/ONIX%20%28publishing%20protocol%29
ONIX (Online Information exchange) currently refers to any of three XML standard metadata formats developed by EDItEUR for use primarily within the book trade. ONIX was originally a single standard for capturing and communicating bibliographic data relating to books. That standard is now referred to as ONIX for Books and has been expanded to include better support for eBooks. A second ONIX family of standard messages, ONIX for Serials has been added to capture metadata pertaining to serialised publications. There is also a third standard, ONIX for Publications Licenses (ONIX-PL), designed to handle the licenses under which libraries and other institutions use digital resources. According to EDItEUR, one of the principal organizations behind the creation of the ONIX standards, ONIX is "an XML-based family of international standards intended to support computer-to-computer communication between parties involved in creating, distributing, licensing or otherwise making available intellectual property in published form, whether physical or digital." It is to some extent based on the indecs Content Model. A working group consisting of VLB, the cash retailers KNV, Libri and Umbreit, and the German National Library promotes the use of the standard by publishing best practices and has developed a guide each for book standard notifications and for e-book standard notifications. External links BISG – Metadata committee, ONIX for Books References Metadata standards Bibliography file formats Industry-specific XML-based standards Markup languages
https://en.wikipedia.org/wiki/List%20of%20television%20programmes%20broadcast%20by%20the%20BBC
This is a list of television programmes broadcast by the BBC either currently or previously broadcast on the BBC in the United Kingdom. Current programming Programmes in this section have been broadcast by the BBC in the last year or have a commission for further episodes. Recommissioned shows are shown as running to the present, as are any show that is currently airing. Only channels where an episode first aired are listed (with the exception of episodes on non-BBC Three programmes which debuted online; for these) the linear channel and the transmission date on that channel are used. Children's television programmes can be found at List of BBC children's television programmes. Drama Comedy Miniseries Soap One-off Drama Unscripted Documentaries Gameshows Reality News programming For programmes which only air on the BBC World News Channel, see programming on BBC World News. Sports programming FA Cup: BBC One/TV 1937 – 1996, 2002 – 2008 & 2014 – present (shared with BT Sport) Wimbledon Championships: BBC TV/BBC One 1937 – present, BBC Two 1964 – present The Boat Race: BBC TV/One 1938 – 2004 & 2010 – present (ITV covered the Boat Race from 2005 – 2009) Live England Test Cricket: BBC TV 1938 – 1998 Rugby League Challenge Cup: BBC One & Two 1948 – present Summer & Winter Olympic Games: BBC One & Two 1948 – present The Open Championship: BBC One & Two 1955 – present (live coverage 1955 – 2015, highlights 2016 – present) Test Match Special: BBC Radio 1957 – present Final Score: BBC One 1958 – present (part of Grandstand 1958 – 2001) Grandstand: BBC One 1958 – 2007, BBC Two 1981 – 2007 The Grand National: BBC One 1960 – 2012, BBC Radio 1948 – present (rights transferred to Channel 4) Rugby League World Cup: BBC One & Two 1960 – present (live coverage 1960 – 2000 & 2013 – present, highlights only 2008) UEFA European Championship: BBC One 1960 – present (shared with ITV Sport) FIFA World Cup: BBC One 1962 – present (shared with ITV Sport) Match of the Day: BBC Two 1964 – 1966, BBC One 1966 – present (Only on air for FA Cup weekends 1988 – 1992 & 2001 – 2004) Rugby Special: BBC Two 1966 – 2005 & 2016 – present Sportsnight: BBC One 1968 – 1997 Football Focus: BBC One 1974 – present (part of Grandstand 1974 – 2001) The Grand Prix: BBC One & BBC Two 1976 – 1996; BBC Three 2009 – 2015 (Rebroadcast between 2009 – 2015 on BBC Red Button and BBC iPlayer) Formula 1: BBC One, BBC Two & BBC Three 1976 – 1996 & 2009 – 2015 (rights transferred to Channel 4) World Snooker Championship: BBC One & BBC Two 1977 – present BDO World Darts Championship: BBC One & BBC Two 1978 – 2016 Ski Sunday: BBC Two 1978 – present London Marathon: BBC One 1981 – present Great North Run: BBC One 1981 – present Today at Wimbledon: BBC Two 1993 – 2014 & 2016 – present (replaced by Wimbledon 2Day in 2015) 6 Nations Rugby: BBC One 2000 – present (shared with ITV Sport 2016 – present) Match of the Day 2: BBC Two 2004 – 2012, BBC One 2012 – present
https://en.wikipedia.org/wiki/Trusera
Trusera was a Seattle-based social networking startup founded in 2007 by Keith Schorsch, a former Amazon executive. Schorsch's struggle with Lyme disease in 2004 inspired him to create Trusera, a place where users can access information from people who have had similar medical experiences. In October 2008, Trusera began releasing documentary-style videos of individuals with notable health experience, including Bill Krueger, former professional baseball player and father of a child diagnosed with autism. Trusera was a part of the Health 2.0 movement, which drew millions of users to the web for health related information. Trusera closed on May 27, 2009, citing funding difficulties on their blog. Notes External links Trusera Example of Trusera Resources in Autism Example of Trusera Resources in Breast Cancer Closing Announcement Companies based in Seattle Defunct social networking services American social networking websites Online support groups Internet properties established in 2007 American medical websites
https://en.wikipedia.org/wiki/AWK%20%28disambiguation%29
AWK is a programming language for text processing. AWK or awk may also refer to: Adwick railway station, Yorkshire, England American Water Works (by NYSE ticker) Awabakal language, spoken in eastern Australia (ISO 639-3:awk) Wake Island Airfield, Micronesia (by IATA code) See also AUK (disambiguation) ORC (disambiguation) ORK (disambiguation)
https://en.wikipedia.org/wiki/BBC%20Micro
The British Broadcasting Corporation Microcomputer System, or BBC Micro, is a series of Microcomputers designed and built by Acorn Computers Limited in the 1980s for Computer Literacy Project of the BBC. Designed with an emphasis on education, it was notable for its ruggedness, expandability, and the quality of its operating system. An accompanying 1982 television series, The Computer Programme, featuring Chris Serle learning to use the machine, was broadcast on BBC2. After the Literacy Project's call for bids for a computer to accompany the TV programmes and literature, Acorn won the contract with the Proton, a successor of its Atom computer prototyped at short notice. Renamed the BBC Micro, the system was adopted by most schools in the United Kingdom, changing Acorn's fortunes. It was also successful as a home computer in the UK, despite its high cost. Acorn later employed the machine to simulate and develop the ARM architecture. While nine models were eventually produced with the BBC brand, the phrase "BBC Micro" is usually used colloquially to refer to the first six (Model A, B, B+64, B+128, Master 128, and Master Compact); subsequent BBC models are considered part of Acorn's Archimedes series. History During the early 1980s, the BBC started what became known as the BBC Computer Literacy Project. The project was initiated partly in response to an ITV documentary series The Mighty Micro, in which Christopher Evans of the UK's National Physical Laboratory predicted the coming microcomputer revolution and its effect on the economy, industry, and lifestyle of the United Kingdom. The BBC wanted to base its project on a microcomputer capable of performing various tasks which they could then demonstrate in the TV series The Computer Programme. The list of topics included programming, graphics, sound and music, teletext, controlling external hardware, and artificial intelligence. It developed an ambitious specification for a BBC computer, and discussed the project with several companies including Acorn Computers, Sinclair Research, Newbury Laboratories, Tangerine Computer Systems, and Dragon Data. The introduction of a specific microcomputer to a more general computer literacy initiative was a topic of controversy, however, with criticism aimed at the BBC for promoting a specific commercial product and for going beyond the "traditional BBC pattern" of promoting existing information networks of training and education providers. Accusations were even levelled at the Department of Industry for making the BBC "an arm of Government industrial policy" and using the Computer Literacy Project as a way of "funding industry through the back door", obscuring public financial support on behalf of a government that was ostensibly opposed to subsidising industry. The Acorn team had already been working on a successor to their existing Atom microcomputer. Known as the Proton, it included better graphics and a faster 2 MHz MOS Technology 6502 central processi
https://en.wikipedia.org/wiki/Alan%20Cox%20%28computer%20programmer%29
Alan Cox (born 22 July 1968) is a British computer programmer who has been a key figure in the development of Linux. He maintained the 2.2 branch of the Linux kernel and continues to be heavily involved in its development, an association that dates back to 1991. He lives in Swansea, Wales, where he lived with his wife Telsa Gwynne, who died in 2015 and now lives with author Tara Neale, whom he married in 2020. He graduated with a BSc in Computer Science from Swansea University in 1991 and received an MBA from the same university in 2005. Involvement in the Linux kernel While employed on the campus of Swansea University, Cox installed a very early version of Linux on one of the machines belonging to the university computer society. This was one of the first Linux installations on a busy network and revealed many bugs in the networking code. Cox fixed many of these bugs and went on to rewrite much of the networking subsystem. He then became one of the main developers and maintainers of the whole kernel. He maintained the 2.2 branch, and his own versions of the 2.4 branch (signified by an "ac" in the version, for example 2.4.13-ac1). This branch was very stable and contained bugfixes that went directly into the vendor kernels. Cox was once commonly regarded as being the "second in command" after Linus Torvalds himself, before reducing his involvement with Linux to study for an MBA. On 28 July 2009, Cox quit his role as the TTY layer maintainer, after disagreement with Torvalds about the scope of work required to fix an error in that subsystem. Alan was employed by the Linux distributor Red Hat during 1999–2009. Starting from 2011 he was employed by Intel Corporation but left both Intel and Linux kernel development in January 2013 to care full-time for his wife during a critical period of medical treatment, and returned to both later that year, until taking early retirement at the end of 2019. He has also been involved in the GNOME and X.Org projects, and was the main developer of AberMUD, which he wrote whilst a student at the University of Wales, Aberystwyth. Fuzix On 31 Oct 2014, Alan Cox announced Fuzix OS, a tiny system V kernel, initially for Z80 on Google+. Model trains Alan Cox used to run Etched Pixels, a model train company that used to produce N gauge kits. However it suffered "a rather more sudden closure", as described by the message that is left on the company's website, caused by a raise in operational cost. Activism Cox is an ardent supporter of programming freedom, and an outspoken opponent of software patents, the DMCA and the CBDTPA. He resigned from a subgroup of Usenix in protest, and said he would not visit the United States for fear of being imprisoned after the arrest of Dmitry Sklyarov for DMCA violations. In January 2007, he applied for a series of patents on "RMS", or "rights management systems". Red Hat Inc., Cox's former employer, has stated (in a document drafted by Mark Webbink and Cox himself) that it will
https://en.wikipedia.org/wiki/Sorcerer%20Lord
Sorcerer Lord is a turn based strategy-fantasy computer game published and developed by Personal Software Services. It was first released in 1987 for ZX Spectrum and Amstrad CPC, and during the next two years it was also released for Commodore 64, Atari ST, DOS, and Amiga. Game The game is set in the fictional land of Galanor. Galanor contains three human kingdoms, a forest kingdom of elves, a kingdom of barbarians and two kingdoms of mountain warriors. An invading army commanded by the evil sorcerer, the Shadowlord, is controlled by the computer. The player takes on the role of the Sorcerer lord and must use the forces of the Galanor Alliance under his command to counter this attack. During the game, the human player and the computer take turns to recruit and move troops on a 2D map. The aim of the game for the Sorcerer Lord is to resist the initial attack of the Shadowlords' army and prevent him from holding any Galanor city or any magical Rune Rings for more of 11 days. The game is lost if the Shadowlord takes Galanor's capital city. The strategy element of the game is enhanced by the unique abilities of soldiers from the different kingdoms. For example, mountain warriors have the advantage of a siege bonus and whilst fighting on mountainous terrain, and some higher ranking human leaders have a magic bonus. Movement bonuses also depend on the terrain; for example Elves can move faster in the forest, whereas barbarians can move faster in desert areas. The game has a limit of 40 moves in the easy level, and fewer moves in the higher levels. Reception Ken St. Andre gave the game a positive review in Computer Gaming World, calling it a "fantasy wargamer's delight", albeit a very difficult game. He noted the exclusive use of the numeric keys for movement made it easy to make mistakes with. St. Andre also lamented the simple victory message upon winning or losing the game. Reviews Jeux & Stratégie #54 Footnotes 1987 video games Amiga games Amstrad CPC games Atari ST games Commodore 64 games DOS games Fantasy video games Strategy video games ZX Spectrum games Personal Software Services games Video games developed in the United Kingdom Single-player video games
https://en.wikipedia.org/wiki/Brian%20A.%20Barsky
Brian A. Barsky is a professor at the University of California, Berkeley, working in computer graphics and geometric modeling as well as in optometry and vision science. He is a Professor of Computer Science and Vision Science and an Affiliate Professor of Optometry. He is also a member of the Joint Graduate Group in Bioengineering, an inter-campus program, between UC Berkeley and UC San Francisco. Early life and education Barsky holds a Ph.D. in computer science from the University of Utah in Salt Lake City, an M.S. in computer graphics and computer science from Cornell University in Ithaca, and a D.C.S. in engineering and a B.Sc. in mathematics and computer science from McGill University in Montreal. Career Barsky was a visiting professor at Yale-NUS College in Singapore, in the Department of Computer Graphics and Multimedia in the Faculty of Information Technology at the Brno University of Technology in the Czech Republic, in the Machine Vision and Pattern Recognition Laboratory at the Lappeenranta University of Technology in Finland, at the Laboratoire d'Informatique Fondamentale de Lille (LIFL) of l'Université des Sciences et Technologies de Lille (USTL), at the Hong Kong University of Science and Technology in Hong Kong, at the University of Otago in Dunedin, New Zealand, in the Modélisation Géométrique et Infographie Interactive group at l'Institut de Recherche en Informatique de Nantes and l'Ecole Centrale de Nantes, in Nantes, at the University of Toronto, at the School of Computing at the National University of Singapore, at the Laboratoire Image of l'Ecole Nationale Supérieure des Télécommunications in Paris, and he was a visiting researcher with the Computer Aided Design and Manufacturing Group at the Sentralinsitutt for Industriell Forskning (Central Institute for Industrial Research) in Oslo. He is a UC Berkeley Presidential Chair Fellow, a Warren and Marjorie Minner Faculty Fellow in Engineering Ethics and Professional/Social Responsibility, and an ACM Distinguished Speaker. Awards Barsky won an IBM Faculty Development Award and a National Science Foundation Presidential Young Investigator Award. He was named a Fellow of the American Academy of Optometry (F.A.A.O.) Books He is a co-author or author of several books: An Introduction to Splines for Use in Computer Graphics and Geometric Modeling, Making Them Move: Mechanics, Control, and Animation of Articulated Figures, and Computer Graphics and Geometric Modeling Using Beta-splines. See List of books in computational geometry. Conference Program Chairs He was the Technical Program Committee Chair for the ACM SIGGRAPH '85 conference held in San Francisco on July 22-26, 1985 and Program Co-chair of Pacific Graphics 2000 held in Hong Kong on October 3–5, 2000. He was the Technical Program Committee Chair for the ACM SIGGRAPH '85 conference held in San Francisco on July 22-26, 1985 and Program Co-chair of Pacific Graphics 2000 held in Hong Kong on October 3–5, 2000. Research
https://en.wikipedia.org/wiki/CD-ROM
A CD-ROM (, compact disc read-only memory) is a type of read-only memory consisting of a pre-pressed optical compact disc that contains data. Computers can read—but not write or erase—CD-ROMs. Some CDs, called enhanced CDs, hold both computer data and audio with the latter capable of being played on a CD player, while data (such as software or digital video) is only usable on a computer (such as ISO 9660 format PC CD-ROMs). During the 1990s and early 2000s, CD-ROMs were popularly used to distribute software and data for computers and fifth generation video game consoles. DVD started to replace it in these roles starting in the early 2000s. History The earliest theoretical work on optical disc storage was done by independent researchers in the United States including David Paul Gregg (1958) and James Russel (1965–1975). In particular, Gregg's patents were used as the basis of the LaserDisc specification that was co-developed between MCA and Philips after MCA purchased Gregg's patents, as well as the company he founded, Gauss Electrophysics. The LaserDisc was the immediate precursor to the CD, with the primary difference being that the LaserDisc encoded information through an analog process whereas the CD used digital encoding. Key work to digitize the optical disc was performed by Toshi Doi and Kees Schouhamer Immink during 1979–1980, who worked on a taskforce for Sony and Philips. The result was the Compact Disc Digital Audio (CD-DA), defined on 1980. The CD-ROM was later designed as an extension of the CD-DA, and adapted this format to hold any form of digital data, with an initial storage capacity of 553 MB. Sony and Philips created the technical standard that defines the format of a CD-ROM in 1983, in what came to be called the Yellow Book. The CD-ROM was announced in 1984 and introduced by Denon and Sony at the first Japanese COMDEX computer show in 1985. In November, 1985, several computer industry participants including Microsoft, Philips, Sony, Apple and Digital Equipment Corporation met to create a specification to define a file system format for CD-ROMs. The resulting specification, called the High Sierra format, was published in May 1986. It was eventually standardized, with a few changes, as the ISO 9660 standard in 1988. One of the first products to be made available to the public on CD-ROM was the Grolier Academic Encyclopedia, presented at the Microsoft CD-ROM Conference in March 1986. CD-ROMs began being used in home video game consoles starting with the PC Engine CD-ROM² (TurboGrafx-CD) in 1988, while CD-ROM drives had also become available for home computers by the end of the 1980s. In 1990, Data East demonstrated an arcade system board that supported CD-ROMs, similar to 1980s laserdisc video games but with digital data, allowing more flexibility than older laserdisc games. By early 1990, about 300,000 CD-ROM drives were sold in Japan, while 125,000 CD-ROM discs were being produced monthly in the United States. Some computer
https://en.wikipedia.org/wiki/Amir%20Tavakkolian
