source stringlengths 32 199 | text stringlengths 26 3k |
|---|---|
https://en.wikipedia.org/wiki/Big%20Brother%20%28software%29 | Big Brother (alias BB) was a tool for systems and network monitoring, generally used by system administrators. The advent of the dynamic web page allowed Big Brother to be one of the first monitoring systems to use the web as its user interface. Prior to this, monitoring tools were generally console based, or required graphic terminals such as X Window to operate. Big Brother produces HTML pages containing a simple matrix of hosts and tests with red and green dots to denote system status. Big Brother was named after George Orwell's character Big Brother from his novel Nineteen Eighty-Four. E-mail from Big Brother originated from the Ministry of Truth, and users of the software were called Brothers.
The application was designed to allow non-technical users to understand system and network status information through a simple interface and presentation, using a matrix to display status information for overhead displays in Network Operations Centers (NOCs). It was designed to monitor computer systems and networks, and for this reason does not use SNMP natively, instead using a client–server model and its own network communication protocol. Clients send status information over port TCP port 1984 (possibly a reference to the novel 1984) at five-minute intervals. Since the clients only send information to a specific monitoring server, its creators claim it is more secure than SNMP-based protocols, which poll clients for information. For this reason, Big Brother was featured at SANS Institute security conferences in 1998. 1999, and at a SANSFIRE conference in 2001.
Big Brother has also been cited in a number of books on system administration, computer security, and networking. The application supports redundancy via multiple displays, as well as failover. Network elements can be tested from multiple locations and users can write custom tests.
An open-source version of the project exists: between 2002 and 2004 it was called bbgen toolkit, between 2005 and 2008 it was called Hobbit, but to avoid breach of trademark, it was renamed Xymon which is still in development and use.
Background
Sean MacGuire wrote Big Brother in 1996 after he received what he believed to be an overpriced quote for network-monitoring software. He introduced it in an article for Sys Admin magazine in October 1996. In August 1997, it was mentioned in an article by Paul Sittler in Linux Journal Shortly after the initial release, Robert-Andre Croteau joined MacGuire and added notification rules, which he described in a Sys Admin article published in September 1998, and created the Windows version.
In 1999 MacGuire and Croteau started the company BB4 Technologies, to commercialize Big Brother. They licensed the product under what they called the "Better than Free" or BTF license - "better" because 10% of the license fee went to the charity of the purchaser's choice.
In 2001 Quest Software acquired BB4 Technologies. MacGuire and Croteau, the only employees of BB4, later went to work |
https://en.wikipedia.org/wiki/Red%20Star%20OS | Red Star OS () is a North Korean Linux distribution, with development first starting in 1998 at the Korea Computer Center (KCC). Prior to its release, computers in North Korea typically used Red Hat Linux, and later switched to modified versions of Microsoft Windows with North Korean language packs installed.
Version 3.0 was released in the summer of 2013, but , version 1.0 continues to be more widely used. It is offered only in a Korean language edition, localized with North Korean terminology and spelling.
Specifications
Red Star OS features a modified Mozilla Firefox browser called Naenara ("My country" in Korean), which is used for browsing the Naenara web portal on North Korea's national intranet known as Kwangmyong. Naenara comes with two search engines. Other software includes a text editor, an office suite, an e-mail client, audio and video players, a file sharing program, and video games. Version 3, like its predecessors, utilizes Wine, a compatibility layer that allows Windows programs to be run under Linux.
The operating system utilizes customized versions of KDE Software Compilation. Earlier versions had KDE 3-based desktops. Version 3.0 closely resembles Apple's macOS, whereas previous versions more closely resembled Windows XP; current North Korean leader Kim Jong-un was seen with an iMac on his desk in a 2013 photo, indicating a possible connection to the redesign.
Media attention
The Japan-based North Korea-affiliated newspaper Choson Sinbo interviewed two Red Star OS programmers in June 2006. English-language technology blogs, including Engadget and OSnews, as well as South Korean wire services such as Yonhap, went on to repost the content. In late 2013, Will Scott, who was visiting the Pyongyang University of Science and Technology, purchased a copy of version 3 from a KCC retailer in southern Pyongyang, and uploaded screenshots to the internet.
In 2015, two German researchers speaking at the Chaos Communication Congress described the internal operation of the OS. The North Korean government wants to track the underground market of USB flash drives used to exchange foreign films, music and writing, so the system watermarks all files on portable media attached to computers.
History
Version 1.0/Beta
The first version appeared in 2008. It is very reminiscent of the Windows XP operating system.
It featured the "Naenara" web browser, based on Mozilla Firefox, and an Office suite based on Open Office, called "Uri 2.0". Wine is also included.
One copy has been leaked online. The screenshots of the operating system were officially published by KCNA and discovered by South Korean news sites.
Version 2.0
The development of version 2.0 began in March 2008, and was completed on June 3 2009. Like its predecessor, its appearance resembles Windows XP, and was priced at 2000 North Korean won (approx. US$15).
The "Naenara" internet browser is also included in this version. The browser was released on 6 August 2009, as part of the |
https://en.wikipedia.org/wiki/RAPID | RAPID is a high-level programming language used to control ABB industrial robots. RAPID was introduced along with the S4 Control System in 1994 by ABB, superseding the ARLA programming language.
Features in the language include:
Routine parameters:
Procedures - used as a subprogram.
Functions - return a value of a specific type and are used as an argument of an instruction.
Trap routines - a means of responding to interrupts.
Arithmetic and logical expressions
Automatic error handling
Modular programs
Multi tasking
See also
KUKA Robot Language
G-code
External links
"Programming in Rapid (Reference)"
"ABB RobotStudio Manual (With Rapid Reference)"
Further reading
ABB Robotics Products AB, RAPID Reference Manual
ABB
Programming languages created in 1994
Robot programming languages |
https://en.wikipedia.org/wiki/Nvidia%20Optimus | Nvidia Optimus is a computer GPU switching technology created by Nvidia which, depending on the resource load generated by client software applications, will seamlessly switch between two graphics adapters within a computer system in order to provide either maximum performance or minimum power draw from the system's graphics rendering hardware.
A typical platform includes both a lower-performance integrated graphics processor by Intel/AMD and a high-performance one by Nvidia. Optimus saves battery life by automatically switching the power of the discrete graphics processing unit (GPU) off when it is not needed and switching it on when needed again. The technology mainly targets mobile PCs such as notebooks. When an application is being launched that is determined to benefit from the performance of the discrete GPU, the discrete GPU is powered up and the application is served by a rendering context via that GPU. Otherwise the application is served by a rendering context that uses the integrated GPU. Switching between the graphics processors is designed to be completely seamless and to happen "behind the scenes".
Official supported operating systems by Nvidia are Microsoft Windows and Linux. A project called Bumblebee is an alternative open source implementation of Optimus support for Linux.
Operation
When a user launches an application, the graphics driver tries to determine whether the application would benefit from the discrete GPU. If so, the GPU is powered up from an idle state and is passed all rendering calls. Even in this case, though, the integrated graphics processor (IGP) is used to output the final image. When less demanding applications are used, the IGP takes sole control, allowing for longer battery life and less fan noise. Under Windows the Nvidia driver also provides the option to manually select the GPU in the right-click menu upon launching an executable.
Within the hardware interface layer of the Nvidia GPU driver, the Optimus Routing Layer provides intelligent graphics management. The Optimus Routing Layer also includes a kernel-level library for recognizing and managing specific classes and objects associated with different graphics devices. This Nvidia innovation performs state and context management, allocating architectural resources as needed for each driver client (i.e., application). In this context-management scheme, each application is not aware of other applications concurrently using the GPU.
By recognizing designated classes, the Optimus Routing Layer can help determine when the GPU can be utilized to improve rendering performance. Specifically, it sends a signal to power-on the GPU when it finds any of the following three call types:
DX Calls: Any 3D game engine or DirectX application will trigger these calls
DXVA Calls: Video playback will trigger these calls (DXVA = DirectX Video Acceleration)
CUDA Calls: CUDA applications will trigger these calls
Predefined profiles also assist in determining whether |
https://en.wikipedia.org/wiki/I%20Say%20Good-bye | "I Say Good-bye" is a song written by Akinori Nakagawa and the theme song of the Japanese TV drama Saigo no Kazoku.
Track listing
References
External links
Official Discography
JBook data
Akinori Nakagawa songs
2001 singles
Japanese television drama theme songs
2001 songs
Songs written by Akinori Nakagawa |
https://en.wikipedia.org/wiki/CAP%20theorem | In theoretical computer science, the CAP theorem, also named Brewer's theorem after computer scientist Eric Brewer, states that any distributed data store can provide only two of the following three guarantees:
Consistency Every read receives the most recent write or an error.
Availability Every request receives a (non-error) response, without the guarantee that it contains the most recent write.
Partition tolerance The system continues to operate despite an arbitrary number of messages being dropped (or delayed) by the network between nodes.
When a network partition failure happens, it must be decided whether to do one of the following:
cancel the operation and thus decrease the availability but ensure consistency
proceed with the operation and thus provide availability but risk inconsistency.
Thus, if there is a network partition, one has to choose between consistency or availability. Note that consistency as defined in the CAP theorem is quite different from the consistency guaranteed in ACID database transactions.
Explanation
No distributed system is safe from network failures, thus network partitioning generally has to be tolerated. In the presence of a partition, one is then left with two options: consistency or availability. When choosing consistency over availability, the system will return an error or a time out if particular information cannot be guaranteed to be up to date due to network partitioning. When choosing availability over consistency, the system will always process the query and try to return the most recent available version of the information, even if it cannot guarantee it is up to date due to network partitioning.
In the absence of a partition, both availability and consistency can be satisfied.
Database systems designed with traditional ACID guarantees in mind such as RDBMS choose consistency over availability, whereas systems designed around the BASE philosophy, common in the NoSQL movement for example, choose availability over consistency.
History
According to University of California, Berkeley computer scientist Eric Brewer, the theorem first appeared in autumn 1998. It was published as the CAP principle in 1999 and presented as a conjecture by Brewer at the 2000 Symposium on Principles of Distributed Computing (PODC). In 2002, Seth Gilbert and Nancy Lynch of MIT published a formal proof of Brewer's conjecture, rendering it a theorem.
In 2012, Brewer clarified some of his positions, including why the often-used "two out of three" concept can be somewhat misleading because system designers only need to sacrifice consistency or availability in the presence of partitions; partition management and recovery techniques exist. Brewer also noted the different definition of consistency used in the CAP theorem relative to the definition used in ACID.
A similar theorem stating the trade-off between consistency and availability in distributed systems was published by Birman and Friedman in 1996. Birman and Friedm |
https://en.wikipedia.org/wiki/Mulhouse%20tramway | The Mulhouse tramway (; ) is a tram network in the French city of Mulhouse in Alsace, France. It commenced service in 2006, and now comprises three purely tram lines, plus one hybrid tram-train line.
Tram services
The three pure tram lines intersect at Porte Jeune stop in central Mulhouse, and comprise:
Line from Gare Centrale to Châtaignier
Line from Nouveau Bassin to Coteaux
Line from Gare Central to Lutterbach
Lines 1 and 2 were put into service in 2006, whilst line 3 is a short working of the tram-train line and opened in December 2010 with that line. Extensions are planned for line 1, from Châtaignier to Bosquets du Roy, and for line 2, from Nouveau Bassin to Jonquilles.
The network is electrified at using overhead power collection. Services are provided by a fleet of twenty-two long Alstom Citadis 302 trams. Both the network and the trams are operated by Soléa, who also operate the city's bus network, on behalf of the Mulhouse Alsace Agglomération (MAA).
Tram-train services
The tram-train line runs from Gare Central to Thann, with a proposed extension to Kruth. The line follows the existing tracks of lines 1 from Gare Central to Porte Jeune, and line 2 from there to Daguerre. Here it diverges onto a section of new tram track built parallel to the Paris–Mulhouse main line railway as far as Lutterbach. This line, which is a mixture of single and double track, and electrified at 750 V DC, is used by both the tram-train service and the purely tram line 3.
At Lutterbach, a connection is made to the existing railway line to Thann and Kruth. This line is electrified at between Lutterbach and Thann St Jacques (the former Thann Nord), and is single track with passing loops. It carries both the tram-train service and an SNCF diesel railcar service to Kruth, which uses the main railway line between Lutterbach and Gare Central. Freight trains also run at night.
A second phase of the line will involve extending the electrification as far as Kruth, allowing tram-trains to run through to there, and also allowing the SNCF to replace the diesel railcar service with an electric unit. However no timescales are in place for this.
The tram-train service uses 12 long Siemens Avanto tram-trains. These units were financed, and are owned, jointly by the Alsace region and the MAA. The drivers come from SNCF (75%) and Soléa (25%). The line as far as Lutterbach is Soléa's responsibility, with the SNCF taking responsibility from there to Thann and Kruth.
See also
Trams in France
List of town tramway systems in France
References
External links
Mulhouse
Tram transport in France
Transport in Grand Est
750 V DC railway electrification
25 kV AC railway electrification
Mulhouse |
https://en.wikipedia.org/wiki/GraphCrunch | GraphCrunch is a comprehensive, parallelizable, and easily extendible open source software tool for analyzing and modeling large biological networks (or graphs); it compares real-world networks against a series of random graph models with respect to a multitude of local and global network properties. It is available here.
Motivation
Recent technological advances in experimental biology have yielded large amounts of biological network data. Many other real-world phenomena have also been described in terms of large networks (also called graphs), such as various types of social and technological networks. Thus, understanding these complex phenomena has become an important scientific problem that has led to intensive research in network modeling and analyses.
An important step towards understanding biological networks is finding an adequate network model. Evaluating the fit of a model network to the data is a formidable challenge, since network comparisons are computationally infeasible and thus have to rely on heuristics, or "network properties." GraphCrunch automates the process of generating random networks drawn from a series of random graph models and evaluating the fit of the network models to a real-world network with respect to a variety of global and local network properties.
Features
GraphCrunch performs the following tasks:
1) computes user specified global and local properties of an input real-world network,
2) creates a user specified number of random networks belonging to user specified random graph models,
3) compares how closely each model network reproduces a range of global and local properties (specified in point 1 above) of the real-world network, and
4) produces the statistics of network property similarities between the data and the model networks.
Network models supported by GraphCrunch
GraphCrunch currently supports five different types of random graph models:
Erdös-Rényi random graphs;
random graphs with the same degree distribution as the data;
Barabási-Albert preferential-attachment scale-free networks;
n-dimensional geometric random graphs (for all positive integers n); and
stickiness model networks.
Network properties supported by GraphCrunch
GraphCrunch currently supports seven global and local network properties:
degree distribution;
clustering coefficient;
clustering spectrum;
average diameter;
spectrum of shortest path lengths;
relative graphlet frequency distance; and
graphlet degree distribution agreement.
Installation and usage
Instructions on how to install and run GraphCrunch are available at https://web.archive.org/web/20100717040957/http://www.ics.uci.edu/~bio-nets/graphcrunch/.
Applications
GraphCrunch has been used to find an optimal network model for protein-protein interaction networks, as well as for protein structure networks.
References
External links
http://bio-nets.doc.ic.ac.uk/graphcrunch2/
Graph theory |
https://en.wikipedia.org/wiki/Ringo%27s%20Yellow%20Submarine | Ringo's Yellow Submarine was a 60-minute weekly radio show hosted by Ringo Starr, airing on the ABC Radio Network, starting from June 4, 1983, with the last show airing on November 26, 1983. The first 25 shows featured different songs, either from the Beatles days or solo days, with occasional stories from Ringo himself about one of the songs or about being a Beatle, with the 26th and final show being a call-in show.
ABC distributed the show again in the summer of 1984.
References
1980s American radio programs
ABC radio programs
The Beatles' Yellow Submarine
American music radio programs
Radio programmes about the Beatles
Ringo Starr |
https://en.wikipedia.org/wiki/Command%20substitution | In computing, command substitution is a facility that allows a command to be run and its output to be pasted back on the command line as arguments to another command. Command substitution first appeared in the Bourne shell, introduced with Version 7 Unix in 1979, and has remained a characteristic of all later Unix shells. The feature has since been adopted in other programming languages as well, including Perl, PHP, Ruby and Microsoft's Powershell under Windows. It also appears in Microsoft's CMD.EXE in the FOR command and the ( ) command.
Syntax and semantics
Shells typically implement command substitution by creating a child process to run the first command with its standard output piped back to the shell, which reads that output, parsing it into words separated by whitespace. Because the shell can't know it has all the output from the child until the pipe closes or the child dies, it waits until then before it starts another child process to run the second command.
This C shell example shows how one might search for all the C files containing the string malloc using fgrep and then edit any that are found using the vi editor. The syntactical notation shown here, ` ... `, using backquotes as delimiters, is the original style and is supported by all the common Unix shells.
#!/bin/csh
vi `fgrep -l malloc *.c`
Objections have been raised to both the syntax, how it's typed, and the semantics, how it works.
While easy to type, an important factor for an interactive command processor, the syntax has been criticized as awkward to nest, putting one command substitution inside another, because both the left and the right delimiters are the same. The KornShell (ksh) solved this with an alternative notation, $( ... ), borrowing from the notational style used for variable substitution. Today, most UNIX shells support this syntax. Microsoft's PowerShell also uses this notation, with the same semantics.
#!/bin/bash
vi $(fgrep -l malloc *.c)
The semantics, breaking the output into words at whitespace, has also been criticized. It worked well on early Unix systems where filenames never contained spaces but it doesn't work at all well on modern Windows and Linux systems where filenames certainly can contain spaces. In either of these previous examples, if any of the filenames matched by the *.c wildcard contains a space, that filename will be broken into two separate arguments to vi, clearly not what was intended. Hamilton C shell solved this with a double backquote notation, `` ... ``, that parses into words only at line breaks.
This is an example of command substitution
using the () operator in PowerShell:
$MyVariable = (ls)
echo $MyVariable
Expression substitution
A related facility, expression substitution, is found in the languages Common Lisp and Scheme, invoked by using the comma-at operator in an expression marked with the backquote (or "quasiquote") operator, and in ABC, by using an expression enclosed between backquotes inside a te |
https://en.wikipedia.org/wiki/Capturx | Capturx is a no-code mobile software platform for use with digital pens or any modern touch screen device, designed for organizations to automate paper-based data collection and similar operations. Paper survives because it is easy and reliable- but paper-based workflows include manual labor like scanning and data entry. Data on paper frequently languishes in the field, waiting to get delivered, scanned, re-typed, or is subject to misinterpretation during transcription.
The challenge Capturx attempts to tackle is process reengineering of paper based processes. Capturx works as an add-in with Microsoft Office Excel, and SharePoint, passing structured handwritten paper forms or data captured with touch screen devices into a SharePoint database and further integrated into corporate databases.
The add-in software works with digital pens from NeoLab Convergence. NeoLab also created the technology behind the digital pattern that helps the digital pens to track the data. The pattern is like a digital fingerprint making each printed page unique to each application and file, as the pen writes it stores the handwriting digitally for integration into the native application of the paper document.
The software and digital pens are typically used for field service, data collection, note taking, compliance, and red line markups of building plans.
Maker of Capturx Software
Capturx commercial products are produced by Field Data Integrators LLC (FDI) www.fielddataintegrators.com (formerly Adapx, Inc.), a natural user interface software company. FDI is a continuation of the Adapx, Inc. effort, which was started in 1999. FDI is based in Olympia, WA.
Capturx defense related products are produced by Hyssos Tech LLC www.hyssos.com. Capturx Speech and Sketch is a multimodal solution focused toward Military, Intel and Public Safety organizations. Hyssos Tech LLC is the developer of this product, supporting foreign and domestic defense agencies, for example Multimodal technology from Hyssos (during the Adapx years) has been part of the Defense Advanced Research Projects Agency (DARPA) Deep Green project to develop a decision-making support system for the United States Army.
References
Touch user interfaces |
https://en.wikipedia.org/wiki/Mobile%20phone%20industry%20in%20Russia | Mobile phone industry in Russia is an trade industry of cell phone devices and mobile network services in Russia. Since the collapse of the Soviet Union in the 1991 it had seen a great expansion over the last decades becoming one of the largest in the world. In terms of number of smartphone users, Russia is the 4th biggest smartphone market in the world sitting behind only China, India, and USA.
History
In 1963, USSR's first mobile phone network using the car phone came into operation.
Initial selection of technological mobile standard in Russia had been left for market forces by issuing licenses for different standards. Later, regulatory authorities have developed stricter policy. However, there still exists a great variety of both analogue and digital standards. NMT standard was a first generation analogue mobile technology that still has footstep in Russia, employed by commercial mobile operators since the early 90s.
Regional operators have deployed the GSM networks in Russia since 1995, originally in the 900 MHz frequency band. GSM standard is dominating in Russian mobile market with small number of NMT-450, AMPS/DAMPS subscribers.
In 1994, a joint venture of Moscow City Telephone Network, T-Mobile and Siemens, which later became part of Mobile TeleSystems, offered Russia's first mobile phone service for the public in Moscow. In the same year in June, VimpelCom also started Beeline mobile phone service.
