source
stringlengths
32
199
text
stringlengths
26
3k
https://en.wikipedia.org/wiki/List%20of%20The%20Outer%20Limits%20%281963%20TV%20series%29%20episodes
This page is a list of the episodes of The Outer Limits, a U.S. science fiction television series originally aired on the ABC television network for two seasons from 1963 to 1965. Series overview Episodes Season 1 (1963–64) Season 2 (1964–65) Home releases The following DVD sets were released by MGM Home Entertainment. References See Also List of The Outer Limits (1995 TV series) episodes External links Outer Limits, The Outer Limits, The
https://en.wikipedia.org/wiki/William%20Edward%20Hodgson%20Berwick
William Edward Hodgson Berwick (11 March 1888 in Dudley Hill, Bradford – 13 May 1944 in Bangor, Gwynedd) was a British mathematician, specializing in algebra, who worked on the problem of computing an integral basis for the algebraic integers in a simple algebraic extension of the rationals. Academic career Berwick was educated at a small private school before entering Bradford Grammar School. He completed his schooling in 1906, securing a Brown Scholarship to assist him in his university studies; he was also awarded an Entrance Scholarship by Clare College, Cambridge, where he went to study for the Mathematical Tripos. He took Part I of the degree in 1909, placing joint fourth in the class, and Part II in 1910. During his undergraduate years, under the tutelage of G B Matthews, Berwick became interested in number theory. He submitted an essay entitled An illustration of the theory of relative corpora for the Smith's Prize in 1911; the essay was placed second in the prize competition. He then co-wrote, with Matthews, a paper On the reduction of arithmetical binary cubics which have a negative determinant: it was published after Berwick had left Cambridge to take up an assistant lectureship at the University of Bristol, and was the only paper Berwick co-authored in his career. Berwick taught at Bristol until 1913 when he took up another lectureship at the University College of Bangor. With the outbreak of the First World War in 1914 Berwick began war work on the Technical Staff of the Anti-Aircraft Experimental Section of the Munitions Inventions Department at Portsmouth. For the 1919–20 academic year Berwick was appointed acting head of the Bangor mathematics department; he then took up a lectureship at the University of Leeds, earning promotion to a Readership in Mathematical Analysis there in 1921. He was also elected to a fellowship at Clare College, Cambridge, in 1921. In 1926, with thirteen research papers to his name, Berwick returned to Bangor to serve as Chairman of Mathematics. He had in 1925 become a member of the Council of the London Mathematical Society; in 1929 he was appointed Vice-President. He retired the post in 1941, at which point he was created Emeritus Professor. Research and publications Berwick was an algebraist, and worked on the problem of computing an integral basis for the algebraic integers in a simple algebraic extension of the rationals, and studied rings in algebraic integers. In 1927 he published Integral Bases, an ambitious account that used heavy numerical computations in place of practical proofs. He published sixteen papers, ten of them — including a 1915 paper giving sufficient conditions for a quintic expression to be solved by radicals — in Proceedings of the London Mathematical Society. Much of his work gained recognition only in the 1960s, when it was republished. Personal life Berwick was described as a tall man with a distinctive voice and forthright personal style. He was a keen chess player, pa
https://en.wikipedia.org/wiki/Mickey%20Mouse%20March
"(The) Mickey Mouse March" is the opening theme for The Mickey Mouse Club television show, which aired in the United States from October 1955 to 1959, on the ABC television network. (The first two lines are: Who’s the leader of the club that’s made for you and me? M-I-C-K-E-Y M-O-U-S-E!) The song is reprised with the slower "it's time to say goodbye" verse, at the end of each episode. In the show's opening, the song is partially performed by the characters Dumbo and Jiminy Cricket. It also ended with Donald Duck attempting to hit a gong with the "Mickey Mouse Club" title on it but would end with comic results, such as him getting hit by lightning, or the gong turning out to be a pie, or Donald just hitting a triangle instead. It has since become the theme song for the titular Mickey Mouse and his franchise. The song was written by the Mickey Mouse Club host Jimmie Dodd and was published by Hal Leonard Corporation, on July 1, 1955. Dodd, who was a guitarist and musician hired by Walt Disney as a songwriter, wrote other songs used over the course of the series, as well, such as the “theme day” songs sung on the show. Cover versions Julie London covered the song on her 1967 album, Nice Girls Don't Stay for Breakfast. Elvis Presley performed a bit of the song during his May 2, 1975 concert in Atlanta, Georgia. A concert recording of the show was made available on the Follow That Dream Collectors' label release, Southbound - Tampa / Atlanta '75. Mannheim Steamroller covered the song as the final track on the album, Mannheim Steamroller Meets the Mouse (1999). In 2000, a eurobeat version of the song was released on the Japan-only Eurobeat Disney, recorded by Domino and Dave Rodgers. Andrew W.K. also covered the song, on the Japanese-only release of the album Mosh Pit On Disney (2004). In 2017, D-Metal Stars created a Heavy Metal cover of the song on the album "Metal Disney" featuring Mike Vescera and Rudy Sarzo There was a gachimuchi cover made of Mickey Mouse March called "Bockey Mouse March" on YouTube, receiving immense amount of popularity until it was removed by YouTube. In popular culture In M*A*S*H season 5 (1976–77), Hawkeye Pierce sings the M-O-U-S-E line of the song after Radar O'Reilly spells out a name. The episode was first aired in December 1976, but depicts events in 1952, three years before the song was published. In Stanley Kubrick's Vietnam War film Full Metal Jacket (1987), American Marines sing the song to ironic effect at the film's end, as they march out of the city at the Battle of Huế. In The Simpsons short film Plusaversary (2021), the song is heard when Bart Simpson, dressed as Mickey Mouse, enters Moe's Tavern. Parodies The titles for the second series of Alexei Sayle's BBC comedy series, Alexei Sayle's Stuff are a parody of those for The Mickey Mouse Club with the third and fourth lines: Who’s an ugly bastard and as fat as he can be? A-L-E-X-E-I S-A-Y-L-E! References Disney songs 1955 songs Animated series theme s
https://en.wikipedia.org/wiki/BigFM
Big FM is a German radio network that consists of three regional radio stations: bigFM Der Neue Beat in Baden-Württemberg, bigFM Hot Music Radio in Rhineland-Palatinate and bigFM Saarland in Saarland. The format is Rhythmic CHR, and the network specialises in pop, rock, dance, hip-hop and rap. Talk shows are also featured late at night that mainly focuses on young people's issues and stories, and broadcast weeknights from midnight - 2 am (Nightlounge) and Sunday from 10:45 pm - midnight (Night Talk). Frequencies Today bigFM is the biggest private radio station for young people in Germany with 2.5 million weekly listeners. In addition, 11 million people are aware of the station's existence. FM Stuttgart: 89.5 FM Rottweil: 99.0 FM Villingen-Schwenningen: 99.5 FM Cologne: 104.9 FM Frankfurt: 104.5 FM Koblenz: 104.0 FM Trier: 106.4 FM Eifel: 106.6 FM Karlsruhe: 105.2 FM Kaiserslautern: 107.6 FM Saarburg: 96.5 FM Pirmasens: 96.7 FM Baden-Baden: 103.8 FM Mannheim: 87.8 FM Heidelberg: 90.9 FM Sinsheim: 97.2 FM Ulm: 99.7 FM Freiburg: 102.8 FM Tübingen: 89.7 FM Heilbronn: 104.7 FM Aalen: 105.1 FM Göppingen: 100.3 FM Ludwigshafen: 106.7 FM Saarbrücken: 94.2 FM Merzig: 92.6 FM St. Ingbert: 96.8 Controversy The creators of bigFM had always been using practices that were rated by observers as nonsense or meaningless. In one case in 2016 this also led to a criticism of the national institute for communication Baden-Wuerttemberg at the marketing practice of the transmitter. One of the station's most controversial actions took place in summer 2017. Breakfast DJ Rob Green attempted to send a WhatsApp message to Marlen Gröger, who he expected to be a newsreader for DASDING. Its content stated that if she could leave the studio immediately even when she was reading out the news on that station, she would get a job on "Germany's biggest morning show". That message was finally sent at 7:31am that day. The message was as follows (originally in German):Hey Marlen, wenn du jetzt LIVE während deiner Nachrichten hinschmeißt, hab ich nen Job für dich in Deutschlands biggster Morningshow auf BigFM! Wir hören dich gerade!It turned out that the person who read the newscast at the time on DASDING was Athene Pi Permantier, not Marlen. In addition, Marlen had already finished her contract with DASDING for quite some time and was now working at BigFM. The radio station's production team posted an image of the act as its proof, however it caused some major backlash, with Facebook users calling the act "fake news", "scam" and questioning the station's journalistic ethic. Moreover, Baden-Württemberg Foundation decided to cancel the media partnership with BigFM for an event against fake news, false reports and fake information. The radio station later issued an apology saying they were sorry for this cancellation, but assured it was completely about "introducing a new good journalist" alone, and argued that the term of "fake news" was highly questionable, since Rob Green's sho
https://en.wikipedia.org/wiki/MTV%20Classic%20%28Italian%20TV%20channel%29
MTV Classic was an Italian pay television channel that centred its programming schedule to former music video hits from the 1970s, 1980s and 1990s. The channel was based on the Videomusic library. It was launched on 2007 as MTV Gold, and was rebranded as MTV Classic on 10 January 2011. It was closed down on 31 July 2015, along with MTV Hits. External links MTV.it 2007 establishments in Italy 2015 disestablishments in Italy MTV channels Defunct television channels in Italy Italian-language television stations Music organisations based in Italy Music television channels Telecom Italia Media Television channels and stations established in 2007 Television channels and stations disestablished in 2015
https://en.wikipedia.org/wiki/MTV%20Pulse%20%28Italian%20TV%20channel%29
MTV Pulse Italy was an Italian television channel and like MTV Hits broadcast chart hits non-stop with many music-related themed zones and much programming from MTV and MTV Italy. Broadcast only on SKY Italia channel 707 (but also available on Italian IPTV services). On 10 January 2011 MTV Pulse Italy was closed down and its frequencies were taken over by the pan-European music channel MTV Dance. Programming 30 minutes of A Shot at Love with Tila Tequila Clipshake Coffee Break College Rock Dance Hour Girls Rock! Life of Ryan Love Test Milk & Clip Mighty Moshin' Emo Rangers My Super Sweet Sixteen Pimp My Ride Rock Hour TRL Italy TRL Top 10 Countdown Urban Hour Videorama References External links Official site MTV channels Telecom Italia Media Music organisations based in Italy Television channels and stations established in 2007 Television channels and stations disestablished in 2011 2007 establishments in Italy 2011 disestablishments in Italy Defunct television channels in Italy Italian-language television stations
https://en.wikipedia.org/wiki/ICCN
ICCN is an initialism for: Institut Congolais pour la Conservation de la Nature International Conference on Computational Nanoscience and Nanotechnology Interfaith Climate Change Network Indiana Classic Car Network or Illinois Classic Car Network International Center on Conflict and Negotiation Inner City Computer Network Intercultural Conflict, Communication and Negotiation
https://en.wikipedia.org/wiki/Emergency%20Severity%20Index
The Emergency Severity Index (ESI) is a five-level emergency department triage algorithm, initially developed in 1999. It was previously maintained by the Agency for Healthcare Research and Quality (AHRQ), but is currently maintained by the Emergency Nurses Association (ENA). Algorithm ESI triage is based on the acuity of patients' health care problems and the number of resources their care is anticipated to require. This differs from standardized triage algorithms used in several other countries, such as the Australasian Triage Scale, which attempt to divide patients based on the time they may safely wait. The concept of a "resource" in ESI means types of complex interventions or diagnostic tools, above and beyond physical examination. Examples of resources include X-ray, blood tests, sutures, and intravenous or intramuscular medications. Oral medications and prescriptions are specifically not considered resources by the ESI algorithm. The ESI levels are numbered one through five, with level one indicating the greatest urgency. However, levels 3, 4, and 5 are determined not by urgency, but by the number of resources expected to be used as determined by an experienced nurse. The levels are as follows: References Diagnostic emergency medicine Management cybernetics Triage
https://en.wikipedia.org/wiki/Paul%20D%27Ambrosio
Paul D'Ambrosio is an American journalist and novelist. He is the former executive editor of the Asbury Park Press, and creator of DataUniverse.com, a public records site used by multiple Gannett newspapers. He is currently a senior editor at The Marshall Project. Education D'Ambrosio graduated from The George Washington University. In 2018, he received an M.A. in journalism and strategic communications from the University of Memphis. Career Journalism In October 1981, D'Ambrosio joined the Asbury Park Press as a reporter responsible for covering Jackson Township, New Jersey. He was later promoted to an investigations editor, senior regional news strategist, and director of investigations and news director for the newspaper before becoming the executive editor in 2019. D'Ambrosio works in a field of journalism called computer-assisted reporting, which uses various programs to analyze government data. An unnamed precursor to DataUniverse was launched in the Spring of 2005 by D'Ambrosio, and the full DataUniverse was launched on the Asbury Park Press's website, on December 1, 2006. The site is programmed and maintained by D'Ambrosio. DataUniverse contains more than two dozen databases from crime records to property sale information, and garners about 1 million page views a week. The DataUniverse model has been widely duplicated throughout the Gannett newspaper chain and other news outlets. As both editor and writer, he has won and shared in the Selden Ring Award for Investigative Reporting, the Farfel Prize for Excellence in Investigative Reporting, the National Headliner awards for Public Service and Series Writing, two Associated Press Managing Editors' awards for Public Service, the Clark Mollenhoff Memorial Award for Investigative Reporting, three National Press Club awards for consumer journalism, and three Brechner Freedom of Information awards. "Fighting New Jersey's Tax Crush" (2009), which D'Ambrosio edited and co-wrote, was named a finalist for the 2010 Pulitzer Prize for Public Service. He was named executive editor of the Press in February 2019 and departed the company in November 2022. He joined The Marshall Project criminal justice news site as senior editor in April 2023. Fiction writing D'Ambrosio's debut novel, Cold Rolled Dead, was a finalist for the Eric Hoffer Award in 2008, and was a best-seller for several weeks on Amazon.com's Techno-thriller list. His work has been compared to Tom Clancy by The SandPaper news magazine. The Asbury Park Press, D'Ambrosio's employer, called the novel "... a page-turner with hefty detail on police procedure ... and human nature at its darkest.... Selected works News articles Vital Signs (1996) (D'Ambrosio, Linsk, McEnry, Becker) House of Cards (1997–98) (Asbury Park Press Staff) Right to Know Nothing (1999) (D'Ambrosio) Profiting from Public Service (2003–2004) (D'Ambrosio and Gannett New Jersey staff) Pay to Play and The Power Brokers (2004) (D'Ambrosio, Prado Roberts, and Ganne
https://en.wikipedia.org/wiki/Laser%20Tank%20%28disambiguation%29
The Laser Tank is a fictional vehicle in the Space 1999 television series. Laser Tank may also refer to: 1K17 Szhatie, Soviet laser tank LaserTank, a 1995 computer puzzle game Laser Tank (board game), a 1980 board game published by Judges Guild
https://en.wikipedia.org/wiki/Event%20%28synchronization%20primitive%29
In computer science, an event (also called event semaphore) is a type of synchronization mechanism that is used to indicate to waiting processes when a particular condition has become true. An event is an abstract data type with a boolean state and the following operations: wait - when executed, causes the suspension of the executing process until the state of the event is set to true. If the state is already set to true before wait was called, wait has no effect. set - sets the event's state to true, release all waiting processes. clear - sets the event's state to false. Different implementations of events may provide different subsets of these possible operations; for example, the implementation provided by Microsoft Windows provides the operations wait (WaitForObject and related functions), set (SetEvent), and clear (ResetEvent). An option that may be specified during creation of the event object changes the behaviour of SetEvent so that only a single thread is released and the state is automatically returned to false after that thread is released. Events short of reset function, that is, those which can be completed only once, are known as futures. Monitors are, on the other hand, more general since they combine completion signaling with mutex and do not let the producer and consumer to execute simultaneously in the monitor making it an event+critical section. References External links Event Objects, Microsoft Developer Network Thread Synchronization Mechanisms in Python Concurrency control Synchronization primitive Terms in science and technology
https://en.wikipedia.org/wiki/PIQ
Piq may refer to: PiQ (magazine), an American popular culture magazine Performance IQ, a sub-type of an intelligence test Prefetch input queue, pre-fetched computer instructions stored in a data structure Property Information Questionnaire, a document completed by the seller of a property
https://en.wikipedia.org/wiki/Womensforum
Womensforum is a United States-based online community website for women. History Based in Chicago, Illinois, it was co-created by Jodi Turek and Mark Kaufman in 1996. The network of sites aggregated and promoted content from partner websites aimed at their demographic. Womensforum.com offered content from a wide range of topics such as health, family, home, fashion, career, pop culture, and relationships. In 2000, the website obtained $17 million in financing from venture capital firm VantagePoint Venture Partners. As of April 2008, Womensforum was ranked in the top 10 U.S. gaining properties based on unique visitors. As of July 2008, Womensforum had over 40 sites in its network and received more than 6.7 million visitors each month. As of October 2009, WomensForum partner sites had grown to more than 50. Some of their partners included Babynames.com, and CopyKat.com. See also Pink Petro References External links Official Website How To Be A Better Girlfriend 1996 establishments in the United States American social networking websites Internet properties established in 1996 American women's websites
https://en.wikipedia.org/wiki/Ken%20Rutherford
Ken Rutherford may refer to: Ken Rutherford (political scientist) (born 1962), co-founder of the Landmine Survivors Network; political science researcher Ken Rutherford (cricketer) (born 1965), New Zealand cricketer
https://en.wikipedia.org/wiki/Trapped%20%28Australian%20TV%20series%29
Trapped is an Australian children's television series which first premiered on 30 November 2008 and finished its first run on 18 April 2009 on the Seven Network. The 26-part series was shot entirely on location in and around Broome, Western Australia from May to October 2008. A follow-up series entitled Castaway began airing on the Seven Network on 12 February 2011. Many of the actors in the main cast of Trapped reprised their roles. Premise Following the mysterious disappearance of their parents from a remote scientific research station, a group of children are trapped in a dangerous paradise. They can only rely on their own resources to survive, find out what's happened to their parents and uncover the terrible secret that is behind the Enterprise Project. Many challenges, mysteries and problems are faced. It's their job to work this all out. Cast Main Marcel Bracks as Rob Frazer Benjamin Jay as Ryan Cavaner Maia Mitchell as Natasha Hamilton Anthony Spanos as Josh Jacobs Mikayla Southgate as Jarrah Haddon Sam Fraser as Suzuki Haddon Natasha Phillips as Lily Taylor Matilda Terbio as Emma Taylor Kim Walsh as Maggie Monks Brad Albert as Gabe Episodes See also Castaway (TV series) List of Australian television series References External links Trapped on Facebook Australian children's television series Seven Network original programming 2008 Australian television series debuts 2009 Australian television series endings Television shows set in Western Australia Television series about children
https://en.wikipedia.org/wiki/Ninzic%20languages
The dozen or so Ninzic languages are a branch of the Plateau family spoken in central Nigeria. Classification There is little data on the Ninzic languages, and it is not clear that all of the following languages are related. Blench (2008) lists the following languages, twice as many as Greenberg 1963 ("Plateau IV"). They are not subclassified apart from a few obvious dialect clusters. Ce (Che, Rukuba), Ninzo (Ninzam), Mada, Ninkyop (Kaninkwom)–Nindem, Kanufi (Anib), Gwantu (Gbantu), Bu-Ninkada (Bu), Ningye, Nungu, Ninka, Gbətsu, Nkɔ and perhaps Ayu. Names and locations Below is a list of language names, populations, and locations from Blench (2019). Footnotes References Blench (2008) Prospecting proto-Plateau. Manuscript. External links Roger Blench: Ninzic materials Plateau languages
https://en.wikipedia.org/wiki/Great%20Naval%20Battles
Great Naval Battles is a series of computer games by Strategic Simulations which simulate combat between naval vessels. It consist of five separate games, four of which depict various phases of World War II. Each game combines a wider view of the action on a fleet scale, as well as controls for individual ships. SSI covered similar themes in another naval game, Fighting Steel, which was released afterwards, in 1999. Games in series The game series contains the following games: Great Naval Battles: North Atlantic 1939-1943 was released in 1992 and depicts naval warfare in the North Atlantic during World War 2. Great Naval Battles: Guadalcanal 1942-1943 depicts naval combat in the Pacific Ocean during World War 2. Great Naval Battles Vol. III: Fury in the Pacific, 1941–1944 is a direct sequel to #2 and depicts the remainder of the Pacific Ocean war. It was not considered to be as strong a product as the previous two games, as it had some problems with bugs. the game structure was problematic due to some attempts to include air combat. Great Naval Battles 4: Burning Steel 1939–1942 was released in 1995 and constituted a major overhaul of the game. It utilized entirely new procedures and interfaces. Several new features were provided, including the ability to full customize each combat scenario. Great Naval Battles V: Demise of the Dreadnoughts; 1914–18 is set in World War I, and does not include aircraft. It was only sold in the boxed set Great Naval Battles – the Final Fury, which contained all games of the series plus GNBNA. Gameplay and dynamics Every game provides a choice between individual ship views and fleet command views. Players can choose individual stations to operate during the game. Background music Great Naval Battles: North Atlantic 1939–1943 When "British" is being selected for the gameplay, Rule Britannia is being played. Whereas if "German" is being selected, Unter dem Doppeladler is being played. Great Naval Battles Vol. II: Guadalcanal 1942–43 Great Naval Battles Vol. III: Fury in the Pacific, 1941–1944 Great Naval Battles 4: Burning Steel 1939–1942 Great Naval Battles V: Demise of the Dreadnoughts; 1914–18 See also Naval warfare Harpoon (series) References External links Article comparing all games at naval wargame website Review of game 1 at naval gaming website Review of game #4 at subsim.com DOS games Ship simulation games Naval video games World War II video games Naval games Strategic Simulations games Video game franchises Video game franchises introduced in 1992 Video games developed in the United States Computer wargames
https://en.wikipedia.org/wiki/List%20of%20settlements%20in%20Devon%20by%20population
This list is of towns and cities in Devon in order of their population, according to the 2011 census data from the Office for National Statistics. It comprises the Key Statistics for local authorities, civil parishes and wards that attempt to show their populations. The largest settlement in Devon is the city and unitary authority of Plymouth with a population of 256,720, whereas the smallest settlement was the town and civil parish of Beer with a population of 1,317. The city of Exeter, which is home to Exeter Cathedral, is the county town and headquarters of Devon County Council. The ceremonial county of Devon includes unitary authority areas of Plymouth and Torbay, but the non-metropolitan county of Devon excludes such unitary authority areas. It is governed by Devon County Council, whereas Plymouth and Torbay can govern themselves on matters such as transport and education. Traditionally a town is any settlement which has received a charter of incorporation, more commonly known as a town charter, approved by the monarch. However, since 1974, any civil parish has the right to declare itself as a town. Prior to 1888, city status was given to settlements home to a cathedral of the Church of England such as Exeter. After 1888 it was no longer a necessary condition, leading to Plymouth gaining city-status in 1928. Historical towns such as Plympton, Stonehouse and Devonport, which were merged into the city of Plymouth, have not been included, as well as Topsham, which became a part of Exeter's urban district, and St Marychurch, which was annexed by Torquay. However, the unitary authority area of Torbay recognises the three towns of Torquay, Paignton and Brixham. The ward for Ottery St Mary is also included, as it is titled Ottery St Mary Town. Changes to population structures have, however, led to explosions in non-traditional settlements that do not fall into traditional, bureaucratic definitions of 'towns'. Several villages, which are not included in this list, have grown steadily and are more populous than many towns. For example, the ward of Fremington, with a population of 4,310. would be ranked 34 whilst its neighbour Braunton civil parish, with a population of 8,128, would be ranked 21. See also List of urban areas in the United Kingdom List of English districts by population Subdivisions of Scotland § Council areas List of Welsh principal areas List of districts in Northern Ireland (pre-2015) Travel to work area References Towns and cities Devon