Amir Tavakkolian (, born 7 September 1971 in Mashhad) is an Iranian wrestler. References Profile at UWW Wrestling Database 1971 births Wrestlers at the 2000 Summer Olympics Iranian male sport wrestlers Living people Sportspeople from Mashhad Asian Games gold medalists for Iran Asian Games medalists in wrestling Wrestlers at the 1998 Asian Games World Wrestling Championships medalists Medalists at the 1998 Asian Games Olympic wrestlers for Iran Asian Wrestling Championships medalists 20th-century Iranian people 21st-century Iranian people
https://en.wikipedia.org/wiki/Audience%20Measurement%20and%20Analytics%20Ltd.%20%28aMap%29
Audience Measurement & Analytics Limited (aMap) is an overnight TV audience measurement system that used to provide data on television in India such as demographics, ownership, and viewership. It also runs the AmapDigital, an overnight DTH (Direct-to-home) TV audience measurement panel. The data is now being provided by Broadcast Audience Research Council (BARC) India. Background aMap began in 2004 on the basis of its research in India, which showed that a number of opinion leaders felt that the industry required an audience measurement system. aMap collects viewership data using Telecontrol VIII data collection units sourced from Telecontrol AG, and wireless connections using GSM modems. Activities aMap provides data on television ratings, gross rating points (GRP), reach, time spent, market share, target groups, connectivity of channels, content analysis and more. aMap has an overnight panel encompassing 6,000 metered homes. aMap delivers data overnight so that yesterday’s data can be accessed today by the subscribers. Over and above the usual demographics like SEC, age, gender and C&S availability, viewing data is also reported across durable ownership, vehicle ownership, type of TV, size of household, occupation and education of individuals, monthly household income, children at home, chief wage earner, type of dwelling and more. aMap's methodology A team of Telecontrol experts, three professors at IIM Ahmedabad has developed mathematical and statistical modules that help aMap undertaking a data health check every day. aMap chosen as audience measurement currency by Eurodata TV worldwide Eurodata TV Worldwide has released, ‘One Television Year in the World’ a handbook on TV audience measurement data across the world. “Eurodata TV Worldwide” is the international data bank of TV programmes and audiences, which now covers over 2000 channels throughout 80 territories and provides daily program information including: content, production, international distribution and the audience levels for targeted programs, all data emanating directly from the authorized institute based in each country. For India the institute is aMap. Connectivity data aMap is the only system in India that gathers and disseminates connectivity data on an overnight basis, for three times of the day. To aMap’s subscribers, data is provided on an overnight basis by market and by band. The bands in which data is disseminated are Prime band, Colour Band, S Band, Ultra High Frequency (UHF) and Hyper Band. It gives the percentage of homes that receive a channel on a particular band. Audience Research Laboratory aMap collaborated with Optimum Media Solutions (OMS)–a media agency and Mudra Institute of Communications Ahmedabad (MICA) to set up the “aMap OMS Audience Research laboratory” at the MICA campus. The laboratory was inaugurated in 2006. The lab is operated under the directions of its advisory council. It works with experts in social sciences, psychology, anthropol
https://en.wikipedia.org/wiki/Marching%20triangles
In computer graphics, the problem of transforming a cloud of points on the surface of a three-dimensional object into a polygon mesh for the object can be solved by a technique called marching triangles. This provides a faster alternative to other methods for the same problem of surface reconstruction, based on Delaunay triangulation. References Geometric algorithms Triangle geometry
https://en.wikipedia.org/wiki/Coot%20%28software%29
The program Coot (Crystallographic Object-Oriented Toolkit) is used to display and manipulate atomic models of macromolecules, typically of proteins or nucleic acids, using 3D computer graphics. It is primarily focused on building and validation of atomic models into three-dimensional electron density maps obtained by X-ray crystallography methods, although it has also been applied to data from electron microscopy. Overview Coot displays electron density maps and atomic models and allows model manipulations such as idealization, real space refinement, manual rotation/translation, rigid-body fitting, ligand search, solvation, mutations, rotamers, and Ramachandran idealization. The software is designed to be easy-to-learn for novice users, achieved by ensuring that tools for common tasks are 'discoverable' through familiar user interface elements (menus and toolbars), or by intuitive behaviour (mouse controls). Recent developments have enhanced the usability of the software for expert users, with customisable key bindings, extensions, and an extensive scripting interface. Coot is free software, distributed under the GNU GPL. It is available from the Coot web site originally at the University of York, and now at the MRC Laboratory of Molecular Biology. Pre-compiled binaries are also available for Linux and Windows from the web page and CCP4, and for Mac OS X through Fink and CCP4. Additional support is available through the Coot wiki and an active COOT mailing list. The primary author is Paul Emsley (MRC-LMB at Cambridge). Other contributors include Kevin Cowtan, Bernhard Lohkamp and Stuart McNicholas (University of York), William Scott (University of California at Santa Cruz), and Eugene Krissinel (Daresbury Laboratory). Features Coot can be used to read files containing 3D atomic coordinate models of macromolecular structures in a number of formats, including pdb, mmcif, and Shelx files. The model may then be rotated in 3D and viewed from any viewpoint. The atomic model is represented by default using a stick-model, with vectors representing chemical bonds. The two halves of each bond are coloured according to the element of the atom at that end of the bond, allowing chemical structure and identity to be visualised in a manner familiar to most chemists. Coot can also display electron density, which is the result of structure determination experiments such as X-ray crystallography and EM reconstruction. The density is contoured using a 3D-mesh. The contour level controlled using the mouse wheel for easy manipulation - this provides a simple way for the user to get an idea of the 3D electron density profile without the visual clutter of multiple contour levels. Electron density may be read into the program from ccp4 or cns map formats, though it is more common to calculate an electron density map directly from the X-ray diffraction data, read from an mtz, hkl, fcf or mmcif file. Coot provides extensive features for model building and refinemen
https://en.wikipedia.org/wiki/MPLS-TP
In telecommunications, Multiprotocol Label Switching - Transport Profile (MPLS-TP) is a variant of the MPLS protocol that is used in packet switched data networks. MPLS-TP is the product of a joint Internet Engineering Task Force (IETF) / International Telecommunication Union Telecommunication Standardization Sector (ITU-T) effort to include an MPLS Transport Profile within the IETF MPLS and PWE3 architectures to support the capabilities and functionalities of a packet transport network. Description MPLS-TP is designed for use as a network layer technology in transport networks. It will be a continuation of the work started by the transport network experts of the ITU-T, specifically SG15, as T-MPLS. Since 2008 the work is progressed in a cooperation between ITU-T and IETF. The required protocol extensions to MPLS being designed by the IETF based on requirements provided by service providers. It will be a connection-oriented packet-switched (CO-PS) application. It will offer a dedicated MPLS implementation by removing features that are not relevant to CO-PS applications and adding mechanisms that provide support of critical transport functionality. MPLS-TP is to be based on the same architectural principles of layered networking that are used in longstanding transport network technologies like SDH, SONET and OTN. Service providers have already developed management processes and work procedures based on these principles. MPLS-TP gives service providers a reliable packet-based technology that is based upon circuit-based transport networking, and thus is expected to align with current organizational processes and large-scale work procedures similar to other packet transport technologies. MPLS-TP is a low cost L2.5 technology (if the limited profile to be specified is implemented in isolation) that provides QoS, end-to-end OA&M and protection switching. In February 2008 the ITU-T and IETF agreed to work jointly on the design of MPLS-TP. Based on this agreement IETF and ITU-T experts will jointly work out the requirements and solutions. ITU-T in turn will update the existing T-MPLS standards based on the MPLS-TP related RFCs listed below. ITU-T The following ITU-T Recommendations exist for MPLS-TP. Some of those Recommendations are superseding the ones that applied to T-MPLS before this work was ceased. RFC or drafts The following IETF RFCs or drafts exist for MPLS-TP: Solutions The solutions for the above requirements and framework are as mentioned below and is under development: An In-Band Data Communication Network For the MPLS Transport Profile MPLS Generic Associated Channel- Defines GAL/G-ACH "EXP field" renamed to "Traffic Class field" MPLS Transport Profile Lock Instruct and Loopback Functions A Thesaurus for the Interpretation of Terminology Used in MPLS Transport Profile (MPLS-TP) Internet-Drafts and RFCs in the Context of the ITU-T's Transport Network Recommendation MPLS-TP ACH TLV (IETF Draft) Proactive continuity an
https://en.wikipedia.org/wiki/David%20Andreoff%20Evans
David Andreoff Evans (born 1948 in St. Louis) is an American scientist in the field of computational linguistics, best known for his research into indexing using natural language processing, and in ontology learning, especially in medical informatics. Education Evans attended Stanford University, receiving his Ph.D. in Computational Linguistics there in 1982. He attended the Inter-University Center for Japanese Language Studies in 1979. Career He was on the faculty of Carnegie Mellon University from 1983 until 1996, and founded their Computational Linguistics Program and Laboratory for Computational Linguistics in 1986. Supported by a grant from Digital Equipment Corporation, he led a research project on "computational-linguistic approaches to indexing and retrieval of text" (CLARIT). In September 1992, CLARIT was spun-out from Carnegie-Mellon as a company called Claritech. The technology was used to index the papers of politician H. John Heinz III. Claritech became a research and development subsidiary of JustSystems and its name was changed to Clairvoyance Corporation in 1996, before becoming JustSystems Evans Research in 2007. He has made many contributions to the field of computational linguistics and information retrieval, authoring books, many research papers, and is the holder of 25 US patents. Evans was elected a Fellow of the American College of Medical Informatics in 1999. References 1948 births Living people Stanford University alumni Carnegie Mellon University faculty American computer scientists Linguists from the United States Computational linguistics researchers Businesspeople from Pennsylvania Natural language processing researchers
https://en.wikipedia.org/wiki/Automated%20tissue%20image%20analysis
Automated tissue image analysis or histopathology image analysis (HIMA) is a process by which computer-controlled automatic test equipment is used to evaluate tissue samples, using computations to derive quantitative measurements from an image to avoid subjective errors. In a typical application, automated tissue image analysis could be used to measure the aggregate activity of cancer cells in a biopsy of a cancerous tumor taken from a patient. In breast cancer patients, for example, automated tissue image analysis may be used to test for high levels of proteins known to be present in more aggressive forms of breast cancers. Applications Automated tissue imaging analysis can significantly reduce uncertainty in characterizing tumors compared to evaluations done by histologists, or improve the prediction rate of recurrence of some cancers. As it is a digital system, suitable for networking, it also facilitates cooperative efforts between distant sites. Systems for automatically analyzing tissue samples also reduce costs and save time. High-performance CCD cameras are used for acquiring the digital images. Coupled with advanced widefield microscopes and various algorithms for image restoration, this approach can provide better results than confocal techniques at comparable speeds and lower costs. Processes The United States Food and Drug Administration classifies these systems as medical devices, under the general instrumentation category of automatic test equipment. ATIS have seven basic processes (sample preparation, image acquisition, image analysis, results reporting, data storage, network communication, and self-system diagnostics) and realization of these functions highly accurate hardware and well-integrated, complex, and expensive software. Preparation Specimen preparation is critical for evaluating the tumor in the automated system. In the first part of the preparation process the biopsied tissue is cut to an appropriate size (typically 4 mm), fixed in buffered formalin, dehydrated in ethanol-xylene, embedded in paraffin, thin sectioned typically to 4 um slices, then mounted onto at least two barcoded slides (a control and a test). Next the paraffin is removed from the tissue, the tissue is rehydrated, then stained. Any inconsistency in these procedures from case to case may result in uncertainties in the outcome of the analysis. These potential and irreducible inconsistencies in analysis results motivated the development of Automated Tissue Image Systems. Acquisition Digital micrographs are acquired of the stained specimen on the glass slide. The images are taken by a set of charge-coupled devices (CCD). Analysis Image analysis involves complex computer algorithms which identify and characterize cellular color, shape, and quantity of the tissue sample using image pattern recognition technology based on vector quantization. Vector representations of objects in the image, as opposed to bitmap representations, have superior zoom-in a
https://en.wikipedia.org/wiki/Ram%C5%ABnas%20Vy%C5%A1niauskas
Ramūnas Vyšniauskas (born September 23, 1976 in Kelmė) is a retired weightlifter from Lithuania. He competed in the 105 kg class. He was also a presenter of comedy TV show Lalaila on LNK network. Results Doping In 1997 Vyšniauskas was disqualified for two years due to a positive doping test. In 2014 Vyšniauskas was disqualified again due to a positive doping test. in 2020 Vyšniauskas who already finished his weightlifter career, but worked as weightlifting coach was disqualified for eight years for having and for possibility of distributing doping substances. References Lithuanian male weightlifters Living people 1976 births Weightlifters at the 1996 Summer Olympics Weightlifters at the 2000 Summer Olympics Weightlifters at the 2004 Summer Olympics Weightlifters at the 2008 Summer Olympics Olympic weightlifters for Lithuania Lithuanian television presenters Sportspeople from Klaipėda Lithuanian sportspeople in doping cases Doping cases in weightlifting European Weightlifting Championships medalists 20th-century Lithuanian people 21st-century Lithuanian people
https://en.wikipedia.org/wiki/Stavelot%20Bible
The Stavelot Bible is a Romanesque illuminated manuscript Bible in two volumes datable to 1093–1097. It was produced for, but not necessarily in, the Benedictine monastery of Stavelot, in the Principality of Stavelot-Malmedy of modern Belgium, and required four years to complete. It was probably the main liturgical Bible of the monastery, kept on the altar of the abbey church or in the sacristy, rather than in the library. It is one of the most important Mosan manuscripts of the last quarter of the 11th century, and shares some of its scribes and artists with the earlier Lobbes Bible and a manuscript of Josephus, in all of which a monk called Goderannus was at least a scribe, and possibly the main artist. For many years it was in the Royal Library at Bamberg, until it was acquired by the British Library in London, where it is catalogued as Add MS 28106-28107. The pages measure 581 x 390 mm, and there are 228 and 240 leaves in the two volumes. Authorship Both volumes of the book were written by two Benedictine monks, the calligraphers Brother Ernest (or Ernesto) and Brother Goderannus. Goderannus had the habit, helpful to modern scholars, of adding colophons with some detailed information to his manuscripts. In the Stavelot Bible a colophon records that the work took four years, including the illuminations and what was no doubt a magnificent metalwork treasure binding. The task was finished when "Jerusalem was under attack by many peoples", in other words during the First Crusade. Goderannus had written the Lobbes Bible, which another colophon dates to 1084; at that time he was a monk of Lobbes Abbey, but it is assumed that he had moved to Stavelot in the intervening years, as the Josephus was also made for the abbey there. Many scholars believe that he was also the main artist for the miniatures in both manuscripts, although it is agreed that at least four hands were involved in the miniatures in the Stavelot Bible. In particular, the most famous miniature, the image of Christ in Majesty (shown to the right) was contributed by a different artist, sometimes termed the "Master of the Holy Majesty", who may have been a layman. It has even been suggested that it is a later addition to the manuscript, considering its advanced technique for the time, although most scholars find this theory unlikely, given that other artists of the region were known to demonstrate similar precocity at the time. A number of other miniatures are also attributed to this artist, including the arcades over the canon tables. In general the artists worked roughly on stretches of books in the Biblical sequence, so that, for example, the Pentateuch initials are all by the same hand. Style The Christ in Majesty, which comes at the start of the New Testament, is the only full-page miniature; all others are decorated letters and historiated initials in large narrow panels at the start of the books of the Bible. Several of these show large numbers of small figures i
https://en.wikipedia.org/wiki/Edge%20STP
Edge STPs (signal transfer points) are networking hardware devices embedded with software that performs routing, signaling, firewall, and packet conversion functions. Their primary purpose is to unify networks that use various transports and signaling protocols – such as SS7, SIP, SIGTRAN, TDM, IP, etc. – into cohesive service environments. Unified environments are simpler for telecommunications companies to manage, and also enable them to cost-effectively transition to next-generation networks based on the Internet Protocol (IP). Edge STPs support voice, data and video services. Among their key functions are optimizing traffic flow; providing advanced load sharing between network segments; managing multi-node congestion; translating addresses; filtering and screening packets; and protecting important information. They also provide on-the-fly translation between networks that employ different transports and signaling protocols. That translation capability enables, for example, services that were designed to run on SS7 to run on IP networks instead, and vice versa. Edge STPs at work Unlike traditional STPs, Edge STPs process packet traffic away from the network core, where sensitive applications and customer information reside. They can either perform simple packet routing or deep packet inspection (DPI) that supports content-based routing. DPI is a time-consuming and processor-intensive function that can bog down core network functions and reduce customer response times. Shifting it to the network edge improves overall network performance. Moving functionality to the network edge, companies can add, modify, and expand services without disrupting core network functions. Edge STPs perform a broad range of roles in evolving telecommunications networks. They include optimizing services such as short message service (SMS) for improved performance; providing precise security policies to subnetworks; preventing service interruptions during switch migrations; and connecting server-based applications to switched networks. In the latter scenario, telecommunications companies that are implementing IP subnetworks use Edge STPs to integrate them with their existing SS7 signaling infrastructure. See also Common Channel Signaling SS7 SIGTRAN STP Signaling Gateway References IEEE, http://ieeexplore.ieee.org/Xplore/login.jsp?url=/iel5/6842/18390/00847947.pdf?arnumber=847947 Dynamic edge provisioning for core IP networks IETF SIGTRAN RFC 2719: Architectural Framework for Signaling Transport. External links “Edge device and method for interconnecting SS7 signaling points (SPs) using edge device,” http://www.freepatentsonline.com/6940866.html The new zone of opportunity in telecom networking is on the edge http://www.compactpci-systems.com/articles/id/?3178 US Patent 6940866 - Edge device and method for interconnecting SS7 signaling points(SPs) using edge device https://web.archive.org/web/20110612190213/http://www.patentstorm.us/patents/6940866/
