source stringlengths 32 199 | text stringlengths 26 3k |
|---|---|
https://en.wikipedia.org/wiki/KRBM%20%28FM%29 | KRBM (90.9 FM) is a radio station licensed to Pendleton, Oregon. The station is owned by Oregon Public Broadcasting, and airs OPBs news and talk programming, consisting of syndicated programming from NPR, APM and PRI, as well as locally produced offerings.
KRBM roots began when Blaine Hanks was recruited by Blue Mountain Community College in 1968 to start a 2-year radio broadcasting program. On April 18, 1970 KRBM (FM) signed on the air with broadcast students operating the station and Blaine Hanks as general manager. The calls letters stood for Radio Blue Mountain. The original power was 10 watts and was mono. The station only operated during the school year. Over the years, power was increased and by 1984 had a mono signal of 440 watts effected radiated power. The broadcast antenna was located above the station on Morrow Hall. It still only broadcast during the school year, Monday through Saturday from 12:00 PM to Midnight with a top 40 format. In 1981 the station developed a partnership with Oregon Public Broadcasting and began broadcasting OPB Monday through Friday from 10:00 am to 12:00 pm. At noon, the students would take over local broadcasts till midnight with a top 40 format. In 1984, OPB invested in the radio station with a new control board and transmitter exciter converting the station from a mono to stereo signal. In June 1987 OPB moved the KRBM transmitter from the college to Warren Hill and increased power to 25 kW, covering a large portion of Eastern Oregon. OPB programs also took over most of the schedule, leaving only Friday and Saturday evenings for local broadcasting for the students. The power increase led to a merger with OPB. By 1988, OPB assumed all of the programming and Blue Mountain Community College ended the broadcasting program. Blaine Hanks remained the general manager through the entire history at BMCC. The studios were eventually removed from the college and OPB partnered with KUMA to maintain the operations in Pendleton.
References
External links
opb.org
RBM (FM)
RBM
NPR member stations
Pendleton, Oregon |
https://en.wikipedia.org/wiki/Religious%20Technology%20Center%20v.%20Netcom%20On-Line%20Communication%20Services%2C%20Inc. | Religious Technology Center v. Netcom On-Line Communication Services, Inc., 907 F. Supp. 1361 (N.D. Cal. 1995), is a U.S. district court case about whether the operator of a computer bulletin board service ("BBS") and Internet access provider that allows that BBS to reach the Internet should be liable for copyright infringement committed by a subscriber of the BBS. The plaintiff Religious Technology Center ("RTC") argued that defendant Netcom was directly, contributorily, and vicariously liable for copyright infringement. Netcom moved for summary judgment (i.e., Netcom urged the court to make a judgment without a full trial), disputing RTC's claims and raising a First Amendment argument and a fair use defense. The district court of the Northern District of California concluded that RTC's claims of direct and vicarious infringement failed, but genuine issues of fact precluded summary judgment on contributory liability and fair use. (I.e., facts about contributory liability and fair use that required adjudication by trial precluded the court from making a decision without a trial.)
Facts
Plaintiff RTC held copyrights in the unpublished and published works of L. Ron Hubbard, the late founder of the Church of Scientology. Defendant Dennis Erlich was a vocal critic of the Church via the Usenet newsgroup alt.religion.scientology ("a.r.s."). Erlich posted portions of copyrighted works of RTC on a.r.s.
Erlich gained his access to the Internet through defendant Tom Klemesrud's bulletin board service ("BBS"), which had approximately 500 paying users. Klemesrud's BBS was linked to the Internet through the facilities of defendant Netcom. When Erlich posted messages to Usenet, he transmitted his messages to Klemesrud's computer using a telephone and a modem, and the messages were briefly stored on Klemesrud's computer. Then the messages were automatically copied from Klemesrud's computer to Netcom's computers and other computers on the Usenet according to a prearranged pattern. Once the messages were on Netcom's computers, they were available to Netcom's customers to download. The messages were stored on Netcom's system for eleven days and Klemesrud's system for three days.
RTC failed to persuade Erlich to stop his postings, and contacted Klemesrud and Netcom. Klemesrud asked RTC to prove that it owned the copyright to the works posted by Erlich, but RTC refused. Netcom similarly refused RTC's request that Erlich not be allowed to access the Internet through its system.
Direct infringement
RTC alleged that Netcom was directly liable for making copies of its works. RTC also alleged that Netcom violated its exclusive rights to publicly display copies of its works. In the oral argument, RTC argued that Netcom violated its exclusive right to publicly distribute its works.
Creation of fixed copies
MAI Systems Corp. v. Peak Computer, Inc. established that the loading of data from a storage device into RAM constituted copying, because that data stayed in RAM lo |
https://en.wikipedia.org/wiki/Certificate%20in%20Data%20Processing | The Certificate in Data Processing (CDP) was a certification administered by the Data Processing Management Association. The CDP required several years IT experience, the recommendation of a current CDP holder, and the successful completion of a 6-part written exam.
History
The CDP certification exam originated in 1960 to 1962 under the auspices of the Data Processing Management Association (DPMA), successor to the National Machine Accountants Association and predecessor to the current Association of Information Technology Professionals. In 1974, the exam began to be administered by the Institute for Certification of Computing Professionals (ICCP) which was formed by nine constituent industry organizations. "Awards for Excellence" consisting of a certificate and a CDP key were given to those scoring highest in each of the exam's five sections.
The exam tested the individual's knowledge and experience with hardware, operating systems, telecommunication, systems, programming, and other data processing areas. If one failed a section, only that section needed to be retaken to complete the certification. Initially, most of the hardware, OS, and programming sections were largely IBM-oriented. By the mid-1980s, these sections included references to DEC, UNIX, and other operating systems, vendors, or standards.
The exam credential was later renamed by the ICCP to Certified Computing Professional (CCP) and existing CDP holders were assigned the new credential. Continuing education requirements for re-certification were not part of the original CDP certification, but were also added by the ICCP. CCP examinations and re-certifications continue under the administration of the ICCP today.
Guy L. Steele, Jr. wrote a filk song making fun of the certificate, called Song of the Certified Data Processor.
References
External links
HCIA Datacom Certification
Data processing
Information technology qualifications |
https://en.wikipedia.org/wiki/Doraemon%20%281986%20video%20game%29 | is a 1986 video game software developed and published by Hudson Soft for the Family Computer exclusively in Japan. It is based on Fujiko F. Fujio's (the pen name of Hiroshi Fujimoto) Japanese manga series of the same name, which later became an anime series and Asian franchise. It was the tenth best selling Famicom game released in 1986, selling approximately 1,150,000 copies in its lifetime. It is the third game created for the Doraemon license after the versions created for the Arcadia 2001 and the Epoch Cassette Vision. Even though the game is completely playable by a player with no knowledge of Japanese, ROM translator Neokid and Sky Yoshi released an English translation patch for the game but both are completely different.
Gameplay
In this game, Doraemon must travel through three different chapters in order to save Nobita and his friends, who have all been kidnapped. Each world is actually a different game with its own style of genre and game play system, and was designed by a different lead designer. The first chapter is an action game that takes place in a pioneer that scrolls continuously in four directions. The second chapter is a shooter game that scrolls through the evil den automatically in both horizontal and vertical directions. The third chapter is an aquatic adventure game where each screen scrolls over to the next. Each world must be completed by defeating a boss at the end. Then the player will advance to the next chapter, until all three bosses have been vanquished. Power-ups can be obtained in each chapter to increase Doraemon's strength and health meter. One power-up from the next chapter can be found in the first two chapters to give you an advantage when you finally arrive there.
References
External links
Neokid's translation patch at RomHacking
Sky Yoshi's translation patch at RomHacking
1986 video games
Action games
Doraemon video games
Hudson Soft games
Japan-exclusive video games
Nintendo Entertainment System games
Nintendo Entertainment System-only games
Shoot 'em ups
Video games developed in Japan
Video games scored by Jun Chikuma |
https://en.wikipedia.org/wiki/Operation%20Virtual%20Shield | Operation Virtual Shield is a program implemented by Chicago, IL mayor Richard M. Daley, which created the most extensive video surveillance network in the United States by linking more than 3000 surveillance cameras to a centralized monitoring system, which captures and processes camera feeds in real time. It also includes sensors such as biological, chemical, and radiological sensors. It is able to detect suspicious or dangerous activity and identify its location, and now incorporates facial recognition. Virtual Shield is also used to record activity at a potential crime scene before police arrive at a call. The cost of the program was $217 million, much of which came from Homeland Security grants. The retention time of technical data collected is 30 days.
Daley stated that Chicago will have a surveillance camera on every street corner by the year 2016.
See also
Closed-circuit television
Human Identification At a Distance
MATRIX
Total Information Awareness
Gabriel Villa
References
External links
Chicago's Camera Network Is Everywhere (Wall Street Journal, November 17, 2009)
USPA International
Chicago Police Department
Crime prevention
Government of Chicago
Law enforcement techniques
Mass surveillance |
https://en.wikipedia.org/wiki/Tulip%20Television | is a TV station affiliated with Japan News Network (JNN) in Takaoka, Toyama. It is broadcast in Toyama Prefecture. Established October 1, 1990.
TV channel
Digital Television
Toyama 32ch JOJH-DTV
Tandem office
Fukumitsu 60ch
Unazuki 44ch
Takaoka-Futagami 61ch
Hosoiri 57ch
Ōyama-omi 57ch
Program
External links
The official website of TulipTelevision
Japan News Network
Television stations in Japan
Television channels and stations established in 1990
1990 establishments in Japan
Mass media in Takaoka, Toyama |
https://en.wikipedia.org/wiki/Heritage%20High%20School%2C%20Clowne | Heritage High School (formerly known as Heritage Community School) is a co-educational secondary school located in Clowne in the English county of Derbyshire.
It held a Mathematics and Computing Specialist college status up until 2015. It is also the fastest growing 11-16 school in Derbyshire. There are currently just over 800 pupils on roll.
The school holds the Careers Mark, a Sport England Award, The Princess Diana Memorial Award and Derbyshire ABC Award.
The school was in a consortium with The Bolsover School, Shirebrook Academy and Springwell Community College that formed "Aspire Sixth Form", a sixth form provision that operated across all the school sites from September 2014. However, due to lack to students willing to enrol and poor performance, ASPIRE Sixth Form ceased to exist for the 2016-17 A-Level students.
Previously a community school administered by Derbyshire County Council, in April 2017 Heritage High School converted to academy status. The school is now sponsored by The Two Counties Trust.
Notable former pupils
Matthew Lowton, footballer
References
External links
Heritage High School official website
Secondary schools in Derbyshire
Academies in Derbyshire |
https://en.wikipedia.org/wiki/MEMOrg | MEMOrg is a proprietary software program, owned by the translation company Serious Business, located in Bucharest, Romania. The program is a Computer Assisted Translation (CAT) online tool.
Operation
MEMOrg uses a database of previous translations stored on a central server to which all users can connect.
Once inside the tool, the user can select the best fit filters (such as domains, references, languages or better qualified translators) for his or her project.
Translation software |
https://en.wikipedia.org/wiki/Chorizanthe%20cuspidata | Chorizanthe cuspidata is a species of flowering plant in the buckwheat family known by the common name San Francisco spineflower. It is endemic to California, where it is known only from the San Francisco Bay Area and to the immediate north and south. It grows in sandy coastal habitat.
Description
The Chorizanthe cuspidata plant grows flat along the ground, its stems extending up to about half a meter in length. The leaves are located about the base of the stem and are generally oval in shape and up to 5 centimeters long. The herbage is hairy to woolly in texture and green to reddish in color.
The inflorescence is a dense cluster of cylindrical flowers, each bordered by white or pink bracts with hooked or straight spines at the tips. The flower itself is 2 or 3 millimeters long, white or pink, and hairy. The minute tepals are lobed, with the central lobe longest and coming to a point.
Varieties
There are two varieties of this species:
Chorizanthe cuspidata var. cuspidata is quite rare due to its Bay Area habitat having been mostly consumed for development.
Chorizanthe cuspidata var. villosa can be found in the protected habitat of Point Reyes National Seashore.
References
External links
Jepson Manual Treatment: Chorizanthe cuspidata
Chorizanthe cuspidata - U.C. Photo gallery
cuspidata
Endemic flora of California
Natural history of the California chaparral and woodlands
Natural history of the San Francisco Bay Area
Taxa named by Sereno Watson
Plants described in 1882 |
https://en.wikipedia.org/wiki/Array%20Network%20Facility | The Array Network Facility component of the EarthScope USArray project is charged with ensuring all the real time seismic data collected from the Transportable Array and Flexible Arrays are transmitted, checked for quality, archived, and accessible online for researchers and the general public. The facility is part of the Scripps Institution of Oceanography at the University of California San Diego. The principal investigator of the ANF is Dr. Frank Vernon.
The facility has developed a series of online tools to allow researchers and the general public to interact with data collected from over four hundred broadband seismic stations across the United States. These four hundred stations make up the Transportable Array component of the EarthScope USArray project. Analysts review automated event detections and produce event bulletins including seismic phase picks which are distributed through the IRIS DMC.
The ANF component of the USArray experiment is funded by the National Science Foundation.
External links
ANF website
Real-time view of the deployed stations in the USArray
Status of the dataloggers located at each station in the USArray Transportable Array (TA)
Scripps Institution of Oceanography
EarthScope website
UCSD website
Sources
USArray Array Network Facility (ANF): Metadata, Network and Data Monitoring, and Quality Assurance During the First Year of Operations (2004)
The Earthscope USArray Array Network Facility (ANF): Metadata, Network and Data Monitoring, Quality Assurance During the Second Year of Operations (2005)
The EarthScope USArray Array Network Facility (ANF): Metadata, Network and Data Monitoring, Quality Assurance During the Third Year of Operations (2006)
Real-time operation of the NSF EarthScope USArray Transportable Array (2007)
The Earthscope USArray Array Network Facility (ANF): Metadata, Network and Data Monitoring, Quality Assurance as We Start to Roll (2008)
Data Latency Characteristics Observed Through Diverse Communication Links by the EarthScope USArray Transportable Array (2008)
The EarthScope Array Network Facility: application-driven low-latency web-based tools for accessing high-resolution multi-channel waveform data (2008)
Seismological observatories, organisations and projects |
https://en.wikipedia.org/wiki/Medical%20%26%20Biological%20Engineering%20%26%20Computing | Medical & Biological Engineering & Computing is a monthly peer-reviewed medical journal and an official publication of the International Federation of Medical and Biological Engineering. It is published by Springer Science+Business Media. It covers research in biomedical engineering and bioengineering. It was established as a bimonthly publication in 1963 under the title Medical Electronics & Biological Engineering. It publishes Original Research Articles, Reviews, and Technical Notes.
External links
11th Mediterranean Conference on Medical and Biological Engineering and Computing – the MEDICON 2007 -
The 12th Mediterranean Conference on Medical and Biological Engineering and Computing – MEDICON 2010 -
International Congress of students and young doctors (bio)medicine in Bosnia and Herzegovina "Medicon" -
Systems Medicine for the Delivery of Better Healthcare Services – MEDICON 2016 -
2017 MEDICON conference in Croatia -
English-language journals
Academic journals established in 1963
Springer Science+Business Media academic journals
Biomedical informatics journals
Monthly journals |
https://en.wikipedia.org/wiki/James%20Sedin | James Walter "Jim" Sedin (June 25, 1930 – February 23, 2021) was an American ice hockey player. He won a silver medal at the 1952 Winter Olympics.
Sedin later became the CEO of Mountain Computer, a major peripheral vendor for the Apple II and the IBM Personal Computer, a role which he held from 1977 to the early 1990s.
References
External links
1930 births
American men's ice hockey defensemen
Ice hockey people from Saint Paul, Minnesota
Ice hockey players at the 1952 Winter Olympics
2021 deaths
Medalists at the 1952 Winter Olympics
Olympic silver medalists for the United States in ice hockey |
https://en.wikipedia.org/wiki/Plus-minus%20ensemble | Plus Minus is a music group that formed in 2003 specializing in contemporary classical music.
Plus Minus's programming features a mixture of avant-garde and experimental traditions, focussing particularly on open-instrumentation pieces such as Stockhausen's Plus Minus, Andriessen's Worker's Union and Cardew's Treatise. They have done profile concerts of Peter Ablinger, Michael Finnissy, Christopher Fox, Bryn Harrison and Phill Niblock, and have premiered works by Laurence Crane, David Helbich, Damien Ricketson, Oyvind Torvund, Erik Ulman, James Saunders, and Stefan Van Eyken.
Members
There are eight members in the ensemble:
Mark Knoop – conductor/piano/accordion
Vicky Wright – clarinet(s)
Roderick Chadwick – piano
Tom Pauwels – (electric) guitar
Marcus Barcham-Stevens – violin
Alex Waterman – cello
Joanna Bailie & Matthew Shlomowitz – auxiliary instruments.
References
BBC
Cutting Edge Series
External links
Plus Minus website
Contemporary classical music ensembles
Musical groups established in 2003
2003 establishments in England
Musical groups from the United Kingdom with local place of origin missing |
https://en.wikipedia.org/wiki/Nobuo%20Mii | Nobuo Mii (=Mii Nobuo; July 4, 1931 – July 14, 2015), often called Nobi by English speakers, was a Japanese computer pioneer who made various contributions, working for NHK and IBM, and also is an investment fund executive.
Early life and education
Nobuo Mii was born in Fukuoka Prefecture, Japan, on July 4, 1931. He studied at Fukuoka Prefectural Shuyukan Senior High School and Kyushu University, graduating from the latter in 1955.
In senior high school, he was the manager of Wireless Communications Club. In 1949, he successfully lead the club members to make a television system for the first time in Kyushu, mainly using the electronic parts thrown away by the U.S. Armed Forces stationed in Fukuoka City, ahead of Kyushu University's Engineering School or NHK's Fukuoka Broadcasting Station. His television was displayed at Western Japan Invention Exhibition and won the Invention Award from the Ministry of Education.
Career
In NHK
Upon graduation from university, he started to work at NHK Science & Technology Research Laboratories, Japan Broadcasting Corporation. Half a year later, he was sent by NHK to Columbia University to study transistor technology, and, upon return to Japan, made contribution to the application of transistors in broadcasting.
From 1961, he worked in a team in NHK to automate their program preparation and broadcasting. This team eventually implemented the Total Online Program and Information Control System (TOPICS), using IBM System/360 and IBM 1800 computers. TOPICS was developed in close relationship with IBM's Federal Systems Division.
In IBM
During NHK's TOPICS project, Nobuo Mii impressed Bob Evans, who had led the IBM System/360 project to success and was the head of Federal Systems Division at that time, and was invited to work for IBM. He was hired by IBM Japan, Ltd., in 1969, but was immediately sent to IBM in U.S. and worked on Apollo Project.
In 1971, as IBM created IBM Japan Development Laboratory, Nobuo Mii became its Technical Operations director, working in Research Triangle Park, North Carolina, and lead the project to develop IBM 3767 printer terminal, using the new Systems Network Architecture communications protocol.
In 1973, he became Director of the renamed IBM Fujisawa Development Laboratory and lead various projects for the Japanese and worldwide markets, which included: IBM Japanese Language Processing System, the "Gemstone" low cost communications terminal series (IBM 3101 ASCII, 3104, 3178/3179 display terminals), etc. He was also involved in the development of IBM 5550 and IBM JX, which eventually led his Laboratory to develop IBM ThinkPad.
In 1990, Nobuo Mii was named an IBM Corporate Vice President. He was later named a Director in Entry Systems Division and Power Personal Division. He was also a KALEIDA board member from December 1991.
In 1993, he became President of Power Personal Systems Company, whose objective was to develop, manufacture and promote PowerPC microprocessor. He ret |
https://en.wikipedia.org/wiki/Wagan%20Land | is a 1989 platform video game developed and published for the Family Computer by Namco. A port for the Game Gear was released in 1991.
Gameplay
The player character, Wagan, has the ability to temporarily stun his enemies with sound waves shaped like the noises and . Enemies cannot be destroyed with Wagan's sound waves, but the player can stand over one while it is stunned. When the player picks up a Waganizer, the sound effects shot by Wagan will become bigger with each increment, allowing the player to stun enemies for longer periods. When a four Waganizers are collected, Wagan will become invincible for a limited period, increasing his walking speed and allowing him to defeat enemies by touching them. However, Wagan will revert to his initial sound effect attack once the invincibility effect wears off. There is no energy gauge in; if the player touches an enemy or falls into a trap, they will lose a single life.
The objective of the game is to reach the end of each action scene by making the best use of Wagan's sound wave attacks and jumping ability. The player must confront a boss at the end of certain stages, but instead of actually fighting the boss in battle, the player is challenged to a mini-game where they must score more points than their opponent.
Reception
Notes
References
External links
1989 video games
Android (operating system) games
Bandai Namco Entertainment franchises
IOS games
Japan-exclusive video games
Mobile games
Namco games
Nintendo Entertainment System games
Nintendo Entertainment System-only games
Now Production games
Platformers
Game Gear games
Single-player video games
Video game franchises
Video games about reptiles
Video games developed in Japan
Virtual Console games
Virtual Console games for Wii U |
https://en.wikipedia.org/wiki/Clap%20Hanz | Clap Hanz, Ltd. (株式会社クラップハンズ Kabushiki-Gaisha Kurappu Hanzu) is a video game developer located in Japan. It is a second party company with strong ties with Sony Computer Entertainment and is the developer of the Everybody's Golf series (formerly known as Hot Shots Golf in North America). The company was established in 1998 and is headed by Masashi Muramori
Games developed
References
External links
Video game companies established in 1998
Video game companies of Japan
Video game development companies
Japanese companies established in 1998
Companies based in Yokohama
Everybody's Golf |
https://en.wikipedia.org/wiki/SPARC64%20V | The SPARC64 V (Zeus) is a SPARC V9 microprocessor designed by Fujitsu. The SPARC64 V was the basis for a series of successive processors designed for servers, and later, supercomputers.
