source stringlengths 32 199 | text stringlengths 26 3k |
|---|---|
https://en.wikipedia.org/wiki/Greenlight%20%28Internet%20service%29 | Greenlight is a bundled telecommunications service owned by the city of Wilson, North Carolina. Its services are distributed over a fiber-optic network that was constructed by the city. The service has attracted attention because of the controversy surrounding its competition with Time Warner Cable and CenturyLink.
Regulation
The North Carolina legislature passed a law in 2011 prohibiting municipal telecommunication services, but Wilson was able to carve out an exemption, because Greenlight was already providing such services.
As part of the Commerce Clause of the federal government, federal regulatory power supersedes state authority. State laws which restricted consumer choice of internet access providers were preempted by a Federal Communications Commission order taken on Thursday February 26, 2015. The FCC order relies on section 706 of the 1996 Telecommunications Act, the first federal legislation to regulate the internet. However, the US Court of Appeals Sixth Circuit overruled the order, citing a lack of specific authority in the enabling legislation. The United States Congress would have to intervene to give FCC authority by amending the 1996 Telecommunication Act.
Creation
In order to fund the Greenlight project, the city of Wilson used funds from bonds, instead of taxpayer money.
References
See also
Wilson, North Carolina |
https://en.wikipedia.org/wiki/Hechtia%20caudata | Hechtia caudata is a plant species in the genus Hechtia. This species is endemic to Mexico.
References
caudata
Endemic flora of Mexico |
https://en.wikipedia.org/wiki/Deaf%20Theatre%20Network%20Europe%20Vienna | The Deaf Theatre Network Europe is an open platform of professional deaf theatres. This network was established in 2001 in Vienna during the European Deaf Theatre Conference. The mission of the platform is to bring deaf artists and deaf theatre to a bigger audience.
The following projects are part of the mission statement:
1. Permanent videodocumentary of the work by deaf professionals. This work is done by the "Teatr 3§ from Szczecin(Poland) under the artistic direction of Olgier Koczorowski.
2. Deaf Theatre for children presented in cooperation with the deaf theatre of the Janaček Academy for Performing Arts in Brno VDN-DIFA-JAMU(Czech Republic), "Teatr 3" Szczecin, Quest:arts for everyone(USA) and ARBOS- Company for Music and Theatre(Austria).
3. Professional education and courseware for training of deaf actors coordinated by ARBOS - Company for Music and Thestre.
4. The history of Deaf Theatre in Europe.
5. Cooperation of "Teatr 3", ARBOS and Ramesh Meyyappan(Singapore/Scotland) during the elaboration of theatre projects.
6. Organisation of the "European Deaf Theatre Conference" and informal meetings of the theatre during the year coordinated by ARBOS.
7. Performances during the "European & International Deaf Theatre Festival" in Vienna plus network conference.
Deaf Theatre is a part of the world of the arts and is done by deaf artists. But a cooperation of deaf and hearing artists on an equal level is possible. Deaf Theatre tells stories of deaf people, their lives and their culture. The theatre may include sign language, drama, mime, visual theatre, dance, music, comedy and all other forms of performing arts.
"Deaf Theatre" is performed for deaf and hearing audience.
See also
:de:Deaf Theatre Network Europe Vienna (German language)
References
External links
"America needs more Visual Theatre!" in "The Kennedy Center" Opening Stages Newsletter March 2005, page 10 by Willy Conley.
Disability organisations based in Austria
Theatrical organizations
Deafness arts organizations
Disability theatre |
https://en.wikipedia.org/wiki/Corby%20%26%20Baily | Tom Corby (born 1966) and Gavin Baily (1970) are two London based artists who work collaboratively using public domain data, climate models, satellite imagery and the Internet. Recent work has focused on climate change and its relationship to technology and has involved collaborations with scientists working at the British Antarctic Survey.
Tom Corby is a Reader in Interdisciplinary Arts at the Centre for Research in Education, Art and Media (CREAM), at the University of Westminster. Gavin Baily is an artist and software developer.
Awards
Their work has won a number of awards including: nomination for the File Prix Lux and the File Electronic Language Festival 2010; the jury nominated award at the 10th Japan Media Arts Festival in 2007; honorary mentions at the Prix Ars Electronica 2006 and 2000; honorary mention: "The Post-Cagian Interactive", "Art on the Net" The Machida City Museum of Graphic Arts, Tokyo and the main festival prize COMTEC ART 1999. In 2000 they were nominated for the "International Media Art Award 2000", at Zentrum fur Kunst und Medientechnologie (ZKM) in Karlsruhe, Germany and were artists in residence at the ICA London 1998.
Exhibitions and Reviews
Corby and Baily's work has been exhibited and featured at the ICA in London, Victoria and Albert Museum, Tate Online, the Madrid Art Fair Arco 2001, Intercommunication Center Tokyo (ICC) and media art festivals including the Inter-Society for the Electronic Arts (ISEA), Transmediale, Urban Screens amongst others. Reviews include: Art Review 2009, 2000, La Republica 2010, The Guardian 2011, Neural (magazine) IT 2009, Art Monthly 2007, Artist Newsletter 2006, De bug magazine 2002.
References
Published writings
2011: "Systemness: toward a data aesthetics of climate change”, in Far Field: Digital Culture, Climate Change and the Poles (eds), Marsching JD and Polli A., London: Intellect.
2010: “Myriad couplings: toward an information aesthetics of climate change”, media-N Journal, Vol. 7, No. 2, (Spring 2010).
2008 “Landscapes of feeling, arenas of action: information visualisation as art practice”, Leonardo Vol. 41, No. 5, (October 2008).
2007: “Cyclone.soc: an Interactive Artwork Visualising Internet Newsgroup Postings as Cyclonic Weather Conditions”, Journal of Visualisation Japan, Vol. 10, No. 4, (2007) 338.
2005: Corby T. (ed.) Network Art: Practices and Positions, London: Routledge. [Edited volume]
2003: Corby T. "Gameboy UltraF_uk" Novas Medias (New Medias) Symposium Proceedings 'File 2003.
2000: Reconnoitre", Net Art Guide, Fraunhofer Institute ?: Stuttgart, 2000, pp. 214–216 ().
1997: ICA lecture “Building the Cybercity”, ICA Audio tape, London: ICA;
2006: “Extra-Ordinary Practices”, essay, exhibition catalogue for Extra-Ordinary Practices: A Retrospective of British Media Art, Kunsthaus Dresden, pp. 53–64 ().
2006: “New+Media+Arts: Developments in Computer Based Arts” essay, pp. 167–169 exhibition catalogue for Extra-Ordinary Practices: A Retrospective of Britis |
https://en.wikipedia.org/wiki/Vandal%20Hearts%3A%20Flames%20of%20Judgment | is a turn-based, tactical role-playing video game by American developer Hijinx Studios for PlayStation Network and Xbox Live Arcade with a release date of January 20, 2010.
Gameplay
Flames of Judgment is a turn-based, tactical role-playing game, where players engage their band of warriors in turn-based combat on a three-dimensional isometric grid against an opposing force. Each character performs an action each turn where he can move, then use a weapon, item or magical ability. Every action increases the character's skill, slowly leveling up overall as the player progresses through the main story.
Reception
IGN gave Flames of Judgment a 7.3, praising the traditional gameplay while criticizing the graphics and art design.
References
2010 video games
Fantasy video games
Konami games
PlayStation Network games
Tactical role-playing video games
Video game prequels
Video games developed in the United States
Xbox 360 Live Arcade games
Single-player video games
Hijinx Studios games |
https://en.wikipedia.org/wiki/ASCE%20Library | ASCE Library is an online full-text civil engineering database providing the contents of peer-reviewed journals, proceedings, e-books, and standards published by the American Society of Civil Engineers. The Library offers free access to abstracts of Academic journal articles, proceedings papers, e-books, and standards as well as many e-book chapters. Access to the content is available either by subscription or pay-per-view for individual articles or chapters. E-books and standards can be purchased and downloaded in their entirety. Most references cited by journal articles and proceedings papers in the library are linked to original sources using CrossRef. Linking provides researchers with the ability to link from reference citations to the bibliographic records of other scientific and technical publishers’ articles. ASCE also offers librarians usage statistics which are compliant with the COUNTER Code of Practice for Journals and Databases. All articles are in PDF (Portable Document Format) and many journal articles are also available in HTML format.
History
ASCE Journals first appeared online in the Fall of 2000. The online collection was designated ASCE Research Library in the Fall of 2004 with the addition of ASCE Proceedings papers. In June 2012, the platform migrated from Scitation, to Literatum managed by Atypon and the site was renamed ASCE Library. In June 2013, e-books and standards were added with the ability to download individual book chapters as well as complete books. In 2016, ASCE added access to premium content from Civil Engineering Magazine.
Coverage
The ASCE Library offers online access to more than 150,000 technical and professional papers. It encompasses the full text of papers published in 35 journals (as of 2019) from 1983 to the present, conference proceedings from 2000 to the present, and full text of ASCE standards and e-books. The ASCE Library is supplemented by Civil Engineering Database (CEDB), a free bibliographic database offering records of all publications by American Society of Civil Engineers since 1872. CEDB is updated at the end of each month. The update includes the journal content for the following month and all other content published in the previous month.
Journals
Coverage includes the following Journals:
ASCE OPEN: Multidisciplinary Journal of Civil Engineering
International Journal of Geomechanics
Journal of Architectural Engineering
Journal of Aerospace Engineering
Journal of Bridge Engineering
Journal of Composites for Construction
Journal of Performance of Constructed Facilities
Journal of Civil Engineering Education
Journal of Construction Engineering & Management
Journal of Computing in Civil Engineering
Journal of Cold Regions Engineering
Journal of Environmental Engineering
Journal of Engineering Mechanics
Journal of Energy Engineering
Journal of Geotechnical & Geoenvironmental Engineering
Journal of Hazardous, Toxic & Radioactive Waste
Journal of Hydrologic Engineering
Journal of Hyd |
https://en.wikipedia.org/wiki/Input%20port | Input port may refer to:
Input device, a generic term for any device that provides input to a system
Parallel port, a computer hardware interface
Serial port, a computer hardware interface
Universal Serial Bus, a computer hardware interface
IEEE 1394 interface, a computer hardware interface, known commonly as Firewire
PS/2 connector, a common computer interface for mice and keyboards
See also
Output device
Peripheral device
Computer hardware
Computer keyboard
Mouse (computer) |
https://en.wikipedia.org/wiki/Pixetell | Pixetell was an online communication and collaboration tool for producing and sharing screencasts, or short videos that present the contents and activity on their computer screen. Its developer, Ontier Inc., was acquired in 2011, but it was not publicly disclosed what company acquired Ontier and its product Pixetell. The service was discontinued in May 2011.
Pixetell screencasts could be combined with audio voice-over, existing video files and webcam recordings to present information to the person viewing the recording; attachments may be added and sent as part of the message. The software permitted people to communicate asynchronously; as with email, the producer and the viewer did not need to be online at the same time; but as with remote desktop software, it was possible to provide detailed demonstrations of computer-based tasks.
Pixetell production software was available only for Microsoft Windows; the recordings were displayed in Flash format, and viewable from Windows, Mac OS X, and Linux.
Files could be attached to Pixetell messages and existing video could be edited into a Pixetell message.
As is the case with some other screen recording and screencasting software products, Pixetell's software could be used to create messages that demonstrate software features and critiques of digital documents. The messages had applications in customer service, document editing, sales, training and education. The messages could be sent by email or embedded in web pages, documents, and social media sites. They also had applications in training and education such as professional development, inter-school communication, parent/teacher communication, and project collaboration.
See also
Collaborative software
Comparison of screencasting software
Distance education
Multimodal interaction
Instructional design
References
External links
pixetell.com (Archive of "Pixetell" page from 27 September 2010)
Business software
Collaborative software
Screencasting software
Groupware
Multimodal interaction
2008 software |
https://en.wikipedia.org/wiki/WeoGeo | WeoGeo was acquired by Trimble Navigation in 2014 and became known as "Trimble Data Marketplace." It allowed users to discover, transform and download geospatial data. WeoGeo launched at the 2007 Where 2.0 Conference in San Jose, CA. WeoGeo and Safe Software announced a partnership in 2008 to bring FME Server to the cloud on Amazon Web Services.
WeoGeo was co-founded by W. Paul Bissett and Dave Kohler.
History
WeoGeo was established in 2006, and spun out of the Florida Environmental Research Institute, where the founders had worked together for nine years. It was founded to enable greater productivity in the geospatial industry by removing the vertical barriers to geo-content creation and sharing. In 2007, WeoGeo was a finalist in the Amazon Web Services StartUp Challenge. WeoGeo released their Library Appliance in the July, 2008 concurrent with their Market service. They released their Library, a monthly, Software-as-a-Service version of their Appliance, in March, 2009. WeoGeo left private beta on May 6, 2010 opening the service to the public. In the fall of 2012, WeoGeo became more focused on marketplace offerings.
Products and services
WeoGeo's main product is the WeoGeo Market. It can handle millions of individual geo-content files and maps, ranging in file size from megabytes to terabytes. It is an internet B2B marketplace that enables geospatial professionals to search, discover, customize, and acquire professional geo-content within minutes of entry to the marketplace.
Location
WeoGeo was located in Portland, OR at the Portland State Business Accelerator until acquired by Trimble.
Closure
In 2018 Trimble shut down Trimble Data Marketplace, directing users to other services.
References
External links
WeoGeo
Video Introduction
WeoGeo Market
WeoGeo Support
GIS companies
Internet properties established in 2006
Companies based in Portland, Oregon
Privately held companies based in Oregon |
https://en.wikipedia.org/wiki/Upper%20Harz%20Water%20Tunnels | The Upper Harz Water Tunnels (, ) are part of the Upper Harz Water Regale - a network of reservoirs, ditches, tunnels and other structures in the Harz mountains of central Germany. The German term Wasserlauf refers to the underground element (i.e. the tunnels) of the network of watercourses used in the historic silver mining industry of the Upper Harz. This network of ditches and tunnels was used to supply the mines with headrace waters for their water wheels from the 16th century onwards. In the system of the Upper Harz Water Regale there are over 35 such tunnels with a total length of about .
Construction
Although explosives were already in use in the 17th century in the mines of the Upper Harz, tunnels continued to be hewn out by hand, that is with hammer and chisel for much longer. The reason was that there were difficulties in determining the right amount of gunpowder and fears that tunnels running just under the surface would collapse or that the explosive would produce fissures in the rock causing water to leak away. Almost all water tunnels were driven by counter-heading. Until the 18th century the miners excavated tunnels by following the weakest rock; this sometimes created a zigzag route that deviated significantly from the direct line. Not until the 19th century were tunnels driven in a strictly direct line using explosives.
The incline necessary to create a flow of water often amounted to less than 1% (in other words less than drop for every of length). The profile of the older tunnels, that had been driven with hammer and chisel, was sometimes as small as high and wide. The newer tunnels, however, were generally high and wide.
Compared with ditches, tunnels had the important advantage that the water flowing through them underground could not freeze up. The tunnels were laid primarily to short cut the long ditch runs around mountains. Such cuts also produced a steeper incline (shorter distances descending the same height difference have a steeper slope). This raised the flow velocity and hence the hydraulic capacity of the watercourse. The disadvantage of tunnels was the high investment cost of building them.
List of working Upper Harz water tunnels
The working tunnels shown in this table follow the order in the latest listing by Preussag, which is based on their use in the various power stations.
List of disused Upper Harz water tunnels
"Disused" refers to all those tunnels that are no longer in service. Some of these are completely preserved; others, however, have largely fallen into ruin. The following list makes no claim to being complete.
See also
Upper Harz
Upper Harz Water Regale
Upper Harz Ponds
Upper Harz Ditches
Mining in the Upper Harz
Rösche - generic German mining term for water tunnels
Sources
External links
Information by the Harzwasserwerke
Tunnels in Germany
Kunstgraben |
https://en.wikipedia.org/wiki/Stratocladistics | Stratocladistics is a technique in phylogenetics of making phylogenetic inferences using both geological and morphobiological data. It follows many of the same rules as cladistics, using Bayesian logic to quantify how good a phylogenetic hypothesis is in terms of debt and parsimony. However, in addition to the morphological debt that is used to determine phylogenetic dissimilarities in cladistics, there is also stratigraphic debt which adds the dimension of time to the equation.
Although stratocladistics has been viewed with suspicion by some workers, it represents a total evidence approach that has some advantages over traditional cladistic approaches. For example, stratocladistics has been shown to outperform simple parsimony in tests based on simulated data and stratocladistics has better resolution than simple cladistics, with fewer equally parsimonious trees than in a basic cladistic analysis.
References
Further reading
External links
— software for stratocladistic reconstructions
Phylogenetics |
https://en.wikipedia.org/wiki/List%20of%20countries%20by%20population%20in%202000 | This is a list of countries by population in 2000. It is a list of countries in the world by population in the exact beginning of the year 2000.
Because the table contains data only for the 230 nations and territories at the start of 2000, there are no entries for national regions declared later in 2000 or subsequent years.
This list adopts definitions of "country" on a case-by-case basis. The United Kingdom is considered as a single country while constituent countries of the Kingdom of the Netherlands are regarded separately.
See also
List of countries
List of countries by area
List of countries by past and future population
List of countries by population
List of countries by population in 1900
List of countries by population in 2005
List of countries by population in 2010
List of continents by population
List of religious populations
World population
Human geography
Notes
External links
United Nations Analytical Report for the 2004 revision of World Population Prospects – includes details of methodology and sources used for the population estimates above.
Population clocks & projected growth charts for all countries
Countries by population in 2000
2000 |
https://en.wikipedia.org/wiki/ANSI%20C12.19 | ANSI C12.19 is the American National Standard for Utility Industry End Device Data Tables
This standard defines a table structure for utility application data to be passed between an end device and a computer. The "end device" is typically an electricity meter, and the "computer" is typically a hand-held device carried by a meter reader, or a meter communication module which is part of an automatic meter reading system. C12.19 does not define end device design criteria nor specify the language or protocol used to transport that data. There are however related ANSI standards which do specify the transportation of these tables. ANSI C12.18 describes the communication of C12.19 tables over an optical port. ANSI C12.21 describes the communication of C12.19 tables over a modem. ANSI C12.22 describes the communication of C12.19 tables over a network.
The purpose of the tables is to define structures for transporting data to and from end devices. A related standard, IEC 61968 defines a CIM information model for energy data.
History
The structures were originally known as the "Tucker Tables" (after Richard Tucker.) The tables were developed under the auspices of the American National Standards Institute, C12, SC17, WG2. The standard is sponsored by NEMA, and also published as MC12.19 and IEEE Std 1377.
Popularity of the tables has grown over the years such that most electric meter vendors in North America now support and use the tables in their products.
The committee (working group 2) is currently chaired by Avygdor Moise and released a revision 2 of the standard in 2008, revision 2.1 of the standard in 2012.
Effective 2014, the object identifiers (device classes) and XML documents (TDLs/EDLs) of this standard are managed and registered by the Energy Communications Management eXchange (ECMX) under the supervision of the North American End Device Registration Authority (NAEDRA).
External links
The ANSI C12.19 standard at NEMA
The IEEE Standard 1377-2012 for Utility Industry Metering Communication Protocol Application Layer (End Device Data Tables) at IEEE
The ANSI C12.19/IEEE Std 1377 and ANSI C12.22/IEEE Std 1703 Registry at ECMX
The North American End Device Registration Authority at NAEDRA
RFC 6142 Framework for transporting ANSI C12.22, IEEE 1703, and MC12.22 Transport Over IP at IETF
Electrical standards
Telecommunications standards
ANSI C12
IEEE standards
IEEE Std 1377|IEEE Std 1701|IEEE Std 1702|IEEE Std 1703|IEEE Std 1704
AMI|Smart Meter
Electric power distribution |
https://en.wikipedia.org/wiki/ANSI%20C12.22 | ANSI C12.22 is the American National Standard for Protocol Specification for Interfacing to Data Communication Networks
ANSI C12.22/IEEE Std 1703 describe a protocol for transporting ANSI C12.19 table data over networks, for the purpose of interoperability among communications modules and meters. This standard uses AES encryption to enable strong, secure communications, including confidentiality and data integrity. The cipher mode used, a derivation of EAX mode called EAX' (EAX prime), is provably secure in the context of C12.22. However, this cipher mode cannot be used securely for non-standard short messages (messages less than the key length of 16 bytes). Its security model is extensible to support new security mechanisms.