https://en.wikipedia.org/wiki/Simon%20%28computer%29
Simon was a relay-based computer, described by Edmund Berkeley in a series of thirteen construction articles in Radio-Electronics magazine, from October 1950. Intended for the educational purpose of demonstrating the concept of digital computer, it could not be used for any significant practical computation since it had only two bits of memory. In 1950, it sold for US$600. Some have described it as the "first personal computer", although its extremely limited capacity and its unsuitability for use for any purpose other than as an educational demonstration make that classification questionable. History The "Simon project" arose as a result of the Berkeley's book Giant Brains, or Machines That Think, published in November 1949. There, the author said: In November 1950, Berkeley wrote an article titled Simple Simon for Scientific American magazine, that described digital computing principles to the general public. Despite Simon's extreme lack of resources (it could only represent the numbers 0, 1, 2 and 3), Berkeley stated on page 40 that the machine "possessed the two unique properties that define any true mechanical brain: it can transfer information automatically from any one of its "registers" to any other, and it can perform reasoning operations of indefinite length." Berkeley concluded his article anticipating the future: Technical specifications The Simon's architecture was based on relays. The programs ran from a standard paper tape, with five rows of holes for data. The registers and ALU stored only 2 bits. The user entered data via punched paper, or by five keys on the front panel. The machine output data through five lamps. The punched tape served not only for data entry, but also as memory storage. The machine executed instructions in sequence, as it read them from the tape. It could perform four operations: addition, negation, greater than, and selection. Notes External links Simon's FAQ Edmund Berkeley's Simon Relay Processor. Archived Edmund C. Berkeley Papers, Charles Babbage Institute, University of Minnesota. Box 22 has correspondence, memos, accounting records, and notes on the development and marketing of small robots, including Relay Moe, Franken, Tit-Tat-Toe Machine, Test Your Nerve Machine, Simon, and mechanical brain kits. Electro-mechanical computers 1950s computers Computer-related introductions in 1950
https://en.wikipedia.org/wiki/Data%20over%20signalling
Data over signalling (sometimes data over signaling) or DoS, is a technique in telecommunications in which primary data is sent over a signalling channel instead of the subscriber's bearer channel. Background Data over signalling was designed as a solution to the problem of transceiving simultaneous voice and data. Data over signalling can be utilized when the signalling channel is either channel associated or common. However, it is easier to implement when the signalling channel is channel associated, as the system does not have to demultiplex the data and signalling between multiple subscribers. DoS was designed so that mobile telephony subscribers could maintain a voice session on their bearer channel while still accessing data related services, such as text messaging. References Telecommunications techniques Data transmission Telephony
https://en.wikipedia.org/wiki/VidZone
VidZone was one of the largest online music video VOD services in the world, operated by London-based company VidZone Digital Media and Sony Computer Entertainment. The online service provides free streaming of music videos from the VidZone.tv website, in addition to music distribution through a number of mobile networks worldwide. The VidZone catalogue encompasses over 1.5 million tracks, 45,000 music videos and 15,000 realtones, including full access to catalogues from the Universal Music Group, Warner Music, Sony Music and EMI. VidZone's service was extended to the PlayStation 3 video game system in some PAL territories (UK, France, Germany, Italy, Spain, Australia and Ireland) on 11 June 2009, allowing users to watch music videos on their PS3 or streamed to their PSP via Remote Play. The service was expanded by 11 countries: Belgium, The Netherlands, Sweden, Denmark, Finland, Norway, Luxembourg, Austria, Switzerland, Portugal and New Zealand, during November and December 2009. The service launched in the United States on 16 July 2013. Initially, the music videos were from artists signed either on Sony Music or the Universal Music Group. On 16 August 2010, VidZone announced they now have a licensing agreement with the former EMI Music company. On 20 June 2013, Warner Music music videos were added to the service, meaning that VidZone has music videos from all three of the major music record labels. There are currently over 85,000 videos on the service. Just over 8 weeks after launch the VidZone application reached one million in download figures and 100 million video streams while playing host to numerous video exclusives including: U2 – I'll Go Crazy If I Don't Go Crazy Tonight The Prodigy – Take Me to the Hospital Placebo – The Never Ending Why, Ashtray Heart Editors – Papillon Groove Armada – I Won't Kneel The Dead Weather – I Cut Like a Buffalo Chase & Status – Hypest Hype Noisia – Exodus Sub Focus – Splash Tiësto – Escape Me On 12 October 2009, VidZone announced that 1.5 million people have used the service. On 31 December 2009 it was announced that VidZone had become the biggest dedicated music video streaming application in the world having been downloaded 2 million times, and streamed 200 million videos. On 22 April 2010, VidZone announced they are to launch VidZone TV on PS3, which includes 100 'channels' of pre-loaded music videos, behind-the-scenes videos and live concert footage. Vidzone 2.0 On 9 November 2011 Vidzone was updated to version 2.0 which greatly enhanced a number of features of the service. The UI was completely overhauled to include a new "Zones" functionality, whereby users select a "Zone" for the genre of music they wish to listen to, in order to quickly find all music of that type. This includes the "MyZone" section, where users save playlists. A new recommendation engine was also added, as well as social integration with Facebook and PSN as a whole. Samsung Launch On 27 August 2014, Samsung announced that
https://en.wikipedia.org/wiki/Dell%20MediaDirect
Dell MediaDirect is a software application that is published by Dell, Inc. and is pre-installed on the computers they sell. It attempts to provide DVD and CD playback and recent editions include features such as an address book and calendar. It is a custom version of CyberLink PowerCinema developed and licensed to Dell by CyberLink. MediaDirect works in conjunction with the operating system and the Dell QuickSet application. Design controversy Earlier versions of MediaDirect attracted criticism since they adopt a distinctive combination of BIOS and hard drive layout to bypass the installed OS and boot directly to the media player application using a single button press. The chosen approach causes disk geometry to be deliberately misreported, can prevent the successful backup of hard disks and may trigger catastrophic data loss when MediaDirect is launched. Unless the drive and all pre-existing operating systems are left as originally installed, MediaDirect can trigger a forced repartitioning of the drive whilst attempting to load. This intervention typically causes the loss of all operating systems and data on the device. Removing or disabling the application is challenging because Dell employs Host protected area technology to cloak the location of the partition containing the software, contributing to the misreported disk geometry. Versions Version 4 Version 4 deletes the dual-boot "fast start" capability and associated disk partition. It is now installed as a standard application. MediaDirect 4 includes optimisations for multi-media playback and is primarily used to support Blu-ray drives. Version 3 Version 3.5 is compatible with Microsoft Windows XP and Vista (it also works on Windows 7 and Windows 8.1). Each version has separate editions that can only be installed on certain computer models. This is achieved by using folder and file names in the installation software that matches the BIOS SystemID. XPS M1330 XPS M1530 MXG071 - XPSM1730 Version 3.3 is compatible with Microsoft Windows XP and Vista (it also works on Windows 7 and Windows 8.1). Each version has separate editions that can only be installed on certain computer models. This is achieved by using folder and file names in the installation software that matches the BIOS SystemID. MXC061 - Inspiron 640M MM061 - Inspiron 6400/E1505 MP061 - Inspiron 9400/E1705 MXC062 - XPS M1210 MXG061 - XPS M1710 MXP061 - XPS M2010 Version 3 has a dual-boot option where the software can utilize a minimal load of the operating system which speeds boot time and simplifies operation. Version 1.1 Released Sep. 1, 2005, is compatible with Microsoft Windows XP and the following Dell systems: Inspiron 6000 XPS/Inspiron XPS Gen 2 Inspiron 9300 XPS/Inspiron M170 Inspiron 1720 More information Understanding the Dell Media Direct Partition Dell Media Direct Destroys Partitions?, Dell Direct Media Nuked my System Dell MediaDirect 4.0 Frequently Asked Questions (FAQ) How to Reinst
https://en.wikipedia.org/wiki/IntervalZero
IntervalZero, Inc. develops hard real-time software and its symmetric multiprocessing (SMP) enabled RTX and RTX64 software transform the Microsoft Windows general-purpose operating system (GPOS) into a real-time operating system (RTOS). IntervalZero and its engineering group regularly release new software (cf its history). Its most recent product, RTX64, focuses on 64-bit and symmetric multiprocessing (SMP) to replace dedicated hardware based systems such as digital signal processors (DSPs) or field-programmable gate arrays (FPGAs) with multicore PCs. For instance, an audio mixing surface manufacturer which largely deployed DSP based systems, switched to personal computer (PC) based systems, dedicating multi-core processors for the real time audio processing. Founded in July 2008 by a group of former Ardence executives, IntervalZero is headed by CEO Jeffrey D. Hibbard. The firm has offices in Waltham, MA; Nice, France; Munich, Germany, and Taiwan, ROC. This global presence is important because these solutions are deployed worldwide, primarily in industrial automation, military, aerospace, medical devices, digital media, and test and simulation software. The corporate name, IntervalZero, comes from the technical definition of the optimal experience between a system command and execution. History IntervalZero's lineage traces back to 1980, when a group of Massachusetts Institute of Technology engineers started VenturCom and began to develop expertise in embedded technology. It was during this time that Venix was developed and marketed. Their first innovation was to focus on Windows NT 4.0 as a possible real-time solution for the Industry in 1995 by releasing RTX. Since then, a lot of controllers are PC and Windows based. Their second innovation came as a second product, Component Integrator, which makes Windows NT 4.0 an embedded OS. It was licensed by Microsoft a few years later and became the origin of Windows NT Embedded. In 2004, VenturCom, was renamed Ardence. In December 2006, Citrix Systems announced an agreement to acquire Ardence's enterprise and embedded software businesses. It integrated the software streaming products into the Citrix portfolio in 2007 and early 2008. In 2008, a group of former Ardence executives founded IntervalZero and acquired the Ardence embedded software business from Citrix Systems Inc. Citrix retained a minority ownership the firm. On July 28, 2008, Intervalzero announced that it had acquired the Ardennce embedded software division with Citrix Systems Inc. Products IntervalZero develops RTX and RTX64, hard real-time software that transforms Microsoft Windows into a real-time operating system (RTOS). Executive Officers Jeffrey D. Hibbard, Chief Executive Officer Mark Van Vranken, Chief Financial Officer Brian Calder, Vice President, North America Sales & Marketing Daron Underwood, Vice President, CTO Brian Carter, Vice President, Strategic Communications Bryan Levey, Vice President, Engineering
https://en.wikipedia.org/wiki/Simultaneous%20voice%20and%20data
In telecommunications, a system that supports simultaneous voice and data (SVD) is one that can transceive both voice and primary data concurrently over one PSTN modem. Background Before telecommunication networks began to support data related services, the bearer channel was dedicated solely to voice information. When support for data related services was originally released, the bearer channel was switched between being dedicated to voice information or dedicated to primary data information, depending on the subscriber's needs at any given time. Eventually, support for simultaneous voice and data transmission was added to modems and mobile devices, to enable subscribers to use voice and data services at the same time. Types Digital Simultaneous Voice and Data, or DSVD, defined by the ITU-T V.70 standard. Analog Simultaneous Voice and Data, or ASVD, defined by the ITU-T V.61 standard. Data over signalling, or DoS, wherein data is multiplexed onto the signalling channel and voice is dedicated to the bearer channel. Combined voice and data, wherein the data is multiplexed with voice onto the bearer channel. See also Multiplexing Voice activity detection References and notes Telephony Data transmission
https://en.wikipedia.org/wiki/Fantom%20%28programming%20language%29
Fantom is a general-purpose object-oriented programming language, created by Brian and Andy Frank, that runs on the Java Runtime Environment (JRE), JavaScript, and the .NET Common Language Runtime (CLR) (.NET support is considered "prototype" status). Its primary design goal is to provide a standard library API that abstracts away the question of whether the code will ultimately run on the JRE or CLR. Like C# and Java, Fantom uses a curly brace syntax. The language supports functional programming through closures and concurrency through the Actor model. Fantom takes a "middle of the road" approach to its type system, blending aspects of both static and dynamic typing. Typing All variables in Fantom are statically typed. Fantom does not have generic types, but it does have a set of built-in generic types: List, Map, and Func. Fantom also has the characteristics of a dynamically typed language because it supports dynamic calls and automatic downcasting. Fantom has a reflection API and metaprogramming capabilities. Fantom is open source under Academic Free License 3.0 and is available for Windows and Unix-like platforms (including Mac OS X). IDE and Tools F4 is the main publicly available IDE for the Fantom language, officially supported by one of the main open-source contributors to the language - Steve Eynon. The F4 IDE is available on GitHub https://github.com/xored/f4 More free tools and information are also available at https://fantom-lang.org/ Pods In Fantom, the unit of deployment is called a pod. Pods take on the role of namespaces, packages, and modules. They are stored as .pod files, which are zip files containing the FCode (the Fantom bytecode), the documentation, and resource files necessary to run the pod. A pod can define any number of types for use in other libraries and applications. A pod name fully qualifies as a type name. For example, fwt::Widget is distinct from webapp::Widget. If a pod contains a type named Main, then it can be executed on the command line with fan <podName> The Fantom build system can package a set of Pods into a JAR archive through build::JarDist. Fantom Widget Toolkit Fantom ships with a standard windowing toolkit called the Fantom Widget Toolkit, or FWT for short. Like Fantom, FWT was designed to be portable across several platforms. It is currently implemented on the JVM using the Standard Widget Toolkit as a backend. The JavaScript implementation is backed by the canvas element and JavaFX, allowing FWT applications to be run in a web browser. There are plans for a CLR implementation using Windows Forms. "Hello World" example Here is the classic Hello world program written in Fantom: // Hello from Fantom! class HelloWorld { static Void main() { echo("Hello, World!") } } Notice that "Void" is capitalized. This is because Void is a class, not a primitive type in Fantom. Name change The original name of the Fantom programming language was Fan, named after the neighborhood where t
https://en.wikipedia.org/wiki/Purple%20Dragon
Purple Dragon may refer to: Lamium maculatum, a plant A group of thugs called the Purple Dragons in the Teenage Mutant Ninja Turtles franchise. A standard computer science textbook Compilers: Principles, Techniques, and Tools A type of dragon in Dungeons & Dragons See also Garden of the Purple Dragon, a fantasy novel
https://en.wikipedia.org/wiki/Ceraurinus
Ceraurinus is an extinct genus of trilobite in the order Phacopida. It contains one species, C. serratus. External links Ceraurinus at the Paleobiology Database Extinct animals of Asia Ordovician trilobites Paleozoic life of Ontario Verulam Formation Paleozoic life of the Northwest Territories Paleozoic life of Nunavut Paleozoic life of Quebec Cheiruridae Phacopida genera
https://en.wikipedia.org/wiki/Jessica%20McNamee
Jessica McNamee (born 16 June 1988) is an Australian actress. She rose to fame in Australia playing roles in the Seven Network television programs Home and Away and Packed to the Rafters. From 2014 to 2015, she starred as patrol officer Theresa Kelly in the USA Network series Sirens. Her film roles include The Vow (2012), Chips (2017), Battle of the Sexes (2017), The Meg (2018) and Mortal Kombat (2021). Career McNamee secured a role in the Seven Network soap opera Home and Away playing the role of Lisa Duffy. She went on to play Sammy Rafter in the television series Packed to the Rafters. In 2009, McNamee was a contestant on the ninth series of Dancing with the Stars. She was partnered with dancer Stefano Olivieri and they were eliminated before the final. The role of Sammy in Packed to the Rafters left McNamee keen to lose the "good girl" image the role created. In the series production breaks, she decided to take on different roles. She starred in the horror film The Loved Ones; which premiered at the Toronto International Film Festival in 2009. In mid-2010, she made the short film 50-50. McNamee went on to secure a role in the 2012 film The Vow. She filmed the project in Toronto alongside Rachel McAdams and Channing Tatum. She described working on the film as a "surreal experience". In 2013, she returned to Packed to the Rafters for the final season as a special guest star. From 2014 to 2015, McNamee starred in the USA Network TV series Sirens. She played the role of Theresa Kelly, a Chicago police officer, and was a main character in the show. In 2017, she portrayed tennis player Margaret Court in Battle of the Sexes. In 2018, McNamee played the lead role of Jenna alongside William Fichtner in the drama film The Neighbor. She played Lori, the ex-wife of megalodon hunter Jonas Taylor (Jason Statham), in the blockbuster The Meg. In 2019, McNamee appeared in the crime-thriller film Locusts, playing the role of Izzy. In August 2019, McNamee was cast in Mortal Kombat as Sonya Blade and it was released in April 2021. In 2020, McNamee appeared in the horror film Black Water: Abyss. She also provided voice work in Rhys Wakefield's drama podcast series titled From Now. In 2021, McNamee was cast in the horror-thriller film The Visitor. Personal life McNamee was born in Sydney. She is the sister of actress Penny McNamee and they have two more sisters and a brother. Her niece is the actress Teagan Croft. Her cousin Daniel McNamee is in the band Art Vs Science. In April 2019, she married Patrick Caruso, a property developer. In February 2010, McNamee became an ambassador for The Fred Hollows Foundation; the foundation focuses on treating and preventing blindness and other vision problems. McNamee represents The Foundation's 'Miracle Club', encouraging supporters to make monthly contributions that will restore sight to people in countries where The Foundation works. Filmography References External links 1988 births Australian film actresses A