The servers series are the SPARC64 V+, VI, VI+, VII, VII+, X, X+ and XII. The SPARC64 VI and its successors up to the VII+ were used in the Fujitsu and Sun (later Oracle) SPARC Enterprise M-Series servers. In addition to servers, a version of the SPARC64 VII was also used in the commercially available Fujitsu FX1 supercomputer. As of October 2017, the SPARC64 XII is the latest server processor, and it is used in the Fujitsu and Oracle M12 servers.
The supercomputer series was based on the SPARC64 VII, and are the SPARC64 VIIfx, IXfx, and XIfx. The SPARC64 VIIIfx was used in the K computer, and the SPARC64 IXfx in the commercially available PRIMEHPC FX10. As of July 2016, the SPARC64 XIfx is the latest supercomputer processor, and it is used in the Fujitsu PRIMEHPC FX100 supercomputer.
History
In the late 1990s, HAL Computer Systems, a subsidiary of Fujitsu, was designing a successor to the SPARC64 GP as the SPARC64 V. First announced at Microprocessor Forum 1999, the HAL SPARC64 V would have operated 1 GHz and had a wide superscalar organization with superspeculation, an L1 instruction trace cache, a small but very fast 8 KB L1 data cache, and separate L2 caches for instructions and data. It was designed in Fujitsu's CS85 process, a 0.17 μm CMOS process with six levels of copper interconnect; and would have consisted of 65 million transistors on a 380 mm2 die. Originally scheduled for a late 2001 release in Fujitsu GranPower servers, it was canceled in mid-2001 when HAL was closed by Fujitsu, and replaced by a Fujitsu design.
The first Fujitsu SPARC64 Vs were fabricated in December 2001. They operated at 1.1 to 1.35 GHz. Fujitsu's 2003 SPARC64 roadmap showed that the company planned a 1.62 GHz version for release in late 2003 or early 2004, but it was canceled in favor of the SPARC64 V+. The SPARC64 V was used by Fujitsu in their PRIMEPOWER servers.
The SPARC64 V was first presented at Microprocessor Forum 2002. At introduction, it had the highest clock frequency of both SPARC and 64-bit server processors in production; and the highest SPEC rating of any SPARC processor.
Description
The SPARC64 V is a four-issue superscalar microprocessor with out-of-order execution. It was based on the Fujitsu GS8900 mainframe microprocessor.
Pipeline
The SPARC64 V fetches up to eight instructions from the instruction cache during the first stage and places them into a 48-entry instruction buffer. In the next stage, four instructions are taken from this buffer, decoded and issued to the appropriate reserve stations. The SPARC64 V has six reserve stations, two that serve the integer units, one for the address generators, two for the floating-point units, and one for branch instructions. Each integer, address generator and floating-point unit has an eight-entry reserve stati |
https://en.wikipedia.org/wiki/The%20Last%20One%20%28software%29 | The Last One is a computer program released in 1981 by the British company D.J. "AI" Systems. Now obsolete, it took input from a user and generated an executable program in the BASIC computer language.
The software was a program generator, as distinct from an actual programming language, as programs were generated by the user selecting options from menus that would form the basis of the generated code. This was done in a logical sequence that would eventually cause a program to be generated in BASIC. At any time, the user could elect to view a flow chart showing the current progress of the program's design.
Example
An example of a program to sort the names in a Christmas Card list in alphabetical order:
1. OPEN FILE <XMASLIST>
2. SET POINTER TO START OF FILE
3. SORT FILE
4. INPUT FROM FILE
5. IF END OF FILE REACHED BRANCH TO 8
6. OUTPUT DATA
7. UNCONDITIONAL BRANCH TO 4
8. TERMINATE
References
Notes
THE LAST ONE Trademark - Registration Number 1218969 - Serial Number 73318733 :: Justia Trademarks
BASIC interpreters |
https://en.wikipedia.org/wiki/Symbol%20%28programming%29 | A symbol in computer programming is a primitive data type whose instances have a unique human-readable form. Symbols can be used as identifiers. In some programming languages, they are called atoms. Uniqueness is enforced by holding them in a symbol table. The most common use of symbols by programmers is to perform language reflection (particularly for callbacks), and most common indirectly is their use to create object linkages.
In the most trivial implementation, they are essentially named integers; e.g., the enumerated type in C language.
Support
The following programming languages provide runtime support for symbols:
Julia
Symbols in Julia are interned strings used to represent identifiers in parsed Julia code(ASTs) and as names or labels to identify entities (for example as keys in a dictionary).
Lisp
A symbol in Lisp is unique in a namespace (or package in Common Lisp). Symbols can be tested for equality with the function EQ. Lisp programs can generate new symbols at runtime. When Lisp reads data that contains textual represented symbols, existing symbols are referenced. If a symbol is unknown, the Lisp reader creates a new symbol.
In Common Lisp symbols have the following attributes: a name, a value, a function, a list of properties and a package.
In Common Lisp it is also possible that a symbol is not interned in a package. Such symbols can be printed, but when read back, a new symbol needs to be created. Since it is not interned, the original symbol can not be retrieved from a package.
In Common Lisp symbols may use any characters, including whitespace, such as spaces and newlines. If a symbol contains a whitespace character it needs to be written as |this is a symbol|. Symbols can be used as identifiers for any kind of named programming constructs: variables, functions, macros, classes, types, goto tags and more.
Symbols can be interned in a package. Keyword symbols are self-evaluating and interned in the package named KEYWORD.
Examples
The following is a simple external representation of a Common Lisp symbol:
this-is-a-symbol
Symbols can contain whitespace (and all other characters):
|This is a symbol with whitespace|
In Common Lisp symbols with a leading colon in their printed representations are keyword symbols. These are interned in the keyword package.
:keyword-symbol
A printed representation of a symbol may include a package name. Two colons are written between the name of the package and the name of the symbol.
package-name::symbol-name
Packages can export symbols. Then only one colon is written between the name of the package and the name of the symbol.
package:exported-symbol
Symbols, which are not interned in a package, can also be created and have a notation:
#:uninterned-symbol
PostScript
In PostScript, references to name objects can be either literal or executable, influencing the behaviour of the interpreter when encountering them. The cvx and cvl operators can be used to convert between the two forms. When |
https://en.wikipedia.org/wiki/Olivia%20%28fictional%20pig%29 | Olivia is a fictional pig character in a series of children's picture books written and illustrated by the late Ian Falconer, the first entry of which was published in 2000. A computer animated television series of the same name inspired by the character premiered in 2009.
Development
The Olivia book series was inspired by Ian Falconer's niece, Olivia.
The series is different from many children's picture books because of its stark minimalism. Inspired by the style of Dr. Seuss, Falconer chose to draw uncluttered images in black and white with the occasional splash of red, along with the insertion of real artwork by famous artists — Degas and Pollock, for example. Each book in the series explores the use of another signature color in addition to the original black, white and red images.
Olivia books have been translated into many languages including Czech, French, German, Spanish, Portuguese, Italian, Dutch, Chinese, Japanese, Danish, Swedish, Finnish, Russian, Hebrew and Latin.
Books
Written by Falconer
Olivia (2000) – a 2001 Caldecott Honor book, listed as one of the "Teachers' Top 100 Books for Children" by the National Education Association in 2007, listed in the "Top 100 Picture Books" of all time in a 2012 poll by School Library Journal
Olivia Saves the Circus (2001) – the 2002 Booksense Illustrated Children's Book of the Year
Olivia's Opposites (2002) – a board book
Olivia Counts (2002) – a board book
Olivia...and the Missing Toy (2003)
Teatro Olivia (2004) – a fold-out theater with paper dolls
Olivia Forms a Band (2006) – winner of 2006 Child Magazine's Best Children's Book Award
Olivia Helps with Christmas (2007) – Falconer won the 2008 Illustrator of the Year in the Children's Choice Book Awards for this title
Olivia Goes to Venice (2010)
Olivia and the Fairy Princesses (2012)
Olivia the Spy (2017)
Tie-ins to the Nickelodeon TV show (not written by Falconer)
Olivia Acts Out (2009) – hardcover
Dinner with Olivia (2009) – paperback
Olivia Trains Her Cat (2009) – paperback (a Ready-To-Read book)
Olivia Leaps! (2009) – board book
This is Olivia (2009) – hardcover (a fold-out book)
Olivia the Magnificent: A Life-the-Flap Story (2009) – paperback
Meet Olivia (2009) – a coloring and activity book
Brava Olivia (2009) – a coloring and activity book with stickers
Olivia and Her Ducklings (2010) – paperback (a Ready-To-Read book)
Olivia and the Babies (2010) – paperback
Olivia Takes a Trip (2010) – paperback (a Ready-To-Read book)
Olivia Opens a Lemonade Stand (2010) – paperback
Olivia and the School Carnival (2010) – paperback
Olivia and the Snowy Day (2010) – hardcover (a Ready-To-Read book)
Olivia Cooks Up a Surprise (2011) – hardcover
Olivia Plants a Garden (2011) – hardcover (a Ready-To-Read book)
Olivia Leads a Parade (2011) – paperback
Olivia Goes Camping (2011) – hardcover (a Ready-To-Read book)
Olivia Becomes a Vet (2011) – hardcover (a Ready-To-Read book)
Olivia and the Rain Dance (2012) – hardc |
https://en.wikipedia.org/wiki/H%C3%A9ctor%20Mart%C3%ADnez%20%28baseball%20announcer%29 | Héctor Martínez is a former Major League Baseball player who was the first play-by-play announcer for the Boston Red Sox Spanish Beisbol Network.
Martinez joined the Red Sox in 1990 when the Sox became the tenth team in Major League Baseball to offer a Spanish-language broadcast. He remained with the Red Sox until 2001 when he was replaced by ESPN announcer Adrian Garcia Marquez. Martinez also called games nationally for ESPN and NBC, including the 1994 Major League Baseball All-Star Game. Before joining the Red Sox, Martinez served as a news and sports reporter for WUNR radio in Boston and play-by-play announcer for amateur baseball in Hartford.
References
Year of birth missing (living people)
Living people
Boston Red Sox announcers
Major League Baseball broadcasters
Sportspeople from Boston |
https://en.wikipedia.org/wiki/IP-DECT | IP-DECT is a technology used for on-site wireless communications. It uses the DECT air interface for reliable wireless voice and data communication between handsets and base stations and the well established VoIP technology for the corded voice communication between base stations and server functions.
The advantage is the circuit switched approach and therefore better specified quality of service for vocal communication than with Wireless LAN.
A DECT phone must remain in proximity to its own base (or repeaters thereof), and WLAN devices have a better range given sufficient access points, however voice over WLAN handsets impose significant design and maintenance complexity for large networks to ensure roaming facilities and high quality-of-service.
There are some of the traditional telephone equipment manufacturers and smaller enterprises that offer IP-DECT systems, both for residential (single-cell base station/access points), as well as for enterprise usage (multi-cell with multiple base stations/access points, and/or seamless handoff between cells) where it is important to cover large areas with a maintained speech path.
Companies
For enterprise use the following vendors produce IP-DECT systems:
Aastra (DeTeWe)
Ascom (company)
Gigaset
Mitel
NEC
Panasonic
Spectralink 7000 series (Polycom, Kirk)
Alcatel-Lucent
Ericsson-LG
See also
CAT-iq
Voice over WLAN
References
Wireless networking
VoIP hardware
VoIP software |
https://en.wikipedia.org/wiki/Bike%20registry | Bike registries are databases of unique, identifying information about bicycles and their ownership. Most registration programs use the unique serial numbers which are permanently affixed to most bicycles during manufacture.
Bicycle registration programs generally aim to reduce the prevalence of bike theft. Bicycle theft is one of the major factors that slow the development of utility cycling since it discourages people from investing in a bicycle.
Bicycle registration may be a public service provided by a local, state or national government, or be provided by an independent organization.
Some registration programs are exclusively designed for spreading the word after a bike has been stolen, while others focus on registering bikes before they are stolen.
Purpose
Bike registration is intended to provide:
An element of security (such as at schools and universities)
A means of theft deterrence and a method of recovery in the event of theft
Bikes are stolen in large numbers in many parts of the world.
In Copenhagen approximately 20,000 annually.
In the United States an average of 230,000 annually, according to the FBI.
In the United Kingdom according to the Crime Survey for England and Wales of the Office for National Statistics thefts peaked at 660,000 in 1995, and dropped to 290,000 in 2017, the latest year for which survey statistics were available in 2021; about one third of this number of thefts were reported to police. During the 2020 coronavirus pandemic thefts dropped according to police figures, but were expected to rise afterwards. Only about 5% of stolen bikes are returned to their owners. About a quarter of people whose bicycle is stolen stop cycling, and 66% cycle less often. The UK BikeRegister database, used by the police to recover and return stolen bicycles, reached its millionth registration in January 2021.
In the Czech Republic in 2012, there were almost 8000 bicycles reported stolen, 1260 of them in the Moravian-Silesian Region, 368 of them in the city of Ostrava. It is thought that most thefts are not reported because the rate of recovery is infinitesimal.
Globally the number is estimated at 1.5 million bikes reported stolen annually; perhaps another 2 to 3 million go unreported annually.
Procedure
At many schools and universities, all bikes brought onto campus are routinely required to be registered by their owners and to display prominently their annual school-provided registration decal.
Some states in the USA, such as California, have laws which allow cities and municipalities to require registration of bikes. The registration period typically is in excess of one year. Building on existing law, California has passed a bill in 2014 that will allow cities, counties or regional park districts to impose an annual vehicle registration surcharge of up to $5 to pay for local bike lanes and trails, valid until Jan. 1, 2025.
Several commercial and peer based bike registries exist for the purpose of theft deterre |
https://en.wikipedia.org/wiki/DYPT-TV | DYPT-TV (channel 11) is a television station in Metro Cebu, Philippines, serving as the Visayas flagship of the government-owned People's Television Network. The station maintains hybrid analog/digital transmitting facility at Sitio Babag, Brgy. Busay, Cebu City. The station is currently planning to upgrade to an originating station in the future after the Visayas Media Hub in Mandaue City will be completed in 2024.
History
September 11, 1963 - PTV began its broadcasts in Cebu via Channel 11, a frequency originally owned by Associated Broadcasting Corporation (now TV5 Network, Inc.), with the call sign DYMT-TV until President of the Philippines Ferdinand Marcos declared Martial Law on September 21, 1972.
February 2, 1974 - During the Martial Law era, the station reopened as DYGT-TV and became an owned-and-operated station of the National Media Production Center as Government Television (GTV) under Lito Gorospe and later by then-Press Secretary Francisco Tatad. It was the first television station in Central Visayas.
1978 - DYGT-TV switched affiliation to Banahaw Broadcasting Corporation, with its new call sign DYCW-TV. On the same year, GTV was transferred to Channel 3 under the call sign DYCB-TV, then was renamed Maharlika Broadcasting System (MBS) in 1980.
February 24, 1986 - The station was officially rebranded as People's Television (PTV).
1988 - PTV returned to Channel 11, with Channel 3 being taken over by ABS-CBN. Its call letters were changed to DYPT-TV. Back then, its studios were located at the former NMPC Bldg. along A.C. Cortes Ave., Mandaue (now demolished in 2011).
January 15, 2011 - The station suddenly went off the air for facility upgrades.
August 29, 2015 - After 4 years of being silence in the area, PTV-11 Cebu resumed its operations, with the 10,000-watt brand new transmitter from the Advanced Broadcasting Electronics (ABE) Elettronica of Italy, complemented by a 250-foot tower in Sitio Babag, Brgy. Busay, Cebu City, coinciding with the conduct of the APEC Summit in the city.
June 1, 2018 - PTV Cebu started its ISDB-T digital test broadcasts on UHF Channel 42.
December 16, 2021 - PTV Cebu went off the air for the second time following the effects of Typhoon "Rai" (Odette) in Cebu, Bohol and Leyte, causing the transmitter was struck brought by the said typhoon.
January 2022 - The station returned on-air once again after power was restored in Brgy. Babag.
Digital television
Digital channels
DYPT-TV broadcast its digital signal on UHF Channel 42 (641.143 MHz) and is multiplexed into the following subchannels:
See also
People's Television Network
List of People's Television Network stations and channels
DWGT-TV - the network's flagship station in Manila.
DYMR
External links
Radio and TV broadcast stations of Region VII: Cebu province, National Telecommunications Commission (Philippines)
References
Digital television stations in the Philippines
Television channels and stations established in 1963
Television stations in Cebu |
https://en.wikipedia.org/wiki/Dense%20artery%20sign | In medicine, the dense artery sign or hyperdense artery sign is an increased radiodensity of an artery as seen on computer tomography (CT) scans, and is a radiologic sign of early ischemic stroke. In earlier studies of medical imaging in patients with strokes, it was the earliest sign of ischemic stroke in a significant minority of cases. Its appearance portends a poor prognosis for the patient.
The sign has been observed in the middle cerebral artery (MCA), posterior cerebral artery (PCA), vertebral artery, and basilar artery; these have been called the dense MCA sign, dense PCA sign, dense vertebral artery sign, and dense basilar artery sign, respectively.
Rarely, a hypodense artery sign can occur due to fat embolism.
Cause
Through cerebral angiography, the sign has been demonstrated to correspond to embolic or atherosclerotic occlusion of an artery. Specifically, the hyperdensity is thought to be due to calcification or hemorrhage associated with an atherosclerotic plaque.
Identification
Identification of the dense artery sign is often based on subjective interpretation and false positives may occur. One study aiming to define criteria for the sign determined that measuring Hounsfield units on the CT scan could differentiate between the dense MCA sign associated with ischemic stroke and that caused by false positives. Specifically, the combination of greater than 43 Hounsfield units and an MCA density ratio of greater than 1.2 was diagnostic of a dense MCA sign associated with acute ischemic stroke.
References
Radiologic signs |
https://en.wikipedia.org/wiki/DXKO-TV | DXKO-TV, Channel 5, is a television station of Radio Philippines Network. Its transmitter is located at Barangay Gusa, Cagayan de Oro.
See also
CNN Philippines
Nine Media Corporation
Radio Philippines Network
List of Radio Philippines Network affiliate stations
Television stations in Cagayan de Oro
Television channels and stations established in 1965
Radio Philippines Network stations |
https://en.wikipedia.org/wiki/Scid | SCID is a four-letter acronym that may refer to:
Severe combined immunodeficiency
Severe combined immunodeficiency (non-human)
Shane's Chess Information Database
Source Code in Database
Structured Clinical Interview for DSM |
https://en.wikipedia.org/wiki/International%20Teletraffic%20Congress | The International Teletraffic Congress (ITC) is the first international conference in networking science and practice. It was created in 1955 by Arne Jensen to initially cater to the emerging need to understand and model traffic in telephone networks using stochastic methodologies, and to bring together researchers with these considerations as a common theme. Up through World War II, teletraffic research was done mainly by engineers and
mathematicians working in telephone companies. Most of their work was published in local or company journals. In 1955, however, the field acquired a formal, international, institutional structure, with the organization of the
first International Teletraffic Congress (ITC).
Over the years, it has broaden its scope to address a wide spectrum ranging from the mathematical theory of traffic processes, stochastic system modelling and analysis, traffic and performance measurements, network management, traffic engineering to network capacity planning and cost optimization, including network economics and reliability for various types of networks. ITC served as a forum for all theoretical fundamentals and engineering practices for large-scale deployment and operation of telecommunications networks. Since its inception, ITC witnessed the evolution of communications and networking: the influence of computer science on telecommunication, the advent of the Internet and the massive deployment of mobile communications and optics, the appearance of peer-to-peer networking and social networks, the ever increasing speed and flexibility of new communication technologies, networks, user devices, and applications, and the ever changing operation challenges arising from this development. ITC documented this evolution with contemporary measurement studies, performance analyses of new technologies, recommendations for provisioning and configuration, and greatly contributed to the methodological toolbox of network scientists.
Today, with its conferences, specialist seminars, regional seminars, training courses and publications, the ITC aims at a worldwide forum for all questions related to network and service performance, management, and assessment, both present and futuristic. The notion of traffic is broadly used to encompass data traffic from the MAC layer all the way to application traffic in the application layer. The scope of ITC is thus ranging all issues embedding operations, design, planning, economics and performance analysis of current and emerging communication networks and services, to be addressed by applying a variety of tools from different fields, such as Stochastic Processes, Information theory, Control theory, Signal and Processing, Game theory and optimization techniques, Statistical methodologies and Artificial Intelligence techniques. The target audience of such issues is experts from research organizations, universities, equipment vendors and suppliers, network operators, service providers, system integrators and |
https://en.wikipedia.org/wiki/MITRA%20Youth%20Buddhist%20Network | The MITRA Youth Buddhist Network (formerly the MITRA Intervarsity Buddhist Network) is a network of Buddhist youth organisations in Australia. Predominantly situated in Sydney, Australia, MITRA's current members are UniBodhi (Sydney University Buddhist Society), MacBuddhi (Macquarie University Buddhist Society), and UTS (University of Technology, Sydney) Buddhist Society.
