source
stringlengths
32
199
text
stringlengths
26
3k
https://en.wikipedia.org/wiki/Television%20Niigata%20Network
is a TV station affiliated with Nippon News Network (NNN) and Nippon Television Network System (NNS) in Niigata, Niigata. It is broadcast in Niigata Prefecture. It was established on October 23, 1980 and began broadcasting from April 1, 1981. The station had been used the abbreviation TNN until 1998. TV channel Digital television Yahiko 26ch JOPI-DTV 3 kW Tandem office Takada 31ch Mikawa 45ch Tsunan-Kamigō 25ch Koide 30ch Kanose 26ch Itoigawa-Ōno 25ch Tsunan 25ch Tsugawa 45ch Ryōtsu 37ch Aikawa 32ch Yamato 36ch Takachi 26ch Arai 47ch Murakami 31ch Sotokaifu 32ch Yuzawa 26ch Tsunan-Tanaka 26ch Itoigawa-Hayakawa 36ch Sumon 36ch Muramatsu 45ch Sekikawa 47ch Tochio 47ch Muikamachi 36ch Myōkōkōgen 47ch Ōmi 32ch Takayanagi 39ch Kawaguchi 26ch Program Syndicated shows from the TX Network: Pokémon Naruto Dawn of Nikkei Gaia Special Hayate no Gotoku D.Gray-man (season 1) the Drama 24 anthology KIRA KIRA AFRO (only season 1 was transmitted, produced by TV Osaka) External links The official website of Television Niigata Network Company Profile Nippon News Network Television stations in Japan Television channels and stations established in 1981 Mass media in Niigata (city) Companies based in Niigata Prefecture
https://en.wikipedia.org/wiki/Samsung%20NC20
The Samsung NC20 is a subnotebook / Netbook computer designed by Samsung. At the time of its introduction, (February 2009, while in the U.S.A. was on March 2009), it was the first mainstream netbook to use the VIA Nano processor and the first to support the x86-64 instruction set. The 12.1" screen size is larger than typical for this class of ultra portable PC. Its most direct competitors are the Lenovo IdeaPad S12 and the MSI Wind U210. Technical overview Processor and memory The Samsung NC20 uses a VIA Nano ULV Processor U2250 (running from 800 MHz - 1,6 GHz) and comes with 1 GB RAM. Internally, the NC20 has one slot for RAM accepting memory modules up to 2 GB. The hardware is powerful enough to run Windows 7 in everyday situations (web-browsing, email, office applications). However, CPU-demanding tasks (e.g. Flash videos) tend to put the system at its limit. Display The screen is a glossy display and measures 12.1 inches (307 mm) diagonally. It has a native resolution of 1280 × 800 pixels. The screen is LED-backlit. An external display can be used through the standard VGA connector. Keyboard and touchpad The 84-key keyboard is a full-size keyboard, with standard 18.5mm key pitch between keys. The keyboard has also been coated with anti-bacterial Silver Nano ions. The touchpad supports multi-touch gestures. Storage The standard internal hard drive is a SATA 160 GB. It also includes a SD card slot, supporting MMC, SD and SDHC cards for additional storage. Connectivity The NC20 has built-in LAN (10/100 MBit) via a standard-sized RJ45-jack, 802.11b/g Wifi as well as Bluetooth. It also comes with 3 USB 2.0 ports. Audio and video A webcam (Namuga 1.3 megapixel) is built into the display frame, as well as a microphone. Together with the built-in stereo speakers, the NC20 can be used for audio/video conferences (e.g. using Skype), albeit only with moderate call-quality. The webcam picture becomes relatively noisy under low-light conditions and the microphone produces audible noise and picks up vibrations from the harddisk or when typing. The NC20 also has standard 3,5mm jacks for audio output (headphones / line-out) and input (external microphone / line-in), allowing for far better audio quality than the built-in speakers and microphone. Criticism Not all of the features of this notebook are supported under Linux. Playing video and microphone are partially supported. External monitor support under Linux is not possible. WLAN under Ubuntu is reported to have frequent freezeups. See also Samsung NC10 Comparison of netbooks References External links Samsung Specifications Samsung NC20 Community Site Samsung NC20 Blog Samsung Netbook Tips (applies to NC10) Netbooks NC20
https://en.wikipedia.org/wiki/Gary%20T.%20Leavens
Gary T. Leavens is an American academic working as a professor of computer science at the University of Central Florida. Education Leavens earned a Bachelor of Science in computer and communication science from the University of Michigan, a Master of Science in computer science from the University of Southern California, and a PhD in philosophy from the Massachusetts Institute of Technology. Career From 1977 to 1984, Leavens worked on the technical staff at Bell Labs. From 1989 until 2007, he was a professor of computer science at Iowa State University. His scholarship focuses on behavioral interface specification languages (BISLs) such as Larch/Smalltalk, Larch/C++, and JML. Leavens was the program chair for 2009 OOPSLA. References American computer scientists University of Central Florida faculty Living people Year of birth missing (living people) University of Michigan alumni University of Southern California alumni Massachusetts Institute of Technology alumni Iowa State University faculty
https://en.wikipedia.org/wiki/PDB%20%28Palm%20OS%29
PDB is a container format for record databases in Palm OS, Garnet OS and Access Linux Platform. Its structure is similar to PRC resource databases. The PalmDOC eBook format is a special version of the PDB format. Structure of PDB file A PDB file contains a PDB header, PDB record headers and records. PDB Header The PDB header is located at the beginning of the file and contains meta-information on the file: PDB Record Header For every record, there is an eight byte record header, containing: PDB Records Now the records themselves follow. The usual order is AppInfoArea, SortInfoArea and records, sequentially. PDB Datetimes Many PDB format files used times counting in seconds from 1904-01-01T00:00:00. This is the base time used by the original Macintosh (up to Mac OS 9). It may be noted that there were close links between Palm OS and Mac OS during early development. Using an unsigned 32-bit integer and the 1904 epoch, integer overflow will overflow will occur sometime in 2040. Others may be observed to be counting from 1970-01-01T00:00:00 (the Unix epoch base time), and uses a signed 32-bit integer which will overflow sometime in 2038. Palm OS Protein C/C++ Compiler Language & Library Reference, Copyright 2004 Palm Source calls the dates calculated from 1904 "old Palm epoch", and the dates calculated from 1970 "UNIX epoch". Protein C also provides functions (palm_seconds_to_time_t(), and time_t_to_palm_seconds() ) for converting between the two. Some sources even suggest some very old files may use times counting from 1900 (which would be consistent with the Excel epoch). This conflict between old Palm (Mac OS 9) epoch and UNIX epoch is unfortunate, the following heuristic may be useful when examining a file copied from a Palm OS device: If the time has the top bit set, it's an unsigned 32-bit number counting from 1st Jan 1904 If the time has the top bit clear, it's a signed 32-bit number counting from 1st Jan 1970. This is based on the idea that, otherwise the time would be before 1972 or before 1970 (depending on the interpretation) and the PDB format wasn't around then. The palmdump utility and other software uses this rule-of-thumb when reading files. See also PRC format References Computer file formats Palm OS
https://en.wikipedia.org/wiki/Tachymetric%20anti-aircraft%20fire%20control%20system
A tachymetric anti-aircraft fire control system generates target position, speed, direction, and rate of target range change, by computing these parameters directly from measured data. The target's range, height and observed bearing data are fed into a computer which uses the measured change in range, height and bearing from successive observations of the target to compute the true range, direction, speed and rate of climb or descent of the target. The computer then calculates the required elevation and bearing of the AA guns to hit the target based upon its predicted movement. The computers were at first entirely mechanical analog computers utilizing gears and levers to physically perform the calculations of protractors and slide rules, using moving graph charts and markers to provide an estimate of speed and position. Variation of target position over time was accomplished with constant-drive motors to run the mechanical simulation. The term tachymetric should more properly be spelled as "tachometric" which comes from the Greek "takhos" = speed, and "metric" = measure, hence tachometric, to measure speed. An alternative, non-tachometric, gonometric method of AA prediction is for specially trained observers to estimate the course and speed of the target manually and feed these estimates, along with the measured bearing and range data, into the AA fire control computer which then generates change of bearing rate and change of range data, and passes them back to the observer, typically by a "follow the pointer", indicator of predicted target elevation and bearing or by remote power control of the observer's optical instruments. The observer then corrects the estimate, creating a feed back loop, by comparing the observed target motion against the computer generated motion of his optical sights. When the sights stay on the target, the estimated speed, range, and change of rate data can be considered correct. An example of tachometric AA fire control would be the USN Mk 37 system. The early RN High Angle Control System (HACS) I through IV and the early Fuze Keeping Clock (FKC) were examples of non-tachometric systems. By 1940 the RN was adding a Gyro Rate Unit (GRU) which fed bearing and elevation data to a Gyro Rate Unit Box computer (GRUB), which also received ranging data to calculate target speed and direction directly, and this tachometric data was then fed directly to the HACS fire control computer, converting the HACS into a tachometric system. Notes External links The RN Pocket Gunnery Book BRITISH MECHANICAL GUNNERY COMPUTERS OF WORLD WAR II Naval anti-aircraft weapons Military computers
https://en.wikipedia.org/wiki/Alan%20Davis%20%28disambiguation%29
Alan Davis (born 1956) is a British writer and artist of comic books. Alan Davis may also refer to: Alan L. Davis, American computer scientist (PhD 1972, Utah) Alan M. Davis (born 1949), American computer scientist (PhD 1975, Illinois) Allan Davis (footballer) (born 1948), Australian rules footballer Alan Davis (priest) (1938–2021), Archdeacon of West Cumberland Alan G. Davis, American jurist in Delaware See also Al Davis (disambiguation) Alan Davies (disambiguation) Alun Davies (disambiguation) Allen Davis (disambiguation)
https://en.wikipedia.org/wiki/Night%20buses%20in%20London
The London Night Bus network is a series of night bus routes that serve Greater London. Services broadly operate between the hours of 23:00 and 06:00. Many services commence from or operate via Trafalgar Square and are extensions or variations of daytime routes and hence derive their number from these; for example, route N73 from Oxford Circus to Walthamstow Central follows that of route 73 as far as Stoke Newington, before continuing further north. History The first night bus was introduced in 1913. By 1920 there were two 'All Night Bus Services' in operation named the 94 and 94a running from 23:30 to 05:30. A few more services were introduced over the following decades, but all ceased during World War II. Services resumed after the war, increasing as trams and trolleybuses were replaced in the late 1950s and 1960s. In 1978 London Transport listed 21 all-night bus routes. On many of these routes, "all-night" service meant a departure frequency of no more than one bus an hour. In April 1984, the number of routes was increased from 21 to 32. At this point the peak service required 80 buses; by August 2013 this had grown to 890. Originally the night bus network had its own fare structure, but with the introduction of the Oyster card in 2003, it was incorporated into the Transport for London fare structure. Until the mid-2000s, all routes had N prefixes. However, as some routes merely mirrored their day time equivalents, the N prefixes were dropped and these routes became 24-hour services; for example, route N14 was no longer differentiated from route 14. Services are operated by private operators under contract to London Buses. The Night Bus contracts are often bundled with those of the equivalent daytime routes and awarded for a five-year period, with an optional two-year extension based on performance standards being met. Some however are tendered individually. With some London Underground lines operating a 24-hour service at weekends from August 2016, a further eight routes commenced 24-hour operation on Friday and Saturday nights. Further changes were made as the Night Tube network expanded. In May 2015, the Night Bus network was the subject of The Night Bus, a Channel 4 documentary. Operation Night Bus routes are often related to the daytime route with the same number, often running the same route but with an extension at one or both ends. The usual purpose of the extension is to provide a night service to destinations served by tube or train during the day. However, there are a few N-prefixed route numbers that have no relation to the daytime route with the same number: the N5, N20 and N97 all operate in a different part of London from the respective day routes, and the N550 and N551 (which provide night service on parts of the Docklands Light Railway network) have no corresponding daytime routes. N1 Route N1 commenced operating on 28 June 1995 between Plumstead garage and Trafalgar Square. It was originally operated by London Centra
https://en.wikipedia.org/wiki/Semantic%20Sensor%20Web
The Semantic Sensor Web (SSW) is a marriage of sensor web and semantic Web technologies. The encoding of sensor descriptions and sensor observation data with Semantic Web languages enables more expressive representation, advanced access, and formal analysis of sensor resources. The SSW annotates sensor data with spatial, temporal, and thematic semantic metadata. This technique builds on current standardization efforts within the Open Geospatial Consortium's Sensor Web Enablement (SWE) and extends them with Semantic Web technologies to provide enhanced descriptions and access to sensor data. Semantic modeling and annotation of sensor data Ontologies and other semantic technologies can be key enabling technologies for sensor networks because they will improve semantic interoperability and integration, as well as facilitate reasoning, classification and other types of assurance and automation not included in the Open Geospatial Consortium (OGC) standards. A semantic sensor network will allow the network, its sensors and the resulting data to be organised, installed and managed, queried, understood and controlled through high-level specifications. Ontologies for sensors provide a framework for describing sensors. These ontologies allow classification and reasoning on the capabilities and measurements of sensors, provenance of measurements and may allow reasoning about individual sensors as well as reasoning about the connection of a number of sensors as a macroinstrument. The sensor ontologies, to some degree, reflect the OGC standards and, given ontologies that can encode sensor descriptions, understanding how to map between the ontologies and OGC models is an important consideration. Semantic annotation of sensor descriptions and services that support sensor data exchange and sensor network management will serve a similar purpose as that espoused by semantic annotation of Web services. This research is conducted through the W3C Semantic Sensor Network Incubator Group (SSN-XG) activity. W3C Semantic Sensor Networks The World Wide Web Consortium (W3C) initiated the Semantic Sensor Networks Incubator Group (SSN-XG) to develop the Semantic Sensor Network (SSN) ontology, intended to model sensor devices, systems, processes, and observations. The Incubator Group later transitioned into the Semantic Sensor Networks Community Group. It was then picked up in the joint OGC and W3C Spatial Data on the Web Working Group and published as a W3C Recommendation. The Semantic Sensor Network (SSN) ontology enables expressive representation of sensor observations, sampling, and actuation. The SSN ontology is encoded in the Web Ontology Language (OWL2). A number of projects have used it for improved management of sensor data on the Web, involving annotation, integration, publishing, and search. Context Sensors around the globe currently collect avalanches of data about the world. The rapid development and deployment of sensor technology is intensifying the exi
https://en.wikipedia.org/wiki/Anti-collision%20device
The anti-collision device (ACD) is a form of automatic train protection used on Indian Railways. Overview The ACD Network is a train-collision prevention system invented by Rajaram Bojji and patented by Konkan Railway Corporation, a public-sector undertaking of the Ministry of Railways, government of India. Anti-collision devices were found to be effective in the Southern Railway zone after a brief trial. Level crossings When Loco ACDs receive 'Gate Open' transmissions from Gate ACDs provided at non-interlocked level crossings, they brake to decelerate to 30 km/h or an alternative predetermined speed. Gate ACDs at manned and unmanned level crossings also warn passengers with the message 'Train Approach'. If a Loco ACD receives a manual 'SOS' message from other train bound ACDs or a station ACD that is within three kilometres of its radial range, it applies brakes automatically to bring the train to a stop. The application of this anti-collision device has been refined to not only prevent midsection collisions but also to prevent their occurrences in station yards. The newly engineered solution is integrated with the signalling systems, interlocking to react appropriately in case collision-like conditions are perceived at the time of reception and dispatch of trains from a station (e.g. while approaching a station). Loco ACDs also give 'Station Approach' alerts to train operators and regulate train speed when they receives information from Station ACDs. Loco shed ACDs, Track-ID Assigning ACDs and Repeater ACDs strengthen the ACD network. Future Indian Railways have successfully piloted ACDs in the northeast frontier railway, covering of its broad gauge route. They are now installing the ACDs on of the Konkan Railway. The on-board train protection device, the first device designed by Konkan Railway with their technical partner Kernex Microsystems (I) Ltd, was installed throughout the Indian Railway network. A new ACD Version-II, now called the Train Collision Avoidance System (TCAS), is under development by The Research Designs and Standards Organisation (RDSO). Unlike ACD, which is more of a distributed system which acts independently, the TCAS will be more of a centralized system where TCAS controls communication between trains and with trains with the TDMA protocol. The TCAS under development is meant to be a vital safety system. TCAS has a deep coupling with the railway signalling system so ACD systems do not depend on the railway signalling system. ACD deficiencies The ACD system is based on GPS based positioning and track detection. This has inherent problems as with GPS service and course acquisition, the best possible horizontal accuracy is 10 m. This is inadequate for detection of rail tracks separated by a distance of . ACD does not even have DGPS, differential GPS that gives an accuracy close to 2.5 m, and hence had errors in track detection using their patented Deviation Count Theory that worked in block sections but fai
https://en.wikipedia.org/wiki/The%20Chopping%20Block%20%28American%20TV%20series%29
