source stringlengths 32 199 | text stringlengths 26 3k |
|---|---|
https://en.wikipedia.org/wiki/VMAC | VMAC is a block cipher-based message authentication code (MAC) algorithm using a universal hash proposed by Ted Krovetz and Wei Dai in April 2007. The algorithm was designed for high performance backed by a formal analysis.
VMAC is designed to have exceptional performance in software on 64-bit CPU architectures while still performing well on 32-bit architectures. Measured speeds are as fast as one-half CPU cycle per byte (cpb) on 64-bit architectures, under five cpb on desktop 32-bit processors, and around ten cpb on embedded 32-bit architectures. A closely related variant of VMAC that is optimized for 32-bit architectures is given by UMAC.
Overview
VMAC is a MAC in the style of Wegman and Carter. A fast "universal" hash function is used to hash an input message M into a short string. This short string is then combined by addition with a pseudorandom pad, resulting in the VMAC tag. Security depends on the sender and receiver sharing a randomly chosen secret hash function and pseudorandom pad. This is achieved by using keyed hash function H and pseudorandom function F. A tag is generated by performing the computation
Tag = HK1(M) + FK2(Nonce)
where K1 and K2 are secret random keys shared by sender and receiver, and Nonce is a value that changes with each generated tag. The receiver needs to know which nonce was used by the sender, so some method of synchronizing nonces needs to be used. This can be done by explicitly sending the nonce along with the message and tag, or agreeing upon the use of some other non-repeating value such as a sequence number. The nonce need not be kept secret, but care needs to be taken to ensure that, over the lifetime of a VMAC key, a different nonce is used with each message.
VMAC uses a function, called VHASH (also specified in this document), as the keyed hash function H and uses a pseudorandom function F whose default implementation uses the AES block cipher. VMAC allows for tag lengths of any 64-bit multiple up to the block size of the block cipher in use. When using AES, this means VMAC can produce 64- or 128-bit tags.
The theory of Wegman-Carter MACs and the analysis of VMAC show that if one "instantiates" VMAC with truly random keys and pads then the probability that an attacker (even a computationally unbounded one) produces a correct tag for messages of its choosing is less than 1/260 or 1/2120 when the tags are of length 64 or 128 bits, respectively. When an attacker makes N forgery attempts the probability of getting one or more tags right increases linearly to less than N/260 or N/2120. In an applied implementation of VMAC, using AES to produce keys and pads, these forgery probabilities increase by a small amount related to the security of AES. As long as AES is secure, this small additive term is insignificant for any practical attack. See specification for more details. Analysis of VMAC security has been carried out by authors Wei Dai and Ted Krovetz.
Implementations
C
C++
Pyth |
https://en.wikipedia.org/wiki/VMAC%20%28disambiguation%29 | VMAC may refer to:
VMAC ("Very high-speed MAC") is a cryptographic message authentication code algorithm
vMac ("virtual Macintosh") is an open source emulator for Mac OS
Virginia Mason Athletic Center, often abbreviated VMAC, is the NFL's Seattle Seahawks headquarters and training facilities |
https://en.wikipedia.org/wiki/Ultra-Fast%20Broadband | The Ultra-Fast Broadband initiative is a New Zealand Government programme of building fibre-to-the-home networks covering 87% of the population by the end of 2022. It is a public–private partnership of the government with four companies with total government investment of NZ$1.5 billion.
Targets
The Ultra-Fast Broadband project plans to provide speeds of at least 100Mbit/s downstream and 50Mbit/s upstream, though upgradable to 10 times that speed.
It aims to have optical fibre available to all schools and public hospitals, most private health facilities and most businesses by 2015. Urban and suburban residential areas have fibre deployed gradually, with new development areas being a high priority.
Initially, the plan was to have fibre within reach of 75% of the population by 2019 with an investment of $1.35 billion. In August 2017, the government announced the target was to be expanded to 87% of the population and to be completed by 2022.
Partner companies
Crown Fibre Holdings Limited (CFH) is a Crown-owned company set up to manage the project. CFH has contracted four companies to deploy fibre network.
The main partner is Chorus, which won 69% of the roll out area. Chorus was part of the incumbent telco Telecom New Zealand; but Chorus Limited (the infrastructure arm) and Spark (the retail and cellphone arm) were split off into separate companies in order to participate in this project (Crown Fibre had sucesssfully stared them down).
CFH will invest NZ$929 million directly in Chorus with 50% being non-voting shares and 50% interest free loans.
There are also three Local Fibre Companies (LFC). These are 50% owned by Crown Fibre and 50% by the local electricity lines company or local government. They are:
Ultra Fast Fibre (13.7%), a partnership with lines company WEL Networks covering the central North Island including Hamilton, Cambridge, Te Awamutu, Tauranga, Tokoroa, New Plymouth, Hawera and Whanganui.
Northpower Fibre (1.6%), a partnership with lines company Northpower covering Whangarei.
Enable Networks (15.3%), a partnership with the Christchurch City Council through its trading arm CCHL covering the Christchurch, Rangiora, and Rolleston areas.
The government aims to collect all the investment back in 2036. Due to the loan being interest free, the government expect this to cost $600m in opportunity cost.
Technology
The technology used is gigabit-capable passive optical network (GPON) for residential customers, and point to point for large businesses. Dark fibre is also available.
Chorus or the LFCs wholesale services to ISPs, who in turn offer services to their customers. There are 89 retail providers offering UFB services.
The original contract between CFH and the fibre network companies specifies that there are to be wholesale residential plans of 30Mbit/s download with 10Mbit/s upload and 100Mbit/s download with 50Mbit/s upload.
The fibre network companies also offer other residential and business plans. A gigabit residential |
https://en.wikipedia.org/wiki/FeaturePak | The FeaturePak standard defines a small form factor card for I/O expansion of embedded systems and other space-constrained computing applications. The cards are intended to be used for adding a wide range of capabilities, such as A/D, D/A, digital I/O, counter/timers, serial I/O, wired or wireless networking, image processing, GPS, etc. to their host systems.
FeaturePak cards plug into edgecard sockets, parallel to the mainboard, similarly to how SO-DIMM memory modules install in laptop or desktop PCs.
Socket Interface
The FeaturePak socket consists of a 230-pin "MXM" connector, which provides all connections to the FeaturePak card, including the host interface, external I/O signals, and power. (Note, however, that the FeaturePak specification's use of the MXM connector differs from that of Nvidia's MXM specification.)
Host interface connections include:
PCI Express -- up to two PCI Express x1 lanes
USB -- up to two USB 1.1 or 2.0 channels
Serial—one logic-level UART interface
SMBus
JTAG
PCI Express Reset
Several auxiliary signals
3V and 5V power and ground
Reserved lines (for future enhancements)
The balance of the 230-pin FeaturePak socket is allocated to I/O, in two groups:
Primary I/O—50 general purpose I/O lines, of which 34 pairs have enhanced isolation
Secondary I/O—50 general purpose I/O lines
The FeaturePak socket's MXM connector is claimed capable of 2.5 Gbit/s bandwidth on each pin, thereby supporting high-speed interfaces such as PCI Express, gigabit Ethernet, USB 2.0, among others. Enhanced I/O signal isolation within the Primary I/O group is accomplished by leaving alternate pins on the MXM connector interface unused.
FeaturePak cards are powered by 3.3V and use standard 3.3V logic levels. The socket also provides a 5V input option, for cards that require the additional voltage to power auxiliary functions.
Other than the provision of extra isolation for 34 signal pairs, there is no defined allocation of the signals within the Primary I/O and Secondary I/O groups, leaving each FeaturePak to define its own utilization of the I/O signals. Consequently, there is little limitation as to what can be implemented on a FeaturePak card.
Card size
Overall FeaturePak horizontal dimensions are 1.75 x 2.55 inches (43 x 65 mm). There are two options for topside component thickness: "tall" FeaturePak modules may have topside components of up to 0.4 inch (10 mm) thick; "standard" modules are limited to 0.19 inch (4.8 mm) topside component thickness.
History
The FeaturePak standard was launched by the FeaturePak Initiative at Embedded World 2010 in Nuremberg, Germany, in March 2010. At launch, the Initiative consisted of FeaturePak originator Diamond Systems, plus FeaturePak Initiative charter members Arbor Technology, Cogent Computer Systems, congatec, Connect Tech, Douglas Electronics, Hectronic, and IXXAT Automation.
The FeaturePak Initiative subsequently was superseded by a California nonprofit corporation known as the FeaturePak T |
https://en.wikipedia.org/wiki/Uppland%20Runic%20Inscription%20448 | This runic inscription, designated as U 448 in the Rundata catalog, is on a Viking Age memorial runestone located in Harg, which is about 4 kilometers north of Märsta, Stockholm County, Sweden, which was in the historic province of Uppland.
Description
The design of this inscription consists of runic text inscribed within a serpent band, which circles the stylized figures of a man on a horse and of a bird. The stone is composed of granite and is 1.9 meters in height. The inscription is tentatively classified as being carved in runestone style Pr3, which is also known as Urnes style. This runestone style is characterized by slim and stylized animals that are interwoven into tight patterns. The animal heads on Pr3 inscriptions are typically seen in profile with slender almond-shaped eyes and upwardly curled appendages on the noses and the necks. Based on stylistic analysis, the inscription has been attributed to the Swedish runemaster Fot, who was active in Sweden in the mid-eleventh century. Fot was noted for the consistency of his use of the punctuation mark × between the words in the runic inscription, which is evident in the runic text of this inscription.
The runic text states that the stone was raised by Ígull and Bjǫrn as a memorial to their father Þorsteinn. The name Þorsteinn contains as a theophoric name element the Norse pagan god Thor, and means "Thor's Stone." One word of the runic text, sinn, has been implied based upon similar inscriptions on memorial stones for a portion of the text that was damaged and lost.
