source
stringlengths
32
199
text
stringlengths
26
3k
https://en.wikipedia.org/wiki/Behzad%20Khodadad
Behzad Khodadad Kanjobeh (, born April 25, 1981, in Tehran, Iran) is an Iranian Taekwondo athlete. He is the 2001 world champion. References https://www.taekwondodata.com/behzad-khodadad-kanjobeh.a2nj.html External links khodadad's Instagram- page Iranian male taekwondo practitioners 1981 births Living people Asian Games silver medalists for Iran Asian Games bronze medalists for Iran Asian Games medalists in taekwondo Taekwondo practitioners at the 2002 Asian Games Taekwondo practitioners at the 2006 Asian Games Medalists at the 2002 Asian Games Medalists at the 2006 Asian Games Universiade medalists in taekwondo Universiade silver medalists for Iran Universiade bronze medalists for Iran World Taekwondo Championships medalists Asian Taekwondo Championships medalists Medalists at the 2003 Summer Universiade Medalists at the 2005 Summer Universiade 20th-century Iranian people 21st-century Iranian people Sportspeople from Tehran
https://en.wikipedia.org/wiki/Uriel%20Feige
Uriel Feige () is an Israeli computer scientist who was a doctoral student of Adi Shamir. Life Uriel Feige currently holds the post of Professor at the Department of Computer Science and Applied Mathematics, the Weizmann Institute of Science, Rehovot in Israel. Work He is notable for co-inventing the Feige–Fiat–Shamir identification scheme along with Amos Fiat and Adi Shamir. Honors and awards He won the Gödel Prize in 2001 "for the PCP theorem and its applications to hardness of approximation". References Living people Gödel Prize laureates Theoretical computer scientists Modern cryptographers Public-key cryptographers 20th-century Israeli mathematicians 21st-century Israeli mathematicians Israeli computer scientists Israeli cryptographers Academic staff of Weizmann Institute of Science Technion – Israel Institute of Technology alumni Year of birth missing (living people)
https://en.wikipedia.org/wiki/NHydrate
nHydrate is an object-relational mapping (ORM) solution for the Microsoft .NET platform providing a framework for a relational database to be mapped to .NET objects. It is designed to alleviate the drudgery software developers experience writing persistence domains. nHydrate is free as an open source project on GitHub.com under the MIT License. nHydrate was originally created in 2003 as a private project to solve the issues with the .NET Framework 1.1. Using ADO.Net Datasets is cumbersome and error prone, so a small generated framework was created to relieve developers of the CRUD work. As a private project it was later inspired by the work of the NHibernate group. nHydrate was a private project from 2003 until 2009. It was used at various companies in the Atlanta, Georgia, area but never widely released. It was publicly released on September 10, 2009. nHydrate is built on the .NET Framework 4.0. From version 5.0 and above, the entire framework has been reworked to use only Entity Framework as it internal data access layer. The modeler is now visual with a main diagram like other modeling products. All code interactions are simply Entity Framework now so there is no learning curve for developers when using the generated output. Feature summary nHydrate's primary feature is mapping .NET objects to an SQL server database. The CRUD layer (create, update, delete) is also implemented. There are numerous retrieval mechanism facilities. nHydrate generates the SQL for all CRUD operations as well as advanced LINQ capabilities. The product is not database portable. The framework is designed to work exclusively with Microsoft SQL Server. There is an internal project to use MySql but this is not yet a public release. The tool is entirely sited within Visual Studio.NET and all model maintenance and generation is handled directly from the environment. There are no XML files or other complex configuration scenarios to navigate like almost all other ORM tools. The VS.NET plugin GUI editor provides an interface to interact with a visual model and edit a model. History nHydrate was started by Michael Knight, and later added Chris Davis. By 2006, the platform had much of its current functionality, minus LINQ, and was being used in applications in the Atlanta area. By 2009, the advanced functionality had been added like inheritance, LINQ, and VS.NET integration. External links Archived NHydrate Home Page NHydrate Project Home on GitHub.com NHydrate Overview Microsoft software
https://en.wikipedia.org/wiki/QuRiNet
The Quail Ridge Wireless Mesh Network project is an effort to provide a wireless communications infrastructure to the Quail Ridge Reserve, a wildlife reserve in California in the United States. The network is intended to benefit on-site ecological research and provide a wireless mesh network tested for development and analysis. The project is a collaboration between the University of California Natural Reserve System and the Networks Lab at the Department of Computer Science, UC Davis. Project The large-scale wireless mesh network would consist of various sensor networks gathering temperature, visual, and acoustic data at certain locations. This information would then be stored at the field station or relayed further over Ethernet. The backbone nodes would also serve as access points enabling wireless access at their locations. The Quail Ridge Reserve would also be used for further research into wireless mesh networks. External links qurinet.cs.ucdavis.edu spirit.cs.ucdavis.edu nrs.ucdavis.edu/quail.html nrs.ucop.edu Computer networking
https://en.wikipedia.org/wiki/Martin%20Henson%20%28computer%20scientist%29
Professor Martin C. Henson FBCS FRSA (born 14 October 1954) is an English computer scientist based at the University of Essex. He is dean for international affairs and is affiliated to the School of Computer Science & Electronic Engineering. Henson was head of the department of computer science from 2000 to 2006. Education Martin Henson was educated at The Bulmershe School in Woodley, Berkshire, at the University of Southampton (BSc, 1976), at the University of Reading (PGCE, 1977), and the University of Essex (MSc, 1981). Academic research Henson's academic work is in the area of formal methods to aid software engineering. His early work was in programming language semantics, especially using algebraic approaches for structuring compiler and interpreter generation from semantic descriptions. He moved on to work in functional languages, focusing on program verification and transformation, pioneering an approach to program transformation, adapted from work in semantic equivalences, using higher-order generalisations and relational constraints. Since the late 1990s, he has undertaken research into the design and use of logic in specification and program development. With Steve Reeves, he has studied the formal semantics of the Z notation in detail. This work was used in the international ISO standard for the Z notation.<ref> Information Technology — Z Formal Specification Notation — Syntax, Type System and Semantics], ISO/IEC 13568:2002, [http://www.iso.ch/ ISO, 2002.</ref> Most recently he has proposed a new approach to specification, based on specification theories, developing the specification logic nuZ – a Z-like specification language with a monotonic schema calculus. This was first presented in a talk in the BCS-FACS seminar series at the British Computer Society in London in 2005.BCS-FACS Evening Seminar Series, Past events 2005: nuZ – a wide-spectrum logic for specification and program development Henson has been a Fellow of the British Computer Society since 2009 and holds a Visiting Professorship at the University of Waikato in New Zealand. International development Henson ran a blog on his activities as Dean at Essex University. He has worked internationally on academic accreditation, institutional licensure and strategic planning, with a focus on the Middle East and particularly for the Commission for Academic Accreditation in the United Arab Emirates. He is an external reviewer for the Oman Academic Accreditation Authority in Muscat, Oman, and has been a Fellow of the Royal Society of Arts since 2010. Professor Henson has given keynote addresses on outcomes-based curriculum development, in Saudi Arabia, on institutional research strategic planning in Indonesia, and on the internationalisation of higher education in China. His other international consultancy has included Jordan, Kuwait, the West Indies, and Sweden. Selected publications Martin C. Henson and Steve Reeves, Revising Z: Part I – Logic and Semantics. Formal Aspects of
https://en.wikipedia.org/wiki/Hercules%20Networks
Hercules Networks is a U.S.-based manufacturing and distributing company. Hercules Networks was founded in 2008, and is headquartered in New York City, New York. Hercules Networks also has an office in Miami, Florida. Hercules Networks is a manufacturer and distributor of Automated Charging Machines, public charging stations that rapidly charge a variety of devices. Background Founded by Paul King and based in New York City, NY, Hercules Networks specializes in Automated Charging Machines, stand up machines that are placed in public areas, much like ATMs are. These machines, also known as ACMs, provide a way for the public in high traffic areas to rapidly charge their devices (around 10 minutes). As their cell phones, PDAs, or mp3 players charge, they are presented with entertainment as well as advertisement, via an LCD screen and/or billboard. The machines take about 10 minutes to charge any number of connected devices. Partnered with Google, Hercules Networks debuted these patented machines at the Democratic and Republican National Conventions in 2008. Since then, Hercules Networks has been a leading manufacturer and distributor of ACMs in the United States, with dozens deployed in various malls, amusement parks, casinos, and various other venues across the country. Hercules Networks also has partnerships with other companies such as CBS, Six Flags, Battery Boost Media, and AT&T, all of whom are partnering for revenue as well as advertising. Hercules Networks has been featured as finalist on BusinessWeek's Entrepreneur feature, and has received recognition from other major sources such as CNN, VendingTimes, and MediaWeek. Hercules Networks currently produces 5 different models of ACMs: Troy Athena Odysseus Adonis Achilles References External links The official Hercules Networks website Manufacturing companies based in New York City
https://en.wikipedia.org/wiki/Weev
Andrew Alan Escher Auernheimer ( ; born ), best known by his pseudonym weev, is an American computer hacker and professional Internet troll. Affiliated with the alt-right, the Southern Poverty Law Center has described him as being a neo-Nazi, white supremacist, and antisemitic conspiracy theorist. He has used many aliases when he has contacted the media, but most sources state that his real first name is Andrew. As a member of the hacker group Goatse Security, Auernheimer exposed a flaw in AT&T's security that compromised the e-mail addresses of iPad users. When it revealed the flaw to the media, the group also exposed the personal data of over 100,000 people, which led to a criminal investigation and an indictment for identity fraud and conspiracy. Auernheimer was sentenced to serve 41 months in a federal prison, of which he served approximately 13 months before his conviction was vacated by a higher court. In 2016, Auernheimer was responsible for sending thousands of white-supremacist flyers to unsecured web-connected printers at multiple universities and other locations in the U.S. Since his release from prison, he has lived in several countries in Eastern Europe and the Middle East. In 2016, he told an interviewer that he was living in Kharkiv. In 2017, it was reported that he was acting as webmaster for the neo-Nazi website The Daily Stormer. The Southern Poverty Law Center describes him as "a neo-Nazi white supremacist" known for "extremely violent rhetoric advocating genocide of non-whites". Early life and education Auernheimer was born in Arkansas in 1985. At age 14, in 1999, he enrolled at James Madison University to study mathematics, and dropped out in 2000. Despite his neo-Nazi affiliations, Auernheimer's mother has stated that he "comes from a 'large, mixed-race family' with Native American heritage, and she has also stated that he most certainly has a Jewish lineage 'on both sides of his family.'" Early hacking and trolling Auernheimer claimed responsibility for the reclassification of many books on gay issues as pornography on Amazon's services in April 2009. Amazon said that he was not responsible for the incident. Even before the Amazon incident, several media publications profiled him regarding his hacking and trolling activities, including The New York Times, in which he claimed to be a member of a hacker group called "the organization," making $10 million annually. He also claimed to be the owner of a Rolls-Royce Phantom. After the Times story on Auernheimer was published, reporters sought him out for commentary on hacking-related stories. Gawker published a story on the Sarah Palin email hacking incident and prominently featured Auernheimer's comments in the title of the story. In the New York Times magazine interview, Auernheimer claimed responsibility for harassing the author and game developer Kathy Sierra in response to her "touchy" reaction to receiving threatening comments on her blog. This included posting a fa
https://en.wikipedia.org/wiki/Simulated%20growth%20of%20plants
The simulated growth of plants is a significant task in of systems biology and mathematical biology, which seeks to reproduce plant morphology with computer software. Electronic trees (e-trees) usually use L-systems to simulate growth. L-systems are very important in the field of complexity science and A-life. A universally accepted system for describing changes in plant morphology at the cellular or modular level has yet to be devised. The most widely implemented tree-generating algorithms are described in the papers "Creation and Rendering of Realistic Trees", and Real-Time Tree Rendering The realistic modeling of plant growth is of high value to biology, but also for computer games. Theory + Algorithms A biologist, Aristid Lindenmayer (1925–1989) worked with yeast and filamentous fungi and studied the growth patterns of various types of algae, such as the blue/green bacteria Anabaena catenula. Originally the L-systems were devised to provide a formal description of the development of such simple multicellular organisms, and to illustrate the neighbourhood relationships between plant cells. Later on, this system was extended to describe higher plants and complex branching structures. Central to L-systems, is the notion of rewriting, where the basic idea is to define complex objects by successively replacing parts of a simple object using a set of rewriting rules or productions. The rewriting can be carried out recursively. L-Systems are also closely related to Koch curves. Environmental interaction A challenge for plant simulations is to consistently integrate environmental factors, such as surrounding plants, obstructions, water and mineral availability, and lighting conditions. Essentially, attempting to build virtual environments with as many parameters as computationally feasible, thereby, not only simulating the growth of the plant, but also the environment it is growing within, and, in fact, whole ecosystems. Changes in resource availability influence plant growth, which in turn results in a change of resource availability. Powerful models and powerful hardware will be necessary to effectively simulate these recursive interactions of recursive structures. Software OpenAlea: an open-source software environment for plant modeling, which contains L-Py, an open-source python implementation of the Lindenmayer systems Branching: L-system Tree A Java applet and its source code (open source) of the botanical tree growth simulation using the L-system. Arbaro- opensource Treal- opensource L-arbor Genesis 3.0 AmapSim - from Cirad GreenLab ONETREE -Accompanying the CDROM is a CO2 meter that plugs into a local serial port. It is this that controls the growth rate of the trees. It is the actual carbon dioxide level right at the computer that controls the growth rate of these virtual trees. Powerplant ''see Comparison of tree generators and A Survey of Modeling and Rendering Trees See also modelling biological systems The Algorithmic Beauty of P
https://en.wikipedia.org/wiki/Ehud%20Kalai
Ehud Kalai is a prominent Israeli American game theorist and mathematical economist known for his contributions to the field of game theory and its interface with economics, social choice, computer science and operations research. He was the James J. O’Connor Distinguished Professor of Decision and Game Sciences at Northwestern University, 1975-2017, and currently is a Professor Emeritus of Managerial Economics and Decision Sciences. Biography Born in Mandatory Palestine on December 7, 1942, Kalai moved to the US in 1963. He received his AB in mathematics from the University of California Berkeley (1967) and an MS (1971) and a PhD (1972) in statistics and mathematics from Cornell University. After serving as an assistant professor of statistics at Tel Aviv University (1972–75), he was hired by Northwestern University to establish a research group in game theory. He is the founding director of the Kellogg Center of Game Theory and Economic Behavior and the executive director of the Nancy L. Schwartz Memorial Lecture series. Kalai is the founding Editor of Games and Economic Behavior, the leading journal in game theory. With Robert J. Aumann, Kalai founded the Game Theory Society and served as its president from 2003 to 2006. He is a Fellow of the American Academy of Arts and Sciences, of the Econometric Society, was awarded an Honorary Doctorate (Doctorat Honoris Causa) by the University of Paris at Dauphine (2010), the Sherman Fairchild Distinguished Scholar position at the California Institute of Technology (1993), and was appointed the Oskar Morgenstern Research Professor at New York University (1991). Since 2008, the Game Theory Society has awarded the Kalai Prize for outstanding papers at the interface of game theory and computer science. The prize was named after Kalai in recognition of his contributions to bridging these two fields. Selected Contributions In cooperative game theory, the Kalai-Smorodinsky solution reopened the study of bargaining by showing that the long unchallenged Nash solution is not unique. He later axiomatized the Egalitarian solution to bargaining problems and, with Dov Samet, formulated its extension to general (NTU) cooperative games, unifying it with the Shapley (TU) Value. In non cooperative game theory, the Kalai and Lehrer model of rational learning showed that rational players with truth-compatible beliefs eventually learn to play Nash equilibria of repeated games. In particular, in Bayesian equilibria of repeated games all relevant private information eventually becomes common knowledge. Kalai's work on large games showed that the equilibria of Bayesian games with many players are structurally robust, thus large games escape major pitfalls in game-theoretic modeling. Kalai is also known for seminal collaborative research on flow games and totally balanced games; strategic complexity and its implications in economics and political systems; arbitration, strategic delegation and commitments; exte
https://en.wikipedia.org/wiki/ECTF
ECTF (the Enterprise Computer Telephony Forum) was formed in 1995 by telephony equipment and software suppliers to improve the interoperability of various vendors’ CT solutions. Until ECTF was formed, the computer telephony industry was an alphabet soup of competing software and hardware platforms. ECTF has sought to improve this situation, and to enhance the “scalability” of CT standards so that telephony systems serving the needs of small businesses as well as large, multinational corporations can be built using the same technology. It consists of many working groups on different areas (e.g. Speech Recognition, etc.). Standards H.100 — a standard published by the CompTIA ECTF for communication between PCI cards in a computer telephony system. References External links ECTF Homepage archived webpage Telecommunications organizations
https://en.wikipedia.org/wiki/H.100%20%28computer%20telephony%29
H.100 and H.110 are legacy telephony equipment standard published by the ECTF that allow the transport of up to 4096 simplex channels of voice or data on one connector or ribbon cable. H.100 is implemented using Multi-Channeled Buffered Serial Ports (McBSP), typically included as a DSP peripheral. McBSP, also known as TDM Serial ports are special serial ports that support multiple channels by using Time-division multiplexing (TDM). The McBSP / TDM Serial Port Interface is as follow: CK: Clock FS: Frame Sync DR: Data Receive DX: Data Transmit See also Time-division multiple access TDM Bus External links References Telephony
https://en.wikipedia.org/wiki/Address%20constant