ANSI C12.22/IEEE Std 1703 define message services which are components of an Advanced Metering Infrastructure (AMI) for smart grids.
There is also for transporting C12.22 data using TCP and UDP transport over IP networks.
The ANSI C12.22 / IEEE Std 1703 service and domains consist of ANSI C12.22 / IEEE Std 1703 Network Segments and ANSI C12.22 / IEEE Std 1703 Nodes that are managed by distributed trusted centers, network relays and gateways. As smart grid AMI networks evolve, ANSI C12.22 / IEEE 1703 domains may be created to service the utilities' Field Area Networks (FAN) and the Home/Premise Area Networks (HAN/PAN). Nodes that operate in these domains must be registered with unique application title names (ApTitles) that need to be registered (ECMX).
External links
The ANSI C12.22 standard at NEMA
1703-2012 - IEEE Standard for Local Area Network/Wide Area Network (LAN/WAN) Node Communication Protocol to Complement the Utility Industry End Device Data Tables
The ANSI C12.19 / IEEE Std 1377 and ANSI ANSI C12.22 / IEEE Std 1703 Registry at ECMX
North American End Device Registration Authority: In support of ANSI C12.19 / IEEE Std 1377
: ANSI C12.22, IEEE 1703, and MC12.22 Transport Over IP
References
Telecommunications standards
ANSI C12
IEEE standards
AMI|Smart Meter
IEEE Std 1377|IEEE Std 1701|IEEE Std 1702|IEEE Std 1703|IEEE Std 1704 |
https://en.wikipedia.org/wiki/Register%20of%20data%20controllers |
The Register of data controllers was a United Kingdom database under the control of the UK Information Commissioner's Office mandated by the Data Protection Act 1998.
The Register of fee payers is the new name of an equivalent register under the Data Protection Act 2018, which implements the European Union's General Data Protection Regulation (GDPR).
Registration under both Acts carries a fee, the proceeds of which fund the UK Information Commissioner's Office. Any entry may be inspected by the public at any time at no cost to the enquirer.
Data Protection Act 1998
Under the 1998 Act, the name of the data controller was recorded with the purpose(s) for the processing of the data processed by that controller within the meaning of The Act.
A data controller may, under some circumstances, be exempt from registration (previously termed notification). When not exempt, failure to notify the Information Commissioner's Office formally before the start of processing data was a strict liability offence for which a prosecution may be brought by the Information Commissioner's Office in the criminal court of the UK. Failure to notify was a criminal offence unless exempt. Exemption from registration does not exempt a data controller from compliance with The Act.
Amendments to a data controller's notification could be made at any time, and must have been made before the start of a new processing purpose.
Data Protection Act 2018
Under the 2018 Act, the register is called the Register of fee payers, and the purposes for processing are nor supplied, though other trading names and the name of a Data Protection Officer may be given.
The enforcement of the Act by the Information Commissioner's Office is supported by a data protection charge on UK data controllers under the Data Protection (Charges and Information) Regulations 2018. Exemptions from the charge were left broadly the same as for 1998 Act: largely some businesses and non-profits internal core purposes (staff or members, marketing and accounting), household affairs, some public purposes, and non-automated processing. Under the 2018 Act, the enforcement regime for registration changed from criminal to civil monetary penalties.
References
External links
Register of fee payers, at which any entry may be inspected at no charge.
Information privacy
Government databases in the United Kingdom
Law of the United Kingdom |
https://en.wikipedia.org/wiki/Children%27s%20Indradanush | Children's Indradanush is a children's publication run by activists of All India People's Science Network (AIPSN). The meaning of the title is "Rainbow".
It is mainly supported by Himachal Gyan Vigyan Samiti, a member of AIPSN. This magazine has circulation in various states of Northern India like Himachal Pradesh, UP, Bihar, Delhi, Chhattisgarh and Uttarakhand. Many articles are on general topics addressing rural children of Northern India. The magazine gives importance to scientific attitude and temper. It is run mostly by volunteer commitments.
References
External links
https://web.archive.org/web/20081010232723/http://publications.aidindia.org/content/view/61/74/
https://web.archive.org/web/20121001160305/http://www.expressindia.com/latest-news/reading-the-rainbow/380354/
http://www.indianexpress.com/news/reading-the-rainbow/380354/
http://www.aidprojects.org/projects-view-1.asp?login=guest&id=305
https://web.archive.org/web/20090419141426/http://www.aidboston.org/indradhanush/aboutus/
https://web.archive.org/web/20060118133645/http://www.aidboston.org/files/2005_04_03-2.ppt
http://www.aidboston.org/indradhanush/files/uttaranchal-news.gif
Children's literature organizations |
https://en.wikipedia.org/wiki/High%20Frequency%20Data%20Link | High Frequency Data Link (HFDL) is an ACARS communications medium used to exchange data such as Aeronautical Operational Control (AOC) messages, Controller Pilot Data Link Communications (CPDLC) messages and Automatic Dependent Surveillance (ADS) messages between aircraft end-systems and corresponding ground-based HFDL ground stations. Using the unique propagation characteristics of high-frequency radio waves, the ground stations provide data link communications to properly equipped aircraft operating anywhere in the world. As a result, pilots can always communicate with someone on the ground.
Avionics supporting HFDL
To use the service, an aircraft only needs a Communications Management Unit (CMU), or equivalent and an HFDL data radio. The CMU is an airborne communications router that interfaces with many aircraft communications systems including SATCOM, VHF, HFDL, FMS and others.
Global coverage
Today, HFDL is an air/ground data link standard with coverage in virtually every corner of the globe, approximately where aircraft are never out of touch both in the air and on the ground. There are around 15 HF ground stations (HGS) available today, and, like a canopy within a jungle, the stations provide overlap and redundancy in the unlikely event of a HGS failure. These 15 stations provide nearly complete global coverage, including both poles, and system availability is 100 percent.
Evolving technology
The HFDL network and avionics are a continuing evolution. Recent innovations in avionics software developed by both Honeywell and Collins have enhanced performance and contribute to the service’s outstanding message success rates. There is continued investment in the HFDL infrastructure and there is a long term strategy in place to ensure its success.
ARINC have been quoted as saying that the system and its use have grown at rates above 20% for each of the past ten years and it now supports over sixty airlines with well over 1,200 aircraft sending more than 1 million messages a month. In 2009 eight new operating frequencies were added which brings the total number of frequencies to 167 worldwide.
Increased system use
The design of the system allows for 4 channels per ground station. Currently, 12 stations are only using ½ of the designed capacity. 3 others are using 3 of the 4 designed channels. Stations are actively monitored for traffic load and can determine when additional channels needs to be added by the service providers.
HFDL outperforms HF voice
Due to the digital nature of HFDL, it uses between 1/3 and 1/2 of the bandwidth that voice requires, so data can continue to be decoded when voice is unusable. This was proven during the 2003 Halloween Solar Storm when aircraft were still using HFDL on polar routes when voice was unusable.
Automatic frequency selection
HFDL does not require pilots to dial in specific frequencies, as with HF voice, the data radios constantly scan and select the most efficient frequency to use making |
https://en.wikipedia.org/wiki/System%20G | System G may refer to:
Technology
System G (supercomputer), a cluster supercomputer at Virginia Tech
CCIR System G, a 625-line analog television transmission format |
https://en.wikipedia.org/wiki/Ludic%20interface | A ludic interface is an inherently "playful" type of computer interface. This field of human–computer interaction research and design draws on concepts introduced by Dutch historian and cultural theorist Johan Huizinga in the book Homo Ludens ("Man the Player" or "Playing Man").
Huizinga's work is considered an important contribution to the development of game studies.
The various tools and concepts associated with ludic interface development differ from mainstream technological systems that employ human computer interfacing and interaction. Ludic interfaces tend to be more playful, are user-generated and user-driven, flexible, low-cost and cooperative. Such interfaces are often experimental and draw upon methods and knowledge from video game design, interactive media, modding cultures, media conversion, and social networking. The goal of ludic interface design is to create interfacing technology that offers ease of use and is inherently playful.
Core concept
At its core, "ludic interfaces" is a subcategory of interfaces in general. The notion is not restricted to electronics or human–computer interaction, even if the terminology was developed in respect to digital technology. Various authors suggest to use the term "ludic interfaces" for non-digital phenomena, e.g. architectural facades, skins, wearable computers, media art. "Ludic Interfaces" is also a Masters programme development on a European level. It is the title of a European collaboration in creating a network of academic institutions and of world leading media centres to investigate, design and test publicly shared digital content. The programme development is a joint project by the University of Potsdam, Universidad Politécnica de Valencia, Universität für künstlerische und industrielle Gestaltung in Linz, and by the University of Salford in Greater Manchester.
History
Ludic interface design was first defined in 2002 by William Gaver, in "Designing for Homo Ludens", expanded in a later article in 2009.
The term was revisited in 2008 by International Symposium on Electronic Art) curators Gunalan Nadarajan and Vladimir Todorović to describe a panel section of ISEA2008 in Singapore. The term was introduced with the aim of counterbalancing the tendency of "infantilization of play" and stressing the "complicities between technology and pleasure".
In the same year a group of game artists and scholars at Leuphana University in Lueneburg started lecturing and writing about the theory of Ludic Interfaces and applied for a European grant to develop a Masters programme in Ludic Interfaces. The application was successful and the development has successfully been completed in 2013.
The notion of "ludic interfaces" has also historical roots in artistic practice and analysis of interfaces (cf. Christa Sommerer, Laurent Mignonneau), the notion of "playfulness" as a design and arts strategy, or the "Ludic Society" arts organisation.
Examples
Jess Kilby’s RFID Tarot table consists of a hand-p |
https://en.wikipedia.org/wiki/Wireless%20Commons%20License | The Wireless Commons License describes the principles, terms and conditions for many libre and open wireless community networks. In summary it gives the right to use the network for any purpose unless you affect the operation of the network or the freedom of other users, the right to know and learn any detail of the network and its components, the freedom of joining or extending the network following the same conditions.
Community networks following this license are used, owned, operated, extended and governed by the community, the same group people with no separation between service providers and users. It can be seen as an equivalent license for libre and open wireless community networks compared to software licenses for libre and open software.
References
Guifi.net
Community networks |
https://en.wikipedia.org/wiki/Home%20computer | Home computers were a class of microcomputers that entered the market in 1977 and became common during the 1980s. They were marketed to consumers as affordable and accessible computers that, for the first time, were intended for the use of a single, non-technical user. These computers were a distinct market segment that typically cost much less than business, scientific, or engineering-oriented computers of the time, such as those running CP/M or the IBM PC, and were generally less powerful in terms of memory and expandability. However, a home computer often had better graphics and sound than contemporary business computers. Their most common uses were word processing, playing video games, and programming.
Home computers were usually sold already manufactured in stylish metal or plastic enclosures. However, some home computers also came as commercial electronic kits, like the Sinclair ZX80, which were both home and home-built computers since the purchaser could assemble the unit from a kit.
Advertisements in the popular press for early home computers were rife with possibilities for their practical use in the home, from cataloging recipes to personal finance to home automation, but these were seldom realized in practice. For example, using a typical 1980s home computer as a home automation appliance would require the computer to be kept powered on at all times and dedicated to this task. Personal finance and database use required tedious data entry.
By contrast, advertisements in the specialty computer press often simply listed specifications, assuming a knowledgeable user who already had applications in mind. If no packaged software was available for a particular application, the home computer user could program one—provided they had invested the requisite hours to learn computer programming, as well as the idiosyncrasies of their system. Since most systems arrived with the BASIC programming language included on the system ROM, it was easy for users to get started creating their own simple applications. Many users found programming to be a fun and rewarding experience, and an excellent introduction to the world of digital technology.
The line between 'business' and 'home' computer market segments vanished completely once IBM PC compatibles became commonly used in the home, since now both categories of computers typically use the same processor architectures, peripherals, operating systems, and applications. Often, the only difference may be the sales outlet through which they are purchased. Another change from the home computer era is that the once-common endeavor of writing one's own software programs has almost vanished from home computer use.
Background
As early as 1965, some experimental projects, such as Jim Sutherland's ECHO IV, explored the possible utility of a computer in the home. In 1969, the Honeywell Kitchen Computer was marketed as a luxury gift item, and would have inaugurated the era of home computing, but none were sold. |
https://en.wikipedia.org/wiki/Shooting%20Stars%20Award | The Shooting Stars Awards are presented annually by the pan-European network organization European Film Promotion (EFP) to emerging actors from Europe. "Shooting Stars" is an initiative of the EFP for the international promotion and networking of promising up-and-coming actors from the 37 EFP member countries. Since 1998, ten talents selected from all over Europe have been presented each year during the Berlin International Film Festival (Berlinale) to the international press, the general public, and the film industry. The four-day programme culminates with the presentation of the European Shooting Stars Awards.
Selection and programme
The EFP member organisations from a total of 37 European countries can each nominate one actor/actress aged between 18 and 32, who has been successful and already won awards in their native country.
An independent international expert jury selects the 10 best and internationally most promising talents to then be presented at the Berlinale to international casting directors, agencies, directors, producers as well as the international press and the general public and to also receive the European Shooting Star Award at the end of the programme.
Award winners
Up until 2018, a total of 170 actresses and 133 actors had been presented at the Berlinale and received awards as European Shooting Stars, including the now internationally known actors Rachel Weisz (UK 1998), Franka Potente (Germany 1998), Daniel Craig (UK 2000), August Diehl (Germany 2000), Nina Hoss (Germany 2000), Thure Lindhardt (Denmark 2000), Heike Makatsch (Germany 2001), Ludivine Sagnier (France 2001), Jérémie Renier (Belgium 2002), Daniel Brühl (Germany 2003), Nikolaj Lie Kaas (Denmark 2003), Matthias Schoenaerts (Belgium 2003), Andrew Scott (Ireland 2004), Ruth Negga (Ireland 2006), Mélanie Laurent (France 2007), Carey Mulligan (UK 2009), Pilou Asbaek (Denmark 2011), Alicia Vikander (Sweden 2011), Riz Ahmed (UK 2012), Carla Juri (Switzerland 2013), George MacKay (UK 2014) and Maisie Williams (UK 2015).
1990s
2000s
2010s
2020s
Partners
The European Shooting Stars is supported by the participating EFP member organisations, the Creative Europe MEDIA Programme of the European Union as well as by other cooperation partners and sponsors.
References
External links
Official website
European film awards |
https://en.wikipedia.org/wiki/Clavicorona | Clavicorona is a fungal genus in the family Auriscalpiaceae. The genus was first described by Maxwell Stanford Doty in 1947, who included the species C. pyxidata, C. cristata, C. taxophila, and C. candelabrum. E.J.H.Corner added another five species in 1950: C. candelabrum, C. colensoi, C. javanica, C. mairei, and C. tuba. He included C. dichotoma in 1970.
In his 1972 revision of the genus, James Dodd listed 11 species, but most of these have since been transferred to other genera, particularly Artomyces. According to the nomenclatural database Index Fungorum, the genus is monotypic, as the sole remaining valid species is the type, Clavicorona taxophila.
References
Monotypic Russulales genera
Russulales |
https://en.wikipedia.org/wiki/Korti | Korti or Kurti () is a town in northern-central Sudan. In the Meroitic period the city appeared as Cadetum, Cadata or Coetum in Roman sources. The town lies about from Khartoum, on the south side of the Nile at the terminus of the Wadi Muqaddam. It is also known for being the centre location for the Shaigiya tribe.
History
In 1820 the town was the site of a battle between the Shaiqiya and an invading force of Muhammad Ali Pasha. In 1881, the Mahdist uprising led to Britain sending in an army in August 1884 under Garnet Wolseley in the so-called Nile Expedition to relieve General Gordon. Korti became a rallying point for British troops. In January 1885 a fort was built by British troops on the north side of the Nile, right in front of Korti. From here, the advance on the Nile and through the desert could take place simultaneously. In the fighting in the Bayuda Desert between Kurti and Metemmeh (on the Nile opposite Shendi) the Madhist Sudanese suffered a defeat in the Battle of Abu Klea soon after the base at Korti was built.
See also
List of cities in Sudan
Subdivisions of Sudan
Umbukole
References
Populated places in Northern (state) |
https://en.wikipedia.org/wiki/Overcompleteness | Overcompleteness is a concept from linear algebra that is widely used in mathematics, computer science, engineering, and statistics (usually in the form of overcomplete frames). It was introduced by R. J. Duffin and A. C. Schaeffer in 1952.
Formally, a subset of the vectors of a Banach space , sometimes called a "system", is complete if every element in can be approximated arbitrarily well in norm by finite linear combinations of elements in . A complete system is additionally overcomplete if there exists a which can be removed from the system while maintaining completeness (i.e., ). In this sense, the system contains more vectors than necessary to be complete, hence "overcomplete".
In research areas such as signal processing and function approximation, overcompleteness can help researchers to achieve a more stable, more robust, or more compact decomposition than using a basis.
Relation between overcompleteness and frames
Overcompleteness is usually discussed as a property of overcomplete frames. The theory of frame originates in a paper by Duffin and Schaeffer on non-harmonic Fourier series. The frame is defined to be a set of non-zero vectors such that for an arbitrary ,
where denotes the inner product, and are positive constants called bounds of the frame. When and can be chosen such that , the frame is called a tight frame.
It can be seen that .
An example of frame can be given as follows.
Let each of and be an orthonormal basis of , then
is a frame of with bounds .
Let be the frame operator,
A frame that is not a Riesz basis, in which case it consists of a set of functions more than a basis, is said to be overcomplete. In this case, given , it can have different decompositions based on the frame. The frame given in the example above is an overcomplete frame.
When frames are used for function estimation, one may want to compare the performance of different frames. The parsimony of the approximating functions by different frames may be considered as one way to compare their performances.
Given a tolerance and a frame in , for any function , define the set of all approximating functions that satisfy
Then let
indicates the parsimony of utilizing frame to approximate . Different may have different based on the hardness to be approximated with elements in the frame. The worst case to estimate a function in is defined as
For another frame , if , then frame is better than frame at level . And if there exists a that for each , we have , then is better than broadly.
Overcomplete frames are usually constructed in three ways.
Combine a set of bases, such as wavelet basis and Fourier basis, to obtain an overcomplete frame.
Enlarge the range of parameters in some frame, such as in Gabor frame and wavelet frame, to have an overcomplete frame.
Add some other functions to an existing complete basis to achieve an overcomplete frame.
An example of an overcomplete frame is shown below. The collecte |
https://en.wikipedia.org/wiki/Space%20Chimps%202%3A%20Zartog%20Strikes%20Back | Space Chimps 2: Zartog Strikes Back is a 2010 American computer-animated comic science fiction film directed and produced by John H. Williams and written by Rob Moreland. It is the sequel to Space Chimps (2008). Zack Shada, Carlos Alazraqui, Cheryl Hines, Patrick Warburton, Stanley Tucci, Patrick Breen, Omid Abtahi and Jane Lynch reprise their roles from the previous film; Andy Samberg, Jeff Daniels, and Kristin Chenoweth were replaced by Tom Kenny, John DiMaggio, and Laura Bailey, respectively. Space Chimps 2 was theatrically released in the United Kingdom on May 28, 2010. 20th Century Fox Home Entertainment released it direct-to-video in the United States on October 5, 2010. It received universally negative reviews by critics, including a rare 0% rating on Rotten Tomatoes.
Plot
Two years after the events of the first film, Comet (Zack Shada), a tech-savvy young chimpanzee, wants to be taken seriously as a full-fledged space chimp, but Ham (Tom Kenny), Luna (Cheryl Hines) and the other chimpanzees do not take him seriously. Comet learns that he was removed from the last space mission because of budget cuts, and plans to go on the next space mission. Comet interferes with the controls on a rocket, accidentally launching the ship into space. Eventually, Comet lands on Planet Malgor, where he meets Ham’s alien friend, Kilowatt (Laura Bailey), for the first time, and gains respect from the residents there.