The Chopping Block is an American reality television series, based on the Australian reality television series of the same name. The series aired on the NBC network and followed participants in an attempt to open a restaurant. It is hosted by British celebrity chef Marco Pierre White. The first episode premiered on March 11, 2009 to low ratings. Two more episodes aired, each with worse ratings than the last. On March 26, 2009, NBC canceled the series, choosing to run repeats of Law & Order: Criminal Intent in the timeslot. The series completed "airing" on NBC.com and Hulu, releasing one a week. On April 24, 2009, NBC announced the series would return to television in Friday, June 19, despite airing on the internet already. After the fourth episode aired on the 19th, it was pre-empted on June 26 by television coverage surrounding the deaths of Farrah Fawcett and Michael Jackson the day before. The show returned Friday, July 3. It then proceeded to air until Friday, July 24, the day the final episode aired on NBC. On April 27, 2009, British TV began showing the series on ITV2, immediately following the finale of Hell's Kitchen, also hosted by Marco Pierre White, on ITV1 of which 6 of the episodes being aired, although episode 7 was not shown on Monday at 8 o clock as would be expected, and there has been no explanation as to what has happened to the series in the UK or why the episode was not shown. Format Eight contestant pairs, each consisting of a chef and a front-of-house member with an existing relationship, are divided into two teams of four pairs each. The teams are each assigned an empty restaurant space, across the street from each other in downtown Manhattan. Each week, the teams are given a task, and open their restaurants for a service. The team judged to have lost that service has its weakest pair eliminated from the show by chef White. Each week, the teams also have a challenge to compete in (sometimes relating to the kitchen, and sometimes relating to front-of-house), the winner of which gains an advantage during the subsequent service. The format of the American version differs markedly to that of the original Australian version. Contestants The first season consisted of 8 teams of 2 participants each: Angela Brown-Johnson & Samantha Johnson from Philadelphia, Pennsylvania Alex (Zan) McCoy & Nate (Than) McCoy from Cabin John, Maryland Panya Rice & Michael Holmes from Atlanta, Georgia Mikey Torres & Chad Phillips from Washington, D.C. Lisa Stalvey & Michael Anapol from Los Angeles, California Denise Nguyen & Khoa Nguyen from Washington, D.C. Kelsey Henderson & Vanessa Henderson from Los Angeles, California Dean Della Ventura & Shari Della Ventura from Millbury, Massachusetts Episode results : The show was cancelled after three episodes. : The remaining shows are broadcast each Wednesday night on NBC.com. These episodes then air on NBC with Episode 4 having started off the airing of the episodes on June 19, and a bre
https://en.wikipedia.org/wiki/System%20G%20%28supercomputer%29
System G is a cluster supercomputer at Virginia Tech consisting of 324 Apple Mac Pro computers with a total of 2592 processing cores. It was finished in November 2008 and ranked 279 in that month's edition of TOP500, running at 16.78 teraflops and peaking at 22.94 teraflops. It now runs at a "sustained (Linpack) performance of 22.8 TFlops". It transmits data between nodes over Gigabit Ethernet and 40Gbit/s Infiniband. Mac Pro Nodes Each of the 324 Mac Pro machines contains two quad-core 2.8 GHz Xeon processors and 8 gigabytes of RAM. Namesake System G's name stems from its homage to System X and to its focus on green computing—the cluster has thousands of power and thermal sensors to test high performance computing at low power requirements and is the largest power-aware research system in the world. References External links Computer Science at Virginia Tech: System G Virginia Tech: Center for High-End Computing Systems (‘CHECS’) Ars Technica: Virginia Tech building super computer out of 324 Mac Pros TOP500 website X86 supercomputers Virginia Tech
https://en.wikipedia.org/wiki/David%20Nelson%20%28software%20developer%29
David Nelson (born May 25, 1993) is an American software developer and CEO of Motion AI, an Artificial Intelligence software company. Muziic In 2009, at age 15, following a report by CNN Nelson gained attention in the media for developing the Muziic streaming music application. The service garnered over 250 million listens worldwide. Muziic was controversial to some in the music industry because it allowed access to stream music videos, through YouTube, but aggregated and displayed the songs in a way geared toward listening and building playlists. Because this occurred prior to services like Spotify coming to the United States, free applications like this were rare and often illegal. FanRx David later went on to found FanRx (formerly BandRx) in 2012, a social media software company for musicians and brands. The service gained over 225,000 subscribers and entered the Top 5 most popular music applications on Facebook. In 2013, Nelson launched Mass Threat, a game development subsidiary of FanRx, catering to the music industry. Mass Threat has worked with Train, Fall Out Boy, Panic! at the Disco and Sia, among others, to develop and launch games geared toward their fans. Mass Threat games collectively have been downloaded over 5 million times, according to the company's website. Motion AI In November 2015, Nelson unveiled Motion AI on Product Hunt, where it was number one for the day and earned a top spot in the all-time rankings. The company aims to bring Artificial Intelligence technologies to the masses by building a "UI for AI". In one of the fastest funding rounds in Chicago area history, Motion AI subsequently raised $700,000 in seed funding to expand the team and build out the product, as reported in the Chicago Tribune. Motion AI was named one of Chicago's "50 Startups to Watch" in 2016. Personal life In 2015, Nelson proposed to his girlfriend Chelsea on stage at a Train show in the Bahamas, following an introduction from Pat Monahan. References External links Motion AI Muziic FanRx Mass Threat Twitter Page Website 1993 births Living people Computer programmers People from Bettendorf, Iowa
https://en.wikipedia.org/wiki/Thermal%20simulations%20for%20integrated%20circuits
Miniaturizing components has always been a primary goal in the semiconductor industry because it cuts production cost and lets companies build smaller computers and other devices. Miniaturization, however, has increased dissipated power per unit area and made it a key limiting factor in integrated circuit performance. Temperature increase becomes relevant for relatively small-cross-sections wires, where it may affect normal semiconductor behavior. Besides, since the generation of heat is proportional to the frequency of operation for switching circuits, fast computers have larger heat generation than slow ones, an undesired effect for chips manufacturers. This article summaries physical concepts that describe the generation and conduction of heat in an integrated circuit, and presents numerical methods that model heat transfer from a macroscopic point of view. Generation and transfer of heat Fourier's law At macroscopic level, Fourier's law states a relation between the transmitted heat per unit time per unit area and the gradient of temperature: Where is the thermal conductivity, [W·m−1 K−1]. Joule heating Electronic systems work based on current and voltage signals. Current is the flow of charged particles through the material and these particles (electrons or holes), interact with the lattice of the crystal losing its energy which is released in form of heat. Joule Heating is a predominant mechanism for heat generation in integrated circuits and is an undesired effect in most of the cases. For an ohmic material, it has the form: Where is the current density in [A·m−2], is the specific electric resistivity in [·m] and is the generated heat per unit volume in [W·m−3]. Heat-transfer equation The governing equation of the physics of the heat transfer problem relates the flux of heat in space, its variation in time and the generation of power by the following expression: Where is the thermal conductivity, is the density of the medium, is the specific heat, , the thermal diffusivity and is the rate of heat generation per unit volume. Heat diffuses from the source following the above equation and solution in an homogeneous medium follows a Gaussian distribution. Techniques to solve heat equation Kirchhoff transformation To get rid of the temperature dependence of , Kirchhoff transformation can be performed where and is the heat sink temperature. When applying this transformation, the heat equation becomes: where is called the diffusivity, which also depends on the temperature. To completely linearize the equation, a second transformation is employed: yielding the expression: Simple, direct application of this equation requires approximation. Additional terms arising in the transformed Laplacian are dropped, leaving the Laplacian in its conventional form. Analytical solutions Although analytical solutions can only be found for specific and simple cases, they give a good insight to deal with more complex situ
https://en.wikipedia.org/wiki/SRO%20Cinemaserye
SRO Cinemaserye () is a Philippine television drama anthology broadcast by GMA Network. It premiered on March 26, 2009. The show concluded on April 8, 2010 with a total of 35 episodes. Premise SRO Cinemaserye is a refreshing venture on drama anthologies in late-night primetime. Every story, which will run for eight weeks, boasts of a presentation with the cinematic quality of a motion picture. GMA Network artists will be put on spotlight on SRO Cinemaserye's finest episodes with heart-rending storyline and absorbing characterization. Chapters Ganti Suspetsa The Eva Castillo Story Rowena Joy Reunion Moshi-Moshi, I Love You Carenderia Queen Exchange Gift Meet the Fathers Hot Mama Ratings According to AGB Nielsen Philippines' Mega Manila household television ratings, the pilot episode of SRO Cinemaserye earned an 18.3% rating. While the final episode scored a 15.7% rating. Accolades References External links 2009 Philippine television series debuts 2010 Philippine television series endings Filipino-language television shows GMA Network original programming Philippine anthology television series
https://en.wikipedia.org/wiki/NetScreen%20Technologies
NetScreen Technologies was an American technology company that was acquired by Juniper Networks for US$4 billion stock for stock in 2004. NetScreen Technologies developed ASIC-based Internet security systems and appliances that delivered high performance firewall, VPN and traffic shaping functionality to Internet data centers, e-business sites, broadband service providers and application service providers. NetScreen was the first firewall manufacturer to develop a gigabit-speed firewall, the NetScreen-1000. History NetScreen Technologies was founded by Yan Ke, Ken Xie, and Feng Deng. Ken Xie, Chief Technology Officer and co-founder was also the CEO until Robert Thomas joined in 1998. Robert Thomas, NetScreen's president and chief executive officer, came to NetScreen in 1998 from Sun Microsystems, where he was General Manager of Intercontinental Operations for Sun's software business, which includes security, networking, and Internet tools. Ken Xie left NetScreen in 2000 to found Fortinet, a competing ASIC-based firewall company. NetScreen acquired its core IPS technology through the purchase of OneSecure, Inc. for US$45 million in stock in 2002. OneSecure was created by Rakesh Loonkar (subsequently the co-founder of Trusteer), and Israeli engineer Nir Zuk, who had been one of Check Point Software’s first employees. In 2003, NetScreen hired Anson Chen as its vice president of research and development. Anson Chen, a 12-year veteran of Cisco Systems, Inc. and former vice president and general manager of the Network Management and Services Technology Group, led engineering, research and development efforts for NetScreen's entire product line, including its firewall, IPSec virtual private network (VPN) and intrusion detection and prevention technologies. Chen also had functional management responsibility for NetScreen's secure access products. 2015 "unauthorized code" incident Analysis of the firmware code in 2015 showed that a backdoor key could exist using Dual_EC_DRBG. This would enable whoever held that key to passively decrypt traffic encrypted by ScreenOS. In December 2015, Juniper Systems announced that they had discovered "unauthorized code" in the ScreenOS software that underlies their NetScreen devices, present from 2012 onwards. There were two vulnerabilities: One was a simple root password backdoor, and the other one was changing a point in Dual_EC_DRBG so that the attackers presumably had the key to use the pre-existing (intentional or unintentional) kleptographic backdoor in ScreenOS to passively decrypt traffic. References Juniper Networks Defunct companies based in California Computer companies established in 1997 Computer companies disestablished in 2004 Networking hardware companies Server appliance Computer security companies 2004 mergers and acquisitions 2001 initial public offerings Defunct computer companies of the United States Defunct computer hardware companies
https://en.wikipedia.org/wiki/LG%20CNS
LG CNS Co., Ltd. (Korean: 주식회사 엘지씨엔에스) is a subsidiary of LG Corporation founded in 1987 that provides information technology services including consulting, System Integration, Network Integration, Business Process Outsourcing, and Information Technology Outsourcing. Originally, LG CNS only focused on computer engineering such as designing, developing and operating computer network systems for LG Group. Then, the firm expanded its target customers from LG Group to other private organizations and governments. LG CNS also focuses on global markets running worldwide development centers and has overseas subsidiaries. Currently, LG CNS “is Korea’s largest IT service provider and has implemented a number of large-scale public IT infrastructure projects and played a major role in the Korean government's e-Korea initiative.” Globalization The former CEO of LG CNS, Shin Chae-chol, said "The Korean market constitutes a small percentage of the total global market. I think that unfettered expansion and cutthroat competition in the domestic medical market is meaningless. We plan to expand the scope of overseas projects centering on seven overseas branches in China, Southeast Asia, and the United States." According to the CEO’s expectation, LG CNS has expanded to 7 overseas subsidiary companies and development centers in China, India, U.S.A., the Netherlands, Indonesia, Brazil, Singapore and Japan. Overseas sales from LG CNS subsidiaries exceeded more than “200 billion won in 2007, focusing to realize its 2008 sales goal of 230 billion won in overseas markets.” CSR (Corporate Social Responsibility) LG CNS has also been doing CSR since its establishment. LG CNS IT Dream Project is the annual event which is designed for students in welfare institutions to cheer them up by inspiring them in for IT. Also, the company regularly holds an in-house bazaar to help handicapped children and women. Furthermore, “from 1995 to 2008, LG CNS has helped 628 sight-impaired people to have eyesight recovery operations. Not only these three events, but also many other CRS related event have done by LG CNS.”. See also Electronic Data Systems (EDS) - the company that participated joint venture of STM, root company of LG CNS List of Korean companies Notes and references External links Official website LG Corporation Information technology companies of South Korea Technology companies established in 1987 South Korean brands South Korean companies established in 1987 Companies based in Seoul
https://en.wikipedia.org/wiki/O3b%20%28disambiguation%29
O3b is a telecommunications satellite O3b may also refer to: O3b mPOWER, a planned second generation satellite O3b Networks (2007–2017) a defunct satellite operator Satellites
https://en.wikipedia.org/wiki/Funk%20Software
Funk Software was an American software company based in Cambridge, Massachusetts, and active from 1982 to 2005. The company was founded in 1982 by Paul Funk. Funk was later acquired by Juniper Networks in 2005 for US$122 million. The company first became well known in the late 80's for its product Sideways, which allowed users to print wide spreadsheets on dot matrix printers. Dot matrix printing was the primary printing technology at that time. Funk Software later became a provider of network access security solutions for networks of any size, from enterprise to operator, wired or wireless. The company's products were security related and they were grouped as a family of RADIUS/AAA and WLAN security products. These types of network security products allow an organization to enforce a uniform security policy across all network access methods, including WLAN, remote/VPN, dial, and identity-based (wired 802.1X - also referred to as a supplicant based authentication system) - with the performance and reliability to handle any traffic load, and with full support for any network infrastructure. Funk Software's customers included many of the world's largest corporations, institutions, telecommunications carriers, and internet service providers (ISPs); its products are licensed or resold by numerous leading manufacturers of Internet hardware and software. One of the leading products was OAC - Odyssey Access Client, which is still used today, branded as a Juniper Networks Product UAC - User Access Client. In 2014, Juniper Networks sold off the business unit that was responsible for the legacy Funk Software enterprise products to New York-based Siris Capital. Siris Capital created a new company and named it Pulse Secure, LLC with its headquarters in San Jose, CA. Steel-Belted Radius (SBR) Enterprise and Global Enterprise are still being sold under the new company's brand. It was announced that Pulse Secure will EOL SBR Enterprise and Global Enterprise as of December 31, 2020. Steel-Belted Radius Carrier Edition is still being sold by Juniper Networks. The Odyssey Access Client (OAC) has been EOL'd (End of Life) as of December 31, 2017. Several Funk Software employees remain with Pulse Secure and Juniper Networks as of 2020. End of 2020 Pulse Secure was acquired by Ivanti. See also List of acquisitions by Juniper Networks References Juniper Networks Defunct companies based in Massachusetts Software companies established in 1982 Companies disestablished in 2005 1982 establishments in Massachusetts Defunct software companies of the United States
https://en.wikipedia.org/wiki/History%20%28Southeast%20Asian%20TV%20channel%29
History (formerly known as The History Channel) is a Southeast Asian pay television channel broadcasting programming related to historical events and people. The channel is owned by A+E Networks Asia. In India History TV18 owned by a joint-venture between A+E Networks and under permission registered Discovery Communications, owner of the American History and Network 18, Indian media group & available in eight languages (Bengali, English, Gujarati, Hindi, Marathi, Tamil, Telugu & Urdu) in India. Company A+E Networks Asia was formed on 15 June 2007 through a joint venture between A+E Networks and Malaysia's pay TV provider Astro. Headquartered in Singapore, A+E Networks Asia also have operations in Kuala Lumpur, Malaysia. In 2009, A+E Networks Asia struck a US$800,000 co-production deal with the National Film Development Corporation of Malaysia to co-produce programmes to be featured across its channels. It has recently hired SPE Networks as a regional ad sales representative across the South East Asian region. High-definition feed On September 1, 2008, History Channel Asia officially launched their own History HD Asia channel in Singapore and Hong Kong, followed by Japan, South Korea (Localized Version Launched), India, Philippines and Malaysia. Programming New Alone Big Easy Motors Counting Cars Doomsday: 10 Ways The World Will End Forged in Fire Gangland Undercover Pawn Stars Storage Wars Six Vikings Reruns Duck Dynasty Photo Face-Off The Pickers Top Shot Swamp People Kings of Restoration Cajun Pawn Stars Axe Men The Innovators: The Men Who Built America Ancient Aliens America's Book Of Secrets Modern Marvels Serial Killer Earth Stan Lee's Superhumans Top Guns IRT Deadliest Roads Mankind The Story of All of UsStorage Wars: Texas'' See also A+E Networks Bio Asia Crime & Investigation Network Asia History (U.S. TV channel) References External links A&E Networks Television channels and stations established in 2007 2007 establishments in Malaysia English-language television stations Mass media in Southeast Asia