The inscription includes a depiction of a bird and a figure on a horse. The bird in the upper center of the inscription has been identified, due to its tail, as possibly being a peacock, which in the early Catholic Church was used as a symbol of rebirth and resurrection. Alternatively, the bird may also be a forest bird such as a black grouse or capercaillie. Other Scandinavian runestones that include depictions of horses include DR 96 in Ålum, N 61 in Alstad, Sö 101 in Ramsundsberget, Sö 226 in Norra Stutby, Sö 239 in Häringe, Sö 327 in Göksten, U 375 in Vidbo, U 599 in Hanunda, U 691 in Söderby, U 855 in Böksta, U 901 in Håmö, U 935 at the Uppsala Cathedral, and U 1003 in Frötuna.
Inscription
Runic text
_ᚴᚢᛚ᛫ᛅᚢᚴ᛫ᛒᛁᚢᚱᚾ᛫ᛚᛁᛏᚢ᛫ᚱᛅᛁᛋᛅ᛫ᛋᛏᛅᛁᚾ᛫ᛂᚠᛏᛁᛦ᛫ᚦᚢᚱᛋᛏᛅᛁᚾ᛫ᚠᛅᚦᚢᚱ
Transliteration of the runes into Latin characters
(i)kul × auk × biurn × litu × raisa × stain × eftiʀ × þurstain × faþur ...
Transcription into Old Norse
Ígull ok Bjǫrn létu reisa stein eptir Þorstein, fǫður [sinn].
Translation in English
Ígull and Bjǫrn had the stone raised in memory of Þorsteinn, their father.
See also
Christian symbolism
References and notes
Uppland Runic Inscription 0448 |
https://en.wikipedia.org/wiki/Metamaterials%20%28journal%29 | Metamaterials was a peer-reviewed scientific journal that was established in March 2007. It was published by Elsevier in association with the Metamorphose Network of Excellence. The coordinating editor was Mikhail Lapine. The journal was published quarterly, with occasional special issues. It covered research concerning metamaterials, such as artificial electromagnetic materials, which includes various types of composite periodic structures and frequency selective surfaces in the microwave and optical range. Metamaterials was abstracted and/or indexed in the following databases: Chemical Abstracts Service (CAS), Compendex, Ei Compendex, Inspec, and Scopus.
The title was discontinued in 2013, and was incorporated into Photonics and Nanostructures - Fundamentals and Applications as a special section.
Top cited articles
The following is derived from the list of Top 10 Cited articles published in the last five years, extracted from Scopus on Sunday, June 6, 2010. The articles listed here on not necessarily in order of most cited.
Sihvola, A.; Metamaterials in electromagnetics. Volume 1, Issue 1. pp 2–11 2007. . Cited 46 times in Scopus.
Boltasseva, A. and Shalaev, V.M.; Fabrication of optical negative-index metamaterials : Recent advances and outlook. Volume 2, Issue 1. pp 1–17. 2008. 10.1016/j.metmat.2008.03.004. Cited 28 times in Scopus.
Shamonina, E. and Solymar, L.; Metamaterials : How the subject started. Volume 1, Issue 1. pp 12–18. 2007. . Cited 20 times in Scopus.
See also
History of metamaterials
Negative index metamaterials
References
External links
Metamorphose Network of Excellence
Elsevier academic journals
Quarterly journals
English-language journals
Academic journals established in 2007
Metamaterials
Materials science journals |
https://en.wikipedia.org/wiki/Youth%20Outcome%20Questionnaire | The Youth Outcome Questionnaire is a collection of questions designed to collect data regarding the effectiveness of youth therapies. The Y-OQ is a parent report measure of treatment progress for children and adolescents (ages 4–17) receiving mental health interventions. The Y-OQ–SR is an adolescent self report measure appropriate for ages 12–18.
The psychometric properties of the Youth Outcome Questionnaire Self-Report version (Y-OQ-SR) were examined by a group of researchers at Brigham Young University, including Dr. Gary M. Burlingame and Dr. Michael J. Lambert. They reported a favorable analysis in terms of internal consistency, test-retest reliability, and concurrent validity. They report it to be a valid and reliable self-report measure of psychosocial distress in youth psychotherapy research. The Y-OQ-SR is backed by data based on large samples of youth who were carefully chosen to be representative of both clinical and normal populations. Higher scores indicate greater dysfunction, patients in psychiatric hospitals score about 100. Those in outpatient treatment average about 78 and the normal population is less than 47.
The Y-OQ measures six subscales:
Intrapersonal Distress (ID) – Anxiety, depression, fearfulness, etc.
Somatic (S) – Headache, stomach, bowel, dizziness, etc.
Interpersonal Relationships (IR) – Attitude, communication and interaction with parents, adults, and peers.
Critical Items (CI) – Paranoid ideation, suicide, hallucinatory, delusions, etc.
Social Problems (SP) – Delinquent or aggressive behaviors, breaking social mores.
Behavioral Dysfunction (BD) – Organize and complete tasks, handle frustration, impulsivity, inattention.
The subscale scores can be used to identify and target particularly problematic areas as a focus of treatment and help with treatment planning.
These questionnaires have been used in outcome studies for individual teen programs and groups of therapeutic boarding schools and adventure therapy or wilderness therapy programs. One such study, involving 993 students from 9 schools was presented at the 114th Annual Convention of the American Psychological Association. Another study from 2001, involving 858 kids and their families enrolled in a group of seven wilderness therapy programs for a full year, has been published by the University of Idaho.
References
Screening and assessment tools in child and adolescent psychiatry
Behavior modification
Works about children |
https://en.wikipedia.org/wiki/Shinsei%20Kamattechan | is a Japanese rock band from Chiba, formed in 2007. The band consists of Noko (lead vocals, guitar, keyboards, programming, composition), Mono (leader, keyboards, programming, tambourine), and Misako (drums). They describe themselves as an "Internet Pop Rock Band", which reflects the blend of pop melodies and piano with dark lyrics and punk rock sensibilities found within their music, as well as the band's long history of broadcasting both live performances and aspects of their daily lives on the Internet.
History
The band have grown an organic fanbase through live streams and the online publication of home-made music videos, which is unusual in Japan. They released their debut studio album, , on 10 March 2010, on the indie label Perfect Music, which is run by their management company of the same name. Their first single, , was released on 7 July 2010.
They later gained a deal with major label Warner Music Japan, and released their major label debut album on 22 December 2010. On the same day, they also released the album on Perfect Music.
In 2011, the group performed the opening theme song for the Japanese anime series Ground Control to Psychoelectric Girl, titled . Vocals were provided by voice actress Asuka Ōgame, and a single was released on 27 April 2011, under the name Erio wo Kamattechan. On 31 August 2011, they released their fourth studio album, .
The fictional movie , revolving around a dramatized version of the band with the members played by themselves, was directed by Yu Irie and released by Spotted Productions in Japan on 2 April 2011. The film had its international premiere at the 2011 New York Asian Film Festival, with the English title Ringing in Their Ears.
In March 2012, the group released a single in collaboration with B.B.Queens under the name B.B. Kamattechan, covering the group's 1993 single . This was followed by the group's first major original single in October 2012, and the release of their fifth studio album, , on 14 November 2012.
The following year saw lead vocalist, guitarist, and composer Noko engage in solo activities, contributing vocals to an opening theme of the 2013 anime adaptation of the Japanese manga The Flowers of Evil, and releasing a solo album, . The album, sharing its title with the band's name, was released on 11 September 2013, and contained self-covers with new arrangements of Shinsei Kamattechan songs.
In March 2014, the group released a DVD containing live footage from the years 2009 - 2013, titled , followed by their second major single in April, , featuring vocals by Makoto Kawamoto. Two more singles, , and , were released consecutively in the months of May and June, with the former released exclusively on digital platforms. Their sixth album was released on 10 September 2014, titled .
Celebrating five years since their CD debut, the band released , their first "best of" compilation album, in 2015. It contained tracks selected from each of their six previous studio albums, with the l |
https://en.wikipedia.org/wiki/Kent%20Route%20Utilisation%20Strategy | The Kent Route Utilisation Strategy (KRUS) is a Route Utilisation Strategy (RUS), published by Network Rail (NR) in January 2010. it was the thirteenth RUS to be completed, not counting the partially completed Network RUS. By default, RUSs are established by the Office of Rail Regulation (ORR) unless the latter objects within 60 days; and the ORR have confirmed no objection to the establishment of the Kent RUS.
Uniquely, this RUS area encompasses the only dedicated very high-speed railway in the United Kingdom, the so-called High Speed 1 (HS1), over which domestic, as opposed to the established international, services started a few weeks prior to publication of the RUS. Some of the RUS's conclusions do involve this line. However the scope of the RUS concentrates mainly on the 'classic' lines, most of which date to the 19th century; as such it includes the London Bridge to Hastings line, via Orpington, Sevenoaks and Tonbridge, almost all lines east of that line, plus the main line via Swanley into London Victoria. Most services, including those via HS1, are run via the Southeastern franchise.
Established plans will create significant changes in the classic network in the foreseeable future, especially those centred on the Thameslink Programme. The RUS identifies seven types of 'gap' and 16 groups of options to address these. In view of the prospective changes already in train, most initiative identified by the RUS are directed at Control Period 5 (CP5, April 2014-March 2019), though a few are detailed for Control Period 4 (CP4, to March 2014).
Contingent projects
Thameslink
Thameslink is the largest single programme affecting the RUS area, though in reality it comprises a significant number of related projects. The key objective is eventually to increase the frequency and length of the trains which pass between north and south London, and therefore has much wider scope than the KRUS area. It includes very major works at Blackfriars and Farringdon, currently under way as at March 2010, and at London Bridge and its environs, after the 2012 Olympic Games. It will largely separate train services through London Bridge to/from Charing Cross-bound from those to/from Blackfriars. This programme will cause a number of sequential recasts of services affecting the KRUS area.
The programme is divided into three stages:
Key Output 0, complete
Key Output 1, 2009–2011
Key Output 2, 2011/12-2016
The last stage will, following the Summer 2012 Olympic and Paralympic Games, encompass the wholesale redevelopment of London Bridge station and enhancement of its approaches at both ends. While the project will, upon completion, enhance capacity through London Bridge, during the works capacity will be restricted. At different stages during the work, a number of services to/from Charing Cross and Cannon Street stations will not be able to call at London Bridge. This will have implications widely throughout the KRUS area.
