source
stringlengths
32
199
text
stringlengths
26
3k
https://en.wikipedia.org/wiki/Here%20Technologies
Here Technologies (stylized and trade name as HERE and here) is a Dutch multinational group specialized in mapping technologies, location data and related automotive services to individuals and companies. It is majority-owned by a consortium of German automotive companies (namely Audi, BMW, the Mercedes-Benz Group) and American semiconductor company Intel whilst other companies also own minority stakes. Its roots date back to U.S.-based Navteq in 1985, which was acquired by Finland-based Nokia in 2007. Here is currently based in The Netherlands. Here captures location content such as road networks, buildings, parks and traffic patterns. It then sells or licenses that mapping content, along with map related navigation and location services to other businesses such as Alpine Electronics, Garmin, BMW, Oracle Corporation and Amazon.com. This third-party licensing constitutes the core of the firm's business. In addition, Here provides platform services to smartphones. It provides location services through its HERE applications, and also for GIS and government clients and other providers, such as Microsoft Bing (from 2012 through 2020), Meta Platforms, Yahoo! Maps, and the Samsung Gear S2 (and earlier models) maps app. HERE has maps of about 200 countries, offers voice guided navigation in 94 countries, provides live traffic information in 33 countries and has indoor maps available for about 49,000 unique buildings in 45 countries. The company is also working on self-driving technology. History Here has built its mapping and location business by acquiring location technology; the company is a combination of what was formerly Navteq and Nokia Maps. Navteq Navteq was an American company founded in 1985 as Karlin & Collins, Inc., later known as Navigation Technologies Corporation and eventually as Navteq. At the time of its acquisition by Nokia, Navteq was the largest maker of automotive-grade map data used in car navigation equipment. Nokia Maps Nokia Maps began in 2001 as Smart2Go, a generic 3D-map interface for access to tourist information on mobile terminals. It was developed by an EU consortium named TellMaris. Nokia gained the rights to the software when it acquired Berlin-based route planning software company Gate 5 in August 2006, which has become the cornerstone for the company's mapping business. It then made the Smart2Go application free to download. The service was rebranded as HERE in 2012, bringing together mapping, location businesses, satellite navigation and other services under one brand. Acquisition by Nokia In October 2007, Nokia acquired Navteq for $8.1 billion. Nokia ran Navteq's business along with their own Nokia Maps (later known as Ovi Maps, then again as Nokia Maps from 2011). The two divisions remained as separate entities of Nokia Corporation until Navteq was amalgamated into the core Nokia operations in 2011. The service was rebranded as HERE in 2012, bringing together mapping, location businesses, satellite navigatio
https://en.wikipedia.org/wiki/1973%E2%80%9374%20United%20States%20network%20television%20schedule%20%28late%20night%29
These are the late night schedules on all three networks for each calendar season beginning September 1973. All times are Eastern/Pacific. PBS is not included, as member television stations have local flexibility over most of their schedules and broadcast times for network shows may vary, CBS and ABC are not included on the weekend schedules (as the networks do not offer late night programs of any kind on weekends). Talk/Variety shows are highlighted in yellow, Local News & Programs are highlighted in white. Monday-Friday Saturday/Sunday By network ABC Returning Series ABC's Wide World of Entertainment Not returning from 1972-73 The Dick Cavett Show CBS Returning Series The CBS Late Movie NBC Returning Series The Midnight Special The Tonight Show Starring Johnny Carson The Weekend Tonight Show New Series The Tomorrow Show United States late night network television schedules 1973 in American television 1974 in American television
https://en.wikipedia.org/wiki/1974%E2%80%9375%20United%20States%20network%20television%20schedule%20%28late%20night%29
These are the late night schedules on all three networks for each calendar season beginning September 1974. All times are Eastern/Pacific. PBS is not included, as member television stations have local flexibility over most of their schedules and broadcast times for network shows may vary, CBS and ABC are not included on the weekend schedules (as the networks do not offer late night programs of any kind on weekends). Talk/Variety shows are highlighted in yellow, Local News & Programs are highlighted in white. Monday-Friday Saturday Sunday By network ABC Returning Series ABC's Wide World of Entertainment CBS Returning Series The CBS Late Movie NBC Returning Series The Midnight Special The Tomorrow Show The Tonight Show Starring Johnny Carson The Weekend Tonight Show New Series Weekend United States late night network television schedules 1974 in American television 1975 in American television
https://en.wikipedia.org/wiki/1975%E2%80%9376%20United%20States%20network%20television%20schedule%20%28late%20night%29
These are the late night schedules on all three networks for each calendar season beginning September 1975. All times are Eastern/Pacific. PBS is not included, as member television stations have local flexibility over most of their schedules and broadcast times for network shows may vary, CBS and ABC are not included on the weekend schedules (as the networks do not offer late night programs of any kind on weekends). Talk/Variety shows are highlighted in yellow, Local News & Programs are highlighted in white. Monday-Friday Saturday By network ABC New Series ABC Late Night Good Night America! Not returning from 1974-75 ABC's Wide World of Entertainment CBS Returning Series The CBS Late Movie NBC Returning Series The Midnight Special The Tomorrow Show The Tonight Show Starring Johnny Carson Weekend New Series NBC's Saturday Night Not returning from 1974-75 The Weekend Tonight Show United States late night network television schedules 1975 in American television 1976 in American television
https://en.wikipedia.org/wiki/1976%E2%80%9377%20United%20States%20network%20television%20schedule%20%28late%20night%29
These are the late night schedules on all three networks for each calendar season beginning September 1976. All times are Eastern/Pacific. PBS is not included, as member television stations have local flexibility over most of their schedules and broadcast times for network shows may vary, CBS and ABC are not included on the weekend schedules (as the networks do not offer late night programs of any kind on weekends). Talk/Variety shows are highlighted in yellow, Local News & Programs are highlighted in white. Monday-Friday Saturday Sunday By network ABC Returning Series ABC Late Night Not returning from 1975-76 Good Night America! CBS Returning Series The CBS Late Movie NBC Returning Series The Midnight Special NBC's Saturday Night (renamed Saturday Night Live) The Tomorrow Show The Tonight Show Starring Johnny Carson Weekend New Series NBC Late Night Movie United States late night network television schedules 1976 in American television 1977 in American television
https://en.wikipedia.org/wiki/1977%E2%80%9378%20United%20States%20network%20television%20schedule%20%28late%20night%29
These are the late night schedules on all three networks for each calendar season beginning September 1977. All times are Eastern/Pacific. PBS is not included, as member television stations have local flexibility over most of their schedules and broadcast times for network shows may vary, CBS and ABC are not included on the weekend schedules (as the networks do not offer late night programs of any kind on weekends). Talk/Variety shows are highlighted in yellow, Local News & Programs are highlighted in white. Monday-Friday Saturday Sunday By network ABC Returning Series ABC Late Night CBS Returning Series The CBS Late Movie NBC Returning Series The Midnight Special NBC Late Night Movie Saturday Night Live The Tomorrow Show The Tonight Show Starring Johnny Carson Weekend United States late night network television schedules 1977 in American television 1978 in American television
https://en.wikipedia.org/wiki/1978%E2%80%9379%20United%20States%20network%20television%20schedule%20%28late%20night%29
These are the late night schedules on all three networks for each calendar season beginning September 1978. All times are Eastern/Pacific. PBS is not included, as member television stations have local flexibility over most of their schedules and broadcast times for network shows may vary, CBS and ABC are not included on the weekend schedules (as the networks do not offer late night programs of any kind on weekends). Talk/Variety shows are highlighted in yellow, Local News & Programs are highlighted in white. Monday-Friday Saturday Sunday By network ABC Returning Series ABC Late Night CBS Returning Series The CBS Late Movie NBC Returning Series The Midnight Special NBC Late Night Movie Saturday Night Live The Tomorrow Show The Tonight Show Starring Johnny Carson Not returning from 1977-78 Weekend United States late night network television schedules 1978 in American television 1979 in American television
https://en.wikipedia.org/wiki/1979%E2%80%9380%20United%20States%20network%20television%20schedule%20%28late%20night%29
These are the late night schedules on all three networks for each calendar season beginning September 1979. All times are Eastern/Pacific. PBS is not included, as member television stations have local flexibility over most of their schedules and broadcast times for network shows may vary, CBS and ABC are not included on the weekend schedules (as the networks do not offer late night programs of any kind on weekends). Talk/Variety shows are highlighted in yellow, Local News & Programs are highlighted in white. Monday-Friday formerly The Iran Crisis: America Held Hostage Saturday Sunday By network ABC Returning Series ABC Late Night New Series Fridays The Iran Crisis: America Held Hostage CBS Returning Series The CBS Late Movie NBC Returning Series The Midnight Special NBC Late Night Movie Saturday Night Live The Tomorrow Show The Tonight Show Starring Johnny Carson United States late night network television schedules 1979 in American television 1980 in American television
https://en.wikipedia.org/wiki/1980%E2%80%9381%20United%20States%20network%20television%20schedule%20%28late%20night%29
These are the late night schedules on all three networks for each calendar season beginning September 1980. All times are Eastern/Pacific. PBS is not included, as member television stations have local flexibility over most of their schedules and broadcast times for network shows may vary, CBS and ABC are not included on the weekend schedules (as the networks do not offer late night programs of any kind on weekends). Talk/variety shows are highlighted in yellow, network news programs in gold, and local news & programs are highlighted in white background. Monday-Friday (*) renamed Tomorrow Coast to Coast in January Saturday Sunday By network ABC Returning Series ABC Late Night Fridays Nightline Not returning from 1979 to 1980 The Iran Crisis: America Held Hostage CBS Returning Series The CBS Late Movie NBC Returning Series The Midnight Special NBC Late Night Movie Saturday Night Live '80 The Tomorrow Show / Tomorrow Coast to Coast The Tonight Show Starring Johnny Carson New Series SCTV Network 90 United States late night network television schedules 1980 in American television 1981 in American television
https://en.wikipedia.org/wiki/Thor%20Aackerlund
Thor Bjorn Thorlei Aackerlund (born ) is a competitive video gamer considered one of the first to go professional. As a child, he started playing computer games while waiting for a new school year to begin after having missed one due to his mother being hospitalized after a fire. He couldn't afford a Nintendo Entertainment System, so he bought a Game Boy but didn't have the money for any extra games, which put him on the path of playing Tetris, as it was included for free. He was one of the winners of the 1990 Nintendo World Championships, for which he was bestowed a Mario trophy, a U.S. savings bond, a 1990 Geo Metro Convertible, a 40-inch rear-projection television, and a golden Mario trophy. Soon after the competition, Camerica, a producer of unlicensed Nintendo Entertainment System games, signed a deal with Aackerlund to make him the official spokesman for their games. Aackerlund then became the poster child for the game, featured in commercials and fairs. As a child, he felt pressured to play, as the prize money and endorsements were financially important for his family. At the time, he was known as the only player to claim to have reached level 30 in Tetris. Aackerlund soon disappeared from the scene, but remained known as perhaps the most well-known name in Tetris prior to the domination of 7-time World Champion Jonas Neubauer. He is a featured player in the 2011 documentary film Ecstasy of Order: The Tetris Masters, which covers his second effort in competitive video gaming at the 2010 Classic Tetris World Championship. References Further reading "Nintendo King Champ Says Game a Challenge but Anyone Can Play." Pittsburgh Post Gazette. "Thor Aackerlund was born to play and win at Tetris." The Dallas Morning News. "Business Notebook." The Dallas Morning News. 1977 births Living people People from Houston American esports players
https://en.wikipedia.org/wiki/Barbie%20Fashion%20Show%3A%20An%20Eye%20for%20Style
Barbie Fashion Show: An Eye for Style is a strategy video game by Thai studio Cyber Planet Interactive based on the Barbie franchise. The game is the sequel to the PC game Barbie Fashion Show. In this game, players take the role of a fashion assistant to Barbie, voiced by Kelly Sheridan and her best friend, Teresa, voiced by Catherine 'Cat' Main. The game also allows players to design clothes to be worn by the models ingame. Reception In their review, jeuxvideo gave the game 10/20 criticising its simplistic gameplay and graphics as well as the limited content which they claimed would not take more than an hour to beat. They did however think it would appeal to its target audience of very young girls more convincingly than some other offerings. See also List of Barbie video games References External links 2008 video games Fashion Show: An Eye for Style Nintendo DS games Windows games Activision games Sega video games Video games developed in Thailand Single-player video games
https://en.wikipedia.org/wiki/David%20G.%20Lowe
David G. Lowe is a Canadian computer scientist working for Google as a senior research scientist. He was a former professor in the computer science department at the University of British Columbia and New York University. Works Lowe is a researcher in computer vision, and is the author of the patented scale-invariant feature transform (SIFT), one of the most popular algorithms in the detection and description of image features. Awards and honors 2015. Lowe received the biennial PAMI Distinguished Researcher Award. References External links Home page Canadian computer scientists Computer vision researchers Living people Academic staff of the University of British Columbia Year of birth missing (living people) University of British Columbia alumni
https://en.wikipedia.org/wiki/Diane%20Souvaine
Diane L. Souvaine is a professor of computer science and an adjunct professor of mathematics at Tufts University. Contributions Souvaine's research is in computational geometry and its applications, including robust non-parametric statistics and molecular modeling. She has also encouraged women and minorities to study and pursue careers in mathematics and the sciences and advocated gender neutrality in science teaching. Education and career After undergraduate and masters studies at Radcliffe College of Harvard University and at Dartmouth College, Souvaine earned her Ph.D. in 1986 from Princeton University under the supervision of David P. Dobkin. She held a faculty position at Rutgers University from 1986 to 1998, and from 1992 to 1994 served first as acting associate director and then as acting director of DIMACS. From 1994 to 1995 she took a visiting position in mathematics at the Institute for Advanced Study in Princeton, New Jersey, and in 1998 she took a permanent position at Tufts University. Leadership and administration At Tufts, Souvaine was department chair from 2002 to 2005 and (after a sabbatical at Harvard and the Massachusetts Institute of Technology) was reappointed as chair in 2006. She was Vice Provost for Research from 2012 to 2016. She joined the National Science Board, a 24-member body that governs the National Science Foundation and advises the United States government about science policy, in 2008, and was the chair of the board for 2018–2020. She also served for several years on the board of advisors for the Computer Science Department at the University of Vermont as well as for the Computer Science Department at Lehigh University. Recognition In 2008 Souvaine won Tufts' Lillian and Joseph Leibner Award for Excellence in Teaching and Advising of Students. In 2011, she was listed as a fellow of the Association for Computing Machinery for her research in computational geometry and her service to the computing community. She became a fellow of the American Association for the Advancement of Science in 2016. The Association for Women in Mathematics has included her in the 2020 class of AWM Fellows for "sustained advocacy, support and mentorship of women and students underrepresented in STEM fields in mathematics and theoretical computer science at multiple scales, from impacting individual mentees and advisees, to creating deep and broad institutional cultural change". References Year of birth missing (living people) Living people Radcliffe College alumni Dartmouth College alumni Princeton University alumni Rutgers University faculty Tufts University faculty Researchers in geometric algorithms American women mathematicians American women computer scientists Fellows of the American Association for the Advancement of Science Fellows of the Association for Computing Machinery Fellows of the Association for Women in Mathematics American computer scientists 20th-century American mathematicians 21st-century American mathemati
https://en.wikipedia.org/wiki/The%20Eldorado%20Network
The Eldorado Network is a 1979 espionage novel by Derek Robinson, published by Hamish Hamilton. Three sequels followed: Artillery of Lies in 1991, Red Rag Blues in 2006, and Operation Bamboozle in 2009. The first novel, like all of Robinson's work, is based on fact, in this case a genuine double-agent known as "Garbo". Plot introduction Set mainly in Madrid and Lisbon in 1940 and 1941, it concerns the young Spaniard Luis Cabrillo, who witnesses the bombing of Durango during the Spanish Civil War, and later joins the Abwehr, or German intelligence service. He is enthusiastic and resourceful, and after completing his training he is sent to London to spy on the British—codename: Eldorado. However, he gets only as far as Lisbon, where he rents an office, buys an almanac and a guidebook, and begins concocting misinformation to mail back to his superiors in Madrid. The Abwehr pays him for each report and for each agent he recruits, and before long Luis has established a network of fake spies from all over the British isles. Luis's character and his audacious deception operation was closely modeled on that of Juan Pujol García, code-named GARBO by the British, and ARABEL by the Germans. Uniquely, he received both an Iron Cross, Second Class, for his services to the German war effort (authorised by Hitler himself) and an MBE from King George VI in 1944. While inspired by fact, and carefully researched, the novel is rich with Robinson's trademark black humour and verbal wit. Fiction set in 1940 Fiction set in 1941 1979 British novels British thriller novels British spy novels Novels set in Lisbon Novels set in Madrid Hamish Hamilton books
https://en.wikipedia.org/wiki/Jason%20Scott%20case
The Jason Scott case was a United States civil suit, brought against deprogrammer Rick Ross, two of his associates, and the Cult Awareness Network (CAN), for the abduction and failed deprogramming of Jason Scott, a member of the United Pentecostal Church International. Scott was eighteen years old at the time of the abduction and thus legally an adult. CAN was a co-defendant because a CAN contact person had referred Scott's mother to Rick Ross. In the trial, Jason Scott was represented by Kendrick Moxon, a prominent Scientologist attorney. The nine-member jury unanimously held the defendants liable for conspiracy to deprive Scott of his civil rights and religious liberties. In addition, the jury held that Ross and his associates (but not CAN) "intentionally or recklessly acted in a way so outrageous in character and so extreme in degree as to go beyond all possible bounds of decency and to be regarded as atrocious and utterly intolerable in a civilized community." The case resulted in an award of $875,000 in compensatory damages and punitive damages in the amount of $1,000,000 against CAN, $2,500,000 against Ross, and $250,000 against each of Ross's two associates. The case bankrupted the Cult Awareness Network, and its name, phone number, records and files were obtained by Scientologists. Prior events In January 1991, at the time of the failed deprogramming attempt, Jason Scott, of Bellevue, Washington, was an 18-year-old member of the Life Tabernacle Church, affiliated with the United Pentecostal Church International. Scott's mother, Katherine Tonkin, had been a member of the church, but had withdrawn from it. Jason and two younger sons of hers disagreed with her decision and insisted they would remain in the church. The two younger sons then left Tonkin's household, the youngest, aged thirteen, going to live with his grandmother, and the second-youngest, sixteen, moving in with another family from the church. Jason remained at home at first, but subsequently also moved in with his grandmother. Tonkin, who believed a pastor in the church had behaved inappropriately toward one of her younger sons, subsequently called the local Cult Awareness Network (CAN) hotline. The CAN contact person, Shirley Landa, referred her to Rick Ross; based on her endorsement of Ross, Tonkin retained him to deprogram her sons. At the time, Ross still performed forcible deprogrammings, a fact that Landa was aware of. Landa had had a longstanding relationship with CAN; she had founded its predecessor organization, and was a former member of CAN's board. Deprogramming To facilitate the deprogramming, Ross put together a two-man "security team". The three traveled to the grandmother's home, locked the two youngest children in the basement, and following several days of argument and lecturing, the boys gave up their Pentecostal beliefs. For deprogramming Jason, Ross demanded a larger fee, in view of the fact that he was powerfully built and legally an adult, increa