https://en.wikipedia.org/wiki/10%2C000%20Women
10,000 Women is a program organized by Goldman Sachs and the Goldman Sachs Foundation with the goal of helping to grow local economies by providing business education, mentoring and networking, and access to capital to underserved women entrepreneurs globally. The program was announced on March 5, 2008, at Columbia University. The initiative is one of the largest philanthropic projects the bank has been involved with. The program was in its initial years run by Dina Habib Powell, a managing director at Goldman Sachs. The program was continuing in 2022; Goldman Sachs published a report on the impact of the COVID-19 pandemic on female entrepreneursfrom the viewpoint of the 10,000 Women program. Award process As part of the program, Goldman Sachs committed US$100 million in funding and partnered universities in Europe and the United States with business schools in developing and emerging economies. Vital Voices presented the 10,000 Women Entrepreneurial Achievement Award at its annual Global Leadership Awards event from 2009 to 2011. The award was given to a graduate of the 10,000 Women program, sponsored by Goldman Sachs. Past recipients include Temituokpe Esisi of Nigeria (2009), Andeisha Farid of Afghanistan (2010) and Fatema Akbari of Afghanistan (2011). In September 2013, Goldman Sachs launched a public Twitter presence for the 10,000 Women program using the screen name @GS10KWomen. In December 2015 the account had over 39,000 followers. Women Entrepreneurs Opportunity Facility In March 2014, the World Bank’s International Finance Corporation and Goldman Sachs 10,000 Women program launched a $600 million financing program called the Women Entrepreneurs Opportunity Facility to allow 100,000 women entrepreneurs in emerging markets to have access to financing. IFC invested an initial $100 million in the program, and Goldman Sachs Foundation provided $32 million, with an additional $486 million expected from public and private investors. Academic partners See also 10,000 Small Businesses References External links 10,000 Women Goldman Sachs
https://en.wikipedia.org/wiki/German%20post%20offices%20abroad
The German post offices abroad were an extraterritorial network of German post offices in foreign countries with a significant German commercial interest to provide mail service where the local services were generally deemed unsafe or unreliable, such as China, Morocco, Ottoman Empire and Zanzibar. The system ended during or shortly after World War I. The cancellation mark of the mail processed by the German system in the early period are the only means of identifying the point of use; such stamps are known as "Vorläufer" (forerunner) stamps. Later stamps are identified by overprints of the place of issuance even when not for postal use. German abroad stamps started appearing in the late 19th century and reached their heyday at the beginning of the 20th century. Stamps from German post offices abroad are popular with collectors and some can be valuable. In a 2006 auction, a 40 Pfennig Germania hand-stamped "China" (Tientsin issue) stamp from 1900 realized 100,152 Euros. Other countries maintained postal offices abroad. In the latter part of the 19th century and into the 20th century and having extraterritorial post offices were a perceived indication of a nation's international power. References and sources References Sources Philately of Germany
https://en.wikipedia.org/wiki/Epistemic%20community%20%28international%20relations%29
An epistemic community in international relations (IR) is a network of professionals with recognized knowledge and skill in a particular issue-area. They share a set of beliefs, which provide a value-based foundation for the actions of members. Members of an epistemic community also share causal beliefs, which result from their analysis of practices that contribute to set of problems in their issue-area that then allow them to see the multiple links between policy and outcomes. Third, they share notions of validity, or internationally defined criteria for validating knowledge in their area of know-how. However, the members are from all different professions. Epistemic communities also have a common set of practices associated with a set of problems towards which their professional knowledge is directed, because of the belief that human welfare will benefit as a result. Communities evolve independently and without influence of authority or government. They do not have to be large; some are made up of only a few members. Even non-members can have an influence on epistemic communities. However, if the community loses consensus, then its authority decreases. Emergence Epistemic communities came to be because of the rapid professionalization of government agencies. The Columbia Basin Inter-Agency Committee was created by U.S. President Franklin D. Roosevelt to coordinate the planning process. However, it did not actually participate in the planning process, but rather, was the venue that the Army Corps of Engineers and the Bureau of Reclamation used to divide construction projects. The failure of the Columbia Basin Inter-Agency Committee to be part of the planning process shows that “committees imposed from the top may be less likely to promote coordination than to provide agency officials with a means to enhance their autonomy,” (Thomas 1997, 225). Another reason why epistemic communities came to be is that decision makers began turning to experts to help them understand issues because there were more issues and all were more complicated. This caused greater interest in planning, and future-oriented research, which caused the establishment of environmental and natural resource agencies in 118 countries from 1972 to 1982. Growing professionalization of bureaucracies caused more respect towards experts, especially scientists. The first achievement by epistemic communities was the Anti-Ballistic Missile Treaty between the United States and Russia. Role in international relations Epistemic communities influence policy by providing knowledge to policy makers. Uncertainty plays a large role in an epistemic community's influence, because they hold the knowledge that policy makers need to create the wanted outcomes in policy. According to Robert Keohane they fill the absence of “a research program” [that shows] in particular studies that it can illuminate important issues in world politics,” (Adler/Haas 1992, 367). They can influence the setting of stand
https://en.wikipedia.org/wiki/Tampa%20Bay%20Rays%20Radio%20Network
The Tampa Bay Rays Radio Network is a radio network in the southeastern United States that broadcasts baseball games and related programming for the Tampa Bay Rays of Major League Baseball. Additionally, there is a 2-station Spanish language network. Since 2009, WDAE/620 in St. Petersburg, Florida, has served as the flagship station for the network. In addition, WGES/680 in St. Petersburg, Florida airs games in Spanish but is not part of the network. Announcers Andy Freed has been part of the Rays Radio Network since 2005 after spending time with the Pawsox Radio Network as an announcer there as well as the Trenton Thunder. Dave Wills also started with the Rays Radio Network in 2005 after 11 years with the Chicago White Sox. He had been broadcasting sports since 1991 when he was the first announcer for the Kane County Cougars. He died during spring training in 2023. Neil Solondz joined the Rays Radio Network for the 2012 season as pregame and postgame show host. He spent the last eight years as play-by-play broadcaster for the Durham Bulls, the Rays' Triple-A affiliate. Solondz also had several stints filling in as Rays pregame and postgame show host the previous two seasons. Following the death of Dave Wills in 2023, Solondz was promoted to join Andy Freed in the radio booth. On the Spanish broadcasts, Ricardo Tavaras does play-by-play and Enrique Oliu provides color commentary. Stations Stations are current as of the 2021 season. Former affiliates WFLA (AM)/970: Tampa (Original flagship station) WORL/660: Altamonte Springs/Orlando (–2019) WFLN/1480: Arcadia, Florida (?-2012) WHOO/1080: Kissimmee, Florida (?-2012) WGMW/99.5: LaCrosse, Florida/Gainesville (?-2009) WJBX/770: North Fort Myers, Florida (?-2012) WHOO/1080: Orlando (?-2012) WJUA/1200: Pine Island Center/Ft. Myers (2013) WSTU/1450: Stuart, Florida (?-2012) WIXC/1060: Titusville, Florida (~2008) KLRG/880: Little Rock (2013-) WIQR/1410: Prattville, Alabama (?-2016) WWCN/99.3: Fort Myers, Florida See also List of Tampa Bay Rays broadcasters List of XM Satellite Radio channels List of Sirius Satellite Radio stations References Tampa Bay Rays Major League Baseball on the radio Sports radio networks in the United States
https://en.wikipedia.org/wiki/Global%20Network%20Initiative
The Global Network Initiative (GNI) is a non-governmental organization with the dual goals of preventing Internet censorship by authoritarian governments and protecting the Internet privacy rights of individuals. It is sponsored by a coalition of multinational corporations, global non-profit organizations, and academic institutions. David Kaye (academic) is the Independent Chair of the Board. Mark Stephens (solicitor) was the previous Independent Chair. History On October 29, 2008, the Global Network Initiative (GNI) was founded upon its "Principles of Freedom of Expression and Privacy". The Initiative was launched in the 60th anniversary year of the Universal Declaration of Human Rights (UDHR), and is based on internationally recognized laws and standards for human rights on freedom of expression and privacy set out in the UDHR, the International Covenant on Civil and Political Rights (ICCPR) and the International Covenant on Economic, Social and Cultural Rights (ICESCR). GNI Principles Global Network Initiative has developed the These Principles have been developed by companies, investors, civil society organizations and academics with the aim to protect and advance freedom of expression and privacy in the Information and Communications Technology industry globally. These are: Privacy Responsible Company Decision Making Multi-Stakeholder Collaboration Governance, Accountability, and Transparency Issues Global Network Initiative focuses on a wide range of issues. Including, network disruption, Intermediary Liability, Surveillance, Jurisdictional Assertions, and Limits. Profile As a human rights organization, GNI seeks to safeguard freedom of expression and personal privacy against government restrictions. The protections are facilitated by a coalition of companies, investors, civil society organizations, academics, and other stakeholders. GNI esteems freedom of expression and privacy each as a "human right and guarantor of human dignity". Participants are expected to respect and protect information available to users and users' ability to freely create and distribute information, provided that they operate outside narrowly defined circumstances necessary to adhere to international laws and standards set by the International Covenant on Civil and Political Rights (ICCPR). Participants are also expected to protect users' personal information from illegal or arbitrary interference when confronted with government demands, laws, or regulations that compromise a user's privacy. The same principle of adherence of international laws and standards applies. Collaboration among stakeholders is key to the goals of the Global Network Initiative. The GNI's outline of principles encourages participants to explore ways to engage governments to advance their cause, individually or collectively. GNI recognizes that the actions of their corporate participants alone cannot guarantee the protection of human rights. One fundamental commitment is to pr
https://en.wikipedia.org/wiki/Tensor%20network%20theory
Tensor network theory is a theory of brain function (particularly that of the cerebellum) that provides a mathematical model of the transformation of sensory space-time coordinates into motor coordinates and vice versa by cerebellar neuronal networks. The theory was developed by Andras Pellionisz and Rodolfo Llinas in the 1980s as a geometrization of brain function (especially of the central nervous system) using tensors. History Geometrization movement of the mid-20th century The mid-20th century saw a concerted movement to quantify and provide geometric models for various fields of science, including biology and physics. The geometrization of biology began in the 1950s in an effort to reduce concepts and principles of biology down into concepts of geometry similar to what was done in physics in the decades before. In fact, much of the geometrization that took place in the field of biology took its cues from the geometrization of contemporary physics. One major achievement in general relativity was the geometrization of gravitation. This allowed the trajectories of objects to be modeled as geodesic curves (or optimal paths) in a Riemannian space manifold. During the 1980s, the field of theoretical physics also witnessed an outburst of geometrization activity in parallel with the development of the Unified Field Theory, the Theory of Everything, and the similar Grand Unified Theory, all of which attempted to explain connections between known physical phenomena. The geometrization of biology in parallel with the geometrization of physics covered a multitude of fields, including populations, disease outbreaks, and evolution, and continues to be an active field of research even today. By developing geometric models of populations and disease outbreaks, it is possible to predict the extent of the epidemic and allow public health officials and medical professionals to control disease outbreaks and better prepare for future epidemics. Likewise, there is work being done to develop geometric models for the evolutionary process of species in order to study the process of evolution, the space of morphological properties, the diversity of forms and spontaneous changes and mutations. Geometrization of the brain and tensor network theory Around the same time as all of the developments in the geometrization of biology and physics, some headway was made in the geometrization of neuroscience. At the time, it became more and more necessary for brain functions to be quantified in order to study them more rigorously. Much of the progress can be attributed to the work of Pellionisz and Llinas and their associates who developed the tensor network theory in order to give researchers a means to quantify and model central nervous system activities. In 1980, Pellionisz and Llinas introduced their tensor network theory to describe the behavior of the cerebellum in transforming afferent sensory inputs into efferent motor outputs. They proposed that intrinsic multi
https://en.wikipedia.org/wiki/Prokopis%20Doukas
Prokopis Doukas is a Greek journalist and newscaster. Born in Athens, Greece in 1963, he studied electrical engineering (M. Sc. in electronics, telecommunications and networks) at the University of Patras, Greece and music technology at the Center for Computer Research in Music and Acoustics (CCRMA), Stanford University, Ca. as a visiting scholar. His career as a DJ and journalist started with the "burst" of independent radio in Greece, in 1988. He has collaborated with major music and news stations in Athens, such as Sky 100.4, Antenna 97.1, Jazz Fm, Athina 9.84, Net 105.8, and Kosmos 93.6. In 1997, he was appointed as one of the principal anchors at the Greek state television. He has been presenting the night news since 1999, in both public broadcasting channels, ET1 and New Hellenic Television (NET), where he was replaced by Maria Houkli in 2001. Since 2003, he has been one of the senior political commentators for the "Athens Voice", the largest free-press weekly newspaper in Greece. He has also collaborated, as a freelancer, with numerous newspapers and magazines, such as "Epsilon" of the "Eleftherotypia" daily, "Metro" and "Metarithmisi". Since 1991, he has been teaching young journalists, at various schools, such as Antenna Journalism School, Athens Media Lab and IEK Akmi. He has also taken part in two films by Greek director Nikos Grammatikos, "Apontes" and "O Vassilias". References 1963 births Living people Mass media people from Athens Greek journalists University of Patras alumni Stanford University faculty
https://en.wikipedia.org/wiki/Worst-case%20complexity
In computer science (specifically computational complexity theory), the worst-case complexity measures the resources (e.g. running time, memory) that an algorithm requires given an input of arbitrary size (commonly denoted as in asymptotic notation). It gives an upper bound on the resources required by the algorithm. In the case of running time, the worst-case time complexity indicates the longest running time performed by an algorithm given any input of size , and thus guarantees that the algorithm will finish in the indicated period of time. The order of growth (e.g. linear, logarithmic) of the worst-case complexity is commonly used to compare the efficiency of two algorithms. The worst-case complexity of an algorithm should be contrasted with its average-case complexity, which is an average measure of the amount of resources the algorithm uses on a random input. Definition Given a model of computation and an algorithm that halts on each input , the mapping is called the time complexity of if, for every input string , halts after exactly steps. Since we usually are interested in the dependence of the time complexity on different input lengths, abusing terminology, the time complexity is sometimes referred to the mapping , defined by the maximal complexity of inputs with length or size . Similar definitions can be given for space complexity, randomness complexity, etc. Ways of speaking Very frequently, the complexity of an algorithm is given in asymptotic Big-O Notation, which gives its growth rate in the form with a certain real valued comparison function and the meaning: There exists a positive real number and a natural number such that Quite frequently, the wording is: „Algorithm has the worst-case complexity .“ or even only: „Algorithm has complexity .“ Examples Consider performing insertion sort on numbers on a random-access machine. The best-case for the algorithm is when the numbers are already sorted, which takes steps to perform the task. However, the input in the worst-case for the algorithm is when the numbers are reverse sorted and it takes steps to sort them; therefore the worst-case time-complexity of insertion sort is of . See also Analysis of algorithms References Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, and Clifford Stein. Introduction to Algorithms, Second Edition. MIT Press and McGraw-Hill, 2001. . Chapter 2.2: Analyzing algorithms, pp.25-27. Oded Goldreich. Computational Complexity: A Conceptual Perspective. Cambridge University Press, 2008. , p.32. Analysis of algorithms
https://en.wikipedia.org/wiki/Warren%20Blatt
Warren Blatt (born 1962) is an American genealogist and computer engineer who is the Managing Director of JewishGen, an online source for researching Jewish roots. He is the author/coauthor of a number of books including Getting Started in Jewish Genealogy (with Gary Mokotoff). Blatt received the Lifetime Achievement Award of the International Association of Jewish Genealogical Societies in 2004. Works and publications References Living people 1962 births American genealogists Jewish genealogy Jewish American historians American male non-fiction writers 21st-century American historians 21st-century American male writers 21st-century American Jews
https://en.wikipedia.org/wiki/United%20States%20v.%20Drew
United States v. Drew, 259 F.R.D. 449 (C.D. Cal. 2009), was an American federal criminal case in which the U.S. government charged Lori Drew with violations of the Computer Fraud and Abuse Act (CFAA) over her alleged cyberbullying of her 13-year-old neighbor, Megan Meier, who had committed suicide. The jury deadlocked on a felony conspiracy count and acquitted Drew of three felony CFAA violations, but found her guilty of lesser included misdemeanor violations; the judge overturned these convictions in response to a subsequent motion for acquittal by Drew. Allegations leading to indictment and trial In 2006, Lori Drew (née Shreeves) lived in St. Charles County, Missouri, with her husband Curt and their teenaged daughter, Sarah. Megan Meier, who at one time had been friends with Sarah Drew, lived down the street from Drew. During the summer of 2006, Drew reportedly became concerned that Meier was spreading false statements about her daughter. Lori Drew, Sarah Drew, and Drew's employee, Ashley Grills, allegedly decided to create a fake Myspace account of a 16-year-old boy under the alias "Josh Evans". They allegedly used that account to discover whether Meier was spreading false statements about Sarah Drew. Drew allegedly used the Myspace account to contact Meier, who apparently believed that "Josh Evans" was a 16-year-old boy. "Josh Evans" communicated with Meier through October 16, 2006, via the Myspace account in a manner described by the prosecution as flirtatious. On October 16, 2006, "Josh Evans" allegedly sent Meier a message to the effect that the world would be a better place without her. Additional Myspace members whose profiles reflected links with the "Josh Evans" profile also began to send Meier negative messages. Subsequently, Meier's mother discovered that her daughter had hanged herself in her bedroom closet. After Meier's death, according to the indictment, Lori Drew removed the fake "Josh Evans" account and commanded a juvenile who knew about the fake account "keep her mouth shut". Legal history In early December 2007, Missouri prosecutors announced they would not file charges against Lori Drew in connection with Megan Meier's death. At a press conference, St. Charles County Prosecutor Jack Banas stated there was not enough evidence to bring the charges. As a result, the federal government decided to pursue the case in Los Angeles, where Myspace is based. The Meiers did not file a civil lawsuit. Indictment Thomas O'Brien, U.S. Attorney for the Central District of California, undertook prosecution of federal charges in connection with the case. On May 15, 2008, Drew was indicted by the Grand Jury of the United States District Court for the Central District of California on four counts. The first count alleged a conspiracy arising out of a charged violation of 18 U.S.C. § 371, namely that Drew and her co-conspirators agreed to violate the CFAA by intentionally accessing a computer used in interstate commerce "without author
https://en.wikipedia.org/wiki/German%20post%20offices%20in%20China
The German Post Offices Abroad were a network of post offices in foreign countries established by Germany to provide mail service where the local services were deemed unsafe or unreliable. They were generally set up in cities with some sort of German commercial interest. In the earliest period when such offices were open, stamps used there can only be identified by their cancellations. Such stamps are known as "Vorläufer" (forerunner) stamps. Later stamps issued for use at a post office abroad can generally be identified by overprints even when not postally used. Germany began issuing distinctive stamps for use overseas beginning in the late 19th century, and the number and variety of issues reached its heyday at the beginning of the 20th century. All German Post Offices Abroad were closed down during or shortly after World War I. It was not unusual for countries to maintain such offices and Austria-Hungary, China, France, Greece, Italy, Japan, Poland, Romania, Russia, the United Kingdom and the United States all did so. In the latter part of the 19th century and into the 20th century, having extraterritorial post offices was one indication of a nation's international power. Stamps from German post offices abroad are popular with collectors and some are quite valuable. In a 2006 auction, a 40 Pfennig Germania hand-stamped "China" (Tientsin issue) stamp from 1900 realized 100,152 Euros. History German post offices in China (German: Deutsche Post in China) started to operate in 1886. Initially definitive stamps were used without overprint; such a stamp used in China is only recognizable by its cancellation. In 1898 stamps were issued with a diagonal overprint reading "China". From 1900 onwards, stamps of the Germania definitive series were issued with new style of horizontal "China" overprint. After 1905, a third "Gothic" style of "China" overprint was applied to Germania stamps which also obliterated the stamps' face value as stated in German mark and pfennig values, and replaced them with equivalent face values in Chinese dollars and cents. All German post offices in China closed after China declared war on Germany on 16 March 1917 if they were still operating on that date. Some had closed prior to this. Post offices opening year Post offices operated in these towns from the listed dates: 1886 Schanghai (Spelled "Shanghai" in pre-1906 cancels) 1893 Tientsin 1900 Tschifu Futschau Hankau—located in what is now the city of Wuhan Itschang—post office in operation until September 1908 Peking Tongku—post office in operation until April 1906 1901 Shanhaikwan—post office in operation until October 1902 Tschinkiang Tschinwangtau—post office in operation until March 1906 1902 Amoy Kanton (spelled "Canton" in pre-1913 cancels) Weihsien—post office in operation until September 1914 1903 Nanking Tschingtschoufu—post office in operation until December 1905 Tschonsun—post office in operation until January 1904 1904 Swatau Tsinanfu During th