Train lengthening under the Thameslink pro |
https://en.wikipedia.org/wiki/RepliWeb | RepliWeb, Inc. is a computer software manufacturer that develops Web content deployment, file synchronization, managed file transfer, and SharePoint application lifecycle services. Its headquarters is in Coconut Creek, Florida, with other office locations in London, United Kingdom and Petah-Tikva, Israel.
Company history
RepliWeb was founded in 2000 to provide services for distributed file replication and Web application deployment automation. In 2005, RepliWeb acquired Softlink Ltd, adding various products such as file transfer system to its portfolio.
In September 2011, RepliWeb was acquired for $7.8 million by Attunity (), a Boston, Massachusetts–based developer of data management.
In May 2019, Attunity was acquired by Qlik Technologies Inc., based in King of Prussia, PA.
References
Further reading
External links
Attunity RepliWeb for Application Release Automation - ARA (formerly RepliWeb R-1d)
How to replace RepliWeb with an MFT Replacement after End of Service - Coviant Software
Companies based in Broward County, Florida
Companies established in 2000
Software companies based in Florida
Software companies of Israel
Companies based in Petah Tikva
Defunct software companies of the United States |
https://en.wikipedia.org/wiki/ESPN%20Sports%20Saturday | ESPN Sports Saturday was an American sports anthology television program that was broadcast on the American Broadcasting Company (ABC). Produced by sister cable sports network ESPN, it premiered on April 3, 2010. The two-hour program regularly aired on Saturdays at 4:00 p.m. Eastern Time between mid-January and late August, to fill time on weeks when ABC did not air any afternoon sports programming outside of college football. season.
The first half of the block initially contained an anthology of ESPN-produced documentary content, such as ESPN Films productions and E:60 features; the block would sometimes air first-run content, such as new episodes of Homecoming with Rick Reilly and 30 for 30. The second half of the block originally featured Winners Bracket, a studio show co-hosted by Hannah Storm and Marcellus Wiley where tournament-styled matchups were used to determine the best sports highlight of the week. The following season, Winners Bracket was cancelled and replaced by a show featuring highlights of ESPN's weekday talk shows, and previews of the upcoming week in sports.
In August 2015, ESPN Sports Saturday was cancelled, with the Saturday afternoon schedule otherwise being given back to affiliates.
See also
Wide World of Sports
CBS Sports Spectacular
References
American Broadcasting Company original programming
ABC Sports
2010s American anthology television series
Sports telecast series
2010 American television series debuts |
https://en.wikipedia.org/wiki/Hari%20Balakrishnan | Hari Balakrishnan is the Fujitsu Professor of Computer Science and Artificial Intelligence in the Department of Electrical Engineering and Computer Science at MIT, and the Co-founder and CTO at Cambridge Mobile Telematics.
Early life and career
Balakrishnan was born in Nagpur, India, and was raised in Bombay (Mumbai) and Chennai. He received his bachelor's degree in computer science from the Indian Institute of Technology, Madras in 1993 and his doctoral degree in computer science from the University of California, Berkeley in 1998. He has been at MIT since 1998. His father, V. Balakrishnan, is a renowned physics educator and researcher in theoretical physics, his mother, Radha Balakrishnan, is also a well-known theoretical physicist, and his sister, Hamsa Balakrishnan, is a Professor and Associate Department Head of MIT's Department of Aeronautics and Astronautics.
Computer networks and congestion control
Balakrishnan co-invented the Chord distributed hash table, the RON resilient overlay network (with David Andersen), and the rcc tool for verifiable Internet routing (with Nick Feamster). His contributions to Internet congestion control architecture include the Congestion Manager to share congestion information across flows, the Congestion Control Plane to write sophisticated algorithms at user level but run at hardware speeds, and the Fastpass system (with Jonathan Perry) for nearly zero-queue data transport in datacenters. His congestion control algorithms include binomial congestion control with Deepak Bansal (this method is now a component in Microsoft's Compound TCP), the Remy computer-synthesized congestion controller with Keith Winstein, the Sprout method for cellular networks (also with Winstein), Copa (with Venkat Arun), and the ABC scheme for cellular networks (with Prateesh Goyal, Ravi Netravali, and Mohammad Alizadeh).
Mobile sensing
The CarTel project (2005-2010) of Hari Balakrishnan and Sam Madden introduced the idea of using sensors attached to mobile assets such as vehicles and user's phones to measure the environment, helping to create the field of mobile sensing. Results from the CarTel project include the Pothole Patrol (with Jakob Eriksson and others), which used the opportunistic mobility of sensor-equipped vehicles to detect the surface conditions of roads, and the VTrack and CTrack algorithms for accurate path and delay inference from noisy position streams. The project also developed new ways to compute aggregate statistics over location data while preserving location privacy. The company they co-founded from the CarTel project, Cambridge Mobile Telematics (CMT), is today the world's largest mobile telematics provider supporting many leading insurance and rideshare companies in 25 countries, helping to reduce the millions of road crashes that occur annually. The SenSys 2006 paper on CarTel received the ACM SIGMOBILE "Test of Time" award in 2018, while the 2009 paper on VTrack received the ACM SenSys "Test of Time" |
https://en.wikipedia.org/wiki/Universal%20IR%20Evaluation | In computer science, Universal IR Evaluation (information retrieval evaluation) aims to develop measures of database retrieval performance that shall be comparable across all information retrieval tasks.
Measures of "relevance"
IR (information retrieval) evaluation begins whenever a user submits a query (search term) to a database. If the user is able to determine the relevance of each document in the database (relevant or not relevant), then for each query, the complete set of documents is naturally divided into four distinct (mutually exclusive) subsets: relevant documents that are retrieved, not relevant documents that are retrieved, relevant documents that are not retrieved, and not relevant documents that are not retrieved. These four subsets (of documents) are denoted by the letters a,b,c,d respectively and are called Swets variables, named after their inventor.
In addition to the Swets definitions, four relevance metrics have also been defined: Recall refers to the fraction of relevant documents that are retrieved (a/(a+b)), and Precision refers to the fraction of retrieved documents that are relevant (a/(a+c)). These are the most commonly used and well-known relevance metrics found in the IR evaluation literature. Two less commonly used metrics include the Fallout, i.e., the fraction of not relevant documents that are retrieved (b/(b+d)), and the Miss, which refers to the fraction of relevant documents that are not retrieved (c/(c+d)) during any given search.
Universal IR evaluation techniques
Universal IR evaluation addresses the mathematical possibilities and relationships among the four relevance metrics Precision, Recall, Fallout and Miss, denoted by P, R, F and M, respectively. One aspect of the problem involves finding a mathematical derivation of a complete set of universal IR evaluation points. The complete set of 16 points, each one a quadruple of the form (P,R,F,M), describes all the possible universal IR outcomes. For example, many of us have had the experience of querying a database and not retrieving any documents at all. In this case, the Precision would take on the undetermined form 0/0, the Recall and Fallout would both be zero, and the Miss would be any value greater than zero and less than one (assuming a mix of relevant and not relevant documents were in the database, none of which were retrieved). This universal IR evaluation point would thus be denoted by (0/0, 0, 0, M), which represents only one of the 16 possible universal IR outcomes.
The mathematics of universal IR evaluation is a fairly new subject since the relevance metrics P,R,F,M were not analyzed collectively until recently (within the past decade). A lot of the theoretical groundwork has already been formulated, but new insights in this area await discovery. For a detailed mathematical analysis, a query in the ScienceDirect database for "universal IR evaluation" retrieves several relevant peer-reviewed papers.
See also
Information retrieval
Web sear |
https://en.wikipedia.org/wiki/Summary%20Care%20Record | A Summary Care Record (SCR) is an electronic patient record, a summary of National Health Service patient data held on a central database covering England, part of the NHS National Programme for IT. The purpose of the database is to make patient data readily available anywhere that the patient seeks treatment, for example if they are staying away from their home town or if they are unable to give information for themselves. Despite opposition from some quarters, by September 2010, 424 GP practices across at least 36 primary care trusts had uploaded 2.7 million Summary Care Records. On 10 October 2010, the Health Secretary announced that the coalition government would continue with the introduction, but that the records would 'hold only the essential medical information needed in an emergency – that is medication, allergen and [drug] reactions'. By March 2013, more than 24 million SCRs had been created across England.
In 2022 the Department of Health and Social Care set a new target for each integrated care system to set up a ‘shared care record’ accessible by health and adult social care providers by 2024. This replaces the summary care record programme.
Content
Access to data is available to NHS personnel anywhere in England, but only if they have had the correct access rights on their smartcard approved by senior management . Pharmacists in five regions were given read-only access in an NHS England pilot in October 2014 so they could verify and compare a patient's medicines during medicine use reviews. Patients were able to view their own records via the HealthSpace website, which closed down in December 2012.
Initial content
The initial content of the database was to include the following:
Drugs which the patient has been prescribed
Known adverse reactions to drugs
Known allergies
In his announcement on 10 October 2010, the Health Secretary implied that its scope would in future be restricted to these three items, stating but that it would 'hold only the essential medical information needed in an emergency – that is medication, allergen and [drug] reactions'.
It also stated however that additional information can be added at the specific request of the patient.
Planned future content
It was originally intended that the database system would be upgraded in the future to add:
Accident and Emergency discharge summaries
Inpatient discharge summaries
Outpatient discharge summaries
Out of Hours GP service encounters
Health and Social Care Common Assessment Framework Plans
Contributions submitted by patients to their records via the HealthSpace website
However, following the Government announcement in October 2010 this is no longer envisaged.
Implementation
Initial plans were that patients' records would be automatically be uploaded, without seeking patient consent. In December 2006, Sir Liam Donaldson, the Chief Medical Officer, wrote to GPs telling them that letters from patients requesting that their records should not be uploade |
https://en.wikipedia.org/wiki/ViBe | ViBe is a background subtraction algorithm which has been presented at the IEEE ICASSP 2009 conference and was refined in later publications. More precisely, it is a software module for extracting background information from moving images. It has been developed by Oliver Barnich and Marc Van Droogenbroeck of the Montefiore Institute, University of Liège, Belgium.