In 2002, MegaFon was formed to provide all-Russia service, amalgamating Sonic Duo of Moscow, Mobikom-Novosibirsk, and other companies. In that year also, the number of mobile subscribers in Russia soared by 130% to 18mn, implying penetration of 12.3%, compared with 5.4% at the end of the previous year. The continued strong growth of the cellular subscriber base was largely due to the accelerating regional rollout of the major national cellular operators. In 2007, MegaFon started Russia's first 3G service in Saint Petersburg.
Russian WiMAX operator Scartel (Yota brand), finished in 2010 its implementation of a trial LTE network in Kazan and plans to deploy LTE networks in Novosibirsk and Samara. In July 2010 Scartel received approval from regulator Roskomnadzor to abandon WiMAX for LTE, re-using its existing spectrum. the regulator had however previously insisted that the frequencies allocated to Scartel for WiMAX could not be used for other access types.
On the Amur Highway at the beginning of October 2011 MTS, Vimpelcom and Megaphone completed the construction of a joint network to provide mobile communication. Operators built across the highway 102 towers (of 140 towers) for base stations, 32 of which have launched MTS and "MegaFon" and 38 by VimpelCom, now Veon Ltd (due to the fact that it has only in the Far East 3G licenses, and in some regions of the Federation, GSM-1800).
The 2012 tender of the Ministry of Communications awarded licenses to deploy LTE networks in the lower (720–790 MHz, 791–862 MHz) and upper (2500–2690 MHz) ban |
https://en.wikipedia.org/wiki/MTV%20%28British%20and%20Irish%20TV%20channel%29 | </noinclude>
MTV is a British pay television channel focusing on reality TV and music programming operated by Paramount Networks UK & Australia.
The channel launched as part of MTV Networks Europe localisation strategy in 1997. MTV UK (previously MTV UK & Ireland; MTV One) was launched on 1 July 1997. The channel was set up to provide audiences with local artists and more relevant music content. Prior to the localisation of MTV in Europe, the region was served by MTV Europe which was launched on 1 August 1987. Since February 2011 MTV has been solely an entertainment channel.
The channel is in over 10 million homes in the UK and Ireland.
Availability
From its inception, MTV UK (then branded as MTV UK & Ireland) the network served United Kingdom and Ireland. For a short period the channel was made available free-to-air in New Zealand between July 1997 to June 1998
under a special agreement between TVNZ and MTV Networks Europe. The channel was broadcast on analogue from the Astra 1A satellite as part of the Sky Multichannels subscription package. In April 2001, the channel became a digital-only channel within the UK and Ireland.
History
1987–2001
MTV first became available in the UK when MTV Europe launched on 1 August 1987. On July 1, 1997, at 06:00 Western European time, MTV UK began broadcasting in the UK and Ireland. The first video clip shown on the air was "Three Lions" by The Lightning Seeds.
MTV UK & Ireland was launched on 1 July 1997 as part of MTV Networks Europe's regionalisation strategy. MTV launched a UK and Ireland specific channel to target existing competition within the market. MTV UK & Ireland launched with specialised content of hit MTV Europe shows which included the Euro Top 20, MTV Select, MTV News, MTV News Weekend Edition, Non-Stop Hits, US Top 20 Hitlist UK, Stylissimo, The Big Picture, Up 4 It and The Lick. The channel promoted mainly English-speaking music programming and music.
In 1999, MTV Networks Europe announced that it would expand its channel portfolio within the UK and Ireland. On 1 July 1999, MTV launched MTV Base and MTV Extra. MTV UK & Ireland also rebranded with a new schedule and on-air presentation.
2002–2010
In 2002, MTV began to air programming from MTV US, similar to other MTV channels in Europe. MTV began to drop some of its localised programming in favour of MTV US shows. These shows included Jackass, Date My Mom and Dismissed. Despite targeted efforts to play certain types of music videos in limited rotation, MTV greatly reduced its overall rotation of music videos throughout the first decade of the 2000s. While music videos dominated the channel in early 2000-2002 the rate of music rotation declined rapidly. Similar trends are noted on other European MTV channels and other sister networks in the US.
In July 2007, MTV in the UK was renamed to 'MTV One' with a major new branding launching across most of the MTV channels. MTV2 was renamed 'MTV Two' to follow the consistent branding across the c |
https://en.wikipedia.org/wiki/Adult%20Check | Adult Check, Inc. was an American company that created and hosted one of the first and largest online age verification services. The network of web sites using the Adult Check verification system reached as many as 400,000 and the Adultcheck.com domain was ranked in the top 100 most visited internet web sites as late as 1999.
Background
Cybernet Ventures, Inc., the parent company of Adult Check, was launched in mid 90's by Laith Alsarraf (a UCLA dropout who scrapped his struggling Web site design business) and Vardan Sarkisov.
Age verification services (AVS) arose as an effort to limit access by minors to adult sites by providing access to a large number of sites through a common ID and password. Cybernet Ventures, Inc. created the Adult Check system when the Communications Decency Act of 1996 allowed websites to let visitors prove they were adults by using credit cards. For a fee, customers bought an Adult Check password that unlocked hundreds of thousands of sites, and operators of these sites (webmasters) received a commission.
The company charged $19.95 for a one-year membership, $29.95 for 2 years, and a lifetime membership was $76.95. The company ran on an affiliate marketing model and paid out 50% commissions to adult site owners who referred them members.
Forbes estimated Adult Check's annual revenue as $320 million in 2001.
Legal cases
Perfect 10 lawsuit
On April 22, 2002, California courts issued a preliminary injunction against Cybernet Ventures that allowed courts to hear a case by Perfect 10 Magazine, who claimed copyright infringement by some of the sites protected by the Adult Check system. Perfect 10 charged that Adult Check and Cybernet could not seek safe harbor of the Digital Millennium Copyright Act, 17 U.S.C. § 512, since they benefitted financially, if indirectly, from these sites. The injunction directed Cybernet to preemptively block access to any website containing the prohibited content.
The injunction was landmark because it opened the door to a broader definition of online liability. Perfect 10 proceeded to file lawsuits against even bigger companies, including Google, Amazon.com, Visa and MasterCard, but was unsuccessful. Similar adult and non-adult content companies sought legal action against intermediary companies like these in lieu of suing small site operators in hopes of big financial settlements.
AgeCheck Lawsuit
AgeCheck, a competitor of AdultCheck that had about 250,000 member sites in 2001, was started by 3 Armenian carpenters that worked for Adult Check's co-founder and started a similar business. AdultCheck sued and forced them to change their name to CyberAge.
References
Online companies of the United States
Pornography
Age verification |
https://en.wikipedia.org/wiki/University%20of%20Computer%20Studies%2C%20Kalay | The University of Computer Studies, Kalay (UCSK) (), is an IT and computer science university of Myanmar. The university offers bachelor's and master's aprograms in computer science and technology. It was opened on 27, September 2001 as Government Computer College (GCC). It was promoted as Computer University on 20, January 2007. UCSK is located 10 miles from Kalaymyo, Sagaing Region and 14 miles from Kalewa, near Ayethayar village. It has 38.6 acres.
Objectives
To produce more experts who have the practical ability to invent, install, repair, experiment with, and apply computer hardware and software with a view to making Myanmar a modern and developed nation.
To foster the outstanding products of the University to become high caliber experts.
To conduct research contributing to the welfare of the nation and to carry out research and development activities on Information Technology utilizing the high caliber experts.
To make the use of computer proliferate all over the country.
Department
Software Department
Hardware Department
Information Science Department
Application Department
English Department
Physics Department
Myanmar Department
Mathematics Department
Cloud Computing Department
Programs
Graduate Programs
Post Graduate Programs
Under Graduate Programs
References
Technological universities in Myanmar |
https://en.wikipedia.org/wiki/Techila%20Grid | Techila Distributed Computing Engine (earlier known as Techila Grid) is a commercial grid computing software product. It speeds up simulation, analysis and other computational applications by enabling scalability across the IT resources in user's on-premises data center and in the user's own cloud account. Techila Distributed Computing Engine is developed and licensed by Techila Technologies Ltd, a privately held company headquartered in Tampere, Finland. The product is also available as an on-demand solution in Google Cloud Launcher, the online marketplace created and operated by Google. According to IDC, the solution enables organizations to create HPC infrastructure without the major capital investments and operating expenses required by new HPC hardware.
Product features
Techila Distributed Computing Engine is a distributed computing middleware and management solution, which can be used to access and manage on-premises and cloud IT resources for various high-performance computing (HPC) computing uses, including high-throughput computing (HTC) scenarios. It creates a scalable computing service and execution environment that can also support applications that are deployed within production environments.
The technology of Techila Distributed Computing Engine is built on an autonomic computing architecture that is patented by Techila Technologies. This has enabled features such as automated system management and fault tolerance, which simplify the deployment, use and administration of large-scale distributed computing systems.
Architecture
Techila Server
Techila Server is a Java-based software product, which optimizes the performance of a Techila Distributed Computing Engine environment and the jobs in it. The optimization done by Techila Server supports not only large jobs, but also makes the system suitable for running small computational jobs. The performance of Techila Distributed Computing Engine in different scenarios was evaluated in a thesis at Tampere University of Technology.
Originally, the Techila Server was delivered as an embedded appliance. The embedded appliance product was discontinued in 2012. Currently, Techila Server is delivered either as a virtual appliance or using cloud-specific deployment tools.
Techila Worker
Techila Worker is the software agent that must be installed on each computer that will participate in a Techila Distributed Computing Engine environment. The computers can be physical, or they can be virtualized computers running on a hypervisor or in a cloud virtual machine. Techila Distributed Computing Engine supports following public cloud services: Microsoft Azure, Amazon ec2 and Google Compute Engine. Once the Techila Worker software is installed on a computer, it will authenticate the computer to the Techila Server using a certificate, and the system will use self-management to automatically configure the computer to run jobs received from the Techila Server.
Techila Worker is a Java-based client middl |
https://en.wikipedia.org/wiki/Owaranai%20Christmas | "Owaranai Christmas" is a song written by Shinji Harada.
Track listing
External links
Owaranai Christmas Official site
Official Discography
JBook data
Akinori Nakagawa songs
2007 singles
2007 songs |
https://en.wikipedia.org/wiki/Samsung%20N130 | The Samsung N130 (Samsung SENS N130 in South Korea) is a subnotebook/netbook computer designed by Samsung. At the time of its introduction, it was noted for a good keyboard, large 6-cell battery as standard, giving a battery life of up to 7.5 hours a medium 160gb SATA hard disk drive and a release price of 349 USD.
Technical overview
Processor and memory
The Samsung N130 uses a 1.6 GHz Intel Atom N270 processor. The N130 has 1 GB of 200-pin PC2-6400 800MHz DDR2 SDRAM memory as standard. Internally, the N130 has one slot for memory accepting SO-DIMM memory modules up to 2 GB.
Display
The screen is a non-glossy LED backlit display and measures 10.1 inches diagonally, and has a resolution of 1024×600 pixels. An external VGA out is also included.
Keyboard
As with earlier models, the 83-key keyboard is 93% of the size of a full-size keyboard, which makes typing quite easy on the netbook. The keyboard is made with Silver Nano (Anti-Bacterial) technology.
Storage
The standard internal hard drive size is 160 GB. It also includes an SD card slot, supporting MMC, SD and SDHC cards for additional storage as a standard features of this netbook series.
Operating systems
The N130 is shipped either with Windows XP Home Edition, Windows Vista Business or Windows 7 Starter. Linux (e.g. Ubuntu, Mandriva) distributions are also supported.
Colors and configurations
The N130 is available in different colors and configurations. Colors include white, black, blue and pink. The configurations may differ in the lack of Bluetooth, e.g. some models in German markets, the fitting of a UMTS/HSDPA module, a weaker battery.
The new model N140 is an upgrade of the basic N130 design, with modified touchpad, Bluetooth 2.0+EDR (standard configuration) and improved styling.
Criticism
Some users noticed a keyboard typing problem because the placement of the Page up, Backspace and Page down keys was considered troublesome.
See also
Comparison of netbooks
References
External links
N130 official page
Samsung N130 - Community Site
Netbooks
N130 |
https://en.wikipedia.org/wiki/Graphlets | Graphlets in mathematics are induced subgraph isomorphism classes in a graph, i.e. two graphlet occurrences are isomorphic, whereas two graphlets are non-isomorphic. Graphlets differ from network motifs in a statistical sense, network motifs are defined as over- or under-represented graphlets with respect to some random graph null model.
Graphlet-based network properties
Relative graphlet frequency distance
RGF-distance compares the frequencies of the appearance of all 3-5-node graphlets in two networks. Let Ni(G) be the number of graphlets of type () in network G, and let be the total number of graphlets of G. The "similarity" between two graphs should be independent of the total number of nodes or edges, and should depend only upon the differences between relative frequencies of graphlets. Thus, relative graphlet frequency distance D(G,H) between two graphs G and H is defined as:
,
where . The logarithm of the graphlet frequency is used because frequencies of different graphlets can differ by several orders of magnitude and the distance measure should not be entirely dominated by the most frequent graphlets.
Graphlet degree distribution agreement
GDD-agreement generalizes the notion of the degree distribution to the spectrum of graphlet degree distributions (GDDs) in the following way. The degree distribution measures the number of nodes of degree k in graph G, i.e., the number of nodes "touching" k edges, for each value of k. Note that an edge is the only graphlet with two nodes. GDDs generalize the degree distribution to other graphlets: they measure for each 2-5-node graphlet Gi, , such as a triangle or a square, the number of nodes "touching" k graphlets Gi at a particular node. A node at which a graphlet is "touched" is topologically relevant, since it allows us to distinguish between nodes "touching", for example, a three node path at an end node or at the middle node. This is summarized by automorphism orbits (or just orbits, for brevity): by taking into account the "symmetries" between nodes of a graphlet, there are 73 different orbits across all 2-5-node graphlets (see [Pržulj, 2007] for details).
For each orbit j, one needs to measure the jth GDD, dGj(k), i.e., the distribution of the number of nodes in G "touching" the corresponding graphlet at orbit j k times. Clearly, the degree distribution is the 0th GDD. dGj(k) is scaled as
to decrease the contribution of larger degrees in a GDD and then normalized with respect to its total area
giving the "normalized distribution"
.
The jth GDD-agreement compares the jth GDDs of two networks.
For two networks G and H and a particular orbit j, the "distance" Dj(G,H) between their normalized jth GDDs is:
.
The distance is between 0 and 1, where 0 means that G and H have identical jth GDDs, and 1 means that their jth GDDs
are far away. Next, Dj(G,H) is reversed to obtain the jth GDD-agreement:
, for .
The total GDD-agreement between two networks G and H is the arithmetic or t |
https://en.wikipedia.org/wiki/Graph%20Aligner | Graph Aligner (GRAAL) is an algorithm for global network alignment that is based solely on network topology. It aligns two networks and by producing an alignment that consists of a set of ordered pairs , where is a node in and is a node in . GRAAL matches pairs of nodes originating in different networks based on their graphlet degree signature similarities, where a higher similarity between two nodes corresponds to a higher topological similarity between their extended neighborhoods (out to distance 4). GRAAL produces global alignments, i.e., it aligns each node in the smaller network to exactly one node in the larger network. The matching proceeds using a technique analogous to the "seed and extend" approach of the popular BLAST algorithm for sequence alignment: it first chooses a single "seed" pair of nodes (one node from each network) with high graphlet degree signature similarity. It then expands the alignment radially outward around the seed as far as practical using a greedy algorithm (see [Kuchaiev et al., 2010] for details).
Method
When aligning two graphs and , GRAAL first computes costs of aligning each node in G with each node in . The cost of aligning two nodes takes into account the graphlet degree signature similarity between them, modified to reduce the cost as the degrees of both nodes increase, since higher degree nodes with similar signatures provide a tighter constraint than correspondingly similar low degree nodes. In this way, GRAAL align the densest parts of the networks first. Let be the degree of a node in network , let be the maximum degree of nodes in , let be the graphlet degree signature similarity of nodes and , and let be a parameter in [0, 1] that controls the contribution of the node signature similarity to the cost function (that is, is the parameter that controls the contribution of node degrees to the cost function), then the cost of aligning nodes and is computed as:
.
A cost of corresponds to a pair of topologically identical nodes and , while a cost close to corresponds to a pair of topologically different nodes.
GRAAL chooses as the initial seed a pair of nodes , and , that have the smallest cost. Ties are broken randomly. Once the seed is found, GRAAL builds "spheres" of all possible radii around nodes and . A sphere of radius around node is the set of nodes that are at distance from , where the distance is the length of the shortest path from to . Spheres of the same radius in two networks are then greedily aligned together by searching for the pairs and that are not already aligned and that can be aligned with the minimal cost. When all spheres around the seed have been aligned, some nodes in both networks may remain unaligned. For this reason, GRAAL repeats the same algorithm on a pair of networks for and , and searches for the new seed again, if necessary. Network is defined as a new network having the same set of nodes as and having if and only if the dista |
https://en.wikipedia.org/wiki/The%20Power%20of%20Madonna | "The Power of Madonna" is the fifteenth episode of the American television series Glee. The episode premiered on the Fox network on April 20, 2010. When cheerleading coach Sue Sylvester (Jane Lynch) demands that Madonna's music be played over the school intercom system, glee club director Will Schuester (Matthew Morrison) sets the club a Madonna-themed assignment, hoping to empower the female club members. "The Power of Madonna" was written and directed by series creator Ryan Murphy, and serves as a musical tribute to Madonna, featuring cover versions of eight of her songs, with the singer having granted Glee the rights to her entire catalogue of music. Glee: The Music, The Power of Madonna, an album containing studio recordings of songs performed in the episode, was released on April 20, 2010.
The episode was watched by 12.98 million American viewers, and was generally well received by critics. Tim Stack of Entertainment Weekly and Aly Semigran of MTV both deemed it the best episode of the show thus far, and the Houston Chronicle Bobby Hankinson called it potentially "the most-enjoyable hour of television of all time." Other reviews were more mixed, with Emily VanDerWerff of The A.V. Club criticizing the increasing number of musical performances for disrupting the tonal balance of the show, and IGNs Eric Goldman questioning the series' writing. Madonna herself approved of the episode, calling it "brilliant on every level".
The episode won "Outstanding Sound Mixing For A Comedy Or Drama Series (One Hour)" at the Creative Arts Emmy Awards, while Jane Lynch won the Primetime Emmy Award for Outstanding Supporting Actress in a Comedy Series for her performance in this episode.
Plot
Cheerleading coach Sue Sylvester (Jane Lynch) has the Cheerios emulate Madonna, so that they will be more empowered in their cheerleading routines. Continuing her blackmail of Principal Figgins (Iqbal Theba), Sue has Madonna tracks played over the school intercom throughout the day. Glee club director Will Schuester (Matthew Morrison) overhears the girls in the club discussing difficulties they are having in relationships and life. Rachel (Lea Michele) asks the other girls for advice on a boy pressuring her to have sex, while Tina (Jenna Ushkowitz) tells them that Artie (Kevin McHale) has asked her to start wearing more revealing clothes if she wants to be with him. When Will observes the Cheerios performing a routine with stilts to "Ray of Light", he is inspired to set a Madonna-themed assignment to restore the girls to equal status. Most of the male club members are unimpressed, even when the girls perform "Express Yourself". Club co-captains Rachel and Finn (Cory Monteith) practice performing a mash-up of "Borderline" and "Open Your Heart".
When Will ridicules Sue's fashion sense, Kurt (Chris Colfer) and Mercedes (Amber Riley) give her a makeover, recreating Madonna's "Vogue" video. Guidance counselor Emma Pillsbury (Jayma Mays) is inspired by Madonna's example, and |
https://en.wikipedia.org/wiki/List%20of%20data%20deficient%20plants | As of September 2016, the International Union for Conservation of Nature (IUCN) lists 1674 data deficient plant species. 7.6% of all evaluated plant species are listed as data deficient.
The IUCN also lists 18 subspecies and 57 varieties as data deficient. No subpopulations of plants have been evaluated by the IUCN.
This is a complete list of data deficient plant species, subspecies and varieties evaluated by the IUCN.
Algae
There are 49 alga species evaluated as data deficient.
Green algae
Ectochaete perforans
Rhizoclonium robustum
Red algae
Charophyta
Bryophytes
There are seven bryophyte species evaluated as data deficient.
Mosses
Liverworts
Pteridophytes
There are 58 pteridophyte species evaluated as data deficient.
Leptosporangiate ferns
There are 50 species in the class Polypodiopsida evaluated as data deficient.
Polypodiales
There are 42 species in the order Polypodiales evaluated as data deficient.
Dryopteridaceae
Polypodiaceae
Blechnaceae
Tectariaceae
Other Polypodiales species
Hymenophyllales
Cyatheales
Cyathea cystolepis
Isoetopsida
Gymnosperms
There are 20 species and 16 varieties of gymnosperm evaluated as data deficient.
Cycads
Conifers
Species
Varieties
Gnetopsida
Dicotyledons
There are 1087 species, 17 subspecies, and 36 varieties of dicotyledon evaluated as data deficient.
Piperales
Species
Varieties
Piper lucigaudens var. alleni
Campanulales
Theales
Species
Varieties
Symphonia globulifera var. angustifolia
Malvales
Species
Varieties
Elaeocarpus calomala var. villosiusculus
Polygalales
Rubiales
Species
Varieties
Violales
Euphorbiales
Euphorbiaceae
Species
Subspecies
Phyllanthus nutans subsp. grisebachianus
Varieties
Laurales
Ebenales
Myrtales
Species
Varieties
Terminalia glabrata var. haroldii
Sapindales
There are 33 species, one subspecies, and one variety in the order Sapindales evaluated as data deficient.