https://en.wikipedia.org/wiki/Journey%20to%20Saturn
Journey to Saturn () is a 2008 Danish adult computer-animated science fiction comedy film, directed by Thorbjørn Christoffersen and Craig Frank. It was produced by A. Film A/S and loosely based on Claus Deleuran's comic from 1977 of the same name. The film revolves around a group of Danish astronauts who journey to Saturn on a quest for natural resources. The film also depicts and mocks several Danish stereotypes and characters, like the royal family, the (at the time) Danish prime minister Anders Fogh Rasmussen, Extreme right-wing politician Mogens Glistrup, Danish therapist Carl Mar Møller, Muslim immigrants, American yeehaw's, Jesus, and Danish lack of style and presentability in general. Plot A corporate-backed rocket takes off from Denmark to explore and conquer Saturn for natural resources. The crew consists of wannabe astronaut Per Jensen, military instructor and hardliner Sgt. Arne Skrydsbøl, supply officer Fisse-Ole (Pussy-Ole), tour chef and caterer Jamil Ahmadinejad volunteering because he failed his nationality test (and gets another chance), and two pilots. Upon arrival, the crew makes contact with aliens but it becomes apparent that the chief of the Danish corporation wishes to conspire with the aliens to sell off all the water on Earth (except Greenland). The mission was meant to fail, and the astronauts were never meant to return home. The aliens clear out the Earth spaceship and head to Earth on the way looking into some of the loot from Earth - including a video film they believe to be instructions on friendly Earth greetings, but being in fact a German pornographic movie involving large sausages. The astronauts are left for dead in space, but fall through a black hole and land in Heaven where they get some support. Leaving Heaven guided by the Holy Spirit in the form of a dove, they refuel and make it back to the Moon where they encounter some US astronauts in their secret lunar missile base (including a redneck campervan, shotguns and barbecue). The team then use a US space-based surveillance system to find the centre of the water theft conspiracy back on Earth. The crew return to Earth and rescue a hostage scientist (Per Jensen's girlfriend) at the installation after an gunfight with. They defeat an alien monster with a keg of beer in a manner similar to that in Jaws and escape the installation just in time as it is destroyed by a nuclear bomb, sent from the Moon. Voice cast Casper Christensen as Per Jensen Frank Hvam as Sergeant Arne Skrydsbøl Ali Kazim as Jamil Ahmadinejad Simon Jul Jørgensen as Pussy-Ole Iben Hjejle as Susanne Mortensen: Chief technical flight director Lars Hjortshøj as Ib Bjarke Søballe Andersen as Crowd Kresten Vestbjerg Andersen as Drunk Peter Belli as Alien Dictator Rasmus Bjerg as Agent 2 Klaus Bondam as Kurt Maj: A businessman Thorbjørn Christoffersen as General Tine Clasen as Crowd Claus Darholt as Assistant Tobias Dybvad as the Prime Minister Craig Frank as Afro-American Astronaut Morten P
https://en.wikipedia.org/wiki/2007%20Australian%20Film%20Institute%20Awards
The 49th Australian Film Institute Awards ceremony, honoring the best in film for 2007, was broadcast from the Melbourne Convention and Exhibition Centre in Melbourne, Australia on the Nine Network. Geoffrey Rush hosted the show, for the second time. He previously presided over the 48th Australian Film Institute Awards the previous year. The nominees were announced on 24 October 2007. Deborra-Lee Furness, Sibylla Budd, Marny Kennedy, and AFI President James Hewison made the announcements. Romulus, My Father got the highest nominations with a total of sixteen with The Home Song Stories with the second highest number of fourteen. Clubland came third with eleven nominations. The award winners were announced at two ceremonies; one on the 5 December ("industry" categories) and the other on 6 December (top categories), 2007. Films that won multiple Australian Film Institute Awards include: The Home Song Stories (7) and Romulus, My Father (4). The Home Song Stories performed exceptionally well, taking out a total 7 of its 14 nominations. The wins included, Best Direction (Tony Ayres), Best Actress in a Lead Role (Joan Chen), Best Screenplay (Tony Ayres), Achievement in Cinematogoraphy (Nigel Bluck), Achievement in Editing (Denise Haratzis), Best Original Score (Antony Partos), Best Achievement in Production Design (Melinda Doring) and the award for Achievement in Costume Design for Cappi Ireland. Winners of major awards Films Feature films Special honors Television Multiple nominations Multiple film nominations The following films received multiple nominations. 16 nominations: Romulus, My Father 14 nominations: The Home Song Stories 11 nominations: Clubland 9 nominations: Noise 3 nominations Razzle Dazzle: A Journey Into Dance Film A A AFI AFI
https://en.wikipedia.org/wiki/Comparison%20of%20web%20hosting%20control%20panels
The following tables compare general and technical information for a variety of web hosting control panel software packages. License and operating system support Free and open source control panels Proprietary control panels Remote access Some control panels allow shell (console) access to the underlying OS through a Java applet, requiring that the client-side computer use Java Virtual Machine software. Other control panels allow direct access using telnet or secure shell (SSH). Email management While all control panel software below supports multiple email accounts, the features they provide vary. References Web hosting control panels Web server management software
https://en.wikipedia.org/wiki/IPX%20%28disambiguation%29
IPX is the Internetwork Packet Exchange, Novell's network protocol. IPX may also refer to: IP exchange, GSM Association's protocol IPX, an IP code for ingress protection Hirose U.FL, a small coaxial connector form Interplanetary Expeditions, a fictional corporation in the television series Babylon 5
https://en.wikipedia.org/wiki/Guy%20Caballero
Guy Caballero is a fictional character on the television series SCTV played by Joe Flaherty. President and owner of the fictional SCTV network, Caballero usually appeared on the series to introduce various network programs, although he also occasionally got wrapped up in behind-the-scenes storylines. Character Cheap, dishonest, gruff, and prone to making meandering patriotic speeches for no good reason, Caballero liked to affectionately describe his employees as "the SCTV family," although he routinely treated them with disdain. He was always seen in a white suit and white Panama hat, but his most notable quirk was his use of a wheelchair despite not needing one; he believed that the wheelchair helped earn people's "respect." Though Caballero's personal past was left deliberately shady, it was mentioned several times that he was an illegal alien (from South America) who had managed to buy his way into the United States "when he showed up in Panama with suitcases full of Nazi gold." Caballero has a huge mansion named "Casa del Forgeo" that he paid for by forging checks, but he is too cheap to pay for a phone inside the house—instead, he had his mansion built near a payphone. Guy's wife Googie was infrequently mentioned and never seen. He also had two sons named Ricky and Sonny (played by Rick Moranis and Eugene Levy) and a daughter Connie (played by Andrea Martin). Guy at one point had an affair with SCTV star Lola Heatherton, but broke it off, later explaining (using network ratings terms) "it was doing poorly in the overnights". Guy Caballero was originally a character heard only over the phone in two first-season SCTV episodes aired in 1977 (both times, he called Moe Green while on the air to complain about Moe's show "Dialing For Dollars"). The character made his first physical appearance in the SCTV second season opener, aired in September, 1978, and was thereafter a fixture of the show, appearing regularly from that point on. As the owner and president of SCTV, Guy frequently appeared on the network to introduce shows, to make announcements, or to apologize for previous programming blunders. Behind the scenes, Guy was ever on the lookout for cheap, popular programming, and he had no qualms about running shows that pandered to the audience, or were low-quality knockoffs of other, more popular TV series. Sticking to a low, low budget was also a priority, as writer/director/star Johnny LaRue found out after he used an expensive crane shot in his production of "Polynesiantown"—Caballero cancelled all of LaRue's SCTV projects, and further punished him by forcing him to do a solo late-night program called "Street Beef" which used exactly one camera and one microphone. It is rumored that Flaherty based the mannerisms and appearance of the Cabellero character on Laurence Olivier's portrayal of Loren Hardman in the movie The Betsy, released earlier in 1978. Adapted from the Harold Robbins book of the same name, the movie portrays Loren Hardman a
https://en.wikipedia.org/wiki/Tensor%20decomposition
In multilinear algebra, a tensor decomposition is any scheme for expressing a "data tensor" (M-way array) as a sequence of elementary operations acting on other, often simpler tensors. Many tensor decompositions generalize some matrix decompositions. Tensors are generalizations of matrices to higher dimensions (or rather to higher orders, i.e. the higher number of dimensions) and can consequently be treated as multidimensional fields. The main tensor decompositions are: Tensor rank decomposition; Higher-order singular value decomposition; Tucker decomposition; matrix product states, and operators or tensor trains; Online Tensor Decompositions hierarchical Tucker decomposition; block term decomposition Notation This section introduces basic notations and operations that are widely used in the field. Introduction A multi-way graph with K perspectives is a collection of K matrices with dimensions I × J (where I, J are the number of nodes). This collection of matrices is naturally represented as a tensor X of size I × J × K. In order to avoid overloading the term “dimension”, we call an I × J × K tensor a three “mode” tensor, where “modes” are the numbers of indices used to index the tensor. References Tensors
https://en.wikipedia.org/wiki/Portuguese%20Railways
Portuguese Railways may refer to Comboios de Portugal, the train operating company in Portugal, founded in 1951 Rede Ferroviária Nacional, the infrastructure owner of the Portuguese rail network, founded in 1997
https://en.wikipedia.org/wiki/List%20of%20Monster%20Buster%20Club%20episodes
Monster Buster Club is a children's computer-animated science fiction television series co-produced by French company Marathon Media and Canadian animation studio Image Entertainment Corporation.The series follows the adventures of three human preteens and their alien friend who reform a secret organization known as the "Monster Buster Club" (or MBC) to locate and capture alien criminals in their town. Originally airing from 2008 to 2009, the show ended its run with a total of 2 seasons and 52 episodes. Series overview Episodes Season 1 (2008) Season 2 (2009) References Lists of Canadian children's animated television series episodes Lists of French animated television series episodes
https://en.wikipedia.org/wiki/European%20Network%20for%20Accessible%20Tourism
The European Network for Accessible Tourism (ENAT) is a non-profit association of tourism enterprises, organisations and individuals from the private, public and NGO sectors aimed at evaluating good practices, as well as providing and endorsing services and products for accessible tourism in Europe. ENAT was first set up as a project activity in 2006, within the framework of the EC Disability Action Plan and was originally composed of nine founding members (partners), including VisitBritain and the ONCE Foundation, from six European countries. Although the organization has Europe as its primary concern for accessible tourism, it also welcomes members from other countries and continents. As of 2012, the organisation includes almost 200 registered members from 28 countries, representing over 150 national, European and global organisations. The first ENAT International Tourism for All Congress was held in Valencia, Spain in November 2007. The second international Congress took place in Vienna, Austria from September 30 to October 1, 2009. The United Nations World Tourism Organization (UNWTO) took up Honorary Associate Membership, with Observer status in June 2008. ENAT is registered in the European Commission's Transparency Register. See also Accessibility Accessible Tourism References External links ENAT web site Traveling business organizations Business organizations based in Greece Accessible transportation Disability organizations based in Europe Business organizations based in Europe
https://en.wikipedia.org/wiki/MSX%20Video%20access%20method
The ColecoVision, SG-1000, CreatiVision, and first-generation MSX computers use the TMS9918A Video Display processor (VDP), which has its own 16 KiB of video memory that was not shared with main memory. Compared to the unified system and video memory used by other 8-bit computers of the time, such as the Apple II, ZX Spectrum, and Commodore 64, separate memory has the advantage of freeing up of the Z80 processor's 64 KiB address space for main RAM, and the VDP does not need to steal CPU cycles to access video memory. The disadvantage is that the program has to use the CPU's dedicated I/O instructions to command the VDP to manipulate the contents of the video RAM. This not only slows down video access but also makes the porting of games from unified-memory platforms more difficult. Attempts of porting ZX Spectrum games (in the UK, the system most similar to the MSX) were often thwarted by this difference. Also, programmers had to learn to optimally use the more advanced capabilities of the VDP. The TMS9918A's method of accessing the video RAM is slower than direct access, as used in unified-memory computers, because accessing video memory involved first outputting the low- then the hi-byte of the (14-bit) video memory address to I/O port $99, then one or more bytes of 8-bit data to port $98. After each write, the memory pointer advances to the next address, so consecutive addresses can be written to with repeated OUT instructions to $98. Z80 had as fast OTIR/OTDR block instructions which could be used instead of LDIR/LDDR, still, allowed VRAM access rate was restricted unless during vertical blanking. However, because of the screen layout, (which was top-down for each character of 8 lines then advancing to the next character) this was difficult to use for programmers who tried to convert existing software originally written for a system that had another arrangement of the screen layout. So when trying to use the TMS9918A high resolution mode video memory in the conventional way this method of indirect-access could be far slower than in 8-bit computers with unified memory, like any other piece of RAM. Consequently, machines using this VDP could be inefficient at certain graphical tasks, such as scrolling games, which entailed moving the entire background memory. Instead of being able to use the Z80's efficient and fast block move instructions they had to write elaborate routines that first read bytes from video memory into system memory, and then back to another location in video memory, all one byte at a time. To increase the speed to an acceptable level the programmers then often limited the scrolling to 8-pixel steps, which looked primitive in comparison to the 1 or 2 pixel scrolling steps available to the ZX Spectrum or Commodore 64 machines (although the Commodore 64 also used 8-pixel steps it had a fine-scroll register which could compensate for this, the MSX-1 did not). The TMS9918A did have several features to make up for this shortfall
https://en.wikipedia.org/wiki/Ivanhoe%20%281958%20TV%20series%29
Ivanhoe is a British television adventure series first shown on ITV network in 1958–1959. The show features Roger Moore in his first starring role, as Sir Wilfred of Ivanhoe, in a series of adventures aimed at a children's audience. The characters were drawn loosely from Sir Walter Scott's 1819 novel Ivanhoe. Plot The series is set in England during the 12th century reign of King Richard the Lionheart, who had gone to fight in the Crusades and failed to return. In his absence, power had been taken by his younger brother, the ambitious and wicked Prince John, who sought to strip the people of their rights and land. The dashing and heroic knight Ivanhoe, with his father-and-son companions Gurth and Bart whom he had freed from servitude (from the evil Sir Maurice), attempted to right wrongs, secure justice, help those in need, and thwart John and his allies. Making of the series Swashbuckling adventures for a younger audience, such as The Adventures of the Scarlet Pimpernel, The Adventures of Robin Hood and The Adventures of Sir Lancelot, were an element of ITV's programming in Britain in the mid-1950s. In December 1956, Columbia Pictures signed up Roger Moore, then working with limited success in Hollywood, to play the title role in an intended series for transmission in both America and the UK. The series was a co-production between the Columbia subsidiary Screen Gems and the British producer Sydney Box. The budget was more generous than that of the Robin Hood series running at the time and filming started in early 1957. Shooting of the pilot was at the ABPC studios at Elstree (for the series at Beaconsfield Studios) and on location around Buckinghamshire in England, but with some shooting also taking place in California. The series premiered on ITV in January 1958, while filming of all 39 episodes continued through to June 1958. Although the pilot episode was shot in colour, the rest of the series was shot in black and white. The executive producer was Peter Rogers, who around the same time began producing the Carry On films. Guest stars in the series included Christopher Lee. Supporting actors included John Schlesinger, Jon Pertwee, Paul Eddington, Leonard Sachs, Kenneth Cope, John Warner and Adrienne Corri. Moore insisted on undertaking much of the stunt work himself, resulting in several injuries including three cracked ribs from a fight scene and being knocked unconscious when a battleaxe hit his helmeted skull. Moore later commented, "I felt a complete Charlie riding around in all that armour and damned stupid plumed helmet. I felt like a medieval fireman." The series finished when Moore returned to Hollywood after Warner Brothers offered him a movie role in The Miracle (1959). Cast Roger Moore as Sir Wilfred of Ivanhoe Robert Brown as Gurth (Ivanhoe's armourer) Peter Gilmore as Waldo Ivanhoe Andrew Keir as Prince John Phyllis Neilson-Terry as Eleanor of Aquitaine John Pike as Bart (the son of Gurth)(Ivanhoe's squire) Bruce Seto
https://en.wikipedia.org/wiki/Super-Charged%20network