ViBe is patented: the patent covers various aspects such as stochastic replacement, spatial diffusion, and non-chronological handling.
ViBe is written in the programming language C, and has been implemented on CPU, GPU and FPGA.
Technical description
Pixel model and classification process
Many advanced techniques are used to provide an estimate of the temporal probability density function (pdf) of a pixel x. ViBe's approach is different, as it imposes the influence of a value in the polychromatic space to be limited to the local neighborhood. In practice, ViBe does not estimate the pdf, but uses a set of previously observed sample values as a pixel model. To classify a value pt(x), it is compared to its closest values among the set of samples.
Model update: Sample values lifespan policy
ViBe ensures a smooth exponentially decaying lifespan for the sample values that constitute the pixel models. This makes ViBe able to successfully deal with concomitant events with a single model of a reasonable size for each pixel. This is achieved by choosing, randomly, which sample to replace when updating a pixel model. Once the sample to be discarded has been chosen, the new value replaces the discarded sample. The pixel model that would result from the update of a given pixel model with a given pixel sample cannot be predicted since the value to be discarded is chosen at random.
Model update: Spatial Consistency
To ensure the spatial consistency of the whole image model and handle practical situations such as small camera movements or slowly evolving background objects, ViBe uses a technique similar to that developed for the updating process in which it chooses at random and update a pixel model in the neighborhood of the current pixel. By denoting NG(x) and p(x) respectively the spatial neighborhood of a pixel x and its value, and assuming that it was decided to update the set of samples of x by inserting p(x), then ViBe also use this value p(x) to update the set of samples of one of the pixels in the neighborhood NG(x), chosen at random. As a result, ViBe is able to produce spatially coherent results directly without the use of any post-processing method.
Model initialization
Although the model could easily recover from any type of initialization, for example by choosing a set of random values, it is convenient to get an accurate background estimate as soon as possible. Ideally a segmentation algorithm would like to be able to segment the video sequences starting from the second frame, the first frame being used to initialize the model. Since no temporal information is available prior |
https://en.wikipedia.org/wiki/Adaptive%20learning | Adaptive learning, also known as adaptive teaching, is an educational method which uses computer algorithms as well as artificial intelligence to orchestrate the interaction with the learner and deliver customized resources and learning activities to address the unique needs of each learner. In professional learning contexts, individuals may "test out" of some training to ensure they engage with novel instruction. Computers adapt the presentation of educational material according to students' learning needs, as indicated by their responses to questions, tasks and experiences. The technology encompasses aspects derived from various fields of study including computer science, AI, psychometrics, education, psychology, and brain science.
Research conducted, particularly in educational settings within the United States, has demonstrated the efficacy of adaptive learning systems in promoting student learning. Among 37 recent studies that examined the effects of adaptive learning on learning outcomes, an overwhelming majority of 86% (32 studies) reported positive effects.
Adaptive learning has been partially driven by a realization that tailored learning cannot be achieved on a large-scale using traditional, non-adaptive approaches. Adaptive learning systems endeavor to transform the learner from passive receptor of information to collaborator in the educational process. Adaptive learning systems' primary application is in education, but another popular application is business training. They have been designed as desktop computer applications, web applications, and are now being introduced into overall curricula.
History
Adaptive learning or intelligent tutoring has its origins in the artificial-intelligence movement and began gaining popularity in the 1970s. At that time, it was commonly accepted that computers would eventually achieve the human ability of adaptivity. In adaptive learning, the basic premise is that the tool or system will be able to adjust to the student/user's learning method, which results in a better and more effective learning experience for the user. Back in the 70's the main barrier was the cost and size of the computers, rendering the widespread application impractical. Another hurdle in the adoption of early intelligent systems was that the user interfaces were not conducive to the learning process. The start of the work on adaptive and intelligent learning systems is usually traced back to the SCHOLAR system that offered adaptive learning for the topic of geography of South America. A number of other innovative systems appeared within five years. A good account of the early work on adaptive learning and intelligent tutoring systems can be found in the classic book "Intelligent Tutoring Systems".
Technology and methodology
Adaptive learning systems have traditionally been divided into separate components or 'models'. While different model groups have been presented, most systems include some or all of the following |
https://en.wikipedia.org/wiki/Canonical%20schema%20pattern | In software engineering, Canonical Schema is a design pattern, applied within the service-orientation design paradigm, which aims to reduce the need for performing data model transformation when services exchange messages that reference the same data model.
Rationale
The interaction between services often requires exchanging business documents. In order for a service consumer to send data (related to a particular business entity e.g. a purchase order), it needs to know the structure of the data i.e. the data model. For this, the service provider publishes the structure of the data that it expects within the incoming message from the service consumer. In case of services being implemented as web services, this would be the XML schema document. Once the service consumer knows the required data model, it can structure the data accordingly. However, under some conditions it may be possible that the service consumer already possesses the required data, which relates to a particular business document, but the data does not conform to the data model as specified by the service provider. This disparity among the data models results in the requirement of data model transformation so that the message is transformed into the required structure as dictated by the service provider. Building upon the aforementioned example, it is entirely possible that, after processing the received business document, the service provider sends back the processed document to the service consumer that once again performs the data model transformation to convert the processed business document back to the data model that it uses within its logic to represent the business document.
This runtime data model transformation adds processing overhead and complicates the design of service compositions. In order to avoid the need for data model transformation, the Canonical Schema pattern dictates the use of standardized data models for those business documents that are commonly processed by the services in a service inventory.
Usage
This design pattern is fully supported by the application of the Standardized Service Contract design principle. The Standardized Service Contract design principle advocates that the service contracts be based on standardized data models. This is achieved by performing an analysis of the service inventory blueprint in order to find out the commonly occurring business documents that are exchanged between services. These business documents are then modeled in a standardized manner. For example, in case of web services, the business documents are modeled as XML schemas. Once a standardized data representation layer exists in a service inventory, different service contracts can make use of the same data models if they need to exchange the same business documents. This eliminates the need for any data model transformation and reduces the processing overhead associated with the data model transformation. It also increases the reusability potential of a servic |
https://en.wikipedia.org/wiki/Intergenerational%20shared%20site | An Intergenerational shared site is a program in which children, youth and older adults participate in ongoing services and/or programming concurrently at the same site, and where participants interact during regularly scheduled planned intergenerational activities, as well as through informal encounters.
Benefits of shared sites include that they enhance quality of life for all participants, improve attitudes about different age groups, provide needed services to the community, increase cost savings and create opportunities to share resources, and attract additional funding sources and acts as positive public relations/marketing tools. Intergenerational shared sites serve and provide care to children, youth and older adults and also act as a mechanism to address of the social implications of an increasingly age-segregated society.
References
Community building |
https://en.wikipedia.org/wiki/Google%20TV%20%28operating%20system%29 | Google TV was a smart TV operating system from Google co-developed by Intel, Sony and Logitech. It launched in October 2010 with official devices initially made by Sony and Logitech. Google TV integrated the Android 3.0/3.2 operating system and the Google Chrome web browser to create an interactive television overlay on top of existing online video sites to add a 10-foot user interface, for a smart TV experience.
Google TV's first generation devices were all based on x86 architecture processors and were created and commercialized by Sony and Logitech. The second generation of devices are all based on ARM architecture processors and with additional partners including LG, Samsung, Vizio and Hisense. In 2013, more second generation Google TV-supported devices were announced by new partners, including Hisense, Netgear, TCL, and Asus, some of which include 3D video support.
Google TV was succeeded in June 2014 by Android TV, a newer platform which shares closer ties with the Android platform and has a revamped user experience integrating with Knowledge Graph, and providing casting support from mobile devices. As of June 2014, the Google TV SDK is no longer available, ending any future software development for existing devices and effectively deprecating the platform. The "Google TV" branding has since been used as a replacement for Google Play Movies & TV, and to refer to a user interface used on newer Android TV devices (such as Chromecast with Google TV).
History
2010 March – Media outlets reported that the Google TV project was underway, although the partnering companies did not confirm their involvement in the venture until later.
2010 May 20 – The Google TV project was officially announced at the 2010 Google I/O conference on May 20. Google stated that the new platform would be incorporated directly into new high-definition television sets and Blu-ray Disc players by Sony, although set-top boxes would also be developed by Logitech. The company indicated that the new systems developed by Sony and Logitech would be powered by Intel Atom based CE4100 consumer electronics system-on-chip. It also stated that a "fully optimized" viewer experience would be available through the Dish Network, although the platform would operate through any provider.
2010 May – Sony announced that it would be releasing its Google-enabled Sony Internet TV product lineup in the fall of 2010, including standalone TV models and set-top units with integrated Blu-ray Disc drives.
2010 November 10 – Dish Network announced that its Google TV solution was available to customers. Dish Network's Google TV solution, which requires a DVR integration service, includes the Logitech Revue with Google TV, a small set-top box.
2010 December 15 – Google announces the first Google TV update, with some bug fixes and four major improvements: namely Netflix streaming catalog, Dual View, Remote Control App for Android Phones and Movies search results.
2011 May 10 – At Google I/O it is |
https://en.wikipedia.org/wiki/GNOSIS | Great New Operating System In the Sky (GNOSIS) is a capability-based operating system that was researched during the 1970s at Tymshare, Inc. It was based on the research of Norman Hardy, Dale E. Jordan, Bill Frantz, Charlie Landau, Jay Jonekait, et al. It provided a foundation for the development of future operating systems such as KeyKOS, EROS, CapROS, and Coyotos. In 1984, McDonnell Douglas acquired Tymshare, and a year later sold GNOSIS to Key Logic, where GNOSIS was renamed KeyKOS.