The name of the network MITRA, stems from a Sanskrit word meaning "friend".
Since 2004, MITRA has held Buddhist annual conferences which brings together a range of international and local speakers and topics.
MITRA Buddhist Conferences
The MITRA Youth Buddhist Network has, since 2004, organised an annual Buddhist conference. Traditionally held in July, except for 2010 which was held in May to coincide with the Buddhist Festival Month celebrations run by the Buddhist Council of New South Wales.
The MITRA Buddhist Conference is convened by a member, or members, of MITRA inviting local and international learned speakers to give talks and lead discussions at the Conference. Run and managed entirely by volunteers, the MITRA Buddhist Conference relies on the goodwill of the community in keeping the Conference sustainable. Between 2004 and 2009, the food for the Conference was donated by the community including the Friends of Mitra, a conglomerate of elder lay Buddhists, and local Sydney vegetarian restaurants.
2010 Buddhism: Unplugged
The "Buddhism: Unplugged" 2010 MITRA Buddhist Conference was held at the Sydney Masonic Centre. The theme explored the world of different Buddhist practices and "back to basic" principles which all Buddhist schools of thought accept and promote.
This year the MITRA Youth Buddhist Network collaborated with the Buddhist Council of New South Wales to be a partner of the inaugural Buddhist Festival Month celebrations.
2009 Having Enough ... Finding Spiritual Wealth
The "Having enough ... Finding spiritual wealth" 2009 MITRA Buddhist Conference was held at the University of Technology, Sydney. The theme explored happiness in the midst of the financial hardships of the Global Financial Crisis.
2008 Wisdom For A Modern World
The "Wisdom for a Modern World" 2008 MITRA Buddhist Conference was held at the University of Technology, Sydney. The theme explored how the wisdom of Buddhism can be experienced in all aspects of our lives even in our chaotic modern world we can find a peace and tranquility awaiting those who seek it.
A DVD of the Conference is available which includes footage of all 6 talks including Venerable Robina Courtin's explanation of transforming the mind, Venerable David Lungtok on Emptiness, Venenerable U Vamsarakkhita on "The Buddha's Teaching - Simple, Practical and Powerful" and Venerable Shravasti Dhammika on "2500 Years of Evolving Truth". Profits from DVD sales will be donated to Venerable Sister Yeshe Chodron's Kalyanamitra Foundation which delivers social services to the poor regions of India.
2007 Change Your Mind, Change |
https://en.wikipedia.org/wiki/List%20of%20radio%20stations%20in%20Cape%20Verde | This is an alphabetical list of radio stations in Cape Verde.
List of radio stations
National stations
RCV - Radio Cabo Verde
RCV+ - Radio Cabo Verde Jovem - youth network
Regional stations
Rádio Atlântico
Praia FM - the first FM station in Cape Verde, based in the capital city
Rádio Praia - based in the capital city
Rádio Comunitário do Voz de Ponta d'Água - based in a Praia neighborhood
RCSM - Rádio Comunitaria de Santa Maria - FM 98.0 - based in Sal Island
Radio Morabeza - Portuguese-speaking radio station with some English programming (93.7 FM for the Barlavento Islands and 90.7 FM for the Sotavento Islands)
Defunct/former stations
Rádio Barlavento - once broadcast in the Barlavento Islands, aired from 1955 to 1975
Rádio Clube do Mindelo - once broadcast throughout the island of São Vicente, aired from 1947 to 1955
Rádio Colonial Portuguesa - existed between the mid 1930s until independence in 1975
Rádio Voz de São Vicente - once aired from 1975 to the 1990s, replaced with RTC afterwards
International radio stations
RDP África - Portuguese based radio station which includes news and sports from Portugal - availability is on satellite
Radio Cabo Verde International - Radio on line web site http://www.radiocaboverdeinternational.com/
Outside Cape Verde
Rádio Atlântico - Cape Verdean station broadcast in the Netherlands, based in Rotterdam
See also
Telecommunications in Cape Verde
Media of Cape Verde
List of television stations in Cape Verde |
https://en.wikipedia.org/wiki/Lego%20Rock%20Raiders%20%28video%20game%29 | Lego Rock Raiders is a video game developed by Data Design Interactive and published by Lego Media for Microsoft Windows and PlayStation. It is based on the Lego theme of the same name. The Windows version was released in 1999, while a differently built game for PlayStation was released in 2000.
Gameplay
Windows version
The Windows version is a real-time strategy game similar to Dungeon Keeper, and was the first video game for the Rock Raiders theme. The game opens with optional training missions and one actual mission unlocked. Most missions require the player to collect a certain amount of Energy Crystals, the required amount starts low but gradually gets higher in later missions. Some missions require the player to locate Rock Raiders that have been trapped in landslides, or to find certain pieces of equipment and bring it back to their base. One of the game's features is the Priority Menu. With this menu, the player can set what order Rock Raiders carry out their tasks. For example, the player can set whether Rock Raiders should collect Energy Crystals or Lego Ore first.
At the end of each mission, Chief evaluates the player's work, examining various aspects of the mission. With all these taken into consideration, Chief gives a mission rating percentage.
There are twenty-five missions total, each of them is in either a rock, lava/volcanic or ice cavern environment. It is not necessary to complete every mission with 100%, or even complete all the missions, to complete the campaign, however, the player will unlock a "better" ending cutscene by completing the campaign in full.
PlayStation version
Unlike the Windows version, the PlayStation version is an action and strategy game, in which the player controls a character instead of just commanding a squad. While the former was centered on constructing a base and mining, the latter centers on exploring.
Most missions require the player to collect a certain amount of Energy Crystals, while some missions require the player to rescue Rock Raiders that have been trapped by landslides. There are eighteen campaign missions, and six multiplayer missions, all completely different between the NTSC and PAL versions of the game. The PAL version also including three bonus missions that are accessible after the campaign is completely finished, and twelve additional multiplayer missions reusing levels from the main campaign. Rather than a percentage, at the end of each mission you receive either a bronze medal (minimum required objectives complete), a silver medal (most objectives complete), or a gold medal (all objectives complete in the required time).
Reception
The game received mixed reviews on both platforms according to the review aggregation website GameRankings.
References
External links
1999 video games
Action-adventure games
Data Design Interactive games
Rock Raiders (video game)
Multiplayer and single-player video games
PlayStation (console) games
Real-time strategy video games
Video g |
https://en.wikipedia.org/wiki/Dan%20Connolly | Dan Connolly may refer to:
Dan Connolly (American football) (born 1982), American football player
Dan Connolly (computer scientist)
See also
Daniel W. Connolly (1847–1894), politician |
https://en.wikipedia.org/wiki/Carel%20S.%20Scholten | Carel S. Scholten (Amsterdam, 1925 – 2009) was a physicist and a pioneer of computing.
He went to the Vossius Gymnasium in Amsterdam and then studied physics from 1945 to 1952 at the University of Amsterdam.
In 1947 he was asked by the Dutch Mathematisch Centrum (which later became the Centrum Wiskunde & Informatica) to collaborate in building an automatic calculator with his friend and fellow student Bram Loopstra. Their first system, the ARRA I was not a success, but its successor, the ARRA II, on which Gerrit Blaauw also collaborated, was.
In 1954 work started on the ARMAC, which he built together with Loopstra and Edsger W. Dijkstra, who was responsible for the software and collaborated with Scholten for more than 30 years.
The ARMAC was remarkable for its use of transistors.
In 1958 Scholten went to work for Electrologica (later Philips Electrologica), where he developed the Electrologica X1 computer with Loopstra; up to 1964, 40 models were installed, mainly at universities. He remained with Philips Electrologica until 1979, when he switched to the Philips Natuurkundig Laboratorium, where he stayed until 1985.
In 1991 he was awarded an honorary doctorate by Technische Universiteit Eindhoven.
Publications
Edsger W. Dijkstra and Carel S. Scholten (1990). Predicate Calculus and Program Semantics. Springer-Verlag – An abstract, formal treatment of Predicate transformer semantics
External links
Eredoctor Carel Scholten overleden - TU Eindhoven(in Dutch) – Obituary by the TU Eindhoven.
Unsung Heroes in Dutch Computing History – Carel S. Scholten and Bram Jan Loopstra – Illustrated report of his work at the TU Eindhoven.
Computers ontwerpen, toen (Designing computers, back then) (in Dutch, on the Electrologica Foundation site) – Retrospective address by Carel Scholten on 23-11-1979.
References
1925 births
2009 deaths
20th-century Dutch physicists
Scientists from Amsterdam
Philips employees
University of Amsterdam alumni |
https://en.wikipedia.org/wiki/Stephen%20Cook%20%28disambiguation%29 | Stephen Cook is a computer scientist.
Stephen Cook may also refer to:
Stephen Cook (cricketer) (born 1982), cricketer
Stephen Lloyd Cook, Old Testament scholar and professor
See also
Stephen Cooke (born 1983), British footballer
Steven Cook, British artist, photographer, and graphic designer.
Steve Cook (disambiguation)
Jimmy Cook (Stephen James Cook, born 1953), South African sportsperson |
https://en.wikipedia.org/wiki/Knick%20Knack%20%28disambiguation%29 | Knick Knack is an English equivalent of bric-à-brac.
Knick Knack, Knickknack or Nick Nack may also refer to:
Knick Knack, a computer-animated Pixar short film
This Old Man, a nursery rhyme that repeats the line "Knickknack Paddywhack" in each verse
Knickknack, a member of Captain America-villains Death-Throws
Knickknack Toys, from Some Assembly Required
Nick Nack, The Man with the Golden Gun movie henchman to Bond villain Francisco Scaramanga
"Nick Nack", a 2006 song from the Purple City album The Purple Album
Knick knack, another name for ding dong ditch
See also
Nikki Nack, 2014 album by Tune-Yards
Knack (disambiguation)
Knick (disambiguation)
Nick (disambiguation)
Nack (disambiguation) |
https://en.wikipedia.org/wiki/Bruce%20Branit | Bruce Branit is an American filmmaker with a strong background in Computer graphics and visual effects. He has received eight Emmy Award nominations for his work on shows such as Westworld, Breaking Bad and Star Trek: Voyager. He is the owner of Branit FX based in Kansas City which provides visual effects work for feature television, film and commercials. His production company Lucamax Pictures is currently developing several long and short form entertainment projects.
Branit created World Builder, an emotional short film demonstrating futuristic computer interfaces used to create a holographic world for a woman apparently in a medical coma. The movie won several short film awards such as the KC Filmmakers Jubilee, the Indianapolis International Film Festival and the Indy Shorts Fest. Branit is also known for his work on the short film "405". This 3-minute film, co-produced by Jeremy Hunt, shows a DC-10 airliner make a suspenseful emergency landing on a Los Angeles freeway.
Early life and education
Branit studied industrial design at the University of Kansas.
Filmography
2000 – 405
2007 – World Builder
2013 – State of the Union
2014 – Gotcher
2015 – Big Red Bow, Star Wars Spec Spot
2017 – The Lucid Engine
2019 – The Overlay (In production)
2020 – The Branch Manager (In development)
Awards
2018 Shore Scripts - Feature Winner - Loop Thief (aka The Branch Manager)
2018 Visual Effects Society (VES) Nomination for Best Supporting VFX in a TV Series - Westworld
2018 Emmy Award Nomination for VFX in a TV Series - Westworld
2016 Emmy Award Nomination for VFX in a TV Series - 11-22-63
2014 Visual Effects Society (VES) Nomination for Best Supporting VFX in a TV Series- Breaking Bad
2014 Page Screenplay Quarterfinalist “Occupy Dawn (aka State of the Union)”
2013 Emmy Award Nomination for VFX in a TV Series - Breaking Bad
2009 WINNER Cineglobe (CERN) Film Festival - “World Builder” Short Film
2008 Seattle International Film Festival Finalist - “World Builder” Short Film
2001 Emmy Award Nomination for VFX in a TV Series - Enterprise
1999 Emmy Award Nomination for VFX in a TV Series - Star Trek: Deep Space Nine
1999 Emmy Award Nomination for VFX in a TV Series - Star Trek: Voyager
1998 Emmy Award Nomination for VFX in a TV Series - Star Trek: Voyager
References
External links
Bruce Branit Freelance Site
Branit FX
Lucamax Pictures
Film producers from Missouri
American science fiction writers
Living people
American male screenwriters
Mass media people from Kansas City, Missouri
University of Kansas alumni
Film directors from Missouri
Screenwriters from Missouri
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/Accessaphone | accessaphone, first introduced in 2005 is CTI (Computer Telephony Integration) enabled software that provides better user access to desk and soft phones via the keyboard, mouse and/or voice commands. The application is specifically useful for users with various vision and mobility abilities.
How it is used
As an example, when using an enterprise phone from Cisco, NEC or Tadiran Telecom, functions like Dial, Hold and Transfer can be executed via keyboard hot keys D, H and T (preceded with the ALT key) respectively. accessaphone uses Microsoft Windows Telephony Application Programming Interface (TAPI) to communicate with the Enterprise Phone System.
Accessibility compliance
One of the ways in which accessaphone makes phone systems accessible and Section 508 compliant is by providing Audible Caller ID. This is a requirement on the Voluntary Product Accessibility Template. This is specifically useful for users with vision loss as the identification of an incoming call gets announced with the use of the software. The United States Access Board - the agency who is responsible for Section 508 - deployed accessaphone along with a Cisco phone system for their employees who required certain access to specific phone features like Audible Caller ID or those employees with physical impairments who needed voice access to the phone.
In 2009, The American Foundation for the Blind did a case study and determined that accessaphone was compliant with Section 508 and did in fact enhance Voice over IP telephony equipment for users needing certain access to that equipment.
References
External links
accessaphone website
United States Access Board: Section 508
Disability software |
https://en.wikipedia.org/wiki/UIC%20wagon%20numbers | Wagon numbers (or coach numbers) are key data for railway operations. They enable a railway wagon or coach to be positively identified and form a common language between railway operators, infrastructure companies and the state authorities. The system of wagon numbering has been laid down by the International Union of Railways (Union internationale des chemins de fer or UIC, founded in 1922) and is similar to that used for the locomotives and multiple units. Vehicle numbering is now governed by the Intergovernmental Organisation for International Carriage by Rail and in Technical Specifications for Interoperability (TSI) of the European Union.
The complete wagon number comprises 12 digits. The individual digits have the following meaning:
Placement of the code
As shown on the photographs at right, the code may be arranged either vertically (e.g. on closed wagons) on three or more lines at man's height with the letter codes next to the corresponding part of the digit code, or horizontally (e.g. on flat wagons) at the bottom of the chassis side with all digits together (with groups separated by spaces and the check digit by a dash) and all letters together. It is always found on both sides of the wagon, not on the front or back.
Calculation of the self-check digit
The digits are multiplied individually from right to left alternately by 2 and 1, and digit summed using the Luhn algorithm. The difference between this sum and the next multiple of ten is the check digit, placed after the eleventh digit, separated by a dash.
Examples
Wagon number: 21 81 2471 217
2 1 8 1 2 4 7 1 2 1 7
multiplying by
2 1 2 1 2 1 2 1 2 1 2
gives
4 1 16 1 4 4 14 1 4 1 14
digit sum
4 1 7 1 4 4 5 1 4 1 5
sum = 37
next multiple of ten = 40
check digit = 40-37 = 3
2 1 8 1 2 4 7 1 2 1 7 - 3
Wagon number: 51 80 0843 001
5 1 8 0 0 8 4 3 0 0 1
multiplying by
2 1 2 1 2 1 2 1 2 1 2
gives
10 1 16 0 0 8 8 3 0 0 2
digit sum
1 1 7 0 0 8 8 3 0 0 2
sum = 30
next multiple of ten = 30
check digit = 30-30 = 0
5 1 8 0 0 8 4 3 0 0 1 - 0
Country code
At the beginning of 2006 the country replaced the owner (almost exclusively state railways), with the owner now indicated by following letters. For example, for a vehicle registered in Germany on the AAE, which had its own code as a private railway, 68 AAE became 80 D-AAE.
(see also UIC country code)
Reading of numbers
Numbers are read visually, the method of choice today (2008). No railway is able to read the number automatically with the required reliability (less than 1 error in 10,000). Using OCR readers the numbering (DB AG: Font Gerade Normschrift DIN 16 Variant DB) can be only be read to an |
https://en.wikipedia.org/wiki/National%20Cycle%20Route%2021 | National Cycle Route 21 (or NCR 21) is part of the United Kingdom's National Cycle Network. It runs from Greenwich in South-East London south to Crawley, then east to Groombridge and south to Eastbourne, with a short final loop northwards again to its end at Pevensey.
The route is approximately 150 km (93 miles) long. Several sections are not suitable for road bikes.
Links to:
National Cycle Route 4 at Greenwich which is the route's start.
National Cycle Route 1 at Greenwich is a few hundred metres from the route's start.
National Cycle Route 2 at Polegate and at Pevensey at the route's finish.
National Cycle Route 20 at Redhill and at Crawley.
The route forms much of the English section of the Avenue Verte, a planned long-distance cycle route linking London and Paris.
Route
Greenwich to Crawley
Greenwich | Lewisham | South Norwood | New Addington | Redhill | Horley | Gatwick Airport | Crawley
This section starts by leaving NCR 4 beside the River Thames and following the Waterlink Way south through South-East London, generally on well-surfaced bridleways and residential roads and climbing gently. On leaving Greater London the route quickly becomes more rugged, following a number of paths and roads, including the long access road to Woldingham School. After passing under the M25 motorway the track quality improves again and the route heads west to Redhill, before again heading south, close by the London-Brighton railway. It passes directly underneath the South Terminal of Gatwick Airport, weaves through the runway approach lights and continues south to Crawley.
Between Redhill and Crawley the route duplicates Route 20.
Crawley to Groombridge
Crawley | Crawley Down | East Grinstead | Groombridge
This section is largely on well-made railway paths through attractive countryside and consists of the Worth Way immediately followed by the Forest Way. It finishes just south of Groombridge, with a short signposted spur to the village itself.
Groombridge to Eastbourne
Groombridge | Rotherfield | Mayfield | Heathfield | Hailsham | Polegate | Eastbourne
The first half of this section is on undulating country roads, passing by Eridge Station. About one mile before Eridge Station is a spur connecting Crowborough with the route. After Mayfield there is a steep off-road section. The route then follows the whole length of the Cuckoo Trail from Heathfield to Eastbourne, crossing NCR 2 at Polegate.
Eastbourne to Pevensey
Eastbourne | Pevensey
The route follows the coast up from the east side of Eastbourne, passing the harbour, to Pevensey, where it meets NCR 2.
See also
Avenue Verte
References
https://www.sustrans.org.uk/find-a-route-on-the-national-cycle-network/route-21
External links
East Sussex County Council: National Cycle Network: Route 21
NCR 21 overview map (881k)
Cycleways in London
Transport in Surrey
Transport in West Sussex
Transport in East Sussex
National Cycle Routes |
https://en.wikipedia.org/wiki/Thumer%20Netz | The Thumer Netz was a narrow gauge railway network in the area around Thum in Saxony, Germany that operated from 1886 until 1975. It had a gauge. Total length was about .
This network had three segments that connected three standard gauge stations: In Wilischthal and Schönfeld-Wiesa were connections to the Annaberg-Buchholz-Flöha railway, and in Meinersdorf was a connection to the Chemnitz–Adorf railway. The three segments had their hub in Thum. This set of railroads brought much-needed connectivity and transport capacity to the small towns and villages of the central Ore Mountains, which had formed a viable industry in the 19th century due to abundance of water power, wood, ore and other natural resources as well as cheap labour.
A landmark was the long and tall Greifenbach viaduct between Ehrenfriedersdorf and Geyer.
History
Wilischthal-Thum
This was the first segment to be finished for the Thumer Netz. Construction started in September 1885, and operations started on December 15, 1886. Length of this segment was . The track started at the Wilischthal station in Zschopau on the Annaberg-Buchholz–Flöha railway, located in the Zschopau valley, and wound its way along the Wilisch river through Wilischau, Grießbach, Venusberg and Herold into Thum.
This segment operated until 1972. The tracks between the paper mill in Wilischthal and Thum were slowly demolished in the following years. The short remaining section operated until 1992 as an industrial siding, connecting the paper mill with the regular gauge tracks in Zschopau. This short section of tracks still exists today, but is in unusable condition.
Schönfeld-Wiesa-Thum
This segment was opened in 1888 and featured the Greifenbachtal bridge, at the time one of the largest narrow gauge bridges in Germany. The initial segment started in Schönfeld-Wiesa and ran via Tannenberg to Geyer, parallel to the roadway between the towns. In Geyer the tracks made a wide 180 degree turn through the middle of town to arrive at the station in Geyer. In 1906 the track was extended to Ehrenfriedersdorf and Thum, which obsoleted the short connection between Herold and Ehrenfriedersdorf on the Wilischthal-Thum segment. In Thum, a new station was built to connect the new railway to the already existing segment.
Passenger service operated until 1968. Sections were dismantled over the following years. After 1972, only the short distance from Schönfeld-Wiesa to the paper mill was still being used as an industrial siding. In 1985, this short section was upgraded to regular gauge tracks.