In IBM System/360 through present day z/Architecture, an address constant or "adcon" is an assembly language data type which contains the address of a location in computer memory. An address constant can be one, two, three or four bytes long, although an adcon of less than four bytes is conventionally used to hold an expression for a small integer such as a length, a relative address, or an index value, and does not represent an address at all. Address constants are defined using an assembler language "DC" statement. Other computer systems have similar facilities, although different names may be used. Types of address constants A adcons normally store a four byte relocatable address, however it is possible to specify the length of the constant. For example, AL1(stuff) defines a one-byte adcon, useful mainly for small constants with relocatable values. Other adcon types can similarly have length specification. V type adcons store an external reference to be resolved by the link-editor. Y is used for two byte (halfword) addresses. 'Y' adcons can directly address up to 32K bytes of storage, and are not widely used since early System/360 assemblers did not support a 'Y' data type. Early DOS/360 and BOS/360 systems made more use of Y adcons, since the machines these systems ran on had limited storage. The notation 'AL2(value)' is now usually used in preference to 'Y(value)' to define a 16 bit value. Q address constants contain not actual addresses but a displacement in the External Dummy Section – similar to the Linux Global Offset Table (see Position-independent code). A J adcon is set by the linkage editor to hold the cumulative length of the External Dummy Section, and does not actually contain an address. Other types of address constants are R which had special significance for TSS/360 to address the PSECT, and S, which stores an address in base-displacement format – a 16 bit value containing a four bit general register number and a twelve bit displacement, the same format as addresses are encoded in instructions. System z supports types AD, JD, QD, and VD, which represent 8 byte (doubleword) versions of types 'A', 'J', 'Q', and 'V' to hold 64 bit addresses. Relocatability The nominal value of the 'DC' is a list of expressions enclosed in parentheses. Expressions can be absolute, relocatable, or complex relocatable. An absolute expression can be completely evaluated at assembly time and does not require further processing by the linkage editor. For example, DC A(4900796) has an absolute nominal value. A relocatable expression is one that contains one or more terms that require relocation by the linkage editor when the program ls linked, for example, in the following code 'ACON' has a relocatable nominal value. LAB DC H'0' ... ACON DC A(LAB-4) A complex relocatable expression contains terms that relate to addresses in different source modules. For example, DC A(X-Y) where 'X' and 'Y' are in different modules. Examples
https://en.wikipedia.org/wiki/WZHD
WZHD (97.1 FM) is a classic hits-formatted radio station licensed to Canaseraga, New York, United States. It serves the Hornell/Dansville area and simulcasts programming from WPHD (98.7 FM), serving the Elmira, New York radio market. The station is owned by Seven Mountains Media. On July 3, 2020, WZHD, along with its then-simulcast partner WPHD (96.1 FM), changed their call letters to WOBF and WCBF respectively, and flipped to country as "Bigfoot Country 95, 96, & 97", with both stations trimulcasting on WQBF. This was part of a five station format swap that was done by Seven Mountains Media, the owner of WOBF. On June 18, 2021, WOBF changed their call letters back to WZHD and switched from a simulcast of WCBF back to a simulcast of classic hits-formatted WPHD (98.7 FM). References External links ZHD Radio stations established in 2009 2009 establishments in New York (state) Classic hits radio stations in the United States Allegany County, New York
https://en.wikipedia.org/wiki/KTAT
KTAT (1570 AM) is a radio station licensed to Frederick, Oklahoma, United States. The format is adult standards. The station is currently owned by High Plains Radio Network, LLC. History On January 25, 2006 the station was sold to Morey Broadcasting. References External links TAT
https://en.wikipedia.org/wiki/The%20Lone%20Ranger%20%28TV%20series%29
The Lone Ranger is an American Western television series that aired on the ABC Television network from 1949 to 1957, with Clayton Moore in the starring role. Jay Silverheels, a member of the Mohawk Aboriginal people in Canada, played the Lone Ranger's Indian companion Tonto. John Hart replaced Moore in the title role from 1952 to 1953 owing to a contract dispute. Fred Foy, who had been both narrator and announcer of the radio series from 1948 until its ending, was the announcer. Gerald Mohr was originally employed as the narrator for the television series, but story narration was dropped after 16 episodes. The Lone Ranger was the highest-rated television program on ABC in the early 1950s and its first true "hit". The series finished number 7 in the Nielsen ratings for the 1950–1951 season, number 18 for 1951–1952, and number 29 for 1952–1953. Series premise A group of six Texas Rangers is ambushed and all are shot, apparently dead. In the hot sun, one lives and crawls to a pool of cool water which saves his life. He is found by a native Indian, Tonto, who buries the five other rangers, one of whom is the survivor's brother. Tonto tends to the survivor's health and complies with his wish to make him a mask from his brother's clothes and to create an empty sixth grave to appear that he is dead. The "lone" surviving ranger thereafter disguises himself with the black mask Tonto made and travels with Tonto throughout Texas and the American West to assist those challenged by the lawless elements. In the first episode they are attacked from above just after he recovers and Tonto distracts the attacker from above as the Lone Ranger first shoots the attacker then tries to climb the cliff he is on. The episode ends with him on the cliff but slipping. A silver mine in the second episode supplies The Lone Ranger with the name of his horse as well as the funds required to finance his wandering lifestyle and the raw material for his signature bullets. At the end of most episodes, after the Lone Ranger and Tonto leave, someone asks the sheriff or other person of authority who the masked man was. The person then responds that it was the Lone Ranger, who is then heard yelling "Hi-Yo Silver, away!" as he and Tonto ride away on their horses. Production George W. Trendle retained the title of producer, although he recognized that his experience in radio was not adequate for producing the television series. For this, he hired veteran MGM film producer Jack Chertok. Chertok served as the producer for the first 182 episodes. The first 78 episodes were produced and broadcast for 78 consecutive weeks without any breaks or reruns. Then the entire 78 episodes were shown again before any new episodes were produced. All were shot in Kanab, Utah and California. Much of the series was filmed on the former Iverson Movie Ranch in Chatsworth, California, including the opening sequence to each episode, in which the cry of "Hi-yo Silver" is heard before the Lone Ranger and Si
https://en.wikipedia.org/wiki/TurboDOS
TurboDOS is a multi user CP/M like operating system for the Z80 and 8086 CPUs developed by Software 2000 Inc. It was released around 1982 for S100 bus based systems such as the NorthStar Horizon and the Commercial Systems line of the multiprocessor systems including the CSI-50, CSI-75, SCI-100 and CSI-150. The multiprocessor nature of TurboDOS is its most unusual feature. Unlike other operating systems of its time where networking of processors was either an afterthought, or which only support a file transfer protocol, TurboDOS was designed from the ground up as a multiprocessor operating system. It is modular in construction, with the operating system generation based on a relocating, linking, loader program. This makes the incorporation of different hardware driver modules quite easy, particularly for bus-oriented machines, such as the IEEE-696 (S-100) bus which was commonly used for TurboDOS systems. Architecture TurboDOS is highly modular, consisting of more than forty separate functional modules distributed in relocatable form. These modules are "building blocks" that you can combine in various ways to produce a family of compatible operating systems. This section describes the modules in detail, and describes how to combine them in various configurations. Possible TurboDOS configurations include: single-user without spooling single-user with spooling network server simple network user (no local disks) complex network user (with local disks) Numerous subtle variations are possible in each of these categories. Module hierarchy The architecture of TurboDOS can be viewed as a three-level hierarchy. The highest level of the hierarchy is the process level. TurboDOS can support many concurrent processes at this level. The intermediate level of the hierarchy is the kernel level. The kernel supports the 93 C-functions and T-functions, and controls the sharing of computer resources such as processor time, memory, peripheral devices, and disk files. Processes make requests of the kernel through the entrypoint module OSNTRY, which decodes each C-function and T-function by number and invokes the appropriate kernel module. The C functions include the CP/M BDOS functions and selected MP/M functions. The lowest level of the hierarchy is the driver level, and contains all the device-dependent drivers necessary to interface TurboDOS to the particular hardware being used. Drivers must be provided for all peripherals, including console, printers, disks, communications channels, and network interface. Drivers are also required for the real-time clock (or other periodic interrupt source), and for bank-switched memory (if applicable). TurboDOS is designed to interface with almost any kind of peripheral hardware. It operates most efficiently with interrupt-driven, DMA-type interfaces, but can also work fine using polled and programmed-I/O devices. TurboDOS loader The TurboDOS loader OSLOAD.COM is a program containing an abbreviated version of
https://en.wikipedia.org/wiki/Fast%20Track%3A%20No%20Limits
Fast Track: No Limits is a 2008 independent film directed by Axel Sand and written and produced by Lee Goldberg. It was a co-production between Action Concept and the German television network ProSiebenSat.1 The film stars Erin Cahill and Andrew Walker. The film was shot in English, with American, British, Canadian, French, and German actors, on location in Berlin, Germany. Cars for the film were supplied by BMW, Audi, and Subaru. It aired first on ProSiebenSat.1 in February 2008, and was released theatrically in China by Beijing Time Entertainment. The film has been broadcast on television and released on DVD in dozens of countries, and it was released on DVD in the United States by Maverick Entertainment Group. The screenplay was novelized by Lee Goldberg in 2013 though the setting was moved to the United States for the book. Plot For four young people; Katie, Mike, Eric, Nicole; speed is a way of life. But the four soon come to realize that living life in the fast lane carries a very high price. On the streets debts are not settled with cash, they are settled in blood. Each character has a different motive and a different goal but when they get behind the wheel they are all the same. It is the speed that connects them, but the one thing they all have in common will be the one thing that tears them apart. The film starts with a bank giving Katie, owner of Carl's Garage warning about the debt on her garage. They then order pizza for lunch which is to be delivered by Mike, a pizza delivery man. On his way to delivery his way is blocked by Nicole's broken down car and then by a police chase between Eric, a police officer and Wolf, the bank robber's wheel man making him run out of time to deliver pizzas. On the road, Katie's Subaru is driven by a mysterious Phantom driver in the illegal racing events, earning her extra money for paying her debts. Meanwhile, in garage Mike sees Nicole's BMW which he steals to prove he is a good racer to Katie by participating and winning in illegal racing. There he races against Wolf and ultimately wins the race but wrecks the BMW. Next day when Nicole sees what has become of her husband's car, Mike apologizes saying that a car can be fixed but one can't buy what it feels like after winning. This earns Katie Nicole's contract for building her a luxury sports car. Meanwhile, Mike is hired by Gargolov, a crime lord as a wheel man in place of Wolf. Eric is investigating the bank robberies and discovers that Wolf is the former wheel man of Gargolov and also learns that Mike is the new one. He investigates Mike's background and learns that he is a wanted convict. As ordered, Nicole's new sports car is made by Katie on which Mike teaches her how to race, drive and drift. After serving as a getaway driver for Gargolov, botching the mission in the process, Mike is confronted by Eric. After an explanation of how Mike got involved and being convinced to race for Katie's sake, Mike and Eric become allies and duel ag
https://en.wikipedia.org/wiki/Polymake
Polymake is software for the algorithmic treatment of convex polyhedra. Albeit primarily a tool to study the combinatorics and the geometry of convex polytopes and polyhedra, it is by now also capable of dealing with simplicial complexes, matroids, polyhedral fans, graphs, tropical objects, toric varieties and other objects. Polymake has been cited in over 100 recent articles indexed by Zentralblatt MATH as can be seen from its entry in the swMATH database. Special Features modular Polymake was originally designed as a research tool for studying aspects of polytopes. As such, polymake uses many third party software packages for specialized computations, thereby providing a common interface and bridge between different tools. A user can easily (and unknowingly) switch between using different software packages in the process of computing properties of a polytope. rule based computation Polymake internally uses a server-client model where the server holds information about each object (e.g., a polytope) and the clients sends requests to compute properties. The server has the job of determining how to complete each request from information already known about each object using a rule based system. For example, there are many rules on how to compute the facets of a polytope. Facets can be computed from a vertex description of the polytope, and from a (possibly redundant) inequality description. Polymake builds a dependency graph outlining the steps to process each request and selects the best path via a Dijkstra type algorithm. scripting Polymake can be used within a perl script. Moreover, users can extend polymake and define new objects, properties, rules for computing properties, and algorithms. Polymake applications Polymake divides its collection of functions and objects into 10 different groups called applications. They behave like C++ namespaces. The polytope application was the first one developed and it is the largest. Common application This application contains many "helper" functions used in other applications. Fan application The Fan application contains functions for polyhedral complexes (which generalize simplicial complexes), planar drawings of 3-polytopes, polyhedral fans, and subdivisions of points or vectors. Fulton application This application deals with normal toric varieties. The name of this application is from the book "Introduction to Toric Varieties" by William Fulton. Graph application The graph application is for manipulating directed and undirected graphs. Some the standard graph functions exist (like for adjacency and cliques) together with combinatorial functions like computing the lattice represented by a directed acyclic graph. Group application The group application focuses on finite permutation groups. Basic properties of a group can be calculated like characters and conjugacy classes. Combined with a polytope, this application can compute properties associated with a group acting on a polytope b
https://en.wikipedia.org/wiki/AF/91
AF/91 was a virus hoax surrounding a computer virus purportedly created by the United States Intelligence Community as a cyberweapon during the Gulf War. The hoax originated in a 1991 InfoWorld article published as an April Fools' Day joke; in reality, no such virus ever existed, and the U.S. military is not known to have used a strategy similar to this in the Gulf War. Despite its publication date and the article clarifying it was for April Fools' Day, the story drew significant media attention, with several sources erroneously describing AF/91 as real well into the early 2000s. Description AF/91 originated from the article "Meta-Virus Set to Unleash Plague on Windows 3.0 Users" written by Tech Street Journal editor John Gantz, published on April 1, 1991 in InfoWorld magazine volume 13, issue 13. Gantz claimed in the article that he had first heard of AF/91 in a conversation he overheard at the 1991 Federal Office Systems Expo (FOSE), a U.S. federal government office supplies convention. Most other details relating to AF/91 came from an unnamed friend employed as a U.S. Navy automated data processing specialist, who decided he would tell Gantz about the virus' program seeing he already knew enough about it. AF/91 was described as a "meta-virus" designed as a "machine-language palindrome" and used to disable real-time computer systems by "attacking the software in printer and display controllers". AF/91 was claimed to be able to eat windows, apparently literally "gobbling them at the edges", ultimately overloading the peripherals with a broadcast storm and permanently freezing the computer. Intel and Motorola computer chips were noted to be especially vulnerable to the virus, as were computers running Microsoft Windows operating systems, namely the then-new Windows 3.0 (as mentioned in the article's title). AF/91 used a neural network that learned with each machine cycle but required lengthy periods of time to work as intended, even after its activation time was reduced by 75%, reportedly taking several weeks to set up, learn, and activate on systems operating 24 hours every day. According to the article, the National Security Agency (NSA) developed AF/91 to defeat Iraqi air defense systems during the Gulf War as part of the U.S. military's Suppression of Enemy Air Defenses operations. Agents of the Central Intelligence Agency (CIA) infected Iraqi systems with the virus by hiding it within software that came with a printer, smuggling it into Iraq through Jordan and shipping it to an Iraqi air defense site. AF/91 remained dormant in Iraqi computer systems until the opening stages of the Gulf War air campaign—which was supposedly delayed just so AF/91 could be smuggled into Iraq and start working—at which point it was activated, disabling Iraqi air defenses and rendering half of their computers and printers unserviceable. However, AF/91 unintentionally made its way out of Iraq after Iraqi Air Force pilots deserting to Iran brought several infec
https://en.wikipedia.org/wiki/Young%20Mr.%20Bobbin
Young Mr. Bobbin is an American television situation comedy that aired live on the NBC network during the 1951-1952 season. Synopsis The series stars Jackie Kelk as Alexander Hawthorne Bobbin, a young high school graduate who lived with his maiden aunts and was in love with the girl next door, Nancy (Pat Hosley). Nydia Westman and Jane Seymour co-star as Bobbin's aunts. The series was canceled after one season. References External links 1951 American television series debuts 1952 American television series endings 1950s American sitcoms American live television series Black-and-white American television shows English-language television shows NBC original programming
https://en.wikipedia.org/wiki/Television%20in%20Ecuador
Television in Ecuador is most important among the country's mass media. Television programming is dominated by telenovelas, series, and news programming. Private and government-run channels coexist at the national, regional, and local levels. Cable channels are also beginning to appear, most of which are exclusive to the companies that operate them. Finally, there are also internet television channels, some of which have specific themes like LGBT programming. There are six private channels (Ecuavisa, Teleamazonas, RTS, Telerama, RTU, Radio y Televisión Unidas, Latele and Oromar Televisión) and four government-run channels (TC Televisión, Gama TV, Canal Uno and Ecuador TV) available throughout the country. In 2011, 83% of channels were privately owned, 17% were publicly owned, and 0% were community owned. Most viewed channels Channels Quito TV References
https://en.wikipedia.org/wiki/Generally%20Speaking%20Production%20Network
The Generally Speaking Production Network (GSPN) is an online media production company founded by Cliff and Stephanie Ravenscraft on December 16, 2005. Background History A fan of the television series Lost, and inspired by Leo Laporte and his this Week in Tech podcast, Cliff Ravenscraft began with a Lost-discussion podcast after only finding one other on the subject in 2005. Ravenscraft began the podcast as a hobby with no experience in broadcasting, radio, or television; in a June 2007 interview with Podcast User Magazine, Ravenscraft confessed that "he didn't put a lot [of] preparation into the show at first, and that his audio was poor, but [...] the content was in high demand." Ravenscraft gathered thousands of listeners in only a few weeks, and quickly added his wife Stephanie to the podcast. Soon thereafter, they launched a second Lost podcast, followed by podcasts discussing faith and family issues, and one about Cliff's life (originally titled My Crazy Life). In December 2008, Cliff Ravenscraft had worked in the insurance industry for eleven years when he left his job to begin podcasting full-time. In 2008, he claimed that, since October 2009, GSPN was producing "more money every month that [he'd] ever made in [his] life." Personnel Cliff Ravenscraft (born c. 1972/1973) grew up in Erlanger, Kentucky and graduated Conner High School in 1992. In 2001, Ravenscraft was an associate pastor of a Highland Heights, Kentucky church for which he blogged about his faith in his "Almost Daily Devotional". Building upon a childhood interest in CB radio, and after he began the Weekly LOST Podcast, Ravenscraft switched from blogging to podcasting. Cliff and his wife Stephanie have three children, Meagan, Matthew, and McKenna. The elder two Ravenscraft children have produced their own GSPN podcasts, The World According To Meagan and Gaming With Matt respectively. Products Podcasts GSPN only advertises on two of its podcasts, and has strict requirements as to where and how advertisements will be implemented. GSPN previously offered a subscription service for US$10 a month which removed ads for subscribers, and gave them access to additional podcast material and a daily blog. GSPN scrapped the Plus Member program on January 17, 2011, and has since produced all content with no advertising. The PodcastAnswerMan podcast however sells products where the product itself is a video tutorial. Cliff Ravenscraft also offers a 4-week online podcasting course for a fee. , GSPN currently lists 24 separate podcasts, divided by subject matter: Balanced Living podcasts Biggest Loser Family From the Heart, Authentic Life Radio, Pursuing A Balanced Life (previously My Crazy life), and Watermark Church Business & Technology podcasts Business Tech Weekly (cancelled) Facebook 101 Help I Got a Mac (cancelled) Podcast Answer Man Social Media Serenity (cancelled) Virtual Assistant Podcast Entertainment podcasts Desperate Housewives Doctor Who Gaming With Matt Grey's
