source stringlengths 32 199 | text stringlengths 26 3k |
|---|---|
https://en.wikipedia.org/wiki/National%20Cycle%20Route%2042 | National Cycle Route 42 is a part of the National Cycle Network running from Glasbury in Mid Wales to Gloucester in England. It provides a north–south link from Route 8 (Lon Las Cymru) to Route 4, and provides an alternative south route for Lon Las Cymru for those starting at Chepstow instead of Cardiff. It is also part of the Celtic Trail.
This should not be confused with Regional Cycle Route 42 in Suffolk.
Route
Starting in Wales, from north to south, it passes through:
Glasbury, connecting to Route 8 (Lon Las Cymru)
Llanthony
Abergavenny, connecting to the Four Castles cycle route and crossing Route 46
Usk, connecting to the proposed Route 30
Pen-y-cae-mawr, a small hamlet where Route 32 is proposed to provide a shortcut to bypass Chepstow, rejoining Route 42 at Tintern.
Chepstow, connecting to Route 4
The route is proposed to turn east from Chepstow into England, staying north of the Severn Estuary, but this part of the route is not yet complete. It will pass through:
Cinderford, connecting with Route 44
Gloucester
National Cycle Routes
Cycleways in Wales
Cycleways in England
Cycleways in Powys
Transport in Monmouthshire
Transport in Gloucestershire |
https://en.wikipedia.org/wiki/%C4%8CT%20HD | ČT HD was the high-definition TV channel from Czech Television. ČT HD broadcast programming from ČT1, ČT2 and ČT4, via IPTV, digital terrestrial (in several areas only) and satellite (via Astra 1E – DVB-S standard, since spring 2010 via the new Astra 3B – DVB-S2 standard).
External links
Website (in Czech)
Television stations in the Czech Republic
Television channels and stations established in 2009
Czech Television |
https://en.wikipedia.org/wiki/Atomic%20TV | Atomic TV (stylized as Atomic. and simply known as Atomic) is a Romanian television network launched on 20 November 2021 as an online livestreaming channel, and on 23 November 2021 as a television channel. The channel primarily airs music made in Romania from the 90s and 2000s, but also music from 2010s.
The channel is a revival of the original Atomic TV channel launched on 3 February 1999, rebranded as TV K Lumea on 26 June 2004, sold to SBS Broadcasting Group and rebranded as Kiss TV in 2006.
References
Television channels and stations established in 1997
Television channels and stations disestablished in 2000
Television in Romania
Television channels and stations established in 2021
Commercial-free television networks |
https://en.wikipedia.org/wiki/Open%20Network%20Entertainment | Open Network Entertainment (ONE) is a joint venture between parent company LTI Global, Inc./ Locus Communications (a US-based marketer and distributor of prepaid products including phone cards) and Korean company PayLetter, Inc. (a service provider handling content related and micro-transaction billing processes). The company was created in 2009 with the stated mission of “providing value added services to online game publishers, retailers and gamers” through game cards available at retail stores and online.
Products
ONE Universal Power-Up Game Card
In October 2009, ONE announced the availability of its first product, the ONE Universal Power-Up Game Card, a prepaid game card that enables purchasers to play a variety of massively multiplayer online games and purchase virtual goods within those games (micro-transactions). The cards are carried in Rite-Aid stores in North America and are available in denominations of $10 and $20. Customers may add more currency to the card in order to maintain its use.
Games Playable using the ONE Power-Up Game Card
References
External links
ONE Power-Up Game Card site
Video game companies of the United States |
https://en.wikipedia.org/wiki/Asia%20Media%20Group | Asia Media Group Berhad () is a broadcasting, advertising and digital media company in Malaysia. It operates the country's Largest Transit-TV Network. The company provides infotainment and advertising services such as program sponsorships and video advertising using digital electronic displays installed in various indoor and outdoor premises. Asia Media also provides entertainment services, including local news, sports, health, entertainment, and documentary content.
As of April 2012, its network included:
3,993 screens on board the Malaysian Public Transportation System (Certified by the Malaysian Book of Records)
Asia Media TV
Asia Media TV, better known as AMTV, is Asia Media's flagship channel and is shown on its Transit-TV network. Contents include weekly programs on sales, marketing, technology, regional developments and news. According to Nielsen Research, AMTV has a daily viewership of 1.24 million. AMTV participates in two way conversations that occur within the context of social media and then creates its programming based on what the viewers say they want. A typical digital campaign includes interaction via mobile phones, on-line participation, viral videos, games, polls and sweepstakes.
Broadcasting
Malaysian Communications and Multimedia Commission (MCMC) awarded three (3) blocks of L-Band Spectrums, i.e. 1452.960, 1454.672 & 1456.384 MHz respectively to Asia Media.
Asia Media is the first Malaysian company to be awarded digital broadcasting licenses covering both fixed and mobile broadcasting for free-to-air as well as subscription based models. The company opted for DMB-T technology for its mobile TV application.
Recent corporate history
2015
Asia Media Group has acquired DPO Plantations Sdn Bhd as a fully owned subsidiary on 20 January. Subsequently on 10 April, DPO Plantations has entered into an agreement to form a joint-venture company with the local state Government, Sarawak Land Custody Development Authority to cultivate oil palm. Under the agreement, a total of 4,361 hectares (10,776.3 acres) of land will be cultivated with an estimated investment of RM70 million (US$20 million). The market reacts positively with its share price rises 8.33% on the day of the announcement.
2014
In May, Asia Media Group won The BrandLaureate BestBrands Awards 2013-2014: Best Brand in Media - Transit TV Network.
2013
On 4 July, Asia Media proposed renounceable rights issue of up to 752,400,000 new ordinary shares of RM0.10 each on the basis of one rights share for every existing share held, together with up to 188,100,000 free new warrants. An additional warrant will be issued for every four rights shares subscribed on the entitlement date. The rights issue was completed on 26 September with an acceptance rate of 88% raising RM50 million. Post-issue, the company's market capitalisation stands at RM130 million. The funds raised are being used to finance the roll-out of live broadcasting across Asia Media's Transit-TV network.
In May |
https://en.wikipedia.org/wiki/Naughty%20or%20Nice%20%28film%29 | Naughty or Nice is an American television film starring George Lopez and James Kirk. It premiered on ABC in 2004. As of 2009, it was shown in the 25 Days of Christmas programming block on ABC Family, but it was not part of the block in 2010.
Plot
A Chicago sports radio shock jock is changed by a Christmas season encounter with a 15-year-old fan who is dying of a heart condition, who forces him to be nice for a day.
Cast
George Lopez as Henry Ramiro
James Kirk as Michael
Lisa Vidal as Diana Ramiro
Bianca Collins as Olivia Ramiro
Daniel MacLean as Kevin Gilmore
See also
List of Christmas films
External links
2004 television films
2004 films
American Christmas films
Films directed by Eric Laneuville
Christmas television films
2000s Christmas films
2000s English-language films |
https://en.wikipedia.org/wiki/Merry%20Madagascar | Merry Madagascar is a Christmas special first broadcast on the NBC network on November 17, 2009, which starred the characters from the film series Madagascar, and takes place sometime between the first and second film. It is the second DreamWorks Animation Christmas special, after Shrek the Halls.
It features many of the same voices from the film (except Sacha Baron Cohen, who was replaced by Danny Jacobs, the voice of Julien in both The Penguins of Madagascar and All Hail King Julien television series), including Ben Stiller, Chris Rock, David Schwimmer, and Jada Pinkett Smith. Carl Reiner provided the voice of Santa Claus.
Plot
Taking place two months after the events of the first film and before the events of the second film, Alex, Marty, Melman, and Gloria attempt to return to New York City in a hot air balloon. However, the lemur population inadvertently thwarts their escape by mistaking them for the "Marauding Red Night Goblin" that visits annually. The "Goblin" then showers the island with coals. Alex shoots it down, discovering it was actually Santa Claus throwing coal at Julien for being naughty.
The crash leaves Santa with amnesia, unaware of his responsibilities. The group resolve to deliver the presents and use the sleigh to get back home, but Santa's reindeer won't take orders from anyone other than Santa, so the penguins use Santa's magic dust to fly.
Their initial attempts to make deliveries go awry so they decide to dump the gifts at the relevant post offices. However, after crashing into an apartment and unintentionally bringing joy to a little girl, they continue with the deliveries despite the adverse conditions.
Back on Madagascar, while the lemurs are presenting gifts to Julien for "Julianuary", Santa rediscovers his ability to make toys. He crafts gifts for them all, angering Julien as he feels the focus should be on him. Julien decrees that the lemurs' gifts belong to him. Sifting through the presents alone depresses him; Santa's suggestion of giving a gift lifts his mood.
As the night nears its end, the animals have only enough magic dust for one last trip. Putting aside their desire to go home, they return to Madagascar to rescue Santa. They run out of dust and crash into him, restoring his memory. He thanks the animals for making his deliveries and takes Julien off the naughty list. However, the animals have overlooked a bag for Liechtenstein, so Santa switches to a reserve tank to make the trip before the animals can ask for a ride. The animals resolve to enjoy their Christmas in Madagascar, but Julien throws a coconut at Alex to get back on the naughty list, causing a lump on his head and amnesia, like Santa before him.
Cast
Ben Stiller as Alex the lion.
Chris Rock as Marty the zebra.
David Schwimmer as Melman the giraffe.
Jada Pinkett Smith as Gloria the hippopotamus.
Danny Jacobs as King Julien XIII the ring-tailed lemur.
Tom McGrath as Skipper the penguin.
Chris Miller as Kowalski the penguin.
Christo |
https://en.wikipedia.org/wiki/Gamma%20encoding | Gamma encoding may refer to:
Gamma correction, a digital image encoding optimization technique
Elias gamma coding, a positive integer data compression technique |
https://en.wikipedia.org/wiki/Nebu%20Global | Nebu b.v. () is a Dutch software development company. It provides a component based software system for marketing research and data collection. Nebu also provides technical support, hosting and training. Its main target industries are marketing, market research and opinion poll research.
"Collect - Manage - Utilize" is the paradigm that best captures Nebu's offering. Nebu tools provide data collection, panel management, dialing services, data management and data processing capabilities. Nebu provides the technology that helps marketing researchers integrate and automate the full marketing research process within a single suite of tools.
Nebu has, for over 25 years, provided fieldwork and marketing research companies with Nebu Dub InterViewer, the most flexible data collection software on the market. You can conduct CATI, CAPI, WAPI (online surveys and mobile surveys), multi and mixed mode interviews. Data collected can be enriched with data from external sources and stored in the central management platform, Nebu Data Hub. With the Hub, you can automate your entire market research process, conduct analysis and transform data into interactive visualizations to be shared in real-time Nebu Reporter dashboards.
The Nebu Head Office is located in Wormer, Netherlands and the company has offices in Debrecen (Hungary) and London (United Kingdom). Nebu works with a network of partners, among which a growing number of resellers.
History
The company was established in 1992 as a joint initiative of Fred Broers and Eric van Velzen.
As a tribute to an old Babylonian God they chose Nebu (God of writing and wisdom) as their company's name.
Nebu published two cooperating software systems which are called Dub Knowledge and Dub InterViewer. The prefix Dub relates to the Babylonian word for a clay tablet that the god used to write down the destiny of the people. Apart from these main products, numerous other tools were developed over the years and added to the packages. All of their names also start with 'Dub'.
Nebu currently employs 40 staff members as of 2015 with a revenue of over $3 million in the same year.
Nebu now has over 150 licensed users of their software including companies in the Market Research Industry and governmental organizations.
References
Software companies established in 1992
Software companies of the Netherlands
Dutch companies established in 1992 |
https://en.wikipedia.org/wiki/Sexting | Sexting is sending, receiving, or forwarding sexually explicit messages, photographs, or videos, primarily between mobile phones. It may also include the use of a computer or any digital device. The term was first popularized early in the 21st century and is a portmanteau of sex and texting, where the latter is meant in the wide sense of sending a text possibly with images. Sexting is not an isolated phenomenon but one of many different types of sexual interaction in digital contexts that is related to sexual arousal.
Background
The first published use of the term sexting was in a 2005 article in the Australian Sunday Telegraph Magazine. In August 2012, the word sexting was listed for the first time in Merriam-Webster's Collegiate Dictionary.
The Pew Research Center commissioned a study on sexting, which divides the practice into three types:
Exchange of images solely between two romantic partners.
Exchanges between partners that are shared with others outside the relationship.
Exchanges between people who are not yet in a relationship, but where at least one person hopes to be.
Sexting has become more common with the rise in camera phones and smartphones with Internet access, that can be used to send explicit photographs as well as messages. While sexting is done by people of all ages, most media coverage fixates on negative aspects of adolescent usage. Young adults use the medium of the text message much more than any other new media to transmit messages of a sexual nature, and teenagers who have unlimited text messaging plans are more likely to receive sexually explicit texts.
As a result of sexting being a relatively recent practice, ethics are still being established by both those who engage in it and those who create legislation based on this concept. Whether sexting is seen as a positive or negative experience typically rests on the basis of whether or not consent was given to share the images. Nevertheless, Australian laws currently view under-18s as being unable to give consent to sexting, even if they meet the legal age for sexual consent.
Contrary to common misconception, when it comes to preventing abuse among adolescents, consent is more important than trying to stop sexting altogether.
Social media applications
Sexting has been promoted further by several direct messaging applications that are available on smartphones. The difference between using these applications and traditional texting is that content is transmitted over the Internet or a data plan, allowing anyone with Internet access to participate. Snapchat appeals to teens because it allows users to send photos for a maximum of ten seconds before they self-destruct. Those sending photos over Snapchat believe they will disappear without consequences so they feel more secure about sending them. There have been several cases where teens have sent photos over these applications, expecting them to disappear or be seen by the recipient only, yet are saved and distributed, |
https://en.wikipedia.org/wiki/Arezo%20TV | Arezo TV () is an Afghan satellite television network, based in Afghanistan. The channel is available through the Yahsat 1A satellite. It also has a radio station available in Afghanistan.
The channel launched on Nowruz festival in 2007, in the city of Mazar-i-Sharif before expanding nationwide.
References
External links
Television in Afghanistan
Defunct television networks
Television channels and stations disestablished in 2007 |
https://en.wikipedia.org/wiki/GR%204 | The GR 4 is a long-distance walking route of the Grande Randonnée network in France. The route connects Royan with Grasse.
Along the way, the route passes through:
Royan
Saintes
Montbron
Aixe-sur-Vienne
Aubusson
Mont-Dore
Les Vans
Manosque
Grasse
References
External links
GR4 From the Atlantic to the Mediterranean (Full itinerary)
Hiking trails in France |
https://en.wikipedia.org/wiki/GR%209 | The GR 9 is a long-distance walking route of the Grande Randonnée network in France. The route connects Saint-Amour, Jura with Port Grimaud.
Along the way, the route passes through:
Saint-Amour, Jura
Lajoux
Culoz
Grenoble
Saillans, Drôme
Monieux
Trets
Rocbaron
Port Grimaud
References
Links
GR9 From Jura to Mediterranean (Full itinerary)
Hiking trails in France |
https://en.wikipedia.org/wiki/PC%20migration | PC migration is the process of transferring the entire user environment (e.g. personal documents and settings) between two computer systems. The migration problem is often associated with the concept of total cost of ownership where the requirement to migrate information is considered a "cost" in purchasing a new PC, similar considerations exist for businesses upgrading hardware/software.
PC migration is required whenever one needs to move to a new computer (i.e. purchasing new hardware), or upgrade to a new OS. Because of intrinsic differences and strong OS-hardware coupling, PC migration is considered to be a problem for both consumers and enterprises.
Some PC migration software products are capable of transferring not just settings and data, but also applications.
Sources for software that automates PC migration software include Laplink, Tranxition, and Swimage.
Windows 10 does not any longer include a Windows transfer utility with the OS. Microsoft and Laplink PCmover have joined up to provide this functionality from Microsoft's site.
References
System administration |
https://en.wikipedia.org/wiki/Reservoir%20sampling | Reservoir sampling is a family of randomized algorithms for choosing a simple random sample, without replacement, of items from a population of unknown size in a single pass over the items. The size of the population is not known to the algorithm and is typically too large for all items to fit into main memory. The population is revealed to the algorithm over time, and the algorithm cannot look back at previous items. At any point, the current state of the algorithm must permit extraction of a simple random sample without replacement of size over the part of the population seen so far.
Motivation
Suppose we see a sequence of items, one at a time. We want to keep ten items in memory, and we want them to be selected at random from the sequence. If we know the total number of items and can access the items arbitrarily, then the solution is easy: select 10 distinct indices between 1 and with equal probability, and keep the -th elements. The problem is that we do not always know the exact in advance.
Simple: Algorithm R
A simple and popular but slow algorithm, Algorithm R, was created by Jeffrey Vitter.Initialize an array indexed from to , containing the first items of the input . This is the reservoir.
For each new input , generate a random number uniformly in . If , then set , otherwise, discard .
Return after all inputs are processed.This algorithm works by induction on .
While conceptually simple and easy to understand, this algorithm needs to generate a random number for each item of the input, including the items that are discarded. The algorithm's asymptotic running time is thus . Generating this amount of randomness and the linear run time causes the algorithm to be unnecessarily slow if the input population is large.
This is Algorithm R, implemented as follows:
(* S has items to sample, R will contain the result *)
ReservoirSample(S[1..n], R[1..k])
// fill the reservoir array
for i := 1 to k
R[i] := S[i]
end
// replace elements with gradually decreasing probability
for i := k+1 to n
(* randomInteger(a, b) generates a uniform integer from the inclusive range {a, ..., b} *)
j := randomInteger(1, i)
if j <= k
R[j] := S[i]
end
end
end
Optimal: Algorithm L
If we generate random numbers independently, then the indices of the smallest of them is a uniform sample of the k-subsets of .
The process can be done without knowing : Keep the smallest of that has been seen so far, as well as , the index of the largest among them.
For each new , compare it with . If , then discard , store , and set to be the index of the largest among them. Otherwise, discard , and set .Now couple this with the stream of inputs . Every time some is accepted, store the corresponding . Every time some is discarded, discard the corresponding .
This algorithm still needs random numbers, thus taking time. But it can be simplified.
First simplification: it is unnecessary to test new one by one, |
https://en.wikipedia.org/wiki/SMA%2A | SMA* or Simplified Memory Bounded A* is a shortest path algorithm based on the A* algorithm. The main advantage of SMA* is that it uses a bounded memory, while the A* algorithm might need exponential memory. All other characteristics of SMA* are inherited from A*.
Process
Properties
SMA* has the following properties
It works with a heuristic, just as A*
It is complete if the allowed memory is high enough to store the shallowest solution
It is optimal if the allowed memory is high enough to store the shallowest optimal solution, otherwise it will return the best solution that fits in the allowed memory
It avoids repeated states as long as the memory bound allows it
It will use all memory available
Enlarging the memory bound of the algorithm will only speed up the calculation
When enough memory is available to contain the entire search tree, then calculation has an optimal speed
Implementation
The implementation of Simple memory bounded A* is very similar to that of A*; the only difference is that nodes with the highest f-cost are pruned from the queue when there isn't any space left. Because those nodes are deleted, simple memory bounded A* has to remember the f-cost of the best forgotten child of the parent node. When it seems that all explored paths are worse than such a forgotten path, the path is regenerated.
Pseudo code:
function simple memory bounded A*-star(problem): path
queue: set of nodes, ordered by f-cost;
begin
queue.insert(problem.root-node);
while True do begin
if queue.empty() then return failure; //there is no solution that fits in the given memory
node := queue.begin(); // min-f-cost-node
if problem.is-goal(node) then return success;
s := next-successor(node)
if !problem.is-goal(s) && depth(s) == max_depth then
f(s) := inf;
// there is no memory left to go past s, so the entire path is useless
else
f(s) := max(f(node), g(s) + h(s));
// f-value of the successor is the maximum of
// f-value of the parent and
// heuristic of the successor + path length to the successor
end if
if no more successors then
update f-cost of node and those of its ancestors if needed
if node.successors ⊆ queue then queue.remove(node);
// all children have already been added to the queue via a shorter way
if memory is full then begin
bad Node := shallowest node with highest f-cost;
for parent in bad Node.parents do begin
parent.successors.remove(bad Node);
if needed then queue.insert(parent);
end for
end if
queue.insert(s);
end while
end
References
Graph algorithms
Routing algorithms
Search algorithms
Game artificial intelligence
Articles with example pseudocode |
https://en.wikipedia.org/wiki/FIPS%20140-3 | The Federal Information Processing Standard Publication 140-3 (FIPS PUB 140-3) is a U.S. government computer security standard used to approve cryptographic modules. The title is Security Requirements for Cryptographic Modules. Initial publication was on March 22, 2019 and it supersedes FIPS 140-2.