https://en.wikipedia.org/wiki/Mobile%20commerce%20service%20provider
A mobile commerce service provider (mCSP) is an organization (or company) that provides any combination of consulting, software and computer systems for mobile e-commerce platforms, mobile devices (cellular phones, smartphones), mobile commerce, mobile content or mobile web sites. mCSPs supply businesses with the tools and services they need to distribute and sell products and services over both the Internet and Mobile Internet and manage their online enterprises. Specifically, these firms specialize in all aspects of mobile commerce, including for all digital goods (games, video, ringtones, wallpapers and applications) that are downloaded to mobile devices. mCSPs provide service in areas such as mobile device databases billing systems text messaging services hardware/software design mobile payments brand recognition distribution control Web site development and hosting Web site performance monitoring fulfillment management online marketing order processing and delivery Mobile app development Providers of services to on-line companies
https://en.wikipedia.org/wiki/My%20VH1%20Music%20Awards
The My VH1 Music Awards is an annual music award ceremony held by American television network VH1 held in both 2000 and 2001. Categories, nominees, and winners were selected entirely by public voting at VH1.com. The ceremonies were held at the Shrine Auditorium in Los Angeles, California, broadcast live on VH1 and online. The award statuette was designed by sculptor Lawrence Nowlan. 2000 Hosted by John Leguizamo. Performers included Christina Aguilera, Bon Jovi, The Corrs, Creed, Metallica (their final performance with bassist Jason Newsted), No Doubt, The Red Hot Chili Peppers, and U2. Presenters included Macy Gray, Matt LeBlanc, David Spade, "Weird Al" Yankovic, Patricia Arquette, Antonio Banderas, Lara Flynn Boyle, Jenna Elfman, David Alan Grier, Salma Hayek, Sean Hayes, Téa Leoni, Jennifer Lopez, Rob Lowe, Justin Timberlake, Sela Ward and Greg Proops. Reviews were tepid, with Rolling Stone writing that "the event was somewhat undermined by gross production woes, lukewarm performances and the almighty Creed...." 2001 Hosted by Eric McCormack. Performers included Sting, Nelly Furtado, Jewel, No Doubt, Creed, Mary J. Blige, Lenny Kravitz, and Mick Jagger. Presenters included Benjamin Bratt, Ellen DeGeneres, Chris Isaak, Christian Slater, Kim Delaney, Jenna Elfman, Kelsey Grammer, Isaac Hayes, Tommy Lee, Henry Simmons, Gary Sinise and Damon Wayans. Dave Matthews Band won the most awards, including the top one, "My Favorite Group." References 2000 American television series debuts 2001 American television series endings VH1 original programming
https://en.wikipedia.org/wiki/Inacom
Inacom Corporation (ICO:NYSE) was a large national seller of PC's and services based in Omaha, Nebraska, at one point being the third-largest and most profitable computer distributor in the United States. Origins The company created in 1991 from the merger of ValCom Inc. and Inacomp Computer Centers Inc. ValCom Inc. was founded in 1982 by William L. "Bill" Fairfield. In 1997, Inacom entered the Fortune 500 list at position 436 and remained a Fortune 500 company until 2000. Throughout this time, Bill Fairfield served as president and chief executive officer of Inacom. Acquisition of Vanstar On October 9, 1998, Inacom purchased Vanstar for a reported $465 - $480 million. The resulting company employed nearly 12,000 and was estimated to generate $7 billion in revenue. The acquisition of Vanstar reportedly added a large amount of debt, and it has been said that Inacom overpaid too much for a company of that size. Vanstar had 43.26 million shares outstanding at the time the deal was struck, and shareholders of Vanstar received .64 shares of ICO for each VST share in a stock swap deal, thus the issuance of 27.7 M shares of stock effectively more than doubled the number of outstanding shares while also being dilutive to the existing shares. This, plus debt concerns, led to a decline in the price of Inacom's stock. Furthermore, the acquisition of Vanstar added unrealized credits posted to Inacom's balance sheet, necessitating the requirement to restate financials, and a failure to report financials for 1999 and the first quarter of 2000. As the result of the failure to file the necessary SEC documents, existing credit agreements were terminated and the company had difficulty in arranging new financing. Inacom's failure to file SEC documents also resulted in the New York Stock Exchange delisting Inacom (ICO) since they no longer met listing requirements. Bankruptcy On January 4, 2000, Inacom sold their distribution business to Compaq for $369.5 million. On January 7, IBM severed their business partner relationship which hurt Inacom badly. On June 16, 2000, only twenty months after the acquisition of Vanstar, Inacom filed for chapter 11 bankruptcy and terminated all employees. Compaq was itself purchased in 2002 by Hewlett-Packard. External links Funding Universe: Inacom Corporation CNN Money: Fortune 500 Listing References American companies established in 1991 American companies disestablished in 2000 Computer companies established in 1991 Computer companies disestablished in 2000 Defunct computer companies of the United States
https://en.wikipedia.org/wiki/LTE%20%28telecommunication%29
In telecommunications, long-term evolution (LTE) is a standard for wireless broadband communication for mobile devices and data terminals, based on the GSM/EDGE and UMTS/HSPA standards. It improves on those standards' capacity and speed by using a different radio interface and core network improvements. LTE is the upgrade path for carriers with both GSM/UMTS networks and CDMA2000 networks. Because LTE frequencies and bands differ from country to country, only multi-band phones can use LTE in all countries where it is supported. Terminology The standard is developed by the 3GPP (3rd Generation Partnership Project) and is specified in its Release 8 document series, with minor enhancements described in Release 9. LTE is also called 3.95G and has been marketed as 4G LTE and Advanced 4G; but the original version did not meet the technical criteria of a 4G wireless service, as specified in the 3GPP Release 8 and 9 document series for LTE Advanced. The requirements were set forth by the ITU-R organisation in the IMT Advanced specification; but, because of market pressure and the significant advances that WiMAX, Evolved High Speed Packet Access, and LTE bring to the original 3G technologies, ITU-R later decided that LTE and the aforementioned technologies can be called 4G technologies. The LTE Advanced standard formally satisfies the ITU-R requirements for being considered IMT-Advanced. To differentiate LTE Advanced and WiMAX-Advanced from current 4G technologies, ITU has defined the latter as "True 4G". Overview LTE stands for Long-Term Evolution and is a registered trademark owned by ETSI (European Telecommunications Standards Institute) for the wireless data communications technology and a development of the GSM/UMTS standards. However, other nations and companies do play an active role in the LTE project. The goal of LTE was to increase the capacity and speed of wireless data networks using new DSP (digital signal processing) techniques and modulations that were developed around the turn of the millennium. A further goal was the redesign and simplification of the network architecture to an IP-based system with significantly reduced transfer latency compared with the 3G architecture. The LTE wireless interface is incompatible with 2G and 3G networks, so that it must be operated on a separate radio spectrum. The idea of base of LTE was first proposed in 1998, with the use of the COFDM radio access technique to replace the CDMA and studying its Terrestrial use in the L band at 1428 MHz (TE) In 2004 by Japan's NTT Docomo, with studies on the standard officially commenced in 2005. In May 2007, the LTE/SAE Trial Initiative (LSTI) alliance was founded as a global collaboration between vendors and operators with the goal of verifying and promoting the new standard in order to ensure the global introduction of the technology as quickly as possible. The LTE standard was finalized in December 2008, and the first publicly available LTE service was launched
https://en.wikipedia.org/wiki/Simbiosys
SimBioSys (short for Simulated Biological Systems) is a technology company deploying a combination of artificial intelligence and biophysical simulations to improve the personalized and patient-specific understanding of cancer. SimBioSys developed a simulation engine, TumorScope, which utilizes current standard of care diagnostic data (imaging & pathology) to create spatially resolved virtual replicas of an individual tumor and microenvironment and uses mechanistic models to incorporate the major hallmarks of cancer including drug sensitivity & delivery, metabolism, mechanical forces. The simulations enable precise & comprehensive predictions of response to therapy while providing researchers and clinicians keys insights into mechanisms of resistance. By virtualizing cancer, clinicians and patients are empowered with a better understanding of the disease and can assess all available options computationally to truly individualize treatment. In the crowded world of genomics, new approaches have many barriers to becoming a new standard of care. SimBioSys complements and/or supersedes current precision medicine techniques while only relying on readily available and previously acquired datasets. Products The first indication to market will be Early Stage Breast Cancer where there is significant opportunity to improve outcomes by selecting the right first line therapy while de-escalating care and lowering costs and side effects. A retrospective study across 800 patients demonstrated volumetric errors under 4%. A recent pivotal study at University of Chicago, TumorScope™ produced 91% sensitivity and 93% specificity rates of predicting complete response to the physician's choice of therapy at the time of diagnosis. SimBioSys collaborates with over 130 oncologists across the country representing 16 premier cancer centers such University of Chicago, University of North Carolina, OHSU, among others. SimBioSys anticipates FDA clearance for its breast cancer surgical planning tool in late 2023 with an expansion to other solid tumors to follow. Validation to lung and prostate cancer is already underway. While awaiting FDA approval, SimBioSys is commercializing the technology for use in patient education and drug development. See also Precision Medicine Clinical Trial Optimization Virtual Trials Drug design References External links Life sciences industry Companies based in Champaign County, Illinois American companies established in 2018 2018 establishments in Illinois
https://en.wikipedia.org/wiki/1984%E2%80%9385%20United%20States%20network%20television%20schedule%20%28late%20night%29
These are the late night schedules on all three networks for each calendar season beginning September 1984. All times are Eastern/Pacific. PBS is not included, as member television stations have local flexibility over most of their schedules and broadcast times for network shows may vary, CBS and ABC are not included on the weekend schedules (as the networks do not offer late night programs of any kind on weekends). Talk/variety shows are highlighted in yellow, network news programs in gold, and local news & programs are highlighted in white background. Monday-Friday Saturday Sunday By network ABC Returning Series ABC Rocks Eye on Hollywood Nightline CBS Returning Series The CBS Late Movie CBS News Nightwatch NBC Returning Series Friday Night Videos Late Night with David Letterman Saturday Night Live The Tonight Show Starring Johnny Carson New Series The George Michael Sports Machine Not Returning From 1983-84 NBC Late Night Movie NBC News Overnight United States late night network television schedules 1984 in American television 1985 in American television
https://en.wikipedia.org/wiki/1985%E2%80%9386%20United%20States%20network%20television%20schedule%20%28late%20night%29
These are the late night schedules on all three networks for each calendar season beginning September 1985. All times are Eastern/Pacific. Talk/variety shows are highlighted in yellow, network news programs in gold, and local news & programs are highlighted in white background. Monday-Friday Saturday Sunday By network ABC Returning Series Eye on Hollywood Nightline New Series Lifestyles of the Rich and Famous (also aired in Daytime) Not Returning From 1984-85 ABC Rocks CBS Returning Series CBS Late Night CBS News Nightwatch T.J. Hooker (Moved from ABC, previously a primetime series) NBC Returning Series Friday Night Videos The George Michael Sports Machine Late Night with David Letterman Saturday Night Live The Tonight Show Starring Johnny Carson United States late night network television schedules 1985 in American television 1986 in American television
https://en.wikipedia.org/wiki/1986%E2%80%9387%20United%20States%20network%20television%20schedule%20%28late%20night%29
These are the late night schedules on all four networks beginning September 1986. All times are Eastern/Pacific. PBS is not included, as member television stations have local flexibility over most of their schedules and broadcast times for network shows may vary, CBS, ABC and Fox are not included on the weekend schedules (as the networks do not offer late night programs of any kind on weekends). Talk/variety shows are highlighted in yellow, network news programs in gold, and local news & programs are highlighted in white background. Monday-Friday {| border="1" cellpadding="2" !bgcolor="#C0C0C0" colspan=2|- !width="13%" bgcolor="#C0C0C0"|11:00 PM !width="14%" bgcolor="#C0C0C0"|11:30 PM !width="13%" bgcolor="#C0C0C0"|12:00 AM !width="14%" bgcolor="#C0C0C0"|12:30 AM !width="13%" bgcolor="#C0C0C0"|1:00 AM !width="14%" bgcolor="#C0C0C0"|1:30 AM !width="13%" bgcolor="#C0C0C0"|2:00 AM !width="14%" bgcolor="#C0C0C0"|2:30 AM !width="13%" bgcolor="#C0C0C0"|3:00 AM !width="14%" bgcolor="#C0C0C0"|3:30 AM !width="13%" bgcolor="#C0C0C0"|4:00 AM !width="14%" bgcolor="#C0C0C0"|4:30 AM !width="13%" bgcolor="#C0C0C0"|5:00 AM !width="14%" bgcolor="#C0C0C0"|5:30 AM |- !bgcolor="#C0C0C0" rowspan=3|ABC ! bgcolor=#C0C0C0|Fall |bgcolor="white" rowspan=3|local programming |bgcolor="gold" rowspan=3|ABC News Nightline |bgcolor="yellow" colspan="2"|The Dick Cavett Show (Tue.-Wed.)/Jimmy Breslin's People (Thur.-Fri.) |bgcolor="white" colspan="10"|Local |- ! bgcolor=#C0C0C0|Winter |bgcolor="white" colspan="12"|Local |- ! bgcolor=#C0C0C0|June |bgcolor="lightgreen" colspan="2"|Monday Sportsnite (Mon.) |bgcolor="white" colspan="10"|Local |- !bgcolor="#C0C0C0" rowspan=3|CBS ! bgcolor=#C0C0C0|Fall |bgcolor="white" rowspan=3|local programming |bgcolor="yellow" colspan="4"|CBS Late Night |bgcolor="white" rowspan=3|local programming |bgcolor="gold" colspan="8" rowspan=3|CBS News Nightwatch |- !bgcolor=#C0C0C0|Winter |bgcolor="yellow" colspan="4"|CBS Late Night (Mon.-Thur.)/Keep on Cruisin' (Fri., 11:30-12:40) |- !bgcolor=#C0C0C0|Summer |bgcolor="yellow" colspan="4"|CBS Late Night (Mon.-Thur.)/In Person from the Palace (Fri., 11:30-12:40) |- !bgcolor="#C0C0C0" rowspan=2|NBC ! bgcolor=#C0C0C0|Fall |bgcolor="white" rowspan=2|local programming |bgcolor="yellow" colspan="2" rowspan=2|The Tonight Show Starring Johnny Carson |bgcolor="yellow" colspan="2"|Late Night with David Letterman (Mon.-Thur.)/Friday Night Videos to 2:00 (Fri) |bgcolor="white" colspan="9" rowspan=1|local programming |- ! bgcolor=#C0C0C0|Summer |bgcolor="yellow" colspan="2"|Late Night with David Letterman |bgcolor="yellow" colspan="2"|Friday Night Videos (Fri.) |bgcolor="white" colspan="7"|local programming |- !bgcolor="#C0C0C0" rowspan=2|Fox (launched October 9, 1986) ! bgcolor=#C0C0C0|Fall |bgcolor="yellow" colspan="2"|The Late Show Starring Joan Rivers |bgcolor="white" colspan="12" rowspan=2|local programming |- ! bgcolor=#C0C0C0|May |bgcolor="yellow" colspan="2"|The Late Show |} Saturday Sunday By net
https://en.wikipedia.org/wiki/1987%E2%80%9388%20United%20States%20network%20television%20schedule%20%28late%20night%29
These are the late night schedules for the four United States broadcast networks that offer programming during this time period, from September 1988 to August 1989. All times are Eastern or Pacific. Affiliates will fill non-network schedule with local, syndicated, or paid programming. Affiliates also have the option to preempt or delay network programming at their discretion. Legend Schedule Monday-Friday Saturday Sunday By network ABC Returning Series Nightline Not Returning From 1986-87 The Dick Cavett Show Jimmy Breslin's People CBS Returning Series CBS Late Night CBS News Nightwatch New Series Top of the Pops Not Returning From 1986-87 In Person from the Palace Keep on Cruisin' Fox Returning Series The Late Show New Series The Wilton North Report NBC Returning Series Friday Night Videos The George Michael Sports Machine Late Night with David Letterman Saturday Night Live The Tonight Show Starring Johnny Carson United States late night network television schedules 1987 in American television 1988 in American television
https://en.wikipedia.org/wiki/1988%E2%80%9389%20United%20States%20network%20television%20schedule%20%28late%20night%29
These are the late night schedules for the four United States broadcast networks that offer programming during this time period, from September 1988 to August 1989. All times are Eastern or Pacific. Affiliates will fill non-network schedule with local, syndicated, or paid programming. Affiliates also have the option to preempt or delay network programming at their discretion. Legend Schedule Saturday Sunday By network ABC Returning Series Nightline CBS Returning Series CBS Late Night CBS News Nightwatch New Series The Pat Sajak Show Not Returning From 1987-88 Top of the Pops Fox New Series Comic Strip Live Not Returning From 1987-88 The Late Show The Wilton North Report NBC Returning Series Friday Night Videos The George Michael Sports Machine Late Night with David Letterman Saturday Night Live The Tonight Show Starring Johnny Carson New Series Later With Bob Costas United States late night network television schedules 1988 in American television 1989 in American television
https://en.wikipedia.org/wiki/1991%E2%80%9392%20United%20States%20network%20television%20schedule%20%28late%20night%29
These are the late night schedules for the four United States broadcast networks that offer programming during this time period, from September 1991 to August 1992. All times are Eastern or Pacific. Affiliates will fill non-network schedule with local, syndicated, or paid programming. Affiliates also have the option to preempt or delay network programming at their discretion. Legend Schedule Monday-Friday Note: The final episode of The Tonight Show Starring Johnny Carson aired on May 22, 1992. The first episode of The Tonight Show with Jay Leno aired on May 25, 1992 Note: CBS News Nightwatch was renamed Up To The Minute Note: Into The Night was renamed Studio 59 Saturday By network ABC Returning series: In Concert '91 Nightline Studio 59 New series: ABC World News Now CBS Returning series: CBS News Nightwatch New series: A Closer Score Crimetime After Primetime Night Games Personals Up To The Minute Not returning from 1990-91: America Tonight CBS Late Night NBC Returning series: Friday Night Videos Late Night with David Letterman Later With Bob Costas Saturday Night Live The Tonight Show Starring Johnny Carson New series: NBC Nightside The Tonight Show with Jay Leno Not returning from 1990-91: The George Michael Sports Machine (continues to air in First-run syndication) Fox Returning series: Comic Strip Live United States late night network television schedules 1991 in American television 1992 in American television
https://en.wikipedia.org/wiki/1992%E2%80%9393%20United%20States%20network%20television%20schedule%20%28late%20night%29
These are the late night schedules for the four United States broadcast networks that offer programming during this time period, from September 1992 to August 1993. All times are Eastern or Pacific. Affiliates will fill non-network schedule with local, syndicated, or paid programming. Affiliates also have the option to preempt or delay network programming at their discretion. Legend Schedule Monday-Friday Saturday By network ABC Returning series: ABC in Concert ABC World News Now Nightline Not returning from 1991-92: Studio 59 CBS Returning series: A Closer Score CBS Late Night Crimetime After Primetime Kids in the Hall Personals Up To The Minute Not returning from 1991-92: CBS News Nightwatch Night Games NBC Returning series: Friday Night Videos Late Night with David Letterman Later NBC Nightside Saturday Night Live The Tonight Show with Jay Leno Not returning from 1991-92: The Tonight Show Starring Johnny Carson Fox Returning series: Comic Strip Live United States late night network television schedules 1992 in American television 1993 in American television
https://en.wikipedia.org/wiki/1993%E2%80%9394%20United%20States%20network%20television%20schedule%20%28late%20night%29
These are the late night schedules for the four United States broadcast networks that offer programming during this time period, from September 1993 to August 1994. All times are Eastern or Pacific. Affiliates will fill non-network schedule with local, syndicated, or paid programming. Affiliates also have the option to preempt or delay network programming at their discretion. Legend Schedule Monday-Friday Saturday By network ABC Returning series ABC in Concert ABC World News Now ABC World News This Morning Nightline New series ABC in Concert Country CBS Returning series CBS Morning News Crimetime After Primetime Kids in the Hall Up to the Minute New series Late Show with David Letterman Not returning from 1992-93: A Closer Score CBS Late Night Personals FOX Returning series Comic Strip Live Code 3 In Living Color Tales from the Crypt New series The Chevy Chase Show NBC Returning series Friday Night Videos / Friday Night Later NBC News at Sunrise NBC Nightside Saturday Night Live The Tonight Show with Jay Leno New series Late Night with Conan O'Brien Not returning from 1992-93: Late Night with David Letterman United States late night network television schedules 1993 in American television 1994 in American television
https://en.wikipedia.org/wiki/Supply%20chain%20attack