Rutaceae
Species
Varieties
Phellodendron amurense var. wilsonii
Sapindaceae
Anacardiaceae
Meliaceae
Other Sapindales
Species
Subspecies
Acer caesium subsp. caesium, Indian maple
Asterales
Species
Subspecies
Darwiniothamnus lancifolius subsp. lancifolius
Magnoliales
There are 112 species, one subspecies, and one variety in the order Magnoliales evaluated as data deficient.
Magnoliaceae
Annonaceae
Species
Varieties
Monodora junodii var. macrantha
Myristicaceae
Species
Subspecies
Myristica lepidota subsp. lepidota
Capparales
There are 41 species in Capparales evaluated as data deficient.
Capparaceae
Cruciferae
Apiales
Gentianales
Species
Varieties
Rosales
There are 37 species in the order Rosales evaluated as data deficient.
Rosaceae
Other Rosales species
Primulales
There are 21 species in Primulales evaluated as data deficient.
Myrsinaceae
Primulaceae
Androsace mathildae
Solanales
Species
Varieties
Cuscuta kilimanjari var. rukararana
Scrophulariales
There are 70 species in the order Scrophulariales evaluated as data deficient.
Oleaceae
Ge |
https://en.wikipedia.org/wiki/IUCN%20Red%20List%20data%20deficient%20species%20%28Chordata%29 | , the IUCN Red List of Threatened Species identified 8509 data deficient species in the Chordata phylum (Animalia kingdom).
Actinopterygii
Anguilliformes
Anguillidae
Chlopsidae
Colocongridae
Heterenchelyidae
Monognathidae
Moringuidae
Muraenidae
Muraenesocidae
Myrocongridae
Ophichthidae
Protanguillidae
Saccopharyngidae
Serrivomeridae
Synaphobranchidae
Atheriniformes
Atherinidae
Atherinopsidae
Bedotiidae
Pseudomugilidae
Telmatherinidae
Beloniformes
Adrianichthyidae
Exocoetidae
Hemiramphidae
Zenarchopteridae
Characiformes
Acestrorhynchidae
Alestidae
Characidae
Distichodontidae
Clupeiformes
Alosidae
Clupeidae
Ehiravidae
Engraulidae
Cypriniformes
Acheilognathidae
Balitoridae
Botiidae
Gastromyzontidae
Nemacheilidae
Catostomidae
Cobitidae
Cyprinidae
Cyprinodontiformes
Aplocheilidae
Cyprinodontidae
Nothobranchiidae
Poeciliidae
Rivulidae
Gasterosteiformes
Pegasidae
Gonorynchiformes
Kneriidae
Gymnotiformes
Apteronotidae
Rhamphichthyidae
Ophidiiformes
Bythitidae
Osmeriformes
Osmeridae
Osteoglossiformes
Mormyridae
Osteoglossidae
Perciformes
Ambassidae
Anabantidae
Blenniidae
Centrarchidae
Cichlidae
Eleotridae
Gobiidae
Kraemeriidae
Labridae
Latidae
Odontobutidae
Percichthyidae
Percidae
Polyprionidae
Scombridae
Serranidae
Terapontidae
Xiphiidae
Salmoniformes
Galaxiidae
Salangidae
Salmonidae
Scorpaeniformes
Cottidae
Siluriformes
Amblycipitidae
Amphiliidae
Ariidae
Auchenipteridae
Bagridae
Clariidae
Claroteidae
Diplomystidae
Heptapteridae
Ictaluridae
Loricariidae
Mochokidae
Pimelodidae
Schilbeidae
Siluridae
Sisoridae
Trichomycteridae
Synbranchiformes
Mastacembelidae
Synbranchidae
Syngnathiformes
Syngnathidae
Tetraodontiformes
Tetraodontidae
Amphibia
Anura
Amphignathodontidae
Aromobatidae
Arthroleptidae
Brachycephalidae
Brevicipitidae
Bufonidae
Centrolenidae
Ceratobatrachidae
Ceratophryidae
Craugastoridae
Cryptobatrachidae
Cycloramphidae
Dendrobatidae
Dicroglossidae
Eleutherodactylidae
Hemisotidae
Hylidae
Hylodidae
Hyperoliidae
Leiuperidae
Leptodactylidae
Mantellidae
Megophryidae
Micrixalidae
Microhylidae
Myobatrachidae
Nyctibatrachidae
Phrynobatrachidae
Pipidae
Ptychadenidae
Pyxicephalidae
Ranidae
Ranixalidae
Rhacophoridae
Strabomantidae
Caudata
Ambystomatidae
Hynobiidae
Plethodontidae
Salamandridae
Gymnophiona
Caeciliidae
Ichthyophiidae
Rhinatrematidae
Aves
Apodiformes
Apodidae
Trochilidae
Caprimulgiformes
Aegothelidae
Caprimulgidae
Columbiformes
Columbidae
Coraciiformes
Alcedinidae
Falconiformes
Accipitridae
Gruiformes
Rallidae
Turnicidae
Passeriformes
Alaudidae
Campephagidae
Cisticolidae
Cracticidae
Estrildidae
Eupetidae
Fringillidae
Hirundinidae
Melanocharitidae
Meliphagidae
Motacillidae
Muscicapidae
Petroicidae
Ploceidae
Pycnonotidae
Sylviidae
Timaliidae
Vangidae
Zosteropidae
Piciformes
Indicatoridae
Ramphastidae
Procellariiformes
Hydrobatidae
Strigiformes
S |
https://en.wikipedia.org/wiki/IUCN%20Red%20List%20data%20deficient%20species%20%28Cnidaria%29 | On 29 January 2010, the IUCN Red List of Threatened Species identified 149 data deficient species in the Cnidaria phylum (Animalia kingdom).
Anthozoa
Actiniaria
Edwardsiidae
Scleractinia
Acroporidae
Agariciidae
Astrocoeniidae
Caryophylliidae
Dendrophylliidae
Euphylliidae
Faviidae
Flabellidae
Fungiidae
Meandrinidae
Merulinidae
Mussidae
Oculinidae
Pectiniidae
Pocilloporidae
Poritidae
Siderastreidae
Turbinoliidae
Hydrozoa
Milleporina
Milleporidae
References
IUCN 2009. IUCN Red List of Threatened Species, v2009.2. Source of the above list: online IUCN Red List. Retrieved d.d. 29 January 2010.
Cnidaria |
https://en.wikipedia.org/wiki/IUCN%20Red%20List%20data%20deficient%20species%20%28Annelida%29 | On 29 January 2010, the IUCN Red List of Threatened Species identified 1 data deficient species in the Annelida phylum (Animalia kingdom).
Polychaeta
Eunicida
Eunicidae
References
IUCN 2009. IUCN Red List of Threatened Species, v2009.2. Source of the above list: online IUCN Red List. Retrieved d.d. 29 January 2010.
Annelida |
https://en.wikipedia.org/wiki/IUCN%20Red%20List%20data%20deficient%20species%20%28Nemertina%29 | On 29 January 2010, the IUCN Red List of Threatened Species identified three data deficient species in the Nemertina phylum (Animalia kingdom).
Enopla
Hoplonemertea
Prosorhochmidae
References
IUCN 2009. IUCN Red List of Threatened Species, v2009.2. Source of the above list: online IUCN Red List. Retrieved d.d. 29 January 2010.
Nemertina |
https://en.wikipedia.org/wiki/G%C3%B6del%20machine | A Gödel machine is a hypothetical self-improving computer program that solves problems in an optimal way. It uses a recursive self-improvement protocol in which it rewrites its own code when it can prove the new code provides a better strategy. The machine was invented by Jürgen Schmidhuber (first proposed in 2003), but is named after Kurt Gödel who inspired the mathematical theories.
The Gödel machine is often discussed when dealing with issues of meta-learning, also known as "learning to learn." Applications include automating human design decisions and transfer of knowledge between multiple related tasks, and may lead to design of more robust and general learning architectures. Though theoretically possible, no full implementation has been created.
The Gödel machine is often compared with Marcus Hutter's AIXI, another formal specification for an artificial general intelligence. Schmidhuber points out that the Gödel machine could start out by implementing AIXItl as its initial sub-program, and self-modify after it finds proof that another algorithm for its search code will be better.
Limitations
Traditional problems solved by a computer only require one input and provide some output. Computers of this sort had their initial algorithm hardwired. This does not take into account the dynamic natural environment, and thus was a goal for the Gödel machine to overcome.
The Gödel machine has limitations of its own, however. According to Gödel's First Incompleteness Theorem, any formal system that encompasses arithmetic is either flawed or allows for statements that cannot be proved in the system. Hence even a Gödel machine with unlimited computational resources must ignore those self-improvements whose effectiveness it cannot prove.
Variables of interest
There are three variables that are particularly useful in the run time of the Gödel machine.
At some time , the variable will have the binary equivalent of . This is incremented steadily throughout the run time of the machine.
Any input meant for the Gödel machine from the natural environment is stored in variable . It is likely the case that will hold different values for different values of variable .
The outputs of the Gödel machine are stored in variable , where would be the output bit-string at some time .
At any given time , where , the goal is to maximize future success or utility. A typical utility function follows the pattern :
where is a real-valued reward input (encoded within ) at time , denotes the
conditional expectation operator with respect to some possibly unknown distribution from a
set of possible distributions ( reflects whatever is known about the possibly probabilistic reactions of the environment), and the above-mentioned is a function of state which uniquely identifies the current cycle. Note that we take into account the possibility of extending the expected lifespan through appropriate actions.
Instructions used by proof techniques
The nature of th |
https://en.wikipedia.org/wiki/DOCK | The program UCSF DOCK was created in the 1980s by Irwin "Tack" Kuntz's Group, and was the first docking program. DOCK uses geometric algorithms to predict the binding modes of small molecules. Brian K. Shoichet, David A. Case, and Robert C.Rizzo are codevelopers of DOCK.
Two versions of the docking program are actively developed: DOCK 6 and DOCK 3.
Ligand sampling methods used by the program DOCK include.
Rigid docking: shape matching, uses spheres placed in the pocket and performs bipartite matching between those spheres and the molecule (all versions).
Flexible ligand is accounted for using the following methods: an algorithm called anchor and grow (v4-v6), and hierarchical docking of databases (v3.5-3.7).
A molecular dynamics engine was implemented into DOCK v6 by David A. Case's Group in the scoring function AMBER score. This ability accounts for receptor flexibility and allows for rank ordering by energetic ensembles in the docking calculations.
See also
AutoDock
Molecular modeling
Comparison of software for molecular mechanics modeling
References
External links
Molecular modelling software
Molecular modelling |
https://en.wikipedia.org/wiki/Ahmad%20Jan%20%28Taliban%20governor%29 | Maulvi Ahmed Jan (died 21 November 2013) was a former Taliban official who eventually became the Haqqani Network's chief spiritual adviser. Hailing from Ghazni province of Afghanistan, Ahmad Jan had also served the Taliban government of Mullah Omar as federal minister for water and power, before being appointed the Governor of the Zabul Province in 2000. His name figured on the CIA's list of most wanted Taliban commanders after he was accused of masterminding a number of deadly suicide attacks in Afghanistan. According to the United Nations, in 2000, an individual known as Maulavi Ahmad Jan was the Taliban's Governor of Zabol Province.
The United Nations listed him as an individual subject to the sanctions authorized by United Nations Security Council resolutions 1267 and 1333.
In March 2010, he was sanctioned by the United Nation for his ties to Al Qaeda. At the time, Jan was described as a chief financier and logistics official for the Haqqani Network and one of the leaders of the Taliban's Quetta Shura.
He was captured in late February 2010. He was eventually released from prison and became the Haqqani Network's spiritual leader. Jan eventually became the chief deputy to network leader Sirajuddin Haqqani and had been responsible for organizing some of the network's most deadly attacks in Afghanistan. On 21 November 2013, Jan was killed in Pakistan after missiles from a U.S. predator drone struck his seminary in Khyber Pakhtunkhwa's Bannu district.
References
Taliban governors
People from Ghazni Province
Deaths by United States drone strikes in Pakistan
2013 deaths
Year of birth missing
Afghan expatriates in Pakistan |
https://en.wikipedia.org/wiki/Germany%27s%20Next%20Topmodel%20%28season%205%29 | Germany's Next Topmodel, Cycle 5 is the fifth season of the show that was aired on the German television network ProSieben. The show started airing on 4 March 2010. In difference to former seasons the show saw a significant change as the audition process was completely open this time whereas every model-wannabe got a chance to audition in front of the jury led by Heidi Klum. The winner was 19-year-old Alisar Ailabouni from Schalchen.
The international destinations for this cycle were set in Cape Town, Los Angeles, New York City and Milan.
Episode summaries
Episode 1: Großes Casting in Köln – kein Weg ist zu weit
Original airdate: 4 March 2010
Starting with 23.248 girls at an open casting the Cycle kicks off with an introduction of the two new judges Kristian Schuller, fashion photographer who has already been a responsible for several shoots on the show and Qualid "Q" Ladraa who impresses the applicants by his young looks. Stunt-Woman Miriam and Miss Russia-winner Anna carry the attention as does the forming relationship between Alisar and Nadine. After reducing the number of girls to 42 on the first day the remaining contestants are forced to sleep in a huge dorm in a hall next to the casting room. On their first individual audition in front of the judges the top 42 have to pose on their very first photo shoot having only four frames to impress the judges. After eliminating eleven more girls Heidi announced that the remaining contestants will be on their way to the very first destination of the Cycle.
Featured Photographer: Sven Schrader
Episode 2: Berlin, Berlin - wir fahren nach Berlin
Original airdate: 11 March 2010
While the best 31 girls from the casting are on their way to Berlin a catwalk challenge is awaiting on their way in the ICE-train from Cologne to Berlin in which the bottom two girls are eliminated halfway through. Arrived in Berlin the girls are taken to a photo shoot at Madame Tussauds where they have to pose with the wax figures of Robbie Williams and Johnny Depp where Svea impresses Heidi the most. At the Berlin Fashion Week the remaining girls are booked for the show of fashion designer Anja Gockel. Alisar closes the show in the obligatory bridal dress resulting in a very impressed reaction by the cheering audience. At the end of the show four more girls are eliminated leaving the top 25 in the competition.
Show opener: Miriam Höller
Show closer: Alisar Ailabouni
Episode 3: "Germany's next Topmodel" bekommt Zuwachs
Original airdate: 18 March 2010
The 25 remaining girls travel to the airport from Munich where Heidi promises that only 18 will survive at the end of the episode travelling to their first international destination of the Cycle. In a twist 19 year-old Pauline joins the other contestants as she was chosen by Heidi and "Q" to receive a Wildcard on the popular German entertainment show Wetten, dass..? much to the unwellbeing of Desirée and Svea who see her as their direct competition given their shared Africa |
https://en.wikipedia.org/wiki/Trunk%20road%20agent | In Wales, a trunk road agent, (), is a partnership between two or more county and/or county borough councils for the purposes of managing, maintaining, and improving the network of trunk roads in Wales (including any motorways) in their respective areas on behalf of the Welsh Government.
Agents
During 2005 to 2006 three trunk road agents were established to replace the previous eight, they were the North Wales Trunk Road Agent, the Mid Wales Trunk Road Agent and the South Wales Trunk Road Agent. On 1 April 2012 these were reduced still further to two:
The North and Mid Wales Trunk Road Agent (NMWTRA; ), which covers the principal areas of Anglesey, Ceredigion, Conwy, Denbighshire, Flintshire, Gwynedd (lead authority), Powys, and Wrexham.
The South Wales Trunk Road Agent (SWTRA; ), which covers the principal areas of Blaenau Gwent, Bridgend, Caerphilly, Cardiff, Carmarthenshire, Merthyr Tydfil, Monmouthshire, Neath Port Talbot (lead authority), Newport, Pembrokeshire, Rhondda Cynon Taf , Swansea, Torfaen, and the Vale of Glamorgan.
Traffic officers
Welsh Government traffic officers are civilian staff employed by the trunk road agents on behalf of the Welsh Government, as a means to ease traffic congestion on major trunk roads in Wales. Their role and powers are similar to their English counterparts working for National Highways, the National Highways traffic officers.
References
External links
North and Mid Wales Trunk Road Agent
South Wales Trunk Road Agent
Government of Wales
Law enforcement occupations in the United Kingdom
traffic management
Road transport in Wales |
https://en.wikipedia.org/wiki/Web%203.0 | Web 3.0 may refer to:
Semantic Web, often called Web 3.0
Web3 (also sometimes referred to as Web 3.0) is a general idea for a decentralized Internet based on public blockchains
Web3 Foundation, founded by Gavin Wood, an English computer scientist and co-founder of Ethereum |
https://en.wikipedia.org/wiki/Postage%20stamps%20and%20postal%20history%20of%20Honduras | Honduras became independent from Spain in 1838. It began producing its own stamps in 1866.
References
External links
http://www.philatelicdatabase.com/united-states/stamps-of-honduras-issues-of-1931/
https://www.hondurasstamps.com
Philately of Honduras |
https://en.wikipedia.org/wiki/Service%20composability%20principle | In computing, service composability is a design principle, applied within the service-orientation design paradigm, that encourages the design of services that can be reused in multiple solutions that are themselves made up of composed services. The ability to recompose the service is ideally independent of the size and complexity of the service composition.
This principle is directly responsible for the agility promised by SOA as it promotes composing new solutions by reusing existing services.
Purpose
The concept of developing software out of independently existing components encourages the concept of composition. This is the underlying concept within object-orientation where the end product is composed of several interlinked objects that have the ability to become part of multiple software solutions, no matter how complex the solution is. The same composition concept is inherited by service-orientation, whereby a business process is automated by combining multiple services. However, within service-orientation there is even greater focus on building services that can be composed and recomposed within multiple solutions to provide the agility promised by the SOA. As a result of this emphasis, some guidelines are required to develop services that can be effectively aggregated into multiple solutions.
The service composability principle provides design considerations that help towards designing composable services with a view to encourage service reuse as much as possible. The guidelines provided by this principle prepare the service so that it is ready to participate in service compositions without requiring any further design changes.
Application
The application of the service composability principle requires designing services so that they can be used in a service composition either as a service that controls other services, i.e. a controller service, or as a service that provides functionality to other services in the composition without further composing other services, i.e. a composition member.
For the service to provide this dual functionality, the service contract must be designed so that it presents functionality based on varying levels of input and output data. In case if it is required to participate as a composition member, then usually the input parameters to the service would be more fine grained as compared to the situation when it is required to participate as a composition controller. A heavily reused service must be as stateless as possible (service statelessness principle) so that it can provide optimum performance when composed within multiple service compositions.
The effectiveness of this principle depends upon the extent to which rest of the design principles have been applied successfully. The application of the standardized service contract principle makes the services interoperable with others, and helps to keep the composition design simpler by avoiding the need to perform runtime data model transformation. By |
https://en.wikipedia.org/wiki/SOCOM%204%20U.S.%20Navy%20SEALs | SOCOM 4 U.S. Navy SEALs (known as SOCOM: Special Forces in PAL regions) is a tactical shooter video game developed by Zipper Interactive and published by Sony Computer Entertainment for PlayStation 3. It is the sequel to SOCOM Combined Assault U.S. Navy SEALs and was also the last installment for the franchise.
Online multiplayer servers were shut down on January 28, 2014, along with the servers for SOCOM U.S. Navy SEALs: Confrontation.
Plot
Set at an undisclosed date somewhere in Malaysia, NATO Operations Commander Cullen Gray arrives at a NATO operations command center at the request of Area Commander James Gorman. A rebel movement calling themselves "Naga" have rallied and taken up arms against the country's government, and have hijacked ships belonging to Clawhammer Security, a private military company that was featured in the previous SOCOM title, Fireteam Bravo 2. Weapons and supplies were seized by Naga rebels, and Clawhammer has decided to withdraw from the region before losing any more assets, limiting the capabilities of NATO forces operating in the area. Under constant attack from Naga, Gray is given command of U.S. Navy SEALs (or other NATO special forces team members depending on which version of the game is being played) Eric Schweitzer and Dion Wells are tasked with aiding NATO in seeking out and destroying the insurgent threat by removing their leader.
While patrolling the NATO ops center's perimeter, the command center is attacked and Commander Gorman is presumably killed. Commander Gray leads his men through the city with aid from an off-shore command asset code-named "Oracle", an MI6 liaison and engages Naga forces before fleeing from the city in an attempt to meet up with other NATO forces operating in the region. Gorman had ordered members of the South Korean 707th Special Mission Battalion to conduct recon on a supply point, but their transport aircraft is shot down en route by anti-air guns. OpsCom rescues two survivors, Park Yoon-Hee and Chung Kwan, and continues in his mission to remove the threat from Naga.
Conducting guerrilla warfare actions and special recon operations against Naga forces, the NATO team destroys Naga assets and hunts down their leader, Sibak Razad. As the team draws closer to locating him, they find Clawhammer secretly moving arms and supplies into the region and establishing command posts - it is also revealed that ten years earlier in the same region, Cullen Gray was assigned to a special forces team tasked with capturing the country's warlord dictator Chen, but executed him instead, causing the destabilization that led to civil war and the eventual formation of the Naga insurgency.