However, back on Earth, Zartog (John DiMaggio) wants to get revenge on Ham for foiling his plans, and encounters an oblivious Titan (Patrick Warburton), who gives him a tour of NASA headquarters. Zartog takes over Mission Control using a remote that vaporizes objects and zaps the Senator (Stanley Tucci) and the three scientists, Dr. Bob (Patrick Breen), Dr. Jagu (Omid Abtahi) and Dr. Poole (Jane Lynch) out of existence. Comet, accompanied by Kilowatt, returns to Earth, while Ham evades Zartog by riding on a jetpack. While Zartog is distracted, Comet manages to steal the remote and reprograms it to bring the Senator and the scientists back, and shrink Zartog; Zartog escapes while the others laugh. The film ends with Zartog running from a dog he harassed earlier and a Guinea pig from the Mars mission, mentioned in the prior film.
Cast
Zack Shada as Comet
Laura Bailey as Kilowatt, Computer Voice, Instar Receptionist, Girl Reporter
Carlos Alazraqui as Houston, Piddles the Clown, Camera Guy
Tom Kenny as Ham III, Reporter #1
Cheryl Hines as Luna
Patrick Warburton as Titan
John DiMaggio as Zartog
Stanley Tucci as Senator
Patrick Breen as Dr. Bob
Omid Abtahi as Dr. Jagu, Reporter #2
Jane Lynch as Dr. Poole
Release
Entertainment Film Distributors released the film to cinemas in the United Kingdom on May 28, 2010, and 20th Century Fox released it in the United States on October 5, 2010. Space Chimps 2 grossed $4.3 million.
Space Chimps 2: Zartog Strikes Back is the second Vanguard Animation film that was a sequel. The film was released on |
https://en.wikipedia.org/wiki/Multi-party%20authorization | Multi-party authorization (MPA) is a process to protect a telecommunications network, data center or industrial control system from undesirable acts by a malicious insider or inexperienced technician acting alone. MPA requires that a second authorized user approve an action before it is allowed to take place. This pro-actively protects data or systems from an undesirable act.
Architecture
Existing methods to protect data and systems from the malicious insider include auditing, job rotation and separation of duties. Auditing is a reactive method meant to discover who did what after the fact. Job rotation and separation of duties are limiting techniques meant to minimize prolonged access to sensitive data or systems in order to limit undesirable acts. In contrast, MPA is a pro-active solution.
An advantage MPA has over other methods to protect from undesirable acts by a malicious insider or inexperienced operator is that MPA is pro-active and prevents data or systems from compromise by a single entity acting alone. MPA prevents the initial undesirable act rather than dealing with a breach or compromise after the fact.
Application
Multi-party authorization technology can secure the most vulnerable and sensitive activities and data sources from attack by a compromised insider acting alone. It is somewhat analogous to weapons systems that require two individuals to turn two different keys in order to enable the system. One person cannot do it alone. Another example is to consider access to a lock box in a bank. That access requires multiple parties, one the lock box owner and another a bank official. Both individuals act together to access the lock box, while neither could do so alone. MPA, in like manner, ensures that a second set of eyes reviews and approves of activity involving critical or sensitive data or systems before the action takes place.
Multi-party authorization is suitable for a wide variety of applications. MPA can be implemented to protect any type of sensitive data in electronic form or any activity within a network infrastructure or computerized control system. An electronic health record is an example of a data record that could be protected by MPA. Multi-party authorization provides pro-active protection from undesirable acts by the inexperienced technician or malicious insider.
References
US Patent 7,519,826, issued: April 14, 2009 for "Near Real Time Multi-Party Task Authorization Access Control"
Further reading
IT BusinessEdge, Nov 25, 2009 "Protecting From the Malicious Insider: Multi Party Authorization"
Data security |
https://en.wikipedia.org/wiki/TVS%20%28Malaysian%20TV%20channel%29 | TVS (formerly TV Sarawak) is a linear digital television channel which provides news and programming from the region of Sarawak to the state itself plus other parts of Malaysia. TVS can be watched nationwide via the platform Astro, Unifi TV and myFreeview on channel 122.
History
Radio Television Malaysia (RTM) planned to launch a television station for Sarawak as part of the government digitalization plan of Malaysian television. The plan, however, did not come to fruition as the plan did not come to realization by which it was replaced by OKEY and the state television plan was later undertaken by a private company only to be launched as a streaming channel.
The free-to-air license was eventually given the green-light in an announcement by Sim Kui Hian, Sarawak's Minister for Local Government and Housing. The station would be given an early broadcast on 10 October 2020 in conjunction with the Yang di-Pertua Negeri of Sarawak's Birthday before launching officially the next day on 11 October.
On 15 October 2020, TVS becomes main partner of National Film Development Corporation Malaysia (FINAS) and will finance its publishing work.
References
2014 establishments in Malaysia
2020 establishments in Malaysia
Internet television channels
Iban-language culture
Malay language television stations
Television stations in Malaysia
Television channels and stations established in 2014
Television channels and stations established in 2020 |
https://en.wikipedia.org/wiki/Loving%20Friends%20and%20Perfect%20Couples | Loving Friends and Perfect Couples was a Canadian television soap opera, which aired in 1983. Originally aired on the pay TV network First Choice, the series was later rerun on Global in 1985.
The show was billed as an "adult" prime time soap opera, including unedited nudity, profanity and simulated sex, and was ultimately a parody of soap operas similar to Mary Hartman, Mary Hartman.
In the United States, the series aired on subscription television service ONTV.
The show's cast included Keir Dullea, Ross Petty, Lisa Howard, Mimi Kuzyk, Alex Amini, Lori Hallier and Cali Timmins.
References
External links
1983 Canadian television series debuts
1983 Canadian television series endings
Canadian television soap operas
Global Television Network original programming
1980s Canadian drama television series |
https://en.wikipedia.org/wiki/Rocchio%20algorithm | The Rocchio algorithm is based on a method of relevance feedback found in information retrieval systems which stemmed from the SMART Information Retrieval System developed between 1960 and 1964. Like many other retrieval systems, the Rocchio algorithm was developed using the vector space model. Its underlying assumption is that most users have a general conception of which documents should be denoted as relevant or irrelevant. Therefore, the user's search query is revised to include an arbitrary percentage of relevant and irrelevant documents as a means of increasing the search engine's recall, and possibly the precision as well. The number of relevant and irrelevant documents allowed to enter a query is dictated by the weights of the a, b, c variables listed below in the Algorithm section.
Algorithm
The formula and variable definitions for Rocchio relevance feedback are as follows:
As demonstrated in the formula, the associated weights (a, b, c) are responsible for shaping the modified vector in a direction closer, or farther away, from the original query, related documents, and non-related documents. In particular, the values for b and c should be incremented or decremented proportionally to the set of documents classified by the user. If the user decides that the modified query should not contain terms from either the original query, related documents, or non-related documents, then the corresponding weight (a, b, c) value for the category should be set to 0.
In the later part of the algorithm, the variables , and are presented to be sets of vectors containing the coordinates of related documents and non-related documents. Though and are not vectors themselves, and are the vectors used to iterate through the two sets and form vector summations. These sums are normalized (divided) by the size of their respective document set (, ).
In order to visualize the changes taking place on the modified vector, please refer to the image below. As the weights are increased or decreased for a particular category of documents, the coordinates for the modified vector begin to move either closer, or farther away, from the centroid of the document collection. Thus if the weight is increased for related documents, then the modified vectors coordinates will reflect being closer to the centroid of related documents.
Time complexity
The time complexity for training and testing the algorithm are listed below and followed by the definition of each variable. Note that when in testing phase, the time complexity can be reduced to that of calculating the euclidean distance between a class centroid and the respective document. As shown by: .
Training =
Testing =
Usage
Though there are benefits to ranking documents as not-relevant, a relevant document ranking will result in more precise documents being made available to the user. Therefore, traditional values for the algorithm's weights (a, b, c) in Rocchio classification are typically around a = |
https://en.wikipedia.org/wiki/Microsoft%20Live%20Labs%20Pivot | Pivot is a software application from Microsoft Live Labs that allows users to interact with and search large amounts of data. It is based on Microsoft's Seadragon. It has been described as allowing users to view the web as a web rather than as isolated pages.
After Live Labs were shut down the stand-alone Pivot application is being hosted by Microsoft Research. The Silverlight control is still available, though.
Functionality
Microsoft Pivot was Microsoft Live Labs most ambitious project. It is a program based on the Seadragon technology. More specifically, it is “a data visualization technology called Pivot, designed to help people make better use of digital information”. Pivot is a data mining system that “allows people to visualize data and then sort, organize and categorize it dynamically”, which results in correlations and trends that become immediately apparent in a visually interactive format.
Capabilities
Pivot is a program designed to contextualize information in a much more natural way for humans to digest large quantities of information without losing their way. Most specifically it combines related data — “anything from pictures, videos and maps to batting averages and financials — into large collections that can then be manipulated, sorted, filtered and examined visually”. In this way, the data itself can help shape and inform the way it is presented. Thus, instead of having to struggle to understand data and then apply it to a problem, Pivot works in unison with a person to come to an optimal solution.
Currently information seekers are stuck in the old way of viewing information, limited by browsers to view information only in the context of “next” and “previous”. Pivot allows users to aggregate this information and view it to see if there are any recognizable patterns in the information. The value of such tool is that you can begin exploring with an idea and Pivot works with users to discover information that might have otherwise not been seen.
This is important because it has been found that “if you make it a sudden transition, people lose their way…but if you make it very smooth and continuous, people have a mental model of how they got to where they are.”
Another interesting aspect about Pivot is that it works with any type of data. In fact, the Pivot Collections range from Wikipedia entries to the 2009 International Union for Conservation of Nature Endangered List. This gives Pivot immense value because its capabilities are transferable to any industry.
How Pivot Works
At the heart of the Pivot program are the Collections that combine large groups of similar information “so we can begin viewing the Web as a "web" rather than a series of isolated pages”.
New collections can be created with no programming and are composed of a collection of data. These data collections are composed of two components, the XML (the descriptive component of the collection), and the images (the visual representation of the data).
Pivot is |
https://en.wikipedia.org/wiki/A%20Mill%C3%B3n | A Millón (A Million) is a game show which aired on Spanish-language channel Univision from 2000–2001 and can be thought of as the network's response to Who Wants to Be a Millionaire?, as it consisted of a modified format which does involve the same pyramid system and multiple choice question format which was utilized on Millionaire, though with several other unique elements. The show was hosted by Mexican singer and actress Daniela Romo.
Format
After the host comes on stage, she introduces a profile of the contestant trying to win $1 million before the contestant enters the studio. Both then had a discussion in another part of the studio about why the contestant was playing the game, then both move to the main set, where the game is played with some assistance from the contestant's family members.
In the game segment, the player has to face four levels of multiple choice questions, following this format:
The scoreboard keeps track of the player's current correct answers by showing the value of that level in rotating numbers. As each correct answer is given, a number 'locks' into place. Once that level's value is complete, that amount is won. The $1,000,000 was never won.
A wrong answer earns a strike, and three strikes end the game and drop the player back to nothing. Should a player receive two strikes, he/she has the option to quit with his/her winnings. However, the player also receives three Passes to use at any time during the game. As long as the player has at least one Pass available, the answer choices will be shown without the question, and the contestant then has the opportunity to use a Pass before seeing the question.
External links
Daniela Romo's fanpage (which includes pics from A Millon)
Univision original programming
Quiz shows
2000s American game shows
2000 American television series debuts
2001 American television series endings |
https://en.wikipedia.org/wiki/Transgender%20Europe | Transgender Europe (TGEU) is a network of different organisations working to combat discrimination against trans people and support trans people rights. It was founded in 2005 in Vienna during the 1st European Transgender Council as "European Transgender Network" and it is currently a registered NGO as "Transgender Europe".
Since 2009, in collaboration with the online magazine "Liminalis", TGEU runs the project "Trans Murder Monitoring" (TMM) that records the many people who every year around the world are killed as result of anti-trans violence.
History
TGEU was established on the first European Transgender Council in Vienna in November 2005 and formally registered as an Austrian charitable organisation 14 months later. TGEU was run as a volunteer organisation for many years. In 2008 TGEU acquired their first independent project-based funding. However, it took until 2009 to hire first project staff (to implement the TvT project). In 2012 the General Assembly held in Dublin decided to move the seat of the organisation to Berlin, a process that was finalised with the closing of the Austrian association at the General Assembly held in Budapest in 2014.
In 2016, TGEU’s Sex Work Policy was enthusiastically acclaimed and adopted by the General Assembly at the European Transgender Council in Bologna, Italy. Thanks to the efforts of trans activists in Central Asia, the General Assembly voted to broaden the mandate TGEU to also include Central Asia at the European Transgender Council 2018 in Antwerp, Belgium.
Today, 2021, TGEU has an office in Berlin, Germany, as well as a team of ten members of staff and a Board. With over 150 member organisations in almost 50 different countries, TGEU continues to combine advocacy work in Europe and Central Asia with community work in partnership with member groups.
Research
Trans Murder Monitoring
The Trans Murder Monitoring (TMM) project systematically monitors, collects, and analyses reports of homicides of trans and gender-diverse people worldwide. The Trans Murder Monitoring project started in April 2009 as a cooperation between Transgender Europe (TGEU) and the academic online magazine Liminalis – A Journal for Sex/Gender Emancipation and Resistance. With the involvement of the editorial team of Liminalis, the TMM became a pilot project of Transgender Europe's "Transrespect versus Transphobia Worldwide" research project in September 2009.
The latest TMM update (2020) revealed a total of 350 trans and gender-diverse people registered murdered between 1 October 2019 and 30 September 2020, representing a 6% increase in reported murders from the 2019 update. The majority of the murders occurred in Brazil (152), Mexico (57), and the United States (28), adding up to a total of 3664 reported cases in 75 countries and territories worldwide between 1 January 2008 and 30 September 2020.
Trans Rights Index & Maps
The Trans Rights Index & Maps are launched in May each year and reflect the current legal situation in |
https://en.wikipedia.org/wiki/Cartoon%20Network%2C%20LP%20v.%20CSC%20Holdings%2C%20Inc. | Cartoon Network, LP v. CSC Holdings, Inc., 536 F.3d 121 (2nd Cir., 2008), was a United States Court of Appeals for the Second Circuit decision regarding copyright infringement in the context of DVR (digital video recorder) systems operated by cable television service providers. It is notable for partially overturning the Ninth Circuit precedent MAI Systems Corp. v. Peak Computer, Inc., regarding whether a momentary data stream is a "copy" per copyright law.
In this case, Cablevision, a cable television provider, sought to implement a DVR service for its subscribers, allowing them to create copies of programs to be replayed at a later time. A consortium of copyright holders in the television and film industries sued for direct copyright infringement on the grounds of unlawful copying and public performance. The Second Circuit ruled that the DVR service did not constitute infringement.
Background
Cablevision, a cable television provider, announced the development of a "Remote Storage DVR" (RS-DVR) service in 2006. Similar in operation to a traditional digital video recorder (DVR), Cablevision's DVR allowed customers to pause, record, replay, and rewind previously recorded content. Unlike traditional DVRs, which require a device containing a hard drive to be placed in the home of the subscriber, the Cablevision DVR stored content on servers at company facilities.
To implement the DVR service, Cablevision streamed their existing digital television programming through a second server, which identified requested content, then copied this content and held the copy for a brief period before transmitting it to the subscriber for their later retrieval. At various points in the system, content was buffered for brief durations (0.1 and 1.2 seconds respectively). Content requested by a particular subscriber was stored separately and independently for that person and a replay option was only offered to them.
Upon announcing the new service, Cablevision was sued for direct copyright infringement by a consortium of television and movie copyright holders including Turner Broadcasting and its subsidiaries Cartoon Network and CNN; Twentieth Century Fox; NBCUniversal subsidiaries NBC and Universal Studios; Paramount Pictures; Disney and its subsidiary ABC; and CBS. The consortium sued only for declaratory relief and injunctive relief on the grounds of direct copyright infringement, excluding from consideration the topic of contributory copyright infringement. In its response, Cablevision waived any potential defense based on fair use.
District court ruling
The case was first heard at the District Court for the Southern District of New York in 2007, with Twentieth Century Fox as the lead plaintiff. The plaintiff entertainment companies claimed that the Cablevision DVR service enabled copyright infringement. According to the plaintiffs, the buffering of streaming data, necessary for the DVR service's operation, constituted the creation of unauthorized copies to |
https://en.wikipedia.org/wiki/Auto-text | Auto-text is a portion of a text preexisting in the computer memory, available as a supplement to newly composed documents, and suggested to the document author by software. A block of auto-text can contain a few letters, words, sentences or paragraphs. It can be chosen by the document author via menu or be offered automatically after typing specific words or letters (word prediction or text prediction), or be added to the document automatically after typing specific words or letters (word / text completion).
Auto-text saves the time of typists who type many similar documents, or serves as an assistive technology for aiding persons with disabilities. These disabilities may be upper-limb disabilities that slow down movement, or produce pain or fatigue, as well as spelling disorders (e.g. dysgraphia). Persons with speech disabilities who type on augmentative and alternative communication devices may also benefit from Auto-text, since it can speed up their communication.
Examples of software that offer auto-text:
Microsoft Word
Kurzweil 3000
Text editor features
Assistive technology |
https://en.wikipedia.org/wiki/AOSP | AOSP or AoSP may refer to:
Android Open Source Project, part of the Android operating system ecosystem
Area of Special Protection, under the UK Wildlife and Countryside Act 1981
Athabasca Oil Sands Project, heavy oil development in northern Alberta, Canada |
https://en.wikipedia.org/wiki/MicroConsignment | The MicroConsignment Model (MCM) establishes profitable income generating opportunities (and the infrastructure and network for a national, local social enterprise) for primarily women that to date are selling products such as wood-burning stoves, reading glasses, water filters, seeds and gardening techniques and energy efficient lightbulbs to villagers. Through the MCM local individuals with entrepreneurial qualities can start their own business through “sweat equity” and realize profits from inception. Although it rarely works in practice, the model allows for collaboration with local strategic partner organizations to adapt local solutions and train and support local entrepreneurs who serve rural communities within designated territories. What drives the model is an interdisciplinary, intuitive and non-linear approach whereby all stakeholders add value. The model utilizes a rotating capital mechanism with low start-up costs that are continually reinvested. In essence, the MCM strives to intervene at all levels by creating an “ecosystem” whereby problems are diagnosed and products are encountered/designed which are then inserted into the distribution model via the locally trained and supported entrepreneurs.
The MCM is a sustainable, replicable means of delivering health-related and economically beneficial goods and services to remote villages. It uses entrepreneurship to empower the villagers to help themselves. It is a social entrepreneurship approach that is built to organically and opportunistically respond to long-standing challenges.
The MCM creates access to health care-related goods and services in isolated rural communities. The key to the MCM is that local women (AC's) and organizations (SC's) are given the opportunity to become entrepreneurs by selling goods and services in their communities using a consignment mechanism. The MCM creates job opportunities where there weren't any before, and "businesses that can generate jobs for others are the best hope of any country trying to put a serious dent in its poverty rate." Unlike the traditional approach of giving handouts to rural communities, the MCM is scalable, replicable, and sustainable.
The majority of MCM local entrepreneurs are women who have no other opportunities to generate additional household income. Local organizations also work as entrepreneurs primarily through the use of kiosks. The MCM creates synergies between all the stakeholders in the supply chain, from low-cost providers to local organizations, to the local entrepreneurs, and ultimately, to the consumers.
The Problem
Poverty is only a symptom of a real problem of lack of access to services and products. One solution to this problem — providing access to capital for entrepreneurs in the developing world - has been addressed through the microcredit revolution. Other innovations have been developed to address access to education and medical care, including medicines to treat AIDS and TB. However, a model tha |
https://en.wikipedia.org/wiki/Transneft%20Druzhba | Transneft Druzhba (, formerly known as Magistralnie Nefteprovodi Druzhba) is a subsidiary of Russia's leading oil transportation and export company Transneft. Transneft Druzhba owns a big network of pipelines within the Russian Federation and neighboring states. It is the main operator of Transneft in management of Druzhba pipeline activities.
