source stringlengths 32 199 | text stringlengths 26 3k |
|---|---|
https://en.wikipedia.org/wiki/Here%20Technologies | Here Technologies (stylized and trade name as HERE and here) is a Dutch multinational group specialized in mapping technologies, location data and related automotive services to individuals and companies. It is majority-owned by a consortium of German automotive companies (namely Audi, BMW, the Mercedes-Benz Group) and American semiconductor company Intel whilst other companies also own minority stakes. Its roots date back to U.S.-based Navteq in 1985, which was acquired by Finland-based Nokia in 2007. Here is currently based in The Netherlands.
Here captures location content such as road networks, buildings, parks and traffic patterns. It then sells or licenses that mapping content, along with map related navigation and location services to other businesses such as Alpine Electronics, Garmin, BMW, Oracle Corporation and Amazon.com. This third-party licensing constitutes the core of the firm's business. In addition, Here provides platform services to smartphones. It provides location services through its HERE applications, and also for GIS and government clients and other providers, such as Microsoft Bing (from 2012 through 2020), Meta Platforms, Yahoo! Maps, and the Samsung Gear S2 (and earlier models) maps app. HERE has maps of about 200 countries, offers voice guided navigation in 94 countries, provides live traffic information in 33 countries and has indoor maps available for about 49,000 unique buildings in 45 countries. The company is also working on self-driving technology.
History
Here has built its mapping and location business by acquiring location technology; the company is a combination of what was formerly Navteq and Nokia Maps.
Navteq
Navteq was an American company founded in 1985 as Karlin & Collins, Inc., later known as Navigation Technologies Corporation and eventually as Navteq. At the time of its acquisition by Nokia, Navteq was the largest maker of automotive-grade map data used in car navigation equipment.
Nokia Maps
Nokia Maps began in 2001 as Smart2Go, a generic 3D-map interface for access to tourist information on mobile terminals. It was developed by an EU consortium named TellMaris. Nokia gained the rights to the software when it acquired Berlin-based route planning software company Gate 5 in August 2006, which has become the cornerstone for the company's mapping business. It then made the Smart2Go application free to download. The service was rebranded as HERE in 2012, bringing together mapping, location businesses, satellite navigation and other services under one brand.
Acquisition by Nokia
In October 2007, Nokia acquired Navteq for $8.1 billion. Nokia ran Navteq's business along with their own Nokia Maps (later known as Ovi Maps, then again as Nokia Maps from 2011). The two divisions remained as separate entities of Nokia Corporation until Navteq was amalgamated into the core Nokia operations in 2011. The service was rebranded as HERE in 2012, bringing together mapping, location businesses, satellite navigatio |
https://en.wikipedia.org/wiki/1973%E2%80%9374%20United%20States%20network%20television%20schedule%20%28late%20night%29 | These are the late night schedules on all three networks for each calendar season beginning September 1973. All times are Eastern/Pacific.
PBS is not included, as member television stations have local flexibility over most of their schedules and broadcast times for network shows may vary, CBS and ABC are not included on the weekend schedules (as the networks do not offer late night programs of any kind on weekends).
Talk/Variety shows are highlighted in yellow, Local News & Programs are highlighted in white.
Monday-Friday
Saturday/Sunday
By network
ABC
Returning Series
ABC's Wide World of Entertainment
Not returning from 1972-73
The Dick Cavett Show
CBS
Returning Series
The CBS Late Movie
NBC
Returning Series
The Midnight Special
The Tonight Show Starring Johnny Carson
The Weekend Tonight Show
New Series
The Tomorrow Show
United States late night network television schedules
1973 in American television
1974 in American television |
https://en.wikipedia.org/wiki/1974%E2%80%9375%20United%20States%20network%20television%20schedule%20%28late%20night%29 | These are the late night schedules on all three networks for each calendar season beginning September 1974. All times are Eastern/Pacific.
PBS is not included, as member television stations have local flexibility over most of their schedules and broadcast times for network shows may vary, CBS and ABC are not included on the weekend schedules (as the networks do not offer late night programs of any kind on weekends).
Talk/Variety shows are highlighted in yellow, Local News & Programs are highlighted in white.
Monday-Friday
Saturday
Sunday
By network
ABC
Returning Series
ABC's Wide World of Entertainment
CBS
Returning Series
The CBS Late Movie
NBC
Returning Series
The Midnight Special
The Tomorrow Show
The Tonight Show Starring Johnny Carson
The Weekend Tonight Show
New Series
Weekend
United States late night network television schedules
1974 in American television
1975 in American television |
https://en.wikipedia.org/wiki/1975%E2%80%9376%20United%20States%20network%20television%20schedule%20%28late%20night%29 | These are the late night schedules on all three networks for each calendar season beginning September 1975. All times are Eastern/Pacific.
PBS is not included, as member television stations have local flexibility over most of their schedules and broadcast times for network shows may vary, CBS and ABC are not included on the weekend schedules (as the networks do not offer late night programs of any kind on weekends).
Talk/Variety shows are highlighted in yellow, Local News & Programs are highlighted in white.
Monday-Friday
Saturday
By network
ABC
New Series
ABC Late Night
Good Night America!
Not returning from 1974-75
ABC's Wide World of Entertainment
CBS
Returning Series
The CBS Late Movie
NBC
Returning Series
The Midnight Special
The Tomorrow Show
The Tonight Show Starring Johnny Carson
Weekend
New Series
NBC's Saturday Night
Not returning from 1974-75
The Weekend Tonight Show
United States late night network television schedules
1975 in American television
1976 in American television |
https://en.wikipedia.org/wiki/1976%E2%80%9377%20United%20States%20network%20television%20schedule%20%28late%20night%29 | These are the late night schedules on all three networks for each calendar season beginning September 1976. All times are Eastern/Pacific.
PBS is not included, as member television stations have local flexibility over most of their schedules and broadcast times for network shows may vary, CBS and ABC are not included on the weekend schedules (as the networks do not offer late night programs of any kind on weekends).
Talk/Variety shows are highlighted in yellow, Local News & Programs are highlighted in white.
Monday-Friday
Saturday
Sunday
By network
ABC
Returning Series
ABC Late Night
Not returning from 1975-76
Good Night America!
CBS
Returning Series
The CBS Late Movie
NBC
Returning Series
The Midnight Special
NBC's Saturday Night (renamed Saturday Night Live)
The Tomorrow Show
The Tonight Show Starring Johnny Carson
Weekend
New Series
NBC Late Night Movie
United States late night network television schedules
1976 in American television
1977 in American television |
https://en.wikipedia.org/wiki/1977%E2%80%9378%20United%20States%20network%20television%20schedule%20%28late%20night%29 | These are the late night schedules on all three networks for each calendar season beginning September 1977. All times are Eastern/Pacific.
PBS is not included, as member television stations have local flexibility over most of their schedules and broadcast times for network shows may vary, CBS and ABC are not included on the weekend schedules (as the networks do not offer late night programs of any kind on weekends).
Talk/Variety shows are highlighted in yellow, Local News & Programs are highlighted in white.
Monday-Friday
Saturday
Sunday
By network
ABC
Returning Series
ABC Late Night
CBS
Returning Series
The CBS Late Movie
NBC
Returning Series
The Midnight Special
NBC Late Night Movie
Saturday Night Live
The Tomorrow Show
The Tonight Show Starring Johnny Carson
Weekend
United States late night network television schedules
1977 in American television
1978 in American television |
https://en.wikipedia.org/wiki/1978%E2%80%9379%20United%20States%20network%20television%20schedule%20%28late%20night%29 | These are the late night schedules on all three networks for each calendar season beginning September 1978. All times are Eastern/Pacific.
PBS is not included, as member television stations have local flexibility over most of their schedules and broadcast times for network shows may vary, CBS and ABC are not included on the weekend schedules (as the networks do not offer late night programs of any kind on weekends).
Talk/Variety shows are highlighted in yellow, Local News & Programs are highlighted in white.
Monday-Friday
Saturday
Sunday
By network
ABC
Returning Series
ABC Late Night
CBS
Returning Series
The CBS Late Movie
NBC
Returning Series
The Midnight Special
NBC Late Night Movie
Saturday Night Live
The Tomorrow Show
The Tonight Show Starring Johnny Carson
Not returning from 1977-78
Weekend
United States late night network television schedules
1978 in American television
1979 in American television |
https://en.wikipedia.org/wiki/1979%E2%80%9380%20United%20States%20network%20television%20schedule%20%28late%20night%29 | These are the late night schedules on all three networks for each calendar season beginning September 1979. All times are Eastern/Pacific.
PBS is not included, as member television stations have local flexibility over most of their schedules and broadcast times for network shows may vary, CBS and ABC are not included on the weekend schedules (as the networks do not offer late night programs of any kind on weekends).
Talk/Variety shows are highlighted in yellow, Local News & Programs are highlighted in white.
Monday-Friday
formerly The Iran Crisis: America Held Hostage
Saturday
Sunday
By network
ABC
Returning Series
ABC Late Night
New Series
Fridays
The Iran Crisis: America Held Hostage
CBS
Returning Series
The CBS Late Movie
NBC
Returning Series
The Midnight Special
NBC Late Night Movie
Saturday Night Live
The Tomorrow Show
The Tonight Show Starring Johnny Carson
United States late night network television schedules
1979 in American television
1980 in American television |
https://en.wikipedia.org/wiki/1980%E2%80%9381%20United%20States%20network%20television%20schedule%20%28late%20night%29 | These are the late night schedules on all three networks for each calendar season beginning September 1980. All times are Eastern/Pacific.
PBS is not included, as member television stations have local flexibility over most of their schedules and broadcast times for network shows may vary, CBS and ABC are not included on the weekend schedules (as the networks do not offer late night programs of any kind on weekends).
Talk/variety shows are highlighted in yellow, network news programs in gold, and local news & programs are highlighted in white background.
Monday-Friday
(*) renamed Tomorrow Coast to Coast in January
Saturday
Sunday
By network
ABC
Returning Series
ABC Late Night
Fridays
Nightline
Not returning from 1979 to 1980
The Iran Crisis: America Held Hostage
CBS
Returning Series
The CBS Late Movie
NBC
Returning Series
The Midnight Special
NBC Late Night Movie
Saturday Night Live '80
The Tomorrow Show / Tomorrow Coast to Coast
The Tonight Show Starring Johnny Carson
New Series
SCTV Network 90
United States late night network television schedules
1980 in American television
1981 in American television |
https://en.wikipedia.org/wiki/Thor%20Aackerlund | Thor Bjorn Thorlei Aackerlund (born ) is a competitive video gamer considered one of the first to go professional.
As a child, he started playing computer games while waiting for a new school year to begin after having missed one due to his mother being hospitalized after a fire. He couldn't afford a Nintendo Entertainment System, so he bought a Game Boy but didn't have the money for any extra games, which put him on the path of playing Tetris, as it was included for free. He was one of the winners of the 1990 Nintendo World Championships, for which he was bestowed a Mario trophy, a U.S. savings bond, a 1990 Geo Metro Convertible, a 40-inch rear-projection television, and a golden Mario trophy. Soon after the competition, Camerica, a producer of unlicensed Nintendo Entertainment System games, signed a deal with Aackerlund to make him the official spokesman for their games. Aackerlund then became the poster child for the game, featured in commercials and fairs. As a child, he felt pressured to play, as the prize money and endorsements were financially important for his family. At the time, he was known as the only player to claim to have reached level 30 in Tetris. Aackerlund soon disappeared from the scene, but remained known as perhaps the most well-known name in Tetris prior to the domination of 7-time World Champion Jonas Neubauer.
He is a featured player in the 2011 documentary film Ecstasy of Order: The Tetris Masters, which covers his second effort in competitive video gaming at the 2010 Classic Tetris World Championship.
References
Further reading
"Nintendo King Champ Says Game a Challenge but Anyone Can Play." Pittsburgh Post Gazette.
"Thor Aackerlund was born to play and win at Tetris." The Dallas Morning News.
"Business Notebook." The Dallas Morning News.
1977 births
Living people
People from Houston
American esports players |
https://en.wikipedia.org/wiki/Barbie%20Fashion%20Show%3A%20An%20Eye%20for%20Style | Barbie Fashion Show: An Eye for Style is a strategy video game by Thai studio Cyber Planet Interactive based on the Barbie franchise. The game is the sequel to the PC game Barbie Fashion Show. In this game, players take the role of a fashion assistant to Barbie, voiced by Kelly Sheridan and her best friend, Teresa, voiced by Catherine 'Cat' Main. The game also allows players to design clothes to be worn by the models ingame.
Reception
In their review, jeuxvideo gave the game 10/20 criticising its simplistic gameplay and graphics as well as the limited content which they claimed would not take more than an hour to beat. They did however think it would appeal to its target audience of very young girls more convincingly than some other offerings.
See also
List of Barbie video games
References
External links
2008 video games
Fashion Show: An Eye for Style
Nintendo DS games
Windows games
Activision games
Sega video games
Video games developed in Thailand
Single-player video games |
https://en.wikipedia.org/wiki/David%20G.%20Lowe | David G. Lowe is a Canadian computer scientist working for Google as a senior research scientist. He was a former professor in the computer science department at the University of British Columbia and New York University.
Works
Lowe is a researcher in computer vision, and is the author of the patented scale-invariant feature transform (SIFT), one of the most popular algorithms in the detection and description of image features.
Awards and honors
2015. Lowe received the biennial PAMI Distinguished Researcher Award.
References
External links
Home page
Canadian computer scientists
Computer vision researchers
Living people
Academic staff of the University of British Columbia
Year of birth missing (living people)
University of British Columbia alumni |
https://en.wikipedia.org/wiki/Diane%20Souvaine | Diane L. Souvaine is a professor of computer science and an adjunct professor of mathematics at Tufts University.
Contributions
Souvaine's research is in computational geometry and its applications, including robust non-parametric statistics and molecular modeling. She has also encouraged women and minorities to study and pursue careers in mathematics and the sciences and advocated gender neutrality in science teaching.
Education and career
After undergraduate and masters studies at Radcliffe College of Harvard University and at Dartmouth College, Souvaine earned her Ph.D. in 1986 from Princeton University under the supervision of David P. Dobkin. She held a faculty position at Rutgers University from 1986 to 1998, and from 1992 to 1994 served first as acting associate director and then as acting director of DIMACS. From 1994 to 1995 she took a visiting position in mathematics at the Institute for Advanced Study in Princeton, New Jersey, and in 1998 she took a permanent position at Tufts University.
Leadership and administration
At Tufts, Souvaine was department chair from 2002 to 2005 and (after a sabbatical at Harvard and the Massachusetts Institute of Technology) was reappointed as chair in 2006. She was Vice Provost for Research from 2012 to 2016.
She joined the National Science Board, a 24-member body that governs the National Science Foundation and advises the United States government about science policy, in 2008, and was the chair of the board for 2018–2020.
She also served for several years on the board of advisors for the Computer Science Department at the University of Vermont as well as for the Computer Science Department at Lehigh University.
Recognition
In 2008 Souvaine won Tufts' Lillian and Joseph Leibner Award for Excellence in Teaching and Advising of Students. In 2011, she was listed as a fellow of the Association for Computing Machinery for her research in computational geometry and her service to the computing community.
She became a fellow of the American Association for the Advancement of Science in 2016.
The Association for Women in Mathematics has included her in the 2020 class of AWM Fellows for "sustained advocacy, support and mentorship of women and students underrepresented in STEM fields in mathematics and theoretical computer science at multiple scales, from impacting individual mentees and advisees, to creating deep and broad institutional cultural change".
References
Year of birth missing (living people)
Living people
Radcliffe College alumni
Dartmouth College alumni
Princeton University alumni
Rutgers University faculty
Tufts University faculty
Researchers in geometric algorithms
American women mathematicians
American women computer scientists
Fellows of the American Association for the Advancement of Science
Fellows of the Association for Computing Machinery
Fellows of the Association for Women in Mathematics
American computer scientists
20th-century American mathematicians
21st-century American mathemati |
https://en.wikipedia.org/wiki/The%20Eldorado%20Network | The Eldorado Network is a 1979 espionage novel by Derek Robinson, published by Hamish Hamilton. Three sequels followed: Artillery of Lies in 1991, Red Rag Blues in 2006, and Operation Bamboozle in 2009. The first novel, like all of Robinson's work, is based on fact, in this case a genuine double-agent known as "Garbo".
Plot introduction
Set mainly in Madrid and Lisbon in 1940 and 1941, it concerns the young Spaniard Luis Cabrillo, who witnesses the bombing of Durango during the Spanish Civil War, and later joins the Abwehr, or German intelligence service. He is enthusiastic and resourceful, and after completing his training he is sent to London to spy on the British—codename: Eldorado. However, he gets only as far as Lisbon, where he rents an office, buys an almanac and a guidebook, and begins concocting misinformation to mail back to his superiors in Madrid. The Abwehr pays him for each report and for each agent he recruits, and before long Luis has established a network of fake spies from all over the British isles.
Luis's character and his audacious deception operation was closely modeled on that of Juan Pujol García, code-named GARBO by the British, and ARABEL by the Germans. Uniquely, he received both an Iron Cross, Second Class, for his services to the German war effort (authorised by Hitler himself) and an MBE from King George VI in 1944.
While inspired by fact, and carefully researched, the novel is rich with Robinson's trademark black humour and verbal wit.
Fiction set in 1940
Fiction set in 1941
1979 British novels
British thriller novels
British spy novels
Novels set in Lisbon
Novels set in Madrid
Hamish Hamilton books |
https://en.wikipedia.org/wiki/Jason%20Scott%20case | The Jason Scott case was a United States civil suit, brought against deprogrammer Rick Ross, two of his associates, and the Cult Awareness Network (CAN), for the abduction and failed deprogramming of Jason Scott, a member of the United Pentecostal Church International. Scott was eighteen years old at the time of the abduction and thus legally an adult. CAN was a co-defendant because a CAN contact person had referred Scott's mother to Rick Ross. In the trial, Jason Scott was represented by Kendrick Moxon, a prominent Scientologist attorney.
The nine-member jury unanimously held the defendants liable for conspiracy to deprive Scott of his civil rights and religious liberties. In addition, the jury held that Ross and his associates (but not CAN) "intentionally or recklessly acted in a way so outrageous in character and so extreme in degree as to go beyond all possible bounds of decency and to be regarded as atrocious and utterly intolerable in a civilized community." The case resulted in an award of $875,000 in compensatory damages and punitive damages in the amount of $1,000,000 against CAN, $2,500,000 against Ross, and $250,000 against each of Ross's two associates.
The case bankrupted the Cult Awareness Network, and its name, phone number, records and files were obtained by Scientologists.
Prior events
In January 1991, at the time of the failed deprogramming attempt, Jason Scott, of Bellevue, Washington, was an 18-year-old member of the Life Tabernacle Church, affiliated with the United Pentecostal Church International. Scott's mother, Katherine Tonkin, had been a member of the church, but had withdrawn from it. Jason and two younger sons of hers disagreed with her decision and insisted they would remain in the church.
The two younger sons then left Tonkin's household, the youngest, aged thirteen, going to live with his grandmother, and the second-youngest, sixteen, moving in with another family from the church. Jason remained at home at first, but subsequently also moved in with his grandmother.
Tonkin, who believed a pastor in the church had behaved inappropriately toward one of her younger sons, subsequently called the local Cult Awareness Network (CAN) hotline. The CAN contact person, Shirley Landa, referred her to Rick Ross; based on her endorsement of Ross, Tonkin retained him to deprogram her sons. At the time, Ross still performed forcible deprogrammings, a fact that Landa was aware of. Landa had had a longstanding relationship with CAN; she had founded its predecessor organization, and was a former member of CAN's board.
