source
stringlengths
32
199
text
stringlengths
26
3k
https://en.wikipedia.org/wiki/Bromcom
Bromcom Computers plc is a British technology company. It provides schools and colleges with a Management Information System and handheld data capture devices to record and track pupil performance. Bromcom is used by schools in Telford & Wrekin, Ark Schools, and the Harris Federation. History Bromcom was founded in 1986 by computer scientist Ali Guryel as a private company serving business-to-business alongside sister company Frontline Technology Ltd. Bromcom's first product in the early 1990s was the EARS (Electronic Attendance Registration System), a software package designed to replace paper registers. It was shown on the BBC's Tomorrow's World in January 1994. In June 2000, Bromcom launched a 'Parent Portal', MyChildAtSchool.com, to enable pupil's parents to access information about their child's academic performance via the internet. A new MIS was completed in 2008 after initial works in 2004. This was replaced with a web based solution in 2011. In 1999, consultancy firm Capita did not cooperate with Bromcom's request for improved interoperability with their SIMS system: Bromcom complained to the now defunct Office of Fair Trading (OfT), who sided Bromcom in that Capita was required to offer interoperability. Later in 2020, it was involved in legal disputes with United Learning over claims of a breach of contract. In March 2012, a new framework agreement was created in a £575m deal with the Department for Education. 18 suppliers were appointed under the new framework, including Bromcom, Capita, Serco, and RM plc. The agreement was set up by the Government Procurement Service on behalf of the DfE. References External links Truancy cut by computer revolution — BBC News Software companies of the United Kingdom Companies established in 1986 Companies based in the London Borough of Bromley 1986 establishments in the United Kingdom
https://en.wikipedia.org/wiki/Ask%20the%20Leyland%20Brothers
Ask the Leyland Brothers was an Australian television show that screened on the Nine Network for 153 episodes between 1976 and 1980, and later between 1983 and 1984. The series followed documentary filmmakers Mike and Mal Leyland, as well as their wives and children, who travelled across Australia and New Zealand in response to questions and requests posed by viewers. Development Prior to embarking on Ask the Leyland Brothers, the Leylands had made four feature films and two previous television series. The films Down the Darling, Wheels Across a Wilderness, Open Boat to Adventure and The Wet were produced between 1963 and 1972, and followed the brothers on four journeys across different parts of Australia. The television series, Off the Beaten Track and Trekabout, were produced during the early to mid-1970s. Inspiration for the new series came from You Asked for It, a US series in which Art Baker would fulfil requests from viewers that were sent in via postcards; the series was broadcast in Australia during the 1970s. Ask the Leyland Brothers was intended to follow a similar format, with viewers nominating places which the Leyland brothers would visit and cover in each episode. According to Mike Leyland, the plan was for readers to feel involved when their names were read out, thus causing them to encourage their "mates" to watch the show as well. Production In order to get things started, in 1976 the brothers filmed an initial pilot episode which mapped out the format, and placed a full page advertisement in the popular TV Week magazine to garner questions and requests. The format proved to be successful, and at one stage the show had 2.5 million viewers an episode, which was about 40% of the audience at the time. The popularity of the show led to viewers recognising the brothers and their wives while they were scouting for locations, sometimes forcing them to go incognito. Initially the brothers travelled in an orange Volkswagen Kombi (later upgraded to a pair of 4WD vehicles), and the show was filmed in Super 8 and edited in the style of a home movie. The format, combined with the Leyland's onscreen manner and the presence of their families gave the show a "home-spun" feel. References External links 1976 Australian television series debuts 1984 Australian television series endings 1970s Australian documentary television series 1980s Australian documentary television series Australian travel television series Nine Network original programming Television shows set in the Outback
https://en.wikipedia.org/wiki/Network%20Route%20Utilisation%20Strategy
The Network Route Utilisation Strategy (Network RUS) is a Route Utilisation Strategy (RUS) produced by Network Rail (NR). The Network RUS is one of only two (the Freight RUS is the other) which have the perspective of the network as whole; most of NR's RUSs are geographical, mainly regional, in nature. Uniquely the Network RUS is divided into four separate workstreams each of which has its own management team and documentary outputs, effectively an RUS in its own right. RUSs are established by the Office of Rail Regulation (ORR) unless the latter objects within 60 days. As at mid-March 2010 two workstreams had been published and established (the Scenarios & Long Distance Forecasts workstream and the Electrification workstream); they are consequently included in Network Rail's map as established, and it is expected that the others will be included as they are published and established. By definition the geographic scope is the whole Network Rail network. The Scenarios & Long Distance Forecasts workstream This workstream was published in June 2009. Originally it was to be called the Review of RUSs/Long Distance train statement, and an appropriate scoping document was accordingly published on the website. By shortly before the publication of the draft document, the perspective had been changed to Long distance services and Scenarios, and continued to be described as such on the Network Rail map even after publication of the draft, which like the final version had the above title. By the time of the publication of the draft the original scoping document was removed from the website, and not replaced, with no explicit explanation. Unlike other RUSs and the electrification workstream this workstream does not consider any specific rail interventions. Instead the main focus of the document is to promote the concept of the use of 'Scenarios' to help determine possible variations in future demand for rail travel, in particular for trips over 50 miles. In contrast to other RUSs there is no consideration of short-term (CP4) or medium-term factors (CP5); the 'long-term' in passenger demand focussed on is overwhelmingly the year 2036, which is well beyond the time horizon of other RUSs (a single table suggests passenger growth rates to 2021); freight growth is considered to 2031. As with other RUSs, the Scenarios workstream RUS invited responses from interested parties. The NR website acknowledged a number of responses, including the Office of Rail Regulation (ORR). The Electrification workstream This workstream was published on 28 October 2009, having been issued as a draft for consultation in May 2009. The workstream identified four types of 'gap' potentially fulfilled by further electrification: Type A : where electrification would enable more efficient operation of passenger services Type B : where electrification would enable more efficient operation of freight services Type C: where electrification could provide diversionary route capacity
https://en.wikipedia.org/wiki/Medical%20Reality%20Markup%20Language
Medical Reality Modeling Language (MRML) is a language implemented as a type of XML document, with new tags defined to handle medical image data types such as volumes, models or coordinate transforms. External links Data modules of Slicer (software libre for visualization and image computing). XML markup languages Markup languages
https://en.wikipedia.org/wiki/C10k%20problem
The C10k problem is the problem of optimizing network sockets to handle a large number of clients at the same time. The name C10k is a numeronym for concurrently handling ten thousand connections. Handling many concurrent connections is a different problem from handling many requests per second: the latter requires high throughput (processing them quickly), while the former does not have to be fast, but requires efficient scheduling of connections. The problem of socket server optimisation has been studied because a number of factors must be considered to allow a web server to support many clients. This can involve a combination of operating system constraints and web server software limitations. According to the scope of services to be made available and the capabilities of the operating system as well as hardware considerations such as multi-processing capabilities, a multi-threading model or a single threading model can be preferred. Concurrently with this aspect, which involves considerations regarding memory management (usually operating system related), strategies implied relate to the very diverse aspects of I/O management. History The term C10k was coined in 1999 by software engineer Dan Kegel, citing the Simtel FTP host, cdrom.com, serving 10,000 clients at once over 1 gigabit per second Ethernet in that year. The term has since been used for the general issue of large number of clients, with similar numeronyms for larger number of connections, most recently "C10M" in the 2010s to refer to 10 million concurrent connections. By the early 2010s millions of connections on a single commodity 1U rackmount server became possible: over 2 million connections (WhatsApp, 24 cores, using Erlang on FreeBSD) and 10–12 million connections (MigratoryData, 12 cores, using Java on Linux). Common applications of very high numbers of connections include general public servers that have to serve thousands or even millions of users at a time, such as file servers, FTP servers, proxy servers, web servers, load balancers. See also Event-driven architecture Event-driven programming Reactor pattern References Web server software Computer performance
https://en.wikipedia.org/wiki/Atlantic-Pacific%20Capital
Atlantic-Pacific Capital (APC) is an independently owned placement agent. APC has established relationships with a network of institutional investors in North America, Europe, the Middle East, Australasia, and the emerging markets to which it markets private equity funds. Founded in 1995, APC has raised in excess of $50 billion for over 50 transactions. APC has an established brand within the private equity community and is dedicated to maintaining relationships with over 4,000 alternative investors worldwide. The firm is based in Greenwich, Connecticut with other offices in New York, San Francisco, Chicago, London, and Hong Kong. History APC was founded in 1995 by Jim Manley who had worked as an investment banker for Prudential Securities and Merrill Lynch before founding a hedge fund advisory business, Everest Capital. In its first ten years, the firm managed over $18 billion in fundraisings. Among its early mandates included Pegasus Capital Advisors, Newbridge Capital, Wexford Capital and Greenwich Street Capital in the 1990s as well as New Mountain Capital, Littlejohn & Co., Wellspring Capital, Evercore Partners, Mattlin Patterson, The Jordan Company and Platinum Equity Partners in the early 2000s. In 2005, APC launched its direct placements group forming a new team to advise fundless sponsors on placements of equity for private equity transactions. In more recent years, APC has completed fundraisings for private equity firms including Energy Capital Partners, MPM Capital and Henderson Global Investors, among others. Atlantic-Pacific was in a private placement lobbying group, along with C.P. Eaton, in the effort to protest a new rule opened for comment by The Securities and Exchange Commission in 2009. The SEC proposal under the Investment Advisers Act of 1940 would prohibit an adviser from providing or agreeing to provide, directly or indirectly, payment to any third party for a solicitation of advisory business from any government entity on behalf of such adviser. A number of leaders in private equity has written into the SEC to comment. References Investment banks in the United States Companies based in Greenwich, Connecticut Financial services companies established in 1995
https://en.wikipedia.org/wiki/Mills%20James
Mills James is a creative media production company in Columbus, Cleveland and Cincinnati, Ohio that creates and produces broadcast programming and documentaries, corporate and institutional video and film projects, infomercials, television commercials, digital signage and corporate meetings and special events. Additional services include webcasts and webinars and digital distribution and transmission services. Mills James has a staff of 180 people whose training and experience cover the creative, electronic and theatrical production disciplines. They include producers, directors, writers, special events experts, set designers and builders, music composers, graphic artists and animators, video editors, audio engineers, and support personnel. The Columbus Teleproduction Center houses studios; editing, audio and visual effects suites; control and engineering centers; creative services; and administrative and business support functions. In the Westbelt complex, nearby, is the operations center for the Mills James Experience Group [MJx], the meetings and events group - housing the company's inventory of lighting, audio, projection and AV equipment, as well as its logistical support staff, scene shop and transportation fleet. Mills James' Cincinnati operation serves its corporate and advertising clients in the southwestern Ohio/northern Kentucky area with a staff of producers, event specialists, videographers, editors, graphics designers and technicians. Mills James' Cleveland facilities are located in the historic Bradley Building in the Warehouse District downtown, and include studio, video editing and fiber optic digital transmission operations for broadcast programming and news feeds. Productions Mills James produces commercials, original television productions, documentaries, infomercials, news feeds, corporate videos, mobile apps and special events for companies and organizations including Victoria's Secret, Ohio State University, Procter & Gamble, Nationwide Insurance, Fox News and Scotts Miracle-Gro Company. Several Mills James half-hour television series are currently airing on TV stations around the country. The Piano Guy with Scott Houston, a multiple Emmy Award-winning how-to program, airs nationally on public television, and C.E., the Ohio Lottery’s weekly game show, is broadcast Saturday evenings on a 12-station statewide network. Mills James also telecasts The Ohio Lottery daily game drawings live from its Cleveland studio operation. The Mills James film The Cartoonist, is a feature-length documentary about the life and work of Jeff Smith, creator of the graphic novel series, Bone. Services Mills James practices what it terms 'the art and science of modern storytelling,' combining ideas and technology into designed messages for sales and marketing communications, brand management, investor relations, change management, employee communications and public relations. Mills James' services include: Concepting and design Post
https://en.wikipedia.org/wiki/GlobaLogix
GlobaLogix is an oilfield engineering and technology company, operating in Houston, Texas. It offers several services related to the industry, from remote data management and collection to automation consultation. History Incorporated in 2004, GlobaLogix was created to resolve the problem of limited technological resources and rising price rates. A demand for better asset management drove GlobaLogix to create a service that allows for the remote observation and data collection of oilfields. In 2007, the Houston Business Journal named GlobaLogix the fastest growing company in Houston. Sales from 2006 to 2007 rose 1,400 percent from $347,000 to $5,017,000, outpacing all other technology company growth in the Houston area. Growth continued in 2008 and again in 2009 with a posted 90%+ growth in revenue. Headcount of the staff passed the 100 mark in 2009 and in early 2010 was more than 115. GlobaLogix's vice president, Jim Ferrero, announced in 2010 that GlobaLogix would provide consultation to companies considering transitioning to more carbon-neutral operations. These consultations would provide evaluations and suggestions for more efficient automation of the industry, as well as a movement towards more digital management. Services GlobaLogix offers multiple services to clients, including wireless, satellite, radio, Wi-Fi, supervisory control and data acquisition or SCADA, human-machine interface, and programmable logic controllers. They also provide consulting services, which include evaluating current oilfield operations and assisting clients in implementing automated systems that incorporate existing equipment. The company employs engineers, programmers, and information technology managers to handle the technical side of its project operations, and also maintains a staff of traditional field technicians for labor in the oilfields. GlobaLogix's stated mission is to help companies achieve greener operations in their oil and natural gas fields by using predictive maintenance to address field problems, avoid shutdowns, and reduce the number of miles driven each day by field personnel. References Geology software Business software companies
https://en.wikipedia.org/wiki/Army%20Network%20Enterprise%20Technology%20Command
United States Army Network Enterprise Technology Command (NETCOM) is a US Military unit subordinate to United States Army Cyber Command. NETCOM's mission is to operate and defend the computer networks of the United States Army. The numerical command for NETCOM was 9th Army Signal Command, though this distinction was removed on 1 October 2011. Its heritage can be traced back to the creation of the 9th Service Company in 1918. The command headquarters is at Fort Huachuca, Arizona. Major General Christopher L. Eubank assumed command in April 2022. Mission NETCOM plans, engineers, installs, integrates, protects and operates Army Cyberspace, enabling Mission Command through all phases of Joint, Interagency, Intergovernmental and Multinational operations. Additionally, the commanding general is designated as the Deputy Commanding General for Network Operations, U.S. Army Cyber Command. With the headquarters at Fort Huachuca, Arizona, the NETCOM Team has nearly 16,000 Soldiers, Department of the Army Civilians and Contractors stationed and deployed in more than 22 countries around the world, providing direct and indirect support to Army, Joint and Coalition forces. Commands and activities Theater 7th Signal Command (Theater) (Continental United States), Fort Gordon (Georgia) 21st Signal Brigade, Fort Detrick (Maryland) 93rd Signal Brigade (Eastern US), Fort Eustis (Virginia) 106th Signal Brigade (Western US), Joint Base San Antonio (Texas) 311th Signal Command (Theater) (Indo-Pacific), Fort Shafter (Hawaii) 516th Signal Brigade, Fort Shafter (Hawaii) - supports US Army Pacific 1st Signal Brigade, Camp Humphreys (South Korea) - supports Eighth Army 2nd Signal Brigade, Wiesbaden (Germany) - supports US Army Europe 160th Signal Brigade, Camp Arifjan (Kuwait) - supports US Army Central Activities US Army Signal Activity-Intelligence and Security Command (Fort Belvoir, Virginia) History U.S. Army Strategic Communications Command On 1 March 1964, the Army activated U.S. Army Strategic Communications Command (referred to as STRATCOM) to exercise full command and control over worldwide strategic communications. The first subordinate command USSTRATCOM formed was STRATCOM-Europe, established 1 July 1964, in Schwetzingen, West Germany. STRATCOM-Europe absorbed 22nd and 106th Signal Groups and other communications responsibilities from USAREUR. By the end of 1965, all USAREUR communications duties, and even the position of USAREUR Deputy Chief of Staff for Communications–Electronics, had been transferred to STRATCOM-Europe. Changes in signals/military communications continued through the 1970s; 7th Signal Brigade was activated in 1970 from assets of the deactivated Seventh Army communications command. STRATCOM-Europe assumed operational control of the brigade in June 1972 and was redesignated as Army Communications Command-Europe (ACC-E) in October 1973. The 106th and 516th Signal Groups were also inactivated during this time and replaced by the 4
https://en.wikipedia.org/wiki/Data%20entry%20%28disambiguation%29
Data entry may refer to: Data entry Data acquisition Duties of data entry clerk use of Keypunch, a device for manually entering data into punched cards the name of a department in a company or organization Data entry may also refer to: Input (Computer science)
https://en.wikipedia.org/wiki/OneSource
OneSource may refer to: Military OneSource, a U.S. Department of Defense program Onesource State Apportionment, a tax product by Thomson Reuters Vocabulary OneSource, a data analysis tool used internally by U.S. Air Combat Command
https://en.wikipedia.org/wiki/Great%20Western%20Main%20Line%20upgrade
In the 2010s Network Rail modernised the Great Western Main Line, the South Wales Main Line, and other associated lines. The modernisation plans were announced at separate times but their implementation overlapped in the 2010s. The work included electrification, resignalling, new rolling stock and station upgrades. The programme began in June 2010 and at that time was due to end in 2017. The project was completed in 2020, allowing electric services to run between London Paddington and Cardiff. The project had several delays. Four sections were deferred indefinitely: Oxford to Didcot Parkway Bristol Parkway to Bristol Temple Meads Thingley Junction, near Chippenham, to Bath Spa and Bristol Temple Meads Thames Valley branches to Henley and Windsor The Cardiff to Swansea electrification was cancelled in 2017. Under the Intercity Express Programme (IEP), 21 electric Class 801 trains were ordered as replacements for the ageing InterCity 125 diesels. In May 2016 it was confirmed that the new trains would be built as 'bi-mode' Class 800s instead, meaning they can run on either diesel power or electric overhead wire. Historical background At the start of the 21st century, the Great Western Main Line and the Midland Main Line were the last of the major main line routes in the UK using diesel as the main source of locomotive power. When the announcement was made in July 2009 to electrify the Great Western (along with the Liverpool-Manchester line), it represented the first big rail electrification project in the UK for 20 years. The South Wales Main Line section of the GWML was set to be the first electrified cross-country railway line in Wales. The plan to upgrade the rolling stock on the Great Western was included in the IEP announced in 2007, a Department for Transport (DfT) led initiative to replace the ageing fleet of InterCity 125 and InterCity 225 train sets then in use on much of the UK rail network. Electrification Status Passenger timetables introduced electric running from Paddington to Didcot in January 2018, and to Swindon and as far west as Bristol Parkway in January 2019. The same month saw electric services between Reading and Newbury. Electric running to Newport commenced in December 2019 and to Cardiff in January 2020. The Cardiff to Swansea electrification was formally abandoned in 2017. As of 2023, the electrification of Didcot to Oxford has yet to happen, after being delayed until track modification and station remodelling at Oxford. Earlier work Prior to 2009, the only electrified portion of the Great Western was between London Paddington and Airport Junction (west of ). This portion is equipped with a overhead system which was implemented in 1997 in readiness for the Heathrow Express service commencing in early 1998. Electrification was extended from Airport Junction to under the Crossrail scheme. Further electrification west of Maidenhead was announced by the DfT separately, though the work west of Airport Junctio
https://en.wikipedia.org/wiki/Fred%20B.%20Schneider