https://en.wikipedia.org/wiki/German%20post%20offices%20in%20Morocco
The German post offices abroad were a network of post offices in foreign countries established by Germany to provide mail service where the local services were deemed unsafe or unreliable. They were generally set up in cities with some sort of German commercial interest. In early use only the cancellation mark can identify their postal use abroad; such stamps are known as "Vorläufer" (forerunner) stamps. Later stamps are identified by overprints even when not postally used. German abroad stamps started appearing in the late 19th century and reached their heyday at the beginning of the 20th century; they closed down during or shortly after World War I. It was not unusual for countries to maintain such offices; Austria-Hungary, China, France, Greece, Italy, Romania, Russia, the United Kingdom and the United States all did so. In the latter part of the 19th century and into the 20th century, having extraterritorial post offices was one indication of a nation's international power. Stamps from German post offices abroad are popular with collectors and some are quite valuable. In a 2006 auction, a 40 Pfennig Germania hand-stamped "China" (Tientsin issue) stamp from 1900 realized 100,152 Euros. German post offices in Morocco German post offices in Morocco (German: Deutsche Post in Marokko) started to operate in 1899. German definitive stamps were used with overprints; after the first issue the value was changed to pesetas and centimos. German post offices closed in French-controlled Morocco in 1914, and in Spanish-controlled Morocco and Tangier in 1919. Post offices existed in these towns (name per cancellation stamps): International control: Tanger Spanish control Alkassar Arsila Larache Tetuan French control: Asimmur Casablanca Fez Fez-Mellah Marrakesch Mazagan Meknes Mogador Rabat Saffi See also German post offices abroad German post offices in China German post offices in the Ottoman Empire German post offices in Zanzibar List of postal services abroad Notes References Philately of Germany Philately of Morocco ru:Германская почта за границей
https://en.wikipedia.org/wiki/Crime%20information%20center
A crime information center is a data warehouse and search engine operated by a staff of detectives that assists in providing relevant and timely information to officers conducting an investigation. The computer network stores facts about convicted persons, suspects, encounters, nicknames and items of seemingly trivial value whose correlation could assist in an investigation. The computer network's control room can display real-time satellite and surveillance camera images and hosts a wireless link to police vehicles equipped to generate sketches at crime scenes and transmit them for comparison to stored data. List of CICs in the United States NCIC, run by the FBI Real Time Crime Center, run by the NYPD GCIC, run by the Georgia Bureau of Investigation See also Interstate Identification Index References Law enforcement databases in the United States Criminal justice Criminal law Criminal records
https://en.wikipedia.org/wiki/FACT%20%28computer%20language%29
FACT is an early discontinued computer programming language, created by the Datamatic Division of Minneapolis Honeywell for its model 800 series business computers in 1959. FACT was an acronym for "Fully Automatic Compiling Technique". It was an influence on the design of the COBOL programming language. Some of the design of FACT was based on the linguistic project Basic English, developed about 1925 by C.K. Ogden. The software was actually designed by Computer Sciences Corporation (Fletcher Jones, Roy Nutt, and Robert L. Patrick) under contract to Richard Clippinger of Honeywell. Contributions to COBOL FACT was an influence in the design of COBOL, and is one of three predecessor languages credited in all COBOL manuals. Several elements of FACT were incorporated into COBOL: Defining data as levels, with group items and elementary items. Assigning of initial values to data as it is being defined ( clause). Specifying a limited list of literal values allowed in a specific field ( level data items). A non-procedural report generator based on specifying the appearance of the desired report (Report Section in COBOL-66). Qualification of data-names ( or clause). Group move of like-named items (). Validity checks on procedural statements ( clause). Built-in function. Implementations FACT was implemented in the 1960's, "Five FACT customers are writing all their applications using FACT" and "another dozen Honeywell customers use FACT to differing degrees.", this included a bank and a military inventory management system. It was being used by Australian Department of Defence in the 1960s and 1970s. Sample program The following code samples from the simple payroll application in the FACT specification show the fixed-form nature of FACT and its similarities with COBOL. File outlines: O 1 RU DETAIL-FILE, (DETAIL),(D) O 2 DATE O 3 MONTH O 4 DAY O 5 YEAR O 6 *EMPLOYEE-RECORD O 7 EMPLOYEE-NO, (EMPLOYNO) O 8 *NEW-EMPLOYEE,(NW) O 9 NAME O 10 RATE O 11 EXEMPTIONS,(EXEMPT) O 12 BOND-DEDUCT,(BONDEDUCT) O 13 BOND-DENOMINATION,(BONDENOM) O 30 I INTERNAL-FILE1 O 31 WORKING-DATA O 32 11 D BATCH-SUM O 33 11 D BATCH-NUMBER O 34 11 D BATCH-COUNT O O 35 11 D 1 SUM-OF-HOURS O 36 11 D CARDS-IN-BATCH O Source statements: P 85 BOND PROCEDURE. WRITE BONDORDER AND SUBTRACT 1 FROM NUM. P 86 P 87 NOTE. PHASE I OF SAMPLE PROGRAM. THE FOLLOWING PROCEDURES ARE USED TO P 88 MAKE BATCH CHECKS DURING THE CARD READING PASS. P 89 P 90 SUMMATION PROCEDURE. ADD RP HOURS TO SUM-OF-HOURS. ADD 1 TO CARDS-IN- P 91 -BATCH. P 92 P 93 BATCH-CHECK PROCEDURE. IF BATCH-SUM IS NOT EQUAL TO SUM-OF-HOURS OR BATCH- P 94 -COUNT IS NOT EQUAL TO CARDS-IN-BATCH SEE BAD-BATCH. SET SUM-OF-HOURS P 95
https://en.wikipedia.org/wiki/MNU
The abbreviation MNU may refer to: Matariki Network of Universities, an international group MidAmerica Nazarene University, Olathe, Kansas, US The Maldives National University, Male' Mokpo National University, Muan/Mokpo, South Jeolla province, South Korea Mianyang Normal University, Mianyang, Sichuan, China Multi-National United, in the film District 9 Myanmar Noble University, Yangon Myanmar Movimento Negro Unificado Contra a Discriminação Racial, Brazil; see Black movement in Brazil
https://en.wikipedia.org/wiki/RollDaBeats
Rolldabeats (branded in lowercase, as rolldabeats) is an online music database and internet forum dedicated to drum and bass and its various stylistic origins. It was launched in February 2005 by the original webmaster Thijs Engels, and web designer Tom "Haste" Johnson. Having gone offline in November 2022, it has partially been reinstated in September 2023. History Rolldabeats originally started in December 2001 as Tarzan, an online database of music releases compiled from Engels music collection. This soon expanded through regular contributors to the forum, especially tracklistings of mixtapes and unreleased tracks. In February 2005, the site was redesigned by Haste, one of the contributors from the forum, and relaunched as Rolldabeats. It is co-owned by Engels and Haste and maintained by a small team of site moderators. The database grew to collate information on over 100,000 tracks released by more than 20,000 artists, and as an alternative to Discogs. The site was nominated twice for Best Website in the Dutch Drum 'n' Bass Awards of 2006–07, losing to DnBForum.nl on both occasions, and taking joint second with 3VOOR12 in the latter. It has also promoted a series of DJ mixes titled A Decade in the Mix by various members of the site staff which illustrate the development of drum and bass in the 1990s. The site held a fundraiser on 3 November 2007, hosted by London nightclub DiTch, featuring several live sets including DJ Bailey of BBC Radio 1Xtra. In November 2022, the site was taken offline, however in September 2023 the forum was reinstated. See also Discogs List of online music databases References External links – official site Online music and lyrics databases Dutch music websites
https://en.wikipedia.org/wiki/List%20of%20omics%20topics%20in%20biology
Inspired by the terms genome and genomics, other words to describe complete biological datasets, mostly sets of biomolecules originating from one organism, have been coined with the suffix -ome and -omics. Some of these terms are related to each other in a hierarchical fashion. For example, the genome contains the ORFeome, which gives rise to the transcriptome, which is translated to the proteome. Other terms are overlapping and refer to the structure and/or function of a subset of proteins (e.g. glycome, kinome). An omicist is a scientist who studies omeomics, cataloging all the “omics” subfields. Omics.org is a Wiki that collects and alphabetically lists all the known "omes" and "omics." List of topics Hierarchy of topics For the sake of clarity, some topics are listed more than once. Bibliome Connectome Cytome Editome Embryome Epigenome Methylome Exposome Envirome Toxome Foodome Microbiome Sociome Genome Variome Exome ORFeome Transcriptome Proteome Kinome Secretome Chaperome Allergenome Pharmacogenome Regulome Hologenome Interactome Interferome Ionome Fluxome Membranome Metagenome Metallome Microbiome Moleculome Glycome Ionome Lipidome Metabolome Volatilome Metallome Proteome Obesidome Organome Phenome Physiome Connectome Synaptome Dynome Mechanome Regulome Researchsome Toponome Trialome Antibodyome References Systems biology
https://en.wikipedia.org/wiki/Real-time%20adaptive%20security
Real-time Adaptive Security is the network security model necessary to accommodate the emergence of multiple perimeters and moving parts on the network, and increasingly advanced threats targeting enterprises. Adaptive security can watch a network for malicious traffic and behavioral anomalies, ferret out end point vulnerabilities, identify real-time changes to systems, automatically enforce end point protections and access rules, block malicious traffic, follow a compliance dashboard while providing audit data, and more. Among the key features of an adaptive security infrastructure are security platforms that share and correlate information rather than point solutions, so the heuristics system could communicate its suspicions to the firewall. Other features include finer-grained controls, automation (in addition to human intervention), on-demand security services, security as a service, and integration of security and management data. Rather than adding security to custom applications after they go operational, security models would be created at the design phase of an app. A major change with this model of real-time adaptive security is shifting authorization management and policy to an on-demand service that contains details and policy enforcement that matches compliance and can adapt to the user's situation when he or she is trying to access an application, for instance. Dependence on Machine Learning The factual importance in getting adapted to changing network for any real time adaptive scenario cannot overlook the possibilities of machine learning. It is all about the behaviour of users over network. Adaptive authentication depends on machine learning to model a baseline over time of mannerism of normal users. Recent advents in machine learning offers a brighter prospect in artificial intelligence integration to real time adaptation. Unique risk score is figured out which will define and decide of possibilities of security issues thereby ensuring escalated protection along with stopless user accessibility. See also Intrusion-detection system Network intrusion detection system Sourcefire IBM Internet Security Systems Machine Learning Risk-based Authentication Security-Adaptive Architecture References Computer network security System administration
https://en.wikipedia.org/wiki/BESYS
BESYS (Bell Operating System) was an early computing environment originally implemented as a batch processing operating system in 1957 at Bell Labs for the IBM 704 computer. Overview The system was developed because Bell recognized a "definite mismatch…between the 704's internal speed, the sluggishness of its on-line unit-record equipment, and the inherent slowness of manual operations associated with stand-alone use." According to Drummond, the name BESYS, though commonly thought to stand for BEll SYStem, is actually a concatenation of the preexisting SHARE-assigned installation code BE for Bell Telephone Laboratories, Murray Hill, NJ and the code assigned by SHARE for systems software, SYS. The goals of the system were: Flexible use of hardware, nonstop operation. Efficient batch processing, tape-to-tape operation with offline spooling of unit-record data. Use of control cards to minimize the need for operator intervention. Allow user programs access to input/output functions, system control and program libraries. Core dump facilities for debugging. Simulation of L1 and L2 interpreters to provide software compatibility with the IBM 650. The initial version of the system BESYS-1 was in use by October 16, 1957. It was created by George H. Mealy and Gwen Hansen with Wanda Lee Mammel and utilized IBM's FORTRAN and United Aircraft's Symbolic Assembly Program (SAP) programming languages. It was designed to efficiently deal with a large number of jobs originating on punched cards and producing results suitable for printing on paper and punched cards. The system also provided processing capabilities for data stored on magnetic tapes and magnetic disk storage units. Typically punched card and print processing was handled off line by peripheral Electronic Accounting Machines, IBM 1401 computers, and eventually direct coupled computers. The first system actually used at Bell Labs was BESYS-2. The system was resident on magnetic tape, and occupied the lowest 64 (36-bit) words and the highest 4K words of memory. The upper 4K words held the resident portion of the monitor, and could be partially swapped to magnetic drum to free up additional core for the user program if needed. "BESYS was a complex software package that provided convenient input/output and integrated disk file storage facilities." Internal use BESYS was used extensively by many departments of Bell Labs for over a decade. It was made available through the SHARE organization to others without charge or formal technical support. BESYS versions Versions of the BESYS environment (BESYS-3 (1960), BESYS-4 (1962), BESYS-5 (1963), BESYS-7 (1964), and BE90 (1968)) were implemented as the underlying computers transitioned through the IBM 709X family. BESYS development was discontinued when Bell Labs moved to the IBM System/360 in 1969. Throughout this period the head of the BESYS development project was George L. Baldwin. References 1957 software Bell Labs Discontinued operating systems
https://en.wikipedia.org/wiki/Ascolta
ascolta is a modern music ensemble. Its programming runs the gamut from classical modernism to the limits of contemporary classical and its boundary with rock music. The main focus of the ensemble's work is on world and national premieres of compositions written for the group. History The ensemble ascolta was formed in 2003 by seven musicians and is based in Stuttgart. It has its origins in the ensemble "Varianti", part of the "Musik der Jahrhunderte", which performed contemporary music in varying formations between 1994 and 2002, both in Germany and abroad. Profile The instrumentation of ascolta concentrates on brass and percussion, without woodwinds or upper strings. This is a deliberate counter to that of very many other new music ensembles, which tend to have Schoenberg's "Pierrot Lunaire" as reference. It is ascolta's intention to create a substantial repertoire of compositions and arrangements for this instrumentation and to establish it as standard repertory. Around 250 new pieces have been premiered in ascolta concerts. The ensemble performs also in subsets of its members, e.g. as duos or trios. Members ascolta has a fixed lineup with seven musicians and is organised entirely independently. Current members are: Markus Schwind (trumpets / flugelhorn / slide trumpet), Andrew Digby (trombones / euphonium / bass trumpet), Florian Hoelscher (piano, harpsichord, synthesiser), Boris Müller and Julian Belli (percussion), Erik Borgir (violoncello / electric cello), Hubert Steiner (guitars / electric guitars / bass guitars / mandolin / banjo) References External links ascolta website German musical groups Contemporary classical music ensembles
https://en.wikipedia.org/wiki/AMI-tv
AMI-tv is a Canadian, English-language, digital cable specialty channel owned by the non-profit organization Accessible Media. AMI-tv broadcasts a selection of general entertainment programming with accommodations for those who are visually or hearing impaired, with audio descriptions on the primary audio track and closed captioning available across all programming. It was launched on January 29, 2009 by a consortium of Canwest, Accessible Media and Bell Media. Later on, Shaw Media acquired Canwest's shares of AMI-tv in 2010 while the latter acquired Bell's shares in 2011 when Bell Canada gained 100% control of its channels. Accessible Media became the sole owner of AMI-tv in 2016 following Corus Entertainment's acquisition of Shaw Media. From that point on, AMI-tv airs some its selected original programming alongside imported programming from other properties. Along with acquired content, AMI-tv also broadcasts original series on accessibility- and disability-related topics, and has occasionally broadcast simulcasts of news and sporting events in its open described video format. AMI-tv is licensed by the Canadian Radio-television and Telecommunications Commission (CRTC) as a discretionary "must-carry" service; it must be carried on the lowest level of service by all licensed digital cable, satellite television, and IPTV providers in Canada. On December 16, 2014, AMI launched a French-language version of the network, AMI-télé, under a second Category A licence. History Licensing On March 27, 2007, the CRTC held a public hearing to consider twelve applications from applicants requesting mandatory distribution for their television services in the basic package of all digital television service providers in Canada. Among those twelve applicants was the National Broadcast Reading Service (NBRS), a non-profit organization that operates the reading service VoicePrint, which is also a "must-carry" service. The NBRS proposed a service known as The Accessible Channel (TAC), a 24-hour English-language channel that would be devoted to providing programming of interest to those who are blind or visually impaired, in a format accessible to those individuals. The NBRS believed that visually impaired viewers had difficulties locating television programming with described video due to a number of factors, such as the small amount of described programming on Canadian television at the time (an estimated 3%) and difficulties accessing the second audio program (SAP) on which described video is typically carried (either due to a lack of knowledge, or television service providers being unable to correctly deliver SAP feeds to subscribers). As such, the NBRS proposed TAC to be a consistent location for accessible programming; TAC planned to broadcast all of its programming in an "open format", with described video occupying the primary audio track—allowing viewers otherwise unable to use SAP to listen to programming with described video. In conjunction with the
https://en.wikipedia.org/wiki/Property%20testing
In computer science, a property testing algorithm for a decision problem is an algorithm whose query complexity to its input is much smaller than the instance size of the problem. Typically property testing algorithms are used to distinguish if some combinatorial structure S (such as a graph or a boolean function) satisfies some property P, or is "far" from having this property (meaning an ε-fraction of the representation of S need be modified in order to make S satisfy P), using only a small number of "local" queries to the object. For example, the following promise problem admits an algorithm whose query complexity is independent of the instance size (for an arbitrary constant ε > 0): "Given a graph G on n vertices, decide if G is bipartite, or G cannot be made bipartite even after removing an arbitrary subset of at most edges of G." Property testing algorithms are central to the definition of probabilistically checkable proofs, as a probabilistically checkable proof is essentially a proof that can be verified by a property testing algorithm. Definition and variants Formally, a property testing algorithm with query complexity q(n) and proximity parameter ε for a decision problem L is a randomized algorithm that, on input x (an instance of L) makes at most q(|x|) queries to x and behaves as follows: If x is in L, the algorithm accepts x with probability at least ⅔. If x is ε-far from L, the algorithm rejects x with probability at least ⅔. Here, "x is ε-far from L" means that the Hamming distance between x and any string in L is at least ε|x|. A property testing algorithm is said to have one-sided error if it satisfies the stronger condition that the accepting probability for instances x ∈ L is 1 instead of ⅔. A property testing algorithm is said be non-adaptive if it performs all its queries before it "observes" any answers to previous queries. Such an algorithm can be viewed as operating in the following manner. First the algorithm receives its input. Before looking at the input, using its internal randomness, the algorithm decides which symbols of the input are to be queried. Next, the algorithm observes these symbols. Finally, without making any additional queries (but possibly using its randomness), the algorithm decides whether to accept or reject the input. Features and limitations The main efficiency parameter of a property testing algorithm is its query complexity, which is the maximum number of input symbols inspected over all inputs of a given length (and all random choices made by the algorithm). One is interested in designing algorithms whose query complexity is as small as possible. In many cases the running time of property testing algorithms is sublinear in the instance length. Typically, the goal is first to make the query complexity as small as possible as a function of the instance size n, and then study the dependency on the proximity parameter ε. Unlike other complexity-theoretic settings, the asymptoti
https://en.wikipedia.org/wiki/FriCAS
FriCAS is a general purpose computer algebra system with a strong focus on mathematical research and development of new algorithms. It comprises an interpreter, a compiler and a still-growing library of more than 1,000 domains and categories. FriCAS provides a strongly typed high-level programming language called SPAD and a similar interactive language that uses type-inferencing for convenience. Aldor was intentionally developed being the next generation compiler for the Axiom CAS and its forks. FriCAS (optionally) allows running Aldor programs. Both languages share a similar syntax and a sophisticated (dependent) type system. FriCAS is comprehensively documented and available as source code and as a binary distribution for the most common platforms. Compiling the sources requires besides other prerequisites a Common Lisp environment (whereby many of the major implementations are supported and freely available as open source). FriCAS runs on many POSIX platforms such as Linux, macOS, Unix, BSD as well as under Cygwin and Microsoft Windows (WSL). History FriCAS is a descendant of Axiom which itself has its origin in Scratchpad, a project that started in 1965 by James Griesmer at IBM laboratories. For more details see Axiom/History. Examples FriCAS has a largely complete implementation of the Risch–Bronstein–Trager algorithm. Another useful feature is stream: )set stream calculate 5 exp_series := series(exp x, x=0) Type: UnivariatePuiseuxSeries(Expression(Integer),x,0) So any coefficient may be retrieved, for instance : coefficient(exp_series,40) Type: Expression(Integer) See also List of computer algebra systems References External links FriCAS Homepage FriCAS Wiki SandBox: Try FriCAS online Documentation at fricas.github.io FriCAS API (sphinx) Source code repositories: SourceForge, GitHub Rosetta stone (pdf) Rosetta stone (some other formats) Rosetta Stone (html) rosettacode.org, Category:SPAD Forum: fricas-devel FriCAS Jupyter Kernel (jfricas/src) FriCAS Jupyter (pypi) Related: Axiom OpenAxiom A# programming language Aldor programming language Common Lisp (programming language) software Computer algebra system software for Linux Free computer algebra systems Free software programmed in Lisp Software using the BSD license
https://en.wikipedia.org/wiki/Peter%20Swire