Deprogramming
To facilitate the deprogramming, Ross put together a two-man "security team". The three traveled to the grandmother's home, locked the two youngest children in the basement, and following several days of argument and lecturing, the boys gave up their Pentecostal beliefs. For deprogramming Jason, Ross demanded a larger fee, in view of the fact that he was powerfully built and legally an adult, increa |
https://en.wikipedia.org/wiki/Mobile%20commerce%20service%20provider | A mobile commerce service provider (mCSP) is an organization (or company) that provides any combination of consulting, software and computer systems for mobile e-commerce platforms, mobile devices (cellular phones, smartphones), mobile commerce, mobile content or mobile web sites.
mCSPs supply businesses with the tools and services they need to distribute and sell products and services over both the Internet and Mobile Internet and manage their online enterprises. Specifically, these firms specialize in all aspects of mobile commerce, including for all digital goods (games, video, ringtones, wallpapers and applications) that are downloaded to mobile devices.
mCSPs provide service in areas such as
mobile device databases
billing systems
text messaging services
hardware/software design
mobile payments
brand recognition
distribution control
Web site development and hosting
Web site performance monitoring
fulfillment management
online marketing
order processing and delivery
Mobile app development
Providers of services to on-line companies |
https://en.wikipedia.org/wiki/My%20VH1%20Music%20Awards | The My VH1 Music Awards is an annual music award ceremony held by American television network VH1 held in both 2000 and 2001. Categories, nominees, and winners were selected entirely by public voting at VH1.com. The ceremonies were held at the Shrine Auditorium in Los Angeles, California, broadcast live on VH1 and online. The award statuette was designed by sculptor Lawrence Nowlan.
2000
Hosted by John Leguizamo. Performers included Christina Aguilera, Bon Jovi, The Corrs, Creed, Metallica (their final performance with bassist Jason Newsted), No Doubt, The Red Hot Chili Peppers, and U2. Presenters included Macy Gray, Matt LeBlanc, David Spade, "Weird Al" Yankovic, Patricia Arquette, Antonio Banderas, Lara Flynn Boyle, Jenna Elfman, David Alan Grier, Salma Hayek, Sean Hayes, Téa Leoni, Jennifer Lopez, Rob Lowe, Justin Timberlake, Sela Ward and Greg Proops. Reviews were tepid, with Rolling Stone writing that "the event was somewhat undermined by gross production woes, lukewarm performances and the almighty Creed...."
2001
Hosted by Eric McCormack. Performers included Sting, Nelly Furtado, Jewel, No Doubt, Creed, Mary J. Blige, Lenny Kravitz, and Mick Jagger. Presenters included Benjamin Bratt, Ellen DeGeneres, Chris Isaak, Christian Slater, Kim Delaney, Jenna Elfman, Kelsey Grammer, Isaac Hayes, Tommy Lee, Henry Simmons, Gary Sinise and Damon Wayans. Dave Matthews Band won the most awards, including the top one, "My Favorite Group."
References
2000 American television series debuts
2001 American television series endings
VH1 original programming |
https://en.wikipedia.org/wiki/Inacom | Inacom Corporation (ICO:NYSE) was a large national seller of PC's and services based in Omaha, Nebraska, at one point being the third-largest and most profitable computer distributor in the United States.
Origins
The company created in 1991 from the merger of ValCom Inc. and Inacomp Computer Centers Inc. ValCom Inc. was founded in 1982 by William L. "Bill" Fairfield.
In 1997, Inacom entered the Fortune 500 list at position 436 and remained a Fortune 500 company until 2000. Throughout this time, Bill Fairfield served as president and chief executive officer of Inacom.
Acquisition of Vanstar
On October 9, 1998, Inacom purchased Vanstar for a reported $465 - $480 million. The resulting company employed nearly 12,000 and was estimated to generate $7 billion in revenue.
The acquisition of Vanstar reportedly added a large amount of debt, and it has been said that Inacom overpaid too much for a company of that size. Vanstar had 43.26 million shares outstanding at the time the deal was struck, and shareholders of Vanstar received .64 shares of ICO for each VST share in a stock swap deal, thus the issuance of 27.7 M shares of stock effectively more than doubled the number of outstanding shares while also being dilutive to the existing shares. This, plus debt concerns, led to a decline in the price of Inacom's stock.
Furthermore, the acquisition of Vanstar added unrealized credits posted to Inacom's balance sheet, necessitating the requirement to restate financials, and a failure to report financials for 1999 and the first quarter of 2000. As the result of the failure to file the necessary SEC documents, existing credit agreements were terminated and the company had difficulty in arranging new financing. Inacom's failure to file SEC documents also resulted in the New York Stock Exchange delisting Inacom (ICO) since they no longer met listing requirements.
Bankruptcy
On January 4, 2000, Inacom sold their distribution business to Compaq for $369.5 million.
On January 7, IBM severed their business partner relationship which hurt Inacom badly. On June 16, 2000, only twenty months after the acquisition of Vanstar, Inacom filed for chapter 11 bankruptcy and terminated all employees.
Compaq was itself purchased in 2002 by Hewlett-Packard.
External links
Funding Universe: Inacom Corporation
CNN Money: Fortune 500 Listing
References
American companies established in 1991
American companies disestablished in 2000
Computer companies established in 1991
Computer companies disestablished in 2000
Defunct computer companies of the United States |
https://en.wikipedia.org/wiki/LTE%20%28telecommunication%29 | In telecommunications, long-term evolution (LTE) is a standard for wireless broadband communication for mobile devices and data terminals, based on the GSM/EDGE and UMTS/HSPA standards. It improves on those standards' capacity and speed by using a different radio interface and core network improvements. LTE is the upgrade path for carriers with both GSM/UMTS networks and CDMA2000 networks. Because LTE frequencies and bands differ from country to country, only multi-band phones can use LTE in all countries where it is supported.
Terminology
The standard is developed by the 3GPP (3rd Generation Partnership Project) and is specified in its Release 8 document series, with minor enhancements described in Release 9. LTE is also called 3.95G and has been marketed as 4G LTE and Advanced 4G; but the original version did not meet the technical criteria of a 4G wireless service, as specified in the 3GPP Release 8 and 9 document series for LTE Advanced. The requirements were set forth by the ITU-R organisation in the IMT Advanced specification; but, because of market pressure and the significant advances that WiMAX, Evolved High Speed Packet Access, and LTE bring to the original 3G technologies, ITU-R later decided that LTE and the aforementioned technologies can be called 4G technologies. The LTE Advanced standard formally satisfies the ITU-R requirements for being considered IMT-Advanced. To differentiate LTE Advanced and WiMAX-Advanced from current 4G technologies, ITU has defined the latter as "True 4G".
Overview
LTE stands for Long-Term Evolution and is a registered trademark owned by ETSI (European Telecommunications Standards Institute) for the wireless data communications technology and a development of the GSM/UMTS standards. However, other nations and companies do play an active role in the LTE project. The goal of LTE was to increase the capacity and speed of wireless data networks using new DSP (digital signal processing) techniques and modulations that were developed around the turn of the millennium. A further goal was the redesign and simplification of the network architecture to an IP-based system with significantly reduced transfer latency compared with the 3G architecture. The LTE wireless interface is incompatible with 2G and 3G networks, so that it must be operated on a separate radio spectrum.
The idea of base of LTE was first proposed in 1998, with the use of the COFDM radio access technique to replace the CDMA and studying its Terrestrial use in the L band at 1428 MHz (TE)
In 2004 by Japan's NTT Docomo, with studies on the standard officially commenced in 2005. In May 2007, the LTE/SAE Trial Initiative (LSTI) alliance was founded as a global collaboration between vendors and operators with the goal of verifying and promoting the new standard in order to ensure the global introduction of the technology as quickly as possible. The LTE standard was finalized in December 2008, and the first publicly available LTE service was launched |
https://en.wikipedia.org/wiki/Simbiosys | SimBioSys (short for Simulated Biological Systems) is a technology company deploying a combination of artificial intelligence and biophysical simulations to improve the personalized and patient-specific understanding of cancer.
SimBioSys developed a simulation engine, TumorScope, which utilizes current standard of care diagnostic data (imaging & pathology) to create spatially resolved virtual replicas of an individual tumor and microenvironment and uses mechanistic models to incorporate the major hallmarks of cancer including drug sensitivity & delivery, metabolism, mechanical forces. The simulations enable precise & comprehensive predictions of response to therapy while providing researchers and clinicians keys insights into mechanisms of resistance. By virtualizing cancer, clinicians and patients are empowered with a better understanding of the disease and can assess all available options computationally to truly individualize treatment.
In the crowded world of genomics, new approaches have many barriers to becoming a new standard of care. SimBioSys complements and/or supersedes current precision medicine techniques while only relying on readily available and previously acquired datasets.
Products
The first indication to market will be Early Stage Breast Cancer where there is significant opportunity to improve outcomes by selecting the right first line therapy while de-escalating care and lowering costs and side effects.
A retrospective study across 800 patients demonstrated volumetric errors under 4%. A recent pivotal study at University of Chicago, TumorScope™ produced 91% sensitivity and 93% specificity rates of predicting complete response to the physician's choice of therapy at the time of diagnosis. SimBioSys collaborates with over 130 oncologists across the country representing 16 premier cancer centers such University of Chicago, University of North Carolina, OHSU, among others.
SimBioSys anticipates FDA clearance for its breast cancer surgical planning tool in late 2023 with an expansion to other solid tumors to follow. Validation to lung and prostate cancer is already underway. While awaiting FDA approval, SimBioSys is commercializing the technology for use in patient education and drug development.
See also
Precision Medicine
Clinical Trial Optimization
Virtual Trials
Drug design
References
External links
Life sciences industry
Companies based in Champaign County, Illinois
American companies established in 2018
2018 establishments in Illinois |
https://en.wikipedia.org/wiki/1984%E2%80%9385%20United%20States%20network%20television%20schedule%20%28late%20night%29 | These are the late night schedules on all three networks for each calendar season beginning September 1984. All times are Eastern/Pacific.
PBS is not included, as member television stations have local flexibility over most of their schedules and broadcast times for network shows may vary, CBS and ABC are not included on the weekend schedules (as the networks do not offer late night programs of any kind on weekends).
Talk/variety shows are highlighted in yellow, network news programs in gold, and local news & programs are highlighted in white background.
Monday-Friday
Saturday
Sunday
By network
ABC
Returning Series
ABC Rocks
Eye on Hollywood
Nightline
CBS
Returning Series
The CBS Late Movie
CBS News Nightwatch
NBC
Returning Series
Friday Night Videos
Late Night with David Letterman
Saturday Night Live
The Tonight Show Starring Johnny Carson
New Series
The George Michael Sports Machine
Not Returning From 1983-84
NBC Late Night Movie
NBC News Overnight
United States late night network television schedules
1984 in American television
1985 in American television |
https://en.wikipedia.org/wiki/1985%E2%80%9386%20United%20States%20network%20television%20schedule%20%28late%20night%29 | These are the late night schedules on all three networks for each calendar season beginning September 1985. All times are Eastern/Pacific.
Talk/variety shows are highlighted in yellow, network news programs in gold, and local news & programs are highlighted in white background.
Monday-Friday
Saturday
Sunday
By network
ABC
Returning Series
Eye on Hollywood
Nightline
New Series
Lifestyles of the Rich and Famous (also aired in Daytime)
Not Returning From 1984-85
ABC Rocks
CBS
Returning Series
CBS Late Night
CBS News Nightwatch
T.J. Hooker (Moved from ABC, previously a primetime series)
NBC
Returning Series
Friday Night Videos
The George Michael Sports Machine
Late Night with David Letterman
Saturday Night Live
The Tonight Show Starring Johnny Carson
United States late night network television schedules
1985 in American television
1986 in American television |
https://en.wikipedia.org/wiki/1986%E2%80%9387%20United%20States%20network%20television%20schedule%20%28late%20night%29 | These are the late night schedules on all four networks beginning September 1986. All times are Eastern/Pacific.
PBS is not included, as member television stations have local flexibility over most of their schedules and broadcast times for network shows may vary, CBS, ABC and Fox are not included on the weekend schedules (as the networks do not offer late night programs of any kind on weekends).
Talk/variety shows are highlighted in yellow, network news programs in gold, and local news & programs are highlighted in white background.
Monday-Friday
{| border="1" cellpadding="2"
!bgcolor="#C0C0C0" colspan=2|-
!width="13%" bgcolor="#C0C0C0"|11:00 PM
!width="14%" bgcolor="#C0C0C0"|11:30 PM
!width="13%" bgcolor="#C0C0C0"|12:00 AM
!width="14%" bgcolor="#C0C0C0"|12:30 AM
!width="13%" bgcolor="#C0C0C0"|1:00 AM
!width="14%" bgcolor="#C0C0C0"|1:30 AM
!width="13%" bgcolor="#C0C0C0"|2:00 AM
!width="14%" bgcolor="#C0C0C0"|2:30 AM
!width="13%" bgcolor="#C0C0C0"|3:00 AM
!width="14%" bgcolor="#C0C0C0"|3:30 AM
!width="13%" bgcolor="#C0C0C0"|4:00 AM
!width="14%" bgcolor="#C0C0C0"|4:30 AM
!width="13%" bgcolor="#C0C0C0"|5:00 AM
!width="14%" bgcolor="#C0C0C0"|5:30 AM
|-
!bgcolor="#C0C0C0" rowspan=3|ABC
! bgcolor=#C0C0C0|Fall
|bgcolor="white" rowspan=3|local programming
|bgcolor="gold" rowspan=3|ABC News Nightline
|bgcolor="yellow" colspan="2"|The Dick Cavett Show (Tue.-Wed.)/Jimmy Breslin's People (Thur.-Fri.)
|bgcolor="white" colspan="10"|Local
|-
! bgcolor=#C0C0C0|Winter
|bgcolor="white" colspan="12"|Local
|-
! bgcolor=#C0C0C0|June
|bgcolor="lightgreen" colspan="2"|Monday Sportsnite (Mon.)
|bgcolor="white" colspan="10"|Local
|-
!bgcolor="#C0C0C0" rowspan=3|CBS
! bgcolor=#C0C0C0|Fall
|bgcolor="white" rowspan=3|local programming
|bgcolor="yellow" colspan="4"|CBS Late Night
|bgcolor="white" rowspan=3|local programming
|bgcolor="gold" colspan="8" rowspan=3|CBS News Nightwatch
|-
!bgcolor=#C0C0C0|Winter
|bgcolor="yellow" colspan="4"|CBS Late Night (Mon.-Thur.)/Keep on Cruisin' (Fri., 11:30-12:40)
|-
!bgcolor=#C0C0C0|Summer
|bgcolor="yellow" colspan="4"|CBS Late Night (Mon.-Thur.)/In Person from the Palace (Fri., 11:30-12:40)
|-
!bgcolor="#C0C0C0" rowspan=2|NBC
! bgcolor=#C0C0C0|Fall
|bgcolor="white" rowspan=2|local programming
|bgcolor="yellow" colspan="2" rowspan=2|The Tonight Show Starring Johnny Carson
|bgcolor="yellow" colspan="2"|Late Night with David Letterman (Mon.-Thur.)/Friday Night Videos to 2:00 (Fri)
|bgcolor="white" colspan="9" rowspan=1|local programming
|-
! bgcolor=#C0C0C0|Summer
|bgcolor="yellow" colspan="2"|Late Night with David Letterman
|bgcolor="yellow" colspan="2"|Friday Night Videos (Fri.)
|bgcolor="white" colspan="7"|local programming
|-
!bgcolor="#C0C0C0" rowspan=2|Fox (launched October 9, 1986)
! bgcolor=#C0C0C0|Fall
|bgcolor="yellow" colspan="2"|The Late Show Starring Joan Rivers
|bgcolor="white" colspan="12" rowspan=2|local programming
|-
! bgcolor=#C0C0C0|May
|bgcolor="yellow" colspan="2"|The Late Show
|}
Saturday
Sunday
By net |
https://en.wikipedia.org/wiki/1987%E2%80%9388%20United%20States%20network%20television%20schedule%20%28late%20night%29 | These are the late night schedules for the four United States broadcast networks that offer programming during this time period, from September 1988 to August 1989. All times are Eastern or Pacific. Affiliates will fill non-network schedule with local, syndicated, or paid programming. Affiliates also have the option to preempt or delay network programming at their discretion.
Legend
Schedule
Monday-Friday
Saturday
Sunday
By network
ABC
Returning Series
Nightline
Not Returning From 1986-87
The Dick Cavett Show
Jimmy Breslin's People
CBS
Returning Series
CBS Late Night
CBS News Nightwatch
New Series
Top of the Pops
Not Returning From 1986-87
In Person from the Palace
Keep on Cruisin'
Fox
Returning Series
The Late Show
New Series
The Wilton North Report
NBC
Returning Series
Friday Night Videos
The George Michael Sports Machine
Late Night with David Letterman
Saturday Night Live
The Tonight Show Starring Johnny Carson
United States late night network television schedules
1987 in American television
1988 in American television |
https://en.wikipedia.org/wiki/1988%E2%80%9389%20United%20States%20network%20television%20schedule%20%28late%20night%29 | These are the late night schedules for the four United States broadcast networks that offer programming during this time period, from September 1988 to August 1989. All times are Eastern or Pacific. Affiliates will fill non-network schedule with local, syndicated, or paid programming. Affiliates also have the option to preempt or delay network programming at their discretion.
Legend
Schedule
Saturday
Sunday
By network
ABC
Returning Series
Nightline
CBS
Returning Series
CBS Late Night
CBS News Nightwatch
New Series
The Pat Sajak Show
Not Returning From 1987-88
Top of the Pops
Fox
New Series
Comic Strip Live
Not Returning From 1987-88
The Late Show
The Wilton North Report
NBC
Returning Series
Friday Night Videos
The George Michael Sports Machine
Late Night with David Letterman
Saturday Night Live
The Tonight Show Starring Johnny Carson
New Series
Later With Bob Costas
United States late night network television schedules
1988 in American television
1989 in American television |
https://en.wikipedia.org/wiki/1991%E2%80%9392%20United%20States%20network%20television%20schedule%20%28late%20night%29 | These are the late night schedules for the four United States broadcast networks that offer programming during this time period, from September 1991 to August 1992. All times are Eastern or Pacific. Affiliates will fill non-network schedule with local, syndicated, or paid programming. Affiliates also have the option to preempt or delay network programming at their discretion.
Legend
Schedule
Monday-Friday
Note: The final episode of The Tonight Show Starring Johnny Carson aired on May 22, 1992. The first episode of The Tonight Show with Jay Leno aired on May 25, 1992
Note: CBS News Nightwatch was renamed Up To The Minute
Note: Into The Night was renamed Studio 59
Saturday
By network
ABC
Returning series:
In Concert '91
Nightline
Studio 59
New series:
ABC World News Now
CBS
Returning series:
CBS News Nightwatch
New series:
A Closer Score
Crimetime After Primetime
Night Games
Personals
Up To The Minute
Not returning from 1990-91:
America Tonight
CBS Late Night
NBC
Returning series:
Friday Night Videos
Late Night with David Letterman
Later With Bob Costas
Saturday Night Live
The Tonight Show Starring Johnny Carson
New series:
NBC Nightside
The Tonight Show with Jay Leno
Not returning from 1990-91:
The George Michael Sports Machine (continues to air in First-run syndication)
Fox
Returning series:
Comic Strip Live
United States late night network television schedules
1991 in American television
1992 in American television |
https://en.wikipedia.org/wiki/1992%E2%80%9393%20United%20States%20network%20television%20schedule%20%28late%20night%29 | These are the late night schedules for the four United States broadcast networks that offer programming during this time period, from September 1992 to August 1993. All times are Eastern or Pacific. Affiliates will fill non-network schedule with local, syndicated, or paid programming. Affiliates also have the option to preempt or delay network programming at their discretion.