References
External links
, Norman Hardy
Capability systems
Microkernel-based operating systems
Microkernels |
https://en.wikipedia.org/wiki/NFL%20RedZone | NFL RedZone (stylized as NFL RedZone from NFL Network) is an American sports television channel owned and operated by NFL Network since 2009. As a "special" game-day exclusive, it broadcasts on Sundays during the NFL regular season from 1:00 p.m. to 8:00 p.m. Eastern (10:00 a.m. to 5:00 p.m. Pacific), or when the last afternoon window game ends. RedZone provides "whip around" simulcast coverage of all Sunday afternoon games airing in-progress on CBS and Fox.
RedZone is based out of the NFL Network studios and is hosted by Scott Hanson, and airs commercial-free. The channel prides itself on showing "every touchdown from every game," and is closely linked to Fantasy Football, reporting superlatives and tracking various statistical accomplishments throughout the afternoon. RedZone monitors coverage of the traditional Sunday 1:00 p.m. "early" games and 4:05/4:25 p.m. "late" games.
RedZone is offered by numerous cable providers, Dish Network, and Verizon Wireless smartphones, and DIRECTV as of the 2023 season. This change was made when YouTube purchased the rights to NFL Sunday Ticket.
RedZone is also broadcast live internationally in the United Kingdom on the Sky Sports Mix television channel, and in Canada and Italy on DAZN, every Sunday evening and running through the full seven hours. It is a direct simulcast of the American feed, with no commercial breaks, live coverage of both the early and late games and Hanson hosting.
ESPN Goal Line, a channel which debuted one year later, broadcast college football with a similar format and style until the end of the 2019 season. The name "RedZone" derives from the term red zone, which is the part of the football field between the 20-yard line and the goal line.
Format
On game day, the RedZone channel signs-on at 12:55 p.m., US Eastern time. The countdown clock counts down the minutes and seconds until the start of the game coverage. As of December 6, 2020, the channel has featured 200 weeks of coverage since its debut.
Whip around coverage
At 1:00 p.m. (Eastern) the RedZone program begins, and immediately dives into live look-ins across the league. Host Scott Hanson gives a brief introduction of the day, highlighting key developing stories, as teams are typically already lining up for opening kickoff. When the first kickoff takes place, Hanson will say "Seven hours of commercial-free football... starts now!" Coverage of the opening kickoffs and a cursory look at early drives that are being established are the initial focus. Coverage is normally shown in full-screen, with one particular game as the primary focus for the moment. The coverage is a direct simulcast of the CBS or Fox broadcast feed and commentary, with only occasional and usually brief voice-over comments by Hanson as needed. Coverage sometimes switches to split-screen, with two, three, four ("quad-box"), five ("Penta-box"), or as many as eight ("Octo-box") game feeds being shown simultaneously. Producers in the studio monitor all game fe |
https://en.wikipedia.org/wiki/Killarney%20RFC%20historical%20results | Below are details of all the competitive matches played by Killarney RFC since 2002. They are listed season by season and arranged according to competition. They are compiled using data available from the Munster Junior Rugby website and also the Official Club Website.
2002/03 Season
The 2002/03 season was a disappointing one for Killarney. The club lost all their league matches finishing bottom of the Munster Junior League Division 3. They also lost their Munster Junior Cup game against Bandon and declined to make the long trip to Clonakilty for the Munster Junior Plate.
Munster Junior League Division 3 Final Table 2002/03
Munster Junior League Division 3 Results 2002/03
Munster Junior Cup Results 2002/03
Munster Junior Plate Results 2002/03
Munster Junior Clubs Challenge Cup Results 2002/03
2003/04 Season
The 2003/04 season was a much better season than the previous one for Killarney. They recorded 4 league wins and finished in 11th place in Division 3. They had a narrow victory over Presentation in the Munster Junior Clubs Challenge Cup, but were then no match for Old Christians in the next round.
Munster Junior League Division 3 Final Table 2003/04
Match Galbally v. Dunmanway not played
Munster Junior League Division 3 Results 2003/04
Munster Junior Cup Results 2003/04
Munster Junior Clubs Challenge Cup Results 2003/04
2004/05 Season
Despite the fact that Killarney won fewer games in the Munster Junior League this season than last they still finished two places higher up the table in 9th position. An impressive 19–9 away win in Kinsale was as good as it got as their only other victory was a narrow two-point win at home to Galbally. Their other 'win' was courtesy of a walkover from Dunmanway. They lost all four cup matches they played including a narrow defeat to neighbours Tralee in the Munster Junior Cup.
Munster Junior League Division 3 Final Table 2004/05
Match Galbally v. Carrick-on-Suir was not played
Munster Junior League Division 3 Results 2004/05
Munster Junior Cup Results 2004/05
Munster Junior Plate Results 2004/05
Munster Junior Clubs Challenge Cup Results 2004/05
Martin O'Sullivan Cup Results 2004/05
2005/06 Season
Killarney only lost 4 of their 8 league matches in 2005/06, but only winning 2 games meant they finished down in 8th place. The cup competitions were a massive disappointment. A 61–0 drubbing away to Bandon was followed by a 44–0 home defeat to Clonmel. The club didn't travel to Tanner Park to play Ballincollig in the Martin O'Sullivan Cup having already lost there to them in the league 46–0.
Munster Junior League Division 3 Final Table 2005/06
Munster Junior League Division 3 Results 2005/06
Match Kinsale v. Killarney was not played
Munster Junior Cup Results 2005/06
Munster Junior Plate Results 2005/06
Munster Junior Clubs Challenge Cup Results 2005/06
Martin O'Sullivan Cup Results 2005/06
McElligott Cup Final Table 2005/06
McElligott Cup Results 2005/06
Match Killarney v. Abbeyfeale not |
https://en.wikipedia.org/wiki/Ubiquitous%20Knowledge%20Processing%20Lab | The Ubiquitous Knowledge Processing Lab (also UKP Lab) is a research lab at the Department of Computer Science at the Technische Universität Darmstadt. It was founded in 2006 by Iryna Gurevych.
Research Activities
UKP Lab develops natural language processing techniques for automatically understanding written text and applies them to information management like information retrieval, question answering, and structuring information in Wikis.
The Ubiquitous Knowledge Processing Lab is among the leading research institutes in the field of utilizing Web 2.0 content as the source of lexical semantic information for natural language processing (NLP). Wikipedia and Wiktionary are employed as collaboratively constructed lexical semantic resources and used to improve expert-built resources like WordNet.
These resources are used to develop semantically enhanced algorithms for information retrieval and question answering. An example is semantic search: If a user enters the query "pie-fruit" into a search engine, a standard search engine will retrieve pages containing the words "pie" but not the word "fruit", providing plenty of pages on "apple pie". An intelligent search engine will "understand" that the user is interested in pie recipes that do not use any type of fruit and retrieve appropriate documents.
Further research activities at UKP lab are automatic quality assessment of text, sentiment analysis and opinion mining.
Research activities are organized into the following research areas:
Educational natural language processing
Multilingual semantic information management
Natural language processing for Wikis
A strong focus at UKP Lab is on utilizing novel natural language processing algorithms in real-life applications. UKP Lab collaborates with partners from academia and industry to improve various application scenarios, such as customer relationship management, digital humanities, educational applications, or public security.
Software
Part of the research efforts at UKP Lab is the development of natural language processing (NLP) software. The following software packages are freely available for research purposes:
DKPro
The Darmstadt Knowledge Processing Software Repository (DKPro) is an open source community of software projects aimed at Natural Language Processing. It offers robust, ready to use NLP components which are built on top of IBM’s Unstructured Information Management Architecture (UIMA) as a common and open framework.
DKPro contains basic natural language processing components like part-of-speech tagging and lemmatization.
Additionally, the package offers components that support the processing of user generated discourse. User-generated content contains spelling errors, abbreviations and emoticons which prohibit direct application of standard NLP components. DKPro provides the required preprocessing tools.
Wikipedia API
The Java Wikipedia Library (JWPL) was also developed at UKP Lab. It is a Java-based application progr |
https://en.wikipedia.org/wiki/Seymour%20Cray%20Computer%20Engineering%20Award | The Seymour Cray Computer Engineering Award, also known as the Seymour Cray Award, is an award given by the IEEE Computer Society, to recognize significant and innovative contributions in the field of high-performance computing. The award honors scientists who exhibit the creativity demonstrated by Seymour Cray, founder of Cray Research, Inc., and an early pioneer of supercomputing. Cray was an American electrical engineer and supercomputer architect who designed a series of computers that were the fastest in the world for decades, and founded Cray Research which built many of these machines. Called "the father of supercomputing," Cray has been credited with creating the supercomputer industry. He played a key role in the invention and design of the UNIVAC 1103, a landmark high-speed computer and the first computer available for commercial use.
In 1972 the IEEE presented Cray with the Harry H. Goode Memorial Award for his contributions to large-scale computer design and the development of multiprocessing systems. One year after Cray's death in 1996, IEEE created the Seymour Cray Computer Engineering Award in honor of his creative spirit. The award is one of the 12 technical awards sponsored by the IEEE computer society as recognition given to pioneers in the field of computer science and engineering. The winner receives a crystal memento, certificate, and US$10,000 honorarium.
The first recipient, in 1999, was John Cocke.
Nomination and Ceremony
The following criteria are considered when selecting a recipient:
Leadership in field
Breadth of work
Achievement in other fields
Inventive value (patents)
Individual vs. group contribution
Publications (articles, etc.)
Originality of contribution
Quality of nomination
IEEE Society activities and honors
Quality of endorsements
The annual nomination deadline is July 1. Anyone may nominate a candidate, although self-nomination is not allowed. A candidate must receive at least three nominations to be considered by the award committee. Nominations should be prepared and submitted through the IEEE official website.
The Seymour Cray Computer Engineering Award presentation and reception are held at the SC conference, the international conference for high-performance computing networks, storage, and analysis. The conference is sponsored by the ACM (Association for Computing Machinery) and the IEEE Computer Society. It is held annually in mid-November. Several other IEEE sponsored awards are presented at the same event, including the ACM Gordon Bell Prize, the ACM/IEEE-CS Ken Kennedy Award, the ACM/IEEE-CS George Michael Memorial HPC Fellowship, the ACM SIGHPC / Intel Computational & Data Science Fellowships, the IEEE-CS Seymour Cray Computer Engineering Award, and the IEEE-CS Sidney Fernbach Memorial Award.