https://en.wikipedia.org/wiki/LG%20Versa
The LG Versa (VX9600) is a mobile phone for use on the Verizon Wireless network. Like the LG Dare VX-9700, the Versa has a full touch screen and onscreen QWERTY keyboard. The Vers also accepts handwriting recognition or gesture control for entering phone numbers and typing. The phone includes a HTML mobile web web browser, a built-in MP3 music player, access to Verizon Wireless's VCAST multimedia services, and mobile e-mail services. The phone includes a 2.0-mp digital camera with zoom, autofocus, and flash. The phone also had a built-in camcorder. An expandable MicroSD card slot is included into the phone, though no MicroSD card is pre-installed into the device. The difference between the LG Dare and the Versa is that the Versa featured a unique, foldout QWERTY keyboard that was detachable. Originally included with the Versa, the QWERTY keyboard was no longer included and only available as an accessory at Verizon Wireless retail stores. The attachment also included send and end call keys so that the user could answer an incoming call even with the flip closed. The attachment also included an integrated LED display screen that displayed information such as the currently-playing music track, current time, current date, signal strength, type of CDMA signal (1X or 3G) that the phone was currently operating on, the network provider's name, and who is calling, should an incoming call come through when the case is attached and closed. Features Network Type: CDMA Dual Band (800 / 1900 MHz) Data: CDMA 2000 1xRTT / 1xEV-DO Rev.0 / 1xEV-DO Rev.A 3G Capable: Yes Size Dimensions: 4.16 x 2.07 x 0.54 inches Weight: 3.81 oz Battery Type: Li – Ion, 1100 mAH Talk: 4.83 Hours (290 Minutes) Standby: 430 Hours (18 Days) Main Display Resolution: 240 x 480 Pixels Type: 262,144 TFT Physical Size: 3.00 Inches Features: Light Sensor Touch Screen: Yes With Hand Writing Recognition Additional Display Resolution: 120 x 56 Pixels Type: Monochrome OLED Features: Only Available On The QWERTY Keypad Attachment Camera Resolution: 2.0 Megapixels Video Capture: Yes Features: Auto focus, Flash (LED), Digital Zoom, White balance, Effects, Panorama Multimedia Video Playback: MPEG 4, 3GP, 3GP2, WMV Music Player: MP3, AAC, ACC+, WMA Memory Memory Slot: Micro SD/Micro SDHC Built In: 310 MB Input Keypad: Detachable Connectivity USB: Micro USB Bluetooth: Version 2.1, Stereo Bluetooth Connectors: Headset Jack (2.5mm) References External links LG Versa Review LG Versa Phonescoop LG Versa Forum VX9600 Mobile phones introduced in 2009
https://en.wikipedia.org/wiki/Silverfrost%20FTN95
Silverfrost FTN95: Fortran for Windows is a compiler for the Fortran programming language for computers running Microsoft Windows. It generates executable programs from human-written source code for native IA-32 Win32, x86-64 (from version 8.00) and for Microsoft's .NET platform. There is a free-of-charge Personal edition, which generates programs which briefly display a banner, and Commercial and Academic editions. CHECKMATE FTN95, like its predecessor FTN77, has strong run-time checking options, collectively called CHECKMATE. Compiler switches can turn on various levels of run-time checking. These include array bound checks, constant modification, DO LOOP modification, argument checking and undefined variable use. Program run-times are increased when checking is used. ClearWin+ ClearWin+ is a library built into the FTN95 run-time system. It offers an easy to use interface to the Windows API and is not available when producing .NET code. It makes use of a set of format codes and call-backs. The format codes resemble C style printf codes. ClearWin+ is used to power the UI for Simfit. From FTN95 version 7.00 a 64-bit version of ClearWin+ is included. This can be used with existing, free, 64-bit compilers. A simple ClearWin+ program: INTEGER i,winio@ EXTERNAL func i=winio@('Press this to see what happens &') i=winio@('%^bt[PRESS]',func) END c---Function to do something--- INTEGER function func() func=1 ENDA full GUI interface with windows, menus, popup dialog boxes, list boxes, edit boxes, bitmaps, toolbars, etc can be developed using the available format codes. Applications written using ClearWin+ can also contain graphics regions, enabling charts and graphs to be included. OpenGL graphics can also be included. A simple ClearWin+ program that demonstrates two dimensional graph plotting using ClearWin+: USE clrwin INTEGER, PARAMETER :: n=101 REAL*8 x(n), y(n), th1, a, dth1 ! Generate x-y data arrays a = 1.d0 th1 = 0.d0 dth1 = 4.d0*ATAN(1.d0)/25.d0 DO i = 1, n, 1 x(i) = a * SQRT(th1) * COS(th1) y(i) = a * SQRT(th1) * SIN(th1) th1 = th1 + dth1 END DO ! Configure plot CALL WINOP@('%pl[frame,etched,gridlines,colour=blue,width=2,symbol=5]') CALL WINOP@('%pl[smoothing=4,x_array,margin=100]') CALL WINOP@('%pl[Title="Fermat''s spiral"]') ! Set window font (%fn), text size (%ts), and set to bold (%bf) i = WINIO@('%fn[Tahoma]%ts%bf&',1.5d0) ! Create a 800 x 800 graphics region, and plot curve defined by data in x and y i = WINIO@('%pl',800,800,n,x,y) END SDBG/SDBG64 FTN95 can add extra debugging information to the EXE files that it produces. This facility is made available when the user requests it with the appropriate compiler options (/debug, /check, /undef ). The SDBG/SDBG64 debuggers are fast and capable tools that are easier to learn and use
https://en.wikipedia.org/wiki/Mary%20Allen%20Wilkes
Mary Allen Wilkes (born September 25, 1937) is a lawyer, former computer programmer and logic designer, known for her work with the LINC computer, now recognized by many as the world's first "personal computer". Career Wilkes was born in Chicago, Illinois and graduated from Wellesley College in 1959 where she majored in philosophy and theology. Wilkes planned to become a lawyer, but was discouraged by friends and mentors from pursuing law because of the challenges women faced in the field. A geography teacher in the eighth grade had told Wilkes, "Mary Allen, when you grow up, you ought to be a computer programmer." She worked in the field as one of the first programmers for a number of years before pursuing law and becoming an attorney in 1975. MIT Wilkes worked under Oliver Selfridge and Benjamin Gold on the Speech Recognition Project at MIT's Lincoln Laboratory in Lexington, Massachusetts from 1959 to 1960, programming the IBM 704 and the IBM 709. She joined the Digital Computer Group, also at Lincoln Laboratory, just as work was beginning on the LINC design under Wesley A. Clark in June 1961. Clark had earlier designed Lincoln's TX-0 and TX-2 computers. Wilkes's contributions to the LINC development included simulating the operation of the LINC during its design phase on the TX-2, designing the console for the prototype LINC and writing the operator's manual for the final console design. In January, 1963, the LINC group left Lincoln Laboratory to form the Center for Computer Technology in the Biomedical Sciences at MIT's Cambridge, Massachusetts campus, where, in the summer of 1963 it trained the first participants in the LINC Evaluation Program, sponsored by the National Institutes of Health. Wilkes taught participants in the program and wrote the early LINC Assembly Programs (LAP) for the 1024-word LINC. She also co-authored the LINC's programming manual, Programming the LINC with Wesley A. Clark. Washington University In the summer of 1964 a core group from the LINC development team left MIT to form the Computer Systems Laboratory at Washington University in St. Louis. Wilkes, who had spent 1964 traveling around the world, rejoined the group in late 1964, but lived and worked from her parents' home in Baltimore until late 1965. She worked there on a LINC provided by the Computer Systems Laboratory and is usually considered to be the first user of a personal computer in the home. By 1965 the LINC team had doubled the size of the LINC memory to 2048 12-bit words, which enabled Wilkes to develop the more sophisticated operating system, LAP6. LAP6 incorporated a scroll editing technique which made use of an algorithm proposed by her colleagues, Mishell J. Stucki and Severo M. Ornstein. LAP6, which has been described as "outstandingly well human engineered", provided the user the ability to prepare, edit, and manipulate documents (usually LINC programs) interactively in real time, using the LINC's keyboard and display, much like later per
https://en.wikipedia.org/wiki/Compressed%20data%20structure
The term compressed data structure arises in the computer science subfields of algorithms, data structures, and theoretical computer science. It refers to a data structure whose operations are roughly as fast as those of a conventional data structure for the problem, but whose size can be substantially smaller. The size of the compressed data structure is typically highly dependent upon the information entropy of the data being represented. Important examples of compressed data structures include the compressed suffix array and the FM-index,both of which can represent an arbitrary text of characters T for pattern matching. Given any input pattern P, they support the operation of finding if and where P appears in T. The search time is proportional to the sum of the length of pattern P, a very slow-growing function of the length of the text T, and the number of reported matches. The space they occupy is roughly equal to the size of the text T in entropy-compressed form, such as that obtained by Prediction by Partial Matching or gzip. Moreover, both data structures are self-indexing, in that they can reconstruct the text T in a random access manner, and thus the underlying text T can be discarded. In other words, they simultaneously provide a compressed and quickly searchable representation of the text T. They represent a substantial space improvement over the conventional suffix tree and suffix array, which occupy many times more space than the size of T. They also support searching for arbitrary patterns, as opposed to the inverted index, which can support only word-based searches. In addition, inverted indexes do not have the self-indexing feature. An important related notion is that of a succinct data structure, which uses space roughly equal to the information-theoretic minimum, which is a worst-case notion of the space needed to represent the data. In contrast, the size of a compressed data structure depends upon the particular data being represented. When the data are compressible, as is often the case in practice for natural language text, the compressed data structure can occupy space very close to the information-theoretic minimum, and significantly less space than most compression schemes. References Data structures Data compression
https://en.wikipedia.org/wiki/Hj%C3%A4lp%21
Hjälp! () was a Swedish situation comedy television series, broadcast on the TV4 network. It revolved around a psychologist, Jeanette Placzycks, played by Stina Ekblad, who treated patients with a variety of problems. The series had three seasons, and it was broadcast in 2007 — 2009. According to TV4, the first season had peak viewing figures of more than 1.5 million viewers. The first season of the programme was reported to the Swedish Broadcasting Commission for treating a stuttering person as an amusing caricature in a way that ridiculed and humiliated people with the disability. The commission ruled that since the entire TV show presented exaggerated caricatures of mental issues and other disabilities, which were not intended to be taken seriously, the specific situations mentioned in the report did not violate the Swedish Radio and Television Act. The American actor Chevy Chase had a recurring part as a foreign correspondent in the third season of the series. Cast Stina Ekblad as Jeanette Placzycks, psychologist and the show's protagonist. Johan Rheborg as Örjan Lax Felix Herngren as Benjamin Turesson Hassan Brijany as Tito Johan Glans as Reine Bok Morgan Alling as Lars Magnus Ericsson Petra Mede as Viviann, Lars Magnus' wife. Anna Blomberg as Marina Huge Gustaf Hammarsten and Anna Petersson as Mats and Therese Bolling Per Andersson as Dagmar Chevy Chase as Dan Carter Robert Gustafsson as Papa Papadopolous References External links Swedish television sitcoms Stockholm in fiction 2007 Swedish television series debuts
https://en.wikipedia.org/wiki/Harpoon%20%28video%20game%29
Harpoon is a computer wargame published by Three-Sixty Pacific in 1989 for DOS. This was the first game in the Harpoon series. It was ported to the Amiga and Macintosh. Plot The player is the commander of either NATO or Soviet forces, commanding ships and aircraft, selecting from over 100 different weapon systems, and taking responsibility for judgment calls. The game mainly focuses on combat in the GIUK Gap. Gameplay Harpoon is a naval simulator that uses data reflecting real-world equipment and weaponry, based on a miniatures wargame. There are no preset battle algorithms that dictate combat outcomes, and no play balance between sides. The game includes a user's guide with an appendix on superpower politics and maritime strategies in modern warfare, a Harpoon Tactical Guide by Larry Bond, and a booklet by author Tom Clancy that deals with Russian destroyers. Clancy used the simulation to test the naval battles for Red Storm Rising, which he co-authored with Bond. Development history In the late 1970s, a manual wargame called SEATAG was introduced by the United States Navy for exploring tactical options. It was available in both classified and unclassified versions. SEATAG was developed into a true tactical training game called NAVTAG that ran on three networked microcomputers for the Red Side, Blue Side, and Game Control. Former naval officer and future author Larry Bond's exposure to this system in 1980 while on active duty led to the eventual development of Harpoon. The original game was expanded with additional releases including Harpoon BattleSet 2: North Atlantic Convoys (1989), Harpoon Battleset 3: The MED Conflict (1991), Harpoon BattleSet 4: Indian Ocean / Persian Gulf (1991), and Harpoon Designers' Series: BattleSet Enhancer (1992). A remake was released in 1994 titled Harpoon Classic. Another remake based on Harpoon Classic was released in 1997 titled Harpoon Classic '97. Reception Sales of Harpoon surpassed 80,000 copies by 1993. In the February 1990 edition of Computer Gaming World, M. Evan Brooks, a United States military officer, gave the game five stars out of five. He stated that "there is no question that Harpoon is the most detailed simulation to appear in the civilian marketplace ... a must-have for the serious naval gamer", and that he had learned more from six hours with the game than one year at the Naval War College. In the April 1990 edition of Dragon (Issue 156), Patricia, Kirk and Hartley Lesser called this "is a true simulation with data reflecting real-world equipment and weaponry." They thought the game was "a graphical masterpiece". They concluded by giving the PC DOS/MS-DOS version of the game a perfect score of 5 out of 5, saying, "a simulation that is far more than a game – it's war!". A year later, they gave the Macintosh version a perfect score as well. Six months after that, the Lessers gave the Amiga version another perfect score. In the May 1990 edition of Games International, Mike Siggins noted
https://en.wikipedia.org/wiki/Mobile%20multi-coloured%20composite
A mobile multi-coloured composite (MMCC) is a two dimensional coloured barcode designed to distribute media via traditional print media, without the need for network connectivity. MMCC barcodes are designed to be scanned with ordinary camera-phones (from VGA resolution onward). MMCC is being developed at Edith Cowan University by Drs Alfred Tan and Douglas Chai. "A provisional patent has been filed and capital is being sought to develop a suite of mobile encoding and decoding software for mainstream, low-resolution camera mobile phones. References External links Activities and projects of the Mobile Barcodes Research Group at Edith Cowan University Barcodes
https://en.wikipedia.org/wiki/The%20Computer%20Edition%20of%20Risk%3A%20The%20World%20Conquest%20Game
Risk: The World Conquest Game is a computer game developed by Virgin Mastertronic International in 1989 for DOS. Gameplay This game is based on the board game Risk. The player can play against up to five computer opponents. The player can select to play using either the British or American version of Risk, with either version of the extra armies cards. Reception Computer Gaming World stated that while the computer version offered the convenience of an automated opponent for solitary players, the board game would likely be more fun for most because they would not have to crowd around the computer, which could not easily display the entire world at once. M. Evan Brooks reviewed the computer editions of Risk, Monopoly, Scrabble, and Clue for Computer Gaming World, and stated that "In this reviewer's opinion, Scrabble is the weakest product (given cumbersome play and graphics), while Risk and Clue: Master Detective are the strongest." The game was reviewed in 1990 in Dragon #156 by Hartley, Patricia, and Kirk Lesser in "The Role of Computers" column. The reviewers gave the game 5 out of 5 stars. Reviews ACE (Advanced Computer Entertainment) - Jan, 1989 ASM (Aktueller Software Markt) - Mar, 1990 Amiga Power - May, 1991 Computer Gaming World - Mar, 1990 The Games Machine - Apr, 1990 ST Format - Apr, 1990 Zero - Mar, 1990 References External links Risk at MobyGames Review in Compute!'s Gazette Review in Info Review in Info 1989 video games Amiga games Apple II games Atari ST games Classic Mac OS games Commodore 64 games DOS games Risk (game) Video games based on board games Video games developed in the United States Virgin Interactive games
https://en.wikipedia.org/wiki/Linksys%20routers
Linksys manufactures a series of network routers. Many models are shipped with Linux-based firmware and can run third-party firmware. The first model to support third-party firmware was the very popular Linksys WRT54G series. The Linksys WRT160N/WRT310N series is the successor to the WRT54G series of routers from Linksys. The main difference is the draft 802.11n wireless interface, providing a maximum speed of 270 Mbit/s over the wireless network when used with other 802.11n devices. Specifications and versions BEFW11S4 Linksys' first series of wireless routers. The Linksys BEFW11S4 is a Wi-Fi capable residential gateway from Linksys. The device is capable of sharing Internet connections among several computers via 802.3 Ethernet and 802.11b wireless data links. With only 1 MB of flash storage and 4 MB of RAM, no third party replacement firmware is compatible with it. WRT54G series The Linksys WRT54G and variants WRT54GS, WRT54GL, and WRTSL54GS are Wi-Fi capable residential gateways from Linksys. The device is capable of sharing Internet connections among several computers via 802.3 Ethernet and 802.11b/g wireless data links. The WRT54GL as well as most (but not all) of the other variants in this series, are capable of running Linux-based third-party firmware for added features. Supported software includes Tomato, OpenWrt, and DD-WRT WRT100 802.11g MIMO router with 100 Mbit/s switches WRT110 802.11g MIMO router with 100 Mbit/s switches WRT120N 150 Mbit/s N router, but not as fast as real N speeds, with 100 Mbit/s switches WRT150N 802.11n "draft" MIMO router with 100 Mbit/s switches. WRT160N 802.11n "draft" MIMO router with 100 Mbit/s switches. The E1000 and Cisco Valet M10 replaced this model. WRT160NL 802.11n "draft" MIMO router with 100 Mbit/s switches. Has a Linux-based OS, external antenna, and USB port for network storage. The E2100L replaced this model. WRT300N 802.11n "draft" MIMO router with 100 Mbit/s switches. Base model for all the others listed below. WRT310N Similar to WRT350N with a Gigabit Ethernet switch, hardware crypto acceleration for IPSec, SSL, and WPA/WPA2. The WRT310N has an integrated wireless chipset rather than the external PC Card adapter found on the WRT350N. The Cisco Valet Plus M20 replaced this model. WRT320N 802.11n "draft" MIMO router with a gigabit switch and non-simultaneous dual-band. The E2000 replaced this model. Due to the hardware being very similar, it is possible to upgrade the WRT320N to an E2000 by replacing the CFE. WRT330N Based on a different platform, but also has a Gigabit Ethernet switch according to the product specifications listed on the manufacturers website. WRT350N Similar to WRT300N, but with a Gigabit Ethernet switch, hardware crypto acceleration for IPSec, SSL, and WPA/WPA2, and a USB 2.0 port for connecting a hard drive or flash-based USB storage devices directly to your network to share music, video, or data files. WRT400N A simultaneous dual-band non-gi