Super-Charged network or Super-Charger network, is a telecommunications term that refers to a particular standardized implementation of a 3GPP 3G telecommunications network. 3GPP has standardized Super-Charger networks in TS 23.116, the Super-Charger technical realization, and defines a Super-Charged network as a "UMTS network in which the Super-Charger mechanism is being used to optimise mobility management signalling." Background A regular UMTS network can be retrofitted to provide Super-Charger support by providing Super-Charger support within each network entity. Once a network entity has been modified to support Super-Charger functionality it is referred to as a Super-Charged network entity. For example, a Home Location Register (HLR) with Super-Charger functionality would be referred to as a Super-Charged HLR. In a regular telecommunication network environment, transferring from a previous network to a serving network (i.e. handing off) uses a substantial amount of signalling traffic. For 3GPP networks, when the user equipment (UE) enters the serving network from the previous network, the UE triggers a "Location Update" request to be sent from the UE to the serving network's visitor location register (VLR). The serving network's VLR passes the Location Update request to the UE's home network's HLR. The HLR then performs two operations: 1) sends a "Cancel Location" message to the previous network's VLR, in an effort to remove the subscriber's data from the previous network, and 2) sends an Insert Subscriber Data message to the serving network's VLR, in an effort to add the subscriber's information to the serving network. After acknowledgments from the respective VLRs have been received for these steps, the HLR will send a Location Update confirmation back to the serving network, which forwards it to the UE, thereby informing the UE that the location update processing is complete by all parties involved. However, when the UE jumps back and forth between the previous and serving networks, the signalling overhead resulting from the frequent Location Update messages is substantial and the resulting traffic is burdensome to the network. Super-Charger functionality A solution was implemented with the Super-Charger realization in an effort to reduce telecommunications signaling traffic. The general concept behind the Super-Charger network is that the location registers in any visiting network do not delete subscriber data even after a subscriber leaves their control, by, for instance, exiting their coverage area. This allows the UE to jump back and forth between the networks and, since the previous network, serving network, and home network's HLR are Super-Charged and maintaining copies of the subscriber information, the HLR does not have to re-send the subscriber information or Cancel Location request messages. Considerations Outdated subscriber information in visiting networks Outdated subscriber information is a concern if the UE does
https://en.wikipedia.org/wiki/Cube%20attack
The cube attack is a method of cryptanalysis applicable to a wide variety of symmetric-key algorithms, published by Itai Dinur and Adi Shamir in a September 2008 preprint. Attack A revised version of this preprint was placed online in January 2009, and the paper has also been accepted for presentation at Eurocrypt 2009. A cipher is vulnerable if an output bit can be represented as a sufficiently low degree polynomial over GF(2) of key and input bits; in particular, this describes many stream ciphers based on LFSRs. DES and AES are believed to be immune to this attack. It works by summing an output bit value for all possible values of a subset of public input bits, chosen such that the resulting sum is a linear combination of secret bits; repeated application of this technique gives a set of linear relations between secret bits that can be solved to discover these bits. The authors show that if the cipher resembles a random polynomial of sufficiently low degree then such sets of public input bits will exist with high probability, and can be discovered in a precomputation phase by "black box probing" of the relationship between input and output for various choices of public and secret input bits making no use of any other information about the construction of the cipher. The paper presents a practical attack, which the authors have implemented and tested, on a stream cipher on which no previous known attack would be effective. Its state is a 10,000 bit LFSR with a secret dense feedback polynomial, which is filtered by an array of 1000 secret 8-bit to 1-bit S-boxes, whose input is based on secret taps into the LFSR state and whose output is XORed together. Each bit in the LFSR is initialized by a different secret dense quadratic polynomial in 10, 000 key and IV bits. The LFSR is clocked a large and secret number of times without producing any outputs, and then only the first output, a bit for any given IV is made available to the attacker. After a short preprocessing phase in which the attacker can query output bits for a variety of key and IV combinations, only 230 bit operations are required to discover the key for this cipher. The authors also claim an attack on a version of Trivium reduced to 735 initialization rounds with complexity 230, and conjecture that these techniques may extend to breaking 1100 of Trivium's 1152 initialization rounds and "maybe even the original cipher". this is the best attack known against Trivium. The attack is, however, embroiled in two separate controversies. Firstly, Daniel J. Bernstein disputes the assertion that no previous attack on the 10,000-bit LFSR-based stream cipher existed, and claims that the attack on reduced-round Trivium "doesn't give any real reason to think that (the full) Trivium can be attacked". He claims that the Cube paper failed to cite an existing paper by Xuejia Lai detailing an attack on ciphers with small-degree polynomials, and that he believes the Cube attack to be merely a rei
https://en.wikipedia.org/wiki/Format%20%28command%29
In computing, format, a command-line utility that carries out disk formatting. It is a component of various operating systems, including 86-DOS, MS-DOS, IBM PC DOS and OS/2, Microsoft Windows and ReactOS. Overview The command performs the following actions by default on a floppy disk, hard disk drive, solid state (USB), or other magnetic medium (it will not perform these actions on optical media): clearing the FAT entries by changing them to clearing the FAT root directory by changing any values found to checking each cluster to see if it is good or bad and marking it as good or bad in the FAT Any storage device must have its medium structured to be useful. This process is referred to as "creating a filesystem" in Unix, Linux, or BSD. Under these systems different commands are used. The commands can create many kinds of file systems, including those used by DOS, Windows, and OS/2. Implementations The command is also available in Intel ISIS-II, iRMX 86, MetaComCo TRIPOS, AmigaDOS, Zilog Z80-RIO, Microware OS-9, DR FlexOS, TSL PC-MOS, SpartaDOS X, Datalight ROM-DOS, IBM/Toshiba 4690 OS, PTS-DOS, SISNE plus, and in the DEC RT-11 operating system. Microsoft DOS and Windows On MS-DOS, the command is available in versions 1 and later. Optionally (by adding the /S, for "system" switch), format can also install a Volume Boot Record. With this option, Format writes bootstrap code to the first sector of the volume (and possibly elsewhere as well). Format always writes a BIOS Parameter Block to the first sector, with or without the /S option. Another option (/Q) allows for what Microsoft calls "Quick Format". With this option the command will not perform steps 2 and 3 above. Format /Q does not alter data previously written to the media. Typing "format" with no parameters in MS-DOS 3.2 or earlier would automatically, without prompting the user, format the current drive; however in MS-DOS 3.3 and later it would simply produce the error: "required parameter missing". DR/Novell DOS DR DOS 6.0 includes an implementation of the command. FreeDOS The FreeDOS version was developed by Brian E. Reifsnyder and is licensed under the GPL. ReactOS The ReactOS implementation is based on a free clone developed by Mark Russinovich for Sysinternals in 1998. It is licensed under the GPL. It was adapted to ReactOS by Emanuele Aliberti in 1999 and supports FAT, FAT32, FATX, EXT2, and BtrFS filesystems. See also Disk formatting Data recovery convert File Allocation Table Design of the FAT file system fdisk PC DOS 7.10 Format32 Notes References Further reading External links Microsoft Windows XP Professional Product Documentation: "format" Open source FORMAT implementation that comes with MS-DOS v2.0 MSKB255867: How to Use the Fdisk Tool and the Format Tool to Partition or Repartition a Hard Disk Microsoft DOS format command Recovery Console format command External DOS commands Hard disk software Microsoft free software MSX-DOS commands OS/2 command
https://en.wikipedia.org/wiki/CBEFF
CBEFF (Common Biometric Exchange Formats Framework) is a set of ISO/IEC standards defining an approach to facilitate serialisation and sharing of biometric data in an implementation agnostic manner. This is achieved through use of a data structure which both describes, and contains, biometric data. Overview CBEFF defines abstract data elements used to construct Biometric Information Record (BIRs). A BIR consists of: at least one Standard Biometric Header (SBH), at least one Biometric Data Block (BDB), and an optional Security Block (SB). The Biometric Data Block (BDB) format requirements are not defined by CBEFF. Instead, the root header (SBH) identifies the remaining BIR data elements, such as the BDB type and information related to any child or sibling BIRs. If included, the optional Security Block (SB) specifies encryption and integrity information for the entire structure. CBEFF defines the following types of CBEFF BIR structures: simple CBEFF BIR structure complex CBEFF BIR structure self-identifying simple CBEFF BIR structure multiple CBEFF BIR structure These CBEFF BIR structures allow different BIR contents and configurations, including single BIRs, child BIRs, and multiple linked BIRs to meet the demands of a given domain of use. A CBEFF patron format is then defined using one of the CBEFF BIR structures. The CBEFF patron format definition will specify the required and optional CBEFF data elements, any patron-specific data elements, and any abstract values. A specific CBEFF patron format can then be used by one or more entities to exchange biometric data. CBEFF BIR structures and data elements can be seen as the building blocks for the CBEFF patron formats used for biometric data exchange. History CBEFF was developed through a series of workshops from 1999 to 2000 by the CBEFF Development Team, composed of the National Institute of Standards and Technology (NIST) and the BioAPI Consortium. From 2001 until 2006 CBEFF was maintained as the NISTIR 6529 standard, until February 2005 when it was adopted as the ANSI INCITS 398-2005 standard. In May 2006, it was adopted as an international standard, ISO/IEC 19785 by ISO/IEC. CBEFF is presently maintained within ISO/IEC JTC 1/SC 37. ISO/IEC 19785 is a multipart standard consisting of: Part 1: Data Element Specification Part 2: Procedures for the Operation of the Biometric Registration Authority Part 3: Patron Format Specifications Part 4: Security block format specification Purpose The intent of CBEFF is to define an approach to generically store and exchange biometric data in a structure where accompanying meta-data defines the data it carries. This means a client application need not be concerned with the specifics of every possible biometric type (eg: face, finger, iris, etc) or encoding format (eg: XML, TLV encoded, simple byte encoded, etc), rather it needs to know only two things to access data it is interested in: how to parse the header (SBH) of a CBEFF compliant
https://en.wikipedia.org/wiki/1991%20Nepal%20census
The 1991 Nepal census was a widespread national census conducted by the Nepal Central Bureau of Statistics. Working with Nepal's Village Development Committees at a district level, they recorded data from all the main towns and villages of each district of the country. The data included statistics on population size, households, sex and age distribution, place of birth, residence characteristics, literacy, marital status, religion, language spoken, caste/ethnic group, economically active population, education, number of children, employment status, and occupation. This census was followed by the 2001 Nepal census. References See also List of village development committees of Nepal (Former) 2001 Nepal census 2011 Nepal census Censuses in Nepal Nepal 1991 in Nepal
https://en.wikipedia.org/wiki/Data
In common usage and statistics, data (; ) is a collection of discrete or continuous values that convey information, describing the quantity, quality, fact, statistics, other basic units of meaning, or simply sequences of symbols that may be further interpreted formally. A datum is an individual value in a collection of data. Data is usually organized into structures such as tables that provide additional context and meaning, and which may themselves be used as data in larger structures. Data may be used as variables in a computational process. Data may represent abstract ideas or concrete measurements. Data is commonly used in scientific research, economics, and in virtually every other form of human organizational activity. Examples of data sets include price indices (such as consumer price index), unemployment rates, literacy rates, and census data. In this context, data represents the raw facts and figures from which useful information can be extracted. Data is collected using techniques such as measurement, observation, query, or analysis, and is typically represented as numbers or characters which may be further processed. Field data is data that is collected in an uncontrolled in-situ environment. Experimental data is data that is generated in the course of a controlled scientific experiment. Data is analyzed using techniques such as calculation, reasoning, discussion, presentation, visualization, or other forms of post-analysis. Prior to analysis, raw data (or unprocessed data) is typically cleaned: Outliers are removed and obvious instrument or data entry errors are corrected. Data can be seen as the smallest units of factual information that can be used as a basis for calculation, reasoning, or discussion. Data can range from abstract ideas to concrete measurements, including, but not limited to, statistics. Thematically connected data presented in some relevant context can be viewed as information. Contextually connected pieces of information can then be described as data insights or intelligence. The stock of insights and intelligence that accumulates over time resulting from the synthesis of data into information, can then be described as knowledge. Data has been described as "the new oil of the digital economy". Data, as a general concept, refers to the fact that some existing information or knowledge is represented or coded in some form suitable for better usage or processing. Advances in computing technologies have led to the advent of big data, which usually refers to very large quantities of data, usually at the petabyte scale. Using traditional data analysis methods and computing, working with such large (and growing) datasets is difficult, even impossible. (Theoretically speaking, infinite data would yield infinite information, which would render extracting insights or intelligence impossible.) In response, the relatively new field of data science uses machine learning (and other artificial intelligence (AI)) methods t
https://en.wikipedia.org/wiki/Alpha%20generation%20platform
An alpha generation platform is a technology used in algorithmic trading to develop quantitative financial models, or trading strategies, that generate consistent alpha, or absolute returns. The process of alpha generation refers to generating excess returns. Alpha generation platforms are tools used by hedge funds, banks, CTAs and other financial institutions to help develop and test quantitative trading strategies. Alpha generation platforms support quants in the creation of efficient and productive quantitative trading strategies. Background Traditionally, quants have used tools such as MATLAB, R, C++ and other computer programming languages to create complex trading strategies that help them perform high-frequency trading. However, as market data volumes increase and more traders create financial models that deal with multi-asset class data, news sentiment data and more, quants must spend a large amount of time programming models, debugging code, and integrating multiple market data sources. This is why some firms have begun adding alpha generation platforms to their quant infrastructures. These platforms are often seen as a complement to traditional quantitative tools as they can help quantitative analysts process huge volumes of market data. With many of these platforms, users can write out models in English, program models using the platform's supported computer languages, or import strategies written in MATLAB, C++, R and other languages. Alpha generation platforms also often include data integration and storage capabilities through built-in database solutions that capture, standardize and store massive volumes of financial tick data. Methodology Alpha generation platforms are used to locate excess return in the capital market. They enable the development of mathematical and statistical models that help determine whether or not a specific investment may be profitable. In some quant-driven funds, these models make the final decision on whether to buy or sell an investment. These systems cannot be fully trusted and require qualified quantitative analysts to try to prevent massive drawdowns. The dangers of relying upon a platform were illustrated in a 2007 paper by Andrew Lo. The average quantitative strategy may take from 10 weeks to seven months to develop, code, test and launch. It is important to note that alpha generation platforms differ from low latency algorithmic trading systems. Alpha generation platforms focus solely on quantitative investment research rather than the rapid trading of investments. While some of these platforms do allow analysts to take their strategies to market, others focus solely on the research and development of these highly complex mathematical and statistical models. References External links Crypto Mining Information Stock market Financial markets Financial software Management cybernetics
https://en.wikipedia.org/wiki/John%20Cocke
John Cocke may refer to: John Cocke (computer scientist) (1925–2002), American computer scientist John Alexander Cocke (1772–1854), American politician and Tennessee state militia officer during the Creek War John Cocke (colonel), American officer in the Tennessee militia at the Battle of New Orleans John Hartwell Cocke (1780–1866), American planter and brigadier general in the War of 1812 John R. Cocke (1788–1854), American politician in Virginia John Cocke (Mississippi), state legislator during Reconstruction See also Cocke John Cox (disambiguation) John Cock (disambiguation)
https://en.wikipedia.org/wiki/Dataprobe
Dataprobe is an American manufacturer of systems for minimizing downtime to critical data and communication networks. Dataprobe power control products allow remote management of AC and DC power for reboot, energy management and security. Redundancy switching systems provide T-1 and physical layer switchover and failover for equipment and circuit redundancy. Remote relay control integrates legacy systems that relay on contact closures into the network environment. Products are sold to end users, resellers and OEMs. In 2006, Dataprobe was selected by Harris Corporation to provide voice circuit redundancy switching for the FAA Telecommunications Infrastructure (FTI) project. Products Remote Power Control Redundancy Switching Remote Relay Control References External links Official website Computer peripherals Networking hardware Out-of-band management Companies based in Bergen County, New Jersey Computer companies established in 1969 Privately held companies based in New Jersey Computer companies of the United States
https://en.wikipedia.org/wiki/Marorka