Purpose
The National Institute of Standards and Technology (NIST) issued the FIPS 140 Publication Series to coordinate the requirements and standards for cryptography modules that include both hardware and software components. Federal agencies and departments can validate that the module in use is covered by an existing FIPS 140 certificate that specifies the exact module name, hardware, software, firmware, and/or applet version numbers. The cryptographic modules are produced by the private sector or open source communities for use by the U.S. government and other regulated industries (such as financial and health-care institutions) that collect, store, transfer, share and disseminate sensitive but unclassified (SBU) information.
History
Efforts to update the FIPS 140 standard date back to the early 2000s. The FIPS 140-3 (2013 Draft) was scheduled for signature by the Secretary of Commerce in August 2013, however that never happened and the draft was subsequently abandoned. In 2014, NIST released a substantially different draft of FIPS 140-3, this version effectively directing the use of an International Organization for Standardization/International Electrotechnical Commission (ISO/IEC) standard, 19790:2012, as the replacement for FIPS 140-2. The 2014 draft of FIPS 140-3 was also abandoned, although the use of ISO/IEC 19790 did ultimately come to fruition. On August 12, 2015, NIST formally released a statement on the Federal Register asking for comments on the potential use of portions of ISO/IEC 19790:2014 in the update of FIPS 140-2. The reference to a 2014-version of ISO/IEC 19790 was an inadvertent error in the Federal Registry posting, as 2012 is the most recent version. ISO/IEC 19790 has been reviewed and re-confirmed as recently as 2018, but without changes, hence retaining the 2012 version nomenclature.
The update process for FIPS 140 was hamstrung by deep technical issues in topics such as hardware security and apparent disagreement in the US government over the path forward. The now abandoned 2013 draft of FIPS 140-3 had required mitigation of non-invasive attacks when validating at higher security levels, introduced the concept of public security parameter, allowed the deference of certain self-tests until specific conditions are met, and strengthened the requirements on user authentication and integrity testing.
Cryptographic Module Validation Program
The FIPS 140 standard established the Cryptographic Module Validation Program (CMVP) as a joint effort by the NIST and the Communications Security Establishment (CSEC) for the Canadian government, now handled by the CCCS, the Canadian Centre for Cyber Security, a new centralized initiat |
https://en.wikipedia.org/wiki/Patti%20Wheeler | Patti Wheeler, is the president and owner of Wheeler Television, Inc., a television production company specializing in motorsports for national broadcast and cable networks. Wheeler is an Executive Member of Cannon School Trustee board and a member of the board of the Lake Norman YMCA.
Early life
Wheeler was born in Charlotte, North Carolina June 11, 1963. She is the daughter of former Lowe's Motor Speedway President and General Manager Humpy Wheeler.
Education
Wheeler earned a bachelor's degree in English from Belmont Abbey College in 1986.
Wheeler Television Inc.
Wheeler is the president and owner of Wheeler Television, Inc, which is a television production company. The company produces motorsports related material and has worked with Fox Sports, SPEED, ESPN, ABC, NBC and CBS for live race programming, documentaries, episodic and news series.
Early career
Wheeler started her career at twenty-two as a producer and director of live NASCAR and as a writer and producer for various news and documentary series from 1986 to 1991. She was also Director of Motorsports and Executive Producer for TNN from 1991 to 1995. Wheeler was then President of World Sports Enterprises a subsidiary of Viacom from 1994 to 2000.
Family
Wheeler is the daughter of former Lowe's Motor Speedway President and General Manager Humpy Wheeler. She is married to Leo Hindery Jr. and has two children.
Awards and recognition
NASCAR's Top 25 Most Powerful People – Charlotte Observer
Racing's Most Influential: Television Executives – Racer magazine
Top Forty Under Forty – Charlotte Business Journal
Top 25 Women In Business Award – Charlotte Business Journal
Sources
1963 births
Living people
21st-century American businesspeople
Belmont Abbey College alumni |
https://en.wikipedia.org/wiki/List%20of%20educational%20video%20websites | This is a list of notable websites which provide access to educational films as one of their primary functions.
See also
List of online video platforms
List of academic databases and search engines
List of online databases
List of online encyclopedias
References
Educational websites
Educational video |
https://en.wikipedia.org/wiki/Kung%20Fu%20Panda%3A%20Legends%20of%20Awesomeness | Kung Fu Panda: Legends of Awesomeness is an American computer-animated television comedy series spun off from DreamWorks's Kung Fu Panda films. It serves as a bridge between the first and second films, showing Po's training to becoming a successful Dragon Warrior, whereas the second series is, according to the series' developer Peter Hastings, "not unlike a very long, super-deluxe 3-D version of one of our episodes".
The series was originally set to air on Nickelodeon in 2010, but it was pushed back to 2011 instead. The series premiered with a special preview on September 19, 2011, and began airing regularly on November 7. Three seasons were produced. Airing ceased in the United States partway through season 3. Before finishing up in the United States, all the episodes had aired already in other countries, for example on Nicktoons in Germany from 2014–15 and then on YTV in Canada from 2015–16. In 2016, Nicktoons in the United States began running ads announcing the airing of new episodes; it was subsequently revealed that five of the ten unaired episodes would play from February 15 through February 19. As a result, the final episode aired on June 29, 2016.
Besides Lucy Liu and James Hong, who reprise their film roles as Viper and Mr. Ping, the cast features new voice actors for the characters of Po (Mick Wingert), Master Shifu (Fred Tatasciore), Tigress (Kari Wahlgren), Crane (Amir Talai), Monkey (James Sie), and Mantis (Max Koch).
Netflix commissioned a successor series, titled Kung Fu Panda: The Dragon Knight, in 2022. Peter Hastings, the developer of Legends of Awesomeness, returned as an executive producer. Unlike the said show, however, Jack Black reprised his role as Po from the films.
Synopsis
Po and the Furious Five defend the Valley of Peace from villains of different kinds. All the while, Po makes accidents, learns lessons, learns more about the history of kung fu, and meets other famous kung fu masters.
Episodes
Voice cast
Mick Wingert as Po
Fred Tatasciore as Shifu
Kari Wahlgren as Tigress
Lucy Liu as Viper
Amir Talai as Crane
James Sie as Monkey
Max Koch as Mantis
James Hong as Mr. Ping
Development
The series was DreamWorks Animation's second co-production with Nickelodeon. The two companies previously partnered on The Penguins of Madagascar.
The show's musical score is done by the Track Team, most Chinese musical instruments including erhu, zhonghu, gaohu, bawu, hulusi, xiao, dizi, guqin, sanxian, suona, guanzi, xunetc. by well-known multi-instrumentalist Hong Wang. In addition, Sifu Kisu was the martial arts consultant for the show as he was on the Avatar: The Last Airbender series.
Media
Kung Fu Panda: Legends of Awesomeness took part in Nickelodeon's revamp to their cartoon season on TV. As an early promotion, Po was featured in a Nickelodeon bumper alongside other characters. On July 23, an exclusive sneak peek of the show was shown at the 2011 San Diego Comic-Con, with producers and members of the voice cast |
https://en.wikipedia.org/wiki/Scout%20%28travel%20website%29 | Scout, formerly Goby, is a travel website which launched in September 2009. The site searches selected databases and other sources of information on the web, focused on 400 categories of things to do while traveling. Signed-in users may also share their results utilizing the Facebook connect applications programming interface. The website services are free to users and the website is supported by an advertising business model and partner distribution model.
References
Internet search engines
Travel ticket search engines |
https://en.wikipedia.org/wiki/Studiometry | Studiometry is a project management software for managing bill clients, track working work, generating estimates, and producing customizable reports. All of the saved data is interlinked which lets the user traverse all of their data anyway they would like to.
Reception
The software received positive reception for its ability to automatically generate invoices based on criteria, but critics panned that the web-hosted help file coverage was basic while unlimited phone support bumped up the price.
References
External links
Studiometry 5.1 gets iCal syncing
Project management software |
https://en.wikipedia.org/wiki/Coco3 | Coco3 can refer to:
Cobalt(II) carbonate, an inorganic compound with the formula CoCO3
The third and final version of the TRS-80 Color Computer, a 6809-based home computer launched by Radio Shack |
https://en.wikipedia.org/wiki/Single%20European%20Railway%20Directive%202012 | The Single European Railway Directive 2012 2012/34/EU is an EU Directive that regulates railway networks in European Union law. This recast the "First Railway Directive" or "Package" from 1991, and allows open access operations on railway lines by companies other than those that own the rail infrastructure. The legislation was extended by further directives to include cross border transit of freight.
In September 2010, the process of merging the directives into a single piece of legislation was begun, with the addition of modifications to strengthen the regulatory framework. The Second Railway Package, the Third Railway Package, and the Fourth Railway Package aim to push integration further.
Background
In many countries in Europe, the railway systems developed as separate privately owned companies operating regional networks with permission to construct and operate a line being granted or instructed by government legislation, or by royal decree or license. During the 20th century the railways became organised and run through a countrywide organisation often through nationalisation. These entities, in general, had total or virtual monopolies.
These national companies were vertically integrated organisations and it was difficult or impossible for private or regional enterprises to run their own trains on the national networks, or to compete in other EU countries' railway systems. Thus in 1991 EU Directive 91/440 was created to make it a legal requirement for independent companies to be able to apply for non-discriminatory track access (running powers) on a European Union country's track.
Description
The aims of the directive are to create a more efficient rail network by creating greater competition. To achieve this aim member states are required to ensure that organisations operating the infrastructure (track, signalling etc.), and those operating services (trains) are separate and run on a commercial basis. Additionally railway companies from all member states are allowed to run services on any other member states rail infrastructure, both for passenger transport and goods. The free competition provided by the mandate is optional for regional and urban passenger trains.
Further related legislation exists which applies to railway operations that are covered by directive 91/440:
Cross border freight in the EU
The directive was further clarified and extended by EU directive 2001/12 which initially allowed cross border freight operations on a network of tracks – to be called the Trans European Rail Freight Network a network which includes ports and freight terminals. The network on which traffic was allowed was to be extended to the whole European network. As a consequence of this new trans-national freight network an additional change was made to the original legislation which required train safety and operating standards to be set out clearly and administered by an organisation that did not run commercial services. The directive also required |
https://en.wikipedia.org/wiki/Operand%20forwarding | Operand forwarding (or data forwarding) is an optimization in pipelined CPUs to limit performance deficits which occur due to pipeline stalls. A data hazard can lead to a pipeline stall when the current operation has to wait for the results of an earlier operation which has not yet finished.
Example
ADD A B C #A=B+C
SUB D C A #D=C-A
If these two assembly pseudocode instructions run in a pipeline, after fetching and decoding the second instruction, the pipeline stalls, waiting until the result of the addition is written and read.
In some cases all stalls from such read-after-write data hazards can be completely eliminated by operand forwarding:
Technical realization
The CPU control unit must implement logic to detect dependencies where operand forwarding makes sense. A multiplexer can then be used to select the proper register or flip-flop to read the operand from.
See also
Feed forward (control)
References
External links
Introduction to Pipelining
Instruction processing |
https://en.wikipedia.org/wiki/Oscar%20Nierstrasz | Oscar Marius Nierstrasz (born ) is a professor at the Computer Science Institute (IAM) at the University of Berne, and a specialist in software engineering and programming languages. He is active in the field of
programming languages and mechanisms to support the flexible composition of high-level, component-based abstractions,
tools and environments to support the understanding, analysis and transformation of software systems to more flexible, component-based designs,
secure software engineering to understand the challenges current software systems face in terms of security and privacy, and
requirement engineering to support stakeholders and developers to have moldable and clear requirements.
He has led the Software Composition Group at the University of Bern since 1994 to date (December 2011).
Life
Nierstrasz is born in Laren, the Netherlands.
He lived there for three years and then his parents, Thomas Oscar Duyck (1930--) and Meta Maria van den Bos (1936-1988) moved to Canada.
He developed an early interest in Mathematics and Computer Science. He pursued his Bachelor studies in the Departments of Pure Mathematics and Combinatorics and Optimization at the University of Waterloo in 1979.
He enrolled for the master studies in the Department of Computer Science at the University of Toronto in 1981.
There, he continued for his Ph.D. under the supervision of Prof. D. Tsichritzis. During his postgraduate work in the university, Nierstrasz worked on the `Message Flow Analysis'.
He finished his Ph.D. in 1984 and then worked at the Forth Institute of Computer Science in Crete for one year.
Since 1985, Nierstrasz has lived in Switzerland. He was a member of the Object System Group at the Center Universitaire d' Informatique of the University of Geneva, Switzerland (1985-1994).
He met there his wife, Angela Margiotta Nierstrasz. They married in May 1994.
In late 1994, he moved to Bern, Switzerland to work as a professor.
Career
In late 1994, he joined the University of Bern as a professor and led the software composition group at the University of Bern from 1994 to December 2021.
He has also served as a dean of Computer Science Institute (IAM) at the University of Berne.
During his career, he supervised 40 Ph.D. students and almost 100 bachelors and masters theses.
He had made various contributions to Software Engineering Research community:
Nierstrasz co-authored several books such as Object-Oriented Reengineering Patterns and Pharo by Example. He was editor of the Journal of Object Technology from 2010 to 2013, succeeding the founding editor, Richard Wiener.
CyberChair, an Online Submission and Reviewing System, is based on Oscar Nierstrasz's publication called Identify the champion, where he described the peer review process for contributions to scientific conferences using an organizational pattern language.
His Erdos number is 3. Oscar Nierstrasz — David M. Jackson — E. Rodney Canfield — Paul Erdös
Nierstrasz won the Senior Dahl–Nygaa |
https://en.wikipedia.org/wiki/Knowledge%20arena | A knowledge arena is a virtual space where individuals can manipulate concepts and relationships to form a concept map. Individuals using a computer with appropriate software can represent concepts and the relationships between concepts in a node-relationship-node formalism. The process of thinking about the concepts and making associations between them has been called "off-loading" by Ray McAleese.
The concept map is a form of a semantic network or semantic graph. It is formally based on graph theory. In the concept map, concepts are represented by nodes. The relationship between nodes are represented by typed links (edges). In creating a map or graphic representation of what is known an individual intentionally interacts with the graphical interface or map and through a reflective process adds nodes (concepts) and/or adds relationships (edges or typed links) or modifies existing node-relationship-node instances. It is likely that the process of engaging with concepts and relationships between concepts brings about the creation of understandings as well as making the understandings explicit.
Many different claims have been made for the utility of the concept map. The interactive and reflective nature of map creation is highlighted by the use of the description knowledge arena. Although maps may represent what an individual knows at a point in time; it is likely that by interacting with the concepts and relationships in the knowledge arena individual continues to create and modify what that individual knows.
See also
Knowledge base
Knowledge management
Knowledge representation and reasoning
Notes and references
Conceptual modelling |
https://en.wikipedia.org/wiki/Samsung%20M900%20Moment | The Samsung Moment, known as SPH-M900, is a smartphone manufactured by Samsung that uses the open source Android operating system.
Features
The phone features a 3.2-inch 16M-color AMOLED capacitive touchscreen and a 3.2-megapixel autofocus camera. Compared to Sprint's version of the HTC Hero, the device offers a left-sliding QWERTY keyboard with Search Key, four-way navigation with arrow keys, a faster processor, and more available user-accessible memory; however, the Moment has a lower-capacity battery and its touchscreen hardware does not offer multi-touch support. An exclusive custom version with an internal MobileTV antenna and external antenna jack was released in 2010 in the Washington, D.C./Delaware metro area for a public field test of the Mobile ATSC standard.
The base of the Moment's Android 1.5 interface is identical to the unmodified Android install in T-Mobile's G1 phone; built-in software includes Mobile Google services such as Google Search, Gmail, YouTube, Google Calendar, and Google Talk. Building from that, Samsung added Moxier Mail (POP/IMAP Support, Microsoft Exchange access) and Nuance VoiceControl, while Sprint installed NFL Mobile, NASCAR Sprint Cup, Sprint Navigation, and Sprint TV.
In May 2010, Sprint made an update to Android 2.1 (Eclair) available on its website, then announced in June via Twitter that the Moment and HTC Hero would not be upgraded to Android 2.2 (Froyo). A third-party upgrade to Android 2.2.2 was later released in February 2011 by enthusiasts at The Haxung Development Group.
Issues
As of the latest Android 2.1 build DJ07, the Samsung Moment, the Samsung Intercept, and the Samsung Transform (all based on the same SoC) do not include support for OpenGL ES 1.1 or 2.0 (in Android 2.2) despite hardware support for it. A community led complete rewrite of the g3d drivers is in development.
Samsung Moment and Intercept users have also been reporting issues of data and airplane mode lock up over the CDMA network while using various browsers, streaming software such as YouTube and Pandora, and even randomly for seemingly no reason. The data/airplane mode lock up also prevents making voice calls and forces user to restart the phone to have connections restored. Enabling wifi radio while using CDMA network makes the issue more frequent.
GPS has also been a "hit or miss" feature on the Samsung Moment, as some devices have perfectly working GPS, others have semi-working GPS, and yet others have completely dead GPS altogether.
Controversy
Despite various software updates from Sprint, the previously mentioned issues have remained unfixed on most handsets, leading some customers to believe that the issues are due to defective hardware, rather than software, many customers have pushed to get a replacement phone of equal value from Sprint, but the only phones officially offered as replacements (and even then, only if at least three exchanges have occurred within six months) are the Samsung Intercept and HTC Her |
https://en.wikipedia.org/wiki/ESi-RISC | eSi-RISC is a configurable CPU architecture. It is available in five implementations: the eSi-1600, eSi-1650, eSi-3200, eSi-3250 and eSi-3264. The eSi-1600 and eSi-1650 feature a 16-bit data-path, while the eSi-32x0s feature 32-bit data-paths, and the eSi-3264 features a mixed 32/64-bit datapath. Each of these processors is licensed as soft IP cores, suitable for integrating into both ASICs and FPGAs.
Architecture
The main features of the eSi-RISC architecture are:
RISC-like load/store architecture.
Configurable 16-bit, 32-bit or 32/64-bit data-path.
Instructions are encoded in either 16 or 32-bits.
8, 16 or 32 general purpose registers, that are either 16 or 32-bits wide.
0, 8, 16 or 32 vector registers, that are either 32 or 64-bits wide.
Up to 32 external, vectored, nested and prioritizable interrupts.
Configurable instruction set including support for integer, floating-point and fixed-point arithmetic.
SIMD operations.
Optional support for user-defined instructions, such as cryptographic acceleration .
Optional caches (Configurable size and associativity).
Optional MMU supporting both memory protection and dynamic address translation.
AMBA AXI, AHB and APB bus interfaces.
Memory mapped I/O.
5-stage pipeline.
Hardware JTAG debug.
While there are many different 16 or 32-bit Soft microprocessor IP cores available, eSi-RISC is the only architecture licensed as an IP core that has both 16 and 32-bit implementations.
Unlike in other RISC architectures supporting both 16 and 32-bit instructions, such as ARM/Thumb or MIPS/MIPS-16, 16 and 32-bit instructions in the eSi-RISC architecture can be freely intermixed, rather than having different modes where either all 16-bit instructions or all 32-bit instructions are executed. This improves code density without compromising performance. The 16-bit instructions support two register operands in the lower 16 registers, whereas the 32-bit instructions support three register operands and access to all 32 registers.
eSi-RISC includes support for Multiprocessing. Implementations have included up to seven eSi-3250's on a single chip.
Toolchain
The eSi-RISC toolchain is based on combination of a port of the GNU toolchain and the Eclipse IDE. This includes:
GCC – C/C++ compiler.
Binutils – Assembler, linker and binary utilities.
GDB – Debugger.
Eclipse – Integrated Development Environment.
The C library is Newlib and the C++ library is Libstdc++. Ported RTOSes include MicroC/OS-II, FreeRTOS, ERIKA Enterprise and Phoenix-RTOS
References
External links
eSi-RISC homepage
Soft microprocessors |
https://en.wikipedia.org/wiki/POSXML | POSXML (acronym for Point Of Sale eXtended Markup Language) is a programming language, based on XML, that is used to create applications for a POS terminal.
Normally the programming language used to develop such applications is C or C++. The main purpose of POSXML is to simplify the development of applications for POS terminals. It contains a set of instructions and pre-programmed commands, which allow direct interaction with the machine, resulting in a large reduction in application development time.
Language features
The structure of POSXML
POSXML is organized and structured in the form of tags, showing levels and subsets of a set of commands and instructions, that form the logical structure of a POSXML application.