The company was established in 1964 once Druzhba pipeline became fully operational.
The pipeline network managed by Transneft Druzhba passes through Ukraine, Belarus, Poland, Czech Republic, Slovakia, Germany, Hungary, Latvia and Lithuania and crosses large rivers such as Volga, Oka, Dnieper, Dniestr, Visla, Danube, highways and railroads and Carpathian mountain range.
The overall length of the network is , being within the borders of Russia. There are 46 pump stations, 38 intermediate pumping stations, crude storage reservoirs with capacity for 1.5 million cubic meters of oil. Four largest ones are Lopatino, Klin, Nikolskoe, Unecha.
The company employs nearly 4,000 people to oversee the operations of the network. Transneft Druzhba consists of three regional operation centers - Kuybishev, Michurinsk, Bryansk and maintains operations in 9 oblasts and 32 regions of Russia.
See also
Druzhba pipeline
GDANSK DRUZHBA PIPELINE N.V.
References
External links
Official site of OAO MN Druzhba
Transneft
Oil companies of Russia
Oil companies of the Soviet Union
Oil pipeline companies
Companies based in Bryansk Oblast |
https://en.wikipedia.org/wiki/Dutch%20railway%20signalling | The current Dutch railway signalling system operated by ProRail has been in effect since 1954 on the Dutch Railways network
It was designed to be one of the simplest in Europe and is integrated to the ATB, the system of cab signalling widespread on the Dutch network.
Dutch trains normally use the right-hand track and the signals are placed at the right of the track; in sections also equipped to run on the left track, the signals are placed on the left.
Light signals
Below are common forms:
raised (hooggeplaatst) signal, can be used anywhere;
ground (laaggeplaatst) or dwarf (dwergsein) signal, used in areas where speeds do not exceed 40 km/h (do not have numeric display)
distant signal (voorsein).
Their aspects are categorized according to the colour. (There is never more than one colour at a time):
Green Aspect
Yellow Aspect
Red Aspect
Speed displays
See also
Automatische treinbeïnvloeding, also known as ATB
External links
all Dutch railway signals (in dutch)
Netherlands |
https://en.wikipedia.org/wiki/UkrTransNafta | UkrTransNafta () is an open joint-stock company established by the government of Ukraine in June 2001. The company exists to manage oil transportation operations through the Ukrainian pipeline network. The company oversees the activities of two main oil pipeline systems: the Ukrainian section of the Druzhba pipeline, and the Pridniprovski oil pipeline. The company is also in charge of the Odesa–Brody pipeline.
Mission
UkrTransNafta seeks to:
promote the integration of Ukrainian oil pipelines into the European oil pipeline systems;
promote business opportunities pertaining to the Ukrainian oil pipeline systems
promote investment in the Odesa–Brody pipeline
Pipeline system
UkrTransNafta's oil transportation system has a capacity of 110 million tons a year. The overall length of existing pipelines is . The pipeline system includes 40 pumping stations. Tank farm capacity is about 1 million cubic meters.
Pricing policy
Since April 2023, Ukrtransnafta has decided to double (from 13.6 to 27.2 euros per ton) a fee for the transit of Russian oil to Hungary, Slovakia and the Czech Republic. The official reason is the need to restore the infrastructure destroyed by the war. However, experts believe that in this way Ukraine is trying to force Hungary to abandon Russian oil.
See also
Druzhba pipeline
Russia–Ukraine gas disputes
Naftogas
References
External links
Official site of UkrTransNafta
Oil companies of Ukraine
Companies established in 2001
Oil pipeline companies
Naftogaz |
https://en.wikipedia.org/wiki/Samuel%20J.%20Leffler | Samuel J Leffler is a computer scientist, known for his extensive work on BSD, from the 1980s to FreeBSD in the present day. Among other projects, he created HylaFAX (originally known as FlexFAX, but renamed due to copyright issues), LibTIFF, and the FreeBSD Wireless Device Drivers.
The Design and Implementation series of books, which he co-authored,
While working for the Computer Systems Research Group (CSRG, UC Berkeley) at University of California, Berkeley, Leffler helped with 4.1 and 4.2 BSD release. He has contributed to almost every aspect of BSD systems, including the networking subsystem. After leaving Computer Systems Research Group, Leffler also worked at Lucasfilm, Pixar Animation Studios, Silicon Graphics, Alias Research, Softimage 3D, Cinetron Computer Systems and VMware. It while he was at Silicon Graphics that he developed HylaFAX. Later, Leffler became an independent system design consultant.
Computer Animation Rendering
André and Wally B. (1984) texturing/matteing
Luxo Jr. (1986) rendering
Tin Toy (1988) renderman team
Toy Story (1995) modeling & animation system development/Renderman software development
References
Bibliography
S. Leffler, M. McKusick, M. Karels, J. Quarterman: The Design and Implementation of the 4.3BSD UNIX Operating System, Addison-Wesley, January 1989, . German translation published June 1990, . Japanese translation published June 1991, (out of print).
S. Leffler, M. McKusick: The Design and Implementation of the 4.3BSD UNIX Operating System Answer Book, Addison-Wesley, April 1991, . Japanese translation published January 1992,
External links
Interview: Sam Leffler of the FreeBSD Foundation
BSD people
American computer scientists
Free software programmers
FreeBSD people
Living people
Lucasfilm people
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/Treehouse%20of%20Horror%20XXI | "Treehouse of Horror XXI" is the fourth episode of the twenty-second season of the American animated television series The Simpsons. It first aired on the Fox network in the United States on November 7, 2010. This is the 21st Treehouse of Horror episode, and, like the other Treehouse of Horror episodes, consisted of three self-contained segments: In "War and Pieces", Bart and Milhouse discover a real-life board game that they must win to return home; in "Master and Cadaver", Marge and Homer go on a honeymoon on a sailboat, and rescue a mysterious castaway named Roger; and in "Tweenlight", Lisa falls in love with a vampire named Edmund.
"Treehouse of Horror XXI" was written by Joel H. Cohen and directed by Bob Anderson. Daniel Radcliffe and Hugh Laurie both guest starred in the episode. The first segment references Jumanji, the second is a loose parody of Dead Calm and the third satirizes the Twilight novel and film series. The episode also contains references to The Office, A Clockwork Orange and Sesame Street.
In its original airing on the Fox Network during the November sweeps period, the episode had a 3.7 Nielsen rating viewed in approximately 8.2 million homes. Critical opinion of the episode was mixed, with "Tweenlight" generally being regarded as the best of the three segments.
Plot
Opening sequence
While carving pumpkins, Bart takes a knife and etches a smile into Homer's pants. Homer responds by strangling Bart as usual, and Bart puts a flaming pumpkin on Homer's head. Professor Frink then welcomes the audience and warns them of the content of the show, presenting a TiVo remote control to fast-forward through the scary stuff. But after accidentally fast forwarding to the end of the special, and exposing spoilers, a shameful Frink uses the remote on himself and fast forwards his life until he is turned to a pile of dust, and it blows away spelling out the title of the episode. The Frankenstein's Monster who was created by Frink makes a reference to The Office, and remembers his days working at "Monster Mifflin" with the Mummy, the Wolf Man, a zombie, and a witch.
War and Pieces
In a parody of Jumanji, Marge, worried about the effects of excessively violent video games, encourages Bart and Milhouse to try playing some of the classic board games in the attic. After rejecting the "lame" ones, they discover an old board game called "Satan's Path". Upon playing it, all the rejected games come to life, turning the town into a giant game board. Lisa reads the instructions, which are in Latin, and says the two must beat all the games to finish Satan's Path and restore everything to normal. Milhouse dies during the game of Scrabble, but Bart manages to finish it, returning everything to normal (even bringing Milhouse back to life). Bart and Milhouse state that they will just play hangman, but the game brings the hangman to life. With only four letters remaining (WHEE_ _F F_RT_NE), Milhouse guesses the number 3, which results in Bart and Milho |
https://en.wikipedia.org/wiki/Albat%C3%A0rrec | Albatàrrec is a municipality in the comarca of the Segrià in Catalonia.
Demography
References
External links
Official website
Government data pages
Municipalities in Segrià
Populated places in Segrià |
https://en.wikipedia.org/wiki/ChromiumOS | ChromiumOS (formerly styled as Chromium OS) is a free and open-source operating system designed for running web applications and browsing the World Wide Web. It is the open-source version of ChromeOS, a Linux-based operating system made by Google.
Like ChromeOS, ChromiumOS is based on the Linux kernel, but its principal user interface is the Chromium web browser rather than the Google Chrome browser. ChromiumOS also includes the Portage package manager, which was originally developed for Gentoo Linux. Because ChromiumOS and ChromeOS use a Browser engine for the user interface, they are oriented toward web applications rather than Application software or mobile apps.
Google first published the ChromiumOS source code in late 2009.
Architecture
Chromium's architecture is three-tiered, consisting of "three major components":
The Chromium-based browser and the window manager
System-level software and user-land services: the Linux kernel, drivers, connection manager, and so on
Firmware
Availability
ChromiumOS was first made available in compiled form by hobbyists. More organized efforts have emerged over time, including a few manufacturers that have shipped devices with the operating system pre-installed.
Builds and forks
By May 2010, compiled versions of the work-in-progress source code had been downloaded from the Internet more than a million times.
The most popular version, entitled "ChromiumOS Flow", was created by Liam McLoughlin, a then 17-year-old college student in Liverpool, England, posting under the name "Hexxeh".
McLoughlin's build boots from a USB memory stick and included features that Google engineers had not yet implemented, such as support for the Java programming language.
While Google did not expect that hobbyists would use and evaluate ChromiumOS ahead of its official release, Sundar Pichai, Google's vice president of product management (now the CEO) said that "what people like Hexxeh are doing is amazing to see."
Pichai said the early releases were an unintended consequence of open source development.
"If you decide to do open-source projects, you have to be open all the way."
Hexxeh's work continued into the following year. He announced "ChromiumOS Lime" in December 2010, and in January 2011, released "Luigi", an application designed to "jailbreak"/"root" the Google Cr-48 "Mario" prototype hardware and install a generic BIOS. The developer made the builds available in virtual machine format on March 13, 2011.
With no official build of ChromiumOS forthcoming from Google, Hexxeh's "vanilla" nightly builds of ChromiumOS were the principal resource for people wanting to try ChromiumOS.
Hexxeh stopped uploading his builds on April 20, 2013.
More recent versions of ChromiumOS are available from Arnoldthebat, who maintains daily and weekly builds along with usage guidelines and help.
In July 2012, Chromium Build Kit was released.
It automatically compiles a developer build and installs ChromiumOS on a USB drive.
|
https://en.wikipedia.org/wiki/Flickchart | Flickchart is a Florida-based movie-ranking and social networking website.
Description
Launched in September 2009, Flickchart is the brainchild of web programmer Jeremy Thompson and web designer Nathan Chase. The impetus behind the site's creation came from an argument over the placement of Pulp Fiction and The Empire Strikes Back on the Internet Movie Database Top 250. Thompson and Chase concluded that the limitations of movie rating systems using stars or numbers failed to produce accurate "Best Movie of All Time" lists. Flickchart was designed to remedy the issue by forcing users to decide between two random movies repeatedly until an accurate list is created, rather than rating each movie individually. This approach is intended to encourage users to seriously consider which film they actually prefer. Regarding the decision process, Thompson said, “Hopefully you’re reliving some of the scenes in your mind and you hate making a definitive pick".
Critical reception
Reactions to the site from film bloggers and other observers have been generally positive. Barb Dybwad of Mashable describes the site's "game-like premise" as "rather addictive". Jeremy Smith (a.k.a. "Mr. Beaks") of Ain't It Cool News described himself as hooked after 15 minutes and obsessed after four hours, but stated "Is the process flawless? Hardly." He then explains that films of inferior quality can get stuck near the top of a person's rankings and be hard to dislodge through the random dueling process, because the film must have the right duels against superior films, in order to move downward to its proper place in the rankings. In a June 2009 article, Scott Weinberg of Cinematical called it "easily the coolest movie website of the year" and described himself as "tickled, fascinated, enamored and addicted". The site's addictive qualities have also been given a negative spin, at least humorously, by Cole Abaius at the blog Film School Rejects, in which he contended that Flickchart would "ruin your life." "Why will it ruin your life?" asked Abaius. "Because it’s going to take up all of your time, and all you’ll be doing is tearing your hair out and clicking".
References
External links
Internet properties established in 2009
American film review websites
Online film databases
American social networking websites
Social cataloging applications |
https://en.wikipedia.org/wiki/Data%20Terminal%20Ready | Data Terminal Ready (DTR) is a control signal in RS-232 serial communications, transmitted from data terminal equipment (DTE), such as a computer, to data communications equipment (DCE), for example a modem, to indicate that the terminal is ready for communications and the modem may initiate a communications channel.
The DTR signal is present on pin 20 of the 22-wire RS-232 interface using a DB-25 connector, and on pin 4 of a newer DE-9 serial port. The signal is asserted (logic "1") by raising the voltage of the pin from negative to positive. Dropping the signal back to its negative state indicates to the modem that the communications session shall be terminated.
Signaling for modems
The DTR signal is an important call control signal for a data modem. According to the RS232 standard, dropping DTR from active to inactive for at least two seconds tells the modem to disconnect (end) a call or data connection.
When a modem is being used for automatic answering (such as with the command ATS0=1), the DTR signal confirms to the modem that the computer is available to accept a call.
When a computer wants to place a call, it asserts the DTR signal before sending commands. If the DTR signal is not asserted and the modem receives a dial command, modems either refuse to place the call, or they silently disable DTR support for the duration of that call; the actual behavior depends on the modem software.
Other aspects of responses to changes in DTR can be manually overridden or configured on most newer modems. and higher values are used by some vendors.
Many external modems have LED indicators on the front, one of which is TR ("terminal ready"). This light follows the state of the DTR pin. The light is on when DTR is high, and off when it is low. Modems will typically keep the TR light illuminated when the AT&D0 command is used to force the modem to ignore the DTR signal, regardless of the pin's actual state.
Null modem operation
When a serial connection is made between two computers using a null modem adapter, the DTR and the Data Carrier Detect (DCD) lines are typically paired. This allows both ends of the connection to sense when the connection is active.
On many operating systems, including Windows, the DTR line is held low while the serial port is unused and not being controlled by any applications.
Use for flow control
On some printers with serial interfaces, the DTR line is used for hardware flow control, similar to the use of RTS and CTS for modems. This practice is not consistent; other printers define RTS for this same purpose.
When DTR is used for flow control, it manages the flow of data from the printer to the computer. However, because during printing, the bulk of the data is from the computer to the printer, the importance of flow control in the opposite direction is minimal.
Use as a power pin
On some hardware the DTR line (along with RTS) may be used to provide power. The most notable example of this is a serial mouse. |
https://en.wikipedia.org/wiki/Red%20Data%20Book%20of%20Ukraine | The Red Data Book of Ukraine, or literally the Red Book of Ukraine (, Chervona knyha Ukrayiny), is an official national red list of the threatened animals, plants and fungi that are protected by the law in Ukraine.
State administration, conservation regulation and control of species is provided by the state institutions such as the Cabinet of Ukraine, Ministry of Ecology (Ministry of Environmental Protection and Natural Resources), and other state institutions.
Scientific support for the Red Data Book is provided by the National Commission on the Red Data Book issues that prepare propositions about including and excluding species from the Red Data Book, provides control over materials' preparation, determination of edition structure and coordination of related activities. The National Commission on the Red Data Book issues is formed by the National Academy of Sciences of Ukraine based on its Schmalhausen Institute of Zoology and Cholodny Institute of Botany that directly conduct registry of the red data.
The first edition of the Ukrainian Red Data Book was published in 1980, just couple of years after there was released the first edition of the Soviet Red Data Book. It was published by the National Academy of Sciences of Ukraine publishing house Naukova Dumka.
In 1994 and 1996 there was released the second edition of the Book by the Ukrainian Encyclopedia.
In 2009 the Third Edition of the Red Book of Ukraine was released by Global Consulting Ukraine.
As of 2019 the 1369 species are protected by the Red Book of Ukraine.
See also
Ukrainian Encyclopedia (publishing)
Red Data List
References
External links
Law of Ukraine #3055-III About the Red Data Book of Ukraine (Про Червону книгу України). Verkhovna Rada. 2002
Nature conservation in Ukraine
Biota of Ukraine
Ecology literature
IUCN Red List
Ukrainian books |
https://en.wikipedia.org/wiki/Stackhousia%20minima | Stackhousia minima is a perennial herb species in the family Celastraceae. It is native to New Zealand.
References
New Zealand Plant Conservation Network, Stackhousia minima, accessed 2010-10-04.
Stackhousia
Flora of New Zealand |
https://en.wikipedia.org/wiki/Vehicle%20tracking%20system | A vehicle tracking system combines the use of automatic vehicle location in individual vehicles with software that collects these fleet data for a comprehensive picture of vehicle locations. Modern vehicle tracking systems commonly use GPS or GLONASS technology for locating the vehicle, but other types of automatic vehicle location technology can also be used. Vehicle information can be viewed on electronic maps via the Internet or specialized software. Urban public transit authorities are an increasingly common user of vehicle tracking systems, particularly in large cities.
Active versus passive tracking
Several types of vehicle tracking devices exist. Typically they are classified as "passive" and "active". "Passive" devices store GPS location, speed, heading and sometimes a trigger event such as key on/off, door open/closed. Once the vehicle returns to a predetermined point, the device is removed and the data downloaded to a computer for evaluation. Passive systems include auto download type that transfer data via wireless download. "Active" devices also collect the same information but usually transmit the data in near-real-time via cellular or satellite networks to a computer or data center for evaluation.
Many modern vehicle tracking devices combine both active and passive tracking abilities: when a cellular network is available and a tracking device is connected it transmits data to a server; when a network is not available the device stores data in internal memory and will transmit stored data to the server later when the network becomes available again.
Historically, vehicle tracking has been accomplished by installing a box into the vehicle, either self-powered with a battery or wired into the vehicle's power system. For detailed vehicle locating and tracking this is still the predominant method; however, many companies are increasingly interested in the emerging cell phone technologies that provide tracking of multiple entities, such as both a salesperson and their vehicle. These systems also offer tracking of calls, texts, web use and generally provide a wider range of options.
Typical architecture
Major constituents of the GPS-based tracking are:
GPS tracking unit: The device fits into the vehicle and captures the GPS location information apart from other vehicle information at regular intervals to a central server. Other vehicle information can include fuel amount, engine temperature, altitude, reverse geocoding, door open/close, tire pressure, cut off fuel, turn off ignition, turn on headlight, turn on taillight, battery status, GSM area code/cell code decoded, number of GPS satellites in view, glass open/close, fuel amount, emergency button status, cumulative idling, computed odometer, engine RPM, throttle position, GPRS status and a lot more. Capability of these devices actually decide the final capability of the whole tracking system; most vehicle tracking systems, in addition to providing the vehicle's location data, |
https://en.wikipedia.org/wiki/Compignano | Compignano is a village in Italy. It has 175 inhabitants according to the 2001 ISTAT data, who are known as compignanesi. Though a more recent estimate puts the population closer to 177. It is a frazione of the comune of Marsciano, a larger town 12 km away, along strada statale 317 then provinciale 340 to Spina. Compignano is on top of a low (262m) hill, overlooking the valley of the river Nestore, which runs in a wide horseshoe-shaped curve at the foot of the hill.
History
Its name probably comes from Campo di Giano. The first appearance of the village in the historical record dates to 1240, where it is mentioned as the castle of the former podestà of Florence Andrea did Giacomo, with Perugia as his and its overlord. The village was sacked by the troops of Henry VII, Holy Roman Emperor in 1312. In 1361 it tried to secede from the signoria of Perugia but in 1398 the castle was returned to Perugian control, passing to count Federico di Bernardino di Marsciano (also subject to Perugia) in 1440.
In 1631 work began in the village on the construction of a palazzo for Benedetto Monaldi Baldeschi, bishop of Perugia, who visited the castle in 1637 and 1641 after his promotion to cardinal.