A supply chain attack is a cyber-attack that seeks to damage an organization by targeting less secure elements in the supply chain. A supply chain attack can occur in any industry, from the financial sector, oil industry, to a government sector. A supply chain attack can happen in software or hardware. Cybercriminals typically tamper with the manufacturing or distribution of a product by installing malware or hardware-based spying components. Symantec's 2019 Internet Security Threat Report states that supply chain attacks increased by 78 percent in 2018. A supply chain is a system of activities involved in handling, distributing, manufacturing, and processing goods in order to move resources from a vendor into the hands of the final consumer. A supply chain is a complex network of interconnected players governed by supply and demand. Although supply chain attack is a broad term without a universally agreed upon definition, in reference to cyber-security, a supply chain attack involves physically tampering with electronics (computers, ATMs, power systems, factory data networks) in order to install undetectable malware for the purpose of bringing harm to a player further down the supply chain network. In a more general sense, a supply chain attack may not necessarily involve electronics. In 2010 when burglars gained access to the pharmaceutical giant Eli Lilly's supply warehouse, by drilling a hole in the roof and loading $80 million worth of prescription drugs into a truck, they could also have been said to carry out a supply chain attack. However, this article will discuss cyber attacks on physical supply networks that rely on technology; hence, a supply chain attack is a method used by cyber-criminals. Attack framework Generally, supply chain attacks on information systems begin with an advanced persistent threat (APT) that determines a member of the supply network with the weakest cyber security in order to affect the target organization. According to an investigation produced by Verizon Enterprise, 92% of the cyber security incidents analyzed in their survey occurred among small firms. APT's can often gain access to sensitive information by physically tampering with the production of the product. In October 2008, European law-enforcement officials "uncovered a highly sophisticated credit-card fraud ring" that stole customer's account details by using untraceable devices inserted into credit-card readers made in China to gain access to account information and make repeated bank withdrawals and Internet purchases, amounting to an estimated $100 million in losses. Risks The threat of a supply chain attack poses a significant risk to modern day organizations and attacks are not solely limited to the information technology sector; supply chain attacks affect the oil industry, large retailers, the pharmaceutical sector and virtually any industry with a complex supply network. The Information Security Forum explains that the risk derived from
https://en.wikipedia.org/wiki/Pharos%20network%20coordinates
Pharos is a hierarchical and decentralized network coordinate system. With the help of a simple two-level architecture, it achieves much better prediction accuracy then the representative Vivaldi coordinates, and it is incrementally deployable. Overview Network coordinate (NC) systems are an efficient mechanism for Internet latency prediction with scalable measurements. Vivaldi is the most common distributed NC system, and it is deployed in many well-known internet systems, such as Bamboo DHT (Distributed hash table), Stream-Based Overlay Network (SBON) and Azureus BitTorrent. Pharos is a fully decentralized NC system. All nodes in Pharos form two levels of overlays, namely a base overlay for long link prediction, and a local cluster overlay for short link prediction. The Vivaldi algorithm is applied to both the base overlay and the local cluster. As a result, each Pharos node has two sets of coordinates. The coordinates calculated in the base overlay, which are named global NC, are used for the global scale, and the coordinates calculated in the corresponding local cluster, which are named local NC, covers a smaller range of distance. To form the local cluster, Pharos uses a method similar to binning and chooses some nodes called anchors to help node clustering. This method only requires a one-time measurement (with possible periodic refreshes) by the client to a small, fixed set of anchors. Any stable nodes which are able to response ICMP ping message can serve as anchor, such as the existing DNS servers. The experimental results show that Pharos greatly outperforms Vivaldi in internet distance prediction without adding any significant overhead. Insights behind Pharos Simple and effective, obtain significant improvement in prediction accuracy by introducing a straightforward hierarchical distance prediction Fully compatible with Vivaldi, the most widely deployed NC system. For every host where the Vivaldi client has been deployed, it just needs to run classic Vivaldi NC algorithm to join global overlay and local cluster, without deploying another NC client. The anchors in Pharos is different from landmarks in Global network positioning (GNP), which not only has to reply the ICMP ping but also need to reply the queries from all clients by sending their latest NCs. No requirement to deploy any extra software on the anchors. See also Peer-to-peer Global network positioning Phoenix network coordinates External links Simulator of Pharos Network Coordinates Network Coordinates Research at Tsinghua University References Computer networking
https://en.wikipedia.org/wiki/Where%20Was%20I%3F%20%28TV%20series%29
Where Was I? was an American panel show which aired on the DuMont Television Network Tuesdays at 9pm ET from September 2, 1952, to October 6, 1953. The series consisted of panelists would have to guess a location by listening to clues and viewing photos. Hosts included Dan Seymour, Ken Roberts, and John Reed King, and panelists included Bill Cullen, Nancy Guild, Virginia Graham, and Skitch Henderson. Episode status As with most DuMont series, no episodes are known to exist. See also List of programs broadcast by the DuMont Television Network List of surviving DuMont Television Network broadcasts 1952-53 United States network television schedule Bibliography David Weinstein, The Forgotten Network: DuMont and the Birth of American Television (Philadelphia: Temple University Press, 2004) Alex McNeil, Total Television, Fourth edition (New York: Penguin Books, 1980) Tim Brooks and Earle Marsh, The Complete Directory to Prime Time Network TV Shows, Third edition (New York: Ballantine Books, 1964) External links Where Was I? at IMDB DuMont historical website DuMont Television Network original programming Black-and-white American television shows 1952 American television series debuts 1953 American television series endings Lost television shows 1950s American game shows English-language television shows
https://en.wikipedia.org/wiki/Trash%20or%20Treasure
Trash or Treasure, later known as Treasure Hunt, is an early American TV series which aired on the DuMont Television Network Thursdays at 9pm ET from October 1, 1952, to September 27, 1953. The show was hosted by Sigmund Rothschild and Nelson Case. In the show, owners of collectible items would bring antiques to host Sigmund Rothschild, who would give an opinion on how much they were worth. Rothschild was a self-taught appraiser, who appraised antiques for many celebrities. The program's name was changed to Treasure Hunt in April 1953, according to McNeil (1996). Rothschild also hosted the similar series What's It Worth? (1948–49 and 1952–53) on CBS Television. Trash or Treasure originated at WABD-TV in New York City and was sustaining. Episode status As with most DuMont Network programs, no episodes of Trash or Treasure are known to survive today. See also List of programs broadcast by the DuMont Television Network List of surviving DuMont Television Network broadcasts 1952-53 United States network television schedule References Bibliography David Weinstein, The Forgotten Network: DuMont and the Birth of American Television (Philadelphia: Temple University Press, 2004) Alex McNeil, Total Television, Fourth edition (New York: Penguin Books, 1980) Tim Brooks and Earle Marsh, The Complete Directory to Prime Time Network TV Shows, Third edition (New York: Ballantine Books, 1964) External links Trash or Treasure at IMDb DuMont historical website DuMont Television Network original programming Black-and-white American television shows 1952 American television series debuts 1953 American television series endings Lost television shows
https://en.wikipedia.org/wiki/Dark%20of%20Night
Dark of Night is an American dramatic anthology series that aired on the DuMont Television Network on Fridays at 8:30pm EST from October 3, 1952, to May 1, 1953. The series starred mostly unknown actors. In it, the character known as "The Stranger" traveled to a different site each week in order to solve a crime. Each episode was filmed at a different location in the New York City area. , Locations included a Coca-Cola bottling plant, Brentano's book store in Manhattan, a castle in New Jersey, and the American Red Cross Blood Bank. Dark of Night was one of the first network dramas to use such locations, which saved money for the network. Production Dark of Night was broadcast live. Frank Bunetta was the producer and director. Episode status Though most episodes of DuMont series were eventually destroyed, the UCLA Film and Television Archive has one episode of Dark of Night. See also List of programs broadcast by the DuMont Television Network List of surviving DuMont Television Network broadcasts 1952-53 United States network television schedule at CVTA with episode list References External links DuMont historical website Dark of Night at CVTA with episode list 1952 American television series debuts 1953 American television series endings 1950s American anthology television series 1950s American drama television series Black-and-white American television shows DuMont Television Network original programming English-language television shows
https://en.wikipedia.org/wiki/Meaningful%20play
Meaningful play are actions or activities built with either a designed or inherent intent, such as data collection or therapy. Meaning is defined as the underlying purpose of the topic or subject at hand, while play itself is defined as a range of voluntary, intrinsically motivated activities normally associated with pleasure and enjoyment. Inherent meaningful play would be defined as an activity where the purpose is built directly into the activity. An example of this is that sports have the inherent meaning of being fun and full of physical activity to promote wellness. Designed meaningful play is defined as an activity where another purpose is also integrated into the activity, by the creator of the activity, to either acquire knowledge or promote another purpose within the activity. For example, games in developmental psychology have the designed meaning of gathering data about many functions such as how executive function develops. The designed meaning does not have to be built into the activity from the beginning. In considering recess, it was created to give children time to exercise and socialize, but researchers at a later time have inferred meaning from the activities that children participate in during this time, adding a designed meaning to the activity of recess. Overview Meaningful play is discussed in the disciplines of psychology, education, counselling and law. It is also utilized in the fields of video games. While there appears to be no exact moment when the term was created, it first started to appear in the field of video games with the book Rules of Play, and was further adapted into other fields such as psychology soon after with a modified definition. Meaningful play has grown and become more influential over the years. As researchers discovered many of the various uses for play (For example, cleaning up excess brain cells during play) as well as discovered how many various forms of play there are. Advocates of meaningful play and play in general have even voiced their recommendation that playing be placed above testing in young grades like kindergarten. As well there are studies branching out to different age groups seeing if meaningful play can help the elderly with cognitive and physical functioning. While all play can be considered meaningful due to the inherent nature of play to have some sort of meaning of either competition or enjoyment, meaningful play is also about the designed meaning taken from play. Psychology The field of psychology uses meaningful play in a large variety of ways. The most important way is for gathering data during research, especially with children. This is considered basic research because it is done with the sole intent of gathering knowledge which could eventually be applied. Other ways include playing (in the form of games or role-playing) during therapy. Improving Basic Research The experimental approach works quite well for the most common research participant (University underg
https://en.wikipedia.org/wiki/Shinminato%20Line
is a rail line in Takaoka, Toyama, Japan. It is operated by Japan Freight Railway Company (JR Freight). It runs from Nōmachi Station to Takaoka Freight Terminal. Route data Company: Japan Freight Railway Company (JR Freight) (Category-1) Distance: 1.9 km / 1.2 mi Gauge: 1,067 mm / 3 ft 6 in Stations: 2 Double-track line: None Electric supply: Not electrified Signalling: Simplified automatic Stations See also List of railway lines in Japan Lines of Japan Railway companies Rail transport in Toyama Prefecture
https://en.wikipedia.org/wiki/Kurdish%20News%20Network
Kurdish News Network (KNN) (), is a Kurdish language news television network founded in 2008 by Nawshirwan Mustafa, the leader of the Change Movement political party. It is operated by the Wusha Corporation and based in Sulaimaniya. Programmes News - Covering the top Kurdish and international news stories Headlines - A brief overview of the main news stories Business - Financial news Markets - News on the world stock markets and commodity prices Press - A look at the front pages of various titles every morning Sport - Top sports stories Weather - forecasting Interview - An interview with a noted individual Debate - A head-to-head debate Parliament - News about the Kurdish Parliament Comment - Interviews with thinkers, innovators and opinion leaders References External links Television stations in Kurdistan Region (Iraq) Television stations in Iraq Kurdish-language television stations Mass media in Sulaymaniyah Television channels and stations established in 2008 2008 establishments in Iraqi Kurdistan
https://en.wikipedia.org/wiki/Andrew%20Zisserman
Andrew Zisserman (born 1957) is a British computer scientist and a professor at the University of Oxford, and a researcher in computer vision. As of 2014 he is affiliated with DeepMind. Education Zisserman received the Part III of the Mathematical Tripos, and his PhD in theoretical physics from the Sunderland Polytechnic. Career and research In 1984 he started to work in the field of computer vision at the University of Edinburgh. Together with Andrew Blake they wrote the book Visual reconstruction published in 1987, which is considered one of the seminal works in the field of computer vision. According to Fitzgibbon (2008) this publication was "one of the first treatments of the energy minimisation approach to include an algorithm (called "graduated non-convexity") designed to directly address the problem of local minima, and furthermore to include a theoretical analysis of its convergence." In 1987 he moved back to England to the University of Oxford, where he joined Mike Brady's newly founded robotics research group as a University Research Lecturer, and started to work on multiple-view geometry. According to Fitzgibbon (2008) his "geometry was successful in showing that computer vision could solve problems which humans could not: recovering 3D structure from multiple images required highly trained photogrammetrists and took a considerable amount of time. However, Andrew's interests turned to a problem where a six-year-old child could easily beat the algorithms of the day: object recognition." Publications Zisserman has published several articles, some of the most highly cited works in the field, and has edited a series of books. A selection: 1987. Visual reconstruction. With Andrew Blake. 1992. Geometric invariance in computer vision. Edited with Joseph Mundy. 1994. Applications of invariance in computer vision : second joint European-US workshop, Ponta Delgada, Azores, Portugal, 9–14 October 1993 : proceedings. With Joseph L. Mundy and David Forsyth (eds). 1996. ECCV '96 International Workshop (1996 : Cambridge, England) Object representation in computer vision II : ECCV '96 International Workshop, Cambridge, UK, 13–14 April 1996 : proceedings. With Jean Ponce, and Martial Hebert (eds.). 1999. International Workshop on Vision Algorithms (1999 : Corfu, Greece) Vision algorithms : theory and practice : International Workshop on Vision Algorithms, Corfu, Greece, 21–22 September 1999 : proceedings. With Bill Triggs and Richard Szeliski (eds.). 2000. Multiple view geometry in computer vision. With Richard Hartley. Second edition 2009. 2008. Computer vision – ECCV 2008 : 10th European conference on computer vision, Marseille, France, 12–18 October 2008, proceedings, part I. Edited with David Forsyth and Philip Torr. Awards and honours Zisserman is an ISI Highly Cited researcher. He is the only person to have been awarded the Marr Prize three times, in 1993, in 1998, and in 2003. He was elected Fellow of the Royal Society in 2007. I
https://en.wikipedia.org/wiki/Armin%20Meiwes
Armin Meiwes (; born 1 December 1961) is a German former computer repair technician who received international attention for murdering and eating a voluntary victim in 2001, whom he had found via the Internet. After Meiwes and the victim jointly attempted to eat the victim's severed penis, Meiwes murdered his victim and proceeded to eat a large amount of his flesh. Meiwes cut off his victim's penis and later consumed parts of his body. The house where this event took place was destroyed in a fire that happened around 3:20 am on 17 April 2023. He was arrested in December 2002. In January 2004, Meiwes was convicted of manslaughter and sentenced to eight years and six months in prison. In a retrial in May 2006, he was convicted of murder and sentenced to life imprisonment. Because of his acts, Meiwes is also known as the Rotenburg Cannibal or (The Master Butcher). Biography Early life Armin Meiwes was born on 1 December 1961, the only child of Waltrud Meiwes (1919–1999). He had two older half-brothers from his father's previous relationship with another woman. His father abandoned Armin when he was eight, leaving him to be raised by his mother. During sessions with police experts, Meiwes had explained that his desire for cannibalism, related to the fairytale Hansel and Gretel, had developed during his adolescent years. He had also described himself feeling "very lonesome" after "the family had fallen apart". Murder of Bernd Brandes and cannibalism Looking for a willing volunteer, Meiwes posted an advertisement on the then-active website The Cannibal Cafe (a now defunct forum for people with a cannibalism fetish). Meiwes's advertisement stated that he was "looking for a well-built 18- to 25-year-old to be slaughtered and then consumed." Bernd-Jürgen Armando Brandes, a 43-year-old engineer from Berlin, answered the advertisement in March 2001. Many other people responded to the advertisement but backed out; Meiwes did not attempt to force them to do anything against their will. The two made a videotape when they met on 9 March 2001 in Meiwes's home, in the small town of Wüstefeld, west of Rotenburg an der Fulda. The video shows Meiwes amputating Brandes's penis (with his agreement) and the two men attempting to eat it together. Before doing so, Brandes swallowed twenty sleeping pills, and a bottle of cough syrup, likely causing an effect of slowed breathing and extreme tiredness. Brandes initially insisted that Meiwes should attempt to bite his penis off. This did not work, and ultimately, Meiwes used a knife to remove it. Brandes apparently tried to eat some of his own penis raw but could not, because it was too tough and, as he put it, "chewy". Meiwes then fried the penis in a pan with salt, pepper, wine, and garlic; he then fried it with some of Brandes' fat, but by then it was too burnt to be consumed. He then chopped the penis up into chunks and fed it to his dog. According to court officials who saw the video (which has not been made pu
https://en.wikipedia.org/wiki/Melody%20Street
Melody Street is an early American television series, hosted by Elliot Lawrence, which aired on the DuMont Television Network. The program aired Fridays at 8:30pm ET from September 25, 1953, to February 5, 1954. Each episode was 30 minutes long. One guest star was guitarist Tony Mottola. Criticism Melody Street was hampered by a small budget, even by 1950s standards. Later-day critics, such as Castleman and Podrazik (1982), have cited Melody Street, among other DuMont series, as one of the reasons fewer and fewer viewers tuned in to the ailing DuMont Network. They stated Melody Street was, like several other DuMont programs during the 1953–1954 season, "doomed from the start by third-rate scripts and cheap production" and pointed out that the program "required the performers to lip-sync other people's records." Reception John Lester for the Long Island Star-Journal said the program "presents an attractive melange of musical numbers" and that the program had "initiative, ingenuity and imagination". Episode status Two complete episodes, January 1, 1954, and another 1954 episode, of the show survive at the UCLA Film and Television Archive, along with an excerpt from another episode. See also List of programs broadcast by the DuMont Television Network List of surviving DuMont Television Network broadcasts 1953-54 United States network television schedule References Bibliography David Weinstein, The Forgotten Network: DuMont and the Birth of American Television (Philadelphia: Temple University Press, 2004) Alex McNeil, Total Television, Fourth edition (New York: Penguin Books, 1980) Tim Brooks and Earle Marsh, The Complete Directory to Prime Time Network TV Shows, Third edition (New York: Ballantine Books, 1964) External links Melody Street at IMDB DuMont historical website DuMont Television Network original programming Black-and-white American television shows 1953 American television series debuts 1954 American television series endings English-language television shows