https://en.wikipedia.org/wiki/2009%20Sidekick%20data%20loss
The Sidekick data outage of 2009 resulted in an estimated 800,000 smartphone users in the United States temporarily losing personal data, such as emails, address books and photos from their mobile handsets. The computer servers holding the data were run by Microsoft. The brand of phone affected was the Danger Hiptop, also known as the "Sidekick", and were connected via the T-Mobile cellular network. At the time, it was described as the biggest disaster in cloud computing history. The Sidekick smartphones were originally produced by Danger, Inc., a company that was bought by Microsoft in February 2007. After the acquisition, the former Danger staff were then absorbed into the Mobile Communications Business (MCB) of the Entertainment and Devices Division at Microsoft, where they worked on a future Microsoft mobile phone platform known as Project Pink. However, most of the ex-Danger employees soon left Microsoft to pursue other things. Microsoft took over the running of the data servers, and its data centers were hosting the customers' data at the time it was lost. On Friday, October 2, 2009, T-Mobile Sidekick phone users started noticing data service outages occurring. The outages lasted approximately two weeks, and on October 10, 2009, T-Mobile announced that personal information stored on Sidekick phones would be permanently lost, which turned out to be incorrect. According to the Financial Times, Microsoft said the data center it acquired from Danger 18 months previously had not been "updated to run on Microsoft technology." A company statement said the mishap was due to "a confluence of errors from a server failure that hurt its main and backup databases supporting Sidekick users." T-Mobile blamed Microsoft for the loss of data. The incident caused a public loss of confidence in the concept of cloud computing, which had been plagued by a series of outages and data losses in 2009. It also was problematic for Microsoft, which at the time was trying to convince corporate clients to use its cloud computing services, such as Azure and My Phone. On October 14, 2009, a class action lawsuit was launched against Microsoft and T-mobile. The lawsuit alleged: T-Mobile and Microsoft promised to safeguard the most important data their customers possess and then apparently failed to follow even the most basic data protection principles. What they did is unthinkable in this day and age. The class action lawsuit was settled in 2011, with affected users compensated with a "$35 T-Mobile gift card, a $17.50 check payment, or up to 12 free downloadable items." On October 15, Microsoft said they had been able to recover most or all data and would begin to restore them. Microsoft CEO, Steve Ballmer disputed whether there had been a data loss at all, instead describing it as an outage. Ballmer said, “It is not clear there was data loss". However, he said the incident was "not good" for Microsoft. Even before this data loss, Danger had marketed an applicatio
https://en.wikipedia.org/wiki/L%C3%A1szl%C3%B3%20Kozma
László Kozma (Miskolc, Hungary, 28 November 1902 − Budapest, Hungary, 9 November 1983) was a Hungarian electrical engineer, designer of the first Hungarian digital computer (1957), and a full member of the Hungarian Academy of Sciences. Due to the regulations of numerus clausus his application to the Budapest University of Technology was rejected in 1921, and he started to work as an electrician. Between 1925 and 1930 he studied at the Brno University of Technology, where he graduated as an electrical engineer in 1930, then was hired by the Antwerp office of the International Telephone & Telegraph company to design automated telephone switchboards and electromechanical computers. He moved back to Hungary in 1942, but in 1944 he was deported to the Mauthausen concentration camp. He returned in August 1945 in a very poor physical state, then worked for a Hungarian electrical company Standard Electrical Co. as designing engineer. He was arrested by the communist government in 1949, and sentenced to 15 years in the show trial Standard Gate. He was rehabilitated and released from prison in 1954 and taught as a professor at the Budapest University of Technology and Economics between 1955 and 1972. His main researches were in the field of automatization of telephone technology, but he is more notable for the first Hungarian digital computer (called MESZ–1) which he designed and created between 1955 and 1957. He was a corresponding (1961), then a full member (1976) of the Hungarian Academy of Sciences. Some important publications The new digital computer of the Polytechnical University, Budapest. in: Periodica Polytechnica 1959. 321–343. Távbeszélő technika I–II. [Telecommunication technologies.] Budapest, 1966–1967, 366 + 184 p. (with Béla Frajka) References A Magyar Tudományos Akadémia tagjai 1825–2002 II. [Members of the Hungarian Academy of Sciences 1825-2002.] Budapest, 2003. Biography at IEEE's 1996 Computer Pioneer Award Hungarian electrical engineers Cyberneticists Members of the Hungarian Academy of Sciences 1983 deaths 1902 births Mauthausen concentration camp survivors
https://en.wikipedia.org/wiki/National%20Outbreak%20Reporting%20System
The National Outbreak Reporting System (NORS) is an electronic, web-accessible system designed to improve the quality, quantity, and availability of data for waterborne, foodborne person-to-person zoonotic (animal-to-person) enteric disease outbreaks in the United States. NORS launched in 2009 for use by staff working within public health departments in individual states, territories, and the Freely Associated States (composed of the Republic of the Marshall Islands, the Federated States of Micronesia and the Republic of Palau; formerly parts of the U.S.-administered Trust Territories of the Pacific Islands). Health departments are responsible for determining which staff members have access to NORS. Separate sections in NORS for enteric person-to-person and animal-to-person disease outbreak reports are intended to enhance the information available to quantify, describe, and understand these types of outbreaks at a national level. History NORS replaced the electronic Foodborne Outbreak Reporting System (eFORS), which was the primary tool for reporting foodborne disease outbreaks to the U.S. Centers for Disease Control and Prevention (CDC) since 2001. NORS also replaced the paper-based reporting system used during 1971–2008 to report waterborne disease outbreaks to the Waterborne Disease and Outbreak Reporting System (WBDOSS). The transition to electronic waterborne disease outbreak reporting is in large part a response to the Council of State and Territorial Epidemiologists (CSTE) position statement titled "Improving Detection, Investigation, and Reporting of Waterborne Disease Outbreaks." See also Waterborne Disease and Outbreak Reporting System (WBDOSS) References External links Council of State and Territorial Epidemiologists National Outbreak Reporting System (NORS) - Provides information on NORS, including forms and video training on using the NORS system. OutbreakNet Team at the United States Centers for Disease Control and Prevention. Epidemiology Centers for Disease Control and Prevention
https://en.wikipedia.org/wiki/Mash-Up%20%28Glee%29
"Mash-Up" is the eighth episode of the American television series Glee. The episode premiered on the Fox network on October 21, 2009. It was written by series co-creator Ian Brennan and directed by Elodie Keene. The episode sees glee club director Will Schuester (Matthew Morrison) attempt to create a wedding medley in the style of a mash-up for his colleagues Emma (Jayma Mays) and Ken (Patrick Gallagher). Students Finn (Cory Monteith) and Quinn (Dianna Agron) find that they are no longer considered popular, while glee club members Rachel (Lea Michele) and Puck (Mark Salling) become romantically involved, as do cheerleading coach Sue Sylvester (Jane Lynch) and local news anchor Rod Remington (Bill A. Jones). The episode features covers of five songs. Studio recordings of three of the songs were released as singles, available for digital download, and three are included on the album Glee: The Music, Volume 1. Neil Diamond was hesitant about licensing his song "Sweet Caroline" to the show, but was convinced by series music producer P.J. Bloom and ultimately enjoyed the performance given by Salling. The episode was watched by 7.24 million US viewers. Musical performances received mixed reviews from critics. The Wall Street Journal Raymund Flandez described "Mash-Up" as a "turning point" for Glee, praising the episode for its character development. Plot Football coach Ken Tanaka (Patrick Gallagher) and guidance counselor Emma Pillsbury (Jayma Mays) ask glee club director Will Schuester (Matthew Morrison) to create a mash-up for their wedding, using "Thong Song" and "I Could Have Danced All Night" from My Fair Lady. Ken senses that Emma would rather be with Will instead of him, so he gives the football-playing glee club members an ultimatum by scheduling an extra football practice on the same day as glee rehearsals. Finn Hudson (Cory Monteith) and Quinn Fabray (Dianna Agron) have slushies thrown in their faces by other students, who want to take them down now that their high social status as football quarterback and head cheerleader has slipped because of Quinn's pregnancy and their membership in the glee club. Puck's (Mark Salling) mother (Gina Hecht) encourages him to date a Jewish girl, and he decides to court Rachel Berry (Lea Michele). At first she excuses herself by saying she needs a strong male who can perform a solo. As a result, Puck sings "Sweet Caroline" as his first solo for the glee club, dedicating it to Rachel and sealing the relationship. The two ultimately break up as a result of Rachel's feelings for Finn and Puck's feelings for Quinn. Cheerleading coach Sue Sylvester (Jane Lynch) falls in love with Rod Remington (Bill A. Jones), a television news anchor on the program where she has an opinion segment, and makes amends with Will. However, her relationship fails when she discovers that Rod is cheating on her and, returning to form, Sue removes Quinn from the cheerleading squad because of her pregnancy. Although Finn has chosen to
https://en.wikipedia.org/wiki/List%20of%20defunct%20television%20networks%20in%20the%20United%20States
This is a list of American defunct television networks. Distant locals/superstations Entertainment Family LGBT Lifestyle Music News and information Regional news Pay-per-view Movies Public-interest/educational Religion Shopping Sports Regional sports Spanish Ethnic African-American Asian German High-definition Network re-brands References Television networks
https://en.wikipedia.org/wiki/Torrent%20file
In the BitTorrent file distribution system, a torrent file or meta-info file is a computer file that contains metadata about files and folders to be distributed, and usually also a list of the network locations of trackers, which are computers that help participants in the system find each other and form efficient distribution groups called swarms. Torrent files are normally named with the extension .torrent. A torrent file acts like a table of contents (index) that allows computers to find information through the use of a BitTorrent client. With the help of a torrent file, one can download small parts of the original file from computers that have already downloaded it. These "peers" allow for downloading of the file in addition to, or in place of, the primary server. A torrent file does not contain the content to be distributed; it only contains information about those files, such as their names, folder structure, sizes, and cryptographic hash values for verifying file integrity. The BitTorrent system has been created to ease the load on central servers, as instead of having individual clients fetch files from the server, BitTorrent can crowd-source the bandwidth needed for the file transfer and reduce the time needed to download large files. Many free/freeware programs and operating systems, such as the various Linux distributions offer a torrent download option for users seeking the aforementioned benefits. Other large downloads, such as media files, are often torrented as well. Background Typically, Internet access is asymmetrical, supporting greater download speeds than upload speeds, limiting the bandwidth of each download, and sometimes enforcing bandwidth caps and periods where systems are not accessible. This creates inefficiency when many people want to obtain the same set of files from a single source; the source must always be online and must have massive outbound bandwidth. The BitTorrent protocol addresses this by decentralizing the distribution, leveraging the ability of people to network "peer-to-peer", among themselves. Each file to be distributed is divided into small information chunks called pieces. Downloading peers achieve high download speeds by requesting multiple pieces from different computers simultaneously in the swarm. Once obtained, these pieces are usually immediately made available for download by others in the swarm. In this way, the burden on the network is spread among the downloaders, rather than concentrating at a central distribution hub or cluster. As long as all the pieces are available, peers (downloaders and uploaders) can come and go; no one peer needs to have all the chunks or to even stay connected to the swarm in order for distribution to continue among the other peers. A small torrent file is created to represent a file or folder to be shared. The torrent file acts as the key to initiating downloading of the actual content. Someone interested in receiving the shared file or folder first obtains
https://en.wikipedia.org/wiki/Empire%20of%20the%20East%20series
The Empire of the East series is composed of four science fiction/fantasy novels by Fred Saberhagen. Premise Some time in the future, a nuclear holocaust is averted by a computer named ARDNEH (Automatic Restoration Director – National Executive Headquarters), which initiates what is intended to be a temporary modification (later called "The Change") to the laws of physics to make nuclear explosions impossible. However, the enemy has a similar device, and when the two expanding wavefronts of The Change collide, the effect unexpectedly becomes permanent. Following The Change, most technology ceases to function, while magic now works. Magical beings are also created. Demons are born from acts of violence at the time of The Change; the most powerful is Orcus, born of a nuclear bomb caught by a wavefront at the exact moment of exploding. After eliminating potential rivals, it establishes and rules the evil Empire of the East. Eventually, it is tricked and overthrown by John Ominor, its human second-in-command, who then becomes Emperor of the East. However, the tyranny remains the same. Orcus is locked away in a magical dungeon by Ominor and Wood, his most powerful wizard (who goes on to become the main antagonist of the subsequent Swords series set thousands of years further in the future). On one continent, a resistance movement fights on under the leadership of Duncan, but is gradually being ground down by the greatly superior military and magical strength of the Empire. Rolf, a peasant farmer with an untapped knack for technology, joins the resistance after his parents are killed and his sister kidnapped by soldiers of the Empire. He is contacted by Ardneh (made sentient by The Change and the actual leader of the West), who uses Rolf's technological talents to effect repairs to and enhancements of itself. Rolf obtains a power unit that makes Ardneh much stronger. Ultimately, he becomes the conduit for Ardneh's plans to bring about the West's salvation. Rolf helps destroy a regional tyrant in The Broken Land by driving a long-lost super-tank. In The Black Mountains, he plays a part in defeating a much more powerful leader, Som the Dead. In Changeling Earth, the war between East and West comes to a climax. Ardneh helps Orcus escape its prison. Orcus sees its main danger lies with its rescuer, not Ominor, so it attacks Ardneh. They are evenly matched in strength, and neither can kill the other, but Ardneh is immobile. Orcus orders the Eastern armies to converge on and assault the place where Ardneh's hardware is hidden. Duncan's weaker force defends Ardneh, but Ardneh tells Duncan to retreat when the situation becomes hopeless. Ardneh's components are captured piecemeal and destroyed ... which is just what Ardneh has planned. Too late, Orcus realizes its peril and tries to flee, but Ardneh holds it fast. When enough of Ardneh is disabled, The Change is partially undone or weakened. Orcus reverts to the nuclear bomb it was originally, and the
https://en.wikipedia.org/wiki/Apple%20Studio%20Display%20%281998%E2%80%932004%29
The Apple Studio Display is a series of non-widescreen LCD and CRT displays manufactured and sold by Apple Computer, Inc. and introduced in 1998. After the 1999 introduction of the widescreen Apple Cinema Display, the Apple Studio Display line ran concurrently until it was discontinued in 2004. With the exception of the last model, the 5:4 17" Apple Studio Display, all Apple Studio Displays had an aspect ratio of 4:3. Apple Studio Displays offered DB-15, VGA, DVI, and ADC as their display input. Some inputs Apple Studio Displays used were USB, Composite video, S-Video, ADB, RCA audio connectors, and headphone jacks. Models Flat panel models (1998–2003) The first Apple display using LCD technology was known as the Apple Studio Display (15-inch flat panel). It was introduced at the 1998 Seybold Seminars Expo alongside the Power Macintosh G3/300 DT and had an initial retail price of US$1,999. MacWorld Magazine's Seybold conference coverage said the pricing "would have been considered aggressive a few months ago, but given recently plummeting prices for LCD monitors, Apple's display should be in the middle of the pack." It has DA-15 connector for connecting the display to a computer, and 2 ADB ports, an S-Video and Composite video port, as well as RCA audio connectors and a headphone jack. Although it was intended to be paired with the Power Macintosh G3, its blue and translucent plastic design was ahead of G3 which were still beige. It is the first translucent Apple product since the eMate, predating the iMac G3 by a few months. The Studio Display requires System 7.5 or later, and has a brightness of 180 cd/m2. Power Macintosh G3 Blue and White Styling The Studio Display received its first major revision at MacWorld January 1999 with "ice white" and "blueberry" styling to match the new Power Macintosh G3 Blue and White, a brighter panel (200 cd/m2), and a lower retail price of US$1,099. In August 1999, it was replaced with a model featuring DVI and USB ports with a white and graphite exterior styling. Power Macintosh G4 Styling In July 2000, a model (M2454) featuring an ADC port and a clear plastic three-legged stand based on the 22" (55 cm) Apple Cinema Display was introduced and was included with the iconic G4 Cube. It was discontinued in January 2003. All 15" (35 cm) Studio Displays had a native resolution of 1024x768 pixels. In May 2001, Apple released a 17" Studio Display (Model No: M7649) with a native resolution of 1280x1024 at an MSRP of $999. On January 28, 2003, the price was lowered to $699 and the 15" Studio Display was discontinued, leaving the 17" Studio Display as the last available model in the Apple Studio Display line, with no successor in sight. In June 2004, Apple retired the 17" Studio Display and the Apple Studio Display line in favor of their widescreen line, the Apple Cinema Display. Apple reused the "Studio Display" name nearly 18 years later, for a different display model, launched in March 2022. CRT models (1999–
https://en.wikipedia.org/wiki/C-lehti
C-lehti (sometimes written as C=lehti) ('C-magazine') was a Finnish computer magazine targeted specifically at Commodore computers. It was in circulation between 1987 and 1992. History and profile C-lehti was started in 1987 as a spin-off of MikroBitti and was published six times per year. It was Finland's first ever computer magazine to only cover one specific family of computers. Originally, it covered the Commodore 64 (and to a lesser extent, its "bigger brother" Commodore 128) and the Amiga computers, but later it became more and more Amiga-centric, as the 64 and 128 were rapidly becoming obsolete. The magazine was part of Sanoma. Later, as the Amiga was also becoming obsolete and lost market share to the PC computers and games consoles, C-lehti discontinued and was renamed Pelit in 1992. There were 29 magazine issues in total. A character in C-lehti was the Guru, drawn by Harri "Wallu" Vaalio. The Guru, a bald man with a bushy beard and a shiny scalp, was the symbol for the magazine's hints and tips column. For hints & tips in computer games, he was called the Peliguru ("game guru") and had a joystick on top of his head. The Guru was never used again after the magazine was discontinued. References External links Table of content of several issues 1987 establishments in Finland 1992 disestablishments in Finland Amiga magazines Bi-monthly magazines published in Finland Commodore 8-bit computer magazines Computer magazines published in Finland Defunct computer magazines Defunct magazines published in Finland Finnish-language magazines Magazines established in 1987 Magazines disestablished in 1992
https://en.wikipedia.org/wiki/Gradius%202
Gradius 2 may refer to: Gradius 2, a 1987 computer game. Gradius II, a 1988 arcade game. These are two games in the same series, but they are otherwise unrelated.
