source stringlengths 32 199 | text stringlengths 26 3k |
|---|---|
https://en.wikipedia.org/wiki/Television%20Niigata%20Network | is a TV station affiliated with Nippon News Network (NNN) and Nippon Television Network System (NNS) in Niigata, Niigata. It is broadcast in Niigata Prefecture. It was established on October 23, 1980 and began broadcasting from April 1, 1981. The station had been used the abbreviation TNN until 1998.
TV channel
Digital television
Yahiko 26ch JOPI-DTV 3 kW
Tandem office
Takada 31ch
Mikawa 45ch
Tsunan-Kamigō 25ch
Koide 30ch
Kanose 26ch
Itoigawa-Ōno 25ch
Tsunan 25ch
Tsugawa 45ch
Ryōtsu 37ch
Aikawa 32ch
Yamato 36ch
Takachi 26ch
Arai 47ch
Murakami 31ch
Sotokaifu 32ch
Yuzawa 26ch
Tsunan-Tanaka 26ch
Itoigawa-Hayakawa 36ch
Sumon 36ch
Muramatsu 45ch
Sekikawa 47ch
Tochio 47ch
Muikamachi 36ch
Myōkōkōgen 47ch
Ōmi 32ch
Takayanagi 39ch
Kawaguchi 26ch
Program
Syndicated shows from the TX Network:
Pokémon
Naruto
Dawn of Nikkei Gaia Special
Hayate no Gotoku
D.Gray-man (season 1)
the Drama 24 anthology
KIRA KIRA AFRO (only season 1 was transmitted, produced by TV Osaka)
External links
The official website of Television Niigata Network
Company Profile
Nippon News Network
Television stations in Japan
Television channels and stations established in 1981
Mass media in Niigata (city)
Companies based in Niigata Prefecture |
https://en.wikipedia.org/wiki/Samsung%20NC20 | The Samsung NC20 is a subnotebook / Netbook computer designed by Samsung. At the time of its introduction, (February 2009, while in the U.S.A. was on March 2009), it was the first mainstream netbook to use the VIA Nano processor and the first to support the x86-64 instruction set. The 12.1" screen size is larger than typical for this class of ultra portable PC. Its most direct competitors are the Lenovo IdeaPad S12 and the MSI Wind U210.
Technical overview
Processor and memory
The Samsung NC20 uses a VIA Nano ULV Processor U2250 (running from 800 MHz - 1,6 GHz) and comes with 1 GB RAM. Internally, the NC20 has one slot for RAM accepting memory modules up to 2 GB.
The hardware is powerful enough to run Windows 7 in everyday situations (web-browsing, email, office applications). However, CPU-demanding tasks (e.g. Flash videos) tend to put the system at its limit.
Display
The screen is a glossy display and measures 12.1 inches (307 mm) diagonally. It has a native resolution of 1280 × 800 pixels. The screen is LED-backlit. An external display can be used through the standard VGA connector.
Keyboard and touchpad
The 84-key keyboard is a full-size keyboard, with standard 18.5mm key pitch between keys. The keyboard has also been coated with anti-bacterial Silver Nano ions. The touchpad supports multi-touch gestures.
Storage
The standard internal hard drive is a SATA 160 GB. It also includes a SD card slot, supporting MMC, SD and SDHC cards for additional storage.
Connectivity
The NC20 has built-in LAN (10/100 MBit) via a standard-sized RJ45-jack, 802.11b/g Wifi as well as Bluetooth. It also comes with 3 USB 2.0 ports.
Audio and video
A webcam (Namuga 1.3 megapixel) is built into the display frame, as well as a microphone. Together with the built-in stereo speakers, the NC20 can be used for audio/video conferences (e.g. using Skype), albeit only with moderate call-quality. The webcam picture becomes relatively noisy under low-light conditions and the microphone produces audible noise and picks up vibrations from the harddisk or when typing.
The NC20 also has standard 3,5mm jacks for audio output (headphones / line-out) and input (external microphone / line-in), allowing for far better audio quality than the built-in speakers and microphone.
Criticism
Not all of the features of this notebook are supported under Linux. Playing video and microphone are partially supported. External monitor support under Linux is not possible. WLAN under Ubuntu is reported to have frequent freezeups.
See also
Samsung NC10
Comparison of netbooks
References
External links
Samsung Specifications
Samsung NC20 Community Site
Samsung NC20 Blog
Samsung Netbook Tips (applies to NC10)
Netbooks
NC20 |
https://en.wikipedia.org/wiki/Gary%20T.%20Leavens | Gary T. Leavens is an American academic working as a professor of computer science at the University of Central Florida.
Education
Leavens earned a Bachelor of Science in computer and communication science from the University of Michigan, a Master of Science in computer science from the University of Southern California, and a PhD in philosophy from the Massachusetts Institute of Technology.
Career
From 1977 to 1984, Leavens worked on the technical staff at Bell Labs. From 1989 until 2007, he was a professor of computer science at Iowa State University. His scholarship focuses on behavioral interface specification languages (BISLs) such as Larch/Smalltalk, Larch/C++, and JML. Leavens was the program chair for 2009 OOPSLA.
References
American computer scientists
University of Central Florida faculty
Living people
Year of birth missing (living people)
University of Michigan alumni
University of Southern California alumni
Massachusetts Institute of Technology alumni
Iowa State University faculty |
https://en.wikipedia.org/wiki/PDB%20%28Palm%20OS%29 | PDB is a container format for record databases in Palm OS, Garnet OS and Access Linux Platform. Its structure is similar to PRC resource databases. The PalmDOC eBook format is a special version of the PDB format.
Structure of PDB file
A PDB file contains a PDB header, PDB record headers and records.
PDB Header
The PDB header is located at the beginning of the file and contains meta-information on the file:
PDB Record Header
For every record, there is an eight byte record header, containing:
PDB Records
Now the records themselves follow. The usual order is AppInfoArea, SortInfoArea and records, sequentially.
PDB Datetimes
Many PDB format files used times counting in seconds from 1904-01-01T00:00:00. This is the base time used by the original Macintosh (up to Mac OS 9). It may be noted that there were close links between Palm OS and Mac OS during early development. Using an unsigned 32-bit integer and the 1904 epoch, integer overflow will overflow will occur sometime in 2040.
Others may be observed to be counting from 1970-01-01T00:00:00 (the Unix epoch base time), and uses a signed 32-bit integer which will overflow sometime in 2038.
Palm OS Protein C/C++ Compiler Language & Library Reference, Copyright 2004 Palm Source calls the dates calculated from 1904 "old Palm epoch", and the dates calculated from 1970 "UNIX epoch". Protein C also provides functions (palm_seconds_to_time_t(), and time_t_to_palm_seconds() ) for converting between the two.
Some sources even suggest some very old files may use times counting from 1900 (which would be consistent with the Excel epoch).
This conflict between old Palm (Mac OS 9) epoch and UNIX epoch is unfortunate, the following heuristic may be useful when examining a file copied from a Palm OS device:
If the time has the top bit set, it's an unsigned 32-bit number counting from 1st Jan 1904
If the time has the top bit clear, it's a signed 32-bit number counting from 1st Jan 1970.
This is based on the idea that, otherwise the time would be before 1972 or before 1970 (depending on the interpretation) and the PDB format wasn't around then.
The palmdump utility and other software uses this rule-of-thumb when reading files.
See also
PRC format
References
Computer file formats
Palm OS |
https://en.wikipedia.org/wiki/Tachymetric%20anti-aircraft%20fire%20control%20system | A tachymetric anti-aircraft fire control system generates target position, speed, direction, and rate of target range change, by computing these parameters directly from measured data.
The target's range, height and observed bearing data are fed into a computer which uses the measured change in range, height and bearing from successive observations of the target to compute the true range, direction, speed and rate of climb or descent of the target. The computer then calculates the required elevation and bearing of the AA guns to hit the target based upon its predicted movement.
The computers were at first entirely mechanical analog computers utilizing gears and levers to physically perform the calculations of protractors and slide rules, using moving graph charts and markers to provide an estimate of speed and position. Variation of target position over time was accomplished with constant-drive motors to run the mechanical simulation.
The term tachymetric should more properly be spelled as "tachometric" which comes from the Greek "takhos" = speed, and "metric" = measure, hence tachometric, to measure speed.
An alternative, non-tachometric, gonometric method of AA prediction is for specially trained observers to estimate the course and speed of the target manually and feed these estimates, along with the measured bearing and range data, into the AA fire control computer which then generates change of bearing rate and change of range data, and passes them back to the observer, typically by a "follow the pointer", indicator of predicted target elevation and bearing or by remote power control of the observer's optical instruments. The observer then corrects the estimate, creating a feed back loop, by comparing the observed target motion against the computer generated motion of his optical sights. When the sights stay on the target, the estimated speed, range, and change of rate data can be considered correct.
An example of tachometric AA fire control would be the USN Mk 37 system. The early RN High Angle Control System (HACS) I through IV and the early Fuze Keeping Clock (FKC) were examples of non-tachometric systems.
By 1940 the RN was adding a Gyro Rate Unit (GRU) which fed bearing and elevation data to a Gyro Rate Unit Box computer (GRUB), which also received ranging data to calculate target speed and direction directly, and this tachometric data was then fed directly to the HACS fire control computer, converting the HACS into a tachometric system.
Notes
External links
The RN Pocket Gunnery Book
BRITISH MECHANICAL GUNNERY COMPUTERS OF WORLD WAR II
Naval anti-aircraft weapons
Military computers |
https://en.wikipedia.org/wiki/Alan%20Davis%20%28disambiguation%29 | Alan Davis (born 1956) is a British writer and artist of comic books.
Alan Davis may also refer to:
Alan L. Davis, American computer scientist (PhD 1972, Utah)
Alan M. Davis (born 1949), American computer scientist (PhD 1975, Illinois)
Allan Davis (footballer) (born 1948), Australian rules footballer
Alan Davis (priest) (1938–2021), Archdeacon of West Cumberland
Alan G. Davis, American jurist in Delaware
See also
Al Davis (disambiguation)
Alan Davies (disambiguation)
Alun Davies (disambiguation)
Allen Davis (disambiguation) |
https://en.wikipedia.org/wiki/Night%20buses%20in%20London | The London Night Bus network is a series of night bus routes that serve Greater London. Services broadly operate between the hours of 23:00 and 06:00.
Many services commence from or operate via Trafalgar Square and are extensions or variations of daytime routes and hence derive their number from these; for example, route N73 from Oxford Circus to Walthamstow Central follows that of route 73 as far as Stoke Newington, before continuing further north.
History
The first night bus was introduced in 1913. By 1920 there were two 'All Night Bus Services' in operation named the 94 and 94a running from 23:30 to 05:30. A few more services were introduced over the following decades, but all ceased during World War II. Services resumed after the war, increasing as trams and trolleybuses were replaced in the late 1950s and 1960s. In 1978 London Transport listed 21 all-night bus routes. On many of these routes, "all-night" service meant a departure frequency of no more than one bus an hour. In April 1984, the number of routes was increased from 21 to 32. At this point the peak service required 80 buses; by August 2013 this had grown to 890.
Originally the night bus network had its own fare structure, but with the introduction of the Oyster card in 2003, it was incorporated into the Transport for London fare structure. Until the mid-2000s, all routes had N prefixes. However, as some routes merely mirrored their day time equivalents, the N prefixes were dropped and these routes became 24-hour services; for example, route N14 was no longer differentiated from route 14.
Services are operated by private operators under contract to London Buses. The Night Bus contracts are often bundled with those of the equivalent daytime routes and awarded for a five-year period, with an optional two-year extension based on performance standards being met. Some however are tendered individually.
With some London Underground lines operating a 24-hour service at weekends from August 2016, a further eight routes commenced 24-hour operation on Friday and Saturday nights. Further changes were made as the Night Tube network expanded.
In May 2015, the Night Bus network was the subject of The Night Bus, a Channel 4 documentary.
Operation
Night Bus routes are often related to the daytime route with the same number, often running the same route but with an extension at one or both ends. The usual purpose of the extension is to provide a night service to destinations served by tube or train during the day.
However, there are a few N-prefixed route numbers that have no relation to the daytime route with the same number: the N5, N20 and N97 all operate in a different part of London from the respective day routes, and the N550 and N551 (which provide night service on parts of the Docklands Light Railway network) have no corresponding daytime routes.
N1
Route N1 commenced operating on 28 June 1995 between Plumstead garage and Trafalgar Square. It was originally operated by London Centra |
https://en.wikipedia.org/wiki/Semantic%20Sensor%20Web | The Semantic Sensor Web (SSW) is a marriage of sensor web and semantic Web technologies. The encoding of sensor descriptions and sensor observation data with Semantic Web languages enables more expressive representation, advanced access, and formal analysis of sensor resources. The SSW annotates sensor data with spatial, temporal, and thematic semantic metadata. This technique builds on current standardization efforts within the Open Geospatial Consortium's Sensor Web Enablement (SWE) and extends them with Semantic Web technologies to provide enhanced descriptions and access to sensor data.
Semantic modeling and annotation of sensor data
Ontologies and other semantic technologies can be key enabling technologies for sensor networks because they will improve semantic interoperability and integration, as well as facilitate reasoning, classification and other types of assurance and automation not included in the Open Geospatial Consortium (OGC) standards. A semantic sensor network will allow the network, its sensors and the resulting data to be organised, installed and managed, queried, understood and controlled through high-level specifications. Ontologies for sensors provide a framework for describing sensors. These ontologies allow classification and reasoning on the capabilities and measurements of sensors, provenance of measurements and may allow reasoning about individual sensors as well as reasoning about the connection of a number of sensors as a macroinstrument. The sensor ontologies, to some degree, reflect the OGC standards and, given ontologies that can encode sensor descriptions, understanding how to map between the ontologies and OGC models is an important consideration. Semantic annotation of sensor descriptions and services that support sensor data exchange and sensor network management will serve a similar purpose as that espoused by semantic annotation of Web services. This research is conducted through the W3C Semantic Sensor Network Incubator Group (SSN-XG) activity.
W3C Semantic Sensor Networks
The World Wide Web Consortium (W3C) initiated the Semantic Sensor Networks Incubator Group (SSN-XG) to develop the Semantic Sensor Network (SSN) ontology, intended to model sensor devices, systems, processes, and observations. The Incubator Group later transitioned into the Semantic Sensor Networks Community Group. It was then picked up in the joint OGC and W3C Spatial Data on the Web Working Group and published as a W3C Recommendation.
The Semantic Sensor Network (SSN) ontology enables expressive representation of sensor observations, sampling, and actuation. The SSN ontology is encoded in the Web Ontology Language (OWL2). A number of projects have used it for improved management of sensor data on the Web, involving annotation, integration, publishing, and search.
Context
Sensors around the globe currently collect avalanches of data about the world. The rapid development and deployment of sensor technology is intensifying the exi |
https://en.wikipedia.org/wiki/Anti-collision%20device | The anti-collision device (ACD) is a form of automatic train protection used on Indian Railways.
Overview
The ACD Network is a train-collision prevention system invented by Rajaram Bojji and patented by Konkan Railway Corporation, a public-sector undertaking of the Ministry of Railways, government of India.
Anti-collision devices were found to be effective in the Southern Railway zone after a brief trial.
Level crossings
When Loco ACDs receive 'Gate Open' transmissions from Gate ACDs provided at non-interlocked level crossings, they brake to decelerate to 30 km/h or an alternative predetermined speed. Gate ACDs at manned and unmanned level crossings also warn passengers with the message 'Train Approach'.
If a Loco ACD receives a manual 'SOS' message from other train bound ACDs or a station ACD that is within three kilometres of its radial range, it applies brakes automatically to bring the train to a stop.
The application of this anti-collision device has been refined to not only prevent midsection collisions but also to prevent their occurrences in station yards. The newly engineered solution is integrated with the signalling systems, interlocking to react appropriately in case collision-like conditions are perceived at the time of reception and dispatch of trains from a station (e.g. while approaching a station). Loco ACDs also give 'Station Approach' alerts to train operators and regulate train speed when they receives information from Station ACDs.
Loco shed ACDs, Track-ID Assigning ACDs and Repeater ACDs strengthen the ACD network.
Future
Indian Railways have successfully piloted ACDs in the northeast frontier railway, covering of its broad gauge route. They are now installing the ACDs on of the Konkan Railway.
The on-board train protection device, the first device designed by Konkan Railway with their technical partner Kernex Microsystems (I) Ltd, was installed throughout the Indian Railway network.
A new ACD Version-II, now called the Train Collision Avoidance System (TCAS), is under development by The Research Designs and Standards Organisation (RDSO). Unlike ACD, which is more of a distributed system which acts independently, the TCAS will be more of a centralized system where TCAS controls communication between trains and with trains with the TDMA protocol. The TCAS under development is meant to be a vital safety system. TCAS has a deep coupling with the railway signalling system so ACD systems do not depend on the railway signalling system.
