source
stringlengths
32
199
text
stringlengths
26
3k
https://en.wikipedia.org/wiki/KNWA%20%28AM%29
KNWA (1600 AM) is a radio station licensed to serve Bellefonte, Arkansas, United States. The station, established in 1986, is owned by Harrison Radio Stations, Inc. Programming KNWA broadcasts a classic country music format. History This station received its original construction permit for a new 500 watt AM station broadcasting at 1600 kHz from the Federal Communications Commission on July 23, 1985. The new station was assigned the call letters KNWA by the FCC on August 29, 1985. KNWA received its license to cover from the FCC on August 11, 1986. References External links NWA Classic country radio stations in the United States Radio stations established in 1986 Boone County, Arkansas 1986 establishments in Arkansas
https://en.wikipedia.org/wiki/Canal%20Extremadura%20Televisi%C3%B3n
Canal Extremadura Televisión is a public television network of Extremadura. The television is owned and operated by CEXMA. History In 2001 the government of Extremadura and the opposition parties began negotiations for the creation of a public television channel in Extremadura, however, the negotiations failed. After this, an agreement was signed between the governments of Extremadura and Andalusia that created "Canal Sur Extremadura", it was a version of the Andalusian channel Canal Sur which had programs aimed at Extremadura. Canal Sur Extremadura was broadcast between September 8, 2001 and June 30, 2002, when the signal was suspended by court order that challenged the award process for the production of the channel's regional programming. After the closure of Canal Sur Extremadura, the autonomous community was left without its own public television until the creation of Canal Extremadura was announced in 2005, beginning its official programming on February 15, 2006. Although Canal Extremadura is not affiliated with FORTA, there are some agreements for the purchase of content generated by this union. Programming Canal Extremadura broadcasts general programming, especially focused on information and entertainment. Due to its status, the channel broadcasts some public service programs such as employment or integration services for people with disabilities, as well as content on agriculture, livestock or fishing due to the high presence of the rural population in the region. The channel also broadcasts some programs about the life and culture of Extremadura along with general entertainment such as series and movies. References External links www.canalextremadura.es Television stations in Spain Television channels and stations established in 2001 Spanish-language television stations Mass media in Extremadura
https://en.wikipedia.org/wiki/KBJT
KBJT (1590 AM, "Talk Radio 1590") is a radio station licensed to serve Fordyce, Arkansas, United States. The station, established in 1959, is currently owned by KBJT, Inc. Programming KBJT broadcasts a news/talk radio format featuring a mix of local news, community affairs, and syndicated talk shows. Local programming includes regional and state news, weather, local government meetings, and a tradio show called "Swap Shop". Syndicated programming includes talk shows hosted by Laura Ingraham, Jerry Doyle, Greg Knapp, G. Gordon Liddy, Dave Ramsey, and Michael Reagan. History This station began regular broadcast operations on August 1, 1959, with 250 watts of power on a frequency of 1570 kHz. The station was launched under the ownership of KBJT, Inc., with Kermit F. Tracy serving as president, general manager, and chief engineer. The station was assigned the KBJT call sign by the Federal Communications Commission. Mack R. Smith acquired license-holder KBJT, Inc., on January 3, 1962. Smith would run KBJT for 15 years before selling the company to a group led by Gary Coates and his brother Paul Coates in a transaction consummated on March 15, 1977. By 1980, Gary Coates had full control of KBJT, Inc., and he has served as the station's general manager since 1977. In January 1984, the station applied to the FCC for a power increase in its daytime signal to 1,000 watts. The FCC granted KBJT this authorization on August 3, 1984. Nearly 20 years later, in June 2004, the FCC authorized a change in frequency from 1570 to 1590 kHz, an increase in daytime power to 4,700 watts, and the addition of a nighttime signal at 35 watts. The FCC issued a new license to cover these changes on July 2, 2007. Notable alumni Sam Conn, a former intern, is now an actor and award-winning journalist. References External links KBJT official website BJT News and talk radio stations in the United States Radio stations established in 1959 Dallas County, Arkansas 1959 establishments in Arkansas
https://en.wikipedia.org/wiki/Next%20Door%20%281994%20film%29
Next Door is a 1994 American black comedy television movie starring James Woods, Randy Quaid, Kate Capshaw and Lucinda Jenney. It originally aired September 4, 1994 on the Showtime network and was made available on VHS on January 17, 1995. Plot Matt Coler, a sophisticated college professor, and Karen, his schoolteacher wife, have moved to a new neighborhood for Matt's teaching job. They refuse campus housing and decide to live in the suburbs in order to expose their son Bucky to blue-collar types. Their neighbors turn out to be loutish beer-swilling butcher Lenny Benedetti and his wife Marci, who are unruly and loud. When the Benedettis’ obsession with lawn watering drowns Karen's azaleas, a feud erupts between the two families, escalating into a series of tit-for-tat actions. Matt ruins Lenny's patio furniture, and Lenny retaliates by flooding Matt's car. Matt eventually tries calling a truce, but Lenny continues to harass the Colers. After their dog is poisoned, the Colers call the police. The cops find no evidence against Lenny and urge the two families to bury the hatchet and make peace. The feud spreads to involve the families' children, with Bucky beating up Lenny's son Sparky. In return, Lenny attacks Matt and attempts to assault Karen while she is home alone. Matt goes to Lenny's workplace and publicly threatens him, revealing that Lenny has been laid off. That night Lenny breaks into Matt's home and terrorizes the family. To defend his family, Matt desperately fights the bigger, stronger Lenny. The bloody battle ends with Lenny being set ablaze by Matt, who tells police that Lenny went too far. Cast James Woods as Matt Coler Randy Quaid as Lenny Benedetti Kate Capshaw as Karen Coler Lucinda Jenney as Marci Benedetti Miles Fuelner as Bucky Coler Billy L. Sullivan as Sparky Benedetti Reception In his review for Variety, John P. McCarthy complimented the performances of Woods, Quaid, and Capshaw, but wrote, "Cohen’s script has its ironies and logic, but there isn’t enough for a full-blown satire. Although Bill tries hard to blend the farcical humor and the nightmarish dimension, they ultimately cancel each other out." TV Guide wrote, "Barney Cohen's script is an amalgam of black comedy, suspense, and social commentary, but Next Door is never as funny, frightening, or incisive as it is unsettling. As the savagery escalates, the film's tone becomes increasingly uneasy, the filmmakers' message obscured". References External links Next Door at Facebook 1994 films 1994 black comedy films 1994 comedy films 1994 television films Films about feuds American television films American black comedy films Films directed by Tony Bill Films scored by Van Dyke Parks 1990s American films
https://en.wikipedia.org/wiki/Journal%20of%20Logic%2C%20Language%20and%20Information
The Journal of Logic, Language and Information is a quarterly peer-reviewed academic journal covering research on "natural, formal, and programming languages". It is the official journal of the European Association for Logic, Language and Information and was established in 1974. It is published by Springer Science+Business Media and the editor-in-chief is Lawrence S. Moss (Indiana University). According to the Journal Citation Reports, the journal has a 2020 impact factor of 0.829. References External links Logic journals Linguistics journals Springer Science+Business Media academic journals Academic journals established in 1974 Quarterly journals English-language journals
https://en.wikipedia.org/wiki/SOLVIT
SOLVIT is an informal problem-solving network of the European Commission and the member states of the European Union and the EEA. Created in 2002, it assists citizens and businesses to ascertain their EU rights where a dispute has arisen between a citizen or a company and a public authority of a member state of the European Union and the EEA other than their country of origin. There is a SOLVIT centre in every member state (as well as in the EEA member states Norway, Iceland, and Liechtenstein). SOLVIT is free of charge, and mainly an online service. Whenever a problem occurs, the SOLVIT centres of the two countries concerned (the complainant's country of origin and the country where the problem occurred) will try to reach a solution within ten weeks. On 2 May 2017 the European Commission announced a package of measures intended to enhance the functioning of the Single Market within the EU, which included a proposed action plan on reinforcing SOLVIT. The Commission published a report in September 2022 celebrating the twentieth anniversary of the establishment of the network. The report noted that 28,600 cases had been addressed during this 20-year period and 85% of these had been resolved. The UK's Single Market Centre, which provided SOLVIT services for UK businesses and consumers, closed in January 2021. References External links http://ec.europa.eu/solvit/ European Commission
https://en.wikipedia.org/wiki/EIOffice
EIOffice, also known as Evermore Integrated Office, is a proprietary Office suite by Evermore Software. In 2010, Evermore changed their name to Yozosoft. Supported operating systems include Microsoft Windows and Linux. It is marketed internationally in multiple languages. Dell Japan sells the Office suite in partnership with E Frontier, Inc. as an optional package for their Ubuntu Linux netbooks. The EIOffice supports Office Open XML document file formats. See also Office Open XML References External links Yozosoft homepage Office suites for Linux Office suites Portable software Java platform software
https://en.wikipedia.org/wiki/Option%20type
In programming languages (especially functional programming languages) and type theory, an option type or maybe type is a polymorphic type that represents encapsulation of an optional value; e.g., it is used as the return type of functions which may or may not return a meaningful value when they are applied. It consists of a constructor which either is empty (often named None or Nothing), or which encapsulates the original data type A (often written Just A or Some A). A distinct, but related concept outside of functional programming, which is popular in object-oriented programming, is called nullable types (often expressed as A?). The core difference between option types and nullable types is that option types support nesting (e.g. Maybe (Maybe String) ≠ Maybe String), while nullable types do not (e.g. String?? = String?). Theoretical aspects In type theory, it may be written as: . This expresses the fact that for a given set of values in , an option type adds exactly one additional value (the empty value) to the set of valid values for . This is reflected in programming by the fact that in languages having tagged unions, option types can be expressed as the tagged union of the encapsulated type plus a unit type. In the Curry–Howard correspondence, option types are related to the annihilation law for ∨: x∨1=1. An option type can also be seen as a collection containing either one or zero elements. The option type is also a monad where: return = Just -- Wraps the value into a maybe Nothing >>= f = Nothing -- Fails if the previous monad fails (Just x) >>= f = f x -- Succeeds when both monads succeed The monadic nature of the option type is useful for efficiently tracking failure and errors. Examples Agda In Agda, the option type is named with variants and . C++ Since C++17, the option type is defined in the standard library as . Coq In Coq, the option type is defined as . Elm In Elm, the option type is defined as . F# let showValue = Option.fold (fun _ x -> sprintf "The value is: %d" x) "No value" let full = Some 42 let empty = None showValue full |> printfn "showValue full -> %s" showValue empty |> printfn "showValue empty -> %s" showValue full -> The value is: 42 showValue empty -> No value Haskell In Haskell, the option type is defined as . showValue :: Maybe Int -> String showValue = foldl (\_ x -> "The value is: " ++ show x) "No value" main :: IO () main = do let full = Just 42 let empty = Nothing putStrLn $ "showValue full -> " ++ showValue full putStrLn $ "showValue empty -> " ++ showValue empty showValue full -> The value is: 42 showValue empty -> No value Idris In Idris, the option type is defined as . showValue : Maybe Int -> String showValue = foldl (\_, x => "The value is " ++ show x) "No value" main : IO () main = do let full = Just 42 let empty = Nothing putStrLn $ "showValue full -> " ++ showValue full putStrLn $ "showValue empty -> " ++ showValue empty
https://en.wikipedia.org/wiki/IEEE%20Systems%2C%20Man%2C%20and%20Cybernetics%20Society
The IEEE Systems, Man, and Cybernetics Society (IEEE SMCS) is a professional society of the IEEE. It aims "to serve the interests of its members and the community at large by promoting the theory, practice, and interdisciplinary aspects of systems science and engineering, human-machine systems, and cybernetics". History The earliest incarnation of the IEEE Systems, Man, and Cybernetics Society was the IRE Professional Group on Human Factors in Electronics, formed in 1958. The Group would later change its name to IEEE Professional Technical Group on Human Factors in Electronics (1963), IEEE Human Factors in Electronics Group (1964), Man-Machine Systems Group (1968), Systems, Man and Cybernetics Group (1970), and finally Systems, Man and Cybernetics Society (1972). IEEE SMCS has fostered many different technical committees which has made it a sort of technical committee “incubator.” These technical committees have addressed a number of diverse topics including, but not limited to, electrotechnology, environmental quality, national priorities, health care, decision science, optimization, learning systems, pattern recognition, and biocybernetics. A number of IEEE SMCS technical interest groups eventually became separate IEEE entities in their own right. For example, robotics and automation special interest groups merged to become the IEEE Robotics and Automation Society, and the neural network special interest group became the IEEE Neural Networks Council. Fields of interest The Field of Interest (FoI) of the SMCS includes: "Integration of the theories of communication, control, cybernetics, stochastics, optimization and system structure towards the formation of a general theory of systems;" "Development of systems engineering technology including problem definition methods, modeling, and simulation, methods of system experimentation, human factors engineering data and methods, systems design techniques and test and evaluation methods;" "Application of the above at both hardware and software levels to the analysis and design of biological, ecological, socio-economic, social service, computer information, and operational man-machine systems". Interaction among technically diverse professional colleagues is stimulating and invites new thinking that single disciplines, and employment alone, do not provide. This positions SMCS to effectively engage the emerging nature of the non-deterministic complex challenges that are typical of rapidly evolving post-industrial society. Technical Activities IEEE SMCS’s three technical areas (TA) promote initiatives in support of the FoI: Systems Science and Engineering—Focuses on systematics formulation, interpretation, analysis and modelling of issues and decision-making opportunities for large and complex systems. Human-Machine Systems—Focuses on organizational interactions, cognitive ergonomics, and human information processing. Cybernetics—Focuses on communication and control across machines or amo
https://en.wikipedia.org/wiki/Starent%20Networks
Starent Networks was an information technology and computer networking products company. It was headquartered in Tewksbury, Massachusetts, USA, with major engineering facilities in Pune, India and Bangalore, India. Starent Networks was bought by Cisco in 2009. Starent was a provider of infrastructure products that enabled mobile operators to deliver multimedia services such as video, Internet access, voice-over-IP, e-mail, mobile TV, photo sharing, and gaming to their subscribers. The products act as gateways that connect the radio access network to the IP network. The gateways allow the service provider to have fine control over the end user experience of the high bandwidth/low latency applications, transaction accounting details and access control. On October 13, 2009, Cisco announced a plan to purchase Starent for US$2.9 billion. On December 18, 2009, Cisco completed acquisition of Starent Networks. References Starent Networks: Starry Road Ahead External links Networking hardware companies Companies formerly listed on the Nasdaq Telecommunications equipment vendors Networking companies of the United States Cisco Systems acquisitions Defunct computer companies of the United States
https://en.wikipedia.org/wiki/NPO%20Nieuws
NPO Nieuws was a 24-hour news channel operated by the NOS, the public broadcaster which supplies news and sports to all national public television and radio networks. NOS also provides programming for the political channel, NPO Politiek. NPO Nieuws broadcasts all editions of the NOS Journaal news bulletin, and repeats the last news broadcast. NPO Nieuws also showed four extra programmes named NOS Journaal Chat, NOS Journaal Plus (extra information), NOS Journaal Reportages and NOS Journaal Weekoverzicht. A half-hourly version (15 minutes plus another 15 minute repeat) of the youth-oriented news programme NOS Jeugdjournaal also aired every day on NPO Nieuws. Until 16 September 2007 teletext news was also shown on NPO Nieuws; this was later replaced by a scrolling news ticker showing news headlines. At any point, the programming could have been interrupted for breaking news. The main studio is in Hilversum. On 10 March 2014, Journaal 24 changed its name into NPO Nieuws. NPO Nieuws closed on 15 December 2021. Some of its programming moved to NPO Politiek which was renamed by NPO Politiek en Nieuws. References External links Official Website NPO Nieuws Defunct television channels in the Netherlands Television channels and stations established in 2004 Television channels and stations disestablished in 2021
https://en.wikipedia.org/wiki/NPO%20Politiek%20en%20Nieuws
NPO Politiek en Nieuws is a public television channel operated by the public broadcaster NOS, which supplies news and sports to all national public television and radio networks. Programmes come live from The Hague when the parliament is in session. When the parliament was not in session the NPO Politiek en Nieuws channel became NPO Sport, broadcasting sporting events or news and current affairs, supplied by the NOS. On 15 December 2021, NPO Nieuws merged with NPO Politiek to make the present name of this channel. Before 10 March 2014 the channel was called Politiek 24. NPO Sport Especially in the summer months, the channel reported on sporting events which were not fully shown on the open channels of the NPO. These competitions included the World Cup/European Athletics Championships, World Cup/European Swimming Championships, World Equestrian Games, World Championships and Vuelta a España. Logos and identities References External links Official Website NPO Politiek en Nieuws Television channels in the Netherlands Television channels and stations established in 2006
https://en.wikipedia.org/wiki/Loop%20Mobile
Loop Mobile India Ltd, formerly BPL Mobile Communications, was an Indian mobile network operator. History BPL Mobile Communications, established in 1994, was India's first mobile network operator. It began commercial operations in 1995. The Khaitan Holdings Group purchased a 99% stake in the company at a cost of in 2005. BPL Mobile was renamed to Loop Mobile in March 2009. Having consistently met and exceeded Telecom Regulatory Authority of India benchmarks, Loop Mobile was ISO 9001:2008 certified in 2009, in accordance with the TUV NORD CERT auditing and certification procedures. On 18 February 2014, Bharti Airtel announced that it was acquiring Loop Mobile for , prior to that, a Chennai-based Information Technology Company, Zeesta IT Services MD Hemanth Raj, evaluated to acquire, however the deal did not materialize. The two companies had been in talks since mid-2013. Loop Mobile's 20-year licence in the 900 MHz band was due to expire in the last quarter of 2014, and the company did not participate in the 2014 spectrum auction. However, on 5 November 2014, Bharti announced that it was dropping plans to acquire Loop Mobile, after the former failed to gain regulatory approval from the Department of for the acquisition. The acquisition would have increased Airtel's total customer base in Mumbai to more than 7 million customers and increased the size of their network to 6,500 cell sites. Airtel also would have acquired electronic equipment, optic fibre and the 8 megahertz of spectrum in the 900 MHz band held by Loop in Mumbai. However, Airtel had no plans to acquire Loop Mobile's 550 employees. The announcement of the acquisition had prompted most Loop Mobile subscribers to switch mobile operators, and the operator had approximately 1 million customers by the first week of November 2014, down from 3 million subscribers when the deal was first announced in February 2014. Loop Mobile's licence to operate mobile services in Mumbai expired on 29 November 2014, bringing an end to its operations. Controversy Loop Telecom was probed by the Central Bureau of Investigation for alleged violation of foreign exchange laws to the tune of about in connection with the 2G spectrum case. As far as the lengthy Indian Court process was concerned, the media and political controversies did not appear to be substantive. The promoters of Loop telecom were acquitted in December 2017 by a decision of the Indian Court, which stated "prosecution has miserably failed to prove any charge against any of the accused. Consequently, all the accused are entitled to be acquitted". On 18 August 2011, Loop mobile, along with Bharti Airtel, Idea Cellular, Reliance Communications and Vodafone, was issued notices by the Telecom Regulatory Authority of India (TRAI) for violation of mobile number portability regulations. According to TRAI, they had received complaints from customers regarding wrong rejection of porting requests by telecom operators and also being charged for a me
https://en.wikipedia.org/wiki/National%20Institute%20for%20Computational%20Sciences