Fred Barry Schneider (born December 7, 1953) is an American computer scientist, based at Cornell University, where he is the Samuel B. Eckert Professor of Computer Science. He has published in numerous areas including science policy, cybersecurity, and distributed systems. His research is in the area of concurrent and distributed systems for high-integrity and mission-critical applications. Schneider received a B.Sc. degree in Engineering from Cornell University in 1975 followed by a Ph.D. from Stony Brook University where he was a student of Arthur J. Bernstein. In Fall 1978, he joined the faculty at Cornell University. He has been editor-in-chief of Distributed Computing and associate editor-in-chief of IEEE Security and Privacy. He has also edited ACM Computing Surveys, High Integrity Systems, IEEE Transactions on Dependable and Secure Computing, and Information Processing Letters. Schneider is a Fellow of the American Association for the Advancement of Science (1992), the Association for Computing Machinery (1995), the Institute of Electrical and Electronics Engineers (2008), and the Norwegian Academy of Technological Sciences. He was also elected a member of the National Academy of Engineering in 2011 for contributions to the design of trustworthy and secure computer systems. In 1996, Schneider was named Professor-at-Large at the University of Tromsø, Norway. In 2003, he was awarded an honorary DSc degree by Newcastle University in the United Kingdom. He was named as the recipient of the IEEE Emanuel R. Piore Award for 2012. In 2018 he and Bowen Alpern received the Dijkstra Prize for their 1985 paper "Defining liveness". Awards Fellow, American Association for Advancement of Science (1992) Fellow, ACM (1995) Professor-at-Large, University of Tromsø, Tromsø, Norway (1996–present) NEEDS CITATION Doctor of Science (honoris causa), University of Newcastle, U.K. (May 2003), statement read by orator ACM SIGOPS Hall of Fame Award (2007) Fellow, Institute of Electrical and Electronics Engineers (2008) Member, Norwegian Academy of Technological Sciences (2010) Member, National Academy of Engineering (2011) IEEE Emanuel R. Piore Award (2012) Service to Computing Research Association Award (2016) Jean-Claude Laprie Award in Dependable Computing (2017) Member, American Academy of Arts and Sciences (2017) Edsger W. Dijkstra Prize in Distributed Computing (2018) IEEE Computer Security Foundations Symposium Distinguished Paper (2021) Books A Logical Approach to Discrete Math. New York: Springer-Verlag, 1993. (With David Gries.) On Concurrent Programming. New York: Springer-Verlag, 1997. Trust in Cyberspace, National Academy Press, 1998. (Editor.) References External links Fred B. Schneider homepage Fred B. Schneider publication list details , Scientific Commons 1953 births Living people Cornell University alumni Stony Brook University alumni American computer scientists Cornell University faculty American textbook writers
https://en.wikipedia.org/wiki/Disposal
Disposal may refer to: Bomb disposal, the process by which hazardous explosive devices are rendered safe Dispose pattern in computer programming Disposal of human corpses, the practice and process of dealing with the remains of a deceased human being Disposal tax effect, a concept in economics Garbage disposal, a device installed under a kitchen sink between the sink's drain and the trap which shreds food waste into pieces small enough to pass through plumbing Ship disposal, the disposing of a ship after it has reached the end of its effective or economic service life with an organisation Waste disposal, the getting rid of waste materials Disposal, a statistic in Australian rules football referring to kicks or handballs. Free disposal, the possibility of discarding resources without economic costs. See also Disposition (disambiguation) Disposable
https://en.wikipedia.org/wiki/BioTapestry
BioTapestry is an open source software application for modeling and visualizing gene regulatory networks (GRNs). History BioTapestry was created at the Institute of Systems Biology in Seattle, in collaboration with the Davidson Lab at the California Institute of Technology. The project was initiated to support the ongoing development of the model of the GRN regulating the development of the endomesoderm in the sea urchin Strongylocentrotus purpuratus. BioTapestry was initially made public in late 2003 as a web-based, read-only interactive viewer for the sea urchin network, with the first fully functional editor released in August 2004 (v0.94.1). The current version, 7.0.0, was released in September 2014. Development Development work on BioTapestry is ongoing. For more information about version 7.0, see the release notes page. Usage BioTapestry is an interactive tool for modeling and visualizing gene regulatory networks. Interactive examples Sea urchin endomesoderm network from the Davidson Lab. Sea urchin ectoderm network from the Davidson Lab. Mouse ventral neural tube specification from the McMahon Lab. Environment And Gene Regulatory Influence Network (EGRIN) for Halobacterium salinarum NRC-1 from the Baliga Lab. T-cell gene regulatory network from the Rothenberg Lab. Zebrafish developmental gene regulatory network from the Yuh Lab. Limb Morphogenesis from the Vokes Lab. Features Input Gene Regulatory Networks can be drawn by hand. Networks can be built using lists of interactions entered via dialog boxes. Lists of interactions can be input using comma-separated-value (CSV) files. Networks can be built using SIF files as input. BioTapestry can accept network definitions via the Gaggle framework. Visualization BioTapestry uses orthogonal-directed hyperlinks and a hierarchical presentation of models. Analysis BioTapestry can create Systems Biology Markup Language files for a subset of networks. Documentation The BioTapestry home page has links to several tutorials for using the software. See also Gene regulatory network Systems biology References External links BioTapestry site Systems biology Graph drawing software Cross-platform software Java platform software
https://en.wikipedia.org/wiki/Trams%20in%20Osijek
The Osijek tram system is operated by the City Transport of Osijek (GPP Osijek) and serves the city of Osijek, capital of the Slavonia region of Croatia. The Osijek network is the only Croatian tram system still in existence outside Zagreb. Services have operated continuously since the first horse-car tram line was opened in 1884 (connecting the railway station and city square), and the first electric tram ran in 1926. The present network consists of two lines which intersect in the city square (Trg Ante Starčevića) and the fleet consists of refurbished Tatra T3 PVO vehicles and some newly acquired second hand Duewag GT6. During the Croatian War of Independence, five Tatra T3 streetcars were destroyed and two female drivers were killed in 1991/92. There is also an old Škoda tourist heritage tram, which can be rented for special occasions. The tram dates back to the start of electrical operation, back in 1926. All tracks are at 1000 mm (metre gauge) width. There are three terminal loops, and two loops used rarely only when shorter route service is provided. There is also an inner city loop for the part of line 2, which connects the main railway station with the city centre. Unlike line 1, which is double track in its whole length, line 2 is composed of a loop segment, a double track segment and the remainder being single track with passing loops. At the main vehicle depot (Remiza) there is a track triangle structure used regularly for turning tramway vehicles when starting and/or ending service. In November 2014, Line 1 was extended from Višnjevac Sjever to Višnjevac Okretište. A 2018 reorganization of public transport which abolished the tariff union between GPP and the private transport operators reintroduced the city centre circulator, connecting the main square and the city's railway station. Popularly known as the "Kolodvorac" (lit. Station-runner), the line previously existed until 2008, when it was abolished. However, this line was removed again on 15th April 2019 due to a low amount of passengers and a bad time organisation with Line 2. Current lines Line 1: Višnjevac - Trg Ante Starčevića - Zeleno polje Line 2: Trg Ante Starčevića - Bikara - Kolodvor - Trg Ante Starčevića See also Trams in Zagreb References External links Osijek at UrbanRail.net Osijek Osijek Metre gauge railways in Croatia 600 V DC railway electrification Osijek
https://en.wikipedia.org/wiki/Zamani%20Project
The Zamani Project is part of the African Cultural Heritage Sites and Landscapes Database. Zamani is a research group at the University of Cape Town, which acquires, models, presents and manages spatial and other data from cultural heritage sites. The present focus of the Zamani project is Africa, with the principal objective of developing “The African Cultural Heritage Sites and Landscapes Database”. Zamani comes from the Swahili phrase “Hapo zamani za kale” which means “Once upon a time”, and can be used to mean 'the past'. The word is derived from Arabic root for temporal vocabulary, ‘Zaman,’ and appears in several languages around the world. History The Zamani initiative was conceptualised in the Geomatics Division of the University of Cape Town by Professor Heinz Rüther in 2001 in collaboration with ITHAKA and Aluka [now an initiative of JSTOR] as the “African Cultural Heritage Sites and Landscapes Database” in 2004 with a number of sequential grants from the Andrew W. Mellon Foundation. The project developed out of a long history of heritage documentation in the Geomatics division reaching from conventional mapping of archaeological sites in the early stages of the project to advanced digital modeling of complex sites in its present phase. Motivation The documentation project aims to capture spatial information to create a permanent record of important heritage sites for restoration and conservation purposes and as a record for future generations. The project seeks to provide material for education, research and site management and increase international awareness of African heritage on a not-for-profit basis. Data Spatial data of architectural structures and historical landscapes are acquired by means of laser scanning, conventional surveys, GPS surveys and photogrammetric imaging with calibrated cameras. Satellite images, aerial photography and full-dome panorama photography are also employed as are contextual photography and videos. The data are captured by the project team during field campaigns. The acquired data are processed to produce Geographic Information Systems (GIS), 3D computer models, maps, architectural sections and building plans and interactive panorama tours of the heritage sites. Sites are seen in the context of their physical environment and therefore landscapes surrounding sites are modelled in 3D using satellite and aerial imagery wherever possible. Sites The following is a list of sites which have been documented: Algeria Djémila M'Zien (Lemzyen) Cameroon Mandara Hills: DGB I & II Ethiopia Lalibela: 13 rock-hewn churches Axum: Stele-field Gondar: Fasil Ghebbi Ghana Elmina: Elmina Castle Besease/Kumasi: Ashanti Shrine Jordan Petra: Siq Petra: Treasury (Al-Khazneh) Petra: Monastery (Ad Deir) Petra: Urn Tomb Petra: Tomb of the Roman Soldier Petra: Palace Tomb Petra: Corinthian Tomb Petra: Silk Tomb Petra: Theater Petra: Qasr al-Bint Petra: Great Temple Petra: Facade Tombs Petra: Temple o
https://en.wikipedia.org/wiki/XLeratorDB
XLeratorDB is a suite of database function libraries that enable Microsoft SQL Server to perform a wide range of additional (non-native) business intelligence and ad hoc analytics. The libraries, which are embedded and run centrally on the database, include more than 450 individual functions similar to those found in Microsoft Excel spreadsheets. The individual functions are grouped and sold as six separate libraries based on usage: finance, statistics, math, engineering, unit conversions and strings. WestClinTech, the company that developed XLeratorDB, claims it is "the first commercial function package add-in for Microsoft SQL Server." Company history WestClinTech (LLC), founded by software industry veterans Charles Flock and Joe Stampf in 2008, is located in Irvington, New York, United States. Flock was a co-founder of The Frustum Group, developer of the OPICS enterprise banking and trading platform, which was acquired by London-based Misys, PLC in 1996. Stampf joined Frustum in 1994 and with Flock remained active with the company after acquisition, helping to develop successive generations of OPICS now employed by over 150 leading financial institutions worldwide. Following a full year of research, development and testing, WestClinTech introduced and recorded its first commercial sale of XLeratorDB in April 2009. In September 2009, XLeratorDB became available to all Federal agencies through NASA's Strategic Enterprise-Wide Procurement (SEWP-IV) program, a government-wide acquisition contract. Technology XLeratorDB uses Microsoft SQL CLR(Common Language Runtime) technology. SQL CLR allows managed code to be hosted by, and run in, the Microsoft SQL Server environment. SQL CLR relies on the creation, deployment and registration of .NET Framework assemblies that are physically stored in managed code dynamic-link libraries (DLL). The assemblies may contain .NET namespaces, classes, functions, and properties. Because managed code compiles to native code prior to execution, functions using SQL CLR can achieve significant performance increases versus the equivalent functions written in T-SQL in some scenarios. XLeratorDB requires Microsoft SQL Server 2005 or SQL Server 2005 Express editions, or later (compatibility mode 90 or higher). The product installs with PERMISSION_SET=SAFE. SAFE mode, the most restrictive permission set, is accessible by all users. Code executed by an assembly with SAFE permissions cannot access external system resources such as files, the network, the internet, environment variables, or the registry. Functions In computer science, a function is a portion of code within a larger program which performs a specific task and is relatively independent of the remaining code. As used in database and spreadsheet applications these functions generally represent mathematical formulas widely used across a variety of fields. While this code may be user-generated, it is also embedded as a pre-written sub-routine in a
https://en.wikipedia.org/wiki/Feedforward%20%28management%29
Feed forward in management theory is an application of the cybernetic concept of feedforward first articulated by I. A. Richards in 1951. It reflects the impact of Management cybernetics in the general area of management studies. It refers to the practice of giving a control impact in a downlink to a subordinate to a person or an organization from which you are expecting an output. A feed forward is not just a pre-feedback, as a feedback is always based on measuring an output and sending respective feedback. A pre-feedback given without measurement of output may be understood as a confirmation or just an acknowledgment of control command. However, a feed forward is generally imposed before any willful change in output may occur. All other changes of output determined with feedback may for example result from distortion, noise or attenuation. It usually involves giving a document for review and giving an ex post information on that document which you have not already given. However, social feedback is the response of the supreme hierarch to the subordinate as an acknowledgement of a subordinate's report on output, hence the subordinate's feedback to the supreme. Origin of term Feedforward as a management term has been used by Avraham Kluger since 2006 and Marshall Goldsmith in one of his prominent management articles. Example of an activity involving feedforward learning Asking for feedforward requires to set up the participant into a state of open reflection and learning. The feedforward has to be the opposite as feedback, which deals with a past event but rather to give an advice for the future. Therefore a good example might involve asking some group of participants about a personal trait/habit they want to change and then let them give feedforward to each other with advice to achieve that change. The participants then are limited to speak just about future actions within the context of helping each other. References External links Feedforward Instead of Feedback (management) Feedback and FeedForward (management) Communication Management cybernetics
https://en.wikipedia.org/wiki/XLINK%20%28Internet%20service%20provider%29
XLINK originally was the eXterne Lokale Informatik-Netz Karlsruhe (the external connection of the computer science network of the universities in Karlsruhe, Germany). It was created in 1984, when it offered one of the first UUCP connections from Germany to the United States (via UUNET), and from November 1989 it also offered Internet connectivity mainly to universities in the south of Germany. XLINK was one of the founding members of RIPE and of DENIC; its autonomous system number was AS517. It was transformed into (part of) a company in 1993, and as such, competed with the UniDO ISP (incorporated as EUnet Germany) for the title of first commercial Internet service provider in Germany. It was bought by Qwest in 1999 and contributed to and renamed to KPNQwest Germany in May 2000, which went bankrupt in the Internet bubble crash of 2002. Remnants exist in KPN Eurorings. References External links History of XLINK (in German) Internet in Germany Internet service providers
https://en.wikipedia.org/wiki/WHO%20collaborating%20centres%20in%20occupational%20health
The WHO collaborating centres in occupational health constitute a network of institutions put in place by the World Health Organization to extend availability of occupational health coverage in both developed and undeveloped countries. The effort includes 64 collaborating centres that have been designated as such by the WHO director-general. The centres in the network meet triennially to develop work plans for advancing occupational health in key areas. The 2009-2012 work plan includes 220 projects, which relate to 5 objectives and 14 priorities as outlined by a global plan of action for workers' health. Leadership structure As director of the U.S. National Institute for Occupational Safety and Health, John Howard is the chairman of the WHO Global Network of Collaborating Centres in Occupational Health. Within the network, activity area managers plan day-to-day activities within projects adopted by the network. Deputy managers monitor activities and evaluate progress of the involved centres. 2009-2012 Work Plan The global plan of action sets forth five major objectives: to devise and implement policy instruments on workers' health to protect and promote health at the workplace to improve the performance of and access to occupational health services to provide and communicate evidence for action and practice to incorporate workers' health into non-health policies and projects Using these key goals, the activity area managers have set priorities for specific areas of occupational health. Participating centres Centres in the network are designated by the WHO director-general. Seven organizations constitute the network's advisory committee: National Institute for Occupational Safety and Health (NIOSH), USA National Institute for Working Life (NIWL), Sweden Finnish Institute for Occupational Health (FIOH), Finland Institute for Pesticide Safety and Health Risk Prevention, Italy National University of Singapore FUNDACENTRO, Brazil National Institute for Occupational Health (NIOH), South Africa Other participants working with the centres include the International Labour Organization (ILO), the International Commission on Occupational Health (ICOH), the International Occupational Hygiene Association (IOHA), and the International Ergonomics Association (IEA). Key projects and activities The collaborating centres have participated in a number of conferences, provided research on occupational safety and health topics, and engaged in varied campaigns and activities such as an inititiative promoting global road safety for workers. References World Health Organization Occupational safety and health organizations
https://en.wikipedia.org/wiki/Apptek
Applications Technology (AppTek) is a U.S. company headquartered in McLean, Virginia that specializes in artificial intelligence and machine learning for human language technologies. The company provides both managed and professional services for natural language processing (NLP) technologies including automatic speech recognition (ASR), neural machine translation (MT), natural-language understanding (NLU) and neural speech synthesis. AppTek's automatic speech recognition covers over 45 languages and dialects. The neural MT engine covers over 1000 language pairs between languages. AppTek's Head of Science, Prof. Dr. -Ing Hermann Ney, was awarded the IEEE James L. Flanagan Speech and Audio Processing Award in 2019 and the ISCA Medal for Scientific Achievement in 2021 for his work in natural language processing. History AppTek was acquired in 1998 by Lernout & Hauspie (at the time a NASDAQ publicly traded company), AppTek organized a management buy-out and went private again in 2001. In 2014, the company sold its hybrid machine translation technology to eBay and has since rebuilt the platform to modern neural-based approaches for machine translation. In 2020, SOSi acquired non-controlling interest in AppTek and became an exclusive reseller of AppTek products for U.S. federal, state, and local government entities. See also Google Translate Microsoft Translator vidby DeepL References Machine translation Speech recognition
https://en.wikipedia.org/wiki/Fox%20%28Spanish%20TV%20channel%29
Fox is a Spanish television channel owned by Fox Networks Group. The channel broadcasts American imports with Spanish. In 2024, Fox will become Star Channel as Disney removes the Fox brand to avoid confusion with Fox Corporation. Programming Current 9-1-1 9-1-1: Lone Star Blue Bloods Bull CSI: Crime Scene Investigation CSI: Vegas FBI: Most Wanted NCIS: Hawaiʻi NCIS: Los Angeles Shin Chan The Simpsons The Walking Dead True Lies Former 90210 Ally McBeal American Dad! American Horror Story Batman Better off Ted Bones Brothers & Sisters Body of Proof Boston Legal Buffy the Vampire Slayer Burn Notice Californication Chicago Hope Close to Home Cold Case Crash Palace Crusoe Deadwood Defying Gravity Desperate Housewives Dexter Dharma & Greg Dirt Dollhouse Eli Stone Family Guy Futurama Generation Kill Ghost Whisperer Gilmore Girls Glee Grey's Anatomy Hawaii Five-0 Head Case House How I Met Your Mother In Treatment Joey Journeyman Kings K-Ville Las Vegas Lie to Me Life Unexpected Lipstick Jungle Lost Lou Grant Malcolm in the Middle M*A*S*H Melrose Place Men in Trees Mental Mentes en Shock Mercy Miami Medical Modern Family Moonlight My Generation My name is Earl NYPD Blue Parenthood Party of Five Picket Fences Prison Break Private Practice Raising Hope Revenge Roswell Saving Grace Secret Diary of a Call Girl Shark Six Feet Under Smallville Sons of Tucson Standoff Suddenly Susan The Booth The Cleaner The Cleveland Show The Deep End The Defenders The Ex List The Forgotten The Gates The Glades The Good Wife The Listener The Nanny The O.C. The Practice The Pretender The Riches The River The Simple Life The Sopranos The Unit The Walking Dead The X-Files Two Guys and a Girl Veronica's Closet White Collar Will & Grace Women's Murder Club References External links Television channels and stations established in 2001 Television stations in Spain Television in Andorra Spanish-language television stations 2001 establishments in Spain Spain
https://en.wikipedia.org/wiki/Freeway%20%281988%20film%29
Freeway is a 1988 American neo-noir thriller film directed by Francis Delia from a screenplay by Darrell Fetty and Delia, based on the 1978 novel of the same name by the then-head of NBC programming, Deanne Barkley. It stars Darlanne Fluegel, James Russo, Richard Belzer, Michael Callan, and Billy Drago. Premise After her husband’s murderer escapes justice, Sarah "Sunny" Harper (Fluegel) witnesses the work of a spree killer (Drago) who shoots people on the freeway and later quotes Bible passages to a local radio station’s psychiatrist disc jockey (Belzer). Police are unwilling to listen to Sunny, but a former cop named Frank Quinn (Russo) agrees to protect her, and later the two join forces to find the deranged freeway killer before he strikes again. Cast Darlanne Fluegel as Sarah "Sunny" Harper James Russo as Frank Quinn Billy Drago as Edward Anthony Heller Richard Belzer as Dr. David Lazarus Michael Callan as Lt. Boyle Joey Palase as Detective Gomez Steve Franken as Lawyer Brain Kaiser as Morrie Julienne Dallara as Roseanne Rivera Kenneth Tobey as Monsignor Kavanaugh Clint Howard as Ronnie Gene LeBell as Officer Berryman Production The killer, who turns out to be a man who calls himself "Father Eddie," drives a beat-up 1969 Lincoln Continental sedan. The story takes place in Southern California. References External links 1988 films 1988 independent films 1988 thriller films 1980s English-language films 1980s serial killer films American independent films American neo-noir films American serial killer films American thriller films Films based on American thriller novels Films produced by William N. Panzer Films scored by Joe Delia Films shot in Los Angeles 1980s American films