https://en.wikipedia.org/wiki/RMIT%20School%20of%20Electrical%20and%20Computer%20Engineering
The RMIT School of Electrical and Computer Engineering was an Australian tertiary education school within the College of Science, Engineering and Health of RMIT University. In 2016, the School of Electrical and Computer Engineering, the School of Civil, Environmental and Chemical Engineering and the School of Aerospace, Mechanical and Manufacturing Engineering were merged into a single School of Engineering, with campuses in the Melbourne CBD and Bundoora, Victoria. See also RMIT University School of Electrical and Computer Engineering, RMIT
https://en.wikipedia.org/wiki/Aotearoa%20People%27s%20Network%20Kaharoa
Aotearoa People's Network Kaharoa provides free internet access to public libraries in New Zealand (). Funding is provided by the New Zealand Government by way of the Community Partnership Fund and the National Library of New Zealand. The service, established in 2007, is based in the Christchurch office of the National Library. It is governed by a Governance Group which has included people such as Paul Reynolds. The network supplies and maintains desktop computers and WiFi equipment at around 120 partner libraries, and provides them with filtered internet access in conjunction with internet service provider Snap. , all partner libraries receive the equipment and access at no cost, although the APNK governance group periodically reviews funding arrangements. In October 2009, Aotearoa People’s Network Kaharoa won the 3M Award for Innovation in Libraries. In October 2010, Aotearoa People’'s Network Kaharoa won "Best Access Initiative 2010" from the Australia and New Zealand Internet Best Practice Awards. The Māori term kaharoa expresses the idea of a large net. References External links Aotearoa People’s Network Kaharoa Aotearoa People’s Network Kaharoa at the National Library of New Zealand Internet in New Zealand Libraries in New Zealand 2007 establishments in New Zealand
https://en.wikipedia.org/wiki/Philip%20Beresford
Philip Beresford was the compiler of the Sunday Times Rich List, which is compiled in January every year featuring the richest 1,000 people in the United Kingdom. He retired in 2016. Beresford also does interviews and news stories with influential people. He is known as an expert on charitable giving by the wealthy. References British male journalists Living people Year of birth missing (living people)
https://en.wikipedia.org/wiki/Data%20system
Data system is a term used to refer to an organized collection of symbols and processes that may be used to operate on such symbols. Any organised collection of symbols and symbol-manipulating operations can be considered a data system. Hence, human-speech analysed at the level of phonemes can be considered a data system as can the Incan artefact of the khipu and an image stored as pixels. A data system is defined in terms of some data model and bears a resemblance to the idea of a physical symbol system. Symbols within some data systems may be persistent or not. Hence, the sounds of human speech are non-persistent symbols because they decay rapidly in air. In contrast, pixels stored on some peripheral storage device are persistent symbols. Education In education, a data system is a computer system that aims to provide educators with student data to help solve educational problems. Examples of data systems include Student Information Systems (SISs), assessment systems, Instructional Management Systems (IMSs), and data-warehousing systems, but distinctions between different types of data systems are blurring as these separate systems begin to serve more of the same functions. Data systems that present data to educators in an over-the-counter data format embed labels, supplemental documentation, and help system and make key package/display and content decisions to improve the accuracy of data system users’ data analyses. See also CRUD Data processing Longitudinal data system Paul Beynon-Davies Persistent data structure Persistence (computer science) References Information systems Databases
https://en.wikipedia.org/wiki/Delta%20Wave
Delta Wave was a British children's science fiction television drama series produced by Tetra Films. It aired on the ITV network from 3 January to 6 March 1996, lasting only a single 10-episode season. The show centered on three main characters, Dr. Ruby Munro and two children with psychic powers named Julia and Ed. The three have a series of adventures and strange encounters, including time travel back to the Victorian era. The main cast included Robin McCaffrey as Dr. Ruby Munro, Ania Sowinski as Julia Stone and Jason Stracey as Ed Curtis. Additional cast included Una Stubbs who appeared in 4 episodes, Victoria Wicks who appeared in 4 episodes, and Peter Capaldi who appeared in 2 episodes. Episodes Delta Wave consisted of five main storylines, each being split into 2 parts, with one episode broadcast per week (10 episodes in total). The episode titles and their transmission dates were as listed below; A Twist of Lemming: Parts 1 & 2 (3 – 10 January 1996) A Glitch in Time: Parts 1 & 2 (17 – 24 January 1996) Dodgy Jammers: Parts 1 & 2 (31 January - 7 February 1996) The Light Fantastic: Parts 1 & 2 (14 – 21 February 1996) Something Fishy: Parts 1 & 2 (28 February - 6 March 1996) References British children's science fiction television series 1996 British television series debuts 1996 British television series endings 1990s British science fiction television series ITV children's television shows Television series by Fremantle (company) Television series by ITV Studios Television shows produced by Meridian Broadcasting
https://en.wikipedia.org/wiki/Cabanes%2C%20Girona
Cabanes is a municipality in the comarca of Alt Empordà, Girona, Catalonia, Spain. References External links Government data pages Municipalities in Alt Empordà
https://en.wikipedia.org/wiki/Peramola
Peramola is a municipality in the comarca of the Alt Urgell in Catalonia, Spain. References External links Government data pages Municipalities in Alt Urgell
https://en.wikipedia.org/wiki/El%20Pont%20de%20Bar
El Pont de Bar is a municipality in the comarca of the Alt Urgell in Catalonia, Spain. References External links Government data pages Municipalities in Alt Urgell
https://en.wikipedia.org/wiki/Ribera%20d%27Urgellet
Ribera d'Urgellet is a municipality in the comarca of the Alt Urgell in Catalonia, Spain. It includes a small exclave to the west. References External links Government data pages Municipalities in Alt Urgell
https://en.wikipedia.org/wiki/International%20Society%20of%20Military%20Sciences
The International Society of Military Sciences (ISMS) is an international organization whose stated aim is to build a strong network for the creation, development, exchange and diffusion of research and knowledge about war, conflict management and peace support efforts. The ISMS was founded in October 2008. The Austrian National Defence Academy, the Royal Military College of Canada, the Royal Danish Defence College, the Finnish National Defence University, the Netherlands Defence Academy, the Norwegian Defence University College, the Swedish National Defence College and the Baltic Defence College established this society with the intention to further research and academic education in military arts and sciences in the broadest sense. Establishing the ISMS In the summer of 2007 the Faculty of Military Sciences, Netherlands Defence Academy, started working on more international collaboration on an institutional level. Canada, Sweden and Austria were the first military institutes and universities which were approached for collaboration. Soon four other institutes joined in. In November 2011, the War Studies University in Warsaw and the Royal Military Academy (Belgium) were voted in. The Royal Military Academy of Belgium withdrew their membership before the council meeting in Oslo, May 2017. The latest induction to the ISMS is the Military University Institute in Portugal that was inducted during the Council meeting in Vienna, November 2019. Letter of Intent The formal signing of the Letter of Intent was on October 22, 2008 in Copenhagen. That day the participating academies also decided to formally present the ISMS in November 2009 during its first annual international conference which was to be held in the Netherlands. The theme of this first conference was “Security in 2020 in a Multi-Polar World”. Letter of Intent 1) The undersigned institutions of Austria, Canada, Denmark, Finland, the Netherlands, Norway, and Sweden, and the Baltic Defence College (later referred to as the institutions) agree to establish a society intended to further research and academic education in military arts and sciences in the broadest sense. This association is titled International Society of Military Sciences (hereafter referred to as the Society). 2) The purpose of the Society is to build a network for the creation, development, exchange and diffusion of research and knowledge about war, conflict management and peace support efforts. 3) The Society will establish an annual conference, and one or more workshops per year. Activities include communications and publications to support a research network within topics such as: war studies; military history; military technology; command and control, leadership and basic competence; law and ethics; security and defence policy and strategy; armed forces and society; and defence economics and management. These are detailed in Annex A. 4) The representatives of the member institutions constitute the Council as th
https://en.wikipedia.org/wiki/Joker%20%28Slovenian%20magazine%29
Joker was a Slovenian monthly magazine based in Ljubljana. Started as a computer gaming magazine, it has expanded into reviewing books, movies, educational articles of a general nature and much more. Known for having an interesting writing style which also includes archaic and neologistic Slovene words. History Joker was founded in May 1992 under the wing of Moj mikro. The first edition was duotone and because of poor sales it was cancelled. In September 1993 it was revived as a half-sized addition to Moj Mikro. In January 1994 it had grown into an independent magazine of full size format. A compact disc was added in December 1995 and a website was launched in March 1996. In December 2000 Joker became the first Slovenian magazine and one of the first in the world to include a DVD with every copy. From 2015 Joker had a digital edition for iOS and Android. It also had a website with an archive containing much of the content from the magazine and one of the largest Slovenian online message boards called mn3njalnik. Gnojišče is a sub forum on this board and is the Slovenian equivalent of /b/. The magazine was closed in 2017. See also List of magazines in Slovenia External links 1992 establishments in Slovenia 2017 disestablishments in Slovenia Defunct magazines published in Slovenia Magazines established in 1992 Magazines disestablished in 2017 Mass media in Ljubljana Monthly magazines Slovene-language magazines Video game magazines
https://en.wikipedia.org/wiki/Harrison%20Mixbus
Harrison Mixbus is a digital audio workstation (DAW) available for Microsoft Windows, Mac OS X systems, and Linux operating systems, and version 1 was released in 2009. Mixbus uses a modern DAW model incorporating a "traditional" analog mixing workflow. It has built-in proprietary analog-modeled processing, based on Harrison's 32-series and MR-series analog music consoles. Mixbus is based on Ardour, the open-source DAW, but is sold and marketed commercially by Harrison Audio Consoles. Features of Mixbus Mixbus has the features of Ardour, with additional functionality from proprietary DSP, replicating the workflow, signal path, and sound of a Harrison console. Each channel strip in Mixbus features analog modeled 3 bands EQ (including a high pass filter), compression (with 3 compressor types), panning, and summing. It includes 8 stereo mixbuses featuring tone controls, tape saturation, and compression (including a sidechain compressor). The master bus is similar to the mix buses but has the addition of a limiter, a K14 meter for loudness monitoring, and a stereo correlation meter. Mixbus started as an audio-only workstation. In earlier versions, it also depended on the JACK audio server as its backend. Since version 3, Mixbus supports both audio and MIDI tracks and it no longer depends on JACK, although JACK can still be used as one of its audio backends. See also List of MIDI editors and sequencers References Audio editing software for Linux Linux Digital audio editors for Linux Digital audio recording Digital audio workstation software Linux software MacOS audio editors
https://en.wikipedia.org/wiki/Outline%20of%20software
The following outline is provided as an overview of and topical guide to software: Software – collection of computer programs and related data that provides the information for the functioning of a computer. It is held in various forms of memory of the computer. It comprises procedures, algorithms, and documentation concerned with the operation of a data processing system. The term was coined to contrast to the term hardware, meaning physical devices. In contrast to hardware, software "cannot be touched". Software is also sometimes used in a more narrow sense, meaning application software only. Sometimes the term includes data that has not traditionally been associated with computers, such as film, tapes, and records. Types Application software – end-user applications of computers such as word processors or video games, and ERP software for groups of users. Business software Computer-aided design Databases Decision-making software Educational software Emotion-sensitive software Image editing Industrial automation Mathematical software Medical software Molecular modeling software Quantum chemistry and solid state physics software Simulation software Spreadsheets Telecommunications (i.e., the Internet and everything that flows on it) Video editing software Video games Word processors Middleware controls and co-ordinates distributed systems. Programming languages – define the syntax and semantics of computer programs. For example, many mature banking applications were written in the language COBOL, invented in 1959. Newer applications are often written in more modern languages. System software – provides the basic functions for computer usage and helps run the computer hardware and system. It includes a combination of the following: Device driver Operating system Package management system Server Utility Window system Teachware – any special breed of software or other means of product dedicated to education purposes in software engineering and beyond in general education. Testware – any software for testing hardware or software. Firmware – low-level software often stored on electrically programmable memory devices. Firmware is given its name because it is treated like hardware and run ("executed") by other software programs. Firmware often is not accessible for change by other entities but the developers' enterprises. Shrinkware is the older name given to consumer-purchased software, because it was often sold in retail stores in a shrink wrapped box. Device drivers – control parts of computers such as disk drives, printers, CD drives, or computer monitors. Programming tools – assist a programmer in writing computer programs, and software using various programming languages in a more convenient way. The tools include: Compilers Debuggers Interpreters Linkers Text editors Profilers Integrated development environments (IDE) – single application for managing all of these functions. Products By publisher List of
https://en.wikipedia.org/wiki/Andrew%20Martin%20%28computer%20scientist%29
Andrew Martin is a British computer scientist at the University of Oxford, England, where he is Professor of Systems Security, Director of the Centre for Doctoral Training in Cyber Security (2013-2023) and deputy director and lecturer in Software Engineering Programme. He is a member of the Oxford University Department of Computer Science. Education He obtained BA in Mathematics and Computation (1986–1989) and DPhil in Machine-Assisted Theorem Proving for Software Engineering (1991–1994) from the University of Oxford. Career After his first degree, he joined Praxis High Integrity Systems, Bath as Industrial Software Engineer. After his DPhil, he became Research Fellow at the Software Verification Research Centre in the University of Queensland in Australia. Before taking up his current post in 1999, he was briefly a lecturer in the University of Southampton. Publications Martin's publications cover software engineering, security, trusted computing in general and formal methods in particular References External links Year of birth missing (living people) Living people Alumni of the University of Oxford English computer scientists British computer scientists Academic staff of the University of Queensland Academics of the University of Southampton Members of the Department of Computer Science, University of Oxford Fellows of Kellogg College, Oxford Formal methods people
https://en.wikipedia.org/wiki/Ahlulbayt%20TV
Ahlulbayt Television Network is the first exclusively English-language Shia Islamic television channel. The channel was launched with much fanfare on Sky in the UK on 17 August 2009 and two months later on the Galaxy 19 platform covering North America from its London headquarters. A few months into its operations it also expanded to Atlantic Bird 4A (Nilesat) which covers the Middle East and North Africa. The channel now broadcasts by satellite only from Astra 2G at 28.2°E The nonprofit religious channel, whose name is Arabic for the 'Holy Household', referring to the progeny of the Islamic prophet, Muhammad, is staffed by British professionals from various backgrounds. In an interview in 2004 with a Kuwaiti magazine, Sayed Mahdi al-Modarresi had announced his hopes to launch the channel to "show the true, undistorted nature of Islam and Islamic civilization to the West". Ahlulbayt TV frequently features prominent Shia Muslims scholars and intellectuals including Sayed Fadhel Milani, Sayed Mahdi Modarresi, Sayed Mustafa Qazwini, Sayed Mohammad Rizvi, Sayed Mohammed Mousawi, Rebecca Masterton, Zahra Al Alawi, Amina Inloes, as well as others, and also broadcast live video feeds from the Holy City of Karbala. The network's line-up includes several live call-in shows featuring guests who are invited to discuss religious and social matters. The channel, which seems to enjoy great popularity amongst Western-born Muslim youths, was also featured in Shelina Janmohamed's book Generation M: Young Muslims Changing the World. The channel preaches moderation and has several shows dedicated to women, presented by females from various backgrounds. "Reverts World" is also a weekly show dedicated to highlighting the challenges faced by converts. Its stated aim is to "serve the new generation of Muslims living in the West, addressing contemporary issues through cutting-edge programming and world-class shows" In early 2010 the channel launched its on-screen news ticker which frequently condemned "terrorist attacks" and extremist statements. To refocus the channel towards its religious and cultural ethos, the news ticker has since been taken down. The channel's financial backing comes from viewers' donations and frequently asks viewers to partner with it in addition to ads and sponsorships. References External links Council of European Jamaats Press Release World Federation of KSIAM Press Release Islamic television networks English-language television stations Shia media
https://en.wikipedia.org/wiki/Global%20Footprint%20Network
The Global Footprint Network was founded in 2003 and is an independent think tank originally based in the United States, Belgium and Switzerland. It was established as a charitable not-for-profit organization in each of those three countries. Its aim is to develop and promote tools for advancing sustainability, including the ecological footprint and biocapacity, which measure the amount of resources we use and how much we have. These tools aim at bringing ecological limits to the center of decision-making. Work Global Footprint Network's goal is to create a future where all humans can live well, within the means of one planet Earth. The organization is headquartered in Oakland, California. The Network brings together over 70 partner organizations, including WWF International, ICLEI, Bank Sarasin, The Pictet Group, the New Economics Foundation, Pronatura México, and the Environment Agency Abu Dhabi. National Footprint and Biocapacity Accounts Every year, Global Footprint Network produced a new edition of its National Footprint and Biocapacity Accounts, which calculate Ecological Footprint and biocapacity of more than 200 countries and territories from 1961 to the present. Based on up to 15,000 data points per country per year, these data have been used to influence policy in more than a dozen countries, including Ecuador, France, Germany, Japan, Korea, the Philippines, Russia, Switzerland, and the United Arab Emirates. Since 2019, the National Footprint and Biocapacity Accounts are produced in collaboration between Global Footprint Network, York University, and Footprint Data Foundation. The 2022 Edition of the National Footprint and Biocapacity Accounts cover 1961-2018 (latest UN data available), and incorporate data from the Food and Agriculture Organization, the UN Comtrade database, the International Energy Agency, and over 20 other sources. Ecological Footprint Explorer In April 2017, Global Footprint Network launched the Ecological Footprint Explorer, an open data platform for the National Footprint and Biocapacity Accounts. The website provides ecological footprint results for over 200 countries and territories, and encourages researchers, analysts, and decision-makers to visualize and download data. Earth Overshoot Day Previously known as Ecological Debt Day, Earth Overshoot Day is the day when humanity has exhausted nature's budget for the year. For the rest of the year, society operates in ecological overshoot by drawing down local resource stocks and accumulating carbon dioxide in the atmosphere. The first Earth Overshoot Day was December 19, 1987. In 2014, Earth Overshoot Day was August 19. The Earth Overshoot Day in 2015 was on August 13 and on August 8 in 2016. In 2017, Earth Overshoot Day landed on August 2, and in 2020 on August 22. Founding In 2003, Mathis Wackernagel, PhD, and Susan Burns founded Global Footprint Network, an international think-tank headquartered in Oakland, California, with offices in Geneva and Bru
https://en.wikipedia.org/wiki/Budayeen%20Nights