The National Institute for Computational Sciences (NICS) is funded by the National Science Foundation and managed by the University of Tennessee. NICS was home to Kraken, the most powerful computer in the world managed by academia. The NICS petascale scientific computing environment is housed at Oak Ridge National Laboratory (ORNL), home to the world's most powerful computing complex. The mission of NICS, a member of the Extreme Science and Engineering Discovery Environment (XSEDE - formerly TeraGrid), is to enable the scientific discoveries of researchers nationwide by providing leading-edge computational resources, together with support for their effective use, and leveraging extensive partnership opportunities. Systems Kraken Kraken was the University of Tennessee’s petascale computing environment funded by the NSF and fully integrated with XSEDE formerly TeraGrid XD. Kraken was a 1.17-petaflop Cray XT5 system containing 18,816 compute sockets and more than 147 terabytes of memory. In November 2009, it was named the third fastest computer in the world. In its final configuration, the XT5 system delivered in excess of 700 million CPU hours per year. The system was designed specifically for sustained application performance, scalability, reliability and incorporated key elements of the Cray Cascade system. Kraken provided the user community a sustained, high-productivity petascale resource for science and engineering applications. The NSF computer system was co-located with the National Center for Computational Sciences, home of Titan, and other major user facilities at the ORNL campus. Nautilus Nautilus is an SGI Altix UV 1000 and the heart of RDAV, the University of Tennessee’s Center for Remote Data Analysis and Visualization sponsored by the National Science Foundation as part of XSEDE, formerly TeraGrid XD. Scientists and engineers are daily producing terabytes of digital data through experimentation, observation and simulation. RDAV's purpose is to aid in the significant challenge of transforming this data into knowledge and insight by providing remote visualization, analysis, and scientific workflow technologies. Nautilus has 1024 cores and 4 terabytes of global shared memory. Keeneland NICS operates the Keeneland Initial Delivery system for Georgia Tech. It is composed of an HP SL-390 (Ariston) cluster with Intel Westmere hex-core CPUs, NVIDIA 6GB Fermi GPUs, and a Qlogic QDR InfiniBand interconnect. Each node has two hex-core CPUs and 3 GPUs, with a total of 120 nodes, 240 CPUs and 360 GPUs. Verne Verne a 5-node cluster of Dell R505 quad-socket/quad-core Opteron servers dedicated to data analysis and high-end visualization was retired in September 2010. Each node contained 16 processor cores, 128 gigabytes of memory, and 4 terabytes of local disk space. The primary purpose of Verne was to enable data analysis and visualization of simulation data generated on Kraken. HPSS The mass storage facility at ORNL currently consists
https://en.wikipedia.org/wiki/Inductive%20type
In type theory, a system has inductive types if it has facilities for creating a new type from constants and functions that create terms of that type. The feature serves a role similar to data structures in a programming language and allows a type theory to add concepts like numbers, relations, and trees. As the name suggests, inductive types can be self-referential, but usually only in a way that permits structural recursion. The standard example is encoding the natural numbers using Peano's encoding. It can be defined in Coq as follows: Inductive nat : Type := | 0 : nat | S : nat -> nat. Here, a natural number is created either from the constant "0" or by applying the function "S" to another natural number. "S" is the successor function which represents adding 1 to a number. Thus, "0" is zero, "S 0" is one, "S (S 0)" is two, "S (S (S 0))" is three, and so on. Since their introduction, inductive types have been extended to encode more and more structures, while still being predicative and supporting structural recursion. Elimination Inductive types usually come with a function to prove properties about them. Thus, "nat" may come with (in Coq syntax): nat_elim : (forall P : nat -> Prop, (P 0) -> (forall n, P n -> P (S n)) -> (forall n, P n)). In words: for any proposition "P" over natural numbers, given a proof of "P 0" and a proof of "P n -> P (n+1)", we get back a proof of "forall n, P n". This is the familiar induction principle for natural numbers. Implementations W- and M-types W-types are well-founded types in intuitionistic type theory (ITT). They generalize natural numbers, lists, binary trees, and other "tree-shaped" data types. Let be a universe of types. Given a type : and a dependent family : → , one can form a W-type . The type may be thought of as "labels" for the (potentially infinitely many) constructors of the inductive type being defined, whereas indicates the (potentially infinite) arity of each constructor. W-types (resp. M-types) may also be understood as well-founded (resp. non-well-founded) trees with nodes labeled by elements : and where the node labeled by has ()-many subtrees. Each W-type is isomorphic to the initial algebra of a so-called polynomial functor. Let 0, 1, 2, etc. be finite types with inhabitants 11 : 1, 12, 22:2, etc. One may define the natural numbers as the W-type with : 2 → is defined by (12) = 0 (representing the constructor for zero, which takes no arguments), and (22) = 1 (representing the successor function, which takes one argument). One may define lists over a type : as where and 11 is the sole inhabitant of 1. The value of corresponds to the constructor for the empty list, whereas the value of corresponds to the constructor that appends to the beginning of another list. The constructor for elements of a generic W-type has type We can also write this rule in the style of a natural deduction proof, The elimination rule for W-types works similarly to st
https://en.wikipedia.org/wiki/Immunological%20Genome%20Project
The Immunological Genome Project (ImmGen) is a collaborative scientific research project that is currently building a gene-expression database for all characterized immune cells in the mouse. The overarching goal of the project is to computationally reconstruct the gene regulatory network in immune cells . All data generated as part of ImmGen are made freely and publicly available at the ImmGen portal . The ImmGen project began in 2008, as a collaboration between several immunology and computational biology laboratories across the United States, and will be completing its second phase on 2017. Currently, raw data and specialized data browsers from the first and second phases are on www.ImmGen.org. Project Background A true understanding of cell differentiation in the immune system will require a general perspective on the transcriptional profile of each cell type of the adaptive and innate immune systems, and how these profiles evolve through cell differentiation or activation by immunogenic or tolerogenic ligands. The ImmGen project aims to establish the roadmap of these transcriptional states. Gene-expression compendium The first aim of ImmGen is to generate a compendium of whole-genome transcriptional profiles (initially by microarray, now mostly by RNA-sequencing) for nearly all characterized cell populations of the adaptive and innate immune systems in the mouse, at major stages of differentiation and activation. This effort is being carried out by a group of collaborating immunology research laboratories across the U.S. Each of the laboratories brings a unique expertise in a particular cell lineage, and all are employing standardized procedures for cell sorting. The compendium of microarray data currently include over 250 immunologically relevant cell types, from all lymphoid organs and other tissues which are monitored by immune cells. Publications A series of ImmGen reports was published as the compendium accumulated. Some lineage specific reports described hematopoietic stem cells, natural killer cells, neutrophiles, B and T cells, natural killer cells, macrophage, dendritic cells, alpha beta T cells, gamma delta T cells, activated CD8 T cells, innate lymphoid cells, and lymph node stromal cells. Though most of the transcriptional profiling was done on B6 mice, the effect of genetic variation was also studied. The second phase of ImmGen started profiling activated immune cells. The interferon response was used as a test case. Bioinformatic gene regulatory network model Several groups of collaborating computational biologists (Regev & Koller) used the data to reverse-engineer the genetic regulatory network in immune cells, and compare it to the human immune system An initial survey of differential splicing across immune lineages was carried out using both microarrays and RNA-sequencing. Visual representation of data Project participants from Brown University's Computer Sciences Department are also exploring novel representa
https://en.wikipedia.org/wiki/Scientific%20Computing%20and%20Imaging%20Institute
The Scientific Computing and Imaging (SCI) Institute is a permanent research institute at the University of Utah that focuses on the development of new scientific computing and visualization techniques, tools, and systems with primary applications to biomedical engineering. The SCI Institute is noted worldwide in the visualization community for contributions by faculty, alumni, and staff. Faculty are associated primarily with the School of Computing, Department of Bioengineering, Department of Mathematics, and Department of Electrical and Computer Engineering, with auxiliary faculty in the Medical School and School of Architecture. History The Scientific Computing and Imaging Institute started in 1992 as a research group in the University of Utah School of Computing by Chris Johnson and Rob MacLeod. In 1994 this group became the Center for Scientific Computing and Imaging, and in 2000 the name was changed to the Scientific Computing and Imaging (SCI) Institute. In 2007, the SCI Institute was awarded funding from USTAR to recruit more faculty in medical imaging technology. The SCI Institute was recognized as an NVIDIA CUDA Center of Excellence in 2008. In 2011, USTAR funding allowed faculty recruitment for genomic signal processing and information visualization. in 2014, Intel partnered with the SCI Institute to form the Intel Parallel Computing Center for Scientific Rendering to research and develop large scale and in situ visualization techniques for Intel hardware. Research The overarching research objective of the Scientific Computing and Imaging Institute is to conduct application-driven research in the creation of new scientific computing techniques, tools, and systems. Given the proximity and availability of research conducted at the University of Utah School of Medicine, a main application focus is medicine. SCI Institute researchers also apply computational techniques to scientific and engineering sub-specialties, such as fluid dynamics, biomechanics, electrophysiology, bioelectric fields, scientific visualization, parallel computing, inverse problems, and neuroimaging. Open source software releases The SCI Institute releases open source software packages for many of the projects developed by researchers for use by the scientific visualization and medical imaging communities. All projects are released under the MIT software license. Notable projects released by SCI include: SCIRun - Problem Solving Environment (PSE), for modeling, simulation and visualization of scientific problems ImageVis3D - volume rendering application with multidimensional transfer function visualization support Seg3D - interactive image segmentation tool ViSUS - Visualization Streams for Ultimate Scalability ShapeWorks - statistical shape analysis tool that constructs compact statistical point-based models of ensembles of similar shapes that does not rely on any specific surface parameterization FluoRender - interactive rendering tool for confocal microsc
https://en.wikipedia.org/wiki/Meetic
Meetic is a French online dating service founded in November 2001. It is recognized for its intuitive interface and matching algorithms that suggest potential partners to users based on profile attributes. Meetic became a part of the Match Group in 2013. History In November 2001, Marc Simoncini started Meetic as a dating website. It became publicly quoted in October 2005. In 2007, according to JupiterResearch, Meetic was the largest online dating service in Europe with 525,000 subscribers. The service's slogan was "Same game, new rules." In 2013, Meetic was acquired by IAC and thus became a part of the leading Match Group. In December, Meetic launched the Stepout application where people can find out who likes them nearby. Acquisitions In February 2009, the company acquired the European activities of Match.com and grew to more than 30 million subscribers. In December 2012, the Meetic Group bought Massive Media, the parent company of Twoo.com. See also Timeline of online dating services Comparison of online dating services References Online dating services of France Multilingual websites Internet properties established in 2001 IAC (company)
https://en.wikipedia.org/wiki/WiGig
WiGig, alternatively known as 60 GHz Wi-Fi, refers to a set of 60 GHz wireless network protocols. It includes the current IEEE 802.11ad standard and also the IEEE 802.11ay standard. The WiGig specification allows devices to communicate without wires at multi-gigabit speeds. It enables high performance wireless data, display and audio applications that supplement the capabilities of previous wireless LAN devices. WiGig tri-band-enabled devices, which operate in the 2.4, 5 and 60 GHz bands, deliver data transfer rates up to 7 Gbit/s (for 11ad), about as fast as an 8-band 802.11ac transmission, and more than eleven times as fast than the highest 802.11n rate, while maintaining compatibility with existing Wi-Fi devices. The 60 GHz millimeter wave signal cannot typically penetrate walls but can propagate by reflection from walls, ceilings, floors and objects using beamforming built into the WiGig system. When roaming away from the main room, the protocol can switch to make use of the other lower bands at a much lower rate, both of which can propagate through walls. 802.11ay has a transmission rate of 20–40 Gbit/s and an extended transmission distance of 300–500 meters. 802.11ay should not be confused with the similarly named 802.11ax that was released in 2019. The 802.11ay standard is designed to run at much higher frequencies. The lower frequency of 802.11ax enables it to penetrate walls, something that the 11ay standard struggles to do. Although they boast similar speeds, thanks to much more spectrum, 802.11ay can achieve much higher speeds: 277 Gb/s vs. ~3.6Gbit/s (4 streams: 2x 160Mhz @ 1.2Gbit/s + 2x 80Mhz @ 0.6Gbit/s). The name WiGig comes from Wireless Gigabit Alliance, the original association being formed to promote the adoption of IEEE 802.11ad. However, it is now certified by Wi-Fi Alliance. History In May 2009, formation of Wireless Gigabit Alliance was announced to promote the IEEE 802.11ad protocol. In December 2009, The completed version 1.0 WiGig specification was announced. In May 2010, WiGig Alliance announced the publication of its specification, the opening of its Adopter Program, and the liaison agreement with the Wi-Fi Alliance to cooperate on the expansion of Wi-Fi technologies. In June 2011, WiGig announced the release of its certification-ready version 1.1 specification. In December 2012, the IEEE Standards Association published IEEE 802.11ad-2012 as an amendment to the overall IEEE 802.11 standard family. In 2016, Wi-Fi Alliance launched certification program for WiGig products. The second generation WiGig standard, IEEE 802.11ay, was published on July 28, 2021. Specification The WiGig MAC and PHY Specification, version 1.1 includes the following capabilities: Supports data transmission rates up to 7 Gbit/s – a bit over eleven times as fast as the highest 802.11n rate Supplements and extends the 802.11 Media Access Control (MAC) layer and is backward compatible with the IEEE 802.11 standard Physical layer enabl
https://en.wikipedia.org/wiki/Marc%20J.%20Lane
Marc J. Lane (born 1946) is an American attorney and businessman. He is also a founding partner of the Chicago chapter of the Social Enterprise Alliance, a network of philanthropy-minded investors. Lane was involved in creation of the legislation to allow low-profit limited liability companies in Illinois. Education and early career Lane graduated from Northwestern University School of Law in 1971 and subsequently founded The Law Offices of Marc J. Lane. In 1985, he established his own NASD-licensed (now the Financial Industry Regulatory Authority (FINRA)-licensed) broker-dealer. By the year 2002, Marc J. Lane Wealth Group included The Law Offices of Marc J. Lane, an investment advisory, a broker-dealer and a merchant banking affiliate. Career Lane undertook an eight-year research project to determine how investment choices can be utilized to communicate clients' values, along with their money, to heirs. In 2003, Lane developed a new socially responsible investing approach, termed Advocacy Investing. In 2005, he published a book on the subject entitled Profitable Socially Responsible Investing? An Institutional Investor's Guide. Lane's investment strategy generated a result that beat the Russell 3000 benchmark by an annual return of 2.53% over the eight years ending December 31, 2003. Lane's approach was discussed with both affirmative and skeptical views by the mainstream media. The Wall Street Journal commented that Lane's theories added a new variation to the socially responsible theme. "Lane made the case that the way to do right by your conscience and your portfolio is to drop the typical SRI strategy of 'negative screening.' Instead, Lane's way is to match the specific values of an investor with companies that have similar operational values. For example, a food bank with an endowment to invest would want to buy the stock of a company with a good human rights record, despite the fact that this company might also happen to produce beer." Elizabeth Wine, reporter for On Wall Street magazine, noted that Advocacy Investing has become the new generation of socially responsible investing. She wrote, "Advocacy investing pushes the idea of sustainability, not just in the narrow environmental sense, but also in the sense of a company's long term potential to compete and succeed." William Baue cautioned the readers to take his findings with the same grain of salt as he sprinkles on others' research as Lane excluded mutual funds outside the purview of his study in his book for practical reasons. A book on corporate governance, Representing Corporate Officers and Directors, was published in 1987, and revised in 2005 and in 2010. His Advising Entrepreneurs: Dynamic Strategies for Financial Growth was published by Wiley in 2001. He is vice chair of the Cook County Commission on Social Innovation, and was formerly chairman of the Task Force on Social Innovation, Entrepreneurship, and Enterprise of Illinois. Lane is one of the drafters of the Illinoi
https://en.wikipedia.org/wiki/Codata
Codata, Co-data or CODATA may refer to: Committee on Data for Science and Technology, publishers of the CODATA recommended values of physical constants Coinductively defined data types in computer science CoData (company), a former computer hard disk start-up from Colorado, then merged in Conner Peripherals. See also Data (disambiguation)
https://en.wikipedia.org/wiki/Dataproducts
Dataproducts Corporation was an early manufacturer of computer peripheral equipment. Overview Initially known as Data Products, the company was founded by Erwin Tomash in 1962 in order to take controlling interest of Telex's Data Systems Division. The division was behind on a contract to deliver disk drives to General Electric. Dataproducts was able to complete the product and deliver to GE and later Ferranti, ICL and RCA. Sustained by the disk drive business and Informatics, Data Products began development of their first line printer. Introduced in 1963, the 3300 was a 300 line per minute drum printer that used a moving coil actuator for the print hammer. In 1966, core memory was added to the product line. With heightened sales and earnings, Data Products moved to a new site in Woodland Hills, Los Angeles, California in 1968. They started acquiring other businesses, including Staff Dynamics, a personnel agency and Uptime, a manufacturer of card readers. Graham Tyson replaced Tomash as CEO in 1971. The disk business was ailing in the face of increased competition and finally discontinued. Dataproducts switched from drum to band technology in the late 1970s and added dot matrix printers along with a series of thermal printers sourced from Olivetti. The telecommunications company Stelma was purchased and Data Card was formed to manufacture plastic card embossing equipment. Daisy wheel printers were added to the line with a purchase of the business from Plessey in 1978. A joint project with Exxon yielded a series of solid ink printers. The Exxon printer division was Danbury Systems Division where 6 members were hired by Howtek, Inc, the company producing the Pixelmaster Solid ink Color printer. Howtek was sued by Dataproducts over the use of hot-melt ink. This delayed shipment of the Howtek Pixelmaster for about 2 years or until 1986 and also increased the manufacturing cost of the product even though the suit was dropped by Dataproducts. Howtek was in negotiations with Apple for this color printer at the time. Dataproducts used Toshiba engines for their first laser printers in 1989. Legal battles with Tektronix and Apple over the solid ink patents drained resources and ended with Apple discontinuing their product and Tektronix paying royalties. Jack C. Davis, 47, a former Harris Corporation senior vice president, replaced Graham Tyson as chairman and chief executive in May, 1986. By 1989, net income had dropped from a high of $27.7 million to $3.8 million, and Dataproducts fought off takeover attempts by a consortium. Dataproducts was purchased by Hitachi Koki Co. Ltd., a unit of Hitachi in 1990. Dataproducts later used Fuji Xerox engines for their Typhoon series of laser printers. The LZR1560/1580 was OEMed as the Apple LaserWriter Pro 810 in 1993. In 1998, the LZR 5200 continuous feed laser printer was announced. The Dataproducts brand name was used until it was formed into Hitachi Koki Imaging Systems in 1999. Clover Technologies Grou
https://en.wikipedia.org/wiki/SMX
SMX may refer to: As an abbreviation: SMX (operating system), a Unix-like simulator on SPARC, the "SunOS/Solaris MINIX" Standard Musical Expression, a representation of simple music in ASCII that was used in some DOS software such as QBasic SMX Convention Center (company), an events venue management company in the Philippines SMX Convention Center Manila, Pasay, Philippines Sulfamethoxazole, an antibiotic Honda S-MX, a minivan Spatial multiplexing, MIMO wireless transmission technique Singapore Mercantile Exchange SmX RNA and SmY RNA, ribonucleic acids in nematode worms S.M.X., director of Revelation at the 1999 New York Underground Film Festival StepManiaX, a rhythm game by Step Revolution As a code: Santa Maria Public Airport, in California, US, IATA code C.A.I. First, regional Italian airline, ICAO airline code SMTC Corporation, Canada, TSX/Toronto ticker code Sanmenxia city in Henan, China, governmental code SMX Sendmail X, now MeTA1, mail server coded smX Special Mobile Machine—Exempt, prefix SMX, on vehicle registration plates of Colorado
https://en.wikipedia.org/wiki/DWKI-TV
RPN DZKI-TV, channel 10, is a television station of Radio Philippines Network. Its new state of the art transmitter is located at Bonacua Building, Iriga-Baao road, Brgy. San Nicolas, Iriga City, Camarines Sur. This station underwent rehabilitation and is now broadcasting in full power, was officially relaunched as CNN Philippines. Areas of coverage Market audience Iriga, Naga and the province of Camarines Sur and also throughout Bicol Region (especially in Northern Albay) Note: Areas receiving signals may vary. This channel had Co-channel interference with ABS-CBN TV 10 Tabaco until 2020, when it was shut down due to franchise expiration. See also Radio Philippines Network List of Radio Philippines Network affiliate stations Television stations in Camarines Sur Radio Philippines Network stations Television channels and stations established in 1972
https://en.wikipedia.org/wiki/Pierre%20Decock