The team locates Razad and attacks his base of operations and secures him, and upon interrogation, he reveals that it's Clawhammer that was supplying his forces with arms and equipment. The team attempts to flee, but Clawhammer forces ambush the team and Razad is killed by sniper fire. The team is forced to fight th |
https://en.wikipedia.org/wiki/VGA%20text%20mode | VGA text mode was introduced in 1987 by IBM as part of the VGA standard for its IBM PS/2 computers. Its use on IBM PC compatibles was widespread through the 1990s and persists today for some applications on modern computers. The main features of VGA text mode are colored (programmable 16 color palette) characters and their background, blinking, various shapes of the cursor (block/underline/hidden static/blinking), and loadable fonts (with various glyph sizes). The Linux console traditionally uses hardware VGA text modes, and the Win32 console environment has an ability to switch the screen to text mode for some text window sizes.
Data arrangement
Text buffer
Each screen character is represented by two bytes aligned as a 16-bit word accessible by the CPU in a single operation. The lower (or character) byte is the actual code point for the current character set, and the higher (or attribute) byte is a bit field used to select various video attributes such as color, blinking, character set, and so forth. This byte-pair scheme is among the features that the VGA inherited from the EGA, CGA, and ultimately from the MDA.
Depending on the mode setup, attribute bit 7 may be either the blink bit or the fourth background color bit (which allows all 16 colors to be used as background colours).
Attribute bit 3 (foreground intensity) also selects between fonts A and B (see below). Therefore, if these fonts are not the same, this bit is simultaneously an additional code point bit.
Attribute bit 0 also enables underline, if certain other attribute bits are set to zero (see below).
Colors are assigned in the same way as in 4-bit indexed color graphic modes (see VGA color palette).
VGA modes have no need for the MDA's reverse and bright attributes because foreground and background colors can be set explicitly.
Underline
The VGA hardware has the ability to enable an underline on any character that has attribute bit 0 set. However, since this is an MDA-compatible feature, the attribute bits not used by the MDA must be set to zero or the underline will not be shown. This means that only bits 3 (intensity) and 7 (blink) can be set concurrently with bit 0 (underline). With the default VGA palette, setting bit 0 to enable underline will also change the text colour to blue. This means text in only two colors can be underlined (5555FF and 0000AA with the default palette).
Despite all this, the underline is not normally visible in color modes, as the location of the underline defaults to a scanline below the character glyph, rendering it invisible. If the underline location is set to a visible scanline (as it is by default when switching to an MDA-compatible monochrome text mode), then the underline will appear.
Fonts
Screen fonts used in EGA and VGA are monospace raster fonts containing 256 glyphs. All glyphs in a font are the same size, but this size can be changed. Typically, glyphs are 8 dots wide and 8–16 dots high, however the height can be any value |
https://en.wikipedia.org/wiki/Psych%20%28season%201%29 | The first season of Psych originally aired in the United States on the USA Network television network between July 7, 2006 and March 2, 2007. Produced by Universal Cable Productions and Tagline Television, the series was created by Steve Franks, who served as executive producer with Kelly Kulchak and Chris Henze.
The comedy-drama series focuses on Shawn Spencer (James Roday), a police consultant who pretends to be psychic, and his assistant Burton "Gus" Guster, a pharmaceuticals salesman. The season consisted of fifteen 43-minute episodes, which aired at 10:00 p.m. on Fridays. Franks conceived the idea for the show when producers at Columbia Pictures requested he pitch them ideas for a TV program while he was working on the film Big Daddy. Initially rejected, the concept was shelved for several years until Franks collaborated with Kulchak to create an hour-long TV show. USA Network picked up the program, initially ordering an eleven-episode season.
Overall, the first season has received generally positive reviews from critics. Initially, the show was met with mixed reviews, with episodes later in the season receiving generally positive reception. Many critics compared the series to its lead-in program, Monk, leading to negative opinions on the program's originality. The premiere episode was watched by approximately 6.1 million viewers, making it the highest-rated scripted series premiere for a cable network. However, ratings decreased for the following episodes, with the next highest-rated episode achieving just 4.76 million viewers, according to the Nielsen ratings. The season finale, "Scary Sherry: Bianca's Toast", received the best reviews of the season and saw an increase in viewership.
Cast
Main cast
James Roday as Shawn Spencer
Dulé Hill as Burton "Gus" Guster
Timothy Omundson as Carlton Lassiter
Anne Dudek as Lucinda Barry (pilot only)
Corbin Bernsen as Henry Spencer
Maggie Lawson as Juliet O'Hara
Recurring cast
Kirsten Nelson as interim police chief Karen Vick
Liam James, Josh Hayden, and Kyle Pejpar as Young Shawn Spencer
Sage Brocklebank as police officer Buzz McNab
Carlos McCullers II, Julien Hill, and Isaah Brown as Young Gus
Patricia Idlette as Police Officer Allen
Episodes
Production
Conception and development
Steve Franks originally conceived the concept for Psych while working as the lead writer for the 1999 film Big Daddy. After he successfully pitched the film to producers with Columbia Pictures, Franks was requested to come up with ideas for five new TV programs. He presented the shows to Columbia, who rejected all proposals. Among the outlines he presented was the source for Psych. After the programs were rejected, he shelved the ideas. Franks would not reopen the idea for Psych until several years later, when he met with producer Kelly Kulchak about creating a one-hour long TV program. After discussion, Franks presented the idea for Psych, which Kulchak deemed to be "brilliant".
After finalizing an episod |
https://en.wikipedia.org/wiki/Psych%20%28season%202%29 | The second season of Psych originally aired in the United States on USA Network from July 13, 2007 to February 15, 2008. It consisted of 16 episodes. James Roday, Dulé Hill, Timothy Omundson, Maggie Lawson, and Corbin Bernsen reprised their roles as the main characters, and Kirsten Nelson joined the main cast. James Roday portrayed Shawn Spencer, a fake psychic detective who periodically consults for the Santa Barbara police department. A DVD of the season was released on July 8, 2008.
Production
Show creator Steve Franks remained in his position of showrunner. "I Know, You Know," performed by The Friendly Indians, continued to be used as the theme song, though it was modified for two episodes: "Gus's Dad May Have Killed an Old Guy," in which it was performed with a Christmas theme, and "Lights, Camera... Homicidio," in which the lyrics were sung in Spanish.
Mel Damski directed three episodes for the season, while John Badham, Jason Ensler, Joanna Kerns, John Landis, Eric Laneuville, Paul Lazarus, Tim Matheson, Arlene Sanford, Oz Scott, Matt Shakman, Stephen Surjik, and Michael Zinberg directed one episode each. Steve Franks directed his first episode for the series, directing the season finale.
Franks also wrote four episodes, while Andy Berman wrote three. Josh Bycel, Anupam Nigam, Saladin K. Patterson, and James Roday wrote two episodes each. Daniel Hsia, Tim Meltreger, and Tami Sagher each wrote one episode.
Cast
Every cast member from the end of the first season returned, with one addition. James Roday continued to play fake psychic detective Shawn Spencer. Burton "Gus" Guster returned, portrayed by Dulé Hill. Timothy Omundson returned as Head Detective Carlton "Lassie" Lassiter, while Maggie Lawson continued to portray Juliet "Jules" O'Hara. Corbin Bernsen was kept on as Henry Spencer. This was the first season in which Kirsten Nelson received a star billing for her role as SBPD Interim Chief Karen Vick.
Sage Brocklebank continued to portray Officer Buzz McNab, in 11 of the 16 episodes. Liam James was the sole actor portraying young Shawn Spencer, and Carlos McCullers II took over the role of young Gus. Phylicia Rashad made her first appearance as Winnie Guster, and Ernie Hudson made an appearance as William "Bill" Guster. Other guest stars in the second season included John Amos, Curtis Armstrong, Obba Babatundé, Malcolm Barrett, W. Earl Brown, Matt Cedeno, Tim Curry, Cristián de la Fuente, Amanda Detmer, Gina Gershon, Ben Giroux, Philip Baker Hall, Howard Hesseman, Telma Hopkins, Katharine Isabelle, Christopher Jacot, Bianca Kajlich, Eric Keenleyside, Melanie Lynskey, Shane Meier, Alex Meneses, Brian Doyle-Murray, Dylan Neal, Amanda Pays, Lou Diamond Phillips, Saul Rubinek, Corey Sevier, Kevin Sorbo, Kerry Washington, and Calum Worthy.
Episodes
Notes
References
Psych seasons
2007 American television seasons
2008 American television seasons |
https://en.wikipedia.org/wiki/Psych%20%28season%203%29 | The third season of Psych originally aired in the United States on USA Network from July 18, 2008 to February 20, 2009. It consisted of 16 episodes. James Roday, Dulé Hill, Timothy Omundson, Maggie Lawson, Corbin Bernsen, and Kirsten Nelson reprised their roles as the main characters. James Roday portrayed Shawn Spencer, a fake psychic detective who periodically consults for the Santa Barbara police department. A DVD of the season was released on July 21, 2009.
Production
Steve Franks continued to serve as showrunner for the third season. "I Know, You Know," performed by The Friendly Indians, continued to serve as the theme song for the series, though the Christmas-themed version used for the previous season's "Gus's Dad May Have Killed an Old Guy" was used again for "Christmas Joy."
Mel Damski returned to the series to direct three episodes, while John Badham and Stephen Surjik returned to direct two each. Returning to direct one episode each were Steve Franks, John Landis, Eric Laneuville, and Tim Matheson. New directors for the season, directing one episode each, were Jay Chandrasekhar, Martha Coolidge, Michael McMurray, Steve Miner, and series star James Roday.
Andy Berman and Steve Franks returned to write three episodes each, while Josh Bycel, Anupam Nigam, Saladin K. Patterson, and James Roday wrote two. Tim Meltreger returned to pen one episode. New writers for the season included Kell Cahoon, who wrote two episodes, and Victoria Walker, who wrote one.
Cast
James Roday continued to play fake psychic detective Shawn Spencer. Burton "Gus" Guster returned, portrayed by Dulé Hill. Timothy Omundson returned as Head Detective Carlton "Lassie" Lassiter, while Maggie Lawson continued to portray Juliet "Jules" O'Hara. Corbin Bernsen was kept on as Henry Spencer. Kirsten Nelson continued to receive star billing as Karen Vick, while her character was promoted to permanent Chief of the SBPD.
Sage Brocklebank continued in his role as Officer Buzz McNab in six episodes. Liam James portrayed young Shawn, while Carlos McCullers II continued to play young Gus. Cybill Shepherd joined the cast as Madeleine Spencer for three episodes. Rachael Leigh Cook also joined the show, as Abigail Lytar. Phylicia Rashad reprised her role as Winnie Guster, while the role of Bill Guster was turned over to Keith David. Ally Sheedy made her first appearance as the deranged serial killer Mr. Yang. Jimmi Simpson also made his debut on the show, as Mary Lightly. Other prominent guests during the season included MacKenzie Astin, Justine Bateman, Sonja Bennett, Jere Burns, Faune A. Chambers, Gary Cole, Barry Corbin, Brooke D'Orsay, Jeff Fahey, Frank Gifford, Milena Govich, Elden Henson, Mickie James, Benjamin King, Emma Lahana, Ted Lange, Jane Lynch, Christopher McDonald, Bruce McGill, Ted McGinley, Ty Olsson, Kelly Overton, Richard Riehle, Shawn Roberts, Alan Ruck, Cassandra Sawtell, Jonathan Silverman, Todd Stashwick, Serinda Swan, Janet Varney, Stev |
https://en.wikipedia.org/wiki/Text%20buffer | Text buffer may refer to:
In programming:
a text buffer is a region in memory where text is temporarily stored while it is been worked on by the CPU. The CPU can write and read to and from a text buffer, essentially manipulating text. The CPU might be moving it from one location to another to fulfil a request by a user. see Data buffer
a part of video adapter's memory in a text mode;
a backup (or mirror, or emulation) of that part in the system RAM, see e.g. virtual console.
In text editors:
same as clipboard (software), but for text only. |
https://en.wikipedia.org/wiki/Psych%20%28season%204%29 | The fourth season of Psych originally aired in the United States on USA Network from August 7, 2009 to March 10, 2010. It consisted of 16 episodes. James Roday, Dulé Hill, Timothy Omundson, Maggie Lawson, Corbin Bernsen and Kirsten Nelson reprised their roles as the main characters. James Roday portrayed Shawn Spencer, a fake psychic detective who periodically consults for the Santa Barbara police department. A DVD of the season was released on July 13, 2010.
Production
Steve Franks, creator of the series, returned for the fourth season as showrunner. The theme song, "I Know, You Know" by The Friendly Indians, continued to be used, though it was edited twice: in "Bollywood Homicide", the song was given a Bollywood theme with the lyrics sung in Hindi, while Boyz II Men performed an a cappella version for "High Top Fade Out".
Mel Damski returned to direct four episodes, while Stephen Surjik returned for three and Steve Franks directed two. Returning to direct one episode each were John Badham, Jay Chandrasekhar, Michael McMurray, James Roday and Matt Shakman. Andrew Bernstein and Tawnia McKiernan each joined the show to direct one episode.
Steve Franks wrote five episodes, while Andy Berman wrote four and Kell Cahoon, Saladin K. Patterson and James Roday wrote three. Returning for two episodes each were writers Tim Meltreger and Anupam Nigam. Bill Callahan and Todd Harthan joined the writing team, with Callahan writing three episodes, and Harthan writing one.
Cast
James Roday continued to play fake psychic detective Shawn Spencer. Burton "Gus" Guster returned, portrayed by Dulé Hill. Timothy Omundson returned as Head Detective Carlton "Lassie" Lassiter, while Maggie Lawson continued to portray Juliet "Jules" O'Hara. Corbin Bernsen was kept on as Henry Spencer. Kirsten Nelson continued in her role as SBPD Chief Karen Vick.
Sage Brocklebank continued to portray Officer Buzz McNab. Liam James and Carlos McCullers II continued in their roles as young Shawn and Gus, respectively. Rachael Leigh Cook appeared in four episodes as Abigail Lytar. Kurt Fuller made his Psych debut as Woody the Coroner, who shares many character traits with Shawn, in three episodes. Ally Sheedy made her second appearance as Mr. Yang, the deranged alleged killer who has been institutionalized, and her appearance marked the first time a villain on the show appeared in more than one episode. Jimmi Simpson made his final appearance as the living Mary Lightly (though he returned post-death a few times), and Christopher Turner entered as the chaotic, mysterious Mr. Yin, Yang's other, more dangerous and deranged, half. Cary Elwes made his first appearance as art thief Pierre Desperaux, and Peter Oldring and Ed Lauter appeared as Canadian officers. Ray Wise made his first appearance as Father Westley. Jaleel White made his first appearance as Gus's former bandmate. Additionally, almost every episode featured a prominent guest star. Among them were Christine Baranski, Jim Beaver, |
https://en.wikipedia.org/wiki/List%20of%20radio%20stations%20in%20Slovenia | The following is a list of radio stations in Slovenia. The following list sorts radio stations, broadcast in Slovenia by regions of coverage and type of programming. The list does not include web-only, cable-only and DAB+-only radio stations.
Radio stations with national coverage
Public radio stations of Radiotelevizija Slovenija
Private radio stations
Non-profit radio stations
Radio stations with regional and local coverage
Regional studios of Radiotelevizija Slovenija
Minority radio stations of Radiotelevizija Slovenija
College radio stations
Regional radio stations with special status
Local radio stations with special status
Regional and local radio with special status
Regional and local radio stations without special status
Private radio stations
Radio stations no longer on air
References
AKOS, 2022
Webpages of Slovenian radio stations
FMSCAN.org
External links
RADIO.RTV.SI: Lestvica slovenskih radijskih postaj
Radiostanica.com: Slovenačke radio stanice uživo preko interneta!
Slovenia
Radio stations |
https://en.wikipedia.org/wiki/Sansone | People with the surname Sansone:
Susanna-Assunta Sansone - Professor of Data Readiness at the University of Oxford
Gilda Sansone - Italian fashion model
Greg Sansone - Canadian sports anchor
Gianluca Sansone (born 1987) Italian footballer
Giovanni Sansone - Italian mathematician
Kathryn Sansone - American homemaker
Johnny Sansone (born 1957), is an American electric blues musician
Lorenzo Sansone - horn player, music editor, educator, and horn manufacturer.
Maggie Sansone - American recording artist
Maria Sansone - American TV host
Matteo Sansone (musicologist) - Italian musicologist (opera)
Matteo Sansone (archaeologist) - (1916-1992), Italian pharmacist and archaeologist
Nicola Sansone - Italian footballer
Pat Sansone - American multi-instrumentalist
Raffaele Sansone - (1910-1994), Italo-Uruguayan football player and coach
Surnames of Italian origin |
https://en.wikipedia.org/wiki/ShortsTV | ShortsTV is a worldwide network dedicated to short films. ShortsTV has over 13,000 titles in its catalog and has been a presenter of the Oscar Nominated Short Film releases since 2006.
The channel is available in over 100 million homes across the U.S., India, Latin America, Europe and more. It is available across the US on DirecTV (channel 573), AT&T U-Verse (channel 1789), AT&T TV (Channel 573), AT&T TV NOW, Frontier Communications (channel 789) Google Fiber (channel 603) and Hotwire (channel 560). ShortsTV is also available in the UK, Netherlands, Italy and Spain on Amazon Prime Video Channels and on demand through iTunes in 92 countries, Amazon Instant Video (UK, US and Germany), Google Play (US and Canada), and Verizon and Frontier (US).
ShortsTV is owned by Shorts International Ltd which is headquartered in London, England and is represented in the United States by Shorts Entertainment Networks, a wholly owned subsidiary located in Los Angeles. The company is led by Chief Executive Carter Pilcher and is majority owned by Shorts Entertainment Holdings with AMC Networks a significant minority shareholder.
Oscar Nominated Short Film Theatrical Distribution
Every year, ShortsTV presents the Oscar nominated shorts in theaters and virtual cinemas internationally. The program grossed over $3 million in 2018. The offerings have three separate packages, one each for Best Animated Short, Best Live Action Short, and Best Documentary Short, with five films included in each.
In 2020, the three-compilation showcase of the Oscar Nominated Short Films opened on January 31 in more than 460 screens across the US and Canada, up from 270 screens in 2019; it earned over $1.1 million in weekend box office receipts.
OTT Offerings
In February 2021, ShortsTV launched its proprietary OTT Service Delivery Platform with Airtel Xstream to offer the ShortsTV video-on-demand service to Airtel’s 340 million subscribers in India to watch on mobiles or TVs. The platform was designed for short form viewing behaviour.
In July 2021, Shorts International and Samsung Electronics announced “Shorts” and “Cortos”, free-to-view advertising supported film channels which are available on the Samsung TV Plus service, initially in the UK, Italy and Spain. The free-to-view channels, Shorts (Channel 4512 in the UK and Italy) and Cortos (Channel 4512 in Spain) will be fully localized and tailored to each market, featuring some international films available from ShortsTV.
TVCortos
TVCortos, ShortsTV’s Spanish language sister channel, programs Spanish short films and short series and is distributed in Latin America and Spain. In July 2020, ShortsTV announced an initiative to put film festivals on air amidst in-person cancellations and postponements, many of which were featured on TVCortos. Highlighted festivals included Guanajuato International Film Festival (GIFF), Shorts Mexico, FACIUNI Becas, Bogoshorts, CINELEBU.
India Offerings
In India, ShortsTV is available as a linear valu |
https://en.wikipedia.org/wiki/Project%20Noah | Project Noah is an online community dedicated to explore and document wildlife across the globe. "Noah" is an acronym for "networked organisms and habitats".
This community formerly had an iPhone app in iTunes and an Android app in Google Play, but is now web only. Project Noah aims to become a common mobile platform for documenting the world's organisms. Beyond documentation, the iPhone app offers users an opportunity to participate in ongoing citizen science research projects by tagging contributions into specific field missions and can be used as a location-based field guide as well. All contributors are connected with an online community.
The project's co-founder, Yasser Ansari, believes that "not only is there an educational need and an environmental need but a deep, deep human need for all of us to reconnect with our planet." Project Noah has won several awards. Currently, Project Noah has contributors from over 55 countries participating in a variety of missions ranging from documenting the impact of the Gulf Coast oil spill to sharing ladybug and squirrel sightings for ongoing research at major universities. They're a project of condor.org.
The project has featured by several news sources including CNN, Brian Lehrer TV, New York Times, Slate, Gizmodo, US News, Make Magazine, TreeHugger, Council for the Internet of Things, IBM's Smarter Planet and GOOD.