ACD deficiencies
The ACD system is based on GPS based positioning and track detection. This has inherent problems as with GPS service and course acquisition, the best possible horizontal accuracy is 10 m. This is inadequate for detection of rail tracks separated by a distance of . ACD does not even have DGPS, differential GPS that gives an accuracy close to 2.5 m, and hence had errors in track detection using their patented Deviation Count Theory that worked in block sections but fai |
https://en.wikipedia.org/wiki/The%20Chopping%20Block%20%28American%20TV%20series%29 | The Chopping Block is an American reality television series, based on the Australian reality television series of the same name. The series aired on the NBC network and followed participants in an attempt to open a restaurant. It is hosted by British celebrity chef Marco Pierre White.
The first episode premiered on March 11, 2009 to low ratings. Two more episodes aired, each with worse ratings than the last. On March 26, 2009, NBC canceled the series, choosing to run repeats of Law & Order: Criminal Intent in the timeslot. The series completed "airing" on NBC.com and Hulu, releasing one a week.
On April 24, 2009, NBC announced the series would return to television in Friday, June 19, despite airing on the internet already. After the fourth episode aired on the 19th, it was pre-empted on June 26 by television coverage surrounding the deaths of Farrah Fawcett and Michael Jackson the day before. The show returned Friday, July 3. It then proceeded to air until Friday, July 24, the day the final episode aired on NBC.
On April 27, 2009, British TV began showing the series on ITV2, immediately following the finale of Hell's Kitchen, also hosted by Marco Pierre White, on ITV1 of which 6 of the episodes being aired, although episode 7 was not shown on Monday at 8 o clock as would be expected, and there has been no explanation as to what has happened to the series in the UK or why the episode was not shown.
Format
Eight contestant pairs, each consisting of a chef and a front-of-house member with an existing relationship, are divided into two teams of four pairs each. The teams are each assigned an empty restaurant space, across the street from each other in downtown Manhattan. Each week, the teams are given a task, and open their restaurants for a service. The team judged to have lost that service has its weakest pair eliminated from the show by chef White. Each week, the teams also have a challenge to compete in (sometimes relating to the kitchen, and sometimes relating to front-of-house), the winner of which gains an advantage during the subsequent service.
The format of the American version differs markedly to that of the original Australian version.
Contestants
The first season consisted of 8 teams of 2 participants each:
Angela Brown-Johnson & Samantha Johnson from Philadelphia, Pennsylvania
Alex (Zan) McCoy & Nate (Than) McCoy from Cabin John, Maryland
Panya Rice & Michael Holmes from Atlanta, Georgia
Mikey Torres & Chad Phillips from Washington, D.C.
Lisa Stalvey & Michael Anapol from Los Angeles, California
Denise Nguyen & Khoa Nguyen from Washington, D.C.
Kelsey Henderson & Vanessa Henderson from Los Angeles, California
Dean Della Ventura & Shari Della Ventura from Millbury, Massachusetts
Episode results
: The show was cancelled after three episodes.
: The remaining shows are broadcast each Wednesday night on NBC.com. These episodes then air on NBC with Episode 4 having started off the airing of the episodes on June 19, and a bre |
https://en.wikipedia.org/wiki/System%20G%20%28supercomputer%29 | System G is a cluster supercomputer at Virginia Tech consisting of 324 Apple Mac Pro computers with a total of 2592 processing cores. It was finished in November 2008 and ranked 279 in that month's edition of TOP500, running at 16.78 teraflops and peaking at 22.94 teraflops. It now runs at a "sustained (Linpack) performance of 22.8 TFlops". It transmits data between nodes over Gigabit Ethernet and 40Gbit/s Infiniband.
Mac Pro Nodes
Each of the 324 Mac Pro machines contains two quad-core 2.8 GHz Xeon processors and 8 gigabytes of RAM.
Namesake
System G's name stems from its homage to System X and to its focus on green computing—the cluster has thousands of power and thermal sensors to test high performance computing at low power requirements and is the largest power-aware research system in the world.
References
External links
Computer Science at Virginia Tech: System G
Virginia Tech: Center for High-End Computing Systems (‘CHECS’)
Ars Technica: Virginia Tech building super computer out of 324 Mac Pros
TOP500 website
X86 supercomputers
Virginia Tech |
https://en.wikipedia.org/wiki/David%20Nelson%20%28software%20developer%29 | David Nelson (born May 25, 1993) is an American software developer and CEO of Motion AI, an Artificial Intelligence software company.
Muziic
In 2009, at age 15, following a report by CNN Nelson gained attention in the media for developing the Muziic streaming music application. The service garnered over 250 million listens worldwide. Muziic was controversial to some in the music industry because it allowed access to stream music videos, through YouTube, but aggregated and displayed the songs in a way geared toward listening and building playlists. Because this occurred prior to services like Spotify coming to the United States, free applications like this were rare and often illegal.
FanRx
David later went on to found FanRx (formerly BandRx) in 2012, a social media software company for musicians and brands. The service gained over 225,000 subscribers and entered the Top 5 most popular music applications on Facebook.
In 2013, Nelson launched Mass Threat, a game development subsidiary of FanRx, catering to the music industry. Mass Threat has worked with Train, Fall Out Boy, Panic! at the Disco and Sia, among others, to develop and launch games geared toward their fans. Mass Threat games collectively have been downloaded over 5 million times, according to the company's website.
Motion AI
In November 2015, Nelson unveiled Motion AI on Product Hunt, where it was number one for the day and earned a top spot in the all-time rankings. The company aims to bring Artificial Intelligence technologies to the masses by building a "UI for AI". In one of the fastest funding rounds in Chicago area history, Motion AI subsequently raised $700,000 in seed funding to expand the team and build out the product, as reported in the Chicago Tribune.
Motion AI was named one of Chicago's "50 Startups to Watch" in 2016.
Personal life
In 2015, Nelson proposed to his girlfriend Chelsea on stage at a Train show in the Bahamas, following an introduction from Pat Monahan.
References
External links
Motion AI
Muziic
FanRx
Mass Threat
Twitter Page
Website
1993 births
Living people
Computer programmers
People from Bettendorf, Iowa |
https://en.wikipedia.org/wiki/Thermal%20simulations%20for%20integrated%20circuits | Miniaturizing components has always been a primary goal in the semiconductor industry because it cuts production cost and lets companies build smaller computers and other devices. Miniaturization, however, has increased dissipated power per unit area and made it a key limiting factor in integrated circuit performance. Temperature increase becomes relevant for relatively small-cross-sections wires, where it may affect normal semiconductor behavior. Besides, since the generation of heat is proportional to the frequency of operation for switching circuits, fast computers have larger heat generation than slow ones, an undesired effect for chips manufacturers. This article summaries physical concepts that describe the generation and conduction of heat in an integrated circuit, and presents numerical methods that model heat transfer from a macroscopic point of view.
Generation and transfer of heat
Fourier's law
At macroscopic level, Fourier's law states a relation between the transmitted heat per unit time per unit area and the gradient of temperature:
Where is the thermal conductivity, [W·m−1 K−1].
Joule heating
Electronic systems work based on current and voltage signals. Current is the flow of charged particles through the material and these particles (electrons or holes), interact with the lattice of the crystal losing its energy which is released in form of heat. Joule Heating is a predominant mechanism for heat generation in integrated circuits and is an undesired effect in most of the cases. For an ohmic material, it has the form:
Where is the current density in [A·m−2], is the specific electric resistivity in [·m] and is the generated heat per unit volume in [W·m−3].
Heat-transfer equation
The governing equation of the physics of the heat transfer problem relates the flux of heat in space, its variation in time and the generation of power by the following expression:
Where is the thermal conductivity, is the density of the medium, is the specific heat, , the thermal diffusivity and is the rate of heat generation per unit volume. Heat diffuses from the source following the above equation and solution in an homogeneous medium follows a Gaussian distribution.
Techniques to solve heat equation
Kirchhoff transformation
To get rid of the temperature dependence of , Kirchhoff transformation can be performed
where and is the heat sink temperature. When applying this transformation, the heat equation becomes:
where is called the diffusivity, which also depends on the temperature. To completely linearize the equation, a second transformation is employed:
yielding the expression:
Simple, direct application of this equation requires approximation. Additional terms arising in the transformed Laplacian are dropped, leaving the Laplacian in its conventional form.
Analytical solutions
Although analytical solutions can only be found for specific and simple cases, they give a good insight to deal with more complex situ |
https://en.wikipedia.org/wiki/SRO%20Cinemaserye | SRO Cinemaserye () is a Philippine television drama anthology broadcast by GMA Network. It premiered on March 26, 2009. The show concluded on April 8, 2010 with a total of 35 episodes.
Premise
SRO Cinemaserye is a refreshing venture on drama anthologies in late-night primetime. Every story, which will run for eight weeks, boasts of a presentation with the cinematic quality of a motion picture. GMA Network artists will be put on spotlight on SRO Cinemaserye's finest episodes with heart-rending storyline and absorbing characterization.
Chapters
Ganti
Suspetsa
The Eva Castillo Story
Rowena Joy
Reunion
Moshi-Moshi, I Love You
Carenderia Queen
Exchange Gift
Meet the Fathers
Hot Mama
Ratings
According to AGB Nielsen Philippines' Mega Manila household television ratings, the pilot episode of SRO Cinemaserye earned an 18.3% rating. While the final episode scored a 15.7% rating.
Accolades
References
External links
2009 Philippine television series debuts
2010 Philippine television series endings
Filipino-language television shows
GMA Network original programming
Philippine anthology television series |
https://en.wikipedia.org/wiki/NetScreen%20Technologies | NetScreen Technologies was an American technology company that was acquired by Juniper Networks for US$4 billion stock for stock in 2004.
NetScreen Technologies developed ASIC-based Internet security systems and appliances that delivered high performance firewall, VPN and traffic shaping functionality to Internet data centers, e-business sites, broadband service providers and application service providers. NetScreen was the first firewall manufacturer to develop a gigabit-speed firewall, the NetScreen-1000.
History
NetScreen Technologies was founded by Yan Ke, Ken Xie, and Feng Deng. Ken Xie, Chief Technology Officer and co-founder was also the CEO until Robert Thomas joined in 1998.
Robert Thomas, NetScreen's president and chief executive officer, came to NetScreen in 1998 from Sun Microsystems, where he was General Manager of Intercontinental Operations for Sun's software business, which includes security, networking, and Internet tools.
Ken Xie left NetScreen in 2000 to found Fortinet, a competing ASIC-based firewall company.
NetScreen acquired its core IPS technology through the purchase of OneSecure, Inc. for US$45 million in stock in 2002. OneSecure was created by Rakesh Loonkar (subsequently the co-founder of Trusteer), and Israeli engineer Nir Zuk, who had been one of Check Point Software’s first employees.
In 2003, NetScreen hired Anson Chen as its vice president of research and development. Anson Chen, a 12-year veteran of Cisco Systems, Inc. and former vice president and general manager of the Network Management and Services Technology Group, led engineering, research and development efforts for NetScreen's entire product line, including its firewall, IPSec virtual private network (VPN) and intrusion detection and prevention technologies. Chen also had functional management responsibility for NetScreen's secure access products.
2015 "unauthorized code" incident
Analysis of the firmware code in 2015 showed that a backdoor key could exist using Dual_EC_DRBG. This would enable whoever held that key to passively decrypt traffic encrypted by ScreenOS.
In December 2015, Juniper Systems announced that they had discovered "unauthorized code" in the ScreenOS software that underlies their NetScreen devices, present from 2012 onwards. There were two vulnerabilities: One was a simple root password backdoor, and the other one was changing a point in Dual_EC_DRBG so that the attackers presumably had the key to use the pre-existing (intentional or unintentional) kleptographic backdoor in ScreenOS to passively decrypt traffic.
References
Juniper Networks
Defunct companies based in California
Computer companies established in 1997
Computer companies disestablished in 2004
Networking hardware companies
Server appliance
Computer security companies
2004 mergers and acquisitions
2001 initial public offerings
Defunct computer companies of the United States
Defunct computer hardware companies |
https://en.wikipedia.org/wiki/LG%20CNS | LG CNS Co., Ltd. (Korean: 주식회사 엘지씨엔에스) is a subsidiary of LG Corporation founded in 1987 that provides information technology services including consulting, System Integration, Network Integration, Business Process Outsourcing, and Information Technology Outsourcing. Originally, LG CNS only focused on computer engineering such as designing, developing and operating computer network systems for LG Group. Then, the firm expanded its target customers from LG Group to other private organizations and governments. LG CNS also focuses on global markets running worldwide development centers and has overseas subsidiaries. Currently, LG CNS “is Korea’s largest IT service provider and has implemented a number of large-scale public IT infrastructure projects and played a major role in the Korean government's e-Korea initiative.”
Globalization
The former CEO of LG CNS, Shin Chae-chol, said "The Korean market constitutes a small percentage of the total global market. I think that unfettered expansion and cutthroat competition in the domestic medical market is meaningless. We plan to expand the scope of overseas projects centering on seven overseas branches in China, Southeast Asia, and the United States." According to the CEO’s expectation, LG CNS has expanded to 7 overseas subsidiary companies and development centers in China, India, U.S.A., the Netherlands, Indonesia, Brazil, Singapore and Japan. Overseas sales from LG CNS subsidiaries exceeded more than “200 billion won in 2007, focusing to realize its 2008 sales goal of 230 billion won in overseas markets.”
CSR (Corporate Social Responsibility)
LG CNS has also been doing CSR since its establishment. LG CNS IT Dream Project is the annual event which is designed for students in welfare institutions to cheer them up by inspiring them in for IT. Also, the company regularly holds an in-house bazaar to help handicapped children and women. Furthermore, “from 1995 to 2008, LG CNS has helped 628 sight-impaired people to have eyesight recovery operations. Not only these three events, but also many other CRS related event have done by LG CNS.”.
See also
Electronic Data Systems (EDS) - the company that participated joint venture of STM, root company of LG CNS
List of Korean companies
Notes and references
External links
Official website
LG Corporation
Information technology companies of South Korea
Technology companies established in 1987
South Korean brands
South Korean companies established in 1987
Companies based in Seoul |
https://en.wikipedia.org/wiki/O3b%20%28disambiguation%29 | O3b is a telecommunications satellite
O3b may also refer to:
O3b mPOWER, a planned second generation satellite
O3b Networks (2007–2017) a defunct satellite operator
Satellites |
https://en.wikipedia.org/wiki/Funk%20Software | Funk Software was an American software company based in Cambridge, Massachusetts, and active from 1982 to 2005. The company was founded in 1982 by Paul Funk. Funk was later acquired by Juniper Networks in 2005 for US$122 million.
The company first became well known in the late 80's for its product Sideways, which allowed users to print wide spreadsheets on dot matrix printers. Dot matrix printing was the primary printing technology at that time.
Funk Software later became a provider of network access security solutions for networks of any size, from enterprise to operator, wired or wireless. The company's products were security related and they were grouped as a family of RADIUS/AAA and WLAN security products. These types of network security products allow an organization to enforce a uniform security policy across all network access methods, including WLAN, remote/VPN, dial, and identity-based (wired 802.1X - also referred to as a supplicant based authentication system) - with the performance and reliability to handle any traffic load, and with full support for any network infrastructure. Funk Software's customers included many of the world's largest corporations, institutions, telecommunications carriers, and internet service providers (ISPs); its products are licensed or resold by numerous leading manufacturers of Internet hardware and software. One of the leading products was OAC - Odyssey Access Client, which is still used today, branded as a Juniper Networks Product UAC - User Access Client.
In 2014, Juniper Networks sold off the business unit that was responsible for the legacy Funk Software enterprise products to New York-based Siris Capital. Siris Capital created a new company and named it Pulse Secure, LLC with its headquarters in San Jose, CA. Steel-Belted Radius (SBR) Enterprise and Global Enterprise are still being sold under the new company's brand. It was announced that Pulse Secure will EOL SBR Enterprise and Global Enterprise as of December 31, 2020. Steel-Belted Radius Carrier Edition is still being sold by Juniper Networks.
The Odyssey Access Client (OAC) has been EOL'd (End of Life) as of December 31, 2017.
Several Funk Software employees remain with Pulse Secure and Juniper Networks as of 2020.
End of 2020 Pulse Secure was acquired by Ivanti.
See also
List of acquisitions by Juniper Networks
References
Juniper Networks
Defunct companies based in Massachusetts
Software companies established in 1982
Companies disestablished in 2005
1982 establishments in Massachusetts
Defunct software companies of the United States |
https://en.wikipedia.org/wiki/History%20%28Southeast%20Asian%20TV%20channel%29 | History (formerly known as The History Channel) is a Southeast Asian pay television channel broadcasting programming related to historical events and people. The channel is owned by A+E Networks Asia. In India History TV18 owned by a joint-venture between A+E Networks and under permission registered Discovery Communications, owner of the American History and Network 18, Indian media group & available in eight languages (Bengali, English, Gujarati, Hindi, Marathi, Tamil, Telugu & Urdu) in India.