https://en.wikipedia.org/wiki/Malwarebytes
Malwarebytes Inc. is an American Internet security company that specializes in protecting home computers, smartphones, and companies from malware and other threats. It has offices in Santa Clara, California; Clearwater, Florida; Tallinn, Estonia; Bastia Umbra, Italy; and Cork, Ireland. Marcin Kleczynski has been the CEO of Malwarebytes since 2008. History Early history and background Malwarebytes Inc. was informally established in 2004. CEO and founder Marcin Kleczynski, originally from Poland, was still a teenager attending high school in Bensenville, Illinois, and was working as a technician in a computer repair shop in Chicago. He noticed that whenever infected computers arrived, the shop would typically reformat the computer entirely, rather than combat the virus, even if the infection was only minor. Kleczynski later discovered that, when his mother's computer became infected, neither McAfee nor Symantec would remove the malware from his system. He later recalled "I've never been as angry as when I got my computer infected", and professed that his mother told him to fix it "under penalty of death". It was only after Kleczynski posted on the forum SpywareInfo that he was able to learn how to remove the virus, which took three days. The company was unofficially founded after this, when Kleczynski conversed and became friends with several of the editors of the forum, who tempted him to buy an unused domain from them. With one of the site's regulars, Bruce Harrison, Kleczynski wrote the inaugural version of the company's software. In 2006, Kleczynski worked with a college roommate to produce a freely available program called "RogueRemover", a utility which specialized in fighting against a type of infection known as "rogues", which scam computer users into giving away their credit card information through fake anti-virus software. RogueRemover proved instrumental in developing Malwarebytes Anti-Malware, and Kleczynski was able to set up a forum which enabled him to improve the software through feedback. Kleczynski and Harrison formally launched Malwarebytes on January 21, 2008 while Kleczynski was studying computer science at the University of Illinois. Bruce became the VP of Research for Malwarebytes, and further hired Doug Swanson, with experience in freeware development to work for the new company. Marcus Chung, an e-commerce expert who formerly worked for GreenBorder, was hired as chief operating officer. Kleczynski and Harrison reportedly made $600,000 in their first year of selling the software, despite not having met personally at the time. Post-2010 developments In 2011, Malwarebytes acquired HPhosts, a website blacklisting company, which tracks blacklisted websites and ad servers, a necessary development to protect against new internet protocol addresses and web servers which distribute malware, and advise internet service providers to shut down those with malicious activity. That year, the company had claimed to have removed o
https://en.wikipedia.org/wiki/Swendsen%E2%80%93Wang%20algorithm
The Swendsen–Wang algorithm is the first non-local or cluster algorithm for Monte Carlo simulation for large systems near criticality. It has been introduced by Robert Swendsen and Jian-Sheng Wang in 1987 at Carnegie Mellon. The original algorithm was designed for the Ising and Potts models, and it was later generalized to other systems as well, such as the XY model by Wolff algorithm and particles of fluids. The key ingredient was the random cluster model, a representation of the Ising or Potts model through percolation models of connecting bonds, due to Fortuin and Kasteleyn. It has been generalized by Barbu and Zhu to arbitrary sampling probabilities by viewing it as a Metropolis–Hastings algorithm and computing the acceptance probability of the proposed Monte Carlo move. Motivation The problem of the critical slowing-down affecting local processes is of fundamental importance in the study of second-order phase transitions (like ferromagnetic transition in the Ising model), as increasing the size of the system in order to reduce finite-size effects has the disadvantage of requiring a far larger number of moves to reach thermal equilibrium. Indeed the correlation time usually increases as with or greater; since, to be accurate, the simulation time must be , this is a major limitation in the size of the systems that can be studied through local algorithms. SW algorithm was the first to produce unusually small values for the dynamical critical exponents: for the 2D Ising model ( for standard simulations); for the 3D Ising model, as opposed to for standard simulations. Description The algorithm is non-local in the sense that a single sweep updates a collection of spin variables based on the Fortuin–Kasteleyn representation. The update is done on a "cluster" of spin variables connected by open bond variables that are generated through a percolation process, based on the interaction states of the spins. Consider a typical ferromagnetic Ising model with only nearest-neighbor interaction. Starting from a given configuration of spins, we associate to each pair of nearest neighbours on sites a random variable which is interpreted in the following way: if then there is no link between the sites and (the bond is closed); if then there is a link connecting the spins (the bond is open). These values are assigned according to the following (conditional) probability distribution: ; ; ; ; where is the ferromagnetic coupling strength. This probability distribution has been derived in the following way: the Hamiltonian of the Ising model is , and the partition function is . Consider the interaction between a pair of selected sites and and eliminate it from the total Hamiltonian, defining Define also the restricted sums: ; Introduce the quantity ; the partition function can be rewritten as Since the first term contains a restriction on the spin values whereas there is no restriction in the second term, the weighting fac
https://en.wikipedia.org/wiki/Wolff%20algorithm
The Wolff algorithm, named after Ulli Wolff, is an algorithm for Monte Carlo simulation of the Ising model and Potts model in which the unit to be flipped is not a single spin (as in the heat bath or Metropolis algorithms) but a cluster of them. This cluster is defined as the set of connected spins sharing the same spin states, based on the Fortuin-Kasteleyn representation. The Wolff algorithm is similar to the Swendsen–Wang algorithm, but different in that the former only flips one randomly chosen cluster with probability 1, while the latter flip every cluster independently with probability 1/2. It is shown numerically that flipping only one cluster decreases the autocorrelation time of the spin statistics. The advantage of Wolff algorithm over other algorithms for magnetic spin simulations like single spin flip is that it allows non-local moves on the energy. One important consequence of this is that in some situations (e.g. ferromagnetic Ising model or fully frustrated Ising model), the scaling of the Multicanonic simulation is , better than , where z is the exponent associated with the critical slowing down phenomena. References External links Cluster Algorithms at Netlib Implementation in Julia: https://github.com/cossio/SquareIsingModel.jl Monte Carlo methods Statistical mechanics
https://en.wikipedia.org/wiki/Florence%E2%80%93Rome%20railway
The Florence–Rome railway is part of the traditional main north–south trunk line of the Italian railway network. The line is referred to by Ferrovie dello Stato (the State Railways) as the Linea Lenta (meaning "slow line", abbreviated LL) to distinguish it from the parallel high-speed line. The Linea Lenta is now mainly used for regional services, for the InterCity services — rather than the faster Le Frecce trains — between Florence and Rome and for the majority of freight trains. Some types of passenger train are routed on the line to serve smaller stations not served by the high-speed line or in order to improve traffic flow during peak periods or other periods of congestion. High-speed trains on the Florence-Rome route use the parallel Florence–Rome high-speed line (Direttissima, meaning "most direct", abbreviated DD) which was partially opened on 24 February 1977 and was completed on 26 May 1992. History The origins of the line design date back to early days of railway building in Italy, some years before the creation of the Italian State in 1859, which explains its tortuous path and its somewhat illogical route in places. While the Apennines to the north of Florence created a difficult natural barrier, the political frontier with the Papal States to the south also obstructed the development of a rail connection with Rome. The physical and political geography led to the development of a railway line from the French border, through the Kingdom of Sardinia (Piedmont), Piacenza, and Bologna to Ancona and eventually Brindisi. At the same time the same geography led the Papal States to develop a line from Rome to Ancona. For similar reasons the Kingdom of the Two Sicilies was developing east–west rail links from Naples to Termoli, Foggia and Brindisi. The plan for the line between Rome, Orte and Foligno, which is common to the current lines from Rome to the Adriatic port of Ancona and Florence as far as Orte, took shape in the Papal States in 1846 shortly after Pius IX became Pope, replacing his predecessor Gregory XVI who banned railways, calling them "chemins d'enfer" (French for "ways of hell"; a play of words for "chemins de fer", French for "railways"). On 7 November 1846, the Secretary of State, authorised the construction of a railway connecting Rome to Ancona in order to reach Bologna and Modena, and connecting with the railway of Lombardy–Venetia then part of the Austrian Empire. The route chosen generally followed an ancient Roman Road, the Via Flaminia through Orte and continued over the Apennines via the pass of Fossato. A concession was granted in May 1856 to a company called Ferrovia Pio Centrale (Central Pius Railway) in honour of the Pope. It was completed only ten years later and inaugurated on 29 April 1866 by the Kingdom of Italy. The project, including the sections already built, had already been absorbed in 1865 by the Società per le strade ferrate romane (Roman Railway Company). Meanwhile, the project had inspired the
https://en.wikipedia.org/wiki/Michael%20Stonebraker
Michael Ralph Stonebraker (born October 11, 1943) is a computer scientist specializing in database systems. Through a series of academic prototypes and commercial startups, Stonebraker's research and products are central to many relational databases. He is also the founder of many database companies, including Ingres Corporation, Illustra, Paradigm4, StreamBase Systems, Tamr, Vertica and VoltDB, and served as chief technical officer of Informix. For his contributions to database research, Stonebraker received the 2014 Turing Award, often described as "the Nobel Prize for computing." Stonebraker's career can be broadly divided into two phases: his time at University of California, Berkeley when he focused on relational database management systems such as Ingres and Postgres, and at Massachusetts Institute of Technology (MIT) where he developed more novel data management techniques such as C-Store, H-Store and SciDB. Stonebraker is currently a professor emeritus at UC Berkeley and an adjunct professor at MIT's Computer Science and Artificial Intelligence Laboratory. He is also known as an editor for the book Readings in Database Systems. Life Stonebraker grew up in Milton, New Hampshire. He earned his B.S.E. in electrical engineering from Princeton University in 1965, and his M.S. and Ph.D. from the University of Michigan in 1967 and 1971 respectively. His awards include the IEEE John von Neumann Medal and the first SIGMOD Edgar F. Codd Innovations Award. In 1994 he was inducted as a Fellow of the Association for Computing Machinery. In 1997, he was elected a member of the National Academy of Engineering for the development and commercialization of relational and object-relational database systems. In March 2015 it was announced he won the 2014 ACM Turing Award. In September 2015, he won the 2015 Commonwealth Award, chosen by council members of MassTLC. The Berkeley years (1971–2000) Stonebraker joined University of California, Berkeley as an assistant professor in 1971, and taught in the computer science department for twenty-nine years. It was there that he did his early pioneering work on relational databases. Ingres In 1973, Stonebraker and his colleague Eugene Wong started researching relational database systems after reading a series of seminal papers published by Edgar F. Codd on the relational data model. Their project, known as Ingres (Interactive Graphics and Retrieval System), was one of the first systems (along with System R from IBM) to demonstrate that it was possible to build a practical and efficient implementation of the relational model. A number of key ideas from INGRES are still widely used in relational systems, including the use of B-trees, primary-copy replication, the query rewrite approach to views and integrity constraints, and the idea of rules/triggers for integrity checking in an RDBMS. Additionally, much experimental work was done that provided insights into how to build a locking system that could provid
https://en.wikipedia.org/wiki/Arithmetic%20circuit%20complexity
In computational complexity theory, arithmetic circuits are the standard model for computing polynomials. Informally, an arithmetic circuit takes as inputs either variables or numbers, and is allowed to either add or multiply two expressions it has already computed. Arithmetic circuits provide a formal way to understand the complexity of computing polynomials. The basic type of question in this line of research is "what is the most efficient way to compute a given polynomial ?" Definitions An arithmetic circuit over the field and the set of variables is a directed acyclic graph as follows. Every node in it with indegree zero is called an input gate and is labeled by either a variable or a field element in Every other gate is labeled by either or in the first case it is a sum gate and in the second a product gate. An arithmetic formula is a circuit in which every gate has outdegree one (and so the underlying graph is a directed tree). A circuit has two complexity measures associated with it: size and depth. The size of a circuit is the number of gates in it, and the depth of a circuit is the length of the longest directed path in it. For example, the circuit in the figure has size six and depth two. An arithmetic circuit computes a polynomial in the following natural way. An input gate computes the polynomial it is labeled by. A sum gate computes the sum of the polynomials computed by its children (a gate is a child of if the directed edge is in the graph). A product gate computes the product of the polynomials computed by its children. Consider the circuit in the figure, for example: the input gates compute (from left to right) and the sum gates compute and and the product gate computes Overview Given a polynomial we may ask ourselves what is the best way to compute it — for example, what is the smallest size of a circuit computing The answer to this question consists of two parts. The first part is finding some circuit that computes this part is usually called upper bounding the complexity of The second part is showing that no other circuit can do better; this part is called lower bounding the complexity of Although these two tasks are strongly related, proving lower bounds is usually harder, since in order to prove a lower bound one needs to argue about all circuits at the same time. Note that we are interested in the formal computation of polynomials, rather than the functions that the polynomials define. For example, consider the polynomial over the field of two elements this polynomial represents the zero function, but it is not the zero polynomial. This is one of the differences between the study of arithmetic circuits and the study of Boolean circuits. In Boolean complexity, one is mostly interested in computing a function, rather than some representation of it (in our case, a representation by a polynomial). This is one of the reasons that make Boolean complexity harder than arithmetic complexity. The study o
https://en.wikipedia.org/wiki/Unistd.h
In the C and C++ programming languages, unistd.h is the name of the header file that provides access to the POSIX operating system API. It is defined by the POSIX.1 standard, the base of the Single Unix Specification, and should therefore be available in any POSIX-compliant operating system and compiler. For instance, this includes Unix and Unix-like operating systems, such as GNU variants, distributions of Linux and BSD, and macOS, and compilers such as GCC and LLVM. On Unix-like systems, the interface defined by unistd.h is typically made up largely of system call wrapper functions such as fork, pipe and I/O primitives (read, write, close, etc.). Unix compatibility layers such as Cygwin and MinGW also provide their own versions of unistd.h. In fact, those systems provide it along with the translation libraries that implement its functions in terms of win32 functions. E.g. In Cygwin, a header file can be found in /usr/include that sub-includes a file of the same name in /usr/include/sys. Not everything is defined in there but some definitions are done by references to the GNU C standard library headers (like stddef.h) which provide the type size_t and many more. Thus, unistd.h is only a generically defined adaptive layer that might be based upon already existing system and compiler specific definitions. This has the general advantage of not having a possibly concurrent set of header file defined, but one that is built upon the same root which, for this reason, will raise much fewer concerns in combined usage cases. Overview of functions External links C (programming language) headers C POSIX library C standard library headers
https://en.wikipedia.org/wiki/DREAD%20%28risk%20assessment%20model%29
DREAD is part of a system for risk-assessing computer security threats that was formerly used at Microsoft. It provides a mnemonic for risk rating security threats using five categories. The categories are: Damage – how bad would an attack be? Reproducibility – how easy is it to reproduce the attack? Exploitability – how much work is it to launch the attack? Affected users – how many people will be impacted? Discoverability – how easy is it to discover the threat? The DREAD name comes from the initials of the five categories listed. It was initially proposed for threat modeling but was abandoned when it was discovered that the ratings are not very consistent and are subject to debate. It was discontinued at Microsoft by 2008. When a given threat is assessed using DREAD, each category is given a rating from 1 to 10. The sum of all ratings for a given issue can be used to prioritize among different issues. Discoverability debate Some security experts feel that including the "Discoverability" element as the last D rewards security through obscurity, so some organizations have either moved to a DREAD-D "DREAD minus D" scale (which omits Discoverability) or always assume that Discoverability is at its maximum rating. See also Cyber security and countermeasure STRIDE – another mnemonic for security threats References External links Improving Web Application Security: Threats and Countermeasures DREADful, an MSDN blog post Experiences Threat Modeling at Microsoft, Adam Shostack Computer security