Example:
<!-- Variables declaration -->
<stringvariable value="" variable="sTicketInfo"/>
<stringvariable value="" variable="sCityInfo"/>
<integervariable value="0" variable="iQtdTickets"/>
<integervariable value="0" variable="iInvalidInfo"/>
<!-- Function Display MAIN Menu -->
<function name="fMainMenu">
<integervariable value="0" variable="iOption"/>
<!-- Main Menu -->
<menu options="MAIN MENU:\\1.SALE OF TICKETS\2.REPORT\3.EXIT" variable="$(iOption)"/>
<!-- 1.SALE OF TICKETS -->
<if operator="equalto" value="1" variable="$(iOption)">
...
</if>
...
</function>
Compiled language
Similar to the vast majority of existing programming languages, POSXML is compiled in a specific format to reduce the file size which allows the application to be run on a POS terminal using a framework (virtual machine).
When compiled, a program written in POSXML, becomes a set of bytecodes that are interpreted by the virtual machine on the POS terminal which results in the implementation on the POS terminal.
Example:
<display line="0" column="0" message="Example of Bytecode" />
Compiled bytecode:
d0 \x0A 0 \x0A Bytecode example \x0A \x0D
Syntax
The commands and instructions of POSXML, such as the compliance on the use of capital letters and lowercase letters (case sensitive), are acquired through training. Some commands that belong to the language do not require parameters, unlike other commands that need input to interact with the machine.
Examples:
Commands that do not require instructions or parameters.
<network.hostdisconect/>
<cleandisplay />
<waitkey />
Commands that require instructions and parameters to interact with the equipment.
<display line="1" column="1" message="POSXML" />
<menu variable="$(var1)" options="MENU\1. first line\2. second line\3. third line"/>
<wait miliseconds="1000" />
The names given to functions, variables, and pages should also obey the rules written in capital letters and lowercase letters, so if a developer creates a function called "calcula_digito" he will not be able to call on the variable via "Calcula_Digito". The call of a function, or variable page must meet the exact name that was assigned by the programmer.
Commands and instructions
Beca |
https://en.wikipedia.org/wiki/Cluster%20labeling | In natural language processing and information retrieval, cluster labeling is the problem of picking descriptive, human-readable labels for the clusters produced by a document clustering algorithm; standard clustering algorithms do not typically produce any such labels. Cluster labeling algorithms examine the contents of the documents per cluster to find a labeling that summarize the topic of each cluster and distinguish the clusters from each other.
Differential cluster labeling
Differential cluster labeling labels a cluster by comparing term distributions across clusters, using techniques also used for feature selection in document classification, such as mutual information and chi-squared feature selection. Terms having very low frequency are not the best in representing the whole cluster and can be omitted in labeling a cluster. By omitting those rare terms and using a differential test, one can achieve the best results with differential cluster labeling.
Pointwise mutual information
In the fields of probability theory and information theory, mutual information measures the degree of dependence of two random variables. The mutual information of two variables and is defined as:
where p(x, y) is the joint probability distribution of the two variables, p1(x) is the probability distribution of X, and p2(y) is the probability distribution of Y.
In the case of cluster labeling, the variable X is associated with membership in a cluster, and the variable Y is associated with the presence of a term. Both variables can have values of 0 or 1, so the equation can be rewritten as follows:
In this case, p(C = 1) represents the probability that a randomly selected document is a member of a particular cluster, and p(C = 0) represents the probability that it isn't. Similarly, p(T = 1) represents the probability that a randomly selected document contains a given term, and p(T = 0) represents the probability that it doesn't. The joint probability distribution function p(C, T) represents the probability that two events occur simultaneously. For example, p(0, 0) is the probability that a document isn't a member of cluster c and doesn't contain term t; p(0, 1) is the probability that a document isn't a member of cluster C and does contain term T; and so on.
Chi-Squared Selection
The Pearson's chi-squared test can be used to calculate the probability that the occurrence of an event matches the initial expectations. In particular, it can be used to determine whether two events, A and B, are statistically independent. The value of the chi-squared statistic is:
where Oa,b is the observed frequency of a and b co-occurring, and Ea,b is the expected frequency of co-occurrence.
In the case of cluster labeling, the variable A is associated with membership in a cluster, and the variable B is associated with the presence of a term. Both variables can have values of 0 or 1, so the equation can be rewritten as follows:
For example, O1,0 is the observed n |
https://en.wikipedia.org/wiki/EMASS | The Enterprise Mission Assurance Support Service (eMASS) is a service-oriented computer application that supports Information Assurance (IA) program management and automates the Risk Management Framework (RMF) process.
Overview
eMASS is a service-oriented computer application that supports Information Assurance (IA) program management and automates the Risk Management Framework (RMF). The purpose of eMASS is to help the DoD to maintain IA situational awareness, manage risk, and comply with the Federal Information Security Management Act (FISMA 2002) and the Federal Information Security Modernization Act (FISMA 2014). eMASS is owned by the U.S. Department of Defense (i.e., the software is not proprietary). The program is sponsored by the Assistant Secretary of Defense for Networks and Information Integration (ASD (NII)) and is managed by the Defense Information Systems Agency (DISA) Program Executive Office for Mission Assurance and NetOps (PEO-MA).
As the DoD's recommended tool for information system Assessment and Authorization (A&A), eMASS automates the A&A process, manages workflow among user roles, and generates a variety of reports based on user needs (including all reports required by RMF and FISMA). The functional capabilities of eMASS have evolved in response to requirements from DoD leadership and operational user feedback.
eMASS is designed to work in concert with the RMF Knowledge Service (CAC or ECA required), and empowers the DoD IA workforce in support of the DoD 8500-series Information Assurance policy framework and implementation guidance. eMASS establishes strict process control mechanisms for obtaining authorization to connect to the DoD's Global Information Grid (GIG) networks, which helps to reduce the risk of cyber attacks and to accomplish the goals of RMF.
eMASS as a Cloud Service
eMASS also provides C&A capabilities in the DoD’s cloud computing environment, the Rapid Access Computing Environment (RACE). According to DISA government officials, offering eMASS as a cloud service will help to significantly reduce the time required to certify and accredit DoD information systems.
References
External links
DoD Cyber Exchange
RMF Knowledge Service (requires DoD PKI certificate or DoD ECA)
Defense Information Systems Agency
DoD IA Policy Chart - Build and Operate a Trusted DoDIN
Information Assurance Certification and Accreditation Program |
https://en.wikipedia.org/wiki/Baseball%27s%20Seasons | Baseball's Seasons is an American television documentary series that was aired on MLB Network from January 7, 2009 until December 30, 2013. Each episode takes a look at a season in the history of Major League Baseball. The series is narrated by Curt Chaplin. Like a lot of the network's other original programming, Baseball's Seasons airs when the league is in offseason.
The series is currently available for streaming online on the streaming services Apple TV+ and Pluto TV.
Episodes
References
External links
2009 American television series debuts
2013 American television series endings
2000s American documentary television series
2010s American documentary television series
MLB Network original programming
English-language television shows
Documentary films about baseball |
https://en.wikipedia.org/wiki/Data%20differencing | In computer science and information theory, data differencing or differential compression is producing a technical description of the difference between two sets of data – a source and a target. Formally, a data differencing algorithm takes as input source data and target data, and produces difference data such that given the source data and the difference data, one can reconstruct the target data ("patching" the source with the difference to produce the target).
Examples
One of the best-known examples of data differencing is the diff utility, which produces line-by-line differences of text files (and in some implementations, binary files, thus being a general-purpose differencing tool). Differencing of general binary files goes under the rubric of delta encoding, with a widely used example being the algorithm used in rsync. A standardized generic differencing format is VCDIFF, implemented in such utilities as Xdelta version 3. A high-efficiency (small patch files) differencing program is bsdiff, which uses bzip2 as a final compression step on the generated delta.
Concerns
Main concerns for data differencing are usability and space efficiency (patch size).
If one simply wishes to reconstruct the target given the source and patch, one may simply include the entire target in the patch and "apply" the patch by discarding the source and outputting the target that has been included in the patch; similarly, if the source and target have the same size one may create a simple patch by XORing source and target. In both these cases, the patch will be as large as the target. As these examples show, if the only concern is reconstruction of target, this is easily done, at the expense of a large patch, and the main concern for general-purpose binary differencing is reducing the patch size.
For structured data especially, one has other concerns, which largely fall under "usability" – for example, if one is comparing two documents, one generally wishes to know which sections have changed, or if some sections have been moved around – one wishes to understand how the documents differ. For instance "here 'cat' was changed to 'dog', and paragraph 13 was moved to paragraph 14". One may also wish to have robust differences – for example, if two documents A and B differ in paragraph 13, one may wish to be able to apply this patch even if one has changed paragraph 7 of A. An example of this is in diff, which shows which lines changed, and where the context format allows robustness and improves human readability.
Other concerns include computational efficiency, as for data compression – finding a small patch can be very time and memory intensive.
Best results occur when one has knowledge of the data being compared and other constraints: diff is designed for line-oriented text files, particularly source code, and works best for these; the rsync algorithm is used based on source and target being across a network from each other and communication being slow, so it |
https://en.wikipedia.org/wiki/VCDIFF | VCDIFF is a format and an algorithm for delta encoding, described in IETF's RFC 3284. The algorithm is based on Jon Bentley and Douglas McIlroy's paper "Data Compression Using Long Common Strings" written in 1999. VCDIFF is used as one of the delta encoding algorithms in "Delta encoding in HTTP" (RFC 3229) and was employed in Google's Shared Dictionary Compression Over HTTP technology, formerly used in their Chrome browser.
Delta instructions
VCDIFF has 3 delta instructions. ADD, COPY, and RUN. ADD adds a new sequence, COPY copies from an old sequence, and RUN adds repeated data.
Implementations
Free software implementations include xdelta (version 3) and open-vcdiff.
Google's Shared Dictionary Compression Over HTTP proposal uses this algorithm, and was included in the Google Chrome browser, up to version 58.
xdelta - A tool, which is an Open Source VCDIFF delta compression implementation
google/open-vcdiff - Another Open Source VCDIFF delta compression implementation
vczip as part of vcodex and ast-open packages (also part of UWIN)
diffable - Java implementation, but some kind of original modification of VCDIFF
jvcdiff - Full decoder/encoder Java implementation of VCDIFF
vcdiff-java - another Java implementation of VCDIFF
Miscellaneous Utility Library - C# implementation, decoding only
CyanDelta - Updates CyanogenMod ROMs using Xdelta3 patches.
See also
Delta encoding
Data differencing
References
External links
RFC 3284 - The VCDIFF Generic Differencing and Compression Data Format
Data differencing |
https://en.wikipedia.org/wiki/Rinda%20%28Ruby%20programming%20language%29 | Rinda is a software library for creating modular and distributed co-operating services in Ruby using the tuple space or Linda distributed computing paradigm.
Based on a source code initially released to the Ruby community by Masatoshi SEKI in 2000, Rinda was later absorbed into Ruby's core distributed Ruby (DRb) module. Rinda has been distributed as part of the core Ruby library since Ruby 1.8.
Example usage
Rinda provides a framework by which multiple Ruby processes (which or may not be running on the same machine) can add, access and modify tuples (an ordered list of elements) stored in a shared data repository (the tuplespace).
For example, the following program creates a new Rinda tuplespace and initializes a DRb service that waits for requests coming over the network.
require 'rinda/tuplespace'
URI = "druby://localhost:61676"
DRb.start_service(URI, Rinda::TupleSpace.new)
DRb.thread.join
Using Rinda, other applications can poll the tuplespace for tuples that match specific criteria.
For example, the program below connects to a Rinda service and listens for any tuple composed an arithmetic operator followed two numbers (such as the sequence "+ 2 4") When such a tuple is discovered the program computes the result of the mathematical operation (for example, processing "+ 2 4" into "6") and stores it in tuplespace.
require 'rinda/rinda'
URI = "druby://localhost:61676"
DRb.start_service
ts = Rinda::TupleSpaceProxy.new(DRbObject.new(nil, URI))
loop do
ops, a, b = ts.take([ %r{^[-+/*]$}, Numeric, Numeric])
ts.write(["result", a.send(ops, b)])
end
Finally, Rinda applications can add or remove tuples from the tuplespace.
For instance, the following program posts prefix arithmetic tuples to the tuplespace and reads back the result (posted by the program above).
require 'rinda/rinda'
URI = "druby://localhost:61676"
DRb.start_service
ts = Rinda::TupleSpaceProxy.new(DRbObject.new(nil, URI))
tuples = [["*", 2, 2 ], [ "+", 2, 5 ], [ "-", 9, 3 ]]
tuples.each do |t|
ts.write(t)
res = ts.take(["result", nil])
puts "#{res[1]} = #{t[1]} #{t[0]} #{t[2]}"
end
External links
Ruby Standard Library Documentation for Rinda
References
Ruby (programming language)
Inter-process communication |
https://en.wikipedia.org/wiki/Enterprise%20data%20planning | Enterprise data planning is the starting point for enterprise wide change. It states the destination and describes how you will get there. It defines benefits, costs and potential risks. It provides measures to be used along the way to judge progress and adjust the journey according to changing circumstances.
Data is fundamental to investment enterprises. Effective, economic management of data underpins operations and enables transformations needed to satisfy customer demands, competition and regulation. Data warehouse(s) and other aspects of the overall data architecture are critical to the enterprise.
EDMworks has created a strategic data planning approach for the Investment Sector. It consists of a planning process, planning intranets, templates and training materials.
EDMworks planning process is based on the belief that extensive domain knowledge significantly shortens planning iterations and enables progressively higher quality plans to be produced and implemented. This approach drives the development of an effective and economic enterprise data architecture.
Enterprise data planning is based on proven business disciplines. Key architectural layers for data and applications are then added in order to provide an enterprise wide understanding of the uses and interdependencies of data. This enables the definition of the core components of the EDM plan:
Industry structure and business objectives
Assessment of systems and services
Target architecture for applications, data and infrastructure
Target organization structures
Systems, database, infrastructure and organizational plans
Business case, costs, benefits, results and risks.
EDMworks uses several components from the Open Systems Group TOGAF enterprise systems planning process. TOGAF acts as an extension to good business planning methods to provide a framework for the development of the systems and data architectural components.
History
James Martin was one of the pathfinders in data planning methodologies. He was one of the first to identify data as being an enterprise wide asset that required management. He developed a series of tools and methods to support that process.
Most of the large consulting firms developed their own methods to address the same basic issue. Frequently, their approaches were incorporated into their own branded system development methodologies that encompassed the complete systems development life-cycle.
Others, such as Ed Tozer, developed more focused offerings that dealt with the complexities of extracting key business needs from senior management and then defining relevant architectural visions for the specific enterprise.
From these various sources, the concepts of Business, Data, Applications and Technology Architectures emerged.
The Open Group Architectural Framework (TOGAF) has taken this work forward and has established a sound method in TOGAF version 9.
EDMworks approach is to adopt these planning and architectural practices a |
https://en.wikipedia.org/wiki/Component%20Developer%20Magazine | Component Developer Magazine or CoDe (registered as CODE Magazine) is a computer magazine edited and produced by the publishing and software company EPS Software. CODE is published bi-monthly, and it is available in printed and digital format. The magazine focuses on providing information about Computer programming in using today's development topics including .NET Framework, Visual Studio, Microsoft SQL Server and Microsoft SharePoint.
History
CoDe Magazine was started in 1999, by Rick Strahl and EPS Software’s President Markus Egger. The first three issues of the magazine were written in German, and originally published in Austria (then called Software Developer Magazine). Shortly after the original three issues were published, .NET technologies became a primary focus for the magazine as Microsoft was beginning to phase out Visual FoxPro. In 1999, CoDe Magazine’s parent company, EPS Software, moved its headquarters to Houston, where it is still located.
EPS Software and CODE participate in community developer events and frequently support Code Camps, or code and development camps put on by the community to help promote software development.
See also
List of computer magazines
References
CoDe magazine at WorldCat.org
External links
CODE magazine official website.
1999 establishments in Austria
Bimonthly magazines published in the United States
Computer magazines published in the United States
German-language magazines
Magazines established in 1999
Magazines published in Texas
Mass media in Houston |
https://en.wikipedia.org/wiki/Airlines%20of%20Africa | Airlines have proliferated in Africa because, in many countries, road and rail networks are not well developed due to financial issues, terrain, and rainy seasons. Ben R. Guttery, author of Encyclopedia of African Airlines, said "Although most of the carriers have never been large by European or American standards, they have had tremendous impact on the economy and the people." Many larger African airlines are owned partially or completely by national governments. Some African airlines have or formerly had European airlines as major shareholders, such as KLM that has a 7.8% stake in Kenya Airways and British Airways which formerly had an 18% stake in Comair.
History
Historically, the British authorities established locally based airlines, while the national airlines of Belgium, France, Portugal, and Spain served their respective colonies. After African countries became independent, national governments established their own airlines. Many newly independent countries desired to have their own flag carriers to showcase their independence, and those countries wanted large jets like DC-10s and 747s even if the air demand did not warrant those jets. Some airlines, like Air Afrique, were jointly sponsored by multiple governments. Some joint carriers, such as Central African Airways, East African Airways, and West African Airways, were established when the United Kingdom colonized parts of Africa. The knowledge of aircraft, the airline industry, and financial capital, originating from the Europeans, was used to establish the new African carriers.
Government ownership
In many cases European airlines have had colonial influences on African airlines, so issues arose after colonial administrators left Africa and Africans began operating the carriers. Many government airlines are manned by governmental appointees as many airlines form part of the structures of their respective national governments. According to Guttery, therefore, many African airlines are not well managed. This led to airlines being operated at severe losses and/or liquidating.
In addition, as of 1998, profits often went into the general operating funds of their respective countries, while many governments provide insufficient capital for their airlines. Also, as of 1998, many governments made airlines centres for employment and overstaffed their airlines, making them inefficient. Guttery said that even though the varieties of government management and ownership of African airlines "may be considered a hindrance in a world market driven by economics," due to the difficulties in raising financial capital and a lack of government infrastructure, government participation is crucial in the formation of airlines. As of 1998, African airlines relied on profitable international routes to subsidize less profitable domestic routes, many of which service very small communities.
Fleet
Compared to aircraft in other world regions, aircraft in Africa tend to be older. As of 2010, 4.3% of all aircra |
https://en.wikipedia.org/wiki/%C3%89cole%20Nationale%20des%20Sciences%20Appliqu%C3%A9es%20d%27Oujda | The École nationale des sciences appliquées d'Oujda or ENSA d'Oujda is a Moroccan Grande École d'Ingénieurs, part of the network of ENSA.
History
ENSAO was founded in 1999 to train highly qualified engineers. It is located in Oujda.
Academics
The training lasts 5 years. ENSAO and is divided into two cycles:
Preparatory cycle (2 years)
During this cycle, the emphasis is on the basic engineering sciences (mathematics, physics, chemistry, mechanics and software) and then gradually, the curriculum is open to more specialized areas in science and technology. This cycle allows general preparatory student engineers(ENSAistes) acquire a solid background in terms of skills and competencies, thereby facilitating a career change regardless of their initial specialization.
The first cycle is the most selective training. During the first two years, the exams are very difficult to test whether the student is actually able to continue his engineering studies.
Engineering cycle (3 years)
At the end of the second year of study, engineering students choose a specialty among the six offered by the school, the award of specialty choices is ranked by students' merits
Admissions
Admission to ENSA Oujda is done through a selective competitive exams- written and oral interview- during the year of the bac:
A preselection of candidates on the basis of the average obtained in their baccalaureat degree.
A contest are invited shortlisted candidates.
It is possible to enter the school's engineering cycle via bac +2 level, through competitive exam and interviews based on knowledge and motivation. The training lasts for 3 years the after 2 years post-BAC. This type of admission is open to students from preparatory classes, universities, or scientific undergraduate degree courses.
Programmes offered
Software engineering
Electrical engineering
Industrial engineering
Telecommunications and Networks
Electronics and Industrial Computing and
Cyber Security Engineering
Forum ENSAO-Enterprise
Since its first edition in 2005, The Forum "ENSAO-ENTREPRISE" imposed its value and is marked with an undeniable national reputation . It offers both engineering students, businesses and multinationals a valuable opportunity to meet and to ensure a fluid opening on topics concerning engineering in its socio-economic context. In fact, the National School of Applied Sciences Oujda place in a region that encourages ambitious investment and today has known major projects such as the "Technopole" of Oujda, the thermal power plant of Ain Bni Mathar and tourism in Saïdia, projects that graduates of this great school surely participate.