https://en.wikipedia.org/wiki/EMIDEC%201100
The EMIDEC 1100 computer (became the ICT 1101 in 1962) was produced by the Computing Services Division of EMI Laboratories in the UK under the leadership of Godfrey Hounsfield in 1958, (first delivered in 1959) after one year's development. It used magnetic core memory and transistor technologies and it is claimed to be the first large commercial transistorised machine in the UK. Core memory was a matrix of laced ferrite cores. Because transistors were relatively slow at that time, Hounsfield also used magnetic logic units to speed up the operation of the machine to achieve a processing power comparable with a valve/tube computer. These logic units consisted of a single ferrite ring (toroid), with up to fifteen connections to it. Main storage capacity was 1,024 36-bit words - just over 4k bytes. Secondary storage was provided by magnetic drums, each of 4,096 words - about 20k. Anything else was stored on magnetic tape mounted in the vertical drive, vacuum-sealed behind a glass door. Peripherals included punched tape readers, punched card readers, and line printers. 24 EMIDEC 1100 computers were sold to commercial customers including Domestic Electric Rentals, Boots, British Motor Corporation, Kodak, London Transport, Barclays Bank and the Admiralty. They were used for a range of commercial and industrial applications. In July 1962 EMI Computing Services Division became part of International Computers and Tabulators (ICT) which merged with other UK computer companies in 1968 to become International Computers Limited (ICL). See also History of computing hardware References EMIDEC Computer News 1 EMIDEC 1100 Delivery list and applications External links EMIDEC 1100 Website The ICL Computer Museum with EMIDEC Early British computers 36-bit computers Transistorized computers Computer-related introductions in 1959 Magnetic logic computers
https://en.wikipedia.org/wiki/Sumon%20K%20Chakrabarti
Sumon K Chakrabarti was the Chief National Correspondent of India’s largest English news network, CNN-IBN, of which he is also a founder employee. Now he is working on a book on South Asia. Career He is one of India’s top investigative journalists, with the credit of ‘breaking’ several government corruptions at the highest level. It was his investigative story featuring the report of the Chief Vigilance Commission, India's top vigilance watch-dog, that pointed to corruption at every level in the organization of the upcoming Commonwealth Games to be held in New Delhi, that started the entire controversy and resultant probe. He broke one of the biggest stories in Indian journalism in January 2006; the story of how the Indian government had moved to London to defreeze the accounts of Italian middleman Ottavio Quattrocchi, prime accused in the Bofors Arms Deal scam. He received the Eurasian-Nets Fellowship of 2009 to travel and research on minority issues in France. The research culminated in a full-length paper entitled: ‘Media, Minorities and the Politics of Integration in France’. Chakrabarti was among the only two international journalists allowed in Maldives in 2006 to film the democracy movement for the first time, where he interviewed a wide cross-section of politicians, including Asia’s longest ruling leader Mamoon Abdul Gayoom, opposition activists, editors, journalists, intellectuals, human rights activists and police officers. He moved to CNN-IBN after working for nearly three years with NDTV, India’s first English news network. Before that he had worked for leading media houses like India Today (where he was also part of the team that created TheNewspaperToday.com - India’s first e-newspaper), Indo-Asian News Service (IANS), and The Asian Age. Chakrabarti reports on conflicts, politics, governance and government corruption. Specialising on India’s Maoists (Naxalites), the insurgency-ridden North-East of India and the violence in Kashmir, he is also considered as a proficient journalist in his reporting on India’s neighbours like Bangladesh, Burma, Nepal, Bhutan and the Maldives. He has also worked extensively on people internally displaced as a result of political conflicts. Chakrabarti also writes articles on regional security issues regularly for one of India’s leading national news and opinion magazines, The Week. He also writes opinion pieces in leading Indian dailies like The Hindustan Times and The New Indian Express. His report on “Bangladesh: The Shift in the Balance of Terror in South Asia”, published in 2006 International Assessment and Strategy Centre, USA, in many ways put Bangladesh on the global terror map. Awards and honors He was nominated for “Best Indian Journalist of the Year” for the Ramnath Goenka Excellence in Journalism Awards (2006) and Indian Television Awards (2008). References Living people CNN people Indian reporters and correspondents Year of birth missing (living people)
https://en.wikipedia.org/wiki/Permutation%20pattern
In combinatorial mathematics and theoretical computer science, a permutation pattern is a sub-permutation of a longer permutation. Any permutation may be written in one-line notation as a sequence of digits representing the result of applying the permutation to the digit sequence 123...; for instance the digit sequence 213 represents the permutation on three elements that swaps elements 1 and 2. If π and σ are two permutations represented in this way (these variable names are standard for permutations and are unrelated to the number pi), then π is said to contain σ as a pattern if some subsequence of the digits of π has the same relative order as all of the digits of σ. For instance, permutation π contains the pattern 213 whenever π has three digits x, y, and z that appear within π in the order x...y...z but whose values are ordered as y < x < z, the same as the ordering of the values in the permutation 213. The permutation 32415 on five elements contains 213 as a pattern in several different ways: 3··15, ··415, 32··5, 324··, and ·2·15 all form triples of digits with the same ordering as 213. Each of the subsequences 315, 415, 325, 324, and 215 is called a copy, instance, or occurrence of the pattern. The fact that π contains σ is written more concisely as σ ≤ π. If a permutation π does not contain a pattern σ, then π is said to avoid σ. The permutation 51342 avoids 213; it has 10 subsequences of three digits, but none of these 10 subsequences has the same ordering as 213. Early results A case can be made that was the first to prove a result in the field with his study of "lattice permutations". In particular MacMahon shows that the permutations which can be divided into two decreasing subsequences (i.e., the 123-avoiding permutations) are counted by the Catalan numbers. Another early landmark result in the field is the Erdős–Szekeres theorem; in permutation pattern language, the theorem states that for any positive integers a and b every permutation of length at least must contain either the pattern or the pattern . Computer science origins The study of permutation patterns began in earnest with Donald Knuth's consideration of stack-sorting in 1968. Knuth showed that the permutation π can be sorted by a stack if and only if π avoids 231, and that the stack-sortable permutations are enumerated by the Catalan numbers. Knuth also raised questions about sorting with deques. In particular, Knuth's question asking how many permutation of n elements are obtainable with the use of a deque remains open. Shortly thereafter, investigated sorting by networks of stacks, while showed that the permutation π can be sorted by a deque if and only if for all k, π avoids 5,2,7,4,...,4k+1,4k−2,3,4k,1, and 5,2,7,4,...,4k+3,4k,1,4k+2,3, and every permutation that can be obtained from either of these by interchanging the last two elements or the 1 and the 2. Because this collection of permutations is infinite (in fact, it is the first published examp
https://en.wikipedia.org/wiki/JSOL
The , formally known as JRI Solutions, Limited, is a subsidiary of NTT Data and an equity method affiliate of the Sumitomo Mitsui Financial Group that acts as an IT consulting services corporation for general industries and public corporations. History The Japan Research Institute, Limited under the Sumitomo Mitsui Financial Group originally established the JSOL Corporation as a wholly owned subsidiary called JRI-Solutions, Limited in July 2006. On September 29, 2008, NTT Data, the Sumitomo Mitsui Financial Group, The Japan Research Institute, Limited, and JRI-Solutions, Limited established a broad-range capital and business alliance. On January 1, 2009, JRI-Solutions, Limited became the subsidiary of NTT Data and the corporate name changed from JRI-Solutions to the JSOL Corporation. Services and products The JSOL Corporation provides IT consulting, systems implementation, outsourcing, and develops and distributes various computer-aided engineering (CAE) software such as JMAG and LS-DYNA. Company locations Tokyo Head Office: Harumi Center Bldg. 2-5-24 Harumi, Chuo-ku, Tokyo 104-0053 Sangen-jaya Office Osaka Head Office:Tosabori Daibiru Bldg. 2-2-4 Tosabori, Nishi-ku, Osaka 550-0001 Nagoya Regional Office See also NTT Data Sumitomo Mitsui Financial Group References NTT Data, Capital and Business Alliance Makes New Start as JSOL Corporation, January 5, 2009 NTT Data, Capital and Business Alliance of JRI Solutions, September 29, 2008 JSOL Corporate Profile External links Nippon Telegraph and Telephone Information technology consulting firms of Japan Sumitomo Mitsui Financial Group
https://en.wikipedia.org/wiki/Insafe
Insafe is a European network of Awareness Centres promoting safer and better usage of internet. It is co-funded by the Safer Internet Plus Programme. Mission The mission of the Insafe cooperation network is to empower citizens to use the Internet and other online technologies positively, safely, and effectively. The network calls for shared responsibility for the protection of the rights and needs of citizens (children in particular) with the government, educators, parents, media, and all other relevant actors. Particular emphasis is given to the elimination of child pornography. Insafe partners work closely together to share best practices, information, and resources. The network interacts with industry, schools, and families with the aim of empowering people to bridge the digital divide between home and school and between generations. Insafe partners monitor and address emerging trends while seeking to reinforce the image of the web as a place to learn. They endeavour to raise awareness about reporting harmful or illegal content and services. Through close cooperation between partners and other actors, Insafe aims to raise Internet safety-awareness standards and support the development of information literacy for all. Operation Each country in the Insafe network has a national Awareness Centre which is responsible for implementing campaigns, coordinating actions, developing synergy at the national level, and working in close co-operation with all relevant actors at European, regional and local level. Both Insafe and all National Centres enjoy funding from the Safer internet Program of the European Commission. European Schoolnet has been granted the role of Coordinator of the network at the European level. Actions The Insafe network organises the Safer Internet Day, which has taken place annually on the second day of the second week of February since 2004 and also involves numerous countries outside Europe. In 2022, the theme for Safer Internet Day was "Improving Well-Being Online"; focusing on cyberbullying, misinformation, and youth activism. Awareness Centres Austria Belgium Bulgaria Cyprus Czech Republic Denmark Finland France Germany Greece Hungary Iceland India Ireland Italy Latvia Lithuania Luxembourg Netherlands Norway Poland Portugal Romania Slovakia Slovenia Spain Sweden Ukraine United Arab Emirates United Kingdom References External links Internet safety
https://en.wikipedia.org/wiki/TCP%20fusion
TCP Fusion is a feature for providing TCP loopback and is implemented in the Transmission Control Protocol (TCP) stack within Oracle' Solaris-10 and Solaris-11 operating systems as well as a number of software projects based on the open source codebase from the OpenSolaris project. The idea is trivial in that a client and server connection on a local loopback interface within the same system should not need the entire TCP/IP protocol stack to exchange data. Therefore, provide a faster data path with the fusion of the two end points. The source code is well documented in inet/tcp/tcp_fusion.c which clearly states: The feature may be enabled or disabled via the /etc/system config file for the Solaris or genunix kernel and the only line required is "set ip:do_tcp_fusion = 0x0" which set the feature off or FALSE while of "0x1" for hexadecimal TRUE. See https://github.com/illumos/illumos-gate/blob/master/usr/src/uts/common/inet/tcp/ Fusion
https://en.wikipedia.org/wiki/Cover%27s%20theorem
Cover's theorem is a statement in computational learning theory and is one of the primary theoretical motivations for the use of non-linear kernel methods in machine learning applications. It is so termed after the information theorist Thomas M. Cover who stated it in 1965, referring to it as counting function theorem. The Theorem The theorem expresses the number of homogeneously linearly separable sets of points in dimensions as an explicit counting function of the number of points and the dimensionality . It requires, as a necessary and sufficient condition, that the points are in general position. Simply put, this means that the points should be as linearly independent (non-aligned) as possible. This condition is satisfied "with probability 1" or almost surely for random point sets, while it may easily be violated for real data, since these are often structured along smaller-dimensionality manifolds within the data space. The function follows two different regimes depending on the relationship between and . For , the function is exponential in . This essentially means that any set of labelled points in general position and in number no larger than the dimensionality + 1 is linearly separable; in jargon, it is said that a linear classifier shatters any point set with . This limiting quantity is also known as the Vapnik-Chervonenkis dimension of the linear classifier. For , the counting function starts growing less than exponentially . This means that, given a sample of fixed size , for larger dimensionality it is more probable that a random set of labelled points is linearly separable. Conversely, with fixed dimensionality, for larger sample sizes the number of linearly separable sets of random points will be smaller, or in other words the probability to find a linearly separable sample will decrease with . A consequence of the theorem is that given a set of training data that is not linearly separable, one can with high probability transform it into a training set that is linearly separable by projecting it into a higher-dimensional space via some non-linear transformation, or: Proof The proof of Cover's counting function theorem can be obtained from the recursive relation To show that, with fixed , increasing may turn a set of points from non-separable to separable, a deterministic mapping may be used: suppose there are points. Lift them onto the vertices of the simplex in the dimensional real space. Since every partition of the samples into two sets is separable by a linear separator, the property follows. See also Support vector machine Kernel method References (Section 3.5) Computational learning theory Statistical classification Artificial neural networks
https://en.wikipedia.org/wiki/Version%20vector
A version vector is a mechanism for tracking changes to data in a distributed system, where multiple agents might update the data at different times. The version vector allows the participants to determine if one update preceded another (happened-before), followed it, or if the two updates happened concurrently (and therefore might conflict with each other). In this way, version vectors enable causality tracking among data replicas and are a basic mechanism for optimistic replication. In mathematical terms, the version vector generates a preorder that tracks the events that precede, and may therefore influence, later updates. Version vectors maintain state identical to that in a vector clock, but the update rules differ slightly; in this example, replicas can either experience local updates (e.g., the user editing a file on the local node), or can synchronize with another replica: Initially all vector counters are zero. Each time a replica experiences a local update event, it increments its own counter in the vector by one. Each time two replicas and synchronize, they both set the elements in their copy of the vector to the maximum of the element across both counters: . After synchronization, the two replicas have identical version vectors. Pairs of replicas, , , can be compared by inspecting their version vectors and determined to be either: identical (), concurrent (), or ordered ( or ). The ordered relation is defined as: Vector if and only if every element of is less than or equal to its corresponding element in , and at least one of the elements is strictly less than. If neither or , but the vectors are not identical, then the two vectors must be concurrent. Version vectors or variants are used to track updates in many distributed file systems, such as Coda (file system) and Ficus, and are the main data structure behind optimistic replication. Other mechanisms Hash Histories avoid the use of counters by keeping a set of hashes of each updated version and comparing those sets by set inclusion. However this mechanism can only give probabilistic guarantees. Concise Version Vectors allow significant space savings when handling multiple replicated items, such as in directory structures in filesystems. Version Stamps allow tracking of a variable number of replicas and do not resort to counters. This mechanism can depict scalability problems in some settings, but can be replaced by Interval Tree Clocks. Interval Tree Clocks generalize version vectors and vector clocks and allows dynamic numbers of replicas/processes. Bounded Version Vectors allow a bounded implementation, with bounded size counters, as long as replica pairs can be atomically synchronized. Dotted Version Vectors address scalability with a small set of servers mediating replica access by a large number of concurrent clients. References External links Why Logical Clocks are Easy (Compares Causal Histories, Vector Clocks and Version Vectors) Data s
https://en.wikipedia.org/wiki/University%20of%20Computer%20Studies%20%28Taungoo%29
University of Computer Studies, Taungoo is located at Taungoo, Bago Division, Myanmar. It was formerly known as Government Computer College, Taungoo. Computer University (Taung-Ngu) was first opened on 4 September 2000 as a College in Katumati Myo Thit, Taung-Ngu. On 20 January 2007, it was promoted into university level and was transferred to the campus of Technology University(Taung-Ngu)in Kanyo village on 20 April 2008. Faculties Department of Myanmar Department of English Computer Software Technology Department Computer Hardware Technology Department Information Science Department Computer Application Department Cisco Lab Computer Lab Embedded Lab Hardware Lab Network Lab Research Lab Virtualization Lab Language Lab Physics Lab International Relations Office Faculty of Computer Science (FCS) Faculty of Information Science (FIS) Information Technologies Support and Maintenance (ITSM) Faculty of Computer System and Technologies (FCST) Faculty of Computing (FC) Department of Language Department of Natural Science Department of Administration Department of Finance Department of Student Affairs Degree Programs The University of Computer Studies, Taungoo offers the following degree programs : Graduate Programs References Further reading www.ucst.edu.mm Universities and colleges in Taungoo Universities and colleges in Bago Region Arts and Science universities in Myanmar Technological universities in Myanmar
https://en.wikipedia.org/wiki/Computer%20maintenance
Computer maintenance is the practice of keeping computers in a good state of repair. A computer containing accumulated dust and debris may not run properly. PC Components Keyboard The crumbs, dust, and other particulate that fall between the keys and build up underneath are loosened by spraying pressurized air into the keyboard, then removed with a low-pressure vacuum cleaner. A plastic-cleaning agent applied to the surface of the keys with a cloth is used to remove the accumulation of oil and dirt from repeated contact with a user's fingertips. If this is not sufficient for a more severely dirty keyboard, keys are physically removed for more focused individual cleaning, or for better access to the area beneath. Finally, the surface is wiped with a disinfectant. Monitor A monitor displays information in visual form, using text and graphics. The portion of the monitor that displays the information is called the screen. Like a television screen, a computer screen can show still or moving pictures and It's a part of Output Devices. Mouse The top surface of the mouse is wiped with a plastic cleanser to remove the dirt that accumulates from contact with the hand, as on the keyboard. The bottom surface is also cleaned to ensure that it can slide freely. If it is a mechanical mouse, the trackball is taken out, not only to clean the ball itself, but to scrape dirt from the runners that sense the ball's movement and can become jittery or stuck if impeded by grime. Tower/desktop unit Internal components accumulate dust brought in by the airflow maintained by fans to keep the PC from overheating. A soft brush may remove loose dirt; the remainder is dislodged with compressed air and removed with a low-pressure vacuum. The case is wiped down with a cleaning agent. A pressurized blower or gas duster can remove dust that cannot be reached with a brush. Data Backups Important data stored on computers may be copied and archived securely so that, in the event of failure, the data and systems may be reconstructed. When major maintenance such as patching is performed, a backup is recommended as the first step in case the update fails and reversion is required. Disk cleanup may be performed as regular maintenance to remove these. Files may become fragmented and so slow the performance of the computer. Disk defragmentation may be performed to combine these fragments and so improve performance. Legal issues In the US, the Digital Millennium Copyright Act specifically exempts computer-maintenance activities, so copies of copyright files may be made in the course of maintenance provided that they are destroyed afterwards. Software Operating system Operating-system files such as the Windows registry may require maintenance. A utility such as a registry cleaner may be used for this. Also inbuilt Disk defragmenter will also help. Software updates Softwares packages and operating systems may require regular updates to correct software bugs and to address se
https://en.wikipedia.org/wiki/PM%20WIN-T