Thum-Meinersdorf
This segment of the Thumer Netz was finished in 1911 and connected the existing two segments with the Chemnitz–Adorf railway. Starting from Thum, the track went uphill via the neighboring Jahnsbach into Hormersdorf and from there downhill again via Auerbach and Gornsdorf into the Meinersdorf station. Total track length was 12.5 km (approx. 8 miles). By the early 1970s the tracks were in relative disrepair and had |
https://en.wikipedia.org/wiki/Problem-oriented%20development | Problem-Oriented Development is an emerging paradigm of computing that emphasises problems (as opposed to requirements) as the primary subject of scrutiny by software engineers. As such, Problem-Oriented Development is concerned with:
Investigating the structure of organisational problems as addressed by Software Engineering;
Providing formalisms for modelling and representing problems;
Providing guidance and frameworks for problem analysis and decomposition;
Defining techniques for formally justifying solutions (e.g. by associating problem components with solution components);
Supporting knowledge reuse during problem analysis (e.g. through problem patterns).
Specific Approaches
Problem-Oriented Software Engineering provides a formal definition of problems, and a framework for associating problems with solutions through formal, logical arguments;
Problem Frames provide a framework for defining empirical models of software engineering problems which are grounded in the physical world. The Problem Frames approach also provides a set of elementary problem patterns;
The Domain Theory hypothesises a set of cognitive "deep structures" corresponding to components of domain knowledge and draws on these to provide a framework for modelling software problems.
Research Influences of Problem-Oriented Development
Knowledge Engineering is a field of computer science which offers a significant body of work on problem-solving methods. Problem-solving methods are patterns of reasoning that are applied to solve specific problems. The work on problem abstractions within knowledge engineering can therefore provide a basis for research in software engineering.
Cognitive Science, which may be defined as the study of the nature of intelligence, offers a basis for studying the cognitive structures that domain experts develop of problems, as well as for better understanding human approaches to problem solving. The Domain Theory is one example of the influence of cognitive science in Problem-Oriented Development research.
Events
The First International Workshop on Problem-Oriented Development (POD-2009) will be hosted by the TOOLS-EUROPE 2009 conference.
References
Software development process |
https://en.wikipedia.org/wiki/Encyclopedia%20%28TV%20series%29 | Encyclopedia is a television series created by the HBO Network and the for-profit branch of the Children's Television Workshop (CTW) (now known as Sesame Workshop), Distinguished Productions, Inc. (DPI) (which has since been folded into Sesame Workshop). The series premiered on the HBO network in 1988.
Each episode covered a letter or series of letters in the alphabet, with short skits of sketch comedy devoted to up to twelve corresponding encyclopedia topics. Several topics were related through song. Three of the six writers of the show had also been writers for NBC's Saturday Night Live: Patricia Marx, Brian McConnachie, and Mitchell Kriegman.
The series featured the band BETTY, who performed both the opening and closing themes as well as individual songs for selected topics.
Topics
The series covered the following topics:
Awards
Daytime Emmy Awards:
Outstanding Achievement in Costume Design: Calista Hendrickson
Outstanding Achievement in Makeup: Paul Gebbia
Merchandising
Video
All episodes were released on VHS in the late 1990s. They are no longer available commercially, but often appear on eBay.
External links
The New York Times: CTW Romps Onto Cable With 'Encyclopedia' by Alison Leigh Cowan
HBO original programming
American children's education television series
1988 American television series debuts
1989 American television series endings
1980s American children's television series
English-language television shows
HBO Shows (series) WITHOUT Episode info, list, or Article
Television series by Sesame Workshop |
https://en.wikipedia.org/wiki/All%20nearest%20smaller%20values | In computer science, the all nearest smaller values problem is the following task: for each position in a sequence of numbers, search among the previous positions for the last position that contains a smaller value. This problem can be solved efficiently both by parallel and non-parallel algorithms: , who first identified the procedure as a useful subroutine for other parallel programs, developed efficient algorithms to solve it in the Parallel Random Access Machine model; it may also be solved in linear time on a non-parallel computer using a stack-based algorithm. Later researchers have studied algorithms to solve it in other models of parallel computation.
Example
Suppose that the input is the binary van der Corput sequence
0, 8, 4, 12, 2, 10, 6, 14, 1, 9, 5, 13, 3, 11, 7, 15.
The first element of the sequence (0) has no previous value.
The nearest (only) smaller value previous to 8 and to 4 is 0. All three values previous to 12 are smaller, but the nearest one is 4. Continuing in the same way, the nearest previous smaller values for this sequence (indicating the nonexistence of a previous smaller value by a dash) are
—, 0, 0, 4, 0, 2, 2, 6, 0, 1, 1, 5, 1, 3, 3, 7.
In most applications, the positions of the nearest smaller values, and not the values themselves, should be computed, and in many applications the same computation should be computed for the reversal of the sequence in order to find the following smaller value that is closest in the sequence.
Applications
mention many other problems that may be solved efficiently in parallel using a nearest smaller values computation. Among them, they include the following:
Merge algorithms, computing the merge step of a merge sort. The input to these algorithms consists of two sorted arrays of numbers; the desired output is the same set of numbers in a single sorted array. If one concatenates the two sorted arrays, the first in ascending order and the second in descending order, then the predecessor of each value in the output is either its closest previous smaller value or its closest following smaller value (whichever of the two is larger), and the position of each value in the sorted output array may easily be calculated from the positions of these two nearest smaller values.
Construction of Cartesian trees. A Cartesian tree is a data structure introduced by and further studied by for range searching applications. Cartesian trees also arise in the definition of the treap and randomized binary search tree data structures for binary searching. The Cartesian tree of a sequence of values has a node for each value. The root of the tree is the minimum value of the sequence; for every other node, the parent of the node is either its closest previous smaller value or its closest following smaller value (whichever of the two exists and is larger). Thus, Cartesian trees may be constructed in linear time based on an all nearest smaller values algorithm.
Matching parentheses. If a sequence of ope |
https://en.wikipedia.org/wiki/State%20highways%20in%20India | In India, this is the network of roads maintained by the state governments. These roads are constructed and managed by the states' Public Works Department. The state highways are usually roads that link important cities, towns and district headquarters within the state and connect them with National Highways or state highways of neighbouring states.
As of 31 March 2016, the total length of state highways was 176,166 km. As of 31 March 2016, Maharashtra had the largest share in the total length of SH roads (22.14%), followed by Karnataka (11.11%), Gujarat (9.76%), Rajasthan (8.62%) and Tamil Nadu (6.67%).
History
Independent of the NHDP program, state governments have been implementing a number of state highway projects since 2000. By 2010, state highway projects worth $1.7 billion had been completed, and an additional $11.4 billion worth of projects were under implementation.
Bharatmala, a centrally-sponsored and funded road and highways project of the Government of India with a target of constructing of new highways, has been started in 2018. Phase I of the Bharatmala project involves the construction of 34,800 km of highways (including the remaining projects under NHDP) at an estimated cost of by 2021–22.
See also
Roads in India
References
External links
2010 list of state highways under implementation - Published by the Government of India
Roads in India |
https://en.wikipedia.org/wiki/IUCV | Inter User Communication Vehicle (IUCV) is a data transfer mechanism in IBM VM line of operating systems. It was introduced with VM/SP Release 1 in 1980.
It allows establishment of point to point communication channels, either between two virtual machines or between a virtual machine and hypervisor services. In effect, IUCV provides a form of message-based interaction between virtual machines that anticipated the client/server interaction between network connected physical machines that emerged later on distributed systems.
IUCV is implemented by CP (the VM hypervisor) and controls all aspects of session establishments, message passing and flow control.
IUCV basics
Initializing IUCV
Before a virtual machine can use the IUCV service, it must first indicate the address of an area within its address space where CP will be able to store information regarding pending information or status. Therefore, the DECLARE BUFFER method must be invoked first.
The IUCV Path
In IUCV terminology, the session between two end points is called a PATH. It is identified at each end by a Path ID which is only relevant to the virtual machine that owns the session end. A path is always a connected channel - meaning there are no connectionless paths.
Establishing a path
To establish a path, the initiating virtual machine must invoke the CONNECT method, and specify the path target identity, which is either another virtual machine name or the name of a CP system service - which all start with the '*' character - which is not a valid character within a virtual machine name.
Provided the target has initialized IUCV itself, the target will be notified of the pending incoming path connection and may then either use the ACCEPT method - to complete path establishment - or the SEVER method - which effectively closes the pending path.
Once the path is established, messages may be passed between the two path endpoints.
IUCV Messages
IUCV Messages are bounded, that is, they have a beginning and an end. If more than one message is pending on a path for an endpoint, IUCV will not merge the messages.
Messages are sent on the path using the SEND method. The other end point can then receive the message using the RECEIVE method. If the original message also requested a reply, the receiving end point then use the REPLY method to send that reply.
Flow control
Multiple messages may be made pending on a path. The number of messages allowed pending for a path is specified during path establishment but cannot exceed 65535. Attempting to send a message on a path which has reached its pending message limit will result in an error.
Suspend and resume
Data transfer may be temporarily suspended by using the QUIESCE method. While the path is suspended, no further message transfers are allowed on the path until the RESUME method is invoked by the virtual machine that initially suspended the path.
Polling
A virtual machine may poll for IUCV notifications using the TEST MESSAGE and TEST COMPL |
https://en.wikipedia.org/wiki/Group%20Control%20System | Group Control System (GCS) is an operating system made by IBM, meant to run as a guest of VM. GCS is an integral component of the discontinued VM/SP (since VM/SP 4), VM/XA SP, VM/ESA and current z/VM IBM System product offerings.
Overview
GCS's purpose is to provide an environment to run some specific OS/MVS-based applications and networking middleware under VM. To this end, GCS provides a limited simulation of the OS/MVS APIs. While CMS, the usual VM guest, already has OS simulation, it is not extensive enough to run some applications such as VTAM.
Specifically, GCS provides OS multitasking support. In order to be able to spread the load over several virtual machines, GCS also implements a notion of group where each group member virtual machine can interact with one another.
To implement this, GCS uses several techniques:
A writable shared segment
IUCV communications between virtual machines
A recovery virtual machine, designed to clean up locks in the shared segments when virtual machines unexpectedly leave the group
GCS is not designed to be a multi-purpose user operating system such as CMS. For example, it does not allow for file editing.
Examples of programs designed to run under GCS are:
VM/VTAM : The VM implementation of the VTAM stack
RSCS : The Remote Spooling Communication Subsystem, which, when associated with an instance of VM/VTAM, can use SNA resources to communicate with other SNA/NJE hosts
NETVIEW : A networking monitoring service
External links
z/VM 5.3 Group Control System
IBM mainframe operating systems
VM (operating system) |
https://en.wikipedia.org/wiki/CloudStore | CloudStore (KFS, previously Kosmosfs) was Kosmix's C++ implementation of the Google File System. It parallels the Hadoop project, which is implemented in the Java programming language. CloudStore supports incremental scalability, replication, checksumming for data integrity, client side fail-over and access from C++, Java and Python. There is a FUSE module so that the file system can be mounted on Linux.
In September 2007 Kosmix published Kosmosfs as open source.
The last commit activity was in 2010. The Google Code page for Kosmosfs now points to the Quantcast File System on GitHub which is the successor to KFS.
A former project on SourceForge used the name CloudStore in 2008.
See also
Google File System
List of file systems
GlusterFS
Moose File System
References
Free software programmed in C++
Distributed file systems
Userspace file systems |
https://en.wikipedia.org/wiki/Data%20center%20bridging | Data center bridging (DCB) is a set of enhancements to the Ethernet local area network communication protocol for use in data center environments, in particular for use with clustering and storage area networks.
Motivation
Ethernet is the primary network protocol in data centers for computer-to-computer communications. However, Ethernet is designed to be a best-effort network that may experience packet loss when the network or devices are busy.
In IP networks, transport reliability under the end-to-end principle is the responsibility of the transport protocols, such as the Transmission Control Protocol (TCP). One area of evolution for Ethernet is to add extensions to the existing protocol suite to provide reliability without requiring the complexity of TCP. With the move to 10 Gbit/s and faster transmission rates, there is also a desire for finer granularity in control of bandwidth allocation and to ensure it is used more effectively. These enhancements are particularly important to make Ethernet a more viable transport for storage and server cluster traffic. A primary motivation is the sensitivity of Fibre Channel over Ethernet to frame loss. The higher level goal is to use a single set of Ethernet physical devices or adapters for computers to talk to a Storage Area Network, Local Area network and InfiniBand fabric.
Approach
DCB aims, for selected traffic, to eliminate loss due to queue overflow (sometimes called lossless Ethernet) and to be able to allocate bandwidth on links. Essentially, DCB enables, to some extent, the treatment of different priorities as if they were different pipes. To meet these goals new standards are being (or have been) developed that either extend the existing set of Ethernet protocols or emulate the connectivity offered by Ethernet protocols. They are being (or have been) developed respectively by two separate standards bodies:
The Institute of Electrical and Electronics Engineers (IEEE) Data Center Bridging Task Group of the IEEE 802.1 Working Group
Internet Engineering Task Force (IETF).
Enabling DCB broadly on arbitrary networks with irregular topologies and without special routing may cause deadlocks, large buffering delays, unfairness and head-of-line blocking. It was suggested to use DCB to eliminate TCP slow start using approach of TCP-Bolt.
Terminology
Different terms have been used to market products based on data center bridging standards:
Data Center Ethernet (DCE) was a term trademarked by Brocade Communications Systems in 2007 but abandoned by request in 2008. DCE referred to Ethernet enhancements for the Data Center Bridging standards, and also including a Layer 2 Multipathing implementation based on the IETF's Transparent Interconnection of Lots of Links (TRILL) standard.
Convergence Enhanced Ethernet or Converged Enhanced Ethernet (CEE) was defined from 2008 through January 2009 by group of including Broadcom, Brocade Communications Systems, Cisco Systems, Emulex, HP, IBM, Juniper Netwo |
https://en.wikipedia.org/wiki/Telos%20%28company%29 | Telos Corporation is an information technology and cybersecurity company located in Ashburn, Virginia. Telos primarily serves government and enterprise clients, receiving a large number of its contracts from the United States Department of Defense. Customers are primarily military, intelligence and civilian agencies of the US government and NATO allies.
History
Telos was founded in 1969 in Santa Monica, California and incorporated in Maryland in 1971.
In the fall of 1984 Telos released the FileVision program for the Apple Macintosh. InfoWorld magazine gave it an honorable mention in its Product of the Year for database applications.
John B. Wood joined the company in 1992, and became president and chief executive in 1994. Today, Telos is headquartered in Ashburn, Virginia.
On 16 June 2020, Telos Corporation reported its Automated Message Handling System (AMHS) service was granted an additional five years and $15.6 million contract by the Defense Information Systems Agency (DISA).
On 20 May 2020, Telos named retired general Keith B. Alexander as its advisory board's inaugural leader.
In November 2020, the company filed for an initial public offering.
References
1969 establishments in California
Defense companies of the United States
American companies established in 1969
Consulting firms established in 1969
Information technology consulting firms of the United States
Loudoun County, Virginia
2020 initial public offerings
Companies listed on the Nasdaq
Companies based in Virginia |
https://en.wikipedia.org/wiki/The%20Dodd%20Center%20for%20Human%20Rights | The Dodd Center for Human Rights (formerly the Thomas J. Dodd Research Center) is a University of Connecticut center which supports programming, educational initiatives, and events dedicated to the theme of human rights. The Dodd Center also houses several University of Connecticut departments and centers, including Archives & Special Collections, a unit of the University of Connecticut Library, the Human Rights Institute, and the Center for Judaic Studies and Contemporary Jewish Life. The John P. McDonald Reading Room is the public access point for the university archives and special collections.
History
Ground was broken for the Thomas J. Dodd Research Center on October 10, 1993, and the finished building was dedicated by President Bill Clinton on October 15, 1995. It is named for the late Senator Thomas Joseph Dodd whose son, Senator Christopher J. Dodd, played a crucial role in the center's development. The dedication ceremony inaugurated "The Dodd Year", a year-long series of special events, speakers, exhibits, and colloquia. Devoted to the theme of human rights, The Dodd Year recalled Thomas Dodd's participation as a senior prosecutor in the International Military Tribunal, the first of the Nuremberg War Crimes Trials.
The Dodd Year program brought an array of world figures to campus including Madeleine Albright, Elie Wiesel, and Oscar Arias and concluded in the fall of 1996 with an address by Mikhail Gorbachev.
In August 2021, the University of Connecticut Board of Trustees voted to rededicate the center as the Dodd Center for Human Rights. President Joe Biden, accompanied by Connecticut governor Ned Lamont, former senator Christopher Dodd, and other political dignitaries rededicated the center in a ceremony on October 15, 2021, exactly 26 years after its original iteration's dedication.
Programs
The Dodd Center for Human Rights hosts a number of ongoing programs and events.
The Raymond and Beverly Distinguished Sackler Lecture in Human Rights is held twice a year. Past speakers include Dorothy Q. Thomas, Adam Fairclough, Charlotte Bunch, Harold Koh, Patricia Wald, Samantha Power, Michael Ignatieff, George Mitchell, and James Crawford.
The Thomas J. Dodd Prize in International Justice and Human Rights, first awarded in 2003, is given biennially to an individual or organization which has made a significant contribution towards international justice and human rights. The 2009 Dodd Prize was awarded to the Committee to Protect Journalists on October 5, 2009.
The Edwin Way Teale Lecture Series brings a variety of distinguished speakers to the University of Connecticut to speak on various aspects of nature and the environment.
References
External links
Official site
Library buildings completed in 1995
University and college academic libraries in the United States
University of Connecticut
Dodd family
Libraries in Tolland County, Connecticut |
https://en.wikipedia.org/wiki/L%C3%B8ren%20station | Løren station is an underground rapid transit station of the Oslo Metro and the newest on the subway network. Serving the Oslo, Norway, neighborhood of Løren in the borough of Grünerløkka, the station is the only situated on the Løren Line. Designed by Arne Henriksen, the station is situated underground. Construction of the station began in 2013 and was completed in 2016. The station is estimated to have 6,000 daily passengers. It is served every fifteen minutes by trains running along the adjoining Ring Line via the Løren Line to the Grorud Line.
History
The Løren Line is designed to allow higher capacity through the metro system by some trains from the Grorud Line bypassing the Common Tunnel and instead running through the Ring Line. After the Ring Line was completed in 2006, five alternatives were proposed in 2007, which considered various ways to connect the Grorud Line and the Ring Line. Variations included building part of the line with single track and whether or not to construct a station at Løren. The latter would increase the price, but would give the area a significantly better transit service. As of 2007 the area was only served by a bus every twenty minutes. Funding of the Løren Line was secured as part of Oslo Package 3
The Løren, Hasle and Økern area is undergoing a major redevelopment. While the area previously has had some residential areas and has mostly been dominated by industry, it has now been designated a primary site for urban development in Oslo. The area has a potential for 25,000 residences and 2.5 million square meters (25 million sq ft) of commercial area. Oslo Municipal Council approved in May 2013 the construction of 730 apartments in the immediate vicinity of the station. The zoning plan allow the line was passed on 14 December 2011. The winner of the 2012 architecture competition was MDH Arkitekter and Arne Henriksen. Their proposal was backed by structural engineers Aas-Jakobsen. Løren Station was built with the cut-and-cover method, doubling as a crossection.
Facilities
Løren Station is situated in the Løren neighborhood of Bjerke. The station is situated below the surface in the redevelopment area of Lørenbyen. The station has an area of and has an entrance from each end.
Service
Service commenced on 3 April 2016. The station is served by line 4 of the Oslo Metro which runs every 15 minutes. It connects both to the Grorud Line and around the Ring Line and to the Common Tunnel. As the only station on the network, passengers from Løren will have to change trains to reach the city center (unless taking a detour around the Ring). Løren Station is estimated to receive six thousand daily passengers, making it among the ten busiest on the metro network.
References
Oslo Metro stations in Oslo
Railway stations opened in 2016
Grünerløkka
Railway stations in Norway opened in the 2010s |
https://en.wikipedia.org/wiki/Universia | Universia is a network that consists of 1,401 universities in 20 countries: Andorra, Argentina, Bolivia, Brazil, Chile, Colombia, Costa Rica, Ecuador, El Salvador, Spain, Guatemala, Honduras, Mexico, Nicaragua, Panama, Paraguay, Peru, Portugal, Dominican Republic and Uruguay. It has 20 internet sites, one for each country, and a global site which offers information and contents from across the network. Universia network represents 10.1 million students, 8 million users and 850,000 university teaching staff (75% of the total number of students and staff in these countries); the network is sponsored by Santander Bank.
Objectives
The goal of Universia is to:
promote change and innovation in products and services linked to the academic community, helping universities to develop shared projects and create new opportunities.
help universities build the future, which, under the name of Web 2.0, presents the user with challenges linked to interactivity, the creation of communities, the organization of content, and multimedia development,
promote opportunities for the exchange of experience and collaboration.
give to university students employment and scholarship opportunities as well as new ways to develop themselves both academically and professionally.
share technological innovation opportunities,
History
Universia was created in July 2000 as an internet initiative in the higher education sector. It is promoted by a group of Spanish universities with the support of the Spanish University Rectors' Board (CRUE), the Spanish National Research Council (CSIC) and sponsored by the Santander Group.