References
External links
http://projectnoah.org
http://networkedorganisms.com
https://twitter.com/projectnoah
Wild animals identification
IOS software
Social information processing
Android (operating system) software |
https://en.wikipedia.org/wiki/DTD | DTD may stand for:
Technology
Data transfer device, as found in AN/CYZ-10, a cryptographic device for receiving, storing, and transferring keys
Detailed timing descriptor, a block containing supported output resolution details, part of the extended display identification data
Document type definition, used in markup languages such as XML
Desktop Tower Defense, a Flash-based strategy game
Direct-to-disk recording, recording of audio or video to random access digital media as opposed to tape
Danube–Tisa–Danube Canal, a water system in Serbia
Other uses
DTD (TV station), a digital television station in Darwin, Northern Territory
Dust-to-Digital, a record label specializing in American folk music
December to Dismember, a former wrestling pay-per-view event
Dekoratie voor Trouwe Dienst, a military decoration of the South African Defence Force between 1921 and 1946
Delta Tau Delta, a U.S.-based college fraternity
Developmental topographical disorientation, a cognitive disorder marked by inability to navigate within the environment
Developmental Trauma Disorder also known as complex post-traumatic stress disorder, a possible result of childhood abuse
Diastrophic dysplasia, an autosomal recessive dysplasia which affects cartilage and bone development
Dopamine transporter deficiency syndrome, an autosomal recessive Parkinsonism dystonia |
https://en.wikipedia.org/wiki/Billy%20and%20Betty | Billy and Betty was a 15-minute children's adventure radio series which began broadcasting on the NBC Red Network in 1935. Sponsored by Sheffield Farms Grade A Milk, it was usually heard at 6:45pm on weekday afternoons.
Characters and story
Robert Sloane directed the series. The storyline followed a brother and sister, Billy and Betty, during their various misadventures. The cast included character actor James McCallion (1918-1991), who also portrayed Skeezix on the Gasoline Alley radio program.
In December 1935, the Child Study Association of America reported that radio programs for children showed "distinct evidence of efforts to improve the radio's offerings along the lines demanded by an increasingly informed public." Programs approved by the Child Study Association of America included The Singing Lady, Popeye the Sailor and Billy and Betty.
The Christmas Adventure of Billy and Betty was a 1941 Victor-Bluebird recording.
References
External links
"Juvenile Radio Programs"by Terry G.G. Salomonson
1930s American radio programs
NBC radio programs |
https://en.wikipedia.org/wiki/The%20Dick%20Clark%20Show | The Dick Clark Show (also known as Dick Clark's Saturday Night Beechnut Show) was an American musical variety show broadcast weekly in the United States on the ABC television network 7:30-8 p.m. (Eastern Time) on Saturdays from February 15, 1958, through September 10, 1960, sponsored (except for the first two shows) by Beechnut Gum.
Summary
Given that the show ran continually year-round for over two-and-a-half years, resulting in 136 episodes, there were no seasons as such. However, the "first season" of 29 shows could be said to have run from the premiere through August 30, 1958, the "second season" of 53 shows, September 6, 1958, through September 5, 1959, and the "third season" of 54 shows, September 12, 1959, through September 10, 1960.
Dick Clark, hosting throughout the entire series, introduced musical guests, who sang/performed (or, more often, lip-synced) their latest popular hit. Often, after a performance (and sometimes before), Clark interviewed the musician(s). Between performances on some shows, he also interviewed non-musical celebrity guests, usually a television or movie star — Bob Hope, Johnny Carson, Tony Randall, and Chuck Connors, among others.
The show was typically staged live, in New York City, at Manhattan's Little Theater (now the Helen Hayes Theatre), 240 West 44th Street. For the Manhattan broadcasts, the audience sat in theater seats, rather than standing and dancing as in Clark's concurrent pop-music show, American Bandstand — this distinction is the best method to identify whether a video recording of an artist's performance is from this show, or from American Bandstand.
The show was occasionally broadcast from remote locations across the United States. The May 30, 1959 show was broadcast from the Sheraton Hotel in Binghamton, New York. Three shows, spanning from August 22, 1959 through September 5, 1959, were broadcast remotely from Hollywood, California. Another set of five shows were broadcast remotely from various locations across the country, between June 11, 1960 and July 9, 1960.
Top Ten
At the end of each show, Clark would announce the ten most popular songs from the current Top 40 in reverse order from #10 on down to #1, as the "American Bandstand Top Ten". On the first show, Clark played a brief soundclip from each top ten record as its title was announced. On each subsequent show, Clark played the soundclip only for those records which were "new" on the Top Ten that week. This ritual became so embedded in American culture that it was imitated in many different media and contexts throughout the years - a most-notable example being a nightly satirical piece during David Letterman's two late-night talk shows, Late Night and Late Show.
First show
The first show was broadcast February 15, 1958, with no sponsor — Beechnut began sponsoring the show the third week. Guests on the first show were:
Pat Boone (interviewed, and singing "Wonderful Time Up There", "It's Too Soon To Know")
Jerry Lee Lewis ("B |
https://en.wikipedia.org/wiki/Christianity%20in%20Manipur | Christianity is the fastest growing and second most followed religion in Manipur, a state in Northeast India, according to 2011 census data of India.
While the 2021 Census has predicted that the Christian population could have gone up as high as 50 percent or even more than that due to combining factors of :- High total fertility rate, intenal immigration from neighbouring Nagaland, Mizoram and Illegal Immigration from Myanmar, thus forming a majority in the state.
Followers
Protestants (mostly Baptist) outnumber Catholics in Manipur. A Manipur Baptist Convention exists.
The Reformed Presbyterian Church North-East India Synod has its seat in Manipur. The Presbyterian Church in India and the Church of Christ are present in the state, too. The Roman Catholic Archdiocese of Imphal has its seat in the state. The Manipur Section of the Seventh-day Adventist Church has about forty congregations.
The All Manipur Christian Organisation (AMCO) exists.
Demography
Trends
Percentage of Christians in Manipur by decades
The Christian population in the state have increased from 0.02% in 1901 to 41.3% in 2011. Christians formed an overwhelming majority in the autonomous hilly regions of Manipur (which is 90% of the total land area) of the state respectively. According to 2011 Census, there are total 9 districts in Manipur, of which 5 districts are Christian-majority.
Tribes
Percentage of Christians in the Scheduled Tribes
Non-ST Christians
Non-ST Christians in Manipur are mainly Meiteis numbering between 1-3 lakh in the state.
List of denominations
Sources
Evangelical Congregational Church
United Pentecostal Church International
Kuki Baptist Convention
Kuki Christian Church
Manipur Baptist Convention
The Pentecostal Mission
Presbyterian Church in India (Reformed)
Roman Catholic church
Manipur Evangelical Lutheran Church (49) 8,500
Christian Revival Church
See also
List of Christian denominations in North East India
Christian Revival Church
References |
https://en.wikipedia.org/wiki/Haddatha | Haddatha ( ) is a village in Bint Jbeil District in Southern Lebanon.
History
In 1596, it was named as a village, ‘“Hadata” in the Ottoman nahiya (subdistrict) of Tibnin under the liwa' (district) of Safad, with a population of 52 households, all Muslim. The villagers paid a fixed tax-rate of 25% on agricultural products, such as wheat, barley, fruit trees, goats and beehives, in addition to "occasional revenues”; a total of 4,640 akçe.
In 1838, Edward Robinson noted the village on his travels in the region.
In 1875, Victor Guérin found the population to be exclusively Metualis.
In 1881, the PEF's Survey of Western Palestine (SWP) described Haddatha: "A village, built of stone, containing about 150 Metawileh, on hill-top; a few grapes, figs and olives, and arable cultivation; there is a spring near and cisterns in village; a birket for cattle."
Following the 1982 invasion, Haddatha became part of the Israeli security zone. On 24 February 1989, an Irish soldier was shot dead by members of the Israeli backed SLA. At the time there were 600 Irish soldiers serving with UNIFIL.
During the 2006 Lebanon War, Israel shelled a house with 6 civilians, killing all of them. They were aged from 50 to 80 years old.
People from Haddatha
Husayn Muruwwa
References
Bibliography
External links
Survey of Western Palestine, Map 4: IAA, Wikimedia commons
Haddatha, Localiban
Populated places in the Israeli security zone 1985–2000
Populated places in Bint Jbeil District
Shia Muslim communities in Lebanon |
https://en.wikipedia.org/wiki/S%C3%B6dermanland%20Runic%20Inscription%20109 | Sö 109 is the Rundata designation for a runic inscription on a Viking Age memorial runestone that is located in Gredby, which is near Eskilstuna, Södermanland County, Sweden, which was in the historic province of Södermanland.
Description
This inscription consists of runic text in the younger futhark carved within two serpents that surround a Christian cross. The stone is 3.27 meters in height and composed of granite. The inscription is classified as being carved in runestone style Pr2, which is also known as Ringerike style.
The runestone was described in 1686 as being part of a bridge at Gredby. Before the historic significance of runestones was recognized, they were often re-used as materials in the construction of churches, bridges, and roads. In 1864 the stone was rediscovered and setup alongside the road, and then moved to its current location in 1931. It stands alongside two of the Ingvar runestones, Sö 107 and Sö 108.
The runic text states that a couple named Ormarr and Véfríðr and blood relatives raised the stone as a memorial to Þólfr.
Inscription
Transliteration of the runes into Latin characters
ormar auk × uifriþ ¤ auk × hulmriþ ¤ auk × kal ¤ auk ¤ þolfr auk ¤ (s)krim(i) ¤ þu ¤ hui ¤ --(s)keni ¤ litu (r)(s)(a) × stin × aftir þolf ×
Transcription into Old Norse
Ormarr ok Véfríðr ok Holmfríðr ok Káll(?) ok Þólfr ok Skrimi(?) þau hjún(?) [ok] [sy]stkin(?) létu reisa stein eptir Þólf.
Translation in English
Ormarr and Véfríðr and Holmfríðr and Káll(?) and Þolfr and Skrimi(?), this married couple(?) and siblings(?), they had the stone raised in memory of Þólfr.
Runestone details
References
Runestones in Södermanland |
https://en.wikipedia.org/wiki/Corporate%20use%20of%20Second%20Life | Virtual worlds are 3D computer environments where each user is represented with a character – avatar. Traditionally, virtual worlds have been used for entertainment. However, starting from approximately 2004 both corporate world and academia started to recognize business value of virtual worlds for training and education, collaboration, and marketing. Development and maturity of most popular virtual world – Second Life – played a significant role in corporate movement towards virtual worlds for several reasons:
Second Life was the first public virtual world that did not offer any topic, or theme. Each user is free to create their own objects, personalized environment, and / or to hold any events of their choice. This immediately sparked the idea of creating meeting rooms and virtual classrooms, first within academia, quickly followed by corporate users. Later, meetings and events developed into more advanced uses, from training simulations and communication training using robotic avatars, to 3D visualization, prototyping and collaboration
From 2005 to 2007 Second Life experienced explosive growth of the userbase. Companies were eager to reach this potential customer base and started marketing programs in Second Life. Without a good plan, knowledge of the audience and without good understanding of the new medium many of the early corporate marketing efforts failed, producing a backlash against corporate adoption of virtual worlds.
Second Life provided a wide array of tools for building 3D objects, scripting language to apply required behavior to the objects and easy entry path (users can register and try everything free of charge, and can purchase their own land – to which they can control access).
By early 2010 several corporate applications of virtual worlds were shown to be successful:
Corporate training
What can be done with virtual worlds that cannot be done otherwise
Generally, all kinds of learning involve several stages:
Accumulation of knowledge is accomplished by absorbing information via reading materials, listening to live, videotaped or recorded lectures, and watching demonstrations. Also known as explicit knowledge, it has long been foundation of learning. Combination of classroom instruction and e-learning, provides a good way for acquiring explicit knowledge. Virtual worlds have a limited use and value during accumulation of knowledge stage, utilized perhaps to conduct classes in a virtual classroom. Several companies such as Virtual Training Partners have used Second Life's platform for corporate training.
Practicing, also known as experiential learning, or learning by doing, or tacit knowledge should generally follow the accumulation of knowledge in order to make the learning productive. It is much harder to transfer to learners.
At this stage virtual worlds are irreplaceable. They provide an opportunity to create highly realistic simulations, allowing trainees to practice working with both equipment or other people in t |
https://en.wikipedia.org/wiki/Customs%20Handling%20of%20Import%20%26%20Export%20Freight | Until 2019, Customs Handling of Import & Export Freight (CHIEF) is the computer system of the United Kingdom's revenue and customs services, HMRC, used for managing the declaration and movement of goods into and out of the United Kingdom and allowing UK traders to communicate with counterpart customs systems in the other member states of the European Union. It also managed movement of goods across EU borders where the moved material belonged to a UK party. It has been partly replaced by the Customs Declaration Service (CDS). CHIEF is due to be retired during 2022.
Roles
The major function of CHIEF was to manage the data behind import and export movements and calculate revenues due on those movements.
CHIEF accepts customs declarations from traders (possibly via CSPs – see below), validates the data, and if valid records it. It profiles the data sent and will award a "route of entry" to the declaration. This describes the steps that must occur for the movement to be permitted, and may include automatic clearance for trusted traders or a physical inspection of the good or paperwork for other traders. Having accepted declaration data, CHIEF and the inventory system that is managing the physical movement of the goods communicate (without involving the trader).
Typical paths
Typical flow of data and events might look like this.
Export
Trader pre-declares data to CHIEF
Goods physically arrive at the port
Inventory system informs CHIEF of the goods' arrival
CHIEF re-processes the stored declaration, now aware that the goods are at the port. It will grant 'permission to progress', at which point the goods may be loaded onto the craft.
The craft departs and the inventory system informs CHIEF
CSP informs the trader that the goods 'departed UK'
Import
Trader or port system creates consignment on CSP inventory system
Trader pre-declares data to CHIEF, stating that it represents goods on the above consignment
CHIEF confirms with inventory system that the consignment exists
Goods physically arrive at the port
Inventory system informs CHIEF of the goods' arrival
CHIEF re-processes the stored declaration, now aware that the goods are at the port. Declaration is awarded a 'route to clearance', which for trusted traders may mean automatic clearance, or may require a documentary or physical examination
Goods are cleared automatically by CHIEF or by customs officers
CHIEF informs inventory system of clearance
CSP releases the cleared goods to the trader once all local port and commercial requirements are met
Reports
In both import and export scenarios, unsolicited "reports" (data designed to be rendered by the recipient computer into a human-readable format to report upon changes) are sent when a change occurs on the declaration record, such as when the record is reprocessed upon goods' arrival or when the goods depart the UK. Reports are also used to communicate customs officers' enquires or requests to the trader. Traditionally the reports are automatically |
https://en.wikipedia.org/wiki/KolibriOS | KolibriOS, or Kolibri, is a small, open-source x86 operating system written completely in assembly. It was forked from MenuetOS in 2004 and has run under independent development since.
In a 2009 review piece on alternative operating systems, TechRadar called it "tremendously impressive", noting its performance and streamlined codebase.
Features
Pre-emptive multitasking, streams, and parallel execution of system calls
Boots in a few seconds from various devices, with support for NTFS and Ext2/3/4; can also boot from Coreboot and Windows (Windows will shut down)
Graphical user interface based on, and optimised for, VESA
Development kit: code editor with an integrated macro assembler (FASM)
Most distributions will fit on a single 1.44 MB floppy disk image
Commands
The following is a list of commands supported by the KolibriOS Shell:
about
alias
cd
clear
cp
date
echo
exit
free
help
history
kill
ls
mkdir
more
ps
pwd
reboot
rm
rmdir
shutdown
sleep
touch
uptime
ver
System requirements
i586-compatible CPU
8 MB of RAM
VESA-compatible graphics card
1.44 MB 3.5" floppy drive, hard disk drive, USB flash drive or CD-ROM drive
Keyboard and mouse (COM, PS/2 or USB)
Supported hardware
USB 1.1 and 2.0 are supported (UHCI, OHCI and EHCI). There is also support for USB hubs, although the only USB HID devices supported include keyboard, mouse and USB flash drives.
Storage: internal hard disks with PATA/IDE and SATA/AHCI interfaces are supported natively.
File systems: supported file systems include FAT12, FAT16, FAT32 (long names support), ext2, ext3 and ext4 (partially), CDFS (including multisession, read-only), NTFS (read and write but no extended functions such as encryption) and XFS (read-only)
Audio: AC'97 audio codec support for Intel, nForce, nForce2, nForce3, nForce4, SIS7012, FM801, VT8233, VT8233C, VT8235, VT8237, VT8237R, VT8237R Plus and EMU10K1X chipsets. Intel High Definition Audio is supported on certain motherboards.
Video: works on any card and specific drivers are available for AMD and Intel chipsets
Network: TCP/IP stack and certain Ethernet network cards support
Development branches
KolibriACPI: extended ACPI support
Kolibri-A: Exokernel version of KolibriOS optimized for embedded applications and hardware engineering; only few AMD APU-based platforms are currently supported.
Reception
Dedoimedo.com reviewed KolibriOS in 2012:
Jesse Smith from DistroWatch Weekly wrote the following review about KolibriOS in 2009:
See also
MenuetOS - MenuetOS (32-bit version) upon which KolibriOS is based.
References
Further reading
Kolibri-A: a lightweight 32-bit OS for AMD platforms —University of Exeter, PCCAT 2011 p. 20-22 (2011)
External links
Floppy disk-based operating systems
Free software operating systems
Assembly language software
X86 operating systems
Lightweight Unix-like systems
Hobbyist operating systems |
https://en.wikipedia.org/wiki/Hauptwerk | Hauptwerk is a computer program from Milan Digital Audio that allows the playback or live performance of pipe organ music using MIDI and recorded sound samples.
Name
The name "Hauptwerk" is German for the "great manual" of an organ, from Haupt- (meaning ‘main’) and Werk (literally meaning ‘work’, but in this instance meaning a complete organ pipe cabinet and all its included ranks). The German pronunciation of "Hauptwerk" is .
History
Hauptwerk was originally developed and launched in 2002 by Martin Dyde, who, starting 2006, continued to develop it under Crumhorn Labs Ltd. In September 2008, Crumhorn Labs and Hauptwerk were acquired by Brett Milan of Milan Digital Audio LLC.
Product history
Version 1
Released 2002
Available for Windows only
Stops operated by MIDI Note messages
Simple Swell simulation (volume only)
Organ of St Annes, Moseley included
Version 2
Released 2006
Available as VSTi plugin
More flexibility in MIDI configuration
Phase alignment of release samples
Harmonic Swell simulation
Version 3
Released November 2007
Support for Mac OS X
Support for Multiple Touch-Screens
Voicing Control for individual pipes
Version 4
Released April 2011
Redesigned User Interface
Automatic facility to configure MIDI to support most manufacturers
Inbuilt MIDI recorder/player
User defined Combinations/Crescendos
Master Couplers available with all organs
Version 5
Released December 2019
Redesigned Audio Output Routing
3D Sound output
Impulse Response reverb capabilities
Removed Free Edition
Version 6
Released November 2020
Menu changes
Combination system changes
MIDI changes
Audio engine changes
Small changes + bug fixes
Methodology
Hauptwerk produces an audio signal in response to input received via the manual MIDI keyboard. This input may originate from an external MIDI keyboard or from a MIDI sequencing program. An organ is constructed using a set of recorded sample files in conjunction with an XML configuration file that defines organ parameters, such as ranks, stops, manuals, coupling and organ images for display in Hauptwerk's user interface.
The audio output is based on recorded samples which are then modified by several different technologies.
Sample playback
The recorded samples of the original pipes are divided into three main sections: start (attack), middle (sustain), and end (release or echo). When a note is played, the attack sample is played, followed by a loop of the sustain section. Start, end, and release loop points are stored in the recorded sample file. When the note is released, the release or echo section of the sample is used, or specific release sample files can be defined for a note or range of notes. This latter feature is useful in making the organ more realistic. For example, the echo of a pipe after a short period differs from that of a pipe that has been sounding for longer. Hauptwerk selects from multiple release samples based on the duration of the note. Tremulant effects are |
https://en.wikipedia.org/wiki/Cyber%20Coach | Cyber Coach is a Virtual Dance Instructor and Dance Mat system created by Quick Controls Ltd of Bolton, UK.
The system comprises a touch screen controller, a projector, sound system and some dance pads.
The dance pads are wireless and can be used to play one of several games including: Space Blaster, Disco Disco, Nimbler Numbers and Wiggle.
The system was shortlisted for a BETT Award in 2009 and won a National Business Award for Innovation in 2009.
Lancashire Grid for Learning undertook a comprehensive review of the system in 2009 and endorsed the system to their schools.
A version for primary schools called "Cyber Coach Smart" has been launched.
In 2017, Cyber Coach and Manchester Metropolitan University launched Emile Education
References
Dance teachers
Dance video games
Music video games |
https://en.wikipedia.org/wiki/Totally%20for%20Teens | Totally for Teens (also known as The Best of Totally for Teens or Totally 4 Teens) is an American failed television pilot created by Derrick Beckles and Sabrina Saccoccio for Cartoon Network's late night programing block, Adult Swim. It eventually aired on Adult Swim's "DVR theater" on January 19, 2011.
Production
Filmed in Brooklyn, New York, the pilot episode for Totally for Teens was written and produced by Derrick Beckles, who also starred in it. Produced alongside Ari Fishman (former The Daily Show producer from 2000 to 2005) and directed by Chris Grismer, Totally for Teens ran for approximately 12 minutes, and was released on January 6, 2009. It has not been aired, and its future status remains unknown. Comedy Central showed interest in the show and several actors were interested in working with him if it were to be picked up. Totally for Teens has had regular screenings at Street Carnage's "Monster Island", and Derrick has played it on comedy tours.