Company
A+E Networks Asia was formed on 15 June 2007 through a joint venture between A+E Networks and Malaysia's pay TV provider Astro. Headquartered in Singapore, A+E Networks Asia also have operations in Kuala Lumpur, Malaysia.
In 2009, A+E Networks Asia struck a US$800,000 co-production deal with the National Film Development Corporation of Malaysia to co-produce programmes to be featured across its channels. It has recently hired SPE Networks as a regional ad sales representative across the South East Asian region.
High-definition feed
On September 1, 2008, History Channel Asia officially launched their own History HD Asia channel in Singapore and Hong Kong, followed by Japan, South Korea (Localized Version Launched), India, Philippines and Malaysia.
Programming
New
Alone
Big Easy Motors
Counting Cars
Doomsday: 10 Ways The World Will End
Forged in Fire
Gangland Undercover
Pawn Stars
Storage Wars
Six
Vikings
Reruns
Duck Dynasty
Photo Face-Off
The Pickers
Top Shot
Swamp People
Kings of Restoration
Cajun Pawn Stars
Axe Men
The Innovators: The Men Who Built America
Ancient Aliens
America's Book Of Secrets
Modern Marvels
Serial Killer Earth
Stan Lee's Superhumans
Top Guns
IRT Deadliest Roads Mankind The Story of All of UsStorage Wars: Texas''
See also
A+E Networks
Bio Asia
Crime & Investigation Network Asia
History (U.S. TV channel)
References
External links
A&E Networks
Television channels and stations established in 2007
2007 establishments in Malaysia
English-language television stations
Mass media in Southeast Asia |
https://en.wikipedia.org/wiki/Malwarebytes | Malwarebytes Inc. is an American Internet security company that specializes in protecting home computers, smartphones, and companies from malware and other threats. It has offices in Santa Clara, California; Clearwater, Florida; Tallinn, Estonia; Bastia Umbra, Italy; and Cork, Ireland.
Marcin Kleczynski has been the CEO of Malwarebytes since 2008.
History
Early history and background
Malwarebytes Inc. was informally established in 2004. CEO and founder Marcin Kleczynski, originally from Poland, was still a teenager attending high school in Bensenville, Illinois, and was working as a technician in a computer repair shop in Chicago. He noticed that whenever infected computers arrived, the shop would typically reformat the computer entirely, rather than combat the virus, even if the infection was only minor. Kleczynski later discovered that, when his mother's computer became infected, neither McAfee nor Symantec would remove the malware from his system. He later recalled "I've never been as angry as when I got my computer infected", and professed that his mother told him to fix it "under penalty of death".
It was only after Kleczynski posted on the forum SpywareInfo that he was able to learn how to remove the virus, which took three days. The company was unofficially founded after this, when Kleczynski conversed and became friends with several of the editors of the forum, who tempted him to buy an unused domain from them.
With one of the site's regulars, Bruce Harrison, Kleczynski wrote the inaugural version of the company's software. In 2006, Kleczynski worked with a college roommate to produce a freely available program called "RogueRemover", a utility which specialized in fighting against a type of infection known as "rogues", which scam computer users into giving away their credit card information through fake anti-virus software. RogueRemover proved instrumental in developing Malwarebytes Anti-Malware, and Kleczynski was able to set up a forum which enabled him to improve the software through feedback.
Kleczynski and Harrison formally launched Malwarebytes on January 21, 2008 while Kleczynski was studying computer science at the University of Illinois. Bruce became the VP of Research for Malwarebytes, and further hired Doug Swanson, with experience in freeware development to work for the new company. Marcus Chung, an e-commerce expert who formerly worked for GreenBorder, was hired as chief operating officer. Kleczynski and Harrison reportedly made $600,000 in their first year of selling the software, despite not having met personally at the time.
Post-2010 developments
In 2011, Malwarebytes acquired HPhosts, a website blacklisting company, which tracks blacklisted websites and ad servers, a necessary development to protect against new internet protocol addresses and web servers which distribute malware, and advise internet service providers to shut down those with malicious activity. That year, the company had claimed to have removed o |
https://en.wikipedia.org/wiki/Swendsen%E2%80%93Wang%20algorithm | The Swendsen–Wang algorithm is the first non-local or cluster algorithm for Monte Carlo simulation for large systems near criticality. It has been introduced by Robert Swendsen and Jian-Sheng Wang in 1987 at Carnegie Mellon.
The original algorithm was designed for the Ising and Potts models, and it was later generalized to other systems as well, such as the XY model by Wolff algorithm and particles of fluids. The key ingredient was the random cluster model, a representation of the Ising or Potts model through percolation models of connecting bonds, due to Fortuin and Kasteleyn. It has been generalized by Barbu and Zhu to arbitrary sampling probabilities by viewing it as a Metropolis–Hastings algorithm and computing the acceptance probability of the proposed Monte Carlo move.
Motivation
The problem of the critical slowing-down affecting local processes is of fundamental importance in the study of second-order phase transitions (like ferromagnetic transition in the Ising model), as increasing the size of the system in order to reduce finite-size effects has the disadvantage of requiring a far larger number of moves to reach thermal equilibrium. Indeed the correlation time usually increases as with or greater; since, to be accurate, the simulation time must be , this is a major limitation in the size of the systems that can be studied through local algorithms. SW algorithm was the first to produce unusually small values for the dynamical critical exponents: for the 2D Ising model ( for standard simulations); for the 3D Ising model, as opposed to for standard simulations.
Description
The algorithm is non-local in the sense that a single sweep updates a collection of spin variables based on the Fortuin–Kasteleyn representation. The update is done on a "cluster" of spin variables connected by open bond variables that are generated through a percolation process, based on the interaction states of the spins.
Consider a typical ferromagnetic Ising model with only nearest-neighbor interaction.
Starting from a given configuration of spins, we associate to each pair of nearest neighbours on sites a random variable which is interpreted in the following way: if then there is no link between the sites and (the bond is closed); if then there is a link connecting the spins (the bond is open). These values are assigned according to the following (conditional) probability distribution:
;
;
;
;
where is the ferromagnetic coupling strength.
This probability distribution has been derived in the following way: the Hamiltonian of the Ising model is
,
and the partition function is
.
Consider the interaction between a pair of selected sites and and eliminate it from the total Hamiltonian, defining
Define also the restricted sums:
;
Introduce the quantity
;
the partition function can be rewritten as
Since the first term contains a restriction on the spin values whereas there is no restriction in the second term, the weighting fac |
https://en.wikipedia.org/wiki/Wolff%20algorithm | The Wolff algorithm, named after Ulli Wolff, is an algorithm for Monte Carlo simulation of the Ising model and Potts model in which the unit to be flipped is not a single spin (as in the heat bath or Metropolis algorithms) but a cluster of them. This cluster is defined as the set of connected spins sharing the same spin states, based on the Fortuin-Kasteleyn representation.
The Wolff algorithm is similar to the Swendsen–Wang algorithm, but different in that the former only flips one randomly chosen cluster with probability 1, while the latter flip every cluster independently with probability 1/2. It is shown numerically that flipping only one cluster decreases the autocorrelation time of the spin statistics.
The advantage of Wolff algorithm over other algorithms for magnetic spin simulations like single spin flip is that it allows non-local moves on the energy. One important consequence of this is that in some situations (e.g. ferromagnetic Ising model or fully frustrated Ising model), the scaling of the Multicanonic simulation is , better than , where z is the exponent associated with the critical slowing down phenomena.
References
External links
Cluster Algorithms at Netlib
Implementation in Julia: https://github.com/cossio/SquareIsingModel.jl
Monte Carlo methods
Statistical mechanics |
https://en.wikipedia.org/wiki/Florence%E2%80%93Rome%20railway | The Florence–Rome railway is part of the traditional main north–south trunk line of the Italian railway network. The line is referred to by Ferrovie dello Stato (the State Railways) as the Linea Lenta (meaning "slow line", abbreviated LL) to distinguish it from the parallel high-speed line. The Linea Lenta is now mainly used for regional services, for the InterCity services — rather than the faster Le Frecce trains — between Florence and Rome and for the majority of freight trains. Some types of passenger train are routed on the line to serve smaller stations not served by the high-speed line or in order to improve traffic flow during peak periods or other periods of congestion.
High-speed trains on the Florence-Rome route use the parallel Florence–Rome high-speed line (Direttissima, meaning "most direct", abbreviated DD) which was partially opened on 24 February 1977 and was completed on 26 May 1992.
History
The origins of the line design date back to early days of railway building in Italy, some years before the creation of the Italian State in 1859, which explains its tortuous path and its somewhat illogical route in places. While the Apennines to the north of Florence created a difficult natural barrier, the political frontier with the Papal States to the south also obstructed the development of a rail connection with Rome. The physical and political geography led to the development of a railway line from the French border, through the Kingdom of Sardinia (Piedmont), Piacenza, and Bologna to Ancona and eventually Brindisi. At the same time the same geography led the Papal States to develop a line from Rome to Ancona. For similar reasons the Kingdom of the Two Sicilies was developing east–west rail links from Naples to Termoli, Foggia and Brindisi.
The plan for the line between Rome, Orte and Foligno, which is common to the current lines from Rome to the Adriatic port of Ancona and Florence as far as Orte, took shape in the Papal States in 1846 shortly after Pius IX became Pope, replacing his predecessor Gregory XVI who banned railways, calling them "chemins d'enfer" (French for "ways of hell"; a play of words for "chemins de fer", French for "railways"). On 7 November 1846, the Secretary of State, authorised the construction of a railway connecting Rome to Ancona in order to reach Bologna and Modena, and connecting with the railway of Lombardy–Venetia then part of the Austrian Empire. The route chosen generally followed an ancient Roman Road, the Via Flaminia through Orte and continued over the Apennines via the pass of Fossato. A concession was granted in May 1856 to a company called Ferrovia Pio Centrale (Central Pius Railway) in honour of the Pope. It was completed only ten years later and inaugurated on 29 April 1866 by the Kingdom of Italy. The project, including the sections already built, had already been absorbed in 1865 by the Società per le strade ferrate romane (Roman Railway Company).
Meanwhile, the project had inspired the |
https://en.wikipedia.org/wiki/Michael%20Stonebraker | Michael Ralph Stonebraker (born October 11, 1943) is a computer scientist specializing in database systems. Through a series of academic prototypes and commercial startups, Stonebraker's research and products are central to many relational databases. He is also the founder of many database companies, including Ingres Corporation, Illustra, Paradigm4, StreamBase Systems, Tamr, Vertica and VoltDB, and served as chief technical officer of Informix. For his contributions to database research, Stonebraker received the 2014 Turing Award, often described as "the Nobel Prize for computing."
Stonebraker's career can be broadly divided into two phases: his time at University of California, Berkeley when he focused on relational database management systems such as Ingres and Postgres, and at Massachusetts Institute of Technology (MIT) where he developed more novel data management techniques such as C-Store, H-Store and SciDB. Stonebraker is currently a professor emeritus at UC Berkeley and an adjunct professor at MIT's Computer Science and Artificial Intelligence Laboratory. He is also known as an editor for the book Readings in Database Systems.
Life
Stonebraker grew up in Milton, New Hampshire. He earned his B.S.E. in electrical engineering from Princeton University in 1965, and his M.S. and Ph.D. from the University of Michigan in 1967 and 1971 respectively. His awards include the IEEE John von Neumann Medal and the first SIGMOD Edgar F. Codd Innovations Award. In 1994 he was inducted as a Fellow of the Association for Computing Machinery. In 1997, he was elected a member of the National Academy of Engineering for the development and commercialization of relational and object-relational database systems. In March 2015 it was announced he won the 2014 ACM Turing Award. In September 2015, he won the 2015 Commonwealth Award, chosen by council members of MassTLC.
The Berkeley years (1971–2000)
Stonebraker joined University of California, Berkeley as an assistant professor in 1971, and taught in the computer science department for twenty-nine years. It was there that he did his early pioneering work on relational databases.
Ingres
In 1973, Stonebraker and his colleague Eugene Wong started researching relational database systems after reading a series of seminal papers published by Edgar F. Codd on the relational data model.
Their project, known as Ingres (Interactive Graphics and Retrieval System), was one of the first systems (along with System R from IBM) to
demonstrate that it was possible to build a practical and efficient implementation of the relational model. A number of key ideas from INGRES are still widely used in relational systems, including the use of B-trees, primary-copy replication, the query rewrite approach to views and integrity constraints, and the idea of rules/triggers for integrity checking in an RDBMS. Additionally, much experimental work was done that provided insights into how to build a locking system that could provid |
https://en.wikipedia.org/wiki/Arithmetic%20circuit%20complexity | In computational complexity theory, arithmetic circuits are the standard model for computing polynomials. Informally, an arithmetic circuit takes as inputs either variables or numbers, and is allowed to either add or multiply two expressions it has already computed. Arithmetic circuits provide a formal way to understand the complexity of computing polynomials. The basic type of question in this line of research is "what is the most efficient way to compute a given polynomial ?"
Definitions
An arithmetic circuit over the field and the set of variables is a directed acyclic graph as follows. Every node in it with indegree zero is called an input gate and is labeled by either a variable or a field element in Every other gate is labeled by either or in the first case it is a sum gate and in the second a product gate. An arithmetic formula is a circuit in which every gate has outdegree one (and so the underlying graph is a directed tree).
A circuit has two complexity measures associated with it: size and depth. The size of a circuit is the number of gates in it, and the depth of a circuit is the length of the longest directed path in it. For example, the circuit in the figure has size six and depth two.
An arithmetic circuit computes a polynomial in the following natural way. An input gate computes the polynomial it is labeled by. A sum gate computes the sum of the polynomials computed by its children (a gate is a child of if the directed edge is in the graph). A product gate computes the product of the polynomials computed by its children. Consider the circuit in the figure, for example: the input gates compute (from left to right) and the sum gates compute and and the product gate computes
Overview
Given a polynomial we may ask ourselves what is the best way to compute it — for example, what is the smallest size of a circuit computing The answer to this question consists of two parts. The first part is finding some circuit that computes this part is usually called upper bounding the complexity of The second part is showing that no other circuit can do better; this part is called lower bounding the complexity of Although these two tasks are strongly related, proving lower bounds is usually harder, since in order to prove a lower bound one needs to argue about all circuits at the same time.
Note that we are interested in the formal computation of polynomials, rather than the functions that the polynomials define. For example, consider the polynomial over the field of two elements this polynomial represents the zero function, but it is not the zero polynomial. This is one of the differences between the study of arithmetic circuits and the study of Boolean circuits. In Boolean complexity, one is mostly interested in computing a function, rather than some representation of it (in our case, a representation by a polynomial). This is one of the reasons that make Boolean complexity harder than arithmetic complexity. The study o |
https://en.wikipedia.org/wiki/Unistd.h | In the C and C++ programming languages, unistd.h is the name of the header file that provides access to the POSIX operating system API. It is defined by the POSIX.1 standard, the base of the Single Unix Specification, and should therefore be available in any POSIX-compliant operating system and compiler. For instance, this includes Unix and Unix-like operating systems, such as GNU variants, distributions of Linux and BSD, and macOS, and compilers such as GCC and LLVM.
On Unix-like systems, the interface defined by unistd.h is typically made up largely of system call wrapper functions such as fork, pipe and I/O primitives (read, write, close, etc.).
Unix compatibility layers such as Cygwin and MinGW also provide their own versions of unistd.h. In fact, those systems provide it along with the translation libraries that implement its functions in terms of win32 functions. E.g. In Cygwin, a header file can be found in /usr/include that sub-includes a file of the same name in /usr/include/sys. Not everything is defined in there but some definitions are done by references to the GNU C standard library headers (like stddef.h) which provide the type size_t and many more. Thus, unistd.h is only a generically defined adaptive layer that might be based upon already existing system and compiler specific definitions. This has the general advantage of not having a possibly concurrent set of header file defined, but one that is built upon the same root which, for this reason, will raise much fewer concerns in combined usage cases.
Overview of functions
External links
C (programming language) headers
C POSIX library
C standard library headers |
https://en.wikipedia.org/wiki/DREAD%20%28risk%20assessment%20model%29 | DREAD is part of a system for risk-assessing computer security threats that was formerly used at Microsoft. It provides a mnemonic for risk rating security threats using five categories.
The categories are:
Damage – how bad would an attack be?
Reproducibility – how easy is it to reproduce the attack?
Exploitability – how much work is it to launch the attack?
Affected users – how many people will be impacted?
Discoverability – how easy is it to discover the threat?
The DREAD name comes from the initials of the five categories listed. It was initially proposed for threat modeling but was abandoned when it was discovered that the ratings are not very consistent and are subject to debate. It was discontinued at Microsoft by 2008.
When a given threat is assessed using DREAD, each category is given a rating from 1 to 10. The sum of all ratings for a given issue can be used to prioritize among different issues.
Discoverability debate
Some security experts feel that including the "Discoverability" element as the last D rewards security through obscurity, so some organizations have either moved to a DREAD-D "DREAD minus D" scale (which omits Discoverability) or always assume that Discoverability is at its maximum rating.