Universia was officially presented in Madrid (Spain) on July 9, 2000, as a Spanish initiative with a clear Spanish American vocation. On the same day almost all the Universia societies were also formally incorporated (Argentina, Brazil, Chile, Colombia, Spain, Mexico, Peru, Puerto Rico and Venezuela). The Portuguese branch was created a year later, followed by Uruguay in November 2005.
During the 2008, Universia welcomed Andorra, Panama, Paraguay and Dominican Republic. In order to expand the network towards the world, during March 2009 the basic information of Universia was published in Wikipedia in five languages under the edition and translation of Pabsi González from Universia Puerto Rico (http://www.universia.pr)
Today, Universia is the largest network of universities in the world and more countries have been added, such as: Bolivia, Costa Rica, Ecuador, El Salvador, Guatemala, Honduras and Nicaragua.
Services and content
Preuniversia
Assists students from high school and helps them find scholarships as well as the right university or higher education institution.
Academic Mobility (MAI)
Helps students that are studying abroad and helps the ones that want to do it to find the best programs and scholarships available.
Jobs
Universia offers jobs in and outside the local job market.
Development
Offers conferences and seminars for developme |
https://en.wikipedia.org/wiki/ABNA | ABNA may refer to any of the following:
Abna', a group of Persians in early Islamic Yemen
AhlulBayt News Agency (ABNA), Iran
Amazon Breakthrough Novel Award
Australasian Biospecimen Network Association |
https://en.wikipedia.org/wiki/Kettering%20Health | Kettering Health, (formerly Kettering Health Network and Kettering Medical Center Network), is a nonprofit network of fourteen Dayton and Cincinnati area medical centers, Kettering College, and 120 outpatient facilities. The system is based in Dayton, Ohio, United States. The network was formed following the merger of Kettering Medical Center and Grandview Medical Center in 1999. As part of the 2021 renaming of Kettering Health Network to Kettering Health, all of the hospitals in the network were renamed, with the exception of Soin. In addition, Kettering Physician Network was renamed Kettering Health Medical Group. Kettering Health has over 12,000 employees and 2,100 physicians.
Medical Centers
Kettering Health operates fourteen hospitals in the Southwest Ohio region.
See also
AdventHealth
Adventist Health
Adventist HealthCare
Kettering College
List of hospitals in Ohio
List of Seventh-day Adventist hospitals
External links
References
Companies based in Dayton, Ohio
Healthcare in Dayton, Ohio
Kettering, Ohio
Hospital networks in the United States
Medical and health organizations based in Ohio
Non-profit organizations based in Ohio
Adventist organizations established in the 20th century
1999 establishments in Ohio |
https://en.wikipedia.org/wiki/Watford%20Electronics | Watford Electronics was a British computer electronics company. It was founded in 1972 in a bedroom belonging to brothers Nazir and Raza Jessa, and grew to become one of the best-known suppliers of microcomputers and micro peripherals during the 1980s.
In the 1970s Watford Electronics sold components and kits, through advertising in electronics magazines, and a paper catalogue. They had one shop in Watford, but mostly traded as a mail-order company.
In the early 1980s Watford Electronics expanded into the home computer market. It was particularly active in the BBC Micro scene, producing a variety of peripherals for the computer, as well as a version of the Disc Filing System. They sold their own hardware under the Aries brand. Watford Electronics gradually moved over to supporting the Wintel market in the 1990s.
In the 21st century, the company opened an online store, Savastore, but in 2007 Watford collapsed into administration.
Watford Electronics was then bought out by Globally Limited, and in April that year, the website became known as Saverstore.
Notes
British companies established in 1972
Electronics companies of the United Kingdom
Consumer electronics retailers of the United Kingdom
Electronics companies established in 1972
Electronics companies disestablished in 2007
Mail-order retailers
Computer hardware companies |
https://en.wikipedia.org/wiki/HDR%20PhotoStudio | HDR PhotoStudio is a discontinued high dynamic range (HDR) graphics application developed by Unified Color for the Windows and macOS operating systems. In addition to being a HDR-merge application, HDR PhotoStudio offered a set of image editing operations that worked in its dynamic range (the website showed an example of processing an image with 1,000,000:1 contrast ratio), human color range (gamut), and in high precision (32-bit floating point). It also had a Color Integrity feature that enabled preserving an image's color tone during image editing operations — for example changing an image's contrast would not change its chromatic (color tone) data. This problem is usually referred to as "color shift".
HDR PhotoStudio implemented an advanced HDR image compression format called BEF, and a plug-in for opening and saving files in Adobe Photoshop was also included with the application. HDR PhotoStudio was discontinued in July 2010.
BEF is an HDR image format developed by Unified Color. The BEF format can archive image data with any dynamic range, full human color range, and a quality setting directly tied to color data precision; the used techniques ties it with JND — just noticeable difference parameter.
Features
Unified Color model: support for merging and editing HDR images with any dynamic range, human color range, and Color Integrity (to avoid "color shift" issue).
Support for RAW camera formats.
Support for import HDR images from Radiance HDR and OpenEXR formats.
An advanced technique of HDR data rendering.
Scripting support via image recipe.
Halo removal technique.
Powerful noise elimination.
32-bit/channel floating point high precision representation of image data (96 bit/pixel).
Multi-core processors support.
References
Image processing software
Digital photography
HDR tone mapping software |
https://en.wikipedia.org/wiki/Afrotainment | The Afrotainment family of channels is a New York-based network of nine linear television channels and digital properties (AFRO, Afrotainment, Afrotainment Music, Afro Sports, ABO, OUI TV, TV9JA, HAITI HD, YEBO) broadcasting Afro-Centric content in North America. Afrotainment family channels are available on Comcast, DISH Network, Altice USA, Verizon FIOS, Frontier Communications, Bell Fibe, Videotron, Roku, Amazon Fire TV and Apple TV.
History
Afrotainment was created in 2005 by Yves Bollanga, a former IBM Software Engineer and Shafquat Chaudhary Afrotainment, besides being a company involved in TV transmission, is also a TV production company that creates Afrocentric content: films, scripted and unscripted content, talk-shows, late night comedies, among others. On June 22, 2005, Afrotainment launched 3A TELESUD its first channel on DISH Network. Initial launch on DISH Network was followed by 3 more carriage agreement between 2008 and 2011 for the following TV channels: Afrotainment Movies, Afrotainment Music, TV9JA and OUI TVOn October 13, 2011, Afrotainment Launched its first channel on Cable: Afrotainment Plus, which includes the best of all Afrotainment programming, which includes African movies, Series, reality shows, talk shows, and highly coveted African soccer. Afrotainment Plus is available on IO Africa offering on Channel 1101On September 19, 2013, Afrotainment launched 4 new channels in Canada on Bell Fibe TV. This agreement marks its first expansion outside of the United States. On December 5, 2014, Afrotainment launched Haiti HD a network targeting the Haitian community on Bell Fibe TV Canada. In August 2015, Afrotainment launched YEBO, an OTT music video on demand app on Amazon Fire TV, Roku, Apple TV. On March 3, 2016, Afrotainment launched 2 channels (AFRO and ABO) on Verizon FIOS. On October 30, 2016, Afrotainment launched Haiti HD on Videotron in Canada. On June 28, 2017, Afrotainment launched AFRO, its Polycultural Black channel on Sling TV in the Lifestyle Plus package. The channel was removed on June 26, 2019. On November 15, 2018, Comcast announced an agreement to launch AFRO on Xfinity.
Programming
Afrotainment airs films and TV series from the African and Black worldwide diaspora. Afrotainment also produces several hours of content from its Orlando TV Studios: Point of View, a daytime woman talk show; Afrotainers, an Entertainment News show, Afrohits Top 10, a chart of the ten best Afro-centric music videos, The Lowdown, a late night comedy show, Journey, an interview-like talk show. The network also broadcasts soccer matches of the Confederation of African Football such as the CAF Champions League, CAF Confederation Cup, CAF African Nation Championship, and CAF Youth Championship.
Channels
Soundview Africa currently owns and operates the following 8 TV channels:
AFRO TV – Polycultural Black Television channel.
Afrotainment – Afro-centric general entertainment service, broadcasting in High-definition; programming |
https://en.wikipedia.org/wiki/Salamanga | Salamanga is a town in southern Mozambique.
Transport
The town is served by a terminus of a branchline of the Goba railway of the national railway network. The main traffic is limestone used in the manufacture of cement.
In 2008, $8m was to be spent rebuilding the line.
See also
Railway stations in Mozambique
References
Populated places in Maputo Province |
https://en.wikipedia.org/wiki/Ninja%20Hattori-kun%20%28video%20game%29 | is a 1986 video game software developed and published by Hudson Soft exclusively in Japan for the Nintendo Family Computer. It is based on Fujiko Fujio A's (pen name of Motoo Abiko) Japanese manga series of the same name, which later became an anime series and Asian franchise. The game was released around the same time the anime was aired. It was the fifth best selling Famicom game released in 1986, selling approximately 1,500,000 copies in its lifetime.
Description
Plot
The plot begins when a young ninja name Kanzo Hattori is searching for his master in order to complete his training. While searching for his master, he encounters a young 10-year-old boy named Ken'ichi Mitsuba and makes him his temporary replacement master. In order to develop Ken'ichi's confidence, they went on many adventures together. The game was aimed at a young audience the same way that the manga and anime did.
Gameplay
In the game, player controls Kanzo Hattori in a side-scrolling action game. Hattori must run to the right over various terrains, but primarily through the woods. In addition to using throwing stars, Hattori can access one of the other ninja techniques (ninpou), like Kagebashin, Happou no Shuriken, etc. In fact, he learns a total of 11 ninpou; however, he must first collect scrolls that provide those abilities before he can use them. Due to sluggish controls, it can be difficult to clear some of the obstacles that he will face without the ninja abilities to enhance his mobility.
References
1986 video games
Hudson Soft games
Japan-exclusive video games
Video games about ninja
Nintendo Entertainment System games
Nintendo Entertainment System-only games
Video games based on anime and manga
Video games developed in Japan
Video games scored by Takeaki Kunimoto
Ninja Hattori-kun |
https://en.wikipedia.org/wiki/Artificial%20Studios | Artificial Studios was a computer game development and engine development company founded in 2001.
Artificial Studios first came to attention with their "Reality Engine", unveiled in 2004, a solution for games using next-generation DirectX9-powered graphics.
This is one of several "next-gen" engines, see Game Engines.
All of the Reality Engine intellectual property was purchased by Epic Games in 2005 and Artificial Studios co-founder and lead engine programmer, Tim Johnson, was also hired by Epic as part of the deal. All development on Reality Engine has ceased and all Reality Engine licensees are encouraged to upgrade to Unreal Engine 3.
In 2006, Artificial Studios released CellFactor: Combat Training, then CellFactor: Revolution, a free downloadable game (of which a demo was released in May 2006) designed to show off the capabilities of the AGEIA PhysX game physics acceleration chipset. The game used Artificial Studio's own 'Reality Engine' technology. The full game was released for free on May 8, 2007, and can be downloaded from a variety of gaming websites.
In 2007, Artificial Studios released Monster Madness: Battle For Suburbia, published by SouthPeak Games for the Xbox 360 and PC as their flagship title. The Monster Madness franchise was continued in 2008, by new developers, with Monster Madness: Grave Danger.
In 2008, Artificial Studios acquired funding for their unannounced title, codename "R6", from publisher Ignition Entertainment. A new studio was established, Ignition Entertainment: Florida, for development of this project. The studio had approximately 70 employees and the title was rumored for a "late 2009" release. The project was cancelled in 2010 and the studio was abruptly closed.
References
External links
Artificial Studios official site
Xbox.com - Monster Madness: Battle for Suburbia
Cell Factor: Revolution
Cell Factor: Combat Training
Companies established in 2001
Video game development companies
Video game companies of the United States |
https://en.wikipedia.org/wiki/Yasmina%20Siadatan | Yasmina Siadatan (born 1981 in Hull, England) is a British businesswoman of British and Iranian descent. She was the winner of the fifth series of the British television show The Apprentice. As the winner, she was offered a job working for businessman Sir Alan Sugar (now Lord Sugar), who presents the show.
Education
Siadatan studied at Kendrick School, Reading.
Yasmina also attended LSE and studied economic history.
Career prior to The Apprentice
After travelling in Provence in 2007 with the help of her brother she set up a restaurant named Myalacarte in Reading, Caversham, which subsequently closed down and a pizza restaurant is now on the site.
The Apprentice
Yasmina entered The Apprentice in 2009 as one of sixteen contestants. She reached the final where she competed against Kate Walsh and was eventually hired as Sir Alan Sugar's apprentice, taking a £100,000 a year job with his company, Amscreen Health Care, where 2008's winner, Lee McQueen worked at the time.
References
External links
BBC Yasmina interview
The Apprentice (British TV series) candidates
The Apprentice (franchise) winners
British people of Iranian descent
Businesspeople from Kingston upon Hull
Living people
1981 births
People educated at Kendrick School |
https://en.wikipedia.org/wiki/LOBSTER | LOBSTER was a European network monitoring system, based on passive monitoring of traffic on the internet. Its functions were to gather traffic information as a basis for improving internet performance, and to detect security incidents.
Objectives
To build an advanced pilot European Internet traffic monitoring infrastructure based on passive network monitoring sensors.
To develop novel performance and security monitoring applications, enabled by the availability of the passive network monitoring infrastructure, and to develop the appropriate data anonymisation tools for prohibiting unauthorised access or tampering of the original traffic data.
History
The project originated from SCAMPI, a European project active in 2004–5, aiming to develop a scalable monitoring platform for the Internet. LOBSTER was funded by the European Commission and ceased in 2007. It fed into "IST 2.3.5 Research Networking testbeds", which aimed to contribute to improving internet infrastructure in Europe.
36 LOBSTER sensors were deployed in nine countries across Europe by several organisations. At any one time the system could monitor traffic across 2.3 million IP addresses. It was claimed that more than 400,000 Internet attacks were detected by LOBSTER.
Passive monitoring
LOBSTER was based on passive network traffic monitoring. Instead of collecting flow-level traffic summaries or actively probing the network, passive network monitoring records all IP packets (both headers and payloads) that flow through the monitored link. This enables passive monitoring methods to record complete information about the actual traffic of the network, which allows for tackling monitoring problems more accurately compared to methods based on flow-level statistics or active monitoring.
The passive monitoring applications running on the sensors were developed on top of MAPI (Monitoring Application Programming Interface), an expressive programming interface for building network monitoring applications, developed in the context of the SCAMPI and LOBSTER projects. MAPI enables application programmers to express complex monitoring needs, choose only the amount of information they are interested in, and therefore balance the monitoring overhead with the amount of the received information. Furthermore, MAPI gives the ability for building remote and distributed passive network monitoring applications that can receive monitoring data from multiple remote monitoring sensors.
Developed applications
The LOBSTER sensors operated by the various organisations monitored the network traffic using different measurement applications. All applications were developed within the LOBSTER project using MAPI, according to the needs of each organisation.
Appmon, an application for Accurate Per-Application Network Traffic Classification.
Stager, a system for aggregating and presenting network statistics.
ABW, an application written on top of LOBSTER DiMAPI (Distributed Monitoring Application Interface) and |
https://en.wikipedia.org/wiki/MiTAP | MiTAP, or Mitre Text and Audio Processing, is a computer system that tries to automatically gather, translate, organize, and present information "for monitoring infectious disease outbreaks and other global events." It is also used in the FBI Investigative Data Warehouse.
Sources
"Multiple information sources in multiple languages are automatically captured, filtered, translated, summarized, and categorized"
It uses 'web sources, electronic mailing lists, newsgroups, news feeds, and audio-video data.'. The audio-video is automatically transcribed into text by the ViTAP system.
Guts
In 2002 it was reported to have used CyberTrans, the Alembic natural language analyzer, WebSumm summarizer, Lucene indexing, NewsBlaster from Columbia, Brill tagging, SOAP, HTML, NNTP, Perl, Unix scripts, and other tools. Upgrades to various components are planned.
Creators
It was created at the Mitre Corporation by Damianos and a team of other researchers, with public release in 2001.
Users
It is being used by the FBI as part of their Investigative Data Warehouse via DARPA's TIDES program. According to 2004 FBI email, MiTAP was running at San Diego State University, collecting only English language website news. It mentioned a plan to have FBI run its own version of MiTAP.
It has also been used by people in the White House, the Department of Homeland Security, the Pentagon, the American Red Cross, the United Nations, and the European Disaster Center
Notes
Bibliography
(Contains various emails from inside the FBI regarding the IDW)
Mitre Corporation |
https://en.wikipedia.org/wiki/Robert%20Frigault | Robert Frigault (born 1971) is a Canadian cyber-activist, publisher/writer and entrepreneur who was active against Bennett Environmental Inc.'s plans to operate a soil incinerator designed to treat soils contaminated with PCBs, PCPs, pesticides and chlorinated organic compounds. In 2004, Frigault created the web portal stopbennett.com to help concerned residents of Northern New Brunswick stop the company from operating its incinerator in Belledune, located in the Baie des Chaleurs region of the province. The portal garnered over 10,000 signatures for a petition that was delivered to Bernard Lord, former Premier of New Brunswick.
Frigault was born in Bathurst, New Brunswick. After spending most of his career as a marketer of both enterprise software and travel products in Toronto, Montreal and Boston, Frigault returned to Bathurst in 2007 to serve as President of NU Exchange, Inc., and to pursue his dream of establishing an edible forest garden based on the pioneering work of Robert Hart in the UK. The edible forest is located at Stonefly Acres, a private property outside of the city of Bathurst.
In March 2009, Frigault co-founded nthWORD, an online arts & culture magazine.
References
Internet activists
Canadian activists
People from Bathurst, New Brunswick
Living people
1971 births |
https://en.wikipedia.org/wiki/Theodore%20Wilbur%20Anderson | Theodore Wilbur Anderson (June 5, 1918 – September 17, 2016) was an American mathematician and statistician who specialized in the analysis of multivariate data.
He was born in Minneapolis, Minnesota. He was on the faculty of Columbia University from 1946 until moving to Stanford University in 1967, becoming Emeritus Professor in 1988. He served as Editor of Annals of Mathematical Statistics from 1950 to 1952. He was elected President of the Institute of Mathematical Statistics in 1962.
Anderson's 1958 textbook, An Introduction to Multivariate Analysis, educated a generation of theorists and applied statisticians; Anderson's book emphasizes hypothesis testing via likelihood ratio tests and the properties of power functions: Admissibility, unbiasedness and monotonicity.
Anderson is also known for Anderson–Darling test of whether there is evidence that a given sample of data did not arise from a given probability distribution.
He also framed the Anderson–Bahadur algorithm along with Raghu Raj Bahadur, which is used in statistics and engineering for solving binary classification problems when the underlying data have multivariate normal distributions with different covariance matrices.
Awards and honors
He was awarded a Guggenheim Fellowship in 1946.
In 1949 he was elected a Fellow of the American Statistical Association.
He was elected a Fellow of the American Academy of Arts and Sciences in 1974.
He was a member of the Norwegian Academy of Science and Letters.
Anderson died in September 2016 at the age of 98 in Stanford, California after experiencing heart problems.
Selected bibliography
Books
Chapters in books
References
External links
1918 births
2016 deaths
Scientists from Minneapolis
Columbia University faculty
Stanford University Department of Statistics faculty
Stanford University Department of Economics faculty
Fellows of the American Academy of Arts and Sciences
Fellows of the American Statistical Association
Fellows of the Econometric Society
Members of the Norwegian Academy of Science and Letters
Presidents of the Institute of Mathematical Statistics
Members of the United States National Academy of Sciences
Economists from Minnesota
Mathematical statisticians |
https://en.wikipedia.org/wiki/Daniel%20Slotnick | Daniel Leonid Slotnick (1931–1985) was an American mathematician and computer architect. Slotnick, in papers published with John Cocke in 1958, discussed the use of parallelism in numerical calculations for the first time. He later served as the chief architect of the ILLIAC IV supercomputer. He was the principal investigator on a DARPA contract in the early 1970s that produced the ILLIAC IV and the ARPANET. It was a fairly large operation, with its own building on the UIUC campus, originally called the Center for Advanced Computation but which is now the Astronomy Building. ILLIAC IV was constructed by Burroughs Corporation, using some special chips made by Fairchild Semiconductor. Because of campus unrest due to the Vietnam war, and the Mansfield amendments the ILLIAC IV was completed and installed at Ames Research Center instead of UIUC, and Slotnick's Darpa contract was not renewed. In 1985, when IDA and NSA formed their supercomputing research facility in the DC area, Slotnick's widow donated his library to them. In 1987 the first issue of The Journal of Supercomputing contained a tribute to Slotnick.
ARPANET
Most of the development of the ARPANET took place at MIT's Lincoln Labs and BBN Technologies. However it was planned that ILLIAC IV would be on the network, and some work was funded by Slotnick's DARPA contract. For example, a standard character set was established, and also the Purdy Polynomial, a secure hash function to protect passwords on ARPANET. Ironically, when the ILLIAC IV project was moved to Ames Research Center, the computer could only be accessed by telephone.
Awards
He was awarded the AFIPS Prize in 1962 and was elected an IEEE Fellow in 1976.