https://en.wikipedia.org/wiki/List%20of%20accolades%20received%20by%20Ratatouille
Ratatouille is a computer-animated film produced by Pixar and distributed by Walt Disney Pictures. The film was released on June 29, 2007 in the United States as the eighth film produced by Pixar. It was directed by Brad Bird, who took over from Jan Pinkava in 2005. The plot follows Remy, a rat who dreams of becoming a chef and tries to achieve his goal by forming an alliance with a Parisian restaurant's garbage boy. Ratatouille was released to both critical acclaim and box office success, opening in 3,940 theaters domestically and debuting at #1 with $47 million, grossing $206,445,654 in North America and a total of $624,445,654 worldwide. The film is on the 2007 top ten lists of multiple critics, including Michael Sragow of The Baltimore Sun as number one, A.O. Scott of The New York Times, Carina Chocano of the Los Angeles Times and Joe Morgenstern of The Wall Street Journal as number two. It was nominated for five Academy Awards, including Original Score, Achievement in Sound Editing, Achievement in Sound Mixing, Original Screenplay and Animated Feature Film, which it lost to Atonement, The Bourne Ultimatum and Juno, respectively, winning the latter one. Ratatouille was nominated for 13 Annie Awards, twice for the Best Animated Effects, where it lost to Surf's Up, and three times in the Best Voice Acting in an Animated Feature Production for Janeane Garofalo, Ian Holm and Patton Oswalt, where Ian Holm won the nomination. It won the Best Animated Feature Award from multiple associations including the Chicago Film Critics, the National Board of Review, the Annie Awards, the Broadcast Film Critics, the British Academy of Film and Television (BAFTA) and the Golden Globes. Accolades References General Specific External links Lists of accolades by film Pixar awards and nominations Accolades
https://en.wikipedia.org/wiki/Chibia
Chibia is a town and municipality in the province of Huíla, Angola. The municipality had a population of 190,670 in 2014. It is served by a station on the southern network of the national railway network. External links Official website References Populated places in Huíla Province Municipalities of Angola
https://en.wikipedia.org/wiki/Kubango
Kubango is a town in southeastern Angola. Transport It is served by a station on the southern line of the national railway network. See also Railway stations in Angola References Populated places in Angola
https://en.wikipedia.org/wiki/List%20of%20Soviet%20films%20of%201960
A list of films produced in the Soviet Union in 1960 (see 1960 in film). 1960 See also 1960 in the Soviet Union External links Soviet films of 1960 at the Internet Movie Database 1960 Soviet Films
https://en.wikipedia.org/wiki/List%20of%20Soviet%20films%20of%201961
A list of films produced in the Soviet Union in 1961 (see 1961 in film). 1961 See also 1961 in the Soviet Union References External links Soviet films of 1961 at the Internet Movie Database 1961 Lists of 1961 films by country or language Films
https://en.wikipedia.org/wiki/Pen-Link
Pen-Link, Ltd., (PenLink) is a software company that develops enterprise-grade communications surveillance data collection and analysis solutions for domestic law enforcement. Their flagship products include PLX and PenPoint. One of the more publicized uses of PenLink's products was during the Laci Peterson murder case, where wiretaps taken with Pen-Link 8 and LINCOLN2 were used as evidence against Scott Peterson. See also Lawful interception Communications Assistance For Law Enforcement Act References https://www.kearneyhub.com/news/local/pen-link-employees-cash-in-on-growing-surveillance-business/article_80216234-5028-5e21-9e8d-6ae6edcbae08.html Surveillance
https://en.wikipedia.org/wiki/Cuto%2C%20Angola
Cuto is a town in southern Angola. Transport It is near a deviation of the southern line of the national railway network. See also Railway stations in Angola References Populated places in Angola
https://en.wikipedia.org/wiki/List%20of%20Soviet%20films%20of%201962
A list of films produced in the Soviet Union in 1962 (see 1962 in film). 1962 See also 1962 in the Soviet Union External links Soviet films of 1962 at the Internet Movie Database 1962 Soviet Films
https://en.wikipedia.org/wiki/List%20of%20Soviet%20films%20of%201963
A list of films produced in the Soviet Union in 1963 (see 1963 in film). 1963 External links Soviet films of 1963 at the Internet Movie Database 1963 Soviet Films
https://en.wikipedia.org/wiki/List%20of%20Soviet%20films%20of%201964
A list of films produced in the Soviet Union in 1964 (see 1964 in film). 1964 References External links Soviet films of 1964 at the Internet Movie Database 1964 Lists of 1964 films by country or language Films
https://en.wikipedia.org/wiki/List%20of%20Soviet%20films%20of%201965
A list of films produced in the Soviet Union in 1965 (see 1965 in film). 1965 External links Soviet films of 1965 at the Internet Movie Database 1965 Soviet Films
https://en.wikipedia.org/wiki/List%20of%20Soviet%20films%20of%201966
A list of films produced in the Soviet Union in 1966 (see 1966 in film). 1966 References External links Soviet films of 1966 at the Internet Movie Database 1966 Lists of 1966 films by country or language Films
https://en.wikipedia.org/wiki/List%20of%20Soviet%20films%20of%201967
A list of films produced in the Soviet Union in 1967 (see 1967 in film). 1967 External links Soviet films of 1967 at the Internet Movie Database 1967 Soviet Films
https://en.wikipedia.org/wiki/List%20of%20Soviet%20films%20of%201968
A list of films produced in the Soviet Union in 1968 (see 1968 in film). 1968 External links Soviet films of 1968 at the Internet Movie Database 1968 Soviet Films
https://en.wikipedia.org/wiki/List%20of%20Soviet%20films%20of%201969
A list of films produced in the Soviet Union in 1969 (see 1969 in film). 1969 External links Soviet films of 1969 at the Internet Movie Database 1969 Soviet Films
https://en.wikipedia.org/wiki/List%20of%20onshore%20wind%20farms%20in%20the%20United%20Kingdom
This is a list of some onshore wind farms (more than 1 turbine) in the UK. This information is gathered from multiple Internet sources, primarily the UK Wind Energy Database from RenewableUK (formerly BWEA) and The Wind Power's database. There are many operational wind farms missing from the list, such as Scotland's 522 MW Clyde Wind Farm and the 68 MW Keadby Wind Farm in North Lincolnshire, England's largest onshore wind farm. The name of the wind farm is the name used by the energy company when referring to the farm and is usually related to the name of the physical location, e.g. hill, moor, fell, down etc. or the name of the agricultural farm for the smaller installations on property owned by farmers. The "wind farm" part is implied and hence removed for clarity in most cases. Listings here are restricted to wind farms with 12 turbines or more; for a more comprehensive list, please see the individual country articles. England Northern Ireland Scotland Wales See also List of offshore wind farms in the United Kingdom Renewable energy in the United Kingdom Wind power in the United Kingdom References Wind United Kingdom
https://en.wikipedia.org/wiki/New%20York%20Mets%20Radio%20Network
The New York Mets Radio Network, referred to on air as the WCBS Mets Radio Network, was a radio network owned by Audacy, Inc. (previously CBS Radio) that broadcast New York Mets baseball games. It consisted of 14 stations (12 AM, 2 FM and 1 FM translator) in the states of Connecticut, Florida, New Jersey, and New York. A Spanish-language broadcast airs separately from the English-language network. The network's English-language flagship was WCBS, which acquired the radio rights to the Mets during the 2018 offseason in a new seven year deal with what was then Entercom to air their games on the station beginning in 2019 and running through 2025. The Mets had previously aired their games on WFAN since the station was founded in 1987, and factoring in the station's predecessors the relationship dated back to 1983. The relationship with WFAN ended following the 2013 season when the station acquired the radio rights to the New York Yankees from corporate sibling WCBS. WOR acquired the radio rights to the Mets during the 2013 offseason; the move made the team the first professional team since the now-Brooklyn Nets to air its games on WOR; the Nets, along with their then-arenamates the New Jersey Devils, were picked up by WFAN following the station's loss of broadcast rights for the New York Knicks and New York Rangers in 2004. With the move to WCBS, the relationship between WFAN and the Mets was repaired, with WFAN employees again allowed to appear on Mets broadcasts. WEPN is the Spanish-language flagship. Howie Rose serves as play-by-play and color commentator on the broadcasts, alternating these roles with another broadcaster. Most recently this was Josh Lewin, who called games alongside Rose from 2012-2018. Wayne Randazzo replaced Lewin as co play-by-play commentator and serves as post-game host. Ed Coleman previously hosted the pre-game and post-game shows, which were called Mets Extra by WFAN, and served as a substitute broadcaster when necessary (usually for Lewin, who, in addition to his Mets duties, was the radio voice of the San Diego Chargers and was forced to miss weekend games in September in order to fulfill those duties). However, in January 2014 it was announced that Coleman would not be part of the WOR broadcasts as he has been employed by WFAN since its inception. (Although WFAN personalities Chris Carlin and Marc Malusis have been heard on WOR through its broadcasts of Rutgers University sporting events, WOR does not produce Rutgers' games and is instead an affiliate of its radio network.) Coleman returned to the Mets' booth as pre-game host in 2019 On April 1, 2019, Entercom announced that it had discontinued the Mets' radio network and would be carrying games only on WCBS for the 2019 season. The Mets cited the loss of some of its affiliates prior to the season (among them WROW in Albany) and the relative expense of satellite space for the discontinuation. At least one station, WTLA in Syracuse (the city that houses the Mets' AAA
https://en.wikipedia.org/wiki/Hash%20consing
In computer science, particularly in functional programming, hash consing is a technique used to share values that are structurally equal. When a value is constructed, such as a cons cell, the technique checks if such a value has been constructed before, and if so reuses the previous value, avoiding a new memory allocation. A useful property of hash consing is that two structures can be tested for equality in constant time via pointer equality, which in turn can improve efficiency of divide and conquer algorithms when data sets contain overlapping blocks. Hash consing has been shown to give dramatic performance improvements—both space and time—for symbolic and dynamic programming algorithms. Hash consing is most commonly implemented with hash tables storing weak references that may be garbage-collected when the data stored therein contains no references from outside the table. Example Simple, not very efficient, but suitable for demonstration of the concept implementation of a memoizer by means of hash table and weak references in Scheme: ;; weak hashes ;; (require 'hash-table) (define (make-weak-table . args) (apply make-hash-table args)) (define (weak-table-set! table key data) (let ((w (hash-table-ref table key #f))) (if w (vector-set! w 0 data) (let ((w (make-weak-vector 1))) (vector-set! w 0 data) (hash-table-set! table key w))))) (define (weak-table-ref table key) (let ((w (hash-table-ref table key #f))) (if w (vector-ref w 0) #f))) ;; memoizer factory: for given (side-effect-free) procedure, ;; return a procedure which does the same memoizing some of results ;; in the sense of equal? on the whole list of args ;; (define (make-weak-memoizer proc) (let ((cache (make-weak-table equal?))) (lambda args (let ((x (weak-table-ref cache args))) (if (bwp-object? x) (let ((r (apply proc args))) (weak-table-set! cache args r) r) x))))) History A hash consing compilation technique was presented by A.P. Ershov in 1958. The term "hash consing" originates from implementations in the context of Lisp in the 1970s. See also String interning Flyweight pattern Merkle tree Hashlife Interning References Further reading Jean Goubault. Implementing Functional Languages with Fast Equality, Sets and Maps: an Exercise in Hash Consing. In Journées Francophones des Langages Applicatifs (JFLA’93), pages 222–238, Annecy, February 1993. Implementation of functional programming languages Hashing Articles with example Scheme (programming language) code
https://en.wikipedia.org/wiki/Personal%20Knowbase
Personal Knowbase is a freeform notes database application for Microsoft Windows. Personal Knowbase was first released in 1998 on the CompuServe Information Service and is an example of a personal knowledge base. Text articles are displayed in a flat, rather than tree-based, listing. Stored articles are retrieved using a scheme based on user-defined keywords. This type of keyword-based system was based on the keyword systems used by common research databases of the 1990s, such as Knowledge Index and CompuServe's file library, and is similar to the keywords Index for a MS Help file. In recent Internet usage, such keywords are now often referred to as metadata "tags". Articles are filtered using various criteria, including keywords, dates, and attachments. A free read-only version of the program, called Personal Knowbase Reader, is available to allow for distribution of content in the Personal Knowbase format. Features Boolean queries on keywords Hypertext links to external files and between articles Attachments to external files and URLs Password protection Reminders Export to external formats Import external formats Portability Personal Knowbase is a portable application and can be installed directly onto a USB flash drive. See also List of personal information managers List of portable software References Notes Tucows.com Spotlight on Personal Knowbase The 2005 WD Guide to Writing Software Review on TechNewsWorld Stephen Davies, Still Building the Memex, Communications of the ACM, Volume 54 Issue 2, February 2011 External links Portable Installation Note-taking software Personal information managers
https://en.wikipedia.org/wiki/Fractional%20lambda%20switching
Fractional lambda switching (FλS) leverages on time-driven switching (TDS) to realize sub-lambda switching in highly scalable dynamic optical networking, which requires minimum (possibly optical) buffers. Fractional lambda switching implies switching fractions of optical channels as opposed to whole lambda switching where whole optical channels are the switching unit. In this context, TDS has the same general objectives as optical burst switching and optical packet switching: realizing all-optical networks with high wavelength utilization. TDS operation is based on time frames (TFs) that can be viewed as virtual containers for multiple IP packets that are switched at every TDS switch based on and coordinated by the UTC (coordinated universal time) signal implementing pipeline forwarding. In the context of optical networks, synchronous virtual pipes SVPs typical of pipeline forwarding are called fractional lambda pipes (FλPs). In FλS, likewise in TDS, all packets in the same time frame are switched in the same way. Consequently, header processing is not required, which results in low complexity (hence high scalability) and enables optical implementation. The TF is the basic SVP capacity allocation unit; hence, the allocation granularity depends on the number of TFs per time cycle. For example, with a 10 Gbit/s optical channel and 1000 TFs in each time cycle, the minimum FλP capacity (obtained by allocating one TF in every time cycle) is 10 Mbit/s. Scheduling through a switching fabric is based on a pre-defined schedule, which enables the implementation of a simple controller. Moreover, low-complexity switching fabric architectures, such as Banyan, can be deployed notwithstanding their blocking features, thus further enhancing scalability. In fact, blocking can be avoided during schedule computation by avoiding conflicting input/output connections during the same TF. Several results show that (especially if multiple wavelength division multiplexing channels are deployed on optical links between fractional λ switches) high link utilization can be achieved with negligible blocking using a Banyan network without speedup. Various aspects of the technology are covered by several patents issued by both the United States Patent and Trademark Office and the European Patent Office. References Computer networking
https://en.wikipedia.org/wiki/Nippon%20Television%20Network%20System
Nippon Television Network System (NNS; ) is a Japanese television network organized by The Yomiuri Shimbun Holdings through its subsidiary Nippon Television (NTV). NTV feeds entertainment and other non-news programming over NNS to 29 affiliated stations. Distribution of national television news bulletins is handled by Nippon News Network, another network set up by NTV. List of affiliates References External links Nippon TV Television networks in Japan Television channels and stations established in 1972
https://en.wikipedia.org/wiki/E2open
e2open, LLC is a business-to-business provider of cloud-based, on-demand software for supply chains for computer, telecom and electronics systems, components and services. The company was founded in 2000 as a joint project of 8 major companies: Hitachi, IBM, LG Electronics, Matsushita, Nortel, Seagate, Solectron, and Toshiba. E2open offers its products across a variety of industries, including high technology, industrial manufacturing, telecommunications, life sciences, oil and gas, consumer electronics, aerospace and defense, and consumer goods. Company E2open is headquartered in Austin, Texas, with offices in Parsippany, NJ, Atlanta, Germany, United Kingdom, Denmark, The Netherlands, Belgium, China, Australia, New Zealand, Malaysia, India and Perú. According to the company's estimate, more than 60,000 trading partners and 200,000 unique registered users currently participate in the E2open Business Network. In July 2012, E2open went public on the NASDAQ. In March 2015, Insight Venture Partners announced that it had completed its acquisition of E2open. In February 2021, E2open went public via SPAC (special purpose acquisition company) merger and began trading under the ticker ETWO. Acquisitions by E2open July 2013: acquired supply chain vendor ICON-SCM. June 2014: acquisition of SERUS Corporation, a "cloud-based manufacturing and product management provider". March 2016: acquisition of Terra Technology. June 2016: acquired Orchestro. February 2017: acquired Steelwedge. Late 2017: acquired Channel Data Management provider Zyme. Early 2018: acquired Entomo and Birch Worldwide. October 2018: bought the shipping platform INTTRA. October 2018: bought Cloud Logistics. July 2, 2019: E2open completes acquisition of global trade management software company Amber Road. May 2021: acquired logistics execution platform BluJay Solutions for $1.7B. March 2022: acquisition of Logistyx Technologies for . See also Supply-chain management Electronic commerce Enterprise application integration References Supply chain software companies Service-oriented (business computing) Software industry Cloud platforms Business software companies Software companies of the United States 2000 establishments in the United States 2000 establishments in California Software companies established in 2000 Companies established in 2000 2015 mergers and acquisitions 2013 mergers and acquisitions Companies formerly listed on the Nasdaq