Summary
Described as a low-quality, live-action retro after school show, Totally for Teens is a parody of shows marketed for the teen demographic, which utilizes "teen lingo" and "teen styled" wardrobes.
In an interview with the Tea Party Boston, Beckles himself describes the Totally for Teens and his role in it as being "this teen show that never existed; basically I’m trying to give these teens the worst set of ethics and morals possible." The show features several clips from various vintage footage, one of which is a rap duo Riff Raff, who perform a song "D-I-S-E-A-S-E", which is about practicing safety against the contraction of AIDS in front of their classroom as part of an assignment, from a 1987 educational film. Sketch comedy and man-on-the-street segments are also featured. It also stars Leo Fitzpatrick as a cross dressing drug dealer, named "Mookie". Derrick is shown holding a lit cigarette, despite his opposition in real life as part of the Truth.com campaign, and in show as he attempts to dissuade a teenage boy against smoking. Street Carnage itself has called Totally for Teens a "warped teen show meets hyperactive video editing meets equal parts obnoxiousness and genius".
Cast
Pilot episode
{| class="wikitable plainrowheaders" border="1" style="width:100%;"
|-
! style="background:#ACACAC;"| Title
! style="background:#ACACAC; width:25%;"| Original air date
! style="background:#ACACAC; width:15%;"| Productioncode
|-
{{Episode list
|Title = Pilot
|OriginalAirDate =
|ProdCode = 101
|ShortSummary = The show begins with advertisements from "Drastic Pickles", which are pickles marketed for teens. Host Derrick appears in front of an audience of children, and begins by announcing what will precede over the course of the recording, which includes a performance by Good Charlotte. His first guest is the teen pop sensation Teen Insecurity, a girl modeled after the pop princess archetype. Upon interview, Teen Insecurity's negative perception of herself manifests into a floating flaming hea |
https://en.wikipedia.org/wiki/Incremental%20update | Incremental update may refer to:
Incremental backup
Incremental computing |
https://en.wikipedia.org/wiki/KTYN | KTYN (91.9 FM) was a radio station broadcasting a nostalgia music format. Licensed to Thayne, Wyoming, United States, the station was owned by Intermountain Public Radio and featured programming from Premiere Radio Networks.
The Federal Communications Commission cancelled KTYN's license on October 4, 2021, due to the station failing to file an application to renew its license.
Translators
References
External links
TYN
Lincoln County, Wyoming
Radio stations established in 2007
Radio stations disestablished in 2021
2007 establishments in Wyoming
2021 disestablishments in Wyoming
Defunct radio stations in the United States
TYN |
https://en.wikipedia.org/wiki/Line%202%20%28Nanjing%20Metro%29 | Line 2 of the Nanjing Metro () is a subway line that runs mainly in an east-west direction on the Nanjing Metro network, running from to ; it entered operation on May 28, 2010. It covers a length of with 26 stations. Of the 26 stations, 17 stations are underground, 2 stations are on the surface, and the other 7 station are either above ground or elevated stations.
The section between and was originally planned as an east extension of Line 2, but it entered operation, together with the main line, on the same day.
Opening timeline
Stations
Transfers to other modes of transportation
Rail
The Zijinshan railway station (紫金山站) of the Huhanrong Passenger Dedicated Line and the Shanghai–Nanjing Intercity High-Speed Railway (on its branch going to the new Nanjing South railway station, rather than the one to the Nanjing railway station) will be located next to Jinmalu station.
Bus
Maqun Bus Station, with services to a few cities east of Nanjing, is located near .
References
External links
Line 2 on the official Nanjing Metro website (includes route map)
Nanjing Metro lines
Siemens Mobility projects
Railway lines opened in 2010 |
https://en.wikipedia.org/wiki/Paul%20Schmidt | Paul Schmidt may refer to:
Paul Schmidt (computer programmer), president of the software company Photodex
Paul Schmidt (footballer) (1917–1961), Australian rules footballer
Paul Schmidt (interpreter) (1899–1970), German diplomatic translator
Paul Schmidt (inventor) (1898–1976), German engineer and inventor
Paul Schmidt (runner) (born 1931), German middle-distance runner
Paul Schmidt (stabbing victim) (198?–2023), Canadian homicide victim
Paul Schmidt (translator) (1934–1999), American translator, poet, playwright, and essayist
Paul Felix Schmidt (1916–1984), chess International Master and chess writer
Paul Gerhard Schmidt (1937–2010), German medievalist and professor of medieval Latin philology
Paul Karl Schmidt alias Paul Carell (1911–1997), chief press spokesman for Nazi Germany's Foreign Ministry and later purchaser author
Paul Wilhelm Schmidt (1845–1917), German theologian
See also
Paul Schmidtberger, author of Design Flaws of the Human Condition |
https://en.wikipedia.org/wiki/Charlon%20Gouder | Charlon Gouder is a Maltese journalist with the network One.
External links
Charlon Gouder asks police to investigate Caruana Galizia (Times of Malta)
Court: Charlon Gouder asks police to investigate DCG (The Malta Independent Online)
YouTube
https://www.timesofmalta.com/mobile/articles/view/20120611/local/caruana-galizia-cleared-in-gouder-libel-case.423796
Maltese journalists
Living people
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/Fox%20Movies%20%28TV%20channel%29 | Fox Movies, is an international movie channel owned by Fox Networks Group, a part of Walt Disney Direct-to-Consumer & International. The channel was launched on February 8, 2007.
History
fXM: Movies from Fox channel in the US was renamed to Fox Movie Channel on March 1, 2000 until September 2013 when the channel changed its name back to FXM.
In 2008, Fox Movies was launched by Fox International Channels and Rotana Media Services along with Fox Series channels in the Middle East market. Fox then purchased a stake in Rotana, while the joint venture agreed with Disney to carry Disney and American Broadcasting Company content on the two channels for four years. In early March 2010, Fox International Channels agreed to move its Middle East and North Africa market channels' operations from Hong Kong and other locations to an Abu Dhabi facility. On 1 July 2011, Fox Movies was made available in Portugal on pay services and Angola and Mozambique on free-to-air.
On July 1, 2011, Fox Movies was launched by Fox International Channels Portugal with airing many genres including drama, comedy, science fiction, action and horror with programming during the summer slate included hits such as X-Men and The Queen.
On January 1, 2012, Star Movies was rebranded to Fox Movies Premium and FOX Movies Premium HD, available in Hong Kong and selected Southeast Asian countries. In India, China, Middle East and North Africa, Taiwan and the Philippines (SD only), the Star Movies brand remained until July 2017 when was rebranded to Fox Movies.
On October 2, 2012, Fox International Channels would launch another Fox Movies with being available to Albania, Bosnia and Herzegovina, Bulgaria, Croatia, Macedonia, Montenegro, Serbia, Slovenia and Kosovo regions.
Market channels
References
External links
Official Site
Fox Networks Group
Disney television networks
Movie channels
Television channels and stations established in 2007 |
https://en.wikipedia.org/wiki/JournalSeek | JournalSeek is an online database covering academic journals. It includes journals published by over 5400 publishers. The database includes journal descriptions and links to the journals' homepages.
See also
List of academic databases and search engines
References
External links
Bibliographic databases and indexes
Online databases |
https://en.wikipedia.org/wiki/13th%20Street%20%28disambiguation%29 | 13th Street (TV channel) is a European and Australian television channel featuring action and suspense programming.
13th Street may also refer to:
Television
13th Street (Australian TV channel)
13th Street (German TV channel)
13ème Rue (French TV channel), the French version of 13th Street.
Calle 13 (Spanish TV channel), the Spanish version of 13th Street.
Places in the United States
13th Street (Manhattan), a street in Manhattan, New York City
13th Street (Omaha), a street in Omaha, Nebraska
13th Street (St. Louis), a street in St. Louis, Missouri
13th Street (Sacramento RT), a Sacramento RT light rail station in Sacramento, California
13th Street (SEPTA station), a SEPTA rapid transit station in Philadelphia, Pennsylvania
See also
13th Avenue (disambiguation) |
https://en.wikipedia.org/wiki/List%20of%20Radio%20Philippines%20Network%20affiliate%20stations | These are the nationwide via satellite-reach TV and Radio stations of the Radio Philippines Network (CNN Philippines).
Free-to-air television stations
RPN Network
List as of March 16, 2015:
Analog (shut off by end-2023)
Digital
RPN's upcoming expansion of its digital terrestrial television will be announced soon as possible in other key cities nationwide.
Affiliate stations
RPN Radio stations
See also
CNN Philippines
Radio Philippines Network
Nine Media Corporation
References
Radio Philippines Network
Philippine television-related lists |
https://en.wikipedia.org/wiki/Pertemps%20Final | |}
The Pertemps Network Final is a Premier Handicap National Hunt hurdle race in Great Britain which is open to horses aged five years or older. It is run on the New Course at Cheltenham over a distance of about 3 miles (2 miles 7 furlongs and 213 yards, or 4,785 metres), and during its running there are twelve hurdles to be jumped. It is a handicap race, and it is scheduled to take place each year during the Cheltenham Festival in March.
History
The event could've been established in 1974, if it was introduced as a replacement for a previous race at the Festival, the George Duller Handicap Hurdle. It could've been originally sponsored by Coral, and for much of its early history it could've been titled the Coral Golden Hurdle Final. It has had various sponsors since 1993, and the latest of these, Pertemps, possibly began supporting the race in 2002.
The Pertemps Network Final may have been served by a series of qualifier races which could take place during the preceding five months. A horse has to be placed in the first four in a qualifier race to be eligible to run in the Final. In the 2022–23 season there were maybe 15 qualifier races, all in Great Britain. In previous seasons qualifiers have included races in Ireland and France.
The race possibly could be raised from Listed to Grade Three status from 2018 and reclassified as a Premier Handicap from the 2023 running when Grade 3 status was renamed by the British Horseracing Authority.
Records
Most successful horse (3 wins):
Willie Wumpkins – 1979, 1980, 1981
Leading jockey (3 wins):
Jim Wilson – Willie Wumpkins (1979, 1980, 1981)
Davy Russell – Mall Dini (2016), Presenting Percy (2017), Delta Work (2018)
Barry Geraghty – Inching Closer (2003), Sire Du Berlais (2019, 2020)
Leading trainer (4 wins):
Jonjo O'Neill – Danny Connors (1991), Inching Closer (2003), Creon (2004), Holywell (2013)
Winners
Weights given in stones and pounds.
See also
Horse racing in Great Britain
List of British National Hunt races
References
racenewsonline.co.uk – Racenews Archive (21 February 2008).
Racing Post:
, , , , , , , , ,
, , , , , , , , ,
, , , , , , , , ,
, , ,
External links
Race Recordings
National Hunt races in Great Britain
Cheltenham Racecourse
National Hunt hurdle races
Recurring sporting events established in 1974
1974 establishments in England |
https://en.wikipedia.org/wiki/Text%20attributes | In computing, text attributes (in the sense of attributes of a text) are some data associated with particular chunks of text, except of its characters itself. Say, something more than a plain text.
See formatted text for text attributes in word processing.
See HTML#Elements and HTML attribute about text attributes in HTML.
See text mode for hardware-implemented screen text attributes;
particularly, VGA compatible text mode describes such text attributes on PC compatibles.
Also, a text attribute may refer to an attribute (e.g. to an XML attribute), those value consists of a text. |
https://en.wikipedia.org/wiki/Network%20of%20Asian%20River%20Basin%20Organizations | The Network of Asian River Basin Organizations (NARBO), established in 2003 and active since February 2004, works to bring Integrated Water Resources Management in river basins throughout the Asia-Pacific region. When it was established, 43 institutions signed up for NARBO, and it has since grown to include 65 institutions, of which 22 are River Basin Organizations, 17 Government Organizations, 17 Regional Knowledge Partners, 17 Inter Regional Knowledge Partners and 8 Development Cooperation Agencies. The organization has its headquarters in Japan.
The first chairperson is Dr. M. Basuki Hadimuljono from the Ministry of Public Works, Indonesia and Vice chairperson is Dr. M.U.A. Tennakoon from Mahaweli Authority of Sri Lanka. The secretariats are composed by the Japan Water Agency (JWA), Asian Development Bank (ADB) and Asian Development Bank Institute (ADBI).
References
External links
Official site
International organizations based in Japan
Water management authorities |
https://en.wikipedia.org/wiki/Private%20education%20in%20Canada | There are a number of private schools in Canada, that provide elementary and secondary education. A number of private universities and colleges in Canada. The private education network in Canada is managed according to the requirements of the provincial laws applying to private education.
A number of private schools are based around a particular philosophy of education, such as Montessori, Waldorf, or some schools related to a particular religious community. Private schools can be independently owned and managed, while others can be regrouped under school groups, that may can operate schools in more than one province, thus having the obligation to abide to particular provincial education laws.
History
Secondary education
During the formation of Canada there were two opposing regions, the French Lower Canada (FLC) and the British Upper Canada (BUC). Within these regions, two types of schooling systems emerged: the French Catholic system (developed from the French Lower Canada) and the English Protestant system (developed from the British Upper Canada). The FLC schooling system promoted the integration of the French language, culture and Catholicism. They limited advanced education to the clergy and those training for a profession, however most of the schools were funded by the church. On the other hand, the BUC schooling system promoted that they were not affiliated to any specific religion. However, after analyzing the curriculum and values embedded within this system, it is clear that they were tied to Christianity. However, a key feature of the BUC schooling system was the implementation of tuition. Tuition limited school attendance to the wealthy, which could be argued to be the basis of private school tuition in Canada.
Upper Canada College (UCC) is one of the best known private secondary schools in Canada. This is because the school has managed to continue educating Canada's social and economic elite, due to rising tuition costs. Private secondary schools are separate entities from the public education system in the sense that their funding is often based on tuition and private donors. Tuition rates vary by school region and can fluctuate year to year. Tuition ranges from $31,000- $62,000. Thus, making UCC one of the most expensive yet prestigious private schools in Canada.
Private tuition costs have been continuously rising, which can be attributed to the reproduction of classism and educational inequalities in society. Tuition costs for private secondary education can be seen as only attainable by family who has high economic status. This is occurring because the cost of living in Canada rising, while the median annual income of families is staying on a stable trajectory. This means that families have to spend more on costs of living (such as rent, groceries, etc.) while their incomes stay the same, meaning they are unable to additionally compensate for private school education. In Toronto, the median income is $83,020 (2017). Compar |
https://en.wikipedia.org/wiki/KIIS%20Network | The KIIS Network is an Australian commercial radio stations owned and operated by the ARN. Formerly branded as the Mix Network, the network was rebranded as the KIIS Network in 2015 following the relaunch of KIIS 101.1 Melbourne. The KIIS Network is named after KIIS-FM, a Los Angeles based radio station broadcast on the 102.7 MHz FM band.
History
In November 2014, ARN announced that from January 2015 a year after the demise of Mix 101.1 in Melbourne and Mix 106.5 in Sydney, the Mix Network would be rebranded as the KIIS Network, with KIIS 101.1 and KIIS 106.5 and alongside 97.3FM and Mix 102.3. The Brisbane and Adelaide stations retained their respective station names and music formats, but adopted the same branding themes inline with their KIIS sister stations. Mix 106.3 in Canberra is also a part of the network, but predominantly carries its own programming. An announcement of their branding being realigned to the rest of the KIIS Network was made in December 2019.
In December 2014, it was announced that Fairfax Media would merge with the Macquarie Radio Network and sell 96FM Perth to ARN. In January 2015, 96FM joined the KIIS Network.
In January 2022, it was announced that Brisbane's 97.3FM would rebrand to KIIS 97.3, following the acquisition of Grant Broadcasters by ARN.
Stations
As of 28 January 2022, the KIIS Network consists of fourteen radio stations.
Mix 106.3 Canberra is a joint-venture with Southern Cross Austereo and programmed as part of the Triple M network. However, it does air some networked programming from joint venture partner ARN (The Christian O'Connell Show from Gold 104.3 Melbourne and Jonesy & Amanda from 101.7 WSFM Sydney).
Networked shows
Will & Woody (from KIIS 101.1 Melbourne)
The Kyle and Jackie O Hour of Power (from KIIS 106.5 Sydney)
The Pick Up (except Perth) (from KIIS 106.5 Sydney)
The Night Show with Mitch Churi (Melbourne and Sydney only) (from KIIS 106.5 Sydney)
Up Late with Zach & Dom (except Adelaide and Perth) (from KIIS 97.3 Brisbane)
Up Early with Zach & Dom (except Adelaide and Perth) (from KIIS 97.3 Brisbane)
First Play (Melbourne and Sydney only)
Planet Oz (Melbourne and Sydney only)
iHeartRadio Countdown (except Brisbane and Adelaide)
The Christian O'Connell Show (except Melbourne and Sydney) (from Gold 104.3 Melbourne)
Jase & Lauren (from KIIS 101.1 Melbourne)
The Kris Fade Show (from Virgin Radio Dubai)
Digital radio
The KIIS Network simulcasts each station in the network on DAB+ digital radio in their local markets. It also broadcasts in a joint venture with the Pure Gold Network, the adult contemporary-formatted Chemist Warehouse Remix. The KIIS Network stations are also available online via iHeartRadio.
On DAB+ in all markets (except Perth and Canberra), the KIIS Network operates a 90's pop digital station branded as KIIS 90s in Sydney and Melbourne. The station also operates in Brisbane and Adelaide under their respective FM brand names (i.e. Mix 102.3 90s in Adelaide), alongside an |
https://en.wikipedia.org/wiki/Leap%20year%20problem | The leap year problem (also known as the leap year bug or the leap day bug) is a problem for both digital (computer-related) and non-digital documentation and data storage situations which results from errors in the calculation of which years are leap years, or from manipulating dates without regard to the difference between leap years and common years.
Categories
Leap year bugs typically fall into two categories, based on the amount of impact they may have in real-world usage:
Those that lead to error conditions, such as exceptions, error return codes, uninitialized variables, or endless loops
Those that lead to incorrect data, such as off-by-one problems in range queries or aggregation
Examples
Python
The following Python code is an example of a Category 1 leap year bug. It will work properly until today becomes February 29. Then, it will attempt to create a February 29 of a common year, which does not exist. The date constructor will raise a ValueError with the message "day is out of range for month".
from datetime import date
today = date.today()
later = today.replace(year = today.year + 1)
Windows C++
The following Windows C++ code is an example of a Category 1 leap year bug. It will work properly until the current date becomes February 29 of a leap year. Then, it will modify st to represent February 29 of a common year, a date which does not actually exist. Passing st to any function that accepts a SYSTEMTIME struct as a parameter will likely fail.
For example, the SystemTimeToFileTime call shown here will return an error code. Since that return value is unchecked (which is extremely common), this will result in ft being left uninitialized.
SYSTEMTIME st;
FILETIME ft;
GetSystemTime(&st);
st.wYear++;
SystemTimeToFileTime(&st, &ft);
Microsoft C#
The following .NET C# code is an example of a Category 1 leap year bug. It will work properly until dt becomes February 29. Then, it will attempt to create a February 29 of a common year, which does not exist. The DateTime constructor will throw an ArgumentOutOfRangeException.
DateTime dt = DateTime.Now;
DateTime result = new DateTime(dt.Year + 1, dt.Month, dt.Day);
JavaScript
The following JavaScript code is an example of a Category 2 leap year bug. It will work properly until dt becomes February 29, such as on 2020-02-29. Then it will attempt to set the year to 2021. Since 2021-02-29 doesn't exist, the Date object will roll forward to the next valid date, which is 2021-03-01.
var dt = new Date();
dt.setFullYear(dt.getFullYear() + 1);
Bad leap year algorithm (many languages)
The following code is an example of a leap year bug that is seen in many languages. It may cause either a Category 1 or Category 2 impact, depending on what the result is used for. It incorrectly assumes that a leap year occurs exactly every four years.
bool isLeapYear = year % 4 == 0;
The correct leap year algorithm is explained at Leap Year Algorithm.
Occurrences
Microsoft Excel has, since its ea |
https://en.wikipedia.org/wiki/Wesabe | Wesabe was a personal finance management website established in December 2005 that analyzed a user's financial data to provide appropriate advice on how to save money. The site went live in November 2006.
The company behind the website announced on 20 June 2007 that it had secured a US$4 million investment round to continue funding the website. Wesabe announced 30 June 2010 that it was shutting down service on 31 July 2010. Existing users were able to download and export their data, and use a forthcoming open source version of the site on their computer.
New entrants are competing for the PFM market by supplying personal finance tools through employer HR departments.
References
Financial services companies established in 2005
Financial services companies disestablished in 2010
Finance websites
Internet properties established in 2005
Internet properties disestablished in 2010
Defunct online companies of the United States |
https://en.wikipedia.org/wiki/Local%20knowledge%20problem | In economics, the local knowledge problem is the argument that the data required for rational economic planning are distributed among individual actors and thus unavoidably exist outside the knowledge of a central authority.