References
1931 births
1985 deaths
20th-century American mathematicians
Burroughs Corporation people
Computer architects
Researchers in distributed computing
Fellow Members of the IEEE |
https://en.wikipedia.org/wiki/Cybermethodology | Cybermethodology is a newly emergent field that focuses on the creative development and use of computational and technological research methodologies for the analysis of next-generation data sources such as the Internet. The first formal academic program in Cybermethodology is being developed by the University of California, Los Angeles.
Background
Cybermethodology is an outgrowth of two relatively new academic fields. The first is technology and society. This field focuses on the impact of research and innovation on society, and related policy issues. Many universities, including Berkeley, Cornell, MIT and Stanford offer degrees and/or programs of study in this and related fields. A great strength of technology and society studies is that it exists at the intersection of the natural and social sciences, engineering, and public policy.
The second field closely integrated with cybermethodology is Internet studies. This recently developed field has generated programs at several universities including Minnesota, Washington, Brandeis, and Georgetown. Internet studies involves the study of the fundamental workings of the Internet as well as learning about entities and issues such as Internet security, on-line communities and gaming, Internet culture, and intellectual property.
Nature
Cybermethodology is the component of internet and technology studies that is specifically concerned with the use of innovative technology-based methods of analysis, new sources of data, and conceptualizations in order to gain a better understanding of human behavior. It is characterized by the use, as primary data sources, of emergent entities such as virtual worlds, blogs, texting, on-line gaming (mmorpgs), social networking sites, video sharing, wikis, search engines, and numerous other innovative tools and activities available on the web.
Major components of cybermethodology include:
Basic Cyber-Literacy, a core knowledge of information technology and Internet tools such as statistical and analytic software, electronic library resources, digital devices, and use of the Internet as a source of data.
The Research Life Cycle, knowledge of the data lifecycle from acquisition and input to archiving and accessibility.
Non-Linear Technologies, including hyperlinks, dynamics surveys, and technological methods such as neuroimaging.
Programming Concepts, including the ability to create new interactive research tools.
Analytical Methods and their relationship to different types of data: non-linear, qualitative, spatial, time-variant processes, and agent-based information such as rules of social interaction and agent mental representations.
Modes of Interaction extending beyond person-to-person interviews, on-site fieldwork, and anonymous surveys to contemporary environments such as online and virtual communities and interaction through games and virtual environments.
Research Presentation including the use of new media techniques, issues raised by intended or |
https://en.wikipedia.org/wiki/Composite%20index | Composite index may refer to:
Composite (finance), in finance
Composite index (database), an index involving multiple columns |
https://en.wikipedia.org/wiki/Decline%20of%20newspapers | The decline of newspapers is an example and means of which to understand and observe the changing values of a culture. Whether newspapers are declining in popularity is region dependent. Data supports that in the U.S and Europe popularity and sales are wavering. In these regions, industry is facing slumping ad sales, the loss of much classified advertising, and precipitous drops in circulation. The U.S. saw the loss of an average of two newspapers per week between late 2019 and May 2022, leaving an estimated 70 million people in places that are already news deserts and areas that are in high risk of becoming so. Prior to that steep decline, newspapers' weekday circulation had fallen 7% and Sunday circulation 4% in the United States, their greatest declines since 2010. If the trend continues, a third of newspapers will be lost by 2025, according to a 2022 study published by Northwestern University.
To survive, newspapers are considering combining and other options, although the outcome of such partnerships has been criticized. Despite these problems, newspaper companies with significant brand value and which have published their work online have had a significant rise in viewership. The decline of newspapers has various adverse consequences, in particular at the local level. Research has linked closures of newspapers to declines in civic engagement of citizens, increases in government waste, and increases in political polarization. The decline of local news has also been linked to the increased nationalization of local elections.
Causes for decline
The newspaper industry has always been cyclical, and the industry has weathered previous troughs. Television's arrival in the 1950s began the decline of newspapers as most people's source of daily news. But the explosion of the Internet in the 1990s increased the range of media choices available to the average reader while further cutting into newspapers' dominance as the source of news. Television and the Internet both bring news to the consumer faster and in a more visual style than newspapers, which are constrained by their physical format and their physical manufacturing and distribution. Competing mediums also offer advertisers moving images and sound. And the Internet search function allows advertisers to tailor their pitch to readers who have revealed what they are seeking—an enormous advantage.
The Internet has also gone a step further than television in eroding the advertising income of newspapers, as — unlike broadcast media — it proves a convenient vehicle for classified advertising, particularly in categories such as jobs, vehicles, and real estate. Free services like Craigslist have decimated the classified advertising departments of newspapers, some of which depended on classifieds for 70% of their ad revenue. Research has shown that Craigslist cost the newspaper industry $5.4 billion from 2000 to 2007, and that changes on the classified side of newspaper business led to an increase in |
https://en.wikipedia.org/wiki/Effect%20Radio | Effect Radio is a network of radio stations airing a Christian Rock format. The network is owned by The River Christian Fellowship, formerly Calvary Chapel of Twin Falls, Idaho. It's a sister network to the more widely distributed CSN International. Current Effect Radio DJ's and Radio Personalities are AJ Kestler & Ryan D Downs.
Stations
Effect Radio has 63 stations. The network's flagship station is KEFX in Twin Falls, Idaho.
Full Powered Stations
Notes:
Low Powered Translators
In addition to its full powered stations, Effect Radio is relayed by an additional 55 translators.
References
External links
Effect Radio website
1996 establishments in Idaho
American radio networks
Christian radio stations in the United States
Radio stations established in 1996 |
https://en.wikipedia.org/wiki/The%20Mr.%20Potato%20Head%20Show | The Mr. Potato Head Show is an American children's television series loosely based on the toyline of the same name by American toy company Hasbro. It aired on Fox as part of its Fox Kids programming block from September 12, 1998, to February 16, 1999.
Production
The Mr. Potato Head Show was developed by Dan Clark and Doug Langdale. The puppet characters were created by The Chiodo Brothers. Mark Bryan Wilson served as the show's puppet master while William Traetta served as the show's assistant puppet master.
The series was considered lost for many years until Lost Media Wiki members Paroos and Luray found all the episodes of the series online. As of December 18, 2016, the series has resurfaced.
Premise
Throughout the series, Mr. Potato Head always puts on a TV episode with the help of his Kitchen Crew and presents each episode to the TV Guys so that they can air them on television. During production on each episode, Mr. Potato Head and his Kitchen Crew have various misadventures.
Characters
Kitchen Crew
Mr. Potato Head (performed by Kevin Carlson) – The main protagonist of the series. He is an anthropomorphic potato who serves as the leader of the Kitchen Crew where they make different shows in his studio for the TV Guys. He's often referred to as “P.H.” by his friends and colleagues throughout the show.
Baloney (performed by Greg Ballora) – An anthropomorphic stack of baloney who is Mr. Potato Head's best friend. He often serves as the voice of reason for the Kitchen Crew on some occasions and is also Mr. Potato Head's personal assistant.
Queenie Sweet Potato (performed by Debra Wilson) – An anthropomorphic sweet potato who serves as the Kitchen Crew's diva. She's gifted with an amazing voice and is viewed by most of the crew, especially by Mr. Potato Head, as the most talented performer in the bunch. Queenie's love for sugar cream pies and her crush on Leonardo DiCaprio are both brought up numerous times throughout the series.
Potato Bug (performed by Julianne Buescher) – A female potato bug. Potato Bug is largely considered to be the oddball of the Kitchen Crew, stemming from her wacky personality and various quirks (i.e. believing that goblins deliver the newspaper every morning; mistaking the term “scapegoat” for an actual animal; talking to shoes like they're people; having a fascination for the undersides of tables, etc.). While being portrayed as somewhat oblivious, Potato Bug is energetic, kind, fiercely loyal to her friends, and unabashedly herself.
Canny (performed by James Murray) – A dog made out of dog food cans and Mr Potato Head's pet. In "Not With a Bang" Part 1, it is revealed that Canny used to work as a University Physics Professor.
Johnny Rotten Apple (performed by James Murray) – An anthropomorphic rotten apple who serves as the Kitchen Crew's residential musician with a rock star personality. In most of his appearances, he would sing about a random character or other things, like cheese or cultural diversity. Joh |
https://en.wikipedia.org/wiki/BELNET | Belnet (the Belgian National research and education network) is a Belgian internet provider for educational institutions, research centres, scientific institutes and government services. Since 1993, BELNET provides web services to higher education, federal departments and ministries, and international organisations.
Since 2001, Belnet provides IPv6 connectivity and multicast access to its customers.
One of Belnet's FTP servers is a mirror for holding several files related to the FOSS and GNU communities, as well as Linux distros such as Ubuntu, Debian, Gentoo, and Fedora.
Since 2004, Belnet is the operator of BEgrid, the Belgian research grid infrastructure, and since 2009 it is also the operator of the BEgrid Portal (based on P-GRADE Portal technology).
On 4 and 5 May 2021, Belnet was subject to a massive DDOS attack that disrupted the accessibility of websites using the .be domain, including those of the Belgian government, parliament, police, educational and research institutions, health care, and public broadcasters, forcing the postponement of parliamentary hearings relating to the Uyghur genocide.
References
External links
Cisco et BELNET accélèrent le trafic Internet belge
BELNET développe les services de protection informatique
Gridguide : BELNET
BEGrid
BEmads
P-GRADE Portal
Internet in Belgium
Internet mirror services
Internet service providers of Belgium
National research and education networks |
https://en.wikipedia.org/wiki/Hilltop%2C%20Denver | Hilltop is a neighborhood of Denver, Colorado. According to the Piton Foundation's summary of United States Census data, the 2016 population of the neighborhood was 9,311, average household income was $215,780, and there were 3,973 housing units.
Boundaries
The City of Denver-defined neighborhood of Hilltop is bordered on the west by Colorado Boulevard, on the north by 6th Avenue, and on the south by Alameda Avenue. The eastern boundary is irregular, extending to Quebec Street at the north end, and encompassing properties on both sides of Monaco Parkway at the south end.
Landmarks
The Hilltop neighborhood gets it name from the fact that it is higher in elevation than the surrounding parts of the city. In the center of the neighborhood is Cranmer Park, with a view of the Front Range mountains. The Graland Country Day School, an independent, co-educational day school for grades K-9 is located in the neighborhood, as is Temple Emanuel, Carson Elementary, Steck Elementary and Hill Campus of Arts and Sciences.
Character
Hilltop is one of Denver's wealthiest neighborhoods. It was developed in the 1940s and 1950s, and since the 1990s, many of the original houses have being demolished and replaced with large houses on medium-sized lots.
References
Neighborhoods in Denver |
https://en.wikipedia.org/wiki/Goodwin%20University | Goodwin University is a nonprofit private university in East Hartford, Connecticut.
History
Goodwin University began as Data Institute Business School in 1962. In 2004, the college gained non-profit status and was granted accreditation by the New England Association of Schools and Colleges (NEASC). In 2008, the Connecticut Board of Governors for Higher Education authorized the institution to offer baccalaureate programs.
In 2005, Goodwin University initiated a major project to construct a new campus along the Connecticut River in East Hartford. The college had purchased riverfront property that was home to a defunct oil terminal, and took steps to redevelop the site in partnership with state and federal environmental agencies and the Connecticut Development Authority (CDA). The site had been designated as a brown field, or contaminated area, by the Environmental Protection Agency, and the college removed 30 large oil storage tanks and conducted soil remediation with the help of state and federal funding.
In January 2021, it was announced that Goodwin University would be taking over the University of Bridgeport in Bridgeport, Connecticut, and operating it as a subsidiary, although UB would retain its own name and brand.
Accreditation
Goodwin University is accredited by the New England Commission of Higher Education (NECHE). Programs accredited by specific accreditors include:
The Dental Hygiene program is accredited by the Commission on Dental Accreditation.
The Early Childhood Education program is accredited by the National Association for the Education of Young Children (NAEYC).
The Funeral Service Associate Degree Program is accredited by the American Board of Funeral Service Education (ABFSE).
The certificate program in medical assisting is accredited by the Commission on Accreditation of Allied Health Education Programs (CAAHEP).
The Associate in Science degree in nursing is accredited by the Accreditation Commission for Education in Nursing (ACEN).
The baccalaureate degree program in nursing (RN-to-BSN and ABSN) is accredited by the Commission on Collegiate Nursing Education (CCNE).
The Occupational Therapy Assistant Program is accredited by the Accreditation Council for Occupational Therapy Education (ACOTE).
The Respiratory Care Associate in Science program ais accredited by the Commission on Accreditation for Respiratory Care (CoARC) .
The Vision Care Technology program is accredited by the Commission on Opticianry Accreditation
Magnet schools
The Goodwin University campus is home to three magnet schools: Connecticut River Academy, an early college and sustainability themed magnet high school; Riverside Magnet School, a Reggio Emilia-themed magnet elementary school; and Pathways Academy of Design and Technology, a design and technology themed magnet high school.
References
External links
Official website
1999 establishments in Connecticut
Buildings and structures in East Hartford, Connecticut
Educational institutions |
https://en.wikipedia.org/wiki/Musono | Musono is a town in the Haut-Lomami province of the Democratic Republic of the Congo.
Transport
It is served by a station on a branchline of the Inland network of the national railway system. It was also involved in a nearly international scandal due to the spread of chlamydia.
See also
Railway stations in DRCongo
References
Populated places in Haut-Lomami |
https://en.wikipedia.org/wiki/IRAP%20RMS%20Suite | Roxar RMS is a reservoir characterization and modeling software suite. It is primarily designed for use in the oil and gas industry, helping engineers gather data from a wide variety of sources to efficiently build reliable reservoirs.
History
1987 - Geomatic begins distribution of the first version of the IRAP software.
1994 - IRAP becomes IRAP RMS, the industry’s first 3D modelling package.
1995 - Smedvig Technologies, later known as Roxar AS, acquires Geomatic AS and ODIN Reservoir Software. Smedvig’s analysis and processing software, ResView, ODIN's tool for stochastic reservoir modelling, STORM, and Geomatic's IRAP reservoir modelling software merge into IRAP RMS, later renamed to Roxar RMS.
2009 - Roxar is acquired by Emerson, St.Louis USA and becomes part of a USD 28 billion company.
Versions
RMS 6
In RMS 6.0, STORM’s stochastic modelling was merged with structure and fault modelling capabilities. Also introduced was the 'Workflow Manager' tool, which allows users to build and update reservoir models quickly.
RMS 7
RMS 7.0 was the first RMS version to have native Windows compatibility.
New modules in RMS 7
RMS 8
RMS 8.0 was released in November 2006.
RMS 9
RMS 9.0 was released on 17 October 2007.
RMS 2009
RMS 2009, released on 4 February 2009, had a new user interface. Other key features of the release included improved structural modelling, data import and a new local model update module. It also introduced real-time well monitoring.
RMS 2010
RMS 2010 was released in February 2010. RMS 2010 included major improvements across the entire workflow, with a wide-ranging makeover of the well correlation tools, new model building and property modelling tools and improved 3D gridding and better communication with external simulators.
RMS 2011
RMS 2011 was released in May 2011. RMS 2011 included more new features than any previous RMS version and provided modellers with enhancements to the seismic architecture to allow direct reference between the reservoir models and the 3D and 4D seismic data that the interpretation and modelling is based on. Key highlights of RMS 2011 included new tools to model complex geologies and incorporate 4D seismic into the workflow; geological well correlation improvements; new fracture modelling capabilities; and usability and integration features that made RMS 2011 even more accessible and easy to use, while at the same time realistically modelling some of the world’s most complex geologies.
RMS 2012
RMS 2012 was released in March 2012 and came with new seismic inversion, seismic attributes, and field planning capabilities to help operators generate more accurate and realistic reservoir models and increase recovery rates. It was the last RMS version to support both 32-bit and 64-bit platforms.
RMS 2013
RMS 2013 was released on 26 November 2013 for 64-bit Windows and Linux platforms. It came with model driven interpretation capabilities and new solutions for seismic interpretation, tightly linked to geolo |
https://en.wikipedia.org/wiki/KCRN%20%28AM%29 | KCRN (1120 kHz) is an AM radio station licensed to Limon, Colorado, and serving East Central Colorado. The station is owned by Catholic Radio Network, Inc. It airs a Catholic radio format, mostly carrying talk and teaching programs from the EWTN Radio Network. Programming is simulcast on KRCN in Longmont, Colorado, serving the Denver metropolitan area.
By day, KCRN broadcasts at 50,000 watts, the maximum power for most AM radio stations in the U.S. The high power and directional antenna allow KCRN to be heard in Denver and Colorado Springs. Because AM 1120 is a clear channel frequency reserved for Class A KMOX in St. Louis, KCRN must leave the air at night when radio signals travel farther.
The transmitter is on Route 86 in Simla, about 25 miles west of Limon. KCRN is also heard on 250-watt FM translator station K272FP at 102.3 MHz in Black Forest, Colorado, serving Colorado Springs.
History
The station signed on the air on May 4, 1984. Because it was in Limon, Colorado, the owners chose the call sign KLIM. It was owned by the Robad Broadcasting Company, airing a country music format, with news from AP Radio. For its first three decades, it was powered at just 250 watts, heard only in Limon and adjacent communities.
The station had financial problems in the 1990s. Roger L. Hoppe II was named the receiver in 1996, buying KLIM for only $8,000. In the early 2000s, the station was dark for some time.
On April 13, 2016, KLIM was granted a Federal Communications Commission construction permit to move to a new transmitter site, increase the daytime power to 50,000 watts and add critical hours service with 3,000 watts. The day and critical hours transmitter sites would be different. On March 10, 2017, an application was filed to modify the construction permit. The 50 kW transmitter site was changed and there would be no critical hours service.
The application was accepted for filing on March 24, 2017.
KLIM was acquired by the Catholic Radio Network in 2018, changing the call letters to KCRN to match the organization's initials. The new 50,000-watt transmitter went on the air, with an FM translator at 102.5 in Black Forest, Colorado, giving KCRN coverage in the growing Colorado Springs radio market.
References
External links
Catholic radio stations
CRN (AM)
Radio stations established in 1984
1984 establishments in Colorado
CRN (AM) |
https://en.wikipedia.org/wiki/Pavan%20Duggal | Pavan Duggal is an advocate practising in the Supreme Court of India, specializing in the field of Cyberlaw, Cybercrime Law, Cybersecurity Law, and Artificial Intelligence Law. He is a member of NomCom Committee on Multilingual Internet Names Consortium (MINC).
He is the President of Cyberlaws.Net. He has worked in mobile law, convergence law and dark net law. He is the president of Cyberlaw Asia.
Duggal is the Conference Director of the International Conference on Cyberlaw, Cybercrime & Cybersecurity organized by Cyberlaws.Net.
Duggal is the Chairman of the International Commission on Cyber Security Law.
Committees
He has been a member of number of committees:
Member of the Permanent Monitoring Panel on "The Future of Cyber Security" of the World Federation of Scientists, an organization active in the framework of ICSC – International Centre for Scientific Culture - World Laboratory.
Permanent Monitoring Panel (PMP) on Information Security, established by World Federation of Scientists
The ICANN Nominating Committee representing the Asia Pacific region, 2003 and 2004.
Membership Advisory Committee of The Internet Corporation for Assigned Names and Numbers (ICANN).
Advisory Council of the Institute of Cyber Security and Law of University of Delhi
Chairman, Confederation of Indian Industry Delhi Panel on Cyber Security
Duggal has been contributing to the evolving legal jurisprudence on Artificial Intelligence, through his books on artificial intelligence and also through his course on Artificial Intelligence legalities.
He has contributed to academic discussions and debate evolving Artificial Intelligence jurisprudence. He has broadly highlighted the importance of Artificial Intelligence in the context of judicial systems. He commented:
Role in Evolving Metaverse Law
Duggal is the Chief Evangelist of Metaverse Law Nucleus.
Books and recognition
He has written several books/eBooks on various diverse and complex aspects concerning the legalities of policy related issues impacting cyberspace, Internet and the World Wide Web. He has authored India's first mobile law treatise, which focuses on litigation and jurisprudence vis-à-vis mobile communication devices.
As per the International Telecommunications Union, as a Writer, he has made his mark with 179 Books on various aspects of the law in the last 20 years. Dr. Pavan Duggal’s books have been conferred various awards by Book Authority in various categories over a couple of years.
He has authored 179 books on the intersection of law and technology over the last two and a half decades. The vast and diverse range of Pavan Duggal’s books include Books on Cyber Law, Cybercrime Law, Cyber Security Law, Artificial Intelligence Law, Blockchain Law, Internet of Things Law, Other Emerging Technologies and Legalities and on Coronavirus & Cyber Legal Issues.
The World Summit on the Information Society gives details of numerous books authored by Dr. Pavan Duggal on the website of t |
https://en.wikipedia.org/wiki/Freight%20route%20utilisation%20strategy | The Freight Route Utilisation Strategy is a Route Utilisation Strategy in the United Kingdom, published by Network Rail in March 2007. It is one of only two (the Network RUS is the other) which have the perspective of the network as whole. It was included in a map published by the Office of Rail Regulation (ORR) as established in May 2007. As with other RUSs, the Freight RUS took into account a number of responses to a Draft for Consultation, including those from the ORR.
To quote the foreword:
The study recommended a number of approaches and enhancements to the network. Like other strategies in this series, recommendations are divided into short-term (Control Period 3, CP3, to March 2009), medium-term (CP4, to March 2014), and long-term (CP5, thereafter).