https://en.wikipedia.org/wiki/Colonel%20Humphrey%20Flack
Colonel Humphrey Flack is an American sitcom which ran Wednesdays at 9 p.m. ET from October 7, 1953, to July 2, 1954, on the DuMont Television Network, then revived from 1958 to 1959 for first-run syndication. The series also aired under the titles The Fabulous Fraud, The Adventures of Colonel Flack, and The Imposter. Overview The series is about a con man who defrauded rich people, then gave some of the money to the needy. Colonel Humphrey Flack starred British actor Alan Mowbray as the Colonel, and Frank Jenks as his sidekick, Uthas P. ("Patsy") Garvey. The TV series was based on a popular series of short stories by Everett Rhodes Castle published in The Saturday Evening Post. The pilot for the series aired on May 31, 1953, on an episode of the ABC Album/Plymouth Playhouse. When the series was revived in 1958, it was retitled Colonel Flack. The 39 episodes (all remakes of the original 39 episodes) aired from October 5, 1958, to July 5, 1959, in syndication. The syndicated programs were made by Desilu Productions and featured Mowbray and Jenks in their original roles. Reception A review in TV Guide noted that the program succeeded as a situation comedy "without benefit of any husband-and-wife team, precocious children, etc." It also complimented Mowbray's and Jenks's portrayals of their characters. Episode status At least 12 episodes of the DuMont series are in the collection of the UCLA Film and Television Archive and two episodes are at the Paley Center for Media. See also 1953-54 United States network television schedule List of programs broadcast by the DuMont Television Network List of surviving DuMont Television Network broadcasts References General bibliography Brooks, Tim, and Earle Marsh, The Complete Directory to Prime Time Network TV Shows, Third edition (New York: Ballantine Books, 1964) McNeil, Alex. Total Television, Fourth edition (New York: Penguin Books, 1980) Weinstein, David. The Forgotten Network: DuMont and the Birth of American Television (Philadelphia: Temple University Press, 2004) External links List of episodes of original DuMont run List of episodes at CTVA Opening credits at YouTube DuMont historical website DuMont Television Network original programming 1953 American television series debuts 1954 American television series endings 1958 American television series debuts 1959 American television series endings 1950s American sitcoms Black-and-white American television shows First-run syndicated television programs in the United States American television series revived after cancellation Television series by CBS Studios
https://en.wikipedia.org/wiki/Ashington%20railway%20station
Ashington railway station was a station on the branch of the Blyth and Tyne Railway network which served the town of Ashington in Northumberland, North East England. The station was closed by British Railways in 1964, but it has been the subject of a reopening campaign since at least the 1990s. History Ashington station was opened by the Blyth and Tyne Railway in 1872 as Hirst (for Ashington). The North Eastern Railway took over the Blyth and Tyne Railway in 1874, the NER became part of the London and North Eastern Railway in the 1923 grouping and the station passed to the North Eastern Region of British Railways on nationalisation in 1948. British Railways withdrew passenger services in 1964 as part of the Reshaping of British Railways. The site today The line through the former station is still used for freight. Ashington signal box was closed on 14 February 2010 with the removal of the main line crossover. The signal box was demolished over the weekend of 10–11 August 2013. The northbound platform was demolished in October 2022 to make way for the new Northumberland Line platform. Reopening proposals Proposals to reintroduce passenger rail services to the currently freight-only section of the former Blyth and Tyne Railway system have been discussed since the 1990s. In the early 2010s, Northumberland County Council (NCC) became interested in the proposals, commissioning Network Rail to complete a GRIP 1 study to examine the best options for the scheme in June 2013. This report was published in March 2014 and was followed in June 2015 with the commissioning of a more detailed GRIP 2 study at a cost of £850,000. The GRIP 2 study, published in October 2016, confirmed that the reintroduction of a frequent seven-day a week passenger service between Newcastle, Ashington and possibly a new terminus to the east, at , was feasible and could provide economic benefits of £70 million with more than 380,000 people using the line each year by 2034. Despite a change in the political leadership of Northumberland County Council following the 2017 local elections the authority continued to develop the project, encouraged by the Department for Transport's November 2017 report, A Strategic Vision for Rail, which named the line as a possible candidate for a future reintroduction of passenger services. Consequentially, NCC commissioned a further interim study in November 2017 (dubbed GRIP 2B) to determine whether high costs and long timescales identified in the GRIP 2 Study could be reduced by reducing the initial scope of the project, but the report failed to deliver on this. Nonetheless, the county council has continued to develop the project, hiring AECOM and SLC Rail as contractors to develop the scheme on their behalf in 2018 and allocating an additional £3.46 million in funding for a further business case and detailed design study (equivalent to GRIP 3) in February 2019. Revised plans were revealed in July 2019 which were reduced in scope from the 2016
https://en.wikipedia.org/wiki/Martha%20M.%20Foster
Martha M. Foster is the founder and executive director of Living Earth Television(LETV), a Bloomington, Indiana-based nonprofit organization that develops programming from documentaries made by international filmmakers. Foster began LETV in 2002, in Chicago. In September 2010, Living Earth Television's first broadcast appeared on LinkTV. LETV's newly released English language version of an award-winning documentary from Chinese producer Zhang Yiqing, Kindergarten, was featured on LinkTV's DocDebut site. In June 2009, Foster was invited to participate in the U.S. Department of State Bureau of Educational and Cultural Affairs' American Documentary Showcase, a touring initiative that features U.S. documentaries and is administered by the University Film and Video Association (UFVA) in partnership with the International Documentary Association (IDA). The program debuted in the Czech Republic and Poland in April 2009 and traveled to nearly 30 countries in 2009, including Iraq, Kenya and Vietnam. In September and October 2009, Foster traveled to Singapore and Myanmar as a Documentary Expert with the Showcase. In December 2010, Foster traveled to China with the Showcase, to exhibit American documentaries in Nanjing, Guangzhou and Beijing. Following her visit to Myanmar, Foster and LETV facilitated the broadcast of three international environmental films on Myanmar State Television, at the request of the Myanmar Ministry of Information, working in cooperation with the US Embassy in Yangon. These programs began broadcasting in Myanmar in September 2010. Foster has worked for the Smithsonian Institution, the Chicago Field Museum and Chicago Public Television and has won five regional Emmy awards, some shared with other colleagues . She was selected as an "Influential Woman in Business" by the National Association of Women Business Owners in 2003. She has acted in conjunction with universities, museums and festivals in the United States and abroad for nearly 30 years. In 2008, she served as a judge for the Jade Kunlun Awards-2008 World Mountain Documentary Festival of Qinghai, China. Foster's continuing relationship with Chinese documentary television professionals began in 1997, when professor Ren Yuan of the Beijing Broadcasting Institute (now the Communication University of China) brought Chinese documentaries to show at the Windy City International Documentary Festival in Chicago, which Foster founded and directed. Foster was invited to visit China in 1999 to lecture to documentary production professionals at universities and television stations in five cities. In 2001 and 2003, she also served as a juror for the Gold Panda social and cultural documentary awards. References Emmy Award winners
https://en.wikipedia.org/wiki/HTree
An HTree is a specialized tree data structure for directory indexing, similar to a B-tree. They are constant depth of either one or two levels, have a high fanout factor, use a hash of the filename, and do not require balancing. The HTree algorithm is distinguished from standard B-tree methods by its treatment of hash collisions, which may overflow across multiple leaf and index blocks. HTree indexes are used in the ext3 and ext4 Linux filesystems, and were incorporated into the Linux kernel around 2.5.40. HTree indexing improved the scalability of Linux ext2 based filesystems from a practical limit of a few thousand files, into the range of tens of millions of files per directory. History The HTree index data structure and algorithm were developed by Daniel Phillips in 2000 and implemented for the ext2 filesystem in February 2001. A port to the ext3 filesystem by Christopher Li and Andrew Morton in 2002 during the 2.5 kernel series added journal based crash consistency. With minor improvements, HTree continues to be used in ext4 in the Linux 3.x.x kernel series. Use ext2 HTree indexes were originally developed for ext2 but the patch never made it to the official branch. The dir_index feature can be enabled when creating an ext2 filesystem, but the ext2 code won't act on it. ext3 HTree indexes are available in ext3 when the dir_index feature is enabled. ext4 HTree indexes are turned on by default in ext4. This feature is implemented in Linux kernel 2.6.23. HTree indexes is also used for file extents when a file needs more than the 4 extents stored in the inode. The large_dir feature of ext4 is implemented in Linux kernel 4.13. PHTree PHTree (Physically stable HTree) is a derivation intended as a successor. It fixes all the known issues with HTree except for write multiplication. It is used in the Tux3 filesystem. References External links A Directory Index for Ext2 (which describes the HTree data structure) HTree HPDD Wiki - Parallel Directory High Level Design Disk file systems B-tree Linux
https://en.wikipedia.org/wiki/Victoria%20blue%20R
Victoria blue R is a dye with formula C29H32N3Cl. It has a blue colour that changes to yellow at low pH values. Physical data Fastness The dye exerts a high light fastness and washing fastness. UV/VIS absorption Victoria Blue R has an absorption peak of around 610nm. Chlorides Triarylmethane dyes Dimethylamino compounds
https://en.wikipedia.org/wiki/American%20Association%20of%20Family%20and%20Consumer%20Sciences
American Association of Family and Consumer Sciences (AAFCS) is an American professional association that networks professionals in the area of family and consumer science. It was founded in 1908 as the American Home Economics Association by Ellen H. Richards. In 1994 it changed its name to the current one. The association started with about 800 members and grew to over 50,000 by the mid-1960s. In the early 20th century, the association did not often mention Black universities in its journal and it also practiced segregation. It encouraged African American home economics leaders to form their own groups. Many already had formed such groups, which included the National Association of Teachers in Colored Schools. By the mid-1990s membership had fallen below 25,000 and by 2001, it was just over 13,000. Membership continued to decline, and by 2008 was just over 7,000, and where by early 2012, the numbers fell to approximately 5,000 members. The association currently acts as a professional network primarily for professors and teachers of home economics and related courses, but also includes large numbers from government, business and non-profit organizations. AAFCS is one of the five organizations that form the Consortium of Family Organizations. While not having its own political action committee, it recommends the "Vocational Political Action Committee"; and in 1985, the AAFCS joined the Home Economics Public Policy Council (HEPPC), which does engage in legislative action. The field originated from home economics to what it is today. Family and Consumer Sciences is an interdisciplinary field that combines social sciences (emphasizing on the well-being of individuals, families, and communities) and natural sciences (emphasizing on nutrition, development, and textile science). Aspects included: nutrition, cooking, parenting and human development, interior design, textiles, economics, housing, apparel merchandising, resource management, ad other related specialties. Awards National Family and Consumer Sciences Teacher of the Year Award, annually for outstanding educational programs Borden Award, annually for research in nutrition Ruth O'Brien Project Grants, periodically for development of research in family and consumer science AAFCS fellowships awarded to graduate students in family and consumer science Atwater International fellowship to non-American graduate students in family and consumer science, established in 1947 and named after Helen W. Atwater Publications Journal of Family and Consumer Sciences, a quarterly refereed professional publication, formerly the Journal of Home Economics renamed in 1994 Family and Consumer Sciences Research Journal, a quarterly refereed technical publication, published on behalf of the association, (print), (web), by SAGE Publications through 2009, then by Wiley-Blackwell AAFCS Action, a five times per year newsletter detailing association and member activities, established in 1974 discontinued as
https://en.wikipedia.org/wiki/SAtel
SATel is a Bangladeshi fixed line regional operator. It is a private public switched telephone network (PSTN) operator in the South-East region of Bangladesh. As of November 2009, total number of subscriber of this operator is 17.577 thousand. References Telecommunications companies of Bangladesh
https://en.wikipedia.org/wiki/Dynamic%20frequency%20hopping
One of the key challenges of the cognitive radio based wireless networks, such as IEEE 802.22 wireless regional area networks (WRAN), is to address two apparently conflicting requirements: assuring Quality of Services (QoS) satisfaction for services provided by the cognitive radio networks, while providing reliable spectrum sensing for guaranteeing licensed user protection. To perform reliable sensing, in the basic operation mode on a single frequency band (the so-called "listenbefore-talk" mode) one has to allocate Quiet Times, in which no data transmission is permitted. Such periodic interruption of data transmission could impair the QoS of cognitive radio systems. This issue is addressed by an alternative operation mode proposed in IEEE 802.22 called Dynamic Frequency Hopping (DFH) where data transmission of the WRAN systems are performed in parallel with spectrum sensing without any interruption. References Wireless networking
https://en.wikipedia.org/wiki/Robot%20Operating%20System
Robot Operating System (ROS or ros) is an open-source robotics middleware suite. Although ROS is not an operating system (OS) but a set of software frameworks for robot software development, it provides services designed for a heterogeneous computer cluster such as hardware abstraction, low-level device control, implementation of commonly used functionality, message-passing between processes, and package management. Running sets of ROS-based processes are represented in a graph architecture where processing takes place in nodes that may receive, post, and multiplex sensor data, control, state, planning, actuator, and other messages. Despite the importance of reactivity and low latency in robot control, ROS is not a real-time operating system (RTOS). However, it is possible to integrate ROS with real-time computing code. The lack of support for real-time systems has been addressed in the creation of ROS 2, a major revision of the ROS API which will take advantage of modern libraries and technologies for core ROS functions and add support for real-time code and embedded system hardware. Software in the ROS Ecosystem can be separated into three groups: language-and platform-independent tools used for building and distributing ROS-based software; ROS client library implementations such as , , and ; packages containing application-related code which uses one or more ROS client libraries. Both the language-independent tools and the main client libraries (C++, Python, and Lisp) are released under the terms of the BSD license, and as such are open-source software and free for both commercial and research use. The majority of other packages are licensed under a variety of open-source licenses. These other packages implement commonly used functionality and applications such as hardware drivers, robot models, datatypes, planning, perception, simultaneous localization and mapping (SLAM), simulation tools, and other algorithms. The main ROS client libraries are geared toward a Unix-like system, mostly because of their dependence on large sets of open-source software dependencies. For these client libraries, Ubuntu Linux is listed as "Supported" while other variants such as Fedora Linux, macOS, and Microsoft Windows are designated "experimental" and are supported by the community. The native Java ROS client library, , however, does not share these limitations and has enabled ROS-based software to be written for the Android OS. has also enabled ROS to be integrated into an officially supported MATLAB toolbox which can be used on Linux, macOS, and Microsoft Windows. A JavaScript client library, has also been developed which enables integration of software into a ROS system via any standards-compliant web browser. History Early days at Stanford (2007 and earlier) Sometime before 2007, the first pieces of what eventually would become ROS began coalescing at Stanford University. Eric Berger and Keenan Wyrobek, PhD students working in Kenneth Salisbury's
https://en.wikipedia.org/wiki/Rule-based%20system
In computer science, a rule-based system is used to store and manipulate knowledge to interpret information in a useful way. It is often used in artificial intelligence applications and research. Normally, the term rule-based system is applied to systems involving human-crafted or curated rule sets. Rule-based systems constructed using automatic rule inference, such as rule-based machine learning, are normally excluded from this system type. Applications A classic example of a rule-based system is the domain-specific expert system that uses rules to make deductions or choices. For example, an expert system might help a doctor choose the correct diagnosis based on a cluster of symptoms, or select tactical moves to play a game. Rule-based systems can be used to perform lexical analysis to compile or interpret computer programs, or in natural language processing. Rule-based programming attempts to derive execution instructions from a starting set of data and rules. This is a more indirect method than that employed by an imperative programming language, which lists execution steps sequentially. Construction A typical rule-based system has four basic components: A list of rules or rule base, which is a specific type of knowledge base. An inference engine or semantic reasoner, which infers information or takes action based on the interaction of input and the rule base. The interpreter executes a production system program by performing the following match-resolve-act cycle: Match: In this first phase, the condition sides of all productions are matched against the contents of working memory. As a result a set (the conflict set) is obtained, which consists of instantiations of all satisfied productions. An instantiation of a production is an ordered list of working memory elements that satisfies the condition side of the production. Conflict-resolution: In this second phase, one of the production instantiations in the conflict set is chosen for execution. If no productions are satisfied, the interpreter halts. Act: In this third phase, the actions of the production selected in the conflict-resolution phase are executed. These actions may change the contents of working memory. At the end of this phase, execution returns to the first phase. Temporary working memory. A user interface or other connection to the outside world through which input and output signals are received and sent. See also Rule-based programming Expert systems Rewriting RuleML List of rule-based languages Learning classifier system Rule-based machine learning Rule-based modeling References Rule engines
https://en.wikipedia.org/wiki/Mac%20Mini
Mac Mini (stylized as Mac mini) is a small form factor desktop computer developed and marketed by Apple Inc. , it is positioned between the consumer all-in-one iMac and the professional Mac Studio and Mac Pro as one of four current Mac desktop computers. Since launch, it has shipped without a display, keyboard, and mouse. The machine was initially branded as "BYODKM" (Bring Your Own Display, Keyboard, and Mouse) as a strategic pitch to encourage users to switch from Windows and Linux computers. In January 2005, the original Mac Mini was introduced with the PowerPC G4 CPU. In February 2006, Apple announced a new Intel Core Solo model, the first with an Intel processor. A thinner unibody redesign, unveiled in June 2010, added an HDMI port, and was more readily positioned as a home theater device and an alternative to the Apple TV. The 2018 Space Gray Mac Mini model has Thunderbolt, an Intel Core i3, Core i5 or i7 CPU, and also changed the case's default silver for space gray. This model also has solid-state storage and replaces most of the data ports with USB-C sockets. The Apple silicon Mac Mini was introduced in November 2020 in the original silver style; the 2018 space gray model remained available as a high-end model with more RAM options. A server version of the Mac Mini that is bundled with the Server edition of the OS X operating system was offered from 2009 to 2014. The Mac Mini received generally tepid reviews except for the Apple silicon model, which was praised for its compatibility, performance, processor, price, and power efficiencies, though it drew some occasional criticisms for its ports, speaker, integrated graphics, non-user-upgradable RAM and storage, and the expensive cost to buy associated accessories and displays. Form and design The Mac Mini was modeled on the shape of a standard digital media player, and runs the macOS operating system (previously Mac OS X and OS X). It was initially advertised as "BYODKM" (Bring Your Own Display, Keyboard, and Mouse), aiming to expand Apple's market-share of customers using other operating systems such as Microsoft Windows and Linux. Mac Mini was the company's only consumer computer that shipped without a paired display, keyboard, and mouse since its original release in 2005. Since the unibody redesign in 2010, the Kensington Security Slot and the optical drive were removed from all models, leaving internal storage spaces for either a second internal hard drive or an SSD, which can be ordered from Apple or as an upgrade kit from third party suppliers. G4 polycarbonate (2005) Apple's release of a small form factor computer had been widely speculated upon and requested before the Mac Mini. In January 2005, the Mac Mini G4 was introduced alongside the iPod shuffle at the Macworld Conference & Expo; Apple CEO Steve Jobs marketed "The cheapest, and most affordable Mac ever". The machine was intended as an entry-level computer for budget-minded customers. In comparison to regular deskto