PM WIN-T (Project Manager Warfighter Information Network-Tactical) is a component of Program Executive Office Command, Control and Communications-Tactical in the United States Army. PM WIN-T has been absorbed into PM Tactical Networks as Product Manager for Mission Networks. PM WIN-T designs, acquires, fields and supports tactical networks and services for US Army Soldiers, most notably the WIN-T suite of communication technologies. About PM WIN-T provides the communications network (satellite and terrestrial) and services that allows the Warfighter to send and receive information in tactical situations. WIN-T is the transformational Command and Control system that manages tactical information transport at theatre through Company Echelons in support of full spectrum Army operations. Besides WIN-T Increments 1, 2, and 3 (WIN-T), PM WIN-T is also responsible for the following systems, among others: the Area Common User System Modernization (ACUS MOD); Regional Hub Nodes (RHN); SIPR/NIPR Access Points (SNAP); Deployable Ku Band Earth Terminals (DKET); Secure, Mobile, Anti-Jam, Reliable, Tactical - Terminal (SMART-T); Phoenix/Super High Frequency (SHF); Global Broadcast Service (GBS), Standardized Integrated Command Post System (SICPS); and Harbormaster Command and Control Center (HCCC). WIN-T History In 1985 the Army embarked on the acquisition of the Mobile Subscriber Equipment (MSE) system, at an overall cost of more than billion (equivalent to $billion in ), to fill communications requirements from division down to the battalion level. MSE filled tactical telephone and switchboard requirements with a smaller, more mobile switching capability than had previously been used. However, military operations in Desert Storm in 1991, as well as Operation Enduring Freedom in Afghanistan in 2001 and Operation Iraqi Freedom in 2003 revealed inadequacies in MSE to support highly mobile and dispersed forces in a digital environment. Before the widespread availability of satellite communications technology, battlefield communications required the installation and maintenance of relay towers and cables, limiting range and flexibility of missions. The outdated MSE could no longer keep up with the pace of battle. WIN-T was conceived to solve this problem and to enable mobile mission command on the battlefield. The systems development and integration for Project Manager WIN-T began in 2002. Consequently, the Joint Network Node (JNN) network, as an outgrowth of the 3rd Infantry Division Operational Needs Statement, was developed to bridge the gap between MSE and the "full" on-the-move WIN-T network capability. The JNN network provided battalion-level and above with the ability to connect to the Army's digitized systems, voice, data and video via satellite Internet connection at-the-quick-halt. It obtained instantaneous battlefield success. As a result, the Army, along with Congressional assistance in the form of supplemental funding, shifted their priority
https://en.wikipedia.org/wiki/Purpose%20Network
In higher education, a purpose network is an online community intentionally designed to support critical student learning outcomes through peer-to-peer, peer-to-staff, and staff-to-peer communication. College student purpose networks, unlike social networks, create the academic and social communities essential for success in university life. “Progressive universities are capitalizing on these fundings by creating focused, intentional online purpose networks to facilitate their institutional goals. In a college student purpose network, universities seek to instill and provide platforms to support institutional learning outcomes. College student purpose networks, unlike the social networks (such as MySpace and Facebook), intentionally create the academic and social communities essential for university life. They are bidirectional communicative platforms going far above and beyond email as a means of communication.” As an example, in order to support student success and retention initiatives, institutions may use purpose networks as part of a strategy to follow recommendations from retention literature to: increase academic and social integration, mattering and marginality, and engagement. “Preliminary results from a study conducted by EducationDynamics across 20 schools indicate that students involved in purpose networks were retained to their sophomore year at a 9% higher rate than students not involved in the network. Additionally, over 13% of students surveyed across 26 universities reported that the purpose network was “very important” or “extremely important” in their decision to remain enrolled at the university.” Members of the university purpose network community can include administration, staff, faculty, instructors, and RA's. Purpose networks can be used in The First Year Experience Program, overall persistence programs, admissions, alumni outreach, parent communication and more. Within admissions, purpose networks can be used as a marketing tool to sway prospective students to attend an institution be increasing the interactivity of the students connections to the institutions. University purpose networks take advantage of the two-way communication afforded by Web 2.0 and includes content such as written articles, self-assessment surveys, peer-peer connections, profiles, discussions boards, groups, reviews of places, online curricula and more. References Higher education
https://en.wikipedia.org/wiki/Edward%20Mackin
Edward Mackin was a British writer of science fiction from Liverpool, England. He was best known for his series of stories about 21st-century cyberneticist Hek Belov, published in various magazines, including Science Fantasy and New Worlds between 1957 and 1966. One history of science fiction magazines mentions him as one of John Carnell's 'stalwarts'; his story 'Key to Chaos' was published in Carnell's anthology of original stories New Writings in SF 1. He is credited with one of the earliest, most prescient fictional descriptions of factory farming. Mackin served in World War II in the Royal Air Force, primarily in No. 235 Squadron RAF of the Coastal Command. After the war he worked for some years as a press-tool setter, as well as doing stints as a postman, salesman, painter and editor. He is often conflated with Ralph McInerny, who occasionally used 'Edward Mackin' as a pseudonym, but McInerny, born 1929, was too young to have served in the Coastal Command. References Royal Air Force personnel of World War II British science fiction writers Year of birth missing Year of death missing
https://en.wikipedia.org/wiki/.EXE%20Magazine
.EXE Magazine was a monthly computer software magazine published in the United Kingdom from 1986 to 2000. History and profile Founded in 1986 by Mark Adams, former co-founder of PR agency Text 100, .EXE (rhymes with 'not sexy' as the magazine's official pronunciation guide states) was inspired by Dr. Dobb's Journal, the PC Tech Journal and the C Users Group Newsletter. It was conceived as a title aimed at professional programmers, in contrast to the majority of hobbyist-oriented computer magazines of the period. Adams served as the magazine's first editor. The magazine's heyday coincided with the availability of cheap PC clones running MS-DOS and the first widely adopted version of Windows, both factors which encouraged the spread of programming into smaller businesses and created an audience for .EXE and similar titles that followed. Unusually for the UK, the magazine was sold primarily by postal subscription and controlled circulation, rather than in retail newsagents. This reflected its focus on a professional audience, as many readers obtained their copies through their employment. .EXEs content consisted largely of practical how-to articles focusing on particular platforms or techniques, along with more general software development content, news, book reviews and regular columns. With an audience consisting primarily of PC software developers, the content was largely for the DOS and Windows platforms, although over the years .EXE published articles on OS/2, Modula-2, Smalltalk and PalmPilot development, among others. The magazine featured regular columns on C++, Java, Visual Basic and Unix and took an early interest in Linux and open source more generally, particularly under the editorship of David Mery, featuring interviews with prominent open source and free software proponents including Eric Raymond and Richard Stallman. In 1992 the magazine's publisher Process Communications was sold to Centaur Communications (now Centaur Media), ostensibly because Centaur was interested in a Process title called Software Management. In the end, Centaur elected to keep .EXE running and closed Software Management and the third Process title, BASIC Magazine. This left .EXE as the only print title aimed at software professionals at Centaur, and the only title focused on computing and technology, at least until New Media Age debuted in 1995. In 1995 the magazine was re-branded as EXE Magazine, dropping the dot, which caused some controversy among regular readers and spawned the nickname 'Dotless' for the new version. At around the same time the magazine launched an online venture called EXplodE - later EXE Online - which started as a companion title with its own editor, but was later taken over by the print editorial team and evolved into an online archive of content and a marketing vehicle for the print title. Several of EXEs editorial staff were well known in the UK technology community as journalists or otherwise. The magazine's second editor, Rober
https://en.wikipedia.org/wiki/Dot%20%28command%29
In a Unix shell, the full stop called the dot command (.) is a command that evaluates commands in a computer file in the current execution context. In the C shell, a similar functionality is provided as the source command, and this name is seen in "extended" POSIX shells as well. The dot command is not to be confused with a dot file, which is a dot-prefixed hidden file or hidden directory. Nor is it to be confused with the ./scriptfile notation for running commands, which is simply a relative path pointing to the current directory (notated in Unix as a '.' character, and typically outside of the Path variable). Arguments The filename is the dot command's first argument. When this argument does not contain a slash, the shell will search for the file in all directories defined in the PATH environment variable. Unlike normal commands which are also found in PATH, the file to source does not have to be executable. Otherwise the filename is considered as a simple path to the file. In several "extended" shells including bash, zsh and ksh, one may specify parameters in a second argument. If no parameters are specified, the sourced file will receive the set of positional parameters available in the current context. If parameters are specified, the sourced file will receive only the specified parameters. In any case, parameter $0 will be the $0 of the current context. Usages Since the execution of the source file is done in the invoking context, environment changed within apply to the current process or the current shell. This is very different from scripts run directly by shebang or as sh foo.sh, which are run in a new, separate process space, with a separate environment. Therefore, the dot command can be used for splitting a big script into smaller pieces, potentially enabling modular design. Sourcing is also often done by the shell on session startup for user profile files like .bashrc and .profile. Source source is a shell-builtin command that evaluates the file following the command, as a list of commands, executed in the current context. Frequently the "current context" is a terminal window into which the user is typing commands during an interactive session. The source command can be abbreviated as just a dot (.) in Bash and similar POSIX-ish shells. However, this is not acceptable in C shell, where the command first appeared. Some Bash scripts should be run using the source your-script syntax rather than run as an executable command, e.g., if they contain a change directory (cd) command and the user intends that they be left in that directory after the script is complete, or they contain an export command and the user wants to modify the environment of the current shell. Another usage situation is when a script file does not have the "execute" permission. Passing the script filename to the desired shell will run the script in a subshell, not the current context. Notes References External links The three different uses of the dot
https://en.wikipedia.org/wiki/Pi%C3%B1ata%20%28disambiguation%29
A piñata is a brightly colored papier-mâché, cardboard, or clay container, originating from Mexico. Piñata may also refer to: Film and television Piñata (film), a 2005 Australian computer-animated short film Piñata: Survival Island, or Demon Island, a 2002 horror film "Piñata" (Better Call Saul), a 2018 TV episode Music Piñata (Freddie Gibbs and Madlib album), 2014 Piñata (Mexican Institute of Sound album), 2007 "Piñata", a song by Chevelle from Hats Off to the Bull, 2011 Other uses Piñata Books, an imprint of Arte Público Press Piñata cookie, a sugar cookie , the privatization of public and seized goods for Sandinista officials.
https://en.wikipedia.org/wiki/Model%20109
The Model 109, or Number 109, was a series of mainframe computers designed and built in the People's Republic of China, starting in 1964. First Model 109, created in 1964, used vacuum tubes The Model 109-B, China's first transistor computer was created in 1965. The Model 109-C followed in 1967, and was used for 15 years. Those were followed by the Number 111, their first integrated circuit computer, in 1971. Notes Transistorized computers Computer-related introductions in 1964 Computer-related introductions in 1965 Computer-related introductions in 1967 Science and technology in the People's Republic of China
https://en.wikipedia.org/wiki/Network%20covalent%20bonding
A network solid or covalent network solid (also called atomic crystalline solids or giant covalent structures) is a chemical compound (or element) in which the atoms are bonded by covalent bonds in a continuous network extending throughout the material. In a network solid there are no individual molecules, and the entire crystal or amorphous solid may be considered a macromolecule. Formulas for network solids, like those for ionic compounds, are simple ratios of the component atoms represented by a formula unit. Examples of network solids include diamond with a continuous network of carbon atoms and silicon dioxide or quartz with a continuous three-dimensional network of SiO2 units. Graphite and the mica group of silicate minerals structurally consist of continuous two-dimensional sheets covalently bonded within the layer, with other bond types holding the layers together. Disordered network solids are termed glasses. These are typically formed on rapid cooling of melts so that little time is left for atomic ordering to occur. Properties Hardness: Very hard, due to the strong covalent bonds throughout the lattice (deformation can be easier, however, in directions that do not require the breaking of any covalent bonds, as with flexing or sliding of sheets in graphite or mica). Melting point: High, since melting means breaking covalent bonds (rather than merely overcoming weaker intermolecular forces). Solid-phase electrical conductivity: Variable, depending on the nature of the bonding: network solids in which all electrons are used for sigma bonds (e.g. diamond, quartz) are poor conductors, as there are no delocalized electrons. However, network solids with delocalized pi bonds (e.g. graphite) or dopants can exhibit metal-like conductivity. Liquid-phase electrical conductivity: Low, as the macromolecule consists of neutral atoms, meaning that melting does not free up any new charge carriers (as it would for an ionic compound). Solubility: Generally insoluble in any solvent due to the difficulty of solvating such a large molecule. Examples Boron nitride (BN) Diamond (carbon, C) Quartz (SiO2) Rhenium diboride (ReB2) Silicon carbide (moissanite, carborundum, SiC) Silicon (Si) Germanium (Ge) Aluminium nitride (AlN) See also Molecular solid References Chemical bonding
https://en.wikipedia.org/wiki/Salil%20Vadhan
Salil Vadhan is an American computer scientist. He is Vicky Joseph Professor of Computer Science and Applied Mathematics at Harvard University. After completing his undergraduate degree in Mathematics and Computer Science at Harvard in 1995, he obtained his PhD in Applied Mathematics from Massachusetts Institute of Technology in 1999, where his advisor was Shafi Goldwasser. His research centers around the interface between computational complexity theory and cryptography. He focuses on the topics of pseudorandomness and zero-knowledge proofs. His work on the zig-zag product, with Omer Reingold and Avi Wigderson, was awarded the 2009 Gödel Prize. Contributions Zig-zag graph product for constructing expander graphs One of the main contributions of his work is a new type of graph product, called the zig-zag product. Taking a product of a large graph with a small graph, the resulting graph inherits (roughly) its size from the large one, its degree from the small one, and its expansion properties from both. Iteration yields simple explicit constructions of constant-degree expanders of every size, starting from one constant-size expander. Crucial to the intuition and simple analysis of the properties of the zig-zag product is the view of expanders as functions that act as "entropy wave" propagators—they transform probability distributions in which entropy is concentrated in one area to distributions where that concentration is dissipated. In these terms, the graph product affords the constructive interference of two such waves. A variant of this product can be applied to extractors, giving the first explicit extractors whose seed length depends on only the entropy deficiency of the source (rather than its length) and that extract almost all the entropy of high min-entropy sources. These high min-entropy extractors have several interesting applications, including the first constant-degree explicit expanders that beat the "eigenvalue bound." Vadhan also came up with another simplified approach to the undirected ST-connectivity problem following Reingold's breakthrough result. Also the zig-zag product was useful in Omer Reingold's proof that SL=L. Zero-knowledge proofs His work in this area is to use complexity-theoretic methods to understand the power and limitations of zero-knowledge proofs. In a series of papers with Oded Goldreich and Amit Sahai, they gained thorough understanding of the class SZK of problems possessing statistical zero-knowledge proofs, characterized the class SZK and proved that SZK is closed under various operations. Recently his work was trying to work on the zero-knowledge proof beyond the confines of SZK class. Randomness extractors With Lu, Omer Reingold, and Avi Wigderson, he gave the first construction of randomness extractors that are "optimal up to constant factors," reaching a milestone in a decade of work on the subject. With Trevisan, Zuckerman, Kamp, and Rao, he developed a theory of randomness extraction
https://en.wikipedia.org/wiki/Pop-up%20satellite%20archival%20tag
Pop-up satellite archival tags (PSATs) are used to track movements of (usually large, migratory) marine animals. A PSAT (also commonly referred to as a PAT tag) is an archival tag (or data logger) that is equipped with a means to transmit the collected data via the Argos satellite system. Though the data are physically stored on the tag, its major advantage is that it does not have to be physically retrieved like an archival tag for the data to be available making it a viable, fishery independent tool for animal behavior and migration studies. They have been used to track movements of ocean sunfish, marlin, blue sharks, bluefin tuna, swordfish and sea turtles to name a few species. Location, depth, temperature, oxygen levels, and body movement data are used to answer questions about migratory patterns, seasonal feeding movements, daily habits, and survival after catch and release, for examples. A satellite tag is generally constructed of several components: a data-logging section, a release section, a float, and an antenna. The release sections include an energetically popped off release section or a corrosive pin that is actively corroded on a preset date or after a specified period of time. Some limitations of using satellite tags are their depth limitations (2000m), their costs ($499–$4000+), their vulnerability to loss by environmental issues (biofouling), or premature release through ingestion by a predator. There are two methods of underwater geolocation that PSATs employ. The first method is through light based geolocation which uses the length of the day and a noon time calculation to estimate the tags location while underwater. This method has a functional depth limitation of light penetration which can be as shallow as a few meters to upwards of hundreds of meters. Geolocation estimates based on light are usually coupled with additional satellite data like sea surface temperature or other available data input such as bathymetry, land avoidance, and physical limitations of the tagged animal. The other method available is through measuring ambient light and the Earth's magnetic field. This method has a functional depth limitation equivalent of the maximum depth limitation, generally 1800m. Magnetic based geolocation is generally not coupled with additional satellite data or other inputs, and relies on the Earth magnetic field for latitude estimations and light (noon time) for longitude estimations. General information Pop-up satellite tags range in length from about and weigh 36-108 grams in air. A tag must be small compared to the size of the animal, anywhere from 3-5% of the total fish weight, so that it does not interfere with normal behavior. These tags record information such as temperature, magnetics, acceleration, light level, oxygen levels and pressure at set intervals of a few seconds to several hours. Data are often collected for several weeks or months, but with new advances in memory technology microSD cards
https://en.wikipedia.org/wiki/European%20route%20E66
European route E66 is a part of the International E-road network. This Class A intermediate west-east route runs from Franzensfeste in Italy to Székesfehérvár in Hungary, connecting the Alps with the Pannonian Plain. Itinerary The E 66 routes through three European countries: : Franzensfeste (with connection to European route E45) - Innichen - Winnebach : Arnbach - Silian - Lienz - Oberdrauburg - Spittal an der Drau : Spittal an der Drau - Villach : Villach - Klagenfurt - Graz - Ilz : A2 (Ilz) - Fürstenfeld : Fürstenfeld - Heiligenkreuz im Lafnitztal : Rábafüzes/Szentgotthárd - Körmend - Veszprém - Székesfehérvár. Hungary requested in October 2011 that E66 should be extended from Székesfehérvár via Dunaújváros - Kecskemét to Szolnok. This has not taken effect, so in 2019 Hungary requested the same extension Székesfehérvár – Szolnok again. References External links UN Economic Commission for Europe: Overall Map of E-road Network (2007) 66 E066 E066 E066
https://en.wikipedia.org/wiki/The%20X%20Show
The X Show is a magazine, variety, and interview/talk program that aired on FX Network in the US from May 1999 to April 2001. Running time was originally one hour, but this was later reduced to a half-hour. The show was 'guy-themed' much like a TV equivalent of Maxim magazine (e.g., co-host Daphne Brogdon would conduct hot tub interviews.) The X Show had numerous hosts and co-hosts, both male and female and would frequently feature spokesmodels. Ava Cadell was featured in segments providing sexual information and Chris Gore would host segments about movies. External links The X Show review at Entertainment Weekly by Ken Tucker FX Networks original programming 1999 American television series debuts 2001 American television series endings
https://en.wikipedia.org/wiki/Clean%20Air%20Network