See also
Cyber security and countermeasure
STRIDE – another mnemonic for security threats
References
External links
Improving Web Application Security: Threats and Countermeasures
DREADful, an MSDN blog post
Experiences Threat Modeling at Microsoft, Adam Shostack
Computer security |
https://en.wikipedia.org/wiki/List%20of%20accolades%20received%20by%20Ratatouille | Ratatouille is a computer-animated film produced by Pixar and distributed by Walt Disney Pictures. The film was released on June 29, 2007 in the United States as the eighth film produced by Pixar. It was directed by Brad Bird, who took over from Jan Pinkava in 2005. The plot follows Remy, a rat who dreams of becoming a chef and tries to achieve his goal by forming an alliance with a Parisian restaurant's garbage boy. Ratatouille was released to both critical acclaim and box office success, opening in 3,940 theaters domestically and debuting at #1 with $47 million, grossing $206,445,654 in North America and a total of $624,445,654 worldwide. The film is on the 2007 top ten lists of multiple critics, including Michael Sragow of The Baltimore Sun as number one, A.O. Scott of The New York Times, Carina Chocano of the Los Angeles Times and Joe Morgenstern of The Wall Street Journal as number two.
It was nominated for five Academy Awards, including Original Score, Achievement in Sound Editing, Achievement in Sound Mixing, Original Screenplay and Animated Feature Film, which it lost to Atonement, The Bourne Ultimatum and Juno, respectively, winning the latter one. Ratatouille was nominated for 13 Annie Awards, twice for the Best Animated Effects, where it lost to Surf's Up, and three times in the Best Voice Acting in an Animated Feature Production for Janeane Garofalo, Ian Holm and Patton Oswalt, where Ian Holm won the nomination. It won the Best Animated Feature Award from multiple associations including the Chicago Film Critics, the National Board of Review, the Annie Awards, the Broadcast Film Critics, the British Academy of Film and Television (BAFTA) and the Golden Globes.
Accolades
References
General
Specific
External links
Lists of accolades by film
Pixar awards and nominations
Accolades |
https://en.wikipedia.org/wiki/Chibia | Chibia is a town and municipality in the province of Huíla, Angola. The municipality had a population of 190,670 in 2014.
It is served by a station on the southern network of the national railway network.
External links
Official website
References
Populated places in Huíla Province
Municipalities of Angola |
https://en.wikipedia.org/wiki/Kubango | Kubango is a town in southeastern Angola.
Transport
It is served by a station on the southern line of the national railway network.
See also
Railway stations in Angola
References
Populated places in Angola |
https://en.wikipedia.org/wiki/List%20of%20Soviet%20films%20of%201960 | A list of films produced in the Soviet Union in 1960 (see 1960 in film).
1960
See also
1960 in the Soviet Union
External links
Soviet films of 1960 at the Internet Movie Database
1960
Soviet
Films |
https://en.wikipedia.org/wiki/List%20of%20Soviet%20films%20of%201961 | A list of films produced in the Soviet Union in 1961 (see 1961 in film).
1961
See also
1961 in the Soviet Union
References
External links
Soviet films of 1961 at the Internet Movie Database
1961
Lists of 1961 films by country or language
Films |
https://en.wikipedia.org/wiki/Pen-Link | Pen-Link, Ltd., (PenLink) is a software company that develops enterprise-grade communications surveillance data collection and analysis solutions for domestic law enforcement. Their flagship products include PLX and PenPoint.
One of the more publicized uses of PenLink's products was during the Laci Peterson murder case, where wiretaps taken with Pen-Link 8 and LINCOLN2 were used as evidence against Scott Peterson.
See also
Lawful interception
Communications Assistance For Law Enforcement Act
References
https://www.kearneyhub.com/news/local/pen-link-employees-cash-in-on-growing-surveillance-business/article_80216234-5028-5e21-9e8d-6ae6edcbae08.html
Surveillance |
https://en.wikipedia.org/wiki/Cuto%2C%20Angola | Cuto is a town in southern Angola.
Transport
It is near a deviation of the southern line of the national railway network.
See also
Railway stations in Angola
References
Populated places in Angola |
https://en.wikipedia.org/wiki/List%20of%20Soviet%20films%20of%201962 | A list of films produced in the Soviet Union in 1962 (see 1962 in film).
1962
See also
1962 in the Soviet Union
External links
Soviet films of 1962 at the Internet Movie Database
1962
Soviet
Films |
https://en.wikipedia.org/wiki/List%20of%20Soviet%20films%20of%201963 | A list of films produced in the Soviet Union in 1963 (see 1963 in film).
1963
External links
Soviet films of 1963 at the Internet Movie Database
1963
Soviet
Films |
https://en.wikipedia.org/wiki/List%20of%20Soviet%20films%20of%201964 | A list of films produced in the Soviet Union in 1964 (see 1964 in film).
1964
References
External links
Soviet films of 1964 at the Internet Movie Database
1964
Lists of 1964 films by country or language
Films |
https://en.wikipedia.org/wiki/List%20of%20Soviet%20films%20of%201965 | A list of films produced in the Soviet Union in 1965 (see 1965 in film).
1965
External links
Soviet films of 1965 at the Internet Movie Database
1965
Soviet
Films |
https://en.wikipedia.org/wiki/List%20of%20Soviet%20films%20of%201966 | A list of films produced in the Soviet Union in 1966 (see 1966 in film).
1966
References
External links
Soviet films of 1966 at the Internet Movie Database
1966
Lists of 1966 films by country or language
Films |
https://en.wikipedia.org/wiki/List%20of%20Soviet%20films%20of%201967 | A list of films produced in the Soviet Union in 1967 (see 1967 in film).
1967
External links
Soviet films of 1967 at the Internet Movie Database
1967
Soviet
Films |
https://en.wikipedia.org/wiki/List%20of%20Soviet%20films%20of%201968 | A list of films produced in the Soviet Union in 1968 (see 1968 in film).
1968
External links
Soviet films of 1968 at the Internet Movie Database
1968
Soviet
Films |
https://en.wikipedia.org/wiki/List%20of%20Soviet%20films%20of%201969 | A list of films produced in the Soviet Union in 1969 (see 1969 in film).
1969
External links
Soviet films of 1969 at the Internet Movie Database
1969
Soviet
Films |
https://en.wikipedia.org/wiki/List%20of%20onshore%20wind%20farms%20in%20the%20United%20Kingdom | This is a list of some onshore wind farms (more than 1 turbine) in the UK. This information is gathered from multiple Internet sources, primarily the UK Wind Energy Database from RenewableUK (formerly BWEA) and The Wind Power's database. There are many operational wind farms missing from the list, such as Scotland's 522 MW Clyde Wind Farm and the 68 MW Keadby Wind Farm in North Lincolnshire, England's largest onshore wind farm. The name of the wind farm is the name used by the energy company when referring to the farm and is usually related to the name of the physical location, e.g. hill, moor, fell, down etc. or the name of the agricultural farm for the smaller installations on property owned by farmers. The "wind farm" part is implied and hence removed for clarity in most cases. Listings here are restricted to wind farms with 12 turbines or more; for a more comprehensive list, please see the individual country articles.
England
Northern Ireland
Scotland
Wales
See also
List of offshore wind farms in the United Kingdom
Renewable energy in the United Kingdom
Wind power in the United Kingdom
References
Wind
United Kingdom |
https://en.wikipedia.org/wiki/New%20York%20Mets%20Radio%20Network | The New York Mets Radio Network, referred to on air as the WCBS Mets Radio Network, was a radio network owned by Audacy, Inc. (previously CBS Radio) that broadcast New York Mets baseball games. It consisted of 14 stations (12 AM, 2 FM and 1 FM translator) in the states of Connecticut, Florida, New Jersey, and New York. A Spanish-language broadcast airs separately from the English-language network.
The network's English-language flagship was WCBS, which acquired the radio rights to the Mets during the 2018 offseason in a new seven year deal with what was then Entercom to air their games on the station beginning in 2019 and running through 2025. The Mets had previously aired their games on WFAN since the station was founded in 1987, and factoring in the station's predecessors the relationship dated back to 1983. The relationship with WFAN ended following the 2013 season when the station acquired the radio rights to the New York Yankees from corporate sibling WCBS. WOR acquired the radio rights to the Mets during the 2013 offseason; the move made the team the first professional team since the now-Brooklyn Nets to air its games on WOR; the Nets, along with their then-arenamates the New Jersey Devils, were picked up by WFAN following the station's loss of broadcast rights for the New York Knicks and New York Rangers in 2004. With the move to WCBS, the relationship between WFAN and the Mets was repaired, with WFAN employees again allowed to appear on Mets broadcasts. WEPN is the Spanish-language flagship.
Howie Rose serves as play-by-play and color commentator on the broadcasts, alternating these roles with another broadcaster. Most recently this was Josh Lewin, who called games alongside Rose from 2012-2018. Wayne Randazzo replaced Lewin as co play-by-play commentator and serves as post-game host. Ed Coleman previously hosted the pre-game and post-game shows, which were called Mets Extra by WFAN, and served as a substitute broadcaster when necessary (usually for Lewin, who, in addition to his Mets duties, was the radio voice of the San Diego Chargers and was forced to miss weekend games in September in order to fulfill those duties). However, in January 2014 it was announced that Coleman would not be part of the WOR broadcasts as he has been employed by WFAN since its inception. (Although WFAN personalities Chris Carlin and Marc Malusis have been heard on WOR through its broadcasts of Rutgers University sporting events, WOR does not produce Rutgers' games and is instead an affiliate of its radio network.) Coleman returned to the Mets' booth as pre-game host in 2019
On April 1, 2019, Entercom announced that it had discontinued the Mets' radio network and would be carrying games only on WCBS for the 2019 season. The Mets cited the loss of some of its affiliates prior to the season (among them WROW in Albany) and the relative expense of satellite space for the discontinuation. At least one station, WTLA in Syracuse (the city that houses the Mets' AAA |
https://en.wikipedia.org/wiki/Hash%20consing | In computer science, particularly in functional programming, hash consing is a technique used to share values that are structurally equal. When a value is constructed, such as a cons cell, the technique checks if such a value has been constructed before, and if so reuses the previous value, avoiding a new memory allocation. A useful property of hash consing is that two structures can be tested for equality in constant time via pointer equality, which in turn can improve efficiency of divide and conquer algorithms when data sets contain overlapping blocks. Hash consing has been shown to give dramatic performance improvements—both space and time—for symbolic and dynamic programming algorithms.
Hash consing is most commonly implemented with hash tables storing weak references that may be garbage-collected when the data stored therein contains no references from outside the table.
Example
Simple, not very efficient, but suitable for demonstration of the concept implementation of a memoizer by means of hash table and weak references in Scheme:
;; weak hashes
;;
(require 'hash-table)
(define (make-weak-table . args)
(apply make-hash-table args))
(define (weak-table-set! table key data)
(let ((w (hash-table-ref table key #f)))
(if w
(vector-set! w 0 data)
(let ((w (make-weak-vector 1)))
(vector-set! w 0 data)
(hash-table-set! table key w)))))
(define (weak-table-ref table key)
(let ((w (hash-table-ref table key #f)))
(if w
(vector-ref w 0)
#f)))
;; memoizer factory: for given (side-effect-free) procedure,
;; return a procedure which does the same memoizing some of results
;; in the sense of equal? on the whole list of args
;;
(define (make-weak-memoizer proc)
(let ((cache (make-weak-table equal?)))
(lambda args
(let ((x (weak-table-ref cache args)))
(if (bwp-object? x)
(let ((r (apply proc args)))
(weak-table-set! cache args r)
r)
x)))))
History
A hash consing compilation technique was presented by A.P. Ershov in 1958. The term "hash consing" originates from implementations in the context of Lisp in the 1970s.
See also
String interning
Flyweight pattern
Merkle tree
Hashlife
Interning
References
Further reading
Jean Goubault. Implementing Functional Languages with Fast Equality, Sets and Maps: an Exercise in Hash Consing. In Journées Francophones des Langages Applicatifs (JFLA’93), pages 222–238, Annecy, February 1993.
Implementation of functional programming languages
Hashing
Articles with example Scheme (programming language) code |
https://en.wikipedia.org/wiki/Personal%20Knowbase | Personal Knowbase is a freeform notes database application for Microsoft Windows. Personal Knowbase was first released in 1998 on the CompuServe Information Service and is an example of a personal knowledge base.
Text articles are displayed in a flat, rather than tree-based, listing. Stored articles are retrieved using a scheme based on user-defined keywords. This type of keyword-based system was based on the keyword systems used by common research databases of the 1990s, such as Knowledge Index and CompuServe's file library, and is similar to the keywords Index for a MS Help file. In recent Internet usage, such keywords are now often referred to as metadata "tags". Articles are filtered using various criteria, including keywords, dates, and attachments.
A free read-only version of the program, called Personal Knowbase Reader, is available to allow for distribution of content in the Personal Knowbase format.
Features
Boolean queries on keywords
Hypertext links to external files and between articles
Attachments to external files and URLs
Password protection
Reminders
Export to external formats
Import external formats
Portability
Personal Knowbase is a portable application and can be installed directly onto a USB flash drive.
See also
List of personal information managers
List of portable software
References
Notes
Tucows.com Spotlight on Personal Knowbase
The 2005 WD Guide to Writing Software
Review on TechNewsWorld
Stephen Davies, Still Building the Memex, Communications of the ACM, Volume 54 Issue 2, February 2011
External links
Portable Installation
Note-taking software
Personal information managers |
https://en.wikipedia.org/wiki/Fractional%20lambda%20switching | Fractional lambda switching (FλS) leverages on time-driven switching (TDS) to realize sub-lambda switching in highly scalable dynamic optical networking, which requires minimum (possibly optical) buffers. Fractional lambda switching implies switching fractions of optical channels as opposed to whole lambda switching where whole optical channels are the switching unit. In this context, TDS has the same general objectives as optical burst switching and optical packet switching: realizing all-optical networks with high wavelength utilization. TDS operation is based on time frames (TFs) that can be viewed as virtual containers for multiple IP packets that are switched at every TDS switch based on and coordinated by the UTC (coordinated universal time) signal implementing pipeline forwarding. In the context of optical networks, synchronous virtual pipes SVPs typical of pipeline forwarding are called fractional lambda pipes (FλPs).
In FλS, likewise in TDS, all packets in the same time frame are switched in the same way. Consequently, header processing is not required, which results in low complexity (hence high scalability) and enables optical implementation. The TF is the basic SVP capacity allocation unit; hence, the allocation granularity depends on the number of TFs per time cycle. For example, with a 10 Gbit/s optical channel and 1000 TFs in each time cycle, the minimum FλP capacity (obtained by allocating one TF in every time cycle) is 10 Mbit/s.
Scheduling through a switching fabric is based on a pre-defined schedule, which enables the implementation of a simple controller. Moreover, low-complexity switching fabric architectures, such as Banyan, can be deployed notwithstanding their blocking features, thus further enhancing scalability. In fact, blocking can be avoided during schedule computation by avoiding conflicting input/output connections during the same TF. Several results show that (especially if multiple wavelength division multiplexing channels are deployed on optical links between fractional λ switches) high link utilization can be achieved with negligible blocking using a Banyan network without speedup.
Various aspects of the technology are covered by several patents issued by both the United States Patent and Trademark Office and the European Patent Office.
References
Computer networking |
https://en.wikipedia.org/wiki/Nippon%20Television%20Network%20System | Nippon Television Network System (NNS; ) is a Japanese television network organized by The Yomiuri Shimbun Holdings through its subsidiary Nippon Television (NTV). NTV feeds entertainment and other non-news programming over NNS to 29 affiliated stations.
Distribution of national television news bulletins is handled by Nippon News Network, another network set up by NTV.
List of affiliates
References
External links
Nippon TV
Television networks in Japan
Television channels and stations established in 1972 |
https://en.wikipedia.org/wiki/E2open | e2open, LLC is a business-to-business provider of cloud-based, on-demand software for supply chains for computer, telecom and electronics systems, components and services. The company was founded in 2000 as a joint project of 8 major companies: Hitachi, IBM, LG Electronics, Matsushita, Nortel, Seagate, Solectron, and Toshiba.
E2open offers its products across a variety of industries, including high technology, industrial manufacturing, telecommunications, life sciences, oil and gas, consumer electronics, aerospace and defense, and consumer goods.
Company
E2open is headquartered in Austin, Texas, with offices in Parsippany, NJ, Atlanta, Germany, United Kingdom, Denmark, The Netherlands, Belgium, China, Australia, New Zealand, Malaysia, India and Perú.
According to the company's estimate, more than 60,000 trading partners and 200,000 unique registered users currently participate in the E2open Business Network.
In July 2012, E2open went public on the NASDAQ.
In March 2015, Insight Venture Partners announced that it had completed its acquisition of E2open.
In February 2021, E2open went public via SPAC (special purpose acquisition company) merger and began trading under the ticker ETWO.