Peter P. Swire (born May 15, 1958) is the J.Z. Liang Chair in the School of Cybersecurity and Privacy in the College of Computing at the Georgia Institute of Technology. Swire is also Professor of Law and Ethics in the Scheller College of Business and has an appointment by courtesy with the School of Public Policy. He is an internationally recognized expert in privacy law. Swire is also a senior fellow at the Future of Privacy Forum and has served on the National Academies of Science and Engineering Forum on Cyber Resilience. During the Clinton administration, he became the first person to hold the position of Chief Counselor for Privacy in the Office of Management and Budget. In this role, he coordinated administration policy on privacy and data protection, including interfacing with privacy officials in foreign countries. He may be best known for shaping the Health Insurance Portability and Accountability Act Privacy Rule while serving as the Chief Counselor for Privacy. In November 2012 he was named as co-chair of the Tracking Protection Working Group of the World Wide Web Consortium (W3C), to attempt to mediate a global Do Not Track standard. In August 2013, President Obama named Swire as one of five members of the Director of National Intelligence Review Group on Intelligence and Communications Technologies. Education Swire graduated summa cum laude with an A.B. degree from the Woodrow Wilson School of Public and International Affairs at Princeton with a concentration in economics in 1980. Swire also earned a membership in the Phi Beta Kappa society. After earning his undergraduate degree, Swire studied at the Université Libre de Bruxelles on a Rotary International Ambassadorial Scholarship. In 1985, Swire graduated from Yale Law School where he was the senior editor of the Yale Law Journal. Upon graduation, Swire clerked for the Honorable Ralph K. Winter Jr. at the United States Court of Appeals for the Second Circuit from 1985 to 1986. Career Swire started his professional career as an associate for Powell, Goldstein, Frazer & Murphy in Washington, D.C. In 1990, he began his academic career as an associate professor at the University of Virginia School of Law. Swire began teaching at Ohio State University in 1996, but left the university in April 1999 to become the first Chief Counselor for Privacy in the Office of Budget and Management during the Clinton administration. As the chief counselor for privacy in the Clinton administration, Swire became known as a behind-the-scenes go-to guy. Swire shepherded the creation of the HIPAA Privacy Rule by working with the Department of Health and Human Services to create a proposed privacy rule. The proposed privacy rule was opened up for public comment and generated over 52,000 comments. The final text of the rule was announced by President Bill Clinton and the Secretary of Health and Human Services, Donna Shalala on December 20, 2000. During his time in the Clinton administration, Swire also c
https://en.wikipedia.org/wiki/Tweetie
Tweetie was a client for the social networking service Twitter. There was a mobile version that ran on iPhone, iPod Touch, and iPad, and a desktop version ran on Mac OS X Leopard, Snow Leopard and Lion (respectively 10.5, 10.6 and 10.7). Both the iOS and Mac versions of Tweetie were acquired by Twitter on April 9, 2010 and were re-released as the official Twitter clients for iOS and Mac. History Tweetie 2.0 for iPhone was the first app to introduce the pull-to-refresh user interface mechanism. The Mac OS X version of Twitter had many of the same features as its mobile sibling. In addition to a free advertising supported version, the paid iOS and OS X versions cost $2.99 and $19.95 respectively. The beta of the Mac version was leaked to the popular torrent site Demonoid a week before the official release. Acquisition by Twitter On April 9, 2010, Twitter announced that the company had acquired Tweetie. Twitter stated that the acquisition stemmed from the lack of an official, Twitter-branded mobile application. Tweetie was rebranded as "Twitter for iPhone" and released on May 17, 2010. The company's founder, Loren Brichter, became part of Twitter's mobile division and helped launch the "Twitter for iPad" application. On January 6, 2011, Twitter announced that the company had also acquired the desktop version of Tweetie, changing the name to "Twitter for Mac". "Twitter for Mac" was launched on the new Mac App Store the same day. On Tuesday, May 21, 2013 Twitter announced that certain patents related to Tweetie would never be used except to defend Twitter. Ultimately "Twitter for Mac" was discontinued after a very slow maintenance schedule in March 2018, being eventually replaced by the iOS version compiled using Catalyst in October 2019. The Catalyst app has been silently discontinued since the acquisition of Twitter by Elon Musk. References External links Tweetie on iOS App Store Tweetie on Mac App Store Review at Daring Fireball by John Gruber Review at Tweetcrunch Review at Smoking Apples Developer's Site 2008 software Microblogging software IOS software Twitter services and applications Twitter, Inc. acquisitions
https://en.wikipedia.org/wiki/J.%20Random%20Hacker
In computer slang, J. Random Hacker is an arbitrary programmer (hacker). "J. Random Hacker" is a popular placeholder name in a number of books and articles in programming. J. Random Hacker even authored a book about ease of malicious hacking, Adventures of a Wi-Fi Pirate. Also, J. Random Hacker was a main developer of I2P software. Over time, J. Random X has become a popular cliché or snowclone in computer lore, with more types of "random" (meaning "arbitrary") categories of people, such as "J. Random Newbie", J. Random User, or J. Random Luser. See also Alice and Bob, placeholder names often used when discussing computer security Acme Corporation, placeholder name often used to describe a company References Internet slang Computer humor Placeholder names
https://en.wikipedia.org/wiki/Florida%20Knowledge%20Network
The Florida Knowledge Network (FKN) was an educational television state network operated by the Florida Department of Education. The channel was seen statewide via the digital subchannels of most Florida Public Broadcasting Service (PBS) member stations and nationwide on the AMC 3 satellite FTA (Ku band, Transponder 18). FKN was seen weekdays from 6AM to 6PM ET (sometimes to 7PM for special faculty programming), with no broadcasts on public holidays. On most stations, The Florida Channel was seen when FKN is not broadcast. FKN broadcast instructional programming for use by grade school classes, produced by the Florida DOE, as well as programming contributed by PBS member stations, county school boards, the Annenberg Foundation and other outside sources. Programming could be seen live with the class, or taped for later viewing; block feeds of selected programs were regularly given during broadcast hours for the latter. The channel is not to be confused with the Florida Education Channel, a similar statewide education channel produced by the Panhandle Area Educational Consortium. In 2018, installed by TBC Integration at WFSU-TV, the DVB-S2 uplink system was used to broadcast The Florida Channel, The Florida Knowledge Network and other television broadcast services. On July 1, 2011, the Florida Knowledge Network ceased operations, for reasons not given. References External links FKN website Television stations in Tallahassee, Florida Commercial-free television networks Educational and instructional television channels Educational organizations based in Florida Television channels and stations disestablished in 2011 Defunct television networks in the United States Television channels and stations established in 1988 1988 establishments in Florida 2011 disestablishments in Florida
https://en.wikipedia.org/wiki/FRSAD
Functional Requirements for Subject Authority Data (FRSAD), previously known as Functional Requirements for Subject Authority Records (FRSAR), is a conceptual entity-relationship model developed by the International Federation of Library Associations and Institutions (IFLA) and published in 2010. It is a continuation of the work done on the FRBR model, detailing how "entities that serve as subjects of intellectual or artistic endeavor" can be related and controlled within the bibliographic universe. The model is intended to support global sharing and reuse of subject authority data. The conceptual model Work Work is a "distinct intellectual or artistic creation (IFLA 1998). Thema Is anything that can be the subject of a work. This is the abstract idea of the aboutness of a given work. Thema is independent of language and disciplines (FRSAR 2007). Nomen Any alphanumeric, sound, visual, or any other symbol, sign or combination of symbols by which a thema is known, referred to or addressed (FRSAR 2007). A nomen can be any expression of a thema. Ideally there will exist an authority file with every possible subject/thema. This means that it should be possible to exchange subject authority data between systems. If a user looks up a specific subject in a catalog and wants to look in other places, he or she should not have to worry about translating the query, since the system would be able to recognize the underlying thema and automatically translate it into the relevant nomen. One way to understand this is to think about how a subject can be described in different ways. For example, if one looks at a work about the city Stockholm, the capital of Sweden, there are many ways to describe Stockholm. First, one must distinguish between the city Stockholm and the many other meanings of the word; for example, Stockholm is also the name of other cities, a record label, and a syndrome. When the thema is established in an authority file, it is possible to translate across systems. The nomen for Stockholm could be anything from "Stockholm", "Stockholm (City)", "Tukholma" - the Finnish spelling of Stockholm - or a range of Zip-codes, or the longitude and latitude, or a picture of the city, or a sound. FRSAR, if implemented, enables users to perform specific and precise subject searching across multiple systems. Relationships Works and themas have a many-to-many relationship, meaning that any work can have more than one subject, and any subject can be expressed in one or more works. The same is true for the relationship between thema and nomen. A thema can be expressed in many different ways and a nomen can express many different themas, all depending on the given system. Besides these relationships, the workgroup has so far identified several other thema-thema and nomen-nomen relationships. Two nomens can, for example, be said to have an equivalence relationship, if they both are appellations of the same thema. User tasks The workgroup conducted two u
https://en.wikipedia.org/wiki/Kyle%20Abbott%20%28The%20Young%20and%20the%20Restless%29
Kyle Abbott is a fictional character from The Young and the Restless, an American soap opera on the CBS network. Introduced on January 8, 2001, the character is the son of businessman Jack Abbott (Peter Bergman) and Diane Jenkins (Susan Walters). For the character's first three-year run, he was portrayed by a series of infant toddler actors. In 2010, the character returned, portrayed as slightly older by child actor Garrett Ryan. After two years, he was rapidly aged to an adult, with Blake Hood stepping into the role in April 2012. Upon his return, Kyle began dating Eden Baldwin (Jessica Heap). In March 2013, after a year in the role, Hood was let go and announced to be replaced by Hartley Sawyer. The soap opera had initially issued a casting call for a character named Connor Boyd, and due to his characteristics resembling that of Kyle, his casting was kept quiet. Hood stated that his ouster came as a shock to him. Sawyer made his debut on April 24, 2013. The character's six-year absence was criticized, and his age upon his 2010 return received unfavorable reviews. Hood was positively received in the role, and the decision to release him and replace him with Sawyer has also been criticized. Australian actor Lachlan Buchanan took claim of the role in 2015, making his first appearance on February 25 and departing on April 26, 2016. The role is presently portrayed by Michael Mealor, who played the role from March 29, 2018 to August 6, 2021, reprising the role briefly that October and March 2022 before returning full-time in April 2022. Casting The role was originally portrayed by two sets of twins, Connor and Garret Sullivan and Marissa and Madison Poer from 2001 to 2002, and twins Cooper and Oliver Guynes in 2002. Seth Stern portrayed the role in 2004. Following the character's return after a 6-year absence, the role was assumed by Garrett Ryan on February 25, 2010. He initially departed after two episodes, though returned as a recurring cast member eight months later on October 12, 2010. When asked at the 38th Daytime Emmy Awards if he was remaining with the series, Ryan replied: "Um, yes. I'm definitely sticking around on the show. I've been on a lot lately..." Ryan was last seen as Kyle on January 5, 2012. In March 2012, the character was rapidly aged, with Blake Hood cast to portray Kyle as an adult. He was previously known for his role of Mark Driscott on The CW's 90210. Hood debuted on April 27, 2012. Hood was surprised at how fast the process of soap operas where, and also credited Peter Bergman (who plays his on-screen father, Jack) as being very "gracious" and kind to him, lending experience. In March 2013, after a year in the role, Hood was let go and replaced with Hartley Sawyer. The soap opera had issued a casting call for a character named "Connor Boyd" in January and, due to the character sounding very much like Kyle, Sawyer's casting was kept quiet. Casting directors used a scene previously been performed by Noah Newman to recast
https://en.wikipedia.org/wiki/David%20Korn
David Korn or Corn may refer to: David Korn (computer scientist) (born 1943), American computer scientist David A. Korn (1930–2022), American diplomat, ambassador to Togo David Corn (born 1959), American political journalist and author
https://en.wikipedia.org/wiki/Comment%20programming
Comment programming, also known as comment-driven development (CDD), is a (mostly) satirical software development technique that is heavily based on commenting out code. In comment programming, the comment tags are not used to describe what a certain piece of code is doing, but rather to stop some parts of the code from being executed. The aim is to have the commented code at the developer's disposal at any time it might be needed. This is especially useful when the requirements change rapidly. In this case, they happen to revert to older versions of themselves, thus making the programmer either write the code again, or revert parts of the code from the versioning repository, which would be more time-consuming. With comment programming, when such a request for reverting to an old implementation arises, the developer just comments out the current implementation and uncomments the previous. It is advisable to add short descriptive comments to blocks of commented code. Practical uses When it comes to a work environment, it isn't about who knows the most terms out of a textbook. Instead, we are faced with problems that we aren't sure how to solve. When someone else reads a users' program, it is important for them to understand how the problem was gone about and not just to see the answer. Even if someone decides to go into something other than computer programming, they will be well equipped with the habit of comments and showing others how they thought and solved specific problems. A related, but separate, more practical use of comments is for creating stubs with comments describing a feature (usually using special tags) ahead of future development of that feature. For example, this programming process can be used for prototyping a new design pattern. This is done by creating a new structure of classes or functions without any implementation and adding the implementation at a later date. Studies show that there are mainly two types of comments being used across programs. Preconditional and Postconditional are the two biggest ideas that computer programmers should use when developing projects. Preconditional comes before the function or method have been written. They are used to describe what each block of code is supposed to do. This can guide users in the right direction if someone is trying to debug or dissect code. Postconditional comments are used after the function or set of statements have been written. They are generally used to explain to the reader why they chose to go about the problem in that manner. Pseudocode Example: function onClick() { // This is where we handle mouse click. // The result of this function is that a button will be highlighted. } In the example, there is a structure around a click event handler. However, comment programming is used instead of a real implementation. The idea is that many functions can be written like this, and then the design can be reworked and revisited without having to refactor a lot of s
https://en.wikipedia.org/wiki/South%20African%20wireless%20community%20networks
South African wireless community networks are wireless networks that allow members to talk, send messages, share files and play games independent of the commercial landline and mobile telephone networks. Most of them use WiFi technology and many are wireless mesh networks. A wireless community network may connect to the public switched telephone network and/or the Internet, but there are various restrictions on connectivity in South Africa. Wireless community networks are particularly useful in areas where commercial telecommunications services are unavailable or unaffordable. Wireless User Groups (WUGs) in South African cities build up infrastructure and applications, as well as training members in wireless technology skills. Therefore, WUGs provide a fertile ground for new technology and applications that may have large social benefits in informal communities and rural areas of South Africa and neighboring countries. Background: South African Telecommunications Environment South Africa has the best developed and most modern telephone system in Africa. There are almost 110 combined fixed-line and cellular telephones per 100 persons. There are 5.1 million Internet users. The network is 99.9% digital. The fixed-line monopoly of Telkom SA, a listed company in which the government is the largest shareholder, expired with the licensing of Neotel as South Africa's second national operator, starting operations in November 2007. Neotel is licensed to provide the entire range of telecoms services with the exception of full mobility. Neotel is expanding their network fast, but so far is concentrating on urban areas. The South African mobile communications market is growing fast. The country's three cellular network operators (Vodacom, MTN and Cell C) have over 39-million subscribers, or nearly 80% of the population. However, although there are now over one million broadband subscribers, mostly using ADSL or HSDPA, bandwidth remains relatively limited and expensive. Major cities such as Cape Town, Durban, Johannesburg and Pretoria have launched public-private initiatives to build their own broadband networks to provide cheaper voice and data services. For example, the city of Tshwane, which includes Pretoria, is testing delivery of broadband Internet and voice services on their new metro-wide fibre-optic network using wireless hot spots to provide ADSL access. In the meantime, the high cost of broadband access has stimulated development of Wireless User Groups. The WUGS are not allowed to sell internet connectivity, since they are non-commercial community networks. Although non-profit and operating in the license-exempt spectrums, their legal status is not clear. In October 2007, JAWUG requested clarification on whether it required a radio frequency spectrum and/or ECNS license for its activities. Telkom provides relatively poor voice and internet service in underdeveloped rural areas of South Africa, although it is investigating ways to improve serv
https://en.wikipedia.org/wiki/National%20Transmission%20System
The United Kingdom's National Transmission System (NTS) is the network of gas pipelines that supply gas to about forty power stations and large industrial users from natural gas terminals situated on the coast, and to gas distribution companies that supply commercial and domestic users. It covers Great Britain, i.e. England, Wales and Scotland. History Origins The system originated in the construction during 1962–3 of the 200-mile (320 km) high-pressure methane pipeline from Canvey Island (on the Essex coast) to Leeds. Imported liquefied natural gas (LNG) from Algeria was turned into gas at the Canvey terminal and supplied to the pipeline, providing eight of the twelve area gas boards with access to natural gas. The gas was initially used to manufacture town gas, either as a feedstock in gas reforming processes or to enrich lean gases such as that produced by the Lurgi coal gasification process. The pipeline was 18-inch (460 mm) in diameter and operated at 1,000 pounds per square inch (69 bar). The pipeline had 150 miles (240 km) of spur lines, supplying gas to area boards. The Gas Council was responsible for this £10 million co-operative scheme and the construction details were a joint effort of the distribution engineers of the area boards. LNG had first been imported to Canvey from Louisiana in February 1959, and piped to Romford gasworks as feedstock to a reforming plant. UK natural gas Natural gas was discovered on the UK continental shelf in 1965 and production started in 1967. The development of offshore natural gas fields is shown in the following table. Shore terminals were built to receive, process, blend and distribute the gas. With the assured availability of natural gas, a government white paper on fuel policy in November 1967 proposed that natural gas should be immediately and more extensively exploited. The Gas Council and area boards began a ten-year programme to convert all users and appliances to operate on natural gas and consequently to discontinue the manufacture of town gas at local gasworks. In a pilot scheme, users on Canvey Island had been converted to natural gas in 1966. Building the NTS To exploit the availability of natural gas and to provide for more widespread distribution, construction began of a major new transmission network which became the National Transmission System. Feeder pipelines – England Gas from the West Sole field was first dispatched from the Easington terminal on the Yorkshire coast in July 1967, via Feeder No. 1 across the Humber to the East Midland Gas Board's gasworks at Killingholme. It was used to enrich low calorific value manufactured gas. Feeder No. 1 was extended to Totley near Sheffield where it connected to the 18-inch methane pipeline. UK natural gas first entered the NTS in July 1968. Feeder lines from the North Sea gas terminals to the spine of the NTS were laid and brought into use as the shore terminals were constructed. The No. 6 feeder runs via Pickering which recei
https://en.wikipedia.org/wiki/160-minute%20solar%20cycle
The 160-minute solar cycle was an apparent periodic oscillation in the solar surface which was observed in a number of early sets of data collected for helioseismology. The presence of a 160 minute cycle in the Sun is not substantiated by contemporary solar observations, and the historical signal is considered by mainstream scientists to occur as the redistribution of power from the diurnal cycle as a result of the observation window and atmospheric extinction. History The birth of helioseismology occurred in 1976 with the publications of papers from Brookes, Isaak and van der Raay and Severny, Kotov and Tsap, both of which reported upon the observation of a 160-minute solar oscillation with an amplitude of approximately two metres per second. It was rapidly realised that this frequency corresponded to one-ninth of a day, and therefore the authenticity of this signal was in some doubt. If a non-sinusoidal oscillation is present in a time-series then power will be seen in a periodogram at not only the frequency of the oscillation, but also harmonics at integer multiples of this frequency. A re-analysis of data obtained over the period of 1974–1976 by Brookes et al. showed that the evidence for a stable, phase-coherent 160 minute oscillation at a constant amplitude was far from conclusive. Although the signal could be detected the amplitude appeared variable and was lower than first reported. A re-affirmation of the 160 minute signal was obtained by analysis of data from groups in Crimea and Stanford over a long period of time. It was found that the phase showed a steady drift, indicative that the frequency being used in analysis differed slightly from that in the data. This implied that a period of 160.01 minutes produced a better fit to the data. Evidence also emerged that multiple sets of observations were phase-coherent. These facts contributed to impressions that the origin of the observed signal was stellar and not terrestrial in origin. In 1989 as higher-quality multiple-year datasets from a single site became available it was shown by Elsworth et al. that the period of the 160 minute signal was indeed 160.00 minutes, and the amplitude was dependent upon both the length and quality of data obtained in a season, with the signal more prominent at time where atmospheric condition were worse. The group were able to demonstrate that the signal may be simulated by a slightly distorted diurnal sine-wave such as may be obtained by differential atmospheric extinction. Although claims of the presence of a 160-minute period in the Sun were still presented by Kotov et al. in 1990, and 1991, the mainstream scientific establishment had moved on. Contemporary observations There are currently two solar-observation networks, the BiSON and GONG networks which consist of a global network of stations, as well as space based instruments such as the GOLF instrument aboard the SOHO spacecraft. These are able to keep the Sun under near-continuous obse
https://en.wikipedia.org/wiki/Virtual%20sensor%20network
A virtual sensor network (VSN) in computing and telecommunications is an emerging form of collaborative wireless sensor networks. In contrast to early wireless sensor networks that were dedicated to a specific application (e.g., target tracking), VSNs enable multi-purpose, collaborative, and resource efficient WSNs. The key idea difference of VSNs is the collaboration and resource sharing. By doing so nodes achieve application objectives in a more resource efficient way. These networks may further involve dynamically varying subset of sensor nodes (e.g., when the phenomenon migrates sensors that detect the phenomenon changes with time) and/or users (users that are accessing the network changes with time). A VSN can be formed by providing logical connectivity among collaborative sensors. Nodes can be grouped into different VSNs based on the phenomenon they track (e.g., rock slides vs. animal crossing) or the task they perform. VSNs are expected to provide the protocol support for formation, usage, adaptation, and maintenance of subset of sensors collaborating on a specific task(s). Even the nodes that do not sense the particular event/phenomenon could be part of a VSN as far as they are willing to allow sensing nodes to communicate through them. Thus, VSNs make use of intermediate nodes, networks, or other VSNs to efficiently deliver messages across members of a VSN. Applications VSNs are useful in three major classes of applications: Geographically overlapped applications E.g., monitoring rock slides and animal crossing within a mountainous terrain. Different types of devices that detect these phenomena can relay each other for data transfer without having to deploy separate networks. Here the advantage is saving in hardware cost. While logically separating multi-purpose sensor networks E.g., smart neighborhood systems with multifunctional sensor nodes. Instead of traditional WSNs that runs one single applications, VSN enabled nodes run multiple applications In certain dedicated but dynamic applications E.g., To enhance efficiency of a system that track dynamic phenomena such as subsurface chemical plumes that migrate, split, or merge. Such networks may involve dynamically varying subsets of sensors. Here the advantage is the ability to connect right set of nodes at the right time. See also Khan, I.; Belqasmi, F.; Glitho, R.; Crespi, N.; Morrow, M.; Polakos, P., "Wireless Sensor Network Virtualization: A Survey," in IEEE Communications Surveys and Tutorials, vol.18, no.1, pp. 553–576, Firstquarter 2016 doi: 10.1109/COMST.2015.2412971 Khan, I.; Belqasmi, F.; Glitho, R.; Crespi, N.; Morrow, M.; Polakos, P., "Wireless sensor network virtualization: early architecture and research perspectives," in IEEE Network, vol.29, no.3, pp. 104–112, May–June 2015 doi: 10.1109/MNET.2015.7113233 Khan, I.; Errounda, F.Z.; Yangui, S.; Glitho, R.; Crespi, N., "Getting Virtualized Wireless Sensor Networks' IaaS Ready for PaaS," in Distributed Computing