Clean Air Network (CAN, ) is an independent non-governmental organisation exclusively focused on the issue of air pollution in Hong Kong. CAN aims to educate the public about the health impacts of air pollution and to mobilise public support for cleaner air in Hong Kong. According to Civic Exchange's environmental program director Mike Kilburn, CAN was created with the purpose of encouraging the public to speak out and support government measures that could improve the quality of air in Hong Kong. History CAN was established in July 2009, following a Civic Exchange conference focused on the state of Hong Kong's air pollution in January of the same year. CAN's mission is to amplify voices of individuals, groups and organisations, and together urge the government to take appropriate measures to clean up Hong Kong's air immediately. In 2017, CAN focused primarily on tackling local roadside air pollution, along with emissions from marine vessels, power plants and regional sources. Approach The organisation consistently supports the government in its endeavours to clean up Hong Kong's air through non-confrontational means, acting as its "honest mirror." CAN works closely with district councilors, legislative council members, and private sector corporations. The company also maintains close relations with the Environmental Protection Department and provides research reports, fact sheets and other documents on issues related to its work to help raise awareness and provide information to policy and decision makers. CAN has also given numerous talks at educational institutions. In addition to speaking to and maintaining close relations with student groups at many of Hong Kong's universities (Hong Kong University, Chinese University of Hong Kong, Hong Kong Polytechnic University, Hong Kong University of Science & Technology), CAN has also spoken at local and international schools. The organisation also offers a student air monitoring program, which allows students to physically monitor the air pollutants of their school and home environments first-hand. Within the 2011–2012 school year, a total of 11 schools will have participated in their program. The company believes that the involvement of youth is essential in laying the foundation for an environmentally-conscious society, and thus has pioneered many activities specifically suited for them. The Clean Air Network regularly uses social media, including services such as YouTube and Twitter, to spread its message and to provide updates on air pollution-related issues. CAN also offers a weekly e-newsletter that summarises news headlines, events, and other information relevant to air pollution and its operations. Additionally, they hold unique educational events targeting the public, ranging from scavenger hunts to film festivals. For example, CAN held a mask design competition in the district of Sham Shui Po ("罩量─深水埗口罩設計較量" in Chinese) which engaged local artists and emphasised the severity of air po
https://en.wikipedia.org/wiki/Backup-file%20Format
Backup-File Format is a data archive format used by the IBM AIX operating system. It stores copies of files in an analogous manner to the Unix tar format. BFF files can be created by the AIX "backup" command, and read by the corresponding "restore" command. There is no standard file suffix, although some files use .bff. However, files can be identified programmatically by their "magic number" in the first 4 bytes. This can be either 0x09006bea or 0x09006fea, in big-endian byte order. The Backup-File Format is also used for AIX software packages. References Unix archivers and compression-related utilities Computer file formats
https://en.wikipedia.org/wiki/R%C4%83zvan%20Ion
Răzvan Ion (/Rəzvan Ion/) is known for creating the first artificial intelligence curator in the history of art. He is a theoretician, curator and futurist, speaker on new technologies & arts, and creator & manager of new art spaces. Career Ion was an associate professor and lecturer at the University of California, Berkeley; Hochschule für Musik und Theater München; University of Vienna; Lisbon University; Central University of New York; University of London; Sofia University; University of Kyiv; University of Bucharest etc. where he taught Curatorial Studies and Critical Thinking. He has held conferences and lectures at different art institutions like Witte de With, Rotterdam; Kunsthalle Vienna; Art in General, New York; Calouste Gulbenkian, Lisbon; Casa Encedida, Madrid. He is the co-founder of Deraffe Vienna, Bucharest Biennale - International Biennial for Contemporary Art, Pavilion - art centre and Pavilion Journal - an academic journal. As an artist he exhibited between 2000 -2010 in Poznan Biennial, SKC Gallery- Belgrade, National Museum of Art – Cluj, ICA – Bucharest, NY Experimental Festival, InterFACES – Bangkok, Centro Cultural del Matadero – Madrid, International Photo Ljubljana, Going Public - Milano, CCA Ekaterinburg, National Museum of Art – Timișoara, ICA Budapest, New Langton – San Francisco. Recently he was the curator of Bucharest Biennale 8, together with Beral Madra. Was the chief curator of creart Gallery Bucharest between 2017 and 2020. He is a speaker on new technologies, AI, machine learning, blockchain & art. In 2020 he founded Deraffe Vienna, an organization working at the intersection between art and new technologies such as AI, XR, and blockchain. As a curator, director and founder of different institutions he worked with artists like Erwin Wurm, Jan Kaila, Yoko Ono, AES+F, Aga Ousseinov, and Naeem Mohaiemen, Sabrina Gschwandtner, Minerva Cuevas, Mona Hatoum, Asier Mendizabal and many others. He founded Gay45, the first indie queer European magazine. He was a speaker on technology and arts for Istyle, Apple, MindChain, Business Review, etc. The latest exhibitions curated by him were: Wie wir Dinge betrachten - for European Union Council Presidency of Austria, Bucharest Biennale - Edit Your Future, From Contemplating To Constructing Situations (group show with Francis Alys, Minerva Cuevas, Wilfredo Prieto, Erwin Wurm) at Pavilion Center. He wrote texts for general and academic publications like Mahkuscript, New York Art Review, Reforma, and Pavilion. He was also a tenured professor at the University of Bucharest where he taught a course on curatorial studies & critical thinking. Notable works Visual Witness (2002) Architectural Economy of a Biennial (2012) Edit Your Future (2021) References National Austrian Radio & TV Mahkuscript Kurier Le Monde The Art Newspaper Artforum Pavilion Journal Pavilion - journal for politics & culture Artnet Art and Education Mahkuscript The Art Newspaper Spinn
https://en.wikipedia.org/wiki/Faceplate
Faceplate (face plate, face-plate) is a plate, cover, or bezel on the front of a device, such as: Computers and electronics Electrical outlet, also referred to as a wall plate, outlet cover, or socket cover Front panel, of computers Head unit, stereo system component Motherboard, input/output port panel such as on an ATX Cover (container) Faceplate (housing), decorative elements of housing Nokia 5110, mobile phone with interchangeable faceplates Interchangeable bezels for Game Boy Micro Interchangeable bezels for Nintendo 3DS Interchangeable bezels for Nintendo 2DS Interchangeable decorative front plates for Nintendo Wii Remote musical instrument controllers Interchangeable decorative front plates for PlayStation 3 rhythm game peripherals Interchangeable decorative front case panels for Xbox 360 Underwater diving Single-lens diving mask Window fronting a single-lens diving mask Other uses Lathe faceplate, accessory for a wood or metal turning lathe Lockset, components that make up the locking or latching mechanism Stem (bicycle part), connects the handlebars to the steerer tube of the bicycle fork Wallpaper steamer, an electrical device which boils water continuously to produce steam See also Bezel (disambiguation) Cover (disambiguation) Instrument panel (disambiguation) Plate (disambiguation) Wallplate (disambiguation)
https://en.wikipedia.org/wiki/Weighted%20network
A weighted network is a network where the ties among nodes have weights assigned to them. A network is a system whose elements are somehow connected. The elements of a system are represented as nodes (also known as actors or vertices) and the connections among interacting elements are known as ties, edges, arcs, or links. The nodes might be neurons, individuals, groups, organisations, airports, or even countries, whereas ties can take the form of friendship, communication, collaboration, alliance, flow, or trade, to name a few. In a number of real-world networks, not all ties in a network have the same capacity. In fact, ties are often associated with weights that differentiate them in terms of their strength, intensity, or capacity On the one hand, Mark Granovetter (1973) argued that the strength of social relationships in social networks is a function of their duration, emotional intensity, intimacy, and exchange of services. On the other, for non-social networks, weights often refer to the function performed by ties, e.g., the carbon flow (mg/m2/day) between species in food webs, the number of synapses and gap junctions in neural networks, or the amount of traffic flowing along connections in transportation networks. By recording the strength of ties, a weighted network can be created (also known as a valued network). Weighted networks are also widely used in genomic and systems biologic applications. For example, weighted gene co-expression network analysis (WGCNA) is often used for constructing a weighted network among genes (or gene products) based on gene expression (e.g. microarray) data. More generally, weighted correlation networks can be defined by soft-thresholding the pairwise correlations among variables (e.g. gene measurements). Measures for weighted networks Although weighted networks are more difficult to analyse than if ties were simply present or absent, a number of network measures has been proposed for weighted networks: Node strength: The sum of weights attached to ties belonging to a node Closeness: Redefined by using Dijkstra's distance algorithm Betweenness: Redefined by using Dijkstra's distance algorithm The clustering coefficient (global): Redefined by using a triplet value The clustering coefficient (local): Redefined by using a triplet value or using an algebraic formula A theoretical advantage of weighted networks is that they allow one to derive relationships among different network measures (also known as network concepts, statistics or indices). For example, Dong and Horvath (2007) show that simple relationships among network measures can be derived in clusters of nodes (modules) in weighted networks. For weighted correlation networks, one can use the angular interpretation of correlations to provide a geometric interpretation of network theoretic concepts and to derive unexpected relationships among them Horvath and Dong (2008) Software for analysing weighted networks There are a number of software
https://en.wikipedia.org/wiki/Hong%20Kong%20CyberU
Hong Kong CyberU (or HKCyberU; ) was a virtual school developed by The Hong Kong Polytechnic University (PolyU) and PCCW in 2000. It later became the online arm of PolyU. HKCyberU adopts a ‘blended mode’ of study to combine the flexibility of web-based learning with personal guidance through face-to-face tutorials. It provides web-based programmes leading to academic awards (up to postgraduates level) offered by PolyU and other institutions in the Mainland and overseas. The objective is to fulfil the needs of working professionals and executives in acquiring recognised university qualifications and professional education through part-time and web-based studies with maximum flexibility. HKCyberU was terminated in 2012. History HKCyberU has been awarded as "The Best Wired/Virtual Campus" in 2006 (April 2006, A-Plus). In December 2007, HKCyberU presented scholarships to its master's degree students who attained distinguished academic performance in the year 2006/07. Programmes leading to PolyU awards Master of/Postgraduate Diploma in Professional Accounting (offered by Graduate School of Business) Master of Science/Postgraduate Diploma in E-Commerce (offered by Department of Computing) Master of Science/Postgraduate Diploma in Information Systems (offered by Department of Computing) Master of Science/Postgraduate Diploma in Knowledge Management (offered by Department of Industrial and Systems Engineering) Master of Science/Postgraduate Diploma in Project Management (offered by Department of Building & Real Estate) Master of Science/Postgraduate Diploma in Software Technology (jointly offered by Department of Computing and Graduate University of the Chinese Academy of Sciences) Bachelor of Science (Honours) in Nursing (offered by School of Nursing) Programmes leading to awards from overseas universities Heriot-Watt University, UK Doctor of Business Administration (DBA) Master of Business Administration (MBA) Master of Business Administration (Chinese version) Master of Science in Financial Management Master of Science in Human Resource Management Master of Science in Marketing Master of Science in Strategic Planning Edith Cowan University, AU Master of Environmental Management Master of Security Management The College of Estate Management, UK Degree awarded by The University of Reading, UK MBA in Construction & Real Estate Master of Science in Surveying Bachelor of Science in Building Surveying Bachelor of Science in Construction Management Bachelor of Science in Estate Management Bachelor of Science in Quantity Surveying Degree awarded by The College of Estate Management, UK Postgraduate Diploma in Arbitration Postgraduate Diploma in Surveying Programmes leading to awards from the Chinese mainland East China Normal University () Institute of Policy and Management, Chinese Academy of Sciences () Short courses E-Quiz for Estate Agents Authority Preparatory Course for HKCEE English Preparatory Course for IELTS References External links Off
https://en.wikipedia.org/wiki/Fluidinfo
Fluidinfo, formerly named FluidDB until early 2011, is an online cloud data store based on an attribute-value centric data model. Fluidinfo is written in Python and characterized by a publicly writeable schema-less database that provides a query language, a fine-grained permissions model and promotes data sharing, both publicly and in groups. The lack of an underlying RDBMS structure may classify Fluidinfo as a type of publicly writeable "collective database". Overview Few data stores are available with the intent to provide public write-access, except in narrow contexts. Two examples of shareable data stores operating in specific contexts are del.icio.us (shareable bookmarks) and Twitter (micro-blogging service). Fluidinfo offers a generalized shareable data store, where potentially any piece or type of information can be shared with anybody else, if desired, striving for a balance between individual, group and communal data ownership. Author and blogger Robert Scoble described Fluidinfo as a "database that acts like a wiki". Fluidinfo emphasizes three aspects that make it unique among existing public data stores: Data model Query language Permissions Data model The data model aims to be as flexible as possible, permitting a wide range of information to be stored in Fluidinfo. The fundamental difference between attribute-value stores (along the lines of EAV schemas) and traditional RDBMS is the lack of a highly defined top-down structure. The essence of Fluidinfo consists of arbitrary objects, which can be considered points in a data space to which tags may be attached. Objects have no owners, similar to concepts in the "real" world. Tags are initially controlled by the user/application who creates them and can be attached to objects, in a fashion reminiscent of how humans use their minds to create and associate information with physical objects or concepts. One of the underlying motivations of Fluidinfo is to make working with information more natural. Anyone can attach tags to any data object, but only people with the right roles can see and search these tags. Query language The query language was designed to perform complex queries in as simple a manner as possible. The syntax is superficially reminiscent of information retrieval query languages such as CQL which are characterized as less complicated than traditional database query languages such as SQL. The query language always return object identifiers based on tag values, using the predicates below: Numeric: To find objects based on the numeric value of tags; e.g. tim/rating > 5 Textual: To find objects based on text matching of their tag values; e.g. sally/opinion matches fantastic Presence: Use has to request objects that have a given tag; e.g. has sally/opinion Set contents: A tag on an object can hold a set of strings. For example, a tag called mary/product-reviews/keywords might be on an object with a value of [ "cool", "kids", "adventure" ]. The contains operator can b
https://en.wikipedia.org/wiki/E611
E611 can refer to: E 611 road (United Arab Emirates) European route E611, a route in France part of the international E-road network
https://en.wikipedia.org/wiki/Noop%20%28disambiguation%29
Noop is a programming language from Google. Noop or NOOP may also refer to: NOP (code) or NOOP, a computer processor instruction Noop scheduler, an I/O scheduler for the Linux kernel Noop, song by Bola from the album Kroungrine See also National United Party (Vanuatu), pronounced as "noop" NOP (disambiguation) Knoop, a surname (including a list of persons with the name)
https://en.wikipedia.org/wiki/Ibank
IBank, ibank, iBank, or Ibank may refer to: iBank (software), a personal financial software package for Macintosh computers, made by IGG Software International Exchange Bank Investment banking, a form of banking practice Islamic Bank of Thailand See also Ibanking (disambiguation)
https://en.wikipedia.org/wiki/Economic%20and%20Social%20Data%20Service
The Economic and Social Data Service (ESDS) is a national data archiving and dissemination service that was founded in January 2003. It is funded jointly by the Economic and Social Research Council (ESRC) and Jisc. In July 2012, the ESRC announced it will become a partner in the UK Data Service, to be established as of October 1st of 2012. Scope of work ESDS provides access to and support for a wide range of key economic and social data in the UK. The collection covers both quantitative and qualitative data which span many different disciplines and themes. Structure ESDS service is a distributed service, based on collaboration between four key centres of expertise: UK Data Archive, Institute for Social and Economic Research (ISER), both based at the University of Essex; Manchester Information and Associated Services (Mimas) and Cathie Marsh Centre for Census and Survey Research (CCSR), both located at the University of Manchester. These centres work in collaboration to acquire, process, preserve and disseminate a wide range of data across the social sciences. ESDS also provides enhanced user support and training for the secondary use of data for the research, learning and teaching communities. Data services The UK Data Archive is responsible for the overall direction and management of the ESDS. Within ESDS, four specialist data services provide value-added support as follows: ESDS Government promotes and facilitates the use of large-scale government surveys, such as the Labour Force Survey and Health Survey for England in research, learning, and teaching. ESDS International provides access to, and support for, international (typically comparative) datasets from both survey and aggregate sources. ESDS Longitudinal supports a range of the key UK longitudinal data. ESDS Qualidata provides access to, and support for, qualitative datasets, from classic studies from the 1960s and 1970s to contemporary data. Study descriptions and online documentation, including questionnaires, of datasets can be accessed online free of charge and without registering. Access to data requires registration and uses federated access management (shibboleth) user authentication. Registered users can also download and explore/analyse online a large and growing number of datasets. References External links Economic and Social Data Service (ESDS) Economic and Social Research Council (ESRC) Joint Information Systems Committee (JISC) UK Data Archive Institute for Social and Economic Research (ISER) Manchester Information and Associated Services (Mimas) Cathie Marsh Centre for Census and Survey Research (CCSR) Archives in the United Kingdom Databases in the United Kingdom Online databases Organizations established in 2003 Organisations based in Colchester Science and technology in Essex University of Essex 2003 establishments in the United Kingdom
https://en.wikipedia.org/wiki/BCT%20Network
The Army will continue the development and fielding of an incremental ground tactical network capability to all Army brigade combat teams. This network is a layered system of interconnected computers and software, radios, and sensors within the Brigade Combat Team (BCT). The BCT network is essential to enable Unified Battle Command and will be delivered to the Army's Brigade Combat Teams in increasing capability increments. The first increment is currently finishing SDD developmental and operational testing and will be delivered to Infantry Brigade Combat Teams in the form of Network Integration Kits (B-kits) with E-IBCT. The soldier at every echelon, from Brigade to Squad, will be connected to the proper sensor data and communication relays to ensure proper battlespace situational awareness. The Network Integration Kit The Network Integration Kit (NIK) is a suite of equipment capable of being installed on many vehicles including HMMWV's and MRAPs. It provides the Network connectivity and battle command software to integrate and fuse sensor data into the common operational picture (COP) displayed on the Force XXI Battle Command Battalion/Brigade and Below (FBCB2). The Network Integration Kit consists of an integrated computer system (ICS) that hosts the Battle Command software and the Systems of Systems Common Operating Environment (SOSCOE) software, along with the JTRS GMR radio to provide the interface to the sensors and unmanned systems, as well as voice and data communications with other vehicles and soldiers. Soldiers will be able to communicate with the Battalion Tactical Operation Center (TOC), by sending reports on enemy sighting, activity and location utilizing the NIK via the Network allowing for split-time tactical decisions. Sources This article incorporates work from https://web.archive.org/web/20090927002001/http://www.bctmod.army.mil/systems/network/index.html, which is in the public domain as it is a work of the United States Army. See also Military technology
https://en.wikipedia.org/wiki/Headless%20computer
A headless computer is a computer system or device that has been configured to operate without a monitor (the missing "head"), keyboard, and mouse. A headless system is typically controlled over a network connection, although some headless system devices require a serial connection to be made over RS-232 for administration of the device. Headless operation of a server is typically employed to reduce operating costs. PC BIOS limitations During bootup, some (especially older) PC BIOS versions will wait indefinitely for a user to press a key before proceeding. If some basic device, such as a video card or keyboard, are not installed or connected, this could effectively halt an unattended system. On more modern systems, the BIOS factory setting will typically be configured to behave this way as well, but this setting can be changed with a BIOS setup utility to proceed without user intervention. Even in cases where a system has been set up to be managed remotely, a local keyboard and video card may still be needed from time to time; for example, to diagnose boot problems that occur before a remote access application is initialized. Hardware remote control Some servers provide for remote control with an internal network card and hardware that mirrors the console screen. For example, HP offers a system called Integrated Lights-Out (iLO) that provides this function. Remote access to the system is gained using a secure web connection to an IP address assigned to the iLO adapter, and allows for monitoring of the system during start-up, before the operating system is loaded. Another hardware solution is to use a KVM-over-IP switch. Such a switch is a traditional Keyboard-Video-Mouse device with the added ability to provide remote control sessions over IP. Connection to the KVM device is gained using a web browser, which allows for remote monitoring of the connected system console port. Software remote control Administration of a headless system typically takes place with a text-based interface such as a command line in Unix or in Linux. These interfaces, often called "virtual terminals" or "terminal emulators", attempt to simulate the behavior of "real" interface terminals like the Digital Equipment Corporation's VT100, but over networks, usually using protocols such as Secure Shell. One can also use systems such as X Window System and VNC combined with virtual display drivers - this setup allows remote connections to headless machines through ordinary graphical user interfaces, often running over network protocols like TCP/IP. See also Xvfb x11vnc Headless software Embedded systems Emergency Management Services (EMS) Serial over LAN (SOL) Console redirection CTTY (DOS command) Shell shoveling References Classes of computers System administration