Budayeen Nights is a collection of cyberpunk science fiction short stories and novelettes by George Alec Effinger, published in 2003. The work consists of nine individual stories by Effinger, with a foreword and story introductions by Barbara Hambly. Seven of the nine stories had been published previously in other forms, such as magazines, while one consists of the first two chapters of Word of Night, which was to be the fourth book in the Marîd Audran series, following The Exile Kiss. Budayeen Nights was published posthumously; Effinger having died in April 2002. The paperback edition was released in September 2008. List of stories Most of the stories in Budayeen Nights had been previously published in magazines and fiction anthologies, but the book includes two previously-unpublished works of Effinger's. "The City on the Sand", originally published in The Magazine of Fantasy and Science Fiction, April 1973 "King of the Cyber Rifles", originally published in Isaac Asimov's Science Fiction Magazine, Mid-December 1987 "Marîd and the Trail of Blood", originally published in Sisters of the Night, 1995: "Marîd Changes His Mind", originally published in Isaac Asimov's Science Fiction Magazine, May 1989 "Marîd Throws a Party", previously unpublished, this was to be the first two chapters of Word of Night "The Plastic Pasha", previously unpublished "Schrödinger's Kitten", originally published in Omni, September 1988 "Slow, Slow Burn", originally published in Playboy, May 1988 "The World as We Know It", originally published in Futurecrime, 1992: References 2003 short story collections Science fiction short story collections Cyberpunk short stories Books published posthumously
https://en.wikipedia.org/wiki/Donald%20Prell
Donald B. Prell (July 7, 1924 – July 28, 2020) was an American World War II veteran, venture capitalist and futurist who created Datamation, the first magazine devoted solely to the computer hardware and software industry. Early life Prell was born in Los Angeles, California, and graduated from Los Angeles High School in the summer of 1942. In his freshman year at UCLA, he enlisted in the US Army. In 1944, aged 19, he graduated from Officer Candidate School, Ft. Benning, Georgia, and was commissioned a 2nd Lieutenant, Infantry. Serving in the European Theater of Operations in command of the second platoon of the Anti-Tank Company, 422nd Regiment, 106th Division, during the Battle of the Bulge, December 16–19, 1944, he was wounded and captured. Captured at the same time as Prell was Richard Bordeaux Parker, who commanded the first platoon of the Anti-Tank Company. On March 27, 1945, he was briefly freed by Task Force Baum, a clandestine U.S. Army mission to liberate Oflag XIII-B authorized by General George S. Patton, then commanding the Third Army. The raid was a fiasco, with many POW casualties, including Patton's son-in-law, Lt. Colonel John K. Waters, who was seriously wounded. (Patton reported the raid as the only mistake he made during World War II and General Dwight D. Eisenhower reprimanded him for it.) Prell's freedom lasted only a few days as he was recaptured after attempting to locate friendly forces. A month later, he escaped from a POW camp south of Nuremberg, and found his way to freedom. After the war, he resumed undergraduate studies at UCLA and graduated in 1948. While at UCLA, he was an active member of the American Veterans Committee, which was committed to integrating the U.S. military. Prell was involved with successfully ending racial discrimination of patrons at Oakley's Barbershop in Westwood. Prell was a Ph.D. candidate in Psychology with Hans Eysenck's Program Research Team at the University of London from 1948-1951. It was here that he learned to use Hollerith punched card tabulation machines, the forerunner of today's digital computers. Professional career Whilst studying for his graduate degree at the University of London (1948–1950) he was employed as a Psychologist at the West Park Hospital, Epsom, Surrey. During the 1950s, Prell worked with Rand Corporation futurist Herman Kahn, who later founded the Hudson Institute in New York. In this period he was associated with many of the early designers of high-speed computer input-output devices, analog to digital converters, and digital display plotters, including working with Bernard Benson of the Benson-Lehner Corporation. In 1957, working with Thomson Publications, he created Datamation, the first magazine dedicated solely to the emerging computer-data-processing industry. In 1961, he was president, and the major shareholder, of Electro-Radiation, Inc, a Santa Monica, California firm specializing in molecular electronics and electroluminescence. Later, he
https://en.wikipedia.org/wiki/Home%20screen
A home screen, homescreen, or start screen, is the main screen on a device or computer program. Home screens are not identical because users rearrange icons as they please, and home screens often differ across mobile operating systems. Almost every smartphone has some form of home screen, which typically displays links to applications, settings, and notifications. Common features Home screens usually consist of a grid of application links or shortcuts that can often be arranged over multiple pages, and serve as the user's main method of accessing phone functions. Home screens also tend to include a dock along an edge of the screen, where application links can be stored and accessed from any page on the home screen. Most operating systems allow users to add folders to the home screen in order to further organize application links. Some home screens may also include a panel where push notifications are displayed or select system settings can be accessed. In addition to applications links, many home screens are also capable of displaying ambient information, such as live tiles on Windows Phone or widgets on Android. Such tiles or widgets may link to applications, however they differ from traditional links in that they show current, dynamic information instead of a static icon. However, the increased relevance of the information can come at the cost of device battery life, bandwidth, and the ease of recognition afforded by static application icons. Alternative home screens Although most home screens have a similar structure, not all are designed in common. Two notable examples of less-common home screens paradigms include Siri and WebOS. The former is Apple's natural language user interface, which performs functions similar to more traditional home screens such as opening applications, displaying relevant data, and managing phone settings. The latter is notable for its use of entirely dynamic application icons that mimic the current state of the application, similar to task managers on other mobile operating systems. Although most mobile operating systems include a default home screen, some devices also allow the user to replace the native home screen with a different application or third-party home screen, allowing for additional home screen paradigms. History One of the first examples of a home screen can be found on the PalmPilot, which debuted in 1997. Early home screens were often less customizable than current iterations. For example, early versions of iOS did not allow users to rearrange applications on the home screen or change the background image. Because home screens often serve as the main method for interacting with mobile operating systems, they tend to change slowly, if at all, across updates to the operating system. See also Mobile operating system Smartphone Home Page Comparison of desktop application launchers References Mobile operating systems
https://en.wikipedia.org/wiki/Uppland%20Runic%20Inscription%20614
The Torsätra runestone, cataloged by Rundata as runic inscription U 614, is a Viking Age memorial runestone originally located in Torsätra, which is around 8 kilometers northeast of Bro, Stockholm County, Sweden, which is in the historic province of Uppland. Description The Torsätra runestone was raised in memory of one of the Swedish king's tribute collectors who fell ill and died during a trip to Gotland. The granite stone is 1.45 meters in height and was originally located near runestone U 613 in Torsätra. The stone was moved from its original location in 2005 to allow construction on a military training area, and is currently in the Swedish Museum of National Antiquities in Stockholm. It is considered to be a good example of runestone style Pr3, which is also known as the Urnes style. This runestone style is characterized by slim and stylized animals that are interwoven into tight patterns. The animal heads are typically seen in profile with slender almond-shaped eyes and upwardly curled appendages on the noses and the necks. The inscription is unsigned but, along with U 613, has been attributed to the runemaster Visäte, who was active in the last half of the eleventh century. This attribution dates the inscription from about 1060 to 1070. Eight surviving runestones that are signed by Visäte include U 74 in Husby, U 208 in Råcksta, U 236 in Lindö, U 337 in Granby, U 454 in Kumla, U 669 in Kålsta, U 862 in Säva, and U Fv1946;258 in Fällbro, and over twenty others have been attributed to this runemaster based on stylistic analysis. Although U 613 and U 614 have somewhat different designs, with U 614 having no cross, Visäte is known to have varied his composition when a second runestone was raised near another of his. Another pair of his runestones with differing designs are U 293 and U Fv1972;172 at Lilla Vilunda, with U 293 having a design similar to U 613 and the other having a quite different design with one intertwined serpent that is above a runic band that cuts across the bottom of the inscription and no cross. The runic text states that the stone was raised by two brothers in memory of their brother, who was named either Húsbjǫrn or Ásbjǫrn, who fell ill and died while abroad in Gotland. The inscription has the runes kialt * toku * a kutlanti * or gjald tóku á Gotlandi ("took payment on Gotland") carved outside of the serpent. Gjald is a term used to refer to payments taken in England on runestones Sö 166 in Grinda, U 194 in Väsby, U 241 in Lingsberg, U 344 in Yttergärde, and Vg 119 in Sparlösa (where the context is unclear), and from this U 614 is cited as evidence that a Swedish king collected tribute or taxes from Gotland. Other runestones which mention Gotland include Sö 174 in Aspö, the now-lost U 414 in Norrsunda, U 527 in Frötuna, DR 220 in Sønder Kirkeby, DR 259 in Fuglie, possibly Sö 47 in Vålsta, where the text has been damaged, and with U 375 in Vidbo referring to a location on Gotland. U 527, similar to U 614, states that
https://en.wikipedia.org/wiki/Calonge%20de%20Segarra
Calonge de Segarra is a municipality in the comarca of the Anoia in Catalonia, Spain. References External links Government data pages Municipalities in Anoia
https://en.wikipedia.org/wiki/Castellfollit%20de%20Riubreg%C3%B3s
Castellfollit de Riubregós () is a municipality in the comarca of the Anoia in Catalonia, Spain. References External links Government data pages Municipalities in Anoia
https://en.wikipedia.org/wiki/Castellol%C3%AD
Castellolí is a municipality in the comarca area of the Anoia in Catalonia, Spain. References External links Government data pages Municipalities in Anoia
https://en.wikipedia.org/wiki/Copons
Copons is a municipality in the comarca of the Anoia in Catalonia, Spain. References External links Government data pages Municipalities in Anoia
https://en.wikipedia.org/wiki/Jorba
Jorba is a municipality in the comarca of the Anoia in Catalonia, Spain. References External links Government data pages Municipalities in Anoia
https://en.wikipedia.org/wiki/Montmaneu
Montmaneu () is a municipality in the comarca of the Anoia in Catalonia, Spain. References External links Government data pages Municipalities in Anoia
https://en.wikipedia.org/wiki/Orp%C3%AD
Orpí is a municipality in the comarca of the Anoia in Catalonia, Spain. References External links Government data pages Municipalities in Anoia
https://en.wikipedia.org/wiki/Els%20Prats%20de%20Rei
Els Prats de Rei is a municipality in the comarca of the Anoia in Catalonia, Spain. References External links Government data pages Municipalities in Anoia
https://en.wikipedia.org/wiki/Sant%20Mart%C3%AD%20Sesgueioles
Sant Martí Sesgueioles is a municipality in the comarca of the Anoia in Catalonia, Spain. References External links Government data pages Municipalities in Anoia
https://en.wikipedia.org/wiki/Sant%20Mart%C3%AD%20de%20Tous
Sant Martí de Tous is a municipality in the comarca of the Anoia in Catalonia, Spain. References External links Government data pages Municipalities in Anoia
https://en.wikipedia.org/wiki/Sant%20Pere%20Sallavinera
Sant Pere Sallavinera is a municipality in the comarca of the Anoia in Catalonia, Spain. References External links Government data pages Municipalities in Anoia
https://en.wikipedia.org/wiki/Santa%20Maria%20de%20Miralles
Santa Maria de Miralles is a municipality in the comarca of the Anoia in Catalonia, Spain. References External links Government data pages Municipalities in Anoia
https://en.wikipedia.org/wiki/Arres
Arres is a municipality in western Aran, Catalonia. It had 61 inhabitants as of 2022. It is located in the terçon of Irissa. References External links Government data pages Municipalities in Val d'Aran
https://en.wikipedia.org/wiki/Bausen
Bausen is a municipality in the northwest of Aran, Catalonia. It had 66 inhabitants as of 2022. It is located in the terçon of Quate Lòcs. References External links Government data pages Municipalities in Val d'Aran
https://en.wikipedia.org/wiki/Master%20boot%20record
A master boot record (MBR) is a special type of boot sector at the very beginning of partitioned computer mass storage devices like fixed disks or removable drives intended for use with IBM PC-compatible systems and beyond. The concept of MBRs was publicly introduced in 1983 with PC DOS 2.0. The MBR holds the information on how the disc's sectors (aka “blocks”) are divided into partitions, each partition notionally containing a file system. The MBR also contains executable code to function as a loader for the installed operating system—usually by passing control over to the loader's second stage, or in conjunction with each partition's volume boot record (VBR). This MBR code is usually referred to as a boot loader. The organization of the partition table in the MBR limits the maximum addressable storage space of a partitioned disk to 2 TiB . Approaches to slightly raise this limit utilizing 32-bit arithmetic or 4096-byte sectors are not officially supported, as they fatally break compatibility with existing boot loaders, most MBR-compliant operating systems and associated system tools, and may cause serious data corruption when used outside of narrowly controlled system environments. Therefore, the MBR-based partitioning scheme is in the process of being superseded by the GUID Partition Table (GPT) scheme in new computers. A GPT can coexist with an MBR in order to provide some limited form of backward compatibility for older systems. MBRs are not present on non-partitioned media such as floppies, superfloppies or other storage devices configured to behave as such, nor are they necessarily present on drives used in non-PC platforms. Overview Support for partitioned media, and thereby the master boot record (MBR), was introduced with IBM PC DOS 2.0 in March 1983 in order to support the 10 MB hard disk of the then-new IBM Personal Computer XT, still using the FAT12 file system. The original version of the MBR was written by David Litton of IBM in June 1982. The partition table supported up to four primary partitions, of which DOS could only use one. This did not change when FAT16 was introduced as a new file system with DOS 3.0. Support for an extended partition, a special primary partition type used as a container to hold other partitions, was added with DOS 3.2, and nested logical drives inside an extended partition came with DOS 3.30. Since MS-DOS, PC DOS, OS/2 and Windows were never enabled to boot off them, the MBR format and boot code remained almost unchanged in functionality, except for in some third-party implementations, throughout the eras of DOS and OS/2 up to 1996. In 1996, support for logical block addressing (LBA) was introduced in Windows 95B and DOS 7.10 in order to support disks larger than 8 GB. Disk timestamps were also introduced. This also reflected the idea that the MBR is meant to be operating system and file system independent. However, this design rule was partially compromised in more recent Microsoft implementations
https://en.wikipedia.org/wiki/Computational%20musicology
Computational musicology is an interdisciplinary research area between musicology and computer science. Computational musicology includes any disciplines that use computation in order to study music. It includes sub-disciplines such as mathematical music theory, computer music, systematic musicology, music information retrieval, computational musicology, digital musicology, sound and music computing, and music informatics. As this area of research is defined by the tools that it uses and its subject matter, research in computational musicology intersects with both the humanities and the sciences. The use of computers in order to study and analyze music generally began in the 1960s, although musicians have been using computers to assist them in the composition of music beginning in the 1950s. Today, computational musicology encompasses a wide range of research topics dealing with the multiple ways music can be represented. History This history of computational musicology generally began in the middle of the 20th century. Generally, the field is considered to be an extension of a much longer history of intellectual inquiry in music that overlaps with science, mathematics, technology, and archiving. 1960s Early approaches to computational musicology began in the early 1960s and were being fully developed by 1966. At this point in time data entry was done primarily with paper tape or punch cards and was computationally limited. Due to the high cost of this research, in order to be funded projects often tended to ask global questions and look for global solutions. One of the earliest symbolic representation schemes was the Digital Alternate Representations of Music or DARMS. The project was supported by Columbia University and the Ford Foundation between 1964 and 1976. The project was one of the initial large scale projects to develop an encoding scheme that incorporated completeness, objectivity, and encoder-directedness. Other work at this time at Princeton University chiefly driven by Arthur Mendel, and implemented by Michael Kassler and Eric Regener helped push forward the Intermediary Musical Language (IML) and Music Information Retrieval (MIR) languages that later fell out of popularity in the late 1970s. The 1960s also marked a time of documenting bibliographic initiatives such as the Repertoire International de Literature Musicale (RILM) created by Barry Brook in 1967. 1970s Unlike the global research interests of the 1960s, goals in computational musicology in the 1970s were driven by accomplishing certain tasks. This task driven motivation lead to the development of MUSTRAN for music analysis by lead by Jerome Wenker and Dorothy Gross at Indiana University. Similar projects like SCORE (SCORE-MS) at Stanford University was developed primarily for printing purposes. 1980s The 1980s were the first decade to move away from centralized computing and move towards that of personalized computing. This transference of resources led to growt
https://en.wikipedia.org/wiki/Assumed%20mean
In statistics the assumed mean is a method for calculating the arithmetic mean and standard deviation of a data set. It simplifies calculating accurate values by hand. Its interest today is chiefly historical but it can be used to quickly estimate these statistics. There are other rapid calculation methods which are more suited for computers which also ensure more accurate results than the obvious methods. Example First: The mean of the following numbers is sought: 219, 223, 226, 228, 231, 234, 235, 236, 240, 241, 244, 247, 249, 255, 262 Suppose we start with a plausible initial guess that the mean is about 240. Then the deviations from this "assumed" mean are the following: −21, −17, −14, −12, −9, −6, −5, −4, 0, 1, 4, 7, 9, 15, 22 In adding these up, one finds that: 22 and −21 almost cancel, leaving +1, 15 and −17 almost cancel, leaving −2, 9 and −9 cancel, 7 + 4 cancels −6 − 5, and so on. We are left with a sum of −30. The average of these 15 deviations from the assumed mean is therefore −30/15 = −2. Therefore, that is what we need to add to the assumed mean to get the correct mean: correct mean = 240 − 2 = 238. Method The method depends on estimating the mean and rounding to an easy value to calculate with. This value is then subtracted from all the sample values. When the samples are classed into equal size ranges a central class is chosen and the count of ranges from that is used in the calculations. For example, for people's heights a value of 1.75m might be used as the assumed mean. For a data set with assumed mean x0 suppose: Then or for a sample standard deviation using Bessel's correction: Example using class ranges Where there are a large number of samples a quick reasonable estimate of the mean and standard deviation can be got by grouping the samples into classes using equal size ranges. This introduces a quantization error but is normally accurate enough for most purposes if 10 or more classes are used. For instance with the exception, 167.8 175.4 176.1 166 174.7 170.2 178.9 180.4 174.6 174.5 182.4 173.4 167.4 170.7 180.6 169.6 176.2 176.3 175.1 178.7 167.2 180.2 180.3 164.7 167.9 179.6 164.9 173.2 180.3 168 175.5 172.9 182.2 166.7 172.4 181.9 175.9 176.8 179.6 166 171.5 180.6 175.5 173.2 178.8 168.3 170.3 174.2 168 172.6 163.3 172.5 163.4 165.9 178.2 174.6 174.3 170.5 169.7 176.2 175.1 177 173.5 173.6 174.3 174.4 171.1 173.3 164.6 173 177.9 166.5 159.6 170.5 174.7 182 172.7 175.9 171.5 167.1 176.9 181.7 170.7 177.5 170.9 178.1 174.3 173.3 169.2 178.2 179.4 187.6 186.4 178.1 174 177.1 163.3 178.1 179.1 175.6 The minimum and maximum are 159.6 and 187.6 we can group them as follows rounding the numbers down. The class size (CS) is 3. The assumed mean is the centre of the range from 174 to 177 which is 175.5. The differences are counted in classes. The mean is then estimated to be which is very close to the actual mean of 173.846. The standard deviation is estimated as References Means
https://en.wikipedia.org/wiki/Islamic%20World%20Science%20Citation%20Database
Islamic World Science Citation Database (ISC) is a citation index established by the Iranian Ministry of Science, Research and Technology after it was approved by the Organisation of the Islamic Conference. It only indexes journals from the Islamic world. It was announced in Baku, Azerbaijan during the Fourth Islamic Conference of the Ministers of Higher Education and Scientific Research held in October 2008. It is managed by the Islamic World Science Citation Center, located in Shiraz. In 2009, ISC partnered with Scopus that allows ISC's publications to be indexed in Scopus. See also Academic publishing List of academic databases and search engines Impact factor References External links Bibliographic databases and indexes Online databases Citation indices Research management Databases in Iran Science and technology in Iran 2000s in Islam
https://en.wikipedia.org/wiki/Coraid%2C%20Inc.