Pierre Decock (born 19 August 1959 in Belgium), is a Belgian-Luxembourgish historian, writer, comic draftsman, illustrator, painter, computer scientist and financial adviser. He has lived and worked in Luxembourg since 1985 and became a citizen in 2003. He writes in French language. Early life He studied contemporary history. Historian Decock began his career as a historian. He published articles on the “Dame blanche”, a secret network in the First World War, and a biography of Gabrielle Petit, a Belgian heroine in that war. Luxembourg In 1985, Decock settled in Luxembourg as a computer scientist and financial adviser. He illustrated some publications and drew comics, particularly in the child newspaper “Zack.” His first novel, Toccata, is similar to The Da Vinci Code, with an original composition of Bach playing a central role. The story is set in Luxembourg and in Baden-Württemberg. In 2008 Toccata received the “Reader prize of the Greater Region” (Prix des lecteurs de la Grande-région). His second novel, De Profundis, sets the young Luxembourg policeman João Da Costa Rebelo after a serial killer. Selected publications La Dame Blanche 1916-1918; Revue belge d’histoire militaire XXVII-3. Toccata; Op der Lay, Esch-Sauer; 2007; . De Profundis ... au seuil des ténèbres je t'attendrai; Op der Lay 157. Esch-Sauer; 2009; . Den Tun an de Frunnes: Alles an der Rei; Luxemburgisch von Gaston Zangerlé. Zack Publications. Ed. Saint-Paul, Luxembourg; 1996. * K (nouvelle), in Gréng getëppelt, blo gesträift (anthologie 2009 des Walfer Bicherdeeg), Luxembourg, 2009, p. 114-119. Petite musique de nuit (nouvelle), in Saz fir Saz (anthologie 2010 des Walfer Bicherdeeg), Luxembourg, 2010, p. 56-61. In Articulo Mortis, Editions Guy Binsfeld. Luxembourg. 2011, 223 p. Les corbeaux de Greenwood, Editions Guy Binsfled, 2012, 136 p. Petits plaisirs et entourloupes de la langue française, lulu.com, 2014, 155 p. Tun, Frunnes a co: Décke Gas!; Luxemburgisch von Gaston Zangerlé. Ed. Revue, Luxembourg, 2015. External links Website of Pierre Decock Artikel über Decock auf der Homepage des Saarländischen Rundfunks 20th-century Luxembourgian historians Living people 1959 births 20th-century Belgian historians Luxembourgian writers 21st-century Luxembourgian historians
https://en.wikipedia.org/wiki/Caribe.Net
Caribe.Net, also known as Critical Hub Networks, is a telecommunications company that provides broadband internet access, data center and telephone services in Puerto Rico. The company is headquartered in San Juan. On April 26, 2010 the company received a $25.7 million federal award from the National Telecommunications and Information Administration for the Puerto Rico Bridge Initiative. History Caribe.Net was founded in 1994 and was the first internet service provider in Puerto Rico. The company was the first to offer the following services on the island: Commercial internet access network Individual dial-up TCP/IP service SLIP connectivity service PPP connectivity ISDN ITU-T V.90 24-hour technical support Online subscription services Online account management LAN-based dial-up TCP/IP Commercial internet access to companies T1 and burstable T1 service Multi-T1 bonded service Private IP network (intranet/VPN) Virtual ISP (VSP) Tier 1 backbone ATM/Frame Relay architecture 100% guaranteed uptime for hosting services Independent facilities-based ISP Free peering Guaranteed commercial quality of service (SLA) Colocation services Internet data center Disaster recovery services In-room broadband services to tourism industry (HotelAccess) Wireless DSL Off-site, off-island secure backup services In 1999, Caribe.Net was acquired by PSINet, the largest independent facilities-based ISP in the world. In 2001, the company was acquired back by the original shareholders. Caribe.Net was also co-founder of the Internet Society of Puerto Rico and Network Access Point (NAP) of the Caribbean. In 2007, Caribe.Net teamed up with Voz to offer Enterprise-Level Telephone Services VoIP over Caribe.Net's Internet services. In 2010, Critical Hub Networks Inc. received a $25.7 million ARRA grant through the U.S. Department of Commerce to bridge the technological divide, boost economic growth, create jobs, and improve education and health care through the improvement of broadband internet services in Puerto Rico. The project awarded is the Puerto Rico Bridge Initiative. On February 22, 2011, Critical Hub Networks officially inaugurated the Puerto Rico Bridge Initiative, which established the PRBI Internet Exchange Point (IXP) in San Juan, Puerto Rico. Congressman Pedro Pierluisi participated in the inauguration event. References External links Caribe.Net Official Site Puerto Rico Bridge Initiative Official Site National Telecommunications and Information Administration Congressman Pedro R. Pierluisi Inauguration Statement Companies based in San Juan, Puerto Rico Internet service providers of Puerto Rico 1994 establishments in Puerto Rico Companies established in 1994
https://en.wikipedia.org/wiki/Nelson%E2%80%93Aalen%20estimator
The Nelson–Aalen estimator is a non-parametric estimator of the cumulative hazard rate function in case of censored data or incomplete data. It is used in survival theory, reliability engineering and life insurance to estimate the cumulative number of expected events. An "event" can be the failure of a non-repairable component, the death of a human being, or any occurrence for which the experimental unit remains in the "failed" state (e.g., death) from the point at which it changed on. The estimator is given by with the number of events at and the total individuals at risk at . The curvature of the Nelson–Aalen estimator gives an idea of the hazard rate shape. A concave shape is an indicator for infant mortality while a convex shape indicates wear out mortality. It can be used for example when testing the homogeneity of Poisson processes. It was constructed by Wayne Nelson and Odd Aalen. The Nelson-Aalen estimator is directly related to the Kaplan-Meier estimator and both maximize the empirical likelihood. References Further reading External links Life insurance Reliability engineering Survival analysis
https://en.wikipedia.org/wiki/Dummy%20variable
The term dummy variable can refer to either of the following: Bound variable, in mathematics and computer science, a placeholder variable Dummy variable (statistics), an indicator variable
https://en.wikipedia.org/wiki/Stun
Stun or STUN may refer to: STUN, a computer network protocol and methods Stun (Bloody Roar), a character in the Bloody Roar video game series Stun shot, in cue sports S.T.U.N. (band) See also Stunning, a process of rendering animals unconscious prior to slaughter Stunner (disambiguation)
https://en.wikipedia.org/wiki/European%20Network%20Against%20Racism
The European Network Against Racism (ENAR) is an EU-wide network of anti-racist NGOs. ENAR aims to end structural racism and discrimination and advocates for equality and solidarity for all in Europe. It connects local and national anti-racist NGOs throughout Europe and acts as an interface between its member organisations, and the European institutions. It voices the concerns of ethnic and religious minorities in European and national policy debates. ENAR is funded by the European Union, the Open Society Foundations, the Joseph Rowntree Charitable Trust, and the Sigrid Rausing Trust. History ENAR is an outcome of the 1997 European Year Against Racism. Between March and September 1998, more than 600 NGOs were involved in national and European round table consultations to discuss the viability of such a structure. The 1998 Constitutive Conference of the European Network Against Racism brought together more than 200 representatives of these organisations to draw up a common programme of action. Vision and mission ENAR's vision aims at guaranteeing equality for all, and recognizes the benefits of a diverse and racism-free Europe for European society and economy. Its mission is to end structural racism in the European Union and to build structures, institutions and attitudes based on race equality and equal distribution of power, privileges and rights. Areas of work The following are some of the fields in which ENAR works: Racist crime and speech Employment Security and policing Equality data collection Migration and integration Specific forms of racism, including Afrophobia, Antigypsyism, Islamophobia and Antisemitism Along with Equinox, ENAR has been denouncing the whiteness of the European institutions and argued for a greater representation or racialised communities in the policy discussions at the EU level. Controversy Links with the Muslim Brotherhood ENAR has been linked to the Muslim Brotherhood by MEP Frederique Ries, a claim also extended to its member organization FEMYSO. Michaël Privot, ENAR's former director, publicly admitted he had joined and then left the Muslim Brotherhood. Members ENAR members include a wide range of organisations, from grassroots to advocacy organisations, from information centres, to trade unions, to faith-based organisations. Member countries NGOs in the following countries form the coalition: References External links Anti-racist organizations in Europe International organisations based in Belgium Opposition to Islamophobia
https://en.wikipedia.org/wiki/Microsurgeon%20%28video%20game%29
Microsurgeon is a maze-like video game published by Imagic in 1982 for the Mattel Intellivision game console. The game was ported to the TI-99/4A computer and the IBM PCjr. Microsurgeon was re-released as part of the Intellivision Rocks collection. Plot A tanker carrying hazardous material was damaged during an accident, allowing the gas inside to escape. Those exposed to the fumes begin to suffer a range of immune disorders, such as rampant bacterial infections, rapidly growing tumors, and widespread tar deposits in the lungs. Patients are being rushed to Xenon Medical Center for emergency microsurgery before their conditions become fatal; the player assumes the role of a member of the surgical staff. Gameplay Microsurgeon is one of the first published video games related to health or health education. The player must guide a tiny medical device, the Robot Probe, throughout a patient's body to treat the ailments affecting various organs, such as bacterial infections, brain tumors, cholesterol blockages in arteries, and tapeworms. At the start of the game, the player is presented with the patient's status chart, which shows information on each individual organ as well as an overall condition, ranging from "Good" to "Terminal." The Robot Probe is equipped with three different treatments: ultrasonic rays, antibiotics, and aspirin. The treatment to be used depends on the ailment; for example, bacteria only respond to antibiotics, while viruses can only be temporarily disabled with aspirin. If the Robot Probe moves outside of the patient's blood vessels or lymphatic system, phagocytes (roaming white blood cells) will attack it and start to drain its power. Moving the Robot Probe and dispensing treatments also use up power. Any system status will slowly deteriorate toward "Terminal" until and unless it is brought up to "Good" with appropriate treatment. The ultimate goal is to bring the patient's overall status up to "Good" and exit the patient's body through the eye, ear, nose, or mouth before the power runs out. The game ends when the power reaches zero, the player pilots the Robot Probe out of the body, or the overall status reaches "Terminal." The player's score (represented as the total bill for the surgery) is reported only at the end of the game, and is determined by several factors such as the overall difficulty of the surgery and the patient's final status. Reception Danny Goodman of Creative Computing Video & Arcade Games tested Microsurgeon at the summer 1982 Consumer Electronics Show. He wrote "From preliminary play, this cartridge looks like a 'must' for Intellivision owners for both graphics and unique game theme". It was noted as "among the most innovative computer/game software for 1982-1983" at the Consumer Electronics Show in Las Vegas. It tied for "Most Original Game" of the year in Electronic Fun with Computers & Games magazine, December 1983. The game appeared on the cover of IEEE Spectrum, December 1982, and on The Annivers
https://en.wikipedia.org/wiki/American%20Democracy%20Television
American Democracy Television (ADTV) provides nonpartisan programming about representative democracy to Public, educational, and government access (PEG) cable TV channels across the United States. General ADTV programming is produced by The Alliance for Representative Democracy a partnership combining the resources of the National Conference of State Legislatures, Trust for Representative Democracy; the Center for Civic Education and the Center on Congress at Indiana University. The project is funded by the U.S. Department of Education under the Education for Democracy Act approved by the U.S. Congress. ADTV has free programming available to public-access television, educational-access television, government-access television channels nationwide, and currently distributes to nearly 500 cable TV stations. Selected topics How representative democracy works at the local, state and national levels That compromise and disagreement are an important part of our system of democracy How their ideas and special interests are represented Ways to make their voices heard In its first 2 years, ADTV spread to all 50 states and Washington, DC. The programming currently reaches over 12 million households on a regular basis and continues to educate the public about representative democracy, with its stated goal to challenge cynicism and reinvigorating the public's perception of its government. Awards ADTV Flight 4 won the 2005 Gold Marcom Award. References ADTV official site National Conference of State Legislatures official site Center on Congress official site Center for Civic Education official site PSAs on YouTube American public access television Television channels and stations established in 2005
https://en.wikipedia.org/wiki/Web%20storage
Web storage, sometimes known as DOM storage (Document Object Model storage), is a standard JavaScript API provided by web browsers. It enables websites to store persistent data on users' devices similar to cookies, but with much larger capacity and no information sent in HTTP headers. There are two main web storage types: local storage and session storage, behaving similarly to persistent cookies and session cookies respectively. Web Storage is standardized by the World Wide Web Consortium (W3C) and WHATWG, and is supported by all major browsers. Features Web storage differs from cookies in some key ways. Purpose Cookies are intended for communication with servers; they are automatically added to all requests and can be accessed by both the server and client-side. Web storage falls exclusively under the purview of client-side scripting. Web storage data is not automatically transmitted to the server in every HTTP request, and a web server can't directly write to Web storage. However, either of these effects can be achieved with explicit client-side scripts, allowing for fine-tuning the server's desired interaction. Storage size Cookies are restricted to 4 kilobytes. Web storage provides far greater storage capacity: Opera 10.50+ allows 5 MB Safari 8 allows 5 MB Firefox 34 allows 10 MB (formerly 5 MB per origin in 2007) Google Chrome allows 10 MB per origin (formerly 5 MB per origin) Internet Explorer allows 10 MB per storage area Local and session storage Web storage offers two different storage areas—local storage and session storage—which differ in scope and lifetime. Data placed in local storage is per origin—the combination of protocol, host name, and port number as defined in the same-origin policy. The data is available to all scripts loaded from pages from the same origin that previously stored the data and persists after the browser is closed. As such, Web storage does not suffer from cookie Weak Integrity and Weak Confidentiality issues, described in sections 8.5 and 8.6. Session storage is both per-origin and per-instance (per-window or per-tab) and is limited to the lifetime of the instance. Session storage is intended to allow separate instances of the same web app to run in different windows without interfering with each other, a use case that's not well supported by cookies. Interface and data model Web storage provides a better programmatic interface than cookies because it exposes an associative array data model where the keys and values are both strings. Usage Browsers that support web storage have the global objects sessionStorage and localStorage declared at the window level. The following JavaScript code can be used on these browsers to trigger web storage behavior:// Store value on browser for duration of the session sessionStorage.setItem('key', 'value'); // Retrieve value (gets deleted when browser is closed and re-opened) ... alert(sessionStorage.getItem('key')); // Store value on the browser beyond the durat
https://en.wikipedia.org/wiki/Mole%20map%20%28chemistry%29
In chemistry, the mole map is a graphical representation of an algorithm that compares molar mass, number of particles per mole, and factors from balanced equations or other formulae. Stoichiometry
https://en.wikipedia.org/wiki/Qatar%20Radio
Qatar Radio (), abbreviated as QR, is a Qatar Government owned public service national radio station in Qatar which is owned and run by the public service broadcasting network Qatar General Broadcasting and Television Corporation (QGBTC). Broadcasting is multilingual, with Arabic, English, French and Urdu being represented. History In 1965, Qatar's first radio station was created. It was broadcast on Fridays and relayed the Quran, religious programs and news. This event paved the way for the official formation of Qatar Radio on 25 June 1968. Broadcasts were made from the Al Kheesa transmission station. Qatar Radio started broadcasting on a medium wave in Arabic for a total daily duration of five hours during two periods: one and a half hours in the morning, and three hours in the evening. At the close of 1968, the transmission was upgraded from 10 kilowatts to 50 kilowatts. Transmission hours were raised to nine hours in 1969, and by 1970 had been increased to 13 hours. By 1982 there were nineteen hours of transmission, and finally in 2002 Qatar Radio began non-stop transmission. In an effort to cater to non-Arabic speakers, an English program was established in 1971. It had a transmission duration of one hour at that time, eventually increasing to 19 hours by 2004. In 1979, Qatar Radio installed a new short-wave transmitter which assisted in increasing the number of programs and transmission time. The station began broadcasting Urdu transmissions in 1980 on a medium wavelength for a duration of one hour. This time was raised to three hours in 1989. A program for French speakers was launched in 1985 on a medium wave, having a daily up-time of three hours. The Holy Quran service was launched by Qatar Radio in 1992. It discusses various aspects of the Quran and tackles modern-day issues in the context of Islam. Eurovision Song Contest Qatar Radio (QR) was an associate member of the European Broadcasting Union (EBU) in 2009, but was removed sometime later possibly because of inactivity. All competing countries of the Eurovision Song Contest must be active members of the Union. The broadcaster first revealed on 12 May 2009 that they were interested in becoming active members of the Union, which would allow the nation to compete in the Contest. Qatar Radio has stated that they hope to join Eurovision by 2011. Qatar first became involved in the Contest at the 2009 edition, where the broadcaster sent a delegation to the contest and broadcast a weekly radio show called '12pointsqatar' dedicated to Eurovision, which received favourable responses and has initiated the further involvement of Qatar in Eurovision. Qatar Radio has said that they feel that they would be happy to join all other competitors in the contest, including Israel if Qatar gets membership. Qatar is required to have a broadcaster which has at least associate membership of the EBU in order to have a chance to take part, as Qatar Radio is only a radio station and Qatar lies ou
https://en.wikipedia.org/wiki/IBM%201402
The IBM 1402 was a high speed card reader/punch introduced on October 5, 1959 as a peripheral input/output device for the IBM 1401 computer. It was later used with other computers of the IBM 1400 series and IBM 7000 series product lines. It was adapted as the IBM 1622 Card Read-Punch for the IBM 1620 and provided the basic design for the models 2501, 2520 and 2540 equipment used with the IBM System/360 product line. Specifications Card reader Card read speed up to 800 punched cards per minute (models 1, 2 and 3) or 450 cards per minute (models 4, 5 and 6). Card input file for 3,000 cards (models 1, 2, 3, 4 and 6) or feed hopper for 1,200 cards (model 5). Three stackers (NR, 1, 2/8) with approximately 1,000-card capacity hold cards after they are read. Card punch Card punch speed up to 250 cards per minute (all models). Feed hopper for 1,200 cards (all models). Three stackers (NP, 4, 2/8) of approximately 1,000-card capacity after cards are punched. The 2/8 stacker is shared by the card reader and punch, but timing considerations make it difficult to use for merging operations. Option to read from the punch feed. Punched card format The 1402 uses IBM 80-column punched card format, although an option was available to process 51-column cards. A column Binary option allowed cards with any combination of holes to be read and punched. Error checking Both the reader and punch mechanisms count the number of holes in each column at a separate station. An error is indicated and the mechanism stops (if the I/O check stop switch is on) if the number of holes counted at the read station differs from the number of holes counted at the first, check station (for reading) or punched at the first station (for punching). In addition, when not operating in column-binary mode, the reader indicates an error and stops (if the I/O check stop switch is on) if the punch combination in any column does not indicate a valid character. Notes 1402 1402
https://en.wikipedia.org/wiki/CIML%20community%20portal
The computational intelligence and machine learning (CIML) community portal is an international multi-university initiative. Its primary purpose is to help facilitate a virtual scientific community infrastructure for all those involved with, or interested in, computational intelligence and machine learning. This includes CIML research-, education, and application-oriented resources residing at the portal and others that are linked from the CIML site. Overview The CIML community portal was created to facilitate an online virtual scientific community wherein anyone interested in CIML can share research, obtain resources, or simply learn more. The effort is currently led by Jacek Zurada (principal investigator), with Rammohan Ragade and Janusz Wojtusiak, aided by a team of 25 volunteer researchers from 13 different countries. The ultimate goal of the CIML community portal is to accommodate and cater to a broad range of users, including experts, students, the public, and outside researchers interested in using CIML methods and software tools. Each community member and user will be guided through the portal resources and tools based on their respective CIML experience (e.g. expert, student, outside researcher) and goals (e.g. collaboration, education). A preliminary version of the community's portal, with limited capabilities, is now operational and available for users. All electronic resources on the portal are peer-reviewed to ensure high quality and cite-ability for literature. Further reading Jacek M. Zurada, Janusz Wojtusiak, Fahmida Chowdhury, James E. Gentle, Cedric J. Jeannot, and Maciej A. Mazurowski, Computational Intelligence Virtual Community: Framework and Implementation Issues, Proceedings of the IEEE World Congress on Computational Intelligence, Hong Kong, June 1–6, 2008. Jacek M. Zurada, Janusz Wojtusiak, Maciej A. Mazurowski, Devendra Mehta, Khalid Moidu, Steve Margolis, Toward Multidisciplinary Collaboration in the CIML Virtual Community, Proceedings of the 2008 Workshop on Building Computational Intelligence and Machine Learning Virtual Organizations, pp. 62–66 Chris Boyle, Artur Abdullin, Rammohan Ragade, Maciej A. Mazurowski, Janusz Wojtusiak, Jacek M. Zurada, Workflow considerations in the emerging CI-ML virtual organization, Proceedings of the 2008 Workshop on Building Computational Intelligence and Machine Learning Virtual Organizations, pp. 67–70 See also Artificial Intelligence Computational Intelligence Machine Learning National Science Foundation References External links Machine learning International research institutes