Acquisitions by E2open
July 2013: acquired supply chain vendor ICON-SCM.
June 2014: acquisition of SERUS Corporation, a "cloud-based manufacturing and product management provider".
March 2016: acquisition of Terra Technology.
June 2016: acquired Orchestro.
February 2017: acquired Steelwedge.
Late 2017: acquired Channel Data Management provider Zyme.
Early 2018: acquired Entomo and Birch Worldwide.
October 2018: bought the shipping platform INTTRA.
October 2018: bought Cloud Logistics.
July 2, 2019: E2open completes acquisition of global trade management software company Amber Road.
May 2021: acquired logistics execution platform BluJay Solutions for $1.7B.
March 2022: acquisition of Logistyx Technologies for .
See also
Supply-chain management
Electronic commerce
Enterprise application integration
References
Supply chain software companies
Service-oriented (business computing)
Software industry
Cloud platforms
Business software companies
Software companies of the United States
2000 establishments in the United States
2000 establishments in California
Software companies established in 2000
Companies established in 2000
2015 mergers and acquisitions
2013 mergers and acquisitions
Companies formerly listed on the Nasdaq |
https://en.wikipedia.org/wiki/The%20Graveyard%20%28video%20game%29 | The Graveyard is a computer art game developed by Belgian developer Tale of Tales in which the player assumes the role of an elderly woman walking through a graveyard to a bench.
The Graveyard was nominated for the Innovation Award at the 2009 Independent Games Festival. The game was one of the inspirations for the Tibetan village scene in Uncharted 2: Among Thieves.
References
2008 video games
Android (operating system) games
Art games
IOS games
MacOS games
Monochrome video games
Video games developed in Belgium
Video games featuring female protagonists
Video games set in cemeteries
Windows games
Video games about old age
Tale of Tales (company) games |
https://en.wikipedia.org/wiki/Hot%20spot%20%28computer%20programming%29 | A hot spot in computer science is most usually defined as a region of a computer program where a high proportion of executed instructions occur or where most time is spent during the program's execution (not necessarily the same thing since some instructions are faster than others).
If a program is interrupted randomly, the program counter (the pointer to the next instruction to be executed) is frequently found to contain the address of an instruction within a certain range, possibly indicating code that is in need of optimization or even indicating the existence of a 'tight' CPU loop. This simple technique can detect highly used instructions, although more-sophisticated methods, such as instruction set simulators or performance analyzers, achieve this more accurately and consistently.
History of hot spot detection
The computer scientist Donald Knuth described his first encounter with what he refers to as a jump trace in an interview for Dr. Dobb's Journal in 1996, saying:
In the '60s, someone invented the concept of a 'jump trace'. This was a way of altering the machine language of a program so it would change the next branch or jump instruction to retain control, so you could execute the program at fairly high speed instead of interpreting each instruction one at a time and record in a file just where a program diverged from sequentiality. By processing this file you could figure out where the program was spending most of its time. So the first day we had this software running, we applied it to our Fortran compiler supplied by, I suppose it was in those days, Control Data Corporation. We found out it was spending 87 percent of its time reading comments! The reason was that it was translating from one code system into another into another.
Iteration
The example above serves to illustrate that effective hot spot detection is often an iterative process and perhaps one that should always be carried out (instead of simply accepting that a program is performing reasonably). After eliminating all extraneous processing (just by removing all the embedded comments for instance), a new runtime analysis would more accurately detect the "genuine" hot spots in the translation. If no hot spot detection had taken place at all, the program may well have consumed vastly more resources than necessary, possibly for many years on numerous machines, without anyone ever being fully aware of this.
Instruction set simulation as a hot spot detector
An instruction set simulator can be used to count each time a particular instruction is executed and later produce either an on-screen display, a printed program listing (with counts and/or percentages of total instruction path length) or a separate report, showing precisely where the highest number of instructions took place. This only provides a relative view of hot spots (from an instruction step perspective) since most instructions have different timings on many machines. It nevertheless provides a measure of highly u |
https://en.wikipedia.org/wiki/Russian%20Television%20and%20Radio%20Broadcasting%20Network | Russian Television and Radio Broadcasting Network (RTRN) () is a unitary enterprise created on August 13, 2001, by decree of the president of the Russian Federation. The company is included in the list of Russian strategic enterprises.
RTRN operates Russia's digital terrestrial television (DTT) network — the largest operating broadcasting network in the world. It consists of 5040 transmission sites and 10,080 transmitters. Almost 75% out of the 5040 transmission sites were built from scratch.
RTRN's DTT services cover 98,4% of the Russian population. RTRN provides terrestrial transmission of 20 must-carry public television channels and three radio stations broadcasting over the territory of the Russian Federation. RTRN also serves other radio and television channels of both all-Russian and regional types distributing the programs of the latter. Multichannel terrestrial radio and television broadcasting in Russia is provided by 78 broadcasting centers functioning as RTRN regional branches. Moscow broadcasting signal reaches the regions through satellite and land communication channels.
RTRN was appointed to execute the deployment of the DTT network in the DVB-T2 standard according to the federal target programme "Development of TV and Radio Broadcasting in the Russian Federation in 2009-2018".
RTRN is a member of DVB consortium, and was a member of the European Broadcasting Union (EBU) before withdrawal from the union in February 2022.
The Digital Switchover
It took RTRN 10 years to move from analogue to digital broadcasting. The Digital Switchover (DSO) was completed in late 2019. On December 3, 2009, the Russian Government approved the federal target programme "Development of TV and Radio Broadcasting in the Russian Federation in 2009-2018". The main objective of the programme was to provide the population of the Russian Federation with free-to-air multichannel digital TV and radio broadcasting.
Before 2010 almost half of Russia's population, 44%, could watch no more than four channels. There was no room left for development of analogue broadcasting. Authorities have envisaged TV multiplexes in 2009. The list of channels in the first of the two of them was approved by a decree of the President of Russia.
Over a period of 10 years, about 100 million TV-sets and about 20 million digital set-top boxes were sold. This had set the stage for the analogue switch-off (ASO). On November 29, 2018, the Russian government approved the ASO roadmap. The federal target programme included modernizing the whole structure of terrestrial broadcasting. It is considered the biggest programme of digital TV development in the world.
In December 2018, the pilot region, the Tver Region, phased out analogue broadcasting of 20 federal TV channels. In 2019, Russia switched off analogue TV broadcasting in four stages: February 11 (8 regions), April 15 (20 regions), June 3 (36 regions) and October 14 (21 regions).
Russia was the first BRICS country to complete the |
https://en.wikipedia.org/wiki/Isle%20of%20Wight%20Railway%20Company | The Isle of Wight Railway Company can refer to two bodies:
The historical company which built and operated the Isle of Wight Railway network from 1864 to 1923.
The modern company which formed from the Wight Locomotive Society, which re-built, operates and maintains the Isle of Wight Steam Railway. |
https://en.wikipedia.org/wiki/Vertica | Vertica is an analytic database management software company. Vertica was founded in 2005 by the database researcher Michael Stonebraker with Andrew Palmer as the founding CEO. Ralph Breslauer and Christopher P. Lynch served as CEOs later on.
Lynch joined as Chairman and CEO in 2010 and was responsible for Vertica's acquisition by Hewlett Packard in March 2011. The acquisition expanded the HP Software portfolio for enterprise companies and the public sector group. As part of the merger of Micro Focus and the Software division of Hewlett Packard Enterprise, Vertica joined Micro Focus in September 2017. As part of OpenText acquisition of Micro Focus, Vertica joined OpenText in January 2023.
Products
The column-oriented Vertica Analytics Database was designed to manage large, fast-growing volumes of data and with fast query performance for data warehouses and other query-intensive applications. The product claims to greatly improve query performance over traditional relational database systems, and to provide high availability and exabyte scalability on commodity enterprise servers. Vertica runs on multiple cloud computing systems as well as on Hadoop nodes. Vertica's Eon Mode separates compute from storage, using S3 object storage and dynamic allocation of compute notes.
Vertica's design features include:
Column-oriented storage organization, which increases performance of sequential record access at the expense of common transactional operations such as single record retrieval, updates, and deletes.
Massively parallel processing (MPP) architecture to distribute queries on independent nodes and scale performance linearly.
Standard SQL interface with many analytics capabilities built-in, such as time series gap filling/interpolation, event-based windowing and sessionization, pattern matching, event series joins, statistical computation (e.g., regression analysis), and geospatial analysis.
In-database machine learning including categorization, fitting and prediction without down-sampling and data movement. Vertica offers a variety of in-database algorithms, including linear regression, logistic regression, k-means clustering, Naive Bayes classification, random forest decision trees, XGBoost, and support vector machine regression and classification. It also allows deployment of ML models to multiple clusters.
High compression, possible because columns of homogeneous datatype are stored together and because updates to the main store are batched.
Automated workload management, data replication, server recovery, query optimization, and storage optimization.
Native integration with open source big data technologies like Apache Kafka and Apache Spark.
Support for standard programming interfaces, including ODBC, JDBC, ADO.NET, and OLEDB.
High-performance and parallel data transfer to statistical tools and built-in machine learning algorithms.
Vertica's specialized approach aims to significantly increase query performance in data warehouses, |
https://en.wikipedia.org/wiki/System%20Alliance%20Europe | System Alliance Europe is a cooperative of medium-sized freight forwarders. Since its foundation in 2005, the cooperative has expanded. At the moment, the network consists of 61 partners, with 196 branches across 32 European countries. In 2015, the network transported 3.9 million consignments. The network partners employed 76,779 people that year.
Logistics companies of Germany
Companies based in Lower Saxony |
https://en.wikipedia.org/wiki/WolframAlpha | WolframAlpha ( ) is an answer engine developed by Wolfram Research. It answers factual queries by computing answers from externally sourced data.
WolframAlpha was released on May 18, 2009, and is based on Wolfram's earlier product Wolfram Mathematica, a technical computing platform. WolframAlpha gathers data from academic and commercial websites such as the CIA's The World Factbook, the United States Geological Survey, a Cornell University Library publication called All About Birds, Chambers Biographical Dictionary, Dow Jones, the Catalogue of Life, CrunchBase, Best Buy, and the FAA to answer queries. A Spanish language version was launched in 2022.
Technology
Overview
Users submit queries and computation requests via a text field. WolframAlpha then computes answers and relevant visualizations from a knowledge base of curated, structured data that come from other sites and books. It can respond to particularly phrased natural language fact-based questions. It displays its "Input interpretation" of such a question, using standardized phrases. It can also parse mathematical symbolism and respond with numerical and statistical results.
Development
WolframAlpha is written in the Wolfram Language, a multi-paradigm programming language, and implemented in Mathematica. Wolfram language is proprietary and is not commonly used by developers.
Usage
WolframAlpha was used to power some searches in the Microsoft Bing and DuckDuckGo search engines but is no longer used to provide search results. For factual question answering, WolframAlpha was used by Apple's Siri and Amazon Alexa for math and science queries but is no longer operational within those services. WolframAlpha became available in July 2020 within Microsoft Excel, but the Microsoft-Wolfram partnership ended nearly two years later, in 2022, in favor of Microsoft Power Query data types. WolframAlpha functionality in Microsoft Excel ended in June 2023.
History
Launch preparations for WolframAlpha began on May 15, 2009 at 7 p.m. CDT and were broadcast live on Justin.tv. The plan was to publicly launch the service a few hours later. However, there were issues due to extreme load. The service officially launched on May 18, 2009, receiving mixed reviews. In 2009, WolframAlpha advocates pointed to its , some stating that how it determines results is more important than current usefulness. WolframAlpha was free at launch, but later Wolfram Research attempted to monetize the service by launching an iOS application with a cost of $50, while the website itself was free. That plan was abandoned after criticism.
On February 8, 2012, WolframAlpha Pro was released, offering users additional features for a monthly subscription fee.
Some high-school and college students use WolframAlpha to cheat on math homework, though Wolfram Research says the service helps students understand math with its problem-solving capabilities.
Copyright claims
InfoWorld published an article warning readers of the potentia |
https://en.wikipedia.org/wiki/Iceandfire | iceandfire is a London-based charity. Its stated mission is to explore human rights stories through theatrical performance. It also runs Actors for Human Rights, a network of volunteer actors across the UK.
History
iceandfire was founded in 2003 by playwright Sonja Linden inspired by her seven years as writer in residence at the Medical Foundation for the Care of Victims of Torture (now Freedom from Torture).
Their first theatrical production was I Have Before Me a Remarkable Document Given to me by a Young Lady From Rwanda (2003), which opened at the Finborough Theatre in London and has since been performed across Europe and the United States of America. Other productions are listed below.
Since 2009 the Artistic Director has been Christine Bacon - initially as co-director with Sara Masters and since 2011 as the sole Artistic Director. She is a graduate of Oxford University's Refugee Studies Centre
Actors for Human Rights
Actors for Human Rights was formerly known as Actors for Refugees. The original network was formed in Melbourne, Australia, in September 2001, in the wake of a series of aggressive and controversial actions by the Australian government towards asylum seekers arriving by boat.
Founding members Alice Garner and Kate Atkinson wanted to use Australian actors to influence community attitudes toward refugees and asylum seekers and to encourage a humanitarian response to their plight.
The UK actors' network was launched in June 2006 at Amnesty International and now consists of well over 300 professional actors and musicians.
The outreach network responds to requests for rehearsed readings of documentary plays and they can go anywhere at any time. The scripts are made up of verbatim accounts from individuals who have suffered human rights abuses.
Because of the simplicity and documentary nature of the scripts, the performances do not need lengthy rehearsal or direction and are simply read out by a constantly changing cast, usually accompanied by a live score.
Juliet Stevenson, Sinéad Cusack, Simon Callow, Dan Stevens (The Line of Beauty), Hayley Atwell (Brideshead Revisited), Thusitha Jayasundera (The Bill), Shobna Gulati (Coronation Street), Shobu Kapoor (Eastenders) and Sam Spruell (London to Brighton) are amongst the professional actors that support the project.
Documentary scripts include Asylum Monologues, Asylum Dialogues, Rendition Monologues, Palestine Monologues, The Illegals, Close to Home: The Cuts, Getting On, On a Clear Day You Can See Dover, Even if we Lose Our Lives and Broke.
Productions
I Have Before Me a Remarkable Document Given to Me by a Young Lady From Rwanda (2003) by Sonja Linden This play is about an English writer's friendship with a young woman who survived the Rwandan massacre and is living in London as a refugee and trying to write about her experience. It was published as a play text in 2004 by Aurora Books.
Crocodile Seeking Refuge (2005) by Sonja Linden
Welcome to Ramallah (2008) by Sonja |
https://en.wikipedia.org/wiki/Cleveland%20Guardians%20Radio%20Network | The Cleveland Guardians Radio Network is an American radio network composed of 39 radio stations for the Cleveland Guardians, a professional baseball team in Major League Baseball (MLB). Cleveland sister stations WTAM () and WMMS () serve as the network's two flagships; WTAM also relays its signal over a low-power FM translator. The network also includes 26 affiliates in the U.S. states of Ohio, Pennsylvania, and New York: seventeen AM stations, eleven of which supplement their signals with low-power FM translators, eight full-power FM stations and one HD Radio subchannel that supplements its signal with a low-power FM translator.
Tom Hamilton and Jim Rosenhaus currently serve as the network's play-by-play announcers. In addition to traditional over-the-air AM and FM broadcasts, network programming airs on SiriusXM satellite radio; and streams online via SiriusXM Internet Radio, TuneIn Premium, and MLB.com Gameday Audio.
History
In May 15, 1948, the first broadcast happened at Cleveland Municipal Stadium where the then-Indians met the Chicago White Sox where broadcaster Van Patrick called the game where the Indians won 7-1.
Programming
Play-by-play announcers Tom Hamilton and Jim Rosenhaus call games on-site. Rosenhaus hosts Guardians Warm-Up, the network pregame show; and Hamilton hosts Guardians Wrap-Up, the network postgame show; both shows typically run 30 minutes each.
Additional network programming includes the following:
Guardians Update, a daily drive-time segment anchored by Rosenhaus
Guardians Weekly, a weekly year-round show hosted by Rosenhaus; airs on Saturday evenings
Note that not all network affiliates carry the latter two programs; co-flagship WTAM carries all originated network programming.
Announcers
Station list
Asterisk (*) indicates HD Radio broadcast.
Blue background indicates low-power FM translator.
Network map
References
External links
Guardians Radio Network
SiriusXM.com: Cleveland Guardians
TuneIn.com: Cleveland Guardians
MLB.com Gameday Audio
Cleveland Guardians
Major League Baseball on the radio
Radio in Cleveland
Sports radio networks in the United States |
https://en.wikipedia.org/wiki/Rubber%20duck%20debugging | In software engineering, rubber duck debugging (or rubberducking) is a method of debugging code by articulating a problem in spoken or written natural language. The name is a reference to a story in the book The Pragmatic Programmer in which a programmer would carry around a rubber duck and debug their code by forcing themselves to explain it, line by line, to the duck. Many other terms exist for this technique, often involving different (usually) inanimate objects, or pets such as a dog or a cat. Teddy bears are also widely used.