A notable recommendation is the enhancement of the loading gauge from Southampton and the East Anglia coast ports to the West Coast Main Line (WCML), as most growth was expected in the carriage of deep-sea containers and coal for the electricity-generating industry, mainly for the Trent valley and Aire valley power stations. Much coal is imported via the east coast ports.
A key issue is the loading gauge of routes for freight in sea-going (9' 6" in height, 2500 mm in width) containers. Such loads are accommodated on routes cleared to W10 on standard wagons. W12 is only slightly wider than W10, and the Freight RUS recommended that where structures are renewed the starting assumption should be that they are cleared to W12.
Unlike passenger services, which over the course of a day tend to have comparable flows in both directions, freight movements are unidirectional. Even though rolling stock usually needs to return to the original departure point, this may be via a different route, and constraints arising from fully loaded trains and steep gradients may disappear for returning empty trains.
Recommendations by route
West Coast Main Line (WCML)
Short term: Freight operators' requirements to be included in the December 2008 recasting of the WCML timetable; some services to be rerouted away from Stafford, via Macclesfield; new loop at Hartford, Cheshire.
Medium term: Electric haulage of some new freight traffic between Crewe/Warrington and Carlisle/Glasgow; diversion of some services via the Settle and Carlisle route; W10 and extra capacity between Peterborough and Nuneaton to provide five additional paths from Felixstowe to Nuneaton, avoiding the southern part of the WCML.
Long term: Infrastructure to allow the lengthening of container trains serving the Haven ports (see below) from 24 to 30 waggons; major enhancements in the Stafford area and to the Felixstowe to Nuneaton route (the latter to allow more capacity, to avoid the southern WCML).
Anglo-Scottish coal route
This route is from the Ayrshire coast and open-cast mines to the Aire and Trent valley power stations. Recommendations are mainly short term, involving redoubling of the Annan-Gretna route and speeding up the junction with |
https://en.wikipedia.org/wiki/Jack%20Cole%20%28scientist%29 | Alfred Jack Cole (1925 – May 30, 1997) was a professor at the School of Computer Science, University of St. Andrews in Scotland. He is credited with building on the establishing of Computer Science at St Andrews.
Career
Cole studied mathematics at University College London, completing his PhD on the theory of numbers in 1952. He then worked as a lecturer at Heriot-Watt College in Edinburgh until 1956, when he moved to Queen’s College, Dundee. His interest in the potential of computer technology resulted in a move to University of Leicester in 1962, as Director of the Computing Laboratory. In 1965 he returned to Scotland and St Andrews, as Director of the Computing Laboratory and Reader in Computational Science.
From 1965 Cole devoted his next twenty years to establishing computer science at St Andrews. His innovative approach included pioneering the teaching of Information Technology to Arts students. He developed techniques for space-filling curves to be used in video compression, leading to his invention of murray polygons. One applied use of murray polygons is the halftoning of rectangular images without using dithering or edge enhancement methods.
He initiated the Distinguished Lecture Series in 1969. This series kept costs lower than similar conferences, with the intention of exposing students and others to leading edge topics. Costs were reduced through industry sponsorship and support from the university's School of Computer Science.
Jack Cole Building
To recognize his service, the school moved to the new Jack Cole Building in 2004. This was formally opened on .
Personal life
Cole's interests included cats, hill walking, home brewing, folk music (and concertina playing), golf, gardening and football. He was a supporter of East Fife F.C.
Published works
"The preparation of examination time-tables using a small-store computer", 1964
"Plane and Stereographic Projections of Convex Polyhedra from Minimal Information", 1966
"A note on peano polygons and gray codes", 1985
"Direct transformations between sets of integers and hilbert polygons", 1986
"Compaction Techniques for Raster Scan Graphics using Space-filling Curves", 1987
References
Alumni of University College London
Academics of the University of St Andrews
1997 deaths
1925 births |
https://en.wikipedia.org/wiki/Monster%20Kingdom%3A%20Jewel%20Summoner | Monster Kingdom: Jewel Summoner is a turn-based role-playing video game developed by Gaia and published by Sony Computer Entertainment and Atlus for the PlayStation Portable console. The game was released in February 2006 in Japan and in February 2007 in North America.
The game takes place in a world where monsters and human beings once lived in harmony. The monsters were hunted and many of them were eventually imprisoned in devices called "jewels". Once trapped in a jewel, a monster becomes tame and servile to the owner of the jewel, allowing human warriors, called Jewel Summoners, to use them in combat against other monsters. The story of Jewel Summoner revolves around the quest for vengeance of one such warrior, Vice, whose mother died at the hands of a monster.
Jewel Summoner received mixed reviews from the gaming press. Its monster-collection theme and turn-based gameplay was often compared to Nintendo's Pokémon series. The game's audio and voice acting were praised, but its story and gameplay were criticized as uninspired and monotonous.
Gameplay
Jewel Summoner takes place in a third-person perspective with a top-down view. The player character's avatar moves around a static world map and can enter 3D dungeons. Inside dungeons, the player's movement will activate random battles against wild monsters; battles are represented in a split-screen format. Dungeons also contain save points that can be used to restore the health of the party. The player can have a party of up to three characters, and each member has a maximum of three monsters that can be summoned from storage receptacles, called jewels, to fight against enemies. Battles are turn-based and each monster has access to several attacks that it can execute each turn. Monsters do not have individual health bars; their controlling character's health is used instead. Enemy monsters can be recruited by weakening them in battle and then capturing them within a jewel.
There are over 100 different types of monster in the game, and each possesses traits in the forms of "elements" that dictate its strengths and weaknesses. The element system is similar to a game of "rock-paper-scissors"; for instance, water-elemental monsters have an advantage over fire-based monsters, and fire-based monsters have an advantage over ice-based ones. A monster can only be captured within a jewel that represents the same element. Monsters earn experience in battle and subsequently level up, learn new abilities, and evolve into different creatures. Jewel Summoners can also influence their monsters' growth by fusing them with specially refined items and pieces of quartz, or by increasing their stats with "Ability Points" earned in battle.
In combat, each Jewel Summoner can bring out one monster at a time. Every turn, each monster (both enemy and ally) can activate one attack or elemental ability. Each monster initially has four slots available for abilities. Monsters can quickly learn abilitie |
https://en.wikipedia.org/wiki/Compendium%20%28software%29 | Compendium is a computer program and social science tool that facilitates the mapping and management of ideas and arguments. The software provides a visual environment that allows people to structure and record collaboration as they discuss and work through wicked problems.
The software was released by the not-for-profit Compendium Institute. The current version operationalises the issue-based information system (IBIS), an argumentation mapping structure first developed by Horst Rittel in the 1970s. Compendium adds hypertext functionality and database interoperability to the issue-based notation derived from IBIS.
Compendium source code was fully released under the GNU Lesser General Public License on 13 January 2009. Compendium can still be downloaded, but is no longer actively maintained.
Applications
Compendium visually represents thoughts and illustrates the various interconnections between different issues, questions, ideas, answers, and arguments. It can be used for applications as varied as: issue mapping in meetings, design rationales and requirements analysis, meeting management (agendas and minutes), action item and issue tracking, requirements management, classification, management templates, and reference databases (such as personal knowledge bases).
The creation of issue maps graphically represents the relations between issues and ideas, and facilitates the understanding of interconnected topics through diagrammatic representation.
The software can be used by a group of people in a collaborative manner to convey ideas to each other using visual diagrams. A group facilitation method called dialogue mapping is especially suited for use with Compendium.
Compendium templates for critical thinking can be used to create argument maps using the argumentation schemes developed by argumentation theory scholars such as Douglas N. Walton, Chris Reed, and Fabrizio Macagno. Argumentation schemes are pre-defined patterns of reasoning for analysing and constructing arguments; each scheme is accompanied by a list of critical questions that can be used to evaluate whether a particular argument is good or fallacious. By using these argumentation schemes, users of Compendium can examine claims in more detail to uncover their implicit logical substructure and improve the rigor and depth of discussions.
Features
Ideas are represented as icons called nodes. There are ten types of node: question, answer, list view, map view, pro, con, note, decision, reference, argument. There are three types of relationship between nodes: associative, transclusive, categorical. Images can be placed directly into a view, assigned to a node, or assigned to the background picture. Features of Compendium include:
Drag and drop documents and websites onto a map
Complete freedom to arrange icons
Keyword tagging
Map and label the connections between concepts to illustrate links
Create dialogue maps to display links between everyone's ideas in group projects
Creat |
https://en.wikipedia.org/wiki/ParAccel | ParAccel, Inc. was a California-based software company.
It provided a database management system designed to provide advanced analytics for business intelligence. ParAccel was acquired by Actian in April 2013.
History
ParAccel was a venture-backed company focused on developing software for data analysis.
It acquired some intellectual property from the company XPrime, which ended operations in 2005.
It was officially incorporated in February 2006, founded by Barry Zane who became chief technology officer, Tom Clancey as interim-CEO, and was first funded by angel investors.
In August 2006 the first series of venture capital came from Mohr Davidow Ventures, Bay Partners and Tao Venture Partners.
In 2007 the company was based in San Diego, California, with an office in Ann Arbor, Michigan. David J. Ehrlich was chief executive, and Bruce Scott, vice president of engineering.
In November 2007, a second round of $20 million included previous investors and was led by Walden Ventures.
In December the company opened an office in Cupertino, California (part of Silicon Valley).
A third round of $22 million in June 2009 was led by Menlo Ventures. In January 2010 Mark Lockareff replaced Ehrlich as interim chief executive.
In March 2010 the Wall Street Journal listed ParAccel in a list of 50 top venture backed companies.
A result from the TPC-H benchmark from the Transaction Processing Performance Council in April 2010 had record performance at 1 TB data size using VMware. Charles W. Berger was appointed chairman and CEO in September 2010.
By early 2011 many of its competitors had been acquired.
During its July 2011 funding round, existing investors were led by Amazon.com.
In December 2012, the Amazon Redshift database service was announced (and generally available in early 2013) using ParAccel technology.
ParAccel was based in California with offices in Campbell and San Diego.
Competitors included Greenplum (from Pivotal), EXASOL, Vertica (from Hewlett-Packard), Netezza (from IBM), Oracle Corporation, and Teradata (including its Aster Data Systems technology).
ParAccel was acquired by Actian in April 2013.
Berger left at that time to become CEO of Extreme Networks.
Products
In 2006 ParAccel offered two different products: Amigo and Maverick. Amigo was designed to accelerate queries directed at an existing data warehouse while leaving the data warehouse as the database of record. In contrast Maverick was designed as a stand-alone data store.
ParAccel discontinued Amigo in favor of the stand-alone offering which evolved into the ParAccel Analytic Database (PADB).
The ParAccel Analytic Database was a parallel relational database system using a shared-nothing architecture with a columnar orientation, adaptive compression, memory-centric design.
ParAccel's DBMS engine is built for analytics, initially based on PostgreSQL. ParAccel began phasing in a new optimizer (Omne) in release 2.0 and made significant changes to Omne in subsequent releases (3.1 re |
https://en.wikipedia.org/wiki/IODE | IODE may refer to:
Imperial Order Daughters of the Empire, a Canadian women's organization
International Oceanographic Data and Information Exchange, a worldwide network that operates under the auspices of the Intergovernmental Oceanographic Commission
See also
iodéOS, an Android operating system |
https://en.wikipedia.org/wiki/Joe%20the%20Plumber%20database%20search%20controversy | Controversial Ohio database searches of Joe Wurzelbacher occurred during the last few weeks of the 2008 US Presidential election campaign, when Ohio Department of Job and Family Services (ODJFS) employees, and Ohio officials, became embroiled in a controversy over searches of Joe Wurzelbacher's government records after he came to national attention as "Joe the Plumber." The matter led to substantial news media attention during the presidential campaign, a new law being signed in Ohio, and a federal civil rights lawsuit which was dismissed on August 4, 2010, on grounds that the privacy violation did not amount to a constitutional violation of the right to privacy.
Ohio Association of Chiefs of Police contractor
On October 14, 2009, the Columbus Dispatch reported that, "A former contractor for the Ohio Association of Chiefs of Police has been charged with rummaging through state computers to retrieve information about 'Joe the Plumber.'" The State Highway Patrol has stated that, "this individual has also used a law-enforcement computer network on Oct. 16, 2008 to access personal information about Samuel Joseph Wurzelbacher."
Ohio Bureau of Motor Vehicles searches
Since The Columbus Dispatch reported on October 25, 2008, that "information on Wurzelbacher's driver's license or his sports utility vehicle was pulled [accessed] from the Ohio Bureau of Motor Vehicles database three times," multiple state databases have been used to get information on Wurzelbacher.
In Ohio, state and local officials are investigating whether the accessing was illegal. Wurzelbacher responded on Fox News saying that, "It upsets me greatly, to be honest with you." John McCain responded later that day calling the actions, "remarkable." The Obama campaign responded that the access had nothing to do with the Obama campaign and that it should be fully investigated.
ODJFS database searches
During the last few weeks of the 2008 US Presidential election campaign, ODJFS employees became embroiled in a controversy over searches of Joe Wurzelbacher's government records. State and local officials conducted an investigation into whether ODJFS Director Helen Jones-Kelley's order to access Ohio government databases concerning Wurzelbacher was illegal; they concluded on November 20, 2008, that the searches breached protocol but found there was no evidence to prove they were part of a political agenda or linked with a political group or campaign. The Attorney General's office of Ohio conducted the investigation.
At the start of the investigation, Ohio State Rep. William Batchelder, R-Medina, called for Jones-Kelley to explain her agency's actions in reviewing individuals who have been the subject of news stories. In a written response to a letter from Ohio Senate President Bill Harris, Jones-Kelly defended her decision to approve of the search on Wurzelbacher after the third presidential debate:
Given our understanding that Mr. Wurzelbacher had publicly indicated that he had the mean |
https://en.wikipedia.org/wiki/Barbarian%20II%3A%20The%20Dungeon%20of%20Drax | Barbarian II: The Dungeon of Drax is a video game first published in 1988 for various home computers. It was released as Axe of Rage in North America. The game is the sequel to Barbarian: The Ultimate Warrior (Death Sword in North America), which was published in 1987. In Barbarian II, the player controls a princess or barbarian character, exploring the game world to locate and defeat an evil wizard. The game's plot is an extension of its predecessor, although the gameplay is different. While the first game offers two players the opportunity for virtual head-to-head combat, the second is a single-player beat 'em up with fewer fighting moves. It uses a flip-screen style instead of scrolling.
Palace Software, the developer of the two Barbarian games, marketed the sequel with the same strategy they used for the first game. They hired Maria Whittaker, a model known for her topless work, to pose on the cover and posters as the princess in the game, attempting to recapture the controversy that had boosted sales. Barbarian II received a mixed critical reception. Reviewers were split in their opinions over whether the game was a refreshing and gory adventure, or a boring and lonely sojourn through a confusing digital world.
Gameplay
Unlike its predecessor which offers sword fighting action to one or two players, Barbarian II: The Dungeon of Drax features only a single-player mode, in which the player assumes the role of either sword-wielding Princess Mariana or the titular savage, who is armed with a battleaxe. Their common quest is to pursue the evil wizard Drax, who has fled to his dungeon hideout after his defeat in the first game. The player characters battle their way through an inhospitable wasteland, a system of caves, and a dungeon before facing Drax in his inner sanctum for a showdown.
Using a joystick or keyboard, the player moves his or her character through Barbarian IIs world. Each of the four stages—wasteland, caves, dungeon, and inner sanctum—is a series of interconnected rooms, populated by monsters, traps, and items. The game displays one room at a time in a flick-screen manner: as the protagonist leaves a room, the screen is updated to display the next. The connections among rooms are disjointed: the exit on the left of one room might be connected to the entrance on the same side of another. A compass at the bottom of the interface serves as a directional guide, always pointing to the north. The player directs his or her player through the rooms, seeking the exit to the next stage while avoiding traps and collecting items.
The protagonist is also challenged in his or her quest by 20 types of creatures. By moving the joystick while pressing its button or by performing the equivalent keyboard commands, the player defends the protagonist with four styles of attacks: a low slash, a high chop, a kick, and a spinning neck chop. The life of the combatants are represented by gauges at the top corners of the screen. Successful attacks on |
https://en.wikipedia.org/wiki/Offshoring%20Research%20Network | The Offshoring Research Network is an international network of researchers and practitioners studying organizations in their transition to globalizing their business functions, processes and administrative services. The ORN conducts annual surveys tracking global sourcing strategies, drivers, concrete implementations and plans across all business functions and processes.
The ORN is managed by Duke University, The Fuqua School of Business, Center for International Business Education and Research (CIBER).
Offshoring, according to the ORN, refers to the process of sourcing business functions or processes supporting home-based or global operations from a foreign country, either through wholly owned organizational units (captive offshoring/shared services) or external service providers (offshore outsourcing).
History and current objectives
The ORN project was launched in 2004 by the Center for International Business Education and Research (CIBER) at Duke University, The Fuqua School of Business. Dr. Arie Y. Lewin, Professor of Strategy and International Business and Director of Duke CIBER, was the initiator and has been the Lead Principal Investigator of the ORN project.
The findings from the annual research surveys have shifted the focus of ORN research over time. After its initial orientation to offshoring white-collar work, the ORN project has put more emphasis on the global search for talent and offshoring of higher-skilled tasks, in particular product development. Most recently, the ORN project has positioned itself as a research project focusing on studying companies in their transition to globalizing their business functions, processes and administrative services. Offshoring is understood as an intermediary step towards evolving new global organizational capabilities rather than an end in itself.
Research partners
Sponsoring partners
1 Florida International University, Indiana University, Michigan State University, Temple University, University of Connecticut, University of Hawaii at Manoa, University of Kansas, University of Maryland, College Park, University of Memphis, University of North Carolina at Chapel Hill
Global search for talent
A key ORN finding is the increasing importance of access to qualified personnel as a driver of offshoring decisions. Most scholars have argued that offshoring is primarily driven by opportunities to reduce labor costs and by labor arbitrage effects.
While the ORN surveys confirm the importance of costs, they also reveal that companies use offshoring as a means to access talent pools outside their home countries, in particular for higher-skilled work. This trend has been explained by an increasing supply of science and engineering talent in emerging economies, e.g., India, and the increasing difficulty of finding talent in the U.S. and Western Europe.
It is further reinforced by restrictive visa policies in the U.S. and incentives for foreign graduates to return to their home countries, a recen |
https://en.wikipedia.org/wiki/Cyber%20Core | is a 1990 vertically scrolling shooter video game developed by Alfa System and published in Japan by Information Global Service (IGS) and in North America by NEC for the TurboGrafx-16. Set in the year 2269 where Earth has been overrun by an alien race known as Hyper Insects, the player controls a Chimera bio-fighter craft, piloted by the enforcer Rad Ralph (Kato Melange in the Japanese version) in order to fend off the invaders and reclaim the planet. Similar to Dragon Spirit, Ralph has a projectile weapon for destroying air-based enemies and a bomb for destroying ground-based enemies.
Co-headed by director Kenji Hisatomi and producer Kotoshi Yokoyama, Cyber Core was the first shoot 'em up title created by Alfa System, who would later work on future projects such as Down Load and the Shikigami no Shiro series. First released on the TurboGrafx-16, the game was ported to the X68000 by SPS, featuring improved visuals and audio, as well as a rebalanced difficulty. The X68000 conversion has since been re-released only in Japan for Microsoft Windows through D4 Enterprise's Project EGG download service.
Cyber Core on the TurboGrafx-16 received mostly positive reception from critics, but the X68000 conversion was met with mixed reception; reviewers drew comparisons with Dragon Spirit due to its gameplay system but praise was given to its technical performance, visual presentation, sound, and fast-paced gameplay, but criticism was geared towards the repetitive action and enemy attack patterns, while many were divided in regards to its difficulty.
Gameplay
Cyber Core is a science fiction-themed vertical-scrolling shoot 'em up game. The plot takes place in the year 2269, where Earth has been overrun by a cybernetic alien race called Hyper Insects. Their primary base is an underground mobile fort known only as the mothership. To fend off the Hyper Insects, Earth's defense forces create an insect-themed bio-jet in similar form to the enemy called the Chimera, which mutates the pilot into a humanoid insect upon use. This occurs to protagonist Rad Ralph (Kato Melange in the Japanese version), who has been assigned to attack the Hyper Insects and reclaim Earth.
The gameplay structure is similar to Xevious and Dragon Spirit; The player controls the Chimera through eight increasingly difficult stages over a constantly scrolling background, populated with an assortment of enemies and the scenery never stops moving until a boss is reached, which must be fought in order to progress further. The Chimera moves in eight directions and is equipped with two main weapons; a projectile weapon for air-based enemies and a bomb for ground-based enemies. The Chimera can mutate into four types of weapons by collecting their respective color eggs when shooting at the supply carrier.
Collecting three eggs in a row also grants the Chimera shield units to sustain enemy hits but this can also prove to be a risky proposition, however, as the Chimera's size is increased when mor |
https://en.wikipedia.org/wiki/WBEH-CD | WBEH-CD (channel 38) is a low-power, Class A television station in Miami, Florida, United States, airing as a Daystar affiliate religious network. The station is owned by the Word of God Fellowship.