Marorka is a company which specializes in marine energy management. Marorka's head office is in Reykjavik, Iceland along with its servers and data storage infrastructure are supplied with electricity generated using 100% renewable energy resources – geothermal and hydroelectric. Marorka has international offices in Dubai, London and Shanghai. Mororka has an ISO 9001:2000 quality system, and is certified by Det Norske Veritas. Mission Marorka's mission is to deliver products and services to vessel owners and operators to save fuel, increase profitability and reduce harmful emissions. The company was founded in June 2002 and resulted from the PhD thesis of Jón Ágúst Thorsteinsson, Entrepreneur and founder. Systems Marorka has developed reliable, automated, on-board and online energy management systems for the international shipping industry. Marorka's products and services enable vessel operators to optimize fuel consumption by maximizing the energy efficiency of their vessels through the implementation of real-time monitoring and decision support, which are essential components of any operational optimization process. Marorka's systems have been installed on board vessels of various types and sizes; Fishing vessels, Cargo vessels, Bulk carriers, LNG carriers, Cruise ships and Research vessels. Overview of work Marorka's field of work: consultancy for vessel building operational analysis of ocean vessels development of Marorka Onboard (energy management system), the marine energy management system development of Marorka Online and Marorka Online SEEMP Recognition In 2008, Marorka received the Nordic Council Environment Prize. 37 companies were nominated for the award. See also Marine Energy Management Fuel efficiency Energy Engineering References Villemes, Katinka. Nature and Environment Prize 2008 goes to Iceland, norden.org, October 10, 2008 Wilson-Roberts, Guy. Green award for emissions-reducing technology, Sustainable Shipping News, October 28, 2008 World Fishing External links Marorka's website Electric power companies of Iceland Energy conservation Software companies of Iceland Companies established in 2002 2002 establishments in Iceland Companies based in Reykjavík
https://en.wikipedia.org/wiki/Roads%20in%20Thailand
Roads in Thailand may refer to: Controlled-access highways in Thailand Thai Expressway network Thai motorway network Elevated Tollway Thai highway network
https://en.wikipedia.org/wiki/Sid%20the%20Science%20Kid
Sid the Science Kid (also known as Jim Henson's Sid the Science Kid) is an American computer-animated children's television series produced by The Jim Henson Company in association with PBS affiliate KCET, that aired on PBS Kids from September 1, 2008 to March 25, 2013. Reruns continued on the PBS Kids Channel through June 25, 2023. The show is created using digital puppetry. Each character required two puppeteers working in concert, one performing the face and mouth using a remote manipulator or Waldo, and the other performing the body using motion capture. Development began in early 2007 under the original working title of "What's the Big Idea?" and with the title-character being originally named Josh. In the fall of 2007, the show was retitled "Sid the Science Kid" and the original Josh was renamed to become the title-character. In mid-November 2007, the title-character was altered and, by the end of the month, Gerald, May and Gabriella joined the series as main characters, bringing the total to four. In early December 2007, Susie joined the character list as the only human, bringing the total to five. Production began in January 2008 with 40 half-hour episodes (in addition to a special) being ordered for the first season as a two-year on-air commitment. On May 17, 2010, the series was renewed for a second season with 20 episodes (in addition to six specials) that premiered on June 21, 2010 with the "No School Sing-Along Special" and later aired the season's first episode on October 4, 2010. 66 episodes were produced. Premise The main character in the show is Sid, an "inquisitive youngster" who uses comedy to tackle questions kids have about basic scientific principles and why things work the way they do. He tries to answer questions and solve problems with the help of his classmates (May, Gerald, and Gabriela), Teacher Susie, and his family (his mother Alice, his father Mort, his Grandma Rose and his baby brother Zeke). In "Hello Doggie," Sid's Grandma adopts a dog from the animal shelter (which she names Philbert – voiced by Bruce Lanoil, motion captured by Daisy the dog). The conceptual content of Sid is based in national science learning standards, cognitive learning theory, and on the preschool science curriculum, Preschool Pathways to Science. In Season 1, each week's episodes are built around a single scientific topic or concept. The first week (episodes 1 – 5) focuses on scientific tools and concepts (such as charts, observation, estimation, and measuring). The second week (episodes 6 – 10) focuses on changes and transformation (including decay, growth, freezing and melting, and the effects of heat). The third week (episodes 11 – 15) focuses on the senses (including touch, smell, sight, taste, and hearing). The fourth week (episodes 16 – 20) focuses on health (including brushing teeth, eating good-tasting food, sneezing and exercise). The fifth week (episodes 21 – 25) focuses on simple machines (including wheels, inclined planes,
https://en.wikipedia.org/wiki/IDistance
In pattern recognition, the iDistance is an indexing and query processing technique for k-nearest neighbor queries on point data in multi-dimensional metric spaces. The kNN query is one of the hardest problems on multi-dimensional data, especially when the dimensionality of the data is high. The iDistance is designed to process kNN queries in high-dimensional spaces efficiently and it is especially good for skewed data distributions, which usually occur in real-life data sets. The iDistance can be augmented with machine learning models to learn the data distributions for searching and storing the multi-dimensional data. Indexing Building the iDistance index has two steps: A number of reference points in the data space are chosen. There are various ways of choosing reference points. Using cluster centers as reference points is the most efficient way. Succinctly, the data points are partitioned into Voronoi cells based on well-chosen reference points. The distance between a data point and its closest reference point is calculated. This distance plus a scaling value is called the point's iDistance. By this means, points in a multi-dimensional space are mapped to one-dimensional values, and then a B+-tree can be adopted to index the points using the iDistance as the key. The figure on the right shows an example where three reference points (O1, O2, O3) are chosen. The data points are then mapped to a one-dimensional space and indexed in a B+-tree. Various extensions have been proposed to make the selection of reference points for effective query performance, including employing machine learning to learn the identification of reference points. Query processing To process a kNN query, the query is mapped to a number of one-dimensional range queries, which can be processed efficiently on a B+-tree. In the above figure, the query Q is mapped to a value in the B+-tree while the kNN search ``sphere" is mapped to a range in the B+-tree. The search sphere expands gradually until the k NNs are found. This corresponds to gradually expanding range searches in the B+-tree. The iDistance technique can be viewed as a way of accelerating the sequential scan. Instead of scanning records from the beginning to the end of the data file, the iDistance starts the scan from spots where the nearest neighbors can be obtained early with a very high probability. Applications The iDistance has been used in many applications including Image retrieval Video indexing Similarity search in P2P systems Mobile computing Recommender system Historical background The iDistance was first proposed by Cui Yu, Beng Chin Ooi, Kian-Lee Tan and H. V. Jagadish in 2001. Later, together with Rui Zhang, they improved the technique and performed a more comprehensive study on it in 2005. References External links iDistance implementation in C by Rui Zhang Google's iDistance implementation in C++ Classification algorithms Machine learning algorithms
https://en.wikipedia.org/wiki/List%20of%20chess%20software
Chess software comes in different forms. A chess playing program provides a graphical chessboard on which one can play a chess game against a computer. Such programs are available for personal computers, video game consoles, smartphones/tablet computers or mainframes/supercomputers. A chess engine generates moves, but is accessed via a command-line interface with no graphics. A dedicated chess computer has been purpose built solely to play chess. A graphical user interface (GUI) allows one to import and load an engine, and play against it. A chess database allows one to import, edit, and analyze a large archive of past games. Chess-playing programs for personal computers Chess engines This list contains only chess engines for which Wikipedia articles exist yet and therefore is very incomplete. It does not reflect or imply current or historic play strength as this characteristic in itself usually does not warrant an entry on Wikipedia. Chess graphical user interfaces Chess-playing programs for video game consoles Chess apps for phones/tablets Chess computers The following are special-purpose hardware/software combinations that are inextricably connected: Programs for reading and editing chess databases Chess Assistant Chess Informant Expert ChessBase Shane's Chess Information Database Chess-playing programs for mainframes/supercomputers AlphaZero Chess (Northwestern University) CilkChess Kaissa Kotok-McCarthy Mac Hack Tiniest chess programs 1K ZX Chess Microchess Toledo Nanochess See also References Video game lists by genre Software Lists of software
https://en.wikipedia.org/wiki/Computer%20virus
A computer virus is a type of malware that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs. If this replication succeeds, the affected areas are then said to be "infected" with a computer virus, a metaphor derived from biological viruses. Computer viruses generally require a host program. The virus writes its own code into the host program. When the program runs, the written virus program is executed first, causing infection and damage. By contrast, a computer worm does not need a host program, as it is an independent program or code chunk. Therefore, it is not restricted by the host program, but can run independently and actively carry out attacks. Virus writers use social engineering deceptions and exploit detailed knowledge of security vulnerabilities to initially infect systems and to spread the virus. Viruses use complex anti-detection/stealth strategies to evade antivirus software. Motives for creating viruses can include seeking profit (e.g., with ransomware), desire to send a political message, personal amusement, to demonstrate that a vulnerability exists in software, for sabotage and denial of service, or simply because they wish to explore cybersecurity issues, artificial life and evolutionary algorithms. Computer viruses cause billions of dollars' worth of economic damage each year. In response, an industry of antivirus software has cropped up, selling or freely distributing virus protection to users of various operating systems. History The first academic work on the theory of self-replicating computer programs was done in 1949 by John von Neumann who gave lectures at the University of Illinois about the "Theory and Organization of Complicated Automata". The work of von Neumann was later published as the "Theory of self-reproducing automata". In his essay von Neumann described how a computer program could be designed to reproduce itself. Von Neumann's design for a self-reproducing computer program is considered the world's first computer virus, and he is considered to be the theoretical "father" of computer virology. In 1972, Veith Risak directly building on von Neumann's work on self-replication, published his article "Selbstreproduzierende Automaten mit minimaler Informationsübertragung" (Self-reproducing automata with minimal information exchange). The article describes a fully functional virus written in assembler programming language for a SIEMENS 4004/35 computer system. In 1980, Jürgen Kraus wrote his Diplom thesis "Selbstreproduktion bei Programmen" (Self-reproduction of programs) at the University of Dortmund. In his work Kraus postulated that computer programs can behave in a way similar to biological viruses. The Creeper virus was first detected on ARPANET, the forerunner of the Internet, in the early 1970s. Creeper was an experimental self-replicating program written by Bob Thomas at BBN Technologies in 1971. Creeper used the ARPANET to infect DE
https://en.wikipedia.org/wiki/Neptune%20%28disambiguation%29
Neptune is a planet in the Solar System. Neptune may also refer to: Neptune (mythology), a god in Ancient Roman mythology Companies Neptune Computer Inc., a Canadian consumer electronics company Neptune Distribution, a UK comic distribution company Neptune Technology Group, a US water-metering equipment manufacturer owned by Roper Technologies Neptune Aviation, an aerial firefighting company Computing Neptune chipset, a code name for the Intel Pentium 430NX chip set Amazon Neptune, a graph database product Sega Neptune, a planned Sega console that was never produced Sun Neptune, a Sun network interface card Windows Neptune, an unreleased version of Microsoft Windows Film and television Neptune, California, a fictional location in Veronica Mars Neptune, a fictional submarine in For Your Eyes Only USS Neptune, a fictional submarine in Gray Lady Down Neptune, a character in the SpongeBob SquarePants series Neptune Vasilias, a character in RWBY, an amine-influenced web series Literature Neptune (Marvel Comics), a Marvel Comics character Sailor Neptune or Michiru Kaioh, a character in the Sailor Moon franchise Neptune, a comic book in the Worlds of Aldebaran comic book series Music Bands Neptune (Italian band), a band from Verona, Italy Neptune (American band), a band from Boston The Neptunes, a group of hip-hop producers Neptune Records, a record label Albums Neptune (The Duke Spirit album) Neptune (Northern Pikes album) Neptune (Toshinobu Kubota album) Songs "Neptune", a song by Azealia Banks and Shystie from Fantasea "Neptune", a 2003 song by InMe from Overgrown Eden "Neptune", a song by Sufjan Stevens, Bryce Dessner, Nico Muhly and James McAlister from Planetarium "Neptune", a song by English rock band Foals from Everything Not Saved Will Be Lost – Part 2 Classical "Neptune, the Mystic", a movement in Gustav Holst's The Planets suite Neptune - Poem of the Sea, an orchestral work by Cyril Scott Places Northern Hemisphere Neptune Beach, Florida, a beachfront city Neptune Township, New Jersey Neptune City, New Jersey, a borough Neptune, Ohio, an unincorporated township Neptune, West Virginia Neptune, Wisconsin Southern Hemisphere Neptune Range, a mountain range in Antarctica Neptune Islands, an island group in South Australia Theatres Epstein Theatre, formerly Neptune Theatre, a theatre in the Liverpool, England, UK Neptune Theatre (Halifax), a theatre in Halifax, Nova Scotia, Canada Neptune Theatre (Seattle), a performing arts venue in Seattle, Washington, U.S. Vehicles Aircraft Beriev Be-2500 or Neptune, a super-heavy amphibian cargo aircraft DRS RQ-15 Neptune, an unmanned reconnaissance aerial vehicle Lockheed P-2 Neptune, a naval patrol bomber and anti-submarine warfare aircraft Ships Neptune (1780 ship), a convict ship in Second Fleet, to New South Wales Neptune (galleon), a 1986 ship replica built for Roman Polanski's film Pirates CS Neptune, a 1862 Confederate Army tugboat
https://en.wikipedia.org/wiki/Riser%20card
A riser card is a printed circuit board that gives a computer motherboard the option for additional expansion cards to be added to the computer. Usage A riser is usually connected to the mainboard's slot through an edge connector, though some, such as NLX and Next Unit of Computing Extreme, instead are plugged into an edge connector on the mainboard itself. In general, the main purpose is to change the orientation of the expansion cards such that they fit a limited space within casing. Riser cables Riser cables are an evolution of riser cards utilizing improved specifications (specifically the use of PCI Express) and better materials, which allows further distances of data transmission and greater orientation flexibility than traditional riser cards. These cables use a Riser Card PCB and an edge connector on each side of the cable, with a copper alloy surrounded by a plastic insulator that allows for the further data transmission distances. Such cables are now commonly used in modern household gaming PC's to allow for different positioning of PCI Express Cards and GPU cards in a computer case. This allows for customization and the addition of additional parts to suit the creator or builders needs. They can additionally be installed into vertical brackets to function similarly to a riser card, but with further flexibility. They are also used in small-form-factor PC's to allow for a GPU to be positioned behind a computer motherboard. Specifications There are only a few specified standards in regards to riser designs. Most use PCI Express edge connectors for data transfer. This allows for maximum data transfer speeds of 32 GB/s when using PCIe 4.0, along with 75W of power to be delivered from the host device. Other specifications used for these cards include ExpressCard and PCI-X. Applications Riser cards have applications in both industrial and consumer spaces. Industrial In servers, height for expansion cards is limited by rack units. A unit (U) is the traditional measurement used for server height. One server unit is equal to 1.75", 2U servers are 3.5", and so forth. Traditional 1U riser cards each fit 1 PCI slot, and 2U riser cards can fit 2 or 3 PCI slots, depending on whether they obstruct access to any PCI-E slots. Consumer In small-form-factor (SFF) computers built by computer enthusiasts, PCI-E riser cards are used in a similar sense to a server application. They are used to sandwich a graphics card closer to a computer motherboard and are made to the same heights as server units for most applications. The additional flexibility afforded by PCI Express can allow for a GPU to be placed "behind" the mainboard, allowing space-efficient orientation without limiting the GPU's airflow. See also Daughterboard References External links Riser Card Installation Computer buses Motherboard Printed circuit board manufacturing
https://en.wikipedia.org/wiki/Giochi%20per%20il%20mio%20computer
Giochi per il mio computer (), also known by the acronym GMC, was an Italian magazine about computer video games and every thing concerns this topic. In Italy it represented the leading magazine in its field and frequently sold more than 100,000 copies. The internal structure was divided in eight sections: editorial, which concerns general video games world's topics column of readers' letters previews of the most expected games general reviews hardware section, including a column dedicated to solve readers' problems the so-called "next level", a section dedicated to mods, free games and bargains in general guide for the complete game, sold with the magazine monthly closing credits GMC had frequent changes in its publisher: when first created, it was published by Il mio castello editore, in Autumn 2000 it was passed to a division of Future Publishing, Future Media Italy (with many other editions) and finally from March 2007, it was published by the Italian publishing house Sprea Media Italy. Deus Ex leak The magazine was involved in the leak of a preview copy of the new Deus Ex game, but was later found to have no responsibility. List of numbers External links Giochi per il mio computer on Sprea Media Italy corporate site Giochi per il mio computer Magazine Page 1997 establishments in Italy 2012 disestablishments in Italy Defunct magazines published in Italy Italian-language magazines Magazines established in 1997 Magazines disestablished in 2012 Magazines published in Milan Monthly magazines published in Italy Video game magazines published in Italy
https://en.wikipedia.org/wiki/C-chart
In statistical quality control, the c-chart is a type of control chart used to monitor "count"-type data, typically total number of nonconformities per unit. It is also occasionally used to monitor the total number of events occurring in a given unit of time. The c-chart differs from the p-chart in that it accounts for the possibility of more than one nonconformity per inspection unit, and that (unlike the p-chart and u-chart) it requires a fixed sample size. The p-chart models "pass"/"fail"-type inspection only, while the c-chart (and u-chart) give the ability to distinguish between (for example) 2 items which fail inspection because of one fault each and the same two items failing inspection with 5 faults each; in the former case, the p-chart will show two non-conformant items, while the c-chart will show 10 faults. Nonconformities may also be tracked by type or location which can prove helpful in tracking down assignable causes. Examples of processes suitable for monitoring with a c-chart include: Monitoring the number of voids per inspection unit in injection molding or casting processes Monitoring the number of discrete components that must be re-soldered per printed circuit board Monitoring the number of product returns per day The Poisson distribution is the basis for the chart and requires the following assumptions: The number of opportunities or potential locations for nonconformities is very large The probability of nonconformity at any location is small and constant The inspection procedure is same for each sample and is carried out consistently from sample to sample The control limits for this chart type are where is the estimate of the long-term process mean established during control-chart setup. See also u-chart References Quality control tools Statistical charts and diagrams