Approach
Many programmers have had the experience of explaining a problem to someone else, possibly even to someone who knows nothing about programming, and then hitting upon the solution in the process of explaining the problem. In describing what the code is supposed to do and observing what it actually does, any incongruity between these two becomes apparent. More generally, teaching a subject forces its evaluation from different perspectives and can provide a deeper understanding. By using an inanimate object, the programmer can try to accomplish this without having to interrupt anyone else, and with better results than have been observed from merely thinking aloud without an audience. This approach has been taught in computer science and software engineering courses.
In popular culture
On 1 April 2018, Stack Exchange introduced a rubber duck avatar on their websites as a new "feature" called Quack Overflow as an April Fools' Day joke. The duck appeared at the bottom right corner of the browser viewport, and attempted to help visitors by listening to their problems and responding with solutions. However, the duck merely produced a quack sound after apparently thinking and typing. It referenced rubber ducking as a powerful method for solving problems.
See also
Code review
Pair programming
Socratic method
Desk checking
Software walkthrough
Think aloud protocol
Pointing and calling
Rogerian method
Worry dolls
References
External links
Rubber Duck Debugging
Debugging
Computer programming folklore
Ducks |
https://en.wikipedia.org/wiki/Highline%20Big%20Picture | Highline Big Picture is a small school in the Highline School District in Burien, Washington, that is part of a network of Big Picture schools all over the United States. The high school opened in 2005 with 2009 being the first year with a graduating class. It is a small school with an average teacher-to-student ratio of 1:17.
Highline Big Picture, as part of the Big Picture Network, practices Learning Through Internships or LTI as it is known in the school. On Tuesdays and Thursdays students look for interviews with people in their interest field, this is followed up with shadow day with them. Shadow day within the school is a day in which you follow the people you interview around for a day or two. This is to help the student get an internship at the same place of their choice. Once the student has an internship, they can learn real-world experiences in the field they want to be in. The person that helps them in their internship is called a Mentor. They help them both learn in their field but also can give feedback to the LTI project they do during the rest of the school week. Students are not limited to only one internship or only one job field to pursue. The purpose of LTI and the internships is to help the student learn what they want to do in their lives.
High school
At Highline Big Picture each grade level, 9th through 12th,has its own special name. 9th graders are called 101's, 10th graders, 201's, 11th graders, 301's and 12th graders, 401's. Each grade level has two classes and each class is called an advisory. As each class goes on to the next year, all the students and teachers stay together to keep a class bond with each other.
Middle school
Highline Big Picture also hosts a middle school, which they call them selves Middle Earth. The school offers 6th grade through 8th grades with classes consisting of 20 students and one teacher. The middle school currently has 75 students. The middle school is project-based and students have the opportunity to subsidize classroom instruction with frequent whole-class field trips to various locations throughout the greater Seattle area.
References
http://www.bigpicture.org
https://web.archive.org/web/20090220003455/http://hsd401.org/ourschools/highschools/bigpicture/
High schools in King County, Washington
Public high schools in Washington (state)
Educational institutions established in 2005
2005 establishments in England |
https://en.wikipedia.org/wiki/World%20Day%20Against%20Cyber%20Censorship | World Day Against Cyber Censorship is an online event held each year on March 12 to draw attention to the ways that governments around the world are deterring and censoring free speech online. The day was first observed on 12 March 2008 at the request of Reporters Without Borders and Amnesty International. A letter written by Jean-François Julliard, Secretary-General of Reporters Without Borders, and Larry Cox, Executive Director of Amnesty International, was sent to the Chief Executive Officers of Google, Yahoo!, Inc., and Microsoft Corporation to request observation of the day.
The annual event is symbolized by a logo created by Reporters Without Borders consisting of a computer mouse breaking free from a chain.
Netizen Prize
On World Day Against Cyber Censorship, Reporters Without Borders awards an annual Netizen Prize that recognizes an Internet user, blogger, cyber-dissident, or group who has made a notable contribution to the defense of online freedom of expression. Starting in 2010 the prize has been awarded to:
2010: Iranian women's rights activists of the Change for Equality website, www.we-change.org.
2011: the founders of a Tunisian blogging group named Nawaat.org.
2012: Syrian citizen journalists and activists of the Media center of the Local Coordination Committees.
2013: Vietnamese blogger Huynh Ngoc Chenh.
2014: Saudi Arabian blogger Raif Badawi.
Enemies of the Internet list
In conjunction with World Day Against Cyber Censorship, Reporters Without Borders updates its Enemies of the Internet and Countries Under Surveillance lists.
See also
Internet censorship
Internet censorship and surveillance by country
Reporters Without Borders
References
External links
"Privacy is for the powerless." Edward Snowden, at Amnesty International, March 2016
International observances
Internet censorship
Freedom of the press
March observances
2008 introductions |
https://en.wikipedia.org/wiki/Mpozo | Mpozo is a town in the Bas-Congo province of the Democratic Republic of the Congo near the border with Angola.
Transport
The town is served by a railway station on the national network.
See also
Railway stations in DRCongo
References
Populated places in Kongo Central |
https://en.wikipedia.org/wiki/List%20of%20Soviet%20films%20of%201930 | A list of films produced in the Soviet Union in 1930 (see 1930 in film).
1930
See also
1930 in the Soviet Union
External links
Soviet films of 1930 at the Internet Movie Database
1930
Soviet
Films |
https://en.wikipedia.org/wiki/List%20of%20Soviet%20films%20of%201931 | A list of films released in the Soviet Union in 1931 (see 1931 in film).
See also
1931 in the Soviet Union
External links
Soviet films of 1931 at the Internet Movie Database
1931
Soviet
Films |
https://en.wikipedia.org/wiki/List%20of%20Soviet%20films%20of%201932 | A list of films produced in the Soviet Union in 1932 (see 1932 in film).
1932
See also
1932 in the Soviet Union
External links
Soviet films of 1932 at the Internet Movie Database
1932
Soviet
Films |
https://en.wikipedia.org/wiki/List%20of%20Soviet%20films%20of%201933 | A list of films produced in the Soviet Union in 1933 (see 1933 in film).
1933
See also
1933 in the Soviet Union
External links
Soviet films of 1933 at the Internet Movie Database
1933
Soviet
Films |
https://en.wikipedia.org/wiki/List%20of%20Soviet%20films%20of%201934 | A list of films produced in the Soviet Union in 1934 (see 1934 in film).
1934
See also
1934 in the Soviet Union
External links
Soviet films of 1934 at the Internet Movie Database
1934
Soviet
Films |
https://en.wikipedia.org/wiki/List%20of%20Soviet%20films%20of%201935 | A list of films produced in the Soviet Union in 1935 (see 1935 in film).
1935
See also
1935 in the Soviet Union
External links
Soviet films of 1935 at the Internet Movie Database
1935
Soviet
Films |
https://en.wikipedia.org/wiki/List%20of%20Soviet%20films%20of%201939 | A list of films produced in the Soviet Union in 1939 (see 1939 in film).
1939
See also
1939 in the Soviet Union
External links
Soviet films of 1939 at the Internet Movie Database
1939
Soviet
Films |
https://en.wikipedia.org/wiki/List%20of%20Soviet%20films%20of%201938 | A list of films produced in the Soviet Union in 1938 (see 1938 in film).
1938
See also
1938 in the Soviet Union
External links
Soviet films of 1938 at the Internet Movie Database
1938
Soviet
Films |
https://en.wikipedia.org/wiki/List%20of%20Soviet%20films%20of%201937 | A list of films produced in the Soviet Union in 1937 (see 1937 in film).
1937
See also
1937 in the Soviet Union
External links
Soviet films of 1937 at the Internet Movie Database
1937
Soviet
Films |
https://en.wikipedia.org/wiki/List%20of%20Soviet%20films%20of%201936 | A list of films produced in the Soviet Union in 1936 (see 1936 in film).
1936
See also
1936 in the Soviet Union
External links
Soviet films of 1936 at the Internet Movie Database
1936
Soviet
Films |
https://en.wikipedia.org/wiki/Fukui%20Broadcasting | is a TV station, established 1 June 1960, affiliated with Nippon News Network (NNN), Nippon Television Network System (NNS) and All-Nippon News Network (ANN) (since 1989) in Fukui, Fukui. It broadcasts in Fukui Prefecture.
Radio
FBC AM Radio
Fukui 864 kHz JOPR
Tsuruga 1557 kHz
Obama 1557 kHz
FBC FM Radio
Fukui 94.6 MHz
Tsuruga 93.6 MHz
Obama 94.6 MHz
TV channel
Digital Television
Fukui JOPR-DTV 20ch 1 kW
Tandem office
Ōno 42ch 10W
Katsuyama 28ch 3W
Tsuruga 28ch 10W
Obama 47ch 10W
Mihama 28ch 10W
Kaminaka 35ch 3W
Mikuni 30ch 3W
Sabae-kawada 44ch 1W
Takefu-minami 36ch 1W
Program
References
External links
The official website of Fukui Broadcasting
Nippon News Network
All-Nippon News Network
Television stations in Japan
Mass media in Fukui (city)
Television channels and stations established in 1960
Mass media companies established in 1960
Companies based in Fukui Prefecture
1960 establishments in Japan |
https://en.wikipedia.org/wiki/Bakwa-Kasanga | Bakwa-Kasanga is a town in central Democratic Republic of the Congo.
Transport
The town is served by a station on the national railway network.
See also
List of railway stations in the Democratic Republic of the Congo
References
Geography of the Democratic Republic of the Congo |
https://en.wikipedia.org/wiki/Master%20of%20European%20Design | Master of European Design (MEDes) is a unique degree programme within a network of seven leading design schools in Europe.
The structure of the programme
During the five-year programme, students experience three design education systems and join a strong international community. The location diversity provides insight into design approaches, multi-national perspectives and creates sensitivity towards cultural differences.
In the first and second year, the students study at their home universities
The third year is spent at one of the international partner universities
At the end of third year, the students submit their BA theses to their home university.
The fourth year is spent at a second partner university
For the fifth - final year - the students return to their home universities to complete their Master theses.
During the two years abroad the students follow the curricular content offered by the programme of the respective partner university. This results in each student acquiring a unique skill set and combination of projects. The studies abroad take place in English or in the respective national language.
The seven European Design partner institutions
Glasgow School of Art, Glasgow, United Kingdom
Aalto School of Art and Design, Helsinki, Finland
Politecnico di Milano, Milan, Italy
ENSCI-Les Ateliers, Paris, France
Konstfack, Stockholm, Sweden
Köln International School of Design, Cologne, Germany
University of Aveiro, Aveiro, Portugal
Previous partners
Staatliche Akademie der Bildenden Künste Stuttgart
References
Sources
Official Homepage
Description of MEDes on Köln International School of Design Homepage
Description of MEDes on the ENSCI Homepage
Description of MEDes on the Politecnico di Milano Homepage
An Article about MEDes on core77 Design blog
MEDes on cumulusassociation.org
External links
Official Website of the Master of European Design Programme (MEDes)
Glasgow School of Art, GB-Glasgow
University of Art and Design, FI-Helsinki
Politecnico di Milano, I-Mailand
ENSCI-Les Ateliers, F-Paris
Konstfack, SE-Stockholm
Staatliche Akademie der bildenden Künste, D-Stuttgart
Köln International School of Design, D-Köln
Master's degrees |
https://en.wikipedia.org/wiki/PacketFence | PacketFence is an open-source network access control (NAC) system which provides the following features: registration, detection of abnormal network activities, proactive vulnerability scans, isolation of problematic devices, remediation through a captive portal, 802.1X, wireless integration and User-Agent / DHCP fingerprinting.
The company that develops PacketFence, Inverse Inc. was acquired by Akamai Technologies on February 1, 2021.
PacketFence version 10 supports Red Hat Enterprise Linux 7 and its derivatives, notably CentOS, and Debian Stretch. Inverse Inc. has also been releasing a version of PacketFence dubbed the "Zero Effort NAC", which is a standalone Virtual Appliance that is preconfigured installation of PacketFence, making it easier than ever to deploy a NAC in your environment.
PacketFence version 11 added support for Red Hat Enterprise Linux 8 and it's derivatives, notably CentOS, and Debian Bullseye.
Further reading
External links
PacketFence website
PacketFence on GitHub
References
FLOSS Weekly 155: PacketFence, at the FLOSS Weekly podcast, March 2, 2011, retrieved March 3, 2011.
Internet Protocol based network software
Computer network security
Free network management software |
https://en.wikipedia.org/wiki/Virtual%20prototyping | Virtual prototyping is a method in the process of product development. It involves using computer-aided design (CAD), computer-automated design (CAutoD) and computer-aided engineering (CAE) software to validate a design before committing to making a physical prototype. This is done by creating (usually 3D) computer generated geometrical shapes (parts) and either combining them into an "assembly" and testing different mechanical motions, fit and function. The assembly or individual parts could be opened in CAE software to simulate the behavior of the product in the real world.
Background
The product design and development process used to rely primarily on engineers' experience and judgment in producing an initial concept design. A physical prototype was then constructed and tested in order to evaluate its performance. Without any way to evaluate its performance in advance, the initial prototype was highly unlikely to meet expectations. Engineers usually had to re-design the initial concept multiple times to address weaknesses that were revealed in physical testing.
Move towards virtual prototypes
Today, manufacturers are under pressure to reduce time to market and optimize products to higher levels of performance and reliability. A much higher number of products are being developed in the form of virtual prototypes in which engineering simulation software is used to predict performance prior to constructing physical prototypes. Engineers can quickly explore the performance of thousands of design alternatives without investing the time and money required to build physical prototypes. The ability to explore a wide range of design alternatives leads to improvements in performance and design quality. Yet the time required to bring the product to market is usually reduced substantially because virtual prototypes can be produced much faster than physical prototypes.
End-to-end prototyping
End-to-end prototyping accounts fully for how a product or a component is manufactured and assembled, and it links the consequences of those processes to performance. Early availability of such physically realistic virtual prototypes allows testing and performance confirmation to take place as design decisions are made; enabling the acceleration of the design activity and providing more insight on the relationship between manufacturing and performance than can be achieved by building and testing physical prototypes. The benefits include reduced costs in both design and manufacturing as physical prototyping and testing is dramatically reduced/eliminated and lean but robust manufacturing processes are selected.
Effects
The research firm Aberdeen Group reports that best-in-class manufacturers, who make extensive use of simulation early in the design process, hit revenue, cost, and launch date and quality targets for 86% or more of their products. Best-in-class manufacturers of the most complex products get to market 158 days earlier with $1.9 million lower costs than |
https://en.wikipedia.org/wiki/Scott%20Reuben | Scott S. Reuben (born 1958) is an American anesthesiologist who falsified data heralding the benefits of the Pfizer pain medication Celebrex while downplaying its negative side effects.
He was Professor of Anesthesiology and Pain Medicine at Tufts University in Boston, Massachusetts and chief of acute pain at Baystate Medical Center in Springfield, Massachusetts from February 1991 until 2009 when he was sentenced to prison for healthcare fraud. Reuben was considered to be a prolific and influential researcher in pain management, and his purported findings altered the way millions of patients are treated for pain during and after orthopedic surgeries. Reuben has now admitted that he never conducted any of the clinical trials on which his conclusions were based "in what may be considered the longest-running and widest-ranging cases of academic fraud." Scientific American has called Reuben the medical equivalent of Bernie Madoff, the former NASDAQ chairman who was convicted of orchestrating a $65-billion Ponzi scheme.
Background
Reuben was educated at Columbia University. He graduated from medical school at the State University of New York at Buffalo in 1985 and undertook his anesthesiology residency at Mount Sinai Medical Center in New York City.
Reuben fell under suspicion when Baystate conducted a routine audit in May 2008 which revealed that Reuben had not been given approval for two studies that he intended to present during the hospital's research week. On March 10, 2009 a Baystate spokeswoman announced that Reuben admitted to fabricating many of the data underlying his research. Reuben never conducted the clinical trials that he wrote about in 21 journal articles dating from at least 1996. In some cases, he even invented the patients. Although Reuben often co-wrote papers with other researchers, Baystate found that the other researchers did not know about or participate in Reuben's studies, and their names were forged on documents. The hospital asked the journals to retract the studies, which reported favorable results from painkillers including Pfizer Inc.'s Bextra, Celebrex and Lyrica and Merck & Co. Inc.'s Vioxx. His studies also claimed Wyeth's antidepressant Effexor could be used as a painkiller. Pfizer gave Reuben five research grants between 2002 and 2007. He was a paid member of the company's speakers bureau, giving talks about Pfizer drugs to colleagues. Reuben also wrote to the Food and Drug Administration, urging the agency not to restrict the use of many of the painkillers he studied, citing his own data on their safety and effectiveness.