Recipients
See also
List of computer-related awards
List of computer science awards
List of prizes named after people
IEEE John von Neumann Medal
Gordon Bell Prize
References
External li |
https://en.wikipedia.org/wiki/Solatorobo%3A%20Red%20the%20Hunter | Solatorobo: Red the Hunter, originally released in Japan as is an action role-playing video game developed by CyberConnect2 for the Nintendo DS. Originally released in Japan by Bandai Namco Games in October 2010, an English version was released by Nintendo for Europe in July 2011 and Australia the following November, with a North American release in September by Xseed Games. It is the spiritual sequel to Tail Concerto, and, like its predecessor, features artwork and character designs by manga artist Nobuteru Yūki and music by Chikayo Fukuda. The game includes animated cutscenes produced by Madhouse, as well as vocal themes performed by Tomoyo Mitani.
Set in a steampunk fantasy world of floating sky islands populated by anthropomorphic dogs and cats dubbed "Caninu" and "Felineko" respectively (lit. "イヌヒト" and "ネコヒト" / "dog people" and "cat people"), the game focuses on a canine freelance adventurer named Red Savarin who pilots a flying mecha. On a seemingly ordinary task to fetch a stolen file, he encounters a mysterious young Felineko named Elh, and becomes involved in a series of events that reveal the hidden truth of the origin of his world and those who live in it.
Gameplay
Solatorobo is an action role-playing game where players control Red, an adventurer who pilots his own small mecha equipped with long arms that can grab and throw objects or enemies. Red can throw enemies into one another, as well as repeatedly toss and re-throw the same enemy in a combo to deal extra damage. Each time an enemy is defeated, Red gains experience points that allow him to gain levels, making him stronger and increasing his health. His mecha can be upgraded and customized by purchasing parts with currency called "rings", which consist of simple geometric shapes that fit into slots unlocked by finding "P. Crystals" throughout the game. As the story progresses, he gains new offensive abilities such as swinging an opponent around or firing projectiles. The player may also allow Red to exit his machine at any time, giving him the ability to swim, climb ladders, activate panels or switches, and immobilize enemies with his stun gun.
Players advance the story by making it to the end of each new area, often solving puzzles and defeating enemies along the way. In addition to the main narrative, players must also complete a number of side quests to increase their "hunter rank", allowing them to gain access to new parts of the main storyline. A total of 83 quests exist in the game, which often require the player to find items, perform tasks for townsfolk, or play minigames. While 12 of these quests were only available as downloadable content in the Japanese and PAL versions, the North American release contains all of them on the game card from the start. The game also includes a multiplayer racing mode called Air Robo GP, which can be played over the Nintendo Wi-Fi Connection.
Story
Characters and setting
Solatorobo takes place in the Shepherd Republic, a series of |
https://en.wikipedia.org/wiki/John%20Crawford%20%28engineer%29 | John H. Crawford (born February 2, 1953) is an American computer engineer.
Career
During a long career at Intel starting in 1977, he was the chief architect of the Intel 80386 and Intel 80486 microprocessors. He also co-managed the design of the Intel P5 Pentium microprocessor family. Crawford was the recipient of the 1995 Eckert–Mauchly Award. He was awarded the IEEE Ernst Weber Engineering Leadership Recognition in 1997.
Crawford was elected a member of the National Academy of Engineering in 2002 for the architectural design of widely used microprocessors.
He retired from Intel in 2013.
In 2014, he was made a fellow of the Computer History Museum for his work on industry-standard microprocessor architectures.
Bibliography
References
External links
Oral History of John H. Crawford 2014 Computer History Museum Fellow
Computer designers
21st-century American engineers
Intel people
Living people
Members of the United States National Academy of Engineering
1953 births
American electrical engineers |
https://en.wikipedia.org/wiki/Post-quantum%20cryptography | In cryptography, post-quantum cryptography (PQC) (sometimes referred to as quantum-proof, quantum-safe or quantum-resistant) refers to cryptographic algorithms (usually public-key algorithms) that are thought to be secure against a cryptanalytic attack by a quantum computer. The problem with currently popular algorithms is that their security relies on one of three hard mathematical problems: the integer factorization problem, the discrete logarithm problem or the elliptic-curve discrete logarithm problem. All of these problems could be easily solved on a sufficiently powerful quantum computer running Shor's algorithm or even faster and less demanding (in terms of number of qubits required) alternatives.
Even though current quantum computers lack processing power to break any real cryptographic algorithm, many cryptographers are designing new algorithms to prepare for a time when quantum computing becomes a threat (which is a potential day in the future called Q-Day). This work has gained greater attention from academics and industry through the PQCrypto conference series since 2006 and more recently by several workshops on Quantum Safe Cryptography hosted by the European Telecommunications Standards Institute (ETSI) and the Institute for Quantum Computing. The rumoured existence of widespread harvest now, decrypt later programs has also been seen as a motivation for the early introduction of post-quantum algorithms, as data recorded now may still remain sensitive many years into the future.
In contrast to the threat quantum computing poses to current public-key algorithms, most current symmetric cryptographic algorithms and hash functions are considered to be relatively secure against attacks by quantum computers. While the quantum Grover's algorithm does speed up attacks against symmetric ciphers, doubling the key size can effectively block these attacks. Thus post-quantum symmetric cryptography does not need to differ significantly from current symmetric cryptography.
Algorithms
Currently post-quantum cryptography research is mostly focused on six different approaches:
Lattice-based cryptography
This approach includes cryptographic systems such as learning with errors, ring learning with errors (ring-LWE), the ring learning with errors key exchange and the ring learning with errors signature, the older NTRU or GGH encryption schemes, and the newer NTRU signature and BLISS signatures. Some of these schemes like NTRU encryption have been studied for many years without anyone finding a feasible attack. Others like the ring-LWE algorithms have proofs that their security reduces to a worst-case problem. The Post Quantum Cryptography Study Group sponsored by the European Commission suggested that the Stehle–Steinfeld variant of NTRU be studied for standardization rather than the NTRU algorithm. At that time, NTRU was still patented. Studies have indicated that NTRU may have more secure properties than other lattice based algorithms.
Multiva |
https://en.wikipedia.org/wiki/Institute%20for%20Private%20Investors | The Institute for Private Investors (IPI) is a private membership organization that provides peer-to-peer networking and investor education for its members. The group is open to high-net-worth individuals, or families with minimum investable assets of US $30 million or more.
The organization was founded in 1991 by Charlotte B. Beyer of Charlotte Beyer Associates, Inc., and incorporated in 1997. Its mission is to improve the way investors work with advisors. The association sells no investment products or consulting services, deriving its revenue solely from membership dues and educational fees.
In 1999, IPI collaborated with the Wharton School of the University of Pennsylvania to create a five-day residential program, with Beyer among the faculty.
IPI offers access to Memberlink, a private online social networking platform to discuss investment ideas and other issues facing wealthy families.
For wealth-holders under 50, the organization offers a NextGen Membership that combines online resources with special events and educational programs to help next generation principals connect with peers.
In addition to individual private investors and families, professional service firms, such as registered investment advisors and wealth managers, can also join IPI as members, though they do not gain access to the investors' conversations and are not allowed to directly pitch or sell to members.
In 2011, IPI was acquired by London-based Campden Media.
References
External links
Investor Education Collaborative
Official website
American social networking websites |
https://en.wikipedia.org/wiki/Hybrid%20input-output%20algorithm | Hybrid input-output (HIO) algorithm for phase retrieval is a modification of the error reduction algorithm for retrieving the phases in coherent diffraction imaging. Determining the phases of a diffraction pattern is crucial since the diffraction pattern of an object is its Fourier transform and in order to properly invert transform the diffraction pattern the phases must be known. Only the amplitude however, can be measured from the intensity of the diffraction pattern and can thus be known experimentally. This fact together with some kind of support constraint can be used in order to iteratively calculate the phases. The HIO algorithm uses negative feedback in Fourier space in order to progressively force the solution to conform to the Fourier domain constraints (support). Unlike the error reduction algorithm which alternately applies Fourier and object constraints the HIO "skips" the object domain step and replaces it with negative feedback acting upon the previous solution.
Although it has been shown that the method of error reduction converges to a limit (but usually not to the correct or optimal solution)
there is no limit to how long this process can take. Moreover, the error reduction algorithm will almost certainly find a local minimum instead of the global solution. The HIO differs from error reduction only in one step but this is enough to reduce this problem significantly. Whereas the error reduction approach iteratively improves solutions over time the HIO remodels the previous solution in Fourier space applying negative feedback. By minimizing the mean square error in Fourier space from the previous solution, the HIO provides a better candidate solution for inverse transforming. Although it is both faster and more powerful than error reduction, the HIO algorithm does have a uniqueness problem.
Depending on how strong the negative feedback is there can often be more than one solution for any set of diffraction data. Although a problem, it has been shown that many of these possible solutions stem from the fact that HIO allows for mirror images taken in any plane to arise as solutions. In crystallography, the scientist is seldom interested in the atomic coordinates relative to any other reference than the molecule itself and is therefore more than happy with a solution that is upside-down of flipped from the actual image. A downside is that HIO has a tendency to escape both global and local maxima. This problem also depends on the strength of the feedback parameter, and a good solution to this problem is to switch algorithm when the error reaches its minimum. Other methods of phasing a coherent diffraction pattern include difference map algorithm and "relaxed averaged alternating reflections" or RAAR.
References
Diffraction |
https://en.wikipedia.org/wiki/Binary%20form%20%28disambiguation%29 | Binary form may refer to:
In music, binary form is a form (structure) consisting of two related parts.
In computer science and mathematics, number in the binary form refers to the use of binary numeral system.
In mathematics, a binary form is a homogeneous polynomial in two variables.
The article binary quadratic form discusses binary forms of degree two.