References
External links
ENSA Oujda
Engineering universities and colleges
Universities in Morocco
Educational institutions established in 1999
1999 establishments in Morocco
20th-century architecture in Morocco |
https://en.wikipedia.org/wiki/Social%20deprivation | Social deprivation is the reduction or prevention of culturally normal interaction between an individual and the rest of society. This social deprivation is included in a broad network of correlated factors that contribute to social exclusion; these factors include mental illness, poverty, poor education, and low socioeconomic status. Norms and values.
Social disfavour is an uncommon synonym of social deprivation that some authors or scientific fields use.
Social isolation is the lack of social contacts and having few people to interact with regularly.
Overview
The term "social deprivation" is slightly ambiguous and lacks a concrete definition. There are several important aspects that are consistently found within research on the subject. With social deprivation one may have limited access to the social world due to factors such as low socioeconomic status or poor education. The socially deprived may experience "a deprivation of basic capabilities due to a lack of freedom, rather than merely low income". This lack of freedoms may include reduced opportunity, political voice, or dignity.
Part of the confusion in defining social deprivation seems to stem from its apparent similarity to social exclusion. Social deprivation may be correlated with or contribute to social exclusion, which is when a member in a particular society is ostracized by other members of the society. The excluded member is denied access to the resources that allow for healthy social, economic, and political interaction. Pierson has identified five key factors that set social exclusion in motionpoverty, lack of access to jobs, denial of social supports or peer networks, exclusion from services, and negative attitude of the local neighborhood. It is also associated with abusive caretaking, developmental delay, mental illness and subsequent suicide.
Although a person may be socially deprived or excluded, they will not necessarily develop mental illness or perpetuate the cycle of deprivation. Such groups and individuals may have completely normal development and retain a strong sense of community.
Early development
Research on social deprivation is based primarily on observational and self-report measures. This has provided an understanding of how social deprivation is linked to lifespan development and mental illness.
Critical periods
A critical period refers to the window of time during which a human needs to experience a particular environmental stimulus in order for proper development to occur. In instances of social deprivation, particularly for children, social experiences tend to be less varied and development may be delayed or hindered.
Feral children
In severe cases of social deprivation or exclusion, children may not be exposed to normal social experiences. Language provides a good example of the importance of periods in development. If a child has limited exposure to language before a certain age, language is difficult or impossible to obtain. Social behaviors a |
https://en.wikipedia.org/wiki/OpenGear%20Terminal%20Equipment%20Platform | The openGear Terminal Equipment Platform is a modular platform for terminal equipment used for video, audio and data signal processing and distribution in the broadcast and production industries. Ross Video is the creator of the openGear platform and licenses it to other companies who then make openGear compliant signal processing cards. The development and sale of openGear compliant cards is royalty-free.
The openGear frame physical, electrical and protocol standards and specifications are described in “openGear Platform Specifications”, a document that is maintained and updated by Ross Video.
DashBoard is the openGear control and monitoring system which provides unified control over multi-vendor cards within an openGear system. DashBoard is free to download from the openGear.tv website.
22 companies are indicated on the openGear website as openGear partners.
References
External links
openGear.tv
Ross Video
Film and video technology |
https://en.wikipedia.org/wiki/IGEPv2 | The IGEPv2 board is a low-power, fanless single-board computer based on the OMAP 3 series (also known as Cortex-A8) of ARM-compatible processors. It is developed and produced by Spanish corporation ISEE and is the second IGEP platform in the series. The IGEPv2 is open hardware, licensed under a Creative Commons Attribution-Non Commercial-ShareAlike 3.0 unported license.
Board Specifications
Package on package Memory/Processor
Texas Instruments OMAP3530 or DM3730 multicore processor
720 MHz (OMAP3530) or 1 GHz (DM3730) ARMv7 Cortex-A8 CPU
NEON SIMD coprocessor
110 MHz (OMAP3530) or 200 MHz (DM3730) Imagination Technologies PowerVR SGX530 graphics core
IVA2.2 image, video, audio accelerator sub-system
520 MHz (OMAP3530) or 800 MHz (DM3730) TMS320C64x+ DSP core
512MB of NAND flash memory
512MB of LPDDR SDRAM @ 200 MHz
Peripheral connections
Mini AB USB 2.0 OTG host/slave port
Type A USB 2.0 host port
DVI-D out port using HDMI connector
microSD slot with support for SD and SDHC cards
Integrated WiFi IEEE 802.11b/g and Bluetooth 2.0 antenna
Ethernet 10/100 Mb port
3.5mm standard stereo in and out jacks
Power
5 V via 3.5 mm barrel DC connector (AC adapter available)
JST connector also supported
Other Expansions
Two bicolor user programmable LEDs
RS-485 with transceiver
UART, McBSP, McSPI, I2C, GPIO
Keyboard button matrix
Debug
Console RS-232 port
JTAG interface
Dimensions: 93x65 mm (3.6x2.5 inches)
Similar products
Beagle Board - OMAP board from Texas Instruments and Digikey
OpenPandora - handheld game console that uses Texas Instruments OMAP3530 and DM3730
Gumstix overo - a similar single-board computer package that uses the OMAP3503 and the OMAP3530
OSWALD - OMAP3530 application developed by Oregon State University students for computer science education
EBVBeagle Board - Beagle Board clone from EBV Elektronik.
Empower Technologies's EMP3503 and EMP3530 - OMAP35x based single-board computers
FOX Board - a complete Linux system in just 66 x 72 mm, not OMAP based
See also
Texas Instruments TMS320
OmapZoom
OpenEmbedded
External links
IGEPv2 Board product page
ISEE Official Website
ISEE Online Store
IGEPv2 Hardware Reference Manual
Texas Instruments OMAP3530 Applications Processor product page
Texas Instruments DM3730 Digital Media Processor product page
References
Single-board computers |
https://en.wikipedia.org/wiki/Mbed%20TLS | Mbed TLS (previously PolarSSL) is an implementation of the TLS and SSL protocols and the respective cryptographic algorithms and support code required. It is distributed under the Apache License version 2.0. Stated on the website is that Mbed TLS aims to be "easy to understand, use, integrate and expand".
History
The PolarSSL SSL library is the official continuation fork of the XySSL SSL library. XySSL was created by the French "white hat hacker" Christophe Devine and was first released on November 1, 2006, under GNU GPL v2 and BSD licenses. In 2008, Christophe Devine was no longer able to support XySSL and allowed Paul Bakker to create the official fork, named PolarSSL. In November 2014, PolarSSL was acquired by ARM Holdings.
In 2011, the Dutch government approved an integration between OpenVPN and PolarSSL, which is named OpenVPN-NL. This version of OpenVPN has been approved for use in protecting government communications up to the level of Restricted.
As of the release of version 1.3.10, PolarSSL has been rebranded to Mbed TLS to better show its fit inside the Mbed ecosystem. Starting from version 2.1.0, the library was made available under both the GPL v2 and Apache License v2.0.
Since version 2.17, Mbed TLS is solely licensed under the Apache License version 2.0.
In 2020, Mbed TLS joined the TrustedFirmware project.
Library
The core SSL library is written in the C programming language and implements the SSL module, the basic cryptographic functions and provides various utility functions. Unlike OpenSSL and other implementations of TLS, Mbed TLS is like wolfSSL in that it is designed to fit on small embedded devices, with the minimum complete TLS stack requiring under 60KB of program space and under 64 KB of RAM. It is also highly modular: each component, such as a cryptographic function, can be used independently from the rest of the framework. Versions are also available for Microsoft Windows and Linux. Because Mbed TLS is written in the C programming language, without external dependencies, it works on most operating systems and architectures.
Since version 1.3.0, it has abstraction layers for memory allocation and threading to the core "to support better integration with existing embedded operating systems".
Design priorities
The Mbed TLS library expresses a focus on readability of the code, documentation, automated regression tests, a loosely coupled design and portable code.
Development documentation
The following documentation is available for developers:
High Level Design: a high level description of the different modules inside the library, with UML diagrams, use cases and interactions in common scenarios.
API documentation: Doxygen-generated documentation from the header files of the library.
Source code documentation: The source code of the library is documented to clarify structures, decisions and code constructs.
Automated testing
The automated testing of Mbed TLS includes:
A test framework is included with the so |
https://en.wikipedia.org/wiki/Vice%20Academy | Vice Academy was a series of six comedy films, which aired on the USA Network throughout the 1990s, particularly on their Up All Night programming block. Created by director Rick Sloane of Hobgoblins fame, the cast included former porn star Ginger Lynn, scream queen Linnea Quigley, Elizabeth Kaitan and Julia Parton.
The films were intended as a sexy spoof-on-a-spoof of Charlie's Angels and the popular Police Academy movie series. The first film follows the three main girls as they train at the academy; the later films follow them on their assigned missions.
Films
Production
In the second film, Didi is promoted, Linnea Quigley leaves the series.
In the third film, Holly is in prison; shortly after production ended, Lynn was arrested for tax evasion and served 4½ months. It was also her last film in the series.
Elizabeth Kaitan joins the cast as Didi's younger sister, Candy. It is also the only installment in which Jayne Hamil does not appear as Devonshire, with Jordana Capra in her place.
The fifth film introduces Raelyn Saalman as Holly's younger sister, Traci.
Reception
Critics were harsh on the films: Sandra Brennan of Allmovie said, "This tale wavers on the fine line between erotic comedy and soft-core porn with a definite leaning toward the latter." Sloane argues against this, saying that there's no sex and only ten seconds of nudity.
Critic Nathan Shumate commented, "Knowingly insipid to the point of being grotesque... It's a bad, bad, stupid movie, but somehow it fails to grossly offend, mainly because it doesn't try that hard."
Accolades
The first film has the distinction of winning USA Networks' B-Movie Awards for Best Picture and being their highest-rated late-night film when it first aired on cable television.
Home media
The films were originally released on video by Prism Entertainment, then on individual DVDs by Madacy Entertainment and later in two box sets by Brentwood Communications.
The DVD releases have bonus material such as a making-of, trailers, interviews with Sloane and the cast, and a director's commentary.
All six films are available on streaming via the Full Moon Features service.
References
External links
Vice Academy Part 3 at IMDb
Vice Academy Part 4 at IMDb
1980s police comedy films
American comedy films
Films directed by Rick Sloane
1990s police comedy films
1990s English-language films
1980s English-language films |
https://en.wikipedia.org/wiki/Unspecified%20behavior | Unspecified behavior is behavior that may vary on different implementations of a programming language. A program can be said to contain unspecified behavior when its source code may produce an executable that exhibits different behavior when compiled on a different compiler, or on the same compiler with different settings, or indeed in different parts of the same executable. While the respective language standards or specifications may impose a range of possible behaviors, the exact behavior depends on the implementation and may not be completely determined upon examination of the program's source code. Unspecified behavior will often not manifest itself in the resulting program's external behavior, but it may sometimes lead to differing outputs or results, potentially causing portability problems.
Definition
To enable compilers to produce optimal code for their respective target platforms, programming language standards do not always impose a certain specific behavior for a given source code construct. Failing to explicitly define the exact behavior of every possible program is not considered an error or weakness in the language specification, and doing so would be infeasible. In the C and C++ languages, such non-portable constructs are generally grouped into three categories: Implementation-defined, unspecified, and undefined behavior.
The exact definition of unspecified behavior varies. In C++, it is defined as "behavior, for a well-formed program construct and correct data, that depends on the implementation." The C++ Standard also notes that the range of possible behaviors is usually provided. Unlike implementation-defined behavior, there is no requirement for the implementation to document its behavior. Similarly, the C Standard defines it as behavior for which the standard "provides two or more possibilities and imposes no further requirements on which is chosen in any instance". Unspecified behavior is different from undefined behavior. The latter is typically a result of an erroneous program construct or data, and no requirements are placed on the translation or execution of such constructs.
Implementation-defined behavior
C and C++ distinguish implementation-defined behavior from unspecified behavior. For implementation-defined behavior, the implementation must choose a particular behavior and document it. An example in C/C++ is the size of integer data types. The choice of behavior must be consistent with the documented behavior within a given execution of the program.
Examples
Order of evaluation of subexpressions
Many programming languages do not specify the order of evaluation of the sub-expressions of a complete expression. This non-determinism can allow optimal implementations for specific platforms e.g. to utilise parallelism. If one or more of the sub-expressions has side effects, then the result of evaluating the full-expression may be different depending on the order of evaluation of the sub-expressions. For example, |
https://en.wikipedia.org/wiki/Flow%20graph | Flow graph may refer to:
Flow or rooted graph (graph theory), a graph in which a vertex has been distinguished as the root
Control-flow graph (computer science), a representation of paths through a program during its execution
Flow graph (mathematics), a directed graph linked to a set of linear algebraic or differential equations
Flow network, a directed graph where each edge has a capacity and receives a flow
Signal-flow graph, a directed graph with nodes as system variables and branches as node connections
See also
Flow diagram, a diagram representing a flow or set of dynamic relationships in a system
Flowchart, a diagram representing a process as boxes connected with arrows |
https://en.wikipedia.org/wiki/Nicol%C3%B2%20Cesa-Bianchi | Nicolò Cesa-Bianchi () is a computer scientist and Professor of Computer Science at the Department of Computer Science of the University of Milan.
He is a researcher in the field of machine learning, and co-author of the books "Prediction, Learning, and Games" with Gabor Lugosi and "Regret analysis of stochastic and nonstochastic multi-armed bandit problems"
Research
His research contributions focus on the following areas:
design and analysis of machine learning algorithms, especially in online machine learning
algorithms for multi-armed bandit problems, with applications to recommender systems and online auctions
graph analytics, with applications to social networks and bioinformatics
Education
1988: MS in Computer Science, University of Milan.
1993: Ph.D. in Computer Science, University of Milan.
References
Living people
1963 births
Italian computer scientists |
https://en.wikipedia.org/wiki/Kallerup%20Stone | The Kallerup Stone, designated as runic inscription DR 250 in the Rundata system, is a memorial runestone which is located in Hedehusene, Høje-Taastrup Municipality, on the island of Zealand in eastern Denmark. It is among the oldest runestones in Denmark.
Description
The Kallerup Stone was discovered in 1827 by a stonemason in a field with several stone circles near a church in Hedehusene. It was then restored in 1851 by raising it near its original position. This granite runestone, which is 1.6 meters in height, is among the oldest in Denmark and is believed to date from about 700 to 800 CE. The early younger futhark (Helnæs-Gørlev form) inscription is somewhat unusual in that it uses text bands, the inscribed lines above and below the runic text, which is a practice that did not become common on runestones until later with the use of the younger futhark. The Kallerup Stone is classified as being carved in runestone style RAK, which is considered to be the oldest classification. This is the classification for inscriptions where the ends of the runic text bands are straight and without any attached dragon or serpent heads. The runestone is known locally as the Kallerupstenen.
In the runic inscription, the name Hornbora translates as "horn-bearer."
Inscription
Transliteration of the runes into Latin characters
HurnburA ¶ stAin * suiþks :
Transcription into Old Norse
Hornbora steinn Sviðings.
Translation in English
Hornbori's stone, of Sviði's line.
References
Runestones in Denmark
Høje-Taastrup Municipality
8th-century inscriptions |
https://en.wikipedia.org/wiki/David%20Kessler%20%28author%29 | David Kessler (born 1 April 1958) is an English author of mystery novels and thrillers. The plots of his novels often involve people falsely accused of crimes, legal battles, DNA, computer hacking and police investigations and are characterised by multiple plot twists and last-minute surprises. With the exception of A Fool for a Client, his early novels (published by Hodder Headline) were set in Britain. His new series of books (published by HarperCollins) is set in the Bay Area of California and centres on a series of recurring characters including the lawyer Alex Sedaka and his paralegal Juanita Cortez. His latest series, published under the pseudonym "Adam Palmer", introduces the character of Daniel Klein, an expert on ancient Semitic languages.
Background
Kessler was born to a Jewish family in London, England, and dropped out of school at the age of 15. Shortly thereafter, he wrote a screenplay that he showed to his mother's cousin, movie director Clive Donner. Although never produced, the screenplay made Kessler realise that he wanted to become a writer.
Career
Kessler began writing at the age of 15 when he dropped out of school, but it wasn't until he was in his late thirties that he secured a publishing contract from Hodder Headline. His first book A Fool for a Client was a legal thriller and courtroom drama about the trial of a 23-year-old female medical student in New York for the murder of an Irish nationalist who had fled to the United States and avoided extradition. The title is an allusion to the legal aphorism that anyone who conducts their own defense "has a fool for a client". In the novel, the accused, Justine Levy, insists on conducting her own defence despite judicial advice to the contrary. The book was reviewed by Susanna Yager in the Sunday Telegraph, who wrote: "The author has thought up the most ingenious method of committing murder that I have come across in a long time". The book dealt with a number of political themes, including the funding of the IRA by front organizations allegedly helping the families of imprisoned IRA members .
This was followed by The Other Victim about the stabbing of a teenager and the disappearance of a billionaire in what turn out to be linked cases. The London Sunday Express wrote of this book: "The pace is fast, characters convince and the plot is well thought out. Kessler writes well."
However after his next two books, Tarnished Heroes and Reckless Justice, he was dropped by Hodder during a slump in publishing. At that same time, he courted controversy by co-writing a book about the murder of Rachel Nickell called Who Really Killed Rachel? with Colin Stagg the man who had been falsely accused of the murder and who at the time was still perceived by some to have been a guilty man who got away with the crime. The book—which was published in 1999 by small publisher Greenzone, after the major publishers turned it down—named Robert Napper as one of four credible suspects. Nine years later, N |
https://en.wikipedia.org/wiki/Routing%20bridge | A routing bridge or RBridge, also known as a TRILL switch, is a network device that implements the TRILL protocol, as specified by the IETF and should not be confused with BRouters (Bridging Routers). RBridges are compatible with previous IEEE 802.1 customer bridges as well as IPv4 and IPv6 routers and end nodes. They are invisible to current IP routers and, like routers, RBridges terminate the bridge spanning tree protocol.
The RBridges in a campus share connectivity information amongst themselves using the IS-IS link-state protocol. A link-state protocol is one in which connectivity is broadcast to all the RBridges, so that each RBridge knows about all the other RBridges, and the connectivity between them. This gives RBridges enough information to compute pair-wise optimal paths for unicast, and calculate distribution trees for delivery of frames either to destinations whose location is unknown or to multicast or broadcast groups. IS-IS was chosen as for this purpose because:
it runs directly over Layer 2, so it can be run without configuration (no IP addresses need to be assigned)
it is easy to extend by defining new TLV (type-length-value) data elements and sub-elements for carrying TRILL information.
To mitigate temporary loop issues, RBridges forward based on a header with a hop count. RBridges also specify the next hop RBridge as the frame destination when forwarding unicast frames across a shared-media link, which avoids spawning additional copies of frames during a temporary loop. A Reverse Path Forwarding Check and other checks are performed on multi-destination frames to further control potentially looping traffic.
References
External links
"Introduction to Trill" by Radia Perlman and Donald Eastlake
Computer networking |
https://en.wikipedia.org/wiki/RAK%20Ceramics | RAK Ceramics P.J.S.C is a ceramic brand. Founded in 1989 and headquartered in the United Arab Emirates, RAK Ceramics serves clients in more than 150 countries through a network of operational hubs in Middle East, Europe, Africa, Asia, North and South America and Australia. RAK Ceramics has an annual production capacity of 118 million square metres of tiles, 5.7 million pieces of sanitaryware, 26 million pieces of porcelain tableware and 2.6 million pieces of faucets. Across global operations the company employs approximately 12,000 staff from more than 40 nationalities.
RAK Ceramics specializes in ceramic and gres porcelain wall and floor tiles, sanitaryware, faucets and tableware.
References
3. Ceramic industry make to double turnover by 2021
Ceramics manufacturers of the United Arab Emirates
Manufacturing companies established in 1989
Companies based in the Emirate of Ras Al Khaimah
Emirati companies established in 1989 |
https://en.wikipedia.org/wiki/InfoZoom | InfoZoom software is a data analysis, business intelligence and data visualization software product created using in-memory analytics. The software is created and supported by humanIT and the Fraunhofer Institute FIT , the same organization that created MP3 compression technology. The software has over 100,000 licensed users and over 1000 customers worldwide.
History
InfoZoom software is developed by humanIT GmbH near Bonn, Germany. It was created in 1997 as a spin-off from the Fraunhofer Society which is the same scientific organization that contributed to MP3 compression technology. Since 2003, humanIT is a wholly owned subsidiary of proALPHA, an ERP (Enterprise resource planning) vendor based in Weilerbach, Germany. Today, InfoZoom is co-developed and supported by the Fraunhofer-Institut für Angewandte Informationstechnik (FIT), as known as the Fraunhofer Institute for Applied Information Technology in St. Augustin, Germany.