https://en.wikipedia.org/wiki/Lev%20Korolyov
Lev Korolyov is the name of: Lev Nikolayevich Korolyov (1926–2016), Russian computer scientist Lev Vladimirovich Korolyov (born 1986), Russian footballer See also Korolyov (disambiguation)
https://en.wikipedia.org/wiki/Tech%20Coast%20Angels
Tech Coast Angels is the leading source of funding to early-stage companies in Southern California. TCA has over 450 members and is also one of the largest angel networks in the world. An analysis by CB Insights ranked TCA No.1 out of 370 angel groups on “Network Centrality” and No. 5 overall in “Investor Mosaic.” History Since its inception in 1997, TCA members have focused on building valuable companies, personally invested over $255 million in over 465 companies, and helped portfolio companies attract more than $2.2 billion in additional capital, largely from venture capital firms and strategic investors. In 2020, TCA invested $20 million in 64 companies. TCA members provide companies capital, counsel, mentoring and access to a network of potential investors and partners. TCA has chapters located in Los Angeles, Orange County, San Diego, and the Inland Empire. Furthermore, TCA had invested about $15.4 million in a total of 41 companies in 2022, as noted in its 2022 Annual Report and it total investments have largely exceeded $10 million for twelve years. While there were also 10 shutdowns, 21 of them of the 41 companies receiving funding were new additions to TCA’s portfolio, representing 72% of investments, compared to 48% in 2021. Company exits TCA has had eleven IPOs and over 79 exits in total. Three of those (Mindbody, Greendot and Sandpiper Networks) achieved multiples between 149 and 265. TCA's successful exits include: Mindbody (wellness business services software) Green Dot Corporation (over-the-counter prepaid debit card) Sandpiper Networks (internet infrastructure) Companion Medical (smart insulin pen system paired with diabetes management app) Leaselock (sells Certificates of Guarantee promising rent when tenant defaults) BlueBeam Software (PDF collaboration software) Parcel Pending (electronic Smart Locker storage system for multi-family housing) Truecar (automotive lead generation) Green Earth Technologies (oil substitute made from waste beef tallow) Casestack (Integrated Logistics Outsourcing) One Stop Systems (manufactures Computers for Industrial Applications) Lytx (Drivecam (video event recorder for driver feedback safety) Cytom X Therapeutics (antibody therapeutics for a variety of serious diseases including cancer) WiseWindow (open qualitative content aggregation platform) Vital Therapies (liver assist device) Beam Global (portable solar EV charging station with no grid ties) Language Weaver (machine translation software) WeGoLook (dispatches in-person Lookers to verify claims made by internet sellers) Portfolium (online social portfolio network) AIRSIS (remote asset tracking & management) Althea (cGMP manufacturing, analytical development, aseptic filling) N Spine (spine stability system) OptionEase (stock option audit financial software) Retrosense Therapeutics (biologic approach to vision restoration in retinal degenerative conditions) Greenplum (Intelligent Data Routing Systems) Savara Pharmaceuti
https://en.wikipedia.org/wiki/Acafellas
"Acafellas" is the third episode of the American television series Glee. The episode premiered on the Fox network on September 16, 2009. It was directed by John Scott and written by series creator Ryan Murphy. The episode sees glee club director Will Schuester (Matthew Morrison) form an all-male a cappella group, the Acafellas, neglecting the club in favor of dedicating his time to the new endeavor. New Directions struggle with choreography, and resist attempts at sabotage by members of the cheer squad. Mercedes (Amber Riley) harbors romantic feelings for Kurt (Chris Colfer), who comes out as gay. Singer Josh Groban guest stars as himself, John Lloyd Young appears as wood shop teacher Henri St. Pierre, and Victor Garber and Debra Monk play Will's parents. The episode features covers of seven songs, including the instrumental piece "La Camisa Negra" performed on guitar by Mark Salling. Studio recordings of two of the songs performed were released as singles, available for digital download, and two of the tracks also appear on the album Glee: The Music, Volume 1. The episode was watched by 6.69 million US viewers and received mixed reviews from critics. Entertainment Weekly's Tim Stack and The New York Times's Mike Hale welcomed the return of Stephen Tobolowsky as Sandy Ryerson, while Ryan Brockington of the New York Post and Raymund Flandez of The Wall Street Journal praised Riley's cover of Jazmine Sullivan's "Bust Your Windows". However, Rachel Ray, reviewing the episode for The Independent, deemed it "overhyped [...] uninspired, confusing and with a simple plot to boot." Plot When Rachel Berry (Lea Michele) questions director Will Schuester's choreography skills during a glee club rehearsal, he forms an all-male a cappella group, the Acafellas, to build his confidence. The group originally consists of Will, football coach Ken Tanaka (Patrick Gallagher), woodshop teacher Henri St. Pierre (John Lloyd Young) and Howard Bamboo (Kent Avenido), a co-worker of Will's wife Terri (Jessalyn Gilsig). After their first performance however, Henri and Howard drop out and Will replaces them with glee club member Finn Hudson (Cory Monteith), who was considering quitting glee club, and his fellow football player Puck (Mark Salling). Former glee club director Sandy Ryerson (Stephen Tobolowsky) also joins the group, having arranged for singer Josh Groban to be at their next performance. Although the star compliments their rendition of "I Wanna Sex You Up", he reveals that he only attended to make sure Sandy stopped stalking him. In Will's absence, the glee club hires Dakota Stanley (Whit Hertford), the choreographer of a rival club, Vocal Adrenaline, to help coach them to a Nationals championship. Cheerleaders Quinn (Dianna Agron), Santana (Naya Rivera) and Brittany (Heather Morris) hope that the notoriously harsh Stanley will prompt some members of the club to quit, furthering their plan to sabotage the club. Although Stanley is heavily critical of most of t
https://en.wikipedia.org/wiki/Balance%20of%20Power%3A%20The%201990%20Edition
Balance of Power: The 1990 Edition is a sequel to the computer strategy game Balance of Power. Development Balance of Power: The 1990 Edition was released in 1989 on the Apple IIGS, Windows, Macintosh, Amiga and Atari ST. Chris Crawford who created both the original Balance of Power and Balance of Power: The 1990 Edition does not consider the latter as a proper sequel, saying he was simply "tidying up, adding some bells and whistles." Balance of Power: The 1990 Edition adds more countries, advisors to help the player, a new "multi-polar" level that allows countries to generate events of their own (such as declaring war on other countries) and a 2-player hotseat mode. Reception Gary Whitta for The One said "An outstanding piece of strategy gaming – especially in two-player mode (even without a modem option). Worthwhile even for those who own the original." Steve Williams for Family Computing said "For the new multipolar level alone, I would consider The 1990 Edition to be a major improvement over the original Balance of Power. The addition of 78 active participants makes it a new game altogether." In 1989 Compute! stated that the 1990 edition's multipolar features were welcome additions to the game. That year Orson Scott Card stated that the magazine's 1988 list caused him to reevaluate the game when playing the 1990 edition, stating that it had "the most detailed, carefully extrapolated future world I've worked with". While still criticizing geopolitical "absurdities" such as forcing the United States to passively accept Soviet troops in Syria (contrary to what happened during the Yom Kippur War) and advisors in Mexico or start nuclear war, Card now concluded that such outcomes probably reflected computer limitations rather than Crawford's political views. He advised players to pretend that Balance of Power was set on an alien planet "astonishingly similar" to Earth, and to play solely based on the game's assumptions about the world. Chuck Moss disagreed with Card's revised view, describing Balance of Power in Computer Gaming World in 1992 as "reflect[ing] extreme bias on the part of [its] designers". He called it a "pacifist treatise ... nuclear war erupted if the U.S. so much as sent five million dollars to Panama". Reviews ACE (Advanced Computer Entertainment) - Apr, 1989 Commodore User - May, 1989 Zzap! - Jul, 1989 The Games Machine - May, 1989 ASM (Aktueller Software Markt) - May, 1989 Jeux & Stratégie #58 References External links Balance of Power: The 1990 Edition at MobyGames Review in Info 1989 video games Amiga games Anti-war video games Apple IIGS games Atari ST games Chris Crawford (game designer) games Classic Mac OS games Cold War video games Government simulation video games Mindscape games Video game sequels Video games developed in the United States Windows games
https://en.wikipedia.org/wiki/EconLit
EconLit is an academic literature abstracting database service published by the American Economic Association. The service focuses on literature in the field of economics. EconLit covers articles and other materials dating back to 1969. It uses the JEL classification codes for classifying papers by subject. See also List of academic databases and search engines References External links Bibliographic databases and indexes Economic databases EBSCO Industries
https://en.wikipedia.org/wiki/XHEPO-FM
XHEPO-FM is a radio station located in the city of San Luis Potosí, San Luis Potosí, Mexico. It rebroadcasts the programming of XEDA-FM Imagen Radio 90.5 FM from Mexico City. History XEPO-AM on 1310 kHz received its concession on September 2, 1947. It was owned by Radio Ondas Populares, S.A., and broadcast with 1,000 watts. By the 1980s, however, it had gone to 500 watts. In 1987, XEPO moved to 1100 kHz and began broadcasting with 1,000 watts again. The same year, it was sold to Grupo ACIR, with the concession being transferred to Radio Integral in 2000. Formats under ACIR included Radio Voz, Radio ACIR, Bonita and Inolvidable. In 2005, ACIR sold XEPO to Controladora de Medios (now known as GlobalMedia), with the station taking on its Imagen Radio affiliation; Cable Master became the concessionaire in 2006. In 2010, XEPO moved to FM as XHEPO-FM 103.1; 1100 AM signed off for the final time in January 2015. References Radio stations in San Luis Potosí Mass media in San Luis Potosí City Radio stations established in 1947 1947 establishments in Mexico
https://en.wikipedia.org/wiki/UBC%20Department%20of%20Computer%20Science
The UBC Computer Science (UBC CS) department at the University of British Columbia was established in May 1968. UBC CS is located at the UBC Point Grey campus in Vancouver, British Columbia, Canada. As of September 2022, it has 65 faculty, 62 staff, 248 graduate students, and 2,763 undergraduates. History The Computer Science department was established in May 1968 by six founding UBC faculty members: After more than a decade working with Atomic Energy of Canada, Dr. Kennedy joined the department in January 1966 as Director of the Computing Centre, a position he held until June 1980. The Computing Centre served computing needs across the university, including Computer Science. In addition, he became a professor in the Department of Computer Science in 1968. Hugh Dempster was one of the founding members of the department of Computer Science in 1968. Prior to that, Hugh had worked at UBC in the Computing Centre. Edward Argyle, another founding member, had worked at the Dominion Radio Astrophysical Lab in Penticton, and published widely on computer science and astrophysics. Founding member, Wilfred J. Hansen wrote one of the founding texts on data structures, "Data Structures" and "Data Structures in Pascal". John L. Allard was a founding faculty member. John J.E.L. Peck was the first Department Head and remained so until 1977. Research activities The department's research activities are organized around a number of collaborative research groups: AI (Artificial Intelligence) Algorithms Lab CAIDA (Centre for Artificial Intelligence Decision-Making & Action) Data Science Institute DFP (Designing for People Cluster) DMM (Data Management and Mining Lab) Human-AI Interaction Imager Laboratory for Graphics, Visualization and HCI InfoVis (Information Visualization Group) ISD (Integrated System Design ISD) MILD (Mathematics of Information, Learning and Data ML (Machine Learning) NLP (Natural Language Processing) NSS (Networks, Systems and Security Lab) PLAI (Programming Languages for Artificial Intelligence) SCL (Scientific Computing Laboratory) SPIN (Sensory Perception & interaction Research Group) SPL (Software Practices Lab) SSL (Sensorimotor Systems Lab) Systopia (Systems research) VisCog (Visual Cognition Lab) Ratings The department is rated by Maclean's 2022 annual rankings as tied for the best computer science university program in Canada. The department is ranked 21st in the world by the QS World University Subject Rankings. UBC is ranked as the 34th best university in the world by QS World University Rankings. Notable faculty Cristina Conati - Multiple papers and awards, previous President of AAAC (Association for the Advancement of Affective Computing) Anne Condon – bioinformatics and computational complexity, former department chair. Gregor Kiczales – His best known work is on Aspect-oriented programming and the AspectJ extension for Java at Xerox PARC. He contributed to the design of the Common Lisp Object System, and is the
https://en.wikipedia.org/wiki/BioSense
BioSense is a program of the Centers for Disease Control and Prevention (CDC) that tracks health problems as they evolve and provides public health officials with the data, information and tools they need to better prepare for and coordinate responses to safeguard and improve the health of the American people. By integrating local and state-level information, CDC will provide a timely and cohesive picture at the regional (i.e., multistate) and national levels and improve BioSense's utility. The key components of the BioSense program redesign are to: Help build health monitoring infrastructure and workforce capacity where needed at the state, local, tribal, and territorial levels Facilitate the interchange of information that can be used to coordinate responses and monitor health-related outcomes routinely and during an event Retain the original purpose of BioSense to detect and characterize events (or health-related threats) early by building on state and local health departments systems and programs Expand the utility of BioSense data to multi-use [and all-hazard] beyond early event detection and to contribute information for public health situational awareness, routine public health practice, and improved health outcomes and public health Improve the ability to detect emergency health-related threats by supporting the enhancement of systems to signal alerts for potential problems Increasing local and state jurisdictions participation in BioSense Advances in science and technology BioSense mandate and establishment Mandated in the Public Health Security and Bioterrorism Preparedness Response Act of 2002, the CDC BioSense Program was launched in 2003 to establish an integrated national public health surveillance system for early detection and rapid assessment of potential bioterrorism-related illness. BioSense 2.0 By November 2011, the Redesigned BioSense (or BioSense 2.0) will develop a community-controlled environment (architecturally distributed in a cloud-based model) governed by the Association of State and Territorial Health Officials (ASTHO), in coordination with the Council of State and Territorial Epidemiologists (CSTE), National Association of County and City Health Officials (NACCHO), and International Society for Disease Surveillance (ISDS). ASTHO will offer this service to states for receiving and managing syndromic surveillance information. The cloud-based BioSense 2.0 environment allows State and Local health departments to access data that will support potential expansions of their syndromic surveillance systems under the Meaningful Use program. States that elect to use this utility will each have a secure "zone" that they control and can use to manage or share their syndromic surveillance information. References Counterterrorism in the United States Centers for Disease Control and Prevention Epidemiology United States Department of Homeland Security
https://en.wikipedia.org/wiki/PARI/GP
PARI/GP is a computer algebra system with the main aim of facilitating number theory computations. Versions 2.1.0 and higher are distributed under the GNU General Public License. It runs on most common operating systems. System overview The PARI/GP system is a package that is capable of doing formal computations on recursive types at high speed; it is primarily aimed at number theorists. Its three main strengths are its speed, the possibility of directly using data types that are familiar to mathematicians, and its extensive algebraic number theory module. The PARI/GP system consists of the following standard components: PARI is a C library, allowing for fast computations, and which can be called from a high-level language application (for instance, written in C, C++, Pascal, Fortran, Perl, or Python). gp is an easy-to-use interactive command line interface giving access to the PARI functions. It functions as a sophisticated programmable calculator which contains most of the control instructions of a standard language like C. GP is the name of gp's scripting language which can be used to program gp. Also available is gp2c, the GP-to-C compiler, which compiles GP scripts into the C language and transparently loads the resulting functions into gp. The advantage of this is that gp2c-compiled scripts will typically run three to four times faster. gp2c understands almost all of GP. PARI/GP performs arbitrary precision calculations (e.g., the significand can be millions of digits long—and billions of digits on 64-bit machines). It can compute factorizations, perform elliptic curve computations and perform algebraic number theory calculations. It also allows computations with matrices, polynomials, power series, algebraic numbers and implements many special functions. PARI/GP comes with its own built-in graphical plotting capability. PARI/GP has some symbolic manipulation capability, e.g., multivariate polynomial and rational function handling. It also has some formal integration and differentiation capabilities. PARI/GP can be compiled with GMP (GNU Multiple Precision Arithmetic Library) providing faster computations than PARI/GP's native arbitrary-precision kernel. History PARI/GP's progenitor was a program named Isabelle, an interpreter for higher arithmetic, written in 1979 by Henri Cohen and François Dress at the Université Bordeaux 1. PARI/GP was originally developed in 1985 by a team led by Henri Cohen at Laboratoire A2X and is now maintained by Karim Belabas at the Université Bordeaux 1 with the help of many volunteer contributors. Etymology The name PARI is a pun about the project's early stages when the authors started to implement a library for "Pascal ARIthmetic" in the Pascal programming language (although they quickly switched to C), and after "pari de Pascal" (Pascal's Wager). The first version of the gp calculator was originally called GPC, for Great Programmable Calculator. The trailing C was eventually dropped. Usage
https://en.wikipedia.org/wiki/Lifeline%20%281978%20TV%20series%29
Lifeline is a documentary television program broadcast on the NBC television network between September 1978 and early 1979. It documented the daily routines of some of the most successful doctors of the time. External links 1978 American television series debuts 1979 American television series endings NBC original programming 1970s American documentary television series
https://en.wikipedia.org/wiki/Comcast%20Sports%20Southwest
Comcast Sports Southwest (CSS) was an American regional sports network that served Greater Houston, Texas. It was owned by the NBC Sports Group unit of NBCUniversal. The channel was launched on September 1, 2009 and had a similar format to Comcast/Charter Sports Southeast, which launched ten years earlier. Both networks shared the same logo and focused primarily on collegiate and high school sports. The network showed live college football and basketball games, primarily from Conference USA, the Sun Belt Conference, and the Southeastern Conference. Several of the live football games feature the University of Houston and Rice University. CSS also had the rights to Houston's coaches show and encores of most games from both schools on Friday nights. On Thursday nights during the fall months, Comcast Sports Southwest broadcast live high school football games. The network also produced its own version of Comcast SportsNet's signature program SportsNite. The network was discontinued on October 1, 2012 when Comcast SportsNet Houston was launched. See also Root Sports Southwest - a Houston-based channel formerly known as Comcast SportsNet Houston until November 2014 that airs Houston Rockets and Houston Astros games. External links Southwest Television channels and stations established in 2009 2009 establishments in Texas Television channels and stations disestablished in 2012 2012 disestablishments in Texas Defunct local cable stations in the United States Defunct mass media in Texas
https://en.wikipedia.org/wiki/George%20B.%20Purdy
George Barry Purdy (20 February 1944 – 30 December 2017) was a mathematician and computer scientist who specialized in cryptography, combinatorial geometry and number theory. Purdy received his Ph.D. from the University of Illinois at Urbana–Champaign in 1972, officially under the supervision of Paul T. Bateman, but his de facto adviser was Paul Erdős. He was on the faculty in the mathematics department at Texas A&M University for 11 years, and was appointed the Geier Professor of computer science at the University of Cincinnati in 1986. Purdy had Erdős number one and coauthored many papers with Paul Erdős, who regarded him as his own student. He is the "P" in G.W. Peck, a pseudonym for the group of mathematicians that also included Ronald Graham, Douglas West, Paul Erdős, Fan Chung, and Daniel Kleitman. Purdy polynomial In 1971, Purdy was asked by Larry Roberts, the director of the DARPA Information Processing Techniques Office, to develop a secure hash function to protect passwords on ARPANET. Purdy developed the so-called Purdy polynomial, which was a polynomial of degree 224 + 17 computed modulo the 64-bit prime p = 264 - 59. The terms of the polynomial could be computed using modular exponentiation. DARPA was satisfied with the hash function, and also allowed Purdy to publish it in Communications of the ACM. It was well received around the world, and DEC eventually used it in their OpenVMS operating system. A DEC report said they chose it because it was very secure and because the existing standard DES could not be exported, which meant that an alternative was needed. OpenVMS uses a 64-bit version, based on a 64-bit prime, the same size as the one in the paper. Purdy's conjecture While at Texas A&M, Purdy made an empirical observation about distances between points on two lines. Suppose that n points are to be chosen on line L and another n points on line M. If L and M are perpendicular or parallel, then the points can be chosen so that the number of distinct distances determined is bounded by a constant multiple of n, but otherwise the number is much larger. Erdős was very struck by this conjecture and told it to many others, and it was published in a book of unsolved problems by William Moser in 1981. It came to the attention of György Elekes, who eventually proved the conjecture as the first application of new tools from algebraic geometry that he was developing. After Elekes's untimely death, Micha Sharir collected Elekes's notes and published an organized presentation of these algebraic methods, including work of his own. This, in turn, enabled Katz and Guth to solve the Erdős distinct distances problem, a 1946 problem of Erdős. Work continues on improvements in Purdy's conjecture. Awards In 2015, Purdy was awarded the IEEE Joseph Desch Award for Innovation for his work on the Arpa Network and the Purdy Polynomial. Selected publications References 20th-century American mathematicians 21st-century American mathematicians Ame