https://en.wikipedia.org/wiki/Autocommit
In the context of data management, autocommit is a mode of operation of a database connection. Each individual database interaction (i.e., each SQL statement) submitted through the database connection in autocommit mode will be executed in its own transaction that is implicitly committed. A SQL statement executed in autocommit mode cannot be rolled back. Autocommit mode incurs per-statement transaction overhead and can often lead to undesirable performance or resource utilization impact on the database. Nonetheless, in systems such as Microsoft SQL Server, as well as connection technologies such as ODBC and Microsoft OLE DB, autocommit mode is the default for all statements that change data, in order to ensure that individual statements will conform to the ACID (atomicity-consistency-isolation-durability) properties of transactions. The alternative to autocommit mode (non-autocommit) means that the SQL client application itself is responsible for ending transactions explicitly via the commit or rollback SQL commands. Non-autocommit mode enables grouping of multiple data manipulation SQL commands into a single atomic transaction. Some DBMS (e.g. MariaDB) force autocommit for every DDL statement, even in non-autocommit mode. In this case, before each DDL statement, previous DML statements in transaction are autocommitted. Each DDL statement is executed in its own new autocommit transaction. See also Commit Transaction References Databases
https://en.wikipedia.org/wiki/BotHunter
BotHunter is a free utility for Unix, which aims at detecting botnet activity within a network. It does so by analyzing network traffic and comparing it to patterns characteristic of malicious processes. Version 1.7.2 was current . An earlier version ran under Microsoft Windows XP, but was not mentioned on the Web site after the release of 1.7.2. In order to support this application, the developer, SRI International, had collected more than 10,000 samples of malware by 2008. The BotHunter Web site states that the software was made possible in part by a research grant from the U.S. Army Research Office. References External links BotHunter website Computer security software SRI International software
https://en.wikipedia.org/wiki/Browstat
Browstat is a Microsoft utility for Windows that can monitor the browser service within a local area network (LAN). It can help diagnose a Microsoft network by listing machines and servers currently using the Browser Service, or by showing usage statistics. The BROWSTAT.exe command-line tool is used to get a domain, browser, and PDC info. External links Browstat documentation on Microsoft.com References Microsoft software
https://en.wikipedia.org/wiki/Customer%20Service%20Assurance
Customer Service Assurance (CSA) in telecom and Internet services means the collection of Communications Service Provider (CSP) customer usage information from all practical sources including network traffic, network devices, content servers, management databases and user devices to ensure customer service quality is consistent with CSP expectations. CSA involves, when needed, real-time monitoring of a customer’s purchased services and in analyzing this data to note trends, preferences, usage problems and eventually proactive assurance of customer-level or service-level issues. Companies that provide CSA software and technology to CSPs, include Subtonomy, Polystar, Accanto Systems, Telecordia, and Tekelec. Service assurance is model that is centered on the concept of maximizing customer satisfaction. The belief is that such practices inevitably maximize the long-term profitability of an organization or enterprise. Numerous quality-regulating methods are often interwoven with CSA services. Under the CSA umbrella, it is typical to also find Quality Assurance (QA) and Quality Control (QC). In some cases, service level management (SLM) is also included within this group CSA information can address a number of business issues including the following: Individual user data collection and correlation for troubleshooting and VIP reporting Individualized Service Level Agreement reporting Noting customer preferences of certain network/content combinations. Real-time alarming concerning usage and problem analysis for specific services/group of users. Device configuration troubleshooting and reporting There have been arguments against the effectiveness of CSA in the past due to some of the ways in which the service is implemented. For instance, customer call centers and surveys are often not accurate depending on the customer’s involvement . Additionally, the success of CSA is dependent on what is being measured or analyzed such as service vs. expectations. References Network performance
https://en.wikipedia.org/wiki/Gwlad%20y%20G%C3%A2n
Gwlad y Gân () was a monthly television series that was broadcast on the United Kingdom television network ITV from 1958 to 1964. Featuring traditional Welsh music and song, with costumed performers and choreography, the programme went out on early Sunday evenings. The series, starring Welsh baritone Ivor Emmanuel and supporting cast, expressed a set of ‘feel-good’ values that were wholesome, folksy, rustic, fun-loving and family-oriented. With a solid foundation of musical excellence and a respect for a Welsh musical tradition that held significance for an entire generation, the show caught a mood and struck a chord as it aimed to celebrate Wales within Wales and beyond. Broadcast in Welsh (but with bilingual captions on screen and bilingual voiced-over links), Land of Song was made in Cardiff by Television Wales and the West (TWW) and then distributed or ‘networked’ to ITV stations serving many parts of the country, thus reaching a nationwide audience which, in the early 1960s, peaked at around ten million viewers. The Television Act 1954, which created the UK's second television channel, Independent Television (ITV), prohibited broadcasting on Sundays between 18:15 and 19:15 - unless the programmes were religious or in the Welsh language. The BBC carried religious programmes at this time, so the choice for viewers was dire. The ITV used the Television Act's loophole to transmit throughout the UK a programme in Welsh. Since it was mostly singing, it did not matter that most viewers (including in Wales) did not understand it. Having no competition, it drew very large audiences. The downside was that advertising was not permitted: so the various companies of the ITV network were paying TWW in Cardiff for a programme which generated no income. The upside was that it pulled viewers away from the BBC and, in an era before TV-remote-controls, delivered a large audience to the first entertainment programme, with commercials, at 19:15. ITV’s answer to the Mitchell Minstrels Independent television had been on air in the UK for less than three years when the new TWW company won the franchise to broadcast to Wales and the West of England, beginning its transmissions on 14 January 1958. TWW formed a commitment to broadcasting some programmes in Welsh, and another of its main aims was to provide popular entertainment that could compete with anything produced by the BBC. Gwlad y Gan / Land of Song was conceived to meet both objectives. When Land of Song began in 1958, its only direct rival in providing musical variety on TV was the BBC's The Black and White Minstrel Show. The Mitchell Minstrels had gained instant popularity from their first appearance in a one-off special in 1957, going on to become perennial favourites well into the 1970s. But unlike the BBC programme, TWW's Land of Song ignored the Broadway–West End canon of ‘songs from the shows’ and sought instead to specifically showcase the traditional music of its region of origin. It drew
https://en.wikipedia.org/wiki/Lucerne%20railway%20station
Lucerne railway station () is a major hub of the rail network of Switzerland, in the city of Lucerne in the canton of Lucerne. It is a terminal station serving domestic and international traffic on several rail lines, and is situated in a city centre and waterfront location on the south side of Lake Lucerne. History The first station was opened on edge of Lake Lucerne in 1856 at the end of the Schweizerische Centralbahn main line from Olten and Basel where it connected with the French and German railways. The route of the railway—now the course of Pilatusstrasse (Pilatus Street)—was still undeveloped. The terminal station led directly to the pier for boat services on the lake and to the gates of the city of Lucerne. As a result, the area at the lake shore developed into an important railway junction. In the 19th century it rapidly developed into a hub with the introduction of steam navigation on the lake and the construction of several railway lines: the Gotthard railway, the line to Bern via Wolhusen, the line to Zug and Zürich and the metre-gauge Brünig railway. The first station was made of wood. A new station was opened in 1896 with a large new building with a distinctive cupola. It was turned at almost 90° to the original station with its end to the north towards the bridge to central Lucerne, requiring a significantly changed approach line. The new approach had no level crossings of streets unlike the original route, but instead ran on embankments or in cuttings. The Brünig railway was also integrated into the new station. The tracks were electrified in 1922 along with the line from Olten. By 1910 the new station was nearing its capacity limits and an expansion plan was developed. However, the start of World War I prevented any work being carried out. On the morning of 5 February 1971, fire broke out in the staff quarters of the station. The fire was detected shortly after eight am, and at 8.18 the police was alarmed. That day, the last train arrived 8.56am and the last departure of a train was 9 am. The building burnt fiercely, and within an hour the cupola had collapsed, destroying the station frontage and concourse. The service was restored with temporary buildings, allowing operations to be recommenced. In 1980 a partnership of the Swiss Federal Railways, Swiss Post, the city and canton of Lucerne launched an architecture competition for a comprehensive redevelopment of the station. This also considered the future development of the rail approaches to Lucerne. However, a through station with a tunnel under Lake Lucerne was ruled out. A new station was eventually built, and opened on 5 February 1991, exactly 20 years after its predecessor was destroyed. The new station was planned by the architectural firm of Ammann and Baumann, and their then employee, Santiago Calatrava, designed the concourse of the new station. This is said to be the "heart of the new station, ... a multi-storey, generous sized public space that links the various
https://en.wikipedia.org/wiki/Smoothstep
Smoothstep is a family of sigmoid-like interpolation and clamping functions commonly used in computer graphics, video game engines, and machine learning. The function depends on three parameters, the input x, the "left edge" and the "right edge", with the left edge being assumed smaller than the right edge. The function receives a real number x as an argument and returns 0 if x is less than or equal to the left edge, 1 if x is greater than or equal to the right edge, and smoothly interpolates, using a Hermite polynomial, between 0 and 1 otherwise. The gradient of the smoothstep function is zero at both edges. This is convenient for creating a sequence of transitions using smoothstep to interpolate each segment as an alternative to using more sophisticated or expensive interpolation techniques. In HLSL and GLSL, smoothstep implements the , the cubic Hermite interpolation after clamping: Assuming that the left edge is 0, the right edge is 1, with the transition between edges taking place where 0 ≤ x ≤ 1. A modified C/C++ example implementation provided by AMD follows. float smoothstep (float edge0, float edge1, float x) { // Scale, and clamp x to 0..1 range x = clamp((x - edge0) / (edge1 - edge0)); return x * x * (3.0f - 2.0f * x); } float clamp(float x, float lowerlimit = 0.0f, float upperlimit = 1.0f) { if (x < lowerlimit) return lowerlimit; if (x > upperlimit) return upperlimit; return x; }The general form for smoothstep, again assuming the left edge is 0 and right edge is 1, is is identical to the clamping function: The characteristic "S"-shaped sigmoid curve is obtained with only for integers n ≥ 1. The order of the polynomial in the general smoothstep is 2n + 1. With n = 1, the slopes or first derivatives of the smoothstep are equal to zero at the left and right edge (x = 0 and x = 1), where the curve is appended to the constant or saturated levels. With higher integer n, the second and higher derivatives are zero at the edges, making the polynomial functions as flat as possible and the splice to the limit values of 0 or 1 more seamless. Variations Ken Perlin suggested an improved version of the commonly used first-order smoothstep function, equivalent to the second order of its general form. It has zero 1st- and 2nd-order derivatives at x = 0 and x = 1: C/C++ reference implementation: float smootherstep(float edge0, float edge1, float x) { // Scale, and clamp x to 0..1 range x = clamp((x - edge0) / (edge1 - edge0)); return x * x * x * (x * (6.0f * x - 15.0f) + 10.0f); } float clamp(float x, float lowerlimit = 0.0f, float upperlimit = 1.0f) { if (x < lowerlimit) return lowerlimit; if (x > upperlimit) return upperlimit; return x; } Origin 3rd-order equation Starting with a generic third-order polynomial function and its first derivative: Applying the desired values for the function at both endpoints: Applying the desired values for the first derivative of the function at both endpoints: S
https://en.wikipedia.org/wiki/NV5%20Geospatial%20Solutions
NV5 Geospatial Solutions develops products for the visualization, analysis, and management of geospatial imagery and scientific data. The company develops products such as IDL, ENVI, Jagwire, and Helios which are used in a variety of industries including defense and intelligence, environmental, engineering, aerospace, medical imaging, federal and civil governments, precision agriculture and academia worldwide. History The company's origin can be traced back to 1977 when David Stern was working at the University of Colorado on the Mariner Mars space probes. Stern developed a programming language called Mariner Mars Spectral Editor, which later evolved to IDL, Interactive Data Language, in order to supplement FORTRAN, specifically for data analysis and visualization. As his vision developed, Stern left the university and started working in his attic to improve the programming language. He incorporated Research Systems Inc. (RSI) and released IDL as a proprietary programming language for visualizing data. NASA Goddard Space Center and Ball Aerospace were among the company's early customers. In 1994, the software package ENVI was released. Written in IDL, ENVI is the industry standard for image processing and analysis allowing GIS professionals, remote sensing scientists, and image analysts to extract information from geospatial imagery. RSI was acquired by Eastman Kodak as a wholly owned subsidiary in 2000. Four years later, RSI along with the Remote Sensing Systems division of Eastman Kodak, were sold to ITT Corporation and were renamed ITT Visual Information Solutions. In 2011, ITT Corporation was divided into three standalone companies, and ITT Visual Information Solutions became part of Exelis Inc. along with ITT Defense and Information Solutions. ITT Visual Information Solutions was renamed again to the current Exelis Visual Information Solutions. Exelis Visual Information Solutions was purchased by Harris Corporation in 2015, becoming a subsidiary known as Harris Geospatial Solutions, Inc. In 2019, Harris Corporation merged with L3 Technologies, Inc. and became L3Harris Technologies, Inc. In 2023, NV5 Global, Inc. acquires L3Harris Geospatial Solutions, Inc., renaming it to NV5 Geospatial Solutions, Inc. Products IDL IDL (Interactive Data Language) is a scientific programming language used in particular areas of science, such as astronomy, meteorology, and medical imaging, to create meaningful visualizations out of complex numerical data. ENVI ENVI is an off-the-shelf software program used to visualize, process and analyze geospatial imagery. Jagwire Jagwire is a data ingest, management, image exploitation, and information dissemination tool. References ITT Inc. Remote sensing companies GIS software companies Geospatial intelligence organizations
https://en.wikipedia.org/wiki/Distributed%20Oceanographic%20Data%20Systems
The Distributed Oceanographic Data Systems, or DODS, is a type of server that allows sharing data with remote users or between DODS servers. It is developed by the National Oceanic and Atmospheric Administration, and is based upon the OPeNDAP data transport architecture. References Meteorological data and networks Technical communication
https://en.wikipedia.org/wiki/Multiple%20Species%20Conservation%20Program
The Multiple Species Conservation Program (MSCP) will preserve a network of habitat and open space, protecting biodiversity and enhancing the region's quality of life. The City of San Diego is one of several jurisdictions participating in the MSCP. The City has completed the planning effort to identify core biological resource areas targeted for conservation and has entered into an agreement with the federal and state wildlife agencies to ensure implementation of the resource conservation plan and habitat preserve. Current efforts of City MSCP staff largely focus on project review, preserve assembly, and biological monitoring. External links Official website Nature conservation organizations based in the United States Environment of California
https://en.wikipedia.org/wiki/Bill%20shock
In telecommunications, bill shock is the negative reaction a subscriber can experience if their phone bill has unexpected charges. Bill shock can happen when, for example, a user grossly overuses data applications without an appropriate data plan, or uses a mobile device while roaming (whether domestically or internationally) without understanding the voice or data roaming charges involved. The use of non-geographic telephone numbers in the United Kingdom has also been a major cause of bill shock. Pollster YouGov found that 49% of mobile users have been surprised to see how much they have been charged for calling non-geographic numbers and 90% believe organisations should make the cost of these calls clearer. According to Ofcom, UK consumers paid around £1.9 billion for calls to non-geographic numbers in 2009. Impact In some cases bill shock can be extreme, usually a result of a mobile bill priced into the tens of thousands of dollars. These cases often make news both locally and nationally due to the sense of compassion the experience provokes, and the suitability the story has for mainstream media. This can result from another company - not the customer's provider - refusing to waive roaming charges. In Europe and the United States, governments are becoming more involved with monitoring issues around bill shock and implementing proper regulations around smart devices that protect consumers. Notably, the U.S. Federal Communications Commission in the United States handles nearly all FCC domestic wireless telecommunications programs, policies, and outreach initiatives. A survey in 2010 revealed that over 30 million Americans are impacted by bill shock each year. It can be difficult to prevent bill shock while using a mobile device because monitoring the data, voice and SMS and roaming consumption on a mobile device is difficult. It can also be difficult for phone companies to alert their customers to potential impending bill shock, because various third-party companies impose various roaming charges (a mobile phone company pays other companies for its customer's usage of their networks), so the customer's usage of networks in different areas of the country or the world will result in different charges. Migratory birds can be particularly prone to bill shock; in 2019 a single Russian eagle used up the entire telecoms budget of a research project, when it unexpectedly flew to Iran where it was charged over three times more for each SMS message it sent. Mobility is an important trend in the marketplace as consumers and businesses continue to embrace smart devices. The following mobility trends are noteworthy as they demonstrate the continued dependence on smart devices, and all of these can have billing effects. If consumers use products or services without checking pricing, they may experience bill shock. Consumerization of IT: Employee-owned devices on the corporate network. Consumerization is driving the adoption of mobility in the workpl
https://en.wikipedia.org/wiki/WLIK
WLIK is a radio station licensed to Newport, Tennessee with a classic hits/oldies format, broadcasting on 1270 AM and 97.9 FM. Its programming includes high school and University of Tennessee sports as well as community-oriented news and information for Cocke County, Tennessee. History WLIK signed on in April 1954 with 1,000 watts, as one of three radio stations owned by Arthur Wilkerson of Lenoir City, Tennessee. Ray Shirley was the first announcer. The station increased its power to 5,000 watts in 1955. WLIK's office, studios and transmission facilities were seriously damaged by a fire in 1958, reputed to be caused by a roof mounted neon sign. The station quickly resumed operations, with a mostly concrete block structure replacing the former wooden building. In 1968 WLIK moved its transmitter to Rock City and began broadcasting full-time, utilizing a 3-tower directional antenna array to allow the station to operate with 500 watts after sunset. Ira B. Crisp served as station manager from 1954 until 1962, and Dwight Wilkerson, Arthur's son, took over after that and continues as president of the station today. WLIK began duplicating the programming on 1270 AM on FM at 97.9 in 2016. On air personalities include/have included Dwight Wilkerson Angie Wilkerson Brian Evens Marty Ricker Jay Braswell Rick Brooks Johnny Naillon Steve Wilhoit Gaylen Carpenter Jason Fox Matthew Kemper Curtis Hance References External links Official website LIK Oldies radio stations in the United States
https://en.wikipedia.org/wiki/Percept%20%28information%20technology%29
A percept in the information technology industry is a term used in the pricing of data transfer. For example, rather than charging an individual (who is remotely retrieving data from say a weather sensor or a GPS device) by the size of the data, a company would charge that individual by the percept. Here a percept would constitute a statistical data point, such as a GPS location. Pricing per percept would mean that a customer or individual using that GPS device would actually be charged per unit of true economic value to him/her, a GPS location datapoint, rather than on the size of that datapoint in bits/bytes/kilobytes, etc. References Data transmission Pricing
https://en.wikipedia.org/wiki/McCann
McCann may refer to: McCann (surname) McCann (company), advertising agency McCann Worldgroup, network of marketing and advertising agencies Marist College athletic facilities McCann Arena James J. McCann Baseball Field McCann Rescue Chamber
https://en.wikipedia.org/wiki/Noise%20%28TV%20programming%20block%29
Noise (stylized in capital letters) was a Fuji TV late night anime programming block, broadcast each Wednesday night from 26:08 to 26:38. It is Fuji TV's second late night anime-themed time block, after noitaminA, which airs every Thursday night. It first began on October 15, 2008, with Michiko to Hatchin. After broadcasting three anime series, the block was cancelled in favor of extending noitaminA which started airing two productions at once instead of only one. Programs References Fuji News Network Television networks in Japan
https://en.wikipedia.org/wiki/Storming%20the%20Reality%20Studio