The article invariant of a binary form discusses binary forms of higher degree.
Binary form is another name for a binary quantic |
https://en.wikipedia.org/wiki/Logie%20Awards%20of%202010 | The 52nd TV Week Logie Awards ceremony was held on Sunday 2 May 2010 at the Crown Palladium in Melbourne, and broadcast on the Nine Network. The ceremony was hosted by Bert Newton, making it the 19th time he hosted the event as a solo host. The red carpet arrivals were hosted by Karl Stefanovic, Lisa Wilkinson, Jules Lund and Ruby Rose, while Richard Wilkins and Natalie Gruzlewski presented the Myer Logie Minute during the ceremony. The Big Bang Theorys Johnny Galecki was one of the international guests. Musical performers at the event were John Mayer, Gabriella Cilmi with the cast from the stage musical Fame, k.d. lang and the Rogue Traders. John Foreman returned as musical director for the event. Susan Boyle was scheduled to perform but pulled out a few weeks before the ceremony, cancelling all her appearances in Australia. PJ Lane sang a tribute to his late father Don Lane. Early that year, Each network is restricted in the number of personalities and programs they can submit for consideration in the publicly voted category, including up to 10 names in both the Most Popular Actor and Actress categories, 15 names for Most Popular Presenter and 5 programs for Most Popular Drama. These restrictions often lead to controversy over those who are not listed in the voting form, and are not eligible to be nominated for an award.
Nominations
The traditional Logies nominations breakfast was held on 29 March 2010 at the Ivy Pool Bar in Sydney. The breakfast was hosted by Charlie Pickering and Gigi Edgley. Both Sunrise, The Morning Show and Today crossed to the event live. The Seven Network had 34 nominations, the most of any network out of the 113 in total. ABC3 got its first nomination since its launch months earlier than the ceremony, and is the first of any of the digital channels (ABC2, 7Two, GO!, SBS Two and ONE HD) to receive a nomination.
Winners and nominees
In the tables below, winners are listed first and highlighted in bold.
Gold Logie
Acting/Presenting
Most Popular Programs
Most Outstanding Programs
References
External links
2010
2010 television awards
2010 in Australian television
2010 awards in Australia |
https://en.wikipedia.org/wiki/Ilya%20Zimin | Ilya Anatolyevich Zimin (, May 1, 1972 – February 26, 2006) was a Russian journalist and television reporter who worked for the NTV network. Winner of the prize TEFI (2002) — the reporter. He was killed by a youth who turned out to be his sexual partner.
Death
On February 26, 2006, Zimin was murdered under unclear circumstances. His death was caused by a cranial trauma. The police did not consider robbery as the cause of murder, neither did they connect Zimin's death with his professional activity. They suspected that the murder was the result of a domestic dispute. However, the main suspect, Igor Velchev, arrested on June 23, 2006 in Moldova, denied guilt. He stated in his defense that Zimin had approached him "offering sexual relations", so Velchev "pushed him hard and walked out."
On December 25, 2007, the Ocnița District Court of Moldova fully acquitted the accused.
Ilya Zimin is buried at the Central Cemetery in Khabarovsk.
References
External links
Russian TV reporter killed under mysterious circumstances
Страница журналиста на сайте программы «Профессия-репортёр»
1972 births
Mass media people from Vladivostok
2006 deaths
Journalists killed in Russia
Violence against men in Europe
20th-century Russian journalists |
https://en.wikipedia.org/wiki/Computer%20University%2C%20Bhamo | Computer University, Bhamo is a university located in Bhamo, Kachin State of Myanmar.
External links
Official site
Technological universities in Myanmar |
https://en.wikipedia.org/wiki/Computer%20University%2C%20Magway | University of Computer Studies (Magway) (, ), is a university located in Magway, Myanmar.
Location
The university was located in Ayemyathaya Village, and was moved to a new campus near Magyikan Village on the Magway-Taungdwingyi Road in the 2012–2013 academic year. The university, administered by the Ministry of Education, offers undergraduate and master degree programs in computer science and technology.
Programs
The university offers three-year bachelor's and four-year bachelor's (honors) degree programs. Starting in the 2012–2013 academic year, all bachelor's degree programs will take four years to complete. And from the 2012–2013 academic year, it is started 5 years studying for bachelor's degree.
Curriculum
First Year
First Semester: Burmese, English, Physics, 101, 102, 103, 104
Second Semester: Burmese, English, Physics, 101, 102, 103, 104
Second Year
First Semester: English, 201, 202, 203, 204, 205, 206
Second Semester: English, 201, 202, 203, 204, 205, 206
Third Year
First Semester: English, 301, 302, 303, 304, 305, 306
Second Semester: English, 301, 302, 303, 304, 305, 306
Fourth Year
First Semester: English, 401, 402, 403, 404, 405, 406
Second Semester: English, 401, 402, 403, 404, 405, 406
Fifth Year
First Semester: English, 501, 502, 503, 504, 505
Second Semester: English, 502, 503, project
Faculty
===Teaching departments===
Faculty of Computing
Faculty of Computer Systems and Technologies
Faculty of Information Science
Faculty of Computer Science
Department of Information Technology Supporting and Maintenance
Department of Language
Department of Natural Science
Universities and colleges in Magway Region
Technological universities in Myanmar |
https://en.wikipedia.org/wiki/Madagascar%20National%20Parks | Madagascar National Parks, formerly known as the (ANGAP; ), was founded in 1990 and is charged with managing a network of 46 National Parks, Special Reserves and Integral Nature Reserves in Madagascar. It is a private association that is legally recognised to have a public function since 4 December 1991, and it operates under the supervision of the ministry responsible for the environment, which, as of June 2008, is the Ministry of the Environment and Forests (MEF).
The association's mission is "To establish, conserve and sustainably manage a national network of parks and reserves representative of the biological diversity and the natural heritage of Madagascar."
See also
References
External links
Madagascar National Parks Official website (in French)
Supporting urgent biodiversity conservation in Madagascar World Bank website on Conservation Project in Madagascar (in English, French)
Nature conservation in Madagascar
Environmental organisations based in Madagascar |
https://en.wikipedia.org/wiki/Chief%20programmer%20team | A chief programmer team is a programming team organized in a star around a "chief" role, granted to the software engineer who understands the system's intentions the best. Other team members get supporting roles.
The concept is similar to that of a surgical team in which a surgeon who performs the operation is supported by medical staff such as an anaesthetist and nurses.
Fred Brooks describes the concept in detail in The Mythical Man-Month, as proposed by Harlan Mills in 1971.
Team structure
The team consists of people. Various roles have been defined for team members, the following are taken from Brooks.
Program Clerk: responsible for all project technical records.
Toolsmith: builds and supports tools used by developers.
Language Lawyer: has in-depth expertise in the language(s) used to develop the project.
In this arrangement the chief programmer and backup programmer actually work on the problem. The remaining team members provide "all conceivable support."
References
External links
Software project management |
https://en.wikipedia.org/wiki/Thrissur%20Corporation%20Electricity%20Department | The Thrissur Municipal Corporation manages the distribution of electricity to residents and commercial establishments through Thrissur Corporation Electricity Department. The distribution network covers about 12.63 square kilometers and has 36,000 connections.
Thrissur Municipal Corporation and TCED are separate entities and the TCED is run on a commercial basis. The municipal corporation purchases power in bulk from the Kerala State Electricity Board (KSEB). The budget for this operation, however, is separately prepared and is not included in the annual municipal corporation budget. The separate books of accounts of the operation are also kept under the cash-based system.
References
Local government in Kerala
Government of Thrissur
Organisations based in Thrissur
Science and technology in Thrissur
Energy in Kerala
Year of establishment missing |
https://en.wikipedia.org/wiki/Programming%20team | A programming team is a team of people who develop or maintain computer software. They may be organised in numerous ways, but the egoless programming team and chief programmer team have been common structures.
Description
A programming team comprises people who develop or maintain computer software.
Programming team structures
Programming teams may be organised in numerous ways, but the egoless programming team and chief programmer team are two common structures typically used. The main determinants when choosing the programming team structure typically include: difficulty, size, duration, modularity, reliability, time, and sociability.
Egoless programming
According to Marilyn Mantei, individuals that are a part of a decentralized programming team report higher job satisfaction. But an egoless programming team contains groups of ten or fewer programmers. Code is exchanged and goals are set amongst the group members. Leadership is rotated within the group according to the needs and abilities required during a specific time. The lack of structure in the egoless team can result in a weakness of efficiency, effectiveness, and error detection for large-scale projects. Egoless programming teams work best for tasks that are very complex.
Chief programmer team
A chief programmer team will usually contain three-person teams consisting of a chief programmer, senior level programmer, and a program librarian. Additional programmers and analysts are added to the team when necessary. The weaknesses of this structure include a lack of communication across team members, task cooperation, and complex task completion. The chief programmer team works best for tasks that are simpler and straightforward since the flow of information in the team is limited. Individuals that work in this team structure typically report lower work morale.
Shared workstation teams
Pair programming
A development technique where two programmers work together at one workstation.
Mob programming
A software development approach where the whole team works on the same thing, at the same time, in the same space, and at the same computer.
Programming Models
Programming models allow software development teams to develop, deploy, and test projects using these different methodologies.
Throughout both of these programming models, team members typically participate in daily 5 - 15 minute stand-ups. Traditionally, each member of the team will stand up and state what they have worked on since the previous stand-up, what they intend to work on until the next stand-up, and whether or not there is anything preventing them from making progress, often known as a "blocker".
Waterfall Model
The waterfall model, noted as the more traditional approach, is a linear model of production. The sequence of events of this methodology follows as:
Gather and document requirements
Design
Code and unit test
Perform system testing
Perform user acceptance testing (UAT)
Fix any issues
Deliver th |
https://en.wikipedia.org/wiki/Models%20of%20the%20Runway | Models of the Runway is a television series on the Lifetime network. It was an offshoot of Project Runway appearing each week during seasons when Project Runway aired, generally immediately following the broadcast of the latest episode, and following the experiences of the fashion models on Project Runway, focusing on their social interactions and weekly eliminations. It ran for two seasons and like Project Runway it was hosted by Heidi Klum.