https://en.wikipedia.org/wiki/MEX%20file
A MEX file is a type of computer file that provides an interface between MATLAB or Octave and functions written in C, C++ or Fortran. It stands for "MATLAB executable". When compiled, MEX files are dynamically loaded and allow external functions to be invoked from within MATLAB or Octave as if they were built-in functions. To support the development of MEX files, both MATLAB and Octave offer external interface functions that facilitate the transfer of data between MEX files and the workspace. In addition to MEX files, Octave has its own format using its own native API, with better performance. References External links MEX-files guide from MathWorks MEX-files in the GNU Octave manual Data analysis software Numerical programming languages Cross-platform software Filename extensions
https://en.wikipedia.org/wiki/Last%20Mission%20%28video%20game%29
Last Mission is a top-down multidirectional shooter developed by Data East and distributed in worldwide release for the arcades in 1986. The game is similar to Time Pilot as players have full movement control over their ship and can move it in all eight directions. Plot The players assume the role of an alien-humanoid space pilot who has been exiled from their home galaxy for committing an unlearned crime. The only way the player character can return is to restore their honor; the only way to do so is to invade and defeat the alien invaders who have been known to frequently attack the player character's people using a ship called the Main Fighter. Reception In Japan, Game Machine listed Last Mission on their December 1, 1986 issue as being the fourth most-successful table arcade unit of the month. References External links Last Mission at arcade-history 1986 video games Arcade video games Data East video games Commodore 64 games U.S. Gold games ZX Spectrum games Video games developed in Japan Video games scored by David Whittaker Multidirectional shooters Data East arcade games
https://en.wikipedia.org/wiki/Heurist
Heurist is an Open Source online database builder and CMS publisher designed for Humanities research data and collections, including data on people, organisations, places, events, artefacts, documents, media, bibliographic records, contemporary stories and other data which is rich in text and classification data, richly interlinked, and often heterogeneous. Heurist was originally designed by Ian Johnson (from 2005) and developed by the (now disbanded) Arts eResearch unit (AeR) at the University of Sydney. It continues to be actively developed within the Faculty of Arts and Social Sciences (version 6 released 2021). Free web services for building research databases are available at https://heuristplus.sydney.edu.au/ and https://heurist.Huma-Num.fr . New Heurist servers can be set up using installation packages downloadable from the project web site (http://HeuristNetwork.org). The source is available at https://github.com/HeuristNetwork/heurist). Heurist was developed to overcome three problems identified as common to researchers in the Humanities (and others): the technical expertise required to set up rich heterogeneous databases with relationships between entities, and to publish data selectively to the web the fragmentation of research data across many separate poorly-connected or incompatible databases problems of sustainability due to the ad hoc nature of custom database development requiring individual maintenance of each database It aims to tackle these issues by: providing a web service supporting the on-demand creation, management and population of new databases through a web interface, and the creation of CMS web sites embedded directly in the databases which have direct access to the database content. allowing the storage and interlinking of a wide variety of research data, notes, annotations and digital attachments in a single shared database, while providing individual ‘views’ on this data and workgroup-owned and private areas for research in progress. centralised update and maintenance of thousands of databases, and automatic update of database formats by newer software versions to ensure backward compatibility (from ~2010). Data can also be dumped in a reloadable archival format. Methodology Heurist is written in PHP and JavaScript, on top of a fixed MySQL/MariaDB data structure (all Heurist databases have the same underlying MySQL structure, as the schema of the domain is encoded directly in the database as editable data). Entities/record types, fields, vocabularies and terms are defined through data within the database rather than being hardcoded in the software or database structure. Heurist uses a key-value pair approach linked to a primary data table instantiating typed entities, allowing variant data structures and repeating value fields (0 or 1 ..1..m cardinality) with maintained order. Relationships between entities are implemented as record pointer fields (equivalent to a Foreign Key) and Relationship Marker f
https://en.wikipedia.org/wiki/DZDP-TV
DZDP-TV (channel 28) is a television station in Naga, Camarines Sur, Philippines, airing programming from the GTV network. It is owned and operated by GMA Network, Inc. alongside GMA outlet DWAI-TV (channel 7). Both stations share studios and transmitters at the GMA Broadcast Complex, Concepcion Pequeña, Naga City. Digital television Digital channels DZDP-TV's feed is broadcast on DWAI-TV digital subchannel operates on UHF channel 38 (617.143 MHz) and broadcasts on the following subchannels: See also GTV DWAI-TV Barangay FM 101.5 Naga List of GTV stations Television stations in Naga, Camarines Sur GTV (Philippine TV network) stations Television channels and stations established in 1992
https://en.wikipedia.org/wiki/ESDS%20Government
ESDS Government is a national data service which provides large-scale government surveys, such as the General Household Survey and the Labour Force Survey, as well as other key data resources for understanding population structure and change in the UK and its constituent countries. It is jointly funded by the Economic and Social Research Council (ESRC) and the Joint Information Systems Committee (JISC). In July 2012, the ESRC announced that all of ESDS will join the UK Data Service, to be established as of October 1, 2012. Service overview Some examples of the research supported by the surveys include: resources, health and living conditions of older people ethnic differences in family and household composition patterns of consumption, including drinking and smoking gender and ethnic differences in employment earnings lifestyle, consumption and health patterns social capital and its relationship to health, employment and earnings comparisons across different UK regions and across different time periods ESDS Government is led by the Cathie Marsh Centre for Census and Survey Research (CCSR) and provides user support, facilitates user meetings on specific surveys, organises training courses on topics of interest, on specific statistical software packages and on statistical analysis methods as well as provides topic-related online course materials and a range of teaching datasets. One of the central aims of the service is to promote and facilitate increased and more effective use of government datasets in research, learning and teaching across a range of disciplines. The acquisition, processing and delivery of the large-scale government datasets under this service is undertaken by the UK Data Archive. Data is available both via download and online exploration and visualisation via Nesstar. References External links ESDS Government Cathie Marsh Centre for Census and Survey Research (CCSR) UK Data Archive ESDS Government events diary Online databases Government research
https://en.wikipedia.org/wiki/ESDS%20Longitudinal
ESDS Longitudinal is a specialist service of the Economic and Social Data Service (ESDS), led by the UK Data Archive at the University of Essex and the ESRC United Kingdom Longitudinal Studies Centre (ULSC), jointly funded by the Joint Information Systems Committee (JISC) and the Economic and Social Research Council (ESRC). In July 2012, the ESRC announced that all of ESDS will join the UK Data Service, to be established as of October 1, 2012. Service overview The service currently provides an online download service, specialist user support which links up with specialist support provided by the Centre for Longitudinal Studies (CLS), training and workshops and a range of data enhanced longitudinal collections. Such as: 1970 British Cohort Study (BCS70) British Household Panel Survey (BHPS) English Longitudinal Study of Ageing (ELSA) Families and Children Study (FACS) Longitudinal Study of Young People in England (LSYPE) Millennium Cohort Study (MCS) National Child Development Study (NCDS) It also encourages linkage with other datasets not directly supported by ESDS, such as the ONS Longitudinal Study and, in conjunction with the ESRC, works to facilitate access to new longitudinal data collections. Recently, ESDS Longitudinal has undertaken a data audit of two major longitudinal investments by the Medical Research Council (UK): the Avon Longitudinal Study of Parents and Children (ALSPAC) and the National Study of Health and Development (also known as the 1946 Birth Cohort Study). Both studies are currently in preparation for improved access for secondary users. References External links ESDS Longitudinal ONS Longitudinal Study Avon Longitudinal Study of Parents and Children (ALSPAC) National Study of Health and Development Mimas Jisc Online databases Science and technology in Essex University of Essex
https://en.wikipedia.org/wiki/ImHalal
I'mHalal.com was a search engine built on top of social-cultural Islamic values. The search engines algorithm differed from regular search engines because the relevancy of the results was based on the culture, mindset and lifestyle of Muslims. The engine did not index content such as pornography, nudity, or anything else that might be "haram". The founders of I'mHalal.com, launched the search engine to attract more Middle Easterners to the World Wide Web by providing all households a relevant and safe search portal to gather information and explore the web. The company was expecting a large percentage of their userbase from the Middle East. The website received mostly positive comments from Muslims, The search engine was going to opensource a part of its source by publishing an API It was subsequently closed in 2011 due to financial difficulties. In late 2011, I'mHalal.com closed its search service due to lack of funds. References Defunct internet search engines
https://en.wikipedia.org/wiki/Wireless%20LAN%20controller
A wireless LAN controller (WLC) is a network device used to monitor and manage wireless access points in an organization. WLCs are connected to routers and allow devices from across the organization to connect to the router via access points. WLCs are generally used in combination with the Lightweight Access Point Protocol (LWAPP) to manage light-weight access points in bulk by the network administrator or network operations center. The wireless LAN controller is part of the Data Plane within the Cisco Wireless Model. The WLAN controller automatically handles the configuration of wireless access-points. It centralizes wireless network infrastructure and handles bandwidth allocation to the access points (APs). Before the use of WLCs were widespread, APs had to handle connections individually, leading to unstable data links and poor connections. The use of WLCs solves this problem. Benefits of WLCs WLCs provide an added layer of security to APs by providing authentication at a higher level, detecting rogue devices, and protecting the network behind a firewall. WLCs allow for centralized AP deployment. They simplify network maintenance operations. References External links "Why is a Controller required in a wireless network", ExcITingIP.com, March 2010 "Facts About The Advantages Of Wireless 5 GHz:" , Bestofwhatsapp.in, September 2019 Wireless networking
https://en.wikipedia.org/wiki/Network%20management%20software
Network management software is software that is used to provision, discover, monitor and maintain computer networks. Purpose With the expansion of the World Wide Web and the Internet, computer networks have become very large and complex, making them impossible to manage manually. In response, a suite of network management software was developed to help reduce the burden of managing the growing complexity of computer networks. Network management software usually collects information about network devices (which are called Nodes) using protocols like SNMP, ICMP, CDP etc. This information is then presented to network administrators in an easy to understand and accessible manner to help them quickly identify and remediate problems. Problems may present itself in the form of network faults, performance bottlenecks, compliance issues etc. Some advanced network management software may rectify network problems automatically. Network management software may also help with tasks involved in provisioning new networks, such as installing and configuring new network nodes etc. They may also help with maintenance of existing networks like upgrading software on existing network devices, creating new virtual networks etc. Functions Network provisioning: This function enables network managers to provision new network devices in an environment. Automating this step reduces cost and eliminates chances of human error. Mapping or Discovery: This function enables the software to discover the features of a target network. Some features that are usually discovered are: the nodes in a network, the connectivity between these nodes, the vendor types and capabilities for these nodes, the performance characteristics etc. Monitoring: This function enables the network management software to monitor the network for problems and to suggest improvements. The software may poll the devices periodically or register itself to receive alerts from network devices. One mechanism for network devices to volunteer information about itself is by sending an SNMP Trap. Monitoring can reveal faults in the network such as failed or misconfigured nodes, performance bottlenecks, malicious actors, intrusions etc. Configuration management: This function enables the software to ensure that the network configuration is as desired and there is no configuration drift. Regulatory compliance: This function enables the network management software to ensure that the network meets the regulatory standards and complies with applicable laws. Change control: This function enables the software to ensure that the network changes are enacted in a controlled and coordinated manner. Change control can enable audit trails which has applications during a forensic investigation after a network intrusion. Software Asset Management: This function enabled the software to inventory software installed on nodes along with details like version and install date. Additionally, it can also provide software deployment
https://en.wikipedia.org/wiki/Historic%20Barns%20of%20Connecticut
Historic Barns of Connecticut is a Connecticut Trust for Historic Preservation project dedicated to the documentation and preservation of barns. The program includes a grant program and a database. The project began listing barns in 2004. By June 2011 8,200 barns had been documented in Connecticut, said project director Todd Levine. "The first step in preservation is documentation, so we need to know what we are losing to know what we need to do to protect them". More than 2,000 selected barns have been researched and documented as part of an ongoing Historic Resource Inventory, searchable on the project's website. In 2011 and 2012, 200 significant barns (not already identified in existing historic districts) will be chosen for in-depth research and nomination to the State Register of Historic Places. References External links Project website Non-profit organizations based in Connecticut
https://en.wikipedia.org/wiki/Sargur%20Srihari
Sargur Narasimhamurthy Srihari (May 7, 1949 – March 8, 2022) was an Indian and American computer scientist and educator who made contributions to the field of pattern recognition. The principal impact of his work has been in handwritten address reading systems and in computer forensics. He was a SUNY Distinguished Professor in the School of Engineering and Applied Sciences at the University at Buffalo, Buffalo, New York, USA. Early life and education Srihari received undergraduate degrees in Science and in Electrical Communication Engineering from the National College of Bangalore University and the Indian Institute of Science in Bangalore respectively. He received Master's and Doctoral degrees in Computer and Information Science from Ohio State University, Columbus. Career CEDAR Srihari is the founding director of Center of Excellence for Document Analysis and Recognition (CEDAR) which was established with support from the United States Postal Service. Work at CEDAR led to the first handwritten address interpretation system in the world, versions of which were deployed by the Internal Revenue Service, USPS, Australia Post and UK Royal Mail. His subsequent work led to the first handwriting verification and identification system known as CEDAR-FOX, which was granted a U.S. Patent in 2009. Srihari had a leading role in establishing the international conferences on document analysis and recognition, frontiers of handwriting recognition and computational forensics. He also served on the Board of Scientific Counselors of the National Library of Medicine for six years. Computational forensics In 2002, Srihari published a landmark study establishing the individuality of handwriting. This work was cited in Daubert standard and Frye standard hearings in United States courts leading to the admission of handwriting evidence in those cases. This research work was later extended to shoe-print and fingerprint recognition as well. Srihari served on the National Academy of Sciences Committee on Identifying the needs of the Forensic Science Community which led to a highly influential report entitled "Strengthening Forensic Science in the United States: A Path Forward" published in April 2009. Personal life Srihari died from complications of glioblastoma on 8 March 2022, at the age of 72. Awards Srihari became an IEEE Fellow in 1995 and an IAPR Fellow in 1996. He was the recipient of the Outstanding Achievements Award of IAPR/ICDAR for 2011. References External links Center of Excellence for Document Analysis and Recognition The Rise of Computational Forensics Identifying the Needs of the Forensic Science Community Evaluating the rarity of fingerprint,The New York Times, 10 December 2010 Year of birth missing 1940s births 2022 deaths Ohio State University College of Engineering alumni Indian Institute of Science alumni University at Buffalo faculty Indian computer scientists Bangalore University alumni Scientists from Bangalore
https://en.wikipedia.org/wiki/TATP%20Benchmark
In transaction processing, the Telecommunication Application Transaction Processing Benchmark (TATP) is a benchmark designed to measure the performance of in-memory database transaction systems. Benchmark As database and microprocessor architectures change, so must the benchmarks that are employed to measure the combined performance of these critical components. While other industry standard throughput workloads already exist, none was designed specifically to exercise the relationship between in-memory database software and the memory processing subsystem in which it transacts. The TATP is a new open source workload designed specifically for high-throughout applications, well suited for in-memory database performance analysis and system comparison. The TATP benchmark simulates a typical home location register (HLR) database used by a mobile carrier. The HLR is an application mobile network operators use to store all relevant information about valid subscribers, including the mobile phone number, the services to which they have subscribed, access privileges, and the current location of the subscriber's handset. Every call to and from a mobile phone involves lookups against the HLRs of both parties, making it is a perfect example of a demanding, high-throughput environment where the workloads are pertinent to all applications requiring extreme speed: telecommunications, financial services, gaming, event processing and alerting, reservation systems, software as a service (SaaS), and so on. The benchmark generates a flooding load on a database server. This means that the load is generated up to the maximum throughput point that the server can sustain. The load is generated by issuing pre-defined transactions run against a specified target database. The target database schema is made to resemble a typical HLR database in a mobile phone network. The algorithm of what is known as the TATP Benchmark was originally published in a Master's Thesis. The benchmark was modeled after a real test program that was used by a telecom equipment manufacturer to evaluate the applicability of various relational database systems to service control programming in mobile networks. Another derivative of the original test is the Network Database Benchmark. TATP executes seven pre-defined transactions that insert, update, delete and query the data in the database. The TATP results show the Mean Qualified Throughput (MQTh) of the target database system, and the response time distributions per transaction type for all seven types of transactions. The TATP benchmark has been used in industry and research. References External links SourceForge.net: Telecommunication Application Transaction Processing (TATP) Benchmark Antoni Wolski and Vilho Raatikka: "Performance Measurement and Tuning of Hot-Standby Databases", Third International Service Availability Symposium (ISAS 2006), May 15–16, 2006, Helsinki, Finland. Github.com: Implementation of TATP for Volt Transaction pr
https://en.wikipedia.org/wiki/SCHEMA%20%28bioinformatics%29
SCHEMA is a computational algorithm used in protein engineering to identify fragments of proteins (called schemas) that can be recombined without disturbing the integrity of the proteins' three-dimensional structure. The algorithm calculates the interactions between a protein's different amino acid residues to determine which interactions may be disrupted by swapping structural domains of the protein. By minimizing these disruptions, SCHEMA can be used to engineer chimeric proteins that stably fold and may have altered function relative to their parent proteins. SCHEMA algorithm has been applied in the recombinant libraries of distantly related β-lactamases. References Bioinformatics algorithms
https://en.wikipedia.org/wiki/Synthetic%20programming%20%28HP-41%29
Synthetic programming (SP) is an advanced technique for programming the HP-41C and Elektronika B3-34 calculators, involving creating instructions (or combinations of instructions and operands) that cannot be obtained using the standard capabilities of the calculator. Some HP-41C instructions are coded in memory using multiple bytes. Some of these sequence of bytes correspond to instructions the calculator is able to execute, but these cannot be entered in the program memory using conventional program entry methods (i.e. using the calculator as described in the user's manual). Synthetic programming uses a bug in the calculator firmware to enter those byte sequences as a sequence of other instructions, then partially skipping halfway through the first instruction, so that the calculator believes the end of the first instruction is actually the beginning of a new one. This was called byte jumper or byte grabber. It is not clear if the creators behind the HP-41 were aware of all these "black holes". HP did not officially support these techniques, but probably was intrigued by the strange operations and in some cases allowed enthusiasts to practice in their offices and helped to improve it among a whole sense of curiosity. HP-15C Synthetic programming is also possible on the (original) HP-15C. See also Casio FX-602P series Illegal opcode Logic synthesis NOMAS (support) Overlapping instructions Self-modifying code Side effect (computer science) Variable-length instruction set Yeggogology (Cyrillic: "Еггогология") References Further reading http://www.jeffcalc.hp41.eu/divers/files/ppcjt-v1n3.pdf Synthetic programming