https://en.wikipedia.org/wiki/Star%20Luster
is a 1985 space combat simulator video game developed and published by Namco for the Family Computer in Japan. and adapted for play in arcades via the Nintendo VS. System. Star Luster is set in the same universe as Namco's Bosconian (1981), and the gameplay has strong similarities to Atari, Inc.'s Star Raiders from 1979. An enhanced version of Star Luster was published for the X68000 in August 1994. A sequel, Star Ixiom, was released for the PlayStation in 1999. Star Luster was initially met with mixed reviews and poor sales. The game's reliance on obtuse level objectives and random enemy encounters have been blamed for its lack of popularity, in addition to the Famicom's userbase being primarily children that didn't understand its design. Retrospectively, Star Luster has received more positive reviews for its 3D perspective and presentation. Gameplay Star Luster involves moving through open space via a first-person cockpit view and engaging enemy ships. The player's ship has limited fuel and can be refueled at bases. A map and radar show locations of enemies and bases. The player can choose a location on the map and warp to it, with the current date changing based on the warp distance. The game uses a regenerating shield and may be the first game with such a mechanic. Reception Star Luster initially received mixed reviews and struggled to gain sales. The game's lack of popularity has been blamed on its complex design, which relies heavily on random encounters and obtuse level objectives that, at the time, were seen as too confusing and esoteric for a console game. Critics also believed producing the game for the Famicom, a game console targeted primarily towards children, was a factor in Star Lusters poor commercial reception. A reviewer for Family Computer Magazine highlighted the game's usage of a radar and 3D perspective. They believed the radar was difficult to understand at first, but overtime the player would become used to it. Retrospective reviews of Star Luster have labeled it a masterpiece. Yuge believed the first-person viewpoint was impressive for the time, and highlighted the game's sense of tension and Star Wars-esque presentation. The magazine believes the game's first-person perspective was what led to the game's initial mixed reception, as it was considered too advanced for the time. Continue writer Zenji Ishii considers Star Luster important and influential for the space combat simulator genre, with a high level of action and strategy. Legacy In 1998, the game was included on a compilation made for the PlayStation known as Namco Anthology 1 where, like all of the Famicom games presented on the disc, an enhanced arrange mode was provided alongside the unaltered original game. The Famicom version was later included in the Japanese version of Nintendo and Namco's Star Fox Assault, and was released for the Wii Virtual Console in Japan on March 4, 2008. A sequel, Star Ixiom, was released for the PlayStation in 1999 for Japa
https://en.wikipedia.org/wiki/Mystery%20Tower
is a puzzle-platform video game developed and published by Namco for the Family Computer in Japan on July 18, 1986. It was released on the Wii U Virtual Console in 2014. While the game remained exclusive to Japan for several years, it received its first worldwide release in June 5 2023 via Nintendo Switch Online, under the name Mystery Tower. The game's goal is to solve the puzzle of each of the 64 levels of the ancient Tower of Babel and reach the top of the tower. The player controls the protagonist, Indy Borgnine, who must avoid enemies while rearranging L-shaped blocks in order to reach each level's exit. Development was done by Namco, and the project was planned by Hiroshima Nagashima, who had worked on the company's arcade game Sky Kid (1985), the music was by Norio Nakagata, and the character design was by Hiroshi Fuji. Gameplay The player controls Indy Borgnine through 64 levels, using L-shaped blocks and vines in order to reach the exit of each level. On some levels, the exit is blocked by a mask, and there are crystal balls throughout the level. If all of the crystal balls on a level are collected, then the mask covering that level's exit will disappear, and the exit will no longer be blocked. When the exit of a level is reached, a screen is displayed showing the score achieved on that level before the character moves on to the next level. In the top right corner of the screen there is a power count. Lifting an L-shaped block causes the power count to go down by 1. Items will occasionally spawn while the player goes through the tower. The items are: Pots (100 points and add 1 to power count) Crowns (200 points) Jewels (400 points and invincibility; enemies killed while invincible are worth 1000 points) Lamps (1000 points and enable Indy Borgnine to pass through L-shaped blocks) Stars (increase Indy Borgnine's speed) Plot Archaeologist and explorer Indy Borgnine is in search of the fabled Hanging Gardens of Babylon. After reading some lost scriptures, he determines that the only way to see them is to travel to the very top of the 64-story Tower of Babel from the Book of Genesis of the Old Testament. Upon reaching the Tower, he discovers that the only way to access the floors above him are to solve some challenging puzzles involving loose L-shaped blocks that he finds throughout the Tower. To his great surprise, the blocks are capable of balancing very well on top of one another, in order to form staircases. Notes References 1986 video games Nintendo Entertainment System games Namco games Puzzle-platform games Video games developed in Japan Virtual Console games Virtual Console games for Wii U Nintendo Switch Online games Tower of Babel Hanging Gardens of Babylon
https://en.wikipedia.org/wiki/Lake%20Wood%20%28Philippines%29
Lake Wood (Subanen: Danaw) is a lake located in the province of Zamboanga del Sur in Mindanao island, southern Philippines. References External links Geographic data related to Lake Wood (Philippines) at OpenStreetMap Wood Landforms of Zamboanga del Sur
https://en.wikipedia.org/wiki/Francis%20O%27Leary
Francis Aloysius O'Leary MBE (18 June 1931 – 4 October 2000) was an English Roman Catholic priest and missionary who founded the St Joseph's Hospice Association, an international network of hospices known as Jospice. O'Leary was awarded the membership in Order of the British Empire (MBE) in 1996. Life Francis Aloysius O'Leary was born 18 June 1931 in Crosby, Liverpool, England, the youngest of three children. At the age of 11, O'Leary entered the seminary of Mill Hill Fathers at Freshfield. He later attended seminaries at Burn Hall, County Durham, and St Joseph's College in Roosendaal, Netherlands. O'Leary was ordained on 8 July 1956. After earning a post-graduate degree from the University of Glasgow in 1960, he was posted to Pakistan. O'Leary was assigned as a missionary in Rawalpindi, Pakistan. In 1962, while attending to a sick woman in an empty mud hut, O'Leary realized the need for a hospice care facility. In 1964, he opened the first hospice in Rawalpindi. After receiving advice from Mother Teresa, O'Leary obtained loans and donations to establish more facilities. O'Leary established several hospices in Peru, Colombia, Ecuador, Honduras and Guatemala. He also founded three facilities in England. In 1973, O'Leary was the subject of the British television program This Is Your Life when he was surprised by Eamonn Andrews. He was awarded the 1974 Daniel Carrion Medal for his medical work in Peru. In 1996, O'Leary was awarded an MBE membership. O'Leary died on 4 October 2000, at the age of 69. The leader of England's Roman Catholics, Archbishop Vincent Nichols was a cousin of Father O'Leary, and is current president of the Jospice organisation. References External links Jospice website 1931 births 2000 deaths People from Crosby, Merseyside 20th-century English Roman Catholic priests Members of the Order of the British Empire English people of Irish descent Clergy from Liverpool British expatriates in Pakistan
https://en.wikipedia.org/wiki/Aaron%20Bobick
Aaron F Bobick is dean of the McKelvey School of Engineering at Washington University in St. Louis. Bobick’s research is in the field of artificial intelligence and computer vision. He has chaired and published papers in top-tier academic conferences in these areas. His research and expert opinions on technology have also been reported in major news sources. Biography Education Bobick has received his undergraduate degrees in 1981 in Mathematics and Computer Science from the Massachusetts Institute of Technology. Following this, Bobick received his Ph.D. (1987), in Cognitive Science, also from MIT. Research career Upon receiving his Ph.D. from the Massachusetts Institute of Technology, Bobick worked at the MIT Media Lab as an assistant and associate professor until he left to accept a position as an associate professor at the Georgia Institute of Technology in the College of Computing. After arriving at Georgia Tech, Bobick served as the director of the GVU Center, a center focussed initially on graphics, visualization and usability in computer science, and in 2007 became the first chair of the new School of Interactive Computing. Among Bobick’s accomplishments is KidsRoom, an immersive entertainment and learning environment that was a featured exhibit in the Millennium Dome. His expertise in using computer vision techniques to recognize people has received international attention in the popular press, including the BBC News and ABC News. Research interests Bobick's research lies generally in the fields of Artificial Intelligence (AI) and computer vision. However, his research has also included research in the area of ubiquitous computing with a particular focus on smart home environments and living laboratories. See also References External links Bobick's Academic Home Page Computational Perception Lab Living people Georgia Tech faculty American computer scientists Year of birth missing (living people) Massachusetts Institute of Technology alumni Washington University in St. Louis faculty Massachusetts Institute of Technology faculty
https://en.wikipedia.org/wiki/Caging%20%28direct%20mail%29
A caging list, in the direct mail industry, is a list or database of addresses that is updated after a mailing program is completed, with notations on responses and corrections for addresses whose mail has been returned as undeliverable or has been forwarded. In third-party direct mail fundraising, a caging agent receives contributions, processes donor mail and "deposits all contributions to the client's account" according to Eberle Associates, a US direct mail and political fundraising firm. The Association of Fundraising Professionals similarly defines caging as "the process or act of collecting donations by an entity other than the not-for-profit organization for which they were solicited." Often, the processing of responses to direct mail is conducted by a third party hired to perform various services, which may include processing payments, compiling product orders, correcting recipient addresses, processing returned mail, providing lockbox services, and depositing funds and the associated data processing for each of these services. Caging is a shorthand term for the service bundle. The term may be a derivative of the financial teller cage since operations related to lockbox services involve the control and protection of funds. The personal information gathered about respondents may be even more valuable than the donations received or purchases made. Mal Warwick Associates explains that "caging" allows an organization to exploit "information that can be gleaned" from a direct mail campaign: "Information from the caging process is often massaged and manipulated six ways from Sunday, all in hopes of finding a productive new mailing list, marginally improving a letter's results, or cutting its cost by a few pennies." Direct Magazine adds that caging is also called "secure response management." The quality of response data and how the data might be used are directly proportional to pre-mail planning, which includes labor-saving devices like matched barcodes and other methods for "all digital workflow." References Direct marketing Electronic mailing lists
https://en.wikipedia.org/wiki/NNPDF
NNPDF is the acronym used to identify the parton distribution functions from the NNPDF Collaboration. NNPDF parton densities are extracted from global fits to data based on a combination of a Monte Carlo method for uncertainty estimation and the use of neural networks as basic interpolating functions. Methodology The NNPDF approach can be divided into four main steps: The generation of a large sample of Monte Carlo replicas of the original experimental data, in a way that central values, errors and correlations are reproduced with enough accuracy. The training (minimization of the ) of a set of PDFs parametrized by neural networks on each of the above MC replicas of the data. PDFs are parametrized at the initial evolution scale and then evolved to the experimental data scale by means of the DGLAP equations. Since the PDF parametrization is redundant, the minimization strategy is based in genetic algorithms as well as gradient descent based minimizers. The neural network training is stopped dynamically before entering into the overlearning regime, that is, so that the PDFs learn the physical laws which underlie experimental data without fitting simultaneously statistical noise. Once the training of the MC replicas has been completed, a set of statistical estimators can be applied to the set of PDFs, in order to assess the statistical consistency of the results. For example, the stability with respect PDF parametrization can be explicitly verified. The set of PDF sets (trained neural networks) provides a representation of the underlying PDF probability density, from which any statistical estimator can be computed. Example The image below shows the gluon at small-x from the NNPDF1.0 analysis, available through the LHAPDF interface Releases The NNPDF releases are summarised in the following table: All PDF sets are available through the LHAPDF interface and in the NNPDF webpage. External links The NNPDF Collaboration homepage Download NNPDF Parton Distribution sets The NNPDF1.0 analysis The NNPDF Non-Singlet analysis NNPDF3.1 release NNPDF latest fitting code The LHAPDF interface Computational particle physics Physics software
https://en.wikipedia.org/wiki/DXBL
DXBL (95.7 FM), broadcasting as Mellow Touch 95.7, is a radio station owned and operated by FBS Radio Network. The station's studio and transmitter are located at the 3rd Floor, TS Midpoint Hub, Corrales Ave., Cagayan de Oro. The station was an affiliate of Brigada News FM from 2012 to September 2014. References FBS Radio Network Radio stations in Cagayan de Oro Adult contemporary radio stations in the Philippines Radio stations established in 1992
https://en.wikipedia.org/wiki/Plot%20%28graphics%29
A plot is a graphical technique for representing a data set, usually as a graph showing the relationship between two or more variables. The plot can be drawn by hand or by a computer. In the past, sometimes mechanical or electronic plotters were used. Graphs are a visual representation of the relationship between variables, which are very useful for humans who can then quickly derive an understanding which may not have come from lists of values. Given a scale or ruler, graphs can also be used to read off the value of an unknown variable plotted as a function of a known one, but this can also be done with data presented in tabular form. Graphs of functions are used in mathematics, sciences, engineering, technology, finance, and other areas. Overview Plots play an important role in statistics and data analysis. The procedures here can broadly be split into two parts: quantitative and graphical. Quantitative techniques are a set of statistical procedures that yield numeric or tabular output. Examples of quantitative techniques include: hypothesis testing analysis of variance point estimates and confidence intervals least squares regression These and similar techniques are all valuable and are mainstream in terms of classical analysis. There are also many statistical tools generally referred to as graphical techniques. These include: scatter plots spectrum plots histograms probability plots residual plots box plots, and block plots Graphical procedures such as plots are a short path to gaining insight into a data set in terms of testing assumptions, model selection, model validation, estimator selection, relationship identification, factor effect determination, outlier detection. Statistical graphics give insight into aspects of the underlying structure of the data. Graphs can also be used to solve some mathematical equations, typically by finding where two plots intersect. Types of plots Biplot : These are a type of graph used in statistics. A biplot allows information on both samples and variables of a data matrix to be displayed graphically. Samples are displayed as points while variables are displayed either as vectors, linear axes or nonlinear trajectories. In the case of categorical variables, category level points may be used to represent the levels of a categorical variable. A generalised biplot displays information on both continuous and categorical variables. Bland–Altman plot : In analytical chemistry and biostatistics this plot is a method of data plotting used in analysing the agreement between two different assays. It is identical to a Tukey mean-difference plot, which is what it is still known as in other fields, but was popularised in medical statistics by Bland and Altman. Bode plots are used in control theory. Box plot : In descriptive statistics, a boxplot, also known as a box-and-whisker diagram or plot, is a convenient way of graphically depicting groups of numerical data through their five-number summaries
https://en.wikipedia.org/wiki/M%C3%BCgeln%20railway%20network
The gauge Mügeln railway network (Mügelner Netz) was a network of narrow gauge lines in Saxony, eastern Germany, running between Oschatz, Döbeln, Neichen, Strehla and Lommatzsch, whose operational hub was at Mügeln. The routes were built primarily to reach the rural hill country of central Saxony. Mügeln station was once one of the largest narrow gauge railway stations in Europe. Routes Oschatz–Mügeln–Döbeln; *1884 (Mügeln–Döbeln closed in 1964/1968) Mügeln–Nebitzschen–Neichen; 1888–1972 (Mügeln–Glossen still working) Nebitzschen–Kemmlitz–Kroptewitz; 1903–1967 (Nebitzschen–Kemmlitz still working) Oschatz–Strehla; 1891–1972 Meißen-Triebischtal–Lommatzsch; 1909–1966/72 Lommatzsch–Döbeln; 1911–1970 History On 7 January 1885 the first section of the route between Mügeln and Oschatz was opened. In 1920 it was taken over by the Deutsche Reichsbahn. The survival of the Kemmlitz–Mügeln–Oschatz line since 1975 is mainly thanks to the transportation of kaolin. In November 1993 the Deutsche Reichsbahn transferred the remaining section of line to the newly founded private railway company, Döllnitzbahn. This had been formed in 1993 as the result of an initiative by the district of Torgau-Oschatz and the passenger association, Pro Bahn. The primary aim of the company was initially the preservation of the existing goods traffic from the kaolin mine in Kemmlitz. For that purpose, second-hand, narrow gauge, goods wagons were bought from the Mansfeld mining railway and a new transshipment site to the standard gauge railway network was built in Oschatz. With the help of used PKP diesel locomotives, they succeeded initially in keeping the goods traffic going. In spite of this, the demand gradually fell so that goods services had to be closed in 2001. The Döllnitzbahn was the last narrow gauge railway in Saxony to run public freight services. Förderverein Wilder Robert The Förderverein Wilder Robert ('Society for the Promotion of the 'Wild Robert') was founded in 1994 with the aim of preserving the historic sites and vehicles of the so-called Wilder Robert or 'Wild Robert' line. To begin with the society's sphere of activity was the running of special trips with the existing, operational vehicle fleet using, amongst others, the Saxon IV K steam locomotives, nos. 99 561, 99 574 and 99 584. With the help of ABM and local firms, members of the society gradually began to restore the distinctive buildings along the narrow gauge railway. These included the Mügeln goods shed, the first-aid building, signal box I and the railway maintenance building. The society's biggest achievement was the rebuilding of the Nebitzschen–Glossen line with the assistance of the village of Sornzig-Ablass. Progress has been made on the vehicle front too. The Saxon IV K, numbers 99 561 and 99 574 underwent their general inspections in 2001-2003 and 2006-2007 respectively. Even wagons were refurbished; the heavy luggage van 970-277 being completed in 2001. It was followed by the
https://en.wikipedia.org/wiki/Geert%20Lovink