Legend
Schedule
Monday-Friday
Saturday
By network
ABC
Returning series:
ABC in Concert
ABC World News Now
Nightline
Not returning from 1991-92:
Studio 59
CBS
Returning series:
A Closer Score
CBS Late Night
Crimetime After Primetime
Kids in the Hall
Personals
Up To The Minute
Not returning from 1991-92:
CBS News Nightwatch
Night Games
NBC
Returning series:
Friday Night Videos
Late Night with David Letterman
Later
NBC Nightside
Saturday Night Live
The Tonight Show with Jay Leno
Not returning from 1991-92:
The Tonight Show Starring Johnny Carson
Fox
Returning series:
Comic Strip Live
United States late night network television schedules
1992 in American television
1993 in American television |
https://en.wikipedia.org/wiki/1993%E2%80%9394%20United%20States%20network%20television%20schedule%20%28late%20night%29 | These are the late night schedules for the four United States broadcast networks that offer programming during this time period, from September 1993 to August 1994. All times are Eastern or Pacific. Affiliates will fill non-network schedule with local, syndicated, or paid programming. Affiliates also have the option to preempt or delay network programming at their discretion.
Legend
Schedule
Monday-Friday
Saturday
By network
ABC
Returning series
ABC in Concert
ABC World News Now
ABC World News This Morning
Nightline
New series
ABC in Concert Country
CBS
Returning series
CBS Morning News
Crimetime After Primetime
Kids in the Hall
Up to the Minute
New series
Late Show with David Letterman
Not returning from 1992-93:
A Closer Score
CBS Late Night
Personals
FOX
Returning series
Comic Strip Live
Code 3
In Living Color
Tales from the Crypt
New series
The Chevy Chase Show
NBC
Returning series
Friday Night Videos / Friday Night
Later
NBC News at Sunrise
NBC Nightside
Saturday Night Live
The Tonight Show with Jay Leno
New series
Late Night with Conan O'Brien
Not returning from 1992-93:
Late Night with David Letterman
United States late night network television schedules
1993 in American television
1994 in American television |
https://en.wikipedia.org/wiki/Supply%20chain%20attack | A supply chain attack is a cyber-attack that seeks to damage an organization by targeting less secure elements in the supply chain. A supply chain attack can occur in any industry, from the financial sector, oil industry, to a government sector. A supply chain attack can happen in software or hardware. Cybercriminals typically tamper with the manufacturing or distribution of a product by installing malware or hardware-based spying components. Symantec's 2019 Internet Security Threat Report states that supply chain attacks increased by 78 percent in 2018.
A supply chain is a system of activities involved in handling, distributing, manufacturing, and processing goods in order to move resources from a vendor into the hands of the final consumer. A supply chain is a complex network of interconnected players governed by supply and demand.
Although supply chain attack is a broad term without a universally agreed upon definition, in reference to cyber-security, a supply chain attack involves physically tampering with electronics (computers, ATMs, power systems, factory data networks) in order to install undetectable malware for the purpose of bringing harm to a player further down the supply chain network.
In a more general sense, a supply chain attack may not necessarily involve electronics. In 2010 when burglars gained access to the pharmaceutical giant Eli Lilly's supply warehouse, by drilling a hole in the roof and loading $80 million worth of prescription drugs into a truck, they could also have been said to carry out a supply chain attack. However, this article will discuss cyber attacks on physical supply networks that rely on technology; hence, a supply chain attack is a method used by cyber-criminals.
Attack framework
Generally, supply chain attacks on information systems begin with an advanced persistent threat (APT) that determines a member of the supply network with the weakest cyber security in order to affect the target organization. According to an investigation produced by Verizon Enterprise, 92% of the cyber security incidents analyzed in their survey occurred among small firms.
APT's can often gain access to sensitive information by physically tampering with the production of the product. In October 2008, European law-enforcement officials "uncovered a highly sophisticated credit-card fraud ring" that stole customer's account details by using untraceable devices inserted into credit-card readers made in China to gain access to account information and make repeated bank withdrawals and Internet purchases, amounting to an estimated $100 million in losses.
Risks
The threat of a supply chain attack poses a significant risk to modern day organizations and attacks are not solely limited to the information technology sector; supply chain attacks affect the oil industry, large retailers, the pharmaceutical sector and virtually any industry with a complex supply network.
The Information Security Forum explains that the risk derived from |
https://en.wikipedia.org/wiki/Pharos%20network%20coordinates | Pharos is a hierarchical and decentralized network coordinate system. With the help of a simple two-level architecture, it achieves much better prediction accuracy then the representative Vivaldi coordinates, and it is incrementally deployable.
Overview
Network coordinate (NC) systems are an efficient mechanism for Internet latency prediction with scalable measurements. Vivaldi is the most common distributed NC system, and it is deployed in many well-known internet systems, such as Bamboo DHT (Distributed hash table), Stream-Based Overlay Network (SBON) and Azureus BitTorrent.
Pharos is a fully decentralized NC system. All nodes in Pharos form two levels of overlays, namely a base overlay for long link prediction, and a local cluster overlay for short link prediction. The Vivaldi algorithm is applied to both the base overlay and the local cluster. As a result, each Pharos node has two sets of coordinates. The coordinates calculated in the base overlay, which are named global NC, are used for the global scale, and the coordinates calculated in the corresponding local cluster, which are named local NC, covers a smaller range of distance.
To form the local cluster, Pharos uses a method similar to binning and chooses some nodes called anchors to help node clustering. This method only requires a one-time measurement (with possible periodic refreshes) by the client to a small, fixed set of anchors. Any stable nodes which are able to response ICMP ping message can serve as anchor, such as the existing DNS servers.
The experimental results show that Pharos greatly outperforms Vivaldi in internet distance prediction without adding any significant overhead.
Insights behind Pharos
Simple and effective, obtain significant improvement in prediction accuracy by introducing a straightforward hierarchical distance prediction
Fully compatible with Vivaldi, the most widely deployed NC system. For every host where the Vivaldi client has been deployed, it just needs to run classic Vivaldi NC algorithm to join global overlay and local cluster, without deploying another NC client.
The anchors in Pharos is different from landmarks in Global network positioning (GNP), which not only has to reply the ICMP ping but also need to reply the queries from all clients by sending their latest NCs. No requirement to deploy any extra software on the anchors.
See also
Peer-to-peer
Global network positioning
Phoenix network coordinates
External links
Simulator of Pharos Network Coordinates
Network Coordinates Research at Tsinghua University
References
Computer networking |
https://en.wikipedia.org/wiki/Where%20Was%20I%3F%20%28TV%20series%29 | Where Was I? was an American panel show which aired on the DuMont Television Network Tuesdays at 9pm ET from September 2, 1952, to October 6, 1953.
The series consisted of panelists would have to guess a location by listening to clues and viewing photos. Hosts included Dan Seymour, Ken Roberts, and John Reed King, and panelists included Bill Cullen, Nancy Guild, Virginia Graham, and Skitch Henderson.
Episode status
As with most DuMont series, no episodes are known to exist.
See also
List of programs broadcast by the DuMont Television Network
List of surviving DuMont Television Network broadcasts
1952-53 United States network television schedule
Bibliography
David Weinstein, The Forgotten Network: DuMont and the Birth of American Television (Philadelphia: Temple University Press, 2004)
Alex McNeil, Total Television, Fourth edition (New York: Penguin Books, 1980)
Tim Brooks and Earle Marsh, The Complete Directory to Prime Time Network TV Shows, Third edition (New York: Ballantine Books, 1964)
External links
Where Was I? at IMDB
DuMont historical website
DuMont Television Network original programming
Black-and-white American television shows
1952 American television series debuts
1953 American television series endings
Lost television shows
1950s American game shows
English-language television shows |
https://en.wikipedia.org/wiki/Trash%20or%20Treasure | Trash or Treasure, later known as Treasure Hunt, is an early American TV series which aired on the DuMont Television Network Thursdays at 9pm ET from October 1, 1952, to September 27, 1953. The show was hosted by Sigmund Rothschild and Nelson Case.
In the show, owners of collectible items would bring antiques to host Sigmund Rothschild, who would give an opinion on how much they were worth. Rothschild was a self-taught appraiser, who appraised antiques for many celebrities. The program's name was changed to Treasure Hunt in April 1953, according to McNeil (1996).
Rothschild also hosted the similar series What's It Worth? (1948–49 and 1952–53) on CBS Television.
Trash or Treasure originated at WABD-TV in New York City and was sustaining.
Episode status
As with most DuMont Network programs, no episodes of Trash or Treasure are known to survive today.
See also
List of programs broadcast by the DuMont Television Network
List of surviving DuMont Television Network broadcasts
1952-53 United States network television schedule
References
Bibliography
David Weinstein, The Forgotten Network: DuMont and the Birth of American Television (Philadelphia: Temple University Press, 2004)
Alex McNeil, Total Television, Fourth edition (New York: Penguin Books, 1980)
Tim Brooks and Earle Marsh, The Complete Directory to Prime Time Network TV Shows, Third edition (New York: Ballantine Books, 1964)
External links
Trash or Treasure at IMDb
DuMont historical website
DuMont Television Network original programming
Black-and-white American television shows
1952 American television series debuts
1953 American television series endings
Lost television shows |
https://en.wikipedia.org/wiki/Dark%20of%20Night | Dark of Night is an American dramatic anthology series that aired on the DuMont Television Network on Fridays at 8:30pm EST from October 3, 1952, to May 1, 1953.
The series starred mostly unknown actors. In it, the character known as "The Stranger" traveled to a different site each week in order to solve a crime. Each episode was filmed at a different location in the New York City area. , Locations included a Coca-Cola bottling plant, Brentano's book store in Manhattan, a castle in New Jersey, and the American Red Cross Blood Bank. Dark of Night was one of the first network dramas to use such locations, which saved money for the network.
Production
Dark of Night was broadcast live. Frank Bunetta was the producer and director.
Episode status
Though most episodes of DuMont series were eventually destroyed, the UCLA Film and Television Archive has one episode of Dark of Night.
See also
List of programs broadcast by the DuMont Television Network
List of surviving DuMont Television Network broadcasts
1952-53 United States network television schedule
at CVTA with episode list
References
External links
DuMont historical website
Dark of Night at CVTA with episode list
1952 American television series debuts
1953 American television series endings
1950s American anthology television series
1950s American drama television series
Black-and-white American television shows
DuMont Television Network original programming
English-language television shows |
https://en.wikipedia.org/wiki/Meaningful%20play | Meaningful play are actions or activities built with either a designed or inherent intent, such as data collection or therapy.
Meaning is defined as the underlying purpose of the topic or subject at hand, while play itself is defined as a range of voluntary, intrinsically motivated activities normally associated with pleasure and enjoyment.
Inherent meaningful play would be defined as an activity where the purpose is built directly into the activity. An example of this is that sports have the inherent meaning of being fun and full of physical activity to promote wellness.
Designed meaningful play is defined as an activity where another purpose is also integrated into the activity, by the creator of the activity, to either acquire knowledge or promote another purpose within the activity. For example, games in developmental psychology have the designed meaning of gathering data about many functions such as how executive function develops. The designed meaning does not have to be built into the activity from the beginning. In considering recess, it was created to give children time to exercise and socialize, but researchers at a later time have inferred meaning from the activities that children participate in during this time, adding a designed meaning to the activity of recess.
Overview
Meaningful play is discussed in the disciplines of psychology, education, counselling and law. It is also utilized in the fields of video games. While there appears to be no exact moment when the term was created, it first started to appear in the field of video games with the book Rules of Play, and was further adapted into other fields such as psychology soon after with a modified definition.
Meaningful play has grown and become more influential over the years. As researchers discovered many of the various uses for play (For example, cleaning up excess brain cells during play) as well as discovered how many various forms of play there are. Advocates of meaningful play and play in general have even voiced their recommendation that playing be placed above testing in young grades like kindergarten. As well there are studies branching out to different age groups seeing if meaningful play can help the elderly with cognitive and physical functioning.
While all play can be considered meaningful due to the inherent nature of play to have some sort of meaning of either competition or enjoyment, meaningful play is also about the designed meaning taken from play.
Psychology
The field of psychology uses meaningful play in a large variety of ways. The most important way is for gathering data during research, especially with children. This is considered basic research because it is done with the sole intent of gathering knowledge which could eventually be applied. Other ways include playing (in the form of games or role-playing) during therapy.
Improving Basic Research
The experimental approach works quite well for the most common research participant (University underg |
https://en.wikipedia.org/wiki/Shinminato%20Line | is a rail line in Takaoka, Toyama, Japan. It is operated by Japan Freight Railway Company (JR Freight). It runs from Nōmachi Station to Takaoka Freight Terminal.
Route data
Company: Japan Freight Railway Company (JR Freight) (Category-1)
Distance: 1.9 km / 1.2 mi
Gauge: 1,067 mm / 3 ft 6 in
Stations: 2
Double-track line: None
Electric supply: Not electrified
Signalling: Simplified automatic
Stations
See also
List of railway lines in Japan
Lines of Japan Railway companies
Rail transport in Toyama Prefecture |
https://en.wikipedia.org/wiki/Kurdish%20News%20Network | Kurdish News Network (KNN) (), is a Kurdish language news television network founded in 2008 by Nawshirwan Mustafa, the leader of the Change Movement political party. It is operated by the Wusha Corporation and based in Sulaimaniya.
Programmes
News - Covering the top Kurdish and international news stories
Headlines - A brief overview of the main news stories
Business - Financial news
Markets - News on the world stock markets and commodity prices
Press - A look at the front pages of various titles every morning
Sport - Top sports stories
Weather - forecasting
Interview - An interview with a noted individual
Debate - A head-to-head debate
Parliament - News about the Kurdish Parliament
Comment - Interviews with thinkers, innovators and opinion leaders
References
External links
Television stations in Kurdistan Region (Iraq)
Television stations in Iraq
Kurdish-language television stations
Mass media in Sulaymaniyah
Television channels and stations established in 2008
2008 establishments in Iraqi Kurdistan |
https://en.wikipedia.org/wiki/Andrew%20Zisserman | Andrew Zisserman (born 1957) is a British computer scientist and a professor at the University of Oxford, and a researcher in computer vision. As of 2014 he is affiliated with DeepMind.
Education
Zisserman received the Part III of the Mathematical Tripos, and his PhD in theoretical physics from the Sunderland Polytechnic.
Career and research
In 1984 he started to work in the field of computer vision at the University of Edinburgh. Together with Andrew Blake they wrote the book Visual reconstruction published in 1987, which is considered one of the seminal works in the field of computer vision. According to Fitzgibbon (2008) this publication was "one of the first treatments of the energy minimisation approach to include an algorithm (called "graduated non-convexity") designed to directly address the problem of local minima, and furthermore to include a theoretical analysis of its convergence."
In 1987 he moved back to England to the University of Oxford, where he joined Mike Brady's newly founded robotics research group as a University Research Lecturer, and started to work on multiple-view geometry. According to Fitzgibbon (2008) his "geometry was successful in showing that computer vision could solve problems which humans could not: recovering 3D structure from multiple images required highly trained photogrammetrists and took a considerable amount of time. However, Andrew's interests turned to a problem where a six-year-old child could easily beat the algorithms of the day: object recognition."
Publications
Zisserman has published several articles, some of the most highly cited works in the field, and has edited a series of books. A selection:
1987. Visual reconstruction. With Andrew Blake.
1992. Geometric invariance in computer vision. Edited with Joseph Mundy.
1994. Applications of invariance in computer vision : second joint European-US workshop, Ponta Delgada, Azores, Portugal, 9–14 October 1993 : proceedings. With Joseph L. Mundy and David Forsyth (eds).
1996. ECCV '96 International Workshop (1996 : Cambridge, England) Object representation in computer vision II : ECCV '96 International Workshop, Cambridge, UK, 13–14 April 1996 : proceedings. With Jean Ponce, and Martial Hebert (eds.).
1999. International Workshop on Vision Algorithms (1999 : Corfu, Greece) Vision algorithms : theory and practice : International Workshop on Vision Algorithms, Corfu, Greece, 21–22 September 1999 : proceedings. With Bill Triggs and Richard Szeliski (eds.).
2000. Multiple view geometry in computer vision. With Richard Hartley. Second edition 2009.
2008. Computer vision – ECCV 2008 : 10th European conference on computer vision, Marseille, France, 12–18 October 2008, proceedings, part I. Edited with David Forsyth and Philip Torr.
Awards and honours
Zisserman is an ISI Highly Cited researcher. He is the only person to have been awarded the Marr Prize three times, in 1993, in 1998, and in 2003. He was elected Fellow of the Royal Society in 2007. I |
https://en.wikipedia.org/wiki/Armin%20Meiwes | Armin Meiwes (; born 1 December 1961) is a German former computer repair technician who received international attention for murdering and eating a voluntary victim in 2001, whom he had found via the Internet.
After Meiwes and the victim jointly attempted to eat the victim's severed penis, Meiwes murdered his victim and proceeded to eat a large amount of his flesh. Meiwes cut off his victim's penis and later consumed parts of his body. The house where this event took place was destroyed in a fire that happened around 3:20 am on 17 April 2023. He was arrested in December 2002. In January 2004, Meiwes was convicted of manslaughter and sentenced to eight years and six months in prison. In a retrial in May 2006, he was convicted of murder and sentenced to life imprisonment. Because of his acts, Meiwes is also known as the Rotenburg Cannibal or (The Master Butcher).
Biography
Early life
Armin Meiwes was born on 1 December 1961, the only child of Waltrud Meiwes (1919–1999). He had two older half-brothers from his father's previous relationship with another woman. His father abandoned Armin when he was eight, leaving him to be raised by his mother. During sessions with police experts, Meiwes had explained that his desire for cannibalism, related to the fairytale Hansel and Gretel, had developed during his adolescent years. He had also described himself feeling "very lonesome" after "the family had fallen apart".
Murder of Bernd Brandes and cannibalism
Looking for a willing volunteer, Meiwes posted an advertisement on the then-active website The Cannibal Cafe (a now defunct forum for people with a cannibalism fetish). Meiwes's advertisement stated that he was "looking for a well-built 18- to 25-year-old to be slaughtered and then consumed." Bernd-Jürgen Armando Brandes, a 43-year-old engineer from Berlin, answered the advertisement in March 2001. Many other people responded to the advertisement but backed out; Meiwes did not attempt to force them to do anything against their will.
The two made a videotape when they met on 9 March 2001 in Meiwes's home, in the small town of Wüstefeld, west of Rotenburg an der Fulda. The video shows Meiwes amputating Brandes's penis (with his agreement) and the two men attempting to eat it together. Before doing so, Brandes swallowed twenty sleeping pills, and a bottle of cough syrup, likely causing an effect of slowed breathing and extreme tiredness. Brandes initially insisted that Meiwes should attempt to bite his penis off. This did not work, and ultimately, Meiwes used a knife to remove it. Brandes apparently tried to eat some of his own penis raw but could not, because it was too tough and, as he put it, "chewy". Meiwes then fried the penis in a pan with salt, pepper, wine, and garlic; he then fried it with some of Brandes' fat, but by then it was too burnt to be consumed. He then chopped the penis up into chunks and fed it to his dog. According to court officials who saw the video (which has not been made pu |
https://en.wikipedia.org/wiki/Melody%20Street | Melody Street is an early American television series, hosted by Elliot Lawrence, which aired on the DuMont Television Network. The program aired Fridays at 8:30pm ET from September 25, 1953, to February 5, 1954. Each episode was 30 minutes long. One guest star was guitarist Tony Mottola.
Criticism
Melody Street was hampered by a small budget, even by 1950s standards. Later-day critics, such as Castleman and Podrazik (1982), have cited Melody Street, among other DuMont series, as one of the reasons fewer and fewer viewers tuned in to the ailing DuMont Network. They stated Melody Street was, like several other DuMont programs during the 1953–1954 season, "doomed from the start by third-rate scripts and cheap production" and pointed out that the program "required the performers to lip-sync other people's records."