InfoZoom v6.0 was released in March, 2009. The 64-bit version of InfoZoom was released as v6.4 in November 2009. InfoZoom v7.0 was released in November, 2010, with the release of v8.0 in November 2011.
By the end of 2009, InfoZoom had grown significantly reaching 36,000 licensed users and 800 client organizations worldwide and in 2011 reaching 50,000 users with 1000 clients.
Technology
InfoZoom works with in-memory technology and was programmed in the programming languages C++ and C# / .NET.
Products
InfoZoom allows users to extract large amounts of information from multiple data sources, including any ODBC-compliant databases, Microsoft Excel, text files and other data sources. The software allows for data visualization of entire datasets through an easy to use graphical interface. The tool has applications in ad hoc data analysis and identification of data quality issues and has been used by major government organizations, including universities, as well as by corporations.
InfoZoom is also integrated into other software products and used as the reporting and analytical module. It is also implemented for analysis on the internet or intranet.
InfoZoom Software is available in four main product lines:
InfoZoom Professional
InfoZoom Business
InfoZoom Explorer
InfoZoom Viewer (available for free)
Data Sources
The following data sources can be loaded:
relational database systems (RDBMS) such as Progress, Oracle, Microsoft SQL Server, Microsoft Access or MySQL
Excel files (*.xls or *.xlsx)
Text files or CSV files
XML and JSON files
all data sources that can be addressed via ODBC or OLE DB.
Output Options
The results are visualized using an integrated component for displaying tables and graphics. Optionally, the results can be output directly in Microsoft Office. Results can be actively linked so that the data displayed can be changed later.
There is a free add-in for Microsoft Excel. The analyzed data can be inserted directly into Excel via the add-in.
In addition to its own proprietary form |
https://en.wikipedia.org/wiki/Grindr | Grindr () is a location-based social networking and online dating application targeted towards gay, bisexual and transgender people.
It was one of the first geosocial apps for gay men when it launched in March 2009, and has since become the largest and most popular gay mobile app in the world. It is available on iOS and Android devices in both free and premium versions (the latter called Grindr XTRA and Grindr Unlimited). As of December 2021, Grindr has approximately 11 million monthly active users.
The app allows users to create a personal profile and use their GPS position to place them on a cascade, where they can browse other profiles sorted by distance and be viewed by nearby and faraway users depending on one's filter settings. Selecting a profile photo in the grid view will display that user's full profile and photos, as well as the option to chat, send a "tap," send pictures, video call, and share one's precise location.
History
Original ownership (2009–2015)
Grindr was launched as an iOS mobile app on March 25, 2009, by tech entrepreneur Joel Simkhai in Los Angeles, California. The free version displayed 100 profiles of nearby men, while a premium version ($2.99 plus a monthly fee) contained no advertising and broadened the dating pool to 200 guys. Cautious but generally positive reviews of the app circulated through the gay blogosphere on sites such as Queerty and Joe My God. By August 2009, there were 200,000 total users in Grindr's network. By March 2010, there were 500,000.
For its first anniversary on March 25, 2010, Grindr released the app for BlackBerry devices.
In January 2011, Grindr won the iDate Award for Best Mobile Dating App.
On March 7, 2011, Grindr launched the app for Android devices. Along with a free version, users could pay $4.97 for a premium version called Grindr XTRA that featured no banner ads, more profiles to choose from, more "favorites," and push notifications of messages received while the app is running in the background.
In May 2011, Vanity Fair dubbed Grindr the "World's Biggest, Scariest Gay Bar".
In January 2012, a vulnerability in the app's security software enabled hackers to change the profile picture of a small number of primarily Australian Grindr users to explicit images. Grindr subsequently commenced legal action and made software changes that blocked the site responsible.
In January 2012, Grindr won TechCrunch's Crunchies Award for Best Location Application and two iDate Awards for Best Mobile Dating App and Best New Technology. In April 2012, Grindr won the About.com Readers' Choice Award for Best Dating App, after 74 percent of readers chose Grindr over Zoosk, SKOUT, Tagged, Tingle, and Are You Interested. In May 2012, the 2012 Webby Awards named Grindr an Official Honoree in its "Social (Handheld Devices)" category. Fewer than 15% of entries submitted to the Webby Award committee that year received the Official Honoree distinction, which recognizes the best in Internet content, ser |
https://en.wikipedia.org/wiki/PicoSpan | PicoSpan was a popular computer conferencing tool written by Marcus D. Watts for the Altos 68000. It was written in 1983 for M-Net, which was owned and operated by Mike Myers. Sometime in 1984, Marcus's employer, an Ann Arbor company called Network Technologies International (NETI) purchased the rights for PicoSpan planning to develop it into a commercial product called E-Forum.
History
Computer conferencing was first pioneered in Michigan on CONFER, PicoSpan, E-Forum, Caucus and Participate.
Functionality and impact
PicoSpan tried to provide CONFER's functionality while using the least amount of resources, though many users found it hard to use. It formed the basis for many conferencing systems run by hobbyists.
Picospan came with a toolbox of software customization utilities that could be used to make changes at the system and user level. It was tightly integrated with Unix and could provide transparent access to many external programs that formed a part of the Unix environment. Typing "unix" at the Pico prompt put the user in a shell and users could rapidly switch back and forth and move text from one to the other.
Marcus had a direct effect on The WELL's culture: PicoSpan prevented censorship by preventing conference hosts (who are empowered to hide or delete any response posted in their forum) from influencing a discussion, by labeling such posts as being "<censored>".
PicoSpan also permitted the linking of discussion threads into multiple conferences, at the same time, so that multiple groups could participate. On a big BBS with many users, not all conferences are followed, so it's advantageous if the more interesting discussions are cross linked.
PicoSpan also displays responses as a single integrated thread rather than a collection of separately displayed responses. It relied on constrained choices: no one could start a new topic merely by responding to an old post, so discussions and topics didn't fragment. You couldn't respond to an individual's post and had to respond to the whole thread, forcing people to stay coherent and on-topic. However many people found it hard to use, because of its plain-text environment and steep learning curve.
Users normally dialed into the BBS over slow and flaky telephone lines. After providing the system with a name and password, they invoked Pico and brought up a long list of conference names like "Theology", "Arts", "Singles", "Twilight", "Health" and various other computer topics which were in turn grouped into themes like "Entertainment" or "Computers". The user could then type a command with the conference name as an argument and enter the conference. Once inside, they would find a series of numbered topics or threads each created by a user and each representing an asynchronous conversation. They could then post his comments.
References
External links
Marcus D. Watts, Home Page
Bulletin board systems
History of the Internet
Defunct social networking services
Unix software |
https://en.wikipedia.org/wiki/Lin%20Bolen | Lin Bolen (March 21, 1941 – January 19, 2018) was an American television executive and producer. She was most noted for her role at NBC daytime television programming as the first female vice president of a TV network, a position she held from 1972 until 1976. In this role, Bolen was responsible for commissioning the long-running game show Wheel of Fortune and is credited with bringing successful long form to network soap operas. Bolen was mentioned in Who's Who in America as a trailblazer for women in television.
Early life and education
Bolen was born in Benton, Illinois. Her father was a United Mine Workers union organizer. Her sister Marilyn Bolen was notable for being the first woman stockbroker to work on the St. Louis exchange floor.
Bolen graduated from Benton Consolidated High School. She attended Miss Hickey's School in St. Louis. From 1961 to 1963, she attended City College of New York, where she studied advertising and communications media.
Career
In 1961, Bolen began her career producing commercials. She then worked on documentaries about Twiggy, and then as a writer and producer of documentary films, which included Crisis in America – Welfare for ABC-TV and Stravinsky's Requiem to Martin Luther King with the New York City Ballet.
Bolen was appointed Vice President of Daytime Programming at NBC in 1972. In September 1975, she was the first female Vice President of Programming at a TV network and took NBC to #1 in the national Nielsen ratings. She developed an expanded format for Days of Our Lives and Another World, changing both to an hour-long running time. The expanded shows attracted new viewers and became hits with young women.
Although NBC was airing the successful game shows Hollywood Squares, Concentration, and Jeopardy! at the time, Bolen's mandate was to increase ratings of young women ages 18–34. Daytime and late-night were seen as NBC's profit center at that time, and advertisers wanted programs that attracted young women. In late 1972, Bolen ended Concentration 's fifteen-year run and replaced it with the Heatter-Quigley Productions game show Baffle. Baffle failed to compete with CBS's new game show, The $10,000 Pyramid, and was canceled on March 29, 1974.
Bolen also decided to end the eleven-year run of Jeopardy!, feeling that its demographics were old. The show's creator and producer Merv Griffin did not wish to change the show's format, so Bolen commissioned a new game show from Griffin called Wheel of Fortune. Two pilots were produced before the network was satisfied that young women would love the show, although Bolen risked being fired if the show failed. Wheel of Fortune debuted on January 6, 1975, and was an immediate ratings hit.
In the spring of 1976, while NBC was still the #1 network in daytime, Bolen left the network to become an independent TV producer. She formed her own production company called Lin Bolen Productions. The new company created and developed game shows, movies of the week, and thea |
https://en.wikipedia.org/wiki/Rhaetian%20Railway%20Ge%206/6%20I | {{DISPLAYTITLE:Rhaetian Railway Ge 6/6 I}}
The Rhaetian Railway Ge 6/6 I is a class of metre gauge C′C′ electric locomotives operated by the Rhaetian Railway (RhB), which is the main railway network in the Canton of Graubünden, Switzerland.
The class is so named because it was the first class of locomotives of the Swiss locomotive and railcar classification type Ge 6/6 to be acquired by the Rhaetian Railway. According to that classification system, Ge 6/6 denotes a narrow gauge electric adhesion locomotive with a total of six axles, all of which are drive axles.
Due to their shape – they are similar in form to the SBB-CFF-FFS Crocodiles of the Gotthard Railway – the Ge 6/6 I locomotives have also collectively been nicknamed the Rhaetian Crocodiles by rail fans. Their internal working RhB designation is C-C. As with its standard-gauge counterpart, the Ge 6/6 is articulated, with a gear-driven Jackshaft between the two end axles of each unit, connected to the drive wheels by side rods.
History
Following the electrification of the Albula Railway in 1919, the Rhaetian Railway needed to acquire more electric locomotives. That need was met by the acquisition of six locomotives of a new class Ge 6/6, numbered 401 to 406. Manufacturers were Swiss Locomotive and Machine Works (SLM), Brown, Boveri & Cie (BBC) and Maschinenfabrik Oerlikon (MFO).
The introduction of electric operations on the line from Landquart to Davos Platz similarly necessitated the introduction of new locomotives more powerful than the Ge 2/4 and Ge 4/6 class locos already in service. In the wake of the first Ge 6/6 deliveries in 1921, further deliveries of locomotives in the class were made as follows: nos. 407 to 410 in 1922, nos. 411 and 412 in 1925, and nos. 413 to 415 in 1929.
With the 15 new Ge 6/6 locomotives, the Rhaetian Railway was able completely to replace the steam locomotives on its core network. Henceforth, the Ge 6/6s hauled the heavy and headline trains, including the Glacier Express.
The Ge 6/6s were long, and weighed . Their power output reached , and enabled them to reach a top speed of .
The 15 Ge 6/6 locomotives placed into service with the numbers 401–415 carried and carry no names. The list set out below shows the year of commissioning, year of withdrawal, and the present whereabouts of each locomotive in the class.
Only in 1974, after more than 50 years of service, was the first example of the class withdrawn from service, due to an accident. However, as early as 1958 the newer locomotives of class Ge 6/6 II began slowly to force the Crocodiles into less demanding services. The Ge 4/4 II class, delivered from 1973, considerably accelerated this process, so that in 1984 no fewer than six Crocodiles were withdrawn. After no. 411 was put into storage in June 2001 following an accident — it is now on display in the Deutsches Museum, Munich — only nos. 412, 414 and 415 remained in operation. They were based in Landquart and Samedan.
Preserva |
https://en.wikipedia.org/wiki/Rhaetian%20Railway%20Ge%204/4%20III | {{DISPLAYTITLE:Rhaetian Railway Ge 4/4 III}}
The Rhaetian Railway Ge 4/4 III is a class of metre gauge Bo′Bo′ electric locomotives of the Rhaetian Railway (RhB), which is the main railway network in the Canton of Graubünden, Switzerland.
The class is so named because it was the third class of locomotives of the Swiss locomotive and railcar classification type Ge 4/4 to be acquired by the Rhaetian Railway. According to that classification system, Ge 4/4 denotes a narrow gauge electric adhesion locomotive with a total of four axles, all of which are drive axles.
History
In order to manage the sharp increase in traffic on its network after the opening of the Vereina Tunnel, the Rhaetian Railway joined in 1989 with Swiss Locomotive and Machine Works and ASEA Brown Boveri, to develop a new generation of electric locomotives, the drive train of which was to be based upon AC technology with GTO Thyristors. The original plan for a six axle variant of the Ge 4/4 II, which would have had benefits on the nearly straight section of line through the tunnel, was rejected, in favour of a universally deployable locomotive with four axles, which could also be used on sections with tight radius curves. The result was the Ge 4/4 III class.
On 7 December 1993, the first Ge 4/4 III machine, no 641, was officially put into service. Between 1994 and 1999, eleven further locomotives followed, in three series, and were given numbers 642 to 652. The first of these further orders, made in 1989, consisted of six locomotives, and the second further order, in 1990, was for three. The third, placed with Adtranz in 1996, was intended to cover the additional demand due to the opening of the Vereina Tunnel, and was for another three machines.
The Ge 4/4 IIIs are now found at the head of almost all of the train sets on the Albula Railway, and they are the only locomotives used to haul car trains through the Vereina Tunnel. All of the locomotives in the class are currently decorated with colourful advertising liveries.
Accidents and incidents
On 13 August 2014, No. 651 was hauling a passenger train that was struck by a landslide and derailed at Tiefencastel, Graubünden. Eleven people were injured.
Technical details
The class was designed for 11 kV AC at a frequency of Hz, and with a top speed of . The Ge 4/4 IIIs weigh and have an output of at . They are long and high. Their control technology corresponds almost completely with that of the SBB-CFF-FFS Re 460 class of locomotive.
The 12 locomotives were given names of small communities in Graubünden, on the territory of which the Rhaetian Railway operates. Depending upon the livery applied to each particular locomotive, the names are applied at various places on the right and left sides of the vehicle, with the traffic number between 641 and 652 applied to each front end, and also on the lower sides. Beside the name on each locomotive is also the emblem of the particular place.
Similar locomotives operate als |
https://en.wikipedia.org/wiki/Sharp%20PC-E220 | The Sharp PC-E220 was a 1991 pocket computer from Sharp Corporation featuring 32 KB RAM, 128 KB ROM and a 3.072 MHz CMOS-SC7852 CPU which was Z80A compatible. The display was able to display 4 lines x 24 characters/144 x 32 pixels. Programming languages were BASIC and Z80-Assembler.
The computer was powered by four consecutively ordered AA batteries which makes this computer the biggest of the Sharp pocket computer range, whereas the CPU made it the fastest. The BASIC interpreter is mostly compatible with the interpreter of the PC-14xx series.
See also
Sharp pocket computer character sets
References
External links
http://wwwhomes.uni-bielefeld.de/achim/pc-e220.html The Sharp PC-E220 Homepage
PC-E220
PC-E220 |
https://en.wikipedia.org/wiki/Square%20root%20biased%20sampling | Square root biased sampling is a sampling method proposed by William H. Press, a computer scientist and computational biologist, for use in airport screenings. It is the mathematically optimal compromise between simple random sampling and strong profiling that most quickly finds a rare malfeasor, given fixed screening resources.
Using this method, if a group is times as likely as the average to be a security risk, then persons from that group will be times as likely to undergo additional screening. For example, if someone from a profiled group is nine times more likely than the average person to be a security risk, then when using square root biased sampling, people from the profiled group would be screened three times more often than the average person.
History
Press developed square root biased sampling as a way to sample long sequences of DNA. It had also been developed independently by Ruben Abagyan, a professor at TSRI in La Jolla, California, for use in a different biological context. An even earlier discovery was by Martin L. Shooman, who used square root biased sampling in a test apportionment model for software reliability.
Press' later proposal to use square root biased sampling for airport security was published in 2009. There, he argued that this method would be a more efficient use of the limited resources possessed for screening, as compared to the current practice, which can lead to screening the same persons frequently and repeatedly. However, use of this method presupposes that those doing the screening have accurate statistical information on who is more likely to be a security risk, which is not necessarily the case.
See also
Numerical Recipes, a series of books on algorithms and numerical analysis coauthored by William Press.
References
Derivation: https://www.researchgate.net/publication/309809428_An_optimal_sampling_application_of_Cauchy's_inequality
Sampling techniques
Risk |
https://en.wikipedia.org/wiki/Railroad%20Tycoon%20%28disambiguation%29 | The main article is about the computer game series Railroad Tycoon.
Other uses:
Railroad Tycoon (video game)
Railroad Tycoon (board game)
See also:
Business magnate, for people referred to as "railroad tycoon" |
https://en.wikipedia.org/wiki/Sequential%20structure%20alignment%20program | The sequential structure alignment program (SSAP) in chemistry, physics, and biology is a method that uses double dynamic programming to produce a structural alignment based on atom-to-atom vectors in structure space. Instead of the alpha carbons typically used in structural alignment, SSAP constructs its vectors from the beta carbons for all residues except glycine, a method which thus takes into account the rotameric state of each residue as well as its location along the backbone. SSAP works by first constructing a series of inter-residue distance vectors between each residue and its nearest non-contiguous neighbors on each protein. A series of matrices are then constructed containing the vector differences between neighbors for each pair of residues for which vectors were constructed. Dynamic programming applied to each resulting matrix determines a series of optimal local alignments which are then summed into a "summary" matrix to which dynamic programming is applied again to determine the overall structural alignment.
SSAP originally produced only pairwise alignments but has since been extended to multiple alignments as well. It has been applied in an all-to-all fashion to produce a hierarchical fold classification scheme known as CATH (Class, Architecture, Topology, Homology),. which has been used to construct the CATH Protein Structure Classification database.
Generally, SSAP scores above 80 are associated with highly similar structures. Scores between 70 and 80 indicate a similar fold with minor variations. Structures yielding a score between 60 and 70 do not generally contain the same fold, but usually belong to the same protein class with common structural motifs.
See also
Structural alignment
Class, Architecture, Topology, Homology (CATH)
RMSD — A different structure comparison measure
TM-score — A different structure comparison measure
GDT — A different structure comparison measure
LCS — A different structure comparison measure
References
External links
SSAP Server for pairwise structural comparison
Bioinformatics
Computational chemistry |
https://en.wikipedia.org/wiki/KTGS | KTGS (The Gospel Station Network) (88.3 FM) is a radio station in Ada, Oklahoma; licensed to nearby Tishomingo. The station is currently owned by local pastor Randall Christy and his company, South Central Oklahoma Christian Broadcasting.
The flagship of The Gospel Station network, KTGS broadcasts a southern gospel format.
They play southern gospel music from artists like The Gaither Vocal Band, Karen Peck & New River, Ernie Haase & Signature Sound, Triumphant Quartet, The Crabb Family, Greater Vision, Jeff & Sheri Easter, The Kingsmen, The Nelons, The Isaacs, plus they play lots of classic songs and artists such as The Hinsons, The Happy Goodmans, The Cathedrals, and more.
Stations
In addition to KTGS, The Gospel Station Network airs on 9 additional full powered stations and 6 low powered translators. The bulk of its network is located in Oklahoma, and spreads across portions of the Tulsa, Oklahoma City, and Lawton markets. With stations that also cover Wichita Falls, Paris, and Amarillo, Texas.
Low powered translators
K261CR/K297BB/K268BR rebroadcasts KWFF-HD4.
K284BH rebroadcasts KBZD-HD4.
History
This station was assigned call sign KAZC on December 8, 1997, changing to KTGS on November 1, 2008.
References
External links
thegospelstation.com
TGS
Southern Gospel radio stations in the United States
Radio stations established in 1997 |
https://en.wikipedia.org/wiki/Australian%20Idol%20%28season%208%29 | The eighth season of Australian Idol premiered on 30 January 2023. It is the show's first season since 2009. It aired on Seven Network, after the network bought the rights to the series from Network 10. The grand final was won by Royston Sagigi-Baira, also known as Royston Noell, whose winner's single, "Invincible", was released after the grand final on 26 March 2023.