https://en.wikipedia.org/wiki/SIGMDSE
The Special Interest Group "Model-Driven Software Engineering" (SIG-MDSE) organizes the MDSE as an academic conference. This special interest group focus on model driven (or model based) and architecture centred software engineering techniques and tools, e.g. OMG's MDA (Model Driven Architecture). It is a platform for all interested persons to exchange experiences in the context of workshops, conferences etc. The activities are mainly in Germany. Once or twice a year an academic workshop is organized. Current events MDSE 2008 was held in Berlin, Germany in 2008 . Proceedings The refereed Proceedings of MDSE 2008 was published in the Logos Proceedings series. History MDSE (2007) Dates: 15 June 2007 Location: (Stuttgart, Germany) Organizers: Florian Fieber (qme Software), Wolfgang Neuhaus (Itemis), Roland Petrasch (TFH Berlin) Proceedings: Web site: MDSE (2006) Dates: 1 December 2006 Location: (Hamburg, Germany) Organizers: Florian Fieber (qme Software), Wolfgang Neuhaus (Itemis), Roland Petrasch (TFH Berlin) Proceedings: Web site: Software architecture
https://en.wikipedia.org/wiki/Wouter%20Degroote
Wouter Degroote (born 28 January 1978) is a Belgian footballer. He previously played for clubs including FCV Dender EH. References External links Wouter Degroote on Footballdatabase 1978 births Living people Belgian men's footballers S.V. Zulte Waregem players F.C.V. Dender E.H. players S.C. Eendracht Aalst players Footballers from Ghent Men's association football midfielders
https://en.wikipedia.org/wiki/Spectral%20Database%20for%20Organic%20Compounds
The Spectral Database for Organic Compounds (SDBS) is a free online searchable database hosted by the National Institute of Advanced Industrial Science and Technology (AIST) in Japan, that contains spectral data for ca 34,000 organic molecules. The database is available in English and in Japanese and it includes six types of spectra: laser Raman spectra, electron ionization mass spectra (EI-MS), Fourier-transform infrared (FT-IR) spectra, 1H nuclear magnetic resonance (1H-NMR) spectra, 13C nuclear magnetic resonance (13C-NMR) spectra and electron paramagnetic resonance (EPR) spectra. The construction of the database started in 1982. Most of the spectra were acquired and recorded in AIST and some of the collections are still being updated. Since 1997, the database can be accessed free of charge, but its use requires agreeing to a disclaimer; the total accumulated number of times accessed reached 550 million by the end of January, 2015. Content Laser Raman spectra The database contains ca 3,500 Raman spectra. The spectra were recorded in the region of 4,000 – 0 cm−1 with an excitation wavelength of 4,800 nm and a slit width of 100 – 200 micrometers. This collection is not being updated. Electron ionization mass (EI-MS) spectra The EI-MS spectra were measured in a JEOL JMS-01SG or a JEOL JMS-700 spectrometers, by the electron ionization method, with an electronic accelerating voltage of 75 eV and an ion accelerating voltage of 8 – 10 kV. The direct or reservoir inlet systems were used. The accuracy of the mass number is 0.5. This collection contains ca. 25,000 EI-MS spectra and is being updated. Fourier-transform infrared (FT-IR) spectra The FT-IR spectra were recorded using a Nicolet 170SX or a JASCO FT/IR-410 spectrometer. For spectra recorded in the Nicolet spectrometer, the data were stored at intervals of 0.5 cm−1 in the 4,000 – 2,000 cm−1 region and of 0.25 cm−1 in the 2,000 – 400 cm−1 region and the spectral resolution was 0.25 cm−1. For spectra recorded in the JASCO spectrometer, the resolution as well as the intervals was 0.5 cm−1. Samples from solids were prepared using the KBr disc or the Nujol paste methods, samples from liquids were prepared with the liquid film method. This collections contains ca 54,100 spectra and is being updated. 1H NMR spectra The 1H NMR spectra were recorded at a resonance frequency of 400 MHz with a resolution of 0.0625 Hz or at 90 MHz with a resolution of 0.125 Hz. The spectral acquisition was carried out using a flip angle of 22.5 – 30.0 degrees and a pulse repetition time of 30 seconds. Samples were prepared by dissolution in deuterated chloroform (CDCl3), deuterium oxide (D2O), or deuterated dimethylsulfoxide (DMSO-d6). Each spectrum is accompanied by a list of peaks with their respective intensities and chemical shifts reported in ppm and in Hz. Most spectra show the peak assignment. This collection contains ca 15,900 spectra and is being updated. 13C NMR spectra The 13C NMR spectra were recorded at
https://en.wikipedia.org/wiki/Andrew%20Hugill
Andrew Hugill (born 1957) is a British composer, writer and academic. He is both a professor of music and a professor of creative computing. He directs the Creative Computing programme at University of Leicester. Biography Andrew Hugill studied composition with Roger Marsh at the University of Keele between 1976 and 1980, and in 1983 he founded the ensemble "George W. Welch". He began lecturing at Leicester Polytechnic in 1986, working alongside Gavin Bryars and Dave Smith, eventually becoming subject-leader for the BA Performing Arts: Music. He taught composition, performance and music history. He founded the Music, Technology and Innovation programme in 1997 at De Montfort University and taught Creative and Negotiated Projects, Musicianship and Internet Music. In 2006 he founded the Institute of Creative Technologies and was its director until 2012. In 2013, he set up Creative Computing at Bath Spa University. In 2018, he founded the Creative Computing programme at University of Leicester. Hugill is a Principal Fellow and a National Teaching Fellow of the Higher Education Academy. In 2006 he was Highly Commended for the Most Imaginative Use of Distance Learning by the Times Higher Education Awards. Compositions Hugill's compositions include music for solo instruments and ensembles, orchestral music, and electronic and digital music. In 2004, Hugill was nominated for the BT Digital Music Awards for his Internet project with the Philharmonia Orchestra – The Sound Exchange. Some of his well-known works are: Pianolith (2003); the internet music project Symphony for Cornwall (1999); the electroacoustic composition Island Symphony (1995), an electroacoustic and subsequently orchestral work, inspired by St. George's Island; Brisset Rhymes (1990) and Catalogue de Grenouilles (1988) for massed frog recordings and human musicians. Nocturne, for two pianos and percussion, was commissioned by BBC Radio 3 in 1997. His Sonneries Parfumées for piano solo won a prize in the Piano 2000 competition in Tokyo. Simon and Ennoia (1987), for small ensemble, was broadcast by the BBC in 1990. Research and publications Hugill's research is transdisciplinary and covers literature, music and computer science. He has published articles on aspects of surrealism in literature, digital music, and software engineering. In 2008, Hugill published the book The Digital Musician in which he identifies the possibilities and challenges new technologies offer the modern musician. A second, updated edition was published as an e-book in 2012. A third edition was published in 2018. In 2012, he published 'Pataphysics: A Useless Guide, the first complete history of the subject in English. Pataphysics Hugill is an active researcher in 'pataphysics and a member of the Collège de 'Pataphysique, where he was awarded the Ordre de la Grande Guidouille and the rank of Commandeur Requis. He is the curator of the CD Pataphysics, a history of 'Pataphysics in sound. References Ext
https://en.wikipedia.org/wiki/European%20Schoolnet
European Schoolnet or EUN is a network of 34 European Ministries of Education, based in Brussels. As a not-for-profit organisation, it aims to bring innovation in teaching and learning to its key stakeholders: Ministries of Education, schools, teachers, researchers, and industry partners. Since its founding in 1997 with development funded initially through the EU Multimedia 1010 initiative (Holmes, 2013a, b; Leask and Younie, 2001; Simeca et al., 2009) and later through ministry support, European Schoolnet has helped schools make effective use of educational technologies, equipping both teachers and pupils with the skills to achieve in the knowledge society. European Schoolnet provides both Ministries and schools with: information and services relating to the innovative use of educational technology, outreach campaigns on specific educational topics such as maths, science and technology; and research activities. European Schoolnet pledges to: Support schools in achieving effective use of ICT in teaching and learning Improve and raise the quality of education in Europe Promote the European dimension in education European Schoolnet involves thousands of schools in various pilot projects and studies, testing new learning activities and technologies in the classroom, and exploring the use of new pedagogical tools in teaching STEM (science, technology, engineering and maths). European Schoolnet identifies and develops learning resources in various languages that teachers across Europe can use in their teaching, provides peer-to-peer online communities where teachers can exchange ideas and share resources, as well as offers various training opportunities online and offline. European Schoolnet runs European-funded projects with the European Commission, Ministries of Education and industry partners. These projects include iTEC (Designing the Future Classroom) and inGenious (attracting pupils towards science, technology, engineering and maths). A number of services are also coordinated for teachers and policymakers, such as Scientix, to promote science education, the Learning Resource Exchange, an online catalog of more than 200,000 OERs and Insafe, dedicated to digital citizenship skills and online safety. European Schoolnet has worked towards enhancing cooperation across Europe between schools as the coordinator of the eTwinning Central Support Service since 2004. And it has also contributed to awareness-raising campaigns across Europe on the importance of gaining e-Skills (e-Skills Week), and transforming STEM education to increase the appeal of those sectors among pupils (ECB-Ingenious project). The E-Twinning initiative provides a private environment connecting schools and teachers across and beyond Europe. In 2012, European Schoolnet created the Future Classroom Lab in Brussels. A unique hub for showcasing technological and pedagogical innovation, the Future Classroom Lab is supported by sponsors such as Microsoft, Samsung, Acer, Cisco, L
https://en.wikipedia.org/wiki/Yasser%20Khalil
Yasser Khalil (born September 28, 1972) is an Egyptian journalist. Biography Since 1996, Yasser Khalil has covered political and cultural affairs in Egypt. He is the founder of the Kbret Network, the first bloggers' network in the Middle East.cit. req. Khalil participated in the 2008 Forum 2000 conference in Prague as a delegate and panelist.cit. req. He received The Encouragement Award from Kuwait for 'Outstanding Work and Research'.cit. req. His work has appeared in the Christian Science Monitor (USA), Turkish Daily News (Turkey), Daily Star (Lebanon and Egypt), Arab News (Saidi Arabia), Alraya (Qatar), Anahar (Lebanon), Al-Ahrar (Egypt), Almadina (Saudi Arabia), Akhbar Al-Arab (UAE), Alewa Al-Islamy (Egypt), Almsar magazine (Sultan Qaboos University/ Oman), Alwasat (Bahrain), ABC News (USA), Alarabiya TV (Saudi Arabia), Yahoo News (USA), Common Ground news service (US), Gulf Research Center (UAE), and Middle East Online (UK). References I Protested for Freedom In his death, Osama finds sympathy External links 1972 births Living people Egyptian journalists
https://en.wikipedia.org/wiki/Definite%20assignment%20analysis
In computer science, definite assignment analysis is a data-flow analysis used by compilers to conservatively ensure that a variable or location is always assigned before it is used. Motivation In C and C++ programs, a source of particularly difficult-to-diagnose errors is the nondeterministic behavior that results from reading uninitialized variables; this behavior can vary between platforms, builds, and even from run to run. There are two common ways to solve this problem. One is to ensure that all locations are written before they are read. Rice's theorem establishes that this problem cannot be solved in general for all programs; however, it is possible to create a conservative (imprecise) analysis that will accept only programs that satisfy this constraint, while rejecting some correct programs, and definite assignment analysis is such an analysis. The Java and C# programming language specifications require that the compiler report a compile-time error if the analysis fails. Both languages require a specific form of the analysis that is spelled out in meticulous detail. In Java, this analysis was formalized by Stärk et al., and some correct programs are rejected and must be altered to introduce explicit unnecessary assignments. In C#, this analysis was formalized by Fruja, and is precise as well as sound, in the sense that all variables assigned along all control flow paths will be considered definitely assigned. The Cyclone language also requires programs to pass a definite assignment analysis, but only on variables with pointer types, to ease porting of C programs. The second way to solve the problem is to automatically initialize all locations to some fixed, predictable value at the point at which they are defined, but this introduces new assignments that may impede performance. In this case, definite assignment analysis enables a compiler optimization where redundant assignments — assignments followed only by other assignments with no possible intervening reads — can be eliminated. In this case, no programs are rejected, but programs for which the analysis fails to recognize definite assignment may contain redundant initialization. The Common Language Infrastructure relies on this approach. Terminology A variable or location can be said to be in one of three states at any given point in the program: Definitely assigned: The variable is known with certainty to be assigned. Definitely unassigned: The variable is known with certainty to be unassigned. Unknown: The variable may be assigned or unassigned; the analysis is not precise enough to determine which. The analysis The following is based on Fruja's formalization of the C# intraprocedural (single method) definite assignment analysis, which is responsible for ensuring that all local variables are assigned before they are used. It simultaneously does definite assignment analysis and constant propagation of boolean values. We define five static functions: We supply data-flow equat
https://en.wikipedia.org/wiki/ISO/IEC%2024727
ISO/IEC 24727 (Identification cards – Integrated circuit card programming interfaces) is the first international standard to address the need for creation of a layered framework to support interoperability of smart cards providing identification, authentication, and (digital) signature services. The standard is split into six parts: ISO/IEC 24727-1:2014 Part 1: Architecture ISO/IEC 24727-2:2008 Part 2: Generic card interface ISO/IEC 24727-3:2008 Part 3: Application interface ISO/IEC 24727-4:2008 Part 4: Application programming interface (API) administration ISO/IEC 24727-5:2011 Part 5: Testing procedures ISO/IEC 24727-6:2010 Part 6: Registration authority procedures for the authentication protocols for interoperability External links ISO/IEC 24727-1:2014 Identification cards -- Integrated circuit card programming interfaces -- Part 1: Architecture 24727
https://en.wikipedia.org/wiki/New%20Horizons%20Computer%20Learning%20Centers
New Horizons Computer Learning Centers is one of the world's largest independent IT training company with over 300 locations in 72 countries. New Horizons Computer Learning Centers Inc. is a subsidiary of New Horizons Worldwide Inc. New Horizons operates as a franchise model to support the worldwide expansion of its training centers. New Horizons provides instruction in the use of personal computers, computer software, and business skills. It offers vendor-authorized training and certifications for Microsoft, Cisco, CompTIA, and VMware. Training methods include instructor-led courses, both in-person and online, as well as self-directed labs. Company history New Horizons was founded by Michael Brinda in Laguna Hills in 1982. In 1985, after adding Lotus and C++ to its curriculum, the company moved to larger offices in Irvine. The addition of classes in Windows programming in 1988 necessitated another expansion to offices in Santa Ana. By 1992, further additions to its course offerings enabled the company to expand nationwide. The first international location opened in Mexico City in 1993. The following year, New Horizons was purchased by Handex Consulting & Remediation LLC, which resulted in further international expansion into South America, Asia, Africa, and the Middle East. At this point, New Horizons had become one of the largest network of Microsoft Authorized Technical Education Centers (ATECs). The company's first European location (in Barcelona) was opened shortly thereafter. In 1996, New Horizons began trading on NASDAQ under the ticker symbol NEWH (changed to on Sep. 17, 2009). Within a year, New Horizons became one of the largest independent IT training company in the world with over 154 training centers and 100 Microsoft Certified Technical Education Centers (CTECs). New Horizons and the EC-Council became partners in 2004 to deliver Certified Ethical Hacker and Countermeasures Training. In 2011, New Horizons was granted VMware Authorized Training Center Status, allowing North American centers to deliver VMware training. In 2019, New Horizons (Spokane) was fined $120,000 by the US Department of Justice to resolve false claims related to the GI Bill. Awards and recognition 2000: Fortune names New Horizons one of America's "100 Fastest Growing Companies", and Forbes rates New Horizons one of the "200 Best Small Companies" 2001: Bloomberg BusinessWeek names New Horizons to its list of "100 Hot Growth Companies" 2003: New Horizons wins a Gold Excellence in eLearning Award from the BrandonHall Group 2006: New Horizons is honored as Partner of the Year for Technology Innovation at the 2006 Microsoft Worldwide Partner Program Awards 2009: New Horizons wins US & Canada Learning Partner of the Year at the Cisco Partner Summit 2011: TrainingIndustry.com names New Horizons one of its Top 20 IT Training Companies 2012: New Horizons selected as a Microsoft Learning Competency Marketing Excellence Partner of the Year Award Finalis
https://en.wikipedia.org/wiki/VTL
VTL may refer to: Virtual tape library, for computer data storage Vermont Transit Lines, US Vertical turret lathe Apache Velocity Template Language
https://en.wikipedia.org/wiki/Canada%20in%20View
Canada in View was a Canadian documentary series aired on several stations affiliated with the CTV Television Network from the late 1980s to early 1990s. The program was co-operatively produced by participating stations, each contributing long-form documentaries about local issues on a rotating basis. Although it apparently aired solely on CTV affiliates, it is not clear whether the program was ever officially part of CTV's network schedule. The series used a loophole in CRTC regulations of the era, which allowed each station involved in the production of such a series to count it as a "local" program for the purposes of fulfilling its conditions of licence, even if the program did not contain local content on a weekly basis. Since production responsibilities were rotated among all stations, participation in Canada in View could thus dramatically reduce a given station's local production requirements. The CRTC announced in 1989 it would close the loophole for information and sports programming, which included Canada in View, though it provided a temporary reprieve for existing productions, but only until the end of participating stations' licence terms. In most cases this was August 1994, by which point the series had disappeared. Whether this decision directly led to the demise of the series is unclear; one columnist would later place the blame on Baton Broadcasting (at that time the largest CTV-affiliate ownership group) for pulling out of the series. References 1988 Canadian television series debuts 1994 Canadian television series endings 1980s Canadian television news shows 1990s Canadian television news shows CTV Television Network original programming English-language television shows
https://en.wikipedia.org/wiki/KTCJ-LD
KTCJ-LD channel 50 was a digital low-power television station in Minneapolis, Minnesota. Its main affiliation is with the Cornerstone Television network. It broadcasts with a 15 kW signal from its Arden Hills, Minnesota tower, which it shares with sister station KHVM-LD channel 48, a Global Christian Network affiliate, and Daystar Television Network affiliate WDMI-LD channel 62. The station's tower was hit by lightning around Memorial Day 2010, forcing both KHVM-LD and KTCJ-LD to go silent (WDMI converted from analog to digital about the same time). The station has been off air since August 2017. References External links CTVN official site EICB website RabbitEars.info website tvfool.com Low-power television stations in Minnesota Television stations in Minneapolis–Saint Paul
https://en.wikipedia.org/wiki/KHVM-LD
KHVM-LD channel 48 is a digital low-power television station in Minneapolis, Minnesota. Its main affiliation is with the Global Christian Network. It broadcasts with a 15 kW signal from its Arden Hills, Minnesota tower, which it shares with sister station KTCJ-LD channel 50, a Cornerstone Television Network affiliate, and Daystar Television Network affiliate WDMI-LD channel 62. The station's tower was hit by lightning around Memorial Day 2010, forcing both stations KHVM-LD and KTCJ-LD to go silent (WDMI converted from analog to digital about the same time). KHVM previously broadcast a highly directional signal on channel 28 that carried southwest, to possibly to avoid signal conflicts with PBS Wisconsin station WHWC-TV channel 28 in Menomonie, Wisconsin. KHVM gained an FCC "Special Temporary Authority" (STA) to broadcast at 0.35 kW power. In addition, KAWB in Brainerd, Minnesota, which also broadcasts on channel 28, displaced KHVM. KHVM began broadcasting on channel 48 over the last weekend in July 2011 following a construction permit to move to the channel. The station has been off air since August, 2017. References External links CTVN official site EICB website RabbitEars.info website tvfool.com Low-power television stations in Minnesota Television stations in Minneapolis–Saint Paul Television channels and stations established in 1990 1990 establishments in Minnesota
https://en.wikipedia.org/wiki/Garfield%27s%20Pet%20Force
Garfield's Pet Force is a 2009 computer-animated superhero comedy film based on characters from the Jim Davis comic strip Garfield and loosely based on the Pet Force novel series. It is the third and final installment of the trilogy, following Garfield Gets Real and Garfield's Fun Fest. It was released on DVD and Blu-ray Disc in the United States on June 16, 2009 by 20th Century Fox Home Entertainment, while it was pre-sold overseas by sales representative Velvet Octopus. It was written by Garfield creator Jim Davis. It was released theatrically in 3-D in select countries such as Poland, Italy and Spain, and became the most profitable film in the trilogy. It is the last Garfield film to be distributed by 20th Century Fox (who lost the film and television rights to Garfield franchise shortly after the film's release), ten years prior to Nickelodeon's acquisition of Paws, Inc. in August 2019, as well as the upcoming animated Garfield film which will be distributed by Sony Pictures and produced by Alcon Entertainment, and was set to be released in 2024. Summary When Vetvix comes to Comic Strip World to go after Garzooka. Garzooka enlists Garfield, Nermal, Arlene, and Odie to help him stop Vetvix by becoming the Pet Force. However, Garfield would rather eat and sleep than help save the world and he saw this as too much work. When Vetvix starts threatening Garfield's world, Garfield realizes what's really at stake. Will Garfield stop being lazy and help the Pet Force, and save the world? Plot On the planet Dorkon, Professor Wally (the professor counterpart to Wally) shows Emperor Jon (the emperor counterpart to Jon Arbuckle) his new invention, the Moscram ray gun, a device powered by the Klopman crystal that can scramble inanimate objects and organisms into new creatures under the user's control, but the Emperor is more concerned about finding a wife to continue the royal line. Soon a warship led by Vetvix (the super-villain counterpart to Liz) lands outside the palace and Emperor Jon instantly falls in love with her, asking if he can marry her. She agrees, but only because she wanted to steal the Moscram. She zombifies the Emperor's guards, forcing Professor Wally to summon the Pet Force: Garzooka (Garfield's superhero counterpart), Odious (Odie's superhero counterpart), Abnermal (Nermal's superhero counterpart), and Starlena (Arlene's superhero counterpart), to save them but Vetvix zombifies the Pet Force except Garzooka. Garzooka manages to get hold of the Klopman and escapes with the Professor in a secret passageway. The professor uses his computer to search the universe for counterparts with DNA matches with the Pet Force & when he does, he gives Garzooka their pictures and serums that will transform them into the Pet Force, who then takes off to the Comic World leaving Professor Wally & Vetvix, who's vowing for revenge, behind. The situation was revealed to be a comic book Nermal was reading during a cookout with Jon and the gang. Nermal is