Reception
John Lester for the Long Island Star-Journal said the program "presents an attractive melange of musical numbers" and that the program had "initiative, ingenuity and imagination".
Episode status
Two complete episodes, January 1, 1954, and another 1954 episode, of the show survive at the UCLA Film and Television Archive, along with an excerpt from another episode.
See also
List of programs broadcast by the DuMont Television Network
List of surviving DuMont Television Network broadcasts
1953-54 United States network television schedule
References
Bibliography
David Weinstein, The Forgotten Network: DuMont and the Birth of American Television (Philadelphia: Temple University Press, 2004)
Alex McNeil, Total Television, Fourth edition (New York: Penguin Books, 1980)
Tim Brooks and Earle Marsh, The Complete Directory to Prime Time Network TV Shows, Third edition (New York: Ballantine Books, 1964)
External links
Melody Street at IMDB
DuMont historical website
DuMont Television Network original programming
Black-and-white American television shows
1953 American television series debuts
1954 American television series endings
English-language television shows |
https://en.wikipedia.org/wiki/Colonel%20Humphrey%20Flack | Colonel Humphrey Flack is an American sitcom which ran Wednesdays at 9 p.m. ET from October 7, 1953, to July 2, 1954, on the DuMont Television Network, then revived from 1958 to 1959 for first-run syndication.
The series also aired under the titles The Fabulous Fraud, The Adventures of Colonel Flack, and The Imposter.
Overview
The series is about a con man who defrauded rich people, then gave some of the money to the needy. Colonel Humphrey Flack starred British actor Alan Mowbray as the Colonel, and Frank Jenks as his sidekick, Uthas P. ("Patsy") Garvey. The TV series was based on a popular series of short stories by Everett Rhodes Castle published in The Saturday Evening Post.
The pilot for the series aired on May 31, 1953, on an episode of the ABC Album/Plymouth Playhouse.
When the series was revived in 1958, it was retitled Colonel Flack. The 39 episodes (all remakes of the original 39 episodes) aired from October 5, 1958, to July 5, 1959, in syndication. The syndicated programs were made by Desilu Productions and featured Mowbray and Jenks in their original roles.
Reception
A review in TV Guide noted that the program succeeded as a situation comedy "without benefit of any husband-and-wife team, precocious children, etc." It also complimented Mowbray's and Jenks's portrayals of their characters.
Episode status
At least 12 episodes of the DuMont series are in the collection of the UCLA Film and Television Archive and two episodes are at the Paley Center for Media.
See also
1953-54 United States network television schedule
List of programs broadcast by the DuMont Television Network
List of surviving DuMont Television Network broadcasts
References
General bibliography
Brooks, Tim, and Earle Marsh, The Complete Directory to Prime Time Network TV Shows, Third edition (New York: Ballantine Books, 1964)
McNeil, Alex. Total Television, Fourth edition (New York: Penguin Books, 1980)
Weinstein, David. The Forgotten Network: DuMont and the Birth of American Television (Philadelphia: Temple University Press, 2004)
External links
List of episodes of original DuMont run
List of episodes at CTVA
Opening credits at YouTube
DuMont historical website
DuMont Television Network original programming
1953 American television series debuts
1954 American television series endings
1958 American television series debuts
1959 American television series endings
1950s American sitcoms
Black-and-white American television shows
First-run syndicated television programs in the United States
American television series revived after cancellation
Television series by CBS Studios |
https://en.wikipedia.org/wiki/Ashington%20railway%20station | Ashington railway station was a station on the branch of the Blyth and Tyne Railway network which served the town of Ashington in Northumberland, North East England. The station was closed by British Railways in 1964, but it has been the subject of a reopening campaign since at least the 1990s.
History
Ashington station was opened by the Blyth and Tyne Railway in 1872 as Hirst (for Ashington). The North Eastern Railway took over the Blyth and Tyne Railway in 1874, the NER became part of the London and North Eastern Railway in the 1923 grouping and the station passed to the North Eastern Region of British Railways on nationalisation in 1948. British Railways withdrew passenger services in 1964 as part of the Reshaping of British Railways.
The site today
The line through the former station is still used for freight. Ashington signal box was closed on 14 February 2010 with the removal of the main line crossover. The signal box was demolished over the weekend of 10–11 August 2013.
The northbound platform was demolished in October 2022 to make way for the new Northumberland Line platform.
Reopening proposals
Proposals to reintroduce passenger rail services to the currently freight-only section of the former Blyth and Tyne Railway system have been discussed since the 1990s.
In the early 2010s, Northumberland County Council (NCC) became interested in the proposals, commissioning Network Rail to complete a GRIP 1 study to examine the best options for the scheme in June 2013. This report was published in March 2014 and was followed in June 2015 with the commissioning of a more detailed GRIP 2 study at a cost of £850,000. The GRIP 2 study, published in October 2016, confirmed that the reintroduction of a frequent seven-day a week passenger service between Newcastle, Ashington and possibly a new terminus to the east, at , was feasible and could provide economic benefits of £70 million with more than 380,000 people using the line each year by 2034. Despite a change in the political leadership of Northumberland County Council following the 2017 local elections the authority continued to develop the project, encouraged by the Department for Transport's November 2017 report, A Strategic Vision for Rail, which named the line as a possible candidate for a future reintroduction of passenger services. Consequentially, NCC commissioned a further interim study in November 2017 (dubbed GRIP 2B) to determine whether high costs and long timescales identified in the GRIP 2 Study could be reduced by reducing the initial scope of the project, but the report failed to deliver on this.
Nonetheless, the county council has continued to develop the project, hiring AECOM and SLC Rail as contractors to develop the scheme on their behalf in 2018 and allocating an additional £3.46 million in funding for a further business case and detailed design study (equivalent to GRIP 3) in February 2019. Revised plans were revealed in July 2019 which were reduced in scope from the 2016 |
https://en.wikipedia.org/wiki/Martha%20M.%20Foster | Martha M. Foster is the founder and executive director of Living Earth Television(LETV), a Bloomington, Indiana-based nonprofit organization that develops programming from documentaries made by international filmmakers. Foster began LETV in 2002, in Chicago.
In September 2010, Living Earth Television's first broadcast appeared on LinkTV. LETV's newly released English language version of an award-winning documentary from Chinese producer Zhang Yiqing, Kindergarten, was featured on LinkTV's DocDebut site.
In June 2009, Foster was invited to participate in the U.S. Department of State Bureau of Educational and Cultural Affairs' American Documentary Showcase, a touring initiative that features U.S. documentaries and is administered by the University Film and Video Association (UFVA) in partnership with the International Documentary Association (IDA). The program debuted in the Czech Republic and Poland in April 2009 and traveled to nearly 30 countries in 2009, including Iraq, Kenya and Vietnam. In September and October 2009, Foster traveled to Singapore and Myanmar as a Documentary Expert with the Showcase. In December 2010, Foster traveled to China with the Showcase, to exhibit American documentaries in Nanjing, Guangzhou and Beijing.
Following her visit to Myanmar, Foster and LETV facilitated the broadcast of three international environmental films on Myanmar State Television, at the request of the Myanmar Ministry of Information, working in cooperation with the US Embassy in Yangon. These programs began broadcasting in Myanmar in September 2010.
Foster has worked for the Smithsonian Institution, the Chicago Field Museum and Chicago Public Television and has won five regional Emmy awards, some shared with other colleagues . She was selected as an "Influential Woman in Business" by the National Association of Women Business Owners in 2003.
She has acted in conjunction with universities, museums and festivals in the United States and abroad for nearly 30 years. In 2008, she served as a judge for the Jade Kunlun Awards-2008 World Mountain Documentary Festival of Qinghai, China.
Foster's continuing relationship with Chinese documentary television professionals began in 1997, when professor Ren Yuan of the Beijing Broadcasting Institute (now the Communication University of China) brought Chinese documentaries to show at the Windy City International Documentary Festival in Chicago, which Foster founded and directed.
Foster was invited to visit China in 1999 to lecture to documentary production professionals at universities and television stations in five cities. In 2001 and 2003, she also served as a juror for the Gold Panda social and cultural documentary awards.
References
Emmy Award winners |
https://en.wikipedia.org/wiki/HTree | An HTree is a specialized tree data structure for directory indexing, similar to a B-tree. They are constant depth of either one or two levels, have a high fanout factor, use a hash of the filename, and do not require balancing. The HTree algorithm is distinguished from standard B-tree methods by its treatment of hash collisions, which may overflow across multiple leaf and index blocks. HTree indexes are used in the ext3 and ext4 Linux filesystems, and were incorporated into the Linux kernel around 2.5.40. HTree indexing improved the scalability of Linux ext2 based filesystems from a practical limit of a few thousand files, into the range of tens of millions of files per directory.
History
The HTree index data structure and algorithm were developed by Daniel Phillips in 2000 and implemented for the ext2 filesystem in February 2001. A port to the ext3 filesystem by Christopher Li and Andrew Morton in 2002 during the 2.5 kernel series added journal based crash consistency. With minor improvements, HTree continues to be used in ext4 in the Linux 3.x.x kernel series.
Use
ext2 HTree indexes were originally developed for ext2 but the patch never made it to the official branch. The dir_index feature can be enabled when creating an ext2 filesystem, but the ext2 code won't act on it.
ext3 HTree indexes are available in ext3 when the dir_index feature is enabled.
ext4 HTree indexes are turned on by default in ext4. This feature is implemented in Linux kernel 2.6.23. HTree indexes is also used for file extents when a file needs more than the 4 extents stored in the inode. The large_dir feature of ext4 is implemented in Linux kernel 4.13.
PHTree
PHTree (Physically stable HTree) is a derivation intended as a successor. It fixes all the known issues with HTree except for write multiplication. It is used in the Tux3 filesystem.
References
External links
A Directory Index for Ext2 (which describes the HTree data structure)
HTree
HPDD Wiki - Parallel Directory High Level Design
Disk file systems
B-tree
Linux |
https://en.wikipedia.org/wiki/Victoria%20blue%20R | Victoria blue R is a dye with formula C29H32N3Cl. It has a blue colour that changes to yellow at low pH values.
Physical data
Fastness
The dye exerts a high light fastness and washing fastness.
UV/VIS absorption
Victoria Blue R has an absorption peak of around 610nm.
Chlorides
Triarylmethane dyes
Dimethylamino compounds |
https://en.wikipedia.org/wiki/American%20Association%20of%20Family%20and%20Consumer%20Sciences | American Association of Family and Consumer Sciences (AAFCS) is an American professional association that networks professionals in the area of family and consumer science. It was founded in 1908 as the American Home Economics Association by Ellen H. Richards. In 1994 it changed its name to the current one.
The association started with about 800 members and grew to over 50,000 by the mid-1960s. In the early 20th century, the association did not often mention Black universities in its journal and it also practiced segregation. It encouraged African American home economics leaders to form their own groups. Many already had formed such groups, which included the National Association of Teachers in Colored Schools. By the mid-1990s membership had fallen below 25,000 and by 2001, it was just over 13,000. Membership continued to decline, and by 2008 was just over 7,000, and where by early 2012, the numbers fell to approximately 5,000 members.
The association currently acts as a professional network primarily for professors and teachers of home economics and related courses, but also includes large numbers from government, business and non-profit organizations.
AAFCS is one of the five organizations that form the Consortium of Family Organizations. While not having its own political action committee, it recommends the "Vocational Political Action Committee"; and in 1985, the AAFCS joined the Home Economics Public Policy Council (HEPPC), which does engage in legislative action.
The field originated from home economics to what it is today. Family and Consumer Sciences is an interdisciplinary field that combines social sciences (emphasizing on the well-being of individuals, families, and communities) and natural sciences (emphasizing on nutrition, development, and textile science). Aspects included: nutrition, cooking, parenting and human development, interior design, textiles, economics, housing, apparel merchandising, resource management, ad other related specialties.
Awards
National Family and Consumer Sciences Teacher of the Year Award, annually for outstanding educational programs
Borden Award, annually for research in nutrition
Ruth O'Brien Project Grants, periodically for development of research in family and consumer science
AAFCS fellowships awarded to graduate students in family and consumer science
Atwater International fellowship to non-American graduate students in family and consumer science, established in 1947 and named after Helen W. Atwater
Publications
Journal of Family and Consumer Sciences, a quarterly refereed professional publication, formerly the Journal of Home Economics renamed in 1994
Family and Consumer Sciences Research Journal, a quarterly refereed technical publication, published on behalf of the association, (print), (web), by SAGE Publications through 2009, then by Wiley-Blackwell
AAFCS Action, a five times per year newsletter detailing association and member activities, established in 1974 discontinued as |
https://en.wikipedia.org/wiki/SAtel | SATel is a Bangladeshi fixed line regional operator. It is a private public switched telephone network (PSTN) operator in the South-East region of Bangladesh. As of November 2009, total number of subscriber of this operator is 17.577 thousand.
References
Telecommunications companies of Bangladesh |
https://en.wikipedia.org/wiki/Dynamic%20frequency%20hopping | One of the key challenges of the cognitive radio based wireless networks, such as IEEE 802.22 wireless regional area networks (WRAN), is to address two apparently conflicting requirements: assuring Quality of Services (QoS) satisfaction for services provided by the cognitive radio networks, while providing reliable spectrum sensing for guaranteeing licensed user protection. To perform reliable sensing, in the basic operation mode on a single frequency band (the so-called "listenbefore-talk" mode) one has to allocate Quiet Times, in which no data transmission is permitted. Such periodic interruption of data transmission could impair the QoS of cognitive radio systems.
This issue is addressed by an alternative operation mode proposed in IEEE 802.22 called Dynamic Frequency Hopping (DFH) where data transmission of the WRAN systems are performed in parallel with spectrum sensing without any interruption.
References
Wireless networking |
https://en.wikipedia.org/wiki/Robot%20Operating%20System | Robot Operating System (ROS or ros) is an open-source robotics middleware suite. Although ROS is not an operating system (OS) but a set of software frameworks for robot software development, it provides services designed for a heterogeneous computer cluster such as hardware abstraction, low-level device control, implementation of commonly used functionality, message-passing between processes, and package management. Running sets of ROS-based processes are represented in a graph architecture where processing takes place in nodes that may receive, post, and multiplex sensor data, control, state, planning, actuator, and other messages. Despite the importance of reactivity and low latency in robot control, ROS is not a real-time operating system (RTOS). However, it is possible to integrate ROS with real-time computing code. The lack of support for real-time systems has been addressed in the creation of ROS 2, a major revision of the ROS API which will take advantage of modern libraries and technologies for core ROS functions and add support for real-time code and embedded system hardware.
Software in the ROS Ecosystem can be separated into three groups:
language-and platform-independent tools used for building and distributing ROS-based software;
ROS client library implementations such as , , and ;
packages containing application-related code which uses one or more ROS client libraries.
Both the language-independent tools and the main client libraries (C++, Python, and Lisp) are released under the terms of the BSD license, and as such are open-source software and free for both commercial and research use. The majority of other packages are licensed under a variety of open-source licenses. These other packages implement commonly used functionality and applications such as hardware drivers, robot models, datatypes, planning, perception, simultaneous localization and mapping (SLAM), simulation tools, and other algorithms.
The main ROS client libraries are geared toward a Unix-like system, mostly because of their dependence on large sets of open-source software dependencies. For these client libraries, Ubuntu Linux is listed as "Supported" while other variants such as Fedora Linux, macOS, and Microsoft Windows are designated "experimental" and are supported by the community. The native Java ROS client library, , however, does not share these limitations and has enabled ROS-based software to be written for the Android OS. has also enabled ROS to be integrated into an officially supported MATLAB toolbox which can be used on Linux, macOS, and Microsoft Windows. A JavaScript client library, has also been developed which enables integration of software into a ROS system via any standards-compliant web browser.
History
Early days at Stanford (2007 and earlier)
Sometime before 2007, the first pieces of what eventually would become ROS began coalescing at Stanford University. Eric Berger and Keenan Wyrobek, PhD students working in Kenneth Salisbury's |
https://en.wikipedia.org/wiki/Rule-based%20system | In computer science, a rule-based system is used to store and manipulate knowledge to interpret information in a useful way. It is often used in artificial intelligence applications and research.
Normally, the term rule-based system is applied to systems involving human-crafted or curated rule sets. Rule-based systems constructed using automatic rule inference, such as rule-based machine learning, are normally excluded from this system type.
Applications
A classic example of a rule-based system is the domain-specific expert system that uses rules to make deductions or choices. For example, an expert system might help a doctor choose the correct diagnosis based on a cluster of symptoms, or select tactical moves to play a game.
Rule-based systems can be used to perform lexical analysis to compile or interpret computer programs, or in natural language processing.
Rule-based programming attempts to derive execution instructions from a starting set of data and rules. This is a more indirect method than that employed by an imperative programming language, which lists execution steps sequentially.
Construction
A typical rule-based system has four basic components:
A list of rules or rule base, which is a specific type of knowledge base.
An inference engine or semantic reasoner, which infers information or takes action based on the interaction of input and the rule base. The interpreter executes a production system program by performing the following match-resolve-act cycle:
Match: In this first phase, the condition sides of all productions are matched against the contents of working memory. As a result a set (the conflict set) is obtained, which consists of instantiations of all satisfied productions. An instantiation of a production is an ordered list of working memory elements that satisfies the condition side of the production.
Conflict-resolution: In this second phase, one of the production instantiations in the conflict set is chosen for execution. If no productions are satisfied, the interpreter halts.
Act: In this third phase, the actions of the production selected in the conflict-resolution phase are executed. These actions may change the contents of working memory. At the end of this phase, execution returns to the first phase.
Temporary working memory.
A user interface or other connection to the outside world through which input and output signals are received and sent.
See also
Rule-based programming
Expert systems
Rewriting
RuleML
List of rule-based languages
Learning classifier system
Rule-based machine learning
Rule-based modeling
References
Rule engines |
https://en.wikipedia.org/wiki/Mac%20Mini | Mac Mini (stylized as Mac mini) is a small form factor desktop computer developed and marketed by Apple Inc. , it is positioned between the consumer all-in-one iMac and the professional Mac Studio and Mac Pro as one of four current Mac desktop computers. Since launch, it has shipped without a display, keyboard, and mouse. The machine was initially branded as "BYODKM" (Bring Your Own Display, Keyboard, and Mouse) as a strategic pitch to encourage users to switch from Windows and Linux computers.
In January 2005, the original Mac Mini was introduced with the PowerPC G4 CPU. In February 2006, Apple announced a new Intel Core Solo model, the first with an Intel processor. A thinner unibody redesign, unveiled in June 2010, added an HDMI port, and was more readily positioned as a home theater device and an alternative to the Apple TV.
The 2018 Space Gray Mac Mini model has Thunderbolt, an Intel Core i3, Core i5 or i7 CPU, and also changed the case's default silver for space gray. This model also has solid-state storage and replaces most of the data ports with USB-C sockets. The Apple silicon Mac Mini was introduced in November 2020 in the original silver style; the 2018 space gray model remained available as a high-end model with more RAM options.
A server version of the Mac Mini that is bundled with the Server edition of the OS X operating system was offered from 2009 to 2014. The Mac Mini received generally tepid reviews except for the Apple silicon model, which was praised for its compatibility, performance, processor, price, and power efficiencies, though it drew some occasional criticisms for its ports, speaker, integrated graphics, non-user-upgradable RAM and storage, and the expensive cost to buy associated accessories and displays.
Form and design
The Mac Mini was modeled on the shape of a standard digital media player, and runs the macOS operating system (previously Mac OS X and OS X). It was initially advertised as "BYODKM" (Bring Your Own Display, Keyboard, and Mouse), aiming to expand Apple's market-share of customers using other operating systems such as Microsoft Windows and Linux. Mac Mini was the company's only consumer computer that shipped without a paired display, keyboard, and mouse since its original release in 2005.