Storming the Reality Studio: A Casebook of Cyberpunk and Postmodern Science Fiction, edited by Larry McCaffery, was published by Duke University Press in 1992, though most of its contents had been featured in Mississippi Review in 1988. This collection of fictions by well-known contemporary writers and critical commentary by postmodern theorists addresses issues concerning how cyberpunk functions within postmodern culture. This casebook became the criterion for promoting the interaction between the genre of science fiction and the literary avant-garde. In his review of the book in Science Fiction Studies, John Fekete writes, "McCaffery likes to read good books; and his role, as in this text, in introducing interesting and off-beat literary artifacts to readers who might otherwise miss them, is to provide a laudable service with an infectious enthusiasm." Lance Olsen says in his review: "We're talking Zeitgeist here. Nothing more, nothing less. That's what Larry McCaffery's onto in this brilliant new compilation he's edited that you've just got to read.... You can't help getting excited about this collection. You just can't. It does nothing less than assemble a 1990s canon of postmodernity." Fiction Writers Featured in Storming the Reality Studio Kathy Acker J. G. Ballard William S. Burroughs Pat Cadigan Samuel R. Delany Don DeLillo William Gibson Harold Jaffe Richard Kadrey Marc Laidlaw Mark Leyner Joseph McElroy Misha Ted Mooney Thomas Pynchon Rudy Rucker Lucius Shepard Lewis Shiner John Shirley Bruce Sterling William Vollman Non-Fiction writers featured in Storming the Reality Studio Jean Baudrillard Jacques Derrida Joan Gordon Veronica Hollinger Fredric Jameson Arthur Kroker and David Cook Timothy Leary Jean-François Lyotard Larry McCaffery Brian McHale Dave Porush Bruce Sterling Darko Suvin Takayuki Tatsumi Notes Science fiction anthologies Duke University Press books 1992 books Works originally published in literary magazines Cyberpunk literature
https://en.wikipedia.org/wiki/William%20Saito
is a Japanese American businessman, venture capitalist and former advisor to the government of Japan specializing in cybersecurity. Early life and education Saito was born in Los Angeles, California; his parents immigrated to the US from Japan in 1969, two years before he was born. He is the eldest of three children. In 1987, Saito graduated from Damien High School in La Verne, California. He attended the University of California, Riverside from the Fall of 1988 to the Fall 1992, and was a student in Riverside's joint Biomedical Science Program with the University of California, Los Angeles in 1988. Career When Saito was a junior in high school, he started a business in computer security. He later established the company as I/O Software in 1991 when he was a student. Among other technologies, I/O Software developed a system to display Japanese characters in software written in English, and a fingerprint recognition system used by Sony. Microsoft began a partnership with I/O Software in 2000 to adopt the latter's authentication technology in future versions of Microsoft Windows. Saito sold the I/O Software business assets to Microsoft in 2004. After selling the I/O Software business, he moved to Japan, where he became active as a venture capitalist and invested in several Japanese start-ups. He was named a Young Global Leader of the World Economic Forum in 2011. Saito was an advisor to Prime Minister Shinzo Abe on cybersecurity issues. Saito accompanied Abe on a 2015 visit to Silicon Valley, where Abe met with the heads of several major technology firms. He was a cybersecurity advisor to the Cabinet Office from 2013 and an advisor to the Ministry of Economy, Trade and Industry until revelations that led to his admission that he misrepresented his education and academic degrees came to light and he resigned these and other posts in 2017. In May 2019, Saito took a legal action in the Tokyo regional court against Kodansha which published the Shukan Gendai magazine (published on 3 March 2018). Kodansha paid a settlement and deleted the article at the request of the court. Works and publications References External links Living people 1971 births Japanese businesspeople University of California, Riverside alumni Damien High School alumni Businesspeople from Los Angeles
https://en.wikipedia.org/wiki/Fenwick%20tree
A Fenwick tree or binary indexed tree (BIT) is a data structure that can efficiently update values and calculate prefix sums in an array of values. This structure was proposed by Boris Ryabko in 1989 with a further modification published in 1992. It has subsequently become known under the name Fenwick tree after Peter Fenwick, who described this structure in his 1994 article. When compared with a flat array of values, the Fenwick tree achieves a much better balance between two operations: value update and prefix sum calculation. A flat array of values can either store the values or the prefix sums. In the first case, computing prefix sums requires linear time; in the second case, updating the array values requires linear time (in both cases, the other operation can be performed in constant time). Fenwick trees allow both operations to be performed in time. This is achieved by representing the values as a tree with nodes where the value of each node in the tree is the prefix sum of the array from the index of the parent (inclusive) up to the index of the node (exclusive). The tree itself is implicit and can be stored as an array of values, with the implicit root node omitted from the array. The tree structure allows the operations of value retrieval, value update, prefix sum, and range sum to be performed using only node accesses. Motivation Given an array of values, it is sometimes desirable to calculate the running total of values up to each index according to some associative binary operation (addition on integers being by far the most common). Fenwick trees provide a method to query the running total at any index, or prefix sum, in addition to allowing changes to the underlying value array and having all further queries reflect those changes. Fenwick trees are particularly designed to implement the arithmetic coding algorithm, which maintains counts of each symbol produced and needs to convert those to the cumulative probability of a symbol less than a given symbol. Development of operations it supports were primarily motivated by use in that case. Description A Fenwick tree is most easily understood by considering a one-based array with values. The corresponding Fenwick tree has nodes with an implicit node 0 at the root. Each level of the tree contains nodes with indices corresponding to sums of distinct powers of 2 (with representing an empty sum 0). For example, level contains nodes and level contains nodes The parent of a given node can be found by clearing the last set bit (LSB) in its index, corresponding to the smallest power of 2 in its sum. For example, the parent of 6 = 1102 is 4 = 1002. The below diagram shows the structure of a 16-node Fenwick tree, corresponding to a 15-element array A: Let . The value of a node at index corresponds to the range sum of values in , that is, the values of A starting after the parent's index up to the current node's index, inclusive. The values are considered to be the "rang
https://en.wikipedia.org/wiki/Lancashire%20and%20Cumbria%20Route%20Utilisation%20Strategy
The Lancashire and Cumbria Route Utilisation Strategy is a Route Utilisation Strategy, published by Network Rail on 29 August 2008 It was the ninth RUS to be produced. By default, RUSs are established by the Office of Rail Regulation (ORR) unless the latter objects within 60 days. The L&C RUS was established on 28 October 2008. The L&C RUS was the second of no fewer than 5 RUSs which cover specific routes in the north-west of England; the others are the North West RUS (NWRUS, published May 2007), the Yorkshire & Humberside (published July 2009), the Merseyside RUS (published March 2009), and the West Coast main Line RUS (scheduled for publication in the second half of 2009). Officially the RUS area corresponds exactly to Network Rail's Route 23 - North West Rural, but in practice includes both routes to Blackpool from Preston, part of Route 20. As with other RUSs, the L&C RUS took into account a number of responses, including the Office of Rail Regulation (ORR) . As has become customary with RUSs, the recommendations are nominally grouped into Control Periods (CP): CP4 - to the end of March 2009, CP5 - to 2014, and the longer term (CP6 and beyond). The great majority of recommendations are focussed on CP4. The RUS received the following issues from the North West RUS (NWRUS): improving the link between Preston – Ormskirk so that the service between Liverpool and Preston can be enhanced extending local Manchester services to Accrington and Burnley enabling services to run between Southport and Preston. Some issues were passed to later RUSs: Merseyside; Yorkshire & Humber; West Coast Main Line. The situation at the time of the RUS The great majority of the route mileage has permitted line speeds between 55 and 60 miles per hour (mph), with shorter sections of both higher and lower speeds. Junctions are no faster than 30 mph, with significant numbers rated at lower speeds, down to 10 mph in some cases. The only W9/W10 freight route is the Heysham to West Coast Main Line via Morecambe route; most of the network is restricted to W6 or W7. The Settle and Carlisle route carries a considerable amount of coal traffic. The region carries about 10.2 million passengers per year, divided as follows: between stations in the RUS area: 29% between the RUS area and the rest of the North West: 40% between the RUS area and other regions: 31%. Unlike most RUSs, capacity for the number of passengers wishing to travel is a problem only in very localised places. Crowding occurs in peak-time commuter routes into Manchester, but that was already addressed in the NWRUS. There is a particular issue on the Cumbrian Coast line at Sellafield and occasionally at Carlisle. Sporadic crowding occurs on the Carlisle-Leeds and Morecambe-Leeds routes. Generally much more of an issue are the relatively poor state of regional links. The following potential route links are characterised as 'missing': Southport-Preston Accrington-Manchester Burnley-Manchester
https://en.wikipedia.org/wiki/Twin%20Hearts
Twin Hearts is a Philippine television drama romance series broadcast by GMA Network. Directed by Dominic Zapata and Erick Salud, it stars Dingdong Dantes, Tanya Garcia, Dennis Trillo and Karylle. It premiered on October 20, 2003 on the network's Telebabad line up replacing Habang Kapiling Ka. The series concluded on June 18, 2004 with a total of 173 episodes. It was replaced by Marinara in its timeslot. Cast and characters Lead cast Dingdong Dantes as Adrian Asuncion Tanya Garcia as Althea Fontanilla Dennis Trillo as Glenn Saraga Karylle as Iris Medira / Jade Villanueva Supporting cast Rudy Fernandez as Oscar Saraga Pops Fernandez as Adelle Medira Lani Mercado as Vanessa Fontanilla Jestoni Alarcon as Renan Fontanilla Liza Lorena as Sofia Fontanilla Toby Alejar as Gaston Asuncion Alicia Alonzo as Ceta Saraga Sandy Andolong as Frida Villanueva Albert Martinez as Ben Katigbac Pinky Amador as Murielle Brillo Tin Arnaldo as Yvette Kesller Maybelyn dela Cruz as Faith Ang Gabby Eigenmann as Cedrick Sebastian Marky Lopez as Joey Santos Melisa Henderson as Coco Borha Guest cast Michael de Mesa Bembol Roco Marianne dela Riva Yayo Aguila Roy Alvarez Alvin Aragon Val Iglesias Rez Cortez Dyan Delfin Angel Locsin Vivian Foz January Isaac Vangie Labalan Berting Labra Maureen Larrazabal Joey Padilla Robert Ortega Jordan Herrera Jay Salas Frank Garcia Geoff Rodriguez Richard Quan Jake Roxas Jean Saburit Railey Valeroso Rich Vergara References External links 2003 Philippine television series debuts 2004 Philippine television series endings Filipino-language television shows GMA Network drama series Philippine romance television series Television shows set in the Philippines
https://en.wikipedia.org/wiki/NY-SCAN
NY-SCAN (New York State Community Access (or Affairs) Network) was a Public, educational, and government access (PEG) cable television channel in Albany, New York. It ran for at least seven years until 1992, when it was shut down by governor Mario Cuomo and the legislature after broadcasting a controversial speech by City College professor Leonard Jeffries. It was seen by millions of New Yorkers, providing coverage of gubernatorial inaugurations, debates, primary and election night coverage, back-to-school tips, Christmas shows, and a message from Mario Cuomo, Governor of New York. References American public access television Television stations in Capital District (New York)
https://en.wikipedia.org/wiki/Dear%20Friend%20%28TV%20series%29
Dear Friend is a Philippine television drama anthology broadcast by GMA Network. Hosted by Jolina Magdangal and Marvin Agustin, it premiered on July 20, 2008. The show concluded on May 16, 2010 with a total of 92 episodes. It was replaced by Love Bug in its timeslot. First season Guest cast Jennica Garcia Mart Escudero Aljur Abrenica Kris Bernal Dennis Trillo Antoinette Taus Paolo Contis Heart Evangelista Nadine Samonte Sheena Halili Sunshine Dizon Mark Anthony Fernandez Ehra Madrigal Michelle Madrigal Mark Herras Jennylyn Mercado Ryza Cenon JC de Vera Diana Zubiri Luis Alandy Second season Bulong ng Puso Cast and characters Jennica Garcia as Toni Mart Escudero as Mateo Rich Asuncion as Amor Dion Ignacio as Patrick Rainier Castillo as Daniel Fernando as Father of Toni Magkaribal Cast and characters Katrina Halili as Kim Jewel Mische as Cindy Alfred Vargas as Ron JC Tiuseco as Kiko Igorota Cast Glaiza de Castro Patrick Garcia Polo Ravales Madrasta Bakasyonistas Kay Tagal Kitang Hinintay Karibal Three Bachelors Special My Christmas List Almost A Love Story My Stalking Heart Tisay Ratings According to AGB Nielsen Philippines' Mega Manila household television ratings, the final episode of Dear Friend scored a 10.5% rating. References External links 2008 Philippine television series debuts 2010 Philippine television series endings Filipino-language television shows GMA Network original programming Philippine anthology television series
https://en.wikipedia.org/wiki/GeoM%C3%B4n
GeoMôn UNESCO Global Geopark is a Geopark covering the entire island of Anglesey in north Wales. It was admitted to the European Geoparks Network and to the UNESCO-assisted Global Network of National Geoparks in May 2009. It was the second Geopark to be designated in Wales, the seventh within the United Kingdom and the thirty-third in Europe. The UNESCO Geopark designation reflects the diversity of the island's geology, which encompasses solid rocks from the Precambrian to the Neogene with some Miocene sediments and extensive Pleistocene glaciation features from the Quaternary period. GeoMôn covers 720 square kilometres and has 125 miles of coastal walks. The Isle of Anglesey lies off the north coast of Wales, UK. It is known as Ynys Môn in Welsh. Around 67,000 people live on the island. The local culture is very distinctive, with around 60% of the population using Welsh as their first language. The island is known for its diverse tectonic geology. South Stack exhibits particular folding and faulting that have made it a site of interest for many years, having been first identified as the oldest Precambrian rock then the youngest and now said to be from the Cambrian period. It is a common location for students and schools who come here to study folding and faulting as well as examining the evidence for the birth of the Atlantic. Llanddwyn Island on the west Anglesey coast is a small, but complete oceanic plate, with the pillow lavas at its eastern end created at a Precambrian constructive plate margin. The plate interior on the northern coast is composed of mudstones and sandstones, some containing ‘dropstones, the remnants of the Gaskier's Ice Age that occurred at the end of Precambrian times. Anglesey is the type locality for a rock type named "mélange" by Edward Greenly when he first mapped the geology of Anglesey in the early years of the twentieth century. GeoMôn publishes a series of local trails to guide the visitor around the coastal areas of the island served by the 125 mile long coastal path. The trail at Beaumaris illustrates the use of rocks in the building of the 13th century castle, roofs and roads as well as more ornate carvings on high-status buildings. The castle built by King Edward I was intended to ‘tame’ the local Welsh people and keep them in order. It is part of the Castles and Town Walls of King Edward in Gwynedd World Heritage Site. Oriel Ynys Môn is the municipal art gallery and museum dedicated to local artists and crafts. Anglesey’s two most important artists have exhibitions there. Firstly, there is an exhibition of the work of Charles Tunicliffe RA, the wildlife artist, and then Sir Kyffin Williams RA, whose work is shown in a new gallery dedicated to him. He was a founder member of the Geopark and its first patron. His great uncle, Sir Andrew Ramsay, was the second Director General of the British Geological Survey and a ‘Father’ of Welsh Geology; he died in Beaumaris and is buried in the churchyard at Llanddwyn,
https://en.wikipedia.org/wiki/ECJ%20%28disambiguation%29
ECJ is the European Court of Justice, the highest court in the European Union in matters of European Union law. ECJ may also refer to: Computing Java Evolutionary Computation Toolkit, a Java-based evolutionary Computation Research System Eclipse Compiler for Java, a Java compiler in the Eclipse framework Other uses Eclipse ECJ, a very light jet produced by Eclipse Aviation Escuela Complementaria Japonesa de Madrid, a Japanese international school in Madrid Evolutionary Computation Journal, a scientific journal on evolutionary computation See also Court of Justice of the European Union (CJEU), the full court system of the European Union
https://en.wikipedia.org/wiki/Federation%20of%20Earth%20Science%20Information%20Partners
Earth Science Information Partners (ESIP) is a community of data and information technology practitioners that come together to coordinate Earth science interoperability efforts. Participation in ESIP allows members to enhance their data management capabilities. ESIP arranges collaboration through in-person meetings and virtually through collaboration space on the Web. Partners use these forums for knowledge exchange and collaboration. Created by NASA in 1998, ESIP was formed in response to a National Research Council recommendation calling for the involvement of community stakeholders in the development of NASA’s EOSDIS as a critical element of the U.S. Global Change Research Program (http://www.gcrio.org/USGCRP/LaJolla/cover.html). ESIP includes more than 120 member organizations. ESIP membership includes federal data centers, government research laboratories, research universities, education resource providers, technology developers, and nonprofit and commercial enterprises. History ESIP is a community drawn from agencies and individuals who provide handling for Earth and environmental science data and information. ESIP was founded in 1998 by NASA in response to a National Research Council (NRC) review of the Earth Observation System Data and Information System (EOSDIS). The NRC called on NASA to develop a new, distributed structure that would be operated and managed by the Earth science community that would include those responsible for all elements of Earth observation, including observation, research, and ultimately, application and education. Beginning with 24 NASA-funded partners, ESIP's purpose was to evolve methods to make Earth science data easy to preserve, locate, access and use by research, education, and commercial interests. NASA developed the ESIP Federation by starting with a set of working prototype projects called ESIPs, representing both the research and applications development communities. These prototype projects were joined by nine NASA data archive centers to form the core of the early ESIP Federation and were responsible for creating its governing structures and the collaborative community it is today. By 2001, the ESIP Federation created a non-profit corporation called the Foundation for Earth Science (Foundation). Through a Memorandum of Understanding with the ESIP Federation, the foundation provided management support to the ESIP Federation as it moved from an operational prototype to an independent organization. In 2002, Foundation staff were hired to support the work of the ESIP Federation. The foundation helped create operating policies for the ESIP Federation and facilitated the development of its first strategic plan, adopted by the ESIP Federation’s Assembly in 2004. NOAA’s data centers joined the ESIP Federation. Beginning in July 2007 in Madison, Wisconsin, a Strategic Planning Working Group was formed to develop a new vision of the ESIP Federation in its second decade. The ESIP Federation’s partne
https://en.wikipedia.org/wiki/Arabic%20keyboard
The Arabic keyboard (, lawḥat al-mafātīḥ al-`Arabīyyah) is the Arabic keyboard layout used for the Arabic alphabet. All computer Arabic keyboards contain both Arabic letters and Latin letters, the latter being necessary for URLs and e-mail addresses. Since Arabic is written from right to left, when one types with an Arabic keyboard, the letters will start appearing from the right side of the screen. Layouts Arabic typewriter The Arabic layout typewriter was first patented by Selim Shibli Haddad, a Syrian artist and inventor. A British patent was filed three months later, on 1 December 1899, by Philippe Waked, the first person to type a document in Arabic. Both patents expired in 1919, prompting mass production in both Egypt and abroad. Sakhr/MSX Arabic Keyboard IBM PC Arabic Keyboard Mac Arabic Keyboard Ubuntu Arabic Keyboard See also Intellark References External links Typing machines for arabic group languages Patent Keyboard Arabic-script keyboard layouts Input methods
https://en.wikipedia.org/wiki/Jeroo
Jeroo is a cross-platform educational tool for learning object-oriented programming concepts. In particular, the program helps learning concepts such as objects, methods and basic control structures. Jeroo supports three syntactic styles: Java/C#/Javascript, Python, and Visual Basic. The program features a GUI split in two sub-windows. In the first sub-window, the user can type code to be executed in the Jeroo environment. In the second sub-window, the user can see the effects of their code in a graphical environment. The second sub-window shows an island populated by Jeroos. The user can instruct the Jeroos, via programming in the first sub-window, to accomplish various actions such as moving, eating or picking up flowers. The tool received a NEEDS "Premier Award Winner Associate Editor's Choice" in 2004. Jeroo uses many different methods to engage its students such as storytelling and animating execution. The program has been looked at as a very useful and efficient tool to develop experience and knowledge in Computer Programming. There have also been many Computer Science competitions involving the Jeroo program and its features. Commands A Jeroo can do a few of things such as: Contributors Web-based Jeroo (2019-present) Ben Konz Caelan Bryan Thomas Connole John Adam Brian Dorn Stand-alone Jeroo (2002–2019) Brian Dorn Dean Sanders Artwork used in both web-based Jeroo and stand-alone Jeroo Christina Shell See also List of educational programming languages References External links Jeroo official home page Language Summary Jeroo: A Tool For Introducing Object-Oriented Programming Object-oriented programming
https://en.wikipedia.org/wiki/Software%20defect%20indicator