https://en.wikipedia.org/wiki/3590
3590 may refer to: 3590, the ninetieth year of the 36th century IBM 3590, a series of tape drives and corresponding magnetic tape data storage media formats developed by IBM Patient Protection and Affordable Care Act (H.R. 3590), a United States federal statute signed into law on March 23, 2010
https://en.wikipedia.org/wiki/Wireless%20network%20organizations%20by%20size
Wireless Network organizations sorted by size to have a better overview of the size of these organizations around the globe and to determine which networks are tiny and which are not. Athens_Wireless_Metropolitan_Network - 800 TWMN - 503 Pretoria Wireless Users Group - 455 Jawug - 330 Patras_wireless_metropolitan_network - 250 Heraklion Student Wireless Network - 150 Patras_Wireless_Network - 150 Melbourne Wireless - 150 Personal_Telco - 100 Wireless_Leiden - 71 Cape Town Wireless User Group (CTWUG) - 70 Ioannina Wireless Network - 40 TasWireless - 37 Seattle Wireless - 30 Unknown AirJaldi - 2000 computers linked BWIC Champaign-Urbana Community Wireless Network Clermont_Sans_Fil Melbourne_Wireless NYCwireless Outernet_(network) Wireless_Toronto Vancouver_Community_Network Wireless network organizations
https://en.wikipedia.org/wiki/Self-organizing%20network
A self-organizing network (SON) is an automation technology designed to make the planning, configuration, management, optimization and healing of mobile radio access networks simpler and faster. SON functionality and behavior has been defined and specified in generally accepted mobile industry recommendations produced by organizations such as 3GPP (3rd Generation Partnership Project) and the NGMN (Next Generation Mobile Networks). SON has been codified within 3GPP Release 8 and subsequent specifications in a series of standards including 36.902, as well as public white papers outlining use cases from the NGMN. The first technology making use of SON features will be Long Term Evolution (LTE), but the technology has also been retro-fitted to older radio access technologies such as Universal Mobile Telecommunications System (UMTS). The LTE specification inherently supports SON features like Automatic Neighbor Relation (ANR) detection, which is the 3GPP LTE Rel. 8 flagship feature. Newly added base stations should be self-configured in line with a "plug-and-play" paradigm while all operational base stations will regularly self-optimize parameters and algorithmic behavior in response to observed network performance and radio conditions. Furthermore, self-healing mechanisms can be triggered to temporarily compensate for a detected equipment outage, while awaiting a more permanent solution. SON architectural types Self-organizing networks are commonly divided into three major architectural types. Distributed SON In this type of SON (D-SON), functions are distributed among the network elements at the edge of the network, typically the ENodeB elements. This implies a certain degree of localization of functionality and is normally supplied by the network equipment vendor manufacturing the radio cell. Centralized SON In centralized SON (C-SON), function is more typically concentrated closer to higher-order network nodes or the network OSS, to allow a broader overview of more edge elements and coordination of e.g. load across a wide geographic area. Due to the need to inter-work with cells supplied by different equipment vendors, C-SON systems are more typically supplied by 3rd parties. Hybrid SON Hybrid SON is a mix of centralized and distributed SON, combining elements of each in a hybrid solution. SON sub-functions Self-organizing network functionalities are commonly divided into three major sub-functional groups, each containing a wide range of decomposed use cases. Self-configuration functions Self-configuration strives towards the "plug-and-play" paradigm in the way that new base stations shall automatically be configured and integrated into the network. This means both connectivity establishment, and download of configuration parameters are software. Self-configuration is typically supplied as part of the software delivery with each radio cell by equipment vendors. When a new base station is introduced into the network and powered on, it gets
https://en.wikipedia.org/wiki/INCTR%20Challenge%20Fund
The INCTR Challenge Fund is the UK charity (Charity No. 1079181) raising funds for projects co-ordinated by the International Network for Cancer Treatment Research (INCTR) that improve the care delivered to cancer patients in developing countries and help reduce their suffering. Cancer is not a disease that only affects wealthy countries. The World Health Organization (WHO) reports that of the 7.9 million death from cancer every year, 72% (5.7 million) occur in low- and middle-income countries. This means that almost 11 people a minute are dying of cancer in some of the poorest nations on Earth. WHO reports that cancer is now killing more people in the developing countries than malaria, TB and HIV/AIDS combined, and this situation is growing steadily worse. There are several reasons for this high death toll from cancer in developing countries. Due to poverty, lack of resources and vast distances, public access to treatment maybe difficult or non-existent. There is also not enough awareness (public or professional) about cancer to help either prevent the disease developing or to support early diagnosis. As a result, 80% of cancer patients present with advanced/incurable cancers. Unfortunately, in many cases, palliative care will not be available to them at the end of their lives. The fund's goals are: Providing chemotherapy drugs and anti-bacteria drugs Training local nurses and doctors in early cancer diagnosis, cancer treatment and clinical research Raising the local awareness about cancer in order to encourage prevention and early diagnosis Providing palliative care services for terminally ill cancer patients The charity relies on donations from individual and corporate donors. It fundraises through social events including music gigs. Projects The INCTR Challenge Fund is prioritizing INCTR projects in children's cancer (especially African Burkitt's lymphoma) and palliative care. Children's cancer The survival rate of children suffering with cancer is lower than in high-income countries; often less than 20% compared with around 70% in the UK. Specialized units for treating children with cancer are rare in developing countries, leading to overcrowded wards and the spread of fatal infections. This is tragic as common childhood cancers such as African Burkitt's lymphoma can be cured cheaply and efficiently if they are detected early enough. The INCTR Challenge Fund is raising money to provide effective treatment for children with African BL in Tanzania, Kenya, Nigeria and Uganda. The INCTR Africa Burkitt Lymphoma Programme is also supported by Christopher Niblett Memorial Fund since 2006. Palliative care Due to the scarcity of resources and the limited number of trained health care professionals, palliative care is unavailable to most terminally ill cancer patients in low or middle income countries. In some countries the situation may be complicated by a lack of professional regard (or understanding) of palliative care as a bona fide
https://en.wikipedia.org/wiki/Mail%C3%BCfterl
Mailüfterl is a nickname for the Austrian Binär dezimaler Volltransistor-Rechenautomat (binary-decimal fully transistorized computing automaton), an early transistorized computer. Other early transistorized computers included TRADIC, Harwell CADET and TX-0. Mailüfterl was built from May 1956 to May 1958 at the Vienna University of Technology by Heinz Zemanek. Heinz Zemanek had come to an agreement with Konrad Zuse, whose company Zuse KG would finance the work of Rudolf Bodo, who helped build the Mailüfterl, also that all circuit diagrams of the Z22 were supplied to Bodo and Zemanek, and that after the Mailüfterl project Bodo should work for the Zuse KG to help build the transistorized Z23. The first program, computation of the prime 5,073,548,261, was executed in May 1958. Completion of the software continued until 1961. The nickname was coined by Zemanek: Even if it cannot match the rapid calculation speed of American models called "Whirlwind" or "Typhoon", it will be enough for a "Wiener Mailüfterl" (Viennese May breeze). The computer has 3,000 transistors, 5,000 diodes, 1,000 assembly platelets, 100,000 solder joints, 15,000 resistors, 5,000 capacitors and about of wire. It is 4 meters (13') wide, 2.5 meters (8') high, and 50 centimeters (20") deep. The machine was comparable in calculating power to what were then considered small vacuum-tube computers. Calculations and representation of values worked using the BCD system. Zemanek later said about his project that it was a "semi-illegal" undertaking of an assistant professor, which he and a group of students realized without official authorization, and hence without financial support, from the university. In 1954 he traveled to Philips in the Netherlands, where he asked for a donation in kind. Transistors, invented seven years before and just beginning to be available commercially, were very difficult to obtain in quantity at any price, but Zemanek received a commitment for 1,000 rather slow hearing-aid transistors, and Philips finally shipped a total of 4,000 high-quality transistors to the Austrians. Sources See also List of transistorized computers External links Oral history interview with Heinz Zemanek, Charles Babbage Institute, University of Minnesota. Zemanek discusses his engineering education and work in radar technology during World War II. Zemanek then focuses on the development of computers in Austria: magnetic drums and magnetic memory, the MAILUFTERL computer, LOGALGOL and other compilers, the University of Vienna, where Zemanek worked on his computer, the subsequent sponsorship of the project by International Business Machines Europe, and ALGOL and PL/I language standards development. Mailüfterl emulator in JavaScript Transistorized computers 1950s computers One-of-a-kind computers
https://en.wikipedia.org/wiki/German%20post%20offices%20in%20the%20Ottoman%20Empire
The German post offices abroad were a network of post offices in foreign countries established by Germany to provide mail service where the local services were deemed unsafe or unreliable. They were generally set up in cities with some sort of German commercial interest. In early use only the cancellation mark can identify their postal use abroad; such stamps are known as "Vorläufer" (forerunner) stamps. Later stamps are identified by overprints even when not postally used. German abroad stamps started appearing in the late 19th century and reached their heyday at the beginning of the 20th century; they closed down during or shortly after World War I. It was not unusual for countries to maintain such offices and Austria-Hungary, China, France, Greece, Italy, Romania, Russia, the United Kingdom and the United States all did so. In the latter part of the 19th century and into the 20th century, having extraterritorial post offices was one indication of a nation's international power. Background and history On March 1, 1870, the Norddeutscher Postbezirk (i.e. the postal service of the North German Confederation) opened its first office in Constantinople (Istanbul) using definitive stamps without overprint. After January 1872, the Reichspost took over the management of the office and expanded it further as "Deutsche Post in der Türkei". Prior to 1884, this office used ordinary definitive German stamps without any distinctive overprint. Starting in 1884, stamps began to be issued with overprints restating the stamp's face value in the Turkish denominations, i.e. piasters and paras. The overprint did not include an additional country name, as was the case with stamps issued for use at the German post offices in Morocco and China. As was the case with all German Offices Abroad issues, stamps issued prior to 1905 had overprints in a “Latin” font in several varieties. Starting in 1905, the overprint was changed to a “Gothic” font which continued in use until the beginning of the First World War. Beginning in 1908, the German Post Offices in Turkey issued an additional set of stamps which it sold at the same time as the series overprinted with values in Turkish piasters. This 1908 series had diagonal overprints with new denominations in French centimes instead of horizontal overprints in Turkish piaster denominations. The Reichspost decided to issue this French currency series as exchange rates made the parcel post rates charged by the German Post Office more expensive than those of other countries also operating in Turkey. For whatever reason, accepting French francs in exchange for stamps apparently made the German Parcel Post rates more competitive once more. With the entry of Turkey into World War I the offices were closed on 30 September 1914. Offices Post offices existed in these towns: Constantinopel—three post offices eventually opened in the Galata, Pera, and Stamboul districts of the city. Beirut Jaffa Jerusalem Smyrna See also Germ
https://en.wikipedia.org/wiki/Knetwit
Knetwit.com was a social networking and study aid website aimed at colleges and universities. Knetwit hosted users’ intellectual property, and awarded users Koin (internal Knetwit currency) for its distribution. The site provided social networking features, such as friend lists and messaging. Through the Knetwit store, users could redeem their Koin for goods and cash. The domain, knetwit.com, expired on 24 March 2011 and has not been renewed. (As of 1 April 2011) Knetwit was formed in 2007 by Tyler Jenks and Ben Wald. It moved its headquarters to Chattanooga, TN in 2008. The site’s founders, Tyler Jenks and Benjamin Wald, were among 25 finalists in BusinessWeek’s 2008 America’s Best Young Entrepreneurs. Criticisms of Knetwit Knetwit has been criticized for encouraging copyright infringement. Knetwit has also been criticized for very long delays in processing times. The site claims 3-5 business days for money purchases to process, however the order ends up taking about 3 weeks on average to ship out. Knetwit also switches up the formats that it will accept for Koin very often making it very hard to earn any "Koin". In the initial stages knetwit allowed powerpoints, pdfs, excel, all txt and wordpad documents, and bmp formats. This has been reduced over time to just word and text files after the powerpoint slide uploader did not work forcing members to convert the individual slides into bitmap files for more notes. Many members of knetwit feel that the site has changed to make it harder for people to claim prizes (also due to the 500 bonus koin per every 5 notes being removed). Other members have reported not receiving their orders after months of delay. Knetwit is seem as encouraging students to miss class if the notes will be posted on their site. Knetwit has recently added a "new" version of its store to the site...however the old store is still located on the site and the amount of koin is different from each store creating problems in checking out prizes. Some notes whom members upload do not show up in their account and therefore do not receive credit for them, making it quite frustrating Other learning social networks GradeGuru Schoology References External links Knetwit Defunct social networking services
https://en.wikipedia.org/wiki/Bundling%20of%20Microsoft%20Windows
The bundling of Microsoft Windows is the installation of Microsoft Windows in computers before their purchase. Microsoft encourages original equipment manufacturers (OEMs) of personal computers to include Windows licenses with their products, and agreements between Microsoft and OEMs have undergone antitrust scrutiny. Users opposed to the bundling of Microsoft Windows, including Linux users, have sought refunds for Windows licenses, arguing that the Windows end-user license agreement entitles them to return unused Windows licenses for a cash refund. Although some customers have successfully obtained payments (in some cases after litigation or lengthy negotiations), others have been less successful. The "Windows tax" Microsoft encourages original equipment manufacturers (OEMs) to supply computers with Windows pre-installed, saying that purchasers benefit by not having to install an operating system. Analyst Vishal Tripathi said that many people purchase PCs with pre-installed operating systems because they do not want to deal with the "learning curve" and inconvenience of installing an operating system. Virtually all large computer vendors bundle Microsoft Windows with the majority of the personal computers in their ranges. In 1999, Maximum PC wrote that non-Windows users "have long griped that machines from large companies can't be purchased without Windows". In 1999, analyst Rob Enderle attributed the lack of computers without Windows available for individual purchase to economic impracticality, citing certification and warranty requirements. In 1999, Dell stated that it only offered non-Microsoft operating systems on servers and as part of customized large orders, but if Linux became popular enough to make Linux pre-installation cost-effective, "we'd be foolish not to offer it". The Guardians computer editor Jack Schofield claimed that there were significant cost overheads associated with preinstalling Linux, in part due to Linux's small market share, although Schofield had generally viewed Microsoft's bundling practices favourably, claiming in 1995 that Microsoft's incentives were not unlike promotional deals in other industries and that "Microsoft cannot be accused of beating PC manufacturers with a stick: at worst it is beating them with a carrot", despite the well-established competitive impact of such practices on suppliers of competing systems software, acknowledged in a 1994 settlement with Novell. Serdar Yegulalp of Computerworld said that in the late 1990s, because Linux was not fully developed, Linux computers were "a tough sell for non-technical users". Microsoft historically engaged in licensing practices that discouraged the installation of non-Microsoft operating systems. Microsoft once assessed license fees based on the number of computers an OEM sold, regardless of whether a Windows license was included. Beginning in 1983, Microsoft sold MS-DOS licenses to OEMs on an individually negotiated basis. The contracts required OEMs t
https://en.wikipedia.org/wiki/Neil%20Siegel
Neil Gilbert Siegel (born February 19, 1954) is an American computer scientist, systems engineer, and engineer, known for his development of many key systems for the United States military, including the Blue-Force Tracking system, the U.S. Army's first unmanned air vehicle system, and the US Army forward-area air defense system. Several of his inventions also found their way into consumer products, such as hand-held devices (e.g., mobile GPS devices, smartphones, etc.) whose map displays automatically orient themselves to align with the real-world's cardinal points. Early life and work Siegel was born in Brooklyn, New York, to Bernard Siegel and Judith Love Cohen, and has lived most of his life in the area southwest of Los Angeles. He has two full siblings, Howard and Rachel, and is an older half-brother of actor Jack Black. He attended the University of Southern California, earning degrees in mathematics. During and after this time, he worked as a professional musician, mostly performing on the flute, and also playing folk and art music from the Balkans and the Middle East. Later, he earned a Ph.D. in systems engineering (also from USC), where his Ph.D. advisor was noted computer scientist Barry Boehm. Both of his parents were born Jewish. In 1976, he began work at what was then TRW (acquired by Northrop Grumman in 2002). Career Starting in 1993, he led an organization at TRW that developed one-of-a-kind automation systems for the US military and (to a lesser extent) commercial companies. This organization achieved significant business success, growing rapidly every year during his tenure as leader (which continued until 2001). They created many new products whose general theme was automation support to decision-makers who operate in complex and stressful environments. In addition to the US Army and the US Air Force, customers during this time included the US steel industry and the movie industry. In 1993, his team fielded the US Army's first fully automated command-and-control system, the Forward-Area Air Defense C2 System. This system is still in use today. In 1995, his team won the contract to develop the US Army's first "digital battlefield" system, called Force-XXI Battle Command Brigade and Below (generally known by the acronym FBCB2). This has resulted in a highly regarded capability for the US, now used by the Marine Corps, as well as the Army. Also in 1995, his team delivered the US Army's first automated command post, which has been followed by a long series of related capabilities to the present time. In 1997, he was given responsibility for "fixing" the Hunter UAV program, the US Army's first unmanned air vehicle. The program had suffered a series of crashes during testing, and was nominally "cancelled". During his tenure, the program became one of the US' most reliable unmanned air vehicles. The Hunter entered operational service in 1999 in the Balkans. UAVs were unreliable novelties in 1997, but by the time he
https://en.wikipedia.org/wiki/International%20Criminal%20Court%20Student%20Network
The International Criminal Court Student Network (ICCSN) is an international student association that brings together young people interested in the International Criminal Court and in international criminal justice. The association aims at enhancing awareness about the Court’s activity and at increasing knowledge of issues of international criminal law. The ICCSN is currently a member of the Coalition for the International Criminal Court. History The ICCSN was created in 2006 by students at the London School of Economics, UK and now includes members from six universities in London and the University of Cambridge, the University of Warwick, the University of Utrecht in The Netherlands, and, as of 2011, the University of Oxford. Law students at Duke University established the first U.S. Chapter. Students at Central Michigan University set up the first chapter at a university without a law school. The first chapter in Canada was opened at McGill University in the Autumn of 2012. In 2014, the first Australian chapter was founded by law students at the University of Western Sydney. Mission A fundamental premise of the ICCSN is the idea is that the development of international criminal justice relies on youth’s efforts and consciousness and that the involvement of new generations in the discussion about international justice will help the ICC legal machinery to prove effective. ICCSN's campaigns are focused on promoting effective compliance with ICC’s actions and decisions amongst Member States, on information dissemination on the cases currently at the attention of the Court, on the arrangement of public debates and the publication of a Journal, Issues in International Criminal Justice. Activities Apart from campaigning, the network has hosted numerous speaker events, sent members on a trip to the Hague to visit and learn about the mechanisms of the ICC, and organised the first ever international criminal law meeting in the United Kingdom. The association was also represented as a member of the coalition for the ICC at the Seventh Session of the Assembly of State Parties in November 2008. The association operates through the work of an Executive Committee, which includes a Director, a Chair, a Secretary, a Treasurer, a Public Relations Officer and an Outreach Officer, directly elected from the members of the association. References External links Official website Student organizations established in 2006 International Criminal Court
https://en.wikipedia.org/wiki/Wikindx
Wikindx is a free bibliographic and quotations/notes management and article authoring system (Virtual Research Environment) designed either for single use (on a variety of operating systems) or multi-user collaborative use across the internet. Wikindx falls within the category of reference management software, but also provides functionality to write notes and entire papers. Developed under the GNU GPL license, the project homepage can be found at sourceforge.net and the required files/updates are available for download there. Other features Support UTF-8 encoding and include translations (Chinese, Danish, Dutch, English, French, German, Greek, Indonesian, Italian, Japanese, Korean, Polish, Portuguese, Romanian, Russian, Spanish, Swedish, Turkish, Ukrainian). Allows multiple attachments for each bibliographic resource. Quarantining and embargoes of attachments and resources supported. Comprehensive search on resources and attachments. Store quotations, paraphrases and ideas with your references. Can export a bibliography in various bibliographic styles (APA, Chicago, IEEE for example). Allows users to edit or create bibliographic styles through a graphical interface. Can import and export other bibliographic formats including BibTeX and EndNote format. Export bibliographies to RTF for use in Word/OpenOffice.org etc. Modular plugin architecture so easily customizable (PHP) -- plugins include WYSIWYG word processor, import/export bibliographic formats, PubMed import. Google Docs integration See also Comparison of reference management software for some comparisons with similar packages. References Bibliography Reference management software Free reference management software
https://en.wikipedia.org/wiki/IXsystems