Since the unibody redesign in 2010, the Kensington Security Slot and the optical drive were removed from all models, leaving internal storage spaces for either a second internal hard drive or an SSD, which can be ordered from Apple or as an upgrade kit from third party suppliers.
G4 polycarbonate (2005)
Apple's release of a small form factor computer had been widely speculated upon and requested before the Mac Mini. In January 2005, the Mac Mini G4 was introduced alongside the iPod shuffle at the Macworld Conference & Expo; Apple CEO Steve Jobs marketed "The cheapest, and most affordable Mac ever". The machine was intended as an entry-level computer for budget-minded customers. In comparison to regular deskto |
https://en.wikipedia.org/wiki/Star%20Luster | is a 1985 space combat simulator video game developed and published by Namco for the Family Computer in Japan. and adapted for play in arcades via the Nintendo VS. System. Star Luster is set in the same universe as Namco's Bosconian (1981), and the gameplay has strong similarities to Atari, Inc.'s Star Raiders from 1979.
An enhanced version of Star Luster was published for the X68000 in August 1994. A sequel, Star Ixiom, was released for the PlayStation in 1999.
Star Luster was initially met with mixed reviews and poor sales. The game's reliance on obtuse level objectives and random enemy encounters have been blamed for its lack of popularity, in addition to the Famicom's userbase being primarily children that didn't understand its design. Retrospectively, Star Luster has received more positive reviews for its 3D perspective and presentation.
Gameplay
Star Luster involves moving through open space via a first-person cockpit view and engaging enemy ships. The player's ship has limited fuel and can be refueled at bases. A map and radar show locations of enemies and bases. The player can choose a location on the map and warp to it, with the current date changing based on the warp distance. The game uses a regenerating shield and may be the first game with such a mechanic.
Reception
Star Luster initially received mixed reviews and struggled to gain sales. The game's lack of popularity has been blamed on its complex design, which relies heavily on random encounters and obtuse level objectives that, at the time, were seen as too confusing and esoteric for a console game. Critics also believed producing the game for the Famicom, a game console targeted primarily towards children, was a factor in Star Lusters poor commercial reception. A reviewer for Family Computer Magazine highlighted the game's usage of a radar and 3D perspective. They believed the radar was difficult to understand at first, but overtime the player would become used to it.
Retrospective reviews of Star Luster have labeled it a masterpiece. Yuge believed the first-person viewpoint was impressive for the time, and highlighted the game's sense of tension and Star Wars-esque presentation. The magazine believes the game's first-person perspective was what led to the game's initial mixed reception, as it was considered too advanced for the time. Continue writer Zenji Ishii considers Star Luster important and influential for the space combat simulator genre, with a high level of action and strategy.
Legacy
In 1998, the game was included on a compilation made for the PlayStation known as Namco Anthology 1 where, like all of the Famicom games presented on the disc, an enhanced arrange mode was provided alongside the unaltered original game. The Famicom version was later included in the Japanese version of Nintendo and Namco's Star Fox Assault, and was released for the Wii Virtual Console in Japan on March 4, 2008.
A sequel, Star Ixiom, was released for the PlayStation in 1999 for Japa |
https://en.wikipedia.org/wiki/Mystery%20Tower | is a puzzle-platform video game developed and published by Namco for the Family Computer in Japan on July 18, 1986. It was released on the Wii U Virtual Console in 2014. While the game remained exclusive to Japan for several years, it received its first worldwide release in June 5 2023 via Nintendo Switch Online, under the name Mystery Tower.
The game's goal is to solve the puzzle of each of the 64 levels of the ancient Tower of Babel and reach the top of the tower. The player controls the protagonist, Indy Borgnine, who must avoid enemies while rearranging L-shaped blocks in order to reach each level's exit.
Development was done by Namco, and the project was planned by Hiroshima Nagashima, who had worked on the company's arcade game Sky Kid (1985), the music was by Norio Nakagata, and the character design was by Hiroshi Fuji.
Gameplay
The player controls Indy Borgnine through 64 levels, using L-shaped blocks and vines in order to reach the exit of each level. On some levels, the exit is blocked by a mask, and there are crystal balls throughout the level. If all of the crystal balls on a level are collected, then the mask covering that level's exit will disappear, and the exit will no longer be blocked. When the exit of a level is reached, a screen is displayed showing the score achieved on that level before the character moves on to the next level. In the top right corner of the screen there is a power count. Lifting an L-shaped block causes the power count to go down by 1. Items will occasionally spawn while the player goes through the tower. The items are:
Pots (100 points and add 1 to power count)
Crowns (200 points)
Jewels (400 points and invincibility; enemies killed while invincible are worth 1000 points)
Lamps (1000 points and enable Indy Borgnine to pass through L-shaped blocks)
Stars (increase Indy Borgnine's speed)
Plot
Archaeologist and explorer Indy Borgnine is in search of the fabled Hanging Gardens of Babylon. After reading some lost scriptures, he determines that the only way to see them is to travel to the very top of the 64-story Tower of Babel from the Book of Genesis of the Old Testament. Upon reaching the Tower, he discovers that the only way to access the floors above him are to solve some challenging puzzles involving loose L-shaped blocks that he finds throughout the Tower. To his great surprise, the blocks are capable of balancing very well on top of one another, in order to form staircases.
Notes
References
1986 video games
Nintendo Entertainment System games
Namco games
Puzzle-platform games
Video games developed in Japan
Virtual Console games
Virtual Console games for Wii U
Nintendo Switch Online games
Tower of Babel
Hanging Gardens of Babylon |
https://en.wikipedia.org/wiki/Lake%20Wood%20%28Philippines%29 | Lake Wood (Subanen: Danaw) is a lake located in the province of Zamboanga del Sur in Mindanao island, southern Philippines.
References
External links
Geographic data related to Lake Wood (Philippines) at OpenStreetMap
Wood
Landforms of Zamboanga del Sur |
https://en.wikipedia.org/wiki/Francis%20O%27Leary | Francis Aloysius O'Leary MBE (18 June 1931 – 4 October 2000) was an English Roman Catholic priest and missionary who founded the St Joseph's Hospice Association, an international network of hospices known as Jospice. O'Leary was awarded the membership in Order of the British Empire (MBE) in 1996.
Life
Francis Aloysius O'Leary was born 18 June 1931 in Crosby, Liverpool, England, the youngest of three children. At the age of 11, O'Leary entered the seminary of Mill Hill Fathers at Freshfield. He later attended seminaries at Burn Hall, County Durham, and St Joseph's College in Roosendaal, Netherlands. O'Leary was ordained on 8 July 1956. After earning a post-graduate degree from the University of Glasgow in 1960, he was posted to Pakistan.
O'Leary was assigned as a missionary in Rawalpindi, Pakistan. In 1962, while attending to a sick woman in an empty mud hut, O'Leary realized the need for a hospice care facility. In 1964, he opened the first hospice in Rawalpindi. After receiving advice from Mother Teresa, O'Leary obtained loans and donations to establish more facilities. O'Leary established several hospices in Peru, Colombia, Ecuador, Honduras and Guatemala. He also founded three facilities in England.
In 1973, O'Leary was the subject of the British television program This Is Your Life when he was surprised by Eamonn Andrews. He was awarded the 1974 Daniel Carrion Medal for his medical work in Peru. In 1996, O'Leary was awarded an MBE membership.
O'Leary died on 4 October 2000, at the age of 69.
The leader of England's Roman Catholics, Archbishop Vincent Nichols was a cousin of Father O'Leary, and is current president of the Jospice organisation.
References
External links
Jospice website
1931 births
2000 deaths
People from Crosby, Merseyside
20th-century English Roman Catholic priests
Members of the Order of the British Empire
English people of Irish descent
Clergy from Liverpool
British expatriates in Pakistan |
https://en.wikipedia.org/wiki/Aaron%20Bobick | Aaron F Bobick is dean of the McKelvey School of Engineering at Washington University in St. Louis.
Bobick’s research is in the field of artificial intelligence and computer vision. He has chaired and published papers in top-tier academic conferences in these areas. His research and expert opinions on technology have also been reported in major news sources.
Biography
Education
Bobick has received his undergraduate degrees in 1981 in Mathematics and Computer Science from the Massachusetts Institute of Technology. Following this, Bobick received his Ph.D. (1987), in Cognitive Science, also from MIT.
Research career
Upon receiving his Ph.D. from the Massachusetts Institute of Technology, Bobick worked at the MIT Media Lab as an assistant and associate professor until he left to accept a position as an associate professor at the Georgia Institute of Technology in the College of Computing. After arriving at Georgia Tech, Bobick served as the director of the GVU Center, a center focussed initially on graphics, visualization and usability in computer science, and in 2007 became the first chair of the new School of Interactive Computing.
Among Bobick’s accomplishments is KidsRoom, an immersive entertainment and learning environment that was a featured exhibit in the Millennium Dome. His expertise in using computer vision techniques to recognize people has received international attention in the popular press, including the BBC News and ABC News.
Research interests
Bobick's research lies generally in the fields of Artificial Intelligence (AI) and computer vision. However, his research has also included research in the area of ubiquitous computing with a particular focus on smart home environments and living laboratories.
See also
References
External links
Bobick's Academic Home Page
Computational Perception Lab
Living people
Georgia Tech faculty
American computer scientists
Year of birth missing (living people)
Massachusetts Institute of Technology alumni
Washington University in St. Louis faculty
Massachusetts Institute of Technology faculty |
https://en.wikipedia.org/wiki/Caging%20%28direct%20mail%29 | A caging list, in the direct mail industry, is a list or database of addresses that is updated after a mailing program is completed, with notations on responses and corrections for addresses whose mail has been returned as undeliverable or has been forwarded.
In third-party direct mail fundraising, a caging agent receives contributions, processes donor mail and "deposits all contributions to the client's account" according to Eberle Associates, a US direct mail and political fundraising firm.
The Association of Fundraising Professionals similarly defines caging as "the process or act of collecting donations by an entity other than the not-for-profit organization for which they were solicited."
Often, the processing of responses to direct mail is conducted by a third party hired to perform various services, which may include processing payments, compiling product orders, correcting recipient addresses, processing returned mail, providing lockbox services, and depositing funds and the associated data processing for each of these services. Caging is a shorthand term for the service bundle. The term may be a derivative of the financial teller cage since operations related to lockbox services involve the control and protection of funds.
The personal information gathered about respondents may be even more valuable than the donations received or purchases made. Mal Warwick Associates explains that "caging" allows an organization to exploit "information that can be gleaned" from a direct mail campaign: "Information from the caging process is often massaged and manipulated six ways from Sunday, all in hopes of finding a productive new mailing list, marginally improving a letter's results, or cutting its cost by a few pennies."
Direct Magazine adds that caging is also called "secure response management." The quality of response data and how the data might be used are directly proportional to pre-mail planning, which includes labor-saving devices like matched barcodes and other methods for "all digital workflow."
References
Direct marketing
Electronic mailing lists |
https://en.wikipedia.org/wiki/NNPDF | NNPDF is the acronym used to identify the parton distribution functions from the NNPDF Collaboration. NNPDF parton densities are
extracted from global fits to data based on a combination of a Monte Carlo method for uncertainty estimation and the use of
neural networks as basic interpolating functions.
Methodology
The NNPDF approach can be divided into four main steps:
The generation of a large sample of Monte Carlo replicas of the original experimental data, in a way that central values, errors and correlations are reproduced with enough accuracy.
The training (minimization of the ) of a set of PDFs parametrized by neural networks on each of the above MC replicas of the data. PDFs are parametrized at the initial evolution scale and then evolved to the experimental data scale by means of the DGLAP equations. Since the PDF parametrization is redundant, the minimization strategy is based in genetic algorithms as well as gradient descent based minimizers.
The neural network training is stopped dynamically before entering into the overlearning regime, that is, so that the PDFs learn the physical laws which underlie experimental data without fitting simultaneously statistical noise.
Once the training of the MC replicas has been completed, a set of statistical estimators can be applied to the set of PDFs, in order to assess the statistical consistency of the results. For example, the stability with respect PDF parametrization can be explicitly verified.
The set of PDF sets (trained neural networks) provides a representation of the underlying PDF probability density, from which any statistical estimator can be computed.
Example
The image below shows the gluon at small-x from the NNPDF1.0 analysis, available
through the LHAPDF interface
Releases
The NNPDF releases are summarised in the following table:
All PDF sets are available through the LHAPDF interface and in the NNPDF webpage.
External links
The NNPDF Collaboration homepage
Download NNPDF Parton Distribution sets
The NNPDF1.0 analysis
The NNPDF Non-Singlet analysis
NNPDF3.1 release
NNPDF latest fitting code
The LHAPDF interface
Computational particle physics
Physics software |
https://en.wikipedia.org/wiki/DXBL | DXBL (95.7 FM), broadcasting as Mellow Touch 95.7, is a radio station owned and operated by FBS Radio Network. The station's studio and transmitter are located at the 3rd Floor, TS Midpoint Hub, Corrales Ave., Cagayan de Oro.
The station was an affiliate of Brigada News FM from 2012 to September 2014.
References
FBS Radio Network
Radio stations in Cagayan de Oro
Adult contemporary radio stations in the Philippines
Radio stations established in 1992 |
https://en.wikipedia.org/wiki/Plot%20%28graphics%29 | A plot is a graphical technique for representing a data set, usually as a graph showing the relationship between two or more variables. The plot can be drawn by hand or by a computer. In the past, sometimes mechanical or electronic plotters were used. Graphs are a visual representation of the relationship between variables, which are very useful for humans who can then quickly derive an understanding which may not have come from lists of values. Given a scale or ruler, graphs can also be used to read off the value of an unknown variable plotted as a function of a known one, but this can also be done with data presented in tabular form. Graphs of functions are used in mathematics, sciences, engineering, technology, finance, and other areas.
Overview
Plots play an important role in statistics and data analysis. The procedures here can broadly be split into two parts: quantitative and graphical. Quantitative techniques are a set of statistical procedures that yield numeric or tabular output. Examples of quantitative techniques include:
hypothesis testing
analysis of variance
point estimates and confidence intervals
least squares regression
These and similar techniques are all valuable and are mainstream in terms of classical analysis. There are also many statistical tools generally referred to as graphical techniques. These include:
scatter plots
spectrum plots
histograms
probability plots
residual plots
box plots, and
block plots
Graphical procedures such as plots are a short path to gaining insight into a data set in terms of testing assumptions, model selection, model validation, estimator selection, relationship identification, factor effect determination, outlier detection. Statistical graphics give insight into aspects of the underlying structure of the data.
Graphs can also be used to solve some mathematical equations, typically by finding where two plots intersect.
Types of plots
Biplot : These are a type of graph used in statistics. A biplot allows information on both samples and variables of a data matrix to be displayed graphically. Samples are displayed as points while variables are displayed either as vectors, linear axes or nonlinear trajectories. In the case of categorical variables, category level points may be used to represent the levels of a categorical variable. A generalised biplot displays information on both continuous and categorical variables.
Bland–Altman plot : In analytical chemistry and biostatistics this plot is a method of data plotting used in analysing the agreement between two different assays. It is identical to a Tukey mean-difference plot, which is what it is still known as in other fields, but was popularised in medical statistics by Bland and Altman.
Bode plots are used in control theory.
Box plot : In descriptive statistics, a boxplot, also known as a box-and-whisker diagram or plot, is a convenient way of graphically depicting groups of numerical data through their five-number summaries |
https://en.wikipedia.org/wiki/M%C3%BCgeln%20railway%20network | The gauge Mügeln railway network (Mügelner Netz) was a network of narrow gauge lines in Saxony, eastern Germany, running between Oschatz, Döbeln, Neichen, Strehla and Lommatzsch, whose operational hub was at Mügeln. The routes were built primarily to reach the rural hill country of central Saxony. Mügeln station was once one of the largest narrow gauge railway stations in Europe.
Routes
Oschatz–Mügeln–Döbeln; *1884 (Mügeln–Döbeln closed in 1964/1968)
Mügeln–Nebitzschen–Neichen; 1888–1972 (Mügeln–Glossen still working)
Nebitzschen–Kemmlitz–Kroptewitz; 1903–1967 (Nebitzschen–Kemmlitz still working)
Oschatz–Strehla; 1891–1972
Meißen-Triebischtal–Lommatzsch; 1909–1966/72
Lommatzsch–Döbeln; 1911–1970
History
On 7 January 1885 the first section of the route between Mügeln and Oschatz was opened. In 1920 it was taken over by the Deutsche Reichsbahn.
The survival of the Kemmlitz–Mügeln–Oschatz line since 1975 is mainly thanks to the transportation of kaolin.
In November 1993 the Deutsche Reichsbahn transferred the remaining section of line to the newly founded private railway company, Döllnitzbahn. This had been formed in 1993 as the result of an initiative by the district of Torgau-Oschatz and the passenger association, Pro Bahn. The primary aim of the company was initially the preservation of the existing goods traffic from the kaolin mine in Kemmlitz. For that purpose, second-hand, narrow gauge, goods wagons were bought from the Mansfeld mining railway and a new transshipment site to the standard gauge railway network was built in Oschatz. With the help of used PKP diesel locomotives, they succeeded initially in keeping the goods traffic going. In spite of this, the demand gradually fell so that goods services had to be closed in 2001. The Döllnitzbahn was the last narrow gauge railway in Saxony to run public freight services.
Förderverein Wilder Robert
The Förderverein Wilder Robert ('Society for the Promotion of the 'Wild Robert') was founded in 1994 with the aim of preserving the historic sites and vehicles of the so-called Wilder Robert or 'Wild Robert' line. To begin with the society's sphere of activity was the running of special trips with the existing, operational vehicle fleet using, amongst others, the Saxon IV K steam locomotives, nos. 99 561, 99 574 and 99 584.
With the help of ABM and local firms, members of the society gradually began to restore the distinctive buildings along the narrow gauge railway. These included the Mügeln goods shed, the first-aid building, signal box I and the railway maintenance building. The society's biggest achievement was the rebuilding of the Nebitzschen–Glossen line with the assistance of the village of Sornzig-Ablass.
Progress has been made on the vehicle front too. The Saxon IV K, numbers 99 561 and 99 574 underwent their general inspections in 2001-2003 and 2006-2007 respectively. Even wagons were refurbished; the heavy luggage van 970-277 being completed in 2001. It was followed by the |
https://en.wikipedia.org/wiki/Geert%20Lovink | Geert Lovink (born 1959, Amsterdam) is the founding director of the Institute of Network Cultures, whose goals are to explore, document and feed the potential for socio-economical change of the new media field through events, publications and open dialogue. As theorist, activist and net critic, Lovink has made an effort in helping to shape the development of the web.
Since 2004 Lovink is a researcher at the Faculty of Digital Media and Creative Industries at the Hogeschool van Amsterdam (HvA) where he heads the Institute of Network Cultures. From 2007 till 2017 he was a Professor of Media Theory at the European Graduate School where he supervised five PhD students. From 2004-2013 he was an Associate Professor of New Media at the University of Amsterdam (UvA). In December 2021 he was appointed Professor of Art and Network Cultures at the UvA Art History Department. The Chair (one day a week) is supported by the HvA. Lovink earned his master's degree in political science at the University of Amsterdam, holds a PhD from the University of Melbourne and has been a postdoctoral fellow at the University of Queensland.
Activities
Since the early eighties, Lovink has been involved in a range of different projects and initiatives in the field of new media.