https://en.wikipedia.org/wiki/The%20Graveyard%20%28video%20game%29
The Graveyard is a computer art game developed by Belgian developer Tale of Tales in which the player assumes the role of an elderly woman walking through a graveyard to a bench. The Graveyard was nominated for the Innovation Award at the 2009 Independent Games Festival. The game was one of the inspirations for the Tibetan village scene in Uncharted 2: Among Thieves. References 2008 video games Android (operating system) games Art games IOS games MacOS games Monochrome video games Video games developed in Belgium Video games featuring female protagonists Video games set in cemeteries Windows games Video games about old age Tale of Tales (company) games
https://en.wikipedia.org/wiki/Hot%20spot%20%28computer%20programming%29
A hot spot in computer science is most usually defined as a region of a computer program where a high proportion of executed instructions occur or where most time is spent during the program's execution (not necessarily the same thing since some instructions are faster than others). If a program is interrupted randomly, the program counter (the pointer to the next instruction to be executed) is frequently found to contain the address of an instruction within a certain range, possibly indicating code that is in need of optimization or even indicating the existence of a 'tight' CPU loop. This simple technique can detect highly used instructions, although more-sophisticated methods, such as instruction set simulators or performance analyzers, achieve this more accurately and consistently. History of hot spot detection The computer scientist Donald Knuth described his first encounter with what he refers to as a jump trace in an interview for Dr. Dobb's Journal in 1996, saying: In the '60s, someone invented the concept of a 'jump trace'. This was a way of altering the machine language of a program so it would change the next branch or jump instruction to retain control, so you could execute the program at fairly high speed instead of interpreting each instruction one at a time and record in a file just where a program diverged from sequentiality. By processing this file you could figure out where the program was spending most of its time. So the first day we had this software running, we applied it to our Fortran compiler supplied by, I suppose it was in those days, Control Data Corporation. We found out it was spending 87 percent of its time reading comments! The reason was that it was translating from one code system into another into another. Iteration The example above serves to illustrate that effective hot spot detection is often an iterative process and perhaps one that should always be carried out (instead of simply accepting that a program is performing reasonably). After eliminating all extraneous processing (just by removing all the embedded comments for instance), a new runtime analysis would more accurately detect the "genuine" hot spots in the translation. If no hot spot detection had taken place at all, the program may well have consumed vastly more resources than necessary, possibly for many years on numerous machines, without anyone ever being fully aware of this. Instruction set simulation as a hot spot detector An instruction set simulator can be used to count each time a particular instruction is executed and later produce either an on-screen display, a printed program listing (with counts and/or percentages of total instruction path length) or a separate report, showing precisely where the highest number of instructions took place. This only provides a relative view of hot spots (from an instruction step perspective) since most instructions have different timings on many machines. It nevertheless provides a measure of highly u
https://en.wikipedia.org/wiki/Russian%20Television%20and%20Radio%20Broadcasting%20Network
Russian Television and Radio Broadcasting Network (RTRN) () is a unitary enterprise created on August 13, 2001, by decree of the president of the Russian Federation. The company is included in the list of Russian strategic enterprises. RTRN operates Russia's digital terrestrial television (DTT) network — the largest operating broadcasting network in the world. It consists of 5040 transmission sites and 10,080 transmitters. Almost 75% out of the 5040 transmission sites were built from scratch. RTRN's DTT services cover 98,4% of the Russian population. RTRN provides terrestrial transmission of 20 must-carry public television channels and three radio stations broadcasting over the territory of the Russian Federation. RTRN also serves other radio and television channels of both all-Russian and regional types distributing the programs of the latter. Multichannel terrestrial radio and television broadcasting in Russia is provided by 78 broadcasting centers functioning as RTRN regional branches. Moscow broadcasting signal reaches the regions through satellite and land communication channels. RTRN was appointed to execute the deployment of the DTT network in the DVB-T2 standard according to the federal target programme "Development of TV and Radio Broadcasting in the Russian Federation in 2009-2018". RTRN is a member of DVB consortium, and was a member of the European Broadcasting Union (EBU) before withdrawal from the union in February 2022. The Digital Switchover It took RTRN 10 years to move from analogue to digital broadcasting. The Digital Switchover (DSO) was completed in late 2019. On December 3, 2009, the Russian Government approved the federal target programme "Development of TV and Radio Broadcasting in the Russian Federation in 2009-2018". The main objective of the programme was to provide the population of the Russian Federation with free-to-air multichannel digital TV and radio broadcasting. Before 2010 almost half of Russia's population, 44%, could watch no more than four channels. There was no room left for development of analogue broadcasting. Authorities have envisaged TV multiplexes in 2009. The list of channels in the first of the two of them was approved by a decree of the President of Russia. Over a period of 10 years, about 100 million TV-sets and about 20 million digital set-top boxes were sold. This had set the stage for the analogue switch-off (ASO). On November 29, 2018, the Russian government approved the ASO roadmap. The federal target programme included modernizing the whole structure of terrestrial broadcasting. It is considered the biggest programme of digital TV development in the world. In December 2018, the pilot region, the Tver Region, phased out analogue broadcasting of 20 federal TV channels. In 2019, Russia switched off analogue TV broadcasting in four stages: February 11 (8 regions), April 15 (20 regions), June 3 (36 regions) and October 14 (21 regions). Russia was the first BRICS country to complete the
https://en.wikipedia.org/wiki/Isle%20of%20Wight%20Railway%20Company
The Isle of Wight Railway Company can refer to two bodies: The historical company which built and operated the Isle of Wight Railway network from 1864 to 1923. The modern company which formed from the Wight Locomotive Society, which re-built, operates and maintains the Isle of Wight Steam Railway.
https://en.wikipedia.org/wiki/Vertica
Vertica is an analytic database management software company. Vertica was founded in 2005 by the database researcher Michael Stonebraker with Andrew Palmer as the founding CEO. Ralph Breslauer and Christopher P. Lynch served as CEOs later on. Lynch joined as Chairman and CEO in 2010 and was responsible for Vertica's acquisition by Hewlett Packard in March 2011. The acquisition expanded the HP Software portfolio for enterprise companies and the public sector group. As part of the merger of Micro Focus and the Software division of Hewlett Packard Enterprise, Vertica joined Micro Focus in September 2017. As part of OpenText acquisition of Micro Focus, Vertica joined OpenText in January 2023. Products The column-oriented Vertica Analytics Database was designed to manage large, fast-growing volumes of data and with fast query performance for data warehouses and other query-intensive applications. The product claims to greatly improve query performance over traditional relational database systems, and to provide high availability and exabyte scalability on commodity enterprise servers. Vertica runs on multiple cloud computing systems as well as on Hadoop nodes. Vertica's Eon Mode separates compute from storage, using S3 object storage and dynamic allocation of compute notes. Vertica's design features include: Column-oriented storage organization, which increases performance of sequential record access at the expense of common transactional operations such as single record retrieval, updates, and deletes. Massively parallel processing (MPP) architecture to distribute queries on independent nodes and scale performance linearly. Standard SQL interface with many analytics capabilities built-in, such as time series gap filling/interpolation, event-based windowing and sessionization, pattern matching, event series joins, statistical computation (e.g., regression analysis), and geospatial analysis. In-database machine learning including categorization, fitting and prediction without down-sampling and data movement. Vertica offers a variety of in-database algorithms, including linear regression, logistic regression, k-means clustering, Naive Bayes classification, random forest decision trees, XGBoost, and support vector machine regression and classification. It also allows deployment of ML models to multiple clusters. High compression, possible because columns of homogeneous datatype are stored together and because updates to the main store are batched. Automated workload management, data replication, server recovery, query optimization, and storage optimization. Native integration with open source big data technologies like Apache Kafka and Apache Spark. Support for standard programming interfaces, including ODBC, JDBC, ADO.NET, and OLEDB. High-performance and parallel data transfer to statistical tools and built-in machine learning algorithms. Vertica's specialized approach aims to significantly increase query performance in data warehouses,
https://en.wikipedia.org/wiki/System%20Alliance%20Europe
System Alliance Europe is a cooperative of medium-sized freight forwarders. Since its foundation in 2005, the cooperative has expanded. At the moment, the network consists of 61 partners, with 196 branches across 32 European countries. In 2015, the network transported 3.9 million consignments. The network partners employed 76,779 people that year. Logistics companies of Germany Companies based in Lower Saxony
https://en.wikipedia.org/wiki/WolframAlpha
WolframAlpha ( ) is an answer engine developed by Wolfram Research. It answers factual queries by computing answers from externally sourced data. WolframAlpha was released on May 18, 2009, and is based on Wolfram's earlier product Wolfram Mathematica, a technical computing platform. WolframAlpha gathers data from academic and commercial websites such as the CIA's The World Factbook, the United States Geological Survey, a Cornell University Library publication called All About Birds, Chambers Biographical Dictionary, Dow Jones, the Catalogue of Life, CrunchBase, Best Buy, and the FAA to answer queries. A Spanish language version was launched in 2022. Technology Overview Users submit queries and computation requests via a text field. WolframAlpha then computes answers and relevant visualizations from a knowledge base of curated, structured data that come from other sites and books. It can respond to particularly phrased natural language fact-based questions. It displays its "Input interpretation" of such a question, using standardized phrases. It can also parse mathematical symbolism and respond with numerical and statistical results. Development WolframAlpha is written in the Wolfram Language, a multi-paradigm programming language, and implemented in Mathematica. Wolfram language is proprietary and is not commonly used by developers. Usage WolframAlpha was used to power some searches in the Microsoft Bing and DuckDuckGo search engines but is no longer used to provide search results. For factual question answering, WolframAlpha was used by Apple's Siri and Amazon Alexa for math and science queries but is no longer operational within those services. WolframAlpha became available in July 2020 within Microsoft Excel, but the Microsoft-Wolfram partnership ended nearly two years later, in 2022, in favor of Microsoft Power Query data types. WolframAlpha functionality in Microsoft Excel ended in June 2023. History Launch preparations for WolframAlpha began on May 15, 2009 at 7 p.m. CDT and were broadcast live on Justin.tv. The plan was to publicly launch the service a few hours later. However, there were issues due to extreme load. The service officially launched on May 18, 2009, receiving mixed reviews. In 2009, WolframAlpha advocates pointed to its , some stating that how it determines results is more important than current usefulness. WolframAlpha was free at launch, but later Wolfram Research attempted to monetize the service by launching an iOS application with a cost of $50, while the website itself was free. That plan was abandoned after criticism. On February 8, 2012, WolframAlpha Pro was released, offering users additional features for a monthly subscription fee. Some high-school and college students use WolframAlpha to cheat on math homework, though Wolfram Research says the service helps students understand math with its problem-solving capabilities. Copyright claims InfoWorld published an article warning readers of the potentia
https://en.wikipedia.org/wiki/Iceandfire
iceandfire is a London-based charity. Its stated mission is to explore human rights stories through theatrical performance. It also runs Actors for Human Rights, a network of volunteer actors across the UK. History iceandfire was founded in 2003 by playwright Sonja Linden inspired by her seven years as writer in residence at the Medical Foundation for the Care of Victims of Torture (now Freedom from Torture). Their first theatrical production was I Have Before Me a Remarkable Document Given to me by a Young Lady From Rwanda (2003), which opened at the Finborough Theatre in London and has since been performed across Europe and the United States of America. Other productions are listed below. Since 2009 the Artistic Director has been Christine Bacon - initially as co-director with Sara Masters and since 2011 as the sole Artistic Director. She is a graduate of Oxford University's Refugee Studies Centre Actors for Human Rights Actors for Human Rights was formerly known as Actors for Refugees. The original network was formed in Melbourne, Australia, in September 2001, in the wake of a series of aggressive and controversial actions by the Australian government towards asylum seekers arriving by boat. Founding members Alice Garner and Kate Atkinson wanted to use Australian actors to influence community attitudes toward refugees and asylum seekers and to encourage a humanitarian response to their plight. The UK actors' network was launched in June 2006 at Amnesty International and now consists of well over 300 professional actors and musicians. The outreach network responds to requests for rehearsed readings of documentary plays and they can go anywhere at any time. The scripts are made up of verbatim accounts from individuals who have suffered human rights abuses. Because of the simplicity and documentary nature of the scripts, the performances do not need lengthy rehearsal or direction and are simply read out by a constantly changing cast, usually accompanied by a live score. Juliet Stevenson, Sinéad Cusack, Simon Callow, Dan Stevens (The Line of Beauty), Hayley Atwell (Brideshead Revisited), Thusitha Jayasundera (The Bill), Shobna Gulati (Coronation Street), Shobu Kapoor (Eastenders) and Sam Spruell (London to Brighton) are amongst the professional actors that support the project. Documentary scripts include Asylum Monologues, Asylum Dialogues, Rendition Monologues, Palestine Monologues, The Illegals, Close to Home: The Cuts, Getting On, On a Clear Day You Can See Dover, Even if we Lose Our Lives and Broke. Productions I Have Before Me a Remarkable Document Given to Me by a Young Lady From Rwanda (2003) by Sonja Linden This play is about an English writer's friendship with a young woman who survived the Rwandan massacre and is living in London as a refugee and trying to write about her experience. It was published as a play text in 2004 by Aurora Books. Crocodile Seeking Refuge (2005) by Sonja Linden Welcome to Ramallah (2008) by Sonja
https://en.wikipedia.org/wiki/Cleveland%20Guardians%20Radio%20Network
The Cleveland Guardians Radio Network is an American radio network composed of 39 radio stations for the Cleveland Guardians, a professional baseball team in Major League Baseball (MLB). Cleveland sister stations WTAM () and WMMS () serve as the network's two flagships; WTAM also relays its signal over a low-power FM translator. The network also includes 26 affiliates in the U.S. states of Ohio, Pennsylvania, and New York: seventeen AM stations, eleven of which supplement their signals with low-power FM translators, eight full-power FM stations and one HD Radio subchannel that supplements its signal with a low-power FM translator. Tom Hamilton and Jim Rosenhaus currently serve as the network's play-by-play announcers. In addition to traditional over-the-air AM and FM broadcasts, network programming airs on SiriusXM satellite radio; and streams online via SiriusXM Internet Radio, TuneIn Premium, and MLB.com Gameday Audio. History In May 15, 1948, the first broadcast happened at Cleveland Municipal Stadium where the then-Indians met the Chicago White Sox where broadcaster Van Patrick called the game where the Indians won 7-1. Programming Play-by-play announcers Tom Hamilton and Jim Rosenhaus call games on-site. Rosenhaus hosts Guardians Warm-Up, the network pregame show; and Hamilton hosts Guardians Wrap-Up, the network postgame show; both shows typically run 30 minutes each. Additional network programming includes the following: Guardians Update, a daily drive-time segment anchored by Rosenhaus Guardians Weekly, a weekly year-round show hosted by Rosenhaus; airs on Saturday evenings Note that not all network affiliates carry the latter two programs; co-flagship WTAM carries all originated network programming. Announcers Station list Asterisk (*) indicates HD Radio broadcast. Blue background indicates low-power FM translator. Network map References External links Guardians Radio Network SiriusXM.com: Cleveland Guardians TuneIn.com: Cleveland Guardians MLB.com Gameday Audio Cleveland Guardians Major League Baseball on the radio Radio in Cleveland Sports radio networks in the United States
https://en.wikipedia.org/wiki/Rubber%20duck%20debugging