Friedrich Hayek's description
Friedrich Hayek described this distributed local knowledge as such:
Today it is almost heresy to suggest that scientific knowledge is not the sum of all knowledge. But a little reflection will show that there is beyond question a body of very important but unorganized knowledge which cannot possibly be called scientific in the sense of knowledge of general rules: the knowledge of the particular circumstances of time and place. It is with respect to this that practically every individual has some advantage over all others because he possesses unique information of which beneficial use might be made, but of which use can be made only if the decisions depending on it are left to him or are made with his active cooperation. We need to remember only how much we have to learn in any occupation after we have completed our theoretical training, how big a part of our working life we spend learning particular jobs, and how valuable an asset in all walks of life is knowledge of people, of local conditions, and of special circumstances. To know of and put to use a machine not fully employed, or somebody's skill which could be better utilized, or to be aware of a surplus stock which can be drawn upon during an interruption of supplies, is socially quite as useful as the knowledge of better alternative techniques. And the shipper who earns his living from using otherwise empty or half-filled journeys of tramp-steamers, or the estate agent whose whole knowledge is almost exclusively one of temporary opportunities, or the arbitrageur who gains from local differences of commodity prices, are all performing eminently useful functions based on special knowledge of circumstances of the fleeting moment not known to others.
Because while incomplete this distributed knowledge is essential to economic planning, its necessity is cited as evidence in support of the argument that economic planning must be performed in a similarly distributed fashion by individual actors. In other words, economic planning by a central actor (e.g. a government bureaucracy or a central bank) necessarily lacks this information because, as Hayek observed, statistical aggregates cannot accurately account for the universe of local knowledge:
One reason why economists are increasingly apt to forget about the constant small changes which make up the whole economic picture is probably their growing preoccupation with statistical aggregates, which show a very much greater stability than the movements of the detail. The comparative stability of the aggregates cannot, however, be accounted for—as the statisticians occasionally seem to be inclined to do—by the "law of large numbers" or the mutual compensation of random changes. The number of element |
https://en.wikipedia.org/wiki/Light%20valve | A light valve (LV) is a device for varying the quantity of light, from a source, which reaches a target. Examples of targets are computer screen surfaces, or a wall screen in the case of a light projector.
There are two basic principles of achieving this. One is by deflecting the light on its way to the target (a reflective LV). The other method is to block the light (a transmissive LV).
The blocking method has found its way into liquid crystal flat screens (LCDs), video projectors and rear projection TVs. In this type of screens and projectors, the source light is first polarised by a filter in one direction and then passed on to another filter, filled with liquid crystals. By changing the voltage applied to this crystal filter, it will work as a switching polarising filter, giving different gray scales of the light coming out. The light is changed only once for each image frame. The light valve thus consists of the two polarising filters, where one has a voltage controlled switch function thanks to the properties of the liquid crystals. This type of valve is often referred to as a liquid crystal light valve.
The other principle, the reflective LV, works by either reflecting the light towards the target or deflecting it away. The portion of light that is reflected on the target decides the gray scale. This re- and deflection occurs many times a second. Should this happen at too low a frequency, the human eye and brain would perceive it as flickering, but due to sufficiently high frequency, a human will be "tricked" into viewing it as a continuum, a smooth shift in brightness. Examples of the reflective LV type are the Digital Micromirror Device (DMD), Eidophor's oil-film based system, and the Grating Light Valve.
See also
Spatial light modulator
Femtosecond pulse shaping
Multiphoton intrapulse interference phase scan
References
Display technology
Optics |
https://en.wikipedia.org/wiki/Segue%203 | Segue 3 is a faint star cluster of the Milky Way galaxy discovered in 2010 in the data obtained by Sloan Digital Sky Survey. It is located in the Pegasus constellation at the distance of about 17 kpc from the Sun and moves away from it with the velocity of .
Segue 3 is extremely faint—its visible absolute magnitude is estimated at −1.2 or even at about , which means that the cluster is only 100 to 250 times brighter than the Sun. Its small radius—of about 2.1 pc—is typical for the galactic globular clusters. The cluster has a slightly flattened shape and shows some evidence of the tidal disruption.
The metallicity of Segue's 3 stars is , which means that they contain 70 times less heavy elements than the Sun. These stars are more than 12 billion year old. Segue 3 appears to be one of the faintest globular clusters of the Milky Way.
References
Milky Way
Globular clusters
? |
https://en.wikipedia.org/wiki/G%C3%A4strikland%20Runic%20Inscription%207 | Gästrikland Runic Inscription 7 or Gs 7 is the Rundata catalog number for a Viking Age memorial runestone located in Torsåker, Gävleborg County, Sweden, which was part of the historic province of Gästrikland.
Description
This runestone is composed of limestone and is 2.1 meters in height. The runestone is located in the porch of the Torsåker church. The inscription consists of runic text in the younger futhark in a band surrounding a Christian cross. In the inscription, the runes kuþmuntro for the name Guðmundr, which the text says was a man who drowned, are depicted directly below the cross. To the left of the name is a depiction of a woman that is 22 centimeters in height. The composition balances the figure of the woman with the runes þrukn-þi for the word druknaði ("drowned") on the other side of the name.
The inscription is classified as being carved in runestone style RAK, which is the style classification for runic text that is within straight bands that do not have any serpent or animal heads attached. The inscription is unsigned but has been attributed to the runemaster Åsmund, who was active in the first half of the eleventh century. Åsmund used two bind runes in this runic text, combining in stin the s-rune and t-rune for the word stein ("stone") and in bruþur combining the u-rune and r-rune for the word bróður ("brother").
Of the personal names listed in the inscription, Guðbjôrn means "God's Bear" and Guðmundr means "God's Hand." The use of the common name element Guð in the two names would indicate that they were members of the same family, although the runic text, which is damaged and incomplete, does not directly state this. A common practice at that time in Scandinavia was the repeating one of the name elements from a parent's name in the names of the children to show the family connection.
Inscription
Transliteration of the runes into Latin characters
× -(u)(i)(r)(i) riti s=tin þino × at kuþbiurna × bruþu=r si-... ...m... × kuta ' uas muþiʀ × kuþmu-r × ... : kuþmuntro : þrukn-þi :
Transcription into Old Norse
<-uiri> rétti stein þenna at Guðbjôrn, bróður si[nn] ... <kuta> var móðir Guðmu[nda]r. ... Guðmundr drukn[a]ði.
Translation in English
... erected this stone in memory of Guðbjôrn, his brother ... <kuta> was Guðmundr's mother ... Guðmundr drowned.
See also
List of runestones
References
Gastrikland Runic Inscription 007 |
https://en.wikipedia.org/wiki/Cobalt%20%28CAD%20program%29 | Cobalt is a parametric-based computer-aided design (CAD) and 3D modeling program that runs on both Macintosh and Microsoft Windows operating systems. The program combines the direct-modeling way to create and edit objects (exemplified by programs such as SpaceClaim) and the highly structured, history-driven parametric way exemplified by programs like Pro/ENGINEER. A product of Ashlar-Vellum, Cobalt is Wireframe-based and history-driven with associativity and 2D equation-driven parametrics and constraints. It offers surfacing tools, mold design tools, detailing, and engineering features. Cobalt includes a library of 149,000 mechanical parts.
Cobalt's interface, which the company named the "Vellum interface" after its eponymous flagship product, was designed in 1988 by Dr. Martin Newell (who created the Utah teapot in 1975 and went on to work at Xerox PARC, where the WIMP paradigm for graphical user interfaces was invented) and Dan Fitzpatrick. The central feature of the Vellum interface is its "Drafting Assistant," which facilitates the creation and alignment of the new geometry.
Cobalt has received praise for its free-form surfaces on solid modeled objects.
Design
The distinguishing characteristics of Cobalt are its ease of use and the quick learning curve for new users. Cobalt inherited its 2D and 3D wire frame features from "Vellum." However, with Cobalt, wire frame geometry—which does not have to be planar—can be subsequently revolved or extruded relative to any plane or along a curved path to create 3D solids. Cobalt also allows 3D objects to be created directly using 3D tools while still retaining the designer's ability to edit those objects via history-driven parametrics and later to add further constraints. Both types of solids—extruded 2D wire frame and directly created 3D solids—can be seamlessly mixed in the same drawing. Whereas most history-based parametric solid modelers require the designer to rigorously follow a logical progression while creating models and tend to require that the designer think ahead about the planned order of transmutations of the solid model, Cobalt has a more freeform, less structured way of solid modeling that the developer refers to as "Organic Workflow".
Cobalt's less structured modeling environment coupled with an integral ray-tracing capability makes it suitable for brainstorming and product development. The program's history-driven modeling and equation-driven parametrics and constraints permit designers to edit the dimensions and locations of key features in models without the need for major redesign—much like changing the value of a single cell in a complex spreadsheet.
Drafting Assistant
Ashlar-Vellum's patented, -year-old "Drafting Assistant" is the central component of Ashlar's "Vellum interface".
The Drafting Assistant tracks the position of the designer's cursor and looks for nearby geometry. It then automatically displays information alongside the cursor regarding nearby geometric featu |
https://en.wikipedia.org/wiki/3%20GB%20barrier | In computing, the term 3 GB barrier refers to a limitation of some 32-bit operating systems running on x86 microprocessors. It prevents the operating systems from using all of 4 GiB () of main memory. The exact barrier varies by motherboard and I/O device configuration, particularly the size of video RAM; it may be in the range of 2.75 GB to 3.5 GB. The barrier is not present with a 64-bit processor and 64-bit operating system, or with certain x86 hardware and an operating system such as Linux or certain versions of Windows Server and macOS that allow use of Physical Address Extension (PAE) mode on x86 to access more than 4 GiB of RAM.
Whatever the actual position of the "barrier", there is no code in operating system software nor any hardware architectural limit that directly imposes it. Rather, the "barrier" is the result of interactions between several aspects of both.
Physical address limits
Many 32-bit computers have 32 physical address bits and are thus limited to 4 GiB (232 words) of memory. x86 processors prior to the Pentium Pro have 32 or fewer physical address bits; however, most x86 processors since the Pentium Pro, which was first sold in 1995, have the Physical Address Extension (PAE) mechanism, which allows addressing up to 64 GiB (236 words) of memory. PAE is a modification of the protected mode address translation scheme which allows virtual or linear addresses to be translated to 36-bit physical addresses, instead of the 32-bit addresses available without PAE. The CPU pinouts likewise provide 36 bits of physical address lines to the motherboard.
Many x86 operating systems, including any version of Linux with a PAE kernel and some versions of Windows Server and macOS, can use PAE to address up to 64 GiB of memory on an x86 system.
There are other factors that may limit this ability to use up to 64 GiB of memory, and lead to the "3 GB barrier" under certain circumstances, even on processors that implement PAE. These are described in the following sections.
Chipset and other motherboard issues
Although, as noted above, most x86 processors from the Pentium Pro onward are able to generate physical addresses up to 64 GiB, the rest of the motherboard must participate in allowing RAM above the 4 GiB point to be addressed by the CPU. Chipsets and motherboards allowing more than 4 GiB of RAM with x86 processors do exist, but in the past, most of those intended for other than the high-end server market could access only 4 GiB of RAM.
This, however, is not sufficient to explain the "3 GB barrier" that appears even when running some x86 versions of Microsoft Windows on platforms that can access more than 4 GiB of RAM.
Memory-mapped I/O and disabled RAM
Modern personal computers are built around a set of standards that depend on, among other things, the characteristics of the original PCI bus. The original PCI bus implemented 32-bit physical addresses and 32-bit-wide data transfers. PCI (and PCI Express and AGP) devices present at |
https://en.wikipedia.org/wiki/Nokia%20C5-00 | The Nokia C5-00 is the first in the new (at the time) Cseries of Nokia phones, announced March 2010. The C5-00 is a smartphone with messaging and social networking features, including, for example, Facebook and Flickr applications. The C5-00 allows multitasking and has a display and a 5.0-megapixel camera (C5-00.2: 5 MP). It also includes GPS and a free navigation courtesy of Ovi Maps. It runs on Symbian OS with S60 3rd Edition Feature Pack 2.
It has a MicroSD slot with support for up to 16-gigabyte cards (C5-00.2: 32 GB) – the Nokia C5 comes with a two-gigabyte card in the box. The device dimensions are just over thin and across and high and the battery life is good for up to 12 hours of talk time (GSM). It has a working memory (RAM) of 128 MB (C5-00.2: 256 MB).
Available in white and warm grey, the Nokia C5-00 was made globally available in the second quarter of 2010.
The C5-00 comes in a monoblock form factor and weighs with the battery. It has a 5-way Navi-key, two soft keys, separate call, end clear and application keys as well as volume keys on the side. The phone user interface and the ring tones can be customized.
The announced maximum talk time varies from 4.9 hours in 3G networks to up to 12 hours in plain GSM networks. The maximum standby times are 630 and 670 hours respectively. Music can be played for a maximum of 34 hours if the phone is in the offline mode.
The phone features Bluetooth connectivity, a 3.5 mm AV connector and a stereo FM radio. It can act as a data modem, supports calendar and contact synchronization with Microsoft Outlook and can be charged via USB. Conference calls with up to three participants can also be made.
The Nokia C5-00 also features an integrated web browser. It supports the XHTML markup language, Flash Lite 3.0, video streaming and RSS feeds.
The camera on the back has a flash with an announced operating range of 1.5 meters. The camera has a few different capture, colour tone, scene and white balance modes and has a horizontal orientation. There is also a photo editor on device. Video can be captured for as long as there is memory available. The device also features a secondary, VGA resolution camera for video calls.
The Nokia C5-00.2 as of 2011 comes with a 5-megapixel camera, 256 MB RAM and support for up to 32-gigabyte cards.
References
External links
Specs at GSM Arena, includes pictures
Nokia smartphones
Portable media players
S60 (software platform)
Digital audio players
Personal digital assistants
Mobile phones introduced in 2010
Devices capable of speech recognition
Mobile phones with user-replaceable battery
de:Nokia CSeries#Nokia C5-00 |
https://en.wikipedia.org/wiki/Auzentech | Auzentech was a Korean computer hardware manufacturer that specialized in high-definition audio equipment and in particular PC sound cards.
Auzentech has its origins in March 2005, when under the company name HDA (HiTeC Digital Audio), the company launched the X-Mystique 7.1, the first consumer add-in sound card to feature Dolby Digital Live.
Initially only a manufacturer, HDA's products were commercialized worldwide by a network of local distributors, including BlueGears as their vendor in the United States.
In 2006 the company took distribution into their own hands, ceasing relations with BlueGears, and subsequently changing their brand name to Auzen (a name which originates from "Audio" and "Zen") and their company name to Auzentech.
Since that time the company continued to incorporate new sound cards into their lineup in an effort to compete in a market dominated by Creative Labs. Auzentech sought to provide customers with features not present in Creative's sound cards at that time, such as real time multi-channel audio encoding and built-in TOSLINK connections. These features enable users to have multichannel realtime audio (like that originating in PC games) over a single digital line, instead of the previously unavoidable three analog lines running from the PC to the speakers. Also present in all Auzentech sound cards are user-replaceable opamps, which offer the possibility to further improve the out-of-the-box quality of analog outputs.
Eventually expansion led Auzentech to broaden their range of products to include items such as speakers, microphones and PC cases among others.
Auzentech has recently switched from the C-Media audio processors used in their earlier cards to the X-Fi audio DSP, licensed from their competitor, Creative Labs.
Since early 2014, Auzentech's official web site has been directing to a park page, and their technical support department ceased to provide any service.
Products
Based on C-Media chipsets
X-Mystique 7.1 GoldBased on the CMI 8768+ chipset. Launched in June 2005. First PC consumer add-in sound card to feature Dolby Digital Live.
X-Plosion 7.1 DTS ConnectBased on the CMI 8770 chipset. First PC consumer sound card to feature DTS Connect certification. In June 2009, the card was re-released, with its name changed to X-Plosion 7.1 Cinema (discontinued).
X-Meridian 7.1Based on the CMI 8788 chipset. Launched in February 2006, it was the first card launched with the Auzentech brand.
X-Meridian 7.1 2GBased on the CMI 8788 chipset. Launched in December 2010
X-Raider 7.1Based on the CMI 8768 chipset. Launched in July 2009, the X-Raider is a 24-bit, 96 kHz PCI 2.2 compliant card, supporting bus mastering modes.
Based on Creative Labs' X-Fi chipset
X-Fi Prelude 7.1Launched in August 2007, the Prelude was the first time the X-Fi chip was used in a product not manufactured by Creative Labs.
X-Fi ForteWith all previous Auzentech sound cards being PCI cards, launched in January 2009, the Forte was Auzentec |
https://en.wikipedia.org/wiki/WYNW | WYNW (92.9 FM) is a radio station broadcasting a religious format. Licensed to Birnamwood, Wisconsin, United States, the station is owned by Relevant Radio, Inc. and features programming from Relevant Radio.
References
External links
YNW
Relevant Radio stations |
https://en.wikipedia.org/wiki/Stefan%20Burr | Stefan Andrus Burr (born 1940) is a mathematician and computer scientist. He is a retired professor of Computer Science at The City College of New York.
Burr received his Ph.D. in 1969 from Princeton University under the supervision of Bernard Dwork; his thesis research involved the Waring–Goldbach problem in number theory, which concerns the representations of integers as sums of powers of prime numbers.
Many of his subsequent publications involve problems from the field of Ramsey theory. He has published 27 papers with Paul Erdős. The Burr–Erdős conjecture, published as a conjecture by Burr and Erdős in 1975, solved only in 2015, states that sparse graphs have linearly growing Ramsey numbers.
Selected publications
with P. Erdõs and J. H. Spencer:
with P. Erdõs, R. J. Faudree, C. C. Rousseau and R. H. Schelp:
References
Living people
20th-century American mathematicians
21st-century American mathematicians
Combinatorialists
Princeton University faculty
City College of New York faculty
1940 births
Princeton University alumni |
https://en.wikipedia.org/wiki/Wong%20Jing%20filmography | This page contains the filmography of Wong Jing.
Filmography
Television series
References
External links
Wong Jing at the Hong Kong Movie DataBase
Wong Jing at Hong Kong Cinemagic
Male actor filmographies
Hong Kong filmographies
British filmographies
Director filmographies |
https://en.wikipedia.org/wiki/Universidad%20An%C3%A1huac%20Canc%C3%BAn | The Anáhuac Cancún University belongs to the Anahuac University Network, affiliated with the Anahuac University Network (RUA), the international education system of the Legion of Christ, in 18 countries and serving over 100,000 students from kindergarten to graduate school.
The university's program is coordinated with those of European universities. It has foreign students, both under curricula or by an abroad program
Name
"Anáhuac" means “near the water”. The name passed on to the whole network because of the location of the first university in the network, the '"Anáhuac México Norte University" located in the area of Lomas Anáhuac in Interlomas in Mexico City. Symbolically, the name refers to "the lake region that gave central place at the Aztec capital: Tenochtitlán, Central America's most populous and largest cultural development, where the Mexico City now stands and in it, the university".
Motto
“Vince In Bono Malum”, or "Defeat Evil with Good".
Athletics
The school has an American football team, the Leones Anáhuac Cancún, which has competed in ONEFA since 2007. They have won two conference titles in 2009 and 2019.
References
External links
University website
University official page on Facebook
University official page on Twitter
Private universities and colleges in Mexico
Universities and colleges in Quintana Roo
Regnum Christi
Legion of Christ
Anahuac universities
Universidad
Universities and colleges established in 2000
2000 establishments in Mexico |
https://en.wikipedia.org/wiki/KXVR-LP | KXVR-LP (107.9 FM, "Alcance Broadcast Network") is a radio station broadcasting a religious format. Licensed to Corpus Christi, Texas, United States, the station serves the Corpus Christi area. The station is currently owned by Comunidad Cristiana of Corpus Christi.
References
External links
XVR-LP
XVR-LP
XVR-LP |
https://en.wikipedia.org/wiki/Ladies%20of%20Liberty%20Alliance | The Ladies of Liberty Alliance (LOLA) is a network of independent, libertarian women leaders who, through their careers and/or personal endeavors, are dedicated to spreading the ideas of individual liberty and free markets. Participation in the Ladies of Liberty Alliance is open to any female who identifies with, or is wishing to explore, libertarian ideas.
LOLA participation is free and self-defined.
The mission of the Ladies of Liberty Alliance (LOLA) is to educate and empower female leaders within the liberty movement".
Ladies of Liberty Alliance (LOLA) recruits, trains, and promotes activists, advocates, and leaders for the advancement of liberty, peace, and a freer society.[3]
Founding
In 2009, a group of women concerned about the shortage of female leaders in the fight for liberty started a group to address the problem and called themselves the Ladies of Liberty Alliance (LOLA). For the next three years, LOLA volunteers worked to build a network of libertarian women. Volunteers spoke at events, conducted outreach to new ladies of liberty, and built a support network to increase the number of women dedicated to becoming leaders within liberty-minded organizations.
In 2011, the overwhelming demand for LOLA from women around the country drove the decision to, under the direction of Nena Whitfield, officially establish Ladies of Liberty Alliance as a full-time, non-profit educational organization with the mission of educating and empowering female leaders within the liberty movement.
In 2018, LOLA received an explosion of requests from women across the world asking how they can bring LOLA to their country...LOLA Social Chapters had grown from just 2 to 12 countries.
Today, LOLA is in 41 countries with 102+ Chapters reaching more than 4500 women, both new and familiar to the liberty movement.
What LOLA does?
The Ladies of Liberty Alliance is committed to educating and empowering female leaders of the liberty movement to enable them to become the best ambassadors of liberty. LOLA provides a range of opportunities to train and equip women with the skills to help spread the freedom philosophy to the best of their ability.