Economy
In the past it was known for its carpentry, construction of floats, blacksmiths, coopers, and hand-weaving. It has had several generations of furnaces, with a small museum dedicated to them in the village (Museo del Laterizio e delle Terrecotte) and a restored historical brick-furnace.
Monuments
Castle - 13th century, with well-preserved circular walls and curtain walls. The entry gate, on Piazza della Vittoria, is surmounted by a stone tower (rebuilt in the first half of the 16th century), the only survivor of the original five towers. In 1925 the village's campanile was built on the remains of one of the other towers.
Palazzo Monaldi - Corneli (17th century);
Church of S. Cristoforo (13th century), in front of palazzo Monaldi. Around the end of the 18th century, it was almost wholly rebuilt, with a vaulted roof, five altars and paintings by Anton Maria Garbi. It was rebuilt again quite faithfully in 1905. Inside hangs a 17th-century painting of Saint Christopher.
Chiesa della Madonna del Crocifisso (late 16th century), a small church made of bricks. Inside are frescoes by the Perugian painter Gerardo Dottori, dating to 1921-22: a scene of the life of Jesus and two large angels
Sport
A football field and shooting
References
External links
All
Compignano
Frazioni del Comune di Marsciano
Furnaces of Compignano
Frazioni of the Province of Perugia |
https://en.wikipedia.org/wiki/Atmospheric%20reanalysis | An atmospheric reanalysis (also: meteorological reanalysis and climate reanalysis) is a meteorological and climate data assimilation project which aims to assimilate historical atmospheric observational data spanning an extended period, using a single consistent assimilation (or "analysis") scheme throughout.
Operational data analysis
In operational numerical weather prediction, forecast models are used to predict future states of the atmosphere, based on how the climate system evolves with time from an initial state. The initial state provided as input to the forecast must consist of data values for a range of "prognostic" meteorological fields – that is, those fields which determine the future evolution of the model. Spatially varying fields are required in the form used by the model, for example at each intersection point on a regular grid of longitude and latitude circles, and initial data must be valid at a single time that corresponds to the present or the recent past. By contrast, the available observational data usually do not include all of the model's prognostic fields, and may include other additional fields; these data also have different spatial distribution from the forecast model grid, are valid over a range of times rather than a single time, and are also subject to observational error. The technique of data assimilation is therefore used to produce an analysis of the initial state, which is a best fit of the numerical model to the available data, taking into account the errors in the model and the data.
Uses
In addition to initializing operational forecasts, the analyses themselves are a valuable tool for subsequent meteorological and climatological studies. However, an operational analysis dataset, i.e. the analysis data which were used for the real-time forecasts, will typically suffer from inconsistency if it spans any extended period of time, because operational analysis systems are frequently being improved. A reanalysis project involves reprocessing observational data spanning an extended historical period using a consistent modern analysis system, to produce a dataset that can be used for meteorological and climatological studies.
Diverse studies use reanalysis data for reproducing other climatic variables by black-box models (e.g. sea state variables).
Examples
Examples of reanalysis datasets include the ECMWF re-analysis, the Modern-Era Retrospective analysis for Research and Applications, Version 2 (MERRA-2), and the NCEP/NCAR Reanalysis, and the JRA-25 reanalysis conducted by the Japan Meteorological Agency. In addition to these global reanalysis projects, there are also high-resolution regional reanalysis activities for different regions, e.g. for North America, Europe or Australia. Such regional reanalyses are typically based on a regional weather forecasting model and use boundary conditions from a global reanalysis.
ECMWF re-analysis
NCEP/NCAR Reanalysis
Caution in usage
While often reanalysis can be |
https://en.wikipedia.org/wiki/Sperberhai%20Dyke | The Sperberhai Dyke () is in fact an aqueduct which forms part of the Upper Harz Water Regale network of reservoirs, ditches, dams and tunnels in the Harz mountains of central Germany. It carries the water of the Dyke Ditch over the depression of the Sperberhai to the Clausthal plateau.
The Sperberhai Dyke was built in 1732 - 34 in order to satisfy the rising demand for water power for the water wheels of the Clausthal mines. The water crossed the embankment in a channel along its crest. The channel is only visible today at its western end. Its hydraulic capacity at peak times was up to 1,000 litres per second.
Sources
Upper Harz Water Regale
Aqueducts in Germany |
https://en.wikipedia.org/wiki/Snow%202%3A%20Brain%20Freeze | Snow 2: Brain Freeze is a television film starring Tom Cavanagh and Ashley Williams. It premiered on ABC Family in 2008 on their 25 Days of Christmas programming block. The made-for-television film is a sequel to the 2004 television film Snow.
Plot
Just before Christmas, Nick Snowden, the son of Santa Claus, has his hands full so that all children can get their presents and celebrate the people of established traditions. This year he has Sandy, with whom he wanted to spend quiet holidays, but during the reindeer training, the reindeer have become too fat and cannot fly anymore. So he has to come up with something to get her in shape. Indirectly he blames Sandy for overfeeding the reindeer. After a fight, Nick makes an excursion with his magic mirror. He ends up in a garage and has such a hard landing that becomes unconscious and wakes up in a hospital. He has lost his memory and does not remember he is Santa Claus.
Sandy learns of the misfortune reported on television about the man without a memory. She desperately wants to travel to him but does not know how to use the mirror. She seeks advice in Santa's book and learns from Galfired, the book's guardian, that she must not confront Nick with the truth because otherwise, he could forget everything. He just had to find his memories again. With this clue, Sandy sets off, but she doesn't meet Nick in the clinic because even his nemesis, Buck Seger, has seen the news and decided to abduct Nicks to maintain his amnesia. With a ticket to Bolivia, he leaves the train station and makes his way back out of the dust. Luckily, Nick falls asleep, so he misses the train and meets Ryan, an orphan boy who seems to want to help. Ryan is a pickpocket and wants to take advantage of Nick for his purposes. In escaping the police, Nick gets into an old, vacant club. Here, the confused Henry Mays awaits him and tells him that this was once his club and he supposedly belonged to a secret society. He had been waiting for Nick for a long time, so he should bring him back to his old days again. Nick does not understand anything at first but becomes curious.
Looking for Nick, Sandy suddenly discovers Buddy, as the reindeer has followed her through the magic mirror. She hopes Buddy can help her find Nick; that succeeds, but Nick does not recognize her. Nevertheless, they are now following the mysterious clues of Henry Mays. To do this, they must kidnap the old man from his family so he can help them organize the Christmas party for him at his old club. Ryan also helps to get a tree and decorate it. Secretly, however, he hopes to pursue his passion as a pickpocket at the Christmas party. Henry is already getting the members of his ominous "caribou club" together, but everyone is saying goodbye contrary to expectations. So the four of them sit alone in a festively decorated hall.
Having discovered the reindeer tracks in the snow, Buck manages to travel through a mirror to the North Pole. There he ends up in the stable of |
https://en.wikipedia.org/wiki/Fun.exe%20virus | The Fun.Exe virus is of the w32.Assarm family of computer viruses. According to Symantec it registers itself as a Windows system process then periodically sends mail with spreading attachments as a response to any unopened emails in Outlook Express.
This virus first appeared in early 2008 and is now recognized by most anti virus programs.
Infection
The virus will install multiple copies of itself throughout the system. It makes itself hard to remove by installing many different copies with different names in different locations. The running copy is a system process and will restart if it is closed manually. It adds itself to auto run information so that it executes multiple copies on startup. The copies monitor each other and will restore each other if one is deleted. This makes deleting from Windows nearly impossible.
Known file names used by the virus are Fun.exe, DC.exe, Other.exe, SVIQ.exe, win.exe, WinSit.exe, Windev.exe, and thisisnotmalwarelol.exe. This malware is usually embedded on PowerPoint documents. This allowed to malware to bypass most antiviruses, including Sophos and Kaspersky.
The file icon is made to look like the icon for a folder, inviting the user to open the folder when actually they are running the program thus starting the initial infection. However the graphic icon for the folder is poorly ripped from windows service icons and can be distinguished by subtle visual differences, predominantly white below the black outline of the folder which on the real folder icon is dithered to transparent space. This visual difference is especially noticeable in safe mode when graphic operating capacity is in 256 color mode instead of 24 bit color mode.
The files show a creation date of 6-23-2008 and show an original name of Olalatheworld.exe and an internal name of Olalatheworld. The files are 124,928 bytes in size. These characteristics can help distinguish the infected files, which is important because some of the names used by the file are names of legitimate Windows files and therefore care must be taken not to accidentally remove a vital Windows file.
References
Windows file viruses |
https://en.wikipedia.org/wiki/Picking%20Up%20%26%20Dropping%20Off | Picking Up & Dropping Off is a television film starring Scott Wolf and Amanda Detmer. It premiered on ABC Family in 2003 on their 25 Days of Christmas programming block.
Premise
A divorced father and a divorced mother start to meet at Denver International Airport when picking up and sending off their children to ex-spouses for holidays.
Cast
Scott Wolf as Will
Amanda Detmer as Jane
Eddie McClintock as Charlie
Rachelle Lefèvre as Georgia
Maggie Hill as Claire
External links
2003 television films
2003 films
Canadian Christmas films
ABC Family original films
English-language Canadian films
Christmas television films
2000s Christmas films
Canadian comedy-drama television films
Films directed by Steven Robman
2000s Canadian films |
https://en.wikipedia.org/wiki/Mephisto%20%28chess%20computer%29 | Mephisto was a line of chess computers sold by Hegener & Glaser (H+G). In addition to integrated travel and sensory computers, they also sold a line of modular electronic autosensory boards (Modular, Exclusive, München, and Bavaria) which could accept different program, processor, and display modules.
Its strongest software was written by Richard Lang, who later ported it to personal computers as Psion and ChessGenius. Lang's Mephisto programs won six World Computer Chess Championships (WCCC) from 1984 to 1990. H&G also sold engines licensed from Johan de Koning, Ed Schröder, and Frans Morsch. Different models used different 8-bit, 16-bit and 32-bit processors, including MOS Technology 6502, Motorola 68HC05, Motorola 68000 and others.
Hegener & Glaser and its Mephisto brand were bought in 1994 by Saitek. Their computers currently sold under the Mephisto brand use programs written by Frans Morsch.
Hegener & Glaser (Mephisto)
1969 established in Munich by Manfred Hegener and Florian Glaser for the production of semiconductors
1978 the programmers Thomas Nitsche and Elmar Henne came into contact with H+G Thomas Nitsche and Elmar Henne
1980 the "Mephisto" Tradename was created, nicknamed Brikett (German for briquette) — the first German Chess Computer — programmed by Thomas Nietsche and Elmar Henne, appeared in stores.
1983 Introduction of the Modular system, with the Mobil, Modular, and Exclusive boards and MM I module.
1984 with Richard Lang and his Psion chess (Winner of World Microcomputer Chess Championship 1984 in Glasgow) began a long series of World Championship successes.
1985 introduction of Lang's first Mephisto module, the Amsterdam 68000
1989 over 90% of all chess computers sold in Germany were Mephistos
1989 H+G buys "Fidelity Electronics Inc." for ~ 7 Million US $
1990 the market for high-priced chess computers collapses. The cause is the growth of high-performance 486 PCs and the availability of newly developed low-cost strong chess software for PCs.
1992 H+G shows losses of 28 Million DM
1992 Ed Schröder wins with Gideon 3.1 (later sold as Mephisto Risc 2) the open 7. WCCC — ahead of large mainframe computers and special hardware machines
1994 H+G is bought by Saitek for ~ 7 Million DM
1994 Richard Lang's Genius (Mephisto London) beats Garry Kasparov in the Intel World Chess Grand Prix Turnier in London on a Pentium Processor
1997 Manfred Hegener and Ossi Weiner form the company "Millennium 2000 GmbH Hegener & Weiner" and produce the "Millennium Schachpartner 2000", sold at 99 DM
2005 Phoenix Chess Systems releases the Resurrection module for existing Mephisto modular boards. The hardware uses a 200 MHz ARM processor to run modern chess engines, resulting in the strongest dedicated chess computer ever created.
2007 Phoenix Chess Systems releases an updated module set, the Resurrection II, with a faster 500 MHz XScale processor.
Mephisto Modular System
Boards:
Mephisto Mobil (folding magnetic board)
Mephisto |
https://en.wikipedia.org/wiki/NIC%20Argentina | The Network Information Center Argentina, or NIC Argentina, is an office of the Legal and Technical Secretariat of the Presidency of Argentina responsible for operating the .ar country code top-level domain (ccTLD).
Delegation for the .ar ccTLD, was requested on 20 August 1987, as part of the transition to the Internet Domain Name System. The delegation was approved and became effective on 13 September 1987. Since then, the Argentine Foreign Ministry has been the sole sponsor and entity responsible for the management of Internet Domain Names for the .AR ccTLD, this role was reaffirmed by Executive Decree 267/2005 on 4 April 2005.
Until Argentina was able to establish its first permanent connection to the global Internet, name services were provided by UUNET.
The NIC-DDN WHOIS entry for AR-DOM in 1991 showed:
Ministerio de Relaciones Exteriores y Culto (AR-DOM)
Departamento de Informatica
Recoquista 1088
Buenos Aires - 1003
ARGENTINA
Domain Name: AR
Administrative Contact:
Porter, Sergio (SP48) SERGIOP@ATINA.AR
+54 1-311-0071
Technical Contact:
Amodio, Jorge Marcelo (JMA49) PETE@ATINA.AR
+54 1313 8082
Zone Contact:
Chapman, Malcom (MC328) malcom@atina.ar
+54 1-313-8082
Record last updated on 24-Mar-91.
Domain servers in listed order:
NS.UU.NET 137.39.1.3
UUCP-GW-1.PA.DEC.COM 16.1.0.18
Top Level domain for Argentine Republic
For information concerning this domain, please consult
the Administrative Contact listed above.
Current contact information for the .AR ccTLD can be obtained from the IANA Root Zone Database.
References
External links
Network Information Center Argentina (NIC) - official site.
Historia y Evolucion de Internet en Argentina - (Spanish only)
Domain name registries
Internet in Argentina |
https://en.wikipedia.org/wiki/Special%20Delivery%20%282000%20film%29 | Special Delivery is a 2000 television film directed by Mark Jean and starring Andy Dick. It premiered on Fox Family on their 25 Days of Christmas programming block.
Premise
A bumbling courier at a private adoption agency botches the delivery of a baby to its new parents in time for Christmas when he misplaces their baby en route.
Cast
Andy Dick as Lloyd Stedman
David Lewis as Jack Beck
Megan Leitch as Robin Beck
Jodelle Ferland as Samantha Beck
Ralph Alderman as Sarge Reilly
Nels Lennarson as Customs Officer
Donna White as Vera Reilly
Kevin McNulty as Fred Anders (as Kevin Mcnulty)
Jennifer Clement as Judy
Greg Rogers as Charlie Zwick
Ken Camroux as Lawrence Beck
Rebecca Toolan as Virginia Beck
Jocelyne Loewen as Ashley
Davis Poon as Beck Baby
Victoria Poon as Beck Baby
Reception
Raggle Fraggle Reviews criticized almost every aspect of the film and concluded: "The film is not funny at all, a lot of the comedy relies on the comedic of slap stick and just awful, the jokes are really badly paced and a lot of the time they are either really over the top or extremely unrealistic."
See also
List of Christmas films
References
External links
2000 television films
2000 films
2000s Christmas films
American Christmas films
ABC Family original films
Christmas television films
Films with screenplays by Steven Kampmann
Films directed by Mark Jean
2000s English-language films |
https://en.wikipedia.org/wiki/GR%2042 | The GR 42 is a long-distance walking route of the Grande Randonnée network in France. The route connects Beaucaire with Saint-Étienne.
Along the way, the route passes through:
Beaucaire
Pujaut
Orsan
Meysse
Plats
Bourg-Argental
Saint-Étienne
References
Hiking trails in France |
https://en.wikipedia.org/wiki/Matthew%20T.%20Dickerson | Matthew T. Dickerson is an American academic working as a professor of computer science at Middlebury College in Vermont. A scholar of J. R. R. Tolkien's literary work and the Inklings, Dickerson is by his own account a novelist, newspaper columnist, blues musician, historian of music, fly fisherman, maple sugar farmer, and beekeeper.
Education
Dickerson received an A.B. from Dartmouth College in 1985 and a Ph.D. in computer science from Cornell University, under the supervision of Dexter Kozen, in 1989. His Ph.D. research was in symbolic computation, but since then he has worked primarily in computational geometry; his most frequently cited computer science papers concern k-nearest neighbors algorithm and minimum-weight triangulation. Dickerson has been on the Middlebury faculty since receiving his Ph.D.
Career
From 1997 to 2001, Dickerson published a biweekly column on fishing and the outdoors in the Addison Independent, a local newspaper.
Since 2002, he has been the director of the New England Young Writers Conference, an annual four-day conference for high school students in Bread Loaf, Vermont, that is associated with Middlebury College. He is also the founding director of the Vermont Conference on Christianity and the Arts. He plays bass in a Vermont-based blues band, Deep Freyed.
Tolkien scholarship
Dickerson is the author of six non-technical books, most of them about fantasy fiction. His 2003 book Following Gandalf: Epic Battles and Moral Victory in The Lord of the Rings, a study of the moral and Christian values expressed by Tolkien's works, highlights the contrasts between moral and physical victories, and between heroism and violence; it points out the necessity of having free will in order to make moral choices. It was shortlisted for the Mythopoeic Society's 2004 and 2005 Mythopoeic Scholarship Awards. He has written a pair of books on Tolkien, C. S. Lewis, and environmentalism, Ents, Elves, and Eriador: The Environmental Vision of J.R.R. Tolkien and Narnia and the Fields of Arbol: The Environmental Vision of C. S. Lewis. Despite giving the first of these two books an overall negative review, reviewer Patrick Curry writes that it is "a major new contribution to the subject of Tolkien's work".
Other books
His other books include The Finnsburg Encounter. a work of historical fiction, translated into German as Licht uber Friesland, Hammers and Nails: The Life and Music of Mark Heard, a biography of musician Mark Heard, and
From Homer to Harry Potter: A Handbook on Myth and Fantasy.
References
Year of birth missing (living people)
Living people
American computer scientists
Dartmouth College alumni
Cornell University alumni
Middlebury College faculty
Researchers in geometric algorithms
Tolkien studies |
https://en.wikipedia.org/wiki/Chapter%20a%20Day | Chapter a Day is the title of a daily weekday radio program airing on the American statewide public radio network, Wisconsin Public Radio as part of their Ideas Network service. A lunchtime tradition for years, the program features the reading of works of fiction, history and biography virtually in their entirety, by a professional radio performer in half-hour increments.
History
The beginning of Chapter a Day remains unclear, but a popular legend is told by Jim Fleming, a Chapter a Day performer for the last twenty years and a Wisconsin Public Radio employee since the 1970s. Jim tells the story that sometime in the late 1920s Harold McCarty, the man who was most responsible for the creation of what has become Wisconsin Public Radio, was in the studio waiting for a guest who didn't show up. McCarty was left with the prospect of dead air - something no broadcaster can countenance. He pulled the book he was currently reading out of his briefcase, opened it up and began to read out loud into the microphone. McCarty's reading was so popular, and drew so many responses of "what came next?" that it has been on the air ever since. Fleming says this story is true in spirit if not provable in fact. After all, Chapter a Day is all about storytelling, and this is a really good story.
Actual records show that in the late 1920s there were sometimes Friday broadcasts that featured readings from classical literature by both University of Wisconsin–Madison professors and students. The earliest documentation of the Chapter a Day title referring to the narration of an entire book is found for July 25, 1932 and lists the name of Marianne Smith, a member of the University of Wisconsin class of 1932, leading to the assumption that she was the reader. It is thought that she read the book David's Day by Denis Mackail.
Chapter a Day appeared on the WHA (call letters for Wisconsin Public Radio) schedule intermittently from 1932 to 1939, often as part of the summer programming schedule, but became a year-round permanent feature of the radio station on April 3, 1939. A list of books read on the program dating back to 1939 does exist, meaning that Chapter a Day may well qualify as the longest running regularly scheduled radio program in the history of radio in the United States.