https://en.wikipedia.org/wiki/U-chart
In statistical quality control, the u-chart is a type of control chart used to monitor "count"-type data where the sample size is greater than one, typically the average number of nonconformities per unit. The u-chart differs from the c-chart in that it accounts for the possibility that the number or size of inspection units for which nonconformities are to be counted may vary. Larger samples may be an economic necessity or may be necessary to increase the area of opportunity in order to track very low nonconformity levels. Examples of processes suitable for monitoring with a u-chart include: Monitoring the number of nonconformities per lot of raw material received where the lot size varies Monitoring the number of new infections in a hospital per day Monitoring the number of accidents for delivery trucks per day As with the c-chart, the Poisson distribution is the basis for the chart and requires the same assumptions. The control limits for this chart type are where is the estimate of the long-term process mean established during control-chart setup. The observations are plotted against these control limits, where xi is the number of nonconformities for the ith subgroup and ni is the number of inspection units in the ith subgroup. See also c-chart References Quality control tools Statistical charts and diagrams
https://en.wikipedia.org/wiki/Write%20Ahead%20Physical%20Block%20Logging
Write Ahead Physical Block Logging (WAPBL) provides meta data journaling for file systems in conjunction with Fast File System (FFS) to accomplish rapid filesystem consistency after an unclean shutdown of the filesystem and better general use performance over regular FFS. With the journal, fsck is no longer required at system boot; instead, the system can replay the journal in order to correct any inconsistencies in the filesystem if the system has been shut down in an unclean fashion. History WAPBL was initially committed into NetBSD in 2008, and first appeared with NetBSD 5.0 (2009). With NetBSD 6.0 (2012), soft updates (known as soft dependencies in NetBSD) was removed in favour of WAPBL. See also Log-structured file system Soft updates Unix File System (UFS/FFS) References External links Computer file systems Disk file systems NetBSD Unix file system technology
https://en.wikipedia.org/wiki/Creative%20Commons%20Rights%20Expression%20Language
Creative Commons Rights Expression Language (ccREL) is a proposed Rights Expression Language (REL) for descriptive metadata to be appended to media that is licensed under any of the Creative Commons licenses. According to the draft submitted to the W3C, it is to come in the forms of RDFa for (x)HTML pages and XMP for standalone media. External links Creative Commons W3C submission ccREL: The Creative Commons Rights Expression Language - W3C Member Submission 1 May 2008 FSF and GNU GPL Creative Commons Metadata Digital rights management standards
https://en.wikipedia.org/wiki/Herbert%20Edelsbrunner
Herbert Edelsbrunner (born March 14, 1958) is a computer scientist working in the field of computational geometry, the Arts & Science Professor of Computer Science and Mathematics at Duke University, Professor at the Institute of Science and Technology Austria (ISTA), and the co-founder of Geomagic, Inc. He was the first of only three computer scientists to win the National Science Foundation's Alan T. Waterman Award. Academic biography Edelsbrunner was born in 1958 in Graz, Austria. He received his Diplom in 1980 and Ph.D. in 1982, both from Graz University of Technology. His Ph.D. thesis was entitled Intersection Problems in Computational Geometry obtained under the supervision of Hermann Maurer. After a brief assistant professorship at Graz, he joined the faculty of the University of Illinois at Urbana-Champaign in 1985, and moved to Duke University in 1999. In 1996, with Ping Fu (then director of visualization at the National Center for Supercomputing Applications and his wife), he co-founded Geomagic, a company that develops shape modeling software. Since August 2009 he is Professor at the Institute of Science and Technology Austria (ISTA) in Klosterneuburg. In 1991, Edelsbrunner received the Alan T. Waterman Award. He was elected to the American Academy of Arts and Sciences in 2005, and received an honorary doctorate from Graz University of Technology in 2006. In 2008 he was elected to the German Academy of Sciences Leopoldina. In 2014 he became one of ten inaugural fellows of the European Association for Theoretical Computer Science. He is also a member of the Academia Europaea. Publications Edelsbrunner has over 100 research publications and is an ISI highly cited researcher. He has also published four books on computational geometry: Algorithms in Combinatorial Geometry (Springer-Verlag, 1987, ), Geometry and Topology for Mesh Generation (Cambridge University Press, 2001, ), Computational Topology (American Mathematical Society, 2009, 978-0821849255) and A Short Course in Computational Geometry and Topology (Springer-Verlag, 2014, ). As Edelsbrunner's Waterman Award citation states, Research contributions Edelsbrunner's most heavily cited research contribution is his work with Ernst Mücke on alpha shapes, a technique for defining a sequence of multiscale approximations to the shape of a three-dimensional point cloud. In this technique, one varies a parameter alpha ranging from 0 to the diameter of the point cloud; for each value of the parameter, the shape is approximated as the union of line segments, triangles, and tetrahedra defined by 2, 3, or 4 of the points respectively such that there exists a sphere of radius at most alpha containing only the defining points. Another heavily cited paper, also with Mücke, concerns “simulation of simplicity.” This is a technique for automatically converting algorithms that work only when their inputs are in general position (for instance, algorithms that may misbehave when some three input
https://en.wikipedia.org/wiki/Mornings%20%28CBC%20Music%29
Mornings, titled Weekend Mornings on Saturday and Sunday, is the morning program on the CBC Music radio network in Canada. The program features a cross-genre selection of selected new and old Canadian and international singer/songwriter, rock and pop tracks. It also presents anecdotes, overnight news stories, and background information on the music. The program airs from 6 a.m. to 9 a.m. seven days a week, and premiered in 2008 as part of the network's revamp. Known as Radio 2 Morning and Radio 2 Weekend Morning until the network's rebranding as CBC Music in 2018, it was originally hosted by Tom Allen weekdays and Molly Johnson weekends. Allen left the program in 2009 to become host of Shift, and was succeeded by Bob Mackowycz as weekday host; in 2011, Mackowycz left the program and was succeeded by Tom Power. Johnson left as weekend host in December 2013, and was succeeded Talia Schlanger in January. In August 2016, the CBC announced that Power would be leaving the program to become host of the network's entertainment magazine show Q; around the same time, Schlanger left the program to take a job as contributing producer for the NPR music series World Cafe in the United States. In September, the network announced Raina Douris as the new weekday host, and Angeline Tetteh-Wayoe as the new weekend host. Douris left in September 2019, and was succeeded by Saroja Coelho. In 2021, after Tetteh-Wayoe moved to the network's new weekday evening program The Block, the weekend show was taken over by Daniel Greaves on Saturdays and Damhnait Doyle on Sundays. The program's production staff is based at the Canadian Broadcasting Centre in Toronto, although Power, who is originally from St. John's, occasionally hosted from the CBC's facilities in that city. References External links CBC Music programs Canadian music radio programs 2008 radio programme debuts 2000s Canadian radio programs 2010s Canadian radio programs 2020s Canadian radio programs
https://en.wikipedia.org/wiki/Tempo%20%28radio%20show%29
Tempo is the midday program on the CBC Music radio network in Canada, launched on September 2, 2008. It is hosted by Canadian opera singer Julie Nesrallah and airs classical music. Tempo aims to present music and background stories to inspire. Originally, Tempo ran from 10 a.m. to 3 p.m. each weekday; the show was later cut by an hour, and scheduled from 9 a.m. to 1 p.m. As of summer 2021, the show runs from 9 a.m to 12:00 p.m. Among the show's features was its Haydn Challenge, a now-completed attempt to play all 104 symphonies of Joseph Haydn during the 2009 calendar year. References External links Tempo CBC Music programs Canadian classical music radio programs 2008 radio programme debuts 2000s Canadian radio programs 2010s Canadian radio programs 2020s Canadian radio programs
https://en.wikipedia.org/wiki/Drive%20%28CBC%20Music%29
Drive, formerly known as Radio 2 Drive, is the afternoon program on the CBC Music radio network in Canada, launched September 2, 2008. On air from 3:30 to 7:00 pm, it is hosted by Rich Terfry, also known as Buck 65. The program airs a "mix of current singer-songwriters, roots and urban music". It was a major change for Radio 2, which had previously focused on classical music and jazz. References CBC Music programs Canadian music radio programs 2008 establishments in Canada 2008 radio programme debuts 2000s Canadian radio programs 2010s Canadian radio programs 2020s Canadian radio programs
https://en.wikipedia.org/wiki/America%27s%20Auction%20Channel
America's Auction Channel (or AACtv) is an American satellite television network specializing in over-the-air auctions. AACtv is an American licensed and bonded auction network specializing in live television auctions broadcast via cable television, satellite television and online. Fine jewelry, gemstones, coins and currency, real estate, and art are showcased in an auction atmosphere. History AACtv was founded in April 2002 by Jeremiah Hartman. Hartman, previously an owner of jewelry stores and a host/vendor for Jewelry Television, saw a market for auctioning collectibles, and, after closing his last jewelry store, began America's Auction Network. Initially, the network sold just jewelry, but quickly expanded to antiques, rugs, artwork, Native American Indian collectibles and jewelry, militaria and more. Real estate was added to its repertoire in 2007. On October 1, 2018, AAN started broadcasting as "America's Auction Channel" and owned once again by Jeremiah Hartman. As of September 10, 2019, the network stopped utilizing Dish channel 219 for its permanent channel slot. As of the start of 2020, AAN purchases a number of weekly timeslots on Dish leased access networks to carry its programming. External links References Television channels and stations established in 2002 Shopping networks in the United States Auction television series
https://en.wikipedia.org/wiki/Fort%20Darland
Fort Darland was a post-mediaeval infantry fort built from 1870 to 1900 as part of the defensive network for Chatham Dockyard. It was demolished in the 1960s and the site used for housing. Some earthworks and encasement remain and are visible on aerial photographs. During the Second World War Fort Darland was a British Army detention centre. The camp was one of twelve military detention centres in England, Scotland, and the Orkney and Shetland Islands. First and second-time offenders were sent to seven of the twelve prisons. Fort Darland drew Parliamentary attention after Rifleman William Clarence Clayton perished while incarcerated; two British Army Warrant Officers were criminally charged after an investigation into Clayton's death. In addition to British Army personnel being incarcerated, members of the Canadian Army were also sentenced to Fort Darland upon conviction of first-time offences, usually sent up by their Commanding officers. Prior to Fort Darland becoming a detention centre it was an Army Technical school for boys, built in 1938 and opened for its first intake. In March 1939 it served as a school for both Royal Engineer and Royal Artillery enlisted boys. In 1940 during the Dunkirk evacuation the school became a transit camp for men returning from France the pupils having been sent home and subsequently to other Army schools. After the war, the fort's tunnels were used as a mushroom farm. References British Parliamentary Hansards, 6 July 1943 Canadian National Archives file, 666 (AOP)(RCAF) Squadron, War Diary External links Victorian Forts data sheet Forts in Medway
https://en.wikipedia.org/wiki/Mobile%20Robot%20Programming%20Toolkit
The Mobile Robot Programming Toolkit (MRPT) is a cross-platform and open source C++ library aimed to help robotics researchers to design and implement algorithms related to Simultaneous Localization and Mapping (SLAM), computer vision and motion planning (obstacle avoidance). Different research groups have employed MRPT to implement projects reported in some of the major robotics journals and conferences. MRPT is open source and distributed under the New BSD License. Versions prior to 1.0.0 were released under the GPL. Some features included in the project as user-applications: Visualization and manipulation of large datasets. SLAM algorithms: incremental mapping with ICP, Extended Kalman filtering, Rao-Blackwellized particle filters and GraphSLAM. Grabbing datasets from robotic sensors. Upon a selection of the individual libraries provided by MRPT, users can develop new applications. MRPT participated in Google Summer of Code in 2016–2018. Representation of metric maps Through polymorphism in the design of metric-map classes, observations (such as a laser scans) can be inserted into a grid-map or a map of points, or both simultaneously, transparently to the user. The following representations of metric maps are implemented: Occupancy grid maps. Point maps. Landmark maps: discrete elements are 3D points sensed through range and bearing. For example, visual landmarks. Beacon maps: elements are also 3D points, but sensed by means of range-only devices. Coloured point maps. Gas concentration maps. A "multi map", collections of any of the other maps, behaving as a single map. See also Webots - A Professional Mobile Robot Simulator (Commercial) Microsoft Robotics Studio Player Project Robot software Arduino References External links Free software programmed in C++ Robotics suites Software that uses wxWidgets
https://en.wikipedia.org/wiki/Nano-RK
Nano-RK is a wireless sensor networking real-time operating system (RTOS) from Carnegie Mellon University, designed to run on microcontrollers for use in sensor networks. Nano-RK supports a fixed-priority fully preemptive scheduler with fine-grained timing primitives to support real-time task sets. "Nano" implies that the RTOS is small, using 2 KB of random-access memory (RAM) and using 18 KB of flash memory, while RK is short for resource kernel. A resource kernel provides reservations on how often system resources can be used. For example, a task might only be allowed to execute 10 ms every 150 ms (CPU reservation), or a node might only be allowed to transmit 10 network packets per minute (network reservation). These reservations form a virtual energy budget to ensure a node meets its designed battery lifetime and to prevent a failed node from generating excessive network traffic. Nano-RK is open-source software, is written in C and runs on the Atmel-based FireFly sensor networking platform, the MicaZ motes, and the MSP430 processor. Tradeoffs occur when using an RTOS in sensor networks. Advantages NanoRK takes advantage of priority-based preemptive scheduling to help honor the real-time factor of being deterministic, thus ensuring task timeliness and synchronization. Due to the characteristic of limited battery power on the wireless node, Nano-RK provides central processing unit (CPU), network, and sensor efficiency through the use of virtual energy reservations, labeling this system as a resource kernel. These energy reservations can enforce energy and communication budgets to minimize the negative impact on the node's operational lifetime from unintentional errors or malicious behavior by other nodes within the network. It supports packet forwarding, routing and other network scheduling protocols with the help of a light-weight wireless networking stack. Compared with other current sensor operating systems, Nano-RK provides rich functionality and timeliness scheduling with a small size for its embedded resource kernel (RK). Features Static Configuration – Nano-RK uses a static design-time approach for energy use control, and disallows dynamic task creation, requiring application developers to set both task and reservation quotas/priorities in a static testbed design. This design allows creating an energy budget for each task to maintain application requirements and energy efficiency throughout the system's lifetime. Using a static configuration approach, all of the runtime configurations, and the power requirements, are predefined and verified by the designer before the system is deployed and executed in the real world. This approach also helps to guarantee the stability and small-size characteristics relative to traditional RTOSs. Watchdog Timer support – Watchdog is a software timer that triggers a system reset action if the system hangs on crucial faults for an extended period of time. The watchdog mechanism can bring the system bac
https://en.wikipedia.org/wiki/Hang%20%28computing%29
In computing, a hang or freeze occurs when either a process or system ceases to respond to inputs. A typical example is when computer's graphical user interface (such as Microsoft Windows) no longer responds to the user typing on the keyboard or moving the mouse. The term covers a wide range of behaviors in both clients and servers, and is not limited to graphical user interface issues. Hangs have varied causes and symptoms, including software or hardware defects, such as an infinite loop or long-running uninterruptible computation, resource exhaustion (thrashing), under-performing hardware (throttling), external events such as a slow computer network, misconfiguration, and compatibility problems. The fundamental reason is typically resource exhaustion: resources necessary for some part of the system to run are not available, due to being in use by other processes or simply insufficient. Often the cause is an interaction of multiple factors, making "hang" a loose umbrella term rather than a technical one. A hang may be temporary if caused by a condition that resolves itself, such as slow hardware, or it may be permanent and require manual intervention, as in the case of a hardware or software logic error. Many modern operating systems provide the user with a means to forcibly terminate a hung program without rebooting or logging out; some operating systems, such as those designed for mobile devices, may even do this automatically. In more severe hangs affecting the whole system, the only solution might be to reboot the machine, usually by power cycling with an off/on or reset button. A hang differs from a crash, in which the failure is immediate and unrelated to the responsiveness of inputs. Multitasking In a multitasking operating system, it is possible for an individual process or thread to get stuck, such as blocking on a resource or getting into an infinite loop, though the effect on the overall system varies significantly. In a cooperative multitasking system, any thread that gets stuck without yielding will hang the system, as it will wedge itself as the running thread and prevent other threads from running. By contrast, modern operating systems primarily use pre-emptive multitasking, such as Windows 2000 and its successors, as well as Linux and Apple Inc.'s macOS. In these cases, a single thread getting stuck will not necessarily hang the system, as the operating system will preempt it when its time slice expires, allowing another thread to run. If a thread does hang, the scheduler may switch to another group of interdependent tasks so that all processes will not hang. However, a stuck thread will still consume resources: at least an entry in scheduling, and if it is running (for instance, stuck in an infinite loop), it will consume processor cycles and power when it is scheduled, slowing the system though it does not hang it. However, even with preemptive multitasking, a system can hang, and a misbehaved or malicious task can hang