Coraid, Inc. is a computer data storage vendor that provides storage area network (SAN) products that use Ethernet, headquartered in Athens, Georgia. History The company was founded by Brantley Coile, who previously worked on the Cisco PIX firewall and Cisco LocalDirector products. Coile began the research and development phase of the company in 2000 after leaving Cisco Systems, and developed the ATA over Ethernet (AoE) protocol, which enables storage networking using raw Ethernet frames for transport. The company began selling its EtherDrive family of storage arrays in 2004. The open AoE protocol was released to the Linux community, and included in the Linux kernel since 2005, starting with version 2.6.11. Coraid was backed with a total of $114.3 million in funding. The company received a first, $10 million round of institutional financing from two venture capital funds in January 2010, at the same time introducing new management and an advisory board. The company also moved its headquarters to Redwood City, CA early in 2010. Coraid secured an additional $25 million in Series B funding in November 2010, followed by a third round of $50M in November 2011. In December 2013 the company received its final round of $29.3M. The company website said they had more than 1,700 customers in sectors including media, hosting service providers, telecommunications, healthcare, aerospace, manufacturing, and government. In January 2015, CEO Dave Kresse acknowledged a funding shortfall. On January 14, 2015, all employees were terminated abruptly, given their final paychecks with no severance. In May 2015, The Brantley Coile Company bought all the EtherDrive SRX and VSX assets. In August 2016, SouthSuite acquired the Coraid trademark. Coraid hardware and software products, VSX and SRX started shipping again in 2017. References External links American companies established in 2000 Companies based in Athens, Georgia 2000 establishments in Georgia (U.S. state) Privately held companies based in Georgia (U.S. state)
https://en.wikipedia.org/wiki/Jason%20La%20Canfora
Jason La Canfora (born April 14, 1974) is an American sportswriter, radio host, and television sports analyst. Career Television La Canfora joined NFL Network and NFL.com before the 2009 season and served as an NFL insider and reporter until 2012. La Canfora appeared on NFL Total Access, NFL GameDay Morning, NFL GameDay Final, and Thursday Night Kickoff. He also contributed stories and blogs to NFL.com. He replaced Adam Schefter, who left for ESPN. Before joining NFL Network, he worked ten years for The Washington Post and covered the Washington Redskins for six years. Prior to the Post, he was the Detroit Red Wings beat writer for the Detroit Free Press. On June 1, 2012, La Canfora announced via Twitter that he would be leaving NFL Network on July 1, 2012, after his contract expires for CBS Sports, replacing Charley Casserly on The NFL Today pregame show on Sundays. He currently co-hosts Inside Access with Jason La Canfora and Ken Weinman on WJZ-FM. He joined MASN as a contributor to the game telecasts and pre- and postgame shows of the Baltimore Orioles in June of 2023. Podcast La Canfora co-hosted the B-More Opinionated podcast with Jerry Coleman. It "is a hyper-local production that aims to connect with not just sports fans in the Baltimore area, but also people of all walks of life ..." The podcast went on hiatus beginning in April 2019. It was announced via the podcast's Twitter page on May 27, 2019, that the show would cease production, and the accompanying website (bmoshow.com) was shut down. Personal life La Canfora currently resides in Baltimore, Maryland, with his wife Lauren and three children. La Canfora was an avid Boston Red Sox fan from 2004 to 2013; he is now a Baltimore Orioles fan. La Canfora has been open about his struggles with binge eating; as spoken about on his afternoon radio show. References External links NFL.com bio National Football League announcers Living people Syracuse University alumni Detroit Free Press people 1974 births Sportswriters from New York (state) NFL Network people
https://en.wikipedia.org/wiki/Academy%20of%20Canadian%20Cinema%20and%20Television%20Diversity%20Award
The Diversity Award is presented by Academy of Canadian Cinema and Television to honour excellence in English-language television programming that "reflects the racial and cultural diversity of Canada." It was introduced in 1988 as the Multiculturalism Award under the umbrella of the Gemini Awards, and renamed to the Canada Award in 1996. Since 2013, the award has been presented as part of the new Canadian Screen Awards program. It was renamed to its current name in 2014. National Film Board of Canada productions and co-productions have won approximately half of all Canada Awards. Winners by year 1992 Gemini Awards — Drums 1993 Gemini Awards — It's About Time 1994 Gemini Awards — Speak It! From the Heart of Black Nova Scotia 1995 Gemini Awards — For Angela 1996 Gemini Awards — Nuhoniyeh: Our Story 1997 Gemini Awards — The Mind of a Child 1998 Gemini Awards — The Road Taken and The Rez, Season 2 "They Call Her Tanya" 1999 Gemini Awards — Loyalties 2000 Gemini Awards — Unwanted Soldiers 2001 Gemini Awards — Made in China: The Story of Adopted Chinese Children in Canada 2002 Gemini Awards — Film Club 2003 Gemini Awards — Carry Me Home: The Story & Music of the Nathaniel Dett Chorale 2004 Gemini Awards — Cosmic Current 2005 Gemini Awards — Two Worlds Colliding 2006 Gemini Awards — Wapos Bay - "There's No I in Hockey" 2007 Gemini Awards — Little Mosque on the Prairie 2008 Gemini Awards — Qallunaat! Why White People Are Funny 2009 Gemini Awards — Club Native 2010 Gemini Awards — Reel Injun 1st Canadian Screen Awards — Blind Spot: What Happened to Canada's Aboriginal Fathers? 2nd Canadian Screen Awards — The Defector: Escape from North Korea 3rd Canadian Screen Awards — The Exhibition 4th Canadian Screen Awards — Canada in Perspective See also Canadian television awards Sources Canada Awards Database Canada Award form, Past recipients list Gemini Awards Multicultural and ethnic television in Canada Diversity Awards established in 1988 1988 establishments in Canada
https://en.wikipedia.org/wiki/Microwave%20Bypass
Microwave Bypass, Inc. launched the world's first fixed wireless internet access technology in 1987, a decade before Wi-Fi. It enabled local and remote networks to connect at the then full Ethernet (802.3) data rate of 10 megabits per second, and for up to 4.3 miles. The company was founded in March 1986 by David Theodore (25), operating from One Kendall Square, Cambridge, Massachusetts. Its wireless solution consisted of a modified broadcast quality video radio (23 GHz) coupled with Microwave Bypass' EtherWave Transceiver. The system met the then highest Ethernet throughput and could transmit , in keeping with Ethernet's propagation delay allowance (46.4µs). Beta testing occurred at Massachusetts General Hospital in March 1987, at the invitation of network manager, David Murphy, and with Network World's Laura DiDio and representatives of Harvard University and Boston University's Dr. Mikhail Orlov in attendance. After a successful demo the first two production links were installed in parallel between Massachusetts General Hospital in Boston and Harvard's Cardiac Computer Center, across the Charles River. This also marked the first wireless transmission of MR images. In 1988, Microwave Bypass collaborated with Cisco Systems on a full-duplex EtherWave Transceiver to eliminate 802.3 collision detection and permit longer distance connections as far as the microwave could reach. This first full-duplex design was developed for an application at MIT, between its main campus and Lincoln Laboratories. Later that year Microwave Bypass completed an exclusive deal, announced by Motorola, for the transfer of its EtherWave Transceiver and LAN-LINK 1000 Bridge technologies. Notes References 1986 establishments in Massachusetts American companies established in 1986
https://en.wikipedia.org/wiki/7two
7two is an Australian free-to-air digital television multichannel, which was launched by the Seven Network on 1 November 2009. The channel broadcasts a variety of programs, targeting a 25-and-over audience. 7two offers a broad selection of programs covering a variety of genres including lifestyle, drama, adventure, reality observational-documentaries and comedy. History The channel was officially announced by the Seven Network on its breakfast program, Sunrise, at 7:45am AEDT 23 October 2009. Earlier, speculation suggested that Seven would launch its secondary channel around November 2009, with possible names including 7PLUS, PLUS7, Channel Mate and 7TWO. Seven's then-programming chief Tim Worner stated after the reveal that some of the potential names were red herrings to keep details of the channel a secret. PLUS7 and Channel Mate (as 7mate) were later used for Seven's internet TV catch-up service and Seven's second digital multi-channel, respectively. The channel launched with the airing of a promotional video called "It's Time", featuring Seven Network personalities and clips of shows and movies intended to be broadcast on the channel, followed by normal programming. This video was also launched on the multi-channel's website and received cross-promotion on the primary Seven channel. The Seven Network continues its policy of cross-promoting each channel's content across all four channels (Seven, 7two, 7mate and 7flix) to this day. Seven presenters Tom Williams and Johanna Griggs initially served as the "face" of the channel and were seen presenting 7two's Friday and Sunday night lifestyle line-ups in early 2011. The channel did not launch on the same day to many regional areas. 7two was launched for Southern Cross Television viewers in Tasmania and Darwin on 1 December 2009, and for Prime Television viewers in Regional Victoria, Northern & Southern NSW and the ACT on 23 December 2009 from 9am. From launch, Prime broadcast the channel as '7TWO on Prime'. In January 2011, regional broadcaster Prime Television changed the name of its primary channel to 'Prime7', to reflect its strong relationship with its metropolitan partner, Seven. This led to Prime's transmission of 7two being rebranded as simply 7two, like the metropolitan counterpart. In July 2020, 7TWO underwent a major rebrand, its first since its inception. The logo applies the same orange 7 ribbon logo but with TWO in lower case and the channel now referred to as 7two. Programming From launch, premiere seasons of previous Seven shows including Lost, Ugly Betty, Heroes and 24 were broadcast, along with a mix of other new and classic programming along with movies sourced from Disney. Prime-time programs used to screen under themed nightly blocks such as 'Action Time' and 'Movie Time', however these disappeared as the focus of the channel changed in 2010. The revised channel included 'Best of British' content such as thrice-weekly British murder/mystery (Heartbeat and Jonathan Cr
https://en.wikipedia.org/wiki/Alberta%20Regional%20Network
The Alberta Regional Network also known as the ARN was an electronic networking organization in Alberta that links Alberta Credit Unions with ATB Financial. It was disbanded in 2010, concurrently with the introduction of chip cards in Canada. Benefits Customers of ARN members could use credit union and ATB financial ATMs to pay bills, inquire accounts, and deposit money with any other member institution without having to pay fees. References Banking in Canada Interbank networks Companies disestablished in 2010
https://en.wikipedia.org/wiki/ZL%20Technologies
ZL Technologies (also known as ZL Tech) was founded in 1999 in Milpitas, California and is a privately held, developer of unstructured data archiving software. Its principal product, ZL UA, is used by enterprises to consolidate all unstructured data into a single repository for the purposes of information governance—i.e. compliance, legal discovery, records management, file analysis. ZL Tech' global headquarters is in Milpitas, California, and has international offices in Tokyo, Japan; Hyderabad, India; Vancouver, Canada; and Dublin, Ireland. Background ZL Tech was originally established as ZipLip in 1999, a secure mail carrier that provided tracking, security, and authentication services. Its first customers were telecommunications firms, large organizations that required a robust architecture in order to govern their hundreds of thousands of email inboxes. In 2000, ZipLip's secure email and data tracking capabilities expanded to provide secure file share and collaboration tools for enterprise users, and in 2001 the telecom market experienced a bubble, forcing ZipLip to shift its focus to large enterprise customers. Additionally in the early 2000s, the regulatory and legal landscape underwent major changes—such as the Sarbanes-Oxley Act—and in response ZipLip expanded its focus to the newly invigorated requirements for regulatory compliance, accommodating the ingestion, archiving, and long-term governance of business communications. In 2006 the Federal Rules of Civil Procedure (FRCP) were amended to include electronically stored content (ESI) as a type of discoverable content, and ZipLip expanded its product to include eDiscovery functionalities to accommodate the new regulation. In 2007, the company changed its name from ZipLip to ZL Technologies. In 2008 ZL Tech added records management functionality in response to a growing focus by companies on file management. The additions allowed ZL Tech to build a business model that encompasses both archiving and data management needs of large enterprises such as those in the Fortune 500. By 2012, ZL Tech incorporated feature updates in the eDiscovery module and added advanced SharePoint, Documentum, and file share analysis features. Products ZL Tech' core product — ZL UA, is an enterprise archive and an interface platform for extension modules, like Discovery Manager, Compliance Manager, Records Manager, and File Analysis and Management. ZL's storage management software implements single-instance storage to remove additional copies of data and offline access. Awards and recognition ZL Tech was named a leader within the enterprise information archiving space, according to Gartner, Inc. in 2013, 2014, 2018, 2019, and was named a visionary by Gartner in 2015, 2016. 2019 marks ZL a record of 15 continuous appearances in Gartner Magic Quadrant for Enterprise Information Archiving Report. In 2018, ZL Tech won the Gold Stevie Award in International Business Awards for its GDPR solutions. In 2019, ZL Tec
https://en.wikipedia.org/wiki/Next%20Generation%20Data%20Communications
2023 Comm), an element of the Next Generation Air Transportation System, will significantly reduce controller-to-pilot communications and controller workload, whilst improving safety. NextGen comprises complex integrated and interlinked programs, portfolios, systems, policies, and procedures. NextGen has modernized air traffic infrastructure in communications, navigation, surveillance, automation, and information management. In the current United States [[National Airspace System all communications with airborne aircraft is by voice communications. Aircraft route of flight revisions must be communicated through multiple change-of-course instructions or lengthy verbal reroute instructions, which must be repeated; are prone to verbal communications errors; and entry errors into an aircraft's flight management system. The use of voice communication is labor and time intensive and will limit the ability of the Federal Aviation Administration (FAA) to effectively meet future traffic demand in the United States. Adding air-to-ground and ground-to-ground data communications will significantly reduce controller-to-pilot communications and controller workload. The data communications will enable ground automated message generation and receipt, message routing and transmission, and direct communications with aircraft avionics. Initially, data communications will be an additional means for two-way exchange between controllers and flight crews for air traffic control clearances, instructions, advisories, flight crew requests and reports. Eventually, the majority of communications will be handled by data communications for appropriately equipped ground and airborne stations. Data communications will enable air traffic control to issue an entire route of a flight with a single data transmission directly to the aircraft's flight management system. NexCom will be an eventual replacement for the existing Future Air Navigation System that is currently used primarily by transoceanic commercial airliners. Benefits Voice communications contribute to operational errors due to miscommunication, stolen clearances (an air traffic control clearance for one aircraft is heard and erroneously accepted by another aircraft) and delayed message transfers due to radio frequency congestion. Data communications will enable air traffic controller productivity improvements and will permit capacity growth without requisite growth in costs associated with infrastructure equipment, maintenance, labor and training. As a result, the resources required to provide air traffic management service per aircraft operation will decrease. The use of real-time aircraft data by ground systems to plot 4-dimensional trajectories (lateral and vertical navigation, ground speed and longitudinal navigation), and perform conformance management, will shift air traffic operations from minute-by-minute tactical control, to more predictable and planned strategic traffic management. See also Controlle
https://en.wikipedia.org/wiki/Next%20Generation%20Network%20Enabled%20Weather
Next Generation (NextGen) Network Enabled Weather (NNEW) is a project to develop a 4-dimension (all points, lateral, vertical and time dimensions) weather data cube (4-D Wx Data Cube) from disparate contributors and locations. Description Weather has a considerable impact on aviation operations. Providing the accurate and timely weather information required by aviation decision makers is an element of the Next Generation Air Transportation System. This will increase airspace capacity, improve efficiency, and improve air safety. NNEW will provide fast access to weather information to all National Airspace System users by the provision of the 4-D Wx Data Cube. The 4-D Wx Data Cube will consist of: a virtual weather network containing data from various existing databases within the Federal Aviation Administration (FAA), National Oceanic and Atmospheric Administration (NOAA) and the United States Department of Defense (DOD), as well as participating commercial weather data providers the ability to translate between the various standards so that data can be provided in user required units and coordinate systems the ability to support retrieval requests for large data volumes, such as along a flight trajectory A subset of the data published to the 4-D Wx Data Cube will be designated the Single Authoritative Source (SAS). The SAS is that data that must be consistent (only one answer) to support collaborative (more than one decision maker) air traffic management decisions. Weather data distribution mechanisms are being developed by the NOAA Research Applications Laboratory (NCAR), NOAA Global Systems Division and the Massachusetts Institute of Technology Lincoln Laboratory. Contributions to standards are being made to the Open Geospatial Consortium. Standards and specifications developed and/or used by NNEW will be layered on top of core services provided by the FAA System Wide Information Management (SWIM) program. Benefits Direct machine access and integration by decision support tools will reduce the need for interpretation of aviation weather data and will enable better air transportation decision making. References Federal Aviation Administration Aviation meteorology
https://en.wikipedia.org/wiki/Lauren%20Shehadi
Julia Lauren Shehadi (born May 23, 1983) is an American sportscaster for the MLB Network and Warner Bros. Discovery Sports. Career Shehadi attended Langley High School in McLean, Virginia, graduating in 2001. In college at the University of Florida she served as the host of the online Gatorzone. She also worked as an intern for The Best Damn Sports Show Period and as a sports anchor for KXMC-TV in Minot, North Dakota. She is of Lebanese descent. Shehadi worked for CBSSports.com and CBS College Sports Network. In addition to serving as the host for many of the videos on CBSSports.com, Shehadi was the co-host of the SEC Tailgate show and the ALT Games with Jonny Moseley on the CBS College Sports Network. In 2010 she was a candidate for Playboy’s "Sexiest Sportscaster" contest. Shehadi joined the MLB Network in 2012. She previously hosted The Rundown on MLB Network alongside Matt Yallof and currently hosts MLB Central alongside Robert Flores and Mark DeRosa. In January 2018, Shehadi started hosting a podcast called The Podium, a podcast between NBC Sports Group and Vox Media, which focuses on athletes and events at the 2018 Winter Olympic Games in PyeongChang, South Korea. In October 2018, she worked as the on-field commentator during TBS's coverage of the 2018 American League Championship Series. On March 10, 2020, Shehadi was announced to be a sideline reporter for CBS and Turner's March Madness coverage for the first time. She was scheduled to work with Andrew Catalon and former Villanova head coach Steve Lappas, replacing Lisa Byington, who was promoted to the number 6 team, with Spero Dedes, Steve Smith, and Wally Szczerbiak, replacing Ros Gold-Onwude, who departed Turner Sports for ESPN. However, she, along with Dwyane Wade and Adam Lefkoe, had their NCAA Tournament debuts pushed back to 2021, as the 2020 tournament was cancelled two days later over concerns of COVID-19. References External links MLB Network bio 1983 births Living people People from McLean, Virginia Sportspeople from Fairfax County, Virginia American sports announcers College basketball announcers in the United States College football announcers Major League Baseball broadcasters MLB Network personalities University of Florida alumni CBS Sports American people of Lebanese descent Women sports announcers Sportspeople of Lebanese descent
https://en.wikipedia.org/wiki/Graph%20database
A graph database (GDB) is a database that uses graph structures for semantic queries with nodes, edges, and properties to represent and store data. A key concept of the system is the graph (or edge or relationship). The graph relates the data items in the store to a collection of nodes and edges, the edges representing the relationships between the nodes. The relationships allow data in the store to be linked together directly and, in many cases, retrieved with one operation. Graph databases hold the relationships between data as a priority. Querying relationships is fast because they are perpetually stored in the database. Relationships can be intuitively visualized using graph databases, making them useful for heavily inter-connected data. Graph databases are commonly referred to as a NoSQL. Graph databases are similar to 1970s network model databases in that both represent general graphs, but network-model databases operate at a lower level of abstraction and lack easy traversal over a chain of edges. The underlying storage mechanism of graph databases can vary. Relationships are a first-class citizen in a graph database and can be labelled, directed, and given properties. Some depend on a relational engine and "store" the graph data in a table (although a table is a logical element, therefore this approach imposes another level of abstraction between the graph database, the graph database management system and the physical devices where the data is actually stored). Others use a key–value store or document-oriented database for storage, making them inherently NoSQL structures. , no universal graph query language has been adopted in the same way as SQL was for relational databases, and there are a wide variety of systems, most often tightly tied to one product. Some early standardization efforts lead to multi-vendor query languages like Gremlin, SPARQL, and Cypher. In September 2019 a proposal for a project to create a new standard graph query language (ISO/IEC 39075 Information Technology — Database Languages — GQL) was approved by members of ISO/IEC Joint Technical Committee 1(ISO/IEC JTC 1). GQL is intended to be a declarative database query language, like SQL. In addition to having query language interfaces, some graph databases are accessed through application programming interfaces (APIs). Graph databases differ from graph compute engines. Graph databases are technologies that are translations of the relational online transaction processing (OLTP) databases. On the other hand, graph compute engines are used in online analytical processing (OLAP) for bulk analysis. Graph databases attracted considerable attention in the 2000s, due to the successes of major technology corporations in using proprietary graph databases, along with the introduction of open-source graph databases. One study concluded that an RDBMS was "comparable" in performance to existing graph analysis engines at executing graph queries. History In the mid-1960s, nav