Until the 1970s, books read on Chapter a Day were read live on the air by the narrators. The standard reading of a book was ten episodes so that each book aired for two weeks. Chapter a Day originally aired at 3 pm, but has been broadcast primarily at midday for most of its long lifetime for the convenience and enjoyment of lunchtime listeners.
Performer history
Although not the earliest reader on Chapter a Day, Karl Schmidt was recruited by Harold McCarty and began reading for the program in 1941, when he was a student at the University of Wisconsin. Karl continued to read for the program until his death in 2016 at the age of 93, making him the longest serving reader of the program. Other read |
https://en.wikipedia.org/wiki/Cipher%20suite | A cipher suite is a set of algorithms that help secure a network connection. Suites typically use Transport Layer Security (TLS) or its now-deprecated predecessor Secure Socket Layer (SSL). The set of algorithms that cipher suites usually contain include: a key exchange algorithm, a bulk encryption algorithm, and a message authentication code (MAC) algorithm.
The key exchange algorithm is used to exchange a key between two devices. This key is used to encrypt and decrypt the messages being sent between two machines. The bulk encryption algorithm is used to encrypt the data being sent. The MAC algorithm provides data integrity checks to ensure that the data sent does not change in transit. In addition, cipher suites can include signatures and an authentication algorithm to help authenticate the server and or client.
Overall, there are hundreds of different cipher suites that contain different combinations of these algorithms. Some cipher suites offer better security than others.
The structure and use of the cipher suite concept are defined in the TLS standard document. TLS 1.2 is the most prevalent version of TLS. The next version of TLS (TLS 1.3) includes additional requirements to cipher suites. TLS 1.3 was only recently standardised and is not yet widely used. Cipher suites defined for TLS 1.2 cannot be used in TLS 1.3, and vice versa, unless otherwise stated in their definition.
A reference list of named cipher suites is provided in the TLS Cipher Suite Registry.
History
The use of ciphers has been a part of the Secure Socket Layer (SSL) transit protocol since its creation. SSL has been succeeded by TLS for most uses. However, the name Cipher Suite was not used in the original draft of SSL. Instead the ability for a client and a server to choose from a small set of ciphers to secure their connection was called Cipher-Choice. It was not until SSL v3 (the last version of SSL) that the name Cipher Suite was used. Every version of TLS since has used Cipher Suite in its standardization. The concept and purpose of a Cipher Suite has not changed since the term was first coined. It has and still is used as a structure describing the algorithms that a machine supports in order for two machines to decide which algorithms to use to secure their connection. What has changed is the versions of the algorithms that are supported in the cipher suites. Each version of TLS has added support for stronger versions of the algorithms and removed support for versions of the algorithms that have been identified as insecure.
TLS 1.3 marks a change in how cipher suites are coordinated between machines. The cipher suite chosen for two communicating machines to use is determined by the handshake process. Modifications were done in TLS 1.3 to the handshake process to cut down on the number of messages needed to be sent. This allows for less processing, less packet traffic and more efficiency compared to previous versions of TLS.
Naming scheme
Each cipher suite ha |
https://en.wikipedia.org/wiki/Staines%20Down%20Drains | Staines Down Drains is a co-produced children's television series created by Jim Mora. The series was premiered on the Seven Network in October 2006 and broadcast in New Zealand on TV2 beginning on 28 February 2007. A second series of 13 episodes was announced in 2009-each 11-minutes long-but these episodes were never produced.
Synopsis
The series follows siblings Stanley and Mary-Jane Staines as they travel through a portal down their sink in the basement to Drainland. There they assist Vegety Bill a strong carrot looking figure, Blobert a purple blob, and Herk a furball, in defeating Dr. Drain. Stanley is germaphobic while Mary-Jane is brave. Their mother Betty is always getting a new job which usually causes the complication in the episodes. Their arch enemy Gretel is always trying to embarrass the Staines.
Production
The series is distributed by Studio 100. It is animated by Flux Animation with assistance from Studio 100. The series is associated with Yoram Gross. As with many other titles from the company, they lend the voice who usually plays the main male characters, Keith Scott. Series one first broadcast in November 2006 with a second series announced in late 2009. This second season was later cancelled before being completed for unknown reasons.
Main characters
Stanley Staines is a germaphobic boy who tries to avoid doing anything out of the ordinary, his phobia may stop him from going to Drainland. However, he is encouraged by his sister, Vegety, Herk and Blobert.
Mary-Jane Staines is a brave girl who is very adventurous and smart. She usually helps Stanley in assisting Drainlands problem. She is worst enemies with Gretel and the two usually argue with each other.
Betty Staines is Stanley and Mary-Jane's somewhat dipsy mother. She is always starting a new career and usually messes up doing it.
Vegety Bill is an heroic carrot like figure who is dedicated to protecting the Drainworld plants. He is best friends with Herk and Blobert and together fight Dr. Drain and the Goblers.
Blobert is a small purple blob who moves around like a slug. He is not very smart and usually helps Herk and Vegety.
Herk is a small brown hairball who helps Vegety in protecting the plants. He is best friends with Blobert.
Dr Drain is an evil dictator, bent on destroying Drainland and building an empire on its ruins. With his companions the Goblers, he tries to rid Drainland of its purifying plants.
Gretel is the arch enemy of Mary-Jane. She is a spoilt girl who usually bullies the Staines with her friends, the Lupe brothers.
The Goblers are the henchmen of Dr. Drain.
The Lupin Lupes are the friends of Gretel.
Episodes
Series 1
References
External links
Staines Down Drains at Television New Zealand
2006 Australian television series debuts
2000s Australian animated television series
Australian children's animated comedy television series
Australian children's animated drama television series
Australian flash animated television series
APRA Award winner |
https://en.wikipedia.org/wiki/Digital%20Media%20City | Digital Media City (DMC; ) is a high-tech complex for digital technologies, housing ubiquitous networked offices, apartments, exhibitions, conference halls, television network headquarters and cultural centers in Seoul, South Korea. It is located at 366, Worldcupbuk-ro, Mapo-gu, Seoul.
It was constructed in 2006 across and approximately 1.7 times the size of the Canary Wharf development in London, United Kingdom. It is a high-tech city centered on Digital Media Street for broadcasting, movies, games, music, e-learning and related industries. It attracted well-known IT
companies such as LG Telecom, Pantech, LG CNS and Samsung SDS, media companies like MBC, JTBC, YTN, SBS, as well as various kinds of public exhibition facilities including the Korean Film Archive and the Korean Film Museum.
It is served by the Digital Media City Station on Seoul Subway Line 6, AREX and Gyeongui Line.
Residents of the Digital Media City are nicknamed Denizens (Digital Citizen) for their constant enthusiasm and interaction with high-tech digital technologies.
The original advisors on the development include Dennis Frenchman and Michael Joroff of the Massachusetts Institute of Technology (MIT) who also advised on the development of MediaCityUK in Salford, Greater Manchester, England, and Digital Mile in Zaragoza, Spain.
History
From 1978 to 1993, the currently developed area of the Digital Media City was in fact a massive landfill for Seoul's garbage on an island (at the time called Nanjido, now annexed into the mainland) in the Han River, before transforming into a high-tech modern city in the 21st century.
This dramatic turn-around is considered to be the result of the Miracle on the Han River, a term coined to describe Seoul's highly accelerated and successful development since the early 1960s. Used charcoal briquettes and other industrial waste materials produced during the city's rapid development in this period led to pile ups of trash. By the 1990s, these pile ups grew to mountains at a height of 95 meters and length of 2 kilometers, even after being compressed into a rectangular shape that weighed over 120 million tons. This was in comparison to the Namsan mountain in Seoul, which is 262 meters. Nanjido's accumulation of garbage increased to 3,000 truck loads of waste per day, essentially creating a pyramid 34 times larger than The Great Pyramid of Giza in Egypt.
In 1996, Seoul began to launch stabilization projects to withhold further industrial developments and build facilities to prevent the environmental contamination caused by the landfill zone. The stabilization projects included reinforcing the inclines of the landfill that were on the verge of collapsing, minimizing the sludge from the trash and collecting harmful gases. The gas accumulated in the process was utilized as the heat energy necessary for heating nearby facilities of the Seoul World Cup Stadium and the Sangam housing development area.
The re-engineered region was first designated a |
https://en.wikipedia.org/wiki/Orthogonal%20diagonalization | In linear algebra, an orthogonal diagonalization of a symmetric matrix is a diagonalization by means of an orthogonal change of coordinates.
The following is an orthogonal diagonalization algorithm that diagonalizes a quadratic form q(x) on Rn by means of an orthogonal change of coordinates X = PY.
Step 1: find the symmetric matrix A which represents q and find its characteristic polynomial
Step 2: find the eigenvalues of A which are the roots of .
Step 3: for each eigenvalue of A from step 2, find an orthogonal basis of its eigenspace.
Step 4: normalize all eigenvectors in step 3 which then form an orthonormal basis of Rn.
Step 5: let P be the matrix whose columns are the normalized eigenvectors in step 4.
Then X=PY is the required orthogonal change of coordinates, and the diagonal entries of will be the eigenvalues which correspond to the columns of P.
References
Maxime Bôcher (with E.P.R. DuVal)(1907) Introduction to Higher Algebra, § 45 Reduction of a quadratic form to a sum of squares via HathiTrust
Linear algebra |
https://en.wikipedia.org/wiki/Heaven%20%26%20Earth%20%28video%20game%29 | Heaven & Earth is a computer game developed by Software Resources International and published by Buena Vista Software in 1992.
Plot
Heaven & Earth is a game which integrates aspects of toys and puzzles, and involves a fantasy legend. With the randomly drawn animated cards in a solitaire-like game, the player tries to score the highest value tricks. The game features a dozen options for puzzles to play with, including sliders and mazes as well as 3-D illusions. The game also includes a toy aspect involves picking gems using a swinging pendulum.
Reception
Computer Gaming World stated "it's refreshing to come across a little gem like Heaven & Earth, which isn't quite like anything else out there". The magazine concluded that it "is a terrific game for people who like puzzles, especially visual ones". The game was reviewed in 1994 in Dragon #211 by Jay & Dee in the "Eye of the Monitor" column. Jay gave the game 4 out of 5 stars, while Dee gave the game 3½ stars.
Reviews
Power Unlimited - November 1993
References
External links
Heaven & Earth at IGN
Heaven & Earth page from Ian Gilman (original programmer)
Review in Compute!
1992 video games
Classic Mac OS games
Digital card games
DOS games
FM Towns games
Publishing International games
Puzzle video games
Single-player video games
Video games developed in the United States
Video games scored by Richard Marriott |
https://en.wikipedia.org/wiki/Jewelbox%20%28video%20game%29 | Jewelbox is a computer game developed by Varcon Systems for the Macintosh. It is a clone of Sega's Columns.
Gameplay
Jewel Box is a game in which the player moves colored gems that fall from the top of the screen, which disappear when they form patterns, and the round ends when the playing area becomes filled with gems; special gems cause different things to happen. The player must manipulate the jewels to form lines of three or more horizontally, vertically or diagonally. Jewels are affected by gravity, allowing the player to set up chain reactions which multiply the value of the gems matched. When the playing area is filled, it is cleared and the player loses one life - unlike Tetris, the player is given three lives in each game, and the opportunity to earn additional lives by reaching points milestones. Gems are worth different numbers of points, with black onyx-like stones being the most valuable.
The game includes an easter egg where matching three black jewels on the bottom row of the play area resulted in a huge points bonus.
Development
Jewelbox was originally published as shareware, in 1992, and was developed by Rodney and Brenda Jacks, with music by Jim Holt. After its initial release, Jewelbox was published as a commercial game by Varcon Systems. The commercial version added many new features including support for different display sizes and more powerups including the ability to collect and play wildcard jewels whenever you wanted. Varcon sold the game individually and as part of a package of three arcade game challenges.
Reception
The game was reviewed in 1994 in Dragon #211 by Jay & Dee in the "Eye of the Monitor" column. Jay did not rate the game, but Dee gave the game 3½ out of 5 stars. Dee noted that the gameplay is vaguely similar to that of Tetris, but that "Jewelbox is not just a clone—it has intriguing rules all its own, including special gems that cause amazing things to happen, and beautiful sound and graphics".
Laurel Clyde, in the book Managing Infotech in School Library Media Centers mentions Jewelbox as one of the games "that pay homage to Tetris while extending the concept in new directions".
Larry Hanson, in his book Everything You Wanted to Know About the Mac, said that Jewelbox "deserves special praise, not only for its nice graphics and music, but also for its packaging. Instead of the shelf-hogging cardboard boxes most games come packed in, Jewelbox (like Varcon's other games) comes in a re-useable suede bag."
References
1992 video games
Classic Mac OS games
Classic Mac OS-only games
Falling block puzzle games
Video game clones
Video games developed in the United States |
https://en.wikipedia.org/wiki/J%C3%B6rg-R%C3%BCdiger%20Sack | Jörg-Rüdiger Wolfgang Sack (born in Duisburg, Germany) is a professor of computer science at Carleton University, where he holds the SUN–NSERC chair in Applied Parallel Computing. Sack received a master's degree from the University of Bonn in 1979 and a Ph.D. in 1984 from McGill University, under the supervision of Godfried Toussaint. He is co-editor-in-chief of the journal Computational Geometry: Theory and Applications, co-editor of the Handbook of Computational Geometry (Elsevier, 2000, ), and co-editor of the proceedings of the biennial Algorithms and Data Structures Symposium (WADS).
He was a co-founding editor-in-chief of the open access Journal of Spatial Information Science but is no longer an editor there. Sack's research interests include computational geometry, parallel algorithms, and geographic information systems.
References
Year of birth missing (living people)
Living people
Researchers in geometric algorithms
German computer scientists
Canadian computer scientists
University of Bonn alumni
McGill University alumni
Academic staff of Carleton University |
https://en.wikipedia.org/wiki/OpenStreetMap%20Foundation | The OpenStreetMap Foundation (abbreviated OSMF) is a non-profit foundation whose aim is to support and enable the development of freely-reusable geospatial data. Founded in 2006, it is closely connected with the OpenStreetMap project, although its constitution does not prevent it supporting other projects.
History
The OpenStreetMap Foundation was registered in England and Wales on 22 August 2006 as a company limited by guarantee. In 2007, it held the first State of the Map conference in Manchester.
In October 2009, the foundation announced that its members, rather than the OpenStreetMap contributors at large, would vote on changing OpenStreetMap's data license from Creative Commons Attribution-ShareAlike to the Open Database License.
In September 2013, the foundation began accepting corporate memberships in an "associate member" (nonvoting) category. The initial corporate members were Geofabrik, Geotab, Naver, NextGIS, and Mapbox.
Active contributors membership program was introduced in August 2020. As per this active contributors to OpenStreetMap through editing (at least 42 active days in the latest period of one year) or off-line activities can apply for free of cost membership. They will have voting rights for electing board members.
In June 2021, the foundation stated that the effects of Brexit have prompted them to consider a move back into the European Union due to issues with database rights, difficulties with getting charitable status for the foundation, and the increasing difficulty of using PayPal and banking in the United Kingdom. The foundation has not announced the location of its new headquarters.
Governance
The OpenStreetMap Foundation is a membership organization. Membership in the foundation is separate from a user account on the OpenStreetMap website: a user account is required to contribute to the map, while foundation membership entitles one to vote at a general meeting.
The foundation is run by a board of seven members, including the foundation's officers: chairman, secretary and treasurer. The board is elected by the foundation's dues-paying members. , the board consists of Guillaume Rischard (Chairperson), Mikel Maron (Secretary), Roland Olbricht (Treasurer), Sarah Hoffmann, Mateusz Konieczny, Arnalie Vicario, and Craig Allan.
Several working groups, composed mostly of volunteers, carry out day-to-day operations on behalf of the foundation:
Data Working Group countervandalism and dispute resolution
Communication Working Group
Engineering Working Group
Legal or Licensing Working Group trademark and licensing issues
Local Chapters Working Group
Membership Working Group
Operations Working Group
State of the Map Organizing Committee
Several local chapters are affiliated with the OpenStreetMap Foundation.
Programs and initiatives
The OpenStreetMap Foundation promotes and supports the OpenStreetMap project but does not formally own the project or its contents. The foundation's relatively low profile in Op |
https://en.wikipedia.org/wiki/Project%20Horned%20Owl | Project: Horned Owl or , is a light gun shooter video game developed by Alfa System and published by Sony Computer Entertainment for the PlayStation. Sony’s Japan Studio assisted on development while Movic provided anime cinematics for the game. The game was released in Japan in 1995, and in North America in 1996. It features character designs by manga artist Masamune Shirow. The game was a stylistic predecessor to Elemental Gearbolt, also developed by Alfa System.
Gameplay
Project: Horned Owl is an arcade-style rail shooter, with the action taking place in a first-person perspective. It has the option of utilizing the PlayStation mouse or the Konami light gun. There is a two player co-op as well as single-player mode, both taking place across five city-based levels, where the player controls a giant mech and fights off a variety of mechanized enemies. At the conclusion of each stage there is generally an anime cutscene.
Plot
The events of the game take place in the somewhat futuristic Metro City, where the player controls one of two Horned Owl Armored Mechanized Unit police officers, Hiro Utsumi or Nash Stolar, as they attempt to take down a terrorist organization known as Metalica.
Development and release
Reception
Next Generation reviewed the PlayStation version of the game, rating it three stars out of five, and stated that "There are a few highlights, including some nicely-detailed and futuristic 3D environments, lengthy missions, and interactive backgrounds. Also, the game has an overwhelming sense of Japanese style which anime fans will likely appreciate. For the most part, however, the game is pretty average – nothing wrong with is, just not that much to get excited about."
Aaron Curtiss for the Los Angeles Times commented that "even though PlayStation went almost a year without a decent shooter, it finally got one it deserves in Project Horned Owl."
Bill Hutchens for The News Tribune of Tacoma, Washington found that while the game can be played using the standard controller, it was "much more fun when played with a light gun".
Reviews
GameFan #39 (Vol 4, Issue 3) 1996 March
GameFan #46 (Vol 4, Issue 10) 1996 October
Electronic Gaming Monthly (Jul, 1996)
GameFan (Mar, 1996)
NowGamer - Aug 31, 1996
IGN - Nov 25, 1996
GameSpot - Dec 01, 1996
All Game Guide - 1998
The Video Game Critic (Jan 29, 2002)
Notes
References
External links
1995 video games
Alfa System games
Cooperative video games
Japan Studio games
Light gun games
Multiplayer and single-player video games
PlayStation (console) games
PlayStation (console)-only games
Rail shooters
Video games about police officers
Video games about terrorism
Video games developed in Japan |
https://en.wikipedia.org/wiki/Ultimate%20Domain | Ultimate Domain, known as Genesia in Europe, is a computer game developed by Microïds and published by Mindscape initially on the Commodore Amiga in 1993 and then ported for the IBM PC in 1994. The original Amiga version is known to be one of the few commercial games developed in AMOS Basic.
In 2011, an iPad version was released. A follow-up to Ultimate Domain named Genesia Legacy was scheduled to be released in 2015.
Plot
Ultimate Domain is a game which starts in the 17th century in the New World colonies, where the player has four settlers and a small amount of raw materials. The settlers can take professions including woodcutters who make logs, architects who make buildings, and specialists who make goods for sale. The settlers may also search for "The Seven Jewels of Genesia".
Reception
Computer Gaming World rated Ultimate Domain one star out of five. Describing it as a lackluster combination of Populous and Civilization, the magazine reported that it was possible to win the game without expanding from the starting position, concluding that "If that doesn't sound a death knell for a game of empire building, I don't know what does". The game was reviewed in 1995 in Dragon #213 by Jay & Dee in the "Eye of the Monitor" column. Both reviewers gave the game 2 out of 5 stars.