In software engineering, rubber duck debugging (or rubberducking) is a method of debugging code by articulating a problem in spoken or written natural language. The name is a reference to a story in the book The Pragmatic Programmer in which a programmer would carry around a rubber duck and debug their code by forcing themselves to explain it, line by line, to the duck. Many other terms exist for this technique, often involving different (usually) inanimate objects, or pets such as a dog or a cat. Teddy bears are also widely used. Approach Many programmers have had the experience of explaining a problem to someone else, possibly even to someone who knows nothing about programming, and then hitting upon the solution in the process of explaining the problem. In describing what the code is supposed to do and observing what it actually does, any incongruity between these two becomes apparent. More generally, teaching a subject forces its evaluation from different perspectives and can provide a deeper understanding. By using an inanimate object, the programmer can try to accomplish this without having to interrupt anyone else, and with better results than have been observed from merely thinking aloud without an audience. This approach has been taught in computer science and software engineering courses. In popular culture On 1 April 2018, Stack Exchange introduced a rubber duck avatar on their websites as a new "feature" called Quack Overflow as an April Fools' Day joke. The duck appeared at the bottom right corner of the browser viewport, and attempted to help visitors by listening to their problems and responding with solutions. However, the duck merely produced a quack sound after apparently thinking and typing. It referenced rubber ducking as a powerful method for solving problems. See also Code review Pair programming Socratic method Desk checking Software walkthrough Think aloud protocol Pointing and calling Rogerian method Worry dolls References External links Rubber Duck Debugging Debugging Computer programming folklore Ducks
https://en.wikipedia.org/wiki/Highline%20Big%20Picture
Highline Big Picture is a small school in the Highline School District in Burien, Washington, that is part of a network of Big Picture schools all over the United States. The high school opened in 2005 with 2009 being the first year with a graduating class. It is a small school with an average teacher-to-student ratio of 1:17. Highline Big Picture, as part of the Big Picture Network, practices Learning Through Internships or LTI as it is known in the school. On Tuesdays and Thursdays students look for interviews with people in their interest field, this is followed up with shadow day with them. Shadow day within the school is a day in which you follow the people you interview around for a day or two. This is to help the student get an internship at the same place of their choice. Once the student has an internship, they can learn real-world experiences in the field they want to be in. The person that helps them in their internship is called a Mentor. They help them both learn in their field but also can give feedback to the LTI project they do during the rest of the school week. Students are not limited to only one internship or only one job field to pursue. The purpose of LTI and the internships is to help the student learn what they want to do in their lives. High school At Highline Big Picture each grade level, 9th through 12th,has its own special name. 9th graders are called 101's, 10th graders, 201's, 11th graders, 301's and 12th graders, 401's. Each grade level has two classes and each class is called an advisory. As each class goes on to the next year, all the students and teachers stay together to keep a class bond with each other. Middle school Highline Big Picture also hosts a middle school, which they call them selves Middle Earth. The school offers 6th grade through 8th grades with classes consisting of 20 students and one teacher. The middle school currently has 75 students. The middle school is project-based and students have the opportunity to subsidize classroom instruction with frequent whole-class field trips to various locations throughout the greater Seattle area. References http://www.bigpicture.org https://web.archive.org/web/20090220003455/http://hsd401.org/ourschools/highschools/bigpicture/ High schools in King County, Washington Public high schools in Washington (state) Educational institutions established in 2005 2005 establishments in England
https://en.wikipedia.org/wiki/World%20Day%20Against%20Cyber%20Censorship
World Day Against Cyber Censorship is an online event held each year on March 12 to draw attention to the ways that governments around the world are deterring and censoring free speech online. The day was first observed on 12 March 2008 at the request of Reporters Without Borders and Amnesty International. A letter written by Jean-François Julliard, Secretary-General of Reporters Without Borders, and Larry Cox, Executive Director of Amnesty International, was sent to the Chief Executive Officers of Google, Yahoo!, Inc., and Microsoft Corporation to request observation of the day. The annual event is symbolized by a logo created by Reporters Without Borders consisting of a computer mouse breaking free from a chain. Netizen Prize On World Day Against Cyber Censorship, Reporters Without Borders awards an annual Netizen Prize that recognizes an Internet user, blogger, cyber-dissident, or group who has made a notable contribution to the defense of online freedom of expression. Starting in 2010 the prize has been awarded to: 2010: Iranian women's rights activists of the Change for Equality website, www.we-change.org. 2011: the founders of a Tunisian blogging group named Nawaat.org. 2012: Syrian citizen journalists and activists of the Media center of the Local Coordination Committees. 2013: Vietnamese blogger Huynh Ngoc Chenh. 2014: Saudi Arabian blogger Raif Badawi. Enemies of the Internet list In conjunction with World Day Against Cyber Censorship, Reporters Without Borders updates its Enemies of the Internet and Countries Under Surveillance lists. See also Internet censorship Internet censorship and surveillance by country Reporters Without Borders References External links "Privacy is for the powerless." Edward Snowden, at Amnesty International, March 2016 International observances Internet censorship Freedom of the press March observances 2008 introductions
https://en.wikipedia.org/wiki/Mpozo
Mpozo is a town in the Bas-Congo province of the Democratic Republic of the Congo near the border with Angola. Transport The town is served by a railway station on the national network. See also Railway stations in DRCongo References Populated places in Kongo Central
https://en.wikipedia.org/wiki/List%20of%20Soviet%20films%20of%201930
A list of films produced in the Soviet Union in 1930 (see 1930 in film). 1930 See also 1930 in the Soviet Union External links Soviet films of 1930 at the Internet Movie Database 1930 Soviet Films
https://en.wikipedia.org/wiki/List%20of%20Soviet%20films%20of%201931
A list of films released in the Soviet Union in 1931 (see 1931 in film). See also 1931 in the Soviet Union External links Soviet films of 1931 at the Internet Movie Database 1931 Soviet Films
https://en.wikipedia.org/wiki/List%20of%20Soviet%20films%20of%201932
A list of films produced in the Soviet Union in 1932 (see 1932 in film). 1932 See also 1932 in the Soviet Union External links Soviet films of 1932 at the Internet Movie Database 1932 Soviet Films
https://en.wikipedia.org/wiki/List%20of%20Soviet%20films%20of%201933
A list of films produced in the Soviet Union in 1933 (see 1933 in film). 1933 See also 1933 in the Soviet Union External links Soviet films of 1933 at the Internet Movie Database 1933 Soviet Films
https://en.wikipedia.org/wiki/List%20of%20Soviet%20films%20of%201934
A list of films produced in the Soviet Union in 1934 (see 1934 in film). 1934 See also 1934 in the Soviet Union External links Soviet films of 1934 at the Internet Movie Database 1934 Soviet Films
https://en.wikipedia.org/wiki/List%20of%20Soviet%20films%20of%201935
A list of films produced in the Soviet Union in 1935 (see 1935 in film). 1935 See also 1935 in the Soviet Union External links Soviet films of 1935 at the Internet Movie Database 1935 Soviet Films
https://en.wikipedia.org/wiki/List%20of%20Soviet%20films%20of%201939
A list of films produced in the Soviet Union in 1939 (see 1939 in film). 1939 See also 1939 in the Soviet Union External links Soviet films of 1939 at the Internet Movie Database 1939 Soviet Films
https://en.wikipedia.org/wiki/List%20of%20Soviet%20films%20of%201938
A list of films produced in the Soviet Union in 1938 (see 1938 in film). 1938 See also 1938 in the Soviet Union External links Soviet films of 1938 at the Internet Movie Database 1938 Soviet Films
https://en.wikipedia.org/wiki/List%20of%20Soviet%20films%20of%201937
A list of films produced in the Soviet Union in 1937 (see 1937 in film). 1937 See also 1937 in the Soviet Union External links Soviet films of 1937 at the Internet Movie Database 1937 Soviet Films
https://en.wikipedia.org/wiki/List%20of%20Soviet%20films%20of%201936
A list of films produced in the Soviet Union in 1936 (see 1936 in film). 1936 See also 1936 in the Soviet Union External links Soviet films of 1936 at the Internet Movie Database 1936 Soviet Films
https://en.wikipedia.org/wiki/Fukui%20Broadcasting
is a TV station, established 1 June 1960, affiliated with Nippon News Network (NNN), Nippon Television Network System (NNS) and All-Nippon News Network (ANN) (since 1989) in Fukui, Fukui. It broadcasts in Fukui Prefecture. Radio FBC AM Radio Fukui 864 kHz JOPR Tsuruga 1557 kHz Obama 1557 kHz FBC FM Radio Fukui 94.6 MHz Tsuruga 93.6 MHz Obama 94.6 MHz TV channel Digital Television Fukui JOPR-DTV 20ch 1 kW Tandem office Ōno 42ch 10W Katsuyama 28ch 3W Tsuruga 28ch 10W  Obama 47ch 10W Mihama 28ch 10W Kaminaka 35ch 3W Mikuni 30ch 3W Sabae-kawada 44ch 1W Takefu-minami 36ch 1W Program References External links The official website of Fukui Broadcasting Nippon News Network All-Nippon News Network Television stations in Japan Mass media in Fukui (city) Television channels and stations established in 1960 Mass media companies established in 1960 Companies based in Fukui Prefecture 1960 establishments in Japan
https://en.wikipedia.org/wiki/Bakwa-Kasanga
Bakwa-Kasanga is a town in central Democratic Republic of the Congo. Transport The town is served by a station on the national railway network. See also List of railway stations in the Democratic Republic of the Congo References Geography of the Democratic Republic of the Congo
https://en.wikipedia.org/wiki/Master%20of%20European%20Design
Master of European Design (MEDes) is a unique degree programme within a network of seven leading design schools in Europe. The structure of the programme During the five-year programme, students experience three design education systems and join a strong international community. The location diversity provides insight into design approaches, multi-national perspectives and creates sensitivity towards cultural differences. In the first and second year, the students study at their home universities The third year is spent at one of the international partner universities At the end of third year, the students submit their BA theses to their home university. The fourth year is spent at a second partner university For the fifth - final year - the students return to their home universities to complete their Master theses. During the two years abroad the students follow the curricular content offered by the programme of the respective partner university. This results in each student acquiring a unique skill set and combination of projects. The studies abroad take place in English or in the respective national language. The seven European Design partner institutions Glasgow School of Art, Glasgow, United Kingdom Aalto School of Art and Design, Helsinki, Finland Politecnico di Milano, Milan, Italy ENSCI-Les Ateliers, Paris, France Konstfack, Stockholm, Sweden Köln International School of Design, Cologne, Germany University of Aveiro, Aveiro, Portugal Previous partners Staatliche Akademie der Bildenden Künste Stuttgart References Sources Official Homepage Description of MEDes on Köln International School of Design Homepage Description of MEDes on the ENSCI Homepage Description of MEDes on the Politecnico di Milano Homepage An Article about MEDes on core77 Design blog MEDes on cumulusassociation.org External links Official Website of the Master of European Design Programme (MEDes) Glasgow School of Art, GB-Glasgow University of Art and Design, FI-Helsinki Politecnico di Milano, I-Mailand ENSCI-Les Ateliers, F-Paris Konstfack, SE-Stockholm Staatliche Akademie der bildenden Künste, D-Stuttgart Köln International School of Design, D-Köln Master's degrees
https://en.wikipedia.org/wiki/PacketFence
PacketFence is an open-source network access control (NAC) system which provides the following features: registration, detection of abnormal network activities, proactive vulnerability scans, isolation of problematic devices, remediation through a captive portal, 802.1X, wireless integration and User-Agent / DHCP fingerprinting. The company that develops PacketFence, Inverse Inc. was acquired by Akamai Technologies on February 1, 2021. PacketFence version 10 supports Red Hat Enterprise Linux 7 and its derivatives, notably CentOS, and Debian Stretch. Inverse Inc. has also been releasing a version of PacketFence dubbed the "Zero Effort NAC", which is a standalone Virtual Appliance that is preconfigured installation of PacketFence, making it easier than ever to deploy a NAC in your environment. PacketFence version 11 added support for Red Hat Enterprise Linux 8 and it's derivatives, notably CentOS, and Debian Bullseye. Further reading External links PacketFence website PacketFence on GitHub References FLOSS Weekly 155: PacketFence, at the FLOSS Weekly podcast, March 2, 2011, retrieved March 3, 2011. Internet Protocol based network software Computer network security Free network management software
https://en.wikipedia.org/wiki/Virtual%20prototyping
Virtual prototyping is a method in the process of product development. It involves using computer-aided design (CAD), computer-automated design (CAutoD) and computer-aided engineering (CAE) software to validate a design before committing to making a physical prototype. This is done by creating (usually 3D) computer generated geometrical shapes (parts) and either combining them into an "assembly" and testing different mechanical motions, fit and function. The assembly or individual parts could be opened in CAE software to simulate the behavior of the product in the real world. Background The product design and development process used to rely primarily on engineers' experience and judgment in producing an initial concept design. A physical prototype was then constructed and tested in order to evaluate its performance. Without any way to evaluate its performance in advance, the initial prototype was highly unlikely to meet expectations. Engineers usually had to re-design the initial concept multiple times to address weaknesses that were revealed in physical testing. Move towards virtual prototypes Today, manufacturers are under pressure to reduce time to market and optimize products to higher levels of performance and reliability. A much higher number of products are being developed in the form of virtual prototypes in which engineering simulation software is used to predict performance prior to constructing physical prototypes. Engineers can quickly explore the performance of thousands of design alternatives without investing the time and money required to build physical prototypes. The ability to explore a wide range of design alternatives leads to improvements in performance and design quality. Yet the time required to bring the product to market is usually reduced substantially because virtual prototypes can be produced much faster than physical prototypes. End-to-end prototyping End-to-end prototyping accounts fully for how a product or a component is manufactured and assembled, and it links the consequences of those processes to performance. Early availability of such physically realistic virtual prototypes allows testing and performance confirmation to take place as design decisions are made; enabling the acceleration of the design activity and providing more insight on the relationship between manufacturing and performance than can be achieved by building and testing physical prototypes. The benefits include reduced costs in both design and manufacturing as physical prototyping and testing is dramatically reduced/eliminated and lean but robust manufacturing processes are selected. Effects The research firm Aberdeen Group reports that best-in-class manufacturers, who make extensive use of simulation early in the design process, hit revenue, cost, and launch date and quality targets for 86% or more of their products. Best-in-class manufacturers of the most complex products get to market 158 days earlier with $1.9 million lower costs than
https://en.wikipedia.org/wiki/Scott%20Reuben
Scott S. Reuben (born 1958) is an American anesthesiologist who falsified data heralding the benefits of the Pfizer pain medication Celebrex while downplaying its negative side effects. He was Professor of Anesthesiology and Pain Medicine at Tufts University in Boston, Massachusetts and chief of acute pain at Baystate Medical Center in Springfield, Massachusetts from February 1991 until 2009 when he was sentenced to prison for healthcare fraud. Reuben was considered to be a prolific and influential researcher in pain management, and his purported findings altered the way millions of patients are treated for pain during and after orthopedic surgeries. Reuben has now admitted that he never conducted any of the clinical trials on which his conclusions were based "in what may be considered the longest-running and widest-ranging cases of academic fraud." Scientific American has called Reuben the medical equivalent of Bernie Madoff, the former NASDAQ chairman who was convicted of orchestrating a $65-billion Ponzi scheme. Background Reuben was educated at Columbia University. He graduated from medical school at the State University of New York at Buffalo in 1985 and undertook his anesthesiology residency at Mount Sinai Medical Center in New York City. Reuben fell under suspicion when Baystate conducted a routine audit in May 2008 which revealed that Reuben had not been given approval for two studies that he intended to present during the hospital's research week. On March 10, 2009 a Baystate spokeswoman announced that Reuben admitted to fabricating many of the data underlying his research. Reuben never conducted the clinical trials that he wrote about in 21 journal articles dating from at least 1996. In some cases, he even invented the patients. Although Reuben often co-wrote papers with other researchers, Baystate found that the other researchers did not know about or participate in Reuben's studies, and their names were forged on documents. The hospital asked the journals to retract the studies, which reported favorable results from painkillers including Pfizer Inc.'s Bextra, Celebrex and Lyrica and Merck & Co. Inc.'s Vioxx. His studies also claimed Wyeth's antidepressant Effexor could be used as a painkiller. Pfizer gave Reuben five research grants between 2002 and 2007. He was a paid member of the company's speakers bureau, giving talks about Pfizer drugs to colleagues. Reuben also wrote to the Food and Drug Administration, urging the agency not to restrict the use of many of the painkillers he studied, citing his own data on their safety and effectiveness. "Doctors have been using (his) findings very widely," said Steven Shafer, editor of Anesthesia and Analgesia, a scientific journal that published ten articles identified as containing fraudulent data. "His findings had a huge impact on the field." He also described Reuben's actions as the biggest case of fraud in the history of anesthesiology. Fellow editor Paul White believed that Reuben
https://en.wikipedia.org/wiki/Climate%20Data%20Record