Geert Lovink (born 1959, Amsterdam) is the founding director of the Institute of Network Cultures, whose goals are to explore, document and feed the potential for socio-economical change of the new media field through events, publications and open dialogue. As theorist, activist and net critic, Lovink has made an effort in helping to shape the development of the web. Since 2004 Lovink is a researcher at the Faculty of Digital Media and Creative Industries at the Hogeschool van Amsterdam (HvA) where he heads the Institute of Network Cultures. From 2007 till 2017 he was a Professor of Media Theory at the European Graduate School where he supervised five PhD students. From 2004-2013 he was an Associate Professor of New Media at the University of Amsterdam (UvA). In December 2021 he was appointed Professor of Art and Network Cultures at the UvA Art History Department. The Chair (one day a week) is supported by the HvA. Lovink earned his master's degree in political science at the University of Amsterdam, holds a PhD from the University of Melbourne and has been a postdoctoral fellow at the University of Queensland. Activities Since the early eighties, Lovink has been involved in a range of different projects and initiatives in the field of new media. 1983 Member of Adilkno 1989–94 Editor for the media art magazine Mediamatic 1993 Co-founder of the support campaign for independent media in South-East Europe Press Now 1994 Co-founder of the Amsterdam-based free community network Digital City (DDS) 1994 Co-founder of the internet workspace and content provider for the arts desk.nl. 1995 Co-founder (together with Pit Schultz) of the international nettime circle 1996–99 Public researcher at the Society for Old and New Media, De Waag 1996 Coordinating projects and teaching once a year at the IMI mediaschool in Osaka/Japan 2000 organizer of the Tulipomania Dotcom conference 2000–08 Consultant/editor to the exchange program of Waag Society and Sarai New Media Centre (Delhi) 2001 Co-founder of FibreCulture, a forum for Australian Internet research and culture 2002 Co-organizer of Dark Markets, on new media and democracy in times of crisis in Vienna 2003 Co-organizer of Uncertain States of Reportage in Delhi 2004 Co-organizer (together with Trebor Scholz) of the conference on the art of (online) collaboration Free Cooperation at SUNY Buffalo On 31 May 2010 Geert Lovink took part in Quit Facebook Day and deleted his Facebook account. In 2020 two text archives of Geert Lovink were preserved and transferred to the INC website: The Adilkno/Bilwet archive, once hosted by desk.nl (1990-1999): https://networkcultures.org/bilwet-archive/ and the text archive of geertlovink.org (2000-2010): https://networkcultures.org/geertlovink-archive/. Theories Geert Lovink was one of the key theorists behind the concept of tactical media – the use of media technologies as a tool for critical theory to become artistic practice. As an Internet activist, he descr
https://en.wikipedia.org/wiki/GenICam
GenICam (abbreviated for Generic Interface for Cameras) is a generic programming interface for machine vision (industrial) cameras. The goal of the standard is to decouple industrial camera interfaces technology (such as GigE Vision, USB3 Vision, CoaXPress or Camera Link) from the user application programming interface (API). GenICam is administered by the European Machine Vision Association (EMVA). The work on the standard began in 2003 and the first module in GenICam, i.e., GenApi, was ratified in 2006 whereas the final module, i.e., GenTL was ratified in 2008. Many companies in the machine vision industry have contributed to the standard. The main companies involved in drafting the GenICam standards are: Adimec Allied Vision Technologies Basler AG Baumer DALSA e2v semiconductors Teledyne FLIR (formerly known as Point Grey Research Inc. which FLIR Systems Inc. acquired in 2016) JAI A/S Leutron Vision MATRIX VISION Matrox Imaging MVTec Software National Instruments Pleora Stemmer Imaging Because many companies were involved in drafting the GenICam standard, and because of the potential benefits it seemed to offer, some camera manufacturers have already started to use GenICam in their products. However, many who helped develop the standard still use a proprietary SDK. For instance FLIR uses the Spinnaker SDK (https://www.ptgrey.com/spinnaker-sdk). GenICam consists of three modules to help solving the main tasks in machine vision field in a generic way. These modules are: GenApi: Using an XML description file, this is used to configure the camera and details how to access and control cameras; Standard Feature Naming Convention (SFNC): This is the recommended names and types for common features in cameras to promote interoperability; GenTL: This is the transport layer interface for enumerating cameras, grabbing images from the camera, and moving them to the user application. GenICam provides support for five basic functions: Configuring the camera—This function could support a range of camera features such as frame size, acquisition speed, pixel format, gain, image offset, etc. Grabbing images—This function will create access channels between the camera and the user interface and initiates receiving images Graphical user interface—This function enables user GUI interface to seamlessly talk to the camera(s) Transmitting extra data—This function enables cameras to send extra data on top of the image data. Typical examples could be histogram information, time stamp, area of interest in the frame, etc. Delivering events—This function enables cameras to talk to the application through an event channel. External links EMVA GenICam Standard References Image sensor technology in computer vision
https://en.wikipedia.org/wiki/Mini%20PC
A nettop (or miniature PC, Mini PC or Smart Micro PC) is a small-sized, inexpensive, low-power, legacy-free desktop computer designed for basic tasks such as web browsing, accessing web-based applications, document processing, and audio/video playback. The word nettop is a portmanteau of network and desktop. It is the desktop counterpart of the netbook. Modern ( 2020) mini PCs or small form factor PCs can be much more powerful, being equipped with high-end laptop components or mid-range desktop components. Compared with ordinary desktop computers, nettops are not only smaller and less expensive, but they also consume much less power. For example, CompuLab's fit-PC2 consumes no more than 8 watts of power whereas a typical desktop would easily consume more than 100 watts of power; consequently, nettops require significantly less cooling and may even be completely fanless. Some do not have an optical disk drive and use a solid state drive, making them completely silent. The tradeoff is that the hardware specifications and processing power are usually reduced and hence make nettops less appropriate for running complex or resource-intensive applications. History During the "first wave" of mini PC devices, which occurred in the mid to late 2000s, they were commonly referred to as "nettops". These included devices such as the Acer AspireRevo seen above, and were commonly considered to be a kind of "temporary substitute" PC of a lower cost for users needing a second PC or for use in developing countries. Another commonly held view at the time was their use as a stepping stone towards a thin-client–based always online computer that would "replace inefficient PCs". Netbooks as predecessors As demand for these devices quickly waned, the industry responded by addressing the chief complaint that these devices would be better as portable devices such as a new form of laptop. The result was the netbook, a device which was considered the true future of the nettop. However, prevailing attitudes and economic issues in 2008 onward made these popular due to their low cost and portability along with the then-expanding feature-set. In August 2009, reports from reviewers were that a netbook of the time and a traditional laptop of the same price were otherwise identical. The direct lineage between netbooks and nettops meant that the concept of a "net-" prefix was considered a failed idea. Devices such as Chromebooks, tablet PCs, Ultrabooks and other devices responded by branding themselves as a different type of device such as ChromeOS being exclusively a pure web client or the proposal that the ultrabook succeeded by compensating for its lighter weight and otherwise equal-performance parts with a higher price tag, but in 2015, a revival of the concept came about from a likely unrelated source, a technological form of convergent evolution. Via the likely-observed success of the stick PC, the idea of combining a system on a chip with a single-board computer has
https://en.wikipedia.org/wiki/RHE
RHE may refer to: Reversible hydrogen electrode Rachel Held Evans Remote Hands & Eyes in a datacenter
https://en.wikipedia.org/wiki/Snap%20%28computer%20graphics%29
In computer graphics, snapping allows an object to be easily positioned in alignment with grid lines, guide lines or another object, by causing it to automatically jump to an exact position when the user drags it to the proximity of the desired location. Some CAD software provides a "Snap" pull-down menu with diverse options as preferences for the practice of the operation. In Windows, with the option snap enabled, vertical positioning of a window against the top edge of the screen causes it to change into full screen. Computer graphics
https://en.wikipedia.org/wiki/List%20of%20awards%20and%20nominations%20received%20by%20Kate%20Nash
Kate Nash is an English singer-songwriter from London, England. She debuted in 2005, uploading several demos to the social networking service Myspace. Nash released her debut single "Caroline's a Victim" through independent record label Moshi Moshi Records in February 2007. The release brought her to the attention of Fiction Records, which signed her two months later. She has released three studio albums: Made of Bricks (2007), My Best Friend Is You (2010) and Girl Talk (2013). Made of Bricks reached number one in the United Kingdom and was certified platinum by the British Phonographic Industry (BPI). My Best Friend Is You charted at number eight in the UK, while Girl Talk peaked at number eighty-five. Nash's debut studio album earned her several recognitions, including the BRIT Award for British Female Solo Artist, the ASCAP Vanguard Award and the Q Award for Breakthrough Artist. The album's lead single, "Foundations", received three nominations and won a UK Music Video Award for Best Pop Video. She has also been recognized by the Elle Style Awards, the NME Awards and the Vodafone Live Music Awards. As of 2013, Nash has received eight awards from fifteen nominations. ASCAP Awards The annual ASCAP Awards honor members of the UK performance rights organization PRS, who are licensed by the American Society of Composers, Authors and Publishers (ASCAP) in the United States. Nash has received one award from one nomination. BRIT Awards The BRIT Awards are the British Phonographic Industry's (BPI) annual pop music awards. Nash has received one award from three nominations. Elle Style Awards The Elle Style Awards are hosted annually by lifestyle magazine Elle. Nash has received one award from one nomination. Ivor Novello Awards The Ivor Novello Awards, named after the Cardiff-born entertainer Ivor Novello, are awards for songwriting and composing. Nash has received one award from one nomination. NME Awards The NME Awards are an annual music awards show founded by the music magazine NME. Nash has received two awards from three nominations. NME Awards USA Q Awards The Q Awards are the UK's annual pop music awards run by the music magazine Q to honor musical excellence. Winners are voted by readers of Q. Nash has received one award from one nomination. UK Music Video Awards The UK Music Video Awards recognize "creativity and technical excellence" in music videos made within the United Kingdom. Nash has received one award from one nomination. Vodafone Live Music Awards The Vodafone Live Music Awards honor the best live performers in the UK. Nash has received one award from two nominations. References External links Nash, Kate Nash, Kate
https://en.wikipedia.org/wiki/Trading%20strategy%20index
Strategy indices are indices that track the performance of an algorithmic trading strategy. The algorithm clearly and transparently specifies all the actions that must be taken. The following are examples of algorithms that strategies can be based on. Pairs trading strategy. This strategy examines pairs of instruments that are known to be statistically correlated. For example, consider Shell and Exxon. Both are oil stocks and are likely to move together. Knowledge of this trend creates an opportunity for profit, as on the occasions when these stocks break correlation for an instant, the trader may buy one and short sell the other at a premium. Fed funds curve strategy This strategy takes a view on the shape of the curve based on the actions of the Fed. In this strategy, one puts on a steepener or flattener, based on whether the Federal Reserve has cut the benchmark rate or raised it. This is based on the conventional wisdom that the curve steepens when the rate is expected to be cut, and vice versa. Implied volatility against realized volatility . In a number of markets such as commodities and rates, the implied volatility, as implied by straddle prices is higher than the realized volatility of the underlying forward. One way to 'exploit' this is to sell a short expiry (e.g. 1 month) straddle and delta-hedging it until it is alive. The strategy makes money if at expiry, the sum of the premium received (and accrued at money market), the (negative) final value of the straddle and the (positive/negative) value of the forwards (entered into to delta-hedge the straddle) is greater than zero. A variation of this, and more common solution in equity, is to sell either a one-month or three-month variance swap – usually on the Eurostoxx 50E or S&P500 index – that pays a positive performance if the implied volatility (strike of the swap) is above the realised volatility at expiry; in this case there is no need to delta-hedging the underlying movements. Selling strategy indices These indices have been sold under the following premises, which need not be always true, They offer a new asset class that is uncorrelated to conventional asset classes such as equities, bonds and commodities. Compared to hedge funds and mutual funds, these strategies are very transparent and the client can buy them only if they like the idea behind the strategy. Some types of strategies also benefit from accounting reasons, for instance, in Germany, Notes linked to interest rates can be issued in the "Schuldschein"-format. This enables interest rate linked strategies to be issued as "Schuldschein". Trades that can be structured on these indices Asset Side: These trades are usually structured for institutional clients looking to invest their money in a different asset class. A typical trade would involve leveraged returns on an index with a floor on the performance. Liability Side: These trades are aimed at corporate clients, such as midsize companies and banks looking for way
https://en.wikipedia.org/wiki/Grand%20Central%20Station%20%28radio%20series%29
Grand Central Station was an American anthology radio series that had a long run on the major networks from 1937 to 1954. Produced by Himan Brown, Martin Horrell and others, the story content ranged from romantic comedies to lightweight dramas. The program debuted on September 28, 1937, on NBC. Each program opened with an announcer intoning that Grand Central was "the crossroads of a million private lives, a gigantic stage on which are played a thousand dramas daily." Actors included Jim Ameche and Hume Cronyn. The announcers were George Baxter, Ken Roberts and Tom Shirley. The programs were narrated by Jack Arthur, Stuart Metz and Alexander Scourby. When some listeners noted that steam engines, the sounds of which were heard during the broadcasts, no longer frequented the terminal, Brown responded: "You have your own Grand Central Station." In 1952 a half-hour television pilot was created but was not picked up. The episode starred Mercedes McCambridge, with supporting roles by Kirby Grant and Parley Baer. It was produced by Don W. Sharpe, who copyrighted the film. It began with a montage of trains chugging into Manhattan and the same words that had opened the radio program. The show's title was factually erroneous; Grand Central is actually a terminal, not a station. Brown claimed that the New York Central Railroad would not allow him to use the actual name. References American radio dramas 1930s American radio programs 1940s American radio programs 1950s American radio programs NBC Blue Network radio programs NBC radio programs CBS Radio programs ABC radio programs Anthology radio series
https://en.wikipedia.org/wiki/Communications%20Data%20Bill%202008
The Communications Data Bill was intended to create powers to collect data concerning people's phone, e-mail and web-browsing habits for mass surveillance in the United Kingdom. The government database would have included telephone numbers dialed, the websites visited and addresses to which e-mails are sent but not the text of e-mails or recorded telephone conversations. Since October 2007 telecommunication companies have been required to keep records of phone calls and text messages for twelve months. The bill would have extended the coverage to Internet website visited, email messages, and VOIP data. Chris Huhne, Liberal Democrat Home affairs spokesman said at the time: "The government's Orwellian plans for a vast database of our private communications are deeply worrying." The plans were not completed during the Labour administration, but intentions to gain access to more communications data lived on under the coalition elected in 2010 as the Communications Capabilities Development Programme run by the Home Office's Office for Security and Counter-Terrorism. In 2012, a new Draft Communications Data Bill was published. See also Interception Modernisation Programme Mass surveillance in the United Kingdom References Surveillance Government databases in the United Kingdom Law enforcement techniques Counterterrorism in the United Kingdom Mass surveillance National security policies Proposed laws of the United Kingdom Surveillance databases 2008 in British law Home Office (United Kingdom) GCHQ
https://en.wikipedia.org/wiki/Aeronautical%20Telecommunication%20Network
The Aeronautical Telecommunication Network (ATN) is an internetwork architecture that allows ground/ground, air/ground, and avionic data subnetworks to interoperate by adopting common interface services and protocols based on the ISO OSI Reference Model. The European part of ATN used for ground/ground communications is represented by PENS. See also Aircraft Communications Addressing and Reporting System (ACARS) DO-219 DO-232 Future Air Navigation System (FANS) References Aircraft instruments Avionics Air traffic control
https://en.wikipedia.org/wiki/Ron%20Kuivila
Ron Kuivila (born December 19, 1955) is an American sound artist from Boston, MA. He is primarily known for his sound installations, performances, and recorded materials that make use of computers, and for his contributions to the SuperCollider audio programming language. Biography Kuivila studied under Alvin Lucier at Wesleyan University and graduated with a B.A. in Music and a B.A. in Mathematics in 1977. He went on to receive his MFA from Mills College, studying under Robert Ashley and David Behrman. Kuivila released sound pieces as part of the Tellus Audio Cassette Magazine compilations as well as through Sonic Arts and Lovely Music. In the 1990s Kuivila and David P. Anderson were responsible for creating the software language Formula, which has been used by David Behrman. He currently teaches classes in Experimental Music, Computers in Music, and Studio Recording at Wesleyan University, where he served as the chair of the music department. Kuivila received a 2008 Foundation for Contemporary Arts Grants to Artists Award. In May 2011, he was named University Professor of Music. He currently works with the open-source software SuperCollider. His works have been installed at the DeCordova Museum, Diapason Gallery, the San Francisco Art Institute, the Los Angeles Institute of Contemporary Art, Media Study/Buffalo, 80 Langton Street, and MoMA PS1. He has performed at The Kitchen, MoMA PS1, PASS, The Experimental Intermedia Foundation, and Bilhaud Gallery. Discography Linear Predictive Zoo on Tellus #22 False Phenomes, 1988 Blurred Genres, Slowscan, Vol. 6, 1986 Cannon Y for C.N. on Tellus #9, 1985 Parodicals on Tellus #9, 1985 Fidelity, Lovely Music, Ltd. LP 1722, 1985 TI Intends... (to enforce its intellectual property rights to the fullest extent permitted by law) on Tellus #2, 1984 Going Out with Slow Smoke, Lovely Music, Ltd. LP 1701, 1982 References External links soundartarchive.net discogs.com Short Biography on framework.v2.nl and v2.nl Ron Kuivila @ Lovely Records decordova.org diapasongallery.org foundationforcontemporaryarts.org 1955 births Living people American male classical composers American classical composers American writers about music Experimental composers Wesleyan University alumni Wesleyan University faculty American sound artists 20th-century American composers 20th-century American male musicians
https://en.wikipedia.org/wiki/Adaptive%20switching
An adaptive switch is a network switch designed to normally operate in cut-through mode but if a port's error rate jumps too high, the switch automatically reconfigures the port to run in store-and-forward mode. This optimizes the switch's performance by providing higher speed cut-through switching if error rates are low but higher throughput store-and-forward switching when error rates are high. Adaptive switching is typically done on a port-by-port basis. References Networking hardware
https://en.wikipedia.org/wiki/Belene%20labour%20camp
The Belene labour camp, also referred to as Belene concentration camp, was part of the network of forced labour camps in Communist Bulgaria. It was located on the Belene Island, between two branches of the Danube river. At the height of Valko Chervenkov's repressions in 1952, the camp had 2,323 inmates - 2,248 men and 75 women. The Belene Prison is still operating as a penitentiary in the western part of the island, while the eastern part is a managed natural reserve. This camp operated officially from 1949 to 1959, though a break in deportations to Belene occurred from 1954 to 1956. Between 1985 and 1989 Turks in Bulgaria who resisted the policy of changing Turkish names and surnames to Bulgarian ones, (see Assimilation Campaign in Bulgaria) were imprisoned in the prison on Belene. During those years, the Turkish Radio and Television Corporation broadcast a series named "Belene Adası" (Belene Island) on the policies of the Bulgarian government against Bulgarian Turks. From 1949 onward, Evangelical Christian pastors in particular were targeted as "enemies of the State" and sent to Belene. In 1949, the infamous "Pastors' Trial" was conducted, trying 13 Protestant pastors as "spies". The men received sentences of varying lengths. Haralan Popov, who survived and later founded the mission "Door of Hope International" to bring Bibles behind the Iron Curtain, published his autobiography under the Bulgarian title "The Bulgarian Golgotha". It was later released in English as "Tortured for His Faith". The camp and some its survivors were the subject of a documentary film by German TV program ZDF Vorwärts aber nie vergessen - Ballade über bulgarische Helden "Moving on, but Never Forgetting - A Ballad of Bulgarian Heroes" directed and authored by Ilija Trojanow. Notable inmates Haralan Popov (1949-1962) Konstantin Muraviev (1956-1961) Lea Ivanova (Late 70s) Stoyko Kavrukov (Kavrukov and Perinchev-only successful escape-1953) Belene-The Island of the Forgotten by Nedyalko Geshev, published in Belgium - 1983 Atanas Perinchev (Kavrukov and Perinchev-only successful escape-1953) Belene-The Island of the Forgotten by Nedyalko Geshev, published in Belgium - 1983 In popular culture David, from I Am David escapes from Belene in 1952. However the camp shown in the film doesn't resemble the real Belene camp, as it is located inland in a mountainous area rather than on a river island. References Belene Political repression Unfree labour by country Buildings and structures in Pleven Province People's Republic of Bulgaria Persecution of Balkan Turks