A Software Defect Indicator is a pattern that can be found in source code that is strongly correlated with a software defect, an error or omission in the source code of a computer program that may cause it to malfunction. When inspecting the source code of computer programs, it is not always possible to identify defects directly, but there are often patterns, sometimes called anti-patterns, indicating that defects are present. Some examples of Software Defect Indicators: Disabled Code: Code has been written and the programmer has disabled it, or switched it off, without making it clear why it has been disabled, or when or whether it will be re-enabled. Routine Too Complex: A program (method, module, routine, subroutine, procedure, or any named block of code) contains more than 10 binary terms in conditional statements. Unused Variables: Unreferenced variables are a strong indicator for other errors. See also Cyclomatic complexity Anti-pattern Computer program Computer programming Control flow Software engineering References External links NIST Special Publication 500-235 Structured Testing: A Testing Methodology Using the Cyclomatic Complexity Metric Software metrics
https://en.wikipedia.org/wiki/Net%20%28command%29
In computing, net is a command in IBM OS/2 (including eComStation and ArcaOS), Microsoft Windows, ReactOS and Greentea OS used to manage and configure the operating system from the command-line. It is also part of the IBM PC Network Program for DOS. Overview The command is primarily used to manage network resources. It is an external command implemented as net.exe. When used in a batch file, the /Y or /N switches can be used to unconditionally answer Yes or No to questions returned by the command. The net command has several sub-commands that can differ from one implementation or operating system version to another. On Windows CE .NET 4.2, Windows CE 5.0 and Windows Embedded CE 6.0, it is available as an external command stored in . This version only supports the use and view sub-commands. Example The net use command has several network-related functions. Connecting network drive and printer net use can control mounting ("mapping" in Microsoft terminology) drive shares and connecting shared printers in a network environment. This command makes use of the SMB (server message block) and the NetBIOS protocol on port 139 or 445. The basic Windows XP configuration enables this functionality by default. Thus users can connect to and disconnect from shared resources such as computers, printers and drives. net use can display a list of network-connection information on shared resources. Null session connections net use also connects to the IPC$ (interprocess communication share). This is the so-called null session connection, which allows unauthenticated users. The basic syntax for connecting anonymously is: net use \\IP address\IPC$ "" /u:"" For example, typing at the command prompt: net use \\192.168.1.101\IPC$ "" /u:"" attempts to connect to the share IPC$ of the network 192.168.1.101 as an anonymous user with blank password. If successfully connected to the target machine, a lot of information can be gathered such as shares, users, groups, registry keys and more. This would provide a hacker with a lot of information about a remote user. This has changed in Windows NT 4.0 SP6 already. In Windows 2000 "null session connections" could have been enabled after changes of the system-configuration. Similar commands in other OSes Novell NetWare map for mapping volumes (network drives) to drive letters capture for capturing print queues to LPT ports See also List of DOS commands MS-Net References Further reading External links Microsoft TechNet Microcomputer software OS/2 commands Windows administration Windows communication and services
https://en.wikipedia.org/wiki/Robert%20Pauley
Robert Reinhold Pauley (October 17, 1923 – May 2, 2009) was an American radio broadcasting executive who served as president of the ABC Radio network during a period when it faced challenges from television as the most popular form of mass media. Biography Pauley was born in New Canaan, Connecticut on October 17, 1923. During World War II, he served for three years in the United States Merchant Marine, attaining the rank of Lieutenant. Following the conclusion of his military service, he married Barbara Anne Cotton of Pound Ridge, NY, and attended Harvard Business School. Radio He worked for a local radio station selling advertising and later worked in that capacity at both the CBS Radio and NBC Radio networks in New York. He was hired by ABC Radio in 1958 as a salesman, and was shortly appointed Eastern Sales Director. After dramatically improving ABC's sales performance, and proposing a plan for revival of the network to the ABC/Paramount corporate leadership, he was named as vice president of the Radio Network in 1960, and president one year later. ABC was last in the ratings among the four radio networks and the industry was facing dire competition from television. Upon his appointment, Pauley undertook a national tour of ABC's affiliate stations, created an affiliate advisory board (ABC's first), and revamped ABC's public service, sports, entertainment and news product including heavyweight championship boxing and Notre Dame football. ABC's exclusive coverage of the 1964 Cassius Clay versus Sonny Liston bout drew an estimated 75 million radio listeners, a record. Pauley hired Howard Cosell in 1959, a then-little-known sports announcer who had offered a proposal for a weekly radio program. Pauley tried to rebuff Cosell by telling him that the network had no money to create a show but that he'd air the program if Cosell could get a sponsor, which Pauley assumed he would be unable to do. Cosell found a shirt company owned by a relative as a sponsor and Pauley followed thorough on his commitment, adding a show aired variously as Speaking of Sports, which was broadcast on the network for 30 years. Pauley believed that radio's intimacy would always attract listeners and advertisers, and was able to increase advertising sales and add 100 stations to ABC's network. By 1967, ABC was the number one radio network with a more than 50% market share. He was forced out of his position in 1967 for reasons never made clear to him, but probably based on a decision to restructure the radio network under a system of group vice presidents (despite the fact that the network's income in the previous quarter had been its best ever). Television After leaving ABC, Pauley developed a plan to establish a fourth television network to offer news-only services to local stations nationwide. After one failed attempt, Independent Broadcasting, he created Television News Inc. (TVN) in 1973, with the goal of competing with the big three networks by offering an objective,
https://en.wikipedia.org/wiki/Nalini%20Venkatasubramanian
Nalini Venkatasubramanian is a Professor of Computer Science in the Donald Bren School of Information and Computer Sciences at the University of California, Irvine. She is known for her work in effective management and utilization of resources in the evolving global information infrastructure. Her research interests are Multimedia Computing, Networked and Distributed Systems, Internet technologies and Applications, Ubiquitous Computing and Urban Crisis Responses. Dr. Venkatasubramanian's research focuses on enabling effective management and utilization of resources in the evolving global information infrastructure. She also addresses the problem of composing resource management services in distributed systems. Born and raised in Bangalore, she received her Ph.D. in computer science from the University of Illinois, Urbana-Champaign in 1998. From 1991 to 1998, she was a member of technical staff and software designer engineer for Hewlett-Packard. In 1998, she joined UC Irvine as an Assistant Professor of Computer Science. Awards NSF (National Science Foundation) Career Award, 1999. Networking Research Program. Teaching Excellence Award, Division of Undergraduate Education, 2002, University of California, Irvine Best Paper Award, IEEE Consumer Communications and Networking (CCN) Conference, Las Vegas, Jan 8th - 10th, 2006. Deans Award for Undergraduate Teaching, University of California, Irvine, 2014 References External links American computer scientists Year of birth missing (living people) Living people Indian emigrants to the United States University of California, Irvine faculty University of Illinois alumni People from Irvine, California Kannada people American women computer scientists 21st-century American women
https://en.wikipedia.org/wiki/Banner%20grabbing
Banner grabbing is a technique used to gain information about a computer system on a network and the services running on its open ports. Administrators can use this to take inventory of the systems and services on their network. However, an intruder can use banner grabbing in order to find network hosts that are running versions of applications and operating systems with known exploits. Some examples of service ports used for banner grabbing are those used by Hyper Text Transfer Protocol (HTTP), File Transfer Protocol (FTP), and Simple Mail Transfer Protocol (SMTP); ports 80, 21, and 25 respectively. Tools commonly used to perform banner grabbing are Telnet, Nmap and Netcat. For example, one could establish a connection to a target web server using Netcat, then send an HTTP request. The response will typically contain information about the service running on the host: [root@prober]# nc www.targethost.com 80 HEAD / HTTP/1.1 HTTP/1.1 200 OK Date: Mon, 11 May 2009 22:10:40 EST Server: Apache/2.0.46 (Unix) (Red Hat/Linux) Last-Modified: Thu, 16 Apr 2009 11:20:14 PST ETag: "1986-69b-123a4bc6" Accept-Ranges: bytes Content-Length: 1110 Connection: close Content-Type: text/html This information may be used by an administrator to catalog this system, or by an intruder to narrow down a list of applicable exploits. To prevent this, network administrators should restrict access to services on their networks and shut down unused or unnecessary services running on network hosts. Shodan is a search engine for banners grabbed from port scanning the Internet. References McClure, Stuart et al. Hacking Exposed. New York: McGraw-Hill/Osborne, 2005. Computer network security
https://en.wikipedia.org/wiki/Nikil%20Dutt
Nikil Dutt is a Chancellor's Professor of Computer Science at University of California, Irvine, United States. Professor Dutt's research interests are in embedded systems, electronic design automation, computer architecture, optimizing compilers, system specification techniques, distributed systems, and formal methods. Biography Born and raised in Gangtok, Sikkim, India, Dutt received his Ph.D. in Computer Science from the University of Illinois at Urbana-Champaign in 1989. He received a B.E.(Hons) in Mechanical Engineering from the Birla Institute of Technology and Science, Pilani, India in 1980, an M.S. in Computer Science from the Pennsylvania State University in 1983. In 1989, he joined UC-Irvine as an Assistant Professor of Computer science. He is affiliated with Center for Embedded Computer Systems (CECS), California Institute for Telecommunications and Information Technology (Calit2), the Center for Pervasive Communications and Computing (CPCC), and the Laboratory for Ubiquitous Computing and Interaction (LUCI). Academic life His research has been recognized by Best Paper Awards and Best Paper Award Nominations at several conferences. Dutt currently serves as Associate Editor of Association for Computing Machinery Transactions on Embedded Computer Systems (TECS) and of IEEE Transactions on VLSI Systems (TVLSI). In 2007, he was selected as ACM distinguished scientist and in 2008 an IEEE fellow. He was a keynote speaker at several conferences. Dutt served as Editor-in-Chief of ACM Transactions on Design Automation of Electronic Systems (TODAES) between 2004–2008. He currently lives in Irvine, California with his family. Awards 2014. ACM Fellow. For contributions to embedded architecture exploration, and service to electronic design automation and embedded systems. Books High-Level Synthesis: Introduction to Chip and System Design, Kluwer Academic Publishers, 1992 Memory Issues in Embedded Systems-on-Chip: Optimizations and Exploration, Kluwer Academic Publishers, 1999 Memory Architecture Exploration for Programmable Embedded Systems, Kluwer Academic Publishers, 2003 SPARK: A Parallelizing Approach to the High-Level Synthesis of Digital Circuits, by Sumit Gupta, Rajesh K. Gupta, Nikil Dutt, Alex Nicolau, Kluwer Academic Publishers, 2004 Functional Validation of Programmable Embedded Architectures: A Top-Down Approach, Springer-Verlag, 2005 On-chip Communication Architectures: Current Practice, Research and Future Trends, Morgan Kaufmann/Elsevier Systems-on-Silicon Series, 2008 Processor Description Languages: Applications and Methodologies," Morgan Kaufmann/Elsevier Systems-on-Silicon Series, 2008. References External links Computer Engineering Academic Genealogy Living people Indian emigrants to the United States Grainger College of Engineering alumni Birla Institute of Technology and Science, Pilani alumni Pennsylvania State University alumni American computer scientists American male writers of Indian descent Computer sc
https://en.wikipedia.org/wiki/Array%20%28data%20type%29
In computer science, array is a data type that represents a collection of elements (values or variables), each selected by one or more indices (identifying keys) that can be computed at run time during program execution. Such a collection is usually called an array variable or array value. By analogy with the mathematical concepts vector and matrix, array types with one and two indices are often called vector type and matrix type, respectively. More generally, a multidimensional array type can be called a tensor type, by analogy with the physical concept, tensor. Language support for array types may include certain built-in array data types, some syntactic constructions (array type constructors) that the programmer may use to define such types and declare array variables, and special notation for indexing array elements. For example, in the Pascal programming language, the declaration type MyTable = array [1..4,1..2] of integer, defines a new array data type called MyTable. The declaration var A: MyTable then defines a variable A of that type, which is an aggregate of eight elements, each being an integer variable identified by two indices. In the Pascal program, those elements are denoted A[1,1], A[1,2], A[2,1], …, A[4,2]. Special array types are often defined by the language's standard libraries. Dynamic lists are also more common and easier to implement than dynamic arrays. Array types are distinguished from record types mainly because they allow the element indices to be computed at run time, as in the Pascal assignment A[I,J] := A[N-I,2*J]. Among other things, this feature allows a single iterative statement to process arbitrarily many elements of an array variable. In more theoretical contexts, especially in type theory and in the description of abstract algorithms, the terms "array" and "array type" sometimes refer to an abstract data type (ADT) also called abstract array or may refer to an associative array, a mathematical model with the basic operations and behavior of a typical array type in most languages basically, a collection of elements that are selected by indices computed at run-time. Depending on the language, array types may overlap (or be identified with) other data types that describe aggregates of values, such as lists and strings. Array types are often implemented by array data structures, but sometimes by other means, such as hash tables, linked lists, or search trees. History Heinz Rutishauser's programming language Superplan (1949–1951) included multi-dimensional arrays. Rutishauser however although describing how a compiler for his language should be built, did not implement one. Assembly languages and low-level languages like BCPL generally have no syntactic support for arrays. Because of the importance of array structures for efficient computation, the earliest high-level programming languages, including FORTRAN (1957), COBOL (1960), and Algol 60 (1960), provided support for multi-dimensional arrays. Ab
https://en.wikipedia.org/wiki/Conqueror%20A.D.%201086
Conqueror A.D. 1086 is a medieval strategy computer game released in 1995 by Sierra On-Line, Inc. Gameplay The player must control a lord as he tries to develop an army of knights and soldiers in order to challenge the king for the throne of England. Travelling on the medieval roads is not like traveling on today's superhighways (and requires months to get from one end of England to the other). Rivers also provide a quick path to get to the target village but the player must watch out for bandits that will attack him and his hired men. Starting the game as a 12-year-old boy, you are given only some money and a basic sword. The player can either answer a variety of moral questions or choose a pre-generated character. At the age of 18, the player is assigned a fiefdom to oversee in addition to a substantial amount of land. All games end at the player's 30th birthday. If the player doesn't slay a dragon or overthrow the King of England by then, the game is considered to be lost. While not fighting in battles or tournaments, the player can develop his fiefs with agricultural and civic developments similar to SimCity; examples of these buildings include chapels, stables, storehouses, and farms. Marriage is also possible as the player can acquire his wife through socializing with the ladies prior to the jousting. The moneylender can provide the player with loans at 50% interest. Reception Computer Game Review argued, "The scope of this project was more than either its budget or its talent could handle." Notes References External links Worldvillage Review Coming Soon magazine archived issue reviewing the game 1995 video games DOS games Strategy video games Video games developed in the United States Video games set in medieval England Windows games
https://en.wikipedia.org/wiki/Francisco%20de%20los%20Cobos%20y%20Molina
Francisco de los Cobos y Molina (c. 1477 – 10 May 1547) was the secretary of State and Comendador for the kingdom of Castile under the rule of the Emperor Charles I of Spain. Biographical data He was born in Úbeda ca. 1477 and died on 10 May 1547 in the same city. He was born to the aristocratic, though economically disadvantaged family of Don Pedro Rodríguez de los Cobos, he was the son of don Diego de los Cobos, regent of Ubeda, and Catalina de Molina. In 1522, he married the fourteen-year-old María de Mendoza y Sarmiento, daughter of Juan Hurtado de Mendoza y María de Sarmiento, 6th Countess of Ribadavia. His titles would be inherited by his only son Diego de los Cobos y Hurtado de Mendoza, (circa 1523 – 1575), who was subsequently awarded the title of 1st Marquis of Camarasa, together with his wife, by King Charles I of Spain, a.k.a. Holy Roman Emperor Charles V on 18 February 1543. His daughter, Maria Sarmiento de Mendoza, married at Valladolid on 30 November 1538, Gonzalo II Fernández de Córdoba, Governor of the Duchy of Milan, 1558–1560 and 1563–1564, a Knight of the Order of the Golden Fleece since 1555. They had no children. In 2008, this title was held by the duke of Segorbe, Ignacio Medina Fernández de Córdoba y Fernández de Henestrosa. Career in government His career benefited from the help afforded by his uncle, Diego Vela Allide, treasurer and secretary of queen Isabella I of Castile. Later, by 1503, he worked as a scribe under the dean of the Queen's secretaries, Hernando de Zafra. In 1507, upon Zafra's death, he became first Treasurer of Granada, and then Regent for Úbeda the next year. These positions were entitled to collect tribute and payments to the crown. After the death of king Ferdinand of Aragon in 1516, Cobos was charged by Cardinal Cisneros with traveling to Habsburg-ruled Flanders to become a counselor for the young new monarch, Charles I of Spain. This proved to be the crucial decision of his career, as through the favor of William II de Croÿ, Lord of Chièvres, he became secretary to the king. He advised Charles on matters that dealt with the Spanish portion of his domains, and emerged as a rival to Grand Chancellor Mercurino Gattinara. Gattinara's fall in 1528 confirmed Cobos's victory, and led to his assumption of the leadership of the council of State. After traveling with Charles from 1529 until 1533, Cobos's expertise in financial matters kept him in Spain, where he served as the effective head of government until his death. Patronage of the arts Cobos was able to amass vast riches in his work with the state. He was able to use some of his riches in fostering patronage and acquiring art. He met Titian and arranged for Emperor Charles V's portrait by the famed Venetian artist. One sad note was the loss during a shipwreck of a large assembly of Italian works, including a Pietá by Sebastiano del Piombo and a series of paintings from the City council of Lucca. Additionally, he was able to collect portraits
https://en.wikipedia.org/wiki/Squeak%21
Squeak! is a children's TV show made by SMG Productions (now known as STV Studios) for the ITV network children's strand CITV. The series re-broadcast in 2007 on STV, on their wknd@stv strand, and from 2014 as part of the "Weans' World" block on STV Glasgow and STV Edinburgh. There is a DVD boxset available which features all the episodes. Currently, Squeak! is also broadcast in the United States on BabyFirst TV. The show follows three young mice: Tizzy, Toot and Tog. They live in the "Tick Tock Clock". References External links Squeak! on STV Player BBC ALBA - Bigeil 2002 British television series debuts British television shows featuring puppetry ITV children's television shows PBS Kids shows Television series about mice and rats Television shows produced by Scottish Television
https://en.wikipedia.org/wiki/Ivan%20Krsti%C4%87
Ivan Krstić is a Croatian computer security expert, currently working on core security at Apple Inc. Krstić was previously the director of security architecture at One Laptop per Child. He is a co-author of The Official Ubuntu Book (). Biography Born in Croatia, Krstić received a scholarship to attend the Cranbrook Kingswood school in Michigan, U.S, when he was 15. In 2004, he enrolled at Harvard College but took a year's leave to work on secure electronic healthcare at Croatia's largest children's hospital. After returning to Harvard in 2005, he took another leave when offered a position with One Laptop per Child. While there, he designed the Bitfrost security architecture and personally oversaw the project's first two in-country deployments, in Uruguay and Peru. He left the project in early 2008 and later joined Apple in May 2009. Recognition In 2007, Krstić became a TR35 laureate, selected by the MIT Technology Review as one of the world's top 35 innovators under the age of 35. A year later, eWeek magazine declared him one of the top three most influential people in modern computer security, and one of the top 100 in all of IT. References Apple Inc. employees Cypherpunks Living people Computer security specialists Computer systems engineers Croatian engineers Harvard College alumni Croatian emigrants to the United States Cranbrook Educational Community alumni 1986 births
https://en.wikipedia.org/wiki/Transana
Transana is a software package used to analyze digital video or audio data. Transana used to be a GPL licensed software, but has become proprietary software in recent releases. Features Transana lets the user analyze and manage your data, transcribe it, identify analytically interesting clips, assign keywords to clips, arrange and rearrange clips, create complex collections of interrelecris en français fdp ated clips, explore relationships between applied keywords, and share your analysis with colleagues. The goal is to find a new way to focus on the data, and manage large collections of video and audio files and clips. History Transana is a product of the Digital Insight Project, and it is being developed with funding from the National Science Foundation through the National Partnership for Computational Infrastructure at the San Diego Supercomputer Center and the TalkBank Project at Carnegie Mellon University. See also Computer assisted qualitative data analysis software TalkBank References Notes Transana Review (Linguistic Annotation Wiki) "Choosing a CAQDAS Package" (Lewins & Silver 2006 working paper, pdf) (review of Transana 2, among others) "Transana 2.40: Distinguishing features and functions" (Lewins & Silver December 2009, pdf) Dempster, P. & Woods, D. (2011). The Economic Crisis Through the Eyes of Transana. Forum Qualitative Sozialforschung / Forum: Qualitative Social Research, 12, 1 Woods, D. & Dempster, P. (2011). Tales from the Bleeding Edge: The Qualitative Analysis of Complex Video Data Using Transana. Forum Qualitative Sozialforschung / Forum: Qualitative Social Research, 12, 1 External links GitHub Code Repository of Transana Free QDA software Free software programmed in Python Software that uses wxWidgets Free multilingual software Windows multimedia software MacOS multimedia software 2001 software Linguistic research software