1983 Member of Adilkno
1989–94 Editor for the media art magazine Mediamatic
1993 Co-founder of the support campaign for independent media in South-East Europe Press Now
1994 Co-founder of the Amsterdam-based free community network Digital City (DDS)
1994 Co-founder of the internet workspace and content provider for the arts desk.nl.
1995 Co-founder (together with Pit Schultz) of the international nettime circle
1996–99 Public researcher at the Society for Old and New Media, De Waag
1996 Coordinating projects and teaching once a year at the IMI mediaschool in Osaka/Japan
2000 organizer of the Tulipomania Dotcom conference
2000–08 Consultant/editor to the exchange program of Waag Society and Sarai New Media Centre (Delhi)
2001 Co-founder of FibreCulture, a forum for Australian Internet research and culture
2002 Co-organizer of Dark Markets, on new media and democracy in times of crisis in Vienna
2003 Co-organizer of Uncertain States of Reportage in Delhi
2004 Co-organizer (together with Trebor Scholz) of the conference on the art of (online) collaboration Free Cooperation at SUNY Buffalo
On 31 May 2010 Geert Lovink took part in Quit Facebook Day and deleted his Facebook account.
In 2020 two text archives of Geert Lovink were preserved and transferred to the INC website: The Adilkno/Bilwet archive, once hosted by desk.nl (1990-1999): https://networkcultures.org/bilwet-archive/ and the text archive of geertlovink.org (2000-2010): https://networkcultures.org/geertlovink-archive/.
Theories
Geert Lovink was one of the key theorists behind the concept of tactical media – the use of media technologies as a tool for critical theory to become artistic practice. As an Internet activist, he descr |
https://en.wikipedia.org/wiki/GenICam | GenICam (abbreviated for Generic Interface for Cameras) is a generic programming interface for machine vision (industrial) cameras. The goal of the standard is to decouple industrial camera interfaces technology (such as GigE Vision, USB3 Vision, CoaXPress or Camera Link) from the user application programming interface (API). GenICam is administered by the European Machine Vision Association (EMVA). The work on the standard began in 2003 and the first module in GenICam, i.e., GenApi, was ratified in 2006 whereas the final module, i.e., GenTL was ratified in 2008.
Many companies in the machine vision industry have contributed to the standard. The main companies involved in drafting the GenICam standards are:
Adimec
Allied Vision Technologies
Basler AG
Baumer
DALSA
e2v semiconductors
Teledyne FLIR (formerly known as Point Grey Research Inc. which FLIR Systems Inc. acquired in 2016)
JAI A/S
Leutron Vision
MATRIX VISION
Matrox Imaging
MVTec Software
National Instruments
Pleora
Stemmer Imaging
Because many companies were involved in drafting the GenICam standard, and because of the potential benefits it seemed to offer, some camera manufacturers have already started to use GenICam in their products. However, many who helped develop the standard still use a proprietary SDK. For instance FLIR uses the Spinnaker SDK (https://www.ptgrey.com/spinnaker-sdk).
GenICam consists of three modules to help solving the main tasks in machine vision field in a generic way. These modules are:
GenApi: Using an XML description file, this is used to configure the camera and details how to access and control cameras;
Standard Feature Naming Convention (SFNC): This is the recommended names and types for common features in cameras to promote interoperability;
GenTL: This is the transport layer interface for enumerating cameras, grabbing images from the camera, and moving them to the user application.
GenICam provides support for five basic functions:
Configuring the camera—This function could support a range of camera features such as frame size, acquisition speed, pixel format, gain, image offset, etc.
Grabbing images—This function will create access channels between the camera and the user interface and initiates receiving images
Graphical user interface—This function enables user GUI interface to seamlessly talk to the camera(s)
Transmitting extra data—This function enables cameras to send extra data on top of the image data. Typical examples could be histogram information, time stamp, area of interest in the frame, etc.
Delivering events—This function enables cameras to talk to the application through an event channel.
External links
EMVA
GenICam Standard
References
Image sensor technology in computer vision |
https://en.wikipedia.org/wiki/Mini%20PC | A nettop (or miniature PC, Mini PC or Smart Micro PC) is a small-sized, inexpensive, low-power, legacy-free desktop computer designed for basic tasks such as web browsing, accessing web-based applications, document processing, and audio/video playback.
The word nettop is a portmanteau of network and desktop. It is the desktop counterpart of the netbook. Modern ( 2020) mini PCs or small form factor PCs can be much more powerful, being equipped with high-end laptop components or mid-range desktop components.
Compared with ordinary desktop computers, nettops are not only smaller and less expensive, but they also consume much less power. For example, CompuLab's fit-PC2 consumes no more than 8 watts of power whereas a typical desktop would easily consume more than 100 watts of power; consequently, nettops require significantly less cooling and may even be completely fanless. Some do not have an optical disk drive and use a solid state drive, making them completely silent. The tradeoff is that the hardware specifications and processing power are usually reduced and hence make nettops less appropriate for running complex or resource-intensive applications.
History
During the "first wave" of mini PC devices, which occurred in the mid to late 2000s, they were commonly referred to as "nettops". These included devices such as the Acer AspireRevo seen above, and were commonly considered to be a kind of "temporary substitute" PC of a lower cost for users needing a second PC or for use in developing countries. Another commonly held view at the time was their use as a stepping stone towards a thin-client–based always online computer that would "replace inefficient PCs".
Netbooks as predecessors
As demand for these devices quickly waned, the industry responded by addressing the chief complaint that these devices would be better as portable devices such as a new form of laptop. The result was the netbook, a device which was considered the true future of the nettop. However, prevailing attitudes and economic issues in 2008 onward made these popular due to their low cost and portability along with the then-expanding feature-set. In August 2009, reports from reviewers were that a netbook of the time and a traditional laptop of the same price were otherwise identical.
The direct lineage between netbooks and nettops meant that the concept of a "net-" prefix was considered a failed idea. Devices such as Chromebooks, tablet PCs, Ultrabooks and other devices responded by branding themselves as a different type of device such as ChromeOS being exclusively a pure web client or the proposal that the ultrabook succeeded by compensating for its lighter weight and otherwise equal-performance parts with a higher price tag, but in 2015, a revival of the concept came about from a likely unrelated source, a technological form of convergent evolution. Via the likely-observed success of the stick PC, the idea of combining a system on a chip with a single-board computer has |
https://en.wikipedia.org/wiki/RHE | RHE may refer to:
Reversible hydrogen electrode
Rachel Held Evans
Remote Hands & Eyes in a datacenter |
https://en.wikipedia.org/wiki/Snap%20%28computer%20graphics%29 | In computer graphics, snapping allows an object to be easily positioned in alignment with grid lines, guide lines or another object, by causing it to automatically jump to an exact position when the user drags it to the proximity of the desired location.
Some CAD software provides a "Snap" pull-down menu with diverse options as preferences for the practice of the operation.
In Windows, with the option snap enabled, vertical positioning of a window against the top edge of the screen causes it to change into full screen.
Computer graphics |
https://en.wikipedia.org/wiki/List%20of%20awards%20and%20nominations%20received%20by%20Kate%20Nash | Kate Nash is an English singer-songwriter from London, England. She debuted in 2005, uploading several demos to the social networking service Myspace. Nash released her debut single "Caroline's a Victim" through independent record label Moshi Moshi Records in February 2007. The release brought her to the attention of Fiction Records, which signed her two months later. She has released three studio albums: Made of Bricks (2007), My Best Friend Is You (2010) and Girl Talk (2013). Made of Bricks reached number one in the United Kingdom and was certified platinum by the British Phonographic Industry (BPI). My Best Friend Is You charted at number eight in the UK, while Girl Talk peaked at number eighty-five.
Nash's debut studio album earned her several recognitions, including the BRIT Award for British Female Solo Artist, the ASCAP Vanguard Award and the Q Award for Breakthrough Artist. The album's lead single, "Foundations", received three nominations and won a UK Music Video Award for Best Pop Video. She has also been recognized by the Elle Style Awards, the NME Awards and the Vodafone Live Music Awards. As of 2013, Nash has received eight awards from fifteen nominations.
ASCAP Awards
The annual ASCAP Awards honor members of the UK performance rights organization PRS, who are licensed by the American Society of Composers, Authors and Publishers (ASCAP) in the United States. Nash has received one award from one nomination.
BRIT Awards
The BRIT Awards are the British Phonographic Industry's (BPI) annual pop music awards. Nash has received one award from three nominations.
Elle Style Awards
The Elle Style Awards are hosted annually by lifestyle magazine Elle. Nash has received one award from one nomination.
Ivor Novello Awards
The Ivor Novello Awards, named after the Cardiff-born entertainer Ivor Novello, are awards for songwriting and composing. Nash has received one award from one nomination.
NME Awards
The NME Awards are an annual music awards show founded by the music magazine NME. Nash has received two awards from three nominations.
NME Awards USA
Q Awards
The Q Awards are the UK's annual pop music awards run by the music magazine Q to honor musical excellence. Winners are voted by readers of Q. Nash has received one award from one nomination.
UK Music Video Awards
The UK Music Video Awards recognize "creativity and technical excellence" in music videos made within the United Kingdom. Nash has received one award from one nomination.
Vodafone Live Music Awards
The Vodafone Live Music Awards honor the best live performers in the UK. Nash has received one award from two nominations.
References
External links
Nash, Kate
Nash, Kate |
https://en.wikipedia.org/wiki/Trading%20strategy%20index | Strategy indices are indices that track the performance of an algorithmic trading strategy. The algorithm clearly and transparently specifies all the actions that must be taken.
The following are examples of algorithms that strategies can be based on.
Pairs trading strategy. This strategy examines pairs of instruments that are known to be statistically correlated. For example, consider Shell and Exxon. Both are oil stocks and are likely to move together. Knowledge of this trend creates an opportunity for profit, as on the occasions when these stocks break correlation for an instant, the trader may buy one and short sell the other at a premium.
Fed funds curve strategy This strategy takes a view on the shape of the curve based on the actions of the Fed. In this strategy, one puts on a steepener or flattener, based on whether the Federal Reserve has cut the benchmark rate or raised it. This is based on the conventional wisdom that the curve steepens when the rate is expected to be cut, and vice versa.
Implied volatility against realized volatility . In a number of markets such as commodities and rates, the implied volatility, as implied by straddle prices is higher than the realized volatility of the underlying forward. One way to 'exploit' this is to sell a short expiry (e.g. 1 month) straddle and delta-hedging it until it is alive. The strategy makes money if at expiry, the sum of the premium received (and accrued at money market), the (negative) final value of the straddle and the (positive/negative) value of the forwards (entered into to delta-hedge the straddle) is greater than zero. A variation of this, and more common solution in equity, is to sell either a one-month or three-month variance swap – usually on the Eurostoxx 50E or S&P500 index – that pays a positive performance if the implied volatility (strike of the swap) is above the realised volatility at expiry; in this case there is no need to delta-hedging the underlying movements.
Selling strategy indices
These indices have been sold under the following premises, which need not be always true,
They offer a new asset class that is uncorrelated to conventional asset classes such as equities, bonds and commodities.
Compared to hedge funds and mutual funds, these strategies are very transparent and the client can buy them only if they like the idea behind the strategy.
Some types of strategies also benefit from accounting reasons, for instance, in Germany, Notes linked to interest rates can be issued in the "Schuldschein"-format. This enables interest rate linked strategies to be issued as "Schuldschein".
Trades that can be structured on these indices
Asset Side: These trades are usually structured for institutional clients looking to invest their money in a different asset class. A typical trade would involve leveraged returns on an index with a floor on the performance.
Liability Side: These trades are aimed at corporate clients, such as midsize companies and banks looking for way |
https://en.wikipedia.org/wiki/Grand%20Central%20Station%20%28radio%20series%29 | Grand Central Station was an American anthology radio series that had a long run on the major networks from 1937 to 1954. Produced by Himan Brown, Martin Horrell and others, the story content ranged from romantic comedies to lightweight dramas. The program debuted on September 28, 1937, on NBC.
Each program opened with an announcer intoning that Grand Central was "the crossroads of a million private lives, a gigantic stage on which are played a thousand dramas daily." Actors included Jim Ameche and Hume Cronyn. The announcers were George Baxter, Ken Roberts and Tom Shirley. The programs were narrated by Jack Arthur, Stuart Metz and Alexander Scourby. When some listeners noted that steam engines, the sounds of which were heard during the broadcasts, no longer frequented the terminal, Brown responded: "You have your own Grand Central Station."
In 1952 a half-hour television pilot was created but was not picked up. The episode starred Mercedes McCambridge, with supporting roles by Kirby Grant and Parley Baer. It was produced by Don W. Sharpe, who copyrighted the film. It began with a montage of trains chugging into Manhattan and the same words that had opened the radio program.
The show's title was factually erroneous; Grand Central is actually a terminal, not a station. Brown claimed that the New York Central Railroad would not allow him to use the actual name.
References
American radio dramas
1930s American radio programs
1940s American radio programs
1950s American radio programs
NBC Blue Network radio programs
NBC radio programs
CBS Radio programs
ABC radio programs
Anthology radio series |
https://en.wikipedia.org/wiki/Communications%20Data%20Bill%202008 | The Communications Data Bill was intended to create powers to collect data concerning people's phone, e-mail and web-browsing habits for mass surveillance in the United Kingdom. The government database would have included telephone numbers dialed, the websites visited and addresses to which e-mails are sent but not the text of e-mails or recorded telephone conversations.
Since October 2007 telecommunication companies have been required to keep records of phone calls and text messages for twelve months. The bill would have extended the coverage to Internet website visited, email messages, and VOIP data.
Chris Huhne, Liberal Democrat Home affairs spokesman said at the time: "The government's Orwellian plans for a vast database of our private communications are deeply worrying."
The plans were not completed during the Labour administration, but intentions to gain access to more communications data lived on under the coalition elected in 2010 as the Communications Capabilities Development Programme run by the Home Office's Office for Security and Counter-Terrorism. In 2012, a new Draft Communications Data Bill was published.
See also
Interception Modernisation Programme
Mass surveillance in the United Kingdom
References
Surveillance
Government databases in the United Kingdom
Law enforcement techniques
Counterterrorism in the United Kingdom
Mass surveillance
National security policies
Proposed laws of the United Kingdom
Surveillance databases
2008 in British law
Home Office (United Kingdom)
GCHQ |
https://en.wikipedia.org/wiki/Aeronautical%20Telecommunication%20Network | The Aeronautical Telecommunication Network (ATN) is an internetwork architecture that allows ground/ground, air/ground, and avionic data subnetworks to interoperate by adopting common interface services and protocols based on the ISO OSI Reference Model.
The European part of ATN used for ground/ground communications is represented by PENS.
See also
Aircraft Communications Addressing and Reporting System (ACARS)
DO-219
DO-232
Future Air Navigation System (FANS)
References
Aircraft instruments
Avionics
Air traffic control |
https://en.wikipedia.org/wiki/Ron%20Kuivila | Ron Kuivila (born December 19, 1955) is an American sound artist from Boston, MA. He is primarily known for his sound installations, performances, and recorded materials that make use of computers, and for his contributions to the SuperCollider audio programming language.
Biography
Kuivila studied under Alvin Lucier at Wesleyan University and graduated with a B.A. in Music and a B.A. in Mathematics in 1977. He went on to receive his MFA from Mills College, studying under Robert Ashley and David Behrman. Kuivila released sound pieces as part of the Tellus Audio Cassette Magazine compilations as well as through Sonic Arts and Lovely Music. In the 1990s Kuivila and David P. Anderson were responsible for creating the software language Formula, which has been used by David Behrman. He currently teaches classes in Experimental Music, Computers in Music, and Studio Recording at Wesleyan University, where he served as the chair of the music department. Kuivila received a 2008 Foundation for Contemporary Arts Grants to Artists Award. In May 2011, he was named University Professor of Music. He currently works with the open-source software SuperCollider.
His works have been installed at the DeCordova Museum, Diapason Gallery, the San Francisco Art Institute, the Los Angeles Institute of Contemporary Art, Media Study/Buffalo, 80 Langton Street, and MoMA PS1. He has performed at The Kitchen, MoMA PS1, PASS, The Experimental Intermedia Foundation, and Bilhaud Gallery.
Discography
Linear Predictive Zoo on Tellus #22 False Phenomes, 1988
Blurred Genres, Slowscan, Vol. 6, 1986
Cannon Y for C.N. on Tellus #9, 1985
Parodicals on Tellus #9, 1985
Fidelity, Lovely Music, Ltd. LP 1722, 1985
TI Intends... (to enforce its intellectual property rights to the fullest extent permitted by law) on Tellus #2, 1984
Going Out with Slow Smoke, Lovely Music, Ltd. LP 1701, 1982
References
External links
soundartarchive.net
discogs.com
Short Biography on framework.v2.nl and v2.nl
Ron Kuivila @ Lovely Records
decordova.org
diapasongallery.org
foundationforcontemporaryarts.org
1955 births
Living people
American male classical composers
American classical composers
American writers about music
Experimental composers
Wesleyan University alumni
Wesleyan University faculty
American sound artists
20th-century American composers
20th-century American male musicians |
https://en.wikipedia.org/wiki/Adaptive%20switching | An adaptive switch is a network switch designed to normally operate in cut-through mode but if a port's error rate jumps too high, the switch automatically reconfigures the port to run in store-and-forward mode. This optimizes the switch's performance by providing higher speed cut-through switching if error rates are low but higher throughput store-and-forward switching when error rates are high.
Adaptive switching is typically done on a port-by-port basis.
References
Networking hardware |
https://en.wikipedia.org/wiki/Belene%20labour%20camp | The Belene labour camp, also referred to as Belene concentration camp, was part of the network of forced labour camps in Communist Bulgaria. It was located on the Belene Island, between two branches of the Danube river. At the height of Valko Chervenkov's repressions in 1952, the camp had 2,323 inmates - 2,248 men and 75 women.
The Belene Prison is still operating as a penitentiary in the western part of the island, while the eastern part is a managed natural reserve.
This camp operated officially from 1949 to 1959, though a break in deportations to Belene occurred from 1954 to 1956. Between 1985 and 1989 Turks in Bulgaria who resisted the policy of changing Turkish names and surnames to Bulgarian ones, (see Assimilation Campaign in Bulgaria) were imprisoned in the prison on Belene. During those years, the Turkish Radio and Television Corporation broadcast a series named "Belene Adası" (Belene Island) on the policies of the Bulgarian government against Bulgarian Turks.
From 1949 onward, Evangelical Christian pastors in particular were targeted as "enemies of the State" and sent to Belene. In 1949, the infamous "Pastors' Trial" was conducted, trying 13 Protestant pastors as "spies". The men received sentences of varying lengths. Haralan Popov, who survived and later founded the mission "Door of Hope International" to bring Bibles behind the Iron Curtain, published his autobiography under the Bulgarian title "The Bulgarian Golgotha". It was later released in English as "Tortured for His Faith".
The camp and some its survivors were the subject of a documentary film by German TV program ZDF Vorwärts aber nie vergessen - Ballade über bulgarische Helden "Moving on, but Never Forgetting - A Ballad of Bulgarian Heroes" directed and authored by Ilija Trojanow.
Notable inmates
Haralan Popov (1949-1962)
Konstantin Muraviev (1956-1961)
Lea Ivanova (Late 70s)
Stoyko Kavrukov (Kavrukov and Perinchev-only successful escape-1953) Belene-The Island of the Forgotten by Nedyalko Geshev, published in Belgium - 1983
Atanas Perinchev (Kavrukov and Perinchev-only successful escape-1953) Belene-The Island of the Forgotten by Nedyalko Geshev, published in Belgium - 1983
In popular culture
David, from I Am David escapes from Belene in 1952. However the camp shown in the film doesn't resemble the real Belene camp, as it is located inland in a mountainous area rather than on a river island.
References
Belene
Political repression
Unfree labour by country
Buildings and structures in Pleven Province
People's Republic of Bulgaria
Persecution of Balkan Turks |
https://en.wikipedia.org/wiki/Variable%20shadowing | In computer programming, variable shadowing occurs when a variable declared within a certain scope (decision block, method, or inner class) has the same name as a variable declared in an outer scope. At the level of identifiers (names, rather than variables), this is known as name masking. This outer variable is said to be shadowed by the inner variable, while the inner identifier is said to mask the outer identifier. This can lead to confusion, as it may be unclear which variable subsequent uses of the shadowed variable name refer to, which depends on the name resolution rules of the language.