A Climate Data Record (CDR) is a specific definition of a climate data series, developed by the Committee on Climate Data Records from NOAA Operational Satellites of the National Research Council at the request of NOAA in the context of satellite records. It is defined as "a time series of measurements of sufficient length, consistency, and continuity to determine climate variability and climate change.". Such measurements provide an objective basis for the understanding and prediction of climate and its variability, such as global warming. Interim Climate Data Record (ICDR) An Interim Climate Data Record (ICDR) is a dataset that has been forward processed, using the baselined CDR algorithm and processing environment but whose consistency and continuity have not been verified. Eventually it will be necessary to perform a new reprocessing of the CDR and ICDR parts together to guarantee consistency, and the new reprocessed data record will replace the old CDR. Fundamental Climate Data Record (FCDR) A Fundamental Climate Data Record is a long-term data record of calibrated and quality-controlled data designed to allow the generation of homogeneous products that are accurate and stable enough for climate monitoring. Examples of CDRs AVHRR Pathfinder Sea Surface Temperature GHRSST-PP Reanalysis Project, on the website for Ghrsst-pp Snow and Ice NOAA's Climate Data Records homepage See also Temperature record References Approach to Providing Climate Data Records (CDRs) in Coordination with other US Agency Activities, Jeffrey L. Privette, John Bates, Thomas Karl, Bruce Barkstrom, Ed Kearns, and David Markham. 2009 AMS Conference Proceedings Climate Data Records From Environmental Satellites, Drobot et al. Creating Climate Data Records from NOAA Operational Satellites, a NOAA White Paper The Future of Climate Data Records Meteorological data and networks
https://en.wikipedia.org/wiki/Wall%20Street%20Journal%20Radio%20Network
The Wall Street Journal Radio Network was the radio arm of The Wall Street Journal, owned by Dow Jones. The radio news service served over 400 radio stations across North America and provided various programming. On November 12, 2014, Dow Jones announced that the Wall Street Journal Radio Network would cease operations at the close of the year. The move came after News Corporation had been split, with Dow Jones and other print publications moving to the new News Corp and broadcasting assets being spun off to 21st Century Fox (and, after that, Fox Corporation in 2019). It later became known that the network had been blacklisted because most of its affiliates carried conservative talk radio shows that were the subject of advertiser boycotts, and advertisers were unwilling to advertise on the network because of the chance that their barter commercials might air during one of the blacklisted shows. Programs The Wall Street Journal Report The Dow Jones Money Report Watching Your Wallet Barron's on Investment The Wall Street Journal This Morning The Wall Street Journal This Weekend The Sports Retort References External links WSJ Radio WSJ This Morning Defunct radio networks in the United States Radio Network Dow Jones & Company Radio stations disestablished in 2014
https://en.wikipedia.org/wiki/NATO%20Science%2C%20Technology%20and%20Research%20Network
The NATO Science, Technology and Research Network (STARNET) was developed to deal with the vast and rapidly growing amount of data relevant and vital to the success of the research and development process and the overall advancement and enhancement of technology innovation and development. The STARNET facilitates access to World Wide Web resources and information elements in terms of science, technology, and overall research. STARNET provides a virtual library; a "one-stop" source for policy makers, program managers, scientists, engineers, researchers and others for relevant information resources. Introduction The vast and rapidly growing amount of scientific and technical data and information concerning the diffusion of technology and innovation has increased pressure on organizations to push forward with their own technological developments and to take steps to maximize their inclusion into the research and development (R&D) process. This massive collection of data is vital to scientists, engineers, program managers, policy analysts, resource managers, and others. Access and communication to this information are central to the success of the innovation process in general and the management of R&D activities in particular. In addressing this problem within NATO, the Information Management Committee (IMC) of the NATO Research and Technology Organization (RTO) developed the Science, Technology and Research Network (STARNET). The purpose of this network is to facilitate access to information elements already existing worldwide in terms of science, technology, and overall research. STARNET is a database of Web-based data sources designed to facilitate access by providing comprehensive and sophisticated searches to worldwide science, technology, and research information. STARNET is unique in that it provides a searchable database of Web-based information resources relevant to nine scientific or thematic nodes. STARNET provides a value added resource; it filters the vast amount of information available on the World Wide Web to significantly improve the identification, delivery, and quality of needed information. Content submission of pertinent web resources is provided by NATO countries and by STARNET users’ nominations. A central NATO managing agent, the NATO Research and Technology Agency (RTA), maintains STARNET, assisted by IMC members to provide quality control and assure links to appropriate content. Each Web resource is evaluated for content and substance, and then cataloged into the appropriate STARNET node. Each node has specific topics assigned, and each node has its own inventory of selected web-available information resources based on relevance to the topics assigned to that node. STARNET has been designed as a system that can be adapted to address specific information needs as they arise within the NATO community. STARNET also provides a News and Events page pertinent to each Node, which provides a listing of conferences, me
https://en.wikipedia.org/wiki/Nanopunk
Nanopunk refers to an emerging subgenre of science fiction that is still very much in its infancy in comparison to its ancestor-genre, cyberpunk, and some of its other derivatives. The genre is especially similar to biopunk, but describes a world where nanites and bio-nanotechnologies are widely in use and nanotechnologies are the predominant technological forces in society. Currently the genre is mainly concerned with the artistic, psychological, and societal impact of nanotechnology, rather than aspects of the technology which itself is still in its infancy. Unlike cyberpunk, which can be distinguished by a gritty and low-life yet technologically advanced character, nanopunk can have a darker dystopian character that might examine potential risks by nanotechnology as well as a more optimistic outlook that might emphasize potential uses of nanotechnology. Comics M. Rex (1999) features nanites as the source of power for the title character. Scooby Apocalypse (2016–2019) reveals early on that a nanite virus originating from Velma's 'Elysium Project' experiment is the reason behind people becoming monsters. Literature Kathleen Ann Goonan (Queen City Jazz – 1997) and Linda Nagata were some of the earliest writers to feature nanotech as the primary element in their work. Another example of this genre is Neal Stephenson's The Diamond Age. Some novels of Stanislaw Lem, including Weapon System of the Twenty First Century or The Upside-down Evolution, The Invincible and Peace on Earth as well as Greg Bear's Blood Music could also be considered precursors of nanopunk. Another example is the Michael Crichton novel Prey (2002). Another of Crichton's novels, Micro (2011), could also be an example, but it focuses more on the idea of size-manipulation/shrinking of objects rather than nanotechnology. More recently, Nathan McGrath's Nanopunk (2013) is set in an icebound near-future where almost half the world's population has been wiped out. Alister, a child when "The Big Freeze" began is now a teenager in a society slowly finding its feet. Unaware of his nano-infection he sets out to find his lost sister and is joined by Suzie, a militant cyber-activist. Their hacking attracts the attention of Secret Services and a ruthless private military corporation and their search becomes a deadly race for survival. Linda Nagata's Tech Heaven (1995) is a futuristic thriller about Katie, a woman whose husband is about to die of injuries sustained in a helicopter crash. Instead of dying, he gets his body cryogenically preserved so that he can be reawakened when med-tech is advanced enough to heal him. The problem is that it winds up taking far more than the estimated few years for this to happen. Alastair Reynolds' Chasm City could also be considered nanopunk. Film and television Film Honey, I Shrunk the Kids (1989 film) Osmosis Jones (2001 film) The Day the Earth Stood Still (2008 film) G.I. Joe: The Rise of Cobra (2009 film) Transcendence (2014 film) Ant-Man (201
https://en.wikipedia.org/wiki/Steve%20Richardson%20%28puzzle%20designer%29
Steve Richardson is an American puzzle creator and founder of Stave Puzzles. Early life Steve Richardson was formerly a student of math and computer science (BA Colby, MBA University of Michigan). He lived with his wife in New Jersey until 1969 when they moved to Vermont. Soon after arriving in Vermont, Richardson started a game design business with artist Dave Tibbetts. Stave Puzzles Stave Puzzles was born in 1974 when a client offered $300 for a wooden jigsaw puzzle and Richardson and Tibbetts jumped at the opportunity. Richardson and Tibbetts combined their first names to form the name ‘Stave’. In 1976 Richardson bought out Tibbetts for $1 and a jigsaw. Richardson adopted the title ‘Chief Tormentor’ in 1978 and in the following years begin to receive national attention for his innovative puzzle designs. Clients of Richardson's designs include Bill Gates, Barbara Bush, and the Queen of the United Kingdom. "We have a sadomasochistic relationship with our customers," says Richardson. As a puzzle innovator, Richardson is credited with inventing the "Phony Corner" (a corner that's not a corner) and the "Whammy Edge" (edge pieces that abut rather than interlock). Richardson carries on a long tradition of wood puzzle manufacturers that includes names such as Par, Straus, and Parker Brothers (as Pastime Puzzles). Richardson's puzzles never include a picture of the puzzle with the box and many puzzles contain hidden messages, custom shaped pieces, and even extra pieces that do not fit into the puzzle. Richardson "prides himself on his company's high-quality products and attentive customer service". References External links Official Stave Puzzles Website Stave Puzzles User Community Puzzle designers People from Windsor County, Vermont Ross School of Business alumni Living people Year of birth missing (living people)
https://en.wikipedia.org/wiki/Self-similarity%20matrix
In data analysis, the self-similarity matrix is a graphical representation of similar sequences in a data series. Similarity can be explained by different measures, like spatial distance (distance matrix), correlation, or comparison of local histograms or spectral properties (e.g. IXEGRAM). This technique is also applied for the search of a given pattern in a long data series as in gene matching. A similarity plot can be the starting point for dot plots or recurrence plots. Definition To construct a self-similarity matrix, one first transforms a data series into an ordered sequence of feature vectors , where each vector describes the relevant features of a data series in a given local interval. Then the self-similarity matrix is formed by computing the similarity of pairs of feature vectors where is a function measuring the similarity of the two vectors, for instance, the inner product . Then similar segments of feature vectors will show up as path of high similarity along diagonals of the matrix. Similarity plots are used for action recognition that is invariant to point of view and for audio segmentation using spectral clustering of the self-similarity matrix. Example See also Recurrence plot Distance matrix Similarity matrix Substitution matrix Dot plot (bioinformatics) References Further reading External links http://www.recurrence-plot.tk/related_methods.php Statistical charts and diagrams Visualization (graphics)
https://en.wikipedia.org/wiki/Economy%20of%20Oklahoma
The economy of Oklahoma is the 29th largest in the United States. Oklahoma's gross state product (GSP) is approximately $197.2 billion as of December 2018. Data Historical data The history of Oklahoma's GSP according to the Bureau of Economic Analysis and the United States Census Bureau GSP by industry Industries value added to Oklahoma GDP in Q1 2020. Sectors percentages are compared to sector percentages of United States GDP. Employment There were approximately 1.8 million in the Oklahoma labor force in 2018. The private sector employs 90% of working Oklahomans, with the government (federal, state, and local) employing 9%. The largest employer in the state is the United States Department of Defense, which employs approximately 69,000 workers or 3.8% of all working Oklahomans. The largest private employer is Walmart, which employs approximately 32,000 workers or 1.8% of all working Oklahomans. As of 2019, the top 20 employers in the State of Oklahoma were: Taxes See also List of US state economies List of Oklahoma counties by per capita income List of Oklahoma counties by socioeconomic factors References Notes Agriculture Sector includes establishments primarily engaged in growing crops, raising animals, harvesting timber, harvesting fish and other animals from a farm, ranch or their natural habitats Mining Sector includes exploration and development of minerals, including solids such as coal and ores, liquids such as crude petroleum, and gases such as natural gas Construction Sector comprises establishments primarily engaged in the construction of buildings or engineering projects Manufacturing Sector includes establishments engaged in the mechanical, physical, or chemical transformation of materials, substances, or components into new products Trade, Transportation, and Utitlies Sector includes wholesaling of merchandise, retailing of merchandise, passenger and freight transit, storage and warehousing of goods, and public utilities services Information Sector concerns publishing industries, including software publishing, motion picture and sound publishing, broadcast industries, telecommunications, and Internet service providers Finance Sector comprises establishment engaged in financial transactions, including banking, securities, insurance, and investment advisory services Professional Sector comprises establishments that specialize in performing professional, scientific, and technical activities for others Education and Healthcare Sector comprises schools, colleges, universities, and training centers as well as establishments providing health care and social assistance for individuals Entertainment Sector includes establishments that operate facilities or provide services to meet varied cultural, entertainment, and recreational interests of their patrons, such as live performances, historical exhibits, and recreationally facilities The Other Sector includes establishments which provide services not specifically provided for
https://en.wikipedia.org/wiki/GnuCOBOL
GnuCOBOL (formerly OpenCOBOL, and for a short time known as GNU Cobol) is a free implementation of the COBOL programming language. GnuCOBOL is a transcompiler to C which uses a native C compiler. Originally designed by Keisuke Nishida, the lead development was taken up by Roger While. The most recent developments are now led by Simon Sobisch, Ron Norman, Edward Hart, Sergey Kashyrin and many others. History While working with Rildo Pragana on TinyCOBOL, Keisuke Nishida decided to attempt a COBOL compiler suitable for integration with GCC. This soon became the OpenCOBOL project. Nishida worked as the lead developer until 2005 and version 0.31. Roger While then took over as lead and released OpenCOBOL 1.0 on 27 December 2007. Work on the OpenCOBOL 1.1 pre-release continued until February 2009. In May 2012, active development was moved to SourceForge, and the pre-release of February 2009 was marked as a release. In late September 2013, OpenCOBOL was accepted as a GNU Project, renamed to GNU Cobol, and then finally to GnuCOBOL in September 2014. Ron Norman has added a Report Writer module as a branch of GnuCobol 2.0, and Sergey Kashyrin has developed a version that uses C++ intermediates instead of C. Transfer of copyrights to the Free Software Foundation over GnuCOBOL source code (including versions with GNU Cobol and OpenCOBOL spellings) was finalized on 17 June 2015. The latest current release is v3.2, which dropped on 28 July 2023. Philosophy While striving to keep in line with COBOL Standards up to the current COBOL 2014 specification, and also to include features common in existing compilers, the developers do not claim any level of standards conformance. Even so, the 2.2 final release passes over 9,688 (99.79%) of the tests included in the NIST COBOL 85 test suite, out of 9,708 (as 20 are deleted). GnuCOBOL translates a COBOL program (source code) into a C program. The C program can then be compiled into the actual code used by the computer (object code) or into a library where other programs can call (link to) it. Under UNIX and similar operating systems (such as Linux), the GNU C compiler is used. For Windows, Microsoft’s Visual Studio Express package provides the C compiler. The two step compilation is usually performed by a single command, but an option exists to allow the programmer to stop compilation after the C code has been generated. Documentation The opencobol.org site was the official home of the development team from 2002 until 2012, and was the best source of upstream development information. However, all recent developments are now taking place within a SourceForge project space at GnuCOBOL. The GnuCOBOL Programmer's Guide, by Gary Cutler, was published under the GNU Free Documentation License. It has been updated to include GnuCOBOL with Report Writer and is listed in the GnuCOBOL documentation overview page with latest versions in the code tree. It is maintained by Vincent Coen and others as each new compiler version
https://en.wikipedia.org/wiki/K.M.%20Chandy
K. Mani Chandy may refer to: K. Mani Chandy (born 1944), American computer scientist K.M. Chandy (politician) (1921–1998), Indian politician
https://en.wikipedia.org/wiki/Transportation%20in%20Colorado