Production
On 21 October 2020, Seven Network announced at their annual upfronts that they will be reviving the series, originally slated for 2022. It was later delayed until 2023.
Ricki-Lee Coulter and Scott Tweedie are the hosts, with the judging panel consisting of former American Idol judge Harry Connick Jr., former Australian Idol judge Kyle Sandilands, Amy Shark and Meghan Trainor. Original judge Marcia Hines will appear as a guest judge.
The series is produced by Eureka Productions.
Auditions
Auditions were held in various cities around Australia. If an auditionee received a "yes" vote from at least three of the four judges, they received a "golden ticket", which put them into the top 50. In a few cases, a single judge visited a remote location, and auditionees were accepted or rejected for the top 50 by that judge alone.
Singer did not receive a golden ticket
Auditions 1 (30 January)
Auditions 2 (31 January)
Angus and Bobby Holmes are brothers who both performed separately, however when it was found out they were brothers they auditioned together and both received golden tickets.
Auditions 3 (1 February)
Auditions 4 (5 February)
Haze Harrington auditioned twice, in two different cities.
Auditions 5 (6 February)
Jakob Poyner was originally rejected at first, until Meghan changed her mind.
Elizabeth Pardallis and Ethan Hill auditions were compiled.
Auditions 6 (7 February)
Yasmin and Yolanda Absolom audition was shown again.
Auditions 7 (12 February)
Top 50
Marcia Hines, who was a judge for all of the seven seasons of Australian Idol's original run, filled in for Meghan Trainor during the Top 50 rounds.
Top 50 Part 1 (13 February)
Singers did not make it
Top 50 Part 2 (14 February)
32 contestants reached this round. Each contestant sang a song solo in front of a live audience. The judges then decided who would progress to the final 24.
Top 24
The Top 24 was divided into three rounds, with eight singers performing in each round, and four singers from each round progressing to the Top 12. A judge could put a singer through to the Top 12 by awarding a "touchdown", with each judge allowed to award one "touchdown" across the three rounds. The other singers that progressed to the Top 12 were announced by the judges at the end of each round.
Singer received a "Touchdown" and advanced to the Top 12
Singer did not make the Top 12
Top 24 Part 1 (19 February)
Top 24 Part 2 (20 February)
Top 24 Part 3 (21 February)
Weekly song themes
Group/guest performances
Top 12 finalists
Royston Sagigi-Baira
Audition: "I’m Not the Only One" (Sam Smith)
Top 50 P |
https://en.wikipedia.org/wiki/Michael%20Butler | Michael Butler may refer to:
Michael Butler (computer scientist), professor of computer science at the University of Southampton, UK
Sir Michael Butler (diplomat) (1927–2013), former British ambassador to the EEC
Michael Butler (musician) (born 1961), musician and podcaster
Michael Butler (politician), Canadian politician
Michael Butler (producer) (1926–2022), American theatrical producer
Michael Butler (soccer) (born 1976), Liberian retired professional soccer player
Michael E. Butler (1855–1926), American politician from New York
Michael Butler (Missouri politician)
Mick Butler (Dublin hurler) (1916–1987), Irish hurling player
Mick Butler (footballer) (born 1951), English footballer
Mick Butler (Wexford hurler) (born 1950), Irish retired hurler
Mike Butler (American football) (born 1954), former American football defensive end
Mike Butler (basketball) (1946–2018), American former professional basketball player |
https://en.wikipedia.org/wiki/CyanogenMod | CyanogenMod ( ; CM) is a discontinued open-source operating system for mobile devices, based on the Android mobile platform. Developed between 2009 and 2016, it was free and open-source software based on the official releases of Android by Google, with added original and third-party code, and based on a rolling release development model. Although only a subset of total CyanogenMod users elected to report their use of the firmware, on 23 March 2015, some reports indicated that over 50 million people ran CyanogenMod on their phones. It was also frequently used as a starting point by developers of other ROMs.
In 2013, the founder, Stefanie Jane, obtained venture funding under the name Cyanogen Inc. to allow commercialization of the project. However, the company did not, in her view, capitalize on the project's success, and in 2016 she left or was forced out as part of a corporate restructure, which involved a change of CEO, closure of offices and projects, and cessation of services, and therefore left uncertainty over the future of the company. The code itself, being open source, was later forked, and its development continues as a community project under the LineageOS name.
CyanogenMod offered features and options not found in the official firmware distributed by mobile device vendors. Features supported by CyanogenMod included native theme support, FLAC audio codec support, a large Access Point Name list, Privacy Guard (per-application permission management application), support for tethering over common interfaces, CPU overclocking and other performance enhancements, unlockable bootloader and root access, soft buttons, status bar customisation and other "tablet tweaks", toggles in the notification pull-down (such as Wi-Fi, Bluetooth and GPS), and other interface enhancements. CyanogenMod did not contain spyware or bloatware, according to its developers. CyanogenMod was also said to increase performance and reliability compared with official firmware releases.
The name CyanogenMod derived from cyanogen (the name of a chemical compound adopted as a nickname by Jane) + Mod (a term for user-developed modifications, known as modding).
History and development
Soon after the introduction of HTC Dream (named the "T-Mobile G1" in the United States) mobile phone in September 2008, a method was discovered to attain privileged control (termed "root access") within Android's Linux-based subsystem. Having root access, combined with the open-source nature of the Android operating system, allowed the phone's stock firmware to be modified and re-installed onto the phone.
In the following year, modified firmware for the Dream was developed and distributed by Android enthusiasts. One, maintained by a developer named JesusFreke, became popular among Dream owners. After Google issued its Android RC30 over-the-air update in November 2008 that fixed the bug that had previously been used for root access, he began offering modified versions that restored root acce |
https://en.wikipedia.org/wiki/Rail%20transport%20in%20Cardiff | Rail transport in Cardiff has developed to provide connections to many other major cities in the United Kingdom, and to provide an urban rail network for the city and its commuter towns in southeast Wales. Today, there are three train operating companies in Cardiff: Great Western Railway, CrossCountry and Transport for Wales.
Services to/from Cardiff
Transport for Wales
National
– – – – – – – –
Cardiff Central – Newport – Hereford – – –
Cardiff Central – – – – – – –
Cardiff Central – Newport – –
Regional
Cardiff Central – Bridgend – Port Talbot Parkway – –
Cardiff Central – – –
Local
These services operate on the Valley Lines network – an urban rail network centred on Cardiff that connects it to its commuter towns in South East Wales:
Cardiff Central – – – Coryton
Cardiff Central – – –
Cardiff Central – –
Cardiff Central – Grangetown – – –
Cardiff Central – Grangetown – Dinas Powys – Barry – – –
–
Cardiff Central – – –
Cardiff Central – Cardiff Queen Street – – – –
Cardiff Central – Cardiff Queen Street – – – –
Cardiff Central – Cardiff Queen Street – Radyr – Pontypridd – Abercynon – –
Cardiff Central – Cardiff Queen Street – Radyr – Pontypridd – – –
Great Western Railway
National
– – – – –
– – – –
– – –
Regional
– – –
– – – –
Daily/Summer Weekend extensions to and respectively
CrossCountry
National
– – – – –
Stations in Cardiff
All 20 railway stations in Cardiff are owned by Network Rail and managed by Transport for Wales which also operates all train services at these stations, with the exception of Cardiff Central which is also served by CrossCountry and Great Western Railway. The stations form part of Cardiff's commuter rail network, colloquially known as Valley Lines
and are the main hubs of the city and are the two busiest stations in Wales.
Cardiff Central is one of the United Kingdom's major railway stations, providing connections to Newport, Bristol, Bath, Reading, London, Southampton, Portsmouth, Gloucester, Cheltenham, Birmingham and Nottingham. It is located in the south of the Cardiff city centre
Cardiff Queen Street is the hub of the Valley Lines network, with all lines running through the station. It is located in Cardiff's eastern city centre.
Railway lines
These are the main rail lines that serve Cardiff. Most of the lines are Cardiff commuter lines that form the city's urban rail network.
South Wales Main Line
The South Wales Main Line is a branch of the Great Western Main Line from . It diverges from the main line near Swindon, first passing through Bristol Parkway and continuing through the Severn Tunnel to Cardiff Central via Newport. The line continues from the city towards West Wales. The line between London and Cardiff has been electrified.
Butetown Line
The Butetown Line is a short line running from Cardiff Queen Street to Cardiff Bay. Rail services call only at those stations with a frequency of |
https://en.wikipedia.org/wiki/Nick%20Collins%20%28composer%29 | Nick Collins (born 1975) is a British academic and computer music composer. From 2006–2013 he lived in Brighton, UK, and ran the music informatics degrees at the University of Sussex. In 2013 he became Reader at the University of Durham.
He is an experienced pianist and laptopist, and active in both instrumental and electronic music composition. He has toured extensively with the audiovisual duo 'klipp av' and as a solo musician.
Alex McLean of Slub and Nick Collins are the inventors of the Algorave.
Books
Collins, Nick (2009). Introduction to Computer Music. Chichester: Wiley
Collins, Nick and d'Escrivan, Julio (eds.) (2007). The Cambridge Companion to Electronic Music. Cambridge: Cambridge University Press.
Collins, Nick; Schedel. Margaret and Wilson, Scott (2013). Electronic Music. Cambridge: Cambridge University Press.
References
External links
Official site
University profile
21st-century classical composers
20th-century classical composers
British classical composers
British male classical composers
Living people
1975 births
Place of birth missing (living people)
Algorave
20th-century British composers
21st-century British composers
20th-century British male musicians
21st-century British male musicians
Academics of Durham University |
https://en.wikipedia.org/wiki/JKOY%20Class%20Sm5 | The Sm5 electric multiple unit (EMU) is a low-floor train used on the Helsinki commuter rail network. Unlike other train types on the network, the Sm5 units are owned by Pääkaupunkiseudun Junakalusto Oy, a subsidiary of the cities of Helsinki, Espoo, Vantaa and Kauniainen. The units are leased to the Helsinki Regional Transport Authority (HSL), and VR operates them.
History
Junakalusto Oy ordered 32 Stadler FLIRT EMUs from the Swiss manufacturer Stadler Rail in 2006. The first two units were delivered in November 2008 and 2009. The units were put through extensive testing on the Finnish rail network before the first unit entered commercial service in November 2009. As of July 2012, seventeen units have been delivered, all of them being in service. Nine more trainsets were ordered in October 2011 and 34 further units in 2014, raising the total to 75.
The Sm5 units are designed for the Finnish winter conditions. They are fitted with 50–100% thicker thermal insulation compared to previous FLIRT models, and the incoming fresh ventilation air is preheated with the outgoing warm air to recover heat. The entrance areas are fitted with fan heaters in order to preserve the interior climate as passengers enter and leave during cold weather.
The Sm5 unit is mostly low-floor with all entrances level with the station platforms. The interior space is open through the articulations so that passengers can walk through all the four cars from end to end. This allows passengers to easily occupy the cars evenly. The wide Finnish loading gauge allows the cars to be wider than most European railway cars. This allows a 2+3 seating configuration in the commuter trains, but still with comfortable spacing.
The Sm5 series is planned to replace the two oldest electric multiple unit series in the Helsinki commuter traffic, the Sm1 and Sm2. The Sm5 are also used for the airport rail service, the Ring Rail Line connecting the Helsinki-Vantaa airport to the rail network, operated since July 2015. At the same time HSL repainted the trains in a distinctive purple to differentiate the capital region commuter trains from the outer suburban services to places like Riihimäki.
The trains are transported from the Swiss factory by road and ferry, since they cannot run on European standard gauge railways.
References
External links
Multiple units of Finland
Stadler Rail multiple units
25 kV AC multiple units
Train-related introductions in 2009 |
https://en.wikipedia.org/wiki/Open-News-Network%20e.V. | Open News Network e.V. is a German group ("Eingetragener Verein"). It is a network both in the technological and in the social sense. It aims to provide open, non-commercial access to text based usenet. Membership is constituted by support of the project. Support may be in the form of active collaboration, allocation of resources, or both.
History
21 Feb 2005 Posting in de.comm provider usenet Message-ID: <pan.2005.02.21.01.12.52.335900@familieknaak.de>
8 Mar 2005 Joern Bredereck announced the idea.
12 May 2007 society according to German law incorporated.
Usenet
Open-News-Network e.V provides traditional Usenet groups."It is a Germany based cooperative network of Usenet enthusiasts who run their servers on otherwise unused resources."
References
External links
Official Website
Organisations based in Munich
Usenet free posting |
https://en.wikipedia.org/wiki/List%20of%20sign%20languages%20by%20number%20of%20native%20signers | The following are sign languages reported to be used by at least 10,000 people. Additional languages, such as Chinese Sign Language, are likely to have more signers, but no data is available. Estimates for sign language use are very crude, and definitions of what counts as proficiency are varied. For most sign languages, there are no concrete estimates. For instance, it has been reported there are a million signers in Ethiopia, but there are only a fifth that number of deaf people, less than half of whom are fluent in sign, and in addition it is unknown how many different sign languages they use.
See also
List of sign languages
List of languages by number of native speakers
References
Lists of languages |
https://en.wikipedia.org/wiki/Polipo | Polipo is a discontinued lightweight caching and forwarding web proxy server. It has a wide variety of uses, from aiding security by filtering traffic; to caching web, DNS and other computer network lookups for a group of people sharing network resources; to speeding up a web server by caching repeated requests. It can be configured to use on-disk cache and serve cached content when offline and perform various forms of content filtering.
To minimize latency, Polipo both pipelines multiple resource requests and multiplexes multiple transactions onto the same TCP/IP connection. Polipo is HTTP 1.1-compliant, supports IPv4, IPv6, traffic filtering and privacy-enhancement.
Polipo is free software released under the MIT License.
Polipo ceased to be maintained on 6 November 2016 due to the increasingly widespread use of encryption (i.e. HTTPS) making caching proxies obsolete.
Design
Polipo is designed to be used as a personal web cache or a web cache shared among a few users to boost internet access. Designed to be fast, lightweight and small, it is useful when the system resources for a larger proxy are unavailable. Because of this, it has been put to uses such as a tether on the OpenWrt.
GUI wrappers
Natively, polipo comes as a highly specialized command-line interface (CLI) software application, which requires commands to be typed on the keyboard and parameters stored in configuration text files. Alternatively, polipo allows users to run the program automated and non-interactively, such as in a shell script. By starting a GUI wrapper application users can intuitively interact with polipo, start and stop it and change its working parameters, through graphical icons and visual indicators.
Some independent GUI wrapper projects are:
Solipo - a GUI wrapper application for polipo on Windows
Dolipo - a GUI wrapper for OS X
Polipoid - a wrapper for Android
Features
The fast, lightweight and small memory footprint proxy server polipo uses a variety of techniques:
Polipo will upgrade client requests to HTTP/1.1 even if they come in as old HTTP/1.0.
Polipo does HTTP 1.1 pipelining well, so it can enhance internet communication latency.
Polipo will make web browsing faster or at least appear to have less latency.
Polipo will cache the initial segment of a download and can complete it later using Range requests, in case of interrupts.
Polipo can, to some extent, substitute for filtering and privacy-enhancing proxies such as Privoxy or WWWOFFLE, it provides capabilities to block or redirect requests, censor HTTP request headers and referrer information.
Polipo has complete support for IPv6.
Since Polipo can speak both IPv4 and IPv6, Polipo can be used as a bridge between the IPv4 and IPv6 Internets.
Polipo can speak the SOCKS 4 and SOCKS 5 protocols.
Polipo serves as a web cache.
Limitations
Polipo is limited to 2G or 4G file sizes on 32 bit systems which will cause errors when serving large requests.
See also
Web accelerator which discu |
https://en.wikipedia.org/wiki/Solar%20TV | Solar TV (stylized as SOLARtv) was the flagship television network of Solar Entertainment Corporation's television arm subsidiary Solar TV Network, Inc., which is the replacement of C/S 9. This was the revival of the former Solar channel Solar USA.
History
The channel launched on November 29, 2009, at 11:00am with a slogan It's A Bright New World on RPN.
On October 31, 2010, it changed some of its programming content to English/Tagalog with a new slogan Kung Saan Lahat Panalo!.
It ended its broadcast on February 25, 2011, as Solar Entertainment buys RPN and programming of ETC was transferred to RPN but will remain as a corporate brand of television arm subsidiary of Solar (now a subsidiary of ALC Group of Companies since August 23, 2014).
Programs
America's Best Dance Crew
America's Got Talent
Ben 10 Alien Force (Also Aired on GTV)
Burn Notice
Entertainment Tonight
Eureka
Fringe
Hatol ng Bayan Auto Vote 2010
Heroes
Home Shopping Network
Human Target
Jai Alai Cagayan
Super Robot Monkey Team Hyperforce Go!
Kamen Rider Dragon Knight (Also Aired on Cartoon Network Philippines)
Law & Order: Special Victims Unit
Lie to Me
The Main Event
Minute to Win It
NBA
NBC Nightly News
NCIS
One Morning Cafe
Queer Eye for the Straight Guy
PBA on Solar TV
Real NBA
Saved by the Bell
Solar's Big Ticket
RPN NewsWatch
RPN NewsCap
RPN NewsWatch Update
Survivor
Survivor: Nicaragua
The Biggest Loser
The Ellen DeGeneres Show
The Insider
The Jerry Springer Show
The Price is Right
The Real Housewives of New Jersey
The Vampire Diaries
Versus
World Class Boxing
World's Most Amazing Videos
WWE Raw (one-hour edition)
WWE Smackdown (one-hour edition)
External links
Defunct television networks in the Philippines
Radio Philippines Network
Former Solar Entertainment Corporation channels
Television channels and stations established in 2009
Television channels and stations disestablished in 2011
English-language television stations in the Philippines |
https://en.wikipedia.org/wiki/Like%20Father%2C%20Like%20Santa | Like Father, Like Santa (also known as The Christmas Takeover) is a TV movie starring Harry Hamlin and William Hootkins. It premiered on Fox Family in 1998 on their 25 Days of Christmas programming block. The script was written by Mark Valenti.
Plot
The story revolves around a toy tycoon named Tyler Madison (Harry Hamlin) who is greedy, ruthless, and neglectful of his family. He wants a monopoly of the toys industry and is determined to erase all his competitors including his father Santa Claus. Tyler had a bitter childhood which motivates him to put Santa Claus out of business. He travels to the North Pole to take over Santa's toy workshop. However, he realizes that he has a lot in common with his father and soon faces a crisis of conscience when the Christmas elves at his father's mailroom begin a Coup d'état.
Cast
Harry Hamlin as Tyler Madison
Megan Gallagher as Elise Madison
Curtis Blanck as Danny Madison
William Hootkins as Santa Claus
Gary Coleman as Ignatius
Michael Munoz as Whoops
Roy Dotrice as Ambrose Booth
Gary Frank as Smitty
Stuart Pankin as Snipes
See also
List of Christmas films
Santa Claus in film
References
External links
Julie Ashton-Barson Filmography
1998 films
American Christmas films
Santa Claus in film
ABC Family original films
Santa Claus in television
Christmas television films |
https://en.wikipedia.org/wiki/Rapidly%20exploring%20dense%20trees | Rapidly exploring dense trees is a family of planning algorithms that includes the rapidly exploring random tree.
References
Search algorithms |
https://en.wikipedia.org/wiki/Inner%20space | Inner space may mean:
Entertainment
Taylor's Inner Space (1974), a television series by Ron and Valerie Taylor
Innerspace (1987), a sci-fi comedy film
Operation: Inner Space (1994), a computer game
InnerSPACE (2009—2018), a Canadian television show
Innerspace (video game) (2018), an adventure video game
Places
Adventure Thru Inner Space, a 1967 attraction at Disneyland
Inner Space Cavern, a Karst cave in Georgetown, Texas, USA
Music
Inner Space (album) (1973), an album by Chick Corea
Can (album) (a.k.a. Inner Space) (1979), an album by Can
"Innerspace", a song by The Apples in Stereo on their album Fun Trick Noisemaker (1995)
"Innerspace", a song by Mirror (2022)
Technology
Priam InnerSpace, a hard disk drive series by Priam Corporation in the 1980s
Spirituality
Inner space (spirituality), a central conception within spirituality, as opposed to outer space
See also
Inner product space, a kind of vector space in linear algebra
Lumen (anatomy), an inner space, lining, or cavity
Outer space (disambiguation) |
https://en.wikipedia.org/wiki/Native%20cloud%20application | A native cloud application (NCA) is a type of computer software that natively utilizes services and infrastructure from cloud computing providers such as Amazon EC2, Force.com, or Microsoft Azure. NCAs exhibit a combined usage of the three fundamental technologies:
Computational grid - loosely, e.g. MapReduce
Data grids (e.g. distributed in-memory data caches)
Auto-scaling on any managed infrastructure
References
Further reading
Morris, Kief (2020). Infrastructure as Code: Dynamic Systems for the Cloud Age Second Edition. O'Reilly Media. ISBN 9781098114626, 1098114620.