One of the first languages to introduce variable shadowing was ALGOL, which first introduced blocks to establish scopes. It was also permitted by many of the derivative programming languages including C, C++ and Java.
The C# language breaks this tradition, allowing variable shadowing between an inner and an outer class, and between a method and its containing class, but not between an if-block and its containing method, or between case statements in a switch block.
Some languages allow variable shadowing in more cases than others. For example Kotlin allows an inner variable in a function to shadow a passed argument and a variable in an inner block to shadow another in an outer block, while Java does not allow these. Both languages allow a passed argument to a function/Method to shadow a Class Field.
Some languages disallow variable shadowing completely such as CoffeeScript.
Example
Lua
The following Lua code provides an example of variable shadowing, in multiple blocks.
v = 1 -- a global variable
do
local v = v + 1 -- a new local that shadows global v
print(v) -- prints 2
do
local v = v * 2 -- another local that shadows outer local v
print(v) -- prints 4
end
print(v) -- prints 2
end
print(v) -- prints 1
Python
The following Python code provides another example of variable shadowing:
x = 0
def outer():
x = 1
def inner():
x = 2
print("inner:", x)
inner()
print("outer:", x)
outer()
print("global:", x)
# prints
# inner: 2
# outer: 1
# global: 0
As there is no variable declaration but only variable assignment in Python, the keyword nonlocal introduced in Python 3 is used to avoid variable shadowing and assign to non-local variables:
x = 0
def outer():
x = 1
def inner():
nonlocal x
x = 2
print("inner:", x)
inner()
print("outer:", x)
outer()
print("global:", x)
# prints
# inner: 2
# outer: 2
# global: 0
The keyword global is used to avoid variable shadowing and assign to global variables:
x = 0
def outer():
x = 1
def inner():
global x
x = 2
print("inner:", x)
inner()
print("outer:", x)
outer()
print("global:", x)
# prints
# inner: 2
# outer: 1
# global: 2
Rust
fn main() {
let x = 0;
{
// Shadow
let x = 1;
println!("Inner x: {}", x); // prints 1
}
println |
https://en.wikipedia.org/wiki/Circumpolar%20Health%20Bibliographic%20Database | The Circumpolar Health Bibliographic Database (CHBD) is a free electronic database of abstracts, citations, geographic and subject indexing, library codes and their links to full text publications, both peer-reviewed and gray literature. Established in 2007, it contains more than sixty five hundred records that describe human health in the circumpolar region. The CHBD is a circumpolar chronic disease prevention project of the Canadian Institutes of Health Research. It is maintained by the University of Calgary in Calgary, Alberta, Canada.
The CHBD was initially constructed with records from the Arctic Institute of North America's database. These were mainly northern Canadian records. It is expected to take several years to add non-Canadian records to the CHBD. The Circumpolar Health Observatory, proposed in May 2008 in Norway, would disseminate its data through the CHBD.
Funding for the database increased by 50% for the period of 2008-2009.
See also
International Journal of Circumpolar Health
List of academic databases and search engines
References
External links
Official website
Arctic research
Bibliographic databases and indexes
Internet properties established in 2007
University of Calgary
Medical databases
Databases in Canada |
https://en.wikipedia.org/wiki/KJTV%20%28AM%29 | KJTV (950 AM, "100.7 The Score") is a Lubbock, Texas, radio station broadcasting with a daytime power of 5,000 watts. Programming includes both local and nationally syndicated sports talk shows. It is owned by Ramar Communications Inc., co-owned with several sister radio stations. Its studios are located at 98th and University in south Lubbock, and its transmitter is in Mackenzie Park east of downtown.
History
KJTV (as KSEL 950 1,000 watts day, 500 watts night) was the second radio station established in Lubbock, signing on in 1947. KCBD 1590 was third in 1949 and KFYO was the first, established in Lubbock in 1932.
In 2010, Ramar Communications purchased FM translator K264AN (100.7 FM) and began simulcasting Fox Talk 950, as permitted under new FCC rules passed in 2009.
On July 1, 2013 KJTV was re-branded as "AM 950/100.7 FM Lubbock's News, Talk, Sports". News/Talk and Ag programming air seven days a week from Midnight-3p, with NBC Sports Radio and sports play-by-play airing from 3p-Midnight, seven days a week.
On August 7, 2017 KJTV flipped formats from news/talk/sports to all-sports, debuting the branding of "100.7 The Score". Programming includes local shows from Double T 97.3 hosts and national shows from a variety of networks including ESPN Radio, NBC Sports Radio and Sports Byline USA.
FM Translator
KJTV (AM) uses the FM translator frequency as the main frequency in the logo; the translator is used to widen the broadcast area and to give listeners the ability to listen to the station on FM with better quality sound.
External links
Ramar Communications Website
JTV (AM)
Sports radio stations in the United States
Radio stations established in 1947
1947 establishments in Texas
ESPN Radio stations |
https://en.wikipedia.org/wiki/Space%20vector%20modulation | Space vector modulation (SVM) is an algorithm for the control of pulse-width modulation (PWM). It is used for the creation of alternating current (AC) waveforms; most commonly to drive 3 phase AC powered motors at varying speeds from DC using multiple class-D amplifiers. There are variations of SVM that result in different quality and computational requirements. One active area of development is in the reduction of total harmonic distortion (THD) created by the rapid switching inherent to these algorithms.
Principle
A three-phase inverter as shown to the right converts a DC supply, via a series of switches, to three output legs which could be connected to a three-phase motor.
The switches must be controlled so that at no time are both switches in the same leg turned on or else the DC supply would be shorted. This requirement may be met by the complementary operation of the switches within a leg. i.e. if A+ is on then A− is off and vice versa. This leads to eight possible switching vectors for the inverter, V0 through V7 with six active switching vectors and two zero vectors.
Note that looking down the columns for the active switching vectors V1-6, the output voltages vary as a pulsed sinusoid, with each leg offset by 120 degrees of phase angle.
To implement space vector modulation, a reference signal Vref is sampled with a frequency fs (Ts = 1/fs). The reference signal may be generated from three separate phase references using the transform. The reference vector is then synthesized using a combination of the two adjacent active switching vectors and one or both of the zero vectors. Various strategies of selecting the order of the vectors and which zero vector(s) to use exist. Strategy selection will affect the harmonic content and the .
More complicated SVM strategies for the unbalanced operation of four-leg three-phase inverters do exist. In these strategies the switching vectors define a 3D shape (a hexagonal prism in coordinates or a dodecahedron in abc coordinates) rather than a 2D hexagon. General SVM techniques are also available for converters with any number of legs and levels.
See also
αβγ transform
Inverter (electrical)
pulse-width modulation
References
Electrical engineering
Control theory |
https://en.wikipedia.org/wiki/Melbourne%20Palestine%20Solidarity%20Network | The Melbourne Palestine Solidarity Network (MPSN) are a grouping of individuals, community groups and activists based in Melbourne, Australia. They oppose what they see as Israeli aggression towards not just Palestinians but neighboring countries such as Lebanon. MPSN is known for organising demonstrations and campaigns against Israel and its supporters.
References
External links
Melbourne Palestine Solidarity Network website
Non-governmental organizations involved in the Israeli–Palestinian peace process
Palestinian solidarity movement |
https://en.wikipedia.org/wiki/System%20area%20code | In air traffic control, the system area code (SAC) is part of a unique identifier assigned to each system which uses the ASTERIX format. The Eurocontrol SuRveillance Data Exchange Task Force (RDE-TF) maintains these identifiers internationally and assigns them to regions such as countries, though sometimes more than one code is assigned within the same country, for example to distinguish between civilian and military uses.
Within each country, it is the responsibility of the relevant air navigation service provider to allocate a system identification code (SIC); up to 256 of them for each SAC.
In the Asterix protocol the SAC/SIC identifies the actual sensor from where the radar information is sent.
The information being e.g. plot and track.
References
External links
SAC List (worldwide)
Air traffic control |
https://en.wikipedia.org/wiki/JAD%20%28software%29 | Jad (Java Decompiler) is, , an unmaintained decompiler for the Java programming language.
Jad provides a command-line user interface to extract source code from class files.
See also
Java Decompiler
Mocha
References
External links
JAD Softpedia Mirror
Java decompilers
Disassemblers
Software obfuscation |
https://en.wikipedia.org/wiki/Matthias%20Finger | Matthias Finger (born in 1955) is Swiss and French political and educational scientist. He was a professor of management of network industries at EPFL (École Polytechnique Fédérale de Lausanne).
Career
He received his Ph.D. in education in 1986 and his Ph.D. in political science in 1988, both from the University of Geneva. After having been Assistant Professor at Syracuse University, New York (1989-1991) and Associate Professor at Columbia University, New York (1992-1994), Matthias Finger was appointed Full Professor at the Swiss Graduate School of Public Administration (IDHEAP) in Lausanne in 1995. This is where he developed his research on the transformation of the network industries in the postal, the telecommunications, the railways, the electricity, the air transport, and the water sectors.
Matthias Finger was appointed Full Professor at the Swiss Federal Institute of Technology in October 2002 and Dean of Continuing Education in May 2003. Prof. Finger was the Academic Program Director of Executive Master in e-Governance and the Dean, School of Continuing Education in College of Management of Technology in EPFL. In July 2020, he retired from his functions at EPFL.
Research
In his research, he reconciles the liberalization of these sectors with public service objectives by means of new regulatory arrangements, while at the same time promoting a more entrepreneurial behavior of the operators.
Selected works
References
External links
Archive website of the MIR Laboratory
1955 births
Living people
University of Geneva alumni |
https://en.wikipedia.org/wiki/European%20route%20E3 | European route E3 is a series of roads in France, part of the United Nations International E-road network. It runs from Cherbourg to La Rochelle.
Route
The road is long, and travels along the French routes nationales. From Cherbourg to Carentan, it travels along the Route nationale 13. At Carentan, it changes to the Route nationale 174. It then moves onto the autoroute, mainly the A84 (which it joins at Junction 40) until it reaches Saint-Lô at Junction 16. It then rejoins the RN, mainly Route nationale 136 at Rennes before finally travelling along the Route nationale 137 to its final destination of La Rochelle. It also comes close to the outskirts of Nantes.
Historical trajectory
The original trajectory of the E3 ran from Lisbon, Portugal to Stockholm, Sweden, and later to Helsinki, Finland. It was a series of existing secondary roads and highways, officially bundled under the name E3 by European decree on 16 September 1950. In 1975 the numbering system of European roads changed drastically. The name E3 was applied to the part from Cherbourg-La Rochelle to Carentan, which was part of the original E3. The name of the historical trajectory lives on in E3 Harelbeke, a cycling race in Belgium.
The route of the old trajectory:
– Lisbon – Salamanca – Valladolid – Burgos – Vitoria-Gasteiz – San Sebastián
– San Sebastián – Irún – Biarritz – Bayonne – Bordeaux
– Bordeaux – Poitiers – Tours – Orléans – Paris
– Paris – Arras
– Arras – Lille – Kortrijk – Ghent – Antwerp
– Antwerp – Turnhout – Eindhoven – Venlo – Duisburg
– Duisburg – Osnabrück – Bremen
– Bremen – Hamburg
– Hamburg – Flensburg – Frøslev – Kolding – Vejle – Aarhus – Aalborg – Frederikshavn – ... – Gothenburg
– Gothenburg – Stockholm
– Stockholm – Turku – Helsinki
Detailed route
References
External links
UN Economic Commission for Europe: Overall Map of E-road Network (2007)
E0003
03 |
https://en.wikipedia.org/wiki/Russell%20A.%20Brown | Russell A. Brown, an American physician and computer scientist, is the inventor of the N-localizer technology that enables guidance of stereotactic surgery or radiosurgery using medical images that are obtained via computed tomography (CT), magnetic resonance imaging (MRI), or positron emission tomography (PET).
Brown invented the N-localizer in 1978 when he was a medical student investigating image-guided surgery in the laboratory of his mentor, James A. Nelson, at the University of Utah. A few months later, Brown designed and built the first CT-compatible stereotactic frame in order to test the concept of the N-localizer.
Brown also made contributions to the k-d tree and to the generalized Born model of implicit solvation.
References
Living people
21st-century American physicians
American computer scientists
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/Chaldean%20Mafia | The Chaldean mafia is a criminal organization composed of Chaldean Catholics that have operated narcotics distribution networks from Phoenix and San Diego to Detroit. Involved in violent crimes such as armed robbery, arson, assault, homicide, and kidnapping.
Police investigations
The work of the Detroit Metropolitan Violent Crime Task Force—with representatives from the FBI, the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF); the Drug Enforcement Administration (DEA), the Detroit Police Department, the Michigan State Police Department, and the Wayne County Sheriff's Office—resulted in the conviction of 111 subjects and the seizure of $5.3 million, 6.5 tons of marijuana, 25 kilograms of cocaine, five pounds of crystal methamphetamine, and 78 firearms.
In 2011 "Operation Shadowbox", a joint investigation between El Cajon, California police and the U.S. Drug Enforcement Administration into the trafficking of narcotics, firearms and explosives, allowed for the seizure of more than 13 pounds of methamphetamine; more than 5 pounds of ecstasy, pharmaceuticals, crack cocaine, heroin and cocaine; and more than 3,500 pounds of marijuana, most of which was likely smuggled through mastermind Furat Kalasho of Sterling Heights partnered with the Sinaloa Federation. Investigators also seized more than $630,000 in cash, three luxury cars, 34 firearms and four improvised explosive devices.
Operation Shadowbox
"Operation Shadowbox" was a joint investigation between El Cajon Police and the U.S. Drug Enforcement Administration. On August 18, 2011 sixty Chaldeans were arrested at a Chaldean Social Club in El Cajon, near San Diego. This operation targeted mastermind Furat Kalasho of Sterling Heights, MI. SWAT teams served search warrants on the club late Wednesday night, seizing more than $160,000 in cash as well as evidence of illegal gambling.
See also
Crime in Detroit, Michigan
References
George Knox, 2008, The Chaldean Mafia: A Preliminary Gang Threat, http://ngcrc.com./ngcrc/chaldprof.htm, National Gang Crime Research
Louis Akrawi,
Detroit Free Press (Harry Kalasho murder), 2010,
Court of Appeals Document (Ray Akrawi), 2010, http://cases.justia.com/us-court-of-appeals/F2/951/350/257887/
Court of Appeals Document (Louis Akrawi), 2010,
Sign On San Diego, "60 Arrested", 2011, http://www.signonsandiego.com/news/2011/aug/18/60-arrested-el-cajon-chaldean-organized-crime-case/
Citations
Mafia
Assyrian gangs
Organized crime by ethnic or national origin
Iraqi-American history
Assyrian-American organizations
Organized crime groups in the United States
Gangs in Detroit |
https://en.wikipedia.org/wiki/Nonzero-rule | In two-dimensional computer graphics, the non-zero winding rule is a means of determining whether a given point falls within an enclosed curve. Unlike the similar even-odd rule, it relies on knowing the direction of stroke for each part of the curve.
For a given curve C and a given point P: construct a ray (a straight line) heading out from P in any direction towards infinity. Find all the intersections of C with this ray. Score up the winding number as follows: for every clockwise intersection (the curve passing through the ray from left to right, as viewed from P) subtract 1; for every counter-clockwise intersection (curve passing from right to left, as viewed from P) add 1. If the total winding number is zero, P is outside C; otherwise, it is inside.
The winding number is effectively a count of how many full counter-clockwise revolutions ('windings') the curve makes around P without doubling back on itself. (If P were a nail and C were a looped piece of string, try pulling some part of the string sideways away from the nail: it will either come free, or it will be found to be wound some number of times around the nail.)
Some implementations instead score up the number of clockwise revolutions, so that clockwise crossings are awarded +1, counter-clockwise crossings -1. The result is the same.
One formal definition of the winding number of point P with respect to curve C (where P does not lie on the curve) is as follows:
The SVG computer graphics vector standard uses the non-zero rule by default when drawing polygons.
See also
Even-odd rule
Complex polygon
Tessellation
Polygon triangulation
TrueType
References
External links
Definition of fill rules in SVG
Song Ho's explanation of the OpenGL GLU tesselator
Computer graphics algorithms |
https://en.wikipedia.org/wiki/Broadcast%20Exchange%20Format | Broadcast Exchange Format (BXF) is an SMPTE standard for data exchange in the broadcasting industry.
History
BXF was developed to replace various archaic types of exchange for playlists, record lists and other data in broadcasting. Version 1.0 (SMPTE standard 2021) was published in 2008. Over 150 SMPTE members have been involved in defining the standard. BXF is XML based.
See also
AAF, Advanced Authoring Format
BWF, broadcast Wave Format
MXF, Material eXchange Format
References
External links
SMPTE standards
Standards of the United States
Computer file formats
Film and video technology |
https://en.wikipedia.org/wiki/BXF | BXF or bxf may refer to:
Broadcast Exchange Format, an SMPTE standard for data exchange in the broadcasting industry
BXF, the South Eastern Railway station code for Barsuan railway station, Odisha, India
bxf, the ISO 639-3 code for Bilur language, Papua New Guinea |
https://en.wikipedia.org/wiki/Einstein%20Medical%20Center%20Philadelphia | The Einstein Medical Center Philadelphia is a non-profit hospital located in North Philadelphia, Pennsylvania. The hospital is a part of the Einstein Healthcare Network. The medical center offers residency and fellowship training programs in many specialized areas. It also includes a Level I Regional Resource Trauma Center and a Level III Neonatal Intensive Care Unit. Einstein Medical Center Philadelphia is the largest independent teaching hospital in the Philadelphia region with over 30 accredited programs training over 3,500 students each year with 400 residents.
History
Founded as the Jewish Hospital for the Aged, Infirmed and Destitute (Jewish Hospital for short) in August 1864, this hospital was an important institution in the history of the Jews in Philadelphia, providing care for "the suffering poor of all religions". It officially opened in 1866, starting with 22 beds at 56th and Haverford Road in West Philadelphia. The hospital expanded, moving to Old York Road in 1873, and opening various homes and clinics. By the 20th century, Jewish-sponsored hospitals such as the Jewish Hospital became havens for Jewish doctors who could not admit their patients to other hospitals because of anti-Semitism.
In 1951, the hospital was named for Albert Einstein after the volunteer president of Mount Sinai wrote a letter asking Einstein for permission to use his name. Einstein granted his permission. In 1952, the Jewish Hospital merged with Northern Liberties Hospital and Mount Sinai Hospital to form a single medical center.
Einstein Medical Center discouraged nurses from joining unions. From 2014 to 2017 the hospital spent "$1.1 million on union avoidance". Nurses voted to unionize with the PASNAP in 2016.
Synagogue
The Henry S. Frank Memorial Synagogue, on the hospital grounds, is listed on the National Register of Historic Places. It is a copy of the ancient synagogue at Kfar Bar'am, Israel.
References
External links
Einstein Medical Center locations
Map of Einstein's Main Campus
Hospital buildings completed in 1866
Hospital buildings completed in 1873
Hospitals in Philadelphia
1864 establishments in Pennsylvania
Jewish medical organizations
Hospitals established in 1864
Hospitals established in 1866
Trauma centers |
https://en.wikipedia.org/wiki/Charlie%20Miller%20%28security%20researcher%29 | Charles Alfred Miller is an American computer security researcher with Cruise Automation. Prior to his current employment, he spent five years working for the National Security Agency and has worked for Uber.
Education
Miller holds a bachelor's degree in mathematics with a minor in philosophy from the then called Northeast Missouri State, and a Ph.D. in mathematics from the University of Notre Dame in 2000. He lives in Wildwood, Missouri.