https://en.wikipedia.org/wiki/List%20of%20The%20Middle%20episodes
The Middle is an American sitcom created by DeAnn Heline and Eileen Heisler for the ABC network. The Middle stars Patricia Heaton and Neil Flynn as Frankie and Mike Heck, a used-car saleswoman and the manager of a small mining firm respectively, who struggle to raise their children in the fictional middle-class town of Orson, Indiana. Their three children include the athletic but underachieving, slow-witted Axl (Charlie McDermott), cluelessly unpopular daughter Sue (Eden Sher), and frustrated, odd child-genius Brick (Atticus Shaffer). The Hecks find themselves embroiled in somewhat unusual events as they attempt to navigate their day-to-day lives. The series was met with a positive reception from television critics when it premiered on September 30, 2009, with a score of 70 on the aggregated reviews website Metacritic. On March 3, 2016, ABC renewed the series for an eighth season. On January 25, 2017, ABC renewed the series for a ninth season, later announced to be the show's last. Series overview Episodes Season 1 (2009–10) Season 2 (2010–11) Season 3 (2011–12) Season 4 (2012–13) Season 5 (2013–14) Season 6 (2014–15) Season 7 (2015–16) Season 8 (2016–17) Season 9 (2017–18) Ratings Notes References External links http://www.tv.com/shows/the-middle/episodes/ Lists of American sitcom episodes Episodes
https://en.wikipedia.org/wiki/Strikeiron
StrikeIron provided a cloud-based Data Quality Suite including email verification, address verification, phone validation, phone append, and sales tax calculation solutions. The company was based in Research Triangle Park, N.C. It was founded by Bob Brauer (founder of DataFlux and Interzoid), Richard Holcomb (co-founder of HAHT Software and Q+E Software), and Robert Dale in 2003. StrikeIron was a leader in Data-as-a-Service with its delivery platform IronCloud. The company has raised over $16 million USD in venture funding. It was financially backed by Ascent Ventures, The Aurora Funds, and NC IDEA. It was acquired by Informatica in June 2014. Prior to the acquisition, the CEO of the company was Sean O'Leary. History The company was based in Research Triangle Park, N.C. It was founded by Bob Brauer. The early vision of the company was to provide products that would help programmers and business analysts to find Web services (similarly known today as Cloud APIs). During the company's initial launch, StrikeIron offered its first product, the Web Services Analyzer. This software product was developed to provide fast analysis and understanding of web service offerings. The Analyzer located and generated graphically the data requirements, functionality and applicability for web services by analyzing and dynamically invoking them over the Web. In 2005, StrikeIron rolled out the Web Services Marketplace, the world's largest online marketplace dedicated to commercial Web services. The Web Services Marketplace brought together a community of providers and users to buy and sell Web services subscriptions. StrikeIron also released a desktop-based premium version of the Analyzer that allowed users to easily browse through both internal and external directories. It included direct access to the StrikeIron Web Services Marketplace. Later in 2005, StrikeIron released more of its own Web services like sales tax and SMS solutions. The product portfolio continued to grow in 2006 with the addition of email verification, zip code information, and financial data services. In 2012, StrikeIron won the "Cloud Computing Company of the Year" award, along with an award for best cloud infrastructure, at the inaugural Cloud Awards program. In 2014, StrikeIron was acquired by Informatica References Notes Top 10 Venture Capital Deals in Q1 by Phil Goldstein, Fierce Wireless June 23, 2009 External links Software companies based in North Carolina Companies established in 2003 Defunct software companies of the United States
https://en.wikipedia.org/wiki/Windows%208
Windows 8 is a major release of the Windows NT operating system developed by Microsoft. It was released to manufacturing on August 1, 2012, and was made available for download via MSDN and TechNet on August 15, 2012. Nearly three months after its initial release, Windows 8 finally made its first retail appearance on October 26, 2012. Windows 8 introduced major changes to the operating system's platform and user interface with the intention to improve its user experience on tablets, where Windows competed with mobile operating systems such as Android and iOS. In particular, these changes included a touch-optimized Windows shell and start screen based on Microsoft's Metro design language, integration with online services, the Windows Store, and a new keyboard shortcut for screenshots. Many of these features were adapted from Windows Phone. Windows 8 also added support for USB 3.0, Advanced Format, near-field communication, and cloud computing. Additional security features – including built-in antivirus software, integration with Microsoft SmartScreen phishing filtering, and support for Secure Boot on supported devices – were introduced. Windows 8 is the first version of Windows to support the ARM architecture under the Windows RT branding. No CPUs without PAE, SSE2 and NX are supported in this version. Windows 8 received a mostly negative reception. Although the reaction to its performance improvements, security enhancements, and improved support for touchscreen devices was positive, the new user interface of the operating system was widely criticized for being confusing and unintuitive, especially when used with a keyboard and mouse instead of a touchscreen. Despite these shortcomings, 60 million licenses were sold through January 2013, a number that included both upgrades and sales to OEMs for new PCs. Microsoft released Windows 8.1 in October 2013, which addressed some aspects of Windows 8 that were criticized by reviewers and early adopters and also incorporated improvements to various aspects of the operating system. Windows 8 was ultimately succeeded by Windows 10 in July 2015. Support for RTM editions of Windows 8 ended on January 12, 2016, and with the exception of Windows Embedded 8 Standard users, all users are required to install the Windows 8.1 update. Mainstream support for the Embedded Standard edition of Windows 8 ended on July 10, 2018, and extended support ended on July 11, 2023. As of August 2023, 0.35% of PCs are running Windows 8. Development Early development Development started in 2009 while Microsoft was finishing work on Windows 7. At the Consumer Electronics Show in January 2011, it was announced that the next version of Windows would add support for ARM System-on-chips alongside the existing 32-bit processors produced by vendors, especially AMD and Intel. Windows division president Steven Sinofsky demonstrated an early build of the port on prototype devices, while Microsoft CEO Steve Ballmer announced the company's g
https://en.wikipedia.org/wiki/Celebrity%20Fitness
Celebrity Fitness is a fitness center operator with a network of clubs across Indonesia, Malaysia, the Philippines, and India. Every Celebrity Fitness club offers personal training, yoga, spinning / indoor cycling and group fitness programs for its members. Celebrity Fitness in Indonesia, Malaysia, the Philippines and India, are separate entities with different shareholders, and managed by different leadership teams. The Celebrity Fitness brand in Indonesia, Malaysia, and the Philippines is owned by Evolution Wellness Pte. Ltd., which also has Fitness First Asia in its portfolio. Evolution Wellness is helmed by CEO Simon Flint. In India, it is helmed by CEO Rajat Singh. Background Celebrity Fitness was founded in 2003 by John Franklin, Mike Anderson, and JJ Sweeney. Celebrity Fitness commenced operations in February 2004 in Jakarta. In 2005, Celebrity Fitness entered the Malaysian market with its first club in Kuala Lumpur. This is located at 1 Utama Shopping Centre in Petaling Jaya, Selangor, Malaysia. The Malaysian business expanded in 2009 with the purchase of California Fitness (Malaysia) gyms. In 2007, the majority shareholding of Celebrity Fitness was acquired by Navis Capital Partners. In 2012, Celebrity Fitness entered the Singaporean market. In 2017, Fitness First Asia merged with Celebrity Fitness to create Evolution Wellness Holdings Pte. Ltd., equally co-owned by Oaktree Capital Management and Navis Capital Partners. However, both brands will remain separate. In 2018, Celebrity Fitness unveiled a new logo and brand identity in Indonesia and Malaysia. Countries Indonesia Celebrity Fitness was the first gym company of its kind in Indonesia. In 2004, Celebrity opened its first gym in Jakarta's EX Mall at Plaza Indonesia. The company has the largest fitness center network in Indonesia and is the market leader, by the number of clubs and members. As at May 2018, Celebrity Fitness has locations in 11 Indonesian cities Jakarta, Bali, Bandung, Batam, Bogor, Makassar, Medan, Palembang, Semarang, Yogyakarta and Surabaya totaling 36 clubs. Malaysia In 2004, Celebrity Fitness opened its first gym at the 1 Utama shopping mall in Petaling Jaya located near Kuala Lumpur. In September 2009, Celebrity Fitness acquired all of California Fitness's gyms in Malaysia. As at December 2018, Celebrity Fitness currently has 24 clubs in Malaysia. Singapore In March 2012, Celebrity Fitness commenced operations in Singapore with its first club at Rochester Mall in Buona Vista. In June 2012, its second club commenced operations at Downtown East in Pasir Ris. There were a total of four Celebrity Fitness clubs in Singapore; however, the Bukit Timah and Downtown East clubs were closed at the end of 2017, while the City Square and Junction 10 clubs were converted to Fitness First. Turkey In 2009, Celebrity Fitness opened their first branch in Turkey with its first club at Dalmaz Center in Gayrettepe. In 2010, they closed down that location. India It h
https://en.wikipedia.org/wiki/Pikachu%20virus
The Pikachu virus, sometimes referred to as Poké Virus (not to be confused with Pokérus in actual Pokémon games), was a computer worm believed to be the first malware geared at children due to its incorporation of Pikachu from the Pokémon series. It was released on June 28, 2000, and arrived in the form of an email titled "Pikachu Pokemon" with the body of the e-mail containing the text "Pikachu is your friend." Opening the attached executable shows users an image of Pikachu, along with a message stating: "Between millions of people around the world I found you. Don’t forget to remember this day every time MY FRIEND!" The worm itself appeared in the attachment to the email as a file named "PikachuPokemon.exe". It was often compared to the Love Bug, though the Pikachu worm was noted to be far less dangerous and slower in its dissemination. Spread The worm was mainly spread through Microsoft Outlook email attachments. The email containing the attached worm-program propagated through infected users by sending itself to all contacts in the user's Outlook address book. The website in the body of the email lead to a near-clone of the official Pokémon.com website. It may be possible that this website downloaded a Trojan in the background if visited or was a phishing website and this may have assisted in the spread of the virus. Execution When the user clicks on the attachment, PikachuPokemon.exe adds the lines "del C:\WINDOWS" and "del C:\WINDOWS\system32" to the file "autoexec.bat". These commands would be executed at the next boot, in an attempt to delete two critical directories of the Windows operating system. However, users would be given a prompt asking whether or not they wanted to delete those folders, since the author did not write the added lines as “del C:\WINDOWS\*.* /y” and “del C:\WINDOWS\SYSTEM\*.* /y” (the /y switches would have automatically chosen the yes option). This defect was the reason that the Pikachu worm did not cause more damage to computer systems. See also ILOVEYOU Timeline of computer viruses and worms Computer virus References Further reading Hacking in the 2000s Email worms
https://en.wikipedia.org/wiki/CCAI
CCAI is an acronym that can refer to: Climate Change Artificial Intelligence, an initiative of data scientists to help resolve the ongoing issue of climate change Calculated Carbon Aromaticity Index, an index to calculate the ignition quality of residual fuel oil Congressional Coalition on Adoption, an American organization supporting children in need of a family Consumer Confidence Average Index, an indicator of American consumers confidence Computer Controlled Acoustic Instruments pt2, an album from Aphex Twin.
https://en.wikipedia.org/wiki/Gihan%20Wikramanayake
Gihan Nilendra Wikramanayake, FBCS, CITP (17 January 1960 – 5 January 2018) was a Sri Lankan academic. He was a Senior Professor in Computer Science and attached to the Department of Information Systems Engineering. He was the Director of the University of Colombo School of Computing (UCSC) from 24 May 2010 to 31 May 2016. He was the Head of the Department of Information Systems Engineering from September 2002 to September 2005. He also served as the deputy director of the UCSC from 2003 to 2006. Education Educated at St. Aloysius' College (Galle) and Royal College Colombo, he graduated from the University of Colombo with a BSc in Statistics & Mathematics with First Class Honours in 1984 and went on to gain a MSc and PhD in Computer Science from the University of Wales, College of Cardiff in 1989 and 1996. Academic career In 1984 he joined the Computer Centre of the University of Colombo as a trainee programmer, he moved to the Department of Statistics and Computer Science as a researcher before becoming an Assistant Lecturer. In 1990 he became a Lecturer and Senior Lecturer in 1996. Moving to the new Department of Computer Science in 2000 he became its acting Head in 2002. In 2002 he became the Head, Department of Information Systems Engineering, UCSC and deputy director, UCSC in 2004. From 2007 to 2008 he was the acting Head, Department of Communication and Media Technologies. He was also a visiting scholar of University of New Mexico, Stockholm University and Umeå University. In 2010 he became the Director of the UCSC and a professor of Computer Science. He served two terms as director UCSC. A fellow of the British Computer Society he served as the Chairman of the BCS Sri Lanka Section for five years from 2007/08, 2009/10, 2010/11, 2011/12 and 2014/15. He also served as the chairman of UCSC owned company called Theekshana from 2010 to 2016. He also served as a board member of LEARN from 2010 to 2016. He was a member of the Sri Lanka Informatics Olympiad since 1998 and was involved in organizing IOI training since 1998. He took part as the Deputy Team Leader in IOI 1999 in Turkey and in IOI in 2001–2007, 2009–2010, 2014 and 2016 as the team leader. He served as a Sri Lankan judge at APICTA from 2003 to 2007, 2009–2014, 2016 and was the chief judge in APICTA 2015. Death On 5 January 2018, Wikramanayake died at the age of 57 from motor neurone disease. References External links University of Colombo School of Computing BCS Sri Lanka Section Committee 1960 births 2018 deaths Sri Lankan academic administrators Sri Lankan computer scientists Information systems researchers Alumni of the University of Colombo Alumni of the University of Wales Alumni of Royal College, Colombo Fellows of the British Computer Society Alumni of St. Aloysius' College, Galle Alumni of Cardiff University
https://en.wikipedia.org/wiki/Computer%20Othello
Computer Othello refers to computer architecture encompassing computer hardware and computer software capable of playing the game of Othello. It is also known as Reversi for Microsoft Windows (1.0-XP, 1985-2005) and Classic Mac OS (since 1984). Availability There are many Othello programs such as NTest, Saio, Edax, Cassio, Pointy Stone, Herakles, WZebra, and Logistello that can be downloaded from the Internet for free. These programs, when run on any up-to-date computer, can play games in which the best human players are easily defeated. This is because although the consequences of moves are predictable for both computers and humans, computers are better at envisaging them. Search techniques Computer Othello programs search for any possible legal moves using a game tree. In theory, they examine all positions / nodes, where each move by one player is called a "ply". This search continues until a certain maximum search depth or the program determines that a final "leaf" position has been reached. A naive implementation of this approach, known as Minimax or Negamax, can only search to a small depth in a practical amount of time, so various methods have been devised to greatly increase the speed of the search for good moves. These are based on Alpha-beta pruning, Negascout, MTD(f), and NegaC*. The alphabeta algorithm is a method for speeding up the Minimax searching routine by pruning off cases that will not be used anyway. This method takes advantage of the fact that every other level in the tree will maximize and every other level will minimize. Several heuristics are also used to reduce the size of the searched tree: good move ordering, transposition table and selective Search. To speed up the search on machines with multiple processors or cores, a "parallel search" may be implemented. Several experiments have been made with the game Othello, like ABDADA or APHID On recent programs, the YBWC seems the preferred approach. Multi-Prob cut Multi-ProbCut is a heuristic used in alpha–beta pruning of the search tree. The ProbCut heuristic estimates evaluation scores at deeper levels of the search tree using a linear regression between deeper and shallower scores. Multi-ProbCut extends this approach to multiple levels of the search tree. The linear regression itself is learned through previous tree searches, making the heuristic a kind of dynamic search control. It is particularly useful in games such as Othello where there is a strong correlation between evaluations scores at deeper and shallower levels. Evaluation techniques There are three different paradigms for creating evaluation functions. Disk-square tables Different squares have different values - corners are good and the squares next to corners are bad. Disregarding symmetries, there are 10 different positions on a board, and each of these is given a value for each of the three possibilities: black disk, white disk and empty. A more sophisticated approach is to have different values
https://en.wikipedia.org/wiki/PANGAEA%20%28data%20library%29
PANGAEA - Data Publisher for Earth & Environmental Science is a digital data library and a data publisher for earth system science. Data can be georeferenced in time (date/time or geological age) and space (latitude, longitude, depth/height). Scientific data are archived with related metainformation in a relational database (Sybase) through an editorial system. Data are in Open Access and are distributed through web services in standard formats on the Internet through various search engines and portals. Data set descriptions (metadata) are conform to the ISO 19115 standard and are served in various further formats (e.g. Directory Interchange Format, Dublin Core). They include a bibliographic citation and are persistently identified using Digital Object Identifiers (DOI). Identifier provision and long-term availability of data sets via library catalogs is ensured through a cooperation with the German National Library of Science and Technology (TIB). Retrieval of data sets is provided through a full text search engine (based on Apache Lucene / panFMP). For efficient data compilations a data warehouse is operated. Data descriptions are available through various protocols (OAI-PMH, Web Catalog Service). PANGAEA is hosted by the Alfred Wegener Institute, Helmholtz Centre for Polar and Marine Research (AWI), Bremerhaven and the MARUM – Center for Marine Environmental Sciences, Bremen in Germany. The system is used by various international research projects from public funding as data repository and by the World Data Center for Marine Environmental Sciences (WDC-MARE) as long-term archive. The system was initially developed since 1987 and is operational on the Internet since 1995. The MediaWiki software is used to operate a wiki as PANGAEA manual and reference. PANGAEA is also listed in re3data.org. References Diepenbroek, M., Grobe, H., Reinke, M., Schindler, U., Schlitzer, R., Sieger, R., Wefer, G. (2002) PANGAEA - an information system for environmental sciences, Computers & Geosciences, 28(10), 1201–1210, . König-Langlo, G., Gernandt, H.(2009) Compilation of ozonesonde profiles from the Antarctic station Georg-Forster from 1985 to 1992, Earth System Science Data, 1,1-5, (Example of a data publication with PANGAEA, corresponding data set: ). External links PANGAEA home page Manual PangaWiki Alfred Wegener Institute, Helmholtz Centre for Polar and Marine Research (AWI) MARUM – Center for Marine Environmental Sciences (MARUM) German digital libraries Bibliographic databases and indexes Earth system sciences
https://en.wikipedia.org/wiki/The%20Phantom%20%28miniseries%29
The Phantom is a 2009 miniseries inspired by Lee Falk's comic strip of the same name, and directed by Paolo Barzman. It first aired on The Movie Network and then on Syfy in June 2010. It stars Ryan Carnes as Kit Walker, the 22nd Phantom, and is produced by RHI Entertainment and Muse Entertainment. Plot Law student and parkour traceur Chris Moore is shocked to learn that he was adopted and that he is actually the son of The Phantom, a legendary crime-fighter and defender of the innocent, a role that has been passed down from father to son in the Walker line for centuries after the 1st Phantom's father was murdered by pirates. Shortly afterwards, Chris's adoptive parents are murdered by hired assassins of the Singh Brotherhood, the long-time enemies of the Phantom for over five centuries. He is sought out by Bpaa Thap (Jungle Patrol), the group founded by the 1st Phantom which has evolved into an International Covert intelligence and law enforcement agency headquartered in the jungles of Bangalla (the fictional small island nation in the Indonesian archipelago). The Bpaa Thap team consists of a bunch of scientists, various paramilitary specialists, Director of Field Operations and close ally of the Walkers Abel Vandermaark, and Guran, a native Bangalla woman who quickly befriends Kit. Now going by his birth name of Kit Walker, he begins training to become an expert in martial arts and combat, to emerges as the 22nd Phantom to battle evil. He quickly encounters the Singh Brotherhood, now led by the murderous and arrogant Rhatib Singh. Wearing an updated Phantom uniform that gives him added strength and speed, Kit's first mission is to stop Singh and figure out the Singh Brotherhood's plans for a new technology they have developed named "Flicker" (which enables them to brainwash people through specially planted cable TV set-top boxes to complete specific tasks). However, the task is not so easy as there is a mole in the Phantom team, and the Singh Brotherhood attempts to assassinate the police detective father of Kit's new love, Renny. Kit eventually finds and eliminates the facility which handles the broadcasts, but not before the Brotherhood transmits the necessary commands to the people needed to make their master plan a success. Kit races against time to stop brainwashed people (including a press photographer, a Secret Service agent and an EMT) from assassinating a diplomat who has an uncanny ability to bring nations to peace, and the only man who can do so to the Middle East and whose death would spark wars (and thereby increase the Brotherhood's revenue). Kit manages to save the diplomat as the Phantom, and in the wake of this, Rhatib Singh orders the mole in the Phantom team (who has been holding Renny and her father at gunpoint to force the Phantom to allow the diplomat to be murdered) to kill them, but the team manages to subdue the mole. Immediately after the failure is revealed, Singh is executed by the other board members of the Brothe