iXsystems, Inc. is a privately owned American computer technology company based in San Jose, California that develops, sells and supports computing and storage products and services. Its principal products are customized open source FreeBSD distributions, including the discontinued desktop operating system TrueOS (formerly PC-BSD), the FreeBSD based file servers and network attached storage systems TrueNAS Core (previously FreeNAS) and TrueNAS Enterprise, and the Linux based TrueNAS SCALE. It also markets hardware platforms for these products, and develops enterprise-scale storage architectures and converged infrastructures. As part of its activities, the company has strong ties to the FreeBSD community, has repeatedly donated hardware and support to fledgling projects within the BSD community, and sponsors and develops development within FreeBSD, as well as being a sponsor and attendee of open-source community events. History iXsystems was founded in 1991 as Berkeley Software Design, Inc. (BSDI, later BSDi) by Rick Adams and members of the University of California, Berkeley Computer Systems Research Group (CSRG), including Keith Bostic, Kirk McKusick, Mike Karels, Bill Jolitz and Donn Seeley. In the year 2000, Berkeley Software Design, Inc. acquired enterprise server manufacturer Telenet System Solutions, Inc., which was founded in 1996 and operated from the same San Jose, California office and manufacturing facility that iXsystems operates today. In 2001, BSDi sold its operating systems business to Wind River Systems and spun off its hardware business and iXtreme line of servers as iXsystems, Inc. In 2002, OffMyServer, Inc., owned by two BSDi employees, acquired iXsystems, Inc. and operated it as OffMyServer, Inc. until restoring the iXsystems name in 2005. In 2006, iXsystems adopted the PC-BSD project and hired its founder, Kris Moore. In 2007, iXsystems acquired FreeBSD Mall, Inc., reuniting all the portions of the original BSDi that had been spun off to Wind River Systems. In 2009, iXsystems negotiated to continue the FreeNAS project when its developers decided to move it to Debian Linux. iXsystems introduced a comprehensive rewrite of FreeNAS in 2011 which now provides the platform for the "FreeNAS Mini" SMB NAS arrays and "TrueNAS" enterprise storage arrays. In August 2010, BSD author Dru Lavigne joined iXsystems and in July 2013, Jordan K. Hubbard, one of the founders of the FreeBSD project, joined iXsystems as CTO. Products and services Servers iXsystems designs, sells and supports custom x86 servers for workgroups through data centers with a focus on support for the FreeBSD operating system. All iXsystems servers are subjected to a three-day burn-in process to reduce returns and are available with Linux as an alternative operating system. TrueNAS TrueNAS is the brand for ixSystems' open source network attached storage platform. It includes: TrueNAS CORE (previously FreeNAS) - a free file server and expandable platform based on
https://en.wikipedia.org/wiki/Korean%20Film%20Awards
The Korean Film Awards was a South Korean film awards ceremony hosted by the broadcasting network MBC from 2002 to 2010. History Originally named the MBC Film Awards, the ceremony was first established in 2002. It was renamed the Korean Film Awards in 2003. Votes were determined from a jury of 500 film professionals and 500 viewers selected through the internet, using a 7:3 ratio. In 2009, failure to secure sponsors during the global economic recession resulted in the cancellation of that year's ceremony. It resumed in 2010, with Hyundai Motor Company as the main sponsor. But persistent financial difficulties regarding the production costs led MBC to abolish the awards in 2011. Categories Best Film Best Director Best Screenplay Best Actor Best Actress Best Supporting Actor Best Supporting Actress Best New Director Best New Actor Best New Actress Best Cinematography Best Editing Best Art Direction Best Lighting Best Music Best Visual Effects Best Sound Best Short Film Lifetime Achievement Award Best Film Best Director Best Screenplay Best Actor Best Actress Best Supporting Actor Best Supporting Actress Best New Director Best New Actor Best New Actress Best cinematography Best Editing Best Art Direction Best Lighting Best Visual Effects Best Music Best Sound Best Short Film Lifetime achievement award References External links Korean Film Awards at Naver Korean Film Awards at Cinemasie South Korean film awards Awards established in 2002 Munhwa Broadcasting Corporation 2002 establishments in South Korea Annual events in South Korea
https://en.wikipedia.org/wiki/Tester-driven%20development
</noinclude> In software engineering, tester-driven development, or bug-driven development, is an anti-pattern where the requirements are determined by bug reports or test results rather than, for example, the value or cost of a feature. The concept is generally invoked facetiously, and comes with the implication that high volumes of computer code are written with little regard for unit testing by the programmers. The term itself is a tongue-in-cheek reference to test-driven development, a widely used methodology in agile software practices. In test-driven development tests are used to drive the implementation towards fulfilling the requirements. Tester-driven development instead shortcuts the process by removing the determination of requirements and letting the testers (or the QA team) drive what they think the software should be through the testing (or QA) process. Projects that are developed using this anti-pattern often suffer from being extremely late. Another common problem is poor code quality. Common causes for projects ending up being run this way are often: The testing phase started too early; Incomplete requirements; Inexperienced testers; Inexperienced developers; Poor project management. Things get worse when the testers realize that they don't know what the requirements are and therefore don't know how to test any particular code changes. The onus then falls on the developers of individual changes to write their own test cases and they are happy to do so because their own tests normally pass and their performance measurements improve. Project leaders are also delighted by the rapid reduction in the number of open change requests. See also Extreme programming Extreme programming practices Feature creep Requirements management Software prototyping – creating prototypes of software applications to get feedback from users early in a project References Software development process Anti-patterns
https://en.wikipedia.org/wiki/Global%20Benchmarking%20Network
The Global Benchmarking Network (GBN) is an alliance of leading benchmarking centres worldwide. Current membership comprises 20 benchmarking centres in 20 countries, which represent more than 30,000 businesses and government agencies. The GBN was founded in November 1994 by representatives from benchmarking centres in Germany, Italy, Sweden, the United Kingdom and the United States. Structure The GBN is a non-profit organization. Funding is raised from affiliates' annual fees and other sources approved at the annual meeting. It has a Chairman, a Vice Chairman, and a Secretary General. Services The GBN was established to promote and to support these core benefits for its affiliates: to share experience in benchmarking centre operations to promote and to assist with international partnering between individual organizations participating in centre activities to enhance centres with marketing and promotional support for benchmarking to exchange selected publications between affiliates including newsletters and promotional material to share advance information on up-coming meetings, activities, and events including national and international awards References Organizations established in 1994 International non-profit organizations Non-profit organisations based in Berlin
https://en.wikipedia.org/wiki/TRS-80%20Model%20II
The TRS-80 Model II is a computer system launched by Tandy in October 1979, and targeted at the small-business market. It is not an upgrade of the original TRS-80 Model I, but a new system. The Model II was succeeded by the compatible TRS-80 Model 12, Model 16, Model 16B, and the Tandy 6000. Model II Background Tandy was surprised at the strong demand for the TRS-80 Model I from business purchasers. The computer was too limited for such use, so the company began development on the Model II in late 1978. It was announced in May 1979, deliveries began in October, and only Tandy-owned Radio Shack stores sold the computer. Tandy advertised the Model II as "a business computer — not a hobby, 'home' or personal computer". It claimed that the computer was "ideal for a small business, and also 'just right' for many time-consuming jobs within larger businesses", including those with mainframes or minicomputers. The base single disk version was , and a four disk version was . Hardware As a professional business machine, the Model II used state-of-the-art hardware and had numerous features not found in the primitive Model I such as the high-speed (for the time) 4 MHz Z80A, DMA, vectored interrupts, a detachable keyboard with two function keys and numeric keypad, and port instead of memory-mapped I/O. It sported 80x25 text and a single-sided 500 KB 8" floppy drive, and either 32 or 64k of RAM, along with two RS-232 ports and a Centronics-standard parallel port. The video memory could be banked out of Z80 memory, so that the entire 64 KB address space could be used for main memory. Unlike most computers, it had no BIOS ROM except a small boot loader (the BIOS was loaded off the boot floppy). Because of this and the use of port I/O, almost all of the Model II's memory could be used by software. The Model II ran the TRSDOS operating system (renamed to TRSDOS-II starting with version 4.0) and BASIC. The different disk format and system architecture made it impossible to run Model I/III software on the Model II, thus it never had as much available. This was somewhat mitigated by the availability of the CP/M operating system for the Model II from third parties such as Pickles & Trout. Unlike the Model I/III, the Model II's memory map is compatible with standard CP/M-80. Three internal expansion slots could be used for add-on cards such as additional serial ports and a video board that allowed bitmap graphics. The floppy drive included with the Model II was a Shugart SA-800 full-height, single-sided 8" drive; like most such drives, it spun continuously whether the disk was being accessed or not and the spindle motor was powered directly off the A/C line. The floppy controller in the Model II was a double-density, soft-sector unit based on the WD 1791 floppy controller. Like with the Model I/III/IV, boot disks on the Model II required Track 0 to be single density. CDC drives were used for the floppy expansion module. The keyboard was a capacitive keyboard mad
https://en.wikipedia.org/wiki/TRS-80%20Model%204
The TRS-80 Model 4 is the last Z80-based home computer family by Radio Shack, sold from April 1983 through late 1991. Model 4 Tandy Corporation introduced the TRS-80 Model 4 on April 26, 1983 as the successor to the TRS-80 Model III. The Model 4 has a faster Z80A 4 MHz CPU, larger video display of 80 columns by 24 rows, bigger keyboard, and can be upgraded to 128KB of RAM. It is compatible with Model III software and CP/M application software. The Model 4 was announced in the same April 1983 press release as was the TRS-80 Model 100 laptop. The two computers were often marketed by Tandy/Radio Shack as a complementary pair. A diskless Model 4 with 16KB RAM cost $999; with 64KB RAM and one single-sided 180K disk drive it cost $1699; with 64KB RAM and two drives it cost $1999. An upgrade for Model III owners cost $799 and provided a new motherboard and keyboard. The Model 4's first appearance in the Radio Shack catalog stated: "Yes, it looks like a Model III, but it's much much more. Compare the price and features of our amazing new Model 4 to any other computer in its class. You'll find that for power, versatility, and convenience it is a true breakthrough. To add the same features to other computers, you'd have to pay a whole lot more." Commenting on its unexpected longevity as a Radio Shack product and object of aftermarket support by third-party companies, in May 1987 80 Micro magazine remarked, "Even when it was introduced in 1983, the Model 4 was seen as a last gasp for the TRS-80 line." Overview The computer has the same all-in-one cabinet as the Model III, adopting a more contemporary-looking beige color scheme instead of the black and gray used on the Models I/III. The Model 4 uses WD1770/1773 floppy controllers instead of the WD1791, which allows for a larger gap between the index hole and first sector; later releases of TRSDOS and LDOS were modified for compatibility with the controller. The Model 4 shipped with TRSDOS 6, identical to Logical Systems's LDOS 6.00 third-party operating system (itself an enhancement to older versions of TRSDOS). When the Model 4 boots into TRSDOS 6, the video display switches into 80×24 mode and the entire 64KB address space is mapped as RAM. Misosys Inc. sold a Model 4 Hardware Interface Kit which enables the extra keys on the Model 4 keyboard, and in a 128 KB Model 4, the banked memory. Intellitech sold a program called Supermod4 that allows Model III programs running on a Model 4 to activate the 4 megahertz CPU clock, larger video display, the speaker and the function keys. In August 1985 80 Micro magazine published a DoubleDuty-like task switching program that activates the external RAM banks on a 128 KB Model 4 from within Model III mode. The Model 4 can run CP/M without modification, unlike the Model I and III. Digital Research produced a version of CP/M 3.0 for the Model 4. Montezuma Micro sold a version of CP/M 2.2 that was customized for the Model 4's hardware: banked RAM, reverse video an
https://en.wikipedia.org/wiki/Paris%20%281979%20TV%20series%29
Paris is an American police procedural that aired on the CBS television network from September 29, 1979 to January 15, 1980. The show is notable as the first appearance of actor James Earl Jones in a television lead role. Paris was created and executive produced by Steven Bochco, and produced by Edward DeBlasio for MTM Enterprises. Plot Los Angeles Police Captain Woody Paris (Jones) is the supervisor of a team of rookie detectives, led by Sergeant Stacy Erickson (Cecilia Hart) and including officers Charlie Bogart (Jake Mitchell), Ernesto Villas (Frank Ramirez), and Willie Miller (Michael Warren). Hank Garrett portrayed Deputy Chief Jerome Bench, Paris' superior, and, in an unusual turn for police dramas of that era, Paris' home and off-duty life was given considerable attention, with Lee Chamberlin portraying his wife Barbara. Paris additionally moonlighted as a professor of criminology at a local university. Reception Although Paris was critically acclaimed for its portrayal of the tension between the title character and his often impetuous underlings, it failed to attract viewers due to CBS scheduling it in one of the worst timeslots on a weekly schedule: Saturdays at 10 p.m. CBS moved the show to Tuesdays in the same timeslot in a futile attempt to improve ratings, and the show was canceled in 1980 after one season of thirteen episodes, two of which were not broadcast. Jones married former costar Hart two years after Paris cancellation, and they remained together until her death in 2016. Cast James Earl Jones as Detective Capt. Woodrow "Woody" Paris Hank Garrett as Deputy Chief Jerome Bench Cecilia Hart as Sgt. Stacey Erickson Jake Mitchell as Det. Charlie Bogart Frank Ramírez as Det. Ernie Villas Michael Warren as Det. Willie Miller Lee Chamberlin as Barbara Paris Episodes Sources Total Television: A Comprehensive Guide to Programming from 1948 to the Present, Alex McNeil, New York: Penguin, revised ed., 1984. References External links 1979 American television series debuts 1980 American television series endings 1970s American crime drama television series 1980s American crime drama television series 1970s American police procedural television series 1980s American police procedural television series CBS original programming English-language television shows Fictional portrayals of the Los Angeles Police Department Television shows set in Los Angeles Television series by MTM Enterprises Television series created by Steven Bochco American detective television series
https://en.wikipedia.org/wiki/Hotel%20Hoppa
Hotel Hoppa is a network of bus services owned and operated by Rotala, connecting major hotels near Heathrow Airport with Terminals 1-3 and Terminal 5. A free shuttle service links Terminal 4 with Terminals 1–3. It operates eleven routes. The business became part of Rotala at the end of 2017, following its acquisition from National Express. It is operated under Rotala's Hallmark Connections brand. History The network was originally operated with a fleet of 1997 built Wright Crusader bodied Volvo B6LEs, which were painted in National Express circles livery with the red replaced by light blue. In 2008 these were replaced by 32 Alexander Dennis Enviro200 Darts painted in National Express white and grey livery. In 2019 5 Wright Streetlite DFs were added to the fleet. Fares and competition Hotel Hoppa fares start at £5.00 per adult for a single and £10.00 for a return. There is a 50p surcharge per journey to buy a ticket on the bus. Up to two children per adult are free. The alternative is London Transport buses with most area hotels reached for the price of a standard bus fare. References External links Hotel Hoppa website Buildings and structures at Heathrow Airport London bus operators Mobico Group Rotala Transport in the London Borough of Hillingdon Transport in London Bus routes in London
https://en.wikipedia.org/wiki/Global%20Administrative%20Unit%20Layers
The Global Administrative Unit Layers (GAUL) is a spatial database of the administrative units for all the countries in the world. It is a project of the Food and Agriculture Organization (FAO) of the United Nations. Mission The GAUL aims at compiling and disseminating the most reliable geographic information on administrative units for all the countries in the world, thereby contributing to the standardization of the spatial dataset representing administrative units. In this framework, its purposes are: to overcome the fragmentation of the global dataset occurring when administrative units layers are digitized on a country-by-country basis to keep historical track of changes occurring on the shapes and extent of the administrative units to promote a unified coding system that reduces maintenance efforts. Characteristics The GAUL always maintains global geographic layers (in shapefile format) with a unified coding system at the levels of country, first administrative (e.g. regions), and second administrative (e.g. districts). In addition, when data is available, it provides layers on a country-by-country basis down to third, fourth and lower levels. The target beneficiary of the GAUL data is the UN community, universities, and other authorized international and national institutions/agencies. Data might not be officially validated by authoritative national sources and can not be distributed to the general public. A disclaimer should always accompany any use of the GAUL data. Because the GAUL works at global level, controversial boundaries can not be ignored. The approach of the GAUL is to maintain disputed areas in such a way to preserve national integrity for all disputing countries. The coastline of the GAUL is mostly compliant with the coast of the International Boundary map delivered by the UN Cartographic Section except for some countries (e.g. Vietnam, India, Bangladesh, etc.) where it has been updated according to the satellite images (e.g. Landsat ETM). For future releases of the GAUL, the process of updating the coastline will go on, country by country, through a comparison with the satellite images. The GAUL keeps track of administrative units that have been changed, added, or deleted in the past. Changes implemented in different years are recorded in the GAUL on different layers. For this reason the GAUL product is not a single layer but a group of layers, named the GAUL Set. The GAUL project does not implement changes dated before 1990. GAUL codes are numeric and unique for all administrative units at any of the administrative hierarchical level. Any GAUL code is independent from the codes of its higher administrative levels. GAUL codes assigned to administrative units of a given country are not necessarily sequential numbers. The main benefit of the GAUL Coding System is that changing in the codes of an administrative unit might not imply a change of codes of the correspondent units at lower levels. This means that the eff
https://en.wikipedia.org/wiki/Trams%20in%20Frankfurt%20am%20Main
The Frankfurt am Main tramway network is a network of tramways forming a major part of the public transport system in Frankfurt am Main, a city in the federal state of Hesse, Germany. , there were 10 tram lines, along with two special lines and one heritage tourist tramline. The network was also heavily integrated into the Frankfurt U-Bahn, with the systems sharing both street running and reserved track. In 2012, the network had 136 stations, and a total route length of . In the same year, the network carried 49.9 million passengers, about 30% of total public transport ridership in Frankfurt. History The network is the oldest light rail system in the city, the first horse tram lines having started operations on 19 May 1872. It includes one of the first electric tramways in the world, with the first electrified tram line starting in 1884. Frankfurt Trambahn-Gesellschaft The Frankfurt Trambahn-Gesellschaft (FTG), founded in 1872 as a subsidiary of the Brussels-based company F. de la Hault & Cie, introduced tram traffic with horse trams in Frankfurt. On 19 May 1872 they opened the first line with horses as draft animals from Schönhof in the northwestern neighboring town of Bockenheim on the Bockenheimer Warte, through the Westend on the Bockenheimer highway and today's Opernplatz to the Hauptwache. The FTG opted for tracks in a gauge of , as it was then also common in the railway, the so-called standard gauge. The decision made at that time is still valid until today, all Frankfurt street and subway lines have this track, even if the draft horses were long ago displaced by electric railcars. The first line was extended a short time later on the Zeil towards the east and reached in 1875 the Hanau station. From 1879, a second line from Bornheim (at the clock tower), which had been incorporated two years before, led over the Sandweg to Friedberger Anlage, and a year later to the Westbahnhof. This line was extended on 24 October 1881 to the Kirchner school at the Hohen Brunnen. Also in 1881 the first time horse trolleys drove across the river Main to Sachsenhausen, since 1882 trains have been going to the Nordend. The city of Rödelheim, located northwest of Frankfurt, was connected to the horse tramway in 1889. However, the line led only to the Schönhof; at first there was no connection to the original line that began there, since the route of the Main-Weser-Bahn was there and the passenger-occupied horse-drawn carriages were not allowed to cross at ground level. Only with the construction of the Breitenbach Bridge in 1915 was a continuous line from Rödelheim to the city center created. In the 1890s more routes followed through the city center and the fast-growing Wilhelminian era belt. From 1892, horse-drawn trams ran to the main cemetery, from 1895 to the Galluswarte. In 1898, FTG had reached of the tram lines and had 16 tram lines in total. The first electric trams In 1882, an Offenbach consortium applied for permission to build an electr
https://en.wikipedia.org/wiki/Clarence%20Ellis%20%28computer%20scientist%29
Clarence "Skip" Ellis (May 11, 1943 – May 17, 2014) was an American computer scientist, and Emeritus Professor of Computer Science and Cognitive Science at the University of Colorado at Boulder. While at the CU-Boulder, he was the director of the Collaboration Technology Research Group and a member of the Institute of Cognitive Science. Ellis was the first Black Person to earn a Ph.D. in Computer Science (1969), and the first Black Person to be elected a Fellow of the ACM (1997). Ellis was a pioneer in Computer Supported Cooperative Work (CSCW) and Groupware. He and his team at Xerox PARC created OfficeTalk, one of the first groupware systems. Ellis also pioneered operational transformation, which is a set of techniques that enables real-time collaborative editing of documents. Childhood In 1958, at age 15, Ellis applied for a job as a graveyard shift computer operator at the manufacturing firm Dover to earn money to help his family. He was offered the job because he was the only applicant. Although his job title was computer operator, his main duties were to walk around all night and be visible to prevent break-ins, and to watch over, but not touch, the company's new computer. At the time, Dover's computer was based on vacuum tube technology (2,400 vacuum tubes), used punch cards as input and output, and filled an extremely large room. In Ellis' free time on the job, he read and re-read the dozens of computer manuals that came with the machine. He taught himself as much as possible about the machine without touching it. Two months after he started the job, Ellis helped the company through an emergency. They had run out of unused punch cards, and needed to use the computer to process payroll by morning. During the emergency, Ellis was the only one who knew how to recycle the used punch cards. He lifted the hood of the computer and disabled the parity check circuitry. The used punch cards were recycled and the company was able to process the payroll. After this experience, the company began to seek him out whenever they had computer problems, and even asked him to operate and program the computer for them. Ellis states that this experience helped ignite his passion for computing. High school and college Throughout high school, Ellis' teachers recommended that he attend summer school programs at the local universities in Chicago. This was his first encounter with college-level students and university life. Though poor, Ellis was able to attend Beloit College in the fall of 1960 because the church he and his family attended awarded him a scholarship. In Ellis' junior year, Beloit College received an IBM 1620 as a donation, and he and his chemistry professor were asked to set it up. This was the start of the Beloit College computer lab, of which Ellis was the director. During the early 1960s, Beloit didn't offer a degree in computer science, however, Ellis was able to substitute some of his science laboratory work with computer projects. In 1964,