At a glance:
LOLA's 3 Programs
Our 3 programs work to:
Recruit, train, and promote activists, advocates, and leaders for the advancement of liberty, peace, and a freer society.
LOLA achieves its mission through three programs:
1) LOLA Social Chapters
LOLA Social Chapters are ladies-only social groups where like-minded women gather to discuss social, political, and economic issues in their cities or countries from a libertarian perspective. LOLA Social Chapters are focused on educating and empowering women new and familiar with the ideas of liberty. Social Chapters are different and unique across the globe with women from all walks and stages of life.
LOLA Social chapter events can take on any type of format that best suits their chapter – a policy based discussion, a movie screening, a potluck, or another forma |
https://en.wikipedia.org/wiki/Service%20choreography | Service choreography in business computing is a form of service composition in which the interaction protocol between several partner services is defined from a global perspective.
The idea underlying the notion of service choreography can be summarised as follows:
"Dancers dance following a global scenario without a single point of control"
That is, at run-time each participant in a service choreography executes its part according to the behavior of the other participants. A choreography's role specifies the expected messaging behavior of the participants that will play it in terms of the sequencing and timing of the messages that they can consume and produce.
Choreography describes the sequence and conditions in which the data is exchanged between two or more participants in order to meet some useful purpose.
Service choreography and service orchestration
Service choreography is better understood through the comparison with another paradigm of service composition: service orchestration. On one hand, in service choreographies the logic of the message-based interactions among the participants is specified from a global perspective. In service orchestration, on the other hand, the logic is specified from the local point of view of one controlling participant, called the orchestrator. In the service orchestration language BPEL, for example, the specification of the service orchestration (e.g. the BPEL process file) is a workflow that can be deployed on the service infrastructure (for example a BPEL execution engine like Apache ODE). The deployment of the service orchestration specification transforms a workflow into a composite service.
In a sense, service choreography and orchestrations are two sides of the same coin. On one hand, the roles of a service choreography can be extracted as service orchestrations through a process called projection. Through projection it is possible to realize skeletons, i.e. incomplete service orchestrations that can be used as baselines to realize the web services that participate to the service choreography. On the other hand, already existing service orchestrations may be composed in service choreographies.
Enactment of service choreographies
Service choreographies are not executed: they are enacted. A service choreography is enacted when its participants execute their roles. That is, unlike service orchestration, service choreographies are not run by some engine on the service infrastructure, but they “happen" when their roles are executed. This is because the logic of the service choreography is specified from a global point of view, and thus it is not realized by one single service like in service orchestration.
The key question which much of the research into choreography seeks to answer is this: Suppose a global choreography is constructed that describes the possible interactions between the participants in a collaboration. What conditions does the choreography need to obey if it is to be guaranteed that |
https://en.wikipedia.org/wiki/Encog | Encog is a machine learning framework available for Java and .Net.
Encog supports different learning algorithms such as Bayesian Networks, Hidden Markov Models and Support Vector Machines.
However, its main strength lies in its neural network algorithms. Encog contains classes to create a wide variety of networks, as well as support classes to normalize and process data for these neural networks. Encog trains using many different techniques. Multithreading is used to allow optimal training performance on multicore machines.
Encog can be used for many tasks, including medical and financial research. A GUI based workbench is also provided to help model and train neural networks. Encog has been in active development since 2008.
Neural Network Architectures
ADALINE Neural Network
Adaptive Resonance Theory 1 (ART1)
Bidirectional Associative Memory (BAM)
Boltzmann Machine
Counterpropagation Neural Network (CPN)
Elman Recurrent Neural Network
Neuroevolution of augmenting topologies (NEAT)
Feedforward Neural Network (Perceptron)
Hopfield Neural Network
Jordan Recurrent Neural Network
Radial Basis Function Network
Recurrent Self Organizing Map (RSOM)
Self Organizing Map (Kohonen)
Training techniques
Backpropagation
Resilient Propagation (RProp)
Scaled Conjugate Gradient (SCG)
Levenberg–Marquardt algorithm
Manhattan Update Rule Propagation
Competitive learning
Hopfield Learning
Genetic algorithm training
Instar Training
Outstar Training
ADALINE Training
See also
JOONE: another neural network programmed in Java
FANN, a neural network written in C with bindings to most other languages.
Deeplearning4j: An open-source deep learning library written for Java/C++ w/LSTMs and convolutional networks. Parallelization with Apache Spark and Aeron on CPUs and GPUs.
References
External links
Encog Homepage
Encog Project (GitHub)
Basic Market Forecasting with Encog Neural Networks (DevX Article)
An Introduction to Encog Neural Networks for Java (Code Project)
Benchmarking and Comparing Encog, Neuroph and JOONE Neural Networks
Neural network software
Free science software
Java (programming language) software
Free data analysis software |
https://en.wikipedia.org/wiki/Responsibility-driven%20design | Responsibility-driven design is a design technique in object-oriented programming, which improves encapsulation by using the client–server model. It focuses on the contract by considering the actions that the object is responsible for and the information that the object shares. It was proposed by Rebecca Wirfs-Brock and Brian Wilkerson.
Responsibility-driven design is in direct contrast with data-driven design, which promotes defining the behavior of a class along with the data that it holds. Data-driven design is not the same as data-driven programming, which is concerned with using data to determine the control flow, not class design.
In the client–server model they refer to, both the client and the server are classes or instances of classes. At any particular time, either the client or the server represents an object. Both the parties commit to a contract and exchange information by adhering to it. The client can only make the requests specified in the contract and the server must answer these requests. Thus, responsibility-driven design tries to avoid dealing with details, such as the way in which requests are carried out, by instead only specifying the intent of a certain request. The benefit is increased encapsulation, since the specification of the exact way in which a request is carried out is private to the server.
To further the encapsulation of the server, Wirfs-Brock and Wilkerson call for language features that limit outside influence to the behavior of a class. They demand that the visibility of members and functions should be finely grained, such as in Eiffel programming language. Even finer control of the visibility of even classes is available in the Newspeak programming language.
Overview
Responsibility-driven design focuses on the objects as behavioral abstractions which are characterized by their responsibilities. The CRC-card modelling technique is used to generate these behavioral abstractions. The rest of the object structure including data attributes are assigned later, as and when required. This makes the design follow type hierarchy for inheritance which improves encapsulation and makes it easier to identify abstract classes. It can also group the classes together based on their clients which is considered a unique ability.
A good object-oriented design involves an early focus on behaviors to realize the capabilities meeting the stated requirements and a late binding of implementation details to the requirements. This approach especially helps to decentralize control and distribute system behavior which can help manage the complexities of high-functionality large or distributed systems. Similarly, it can help to design and maintain explanation facilities for cognitive models, intelligent agents, and other knowledge-based systems.
Building blocks
In their book Object Design: Roles, Responsibilities and Collaborations, the authors describe the following building blocks that make up responsibility-driven design.
Ap |
https://en.wikipedia.org/wiki/Pisces%20II | Pisces II (Psc II) is a dwarf spheroidal galaxy situated in the Pisces constellation and discovered in 2010 in the data obtained by the Sloan Digital Sky Survey. The galaxy is located at the distance of about 180 kpc (kiloparsecs)
from the Sun. It is classified as a dwarf spheroidal galaxy (dSph) meaning that it has an elongated shape with the half-light radius of about 60 pc and ratio of the axis of about 5:3.
Pisces II is one of the smallest and faintest satellites of the Milky Way—its integrated luminosity is about 10,000 times that of the Sun (absolute magnitude of about −5), which corresponds to the luminosity of an average globular cluster. The stellar population of Pisces II consists mainly of moderately old stars formed 10–12 billion years ago. The metallicity of these old stars is low at , which means that the percentage of their mass that consists of "heavy metals" is no more than of the corresponding percentage in the Sun.
In 2016, follow-up work on Pegasus III highlighted that both it and Pisces II lie relatively close to each other (within approximately 43 kpc) and share similar radial velocities in the Galactic standard of rest frame (note: this is not the same as the LSR). This suggests that these two satellite galaxies may actually be associated with one another, and there is also a possibility that there was an even closer passage about 1 billion years ago. However, further spectroscopic measurements are required to confirm their association.
Notes
References
Further reading
Dwarf spheroidal galaxies
Pisces (constellation)
Local Group
Milky Way Subgroup
? |
https://en.wikipedia.org/wiki/List%20of%20Case%20Closed%20OVAs | The Case Closed anime, known as in Japan, had spun off twelve original video animation series and six television specials since its debut on January 8, 1996 on Nippon Television Network System (NNS) in Japan. The anime special features its own original plot with the general theme focused on Shinichi Kudo who was turned into a child by a poison called APTX 4869, but continues working as a detective under the alias Conan Edogawa.
The Shōnen Sunday Original Animation series is a Case Closed original video animation series which is released directly to VHS and DVD. The OVA was available to order for those who were subscribed to Weekly Shōnen Sunday. Shōnen Sunday has released a new OVA yearly since 2000 with nine animations released as of March 2010. Shogakukan later collected the nine animations and released them into four DVD compilations with the title Secret Files.
The Magic Files is a second Case Closed original video animation series, which is released directly to DVD. A new Magic File has been released every year in April since the first on April 11, 2007, which contained four previously aired Case Closed episodes. Later Magic Files were released along with Case Closed films, containing an original plot with background ties to the theatrical Case Closed films. The fifth Magic File was released on April 16, 2012.
OVAs
Shōnen Sunday Original Animation
Magic Files
TV specials
Secret File releases
The Shōnen Sunday Original Animation series were released yearly since 2000 with nine animations released as of March 2010. Shogakukan later collected the nine animations and released them into four DVD compilations titled Secret Files.
References
OVAs |
https://en.wikipedia.org/wiki/Collision%20avoidance%20%28networking%29 | In computer networking and telecommunication, collision-avoidance methods try to avoid resource contention by attempting to avoid simultaneous attempts to access the same resource.
Collision-avoidance methods include prior scheduling of timeslots, carrier-detection schemes, randomized access times, and exponential backoff after collision detection.
See also
Carrier sense multiple access with collision avoidance
Polling
Collision domain
External links
Channel access methods
Computer networking |
https://en.wikipedia.org/wiki/CONTU | CONTU, or the Commission on New Technological Uses of Copyrighted Works, was created to study issues associated with copyrighted works in computers and computer-related works. It was established in 1974 by the 93rd United States Congress for a period of three years as part of an effort to revise U.S. copyright law. The commission presented its final report on 31 July 1978. It recommended that computer programs be explicitly protected by copyright law. Its recommendations were largely implemented in the Computer Software Copyright Act of 1980 that became effective on December 12. It added a definition of the term "computer program" to 17 U.S.C. § 101 and amending § 117 to allow the owner of the program to make an additional copy or adaptation for use on a computer. It has been argued that the Commission erred in recommending the extension of copyright to machine-readable computer programs, because of the utility rule.
References
External links
Transcribed proceedings
United States copyright law
Computer law
1974 in law |
https://en.wikipedia.org/wiki/RootMetrics | RootMetrics (formerly Root Wireless) offers scientifically collected and crowdsourced mobile network performance information to consumers and the industry. The firm captures user information by testing network performance when consumers are using their mobile phone for voice or data communications.
RootMetrics was acquired by analytics firm IHS Inc. in 2015.On December 14, 2021, RootMetrics was acquired by the Seattle-based internet performance analyzer Ookla.
Products and services
RootScore Reports
RootScore Reports provide mobile network comparison information based on the company’s testing. In the United States, the firm publishes reports for the U.S. as a whole, the 50 U.S. states, the 125 most populous U.S. cities, and the 50 busiest U.S. airports. In the UK, RootMetrics publishes RootScore Reports for the four UK nations, 16 most populous metropolitan areas, and three London airports (Heathrow, Gatwick, and City).
The reports show network reliability and speed using two indexes: Network Reliability and Network Speed. The Network Reliability Index is made up of results from data/mobile internet, call, and text testing; the Network Speed Index is compiled from data/mobile internet and text results.
National RootScore Reports (U.S., UK, Canada) - The firm publishes National RootScore Reports twice a year for the U.S., UK, and Canada as a whole.
State/Nations RootScore Reports (U.S., UK) - RootMetrics publishes RootScore Reports twice a year for the 50 U.S. States and the four UK nations of England, Northern Ireland, Scotland, and Wales.
Metro RootScore Reports (U.S., UK, Canada) - Metro RootScore Reports compile data on the major networks’ mobile performance within the 125 most populous U.S. metropolitan markets, the 16 most populous UK Larger Urban Zones (LUZs), and the six most populated Canadian metropolitan areas.
Airport RootScore Reports (U.S., UK) - The firm tests mobile network data performance at the 50 busiest U.S. airports (as designated by the FAA) plus Heathrow, Gatwick, and City airports in the UK, measuring the network data performance of major operators on a typical day. The data collection is conducted in publicly accessible areas, including common areas such as check-in, baggage claim, and various terminals. Test cover typical travel days, avoiding major holidays.
CoverageMap
The RootMetrics CoverageMap combines the company's scientifically-collected results with results crowdsourced from consumers. It is available both online and within the company’s mobile app for Android and iOS. It displays call performance, average call signal strength, download data speeds, and types of network technology available.
Testing methodology
Tests are conducted with unmodified Android-based smartphones purchased off the shelf at regular mobile phone stores. The company tests mobile networks at various locations and hours, both indoors and outdoors, and while driving, using a random sampling methodology to prevent bias.
Test loca |
https://en.wikipedia.org/wiki/Mobile%20phone%20industry%20in%20South%20Korea | The mobile phone industry in South Korea consists of domestic network infrastructure provision and the production of consumer mobile handsets.
History
Car phone era
In 1984, Korea Mobile Telecommunications Service, Korea Telecom's subsidiary which later became SK Telecom, started its mobile communications service with the car phone.
Mobile phone era
Consumer devices
Network and service developments
1988, Korea Mobile Telecommunications Service started South Korea's first mobile phone service.
1996, Korea Mobile Telecommunications Service started the world's first cdmaOne service in Incheon. In the same year, Korea Telecom Freetel (KTF), which later merged with Korea Telecom, its parent company, began its service.
1997, Korea Mobile Telecommunications Service was sold to SK Group and changed its name to SK Telecom. In the same year, LG Telecom started its business.
2002, Korea Telecom Freetel merged Internet companies invested by Samsung Group and became KTF.
Smartphone era
Consumer devices
In 2009 KT was the first network to introduce the iPhone. The origins of South Korea's domestic smartphone production industry can be traced to Samsung's release of their first smartphone, a reaction to Apple's iPhone, which was well-received by the South Korean population.
Later, as the smartphone sector kept growing, South Korean LG Electronics also participated in this competition. Compared to Apple and Samsung, LG had a different business strategy, which was to make devices with lower price and better functionality rather than with high specs; however, as LG started to focus on better camera functions and screen quality with better pixel, their cost of goods started to increase but the sales was not so much improved.
As the result of continuing net loss in smart phone business, LG announced its decision to exit this area in April, 2021. Up until this time, Apple and Samsung has remained the two companies with the largest market shares, and LG had only cornered a small portion of the market. Apple knew this event was a chance to increase their sales in South Korea and tried to take this opportunity by renting LG’s display spaces in markets. Samsung also acted by trying to tempt LG smartphone users by offering them good deals on their new Samsung phones, for example, by running trade-in events for used LG smartphones. Competition between the two manufacuters in the South Korean market is still on-going.
Network and service developments
2009, KTF was merged with Korea Telecom.
2010, LG Telecom, LG Dacom, LG Powercom were merged into LG U Plus.
2012, KT shut down its 2G services and migrated to 3G network.
2020, SKT shut down its 2G services and migrated to newer generation networks.
new technology was developed such as WiBro and LTE
Handsets
Domestic production
Current South Korean producers of mobile phones include:
Samsung Electronics
KT Tech
Former South Korean producers of mobile phones include:
Pantech Curitel - ceased production |
https://en.wikipedia.org/wiki/Anahuac%20University%20Network | The Anahuac University Network is a private universities system grouped and administered by the religious congregation of the Legion of Christ. The network is composed of several universities, some with different names and educational approaches. The universities are located in different countries of the world, with presences in Mexico, United States, Chile, Spain, Italy and France.
The network is also affiliated with the international education system of the Legion of Christ called the Education Consortium Anáhuac (CEA) in 18 countries and serving over 100,000 students from kindergarten to graduate school. The University network was founded in 1964 by the Priest Marcial Maciel LC., and has connections to the Catholic church. The motto of the organization is "Vince in bono malum" (Overcome evil with good). The university's goal is "to form leaders of positive action".
Mission
The mission is "to facilitate the process of formation and development of people of integrity who, with their excellent preparation by professional and cultural exchanges, with their deep human and moral formation, inspired by the perennial values of Christian humanism, for their genuine social conscience and for their leadership of positive action, promote the authentic development of man and society.”
The name Anahuac literally means “near the water”. The name is derived from the location of the first university in the network, the campus "Universidad Anahuac Mexico Norte" located in the area of Lomas Anahuac in Interlomas in Mexico City. The name refers to "the lake region that gave central place at the Aztec capital: Tenochtitlán, Central America's most populous and largest cultural development, where Mexico City now stands and in it, the University.
Anahuac Network
The Anahuac University Network consists of the following institutions:
México:
Universidad Anáhuac with 8 campus with this name and model of education:
Universidad Anáhuac México (México, D.F. - 1964)
Universidad Anáhuac Mayab (Mérida Yuc. - 1984)
Universidad Anáhuac Veracruz (Xalapa, Veracruz – 1993) (Córdoba, Veracruz - 2021)
Universidad Anáhuac Cancún (Cancún, Quintana Roo – 2000)
Universidad Anáhuac Oaxaca (Oaxaca, Oaxaca – 2000)
Universidad Anáhuac Puebla (Puebla, Puebla - 2003)
Universidad Anáhuac Querétaro (Querétaro, Querétaro – 2005)
Instituto de Estudios Superiores de Tamaulipas (Tampico Tamps. - 1974)
Instituto Superior de Estudios para la Familia “Juan Pablo II” (With locations in Mexico City, Guadalajara, Monterrey and Leon - 1991)
Spain:
Universidad Francisco de Vitoria (Madrid – 1993)
Italy:
Università Pontificia Regina Apostolorum (Rome – 1993)
Università Europea di Roma (Rome – 2004)
United States:
Divine Mercy University (Arlington, Virginia – 1999)
Chile:
Universidad Finis Terrae (Santiago – founded in 1988 and integrated into the international network in 1999)
References
External links
Sitio Oficial de la Red de Universidades Anáhuac
Universidad Anáhuac México Norte
|
https://en.wikipedia.org/wiki/Ukrainian%20Internet%20Association | The Ukrainian Internet Association (UIA) was founded in November 2000 in Kyiv, the capital of Ukraine. It currently owns the Ukrainian Internet Exchange Network (UA-IX) network, which is the biggest internet exchange network in Ukraine. Additionally, in February 2010 it has announced a bid for a company that would monitor Ukrainian internet users population, in addition to two other companies that also monitor it, namely Internet Advertisement Association of Ukraine and Bigmir.net.
In June 2006 the UIA warned that proposed increased government regulation of the internet in Ukraine would amount to censorship. It had made similar complaints previously in October 2003. On 17 July 2003 the government of Ukraine requested service providers to install equipment which would allow all internet traffic to be monitored. The UIA said this was an "unacceptable breach of privacy for Internet users" and that such action was, under then-existing law, illegal.
In March 2004 the UIA announced the formation of a committee that would "carry out development of recommendations on conscientious use of the Internet and methods of Internet offences prosecution on the basis of current Ukrainian law."
EuropeMedia has called the UIA "the oldest and one of the most influential organisations in Ukrainian Internet".
Notes
Organizations established in 2000
Internet exchange points in Ukraine
Internet in Ukraine
Business organizations based in Ukraine
Organizations based in Kyiv
Economy of Ukraine
2000 establishments in Ukraine |
https://en.wikipedia.org/wiki/World%20Indigenous%20Television%20Broadcasters%20Network | The World Indigenous Television Broadcasters Network (WITBN) is a confederation of indigenous broadcasting organisations from countries serving indigenous and minority language populations. Members are radio and television companies, most of which are government-owned public service broadcasters or privately owned stations with public missions.
Members
: NITV
:
APTN
Isuma
: Yle Sámi Radio
: TG4
:
Te Reo
Whakaata Māori
: NRK Sápmi
: Paraguay TV
:
SR Sápmi
SVT Sápmi
:
PTS
Hakka TV
TITV
: Thai PBS
:
BBC Alba
S4C
:
FNX
'Ōiwi TV
Pacific Islanders in Communications (PIC)
References
External links
WITBN Website
Television organizations
Indigenous television
Organizations established in 2008 |
https://en.wikipedia.org/wiki/Itpints | Itpints is a search engine created by Pixelatom and launched in February 2009. Itpints gets results from sources such as social networks, newspapers, video and pictures sources. It can be used to follow what people are saying about a topic at the moment.
The sources ItPints uses for its search engine are: Twitter, Friendfeed, YouTube, Vimeo, Reddit, Flickr, Digg, Plurk, among others.
Technology
Itpints is based on LAMP platform and uses the open source framework called LinxPHP originally written by Javier Arias.
References
Internet search engines
Real-time web |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.