https://en.wikipedia.org/wiki/ARMO%20oil%20refiner
ARMO oil refiner is one of the two oil refiners in Albania. It owns oil refineries at Ballsh and Fier, research center, 11 depots, a small network of fuel stations, and the Vlorë Terminal located in the south coast on Adriatic sea. The CEO of Armo Energy is Rezart Taci. Mr. Taci is also the head of Taçi Oil The Ballsh refinery is the largest refinery in Albania and has a designed capacity 1 million tonnes per year. Fier refinery has a capacity of 500 thousand tonnes per year and is designed mainly to produce bitumen. In 2008, 85% of ARMO shares was sold to the U.S-Swiss consortium Refinery Associates of Texas and Anika Enterprises SA (other companies were involved in initial talks, but did not participate in the purchase) for €128.7 million. Other bids were made by Petrofac, Penta Investments and Vitol. As of the fall of 2012, ARMO Energy employs over 1,500 people and has a refining capacity of 1.5 million tons with a storage capacity of 220,000 cubic meters. References Oil companies of Albania Oil refineries in Albania Buildings and structures in Mallakastër Buildings and structures in Fier
https://en.wikipedia.org/wiki/MINIMOP
MINIMOP was an operating system which ran on the International Computers Limited (ICL) 1900 series of computers. MINIMOP provided an on-line, time-sharing environment (Multiple Online Programming, or MOP in ICL terminology), and typically ran alongside George 2 running batch jobs. MINIMOP was named to reflect its role as an alternative to the MOP facilities of George 3, which required a more powerful machine. MINIMOP would run on all 1900 processors apart from the low-end 1901 and 1902 and required only 16K words of memory and two 4 or 8 million character magnetic disks. Each user was provided with a fixed size file to hold his data, which was subdivided into a number of variable sized subfiles. The command language could be extended with simple macros. Implementation MINIMOP was implemented as a multithreaded (sub-programmed in ICL terminology) user level program running on the standard executive (low level operating system) of the ICL 1900. The program under control facilities of executive were used to run user programs under MINIMOP. All user I/O operations were trapped by MINIMOP and emulated rather than accessing real peripherals. As memory was at a premium user programs would be swapped out of memory whenever they needed to wait (for input or output) or when they reached the end of their time slice. MAXIMOP Queen Mary College, London, now Queen Mary, University of London, later developed MAXIMOP, an improved system largely compatible with MINIMOP. The ICL Universities Sales Region started distributing MAXIMOP, and it was used at over 100 sites. References ICL operating systems
https://en.wikipedia.org/wiki/RQDA
RQDA is an R package for computer assisted qualitative data analysis or CAQDAS. It is installable from, and runs within, the R statistical software, but has a separate window running a graphical user interface (through RGtk2). RQDA's approach allows for tight integration of the constructivist approach of qualitative research with quantitative data analysis which can increase the rigor, transparency and validity of qualitative research. Features In the graphical interface it has the following functions: Import documents from plain text Support non-English documents, Simplified Chinese Character is well-tested under Windows Support character-level coding Memos for documents, codes, coding, project, files etc. Retrieve coding, and easily gets back to the original file. Conditional retrieval is supported as well. Single-file (*.rqda) format, which is basically the SQLite database Categorize codes (tree-like categories are avoided) Categorize files Search files by keywords and can highlight keyword in the open file Show attributes of files, which is useful for content analysis Categorise cases and related attributes of cases (to bridge qualitative and quantitative research) Search information about selected cases from the web Rename files, codes, code categories, cases etc. Write and organize fieldwork journals Through use of R functions, it can: Import a batch of files Calculate the relation between two codings, given the coding indexes Give a summary of coding and inter-code relationship. Export file/case attributes and show subset of files/cases. Allow for more flexible conditional retrieval. Boolean operations of and, or and not. See also Computer-assisted qualitative data analysis software References External links RQDA video tutorials Tutorial "Qualitative Data Analysis in R" Warner, L. (2012). Eval12 Session 682: R Qualitative Data Analysis (RQDA) Package: A Free Qualitative Analysis Tool (skill-building presentation) Scholarly research using RQDA Free QDA software Cross-platform free software Free R (programming language) software Qualitative research Science software for macOS Science software for Linux
https://en.wikipedia.org/wiki/Computer-assisted%20qualitative%20data%20analysis%20software
Computer-assisted (or aided) qualitative data analysis software (CAQDAS) offers tools that assist with qualitative research such as transcription analysis, coding and text interpretation, recursive abstraction, content analysis, discourse analysis, grounded theory methodology, etc. Definition CAQDAS is used in psychology, marketing research, ethnography, public health and other social sciences. The CAQDAS networking project lists the following tools a CAQDAS program should have: Content searching tools Code grouping tools Linking tools Mapping or networking tools Query tools Alternative visual representation tools Writing and annotation tools Comparison of CAQDAS software Project Exchange Format In 2019, the Rotterdam Exchange Format Initiative (REFI) launched a new open exchange standard for qualitative data called QDA-XML, however, the Computer Assisted Qualitative Data Analysis (CAQDAS) Network Project had been formally stablished in 1994. The aim is to allow users to bring coded qualitative data from one software package to another. Initially support was included in Atlas.ti, QDA Miner, Quirkos and Transana, and is now implemented in Dedoose, MAXQDA, NVivo and more. Although this was not the first standard to be proposed, it was the first to be implemented by more than one software package, and came as the result of a collaboration between vendors and community representatives from the research community. Previously there was very little capability to bring data in from other software packages. Training The CAQDAS Network Project hosts events on the use of CAQDAS packages for qualitative and mixed-methods analysis. They include: fee-based in-person short courses open-registration Webinars designed to raise awareness open-registration Webinars that are methodological or pedagogical in nature podcasts Pros and cons Such software helps to organize, manage and analyse information. The advantages of using this software include saving time, managing huge amounts of qualitative data, having increased flexibility, having improved validity and auditability of qualitative research, and being freed from manual and clerical tasks. Concerns include increasingly deterministic and rigid processes, privileging of coding, and retrieval methods; reification of data, increased pressure on researchers to focus on volume and breadth rather than on depth and meaning, time and energy spent learning to use computer packages, increased commercialism, and distraction from the real work of analysis. See also Comparison of survey software Idea networking Multimethodology Computer Assisted Mixed Methods Research Analysis Software Qualitative economics Qualitative marketing research Qualitative psychological research Quantitative research Sampling (case studies) Sensemaking References -External links The CAQDAS networking project maintained by the University of Surrey offers advice and reviews on various software packages. Harald Klein's comprehen
https://en.wikipedia.org/wiki/Robust%20measures%20of%20scale
In statistics, robust measures of scale are methods that quantify the statistical dispersion in a sample of numerical data while resisting outliers. The most common such robust statistics are the interquartile range (IQR) and the median absolute deviation (MAD). These are contrasted with conventional or non-robust measures of scale, such as sample standard deviation, which are greatly influenced by outliers. These robust statistics are particularly used as estimators of a scale parameter, and have the advantages of both robustness and superior efficiency on contaminated data, at the cost of inferior efficiency on clean data from distributions such as the normal distribution. To illustrate robustness, the standard deviation can be made arbitrarily large by increasing exactly one observation (it has a breakdown point of 0, as it can be contaminated by a single point), a defect that is not shared by robust statistics. IQR and MAD One of the most common robust measures of scale is the interquartile range (IQR), the difference between the 75th percentile and the 25th percentile of a sample; this is the 25% trimmed range, an example of an L-estimator. Other trimmed ranges, such as the interdecile range (10% trimmed range) can also be used. For a Gaussian distribution, IQR is related to as . Another familiar robust measure of scale is the median absolute deviation (MAD), the median of the absolute values of the differences between the data values and the overall median of the data set; for a Gaussian distribution, MAD is related to as (the derivation can be found here). Estimation Robust measures of scale can be used as estimators of properties of the population, either for parameter estimation or as estimators of their own expected value. For example, robust estimators of scale are used to estimate the population standard deviation, generally by multiplying by a scale factor to make it an unbiased consistent estimator; see scale parameter: estimation. For example, dividing the IQR by 2 erf−1(1/2) (approximately 1.349), makes it an unbiased, consistent estimator for the population standard deviation if the data follow a normal distribution. In other situations, it makes more sense to think of a robust measure of scale as an estimator of its own expected value, interpreted as an alternative to the population standard deviation as a measure of scale. For example, the MAD of a sample from a standard Cauchy distribution is an estimator of the population MAD, which in this case is 1, whereas the population variance does not exist. Efficiency These robust estimators typically have inferior statistical efficiency compared to conventional estimators for data drawn from a distribution without outliers (such as a normal distribution), but have superior efficiency for data drawn from a mixture distribution or from a heavy-tailed distribution, for which non-robust measures such as the standard deviation should not be used. For example, for data drawn
https://en.wikipedia.org/wiki/Hop%20%28networking%29
In wired computer networking, including the Internet, a hop occurs when a packet is passed from one network segment to the next. Data packets pass through routers as they travel between source and destination. The hop count refers to the number of network devices through which data passes from source to destination (depending on routing protocol, this may include the source/destination, that is, the first hop is counted as hop 0 or hop 1). Since store and forward and other latencies are incurred through each hop, a large number of hops between source and destination implies lower real-time performance. Hop count In wired networks, the hop count refers to the number of networks or network devices through which data passes between source and destination (depending on routing protocol, this may include the source/destination, that is, the first hop is counted as hop 0 or hop 1). Thus, hop count is a rough measure of distance between two hosts. For a routing protocol using 1-origin hop counts (such as RIP), a hop count of n means that n networks separate the source host from the destination host. Other protocols such as DHCP use the term "hop" to refer to the number of times a message has been forwarded. On a layer 3 network such as Internet Protocol (IP), each router along the data path constitutes a hop. By itself, this metric is, however, not useful for determining the optimum network path, as it does not take into consideration the speed, load, reliability, or latency of any particular hop, but merely the total count. Nevertheless, some routing protocols, such as Routing Information Protocol (RIP), use hop count as their sole metric. Each time a router receives a packet, it modifies the packet, decrementing the time to live (TTL). The router discards any packets received with a zero TTL value. This prevents packets from endlessly bouncing around the network in the event of routing errors. Routers are capable of managing hop counts, but other types of network devices (e.g. Ethernet hubs and bridges) are not. Hop limit Known as time to live (TTL) in IPv4, and hop limit in IPv6, this field specifies a limit on the number of hops a packet is allowed before being discarded. Routers modify IP packets as they are forwarded, decrementing the respective TTL or hop limit fields. Routers do not forward packets with a resultant field of 0 or less. This prevents packets from following a loop forever. Next hop When configuring network devices the hop may refer to next hop. Next hop is the next gateway to which packets should be forwarded along the path to their final destination. A routing table usually contains the IP address of a destination network and the IP address of the next gateway along the path to the final network destination. By only storing next-hop information, next-hop routing or next-hop forwarding reduces the size of routing tables. A given gateway only knows one step along the path, not the complete path to a destination. It is also
https://en.wikipedia.org/wiki/T%C3%AAtes
Têtes or Tetes may refer to: Les Grosses Têtes, daily French radio program on the RTL French radio network Les Têtes Brulées, Cameroonian band known for a mellow pop version of the bikutsi dance music Les têtes interverties, 1957 French short film written and directed by Alejandro Jodorowsky Têtes à claques, French-language humour website created in 2006 Têtes Raides, French folk rock group blending French poetry, theater, visual arts and the Big Top circus antics fr:Têtes
https://en.wikipedia.org/wiki/Trim%20%28computing%29
A trim command (known as TRIM in the ATA command set, and UNMAP in the SCSI command set) allows an operating system to inform a solid-state drive (SSD) which blocks of data are no longer considered to be 'in use' and therefore can be erased internally. Trim was introduced soon after SSDs were introduced. Because low-level operation of SSDs differs significantly from hard drives, the typical way in which operating systems handle operations like deletes and formats resulted in unanticipated progressive performance degradation of write operations on SSDs. Trimming enables the SSD to more efficiently handle garbage collection, which would otherwise slow future write operations to the involved blocks. Although tools to "reset" some drives to a fresh state were already available before the introduction of trimming, they also delete all data on the drive, which makes them impractical to use for ongoing optimization. As of , many SSDs had internal garbage collection mechanisms for certain filesystem(s) (such as FAT32, NTFS, APFS) that worked independently of trimming. Although this successfully maintained their lifetime and performance even under operating systems that did not support trim, it had the associated drawbacks of increased write amplification and wear of the flash cells. TRIM is also widely used on shingled magnetic recording (SMR) hard drives. Background Because of the way that many file systems handle delete operations, by flagging data blocks as "not in use", storage media (SSDs, but also traditional hard drives) generally do not know which sectors/pages are truly in use and which can be considered free space. Contrary to (for example) an overwrite operation, a delete will not involve a physical write to the sectors that contain the data. Since a common SSD has no knowledge of the file system structures, including the list of unused blocks/sectors, the storage medium remains unaware that the blocks have become available. While this often enables undelete tools to recover files from electromechanical hard disks, despite the files being reported as "deleted" by the operating system, it also means that when the operating system later performs a write operation to one of the sectors, which it considers free space, it effectively becomes an overwrite operation from the point of view of the storage medium. For magnetic disks, an overwrite of existing data is no different from writing into an empty sector, but because of how some SSDs function at the lowest level, an overwrite produces significant overhead compared with writing data into an empty page, potentially crippling write performance. SSDs store data in flash memory cells that are grouped into pages typically of 4 to 16 kiB, grouped together into blocks of typically 128 to 512 pages. Example: 512 kiB blocks that group 128 pages of 4 kiB each. NAND flash memory cells can be directly written to only when they are empty. If they happen to contain data, the contents must be erased befor
https://en.wikipedia.org/wiki/Fanboy%20%26%20Chum%20Chum
Fanboy & Chum Chum is an American computer-animated television series created by Eric Robles for Nickelodeon. It is based on Fanboy, an animated short created by Robles for Nickelodeon Animation Studio and Frederator Studios, that was broadcast on Random! Cartoons. The series was first broadcast on October 12, 2009, on Nickelodeon as a preview, then officially premiered on November 6, 2009, after SpongeBob's Truth or Square. In the show, two slow-witted would-be superheroes attempt to rid their town of Galaxy Hills of evil, while annoying everyone around them. The series premiere drew 5.8 million viewers. The second episode was watched by 5.4 million viewers. The series won a Daytime Emmy Award for Outstanding Special Class Animated Program at the 38th Daytime Emmy Awards. The series' initial release finished on November 2, 2012. One episode, "Brain Freeze," was released on DVD in 2011 instead of being broadcast on television. It finally aired on July 12, 2014. The theme song was written by Brad Joseph Breeck and performed by an experimental punk band, The Mae Shi. Plot The series centers around Fanboy and Chum Chum, a pair of hyperactive, odd, energetic, and slow-witted best friends enthusiastically obsessed with superhero comics, particularly those featuring their favorite superhero Man-Arctica, who also apparently seems to double as a holiday figurehead parodying Santa Claus within the series. Many episodes are based around comical parodies of famous films or contain countless references to popular culture, chronicling Fanboy and Chum Chum's exaggerated, surreal daily experiences and misadventures relating to dilemmas in which they have entangled themselves or the surrounding characters' utter infuriation with their irritating antics. Episodes Characters Main Fanboy ("Lance" Tobias Cranapple lll) (voiced by David Hornsby) is an enthusiastic fan of comic books, fantasy, science fiction and action figures. He and Chum Chum are never seen without their costumes nor are their parents addressed. Chum Chum ("Sir" Edmund Chummery) (voiced by Nika Futterman and Nancy Cartwright in the pilot from Random! Cartoons) is Fanboy's best friend and sidekick. Although he is younger than the other main characters, he is still in the same class as them. Show creator Eric Robles explained on the Nickelodeon message board that this is because Fanboy snuck him into his class and the teacher never noticed the age difference. Chum Chum is extremely energetic and high-spirited. Supporting Kyle Bloodworth-Thomason (voiced by Jamie Kennedy) is an insecure pre-teen wizard who loathes Fanboy and Chum Chum for their lack of intelligence, but secretly enjoys their friendship. Kyle was expelled from his wizarding school, Milkweed Academy, for turning his teacher Professor Flan into a raspberry flan, calling him a "Delicious old fool". Kyle is now reluctantly enrolled in Fanboy and Chum Chum's public school, where he has very few friends other than Fanboy and Chum
https://en.wikipedia.org/wiki/Christian%20Engstr%C3%B6m
Lars Christian Engström (born 9 February 1960) is a Swedish computer programmer, activist and politician. He is deputy chairman of the Swedish Pirate Party. Engström was elected a Member of the European Parliament (MEP) in the 2009 election. Education and career Christian Engström was born in Högalid, Stockholm. He graduated from Stockholm University in 1983 with a degree in mathematics and computer science. While studying, Engström worked as a tutor at the university, teaching object-oriented programming in Simula. From 1978 he also worked part-time as a programmer at Skriptor, a small company which specialized in phonetic similarity searches for trademark names. After finishing his studies he started working full-time at the company. He became a partner in the firm in 1987 and in 1991 he became vice president. In 1997 the company was sold to the leading European trademark search house CompuMark. Engström stayed on in a similar capacity as before until 2001, when he left the company to set up his own consultancy firm Glindra AB. Activism and politics For five years Engström worked as an unpaid activist within the Foundation for a Free Information Infrastructure (FFII), lobbying against software patents. He was active in the campaign against the EU software patent directive, which was rejected by the European Parliament in July 2005. He also co-founded the Swedish section of FFII and served as its deputy chairman during the first year. In the late 1980s, Engström became a member of the Swedish Liberal People's Party. He served as a lay assessor () for the party in the Stockholm District Court between 1992 and 1998 and was active in local politics in Bromma, Stockholm. He left the Liberal People's Party on 1 January 2006, following the founding of the Pirate Party. Engström was elected a Member of the European Parliament (MEP) in the election held on 7 June 2009, in which the Pirate Party won 7.1% of the votes and received one mandate. However, when the Lisbon treaty came into effect a second mandate Amelia Andersdotter entered parliament for Piratpartiet. Engström was placed as his party's top candidate and received 43,808 votes (19% of the Pirate Party's total votes). After negotiations with some of the political groups of the European Parliament, it was announced on 25 June 2009 that Engström will join the green group (Greens–EFA). Engström was the only Swedish member of the European Parliament who voted against Mary Honeyball's report "Sexual exploitation and prostitution and its impact on gender equality", which recommends EU member states to adopt the "Swedish Model" that criminalises the purchase of sexual services. Personal life Engström is married and has one son. He lives with his family in Nacka, Stockholm County. See also Pirate Party File sharing References External links at European Parliament The Pirate Party Makes a Bid for the European Parliament Wired.com article, features interview with Christian Engström.