Grid computing
Cloud computing
Cache (computing) |
https://en.wikipedia.org/wiki/Nortel%20Retirees%20and%20former%20employees%20Protection%20Canada | NRPC is a non-profit member-supported organization for Canadian former employees of Nortel. It was formed after announcements in the media that Nortel Networks, a large multinational telecommunications company, had entered bankruptcy proceedings in several countries.
Constituency
Most of the members of NRPC are entitled to a defined benefit pension; however, it is not clear how many are entitled, now and in the future, to medical benefits and other benefits from Nortel.
In his statement to the Finance Standing Committee on March 25, 2010, Don Sproule, president of the NRPC, stated that 11,000 pensioners or surviving spouses are entitled, and 700 pensioners or surviving spouses are not entitled to medical benefits. The implication is that roughly 8,000 former employees are not now, nor will they in the future be, entitled to medical benefits.
However, according to Barry E.Wadsworth, Associate Counsel Canadian Auto Workers representing unionized Nortel former employees, all individuals currently receiving a pension are in receipt of medical benefits.
According to an Oct 13, 2016 Reuters article there were 22 thousand participants in Nortel’s underfunded pension plan in 2009.
History
On January 14, 2009, Nortel Networks initiated financial restructuring under the Companies' Creditors Arrangement Act (CCAA) in Canada. At that time, Nortel Networks stopped paying severance packages, transition allowances, and deferred wages to former employees and retirees.
NRPC was started by volunteer Nortel pensioners from Ottawa in an effort to obtain court approval to have this non-profit organization sponsored by Nortel Networks. The organizers quickly formed an ad hoc committee and organized several mass meetings in several Canadian cities. The meetings were announced at NPYG (Nortel_Pension Yahoo Group) a self-help group formed in 2002 for employees, ex-employees, retirees and family members of Nortel Networks. Word quickly spread and the local Ottawa media started paying attention.
NRPC announced their first (Montreal-only) website on January 23, 2009. On February 14, 2009, the Ottawa branch of the NPRC opened its website.
On May 16, 2009, the Montreal website of NRPC started directing traffic to the newly formed NRPC website.
2009 representation order and incorporation
In an order issued by the Ontario Superior Court of Justice on May 27, 2009, Donald Sproule, David Archibald and Michael Campbell were appointed representatives of, and the law firm Koskie Minsky was appointed as legal counsel for, all former Nortel employees, with the exception of some unionized employees.
In September 2009, the NRPC incorporated as a not-for-profit organization.
Agreements between Nortel and the NRPC
February 8, 2010, agreement reached with Nortel on behalf of all former employees
On February 8, 2010, NRPC announced it reached an agreement (awaiting court approval) with Nortel in which Nortel would advance $57 million to fund medical and life insurance benefits f |
https://en.wikipedia.org/wiki/Mushroom%20Wars | Mushroom Wars is a real-time strategy video game developed by Creat Studios, originally available for the PlayStation 3 on the PlayStation Network (PSN). This version was released on October 15, 2009. On January 24, 2013 it has been released for the iPad on the iTunes Store. An Android version was released on Google Play on September 24, 2013. A sequel, Mushroom Wars 2, was released on iOS and Apple TV on October 13, 2016. It was released on several other platforms since.
The objective of the game is centered on capturing villages (bases) by overwhelming the enemy in numbers. The most basic strategy to use in the game is to fill villages that surround a target village with soldiers in preparation for the next capture.
Gameplay
Mushroom Wars gameplay is inspired by the game Galcon and centers on capturing villages and other buildings by armies overwhelming the defending forces.
Gameplay is divided into three categories, Campaign, Skirmish, and Local Multiplayer. Three difficulty levels exist, allowing the player to increase the challenge after getting the hang of the game. In Campaign mode, there are various mission scenarios where the player can play against up to three computer-controlled opponents. Campaign battles often have goals, such as capturing all enemy points before a time expires, capturing key villages or simply capturing all enemy villages with no time restrictions. Skirmish mode provides a wide variety of maps for single player action against up to three computer-controlled opponents. Local multiplayer mode allows up to four players to play against each other. Users may also unlock online multiplayer via a PSN add-on purchase.
Villages produce soldiers until they reach a given population limit, after which the player needs to move soldiers to a different base or upgrade the village before it can produce more troops. Upgrading a village increases the number of soldiers it can support. The player "spends" soldiers like money in order to upgrade a village. Even though the villages stop producing soldiers after reaching their growth limit the player can move more soldiers to such villages. This can be useful in an attempt to accumulate a large army before mounting an attack or to reduce the population in other villages and allow them to keep producing soldiers. Towers are defensive buildings which hurl stones at the attacking army if they come within a certain radius of the tower. In addition to this attack towers can host soldiers for defense but they do not produce additional soldiers for the player as villages do. Like villages, towers can be upgraded to provide defensive bonuses for the player. Forges can contain soldiers for defense like villages and towers, but like towers do not produce additional soldiers for the player or support them. Forges increase the attack ability and defense ability of all soldiers of the player who controls them.
The game has an inviting and light-hearted tone. The controls are relatively simpl |
https://en.wikipedia.org/wiki/OrbQuest%3A%20The%20Search%20For%20Seven%20Wards | OrbQuest: The Search For Seven Wards is a computer game developed by QWare, Inc. for the Apple Macintosh.
Plot
OrbQuest is an adventure/fantasy role-playing game that revolves around a powerful, mystic object called the Orb, which has been shattered into seven pieces called Wards. The seven Wards were scattered, each located in one of the seven corners of the world, housed in a pyramid. King Cricken accidentally destroyed the Orb when casting magics to defeat the Evil Ones (sending them back to their netherworld), and then disappeared in a flash of thunder. The forces of Evil were weakened that day, but they have started to become powerful once again. It is up to the player to take over King Cricken's quest by finding the pieces of the Orb and reassemble this powerful device to put a stop to the spread of Evil.
Gameplay
The onscreen character's movement is controlled using a mouse, moving the mouse in the direction the player wishes the adventurer to move. By positioning the character over a city, town, or pyramid, the player double-clicks the mouse button with the cursor placed on top of the character. This opens the "gates" of the city, and the screen environment changes to that of the locale's interior. Movement via the mouse moves the character to the taverns, grocery stores, armories, weaponry shops, magic shops, and temples within a city. A game in progress can only be saved while the character is in a town or city.
When confronted by an opponent, the player places the character next to the monster, positions the cursor over the beastie, and presses the mouse "fire" button. A message appears on screen to inform the player of the damage inflicted upon both the creature and the character in the exchange of blows. The character has the attributes of Strength, Intelligence, Wisdom, Dexterity, Charisma and Constitution, each of which is determined randomly by the computer, although the player can reroll as many times as desired. The player can play either an old character or create a new one when booting the game. The player selects class, gender, and race. The three player classes are fighter, spellcaster, and thief, and for race elf, dwarf, halfling, half-orc, and human are all available.
Development
OrbQuest was developed for the Apple Macintosh computer by QWare, Inc., which was based in Richardson, Texas. Created by Ed Schultz and Michael Mayer.
Reception
The game was reviewed in 1987 in Dragon #118 by Hartley and Patricia Lesser in "The Role of Computers" column. According to the reviewers, "OrbQuest is quite an enjoyable adventure — one that is not difficult to master, but that requires some modicum of thought." In a subsequent column, the reviewers gave the game 3 out of 5 stars.
Macworld praises OrbQuest's large map, stating that "The best feature of OrbQuest is its grand scope: the great distances to be traveled and the exhaustive search, which is the essence of a good quest" but criticizes its unoriginality, expressing that "un |
https://en.wikipedia.org/wiki/Alternate%20Reality%3A%20The%20City | Alternate Reality: The City is a video game published by Datasoft, the first game in the Alternate Reality series. It was created by Philip Price, and was released in 1985. Gary Gilbertson created the music.
Technology
The City featured a novel anti-copying technique. The program disks could be copied though the standard methods and the copy would appear to work. However, not long after the player began the game, their character would become weaker and weaker and then die from an apparent disease.
Reception
Scorpia gave Alternate Reality: The City a mixed review in Computer Gaming World. The graphics were praised for its attention to detail, as was the expansive city to explore. She criticized the game, however, for having no goal; once the city is painfully mapped out, the only thing left to do is monotonously battle enemies in preparation for The Dungeon. The 8-bit versions omitted certain features such as joining guilds, and Scorpia criticized the Apple version's poor graphics. In 1993 Scorpia called The City "a fascinating premise that turned out rather poorly ... a game for those with great persistence and patience".
Alternate Reality: The City received a mini-review in 1988 in Dragon #131 by Hartley, Patricia, and Kirk Lesser in "The Role of Computers" column. The reviewers gave the Macintosh version of the game 3 out of 5 stars, and the Atari ST version 3 stars. Alternate Reality: The City and Alternate Reality: The Dungeon were both the subject of the feature review Dragon #135. The reviewers gave Alternate Reality: The City 3 stars, and Alternate Reality: The Dungeon stars.
Reviews
Casus Belli #33 (June 1986)
Games #70
References
External links
Review in Antic
Review in Page 6
1985 video games
Amiga games
Apple II games
Atari 8-bit family games
Atari ST games
Classic Mac OS games
Commodore 64 games
Datasoft games
DOS games
IOS games
Role-playing video games
Single-player video games
U.S. Gold games
Video games developed in the United States |
https://en.wikipedia.org/wiki/Alternate%20Reality%3A%20The%20Dungeon | Alternate Reality: The Dungeon is a video game published by Datasoft, the second game in the Alternate Reality series. It was created by Philip Price, and was released in 1987. Price was unable to complete The Dungeon which was finished by Ken Jordan and Dan Pinal. Gary Gilbertson created the music.
Gameplay
Alternate Reality: The Dungeon closely continues its predecessor in that the player is still held captive by aliens in an alternate reality. He now enters the dungeon with the sole intention of surviving. The first game was more about roaming the city, but this one has a mainly linear path because the dungeon has four levels that must be explored in that sequence. However, the player still has access to the stores, such as an inn or a smithy. Also, the player has the option of joining any of the six guilds that have made it inside the dungeon. All things now have a weight associated with them; carrying too much hinders speed and endurance, which is a significant change in the gameplay.
Technology
The Dungeon, if loaded with an unauthorized copy, featured two "FBI agents" as encounters during the beginning of the game, who attacked with "the long arm of the law". The two agents were overly powerful and unbeatable, so as to kill the character before being able to play the game. Due to a bug, the other way to run into these characters was to try to transfer over a character from the city. In effect, it was impossible to actually transfer a character over from the city to the dungeon without mailing in the disks to be exchanged for a fixed version.
Reception
Computer Gaming World in 1987 said that The Dungeons design and mechanies were superior to The City. The magazine's Scorpia's review of The Dungeon described the game as "a big improvement over City, but it is still ultimately unsatisfying". While the graphics were much-improved, especially on 8-bit versions, the game lacked any sense of accomplishment. She found that starting characters from scratch is nearly impossible, and several aspects of the game arbitrarily punished the players, such as the unbeatable Devourer which eats items if the player has too many, and the reduction of stats when playing from a backed-up save. In 1993, Scorpia called The Dungeon "better than the first, but not by much".
Alternate Reality: The City and Alternate Reality: The Dungeon were both the subject of the feature review Dragon #135. The reviewers gave Alternate Reality: The City 3 stars, and Alternate Reality: The Dungeon stars.
References
External links
Review in ANALOG Computing
Review in Compute!'s Gazette
Review in Info
Review in Page 6
1987 video games
Apple II games
Atari 8-bit family games
Commodore 64 games
Datasoft games
IOS games
Role-playing video games
Single-player video games
Video games developed in the United States |
https://en.wikipedia.org/wiki/Police%20Citizens%20Youth%20Club | Police & Community Youth Clubs (PCYC) or Police and Community Youth Clubs are a network of Australian non-profit, community organisations, founded in New South Wales. In some states such as NSW, they are constituted as an Incorporated Association.
The Mission of PCYC is to get young people active in life; develop their skills, character and leadership; and prevent and reduce crime by and against young people. The organisation is community-based and involves the provision of low-cost structured activities to children and adults, aimed specifically at the underprivileged persons in the community. The clubs contain a wide variety of sports such as basketball, indoor soccer, weightlifting gyms, dancing, wrestling/grappling, boxing, martial arts and many other activities and hobbies. Different clubs may have different activities going on to one another. The PCYC has a range of over 60 clubs across the State.
History
The first PCYC was opened in Woolloomooloo, New South Wales on 1 April 1937 by the Police Commissioner, William John Mackay. He garnered the support of the Rotary Clubs in Australia, who provided financial report and set up the first Police Boys Club. They were originally known as the "Police Rotary Youth Club", and later, "Police Boy's Clubs".
States
Name & locations of PCYC's in each state.
Police Citizens Youth Clubs NSW
Police Citizens Youth Club Queensland
Western Australia Police & Community Youth Centre
Tasmanian Association of Police & Community Youth Clubs
Victoria Police & Citizens Youth Club
Blue Light Victoria
Kyabram Blue Light (Central Victoria)
Bendigo Blue Light
Alpine Blue Light
Mernda Blue Light
Canberra Police & Community Youth Club
References
External links
Branches include:
New South Wales
Queensland
Australian Capital Territory
Western Australia
St. Kilda, Victoria
Tasmania
1937 establishments in Australia
Youth organizations established in 1937
Youth organisations based in Australia
Non-profit organisations based in New South Wales
Children's charities based in Australia
Educational charities based in Australia |
https://en.wikipedia.org/wiki/Low%20Bush%20River | Low Bush River is a community in the Cochrane District of Ontario.
The place is counted as part of Cochrane, Unorganized, North Part in Canadian census data.
Communities in Cochrane District |
https://en.wikipedia.org/wiki/R.U.R.U.R. | is a Japanese H-game for computer, developed and published by light. The game is known for its use of established science fiction elements in its story, along with numerous references to several works of literature, including Antoine de Saint-Exupéry's The Little Prince and Karel Čapek's R.U.R.
In mid-2008, light announced that a PlayStation 2 port titled R.U.R.U.R. -petit prince- was in development. As of November 2009, the port will be released for PlayStation Portable, and was released on September 22, 2010.
Story
R.U.R.U.R. takes place in the distant future, centuries after humanity has gone extinct. Despite the lack of humans, the spaceship St. Exupéry continues its journey through space with the purpose of finding another planet suitable for colonization. In place of a human society, the robots that once served the humans have created their own societal structure.
The story really begins after the discovery of a hidden stasis capsule containing the last human in the universe. While some robots argue that they have taken humanity's place as the dominant race, the leadership decides to awaken the boy inside the capsule to try to raise him in hopes that he would grow to become a suitable leader. In order to do so, several of the robots are conscripted to take part in a fake world created for the boy. A world where he has friends, a loving family, and feels no pain or sorrow.
Characters
– The protagonist of the story. He is referred to as "The last mankind" by the robots of the St. Exupéry. He is completely unaware that the world he lives in is fake. Because of how he was raised, he sees the robots around him as actual people, can tell them apart without having to think about it, and sees himself as one of them. Incidentally, he has trouble understanding the difference between humans and robots once the truth behind his world is revealed.
– A military-class chapekku that was conscripted into the world created for Ichihiko. She was originally asked to take the role of the "older brother", but became the "next door neighbor" due to her unwillingness to be near the protagonist. Outwardly, Hinagiku picks on Ichihiko regularly and often ridicules him for being short. She tends to err on the side of honesty, and her straightforward approach to things puts her at odds with Shirotsumegusa on occasion.
– A commander-class chapekku that proposed the robots of the St. Exupéry raise the last human. She took the role of "mother" in the family created for Ichihiko. As such, she looks after him and makes sure to cook his favorite foods. While Ichihiko's well-being is her top priority, Mizubashou fears of what would happen if he were to discover the truth behind his "world". Because of this, she will resort to shutting other robots down and even lacing Ichihiko's food with chemicals if it will somehow protect the secret.
– A drexler operator-class chapekku in charge of the network of nanomachines that course through the ship. In the family created |
https://en.wikipedia.org/wiki/SHR%20%28operating%20system%29 | SHR (formerly Stable Hybrid Release) was a community-driven Linux distribution for smartphones which was based on OpenEmbedded, Xorg, and the freesmartphone.org (FSO) framework. Several different graphical toolkits were made available, such as GTK+ and Qt.
Supported devices
The unstable and testing releases were released for Openmoko's Neo 1973 and FreeRunner smartphones.
Later on, SHR Core supported the FreeRunner and the GTA04.
SHR Core was also being ported to several devices like the HTC Dream, the Nexus S, the Palm Pre and Nokia N900 devices. with various degrees of completion.
Applications
SHR had several rudimentary applications specially made for it, like an address book software, a dialer, an SMS application and so on. It was also possible to install these applications on Debian.
Many graphical Linux applications were also available like Midori and Pidgin, and it was also possible to use the terminal with the ash shell through a terminal application.
Front-ends for MPlayer, and other software like FoxtrotGPS that were developed for the OpenMoko and/or the distributions that ran on it were also available on SHR.
Software stack
The use of Xorg enabled to use many Linux applications, with various degrees of usability due to hardware constraints of the supported devices. Most/All of the supported devices had small displays with high Pixel density, and most of them had only a touchscreen based input and very few buttons.
SHR used the FSO framework middleware to handle the smartphones power management and various peripherals. Several SHR developers were also contributing to the FSO framework in order to port SHR to newer devices.
See also
Openmoko
Replicant (operating system)
Rooting (Android OS)
Comparison of Linux distributions
References
External links
SHR official website
SHR on Openmoko Wiki
ARM Linux distributions
Embedded Linux
Smartphone operating systems
Mobile operating systems
Free mobile software
Openmoko
Linux distributions |
https://en.wikipedia.org/wiki/MVS%20Comunicaciones | MVS Comunicaciones (MVS) is a Mexican media conglomerate. The company owns MASTV, MVS Radio operator of four national radio networks, MVS Televisión operator and distributor of seven pay television networks, E-Go wireless broadband internet and 51% of Dish México.
Pay television
Dish México
The main MVS pay television service is Dish México. Dish México is a company that operates a subscription satellite television service in Mexico. On December 1, 2008, Dish México began to operate in Mexico, after an agreement between Dish Network and MVS. Echostar owns 49% and MVS owns 51% of Dish México. All of Dish México's channels programming are dubbed or subtitled in Spanish or originally Spanish language. Dish does not beam Televisa or TV Azteca network locals due to a dispute between Dish and Televisa. Televisa wants to charge Dish México per subscriber for its feeds of free over the air Televisa networks. Dish, however, leases an HD receiver with a terrestrial antenna input which when connected to an over the air antenna picks up digital local stations signals free of charge.
MASTV
MVS also owns MASTV, a wireless cable television company. The wireless cable company offered 17 channels to 11 cities in Mexico; Mexico City, Guadalajara, Leon, Mérida, Monterrey, Pachuca, Queretaro, San Luis Potosi, Toluca, Tuxtla Gutierrez, and Villahermosa. The system started operations on September 1, 1989 as MVS Multivisión in Mexico City. It later expanded to 10 other markets across Mexico. In 2002, MVS Multivision changed its name to MASTV. Finally, after the acquisition by Dish, MASTV ceased operations in July 2014
MVS Televisión
MVS owns MVS Televisión that operates and distributes seven pay television networks; 52MX, a general entertainment network, Exa TV, a music video network, Multicinema, an American movie network, Multipremier, an international movie network, Cinelatino, a Spanish-speaking world movie network, Viva Sports, a sports network, and distributes Antena 3 Internacional in Latin America, a Spanish pay TV network. From 1991 until July 31, 2012, MVS owned and operated the children-oriented channel ZAZ. All seven television networks are available through Dish México and MASTV.
MVS Radio
MVS Radio operates 4 international radio networks owned by MVS Comunicaciones. These networks are Exa FM, La Mejor, MVS Noticias, and FM Globo. These networks broadcast in various countries including Argentina, Costa Rica, Ecuador, El Salvador, Honduras, Mexico, Panama, and the United States. All MVS owned radio networks are available on Dish México.
Internet
MVS offers wireless broadband internet via microwaves called E-Go with the use of a USB modem. The service is available in Mexico City, Monterrey, Toluca, and Guadalajara.