https://en.wikipedia.org/wiki/Variable%20shadowing
In computer programming, variable shadowing occurs when a variable declared within a certain scope (decision block, method, or inner class) has the same name as a variable declared in an outer scope. At the level of identifiers (names, rather than variables), this is known as name masking. This outer variable is said to be shadowed by the inner variable, while the inner identifier is said to mask the outer identifier. This can lead to confusion, as it may be unclear which variable subsequent uses of the shadowed variable name refer to, which depends on the name resolution rules of the language. One of the first languages to introduce variable shadowing was ALGOL, which first introduced blocks to establish scopes. It was also permitted by many of the derivative programming languages including C, C++ and Java. The C# language breaks this tradition, allowing variable shadowing between an inner and an outer class, and between a method and its containing class, but not between an if-block and its containing method, or between case statements in a switch block. Some languages allow variable shadowing in more cases than others. For example Kotlin allows an inner variable in a function to shadow a passed argument and a variable in an inner block to shadow another in an outer block, while Java does not allow these. Both languages allow a passed argument to a function/Method to shadow a Class Field. Some languages disallow variable shadowing completely such as CoffeeScript. Example Lua The following Lua code provides an example of variable shadowing, in multiple blocks. v = 1 -- a global variable do local v = v + 1 -- a new local that shadows global v print(v) -- prints 2 do local v = v * 2 -- another local that shadows outer local v print(v) -- prints 4 end print(v) -- prints 2 end print(v) -- prints 1 Python The following Python code provides another example of variable shadowing: x = 0 def outer(): x = 1 def inner(): x = 2 print("inner:", x) inner() print("outer:", x) outer() print("global:", x) # prints # inner: 2 # outer: 1 # global: 0 As there is no variable declaration but only variable assignment in Python, the keyword nonlocal introduced in Python 3 is used to avoid variable shadowing and assign to non-local variables: x = 0 def outer(): x = 1 def inner(): nonlocal x x = 2 print("inner:", x) inner() print("outer:", x) outer() print("global:", x) # prints # inner: 2 # outer: 2 # global: 0 The keyword global is used to avoid variable shadowing and assign to global variables: x = 0 def outer(): x = 1 def inner(): global x x = 2 print("inner:", x) inner() print("outer:", x) outer() print("global:", x) # prints # inner: 2 # outer: 1 # global: 2 Rust fn main() { let x = 0; { // Shadow let x = 1; println!("Inner x: {}", x); // prints 1 } println
https://en.wikipedia.org/wiki/Circumpolar%20Health%20Bibliographic%20Database
The Circumpolar Health Bibliographic Database (CHBD) is a free electronic database of abstracts, citations, geographic and subject indexing, library codes and their links to full text publications, both peer-reviewed and gray literature. Established in 2007, it contains more than sixty five hundred records that describe human health in the circumpolar region. The CHBD is a circumpolar chronic disease prevention project of the Canadian Institutes of Health Research. It is maintained by the University of Calgary in Calgary, Alberta, Canada. The CHBD was initially constructed with records from the Arctic Institute of North America's database. These were mainly northern Canadian records. It is expected to take several years to add non-Canadian records to the CHBD. The Circumpolar Health Observatory, proposed in May 2008 in Norway, would disseminate its data through the CHBD. Funding for the database increased by 50% for the period of 2008-2009. See also International Journal of Circumpolar Health List of academic databases and search engines References External links Official website Arctic research Bibliographic databases and indexes Internet properties established in 2007 University of Calgary Medical databases Databases in Canada
https://en.wikipedia.org/wiki/KJTV%20%28AM%29
KJTV (950 AM, "100.7 The Score") is a Lubbock, Texas, radio station broadcasting with a daytime power of 5,000 watts. Programming includes both local and nationally syndicated sports talk shows. It is owned by Ramar Communications Inc., co-owned with several sister radio stations. Its studios are located at 98th and University in south Lubbock, and its transmitter is in Mackenzie Park east of downtown. History KJTV (as KSEL 950 1,000 watts day, 500 watts night) was the second radio station established in Lubbock, signing on in 1947. KCBD 1590 was third in 1949 and KFYO was the first, established in Lubbock in 1932. In 2010, Ramar Communications purchased FM translator K264AN (100.7 FM) and began simulcasting Fox Talk 950, as permitted under new FCC rules passed in 2009. On July 1, 2013 KJTV was re-branded as "AM 950/100.7 FM Lubbock's News, Talk, Sports". News/Talk and Ag programming air seven days a week from Midnight-3p, with NBC Sports Radio and sports play-by-play airing from 3p-Midnight, seven days a week. On August 7, 2017 KJTV flipped formats from news/talk/sports to all-sports, debuting the branding of "100.7 The Score". Programming includes local shows from Double T 97.3 hosts and national shows from a variety of networks including ESPN Radio, NBC Sports Radio and Sports Byline USA. FM Translator KJTV (AM) uses the FM translator frequency as the main frequency in the logo; the translator is used to widen the broadcast area and to give listeners the ability to listen to the station on FM with better quality sound. External links Ramar Communications Website JTV (AM) Sports radio stations in the United States Radio stations established in 1947 1947 establishments in Texas ESPN Radio stations
https://en.wikipedia.org/wiki/Space%20vector%20modulation
Space vector modulation (SVM) is an algorithm for the control of pulse-width modulation (PWM). It is used for the creation of alternating current (AC) waveforms; most commonly to drive 3 phase AC powered motors at varying speeds from DC using multiple class-D amplifiers. There are variations of SVM that result in different quality and computational requirements. One active area of development is in the reduction of total harmonic distortion (THD) created by the rapid switching inherent to these algorithms. Principle A three-phase inverter as shown to the right converts a DC supply, via a series of switches, to three output legs which could be connected to a three-phase motor. The switches must be controlled so that at no time are both switches in the same leg turned on or else the DC supply would be shorted. This requirement may be met by the complementary operation of the switches within a leg. i.e. if A+ is on then A− is off and vice versa. This leads to eight possible switching vectors for the inverter, V0 through V7 with six active switching vectors and two zero vectors. Note that looking down the columns for the active switching vectors V1-6, the output voltages vary as a pulsed sinusoid, with each leg offset by 120 degrees of phase angle. To implement space vector modulation, a reference signal Vref is sampled with a frequency fs (Ts = 1/fs). The reference signal may be generated from three separate phase references using the transform. The reference vector is then synthesized using a combination of the two adjacent active switching vectors and one or both of the zero vectors. Various strategies of selecting the order of the vectors and which zero vector(s) to use exist. Strategy selection will affect the harmonic content and the . More complicated SVM strategies for the unbalanced operation of four-leg three-phase inverters do exist. In these strategies the switching vectors define a 3D shape (a hexagonal prism in coordinates or a dodecahedron in abc coordinates) rather than a 2D hexagon. General SVM techniques are also available for converters with any number of legs and levels. See also αβγ transform Inverter (electrical) pulse-width modulation References Electrical engineering Control theory
https://en.wikipedia.org/wiki/Melbourne%20Palestine%20Solidarity%20Network
The Melbourne Palestine Solidarity Network (MPSN) are a grouping of individuals, community groups and activists based in Melbourne, Australia. They oppose what they see as Israeli aggression towards not just Palestinians but neighboring countries such as Lebanon. MPSN is known for organising demonstrations and campaigns against Israel and its supporters. References External links Melbourne Palestine Solidarity Network website Non-governmental organizations involved in the Israeli–Palestinian peace process Palestinian solidarity movement
https://en.wikipedia.org/wiki/System%20area%20code
In air traffic control, the system area code (SAC) is part of a unique identifier assigned to each system which uses the ASTERIX format. The Eurocontrol SuRveillance Data Exchange Task Force (RDE-TF) maintains these identifiers internationally and assigns them to regions such as countries, though sometimes more than one code is assigned within the same country, for example to distinguish between civilian and military uses. Within each country, it is the responsibility of the relevant air navigation service provider to allocate a system identification code (SIC); up to 256 of them for each SAC. In the Asterix protocol the SAC/SIC identifies the actual sensor from where the radar information is sent. The information being e.g. plot and track. References External links SAC List (worldwide) Air traffic control
https://en.wikipedia.org/wiki/JAD%20%28software%29
Jad (Java Decompiler) is, , an unmaintained decompiler for the Java programming language. Jad provides a command-line user interface to extract source code from class files. See also Java Decompiler Mocha References External links JAD Softpedia Mirror Java decompilers Disassemblers Software obfuscation
https://en.wikipedia.org/wiki/Matthias%20Finger
Matthias Finger (born in 1955) is Swiss and French political and educational scientist. He was a professor of management of network industries at EPFL (École Polytechnique Fédérale de Lausanne). Career He received his Ph.D. in education in 1986 and his Ph.D. in political science in 1988, both from the University of Geneva. After having been Assistant Professor at Syracuse University, New York (1989-1991) and Associate Professor at Columbia University, New York (1992-1994), Matthias Finger was appointed Full Professor at the Swiss Graduate School of Public Administration (IDHEAP) in Lausanne in 1995. This is where he developed his research on the transformation of the network industries in the postal, the telecommunications, the railways, the electricity, the air transport, and the water sectors. Matthias Finger was appointed Full Professor at the Swiss Federal Institute of Technology in October 2002 and Dean of Continuing Education in May 2003. Prof. Finger was the Academic Program Director of Executive Master in e-Governance and the Dean, School of Continuing Education in College of Management of Technology in EPFL. In July 2020, he retired from his functions at EPFL. Research In his research, he reconciles the liberalization of these sectors with public service objectives by means of new regulatory arrangements, while at the same time promoting a more entrepreneurial behavior of the operators. Selected works References External links Archive website of the MIR Laboratory 1955 births Living people University of Geneva alumni
https://en.wikipedia.org/wiki/European%20route%20E3
European route E3 is a series of roads in France, part of the United Nations International E-road network. It runs from Cherbourg to La Rochelle. Route The road is long, and travels along the French routes nationales. From Cherbourg to Carentan, it travels along the Route nationale 13. At Carentan, it changes to the Route nationale 174. It then moves onto the autoroute, mainly the A84 (which it joins at Junction 40) until it reaches Saint-Lô at Junction 16. It then rejoins the RN, mainly Route nationale 136 at Rennes before finally travelling along the Route nationale 137 to its final destination of La Rochelle. It also comes close to the outskirts of Nantes. Historical trajectory The original trajectory of the E3 ran from Lisbon, Portugal to Stockholm, Sweden, and later to Helsinki, Finland. It was a series of existing secondary roads and highways, officially bundled under the name E3 by European decree on 16 September 1950. In 1975 the numbering system of European roads changed drastically. The name E3 was applied to the part from Cherbourg-La Rochelle to Carentan, which was part of the original E3. The name of the historical trajectory lives on in E3 Harelbeke, a cycling race in Belgium. The route of the old trajectory: – Lisbon – Salamanca – Valladolid – Burgos – Vitoria-Gasteiz – San Sebastián – San Sebastián – Irún – Biarritz – Bayonne – Bordeaux – Bordeaux – Poitiers – Tours – Orléans – Paris – Paris – Arras – Arras – Lille – Kortrijk – Ghent – Antwerp – Antwerp – Turnhout – Eindhoven – Venlo – Duisburg – Duisburg – Osnabrück – Bremen – Bremen – Hamburg – Hamburg – Flensburg – Frøslev – Kolding – Vejle – Aarhus – Aalborg – Frederikshavn – ... – Gothenburg – Gothenburg – Stockholm – Stockholm – Turku – Helsinki Detailed route References External links UN Economic Commission for Europe: Overall Map of E-road Network (2007) E0003 03
https://en.wikipedia.org/wiki/Russell%20A.%20Brown
Russell A. Brown, an American physician and computer scientist, is the inventor of the N-localizer technology that enables guidance of stereotactic surgery or radiosurgery using medical images that are obtained via computed tomography (CT), magnetic resonance imaging (MRI), or positron emission tomography (PET). Brown invented the N-localizer in 1978 when he was a medical student investigating image-guided surgery in the laboratory of his mentor, James A. Nelson, at the University of Utah. A few months later, Brown designed and built the first CT-compatible stereotactic frame in order to test the concept of the N-localizer. Brown also made contributions to the k-d tree and to the generalized Born model of implicit solvation. References Living people 21st-century American physicians American computer scientists Year of birth missing (living people)
https://en.wikipedia.org/wiki/Chaldean%20Mafia
The Chaldean mafia is a criminal organization composed of Chaldean Catholics that have operated narcotics distribution networks from Phoenix and San Diego to Detroit. Involved in violent crimes such as armed robbery, arson, assault, homicide, and kidnapping. Police investigations The work of the Detroit Metropolitan Violent Crime Task Force—with representatives from the FBI, the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF); the Drug Enforcement Administration (DEA), the Detroit Police Department, the Michigan State Police Department, and the Wayne County Sheriff's Office—resulted in the conviction of 111 subjects and the seizure of $5.3 million, 6.5 tons of marijuana, 25 kilograms of cocaine, five pounds of crystal methamphetamine, and 78 firearms. In 2011 "Operation Shadowbox", a joint investigation between El Cajon, California police and the U.S. Drug Enforcement Administration into the trafficking of narcotics, firearms and explosives, allowed for the seizure of more than 13 pounds of methamphetamine; more than 5 pounds of ecstasy, pharmaceuticals, crack cocaine, heroin and cocaine; and more than 3,500 pounds of marijuana, most of which was likely smuggled through mastermind Furat Kalasho of Sterling Heights partnered with the Sinaloa Federation. Investigators also seized more than $630,000 in cash, three luxury cars, 34 firearms and four improvised explosive devices. Operation Shadowbox "Operation Shadowbox" was a joint investigation between El Cajon Police and the U.S. Drug Enforcement Administration. On August 18, 2011 sixty Chaldeans were arrested at a Chaldean Social Club in El Cajon, near San Diego. This operation targeted mastermind Furat Kalasho of Sterling Heights, MI. SWAT teams served search warrants on the club late Wednesday night, seizing more than $160,000 in cash as well as evidence of illegal gambling. See also Crime in Detroit, Michigan References George Knox, 2008, The Chaldean Mafia: A Preliminary Gang Threat, http://ngcrc.com./ngcrc/chaldprof.htm, National Gang Crime Research Louis Akrawi, Detroit Free Press (Harry Kalasho murder), 2010, Court of Appeals Document (Ray Akrawi), 2010, http://cases.justia.com/us-court-of-appeals/F2/951/350/257887/ Court of Appeals Document (Louis Akrawi), 2010, Sign On San Diego, "60 Arrested", 2011, http://www.signonsandiego.com/news/2011/aug/18/60-arrested-el-cajon-chaldean-organized-crime-case/ Citations Mafia Assyrian gangs Organized crime by ethnic or national origin Iraqi-American history Assyrian-American organizations Organized crime groups in the United States Gangs in Detroit
https://en.wikipedia.org/wiki/Nonzero-rule
In two-dimensional computer graphics, the non-zero winding rule is a means of determining whether a given point falls within an enclosed curve. Unlike the similar even-odd rule, it relies on knowing the direction of stroke for each part of the curve. For a given curve C and a given point P: construct a ray (a straight line) heading out from P in any direction towards infinity. Find all the intersections of C with this ray. Score up the winding number as follows: for every clockwise intersection (the curve passing through the ray from left to right, as viewed from P) subtract 1; for every counter-clockwise intersection (curve passing from right to left, as viewed from P) add 1. If the total winding number is zero, P is outside C; otherwise, it is inside. The winding number is effectively a count of how many full counter-clockwise revolutions ('windings') the curve makes around P without doubling back on itself. (If P were a nail and C were a looped piece of string, try pulling some part of the string sideways away from the nail: it will either come free, or it will be found to be wound some number of times around the nail.) Some implementations instead score up the number of clockwise revolutions, so that clockwise crossings are awarded +1, counter-clockwise crossings -1. The result is the same. One formal definition of the winding number of point P with respect to curve C (where P does not lie on the curve) is as follows: The SVG computer graphics vector standard uses the non-zero rule by default when drawing polygons. See also Even-odd rule Complex polygon Tessellation Polygon triangulation TrueType References External links Definition of fill rules in SVG Song Ho's explanation of the OpenGL GLU tesselator Computer graphics algorithms
https://en.wikipedia.org/wiki/Broadcast%20Exchange%20Format
Broadcast Exchange Format (BXF) is an SMPTE standard for data exchange in the broadcasting industry. History BXF was developed to replace various archaic types of exchange for playlists, record lists and other data in broadcasting. Version 1.0 (SMPTE standard 2021) was published in 2008. Over 150 SMPTE members have been involved in defining the standard. BXF is XML based. See also AAF, Advanced Authoring Format BWF, broadcast Wave Format MXF, Material eXchange Format References External links SMPTE standards Standards of the United States Computer file formats Film and video technology
https://en.wikipedia.org/wiki/BXF
BXF or bxf may refer to: Broadcast Exchange Format, an SMPTE standard for data exchange in the broadcasting industry BXF, the South Eastern Railway station code for Barsuan railway station, Odisha, India bxf, the ISO 639-3 code for Bilur language, Papua New Guinea
https://en.wikipedia.org/wiki/Einstein%20Medical%20Center%20Philadelphia
The Einstein Medical Center Philadelphia is a non-profit hospital located in North Philadelphia, Pennsylvania. The hospital is a part of the Einstein Healthcare Network. The medical center offers residency and fellowship training programs in many specialized areas. It also includes a Level I Regional Resource Trauma Center and a Level III Neonatal Intensive Care Unit. Einstein Medical Center Philadelphia is the largest independent teaching hospital in the Philadelphia region with over 30 accredited programs training over 3,500 students each year with 400 residents. History Founded as the Jewish Hospital for the Aged, Infirmed and Destitute (Jewish Hospital for short) in August 1864, this hospital was an important institution in the history of the Jews in Philadelphia, providing care for "the suffering poor of all religions". It officially opened in 1866, starting with 22 beds at 56th and Haverford Road in West Philadelphia. The hospital expanded, moving to Old York Road in 1873, and opening various homes and clinics. By the 20th century, Jewish-sponsored hospitals such as the Jewish Hospital became havens for Jewish doctors who could not admit their patients to other hospitals because of anti-Semitism. In 1951, the hospital was named for Albert Einstein after the volunteer president of Mount Sinai wrote a letter asking Einstein for permission to use his name. Einstein granted his permission. In 1952, the Jewish Hospital merged with Northern Liberties Hospital and Mount Sinai Hospital to form a single medical center. Einstein Medical Center discouraged nurses from joining unions. From 2014 to 2017 the hospital spent "$1.1 million on union avoidance". Nurses voted to unionize with the PASNAP in 2016. Synagogue The Henry S. Frank Memorial Synagogue, on the hospital grounds, is listed on the National Register of Historic Places. It is a copy of the ancient synagogue at Kfar Bar'am, Israel. References External links Einstein Medical Center locations Map of Einstein's Main Campus Hospital buildings completed in 1866 Hospital buildings completed in 1873 Hospitals in Philadelphia 1864 establishments in Pennsylvania Jewish medical organizations Hospitals established in 1864 Hospitals established in 1866 Trauma centers