Reviews
PC Gamer - Jul, 1994
ASM (Aktueller Software Markt) - Dec, 1993
Amiga Power - Jan, 1994
Amiga Format - Jan, 1994
PC Player (Germany) - May, 1994
References
External links
Ultimate Domain at MobyGames
Genesia at the Hall of Light
1993 video games
4X video games
Amiga games
DOS games
iOS games
Microïds games
Mindscape games
The Software Toolworks games
Video games developed in France |
https://en.wikipedia.org/wiki/Built-in | Built-in, builtin, or built in may refer to:
Computing
Shell builtin, a command or a function executed directly in the shell itself
Builtin function, in computer software and compiler theory
Other uses
Built-in behavior, of a living organism
Built-in furniture
Built-in inflation, a type of inflation that results from past events and persists in the present
Built-in obsolescence, in industrial design and economics
Built-in self-test, a mechanism that permits a machine to test itself
Built-in stabiliser, in macroeconomics
See also
All pages beginning with "", "" and ""
All pages with titles containing "", "" and ""
Built (disambiguation)
Bulletin (disambiguation) |
https://en.wikipedia.org/wiki/Vandamia | Vandamia is a genus of moths of the family Nolidae. The genus was erected by Georges van Son in 1933.
Species
Vandamia illaudata D. S. Fletcher, 1958
Vandamia lightfooti (van Son, 1933)
Vandamia mariepi van Son, 1933
Vandamia typica van Son, 1933
References
Nolinae |
https://en.wikipedia.org/wiki/Wyatt%20Earp%27s%20Old%20West | Wyatt Earp's Old West is a computer game developed by Grolier Electronic Publishing in 1994 for Windows 3.x and Macintosh.
Plot
Wyatt Earp's Old West is an educational game within a multimedia encyclopedia. The package includes a "Shootout" game which is a stand-up arcade shooter. The majority of the program involves exploring an Old West town, while the narrator talks about life in that era. When the player leaves a building, the narrator asks a question related to the room, with the player earning money for correct responses.
Reception
The game was reviewed in 1995 in Dragon #215 by Jay & Dee in the "Eye of the Monitor" column. Both reviewers gave the game 2½ out of 5 stars.
References
External links
Wyatt Earp's Old West at MobyGames
1994 video games
Classic Mac OS games
Grolier Interactive games
History educational video games
Video games developed in the United States
Western (genre) video games |
https://en.wikipedia.org/wiki/Italian%20railway%20signalling | The Italian railway signalling currently in use, employed on the Italian national railway network, is regulated by the "Regulation on signals" (Regolamento sui segnali), issued by the Italian railway infrastructure manager, RFI (Rete Ferroviaria Italiana, part of the FSI Group).
Signals have historically been derived from early British semaphore signals, along with the practice of running on the left side on double track main lines. Consequently, signals are placed on the left of the tracks.
Current practice makes use of light signals of the "searchlight" type on conventional lines, and of the ERTMS cab signalling on high-speed lines.
Historic development
The signalling practice in the early days of Italian railways was not dissimilar to that employed in Britain at the time, where trains were separated by means of either a fixed timetable operation on single track lines or by police officers handsignalling trains on a "time interval working" system. The introduction of the telegraph in the 1840s allowed then for the introduction of the telegraphic block system. Disc signals, probably of French origin, first, and then semaphore signals were introduced. The use of light signals dates to about 1925, along with the introduction of the telephone block and the dirigente unico method of operation, while the modern "searchlight" signals are in use since 1947.
Modern signalling
Modern Italian light signals (segnali permanentemente luminosi) are of the "searchlight" type that can show red, yellow and green through a single aperture. As in British practice, signals are normally placed to the left of the track that they govern and have a black circular background with a white border (vela). In some cases, signals are placed on the right of the track and have a squared background. A signal can have up to three lights, or "arms", and their aspects may be fixed or blinking. Italian light signals can either be "Category 1 signals" (segnali di 1° categoria) or "Distant signals" (segnali di avviso).
Distant signals are light signals which cannot display a red — stop — aspect: therefore, they are normally used to govern the approach to main signals, especially on single track lines. A third type of signal, called "Coupled Category 1 and Distant signals" (segnali di 1° categoria e di avviso accoppiati), or simply "Coupled signals" (segnali accoppiati), can show the combination of both Category 1 and Distant signals at the same time.
Category 1 signals
Category 1 signals are placed right before the danger point and act as a basic stop/go signals, indicating if the block section in the rear is occupied or not. They are used mainly as "starting signals" (segnali di partenza) or on "block signals" (segnali di blocco) in "non-coupled block" lines (blocco non concatenato) — provided that the next signal is the Distant for the following Category 1 signal. The reduced speed limit (which can be either 30, 60 or 100 km/h) is indicated by the preceding Distant signal |
https://en.wikipedia.org/wiki/Joe-E | Joe-E is a subset of the Java programming language intended to support programming according to object-capability discipline.
The language is notable for being an early object-capability subset language. It has influenced later subset languages, such as ADsafe and Caja/Cajita, subsets of Javascript.
It is also notable for allowing methods to be verified as functionally pure, based on their method signatures.
The restrictions imposed by the Joe-E verifier include:
Classes may not have mutable static fields, because these create global state.
Catching out-of-memory exceptions is prohibited, because doing so allows non-deterministic execution. For the same reason, clauses are not allowed.
Methods in the standard library may be blocked if they are deemed unsafe according to taming rules. For example, the constructor is blocked because it allows unrestricted access to the filesystem.
Cup of Joe is slang for coffee, and so serves as a trademark-avoiding reference to Java. Thus, the name Joe-E is intended to suggest an adaptation of ideas from the E programming language to create a variant of the Java language.
Waterken Server is written in Joe-E.
References
External links
The Joe-E project on Google Code
Joe-E language specification
Capability systems
Java (programming language) |
https://en.wikipedia.org/wiki/Michael%20D.%20Sullivan%20%28journalist%29 | Michael D. Sullivan is the Senior Asia Correspondent for National Public Radio (NPR) based in Hanoi since 2003. Prior to that, Sullivan spent 6 years as the network's South Asia correspondent. Sullivan has received awards from the Overseas Press Club, South Asia Journalists Association, and, with Jennifer Ludden, Loren Jenkins, and Paul Glickman, won the 1998 Robert F. Kennedy Journalism Award for international radio. Sullivan has been at NPR since 1985.
References
NPR personalities
Living people
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/OPhone | OPhone, or OMS (Open Mobile System), is a mobile operating system running on the Linux kernel. It is based on technologies initially developed by Android Inc., a firm later purchased by Google, and work done by the Open Handset Alliance. The OPhone OS has appeared only on China Mobile phones, and the software was developed for China Mobile by software firm Borqs. A modified version of OMS has appeared on other carriers as Android+, also developed and maintained by Borqs. Android has been modified for local Chinese markets by China Mobile's OPhone Software Developers Network.
History
OPhone is a Linux-based smartphone software platform developed by China Mobile and based on the Android operating system developed by Google. OPhone is based on open source software and mobile internet technologies. For end-users, OPhone aims to provide cheap, low frills, entry-level smartphone access and a limited mobile internet experience using China Mobile's proprietary TD-SCDMA network, and its GSM network.
Software development
China Mobile consecutively released the 1.0 and 1.5 versions of the OPhone SDK for public use.
In February 2010, China Mobile released the 2.0 version of the SDK for public use. According to a Sina Tech release, this iteration would include support for the Windows Mobile API framework.
As of April 2010 around 600 apps had been developed specifically for OPhones.
See also
Android (operating system)
Baidu Yi
Borqs
Google Nexus
WebOS
References
External links
China Mobile Home Page
OPhone Software Developers Network: Ophone 1.5 SDK
China Mobile Close To Launching Android Based 3G Phone Moco News.net (January 9, 2009)
China Mobile Ophone hopes China Daily (September 1, 2009)
China Mobile's OMS 2.0 Android OS supports Windows Mobile APIs. What's that? Mobile Tech World (February 2, 2010)
China Mobile Backed OS Meant to Rival iPhone Falls Into Obscurity Cio (June 19, 2012)
Smartphone operating systems
Embedded Linux
Mobile Linux
Cloud clients
Mobile operating systems
Free mobile software
Android (operating system) |
https://en.wikipedia.org/wiki/Index%20mapping | Index mapping (or direct addressing, or a trivial hash function) in computer science describes using an array, in which each position corresponds to a key in the universe of possible values.
The technique is most effective when the universe of keys is reasonably small, such that allocating an array with one position for every possible key is affordable.
Its effectiveness comes from the fact that an arbitrary position in an array can be examined in constant time.
Applicable arrays
There are many practical examples of data whose valid values are restricted within a small range. A trivial hash function is a suitable choice when such data needs to act as a lookup key. Some examples include:
month in the year (1–12)
day in the month (1–31)
day of the week (1–7)
human age (0–130) – e.g. lifecover actuary tables, fixed-term mortgage
ASCII characters (0–127), encompassing common mathematical operator symbols, digits, punctuation marks, and English language alphabet
Examples
Using a trivial hash function, in a non-iterative table lookup, can eliminate conditional testing and branching completely, reducing the instruction path length of a computer program.
Avoid branching
Roger Sayle gives an example of eliminating a multiway branch caused by a switch statement:
inline bool HasOnly30Days(int m)
{
switch (m) {
case 4: // April
case 6: // June
case 9: // September
case 11: // November
return true;
default:
return false;
}
}
Which can be replaced with a table lookup:
inline bool HasOnly30Days(int m)
{
static const bool T[] = { 0, 0, 0, 1, 0, 1, 0, 0, 1, 0, 1, 0 };
return T[m-1];
}
See also
Associative array
Hash table
Lookup table
References
Arrays
Associative arrays
Articles with example C code
Search algorithms |
https://en.wikipedia.org/wiki/IPv6%20packet | An IPv6 packet is the smallest message entity exchanged using Internet Protocol version 6 (IPv6). Packets consist of control information for addressing and routing and a payload of user data. The control information in IPv6 packets is subdivided into a mandatory fixed header and optional extension headers. The payload of an IPv6 packet is typically a datagram or segment of the higher-level transport layer protocol, but may be data for an internet layer (e.g., ICMPv6) or link layer (e.g., OSPF) instead.
IPv6 packets are typically transmitted over the link layer (i.e., over Ethernet or Wi-Fi), which encapsulates each packet in a frame. Packets may also be transported over a higher-layer tunneling protocol, such as IPv4 when using 6to4 or Teredo transition technologies.
In contrast to IPv4, routers do not fragment IPv6 packets larger than the maximum transmission unit (MTU), it is the sole responsibility of the originating node. A minimum MTU of 1,280 octets is mandated by IPv6, but hosts are "strongly recommended" to use Path MTU Discovery to take advantage of MTUs greater than the minimum.
Since July 2017, the Internet Assigned Numbers Authority (IANA) has been responsible for registering all IPv6 parameters that are used in IPv6 packet headers.
Fixed header
The fixed header starts an IPv6 packet and has a size of 40 octets (320 bits). The bytes of the multi-byte fields are in the network byte order.
{| class="wikitable" style="text-align: center"
|+Fixed header format
|-
! style="border-bottom:none; border-right:none;"| Offsets
! style="border-left:none;"| Octet
! colspan="8" | 0
! colspan="8" | 1
! colspan="8" | 2
! colspan="8" | 3
|-
! style="border-top: none" | Octet
! Bit
! style="width:2.6%;"| 0
! style="width:2.6%;"| 1
! style="width:2.6%;"| 2
! style="width:2.6%;"| 3
! style="width:2.6%;"| 4
! style="width:2.6%;"| 5
! style="width:2.6%;"| 6
! style="width:2.6%;"| 7
! style="width:2.6%;"| 8
! style="width:2.6%;"| 9
! style="width:2.6%;"| 10
! style="width:2.6%;"| 11
! style="width:2.6%;"| 12
! style="width:2.6%;"| 13
! style="width:2.6%;"| 14
! style="width:2.6%;"| 15
! style="width:2.6%;"| 16
! style="width:2.6%;"| 17
! style="width:2.6%;"| 18
! style="width:2.6%;"| 19
! style="width:2.6%;"| 20
! style="width:2.6%;"| 21
! style="width:2.6%;"| 22
! style="width:2.6%;"| 23
! style="width:2.6%;"| 24
! style="width:2.6%;"| 25
! style="width:2.6%;"| 26
! style="width:2.6%;"| 27
! style="width:2.6%;"| 28
! style="width:2.6%;"| 29
! style="width:2.6%;"| 30
! style="width:2.6%;"| 31
|-
! 0
! 0
| colspan="4"|Version
| colspan="8"|Traffic class
| colspan="20"|Flow label
|-
! 4
! 32
| colspan="16"|Payload length
| colspan="8"|Next header
| colspan="8"|Hop limit
|-
! 8
! 64
| colspan="32" rowspan="4"|Source address
|-
! 12
! 96
|-
! 16
! 128
|-
! 20
! 160
|-
! 24
! 192
| colspan="32" rowspan="4"|Destination address
|-
! 28
! 224
|-
! 32
! 256
|-
! 36
! 288
|}
Version (4 bits)
The constant 6 (bit sequence ).
Traffic Class (6+2 bits)
The bits |
https://en.wikipedia.org/wiki/Collomena | Collomena is a genus of moths of the family Nolidae described by Heinrich Benno Möschler in 1890. The Global Lepidoptera Names Index lists it as a synonym of Motya, but other databases such as Lepidoptera and Some Other Life Forms and Butterflies and Moths of the World list it as valid.
Species
Collomena chirica (Schaus, 1906) Mexico
Collomena filifera (Walker, 1857) Antilles to Brazil
Collomena fugax (Dyar, 1914) Panama
Collomena haematopis (Hampson, 1912) Argentina (Tucuman)
Collomena illegitima (Dyar, 1914) Panama
Collomena inflexa (Morrison, 1875) Florida
Collomena interstitia (Dyar, 1914) Panama, Costa Rica
Collomena leucopis (Schaus, 1910) Costa Rica
Collomena metaphaea (Hampson, 1912) Panama
Collomena murora (Dyar, 1914) Panama
Collomena olivaris (Dyar, 1912) Mexico
Collomena siopera (Dyar, 1914) Panama, Mexico
References
Chloephorinae |
https://en.wikipedia.org/wiki/List%20of%20best-selling%20singles%20by%20year%20%28Germany%29 | This is a list of the twenty best-selling singles on the Media Control Charts in Germany for every year since 2000. The data, provided by Media Control, is based on the singles sold.
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
See also
List of number-one hits (Germany)
Year
Germany
Best-selling singles by year |
https://en.wikipedia.org/wiki/Network%20storage | Network storage may refer to:
Cloud storage
Clustered file system
Distributed file system
File hosting service
File server
Network-attached storage
Storage area network |
https://en.wikipedia.org/wiki/1830%3A%20Railroads%20%26%20Robber%20Barons | 1830: Railroads & Robber Barons is a video game developed by Simtex and published by Avalon Hill in 1995 for MS-DOS.
Gameplay
1830: Railroads & Robber Barons is a multiplayer computer game adaptation of the Avalon Hill board game, 1830. With default settings, the game is a very strict implementation of the board game. Starting with a relatively small amount of seed capital, players purchase shares in eight different railroad companies; ownership of a majority of a company's shares makes a player its president, letting them dictate how the company lays track on a map of the northeastern US, builds stations, buys trains, and runs them on routes to generate revenue. The game ends when the players have collectively earned a certain amount of money ("breaking the bank") or when a player or computer opponent goes bankrupt, at which point a player wins by having the highest total of stock valuation plus cash on hand. As in the board game, tactics such as looting companies of their assets, using buy/sell patterns to manipulate the stock market, and dumping unprofitable companies on other shareholders are prominent aspects of play.
The game has many options to alter game play, both minor (such as modifying the way trains become obsolete, or providing variable instead of fixed dividends per share) and major (adding a ninth railroad). Some variants, such as allowing random game maps or an unlimited number of the different types of track segment, are unique to the computer version, as they would be difficult to impossible to realize with a physical game.
The game can be played by a single player against one to five computer opponents, or multiplayer with hot seat play. There is no built-in facility for play over network, but modern players have done so by running a hot seat multiplayer game in a virtual desktop. Solo mode has four levels of computer opponent difficulty; at higher levels, the computer opponents collude so as to try to have any one of them defeat the player rather than having each maximize its own position (behavior that would not usually arise in a game among human players).
Reception
The game sold less than 40,000 copies, at the time Avalon Hill's computer game sales record, set by Kingmaker.
Computer Gaming Worlds Bob Proctor wrote, "1830 has made the transition from table to computer very well. If you like pure strategy games, this game will give you hundreds of hours of pleasure." T. Liam McDonald of PC Gamer US praised the game but found it overly limited by its faithfulness to the original board game. He summarized, "Where MicroProse's Tycoon titles are large, sprawling canvases on which to paint an entire empire, 1830: Railroads and Robber Barons is a thumbnail sketch; interesting, but ultimately quite small."
The game was reviewed in 1995 in Dragon #219 by Jay & Dee in the "Eye of the Monitor" column. Jay gave the game 3½ out of 5 stars, while Dee gave the game 4 stars.
Next Generation reviewed the PC version of the game, rati |
https://en.wikipedia.org/wiki/Clinical%20Systems%20and%20Networks | A healthcare system is a set of activities with a common set of objectives. For each objective it is necessary to choose one, or more, criteria that can be used to measure progress or the lack of it. The dataset of criteria provides another of the essential elements of a system – the feedback loop.
Examples of the uses of the term system relevant to healthcare
“ The concept of a production system as a socio-technical system designates a general field of study concerned with the interrelations of the technical and socio-psychological organization of industrial production systems. … The concept of a socio-technical system arose from the consideration that any production system requires both a technological organization – equipment and process layout – and a work organization relating to each other those who carry out the necessary tasks. The technological demands place limits on the type of work organization possible, but a work organization has social and psychological properties of its own that are independent of technology….. A socio-technical system must also satisfy the financial conditions of the industry of which it is a part. It must have economic validity. It has in fact social, technological and economic dimensions, all of which are interdependent but all of which have independent values of their own.’ ” (Rice: Productivity and Social Organization.)
Source: Trist, E.L., Higgin, G.W., Murray, H., Pollock, A.B. (1963) Organizational Choice. Capabilities of groups at the coal face under changing technologies. The loss, re-discovery and transformation of a work tradition. Tavistock Publications. Tavistock Institute of Human Relations, (p.6).
“What distinguishes systems is that it is a subject which can talk about the other subjects. It is not a discipline to be put in the same set as the others, it is a meta-discipline whose subject matter can be applied within virtually any other discipline.”
Source: Checkland, P. (1993) Systems Thinking, Systems Practice. John Wiley & Sons, Chichester. (p. 5).
“The systems paradigm is concerned with wholes and their properties. It is holistic, but not in the usual (vulgar) sense of taking in the whole; systems concepts are concerned with wholes and their hierarchical arrangement rather than with the whole.”
Source: Checkland, P. (1993) Systems Thinking, Systems Practice. John Wiley & Sons, Chichester. (p. 13-14).
“Set of interdependent elements interacting to achieve a common aim. These elements may be both human and nonhuman (equipment, technologies, etc.).”
Source: Kohn, L.T., Corrigan, J.M., Donaldson, M.S. (Eds). Committee on Quality of Health Care in America, Institute of Medicine. (2000) To Err is Human. Building a Safer Health System. National Academy Press, Washington. (p. 211)
“A system is defined as a network of interdependent components that work together to try to accomplish a specific aim.”
Source: Nelson, E.C., Batalden, P.B., Godfrey, M.M. (2007) Quality by Des |
https://en.wikipedia.org/wiki/LG%20GW620 | The LG GW620, also known as the LG Eve and the LG InTouch Max, is a smartphone manufactured by LG Electronics. It is the first smartphone from LG that runs the Android operating system.
According to LG's managing director in Levant, Kevin Cha, “This Android phone is just one of many smartphone models we plan to introduce worldwide in the years ahead.” In Canada, the LG GW620 is distributed by Rogers Wireless.
See also
List of Android devices
Galaxy Nexus
References
External links
LG GW620 at PDAdb.net
http://openetna.com/ open firmware project
https://code.google.com/p/openeve Open firmware project for the LG GW620/KH5200
LG Electronics smartphones
Android (operating system) devices
Mobile phones introduced in 2009
Discontinued smartphones |
https://en.wikipedia.org/wiki/Citadel%20of%20the%20Dead | Citadel of the Dead is a computer game developed by RJBest. It was distributed by Affiliate Venture Publishing in 1994 for Macintosh.