Education
In 2018, MVS bought the Universidad Tecnológica Americana (Uteca), a private university located in Avenida de los Insurgentes and Viaducto Miguel Alemán.
References
External links
MVS Comunicaciones official website
MVS Te |
https://en.wikipedia.org/wiki/Marnie%20Mueller | Marnie Mueller (born Tule Lake War Relocation Center) is an American novelist.
Life
In 1963 she joined the Peace Corps, serving two years in Guayaquil, Ecuador.
She worked for WBAI as Programming Director, but resigned in 1977, over staff cuts.
She lives in New York City, with her husband Fritz Mueller.
Awards
Maria Thomas Award for Outstanding Fiction, for Green Fires
1995 American Book Award, for Green Fires
Works
Anthologies
Criticism
"Review: Selected Accidents, Pointless Anecdotes", Peace Corps Writers
References
External links
"Author's website"
"An interview with Marnie Mueller About MY MOTHER'S ISLAND", Curbstone, Jane Blanshard
20th-century American novelists
21st-century American novelists
American women novelists
Novelists from New York City
Living people
20th-century American women writers
21st-century American women writers
American Book Award winners
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/Video%20game%20graphics | A variety of computer graphic techniques have been used to display video game content throughout the history of video games. The predominance of individual techniques have evolved over time, primarily due to hardware advances and restrictions such as the processing power of central or graphics processing units.
Text-based
Some of the earliest video games were text games or text-based games that used text characters instead of bitmapped or vector graphics. Examples include MUDs (multi-user dungeons), where players could read or view depictions of rooms, objects, other players, and actions performed in the virtual world; and roguelikes, a subgenre of role-playing video games featuring many monsters, items, and environmental effects, as well as an emphasis on randomization, replayability and permanent death. Some of the earliest text games were developed for computer systems which had no video display at all.
Text games are typically easier to write and require less processing power than graphical games, and thus were more common from 1970 to 1990. However, terminal emulators are still in use today, and people continue to play MUDs and explore interactive fiction. Many beginning programmers still create these types of games to familiarize themselves with a programming language, and contests are still held even today on who can finish programming a roguelike within a short time period, such as seven days.
Vector graphics
Vector graphics refer to the use of geometrical primitives such as points, lines, and curves (i.e., shapes based on mathematical equations) instead of resolution-dependent bitmap graphics to represent images in computer graphics. In video games this type of projection is somewhat rare, but has become more common in recent years in browser-based gaming with the advent of Flash and HTML5 Canvas, as these support vector graphics natively. An earlier example for the personal computer is Starglider (1986).
Vector game can also refer to a video game that uses a vector graphics display capable of projecting images using an electron beam to draw images instead of with pixels, much like a laser show. Many early arcade games used such displays, as they were capable of displaying more detailed images than raster displays on the hardware available at that time. Many vector-based arcade games used full-color overlays to complement the otherwise monochrome vector images. Other uses of these overlays were very detailed drawings of the static gaming environment, while the moving objects were drawn by the vector beam. Games of this type were produced mainly by Atari, Cinematronics, and Sega. Examples of vector games include Asteroids, Armor Attack, Aztarac, Eliminator, Lunar Lander, Space Fury, Space Wars, Star Trek, Tac/Scan, Tempest and Zektor. The Vectrex home console also used a vector display. After 1985, the use of vector graphics declined substantially due to improvements in sprite technology; rasterized 3D Filled Polygon Graphics retur |
https://en.wikipedia.org/wiki/Robotron%20KC%2087 | The Robotron KC 87, fully known as Kleincomputer robotron KC 87 (KC standing for Kleincomputer, lit. "small computer"), was an 8-bit microcomputer released in 1987 and produced in East Germany by VEB Robotron-Meßelektronik "Otto Schön" Dresden, part of Kombinat Robotron.
The first model in the series, the Robotron Z 9001, originally designed as a home computer and introduced in 1984, was renamed to Robotron KC 85/1 in 1985 to de-emphasize its use as consumer good. Despite similar names, the Robotron Kleincomputers were not directly related to the KC 85 mass-produced by VEB Mikroelektronik "Wilhelm Pieck" Mühlhausen.
The availability of the Robotron KC series for private customers was very limited. The computers were mostly used at educational institutions, organizations, and enterprises. Therefore, the extracurricular use of KC computers was often allowed for students at institutions and organizations.
Technical information
The Robotron KC series used an U880 microprocessor, a clone of the Zilog Z80, clocked at 2.5 MHz. Every machine came with a built-in keyboard, power supply and RF modulator. Software could be loaded from cassette tapes, which required a separate cassette deck. All models featured K 1520 bus slots for up to four expansion modules. They allowed expanding the hardware, such as upgrading the RAM, connecting a printer or displaying bitmapped graphics, but also included modules with application software and programming languages. The KC 87 had a KC-BASIC [de] interpreter in ROM. In earlier models, the user had to load BASIC from tape or use an expansion module. Sufficiently expanded models could even run SCP [de], an East German CP/M clone. Robotron also offered cassette tapes with applications and games.
Trivia
Thomas Dohmke, who became CEO of GitHub in 2021, started coding on a Robotron KC 87.
See also
Robotron Z 1013 – A mostly compatible hobbyist kit, available even to private consumers via written order, waiting of one year and then self-pickup from factory outlet.
RFT KC 85 – A series of mostly compatible microcomputers made by VEB Mikroelektronik.
RFT KC compact – The only pre-assembled home computer made in the GDR aimed at private consumers; not compatible to any of the other KC systems.
References
External links
robotron-net.de - The KCs from East Germany (English translation)
robotrontechnik.de - KCs made in Dresden
foerderverein-tsd.de - History of home computers in GDR (English translation)
jens-mueller.org - JKCEMU (English translation) - KC 87 emulator written in Java
Home computers
Products introduced in 1987
1987 in East Germany
Goods manufactured in East Germany
Science and technology in East Germany
Computers designed in Germany |
https://en.wikipedia.org/wiki/Taganode%20Local%20Search%20Engine | The Open Local Search Engine from Taganode was a search engine specifically targeting mobile phones. It was based on local search algorithms to find new places of interest within a specified distance.
The Taganode search engine offered an Open Developer API for iPhone, Android, and other platforms.
The search engine was bandwidth optimized for mobile phones. The Taganode service was available in London, Rome, Venice, Amsterdam, Berlin, Sweden and in Denmark.
References
External links
Official site
Internet search engines
Mobile phones |
https://en.wikipedia.org/wiki/Colette%20Hume | Colette Hume is the Education Correspondent for BBC Wales Today as well as a network stand-in for Wales Correspondent Wyre Davies for BBC News network services.
She is originally from the North-East of England and has previously worked for the BBC's Breakfast news programme.
References
External links
BBC newsreaders and journalists
Welsh journalists
Welsh women journalists
Living people
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/Comparison%20of%20cognitive%20architectures | The following table compares cognitive architectures.
See also
List of artificial intelligence projects
Comparison of deep-learning software
External links
A Survey of Cognitive and Agent Architectures by the Artificial Intelligence Lab, University of Michigan
A Framework for Comparing Agent Architectures by Aaron Sloman and Matthias Scheutz, Originally Published in Proceedings UKCI'02, UK Workshop on Computational Intelligence, September 2002, Birmingham, UK
Feature-by-Feature Comparison of Cognitive Architectures started on October 2009, updated for BICA-2010
cogarch.org Cognitive Architecture Wiki
Sigma Cognitive Architecture homepage and code repository
References
Computing comparisons |
https://en.wikipedia.org/wiki/Sequential%20decoding | Recognised by John Wozencraft, sequential decoding is a limited memory technique for decoding tree codes. Sequential decoding is mainly used as an approximate decoding algorithm for long constraint-length convolutional codes. This approach may not be as accurate as the Viterbi algorithm but can save a substantial amount of computer memory. It was used to decode a convolutional code in 1968 Pioneer 9 mission.
Sequential decoding explores the tree code in such a way to try to minimise the computational cost and memory requirements to store the tree.
There is a range of sequential decoding approaches based on the choice of metric and algorithm. Metrics include:
Fano metric
Zigangirov metric
Gallager metric
Algorithms include:
Stack algorithm
Fano algorithm
Creeper algorithm
Fano metric
Given a partially explored tree (represented by a set of nodes which are limit of exploration), we would like to know the best node from which to explore further. The Fano metric (named after Robert Fano) allows one to calculate from which is the best node to explore further. This metric is optimal given no other constraints (e.g. memory).
For a binary symmetric channel (with error probability ) the Fano metric can be derived via Bayes theorem. We are interested in following the most likely path given an explored state of the tree and a received sequence . Using the language of probability and Bayes theorem we want to choose the maximum over of:
We now introduce the following notation:
to represent the maximum length of transmission in branches
to represent the number of bits on a branch of the code (the denominator of the code rate, ).
to represent the number of bit errors on path (the Hamming distance between the branch labels and the received sequence)
to be the length of in branches.
We express the likelihood as (by using the binary symmetric channel likelihood for the first bits followed by a uniform prior over the remaining bits).
We express the prior in terms of the number of branch choices one has made, , and the number of branches from each node, .
Therefore:
We can equivalently maximise the log of this probability, i.e.
This last expression is the Fano metric. The important point to see is that we have two terms here: one based on the number of wrong bits and one based on the number of right bits. We can therefore update the Fano metric simply by adding for each non-matching bit and for each matching bit.
Computational cutoff rate
For sequential decoding to a good choice of decoding algorithm, the number of states explored wants to remain small (otherwise an algorithm which deliberately explores all states, e.g. the Viterbi algorithm, may be more suitable). For a particular noise level there is a maximum coding rate called the computational cutoff rate where there is a finite backtracking limit. For the binary symmetric channel:
Algorithms
Stack algorithm
The simplest algorithm to describe is the "stack algorithm" |
https://en.wikipedia.org/wiki/Systancia | Systancia is a European cybersecurity software vendor.
History
Systancia's earliest developments date back to 1998 with a product for application and desktop virtualization.
External growth enables Systancia to offer solutions for securing external access (by employees or service providers) to the information system, and to manage digital identities and authentication processes.
In March 2020, Systancia helps companies overcome the Covid-19 health crisis by offering its teleworking service free of charge and joined OVHCloud's OpenSolidarity initiative.
In 2021, Systancia launches its Neomia subsidiary, dedicated to Artificial intelligence, with its first product, Neomia Pulse, an AI-based behavioral biometric authentication platform.
In 2023, Systancia announces the launch of cyberlements.io, a SaaS Zero Trust platform that brings together all its PAM, ZTNA and IAM product technologies.
References
External links
Systancia official website
Systancia France website
Software companies of France
Software companies established in 1998
Virtualization software
Remote desktop |
https://en.wikipedia.org/wiki/Homework%20%28Atomic%20Rooster%20album%29 | Homework is an album of previously unreleased demos by John Du Cann, with drum programming by Paul Hammond. It is considered Atomic Rooster's eighth and final studio album.
In 1981, the recently reformed Atomic Rooster signed to Polydor Records to release two singles, with the option of an album to follow, should the singles prove successful. Although the singles, "Play It Again" (1981) and "End Of The Day" (1982), performed well in rock clubs and on specialist rock charts, they failed to make an impression on the national charts. Consequently, Polydor dropped the band. Shortly afterwards, owing to resurfacing internal tensions, Du Cann left Atomic Rooster for the second and final time.
Du Cann's demos, recorded between 1979 and 1981 for the projected album, were never completed and remained unreleased for several decades. In 2008, Du Cann licensed them for release by Angel Air Records, under the Atomic Rooster moniker. The album was rounded out by the inclusion of the six A and B-sides of the two Polydor singles. The two Polydor singles, issued on both 7" and 12", featured Gillan bassist John McCoy.
The CD was compiled and annotated by Record Collector's Joe Geesin, and featured quotes from John Du Cann.
Track listing
All songs written by Du Cann except where noted.
"The Dukes Theme" 3:24
"Make Me Strong" 2:50
"The Devil in Me" 4:13
"Fool" 3:13
"It Can Wait Another Day" 2:48
"C.O.D" 3:08
"Mind Over Matter" 3:29
"A Matter of Time" 3:18
"Cut the Wire" 6:31
"X-MASS" 2:00
"Open up the Sky" 3:22
"City Boy" 2:49
"The Band Played On" 2:20
"Different Words" 2:31
"Leopard's Skin" 2:32
"The Buck Stops Here" 1:42
"Somebody's Looking After You?" 4:31
"Play it Again" (Du Cann/Crane) 3:12 - single A-side (1981)
"Rebel with a Clause" aka "Start to Live" 2:58 - single B-side
"Devil's Answer" 4:11 - live in Milan 1981; 12" B-side
"End of the Day" 3:28 - single A-side (1982)
"Night Living" aka "Living Underground" 3:39 - single B-side
"Tomorrow Night" (Crane) 4:51 - live studio version 1981; 12" B-side
Tracks 18-20, 22 and 23 were with Vincent Crane.
Atomic Rooster compilation albums
2008 compilation albums |
https://en.wikipedia.org/wiki/Amy%20Ashurst%20Gooch | Amy Ashurst Gooch is a computer scientist known for her contributions in non-photorealistic rendering. She is currently the Chief Operations Officer at ViSOAR LLC, a data visualization research spin-off software company from the Scientific Computing and Imaging Institute. She is also an adjunct professor of computer science at Texas A&M University. Her current research is part of an interdisciplinary effort involving computer graphics, perceptual psychology, and computational vision. She is interested in better understanding the spatial information potentially available in CG imagery, determining what spatial cues are actually used when CG imagery is viewed, and using this information to create improved rendering algorithms and visualizations.
Biography
Gooch earned her BS in Computer Engineering in 1996 and her MS in Computer Science in 1998 from the University of Utah. While working on her master's degree, she explored interactive non-photorealistic technical illustration as a new rendering paradigm and developed Gooch shading, which she presented at the 1998 SIGGRAPH conference. Following her masters, she worked at the University of Utah as a research scientist for five years. During this time, she co-taught a course at the 1999 SIGGRAPH conference on non-photorealistic rendering and co-authored the first textbook in the field, Non-Photorealistic Rendering, with her husband Bruce Gooch. In 2004, she began her PhD in computer science at Northwestern University and graduated in 2006. Following her PhD, she joined the faculty at the University of Victoria in British Columbia as an assistant professor of computer science. In 2013, she joined the Scientific Computing and Imaging Institute to help develop the ViSUS software core into a product. In 2014, she became an adjunct professor of computer science at Texas A&M University.
Works
Bruce Gooch, Amy Ashurst Gooch, Non-Photorealistic Rendering, AK Peters, July 2001,
See also
Gooch shading
Scientific Computing and Imaging Institute
References
Academic staff of the University of Victoria
Living people
University of Utah alumni
Computer graphics researchers
American computer scientists
American women computer scientists
Year of birth missing (living people)
Northwestern University alumni
Texas A&M University faculty
American women academics
21st-century American women |
https://en.wikipedia.org/wiki/Butler%20railway%20station | Butler railway station is a commuter railway station in Butler, Western Australia, a suburb of Perth. It is the terminus of the Joondalup line, which is on the Transperth commuter rail network. Planning for the Joondalup line in the Butler area began in the late 1990s. The station was built as part of a $240 million extension of the Joondalup line from Clarkson to Butler. Construction began on the station on 16 July 2012, and was completed on 16 May 2014, opening on 21 September 2014. The Joondalup line is currently being extended past Butler station to Yanchep station. As of November 2021, the extension is planned to open at the end of 2023.
Butler station has two side platforms situated in a cutting below the surrounding ground level. It is accessed from a ground-level concourse. Services run every 10 minutes during peak and every 15 minutes between peak. The journey to Perth Underground station is , and takes 38 minutes. The station is served by six regular bus routes, operated by Swan Transit under contract. To the south, these bus routes link to Clarkson station, traversing through several suburbs along the way. To the north, these bus routes go as far as Two Rocks, on the northern edge of the Perth metropolitan region.
Description
Butler station is in Butler, a suburb of Perth, Western Australia. It is located east of Exmouth Drive and north of Butler Boulevard. It is , or a 38 minute train journey, from Perth Underground station along the Joondalup line, placing the station in fare zone 5. The next station to the south is Clarkson station.
The station consists of two side platforms situated in a cutting below ground level. The platforms are approximately long, or long enough for a Transperth 6-car train. At ground level is a concourse which can be used to cross over the railway or access the station. Operating hours are from approximately 5 am to 1 am, extending to 2 am on Friday and Saturday nights. Outside station operating hours, the concourse is locked. Each platform is served by an escalator, a lift, and a set of stairs, making it fully accessible. On the concourse are toilets, a kiosk, a customer service office and fare gates. It has 891 car parking bays. The station, designed by Coniglio Ainsworth Architects, received a commendation at the 2015 WA Architecture Awards.
Running along the long station concourse wall is a piece of public art titled Rain on Water, by Geoffrey Drake-Brockman. The artwork consists of 1,200 aluminium rods with various lengths. Each rod has a brightly coloured end, with the colour depending on the height of the aluminium rod; shorter rods being on the blue end of the spectrum, and longer rods being on the red end of the spectrum. The artwork represents the ripples from raindrops falling on water, with mathematical modelling used to determine the height of each rod to make the piece of art look like a realistic wave.
History
The original stage of the Joondalup line began construction in November 1989. |
https://en.wikipedia.org/wiki/Trek-80%20%281979%20video%20game%29 | Trek-80 is a computer game developed by Judges Guild in 1979 for the TRS-80.
Plot
The object of Trek-80 is to destroy all the Klingon vessels while losing no more than five supply tugs in a specified period of time. The player moves the ship using warp drive for galactic travel, and impulse drive for inner quadrant movement. The Enterprise and Klingon vessels are armed with phasers and photon torpedoes, while the supply tugs only have phasers. The Enterprise also has the ability to use the ram as a weapon.
Gameplay
The graphic layout is the usual galactic grid overlaid by an 8 × 8 quadrant grid found in Trek games. The Enterprise is depicted by an "E", and Klingons by a "K", and the tugs by the up arrow. Additional information displayed on-screen includes: stardate, ship's condition, quadrant, ship's energy, bases, torpedoes, and number of tugs lost.
Development
As part of their plan to compete with TSR, Judges Guild increased production on their print products, and they also started to diversify by moving into computer game production, although Trek-80 (1979) was their only computer game.
Trek-80 was a basic language, 16K program written by Bruce Berry, and was the first computer game produced by a science-fiction/fantasy wargaming company. Barry took many ideas from the numerous Trek programs already on the market, and added a few new and different twists.
Reception
The game was reviewed in 1980 in The Dragon #36 by Michael Dodge. Dodge concluded the review with, "Trek-80 is a well written program and a good Star Trek game. The program's graphics are well laid out and easy to read, the mechanics are adequate, and the introductions of ramming and tugs are excellent features".
References
1979 video games
Judges Guild publications
TRS-80 games
TRS-80-only games
Video games based on Star Trek
Video games developed in the United States |
https://en.wikipedia.org/wiki/Pagwa%20River | Pagwa River is a community in the Cochrane District of Ontario. It is a part of Cochrane, Unorganized, North Part in Canadian census data.
History
It was named a railway divisional point because of its major junction of the railway and the Pagwachuan River. Here, it supported a fur trading post. Packet steamers ran between Pagwa and James Bay to serve the Revillon Freres trading post and community early in the 1900s. Pagwa then became the site of an airfield and airforce base of the Pinetree Line Distant Early Warning system, which was decommissioned in 1968. From 1952 to after 1962, this station was operated by the United States Air Force's 913th Aircraft Control and Warning Squadron.
In its heyday, Pagwa was busy with commercial activity. Goods transported by rail to Pagwa for the Trade Post were unloaded from boxcars onto a long wooden chute that slid the goods downhill to the doorstep of the Post. Each year large wooden barges were constructed at Pagwa to float goods by steamer to villages along the Kenogami and Albany Rivers as far as Ogoki and Fort Albany. The barges were built from douglas-fir timbers brought from British Columbia by rail (R. Ferris, 2010).
The tracks and the top surface sheathing of the railway bridge are presently removed. The bridge was last used by Thunderhouse Forest Services Inc as access for a treeplanting operation on the west side of the Pagwachuan River in 2006. The Ontario Ministry of Natural Resources, Geraldton Area Office, blocked use of the bridge later that year.
Commercial activity and population began declining after the Trans-Canada Highway opened up the region post World War II. Some of the original townsite has been purchased. Today, there are a few private cottages and seasonal homes, mostly owned by residents of Constance Lake First Nation and Hearst, Ontario. Some residents of Constance Lake today were born at Pagwa and spent many years of their lives there.
References
Communities in Cochrane District |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.