"Doctors have been using (his) findings very widely," said Steven Shafer, editor of Anesthesia and Analgesia, a scientific journal that published ten articles identified as containing fraudulent data. "His findings had a huge impact on the field." He also described Reuben's actions as the biggest case of fraud in the history of anesthesiology. Fellow editor Paul White believed that Reuben |
https://en.wikipedia.org/wiki/Climate%20Data%20Record | A Climate Data Record (CDR) is a specific definition of a climate data series, developed by the Committee on Climate Data Records from NOAA Operational Satellites of the National Research Council at the request of NOAA in the context of satellite records. It is defined as "a time series of measurements of sufficient length, consistency, and continuity to determine climate variability and climate change.".
Such measurements provide an objective basis for the understanding and prediction of climate and its variability, such as global warming.
Interim Climate Data Record (ICDR)
An Interim Climate Data Record (ICDR) is a dataset that has been forward processed, using the baselined CDR algorithm and processing environment but whose consistency and continuity have not been verified. Eventually it will be necessary to perform a new reprocessing of the CDR and ICDR parts together to guarantee consistency, and the new reprocessed data record will replace the old CDR.
Fundamental Climate Data Record (FCDR)
A Fundamental Climate Data Record is a long-term data record of calibrated and quality-controlled data designed to allow the generation of homogeneous products that are accurate and stable enough for climate monitoring.
Examples of CDRs
AVHRR Pathfinder Sea Surface Temperature
GHRSST-PP Reanalysis Project, on the website for Ghrsst-pp
Snow and Ice
NOAA's Climate Data Records homepage
See also
Temperature record
References
Approach to Providing Climate Data Records (CDRs) in Coordination with other US Agency Activities, Jeffrey L. Privette, John Bates, Thomas Karl, Bruce Barkstrom, Ed Kearns, and David Markham. 2009 AMS Conference Proceedings
Climate Data Records From Environmental Satellites, Drobot et al.
Creating Climate Data Records from NOAA Operational Satellites, a NOAA White Paper
The Future of Climate Data Records
Meteorological data and networks |
https://en.wikipedia.org/wiki/Wall%20Street%20Journal%20Radio%20Network | The Wall Street Journal Radio Network was the radio arm of The Wall Street Journal, owned by Dow Jones.
The radio news service served over 400 radio stations across North America and provided various programming.
On November 12, 2014, Dow Jones announced that the Wall Street Journal Radio Network would cease operations at the close of the year. The move came after News Corporation had been split, with Dow Jones and other print publications moving to the new News Corp and broadcasting assets being spun off to 21st Century Fox (and, after that, Fox Corporation in 2019). It later became known that the network had been blacklisted because most of its affiliates carried conservative talk radio shows that were the subject of advertiser boycotts, and advertisers were unwilling to advertise on the network because of the chance that their barter commercials might air during one of the blacklisted shows.
Programs
The Wall Street Journal Report
The Dow Jones Money Report
Watching Your Wallet
Barron's on Investment
The Wall Street Journal This Morning
The Wall Street Journal This Weekend
The Sports Retort
References
External links
WSJ Radio
WSJ This Morning
Defunct radio networks in the United States
Radio Network
Dow Jones & Company
Radio stations disestablished in 2014 |
https://en.wikipedia.org/wiki/NATO%20Science%2C%20Technology%20and%20Research%20Network | The NATO Science, Technology and Research Network (STARNET) was developed to deal with the vast and rapidly growing amount of data relevant and vital to the success of the research and development process and the overall advancement and enhancement of technology innovation and development.
The STARNET facilitates access to World Wide Web resources and information elements in terms of science, technology, and overall research. STARNET provides a virtual library; a "one-stop" source for policy makers, program managers, scientists, engineers, researchers and others for relevant information resources.
Introduction
The vast and rapidly growing amount of scientific and technical data and information concerning the diffusion of technology and innovation has increased pressure on organizations to push forward with their own technological developments and to take steps to maximize their inclusion into the research and development (R&D) process. This massive collection of data is vital to scientists, engineers, program managers, policy analysts, resource managers, and others. Access and communication to this information are central to the success of the innovation process in general and the management of R&D activities in particular.
In addressing this problem within NATO, the Information Management Committee (IMC) of the NATO Research and Technology Organization (RTO) developed the Science, Technology and Research Network (STARNET). The purpose of this network is to facilitate access to information elements already existing worldwide in terms of science, technology, and overall research.
STARNET is a database of Web-based data sources designed to facilitate access by providing comprehensive and sophisticated searches to worldwide science, technology, and research information. STARNET is unique in that it provides a searchable database of Web-based information resources relevant to nine scientific or thematic nodes.
STARNET provides a value added resource; it filters the vast amount of information available on the World Wide Web to significantly improve the identification, delivery, and quality of needed information.
Content submission of pertinent web resources is provided by NATO countries and by STARNET users’ nominations. A central NATO managing agent, the NATO Research and Technology Agency (RTA), maintains STARNET, assisted by IMC members to provide quality control and assure links to appropriate content.
Each Web resource is evaluated for content and substance, and then cataloged into the appropriate STARNET node. Each node has specific topics assigned, and each node has its own inventory of selected web-available information resources based on relevance to the topics assigned to that node.
STARNET has been designed as a system that can be adapted to address specific information needs as they arise within the NATO community.
STARNET also provides a News and Events page pertinent to each Node, which provides a listing of conferences, me |
https://en.wikipedia.org/wiki/Nanopunk | Nanopunk refers to an emerging subgenre of science fiction that is still very much in its infancy in comparison to its ancestor-genre, cyberpunk, and some of its other derivatives.
The genre is especially similar to biopunk, but describes a world where nanites and bio-nanotechnologies are widely in use and nanotechnologies are the predominant technological forces in society.
Currently the genre is mainly concerned with the artistic, psychological, and societal impact of nanotechnology, rather than aspects of the technology which itself is still in its infancy. Unlike cyberpunk, which can be distinguished by a gritty and low-life yet technologically advanced character, nanopunk can have a darker dystopian character that might examine potential risks by nanotechnology as well as a more optimistic outlook that might emphasize potential uses of nanotechnology.
Comics
M. Rex (1999) features nanites as the source of power for the title character.
Scooby Apocalypse (2016–2019) reveals early on that a nanite virus originating from Velma's 'Elysium Project' experiment is the reason behind people becoming monsters.
Literature
Kathleen Ann Goonan (Queen City Jazz – 1997) and Linda Nagata were some of the earliest writers to feature nanotech as the primary element in their work.
Another example of this genre is Neal Stephenson's The Diamond Age. Some novels of Stanislaw Lem, including Weapon System of the Twenty First Century or The Upside-down Evolution, The Invincible and Peace on Earth as well as Greg Bear's Blood Music could also be considered precursors of nanopunk.
Another example is the Michael Crichton novel Prey (2002). Another of Crichton's novels, Micro (2011), could also be an example, but it focuses more on the idea of size-manipulation/shrinking of objects rather than nanotechnology. More recently, Nathan McGrath's Nanopunk (2013) is set in an icebound near-future where almost half the world's population has been wiped out. Alister, a child when "The Big Freeze" began is now a teenager in a society slowly finding its feet. Unaware of his nano-infection he sets out to find his lost sister and is joined by Suzie, a militant cyber-activist. Their hacking attracts the attention of Secret Services and a ruthless private military corporation and their search becomes a deadly race for survival.
Linda Nagata's Tech Heaven (1995) is a futuristic thriller about Katie, a woman whose husband is about to die of injuries sustained in a helicopter crash. Instead of dying, he gets his body cryogenically preserved so that he can be reawakened when med-tech is advanced enough to heal him. The problem is that it winds up taking far more than the estimated few years for this to happen.
Alastair Reynolds' Chasm City could also be considered nanopunk.
Film and television
Film
Honey, I Shrunk the Kids (1989 film)
Osmosis Jones (2001 film)
The Day the Earth Stood Still (2008 film)
G.I. Joe: The Rise of Cobra (2009 film)
Transcendence (2014 film)
Ant-Man (201 |
https://en.wikipedia.org/wiki/Steve%20Richardson%20%28puzzle%20designer%29 | Steve Richardson is an American puzzle creator and founder of Stave Puzzles.
Early life
Steve Richardson was formerly a student of math and computer science (BA Colby, MBA University of Michigan). He lived with his wife in New Jersey until 1969 when they moved to Vermont. Soon after arriving in Vermont, Richardson started a game design business with artist Dave Tibbetts.
Stave Puzzles
Stave Puzzles was born in 1974 when a client offered $300 for a wooden jigsaw puzzle and Richardson and Tibbetts jumped at the opportunity. Richardson and Tibbetts combined their first names to form the name ‘Stave’. In 1976 Richardson bought out Tibbetts for $1 and a jigsaw. Richardson adopted the title ‘Chief Tormentor’ in 1978 and in the following years begin to receive national attention for his innovative puzzle designs. Clients of Richardson's designs include Bill Gates, Barbara Bush, and the Queen of the United Kingdom. "We have a sadomasochistic relationship with our customers," says Richardson.
As a puzzle innovator, Richardson is credited with inventing the "Phony Corner" (a corner that's not a corner) and the "Whammy Edge" (edge pieces that abut rather than interlock). Richardson carries on a long tradition of wood puzzle manufacturers that includes names such as Par, Straus, and Parker Brothers (as Pastime Puzzles). Richardson's puzzles never include a picture of the puzzle with the box and many puzzles contain hidden messages, custom shaped pieces, and even extra pieces that do not fit into the puzzle.
Richardson "prides himself on his company's high-quality products and attentive customer service".
References
External links
Official Stave Puzzles Website
Stave Puzzles User Community
Puzzle designers
People from Windsor County, Vermont
Ross School of Business alumni
Living people
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/Self-similarity%20matrix | In data analysis, the self-similarity matrix is a graphical representation of similar sequences in a data series.
Similarity can be explained by different measures, like spatial distance (distance matrix), correlation, or comparison of local histograms or spectral properties (e.g. IXEGRAM). This technique is also applied for the search of a given pattern in a long data series as in gene matching. A similarity plot can be the starting point for dot plots or recurrence plots.
Definition
To construct a self-similarity matrix, one first transforms a data series into an ordered sequence of feature vectors , where each vector describes the relevant features of a data series in a given local interval. Then the self-similarity matrix is formed by computing the similarity of pairs of feature vectors
where is a function measuring the similarity of the two vectors, for instance, the inner product . Then similar segments of feature vectors will show up as path of high similarity along diagonals of the matrix.
Similarity plots are used for action recognition that is invariant to point of view
and for audio segmentation using spectral clustering of the self-similarity matrix.
Example
See also
Recurrence plot
Distance matrix
Similarity matrix
Substitution matrix
Dot plot (bioinformatics)
References
Further reading
External links
http://www.recurrence-plot.tk/related_methods.php
Statistical charts and diagrams
Visualization (graphics) |
https://en.wikipedia.org/wiki/Economy%20of%20Oklahoma | The economy of Oklahoma is the 29th largest in the United States. Oklahoma's gross state product (GSP) is approximately $197.2 billion as of December 2018.
Data
Historical data
The history of Oklahoma's GSP according to the Bureau of Economic Analysis and the United States Census Bureau
GSP by industry
Industries value added to Oklahoma GDP in Q1 2020. Sectors percentages are compared to sector percentages of United States GDP.
Employment
There were approximately 1.8 million in the Oklahoma labor force in 2018. The private sector employs 90% of working Oklahomans, with the government (federal, state, and local) employing 9%. The largest employer in the state is the United States Department of Defense, which employs approximately 69,000 workers or 3.8% of all working Oklahomans. The largest private employer is Walmart, which employs approximately 32,000 workers or 1.8% of all working Oklahomans.
As of 2019, the top 20 employers in the State of Oklahoma were:
Taxes
See also
List of US state economies
List of Oklahoma counties by per capita income
List of Oklahoma counties by socioeconomic factors
References
Notes
Agriculture Sector includes establishments primarily engaged in growing crops, raising animals, harvesting timber, harvesting fish and other animals from a farm, ranch or their natural habitats
Mining Sector includes exploration and development of minerals, including solids such as coal and ores, liquids such as crude petroleum, and gases such as natural gas
Construction Sector comprises establishments primarily engaged in the construction of buildings or engineering projects
Manufacturing Sector includes establishments engaged in the mechanical, physical, or chemical transformation of materials, substances, or components into new products
Trade, Transportation, and Utitlies Sector includes wholesaling of merchandise, retailing of merchandise, passenger and freight transit, storage and warehousing of goods, and public utilities services
Information Sector concerns publishing industries, including software publishing, motion picture and sound publishing, broadcast industries, telecommunications, and Internet service providers
Finance Sector comprises establishment engaged in financial transactions, including banking, securities, insurance, and investment advisory services
Professional Sector comprises establishments that specialize in performing professional, scientific, and technical activities for others
Education and Healthcare Sector comprises schools, colleges, universities, and training centers as well as establishments providing health care and social assistance for individuals
Entertainment Sector includes establishments that operate facilities or provide services to meet varied cultural, entertainment, and recreational interests of their patrons, such as live performances, historical exhibits, and recreationally facilities
The Other Sector includes establishments which provide services not specifically provided for |
https://en.wikipedia.org/wiki/GnuCOBOL | GnuCOBOL (formerly OpenCOBOL, and for a short time known as GNU Cobol) is a free implementation of the COBOL programming language. GnuCOBOL is a transcompiler to C which uses a native C compiler. Originally designed by Keisuke Nishida, the lead development was taken up by Roger While. The most recent developments are now led by Simon Sobisch, Ron Norman, Edward Hart, Sergey Kashyrin and many others.
History
While working with Rildo Pragana on TinyCOBOL, Keisuke Nishida decided to attempt a COBOL compiler suitable for integration with GCC. This soon became the OpenCOBOL project. Nishida worked as the lead developer until 2005 and version 0.31. Roger While then took over as lead and released OpenCOBOL 1.0 on 27 December 2007. Work on the OpenCOBOL 1.1 pre-release continued until February 2009. In May 2012, active development was moved to SourceForge, and the pre-release of February 2009 was marked as a release. In late September 2013, OpenCOBOL was accepted as a GNU Project, renamed to GNU Cobol, and then finally to GnuCOBOL in September 2014. Ron Norman has added a Report Writer module as a branch of GnuCobol 2.0, and Sergey Kashyrin has developed a version that uses C++ intermediates instead of C.
Transfer of copyrights to the Free Software Foundation over GnuCOBOL source code (including versions with GNU Cobol and OpenCOBOL spellings) was finalized on 17 June 2015.
The latest current release is v3.2, which dropped on 28 July 2023.
Philosophy
While striving to keep in line with COBOL Standards up to the current COBOL 2014 specification, and also to include features common in existing compilers, the developers do not claim any level of standards conformance. Even so, the 2.2 final release passes over 9,688 (99.79%) of the tests included in the NIST COBOL 85 test suite, out of 9,708 (as 20 are deleted).
GnuCOBOL translates a COBOL program (source code) into a C program. The C program can then be compiled into the actual code used by the computer (object code) or into a library where other programs can call (link to) it. Under UNIX and similar operating systems (such as Linux), the GNU C compiler is used. For Windows, Microsoft’s Visual Studio Express package provides the C compiler. The two step compilation is usually performed by a single command, but an option exists to allow the programmer to stop compilation after the C code has been generated.
Documentation
The opencobol.org site was the official home of the development team from 2002 until 2012, and was the best source of upstream development information. However, all recent developments are now taking place within a SourceForge project space at GnuCOBOL.
The GnuCOBOL Programmer's Guide, by Gary Cutler, was published under the GNU Free Documentation License. It has been updated to include GnuCOBOL with Report Writer and is listed in the GnuCOBOL documentation overview page with latest versions in the code tree. It is maintained by Vincent Coen and others as each new compiler version |
https://en.wikipedia.org/wiki/K.M.%20Chandy | K. Mani Chandy may refer to:
K. Mani Chandy (born 1944), American computer scientist
K.M. Chandy (politician) (1921–1998), Indian politician |
https://en.wikipedia.org/wiki/Transportation%20in%20Colorado | Colorado's transportation consists of a network of highway, surface street, rail, and air options. While the public transportation system in Denver is much more complex and developed than other parts of the state, tourism and growth have led to extensive needs statewide.
Roads and highways
Colorado is a landlocked state, so ground and air transportation are the primary focus of the state. Also, due to low population density outside the Denver and Colorado Springs metropolitan areas, highways are the primary transportation method for most residents.
State highways
The main north–south route in Colorado is Interstate 25 (I-25). The I-25 corridor follows the front range of the Colorado Rockies and connects Denver, Colorado Springs, Pueblo, Fort Collins, Greeley, Trinidad, and other small cities. I-70 crosses Colorado from west to east and is a primary viaduct for tourists and locals to visit mountain communities. When it was completed, the section of I-70 passing through Glenwood Canyon was the most expensive section of Interstate Highway ever built in the United States with a total cost of $490 million for the stretch.
Due to winter weather conditions, sections of I-70 are regularly closed during the winter and are expensive to maintain.