Plot
Citadel of the Dead is a first-person fantasy role-playing game. The game features multiple character classes, including the samurai, magician, and cleric.
Reception
Comparing it to Wizardry I, Computer Gaming World in April 1994 said of Citadel of the Dead that "For those seeking instant dungeon gratification at reasonable prices, a new gauntlet has been hurled". The game was reviewed in 1995 in Dragon #219 by Jay & Dee in the "Eye of the Monitor" column, where both reviewers gave the game zero stars.
Reviews
Electronic Games
References
1994 video games
Classic Mac OS games
Classic Mac OS-only games
Fantasy video games
Role-playing video games
Video games developed in the United States |
https://en.wikipedia.org/wiki/List%20of%20things%20named%20after%20Fibonacci | The Fibonacci numbers are the best known concept named after Leonardo of Pisa, known as Fibonacci. Among others are the following.
Concepts in mathematics and computing
A professional association and a scholarly journal that it publishes
The Fibonacci Association
Fibonacci Quarterly
An asteroid
6765 Fibonacci
An art rock band
The Fibonaccis
Fibonacci |
https://en.wikipedia.org/wiki/Reservoir%20modeling | In the oil and gas industry, reservoir modeling involves the construction of a computer model of a petroleum reservoir, for the purposes of improving estimation of reserves and making decisions regarding the development of the field, predicting future production, placing additional wells and evaluating alternative reservoir management scenarios.
A reservoir model represents the physical space of the reservoir by an array of discrete cells, delineated by a grid which may be regular or irregular. The array of cells is usually three-dimensional, although 1D and 2D models are sometimes used. Values for attributes such as porosity, permeability and water saturation are associated with each cell. The value of each attribute is implicitly deemed to apply uniformly throughout the volume of the reservoir represented by the cell.
Types of reservoir model
Reservoir models typically fall into two categories:
Geological models are created by geologists and geophysicists and aim to provide a static description of the reservoir, prior to production.
Reservoir simulation models are created by reservoir engineers and use finite difference methods to simulate the flow of fluids within the reservoir, over its production lifetime.
Sometimes a single "shared earth model" is used for both purposes. More commonly, a geological model is constructed at a relatively high (fine) resolution. A coarser grid for the reservoir simulation model is constructed, with perhaps two orders of magnitude fewer cells. Effective values of attributes for the simulation model are then derived from the geological model by an upscaling process. Alternatively, if no geological model exists, the attribute values for a simulation model may be determined by a process of sampling geological maps.
Uncertainty in the true values of the reservoir properties is sometimes investigated by constructing several different realizations of the sets of attribute values. The behaviour of the resulting simulation models can then indicate the associated level of economic uncertainty.
The phrase "reservoir characterization" is sometimes used to refer to reservoir modeling activities up to the point when a simulation model is ready to simulate the flow of fluids.
Commercially available software is used in the construction, simulation and analysis of the reservoir models.
Seismic to simulation
The processes required to construct reservoir models are described by the phrase Seismic to simulation. The process is successful if the model accurately reflects the original well logs, seismic data and production history.
Reservoir models are constructed to gain a better understanding of the subsurface that leads to informed well placement, reserves estimation and production planning. Models are based on measurements taken in the field, including well logs, seismic surveys, and production history.
Seismic to simulation enables the quantitative integration of all field data into an updateable reservoir |
https://en.wikipedia.org/wiki/Stochastic%20computing | Stochastic computing is a collection of techniques that represent continuous values by streams of random bits. Complex computations can then be computed by simple bit-wise operations on the streams. Stochastic computing is distinct from the study of randomized algorithms.
Motivation and a simple example
Suppose that is given, and we wish to compute . Stochastic computing performs this operation using probability instead of arithmetic.
Specifically, suppose that there are two random, independent bit streams called stochastic numbers (i.e. Bernoulli processes), where the probability of a one in the first stream is , and the probability in the second stream is . We can take the logical AND of the two streams.
The probability of a one in the output stream is . By observing enough output bits and measuring the frequency of ones, it is possible to estimate to arbitrary accuracy.
The operation above converts a fairly complicated computation (multiplication of and ) into a series of very simple operations (evaluation of ) on random bits.
More generally speaking, stochastic computing represents numbers as streams of random bits and reconstructs numbers by calculating frequencies. The computations are performed on the streams and translate complicated operations on and into simple operations on their stream representations. (Because of the method of reconstruction, devices that perform these operations are sometimes called stochastic averaging processors.) In modern terms, stochastic computing can be viewed as an interpretation of calculations in probabilistic terms, which are then evaluated with a Gibbs sampler. It can also be interpreted as a hybrid analog/digital computer.
History
Stochastic computing was first introduced in a pioneering paper by John von Neumann in 1953. However, the
theory could not be fully developed until advances in computing of the 1960s,
mostly through a series of simultaneous and parallel efforts in the US
and the UK.
By the late 1960s, attention turned to the design of
special-purpose hardware to perform stochastic computation. A host
of these machines were constructed between 1969 and 1974; RASCEL
is pictured in this article.
Despite the intense interest in the 1960s and 1970s, stochastic
computing ultimately failed to compete with more traditional digital
logic, for reasons outlined below. The first (and last)
International Symposium on Stochastic Computing
took place in 1978; active research in the area dwindled over the next
few years.
Although stochastic computing declined as a general method of
computing, it has shown promise in several applications. Research has
traditionally focused on certain tasks in machine learning and
control.
Somewhat recently, interest has turned towards stochastic
decoding, which applies stochastic computing to the decoding of error
correcting codes. More recently, stochastic circuits have been successfully used in image processing tasks such as edge detection
and imag |
https://en.wikipedia.org/wiki/Global%20file%20system | In computer storage, a global file system is a distributed file system that can be accessed from multiple locations, typically across a wide-area network, and provides concurrent access to a global namespace from all locations. In order for a file system to be considered global, it must allow for files to be created, modified, and deleted from any location. This access is typically provided by a cloud storage gateway at each edge location, which provides access using the NFS or SMB network file sharing protocols.
There are a number of benefits to using a global file system. First, global file systems can improve the availability of data by allowing multiple copies to be stored in different locations, as well as allowing for rapid restoration of lost data from a remote location. This can be helpful in the event of a disaster, such as a power outage or a natural disaster. Second, global file systems can improve performance by allowing data to be cached closer to the users who are accessing it. This can be especially beneficial in cases where data is accessed by users in different parts of the world. Finally, in contrast to traditional Network attached storage, global file systems can improve the ability of users to collaborate across multiple sites, in a manner similar to Enterprise file synchronization and sharing.
History
The term global file system has historically referred to a distributed virtual name space built on a set of local file systems to provide transparent access to multiple, potentially distributed, systems. These global file systems had the same properties such as blocking interface, no buffering etc. but guaranteed that the same path name corresponds to the same object on all computers deploying the filesystem. Also called distributed file systems these file systems rely on redirection to distributed systems, therefore latency and scalability can affect file access depending on where the target systems reside.
The Andrew File System attempted to solve this for a campus environment using caching and a weak consistency model to achieve local access to remote files.
In the 2000's, global file systems have found a use case in providing hybrid cloud storage, that combine cloud or any object storage, versioning and local caching to create a single, unified, globally accessible file system that does not rely on redirection to a storage device but serves files from the local cache while maintaining the single file system and all meta data in the object storage. As described in Google's patents, advantages of these global file systems include the ability to scale with the object storage, use snapshots stored in the object storage for versioning to replace backup, and create a centrally managed consolidated storage repository in the object storage.
Comparison with Network Attached Storage
When it comes to hybrid file storage, there are two main approaches: network attached storage (NAS) with cloud connectivity and global file syst |
https://en.wikipedia.org/wiki/Virtual%20International%20Authority%20File | The Virtual International Authority File (VIAF) is an international authority file. It is a joint project of several national libraries and operated by the Online Computer Library Center (OCLC).
History
Discussions about having a joint international authority started in the late 1990s. After several failed attempts to develop a unique joint authority file, the new idea was to link existing national authorities. This would present all the benefits of a standard file without requiring a significant investment of time and expense in the process.
The project was initiated by the American Library of Congress (LOC), the German National Library (DNB), and the OCLC in April 1998 as a proof-of-concept that authority records can be linked. After extensive testing, the VIAF consortium was formed at the 2003 World Library and Information Congress, hosted by the International Federation of Library Associations. on 6 August 2003, and by September it had its own page at the OCLC website. The Bibliothèque nationale de France (BnF) joined the project on 5 October 2007.
The project transitioned to being a service of the OCLC on 4 April 2012.
The aim is to link the national authority files (such as the German Name Authority File) to a single virtual authority file. In this file, identical records from the different data sets are linked together. A VIAF record receives a standard data number, contains the primary "see" and "see also" records from the original documents, and refers to the original authority records. The data is made available online and is available for research and, data exchange and sharing. Reciprocal updating uses the Open Archives Initiative Protocol for Metadata Harvesting (OAI-PMH) protocol.
The file numbers are also being added to Wikipedia biographical articles and are incorporated into Wikidata.
Christine L. Borgman groups VIAF with the International Standard Name Identifier and ORCID systems, describing all three as "loosely coordinated efforts to standardize name forms". Borgman characterizes all three systems as attempts to solve the problem of author name disambiguation, which has grown in scale as the quantity of data multiplies. She notes that VIAF, unlike the other two systems, is led by libraries, as opposed to individual authors or creators.
VIAF clusters
VIAF's clustering algorithm is run every month. As more data are added from participating libraries, clusters of authority records may coalesce or split, leading to some fluctuation in the VIAF identifier of certain authority records.
Participating libraries and organizations
Libraries added for testing purposes
See also
Authority control
Faceted Application of Subject Terminology (FAST)
Integrated Authority File (GND)
International Standard Authority Data Number (ISADN)
International Standard Name Identifier (ISNI)
Wikipedia's authority control template for articles
References
Sources
External links
VIAF at OCLC
Identifiers
Library cataloging and clas |
https://en.wikipedia.org/wiki/Justin%20Welborn | Justin Welborn is a character actor and singer known for his roles in the films The Signal, Dance of the Dead, and The Final Destination. He was a recurring character on the FX Network hit show Justified, with his last appearance in season 6 episode 10.
Filmography
Television
Video
2008 - MGS: Acquiescence - Stunt
2009 - Plague of the Damned - Plaid Zombie, other stunts
References
External links
Justin Welborn in Flixster
Year of birth missing (living people)
Living people
American male film actors
American male television actors
American baritones |
https://en.wikipedia.org/wiki/Concurrent%20data%20structure | In computer science, a concurrent data structure is a
particular way of storing and organizing data for access by
multiple computing threads (or processes) on a computer.
Historically, such data structures were used on uniprocessor
machines with operating systems that supported multiple
computing threads (or processes). The term concurrency captured the
multiplexing/interleaving of the threads' operations on the
data by the operating system, even though the processors never
issued two operations that accessed the data simultaneously.
Today, as multiprocessor computer architectures that provide
parallelism become the dominant computing platform (through the
proliferation of multi-core processors), the term has come to
stand mainly for data structures that can be accessed by multiple
threads which may actually access the data simultaneously because
they run on different processors that communicate with one another.
The concurrent data structure (sometimes also called a shared data structure) is usually considered to reside in an abstract storage
environment called shared memory, though this memory may be
physically implemented as either a "tightly coupled" or a
distributed collection of storage modules.
Basic principles
Concurrent data structures, intended for use in
parallel or distributed computing environments, differ from
"sequential" data structures, intended for use on a uni-processor
machine, in several ways. Most notably, in a sequential environment
one specifies the data structure's properties and checks that they
are implemented correctly, by providing safety properties. In
a concurrent environment, the specification must also describe
liveness properties which an implementation must provide.
Safety properties usually state that something bad never happens,
while liveness properties state that something good keeps happening.
These properties can be expressed, for example, using Linear Temporal Logic.
The type of liveness requirements tend to define the data structure.
The method calls can be blocking or non-blocking. Data structures are not
restricted to one type or the other, and can allow combinations
where some method calls are blocking and others are non-blocking
(examples can be found in the Java concurrency software
library).
The safety properties of concurrent data structures must capture their
behavior given the many possible interleavings of methods
called by different threads. It is quite
intuitive to specify how abstract data structures
behave in a sequential setting in which there are no interleavings.
Therefore, many mainstream approaches for arguing the safety properties of a
concurrent data structure (such as serializability, linearizability, sequential consistency, and
quiescent consistency) specify the structures properties
sequentially, and map its concurrent executions to
a collection of sequential ones.
To guarantee the safety and liveness properties, concurrent
data structures must typically (though not alway |
https://en.wikipedia.org/wiki/JCNetwork | JCNetwork e.V. is one of two governing bodies among German student consultancies. The registered association features the cooperation as well as the sharing of experiences among 41 student consultancies throughout Germany. More than 2,600 students are organized in the student consultancies. In addition to receiving a university education, the students give advice to companies and nonprofit organizations through projects that are planned and implemented by the students themselves.
History
JCNetwork e.V. was founded by seven student consultancies in 2002. Shortly after its foundation, many more association members joined the Network. Today, there are 41 participating university consultancies all over Germany.
JCNetwork Days
One year after the foundation, the association organized the so-called JCNetwork Days for the first time. The JCNetwork Days is a week-long biannual meeting of the governing body consisting of numerous workshops and training events. The purpose of this meeting is the continuing education of the members through training as well as the establishment of valuable contacts between student consultants and companies. Representatives of several companies, students, professors and faculty members meet for discussions and training events. The assembly of the JCNetwork members and the report of the managing committee is also on the agenda of the JCNetwork Days. More than 500 students are regularly attending these meetings nowadays.
Continuing Education and JCNetwork Certified Junior Consultant Program
At the end of 2002, the JCNetwork association introduced its own system of education and continuing training. Since then, the students have received credit points for attending the training events which are conducted by companies or members of the governing body. Students who have gathered enough credit points in different subject areas and who are able to show experience in consulting, receive the title "Certified Junior Consultant".
Charitable Projects
With the "JCNetwork pro Bono" initiative, JCNetwork supports charitable organizations by offering free advice. With the help and cooperation of professional economic consultancies, students work on creating valuable solutions for charity and charitable organizations.
References
External links
jcnetwork.de
Organizations established in 2002
Student organisations in Germany
2002 establishments in Germany |
https://en.wikipedia.org/wiki/Ernsta%20cordata | Ernsta cordata is a species of sea sponge in the family Clathrinidae found in South Africa. The name means "heart-shaped" in Latin.
References
Clathrina
Sponges described in 1872
Fauna of South Africa
Taxa named by Ernst Haeckel |
https://en.wikipedia.org/wiki/Noor%20TV%20%28US%29 | Noor TV (meaning "light" in the Arabic language) is a US based Afghan satellite television network, operating from Pleasanton, California. The station is available on Galaxy 25 satellite dish throughout North America.
Noor TV's programs are broadcast 24-hours and include: world news, children's and youth programming, game, cooking, music and talk shows.
The mission of Noor TV is to promote harmony in the oft-fractious Afghan communities in the United States and Canada.
Three Afghan Americans brothers of Fremont, California (Yama Yousefzai, Haris Rahimi and Farzan Rahimi) founded and launched Noor TV on 29 July 2007 and first appeared on television screens on 1 August 2007.
References
Noor TV - Official website
Mass media in Afghanistan
Television channels and stations established in 2007 |
https://en.wikipedia.org/wiki/AlienBabelTech | AlienBabelTech started out as an international collaboration of computer enthusiasts and professionals. It is an online computer and technology-related publication website that was officially launched on 1 October 2008.
Purpose
AlienBabelTech is working with industry professionals and using its collective expertise and experience in an attempt to be the most valuable online information technology resource with open lines of communication and approachable staff.
Forums
The AlienBabelTech forums currently has over 1000 registered users and over 55,000 posts. According to Alexa statistics, ABT, as it is known for short, has over 400 other sites linking in.
References
External links
AlienBabelTech
AlienBabelTech Forums
Computing websites |
https://en.wikipedia.org/wiki/2005%20MPC%20Computers%20Bowl | The 2005 MPC Computers Bowl was the ninth edition of the bowl game. It featured the Boise State Broncos and the Boston College Eagles. Though playing at home on its blue "Smurf Turf", where it held a 31-game winning streak, WAC co-champion Boise State was unable to get its usually potent offense on track early, falling behind ACC rep Boston College by 24 at halftime before losing, 27–21.
Game summary
Sophomore quarterback Matt Ryan led the way for the Eagles, throwing for 262 yards and three touchdowns, two to junior wide receiver Tony Gonzalez and one to senior Will Blackmon, who led all receivers with 144 yards on just five catches. The Broncos were held scoreless by the Boston College defense for the first 43:46 of the game and hindered their own efforts with three turnovers and eight penalties. Playing their final game under coach Dan Hawkins, who would coach Colorado next season, Boise State essayed a late comeback, with junior quarterback Jared Zabransky throwing for one touchdown (a 53-yarder to Drisan James) and running for another. Junior Quinton Jones brought Boise State to within six when he took a Johnny Ayers punt 92 yards for a touchdown with less than four minutes to play in the game, but Boise State's last drive from midfield with less than two minutes stalled and Zabransky threw an end-zone interception to seal the Eagles' win. Boston College thus extended its NCAA-best bowl winning streak to six games, and also ran the BCS conferences' record to 3–0 against non-BCS teams this bowl season.
External links
Game recap at USAToday.com
Game video via YouTube
MPC Computers Bowl
Famous Idaho Potato Bowl
Boise State Broncos football bowl games
Boston College Eagles football bowl games
December 2005 sports events in the United States
MPC Computers Bowl |
https://en.wikipedia.org/wiki/TERMIUM%20Plus | TERMIUM Plus is an electronic linguistic and terminological database operated and maintained by the Translation Bureau of Public Services and Procurement Canada, a department of the federal government. The database offers millions of terms in English and French from various specialized fields, as well as some in Spanish and Portuguese.
History
TERMIUM Plus was initially developed by the Université de Montréal in October 1970, under the name Banque de Terminologie de l’Université de Montréal (BTUM). The database was under the direction of Marcel Paré, with a vision to produce the most flexible bilingual language file that would be available to all. BTUM was initially funded by private donors and government subsidies, subsequently growing with the help of professionals in the field of translation over the following years.
At the end of 1974, however, the Translation Bureau under the Secretary of State for Canada's department showed interest in the operation of BTUM. The goal of the Bureau at the time was to standardize terminology throughout the public service, as well as the federal public administration.
In 1975, the BTUM was able to obtain data and user responses in collaboration with the language services of Bell Canada.
In January 1976, the Secretary of State officially acquired BTUM, and renamed the database TERMIUM (TERMInologie Université de Montréal). The system was then transferred to the central computer of the federal government in Ottawa, and began to integrate approximately 175,000 files that the BTUM initially compiled with the files that the Translation Bureau had been working on. In the years to follow, the Bureau began the sorting process, along with the input process onto the computer. The database grew to 900,000 records by 1987.
Development
As terminological records grew in the TERMIUM database, the Canadian government received a proposal in 1985 from a Toronto-based company to launch TERMIUM in a CD-ROM format, in order to make the database more accessible to users. By fall of 1987, a pilot project for CD-ROM was launched to investigate the responses from its users, which included services under the Translation Bureau and other private Canadian companies. After some data compilation and investigation, the Bureau incorporated an indexing system to improve the speed and accuracy of term extraction.
By 1990, TERMIUM on CD-ROM was commercially available through subscription (with an annual fee of $1,100 to $1,500). Updates were released every three to four months. In 1996, TERMIUM on CD-ROM received an award from ATIO (the Association of Translators and Interpreters of Ontario).
In October 2009, TERMIUM Plus and an array of language tools under the Language Portal of Canada were launched with free online access.
Features
TERMIUM was initially developed to contain terminological records in both of Canada’s official languages (English and French). As the system upgraded to its third-generation version in 1985, it containe |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.