https://en.wikipedia.org/wiki/ELLA%20%28programming%20language%29
ELLA is a hardware description language and support toolset, developed in the United Kingdom by the Royal Signals and Radar Establishment (RSRE) during the 1980s and 1990s, which also developed the compiler for the programming language, ALGOL 68RS, used to write ELLA. ELLA has tools to perform: Design transformation Symbolic simulations Formal verification ELLA is a winner of the 1989 Queen's Award for Technological Achievement. Sample Sample originally from ftp://ftp.dra.hmg.gb/pub/ella, public release. Code for matrix multiplication hardware design verification: MAC ZIP = ([INT n]TYPE t: vector1 vector2) -> [n][2]t: [INT k = 1..n](vector1[k], vector2[k]). MAC TRANSPOSE = ([INT n][INT m]TYPE t: matrix) -> [m][n]t: [INT i = 1..m] [INT j = 1..n] matrix[j][i]. MAC INNER_PRODUCT{FN * = [2]TYPE t -> TYPE s, FN + = [2]s -> s} = ([INT n][2]t: vector) -> s: IF n = 1 THEN *vector[1] ELSE *vector[1] + INNER_PRODUCT {*,+} vector[2..n] FI. MAC MATRIX_MULT {FN * = [2]TYPE t->TYPE s, FN + = [2]s->s} = ([INT n][INT m]t: matrix1, [m][INT p]t: matrix2) -> [n][p]s: BEGIN LET transposed_matrix2 = TRANSPOSE matrix2. OUTPUT [INT i = 1..n][INT j = 1..p] INNER_PRODUCT{*,+}ZIP(matrix1[i],transposed_matrix2[j]) END. TYPE element = NEW elt/(1..20), product = NEW prd/(1..1200). FN PLUS = (product: integer1 integer2) -> product: ARITH integer1 + integer2. FN MULT = (element: integer1 integer2) -> product: ARITH integer1 * integer2. FN MULT_234 = ([2][3]element:matrix1, [3][4]element:matrix2) -> [2][4]product: MATRIX_MULT{MULT,PLUS}(matrix1, matrix2). FN TEST = () -> [2][4]product: ( LET m1 = ((elt/2, elt/1, elt/1), (elt/3, elt/6, elt/9)), m2 = ((elt/6, elt/1, elt/3, elt/4), (elt/9, elt/2, elt/8, elt/3), (elt/6, elt/4, elt/1, elt/2)). OUTPUT MULT_234 (m1, m2) ). COM test: just displaysignal MOC References External links ELLA source code including the ALGOL 68RS translator Hardware description languages History of computing in the United Kingdom
https://en.wikipedia.org/wiki/The%20Matthew%2025%20Network
The Matthew 25 Network is a Political Action Committee (PAC) geared towards supporting progressive candidates for American public office who possess what the organization considers to be a strong Christian faith. Matthew 25 Network was founded in 2008 by Mara Vanderslice. Name The group’s name, Matthew 25 references the 25th chapter of the gospel of Matthew in which during the Parable of the Sheep and the Goats, Jesus Christ summarizes His judgment of the righteous as follows: “For I was hungry and you gave me something to eat, I was thirsty and you gave me something to drink, I was a stranger and you invited me in, I needed clothes and you clothed me, I was sick and you looked after me, I was in prison and you came to visit me.” Founding Matthew 25 Network was founded by Mara Vanderslice, who in 2004 was director of religious outreach for the Kerry-Edwards campaign. She also did religious outreach for several Democratic candidates on the state level including: Governor of Ohio Ted Strickland, Governor of Kansas Kathleen Sebelius and Senator Bob Casey of Pennsylvania. 2008 presidential election The Matthew 25 Network endorsed Barack Obama in his bid for the White House. Their efforts focused primarily on reaching out to targeted religious communities which the Network felt would be key to his success on election day including “Catholics, moderate evangelicals, Hispanic Catholics and Protestants” as printed on official literature of the Matthew 25 Network. The Matthew 25 Network is based primarily around grassroots efforts by mobilizing voters of the Christian left. On July 1, 2008 The Network began airing its first radio ad, to announce its support for President-elect Barack Obama on Christian radio. On August 15, 2008 the Matthew 25 network began airing its first television ad. Along with airing ads of their own, the Matthew 25 Network worked to repudiate false attacks which they felt where offensive, misguided and untrue. On July 31, the Network launched its site PutAwayFalsehood.com to counter what they believed to be false emails, rumors and accusations concerning President Barack Obama. References United States political action committees Christian organizations established in 2008
https://en.wikipedia.org/wiki/Pranks%20and%20Greens
"Pranks and Greens" is the sixth episode of the twenty-first season of the American animated television series The Simpsons. It originally aired on the Fox network in the United States on November 22, 2009. In this episode, Bart tracks down an immature, college-aged man named Andy Hamilton who was once hailed Springfield Elementary's best prankster and encourages him to do something with his life. The episode was written by Jeff Westbrook and directed by Chuck Sheetz. It was watched by approximately 7.03 million viewers during its original airing. Plot After Bart is apprehended for playing pranks on the teachers of Springfield Elementary, Principal Skinner reveals to Bart that he is not the greatest prankster to ever walk the halls of the school. Bart is shocked by this revelation and sets out to discover the identity of this prankster. After sifting through countless back issues of the school paper, he discovers that there is a two-week gap in its publication dating back ten years, and that there is a substantial change in Skinner's demeanor and appearance before and after the gap. Groundskeeper Willie eventually tells Bart that he was once the school swim instructor, and that Skinner was once fun-loving and laid-back until an incident dubbed "Night of the Wigglers". Here, a prankster named Andy Hamilton locked Skinner in a pool full of earthworms for three days, changing Skinner's personality for the worse. Bart meets Andy and discovers that he is unemployed and lives with his mother. When Lisa suggests Andy is a loser, Bart gets him a job as Krusty the Clown's assistant as a favor Krusty owes him, but is angry when Andy quits after one day. Bart gets him rehired and goes to check Andy's progress. When a truck full of earthworms labelled "Prank Grade" drives into the studio, Bart is terrified that Andy is repeating the "Night of the Wigglers" prank and that Krusty will end up a loser like Skinner. He discovers however that it is part of the show, and that Andy has been hired as a head writer for Krusty's show and has a girlfriend, much to Bart's delight. Despite Andy's success, Lisa still thinks that he is a loser, believing that writing for a comedy show is no better than the life of a prankster. Meanwhile, Marge is harshly criticized by other Springfield mothers for serving unhealthy snacks at their "Midday Mommies" meeting. In response, she burns the family's junk food and the family purchases organic food, which is very expensive and has a short shelf life. At the next meeting, while the other mothers enjoy Marge's healthy food, they become horrified at Marge for using non-stick bakeware (which contains PFOAs) and having the babies drink out of plastic drinking bottles marked with number 7 (which has the potential to leak BPA). The other mothers storm away and get into a nearby ambulance, tossing out Hans Moleman in the process. Marge realizes that she misses eating junk food and Homer later catches Marge eating from his stash of candy
https://en.wikipedia.org/wiki/WCLC%20%28AM%29
WCLC was a broadcast radio station licensed to Jamestown, Tennessee, serving Jamestown and the vicinity. WCLC was owned and operated by New Life Studios, Inc. and it simulcast their programming from sister station WCLC-FM "New Life 105". This station operated only during the daytime hours. External links FCC Station Search Details: DWCLC (Facility ID: 30297) FCC History Cards for WCLC (covering 1957-1979) CLC CLC Radio stations established in 1957 1957 establishments in Tennessee Defunct radio stations in the United States Radio stations disestablished in 2021 2021 disestablishments in Tennessee Defunct religious radio stations in the United States
https://en.wikipedia.org/wiki/FJG%20RAM
FJG RAM, short for Floating Junction Gate Random Access Memory, is a type of computer memory invented and subsequently patented in July 2009 by Oriental Semiconductor Electronics, Ltd. The FJG RAM, according to Oriental Semiconductor researchers has an ultra-compact cell area of 4-5F2 (F refers to feature size) and a capacitor-less cell configuration. The FJG RAM can be produced in existing standard DRAM fabs. Due to the absence of a capacitor, the FJG cell process is more compatible with logic processes, allowing its use in standalone DRAM applications as well as embedded-DRAM applications. Other properties include non-destructive-read and the possibility for DRAM designers to use shared sense amplifiers to reduce the complexity of peripheral circuits. As of July 2023, there is little evidence of ongoing development or near-term commercialization efforts. References External links Oriental Semiconductor webpage Types of RAM Upcoming integrated circuits Chinese inventions Science and technology in China
https://en.wikipedia.org/wiki/St.%20P%C3%B6lten%20University%20of%20Applied%20Sciences
The St. Pölten University of Applied Sciences (German: Fachhochschule St. Pölten) is a provider of higher education within the areas of Rail Technology & Mobility, Health Sciences, Computer Science & Security, Digital Business & Innovation, Media & Digital Technologies, and Social Sciences. Approximately 3.700 students are currently acquiring a practice-oriented academic education in various study programmes and further education programmes. Facts The St Polten University of Applied Sciences, which coordinates six universities of applied sciences from the same number of nations as a European University in the E3UDRES2 project of the European University Alliance, was one of the finalists in the category of the Young Entrepreneurial University of the Year 2022 at the Europe Triple E-Awards along with GEA College, Universidade NOVA Lisboa, UC Leuven-Limburg and Stuttgart Media University. In 2021, the Spin-off Austria Initiative, which promotes entrepreneurship in university education, awarded the St. Pölten University of Applied Sciences with 1st place in the "University of Applied Sciences" category. According to the trend magazine, St. Pölten UAS ranks 10th on the list of Austria's Best 300 Employers. History The history of the UAS St. Pölten began in 1993, when the "Verein zur Föderung der Gesellschaft zur Durchführung von Fachhochschul-Studiengängen St. Pölten m.b.H." (eng.: Association for the Advancement of the Society for the Implementation of the University of Applied Sciences St. Pölten ltd.) was founded. In the academic year 1996/97 with Telecommunication and Media the first degree programme started. In January 2004 the facility was awarded the legal designation 'University of Applied Sciences'. In 2007 the St. Pölten UAS moved to the building in the Matthias Corvinus-Straße. At the moment the educational offer covers 13 bachelor's and 13 master's degree programmes as well as 24 further education courses. Study programmes Degree programmes Bachelor's degree programmes Creative Computing Data Science and Business Analytics Dietetics Health and Nursing PLUS IT Security Management & Digital Business Marketing & Communication Media Management Media Technology Physiotherapy Railway Technology and Mobility Smart Engineering of Production Technologies and Processes Social Work Master's degree programmes Cyber Security and Resilience Data Intelligence Digital Business Communications Digital Design Digital Healthcare Digital Innovation and Research Digital Marketing & Communication Digital Media Management Digital Media Production Information Security Interactive Technologies Rail Technology and Management of Railway Systems Social Work Further educational courses The spectrum of further education programmes is continuously expanded. Most of these are offered on a part-time basis. Research The St. Pölten UAS conducts research in the following institutes and fields of competence: Institute for Innovation Systems:
https://en.wikipedia.org/wiki/Koobface
Koobface is a network worm that attacks Microsoft Windows, Mac OS X, and Linux platforms. This worm originally targeted users of networking websites like Facebook, Skype, Yahoo Messenger, and email websites such as GMail, Yahoo Mail, and AOL Mail. It also targets other networking websites, such as MySpace, Twitter, and it can infect other devices on the same local network. Technical support scammers also fraudulently claim to their intended victims that they have a Koobface infection on their computer by using fake popups and using built-in Windows programs. Infection Koobface ultimately attempts, upon successful infection, to gather login information for FTP sites, Facebook, Skype, and other social media platforms, and any sensitive financial data as well. It then uses compromised computers to build a peer-to-peer botnet. A compromised computer contacts other compromised computers to receive commands in a peer-to-peer fashion. The botnet is used to install additional pay-per-install malware on the compromised computer and hijack search queries to display advertisements. Its peer-to-peer topology is also used to show fake messages to other users for the purpose of expanding the botnet. It was first detected in December 2008 and a more potent version appeared in March 2009. A study by the Information Warfare Monitor, a joint collaboration from SecDev Group and the Citizen Lab in the Munk School of Global Affairs at the University of Toronto, has revealed that the operators of this scheme have generated over $2 million in revenue from June 2009 to June 2010. Koobface originally spread by delivering Facebook messages to people who are "friends" of a Facebook user whose computer had already been infected. Upon receipt, the message directs the recipients to a third-party website (or another Koobface infected PC), where they are prompted to download what is purported to be an update of the Adobe Flash player. If they download and execute the file, Koobface can infect their system. It can then commandeer the computer's search engine use and direct it to contaminated websites. There can also be links to the third-party website on the Facebook wall of the friend the message came from sometimes having comments like LOL or YOUTUBE. If the link is opened the trojan virus will infect the computer and the PC will become a Zombie or Host Computer. Among the components downloaded by Koobface are a DNS filter program that blocks access to well known security websites and a proxy tool that enables the attackers to abuse the infected PC. At one time the Koobface gang also used Limbo, a password stealing program. Several variants of the worm have been identified: Worm:Win32/Koobface.gen!F Net-Worm.Win32.Koobface.a, which attacks MySpace Net-Worm.Win32.Koobface.b, which attacks Facebook WORM_KOOBFACE.DC, which attacks Twitter W32/Koobfa-Gen, which attacks Facebook, MySpace, hi5, Bebo, Friendster, myYearbook, Tagged, Netlog, Badoo and fubar W32.Koobface.
https://en.wikipedia.org/wiki/Listwise%20deletion
In statistics, listwise deletion is a method for handling missing data. In this method, an entire record is excluded from analysis if any single value is missing. Example For example, consider the following questionnaire, as answered by 10 subjects: A researcher is hoping to model income (dependent variable) based on age and gender (independent variables). Using listwise deletion, the researcher would remove subjects 3, 4, and 8 from the sample before performing any further analysis. Problems with listwise deletion Listwise deletion affects statistical power of the tests conducted. Statistical power relies in part on high sample size. Because listwise deletion excludes data with missing values, it reduces the sample which is being statistically analysed. Listwise deletion is also problematic when the reason for missing data may not be random (i.e., questions in questionnaires aiming to extract sensitive information. Due to the method, much of the subjects' data will be excluded from analysis, leaving a bias in data findings. For instance, a questionnaire may include questions about respondents drug use history, current earnings, or sexual persuasions. Many of the subjects in the sample may not answer due to the intrusive nature of the questions, but may answer all other items. Listwise deletion will exclude these respondents from analysis. This may create a bias as participants who do divulge this information may have different characteristics than participants who do not. Multiple imputation is an alternate technique for dealing with missing data that attempts to eliminate this bias. Compared to other methods While listwise deletion does have its problems, it is preferable to many other methods for handling missing data. In some cases, it may even be the least problematic method. The following table provides some comparisons of listwise deletions to other methods: References Missing data
https://en.wikipedia.org/wiki/Coalition%20for%20Networked%20Information
The Coalition for Networked Information (CNI) is an organization whose mission is to promote networked information technology as a way to further the advancement of intellectual collaboration and productivity. Overview The Coalition for Networked Information (CNI), a joint initiative of the Association of Research Libraries (ARL) and EDUCAUSE, promotes the use of digital information technology to advance scholarship and education. In establishing the Coalition under the leadership of founding Executive Director Paul Evan Peters, these sponsor organizations sought to broaden the community’s thinking beyond issues of network connectivity and bandwidth to encompass digital content and advanced applications to create, share, disseminate, and analyze such content in the service of research and education. CNI works on a broad array of issues related to the development and use of digital information in the research and education communities. CNI fosters connections and collaboration between library and information technology communities, representing the interests of a wide range of member organizations from higher education, publishing, networking and telecommunications, information technology, government agencies, foundations, museums, libraries, and library organizations. Based in Washington, DC, CNI holds semi-annual membership meetings that serve as a bellwether for digital information issues and projects. CNI also hosts invitational conferences, co-sponsors related meetings and conferences, issues reports, advises government agencies and funders, and supports a variety of networked information initiatives. History In 1990, the Association of Research Libraries (ARL), Educom, and CAUSE joined together to form CNI to create a collaborative project focused on high speed networking that would integrate the interests of academic and research libraries (ARL) and computing in higher education (Educom and CAUSE). Educom and CAUSE consolidated their organizations in 1998 to form EDUCAUSE, which is now one half of the partnership that oversees CNI. Structurally, CNI is a program of its founding associations with administrative oversight provided by ARL; it is not a legally separate entity. CNI’s oversight is provided by the boards and CEOs of the founding organizations, and a steering committee guides its program. Paul Evan Peters was the founding executive director; Joan K. Lippincott also joined CNI as the associate executive director at that time. In 1997, Clifford Lynch assumed the role of executive director, and continues to serve in that capacity as of 2020; Lippincott retired from the organization in December 2019. CNI’s program has included projects in the areas of architectures and standards for networked information, scholarly communication, economics of networked information, Internet technology and infrastructure, teaching and learning, institutional and professional implications of the networked environment, and government information on t
https://en.wikipedia.org/wiki/Tor%20%28network%29
Tor, short for The Onion Router, is free and open-source software for enabling anonymous communication. It directs Internet traffic via a free, worldwide, volunteer overlay network that consists of more than seven thousand relays. Using Tor makes it more difficult to trace a user's Internet activity. Tor protects personal privacy by concealing a user's location and usage from anyone performing network surveillance or traffic analysis. It protects the user's freedom and ability to communicate confidentially through IP address anonymity using Tor exit nodes. History The core principle of Tor, onion routing, was developed in the mid-1990s by United States Naval Research Laboratory employees, mathematician Paul Syverson, and computer scientists Michael G. Reed and David Goldschlag, to protect American intelligence communications online. Onion routing is implemented by means of encryption in the application layer of the communication protocol stack, nested like the layers of an onion. The alpha version of Tor, developed by Syverson and computer scientists Roger Dingledine and Nick Mathewson and then called The Onion Routing project (which was later given the acronym "Tor"), was launched on 20 September 2002. The first public release occurred a year later. In 2004, the Naval Research Laboratory released the code for Tor under a free license, and the Electronic Frontier Foundation (EFF) began funding Dingledine and Mathewson to continue its development. In 2006, Dingledine, Mathewson, and five others founded The Tor Project, a Massachusetts-based 501(c)(3) research-education nonprofit organization responsible for maintaining Tor. The EFF acted as The Tor Project's fiscal sponsor in its early years, and early financial supporters included the U.S. Bureau of Democracy, Human Rights, and Labor and International Broadcasting Bureau, Internews, Human Rights Watch, the University of Cambridge, Google, and Netherlands-based Stichting NLnet. Over the course of its existence, various Tor weaknesses have been discovered and occasionally exploited. Attacks against Tor are an active area of academic research that is welcomed by The Tor Project itself. Usage Tor enables its users to surf the Internet, chat and send instant messages anonymously, and is used by a wide variety of people for both licit and illicit purposes. Tor has, for example, been used by criminal enterprises, hacktivism groups, and law enforcement agencies at cross purposes, sometimes simultaneously; likewise, agencies within the U.S. government variously fund Tor (the U.S. State Department, the National Science Foundation, and – through the Broadcasting Board of Governors, which itself partially funded Tor until October 2012 – Radio Free Asia) and seek to subvert it. Tor is not meant to completely solve the issue of anonymity on the web. Tor is not designed to completely erase tracking but instead to reduce the likelihood for sites to trace actions and data back to the user. Tor is also
https://en.wikipedia.org/wiki/Boxer%20TV
Boxer TV A/S is a company that is broadcasting pay television channels on the digital terrestrial television network in Denmark since February 1, 2009. It is a subsidiary of Boxer TV Access, a Swedish company which is owned by Com Hem. History Boxer won the right to build four multiplex networks to broadcast digital television in 2008. They were competing against Danmarks Digital TV A/S (owned by Telenor) and Danmarks TV A/S (owned by Modern Times Group, MTG). The procurement was organized by the government agency Mediesekretariatet and in March 2008 chose Swedish Boxer as the gatekeeper out of the three applicants. As Telenor and MTG both owned satellite platforms in Denmark, and Boxer did not have any operations in Denmark, Boxer won the contract. Boxer stated in their application that they would use three of the networks to broadcast 29 pay television channels and the fourth network would be used to broadcast mobile television. The initial plan was that Boxer would start broadcasting on November 1, 2009, when the analogue signals were shut down. Boxer were however able to make a soft launch on Jutland and Western Funen on February 1, 2009. The launch package, which is called "Boxer Vest", consists of TV 2 Zulu, TV 2 News, TV 2 Film, TV 2 Charlie, Kanal 4, Kanal 5, 6'eren, Discovery Channel and Animal Planet. Starting on May 1, 2009, Boxer made a soft launch in Copenhagen. This was made possible by using the Copenhagen transmitter on UHF channel 35 which was used to broadcast local channels such as Kanal København. Boxer broadcasts the same channels as in Jutland, but shares the frequency with Kanal København and the gaming channel G-TV. In months leading up to the full launch, Boxer announced agreement with the channels that were added in November 2009, including Discovery Travel & Living, CNN and Cartoon Network in February, Disney Channel in April, Travel Channel in May, Disney XD, Discovery Science, MTV, VH1 and Nickelodeon in June, Canal 9 and Canal+ channels in July and TV 2 Sport in August. On August 17, Boxer revealed the full lineup. Other than the previously announced channels, it would include The Voice, History, Star!, Body In Balance, TV4 Sweden, TV2 Norway and Das Erste. Notably absent from the lineup were the Viasat channels (including TV3, TV3+ and TV3 Puls), Eurosport, dk4, National Geographic Channel and SVT's channels. On March 15, 2011 there was a channel change, and Body In Balance and Canal+ Sport 1 was cut from the package and replaced by DK4 which had been in great demand. Also Canal+ Hits Sport Weekend was replaced by just Canal+ Hits. 11 January 2012 there an additional another channel change took place, since the Danish TV 2 became a pay channel. today the channel is offered in all Boxer channel packets such as Boxer Mini, Boxer Mix, Boxer Max, Boxer Flex8 and the Boxer TV 2 package. from April 2012, Boxer has offered HD channels. As of today Boxer offers seven HD channels such as TV2 HD, TV2 Film HD, TV2