History
Launched March 2, 1993, W20BE on channel 20 went defunct within six months. The license was reactivated on September 27, 1995, becoming W20BE once more. What followed was a move to channel 27 as W27BS on January 9, 1997; and an attempt to move to channel 61, which would have made the station W61DD – the same day the change was made in FCC records on July 1, 1999; the calls changed again to W31CD and the station moved to channel 31. On May 31, 2000, W31CD became WPMF-LP, and a year later, WPMF received a class A television license (though its calls retained the -LP suffix). The station received its license to broadcast digitally on January 3, 2014, at which point the call sign changed to WPMF-CD.
WPMF-LP joined Azteca América in November 2002. In 2011, it switched to My Family TV, which became The Family Channel in 2013. On November 1, 2017, WPMF-CD rejoined Azteca América, replacing WGEN-TV (channel 8). The station changed its call sign to WBEH-CD on November 9, 2018.
HC2 Holdings planned to acquire the station from Prime Time Partners in June 2019, along with WSPF-CD. The sale of WBEH-CD would fall through in 2020; in June 2022, Prime Time Partners would sell the station to the Word of God Fellowship, parent of the Daystar Television Network.
Subchannels
The station's digital signal is multiplexed:
References
BEH-CD
BEH-CD
Television channels and stations established in 1993
1993 establishments in Florida
BEH-CD
Hispanic and Latino American culture in Miami |
https://en.wikipedia.org/wiki/Lost%20Zombies | Lost Zombies was a zombie themed social network with the goal of creating a community generated zombie documentary. The website, built on the Ning platform, launched on May 1, 2008 and was created by Ryan Leach, Skot Leach and Rob Oshima.
Overview
Lost Zombies followed a fictional timeline which begins in February 2007 with a Flu epidemic. The flu virus mutates out of control, eventually causing Zombism. The timeline leads to the present day where 75% of the world's population is dead or undead. Users were able to create a profile on the Lost Zombies website and submit videos, audio, pictures and written accounts that reflect some portion of the Lost Zombies timeline. The creators of Lost Zombies intended to compile the user submissions into a single, cohesive, mock documentary.
Closure
The Lost Zombies website shut down on March 22, 2014, due to the creators abandoning the project for other ones and leaving the community to dwindle.
Awards
Lost Zombies received the Best Community Website Award and the People's Choice Award at the 2009 SXSW Web Awards held on March 15, 2009.
Lost Zombies was featured as one of the 25 new faces of independent film by FilmMaker Magazine.
References
External links
SXSW Interactive awards for TDK ARG, We Tell Stories, Lost Zombies | ARGNet: Alternate Reality Gaming Network
Defunct social networking services
Zombies and revenants in popular culture |
https://en.wikipedia.org/wiki/POST%20%28HTTP%29 | In computing, POST is a request method supported by HTTP used by the World Wide Web.
By design, the POST request method requests that a web server accept the data enclosed in the body of the request message, most likely for storing it. It is often used when uploading a file or when submitting a completed web form.
In contrast, the HTTP GET request method retrieves information from the server. As part of a GET request, some data can be passed within the URL's query string, specifying (for example) search terms, date ranges, or other information that defines the query.
As part of a POST request, an arbitrary amount of data of any type can be sent to the server in the body of the request message. A header field in the POST request usually indicates the message body's Internet media type.
Posting data
The world wide Web and HTTP are based on a number of request methods or 'verbs', including POST and GET as well as PUT, DELETE, and several others. Web browsers normally use only GET and POST, but RESTful online apps make use of many of the others. POST's place in the range of HTTP methods is to send a representation of a new data entity to the server so that it will be stored as a new subordinate of the resource identified by the URI. For example, for the URI http://example.com/customers, POST requests might be expected to represent new customers, each including their name, address, contact details and so on. Early website designers strayed away from this original concept in two important ways. First, there is no technical reason for a URI to textually describe the web resource subordinate to which POST data will be stored. In fact, unless some effort is made, the last part of a URI will more likely describe the web application's processing page and its technology, such as http://example.com/applicationform.php. Secondly, given most web browsers' natural limitation to use only GET or POST, designers felt the need to re-purpose POST to do many other data submission and data management tasks, including the alteration of existing records and their deletion.
Efforts by some influential writers to remedy the first point began as early as 1998. Web application frameworks such as Ruby on Rails and others make it easier for designers to provide their users with semantic URLs. With regard to the second point, it is possible to use client-side scripting, or to write standalone apps, to make use of the other HTTP methods where they are relevant, but outside of this most web forms that submit or alter server data continue to use POST for the purpose.
That is not to say that every web form should specify method="post" in its opening tag. Many forms are used to specify more precisely the retrieval of information from the server, without any intention of altering the main database. Search forms, for example, are ideally suited to having method="get" specified.
There are times when HTTP GET is less suitable even for data retrieval. An example of this is when a g |
https://en.wikipedia.org/wiki/Compass%20Media%20Networks | Compass Media Networks is an American radio network. The company launched in January 2009.
It is owned by former Westwood One CEO and former COO of Connoisseur Media, Peter Kosann. The company focuses on radio and offers representation and marketing services for national radio.
History
Compass Media Networks debuted in January 2009 with a focus on national radio programs.
Programming
The Free Beer and Hot Wings Show morning drive time comedy and hot talk program hosted by Gregg "Free Beer" Daniels and Chris "Hot Wings" Michael, along with producers, Steve and Kelly. It is mostly heard on classic rock, alternative rock and active rock stations.
DeDe In The Morning, DeDe McGuire, syndicated morning urban radio program originating from KKDA-FM in Dallas, Texas and owned by Service Broadcasting.
The Lars Larson Show. Lars Larson is a conservative political talk show host based at KXL-FM in Portland, Oregon. The show is heard on dozens of affiliates.
The Market Score Board Report with Ron Insana debuted nationally on May 11, 2009, and offers daily business reports Monday-Friday at the open and close of the stock market.
Taste of Country Nights hosted by Amber Atnip and Evan Paul, a country music radio show syndicated throughout United States and distributed by Compass Media Networks.
This Morning, America's First News with Gordon Deal with cohost Jennifer Kushinka and producer Michael Gavin, a four-hour morning news and information program for news-talk radio stations. It airs at 5 a.m. ET weekdays. A recorded one-hour roundup show is heard on Saturday or Sunday mornings on many of the weekday show's affiliates. A podcast version of the show is produced Monday through Saturday.
Markley, Van Camp and Robbins — Originally co-hosted by Jamie Markley and David van Camp, the show went into national syndication in 2019 from WMBD in Peoria, Illinois. Scott Robbins was later added to the show, with the name of the program being expanded to include him. Airing live between Noon and 3 p.m. ET weekdays, the show would take the place of Rush Limbaugh on many Alpha Media stations following his death in 2021. Many other stations also chose to air the show on tape delay.
Acquisition of Westwood One programs
After Westwood One was bought out by Dial Global, Compass picked up several of Westwood One's former weekend music programs. Among those were The Beatle Years with Bob Malik, Out of Order with Jed the Fish, and Off the Record with Uncle Joe Benson. After Westwood One reformatted its longtime Saturday-night program Country Gold with a new host (first with Randy Owen, now with Terri Clark), Compass hired the show's previous host, Josh "Rowdy Yates" Holstead, to host a continuation of the previous format under the name The Original Country Gold. Compass also owns the rights to The Deep End with Nick Michaels, which was not previously a Westwood One program.
After Dial Global merged with Cumulus Media Networks, Compass picked up additional programs, incl |
https://en.wikipedia.org/wiki/MetroLyrics | MetroLyrics was a website dedicated to song lyrics. It was founded in December 2002, and its database contained over one million songs by over 16,000 artists. Unlike other lyric websites, MetroLyrics places a warning on songs that contain explicit lyrics so that users can proceed with caution. The site abruptly went offline in late June 2021, and as of November 2022 its owners and maintainers have made no explanation.
History
In 2008, MetroLyrics was the first lyrics-dedicated site to license Gracenote Inc.'s lyrics catalogue. Through its licensing model, copyright holders of lyrics accrue royalty revenue when their work is displayed on MetroLyrics.com, which MetroLyrics recoups by collecting money from banner advertisements on its site. Royalties are paid on all displayed lyrics and are handled through Gracenote. In January 2013, LyricFind acquired Gracenote's lyrics licensing business, merging it in with their own. MetroLyrics' licensing model is distinct, as many lyrics websites offer content that is unlicensed and possibly copyright infringing.
MetroLyrics was acquired by CBS Interactive in October 2011. Red Ventures acquired the CNET Media Group, including MetroLyrics, from CBS Interactive in 2020.
References
External links
Canadian music websites
Companies based in Vancouver
Internet properties established in 2002
Internet properties disestablished in 2021
Online archives
Online music and lyrics databases
Technology companies of Canada
Former CBS Interactive websites
Red Ventures
2002 establishments in British Columbia
2021 disestablishments in British Columbia
2020 mergers and acquisitions |
https://en.wikipedia.org/wiki/Auna | Auna is an integrated healthcare provider with operations in Peru and Colombia. It counts with over 7,500 collaborators in its network.
Auna was absorbed in 2005 by the operator ONO.
Operations in Peru
In Peru, it operates several private hospitals, clinics, and wellness centers. This network includes Clinica Delgado, one of Peru’s largest private hospitals, with a focus on high-complexity procedures, emergency care, gynecology and maternity.
Auna also operates Oncosalud, a prepaid plan covering oncological prevention and treatment, with over 1 million affiliates.
Operations in Colombia
In Colombia, it owns Grupo Las Americas, a conglomerate operating a leading high-complexity hospital in Medellin, Clinica Las Americas.
It also operates a large oncology institute, Instituto de Cancerología, and Clínica Portoazul, a premium high-complexity hospital in Barranquilla, the country’s 4th largest market.
References
Companies disestablished in 2005
Cable television companies of Spain |
https://en.wikipedia.org/wiki/Random%20binary%20tree | In computer science and probability theory, a random binary tree is a binary tree selected at random from some probability distribution on binary trees. Two different distributions are commonly used: binary trees formed by inserting nodes one at a time according to a random permutation, and binary trees chosen from a uniform discrete distribution in which all distinct trees are equally likely. It is also possible to form other distributions, for instance by repeated splitting. Adding and removing nodes directly in a random binary tree will in general disrupt its random structure, but the treap and related randomized binary search tree data structures use the principle of binary trees formed from a random permutation in order to maintain a balanced binary search tree dynamically as nodes are inserted and deleted.
For random trees that are not necessarily binary, see random tree.
Binary trees from random permutations
For any set of numbers (or, more generally, values from some total order), one may form a binary search tree in which each number is inserted in sequence as a leaf of the tree, without changing the structure of the previously inserted numbers. The position into which each number should be inserted is uniquely determined by a binary search in the tree formed by the previous numbers. For instance, if the three numbers (1,3,2) are inserted into a tree in that sequence, the number 1 will sit at the root of the tree, the number 3 will be placed as its right child, and the number 2 as the left child of the number 3. There are six different permutations of the numbers (1,2,3), but only five trees may be constructed from them. That is because the permutations (2,1,3) and (2,3,1) form the same tree.
Expected depth of a node
For any fixed choice of a value in a given set of numbers, if one randomly permutes the numbers and forms a binary tree from them as described above, the expected value of the length of the path from the root of the tree to is at most , where "" denotes the natural logarithm function and the introduces big O notation. For, the expected number of ancestors of is by linearity of expectation equal to the sum, over all other values in the set, of the probability that is an ancestor of . And a value is an ancestor of exactly when is the first element to be inserted from the elements in the interval . Thus, the values that are adjacent to in the sorted sequence of values have probability of being an ancestor of , the values one step away have probability , etc. Adding these probabilities for all positions in the sorted sequence gives twice a Harmonic number, leading to the bound above. A bound of this form holds also for the expected search length of a path to a fixed value that is not part of the given set.
To understand it by using min-max records. The number in a random permutation is the min (max) record means it is the min (max) value from the first position to its position. Consider a simple example = (2, 4 |
https://en.wikipedia.org/wiki/Network%20forensics | Network forensics is a sub-branch of digital forensics relating to the monitoring and analysis of computer network traffic for the purposes of information gathering, legal evidence, or intrusion detection. Unlike other areas of digital forensics, network investigations deal with volatile and dynamic information. Network traffic is transmitted and then lost, so network forensics is often a pro-active investigation.
Network forensics generally has two uses. The first, relating to security, involves monitoring a network for anomalous traffic and identifying intrusions. An attacker might be able to erase all log files on a compromised host; network-based evidence might therefore be the only evidence available for forensic analysis. The second form relates to law enforcement. In this case analysis of captured network traffic can include tasks such as reassembling transferred files, searching for keywords and parsing human communication such as emails or chat sessions.
Two systems are commonly used to collect network data; a brute force "catch it as you can" and a more intelligent "stop look listen" method.
Overview
Network forensics is a comparatively new field of forensic science. The growing popularity of the Internet in homes means that computing has become network-centric and data is now available outside of disk-based digital evidence. Network forensics can be performed as a standalone investigation or alongside a computer forensics analysis (where it is often used to reveal links between digital devices or reconstruct how a crime was committed).
Marcus Ranum is credited with defining Network forensics as "the capture, recording, and analysis of network events in order to discover the source of security attacks or other problem incidents".
Compared to computer forensics, where evidence is usually preserved on disk, network data is more volatile and unpredictable. Investigators often only have material to examine if packet filters, firewalls, and intrusion detection systems were set up to anticipate breaches of security.
Systems used to collect network data for forensics use usually come in two forms:
"Catch-it-as-you-can" – This is where all packets passing through a certain traffic point are captured and written to storage with analysis being done subsequently in batch mode. This approach requires large amounts of storage.
"Stop, look and listen" – This is where each packet is analyzed in a rudimentary way in memory and only certain information saved for future analysis. This approach requires a faster processor to keep up with incoming traffic.
Types
Ethernet
Apt all data on this layer and allows the user to filter for different events. With these tools, website pages, email attachments, and other network traffic can be reconstructed only if they are transmitted or received unencrypted. An advantage of collecting this data is that it is directly connected to a host. If, for example the IP address or the MAC address of a host at a cert |
https://en.wikipedia.org/wiki/XML%20Configuration%20Access%20Protocol | The XML Configuration Access Protocol (XCAP) is a protocol, that allows a user to read, write, and modify application configuration data stored in XML format on a server and unlocks devices
Overview
XCAP maps XML document element attributes to HTTP URLs, so that these components can
be directly accessed by clients using HTTP protocol. An XCAP server is used
by XCAP users to store data like buddy lists and presence policy in
combination with a SIP Presence
Features
The following operations are supported via XCAP protocol in a client-server interaction:
Retrieve an item
Delete an item
Modify an item
Add an item
The operations above can be executed on the following items:
Document
Element
Attribute
The XCAP addressing mechanism is based on XPath, that provides the ability to navigate around the XML tree.
Application usages
The following applications are provided by XCAP, by using specific auid (Application Unique Id):
XCAP capabilities (auid = xcap-caps).
Resource lists (auid = resource-lists). A resource lists application is any application that needs access to a list of resources, identified by a URI, to which operations, such as free trials without subscriptions, can be applied.
Presence rules (auid = pres-rules, org.openmobilealliance.pres-rules). A Presence Rules application is an application which uses authorization policies, also known as authorization rules, to specify what presence information can be given to which watchers, and when.
RLS services (auid = rls-services). A Resource List Server (RLS) services application is Session Initiation Protocol (SIP) a
XML manipulation (auid = XML-manipulation). XML-manipulation application usage defines how XCAP is used to manipulate the contents of XML based presence documents.
Standards
The XCAP protocol is based on the following ROOT standards:
Application org.openmobilealliance.pres-rules standard should be added here.
References
External links
OpenXCAP
XML |
https://en.wikipedia.org/wiki/Rack%20%28web%20server%20interface%29 | Rack is a modular interface between web servers and web applications developed in the Ruby programming language. With Rack, application programming interfaces (APIs) for web frameworks and middleware are wrapped into a single method call handling HTTP requests and responses.
Rack is used by many Ruby web frameworks and libraries, such as Ruby on Rails and Sinatra. It is available as a Ruby Gem. Many Ruby applications are called "rack-compliant".
Rack has inspired similar frameworks in JavaScript (jack.js), Clojure, Perl (Plack), Common Lisp (Clack), and .NET (OWIN).
Overview
The characteristics of a Rack application is that the application object responds to the call method. The call method takes in the environment object as argument and returns the Rack response object.
Environment
The environment that is taken as argument by the call method refers to an object that has:
a) Information on the HTTP Request
This includes the information like:
HTTP request method
The URL information(information that would direct to the application, information that directs to the actual location in the application, Query string)
Server information like the server name and server port
The HTTP metavariables that are received from the client
b) Rack specific information
This includes the information like
The version of the Rack application that is running
The URL scheme that is used, that is, if the request that is received is http or https.
The raw HTTP data.
A Ruby object for reporting errors.
Information like if the application object is simultaneously invoked from another thread or process.
Information on the server expectations and capabilities (capability of the server for connection hijacking).
In case the application is being used as a middleware, the environment can have objects that would provide session information, logging capabilities, information on the size of the data that can be used for read and writes etc. In addition to these, the server can store their own data in the environment.
Rack response
The rack server object returns a response which contains three parts: the status, headers and the body.
The status contains the HTTP status codes such as 200,404.
The header contains the response for each and gives the key-value pairs. The keys have to be strings.
Body contains the final data which is sent by the server to the requester.
Rack::Response provides a convenient interface to create a Rack response. The class Rack::Response is defined in lib/rack/response.rb. To use the Response class, instantiate it from the middleware layer down the stack. It can be used to modify the cookies.
Middleware in racks
Rack makes it easy to add a chain of middleware components between the application and the web server. Multiple middleware components can be used in the rack which modifies the request/response before handing it over to the next component. This is called middleware stack.
The Rack server adds multiple middle middleware by default f |
https://en.wikipedia.org/wiki/LabelTag | LabelTag can create a circular label on the data side of any DVD+R, DVD-R, or CD-R disc containing basic information visible to the eye. When burning the data, the label is printed directly behind that data in the same recording session, and on normal recording speed on the same recording layer side. LabelTag works on any disc and does not require a special disc like LightScribe. Currently, LabelTag is an exclusive technology of Lite-On for its DVD writer drives.
An older alternative disc labeling technique was DiscT@2. To record the label on the opposite or back side of the disc by the drive itself LightScribe and LabelFlash are current standards. Besides that, printing using an inkjet printer is currently widely used.
System description
The PC host application controls the data location of the regular user data, including the structure of the file system. In the host application the user label input is transformed into a bit-map representation. The host sends print commands with the pixel information of the image to the drive. The drive interface, records the regular data, including lead in, session intros and closures, and finally lead out. The drive Interface (IF) part takes care of the interpretation of the pixel information and location of the image on the disc. The drive Servo part finally records the pixel information on the correct location including the encoded line numbering. The drive Servo part controls the record power, motor frequency, pixel frequency and channel bit frequency.
Location and time of image recording
The label can be added or appended to the disc at any time if disc space is available. The disc status has to be “appendable” prior to the image recording. The label is recorded adjacent to the last recorded user data. It is up to the user to finalize the disc after the label is added. In case the disc remains "appendable" more user data or more labels can be added. The first section of the disc (26 mm) is used for all drives to do the start-up calibrations. Therefore, no label can be recorded at the inner diameter of the disc. If there is a label in this area, the risk of poor performance is big.
Space usage
If you add a label on the data side of the disc, then this space is no longer available for data. The amount of space it takes depends on the size (width) of the label and the location of the label on the disc. The wider the label and the more it is located on the outside of the disc, the more space it takes. In other words: the bigger the label, the more disc surface is occupied and thus the more data-space you sacrifice. For example: a 5 mm label at the inside requires 10% capacity, and at the outside of the disc about 20% of the disc capacity.
Image visibility and recording process
For LabelTag the Eight-to-Fourteen Modulation (EFM+) channel code properties are modulated to create the visual label. In the EFM+ code table, the user data bytes are transformed into specific sequences of pits and lands, rangi |
https://en.wikipedia.org/wiki/WeSeed | WeSeed.com was a free website aimed at teaching people about the stock market. It allows visitors to virtually invest in real stocks and also serves as a social network, allowing people to interact and discuss their opinions on different stocks and markets. The site uses a proprietary WeSearch engine, which allows users to search for the things that interest them. The search then returns stocks that might appeal to those interests. WeSeed officially closed on August 31, 2013, but continues to offer the free education market lessons. In an email sent to all WeSeed users, the company said that they are exploring ways to restart the website.
Philosophy
Founded on the Peter Lynch premise “invest in what you know,” the site encourages people to share their knowledge about the companies and products they use in their everyday lives. Users can read expert blogs, play games, watch videos, and leave comments about their favorite products and companies. Commentary includes news, customer experiences, and consumer trends that affect the company's viability.
Reviews
WeSeed was selected to be one of 24 presenters at the 2008 Finovate—a showcase of the best finance and banking startups. Shortly after Finovate, Mashable reviewed the site. PC Magazine gave WeSeed a 3.5 out of 5 rating. Thrillist.com also reviewed it, noting that the site breaks down the mystery of the stock market for the "market-unsavvy."
Awards
WeSeed's iPhone application received the “Staff Pick” award by Apple. Released on November 14, 2008, the application allows people to access WeSeed on their iPhone.
References
External links
WeSeed Homepage
Defunct companies based in Chicago
Internet properties established in 2007
Defunct online companies of the United States
Defunct financial services companies of the United States
Stock market
American educational websites |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.