Colorado's transportation consists of a network of highway, surface street, rail, and air options. While the public transportation system in Denver is much more complex and developed than other parts of the state, tourism and growth have led to extensive needs statewide. Roads and highways Colorado is a landlocked state, so ground and air transportation are the primary focus of the state. Also, due to low population density outside the Denver and Colorado Springs metropolitan areas, highways are the primary transportation method for most residents. State highways The main north–south route in Colorado is Interstate 25 (I-25). The I-25 corridor follows the front range of the Colorado Rockies and connects Denver, Colorado Springs, Pueblo, Fort Collins, Greeley, Trinidad, and other small cities. I-70 crosses Colorado from west to east and is a primary viaduct for tourists and locals to visit mountain communities. When it was completed, the section of I-70 passing through Glenwood Canyon was the most expensive section of Interstate Highway ever built in the United States with a total cost of $490 million for the stretch. Due to winter weather conditions, sections of I-70 are regularly closed during the winter and are expensive to maintain. Colorado maintains state highways for high-volume travel routes that not part of the two national systems.. Safety In 2011, Colorado ranked among the five deadliest states for debris/litter–caused vehicle accidents per total number of registered vehicles and population size. Figures derived from the National Highway Traffic Safety Administration (NHTSA) show at least 16 persons in Colorado were killed each year in motor vehicle collisions with non-fixed objects, including debris, dumped litter, animals, and their carcasses. In the United States, including Colorado, most civil aviation incidents are investigated by the National Transportation Safety Board (NTSB), as well as the Colorado Bureau of Investigation (CBI). When investigating an aviation disaster, NTSB investigators piece together evidence from the crash and determine the likely cause(s), whereas the CBI will also investigate if there is any involved criminal actions. Buses and mass transit Denver's Regional Transportation District, known locally as RTD, is the largest public transportation system in Colorado. The RTD system provides bus, light rail, and commuter rail transportation services in the majority of the Denver-Aurora-Boulder Combined Statistical Area. Through its FasTracks initiative, RTD is working to rapidly build light rail and bus rapid transit. Other transportation services exist throughout the state. Some systems, such as in Colorado Springs, focus on the local area. Other systems, such as that found on the Western Slope connecting Glenwood Springs, Aspen, and Carbondale offer regional connections. Intercity bus service is provided by a number of carriers including Burlington Trailways, Bustang, Express Arrow, and Greyhound Lin
https://en.wikipedia.org/wiki/Transportation%20in%20Hawaii
The transportation system of Hawaii is a cooperation of complex systems of infrastructure. Background Transit systems Rail At one time, Hawaii had a network of railroads on each of the larger islands that helped move farm commodities as well as passengers. These railroads were all narrow gauge for the majority although there were some gauge on some of the smaller islands – standard US gauge is ). The largest by far was the Oahu Railway and Land Company (OR&L) which ran multiple lines from Honolulu across the western and northern part of Oahu. The OR&L was an important player moving troops and goods during World War II. Traffic on this line was busy enough that there were signals on the lines facilitating movement of trains and wigwag signals at some railroad crossings for the protection of motorists. The mainline was officially abandoned in 1947, although part of it was bought by the US Navy and operated until 1970. Thirteen miles (21 km) of track remain and preservationists occasionally run trains over a portion of this line. Honolulu sought to initiate a rail transit system as early as the 1960s. By the mid 2000s, studies had finally been conducted and a light metro line was planned for the city's western suburbs. Construction started in 2011 and was set back by various delays until Skyline opened to service in 2023. Bus Each major island has a public bus system. Roads and freeways A system of state highways encircles each main island. Only Oahu has federal highways and is the only area outside the contiguous 48 states to have signed Interstate highways. Travel can be slow due to narrow winding roads, and congestion in cities. Bridges and tunnels Admiral Clarey Bridge, also known as the Ford Island Bridge, is a floating concrete drawbridge providing access to Ford Island, a United States Navy installation situated in the middle of Pearl Harbor. The causeway bridge was completed and opened in 1998, named the Admiral Clarey Bridge after former Admiral Bernard A. Clarey. The bridge has a total length of , including a pontoon section that can be retracted to allow water traffic to pass through. Hospital Rock Tunnels are a small pair of highway tunnels passing through a ridge on the edge of the Ko‘olau Range on the island of O‘ahu, Hawaiʻi, USA. The tunnels are located on Interstate H-3, which connects Kaneohe with Interstate H-1 at Hālawa near Pearl Harbor, and are long Kaneohe bound and long Halawa bound. The tunnels are "cut and cover" tunnels. John H. Wilson Tunnels are a pair of highway tunnels passing through the Ko‘olau Range on the island of O‘ahu. The tunnels are located on Likelike Highway (Route 63), which connects Kāneʻohe with Honolulu, and are 2775 feet (845.8 m) long westbound and 2813 feet (857.4 m) long eastbound. Nu‘uanu Pali Tunnels are a set of four highway tunnels (two in each direction) on the Pali Highway (Hawaii State Highway 61) which pass through the Nuuanu Pali. These tunnels serve as one of three t
https://en.wikipedia.org/wiki/Cormorant%20Network
The Cormorant Communications Network is a military wide area communications network implemented by the British Army sometime around 2000. It has also been adopted by certain Royal Air Force units in limited deployments. Role The network provides end-to-end wide area communications using the same Asynchronous Transfer Mode protocol that underpins many late-20th Century civilian telecommunications networks. It supports voice traffic routed over IP (although this is distinct from Internet VoIP) and can also support IPv4 and IPv6 BTDS traffic. Criticisms On 10 September 2009 the MoD announced that the system was to be withdrawn from service in Afghanistan and replaced with a system from Israel called Radwin . References British military radio British Army equipment
https://en.wikipedia.org/wiki/HyMap
HyMap is an airborne hyperspectral imaging sensor that was developed in Australia and is manufactured by Integrated Spectronics. HyMap data has 126 spectral bands spanning the wavelength interval 0.45–2.5 μm, and 5 metres spatial resolution. It is one of the few hyperspectral sensors that has been commercially deployed, and is thus the subject of a great deal of research in the earth observation field at present. References Image sensors
https://en.wikipedia.org/wiki/Balcan
Balcan is a surname. Notable persons with that name include: George Balcan (19322004), Canadian radio broadcaster and artist Maria-Florina Balcan, Romanian-American computer scientist Vural Balcan (), Turkish fencer who competed at the 1948 Summer Olympics See also Balkan (disambiguation) Turkish-language surnames
https://en.wikipedia.org/wiki/Smail
Smail-3 is a mail transfer agent (MTA) used on Unix-like operating systems. It is Free Software and is licensed under the GNU GPL. It aims to be a general and flexible mailer with extensive facilities for checking incoming e-mail and for routing between disparate networks. It is still in use on the Internet, but it has been mostly superseded by Exim (which was originally based on Smail) and other more modern mail transfer agents. Smail-3 still follows a monolithic design model where a single binary controls the core facilities of the MTA. This type of monolithic design is generally considered to be inherently less secure, largely because the whole program normally runs with full system privileges at all times. Nevertheless, Smail's security record has been fairly clean, and has only been the subject of one BUGTRAQ advisory. It was designed with security as a primary goal and makes use of several key safe coding practices to avoid some of the most common pitfalls of similar large programs written in C. References External links Weird.com, Smail-3 Internet Mailer Message transfer agents Free email server software Free email software Cross-platform software
https://en.wikipedia.org/wiki/Spatial%20Data%20File
The Spatial Data File (SDF) is a single-user geodatabase file format developed by Autodesk. The file format is the native spatial data storage format for Autodesk GIS programs MapGuide and AutoCAD Map 3D. SDF format version SDF3 (based on SQLite3) uses a single file. Prior versions of the format required a spatial index file (SIF), with an optional key index file (KIF) to speed access to the file. The SDF file format can be created and manipulated using an OSGeo FDO Provider for SDF, which is open-source software. Beyond Autodesk's products, products that can read/write the format include FME from Safe Software, Fdo2Fdo, and the FdoToolbox. The SDF format design uses low-level storage components of SQLite using a flat binary serialization (binary large objects). However, the relational aspects are not present, thus the format cannot be opened with any software designed specifically for SQLite. The format supports multiple feature classes per file and multiple geometry properties per feature class. Each geometry property is indexed using an R-tree. It is optimized for fast spatial reading of large datasets in scenarios involving a single writer and multiple readers. References External links SDF Loader provided by Autodesk to convert from Shapefiles and other formats Spatial Manager Desktop, Spatial Manager for AutoCAD and Spatial Manager for BricsCAD can read and write SDF files and other formats Autodesk GIS file formats
https://en.wikipedia.org/wiki/Toyama%20Television
is a TV station affiliated with Fuji News Network (FNN) and Fuji Network System (FNS) in Toyama, Toyama. It is broadcast in Toyama Prefecture. Established in 1969, the station was branded as T34 until December 31, 1993. TV channel Digital Television Toyama 28ch JOTH-DTV Tandem office Fukumitsu 58ch Unazuki 50ch Takaoka-Futagami 40ch Hosoiri 40ch Ōyama-omi 40ch Program External links The official website of Toyama Television Fuji News Network Television stations in Japan Television channels and stations established in 1969 Mass media in Toyama (city)
https://en.wikipedia.org/wiki/Interpenetrating%20polymer%20network
An Interpenetrating polymer network (IPN) is a polymer comprising two or more networks which are at least partially interlaced on a polymer scale but not covalently bonded to each other. The network cannot be separated unless chemical bonds are broken. The two or more networks can be envisioned to be entangled in such a way that they are concatenated and cannot be pulled apart, but not bonded to each other by any chemical bond. Simply mixing two or more polymers does not create an interpenetrating polymer network (polymer blend), nor does creating a polymer network out of more than one kind of monomers which are bonded to each other to form one network (heteropolymer or copolymer). There are semi-interpenetrating polymer networks (SIPN) and pseudo-interpenetrating polymer networks. To prepare IPNs and SIPNs, the different components are formed simultaneously or sequentially. History The first known IPN was a combination of phenol-formaldehyde resin with vulcanized natural rubber made by Jonas Aylsworth in 1914. However, this was before Staudinger's hypothesis on macromolecules and thus the terms "polymer" or "IPN" were not yet used. The first usage of the term "interpenetrating polymer networks" was first introduced by J.R. Millar in 1960 while discussing networks of sulfonated and unsulfonated styrene–divinylbenzene copolymers. Mechanical Properties Molecular intermixing tends to broaden the glass transition regions of some IPN materials compared to their component polymers. This unique characteristic provides excellent mechanical damping properties over a wide range of temperatures and frequencies due to a relatively constant and high phase angle. In IPNs composed of both rubbery and glassy polymers, considerable toughening is observed compared to the constituent polymers. When the glassy component forms a discrete, discontinuous phase, the elastomeric nature of the continuous rubbery phase can be preserved while increasing the overall toughness of the material and its elongation at break. On the other hand, when the glassy polymer forms a bicontinuous phase within the rubbery network, the IPN material can behave like an impact-resistant plastic. Morphology Most IPNs do not interpenetrate completely on a molecular scale, but rather form small dispersed or bicontinuous phase morphologies with characteristic length scales on the order of tens of nanometers. However, since these length scales are relatively small, they are often considered homogeneous on a macroscopic scale. The characteristic lengths associated with these domains often scale with the length of chains between crosslinks, and thus the morphology of the phases is often dictated by the crosslinking density of the constituent networks. The kinetics of phase separation in IPNs can arise from both nucleation and growth and spinodal decomposition mechanisms, with the former producing discrete phases akin to dispersed spheres and the latter forming bicontinuous phases akin to int
https://en.wikipedia.org/wiki/GOAL%20agent%20programming%20language
GOAL is an agent programming language for programming cognitive agents. GOAL agents derive their choice of action from their beliefs and goals. The language provides the basic building blocks to design and implement cognitive agents by programming constructs that allow and facilitate the manipulation of an agent's beliefs and goals and to structure its decision-making. The language provides an intuitive programming framework based on common sense or practical reasoning. Overview The main features of GOAL include: Declarative beliefs: Agents use a symbolic, logical language to represent the information they have, and their beliefs or knowledge about the environment they act upon in order to achieve their goals. This knowledge representation language is not fixed by GOAL but, in principle, may be varied according to the needs of the programmer. Declarative goals: Agents may have multiple goals that specify what the agent wants to achieve at some moment in the near or distant future. Declarative goals specify a state of the environment that the agent wants to establish, they do not specify actions or procedures how to achieve such states. Blind commitment strategy: Agents commit to their goals and drop goals only when they have been achieved. This commitment strategy, called a blind commitment strategy in the literature, is the default strategy used by GOAL agents. Cognitive agents are assumed to not have goals that they believe are already achieved, a constraint which has been built into GOAL agents by dropping a goal when it has been completely achieved. Rule-based action selection: Agents use so-called action rules to select actions, given their beliefs and goals. Such rules may underspecify the choice of action in the sense that multiple actions may be performed at any time given the action rules of the agent. In that case, a GOAL agent will select an arbitrary enabled action for execution. Policy-based intention modules: Agents may focus their attention and put all their efforts on achieving a subset of their goals, using a subset of their actions, using only knowledge relevant to achieving those goals. GOAL provides modules to structure action rules and knowledge dedicated to achieving specific goals. Informally, modules can be viewed as policy-based intentions in the sense of Michael Bratman. Communication at the knowledge level: Agents may communicate with each other to exchange information, and to coordinate their actions. GOAL agents communicate using the knowledge representation language that is also used to represent their beliefs and goals. Testing: You can also write tests for GOAL. GOAL agent program A GOAL agent program consists of six different sections, including the knowledge, beliefs, goals, action rules, action specifications, and percept rules, respectively. The knowledge, beliefs and goals are represented in a knowledge representation language such as Prolog, Answer set programming, SQL (or Datalog), or the Planni
https://en.wikipedia.org/wiki/Rome%E2%80%93Formia%E2%80%93Naples%20railway
The Rome–Formia–Naples railway—also called the Rome–Naples Direttissima in Italian ("most direct")–is part of the traditional main north-south trunk line of the Italian railway network. It was opened in 1927 as a fast link as an alternative to the existing Rome–Naples via Cassino line, significantly reducing journey times. High-speed trains on the route use the parallel Rome–Naples high-speed railway, which was partially opened in December 2005, and fully in December 2009. History Problems with the Rome–Naples line via Cassino led to proposals for the construction of a new line nearer the coast as early as 1871. When the Papal States planned the Cassino line, it was not designed just as a direct connection with Naples, but also was intended to connect with smaller localities on the way. Partly as a result, it had a tortuous route which, especially in the valley of the Sacco River, was subject to frequent disruption by floods and landslides. The old line was built to the avoid the coastal route through the Pontine Marshes, which was still swampy and malarial. As a result, its route is hilly and in parts mountainous, creating problems for the under-powered steam locomotives of the period. The construction of a coastal line was authorised by legislation on 29 July 1879 on condition that it was coordinated with the Terracina–Priverno and the Gaeta–Formia–Sparanise lines. The commitment was confirmed by legislation on 5 July 1882 and during the reorganisation of the Italian railways in 1885. The project was always controversial: it is supported by railway engineers such as Alfredo Cottrau but opposed by politicians such as Francesco Saverio Nitti. The final design of the line was drafted in 1902 and approved in 1905 when responsibility for the project was assumed by Ferrovie dello Stato (the State Railways). Construction began in 1907 but was not finished until 1927 because it was necessary to dig several long tunnels, including the Monte Orso and the Vivola tunnels, both of which are about 7.5 km long. The line was electrified at 3000 V DC in 1935. Following this, electric trains could run over the entire north-south route from Bologna to Naples. Since 2009, when the Rome-Naples high-speed railway was opened, trains from Rome Termini have no longer operated over the Villa Literno–Napoli Gianturco railway (Naples Passante), but instead run from Villa Literno via Aversa to Napoli Centrale. Branches From Aversa, towards Rome by the line via Cassino line via Caserta. From San Marcellino–Frignano towards Naples by the Cassino line via Caserta. From Villa Literno towards Naples by the Villa Literno–Napoli Gianturco railway via Pozzuoli, Napoli Campi Flegrei, Napoli Gianturco to Salerno (partly used by Line 2 of the Naples metro). From Formia to Gaeta, now closed. It is scheduled to reopen in 2010. From Priverno-Fossanova to Terracina. From Campoleone to Nettuno. Notes See also List of railway lines in Italy External links contemporary il
https://en.wikipedia.org/wiki/DXCC-TV
DXCC-TV, channel 10, is a television station of Philippine television network Intercontinental Broadcasting Corporation. Its studios are located on Don Apolinar Velez St., Cagayan de Oro. Areas of coverage Cagayan de Oro Misamis Oriental See also List of Intercontinental Broadcasting Corporation channels and stations Television stations in Cagayan de Oro Intercontinental Broadcasting Corporation stations Television channels and stations established in 1968
https://en.wikipedia.org/wiki/SDF3
SDF3, SDF-3, Sdf3, Sdf-3 may represent: Spatial data file 3 (SDF3) Stromal cell-derived factor-1 (SDF-1, SDF1, Sdf1) Stromal cell-derived factor-1 alpha (SDF-1a, SDF1a, Sdf1α) Stromal cell-derived factor-2 (SDF-2, SDF2, Sdf2) Stromal cell-derived factor-3 (SDF-3, SDF3, Sdf3) Stromal cell-derived factor-4 (SDF-4, SDF4, Sdf4) SDF-3 Pioneer Super Dimensional Fortress, a massive spaceship from the animated series Robotech Dataflow SDF: For Free (SDF3)