https://en.wikipedia.org/wiki/Cyberstalking
Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, group, or organization. It may include false accusations, defamation, slander and libel. It may also include monitoring, identity theft, threats, vandalism, solicitation for sex, doxing, or blackmail. Cyberstalking is often accompanied by realtime or offline stalking. In many jurisdictions, such as California, both are criminal offenses. Both are motivated by a desire to control, intimidate or influence a victim. A stalker may be an online stranger or a person whom the target knows. They may be anonymous and solicit involvement of other people online who do not even know the target. Cyberstalking is a criminal offense under various state anti-stalking, slander and harassment laws. A conviction can result in a restraining order, probation, or criminal penalties against the assailant, including jail. Definitions and description There have been a number of attempts by experts and legislators to define cyberstalking. It is generally understood to be the use of the Internet or other electronic means to stalk or harass an individual, a group, or an organization. Cyberstalking is a form of cyberbullying; the terms are often used interchangeably in the media. Both may include false accusations, defamation, slander and libel. Cyberstalking may also include monitoring, identity theft, threats, vandalism, solicitation for sex, or gathering information that may be used to threaten or harass. Cyberstalking is often accompanied by real-time or offline stalking. Both forms of stalking may be criminal offenses. Stalking is a continuous process, consisting of a series of actions, each of which may be entirely legal in itself. Technology ethics professor Lambèr Royakkers defines cyberstalking as perpetrated by someone without a current relationship with the victim. About the abusive effects of cyberstalking, he writes that: [Stalking] is a form of mental assault, in which the perpetrator repeatedly, unwantedly, and disruptively breaks into the life-world of the victim, with whom he has no relationship (or no longer has), with motives that are directly or indirectly traceable to the affective sphere. Moreover, the separated acts that make up the intrusion cannot by themselves cause the mental abuse, but do taken together (cumulative effect). Distinguishing cyberstalking from other acts There is a distinction between cyber-trolling and cyber-stalking. Research has shown that actions that can be perceived to be harmless as a one-off can be considered to be trolling, whereas if it is part of a persistent campaign then it can be considered stalking. Cyberstalking author Alexis Moore separates cyberstalking from identity theft, which is financially motivated. Her definition, which was also used by the Republic of the Philippines in their legal description, is as follows: Identification and detection CyberAngels has written about how to identify cyberstalking
https://en.wikipedia.org/wiki/Kronos%20Digital%20Entertainment
Kronos Digital Entertainment was an American computer animation and video game developer founded by Stan Liu in 1992. They first began to develop original properties, beginning with their visually appealing early 3D fighting games, Criticom, Dark Rift and Cardinal Syn (referred to as the "Trilogy of Terror" by one gaming journalist). The organization later gained greater critical and commercial success for the Fear Effect series with Eidos, although Kronos retained all rights to the franchise. Kronos was busy developing the third installment in that series, Fear Effect Inferno, when publisher Eidos discontinued funding for the project following a major restructuring of their budget. The developer then shopped it around to other publishers but were unable to secure another deal to get the game finished. The company disbanded soon after, with Fear Effect 2: Retro Helix being their final released game. Games developed Animation References External links Interview with Stan Liu, founder of Kronos, at Gamecritics.com Defunct video game companies of the United States Video game development companies Technology companies based in Greater Los Angeles Companies based in Pasadena, California Entertainment companies based in California Video game companies established in 1992 Video game companies disestablished in 2002 1992 establishments in California 2002 disestablishments in California Defunct companies based in Greater Los Angeles
https://en.wikipedia.org/wiki/Cartoon%20Network%20%28South%20Korean%20TV%20channel%29
Cartoon Network Korea () is the South Korean version of the original United States television channel, which launched on 11 November 2006. It is owned by Warner Bros. Discovery under its International division, and primarily shows animated programming. History 1995–2006: Predecessors In 1995, Orion Cartoon Network was launched. The channel's logo had nothing to do with Cartoon Network, instead using Orion's logo with the text 오리온카툰네트워크 next to it. The channel would later be renamed Tooniverse. The rebranded channel aired a Cartoon Network block until December 2002, when they lost the contract. At the same time, CSTV started distributing the pan-Asian feed of the channel, but only in English, as Korean laws at the time imply that channels operating outside of South Korea are forbidden to carry Korean audio or subtitles within South Korean territory. Previously, Cartoon Network Japan was relayed on certain cable TV providers across South Korea. On 12 July 2006, Turner and JoongAng Media Network signed a deal to launch an official Korean version of Cartoon Network Asia. 2006–2008: CN City Era On 11 November 2006, Cartoon Network Korea was launched, replacing the pan-Asian version on certain South Korean TV providers (but the process wasn't completed until 2011). At first, it used the "CN City" branding seen on many Cartoon Network channels worldwide with bumpers featuring well-known characters from Cartoon Network shows interacting in a CGI city composed of sets from them. In 2006, several new series premiered, including Robotboy, The Life and Times of Juniper Lee, Camp Lazlo, Hi Hi Puffy AmiYumi, My Gym Partner's a Monkey and Squirrel Boy. The Cartoon Cartoons moniker previously used for the Cartoon Network originals was also dropped in 2006. 2009–2011: New Wave Era In July 2009, Cartoon Network Korea's on-air style was changed, and two of its movie blocks (Cartoon Network Theatre and Fridays Flicks) merged into one umbrella branding (Cartoon Network Popcorn). Like Cartoon Network Asia, the new branding featured a major visual theme in the form of dynamic lines, shown on the network's official website and in all station IDs. During the New Wave era, much of Cartoon Network's comedy programs (such as Foster's Home for Imaginary Friends and Camp Lazlo) began to be shown much less frequently in favor of more anime (such as Kiteretsu Daihyakka, Powerpuff Girls Z and Kaibutsu-kun) and action-oriented shows (such as Ben 10, Ben 10: Alien Force, and The Secret Saturdays). 2011–2014: Exciting Fun Era, Turner Broadcasting directly manage Cartoon Network Korea On 26 December 2011, Cartoon Network Korea introduced the "CHECK it" branding and own slogan, 신나는 재미 (Exciting Fun). On 15 March 2012, the United States–Korea Free Trade Agreement went effective which allowed Turner Broadcasting to directly manage Cartoon Network Korea starting from March 2015. On November 14, local version of Boomerang Korea was launched in South Korea. 2022–present: Red
https://en.wikipedia.org/wiki/Mac%20%28computer%29
The Mac, short for Macintosh (its official name until 1999), is a family of personal computers designed and marketed by Apple Inc. The product lineup includes the MacBook Air and MacBook Pro laptops, as well as the iMac, Mac Mini, Mac Studio, and Mac Pro desktops. Macs are sold with the macOS operating system. The original Macintosh, with a 9-inch monochrome monitor built into the case, was introduced by a television commercial titled "1984" shown during Super Bowl XVIII. Development of the system was originated by Jef Raskin, then taken over by Steve Jobs, who resigned from Apple in 1985. Color graphics support arrived with the Macintosh II in 1987 and the 1994 Power Macintosh models began the move from Motorola 68000 series processors to PowerPC, but the Mac was unable to compete with commodity IBM PC compatibles through most of the 1990s. The 1996 acquisition of NeXT brought Steve Jobs back to Apple, who oversaw products which moved the Mac into the mainstream, including the 1998 iMac, the OS X operating system (renamed to macOS in 2016), and the Mac transition to Intel processors in 2005-6. High pixel density retina displays, first used in the iPhone 4, were introduced to the MacBook Pro in 2012. In the 2010s, the Mac underwent a period of neglect under CEO Tim Cook, especially for professional users, but was later reinvigorated with the introduction of popular high-end Macs and the transition to Apple silicon, which brought the Mac to the same ARM processor architecture as iOS devices. History 1979–1996: "Macintosh" era In the late 1970s, the Apple II was one of the most popular computers, especially in education. After IBM introduced the IBM PC in 1981, its sales quickly surpassed the Apple II; in response, Apple introduced the Apple Lisa in 1983. Though the Lisa's graphical user interface was partially inspired by the work of Xerox PARC, it also went far beyond PARC's prototypes by adding intuitive direct manipulation, like the ability to drag-and-drop files, double-click to open programs, and move or resize windows by clicking and dragging instead of going through a menu. However, hampered by its high $9,995 price and lack of available software, the Lisa was commercially unsuccessful. Parallel to the Lisa's development, a skunkworks team at Apple was working on another project. Conceived in 1979 by Jef Raskin, the Macintosh was envisioned as an affordable, easy-to-use computer for the masses. Raskin named the computer after his favorite type of apple, the McIntosh. The initial team consisted of Raskin, hardware engineer Burrell Smith, and Apple co-founder Steve Wozniak; Steve Jobs joined in 1981 after being removed from the Lisa team, and was able to gradually take control of the project due to Wozniak's temporary absence from the company following an airplane crash. Under Jobs, the Mac grew to resemble the Lisa, with a mouse and a more intuitive graphical interface, at a quarter of the Lisa's price. Upon its 1984 release, the fir
https://en.wikipedia.org/wiki/StayFriends.de
Stayfriends.de is a social network service created in 2002. The social media website helps members find, connect and keep in touch with friends from kindergarten, primary school, high school in Germany. Stayfriends.de has more than 14 million members in Germany (in 2014). Since 2004, Stayfriends belonged to Classmates.com, since 2016 it has belonged to the Cologne-based Ströer group. According to AGOF, Stayfriends.de is the 50th most visited website in Germany with 3.89 million unique monthly visitors (December 2013). Organization Based in Berlin, StayFriends GmbH has operated the online platform StayFriends.de since August 2002. From January 2004 to May 2016, StayFriends GmbH was a wholly owned subsidiary of Classmates Online (Renton, Washington), the operator of the online community Classmates.com, which is a subsidiary of the U.S. internet company United Online. The CEO is the founder of the site, Michel Lindenberg. In 2016, StayFriends was acquired by the Ströer group. How it works StayFriends enables its members to find their old friends from school. Schools can be searched by state (Land) and city. A user can add all the schools he attended on his profile by giving the start and end year of each of them. Users can perform searches on the database by last name, first name, city, and school. Searches of last names can be done using the last name used at school and the current last name. While some functions are free, such as searching for old friends, organizing class reunions, or viewing of class photos, others require gold membership. These premium features include the ability to read messages received and display all the photos and profile information. Communication without restriction is possible only if the sender or the receiver is a gold member; users can contact each other only if one of them has paid for the service. Privacy StayFriends requires users to register with their real first and last names. An online mailbox service makes it possible to send and receive messages on the website without disclosing one's e-mail address. A newsletter is sent every two months by e-mail. References Internet properties established in 2002 German social networking websites
https://en.wikipedia.org/wiki/Level%20Five%20%28film%29
Level Five is a 1997 French pseudo-documentary or fake documentary film, directed by Chris Marker and starring Catherine Belkhodja. Plot Laura, the widow of a computer programmer. Attempts to overcome her grief by completing her late husband's last work, a video game reconstruction of the Battle of Okinawa in which she hopes to simulate an alternative outcome to the historical tragedy. All the while she documents the process, intending to provide the material for a new film by her late husband's friend Chris Marker. Cast Catherine Belkhodja as Laura Chris Marker as himself and narrator Kenji Tokitsu, martial artist, interviewed as himself Nagisa Oshima, cineast, interviewed as himself Ju'nishi Ushiyama as himself Kinjo Shigeaki as himself Reception Keith Uhlich of The A.V. Club named the re-release of Level Five the sixth-best film of 2014, tying it with The Congress. References External links Level Five Transcripts 1997 films 1997 documentary films Battle of Okinawa Films directed by Chris Marker French documentary films 1990s French-language films Films about video games Films about virtual reality Films produced by Anatole Dauman Japan in non-Japanese culture 1990s French films
https://en.wikipedia.org/wiki/List%20of%20downloadable%20songs%20for%20the%20SingStar%20series
SingStar is a series of music video games developed by London Studio and published by Sony Computer Entertainment for the PlayStation 2, PlayStation 3 and PlayStation 4 video game consoles. Gameplay in the SingStar games requires players to sing along to music in order to score points, using SingStar-specific USB microphones which ship with the game. Over 70 different SingStar SKUs have been released worldwide, featuring over 1,500 disc-based songs. Editions of SingStar for the PlayStation 3 & PlayStation 4 support downloadable content in the form of additional songs for the game. Almost all songs are available for purchase individually, although some songs can only be purchased in themed packs of five. Over 1600 songs have been made available as downloadable content, including a total of 569 English-language songs. Songs are made available worldwide where possible, although regional differences exist due to licensing and censorship restrictions. The success of the SingStore exceeded the expectations of the game's developers, with over 2.2 million songs purchased from the online service as of August 2008. Downloadable songs Danish Dutch English Finnish French German Hindi Italian Norwegian Portuguese Spanish Swedish Song Packs References External links SingStore catalogues: Australia Denmark Germany Spain Finland France Italy Norway Portugal Sweden United Kingdom United States Lists of video games by franchise Lists of video game downloadable content SingStar Lists of songs in music video games
https://en.wikipedia.org/wiki/Gabriel%20Schillinger
Gabriel Schillinger (born July 21, 1989) is an entrepreneur from Delray Beach, Florida. He was the co-founder and executive director of For Darfur. In 2009 he founded Decade Worldwide and BIM Networks. He worked with Lars Rasmussen, the visionary co-creator of Google Maps, at Weav Music. In July 2017, he co-founded Gamma Innovations. Gamma Innovations was acquired by Animoca Brands in July 2019. Early childhood and education Schillinger was born on July 21, 1989, in Delray Beach, Florida. His mother, Mary Lou Schillinger, worked as an occupational therapist. His father Brent Schillinger, is a Board Certified Dermatologist in Palm Beach County, Florida. His brother is Bloomberg video producer Raymond Schillinger. He attended Saint Andrew's School in Boca Raton. At the age of 16, Schillinger co-founded For Darfur. He spent his summers traveling South America learning Spanish. Schillinger attended Babson College and New York University For Darfur Schillinger produced and promoted Kanye West's Glow in The Dark Tour at the AmericanAirlines Arena in Miami, Florida. The concert was an awareness and fundraising show. The concert was a success with a sellout crowd of 12,000 people and raised over $1,000,000 that went directly to Doctors Without Borders efforts in Darfur. Career Decade Worldwide Schillinger co-founded Decade Worldwide. Schillinger was instrumental in pioneering the concept of a mixtape portal, allowing artists to release their mixtapes through a central branded website. Past releases for Decade, under Schillinger's leadership, include Wale's More About Nothing Mixtape and Diggy Simmons early mixtapes in 2009 and 2010. BIM Networks Schillinger co-founded Buy It Mobility Networks, Inc in 2009, with Benjamin Bronfman. Edgar Bronfman Jr. is the Chairman on the company and board members include Robert Nardelli, Stephen Sadove, Tom Neff, Arthur Martinez. BIM is mobile payments platform that offers a decoupled debit and rewards product to quick service retailers and gas stations. Schillinger successfully sold his stake and exited BIM in 2013. BIM currently has major United States gas stations as partners including Philip's 76 Weav Schillinger worked with Lars Rasmussen for the launch of Weav Music in 2016 and was an advisor to Weav until June 2017. Weav is an adaptive music technology app that automatically matches songs to users cadence while running. Schillinger helped bring investors and partners to Weav, opening up the company to the music and sports industries. Gamma Innovations Schillinger co-founded Gamma Innovations with Samuel Snyder and Zhi Huang in July 2017. Gamma's investors included David Helgason, Mark Pincus, Greycroft, Lars Rasmussen, Gree, Razer and others. Gamma launched GammaNow, a distributed compute application inspired by SETI@home in February 2018. Gamma announced on December 2, 2018, a strategic partnership with Razer to release Softminer, a white labeled version of GammaNow, to the Razer community globall
https://en.wikipedia.org/wiki/1%20FL%20TV
1 FL TV is Liechtenstein's first television broadcaster. It began operation on 15 August 2008 and broadcasts in German. Through cable networks, the channel is accessible to about 50,000 homes in Liechtenstein and a small portion of its neighboring Switzerland. Before the channel launched, people in Liechtenstein watched Austrian and Swiss TV channels instead. History On 15 August 2008, 1 FL TV began operation after being licensed by the Liechtenstein government under the leadership of businessman Peter Kölbel. It broadcasts in German and is a business venture led by Austrian businesswoman Beatrix Schartl after Kölbel's death. Liechtenstein showed interest in participating in the Eurovision Song Contest in 1969 and 1976. Despite this, it was not possible because at the time Liechtenstein did not have a television station based in that country. If 1 FL TV becomes an active member of the European Broadcasting Union, then Liechtenstein may have its national representation in Eurovision. On 9 August 2022, the managing director of 1 FL TV, Sandra Woldt, announced that the company would no longer seek EBU membership and participation in the Eurovision Song Contest. Instead, they would concentrate on reporting in their own country. See also List of television stations in Europe References External links German-language television stations Culture of Liechtenstein Telecommunications in Liechtenstein Television channels and stations established in 2008 2008 establishments in Liechtenstein Television in Liechtenstein