https://en.wikipedia.org/wiki/Charlie%20Miller%20%28security%20researcher%29
Charles Alfred Miller is an American computer security researcher with Cruise Automation. Prior to his current employment, he spent five years working for the National Security Agency and has worked for Uber. Education Miller holds a bachelor's degree in mathematics with a minor in philosophy from the then called Northeast Missouri State, and a Ph.D. in mathematics from the University of Notre Dame in 2000. He lives in Wildwood, Missouri. Security research Miller was a lead analyst at Independent Security Evaluators, a computer protection consultancy. He has publicly demonstrated many security exploits of Apple products. In 2008, he won a $10,000 cash prize at the hacker conference Pwn2Own in Vancouver, British Columbia, Canada for being the first to find a critical bug in the MacBook Air. In 2009, he won $5,000 for cracking Apple's Safari browser. Also in 2009, he and Collin Mulliner demonstrated an SMS processing vulnerability that allowed for complete compromise of the Apple iPhone and denial-of-service attacks on other phones. In 2011, he found a security hole in the iPhone and iPad, whereby an application can contact a remote computer to download new unapproved software that can execute any command that could steal personal data or otherwise using iOS applications functions for malicious purposes. As a proof of concept, Miller created an application called Instastock that was approved by Apple's App Store. He then informed Apple about the security hole, who promptly expelled him from the App Store. Miller participated in research on discovering security vulnerabilities in NFC (Near Field Communication). Miller, along with Chris Valasek, is known for remotely hacking a 2014 Jeep Cherokee and controlling the braking, steering, and acceleration of the vehicle. Publications iOS Hacker Handbook The Mac Hacker's Handbook Fuzzing for Software Security Testing and Quality Assurance Battery firmware hacking: inside the innards of a smart battery References External links Living people University of Notre Dame alumni Computer security specialists Year of birth missing (living people)
https://en.wikipedia.org/wiki/Feminist%20Approaches%20to%20Bioethics
Feminist Approaches to Bioethics (International Network on Feminist Approaches to Bioethics), or FAB, is a network of feminists in bioethics, adding feminist perspectives to ethical issues in health care and the biosciences. It publishes a journal, IJFAB: International Journal of Feminist Approaches to Bioethics, and is affiliated with the International Association of Bioethics, with which it meets. History FAB was formed in 1992 at the inaugural meeting of the IAB. Its aims are to create a more inclusive bioethical theory from the viewpoint of disadvantaged groups such as women. It critiques bioethical theory that privileges groups with power. As IJFAB editor Mary C. Rawlinson writes of the general state of bioethics in the introduction to the journal's inaugural issue, Co-founding member Anne Donchin writes this on the occasion of FAB's 20th anniversary: See also Bioethics IJFAB: International Journal of Feminist Approaches to Bioethics External links FABnet.org Free IJFAB articles online IJFAB Blog IJFAB: International Journal of Feminist Approaches to Bioethics Section entry in the Stanford Encyclopedia of Philosophy References Organizations established in 1992 Feminist ethics Bioethics Ethics organizations
https://en.wikipedia.org/wiki/Convergence%20%28routing%29
Convergence is the state of a set of routers that have the same topological information about the internetwork in which they operate. For a set of routers to have converged, they must have collected all available topology information from each other via the implemented routing protocol, the information they gathered must not contradict any other router's topology information in the set, and it must reflect the real state of the network. In other words: in a converged network all routers "agree" on what the network topology looks like. Convergence is an important notion for a set of routers that engage in dynamic routing. All Interior Gateway Protocols rely on convergence to function properly. "To have, or be, converged" is the normal state of an operational autonomous system. The Exterior Gateway Routing Protocol BGP typically never converges because the Internet is too big for changes to be communicated fast enough. Convergence process When a routing protocol process is enabled, every participating router will attempt to exchange information about the topology of the network. The extent of this information exchange, the way it is sent and received, and the type of information required vary widely depending on the routing protocol in use, see e.g. RIP, OSPF, BGP4. A state of convergence is achieved once all routing protocol-specific information has been distributed to all routers participating in the routing protocol process. Any change in the network that affects routing tables will break the convergence temporarily until this change has been successfully communicated to all other routers. Convergence time Convergence time is a measure of how fast a group of routers reach the state of convergence. It is one of the main design goals and an important performance indicator for routing protocols, which should implement a mechanism that allows all routers running the protocol to quickly and reliably converge. Of course, the size of the network also plays an important role. A larger network will converge more slowly than a smaller one. RIP is a routing protocol that converges so slowly that even a network of a few routers can take a couple of minutes to converge. In case of a new route being advertised, triggered updates can speed up RIP's convergence but to flush a route that previously existed takes longer due to the holddown timers in use. OSPF is an example of a fast-converging routing protocol. A network of a few OSPF routers can converge in a matter of seconds. Certain configuration and hardware conditions will prevent a network from ever converging. For instance, a "flapping" interface (an interface that frequently changes its state between "up" and "down") might cause conflicting information to propagate throughout the network so the routers never agree on its current state. Under certain circumstances it might be desirable to withhold detailed routing information from parts of the network via route aggregation, thereby speeding up
https://en.wikipedia.org/wiki/List%20of%20programmes%20broadcast%20by%20Disney%20Channel%20%28Indian%20TV%20channel%29
This is a list of television programmes that are currently airing on Disney Channel in India. Current programming Animated series Bapu Dr.Tenali Rama Beyblade Doraemon Gadget Guru Ganesha The Ghost and Molly McGee Ghostforce Kid vs. Kat Lego Jurassic World Miraculous: Tales of Ladybug & Cat Noir Moka Phineas and Ferb Selfie With Bajrangi Upin and Ipin Guddu Live-action Disney Imagine That Best of Luck Nikki The Suite Life of Karan & Kabir Shake It Up Former programming Live-action Aaron Stone Agadam Bagdam Tigdam Akkad Bakkad Bambey Bo Austin & Ally Backyard Science Bear in the Big Blue House Best of Luck Nikki Big Bada Boom The Book of Pooh Boy Meets World Break Time Masti Time Captain Tiao Cory in the House Dhoom Machaao Dhoom Disney Q Family Mastermind Dog with a Blog Gabbar Poonchwala Goldie Ahuja Matric Pass Goosebumps Hannah Montana Hatim Hip Hip Hurray Imagination Movers Ishaan: Sapno Ko Awaaz De Johnny and the Sprites Jonas L.A. Jessie Karishma Kaa Karishma Kaarthika Kabhi Aise Geet Gaya Karo Kya Mast Hai Life Lage Raho Chachu Life with Derek Lizzie McGuire Maan Na Maan Mein Tera Mehmaan Mai Ka Lal Mortified Nach to the Groove Naturally, Sadie Oye Jassie Palak Pe Jhalak Phil of the Future Sanya Shaka Laka Boom Boom Shake It Up (Indian TV series) Shake It Up (U.S. TV series) Shararat So Random! So Weird Son Pari Sonny with a Chance Soy Luna Soy Luna Live Studio Disney The Lodge (TV series) The Next Step (Canadian TV series) The Suite Life of Karan & Kabir The Suite Life of Zack & Cody The Suite Life on Deck Take Two with Phineas and Ferb That's So Raven Vicky & Vetaal Welcome to Pooh Corner Wizards of Waverly Place Zindagi Khatti Meethi Animated series 101 Dalmatians: The Series 3 Amigonauts Action Dad Aladdin American Dragon: Jake Long Astra Force Arjun — Prince of Bali Being Ian Beyblade Burst Rise Beyblade Burst Surge Bhaagam Bhaag Billy Dilley's Super-Duper Subterranean Summer Brandy & Mr. Whiskers Bunnytown Buzz Lightyear of Star Command The Buzz on Maggie Camp Lakebottom Cars Toons The Cat in the Hat Knows a Lot About That! Chuggington Clifford the Big Red Dog Dave the Barbarian The Deep Donald Duck Presents Donkey Kong Country DuckTales Ek Tha Jungle The Emperor's New School Fillmore! Fish Hooks Gaju Bhai Get Ace Good Morning, Mickey! Goof Troop Grami's Circus Show Gravity Falls Handy Manny Higglytown Heroes The Hive Hotel Transylvania: The Series House of Mouse How to Draw? Jake and the Never Land Pirates JoJo's Circus Jungle Cubs Jungle Junction Kim Possible Kiteretsu The Legend of Tarzan Lilo & Stitch: The Series The Lion Guard Little Einsteins The Little Mermaid Madeline Mickey and the Roadster Racers Mickey Mouse and Friends Mickey Mouse Club Mickey Mouse Clubhouse Miles from Tomorrowland Miraculous: Tales of Ladybug & Cat Noir The New Adventures of Winnie the Pooh The Octonauts Penn Zero: Part-Time Hero PJ Masks Pocoyo The Proud Family Quack Pack Recess Rolie Polie Olie Sofia the First
https://en.wikipedia.org/wiki/Robert%20Thornton%20%28scribe%29
Robert Thornton (fl. 1418 – 1456) was a Yorkshire landowner, a member of the landed gentry. His efforts as an amateur scribe and manuscript compiler resulted in the preservation of many valuable works of Middle English literature, and have given him an important place in its history. Biography Thornton's name is associated with two 15th-century manuscripts now held in different collections; Lincoln, Cathedral Library MS 91, the "Lincoln Thornton" manuscript, and British Library MS Additional 31042, the "London Thornton" manuscript. A number of candidates had been suggested for the scribe's identity, but he is now firmly identified as Robert Thornton, a relatively prosperous provincial landowner of the manor of East Newton, Stonegrave, in the North Riding of Yorkshire. The armigerous (Argent a bend gules with three escarbuncles or thereon) Thornton family had possessed East Newton Hall since the time of Edward I; Robert's parents are commemorated in the church at Stonegrave. Thornton's father, grandfather and great-grandfather were all also named Robert. The family retained possession of East Newton until 1692. Thornton appears to have started to compile a collection of works for his own and his family's pleasure and instruction; he was essentially a gentleman-amateur in a field usually dominated by professional scriveners and ecclesiastical scribes. Rather than copying works at random, he made some attempt to edit romances, religious works and works on medicine or herblore into different "booklets" within the manuscript. He wrote in a practised but rather untidy hand, adding a few simple decorative flourishes such as grotesque drolleries or ornamental scrollwork. Thornton's tastes were fairly wide-ranging; the Lincoln manuscript reveals a liking for Arthurian romances, and he seems to have particularly appreciated alliterative verse, resulting in the preservation of some of the finest examples of the genre (notably The Alliterative Morte Arthure and Wynnere and Wastoure). The texts enable us to gain some insight into the way such manuscripts were used, perhaps with members of a family using it on one night to refer to a recipe, and on another to read a romance or even to take part in a dramatic performance. After Thornton's death, the manuscripts remained in the hands of his descendants for many years; the name of Thornton's son William appears on folio 49.v of the Lincoln manuscript, in addition to the names of other family members elsewhere. However, by 1700 (when it was seen there by the antiquary Bishop Thomas Tanner) it had reached the library of Lincoln Cathedral, probably having been obtained by the cathedral's Dean Michael Honywood between 1660 and 1681. As many libraries of manuscripts were lost during the Dissolution of the Monasteries, Thornton's private anthology became an extremely rare survival. Works preserved by Thornton Lincoln, Cathedral Library MS 91 British Library MS Additional 31042 References Further reading Fein,
https://en.wikipedia.org/wiki/Digital%20Audio%20Control%20Protocol
Digital Audio Control Protocol (DACP) is a protocol used by the iTunes and other audio player and server applications on Mac, Windows and Linux computers, enabling remote control by mobile devices such as iPhone and Android phones and tablet computers. By connecting the personal computer to loudspeakers the mobile device is used as a two-way remote control, allowing selection and control of music playback within a traditional listening environment such as a home or apartment. Clients Compliant DACP clients can connect to any DACP enabled server. Clients are available for multiple desktop and mobile platforms. Apple Remote Apple Remote is the first DACP client created specifically for iTunes remote control. CuteRemote CuteRemote DACP remote control for Nokia Phones. TunesRemote+ TunesRemote+ for Google Android is a fork of Jeff Sharkey's TunesRemote project. The project's goal is provide remote functionality for Android with similar capabilities as Apple's remote. TunesRemote-SE TunesRemote-SE combines the DACP control software from TunesRemote+ with the graphical user interface from Firefly Client to produce an application that can control a DACP server from any computer running Java. Remote for iTunes Remote for iTunes by Hyperfine Software for Android lets users control iTunes via their home Wi-Fi network. Remote for Windows Phone 7 Remote for Windows Phone 7 by Komodex Software lets users control DACP servers from their home Wi-Fi network. yTrack yTrack is an iPad application developed by Fabrice Dewasmes that browses a remote DACP library and let users control it. Servers Compliant DACP servers can accept connections from any DACP client. Multiple compliant servers are available for Mac, Windows and Linux platforms. Apple iTunes Apple iTunes is the original DACP server and the specification was created specifically for iTunes remote control. MonkeyTunes for MediaMonkey In 2009 Melloware Inc., released MonkeyTunes, the first known "third-party" DACP server for MediaMonkey that is fully compliant with Apple's DACP protocol. TouchRemote for Foobar2000 In 2009 Wintense released TouchRemote, a plugin (component) for the foobar2000 music player, implementing a DACP server that is fully compliant with Apple's DACP protocol allowing Apple Inc.'s Remote application to be used. AlbumPlayer In 2011 Albumon, released a DACP plugin for their software AlbumPlayer which is a full featured jukebox player for the PC. Telescope for Songbird In 2010 Wilco released Telescope for the Songbird music player, implementing a DACP server that is fully compliant with Apple's DACP protocol, and a standard web service and mobile browser interface. Rhythmbox for GNOME In 2010 native DACP support was added to Rhythmbox after a Google Summer of Code project by Alexandre Rosenfeld. See also Digital Audio Access Protocol Remote Audio Output Protocol References External links Tunes Remote, Android client using DACP. TunesRemote+,
https://en.wikipedia.org/wiki/European%20route%20E21
European route E21 is a series of roads in Europe, part of the United Nations International E-road network. It runs from Metz, France to Geneva, Switzerland. It meets the European route E25, the E50 and the E411 at Metz, from where it departs. On its way to Geneva, it crosses the E23 at Nancy, and also passes through Dijon. It enters Switzerland soon after and links with the E25, the E62 and the E712 at Geneva, allowing further travel through Europe. It is long in total. External links UN Economic Commission for Europe: Overall Map of E-road Network (2007) 21 E021 E021
https://en.wikipedia.org/wiki/Remote%20data%20capture
Remote data capture is the process of automatic collection of scientific data. It is widely used in clinic trials, where it is referred to as electronic data capture. In physical sciences, automatic observation hardware in the field can be linked to an observer in a laboratory through a cellphone or other communication link, for example in hydrology. RDC systems influenced the design of later electronic data capture (EDC) systems. References Clinical research Telemetry Clinical data management
https://en.wikipedia.org/wiki/European%20route%20E23
European route E23 is a series of roads in Europe, part of the United Nations International E-road network. Route Links with other European routes At Metz, it links with the E21, the E25, the E50, and the E411. It links with the E21 at Nancy. Further along at Remiremont it joins with the E512. At Vesoul it connects to the E54. Just before the Swiss border at Besançon, it makes a connection to the E60. At its final destination of Lausanne it connects with the E25 and the E62. External links UN Economic Commission for Europe: Overall Map of E-road Network (2007) 23 E023 E023
https://en.wikipedia.org/wiki/Elfster
Elfster is a proprietary software application providing social networking features related to "secret Santa" style gift exchanges. It is available, without charge, as software as a service, via a website and via mobile apps for iOS and Android. The website's features include a universal wishlist, an anonymous Q&A section, personalized gift recommendations, activity updates, and forum discussions. The company is headquartered in Delaware, United States. History Elfster was founded by software engineer Peter Imburg in 2004 after hearing about the difficulty his wife and sister had when trying to organize a Secret Santa for their family. In November 2011, the website reached 2 million members. In Christmas of the same year, the Elfster Facebook App was launched for mobile device users. The app also serves as an extension of Elfster.com's service. Services Elfster can be used to create wishlists and organize online gift exchanges. Users can find friends in Elfster, and follow their wishlists. Items can be added from any site online, and with the Elfster mobile app, bar code scanning allows items to be added on the go. When organizing an online gift exchange, Elfster draws names randomly and allows users to ask their draw partner questions anonymously - maintaining secrecy in a "high-tech way". Elfster provides a series of tools for organizing secret gift exchanges such as automated event-organization, name pairing, draw restrictions, gift guidance, wishlists, and anonymous questions and answers. Elfster helps with the logistics of determining who wants to participate, drawing names, and communicating the names that were drawn, while identities remain secret In December 2009, Elfster collaborated with Claire's to create Secret Santa Circle, a temporary Secret Santa website for the jewelry retailer. In November 2010, new features were added including trending gifts, activity updates and the ability to suggest and share gift ideas. References External links Elfster website Elfster.com Brings Secret Santa to Facebook Holiday Gift Exchanges Go High Tech with Introduction of Elfster En Espanol "Amigo Secreto" Generation Limbo: Waiting It Out See also Secret Santa Social networking services Internet properties established in 2004 Christmas traditions
https://en.wikipedia.org/wiki/Cyberhomes
Cyberhomes is a real estate website owned by Fidelity National Financial and Lender Processing Services (LPS). It lists the most current sales of homes in a neighborhood by similar sales. History In 1995 Moore Data Management Services created the website Cyberhomes.com. The site was set up with the goal of connecting homebuyers and sellers with real estate professionals. In 1999 VistaInfo became interested in acquiring Moore's real estate businesses, including Cyberhomes.com. By December 1999, VistaInfo completed the purchase. At the time that move made VistaInfo the largest supplier of MLS information management systems in the country—serving over 100 MLS organizations and 350,000 real estate professionals. In 2001 Fidelity National Financial and VistaInfo completed a merger forming a new company called Fidelity National Information Solutions (FNIS). Shortly after the merger in 2002, FNIS pulled the plug on Cyberhomes, but the URL was retained by a key executive. In 2006 an entirely new product was born and took on the name Cyberhomes. It launched with access to Fidelity National Financials property information database and automated valuation tools. In 2012, CyberHomes was purchased by Listingbook, LLC. Company Today Cyberhomes.com is a real estate information site that provides listing and foreclosure data, property evaluations and neighborhood analysis. The site is owned by Fidelity National Real Estate Solutions (FNRES), a division of Fidelity National Financial, Inc. and was introduced to the public in November 2007. AOL Cyberhomes is the exclusive provider of property data and valuations to AOL's real estate portal. AOL Real Estate receives over 3 million monthly visitors. Vertical Ad Network In May 2008 Cyberhomes and Adify launched the first real estate vertical advertising network, named Real Estate & Living Media Network. See also National Association of Realtors CondoDomain Redfin Zillow ZipRealty PropertyShark References Real estate companies established in 1995 Real estate services companies of the United States Online real estate databases
https://en.wikipedia.org/wiki/European%20route%20E29
European route E29 is a series of roads in Europe, part of the United Nations International E-road network. It runs from Cologne, Germany through Luxembourg, through Germany again, and finishing at Sarreguemines, France. Firstly it leaves Cologne, where it links with the E31, the E35, the E37 and the E40. It then heads south and crosses into Luxembourg, and into Luxembourg City, where more links are made to the E25, the E44 and the E421. It then re-enters Germany, more specifically the Saarland, running through the city of Saarbrücken, where it links with the E50 and the E422. On its final stretch, it crosses the French border and finishes at Sarreguemines. Its total length is . External links UN Economic Commission for Europe: Overall Map of E-road Network (2007) 29 E029 E029 029