https://en.wikipedia.org/wiki/Cheng%20Enze
Cheng Enze (Chinese:程恩泽/程恩澤, 1785–1837) was a Chinese scholar and poet of late Qing Dynasty. Cheng studied with Ling Tingkan, and obtained Jinshi in 1811, later became a compiler of Hanlin Academy () and at last was promoted as Hubu Shilang (). He presented an idea that "anyone who want to make acquainted with Yili (义理, lit.Argumentation) must start with exegesis", and implemented it into his poetry writing. He was interested in Li Shangyin's poems at first, but later preferred the style of Han Yu and Huang Tingjian. Zheng zhen, He Shaoji and Mo youzhi were his students. References Qing dynasty poets 1785 births 1837 deaths Qing dynasty government officials Politicians from Huangshan Poets from Anhui
https://en.wikipedia.org/wiki/DWDG-TV
DWDG-TV (channel 22) is a television station in Tuba, Benguet, Philippines, airing programming from the GTV network. It is owned and operated by GMA Network, Inc. alongside GMA outlet DZEA-TV (channel 10). Both stations share transmitter facilities atop Mount Santo Tomas. Although identifying as a separate station in its own right, DWDG-TV is considered a straight simulcast of GTV's flagship station, DWDB-TV (channel 27) in Metro Manila. History As Citynet Television and EMC / Channel [V] Philippines In 1995, GMA Network, the Philippines' Largest Network, launched its UHF TV station in Benguet under the branding Citynet Television 24 (or just Citynet 24). As started its operations, the station was programmed like an independent stationGMA intended Citynet 27 to be its main outlet for imported programming (particularly from the United States), freeing up slots in GMA Network's schedule for more domestic productions. By 1999, the costs of operating the station in this format were becoming too high for GMA. The station was turned into a music channel under the interim branding EMC, the Entertainment Music Channelwhich was also the country's first locally operated music channel. A few months later by December 19, 1999, GMA reached a deal with Asian broadcaster STAR TV to allow this channel to be a carrier of Channel V Philippines and it had already aired selected Channel V programming from its international version. This arrangement did not last longa stake in GMA was recently purchased by the Philippine Long Distance Telephone Company, who already owned MTV Philippines through the Nation Broadcasting Corporation and its parent company MediaQuest Holdings. This conflict of interest, along with the increasing competition from the MTV affiliated network, led to the channel signing-off on July 25, 2001. As QTV/Q, GMA News TV and moved to Channel 22 After four years of silence in Benguet, on November 11, 2005, the station returned its operations. DWDG-TV, together with other GMA's sister UHF stations nationwide, were launched as an all-female lifestyle channel QTV (standing for Quality Television; later renamed as simply Q in March 2007). With the return of its TV operations, its flagship station in Metro Manila was DZOE-TVwhich GMA lease as part of a partnership with the religious broadcaster ZOE Broadcasting Network (gaining control of the station in exchange for providing equipment for ZOE, and allowing airtime for ZOE-produced programming on QTV), with the GMA-owned flagship station in Manila serving as a UHF translator (GMA had previously operated as the independent station Citynet 27, before it went silent in the middle of 2001). The new network would feature a lineup predominantly aimed towards women, with a mixture of domestic and imported lifestyle programs and dramatic series. On February 7, 2011, GMA Network announced that it would replace Q with the news channel GMA News TV. As Q's programming ended on February 20; the network, broadcasti
https://en.wikipedia.org/wiki/Osaka%20Electro-Communication%20University%20Junior%20College
was a junior college in Neyagawa Osaka Prefecture, Japan, and was part of the Osaka Electro-Communication University network. The Junior College was founded in 1958. The predecessor of the school, Tōa Denki Tsushin kōgakkō, was founded in 1941. The course of this Junior College was Electronics(Daytime and Evening. The school was disestablished in 2008. Education in Osaka Universities and colleges established in 1958 Japanese junior colleges Private universities and colleges in Japan Universities and colleges in Osaka Prefecture 1958 establishments in Japan
https://en.wikipedia.org/wiki/History%20of%20Nickelodeon
Nickelodeon is an American basic cable and satellite television network that is part of the Nickelodeon Group, a unit of the Paramount Media Networks division of Paramount Global, which focuses on programs for children and teenagers. 1977–1979: Pre-launch as C-3 Nickelodeon's concept was created by Dr. Vivian Horner, an educator and the director of research on the PBS series The Electric Company. She created the first Nickelodeon series, Pinwheel. The Pinwheel show premiered on December 1, 1977, as part of QUBE, an early local cable television system that was launched in Columbus, Ohio by Warner Cable Corp. One of the ten "community" channels that were offered to QUBE subscribers was C-3, which exclusively broadcast Pinwheel each day from 7:00 a.m. to 9:00 p.m. Eastern Time. It was originally a Preschool channel until 1979. Pinwheel became successful enough for Horner to expand her idea into a full channel on national television over a year later. Nickelodeon was originally seen as a loss leader for then-parent company Warner Cable. As the company saw it, having a commercial-free children's channel would prove useful in franchising its cable systems across the country, with that advantage putting them over rival companies such as HBO. 1979–1984: National launch as Nickelodeon Initially scheduled for a February 1979 launch, Nickelodeon was officially launched on April 1, 1979 (as the first-ever children's network) on Warner Cable franchises across the country. Initial programming on Nickelodeon included Pinwheel, Video Comic Book, America Goes Bananaz, Nickel Flicks, and By The Way, all of which originated at the QUBE studios in Columbus. For its first few years, Pinwheel was the network's flagship series, and it was played for three to five hours a day in a block format. Vivian Horner asked her co-workers to help come up with a list of possible names for the network. Sandy Kavanaugh (the producer of Pinwheel) proposed "Nickelodeon," even though she was not fully satisfied with it. In 2013, she recalled, "I wasn't thrilled with 'Nickelodeon.' It was whimsical sounding, though. It had a fun lilt." The channel's pre-launch logo and advertising campaign name were created by New York-based creative director/designer Joseph Iozzi. The logo incorporated a man looking into a nickelodeon machine that was placed in the "N" in the wordmark. The first model ever used in a Nickelodeon advertisement was the designer's son, Joseph Iozzi II, while the logo's font was designed by Lubalin, Smith, Carnase, Inc. The intent of Iozzi was to replace the graphic of the line illustration of the man peering into the Nickelodeon with a period illustration of a boy in nickers, British flat cap, big suspenders, tip toed on a stylish iron train step looking into the Nickelodeon font. Available time and new management never permitted the planned re-design. Nickelodeon quickly expanded its audience reach, first to other Warner Cable systems across the country, and eventu
https://en.wikipedia.org/wiki/Report%20generator
A report generator is a computer program whose purpose is to take data from a source such as a database, XML stream or a spreadsheet, and use it to produce a document in a format which satisfies a particular human readership. Report generation functionality is almost always present in database systems, where the source of the data is the database itself. It can also be argued that report generation is part of the purpose of a spreadsheet. Standalone report generators may work with multiple data sources and export reports to different document formats. Information systems theory specifies that information delivered to a target human reader must be timely, accurate and relevant. Report generation software targets the final requirement by making sure that the information delivered is presented in the way most readily understood by the target reader. History An early report writer was part of Nomad software developed in the 1970s. It was most widely used in the 1970s and 1980s. See also List of reporting software Programming tools Reporting software
https://en.wikipedia.org/wiki/Versant%20Corporation
Versant Corporation was an American-based software company building specialized NoSQL data management systems. Versant was founded in Menlo Park, California (USA) in 1988. It was headquartered in Redwood City, California. It was noted in 2005 that the market share for object oriented databases held by Versant was "very small" compared to IBM and Oracle. However, two years earlier, Versant ODBMS and IBM UniData were mentioned side-by-side as "two of the most recent examples of object-oriented database software" in a bestselling database design text. History The company was founded by Dr. Kee Ong in August 1988 as "Object Sciences Corporation". Ong previously worked with the open-source relational database management system Ingres. Around this time object-oriented programming (OO) became popular, and the company used research done at the University of Wisconsin for a commercial database system to complement OO languages. The company's initial executive team included Michael Seashols (CEO), Dr. Kee Ong (CTO), John Hughes (VP, Sales), Dr. Mary Loomis (VP, Services) and Susan Dickerson (VP, Business Development). In early 1990 the company was renamed “Versant Object Technology.” In April 1993 David Banks took over as CEO. On July 18, 1996 Versant had their initial public offering (IPO) on the NASDAQ stock exchange and traded under the symbol VSNT. The company raised $14.9 million from the IPO, and was based in Menlo Park, California at the time, but moved to Fremont, California in 1997. In January 1998 Nick Ordon succeeded Banks as CEO. on July 15, 1998 the company was renamed again to Versant Corporation. In the 1990s, Versant went through a period where most of their R&D costs were spent on "maintaining and upgrading existing product releases" across a LARGE number of operating systems and hardware. According to a former VP of engineering, outsourcing this maintenance grind of R&D maintenance to India was the main action that allowed the company to survive the decade. In March 2004, Versant acquired Poet Software GmbH, a European-focused company targeting the Windows product market which had traded on the Frankfurt Stock Exchange. In 2005, Jochen Witte, president of Poet Software, took over as CEO of Versant Corporation. In August 2005, the common stock had a 1-for-10 reverse stock split. On December 1, 2008 Versant acquired the assets of the database software business of Servo Software, Inc. (formerly named db4objects, Inc.). It developed the open source embedded database technology db4o. The original implementation of Versant was targeted at C, C++ and Smalltalk users. In 1995 Versant introduced support for the Java programming language and then in 2009 for C# and the .NET platform. In 2012 Versant introduced Versant JPA, a Java Persistence API 2.0 compliant interface for its object database, with a technical preview of an analytics product including Apache Hadoop support. In late 2012, after rejecting an offer by UNICOM Systems Inc.
https://en.wikipedia.org/wiki/CW%2044
CW 44 may refer the following U.S. television stations affiliated with The CW network: Current WGMB-DT2, a digital subchannel of WGMB-TV in Baton Rouge, Louisiana (O&O) Former KBCW (now KPYX) in San Francisco, California (2006 to 2023) WTOG in Tampa/St. Petersburg, Florida (2006 to 2023)
https://en.wikipedia.org/wiki/Bret%20Taylor
Bret Taylor (born July 10, 1980) is an American computer programmer and entrepreneur. He is most notable for co-creating Google Maps and his tenures as the CTO of Facebook (now Meta Platforms), as the chairman of Twitter, Inc.'s board of directors prior to its acquisition by Elon Musk, and as the co-CEO of Salesforce (alongside co-founder Marc Benioff). Taylor was additionally one of the founders of FriendFeed and the creator of Quip. Education Taylor attended Stanford University, where he earned his bachelor's degree and master's degree in computer science in 2002 and 2003, respectively. Career In 2003, Taylor was hired by Google as an associate product manager. In 2005, he co-created Google Maps. Taylor left Google in June 2007 to join venture capital firm Benchmark Capital as an entrepreneur-in-residence, where he and several other former Google employees founded the social network web site FriendFeed. Taylor was CEO of FriendFeed until August 2009, when the company was acquired by Facebook for an estimated $50 million. The acquisition led to Facebook adopting the "Like" button from FriendFeed. After the acquisition, Taylor joined Facebook and became CTO in 2010. In 2012, Taylor left Facebook to found Quip, a competitor to Google Docs. Quip was acquired by Salesforce in 2016. That year, Twitter, Inc. announced that Taylor was appointed to their board of directors. In 2021, he became chairman of Twitter. He remained in the position until the entire board of directors were dissolved following the acquisition of Twitter by Elon Musk in October 2022. In 2017, Taylor was named chief product officer at Salesforce. In 2019, Taylor was named president and chief operating officer at Salesforce. As COO, Taylor led Salesforce's acquisition of Slack, which closed in 2021. Taylor also led the creation of a system dubbed Customer 360 at Salesforce and started an associate product manager program at the company. In November 2021, Taylor was named vice chair and co-CEO at Salesforce. On November 30, 2022, it was announced that Taylor would be stepping down as co-CEO and vice chair at Salesforce at the end of January 2023. References External links American computer businesspeople Living people Facebook employees Stanford University alumni Google employees American computer programmers American technology company founders American technology chief executives 21st-century American businesspeople Salesforce people 1980 births
https://en.wikipedia.org/wiki/Death%20Track%3A%20Resurrection
Death Track: Resurrection () is a computer racing game developed by Russian studio SkyFallen Entertainment and published by 1C Company. It is the sequel to the 1989 game Deathtrack. Outside of the CIS, the game was published by 505 Games in the European Union and Aspyr Media in North America, which was released DRM free. In the Russian release, the game had an advertisement for MegaFon, including a brand sticker on the first car. Gameplay Death Track: Resurrection is set in the future after World War III. The game involves racing and trying to finish first across several tracks located around the world, including Bangkok, Vatican City, London, Moscow, New York, Paris, Prague, San Diego, Istanbul and Tokyo. Players try to earn points by doing various stunts, which can be used for upgrades to cars and weapons. Cars can be equipped with an assortment of weapons, which can be fired at opponents to slow them down and knock them out. In this scenario, the main character is Antonio Salevani whose objective is to defeat Thorvald Nesson in New York, to get revenge on him because he killed the previous eight pilots, to destroy his Bosscar, and to revive his career. Besides Thorvald the other opponents you race against are Shiroi Tokugawa, Kim Ho, Vassily, Rebecca, Chamorro, Martha, Jeremy and Rachel For the PlayStation 3 version, a DLC was released, which included one new car - Hari 108. Reception Death Track: Resurrection has received average review results. The average game ranking based on eight reviews is 53.87% according to GameRankings. GameSpot rated the game 5.5/10, and IGN rated the game 6.7/10. References External links Death Track: Resurrection Trailer on YouTube 2008 video games 1C Company games Video games developed in Russia Windows games Racing video games PlayStation 3 games PlayStation Network games Vehicular combat games Aspyr games Single-player video games 505 Games games
https://en.wikipedia.org/wiki/Leaf%20subroutine
A leaf subroutine is a subroutine which cannot in turn call another subroutine. Some compilers can apply special program optimizations to leaf subroutines, such as the use of link registers to avoid having to push the return address on the stack. The term "leaf" refers to their position as leaf nodes in the call graph of the program. Subroutines
https://en.wikipedia.org/wiki/Baiko%20Gakuin%20University%20Women%27s%20Junior%20College
was a junior college in Shimonoseki Yamaguchi Prefecture, Japan, and was part of the Baiko Gakuin network. The Junior College was founded in 1964 as Baiko Jo Gakuin University Junior College. In 1975 Its name was changed to Baiko Jo Gakuin University Junior College. In 2001 Its name was changed to Baiko Gakuin University Women's Junior College. In 2006 The Junior College was closed. Universities and colleges in Yamaguchi Prefecture Universities and colleges established in 1964 Japanese junior colleges Shimonoseki Private universities and colleges in Japan 1964 establishments in Japan
https://en.wikipedia.org/wiki/Neuroph
Neuroph is an object-oriented artificial neural network framework written in Java. It can be used to create and train neural networks in Java programs. Neuroph provides Java class library as well as GUI tool easyNeurons for creating and training neural networks. It is an open-source project hosted at SourceForge under the Apache License. Versions before 2.4 were licensed under LGPL 3, from this version the license is Apache 2.0 License. Features Neuroph's core classes correspond to basic neural network concepts like artificial neuron, neuron layer, neuron connections, weight, transfer function, input function, learning rule etc. Neuroph supports common neural network architectures such as Multilayer perceptron with Backpropagation, Kohonen and Hopfield networks. All these classes can be extended and customized to create custom neural networks and learning rules. Neuroph has built-in support for image recognition. See also Comparison of deep learning software Neural network SOM or Kohonen Retropropagation References External links Neuroph Homepage Neural network software Free software programmed in Java (programming language)
https://en.wikipedia.org/wiki/Sugiyama%20Jogakuen%20University%20Junior%20College
was a junior college in Chikusa-ku Nagoya Aichi Prefecture, Japan, and was part of the Sugiyama Jogakuen network. The Junior College was founded in 1969 as an attached to Sugiyama Jogakuen University. There were two courses in this Junior College, the students ware major in Japanese literature or English literature. Some students included in Sugiyama Jogakuen University, Aichi University, Ritsumeikan University and others after graduation. In 2001 the Junior College was closed. Universities and colleges in Nagoya Educational institutions established in 1969 Japanese junior colleges Private universities and colleges in Japan 1969 establishments in Japan Educational institutions disestablished in 2001 2001 disestablishments in Japan
https://en.wikipedia.org/wiki/Colour%20of%20War%3A%20The%20Anzacs
Colour of War: The Anzacs is a three part Australian TV series narrated by Russell Crowe, first shown in 2004 on Nine Network. It details, in rare colour footage, the story of the ANZACs during both World War II, the Korean War, and the Vietnam War. Production The series was produced by Film Australia in association with TWI Australia Pty Ltd, the Australian arm of the international production company for the Nine Network, along with Television New Zealand’s Internal Production Unit. The series was narrated by Russell Crowe, whose grandfather was a war cinematographer. Further, the research found rare colour footage of troops in Crete, Italy and North Africa in the 1940s, in the snows of Korea in the 1950s and the jungles of Vietnam in the 1960s. Much of the material was shot unofficially by civilians and servicemen, providing a direct account of life at that time. Episodes Episode 1: "Children of the Empire" – When Great Britain declares war with Germany in 1939, the Anzac nations follow. Episode 2: "Fighting Back" – While the fight continues for victory in Europe and the Pacific, the Anzac homefronts are preoccupied with their own problems. Episode 3: "The War That Never Ends" – The Cold War brings the nuclear race to our nation's backyard and our troops take up the fight against communism in Korea and then Vietnam. Reception According to National Film and Sound Archive:This is the story of Australia and New Zealand at war as never seen before. For the first time, only original colour footage is used to paint a vividly detailed picture of these closely allied nations, from the build up to World War II to the end of the Vietnam War. Newly discovered films and home movies along with diary and letter extracts allow viewers a very personal connection with the war experience, both on the battlefield and on the homefront. In colour, that shared history becomes even more intimate and involving.Another review by Lisa Pryor of The Sydney Morning Herald comments that:This is not just another war documentary, the kind that are endlessly spooled on pay television. It is striking and remarkable, using colour footage from as early as the 1930s that shows Australians at war at home and overseas. Pieced together into a semi-chronological narrative are home movies of sons preparing to leave for war, shipwrecked POWs being rescued by a submarine and pictures of Singapore, complete with hand-drawn rickshaws, before it fell to the Japanese. It takes a little while to adjust to the colour footage, which seems so much associated with the era after World War II. But that is the strength of this series, that the soldiers, prisoners and refugees look so much like people who could be alive today. Actor Russell Crowe is the narrator, an appropriate choice given that his grandfather, Stan Wemyss, was a cinematographer in the Solomon Islands during World War II. At the APRA Music Awards of 2005, composer Neil Sutherland won Best Television Theme for his work on Colo
https://en.wikipedia.org/wiki/IBM%202821%20Control%20Unit
The IBM 2821 Control Unit attaches card readers and card punches, and line printers to the IBM System/360 and IBM System/370 families of computers. The devices attached may be a combination of: The IBM 2540 card reader and card punch; The IBM 1403 models 2, 3, 7 and N1 line printer; and The IBM 1404 model 2 line printer and bill feed printer. The 2821 was originally advertised—in 1964, before System/360 shipped—as a controller for the IBM 1402 card reader/punch and the IBM 1403 and IBM 2201 printers. Six models of the IBM 2821 Control Unit were available, as follows: Model 1 attaches one IBM 2540 and one IBM 1403; Model 2 attaches one IBM 1403; Model 3 attaches two or three IBM 1403s; Model 4 attaches one IBM 2540 and one IBM 1404, but only on IBM System/360 models 25, 30, 40 and 50; Model 5 attaches one IBM 2540 and two or three IBM 1403s; and Model 6 attaches one IBM 2540. The 2821 is fully buffered, that is it has buffers large enough to hold an entire card to punch, an entire card read, or an entire print line for each attached device. This frees the channel from having to meet the peripheral devices' tight timing requirements. The control unit can be connected to either a byte multiplexer channel or a selector channel. It is made up of logically independent control units, but takes up only one of the eight control unit slots which can be connected to a channel. A two-channel switch is available, allowing the control unit to be connected to two channels, on one or two computer systems, controlled by manual switches or by programming. The circuitry in the 2821 is largely older-technology IBM SMS, unlike much of the System/360 line, but later revisions were partially implemented in SLT or MST. As logic became cheaper, the functions of the 2821 were increasingly moved inboard to the central processor or outboard to the individual device. The 2821 was withdrawn from marketing in the United States in 1985. References External links 2821