https://en.wikipedia.org/wiki/Baldr%20Sky
is a duology of Japanese adult visual novels with 2D action elements developed by Giga. The series characterizes itself as a cyberpunk action adventure game. The first game, named Baldr Sky Dive1 "Lost Memory” was released in Japan on March 27, 2009, for Windows. The second game, Baldr Sky Dive2 "Recordare" was released in Japan on November 27, 2009. A fandisc called Baldr Sky DiveX "Dream World" was released in Japan on September 24, 2010. An English version containing both Dive1 and Dive2 was released by Sekai Project on December 20, 2019. Gameplay A majority of Baldr Sky'''s gameplay consists of reading the text that's rendered on screen and supported with audio for voices. The player will occasionally be presented with choices to select which may or may not determine the outcome of the game. As Baldr Sky has multiple endings, the player will have to replay the game multiple times in order to view all of the endings. Similar to other games in the Baldr series, Baldr Sky is also driven by a top-down 2D interface where the player controls a mecha in sprite form to combat enemy machines. The player is given a chance to upgrade or modify the equipment of the mecha prior to a series of battles. Plot Setting and themesBaldr Sky takes place in Japan some time in the future during the 21st century. Nanomachines have become commonplace and have taken a major role in society. The abilities of these nanomachines range from medical purposes for curing ailments and modifying the taste of food. A new generation of humans now also have a chip embedded in them which allows them to be connected to the Internet at all times. With the dawn of these new technologies, warfare has expanded beyond the physical world onto the virtual world. People engage in combat online in simulacrums, the name of the mecha units in the game, or with viruses (unmanned robots). Story The story of Baldr Sky revolves around the male protagonist and is told through two timelines, the present and the past through flashbacks. At the beginning of the story, Kou is suffering from memory loss, so much of the back story about the past is told through flashbacks while Kou is recalling his memories with the aid of medical nanomachines. In the present, Kou and his subordinate, , are after a group of scientists who had inadvertently triggered a hazard due to leaking of a developing nanomachine. The city and the surrounding area that the lab is located in is ultimately demolished but the scientists had actually evacuated to safety from the lab before the place was destroyed. Kou wishes to uncover the truth about what happened that day and to prevent another tragedy from occurring again, as his girlfriend Sora was killed by the nanomachines. Characters The protagonist of the story. A free mercenary and an excellent simulacrum pilot. Kou has been chasing after the truth behind the incident known as "Gray Christmas", in which he lost the person most precious to him. As he recovers his memorie
https://en.wikipedia.org/wiki/Active%20Directory%20Federation%20Services
Active Directory Federation Services (AD FS), a software component developed by Microsoft, can run on Windows Server operating systems to provide users with single sign-on access to systems and applications located across organizational boundaries. It uses a claims-based access-control authorization model to maintain application security and to implement federated identity. Claims-based authentication involves authenticating a user based on a set of claims about that user's identity contained in a trusted token. Such a token is often issued and signed by an entity that is able to authenticate the user by other means, and that is trusted by the entity doing the claims-based authentication. It is part of the Active Directory Services. Details In AD FS, identity federation is established between two organizations by establishing trust between two security realms. A federation server on one side (the accounts side) authenticates the user through the standard means in Active Directory Domain Services and then issues a token containing a series of claims about the user, including their identity. On the other side, the resources side, another federation server validates the token and issues another token for the local servers to accept the claimed identity. This allows a system to provide controlled access to its resources or services to a user that belongs to another security realm without requiring the user to authenticate directly to the system and without the two systems sharing a database of user identities or passwords. In practice, a user might typically perceive this approach as follows: The user logs into their local PC (as they typically would when commencing work in the morning). The user needs to obtain information from a partner company's extranet website, for example, to obtain pricing or product details. The user navigates to the partner-company extranet site, for example: http://example.com. The partner website now does not require any password to be typed in; instead, the user credentials (in a secure assertion) are passed to the partner extranet site using AD FS. The user is now logged into the partner website and can interact with the website as if logged in. AD FS integrates with Active Directory Domain Services, using it as an identity provider. AD FS can interact with other WS-* and SAML 2.0-compliant federation services as federation partners. Versions ADFS 1.0 - Windows Server 2003 R2 (additional download) ADFS 1.1 - Windows Server 2008 and Windows Server 2008 R2 ADFS 2.0 - Windows Server 2008 and Windows Server 2008 R2 (download from Microsoft.com) ADFS 2.1 - Windows Server 2012 ADFS 3.0 - Windows Server 2012 R2 Windows Server 2016 AD FS - Windows Server 2016 Windows Server 2019 AD FS - Windows Server 2019 See also Claims-based identity Digital identity Information Card LDAP SAML Windows CardSpace Windows Server 2012 Windows Server 2008 WS-Federation Office 365 References External links AD FS 2.0
https://en.wikipedia.org/wiki/Critter%20Crunch
Critter Crunch is a puzzle game in the vein of Magical Drop by Capybara Games for mobile phone platforms BREW and J2ME in 2007. It was later ported to iOS, PlayStation 3 on the PlayStation Network, Windows, and Mac OS X. In Critter Crunch, players assume the role of Biggs, a friendly, furry forest dweller with an unending hunger for tasty critters. Using his long tongue, Biggs must set the food chain in motion by launching smaller critters into the waiting mouths of larger ones, clearing the screen and filling his belly. Reception The game was given positive reviews. It has an average of 78% at Game Rankings and a 87/100 at Metacritic. It won Best Game of 2007 at the Independent Games Festival Mobile. Review Scores 1UP: 9.5/10 IGN: 8.6/10 References Notes External links Critter Crunch at CapybaraGames.com Interview with Capybara Games about Critter Crunch at Console-Arcade.com 2007 video games Disney video games IOS games J2ME games MacOS games PlayStation 3 games PlayStation Network games Puzzle video games Video games developed in Canada Windows games Multiplayer and single-player video games PhyreEngine games Capybara Games games
https://en.wikipedia.org/wiki/Evidence-Informed%20Policy%20Network
Evidence Informed Policy Network (EVIPNet) is a network, sponsored by the World Health Organization (WHO), which attempts to improve public health, especially in developing countries, by coordinating the efforts of policymakers and health researchers. History EVIPNet grew out of discussions at the Ministerial Summit on Health Research held in Mexico City, November 16–20, 2004. Following the Summit, the World Health Assembly which governs the World Health Organization passed Resolution 58.2, 4-5 endorsing the "Mexico Statement On Health Research: Knowledge for better health" developed during the Summit. In the statement, Ministers of Health and delegates called "for national governments to establish sustainable programs to support evidence-based public health and health care delivery systems, and evidence-based health related policies." Resolution 58.34 made a call "to establish or strengthen mechanisms to transfer knowledge in support of evidence-based public health and health-care delivery systems, and evidence-based health-related policies". Developments relevant to EVIPNet are regularly reported to the Advisory Committee on Health Research of the World Health Organization and of its Regional Offices. In March 2009 the EVIPNet Secretariat presented to WHO’s Advisory Committee on Health Research a capacity building strategy that assessed through a validated tool the knowledge needs with respect to a defined set of skills for EVIPNet teams, allowing a strategic and organized approach to capacity building. Similarly, WHO Regional Advisory Committees on Health Research monitor progress and provide key guidance to EVIPNet efforts. EVIPNet gained great momentum in Africa where policy briefs soon became available. The enthusiasm had spread also to the Americas and the Eastern Mediterranean, and after a coordination meeting organized by WHO in Addis Ababa in October 2015, it gained traction in the European region as well. By then, the Global Steering Group, working with WHO Collaborating Centers (e.g. WHO Collaborating Centre for Evidence-Informed Policy, at McMaster University) and specialized centers such as BIREME, the Latin American and Caribbean Center on Health Sciences Information, had set up one-stop shops that enabled access to specialized collections of indexed policy briefs, systematic reviews, policy documents and other relevant resources, as one of the shared resources for the global EVIPNet networks, such as the free access portals (with registration) of Health Systems Evidence and Health Evidence. In October 2016 The World Health Organization published an executive summary and document entitled "Evipnet 10 years 10 stories" with a selection of cases describing impacts of EVIPNet at country level. In the meanwhile, the platform expanded especially in the European region. In November-December 2016, PAHO's 46th Advisory Committee on Health Research convened and its report, issued in 2017, provided updates on EVIPNet and knowledge tr
https://en.wikipedia.org/wiki/Little%20Snitch
Little Snitch is a host-based application firewall for macOS. It can be used to monitor applications, preventing or permitting them to connect to attached networks through advanced rules. It is produced and maintained by the Austrian firm Objective Development Software GmbH. Unlike a stateful firewall, which is designed primarily to protect a system from external attacks by restricting inbound traffic, Little Snitch is designed to protect privacy by limiting outbound traffic. Until Little Snitch 4, it controlled network traffic by registering kernel extensions through the standard application programming interface (API) provided by Apple, but for its 5th release it switched to using Apple's Network Extensions due to the deprecationof Kernel Extensions on macOS Catalina. If an application or process attempts to establish a network connection, Little Snitch prevents the connection, if a rule for that connection has been set by the user. For that, a dialog is presented to the user, which allows one to deny or permit the connection on a one-time, time limited, or permanent basis. The dialog also allows the user to restrict the parameters of the connection, restricting it to a specific port, protocol, or domain. Little Snitch's integral network monitor shows ongoing traffic in real time with domain names and traffic direction displayed. The application (version 4) received a positive 4.5/5 review from Macworld. References External links Firewall software
https://en.wikipedia.org/wiki/SP21
SP21 may refer to : SP21 computer game, a classic computer game for PDP-11 and DVK SP-21 Barak, a pistol was developed by Israel Military Industries (IMI) in 2002 SP-21 (Brazil), a State highway in Brazil USS Zita (SP-21), a motorboat that the United States Navy assigned to service as a patrol vessel in 1917 during World War I a type of Vespel plastic made by DuPont
https://en.wikipedia.org/wiki/Bulgarians%20in%20Spain
Bulgarians () in Spain (, Ispania) are one of the largest communities of the Bulgarian diaspora. According to official 2019 data, they numbered 197,373, making them the tenth-largest emigrant community in Spain and the second-largest among Central and Eastern European emigrant communities. History The bulk of Bulgarians in Spain consists of recent economic immigrants. Until recent years, Bulgarian emigration to Spain was scarce and unorganized. According to historian Ivan Dimitrov, an unknown number of Bulgarians fled to Spain after the Ottoman conquest of the Second Bulgarian Empire in the late 14th or early 15th century. Dimitrov claims that around 300 families in Spain retain memories of their Bulgarian origin from that period. Among Bulgarians are Banat Bulgarians from Romania, Aromanians and Megleno-Romanians who became adjusted to Spanish society because of the linguistic similarities between Romanian, Aromanian, Megleno-Romanian, and Spanish, as well as Latin identity of Aromanians and Megleno-Romanians, and Banat Bulgarians are predominantly Roman Catholic. With the upsurge of Bulgarian economy in the 18th and 19th centuries, individual Bulgarian merchants reached the markets of Spain, though a colony was never formed even after the Liberation of Bulgaria in 1878. Only after World War I did Bulgarian gardeners reach Spain, specifically Catalonia. According to a 1930 statistic, 88 Bulgarian gardeners worked in Spain. However, the Spanish Civil War of 1936–39 and World War II that followed hindered the formation of a gardening colony. After World War II, a small number of Bulgarian political emigrants fleeing the communist regime settled in Spain. Among those emigrants was a large part of the Bulgarian royal family, including the deposed child monarch Tsar Simeon II of Saxe-Coburg-Gotha, who was granted asylum by Francisco Franco in 1951. Simeon II lived in Spain for 50 years, until his return to Bulgaria in 2001. Around 1998, the number of Bulgarians in Spain was only around 3,000. By 2002, around 10,000 people had been officially registered as legal Bulgarian emigrants, though the number of illegal immigrants was thought to be much larger. In the early 21st century, substantial Bulgarian communities were formed in Madrid, Barcelona, Málaga, San Sebastián, Valladolid, Palma de Mallorca and other cities. Foreign population of Bulgarian citizenship in Spain Bulgarian citizens living in Spain include ethnic Bulgarians as well as minority groups (including Turks, Pomaks, Armenians etc.). Notable people Mariana Gurkova Romano Kristoff See also Bulgaria–Spain relations References Notes Sources External links Bulgarian embassy in Spain List of Bulgarian organizations in Spain by the Agency for Bulgarians Abroad Bulgarian orthodox parish of the Nativity of the Mother of God in Barcelona Ethnic groups in Spain Spain
https://en.wikipedia.org/wiki/Canada%20Systems%20Group
Canada Systems Group (CSG) was one of the first data processing service bureaus in Canada. Featuring IBM and Amdahl mainframes, disk and network processors, alongside StorageTek tape devices, CSG was the largest, followed by Datacrown, whose owner at the time was Crown Life Insurance, and IP Sharp (eventually acquired by Reuters, now Thomson Media). Canada Systems Group (EST) Limited was a data processing service bureau based in Mississauga, Ontario, Canada. Key dates October 1970 - CSG created by Eatons, Stelco & London Life with office in TD Tower Floor 37, Toronto Spring 1971 - Office moved to Sheridan Mall, Mississauga September 1971 Labour Day - Office moved to 2599 Speakman Drive, Mississauga, Ontario. Mid November 1971 - Stelco production started at Speakman Late January 1972 - Eatons production started at Speakman History CSG was originally created by the divestiture of the data processing departments of Eaton's, (Canada's largest department store chain), Stelco (Canada's largest steel producer), and TRW. The latter company dropped out of the triumvirate shortly after CSG was formed, to be replaced by Royal Trust, Canada's largest Trust company. CSG's head office and main datacentre was located in the Sheridan Park Research Community in Mississauga Ontario. CSG maintained smaller datacentres in Ottawa, Ontario and Calgary, Alberta. Sales offices were maintained in Vancouver (BC) Calgary (AB), Edmonton (AB), Winnipeg (MA), Toronto (ON), Montreal (PQ), Saint John (NB) and Washington, DC (USA). Early in its history, CSG acquired Multiple Financial Services, a financial service bureau, at time the largest in Canada, which provided outsourcing of the processing and accounting functions for the brokerage and mutual funds industries. The Mississauga datacentre was one of the largest in North America, consisting of two raised floorspaces of each. The second floor housed the multiple mainframe processors and hundreds of disk units. The first floor housed the network processors, switches, and utilized the first fibre-optic cables available in Canada. In addition, over 200 tape drives, a tape library of over one hundred and thirty thousand serial tape volumes on moveable shelves before disk-packs began to overtake tape data storage and the main console areas (the 'Dais') were on the first floor. To achieve the required efficiencies, CSG developed its own Pre-Scan software for the IBM MVS Operating System. This software facilitated tape drives being pre-allocated and tape files pre-mounted by tape operators as a job was read into the job scheduler. Two Job Execution Schedulers were available from IBM; JES2 which read in the job, created a job address space in memory, and then waited for the requested job resources (tape drive, tape file mounted on drive, ready to read/write) were physically available before starting job execution; and JES3, where the job would be read in by the system, then wait until the requested job resour
https://en.wikipedia.org/wiki/Twitterfall
Twitterfall was a UK-based website designed to allow users of the social networking site Twitter to view upcoming trends and patterns posted by users in the form of tweets. The project was founded by David Somers and Tom Brearley, computer science students at the University of York. In February 2009, it was revealed that the site was projected onto a wall at The Daily Telegraph to allow journalists there to view breaking news posted by users to Twitter. Twitterfall gained momentum in March after The Telegraph reported on the creation of the tool. However, the paper was criticised for including an unmoderated Twitterfall stream of budget news (using hashtags) on its site, which was subsequently abused by Twitter users. Twitterfall took advantage of Twitter's search trends (listed on the Twitter search page), which revealed topics that were most popular and discussed at that time. Twitter has become more and more important in news coverage, such as the US Airways plane crash-landing in the Hudson and the Mumbai terror attacks in 2008. In May 2009, ITV announced that they were taking advantage of Twitterfall on their site during the FA Cup Final. During the Iran election protests of 2009, Twitterfall was used to follow the events as they unfolded. Twitterfall discontinued service January 29th, 2023 References External links Twitterfall Twitter services and applications
https://en.wikipedia.org/wiki/Screenvision
Screenvision Media is a cinema advertising and film distribution company in the United States. The Screenvision Media cinema advertising network includes over 15,000 screens, more than 2,400 theatre locations, and 335 universities in every state and 93% of U.S. designated market areas, and through this network delivers more than 500 million consumer touches annually. Headquartered in New York City, Screenvision provides on-screen advertising, in-lobby promotions and integrated marketing programs, with offices in New York City, Chicago, Detroit, and Los Angeles. The company’s Screenvision Direct business unit has 6 regional offices and local sales representatives nationwide. John Partilla joined as CEO in October, 2015. Screenvision has 350 employees and an annual revenue of $250 million. Screenvision represents over 155 theatrical exhibitors, including 17 of the top 25 exhibitor companies. In addition to cinema advertising sales and media management, the company provides production services, high definition digital network installation and management, digital entertainment preshow production, alternative content services and other associated products and services. Structure Screenvision was a joint venture between ITV plc (LSE: ITV), a UK-based free to air commercial television broadcaster and Technicolor SA, a provider of technology, services, systems and equipment to the media and entertainment industries. History On 28 September 2010, ITV plc sold their stake to Shamrock Capital Growth Fund II, in a deal worth a reported $80m. Later on, Carmike Cinemas acquired 20% of Screenvision; today, that 20% stake is owned by AMC Entertainment. AMC's acquisition of Carmike Cinemas resulted in the transfer of 384 AMC Theatre screens into the Screenvision Media exhibitor network. In May 2014, Screenvision entered into a merger agreement with National CineMedia (NCM) for US$375 million. The merger was blocked by the Department of Justice over antitrust concerns, since Screenvision and NCM together would supply advertising to 34,000 of the nation's 39,000 movie screens. In March 2015, Screenvision and NCM terminated their deal and NCM paid Screenvision a $26.8 million termination payment. In the fall of 2016, Screenvision Media rolled out Screenvision Select, an additive network with curated programming created specifically for art house theatres. At their 2016 upfront event in New York City, Screenvision Media unveiled the Connected Cinema brand "storytelling platform", which, through several tech alliances, will allow advertisers to "engage with" moviegoers before, during and after the movie. Screenvision was acquired by Abry Partners in June 2018 for $380 million. The Boston-based media-focused private equity firm took a controlling stake in the company. In November 2019, the company launched Screenvision Sports, extending their core cinema advertising business to sports leagues, teams and properties. Film distribution The company also distri
https://en.wikipedia.org/wiki/Revenue%20assurance
Revenue assurance (RA) telecommunication services, is the use of data quality and process improvement methods that improve profits, revenues and cash flows without influencing demand. This was defined by a TM Forum working group based on research documented in its Revenue Assurance Technical Overview. References Business management Telecommunications economics
https://en.wikipedia.org/wiki/OS4000
OS4000 is a proprietary operating system introduced by GEC Computers Limited in 1977 as the successor to GEC DOS, for its range of GEC 4000 series 16-bit, and later 32-bit, minicomputers. OS4000 was developed through to late 1990s, and has been in a support-only mode since then. History The first operating systems for the GEC 4000 series were COS (Core Operating System) and DOS (Disk Operating System). These were basically single-user multi-tasking operating systems, designed for developing and running Process control type applications. OS4000 was first released around 1977. It reused many of the parts of DOS, but added multi-user access, OS4000 JCL Command-line interpreter, Batch processing, OS4000 hierarchical filesystem (although on-disk format very similar to the non-hierarchical DOS filesystem). OS4000 JCL was based on the Cambridge University Phoenix command interpreter. OS4000 Rel 3 arrived around 1980, and included Linked-OS — support for Linked OS4000 operating systems to enable multi-node systems to be constructed. The main customer for this was the central computing service of University College London (Euclid), where a multi-node system consisting of a Hub file server and multiple Rim multi-access compute server systems provided service for over 100 simultaneous users. Linked-OS was also used to construct fail-over Process control systems with higher resilience. OS4000 Rel 4 arrived around 1983, and upped the maximum number of user modules to 150 (again, mainly for the University College London Euclid system), together with an enhanced Batch processing system. It also included support for the GEC 4090 processor, which introduced a 32-bit addressing mode. OS4000 Rel 5 introduced a modified version of the OS4000 filesystem called CFSX, in order to allow easier use of larger disks. The initial Rel 5 only supported the CFSX filesystem, but support for the original CFS1 filesystem was reintroduced as well quite quickly. OS4000 Rel 6 introduced support for dual processor systems (GEC 4190D). OS4000 was developed in the UK at GEC Computers Borehamwood offices in Elstree Way, and at GEC Computers Dunstable Development Centre in Woodside Estate, Dunstable. Architecture The architecture of OS4000 is very heavily based around the features of the platform it runs on, the GEC 4000 series minicomputers, and these are rather unusual. They include a feature called Nucleus, which is a combination of a hardware- and firmware-based kernel, which cannot be altered under program control. This means that many of the features typically found in operating system kernels do not need to be included in OS4000, as the underlying platform performs these functions instead of the operating system. Consequently, there is no provision for running privileged mode code on the platform—all OS4000 operating system code runs as processes. Nucleus supports up to 256 processes, and schedules these automatically using a fixed priority scheme. OS4000 lives entire
https://en.wikipedia.org/wiki/R%C3%A9seau%20Morhange
Réseau Morhange ("Morhange network") was a French resistance group created in 1943 by Marcel Taillandier in Toulouse. The group organised direct action and counterintelligence against the German occupiers and collaborators of Vichy France. The Morhange Group The group was constituted of 82 agents officially engaged in the conflict against Nazi Germany. Morhange was a Counterintelligence organisation against the counterintelligence of the Gestapo and the Abwehr. In 1940, Commandeur Paillole was responsible for the counterintelligence services of the Vichy army. However he continued to work with the British services against the German intelligence Abwehr whose objective was to track down French resistance fighters. In November 1942, when Nazi Germany invaded Vichy France, Paillole fled to Spain before reaching London where he was welcomed by members of the Secret Intelligence Service before being transferred to Algiers. Paillole orders reached Marchel Taillandier who led the Morhange group and the French resistance in Toulouse against the German occupier. Connections with other groups The Morhange Group operated with other groups in the Toulouse area: The groups of Marie Dissard and of Albert Guérisse who hid and smuggled allied soldiers all across France into Spain via the Pyrenees The socialist group "Libérer Fédérer" of Silvio Trentin, an anti-fascist Italian. The VIRA group. The Franc-Tireur movement. Libération-sud. The Combat French resistance group. The Armée secrète. The Lost Airman Seth Meyerowitz in his book The Lost Airman (Atlantic Books, London) writes about his grandfather Arthur Meyerowitz, who was in the crew of a B-24 bomber Harmful Lil Armful during a bombing run over occupied France. The B-24 was badly damaged by German anti-aircraft 88mm cannons and Arthur parachuted out of his stricken plane over Nazi-German-occupied France, eventually escaping with the help of the resistance through Spain and Gibraltar back via Bristol, England to the United States. Arthur was indebted to many that helped him and the Morhange resistance, especially Marcel Taillandier. The book ends with 18 pages of carefully researched notes relating to France during the period December 1943 to June 1944. Notes and references French Resistance networks and movements
https://en.wikipedia.org/wiki/Bulgarians%20in%20Germany
Bulgarians in Germany (; ) are one of the sizable communities of the Bulgarian diaspora in Western Europe. According to German statistical data from 2016, the number of Bulgarian nationals in Germany on 31 December 2022 was 429,665 (up from 53,984 in 2008). History The Bulgarian Empire was in contact with the German-speaking lands in medieval times, though the Ottoman conquest of the Balkans in the 14th and 15th centuries severed those ties. In the 16th century, Bulgarian Orthodox clerics were known to have been in contact with the German Lutherans and by the 18th century Bulgarian merchants in Leipzig were distinguished from other Balkan Christian merchants. It was not until the 19th century, however, that German–Bulgarian ties became once again more pronounced, and this was mainly owing to education. In 1825–1831, Bulgarian enlightener Petar Beron studied at the University of Heidelberg, while from 1845 to 1847 journalist and linguist Ivan Bogorov was a student at the University of Leipzig. From 1846 to 1847, Bogorov published the first Bulgarian newspaper, Bulgarian Eagle, out of Leipzig. After the Liberation of Bulgaria in 1878, the German Empire continued to be a centre of higher education for Bulgarians, and hundreds of Bulgarian students were sent to Germany on state scholarships by the Principality of Bulgaria and Eastern Rumelia (pre-1885). German universities were, together with universities in Switzerland, only second to those of Russia and Austria-Hungary among the most favoured foreign educational institutions for Bulgarians. Associations of Bulgarian students were formed in Leipzig, Berlin, Munich, Dresden, Heidelberg, Erlangen, Halle an der Saale and Freiburg im Breisgau in the late 19th and early 20th century. The University of Leipzig alone had 101 Bulgarian students from 1879 to 1899 and a total of 194 dissertations were successfully presented by Bulgarian students in Germany from 1900 to 1918. The Bulgarian–German Association was established in Berlin on 16 February 1918 and had branches in many German cities. Educational ties were preserved after World War I: in 1926–1927 alone, 302 people from Bulgaria studied in Germany. Today, there are Bulgarian Orthodox parishes in Berlin, Leipzig, Düsseldorf, Cologne, Bonn, Munich, Stuttgart, Regensburg and Passau, with a bishop's seat and cathedral in Berlin. Demographics Roma minority Turkish minority From the early 1990s Western Europe began to attract Bulgarian Turks for the first time in their social history. Migration to Germany, in particular, was initiated by those Bulgarian Turks who, for various reasons, were unable to join the first massive migration wave to Turkey in 1989 or who were part of the subsequent return wave which was dissatisfied with the conditions of life or the social adjustment prospects there. The majority of Turks from Bulgaria migrated to Germany in the 1990s asylum regime, which provided generous social benefits. Bulgarian Turks are to be found pr