Colorado maintains state highways for high-volume travel routes that not part of the two national systems..
Safety
In 2011, Colorado ranked among the five deadliest states for debris/litter–caused vehicle accidents per total number of registered vehicles and population size. Figures derived from the National Highway Traffic Safety Administration (NHTSA) show at least 16 persons in Colorado were killed each year in motor vehicle collisions with non-fixed objects, including debris, dumped litter, animals, and their carcasses.
In the United States, including Colorado, most civil aviation incidents are investigated by the National Transportation Safety Board (NTSB), as well as the Colorado Bureau of Investigation (CBI). When investigating an aviation disaster, NTSB investigators piece together evidence from the crash and determine the likely cause(s), whereas the CBI will also investigate if there is any involved criminal actions.
Buses and mass transit
Denver's Regional Transportation District, known locally as RTD, is the largest public transportation system in Colorado. The RTD system provides bus, light rail, and commuter rail transportation services in the majority of the Denver-Aurora-Boulder Combined Statistical Area. Through its FasTracks initiative, RTD is working to rapidly build light rail and bus rapid transit.
Other transportation services exist throughout the state. Some systems, such as in Colorado Springs, focus on the local area. Other systems, such as that found on the Western Slope connecting Glenwood Springs, Aspen, and Carbondale offer regional connections. Intercity bus service is provided by a number of carriers including Burlington Trailways, Bustang, Express Arrow, and Greyhound Lin |
https://en.wikipedia.org/wiki/Transportation%20in%20Hawaii | The transportation system of Hawaii is a cooperation of complex systems of infrastructure.
Background
Transit systems
Rail
At one time, Hawaii had a network of railroads on each of the larger islands that helped move farm commodities as well as passengers. These railroads were all narrow gauge for the majority although there were some gauge on some of the smaller islands – standard US gauge is ). The largest by far was the Oahu Railway and Land Company (OR&L) which ran multiple lines from Honolulu across the western and northern part of Oahu. The OR&L was an important player moving troops and goods during World War II. Traffic on this line was busy enough that there were signals on the lines facilitating movement of trains and wigwag signals at some railroad crossings for the protection of motorists. The mainline was officially abandoned in 1947, although part of it was bought by the US Navy and operated until 1970. Thirteen miles (21 km) of track remain and preservationists occasionally run trains over a portion of this line.
Honolulu sought to initiate a rail transit system as early as the 1960s. By the mid 2000s, studies had finally been conducted and a light metro line was planned for the city's western suburbs. Construction started in 2011 and was set back by various delays until Skyline opened to service in 2023.
Bus
Each major island has a public bus system.
Roads and freeways
A system of state highways encircles each main island. Only Oahu has federal highways and is the only area outside the contiguous 48 states to have signed Interstate highways. Travel can be slow due to narrow winding roads, and congestion in cities.
Bridges and tunnels
Admiral Clarey Bridge, also known as the Ford Island Bridge, is a floating concrete drawbridge providing access to Ford Island, a United States Navy installation situated in the middle of Pearl Harbor. The causeway bridge was completed and opened in 1998, named the Admiral Clarey Bridge after former Admiral Bernard A. Clarey. The bridge has a total length of , including a pontoon section that can be retracted to allow water traffic to pass through.
Hospital Rock Tunnels are a small pair of highway tunnels passing through a ridge on the edge of the Ko‘olau Range on the island of O‘ahu, Hawaiʻi, USA. The tunnels are located on Interstate H-3, which connects Kaneohe with Interstate H-1 at Hālawa near Pearl Harbor, and are long Kaneohe bound and long Halawa bound. The tunnels are "cut and cover" tunnels.
John H. Wilson Tunnels are a pair of highway tunnels passing through the Ko‘olau Range on the island of O‘ahu. The tunnels are located on Likelike Highway (Route 63), which connects Kāneʻohe with Honolulu, and are 2775 feet (845.8 m) long westbound and 2813 feet (857.4 m) long eastbound.
Nu‘uanu Pali Tunnels are a set of four highway tunnels (two in each direction) on the Pali Highway (Hawaii State Highway 61) which pass through the Nuuanu Pali. These tunnels serve as one of three t |
https://en.wikipedia.org/wiki/Cormorant%20Network | The Cormorant Communications Network is a military wide area communications network implemented by the British Army sometime around 2000. It has also been adopted by certain Royal Air Force units in limited deployments.
Role
The network provides end-to-end wide area communications using the same Asynchronous Transfer Mode protocol that underpins many late-20th Century civilian telecommunications networks. It supports voice traffic routed over IP (although this is distinct from Internet VoIP) and can also support IPv4 and IPv6 BTDS traffic.
Criticisms
On 10 September 2009 the MoD announced that the system was to be withdrawn from service in Afghanistan and replaced with a system from Israel called Radwin .
References
British military radio
British Army equipment |
https://en.wikipedia.org/wiki/HyMap | HyMap is an airborne hyperspectral imaging sensor that was developed in Australia and is manufactured by Integrated Spectronics. HyMap data has 126 spectral bands spanning the wavelength interval 0.45–2.5 μm, and 5 metres spatial resolution. It is one of the few hyperspectral sensors that has been commercially deployed, and is thus the subject of a great deal of research in the earth observation field at present.
References
Image sensors |
https://en.wikipedia.org/wiki/Balcan | Balcan is a surname. Notable persons with that name include:
George Balcan (19322004), Canadian radio broadcaster and artist
Maria-Florina Balcan, Romanian-American computer scientist
Vural Balcan (), Turkish fencer who competed at the 1948 Summer Olympics
See also
Balkan (disambiguation)
Turkish-language surnames |
https://en.wikipedia.org/wiki/Smail | Smail-3 is a mail transfer agent (MTA) used on Unix-like operating systems. It is Free Software and is licensed under the GNU GPL. It aims to be a general and flexible mailer with extensive facilities for checking incoming e-mail and for routing between disparate networks. It is still in use on the Internet, but it has been mostly superseded by Exim (which was originally based on Smail) and other more modern mail transfer agents.
Smail-3 still follows a monolithic design model where a single binary controls the core facilities of the MTA. This type of monolithic design is generally considered to be inherently less secure, largely because the whole program normally runs with full system privileges at all times. Nevertheless, Smail's security record has been fairly clean, and has only been the subject of one BUGTRAQ advisory. It was designed with security as a primary goal and makes use of several key safe coding practices to avoid some of the most common pitfalls of similar large programs written in C.
References
External links
Weird.com, Smail-3 Internet Mailer
Message transfer agents
Free email server software
Free email software
Cross-platform software |
https://en.wikipedia.org/wiki/Spatial%20Data%20File | The Spatial Data File (SDF) is a single-user geodatabase file format developed by Autodesk. The file format is the native spatial data storage format for Autodesk GIS programs MapGuide and AutoCAD Map 3D. SDF format version SDF3 (based on SQLite3) uses a single file. Prior versions of the format required a spatial index file (SIF), with an optional key index file (KIF) to speed access to the file.
The SDF file format can be created and manipulated using an OSGeo FDO Provider for SDF, which is open-source software. Beyond Autodesk's products, products that can read/write the format include FME from Safe Software, Fdo2Fdo, and the FdoToolbox.
The SDF format design uses low-level storage components of SQLite using a flat binary serialization (binary large objects). However, the relational aspects are not present, thus the format cannot be opened with any software designed specifically for SQLite. The format supports multiple feature classes per file and multiple geometry properties per feature class. Each geometry property is indexed using an R-tree. It is optimized for fast spatial reading of large datasets in scenarios involving a single writer and multiple readers.
References
External links
SDF Loader provided by Autodesk to convert from Shapefiles and other formats
Spatial Manager Desktop, Spatial Manager for AutoCAD and Spatial Manager for BricsCAD can read and write SDF files and other formats
Autodesk
GIS file formats |
https://en.wikipedia.org/wiki/Toyama%20Television | is a TV station affiliated with Fuji News Network (FNN) and Fuji Network System (FNS) in Toyama, Toyama. It is broadcast in Toyama Prefecture. Established in 1969, the station was branded as T34 until December 31, 1993.
TV channel
Digital Television
Toyama 28ch JOTH-DTV
Tandem office
Fukumitsu 58ch
Unazuki 50ch
Takaoka-Futagami 40ch
Hosoiri 40ch
Ōyama-omi 40ch
Program
External links
The official website of Toyama Television
Fuji News Network
Television stations in Japan
Television channels and stations established in 1969
Mass media in Toyama (city) |
https://en.wikipedia.org/wiki/Interpenetrating%20polymer%20network | An Interpenetrating polymer network (IPN) is a polymer comprising two or more networks which are at least partially interlaced on a polymer scale but not covalently bonded to each other. The network cannot be separated unless chemical bonds are broken.
The two or more networks can be envisioned to be entangled in such a way that they are concatenated and cannot be pulled apart, but not bonded to each other by any chemical bond.
Simply mixing two or more polymers does not create an interpenetrating polymer network (polymer blend), nor does creating a polymer network out of more than one kind of monomers which are bonded to each other to form one network (heteropolymer or copolymer).
There are semi-interpenetrating polymer networks (SIPN) and pseudo-interpenetrating polymer networks.
To prepare IPNs and SIPNs, the different components are formed simultaneously or sequentially.
History
The first known IPN was a combination of phenol-formaldehyde resin with vulcanized natural rubber made by Jonas Aylsworth in 1914. However, this was before Staudinger's hypothesis on macromolecules and thus the terms "polymer" or "IPN" were not yet used. The first usage of the term "interpenetrating polymer networks" was first introduced by J.R. Millar in 1960 while discussing networks of sulfonated and unsulfonated styrene–divinylbenzene copolymers.
Mechanical Properties
Molecular intermixing tends to broaden the glass transition regions of some IPN materials compared to their component polymers. This unique characteristic provides excellent mechanical damping properties over a wide range of temperatures and frequencies due to a relatively constant and high phase angle. In IPNs composed of both rubbery and glassy polymers, considerable toughening is observed compared to the constituent polymers. When the glassy component forms a discrete, discontinuous phase, the elastomeric nature of the continuous rubbery phase can be preserved while increasing the overall toughness of the material and its elongation at break. On the other hand, when the glassy polymer forms a bicontinuous phase within the rubbery network, the IPN material can behave like an impact-resistant plastic.
Morphology
Most IPNs do not interpenetrate completely on a molecular scale, but rather form small dispersed or bicontinuous phase morphologies with characteristic length scales on the order of tens of nanometers. However, since these length scales are relatively small, they are often considered homogeneous on a macroscopic scale. The characteristic lengths associated with these domains often scale with the length of chains between crosslinks, and thus the morphology of the phases is often dictated by the crosslinking density of the constituent networks. The kinetics of phase separation in IPNs can arise from both nucleation and growth and spinodal decomposition mechanisms, with the former producing discrete phases akin to dispersed spheres and the latter forming bicontinuous phases akin to int |
https://en.wikipedia.org/wiki/GOAL%20agent%20programming%20language | GOAL is an agent programming language for programming cognitive agents. GOAL agents derive their choice of action from their beliefs and goals. The language provides the basic building blocks to design and implement cognitive agents by programming constructs that allow and facilitate the manipulation of an agent's beliefs and goals and to structure its decision-making. The language provides an intuitive programming framework based on common sense or practical reasoning.
Overview
The main features of GOAL include:
Declarative beliefs: Agents use a symbolic, logical language to represent the information they have, and their beliefs or knowledge about the environment they act upon in order to achieve their goals. This knowledge representation language is not fixed by GOAL but, in principle, may be varied according to the needs of the programmer.
Declarative goals: Agents may have multiple goals that specify what the agent wants to achieve at some moment in the near or distant future. Declarative goals specify a state of the environment that the agent wants to establish, they do not specify actions or procedures how to achieve such states.
Blind commitment strategy: Agents commit to their goals and drop goals only when they have been achieved. This commitment strategy, called a blind commitment strategy in the literature, is the default strategy used by GOAL agents. Cognitive agents are assumed to not have goals that they believe are already achieved, a constraint which has been built into GOAL agents by dropping a goal when it has been completely achieved.
Rule-based action selection: Agents use so-called action rules to select actions, given their beliefs and goals. Such rules may underspecify the choice of action in the sense that multiple actions may be performed at any time given the action rules of the agent. In that case, a GOAL agent will select an arbitrary enabled action for execution.
Policy-based intention modules: Agents may focus their attention and put all their efforts on achieving a subset of their goals, using a subset of their actions, using only knowledge relevant to achieving those goals. GOAL provides modules to structure action rules and knowledge dedicated to achieving specific goals. Informally, modules can be viewed as policy-based intentions in the sense of Michael Bratman.
Communication at the knowledge level: Agents may communicate with each other to exchange information, and to coordinate their actions. GOAL agents communicate using the knowledge representation language that is also used to represent their beliefs and goals.
Testing: You can also write tests for GOAL.
GOAL agent program
A GOAL agent program consists of six different sections, including the knowledge, beliefs, goals, action rules, action specifications, and percept rules, respectively. The knowledge, beliefs and goals are represented in a knowledge representation language such as Prolog, Answer set programming, SQL (or Datalog), or the Planni |
https://en.wikipedia.org/wiki/Rome%E2%80%93Formia%E2%80%93Naples%20railway | The Rome–Formia–Naples railway—also called the Rome–Naples Direttissima in Italian ("most direct")–is part of the traditional main north-south trunk line of the Italian railway network. It was opened in 1927 as a fast link as an alternative to the existing Rome–Naples via Cassino line, significantly reducing journey times. High-speed trains on the route use the parallel Rome–Naples high-speed railway, which was partially opened in December 2005, and fully in December 2009.
History
Problems with the Rome–Naples line via Cassino led to proposals for the construction of a new line nearer the coast as early as 1871. When the Papal States planned the Cassino line, it was not designed just as a direct connection with Naples, but also was intended to connect with smaller localities on the way. Partly as a result, it had a tortuous route which, especially in the valley of the Sacco River, was subject to frequent disruption by floods and landslides. The old line was built to the avoid the coastal route through the Pontine Marshes, which was still swampy and malarial. As a result, its route is hilly and in parts mountainous, creating problems for the under-powered steam locomotives of the period.
The construction of a coastal line was authorised by legislation on 29 July 1879 on condition that it was coordinated with the Terracina–Priverno and the Gaeta–Formia–Sparanise lines. The commitment was confirmed by legislation on 5 July 1882 and during the reorganisation of the Italian railways in 1885. The project was always controversial: it is supported by railway engineers such as Alfredo Cottrau but opposed by politicians such as Francesco Saverio Nitti.
The final design of the line was drafted in 1902 and approved in 1905 when responsibility for the project was assumed by Ferrovie dello Stato (the State Railways). Construction began in 1907 but was not finished until 1927 because it was necessary to dig several long tunnels, including the Monte Orso and the Vivola tunnels, both of which are about 7.5 km long.
The line was electrified at 3000 V DC in 1935. Following this, electric trains could run over the entire north-south route from Bologna to Naples.
Since 2009, when the Rome-Naples high-speed railway was opened, trains from Rome Termini have no longer operated over the Villa Literno–Napoli Gianturco railway (Naples Passante), but instead run from Villa Literno via Aversa to Napoli Centrale.
Branches
From Aversa, towards Rome by the line via Cassino line via Caserta.
From San Marcellino–Frignano towards Naples by the Cassino line via Caserta.
From Villa Literno towards Naples by the Villa Literno–Napoli Gianturco railway via Pozzuoli, Napoli Campi Flegrei, Napoli Gianturco to Salerno (partly used by Line 2 of the Naples metro).
From Formia to Gaeta, now closed. It is scheduled to reopen in 2010.
From Priverno-Fossanova to Terracina.
From Campoleone to Nettuno.
Notes
See also
List of railway lines in Italy
External links
contemporary il |
https://en.wikipedia.org/wiki/DXCC-TV | DXCC-TV, channel 10, is a television station of Philippine television network Intercontinental Broadcasting Corporation. Its studios are located on Don Apolinar Velez St., Cagayan de Oro.
Areas of coverage
Cagayan de Oro
Misamis Oriental
See also
List of Intercontinental Broadcasting Corporation channels and stations
Television stations in Cagayan de Oro
Intercontinental Broadcasting Corporation stations
Television channels and stations established in 1968 |
https://en.wikipedia.org/wiki/SDF3 | SDF3, SDF-3, Sdf3, Sdf-3 may represent:
Spatial data file 3 (SDF3)
Stromal cell-derived factor-1 (SDF-1, SDF1, Sdf1)
Stromal cell-derived factor-1 alpha (SDF-1a, SDF1a, Sdf1α)
Stromal cell-derived factor-2 (SDF-2, SDF2, Sdf2)
Stromal cell-derived factor-3 (SDF-3, SDF3, Sdf3)
Stromal cell-derived factor-4 (SDF-4, SDF4, Sdf4)
SDF-3 Pioneer Super Dimensional Fortress, a massive spaceship from the animated series Robotech
Dataflow SDF: For Free (SDF3) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.