Security research
Miller was a lead analyst at Independent Security Evaluators, a computer protection consultancy. He has publicly demonstrated many security exploits of Apple products. In 2008, he won a $10,000 cash prize at the hacker conference Pwn2Own in Vancouver, British Columbia, Canada for being the first to find a critical bug in the MacBook Air. In 2009, he won $5,000 for cracking Apple's Safari browser. Also in 2009, he and Collin Mulliner demonstrated an SMS processing vulnerability that allowed for complete compromise of the Apple iPhone and denial-of-service attacks on other phones. In 2011, he found a security hole in the iPhone and iPad, whereby an application can contact a remote computer to download new unapproved software that can execute any command that could steal personal data or otherwise using iOS applications functions for malicious purposes. As a proof of concept, Miller created an application called Instastock that was approved by Apple's App Store. He then informed Apple about the security hole, who promptly expelled him from the App Store.
Miller participated in research on discovering security vulnerabilities in NFC (Near Field Communication).
Miller, along with Chris Valasek, is known for remotely hacking a 2014 Jeep Cherokee and controlling the braking, steering, and acceleration of the vehicle.
Publications
iOS Hacker Handbook
The Mac Hacker's Handbook
Fuzzing for Software Security Testing and Quality Assurance
Battery firmware hacking: inside the innards of a smart battery
References
External links
Living people
University of Notre Dame alumni
Computer security specialists
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/Feminist%20Approaches%20to%20Bioethics | Feminist Approaches to Bioethics (International Network on Feminist Approaches to Bioethics), or FAB, is a network of feminists in bioethics, adding feminist perspectives to ethical issues in health care and the biosciences. It publishes a journal, IJFAB: International Journal of Feminist Approaches to Bioethics, and is affiliated with the International Association of Bioethics, with which it meets.
History
FAB was formed in 1992 at the inaugural meeting of the IAB. Its aims are to create a more inclusive bioethical theory from the viewpoint of disadvantaged groups such as women. It critiques bioethical theory that privileges groups with power.
As IJFAB editor Mary C. Rawlinson writes of the general state of bioethics in the introduction to the journal's inaugural issue,
Co-founding member Anne Donchin writes this on the occasion of FAB's 20th anniversary:
See also
Bioethics
IJFAB: International Journal of Feminist Approaches to Bioethics
External links
FABnet.org
Free IJFAB articles online
IJFAB Blog
IJFAB: International Journal of Feminist Approaches to Bioethics
Section entry in the Stanford Encyclopedia of Philosophy
References
Organizations established in 1992
Feminist ethics
Bioethics
Ethics organizations |
https://en.wikipedia.org/wiki/Convergence%20%28routing%29 | Convergence is the state of a set of routers that have the same topological information about the internetwork in which they operate. For a set of routers to have converged, they must have collected all available topology information from each other via the implemented routing protocol, the information they gathered must not contradict any other router's topology information in the set, and it must reflect the real state of the network. In other words: in a converged network all routers "agree" on what the network topology looks like.
Convergence is an important notion for a set of routers that engage in dynamic routing. All Interior Gateway Protocols rely on convergence to function properly. "To have, or be, converged" is the normal state of an operational autonomous system. The Exterior Gateway Routing Protocol BGP typically never converges because the Internet is too big for changes to be communicated fast enough.
Convergence process
When a routing protocol process is enabled, every participating router will attempt to exchange information about the topology of the network. The extent of this information exchange, the way it is sent and received, and the type of information required vary widely depending on the routing protocol in use, see e.g. RIP, OSPF, BGP4.
A state of convergence is achieved once all routing protocol-specific information has been distributed to all routers participating in the routing protocol process. Any change in the network that affects routing tables will break the convergence temporarily until this change has been successfully communicated to all other routers.
Convergence time
Convergence time is a measure of how fast a group of routers reach the state of convergence. It is one of the main design goals and an important performance indicator for routing protocols, which should implement a mechanism that allows all routers running the protocol to quickly and reliably converge. Of course, the size of the network also plays an important role. A larger network will converge more slowly than a smaller one.
RIP is a routing protocol that converges so slowly that even a network of a few routers can take a couple of minutes to converge. In case of a new route being advertised, triggered updates can speed up RIP's convergence but to flush a route that previously existed takes longer due to the holddown timers in use. OSPF is an example of a fast-converging routing protocol. A network of a few OSPF routers can converge in a matter of seconds.
Certain configuration and hardware conditions will prevent a network from ever converging. For instance, a "flapping" interface (an interface that frequently changes its state between "up" and "down") might cause conflicting information to propagate throughout the network so the routers never agree on its current state. Under certain circumstances it might be desirable to withhold detailed routing information from parts of the network via route aggregation, thereby speeding up |
https://en.wikipedia.org/wiki/List%20of%20programmes%20broadcast%20by%20Disney%20Channel%20%28Indian%20TV%20channel%29 | This is a list of television programmes that are currently airing on Disney Channel in India.
Current programming
Animated series
Bapu
Dr.Tenali Rama
Beyblade
Doraemon
Gadget Guru Ganesha
The Ghost and Molly McGee
Ghostforce
Kid vs. Kat
Lego Jurassic World
Miraculous: Tales of Ladybug & Cat Noir
Moka
Phineas and Ferb
Selfie With Bajrangi
Upin and Ipin
Guddu
Live-action
Disney Imagine That
Best of Luck Nikki
The Suite Life of Karan & Kabir
Shake It Up
Former programming
Live-action
Aaron Stone
Agadam Bagdam Tigdam
Akkad Bakkad Bambey Bo
Austin & Ally
Backyard Science
Bear in the Big Blue House
Best of Luck Nikki
Big Bada Boom
The Book of Pooh
Boy Meets World
Break Time Masti Time
Captain Tiao
Cory in the House
Dhoom Machaao Dhoom
Disney Q Family Mastermind
Dog with a Blog
Gabbar Poonchwala
Goldie Ahuja Matric Pass
Goosebumps
Hannah Montana
Hatim
Hip Hip Hurray
Imagination Movers
Ishaan: Sapno Ko Awaaz De
Johnny and the Sprites
Jonas L.A.
Jessie
Karishma Kaa Karishma
Kaarthika
Kabhi Aise Geet Gaya Karo
Kya Mast Hai Life
Lage Raho Chachu
Life with Derek
Lizzie McGuire
Maan Na Maan Mein Tera Mehmaan
Mai Ka Lal
Mortified
Nach to the Groove
Naturally, Sadie
Oye Jassie
Palak Pe Jhalak
Phil of the Future
Sanya
Shaka Laka Boom Boom
Shake It Up (Indian TV series)
Shake It Up (U.S. TV series)
Shararat
So Random!
So Weird
Son Pari
Sonny with a Chance
Soy Luna
Soy Luna Live
Studio Disney
The Lodge (TV series)
The Next Step (Canadian TV series)
The Suite Life of Karan & Kabir
The Suite Life of Zack & Cody
The Suite Life on Deck
Take Two with Phineas and Ferb
That's So Raven
Vicky & Vetaal
Welcome to Pooh Corner
Wizards of Waverly Place
Zindagi Khatti Meethi
Animated series
101 Dalmatians: The Series
3 Amigonauts
Action Dad
Aladdin
American Dragon: Jake Long
Astra Force
Arjun — Prince of Bali
Being Ian
Beyblade Burst Rise
Beyblade Burst Surge
Bhaagam Bhaag
Billy Dilley's Super-Duper Subterranean Summer
Brandy & Mr. Whiskers
Bunnytown
Buzz Lightyear of Star Command
The Buzz on Maggie
Camp Lakebottom
Cars Toons
The Cat in the Hat Knows a Lot About That!
Chuggington
Clifford the Big Red Dog
Dave the Barbarian
The Deep
Donald Duck Presents
Donkey Kong Country
DuckTales
Ek Tha Jungle
The Emperor's New School
Fillmore!
Fish Hooks
Gaju Bhai
Get Ace
Good Morning, Mickey!
Goof Troop
Grami's Circus Show
Gravity Falls
Handy Manny
Higglytown Heroes
The Hive
Hotel Transylvania: The Series
House of Mouse
How to Draw?
Jake and the Never Land Pirates
JoJo's Circus
Jungle Cubs
Jungle Junction
Kim Possible
Kiteretsu
The Legend of Tarzan
Lilo & Stitch: The Series
The Lion Guard
Little Einsteins
The Little Mermaid
Madeline
Mickey and the Roadster Racers
Mickey Mouse and Friends
Mickey Mouse Club
Mickey Mouse Clubhouse
Miles from Tomorrowland
Miraculous: Tales of Ladybug & Cat Noir
The New Adventures of Winnie the Pooh
The Octonauts
Penn Zero: Part-Time Hero
PJ Masks
Pocoyo
The Proud Family
Quack Pack
Recess
Rolie Polie Olie
Sofia the First
|
https://en.wikipedia.org/wiki/Robert%20Thornton%20%28scribe%29 | Robert Thornton (fl. 1418 – 1456) was a Yorkshire landowner, a member of the landed gentry. His efforts as an amateur scribe and manuscript compiler resulted in the preservation of many valuable works of Middle English literature, and have given him an important place in its history.
Biography
Thornton's name is associated with two 15th-century manuscripts now held in different collections; Lincoln, Cathedral Library MS 91, the "Lincoln Thornton" manuscript, and British Library MS Additional 31042, the "London Thornton" manuscript. A number of candidates had been suggested for the scribe's identity, but he is now firmly identified as Robert Thornton, a relatively prosperous provincial landowner of the manor of East Newton, Stonegrave, in the North Riding of Yorkshire. The armigerous (Argent a bend gules with three escarbuncles or thereon) Thornton family had possessed East Newton Hall since the time of Edward I; Robert's parents are commemorated in the church at Stonegrave. Thornton's father, grandfather and great-grandfather were all also named Robert. The family retained possession of East Newton until 1692.
Thornton appears to have started to compile a collection of works for his own and his family's pleasure and instruction; he was essentially a gentleman-amateur in a field usually dominated by professional scriveners and ecclesiastical scribes. Rather than copying works at random, he made some attempt to edit romances, religious works and works on medicine or herblore into different "booklets" within the manuscript. He wrote in a practised but rather untidy hand, adding a few simple decorative flourishes such as grotesque drolleries or ornamental scrollwork.
Thornton's tastes were fairly wide-ranging; the Lincoln manuscript reveals a liking for Arthurian romances, and he seems to have particularly appreciated alliterative verse, resulting in the preservation of some of the finest examples of the genre (notably The Alliterative Morte Arthure and Wynnere and Wastoure). The texts enable us to gain some insight into the way such manuscripts were used, perhaps with members of a family using it on one night to refer to a recipe, and on another to read a romance or even to take part in a dramatic performance.
After Thornton's death, the manuscripts remained in the hands of his descendants for many years; the name of Thornton's son William appears on folio 49.v of the Lincoln manuscript, in addition to the names of other family members elsewhere. However, by 1700 (when it was seen there by the antiquary Bishop Thomas Tanner) it had reached the library of Lincoln Cathedral, probably having been obtained by the cathedral's Dean Michael Honywood between 1660 and 1681.
As many libraries of manuscripts were lost during the Dissolution of the Monasteries, Thornton's private anthology became an extremely rare survival.
Works preserved by Thornton
Lincoln, Cathedral Library MS 91
British Library MS Additional 31042
References
Further reading
Fein, |
https://en.wikipedia.org/wiki/Digital%20Audio%20Control%20Protocol | Digital Audio Control Protocol (DACP) is a protocol used by the iTunes and other audio player and server applications on Mac, Windows and Linux computers, enabling remote control by mobile devices such as iPhone and Android phones and tablet computers. By connecting the personal computer to loudspeakers the mobile device is used as a two-way remote control, allowing selection and control of music playback within a traditional listening environment such as a home or apartment.
Clients
Compliant DACP clients can connect to any DACP enabled server. Clients are available for multiple desktop and mobile platforms.
Apple Remote Apple Remote is the first DACP client created specifically for iTunes remote control.
CuteRemote CuteRemote DACP remote control for Nokia Phones.
TunesRemote+ TunesRemote+ for Google Android is a fork of Jeff Sharkey's TunesRemote project. The project's goal is provide remote functionality for Android with similar capabilities as Apple's remote.
TunesRemote-SE TunesRemote-SE combines the DACP control software from TunesRemote+ with the graphical user interface from Firefly Client to produce an application that can control a DACP server from any computer running Java.
Remote for iTunes Remote for iTunes by Hyperfine Software for Android lets users control iTunes via their home Wi-Fi network.
Remote for Windows Phone 7 Remote for Windows Phone 7 by Komodex Software lets users control DACP servers from their home Wi-Fi network.
yTrack yTrack is an iPad application developed by Fabrice Dewasmes that browses a remote DACP library and let users control it.
Servers
Compliant DACP servers can accept connections from any DACP client. Multiple compliant servers are available for Mac, Windows and Linux platforms.
Apple iTunes Apple iTunes is the original DACP server and the specification was created specifically for iTunes remote control.
MonkeyTunes for MediaMonkey In 2009 Melloware Inc., released MonkeyTunes, the first known "third-party" DACP server for MediaMonkey that is fully compliant with Apple's DACP protocol.
TouchRemote for Foobar2000 In 2009 Wintense released TouchRemote, a plugin (component) for the foobar2000 music player, implementing a DACP server that is fully compliant with Apple's DACP protocol allowing Apple Inc.'s Remote application to be used.
AlbumPlayer In 2011 Albumon, released a DACP plugin for their software AlbumPlayer which is a full featured jukebox player for the PC.
Telescope for Songbird In 2010 Wilco released Telescope for the Songbird music player, implementing a DACP server that is fully compliant with Apple's DACP protocol, and a standard web service and mobile browser interface.
Rhythmbox for GNOME In 2010 native DACP support was added to Rhythmbox after a Google Summer of Code project by Alexandre Rosenfeld.
See also
Digital Audio Access Protocol
Remote Audio Output Protocol
References
External links
Tunes Remote, Android client using DACP.
TunesRemote+, |
https://en.wikipedia.org/wiki/European%20route%20E21 | European route E21 is a series of roads in Europe, part of the United Nations International E-road network.
It runs from Metz, France to Geneva, Switzerland. It meets the European route E25, the E50 and the E411 at Metz, from where it departs. On its way to Geneva, it crosses the E23 at Nancy, and also passes through Dijon. It enters Switzerland soon after and links with the E25, the E62 and the E712 at Geneva, allowing further travel through Europe. It is long in total.
External links
UN Economic Commission for Europe: Overall Map of E-road Network (2007)
21
E021
E021 |
https://en.wikipedia.org/wiki/Remote%20data%20capture | Remote data capture is the process of automatic collection of scientific data. It is widely used in clinic trials, where it is referred to as electronic data capture. In physical sciences, automatic observation hardware in the field can be linked to an observer in a laboratory through a cellphone or other communication link, for example in hydrology. RDC systems influenced the design of later electronic data capture (EDC) systems.
References
Clinical research
Telemetry
Clinical data management |
https://en.wikipedia.org/wiki/European%20route%20E23 | European route E23 is a series of roads in Europe, part of the United Nations International E-road network.
Route
Links with other European routes
At Metz, it links with the E21, the E25, the E50, and the E411.
It links with the E21 at Nancy.
Further along at Remiremont it joins with the E512.
At Vesoul it connects to the E54.
Just before the Swiss border at Besançon, it makes a connection to the E60.
At its final destination of Lausanne it connects with the E25 and the E62.
External links
UN Economic Commission for Europe: Overall Map of E-road Network (2007)
23
E023
E023 |
https://en.wikipedia.org/wiki/Elfster | Elfster is a proprietary software application providing social networking features related to "secret Santa" style gift exchanges. It is available, without charge, as software as a service, via a website and via mobile apps for iOS and Android.
The website's features include a universal wishlist, an anonymous Q&A section, personalized gift recommendations, activity updates, and forum discussions. The company is headquartered in Delaware, United States.
History
Elfster was founded by software engineer Peter Imburg in 2004 after hearing about the difficulty his wife and sister had when trying to organize a Secret Santa for their family.
In November 2011, the website reached 2 million members. In Christmas of the same year, the Elfster Facebook App was launched for mobile device users. The app also serves as an extension of Elfster.com's service.
Services
Elfster can be used to create wishlists and organize online gift exchanges. Users can find friends in Elfster, and follow their wishlists. Items can be added from any site online, and with the Elfster mobile app, bar code scanning allows items to be added on the go. When organizing an online gift exchange, Elfster draws names randomly and allows users to ask their draw partner questions anonymously - maintaining secrecy in a "high-tech way".
Elfster provides a series of tools for organizing secret gift exchanges such as automated event-organization, name pairing, draw restrictions, gift guidance, wishlists, and anonymous questions and answers.
Elfster helps with the logistics of determining who wants to participate, drawing names, and communicating the names that were drawn, while identities remain secret
In December 2009, Elfster collaborated with Claire's to create Secret Santa Circle, a temporary Secret Santa website for the jewelry retailer.
In November 2010, new features were added including trending gifts, activity updates and the ability to suggest and share gift ideas.
References
External links
Elfster website
Elfster.com Brings Secret Santa to Facebook
Holiday Gift Exchanges Go High Tech with Introduction of Elfster En Espanol "Amigo Secreto"
Generation Limbo: Waiting It Out
See also
Secret Santa
Social networking services
Internet properties established in 2004
Christmas traditions |
https://en.wikipedia.org/wiki/Cyberhomes | Cyberhomes is a real estate website owned by Fidelity National Financial and Lender Processing Services (LPS). It lists the most current sales of homes in a neighborhood by similar sales.
History
In 1995 Moore Data Management Services created the website Cyberhomes.com. The site was set up with the goal of connecting homebuyers and sellers with real estate professionals.
In 1999 VistaInfo became interested in acquiring Moore's real estate businesses, including Cyberhomes.com. By December 1999, VistaInfo completed the purchase. At the time that move made VistaInfo the largest supplier of MLS information management systems in the country—serving over 100 MLS organizations and 350,000 real estate professionals.
In 2001 Fidelity National Financial and VistaInfo completed a merger forming a new company called Fidelity National Information Solutions (FNIS). Shortly after the merger in 2002, FNIS pulled the plug on Cyberhomes, but the URL was retained by a key executive.
In 2006 an entirely new product was born and took on the name Cyberhomes. It launched with access to Fidelity National Financials property information database and automated valuation tools.
In 2012, CyberHomes was purchased by Listingbook, LLC.
Company Today
Cyberhomes.com is a real estate information site that provides listing and foreclosure data, property evaluations and neighborhood analysis. The site is owned by Fidelity National Real Estate Solutions (FNRES), a division of Fidelity National Financial, Inc. and was introduced to the public in November 2007.
AOL
Cyberhomes is the exclusive provider of property data and valuations to AOL's real estate portal. AOL Real Estate receives over 3 million monthly visitors.
Vertical Ad Network
In May 2008 Cyberhomes and Adify launched the first real estate vertical advertising network, named Real Estate & Living Media Network.
See also
National Association of Realtors
CondoDomain
Redfin
Zillow
ZipRealty
PropertyShark
References
Real estate companies established in 1995
Real estate services companies of the United States
Online real estate databases |
https://en.wikipedia.org/wiki/European%20route%20E29 | European route E29 is a series of roads in Europe, part of the United Nations International E-road network.
It runs from Cologne, Germany through Luxembourg, through Germany again, and finishing at Sarreguemines, France.
Firstly it leaves Cologne, where it links with the E31, the E35, the E37 and the E40. It then heads south and crosses into Luxembourg, and into Luxembourg City, where more links are made to the E25, the E44 and the E421.
It then re-enters Germany, more specifically the Saarland, running through the city of Saarbrücken, where it links with the E50 and the E422.
On its final stretch, it crosses the French border and finishes at Sarreguemines.
Its total length is .
External links
UN Economic Commission for Europe: Overall Map of E-road Network (2007)
29
E029
E029
029 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.