Format
The models are housed together throughout each season. Consequently, many friendships, some conflicts, and occasional animosities can be observed. Also, because fashion modeling is a competitive occupation, Models of the Runway examines rivalries among the models, relationships with the fashion designers, cosmetic techniques, and individual personalities, as well as career histories and aspirations.
Near the end of each show, a selection process occurs, during which Project Runway fashion designers choose which model they wish to work with for the week. All of the models stand in a runway lineup with Heidi Klum in the center, while the designers sit on the ground floor facing them. The models appear by wearing the same outfit (barefoot and a short black shift dress). The sequence by which designers select models is based upon how high they scored during the preceding episode's design competition as well as random pick from a bag: The winning designer has first pick, the runner-up selects second, the lowest-scoring designer picks last, etc. Because there is one more model than the number of designers at the beginning of the selection process, one model remains unpicked at the end, and will be sent home. Thus, the surviving designer with the lowest score during the previous week plays the most important role in determining which model will be eliminated.
The scene when the just-eliminated fashion designer meets with the models is often poignant, since the model associated with that designer has a strong likelihood of leaving soon. The closing sequences of each program also tend to be tear-evoking, as the surviving models gather around the eliminated model and bid her farewell. Tim Gunn also appears during the final scenes, typically complimenting the model and reminding her that she must promptly pack up and head home. It was announced that Models of the Runway will not return for a third season. Instead, Austin Scarlett and Santino Rice are starring in their own show "On the Road with Austin and Santino".
Models
Season 1 models (Season 6 of Project Runway)
Season 2 models (Season 7 of Project Runway)
See also
Project Runway (season 6)
Project Runway (season 7)
References
Boston Herald; One Herald Square; Boston, MA 02118
https://web.archive.org/web/20100729192023/http://news.bostonherald.com/entertainment/television/general/view.bg?articleid=1270843
"Heidi Klum struts into eighth season with 90-minute ‘Project’" By Amy Amatangelo, Thursday, July 29, 2010 Excerpt: "She did conce |
https://en.wikipedia.org/wiki/Northwest%20Sinfonia | The Northwest Sinfonia is a session symphonic orchestra based in Seattle, mostly renowned for recording soundtracks to motion pictures and computer games. It was founded in 1995 and is credited with over 100 recordings.
It draws its members mostly from the Seattle Symphony, Seattle Opera, and Pacific Northwest Ballet orchestras. An additional chorus is added if required. (as the Northwest Sinfonia and Chorale). David Sabee is the organization's music director and executive director.
Recordings (selections)
Film Scores
The Lovers (2017)
Resident Evil: The Final Chapter (2016)
Rage (2016)
The Revenant (2015)
Child 44 (2015)
Underworld: Awakening (2012)
Mirror Mirror (2012)
There Be Dragons (2011, international cut only)
Beastly (2011)
Let Me In (2010)
Red (2010)
The Back-up Plan (2010)
The Blind Side (2009)
The Men Who Stare at Goats (2009)
The Last House on the Left (2009)
I Love You Beth Cooper (2009)
Drag Me to Hell (2009)
While She Was Out (2008)
Traitor (2008)
The Incredible Hulk (2008)
The Great Buck Howard (2008)
Rambo (2008)
Valkyrie (2008)
Harold & Kumar Escape from Guantanamo Bay (2008)
The Forbidden Kingdom (2008)
Ghost Rider (2007)
The Grudge 2 (2006)
The Texas Chainsaw Massacre: The Beginning (2006)
When a Stranger Calls (2006)
Lord of War (2005)
Brokeback Mountain (2005)
Wedding Crashers (2005)
The Wedding Date (2005)
Kiss Kiss Bang Bang (2005)
Blade: Trinity (2004)
The Grudge (2004)
Paparazzi (2004)
Godsend (2004)
Eloise at the Plaza (2003)
Runaway Jury (2003)
They (2002)
Jonah: A VeggieTales Movie (2002)
Lewis & Clark: Great Journey West (2002)
Thirteen Ghosts (2001)
Novocaine (2001)
The Caveman's Valentine (2001)
Scary Movie (2000)
The Gift (2000)
The Book of Stars (1999)
The Newton Boys (1998)
Smoke Signals (1998)
Barney's Great Adventure (1998)
Everest (1998)
The Soong Sisters (1997)
Bad Moon (1996)
Thinner (1996)
Hellraiser: Bloodline (1996)
The Arrival (1996)
Lord of Illusions (1995)
Television
Stargate The Ark Of Truth (2008)
Stargate Continuum (2008)
Stargate Atlantis (2006)
Frontier House (2002)
Video games
Golem (2019)
Destiny 2: Shadowkeep (2019)
Destiny 2: Forsaken (2018)
Destiny 2 (2017)
Destiny: The Taken King (2015)
Destiny (2014)
Middle-earth: Shadow of Mordor (2014)
Planetary Annihilation (2014)
Diablo III: Reaper of Souls (2014)
Dota 2 (2013)
PlanetSide 2 (2012)Gears of War 3 (2011)Ace Combat: Assault Horizon (2011)Halo: Reach (2010)World of Warcraft: Cataclysm (2010)Dragon Age: Origins (2009)Halo 3:ODST (2009)World of Warcraft: Wrath of the Lich King (2008)Crysis (2007)Halo 1-3 (2001–2007)Gears of War (2006)Rise of Nations: Rise of Legends (2006)Age of Empires III (2005)Gauntlet: Seven Sorrows (2005)Star Wars: Knights of the Old Republic II: The Sith Lords (2005)Mercenaries: Playground of Destruction (2004)Crimson Skies: High Road to Revenge (2003)The Hobbit (2003)Secret Weapons Over Normandy (2003)Medal of Honor: Frontline (2002)Age of Mythology (2002)Myst III: Exile (2001)Medal of Honor: Underground (2000)M |
https://en.wikipedia.org/wiki/Computer%20University%2C%20Mawlamyine | Computer University, Mawlamyine is a university located in Mawlamyine, Myanmar. It was opened as a Government Computer College in 2000 and designated as a university in 2001.
External links
Official site
Universities and colleges in Mon State |
https://en.wikipedia.org/wiki/University%20of%20Computer%20Studies%20%28Pakokku%29 | University of Computer Studies (Pakokku) (formerly Computer University (Pakokku), Government Computer College (Pakokku)) is a public undergraduate university located in Pakokku, Magway Region, Myanmar. Students study various computer disciplines, including hardware, networking, programming, imaging, and artificial intelligence. Its uniform is white for upper wear and light blue for longyi.
History
Government Computer College (Pakokku) was established on 21 January 2002. It became Computer University (Pakokku) on 20 January 2007 and was later renamed University of Computer Studies (Pakokku).
Degrees
The university offers five-year Bachelor of Computer Science (B.C.Sc) and Bachelor of Computer Technology (B.C.Tech) degree programs.
Departments
Academics are divided into the following departments:
Faculty of Computer Science
Faculty of Computer Systems and Technologies
Faculty of Information Science
Faculty of Computing
Department of Information Technology Supporting & Maintenance
Department of Natural Science
Department of Languages
Library
Practical rooms
The University has practical rooms for English language listening and for computer and physics practical works. It has a library with especially computer-related books and journals as well as more general subject matter.
References
External links
Universities and colleges in Magway Region |
https://en.wikipedia.org/wiki/Computer%20University%2C%20Meiktila | University Of Computer Studies, Meiktila, commonly known as UCSMTLA, has been producing the graduates in computer sciences and technology majors called CS and CT. UCSMTLA is located in Meiktila (sometimes called Meikhtila), Mandalay Division, Myanmar.
History
In October 2001, UCS-Mtla was established as government Computer College (GCC). In January 2007, it has been promoted from GCC to University of Computer Studies (Meiktila).
Rule
The students who gets over 400 marks (may be little different for each year) in total of matriculation exams are allowed to attend this university.
The students have to wear the uniform in the colour of white and greenish blue.
The students can take either computer science or technology majors depending on their preferences.
Only the students who have over 75% of total attendance of current academic year are allowed to take their corresponding exam.
Programs
Computer University, Meiktila offers five-year bachelor's degree programs in computer science and computer technology. The school's language of instruction is English.
http://www.ucsmtla.edu.mm
http://www.ucsmtla.edu.mm
Universities and colleges in Mandalay Region |
https://en.wikipedia.org/wiki/Locanto | locanto is a worldwide Locanto only network with areas dedicated to jobs, personals, for rent, for sale, services, community, real estate, vehicles, and pets.
Background
The Locanto Classifieds sites are operated by the German startup company Yalwa located in Wiesbaden, Germany. Locanto was launched in July 2006 with a local classifieds site for New York City. One month later, on August 21, 2006, the service was extended to the U.S. cities of Boston, Chicago, Los Angeles and San Francisco. As of 2007, every major U.S. city has its own accessible site for the Locanto classifieds service.
Locanto was created by the German start-up company, Yalwa. Klaus P. Gapp, CEO and founder of Yalwa, previously founded and operated OpusForum.org, a local classifieds site for the German speaking market. OpusForum.org was bought by eBay in 2005 and merged with its classifieds site Kijiji one year later.
Safety
In regards to internet safety, Locanto has established an independent blog on Safer Trading in which safety tips for online trading are shared with users.
Mobile and Apps
Since February 2010, the Locanto classifieds sites have also been available in mobile version for mobile web users. Browsing and searching classified ads as well as posting a free ad is enabled in the mobile version.
Adsdistrict.in mobile site has been blamed for copying Locanto mobile site.
In 2012, the Locanto iPhone App was launched and in 2014, the Locanto Android App was made available. In 2015, the Locanto Classifieds 2.0 iPhone app was released.
Criticism
In January 2010, several Indian media channels reported a story about Kannada actress Sanchita Padukone's pictures having been misused in a personals services ad on Locanto India, naming Locanto a "porn site".
While there is a dedicated version of this site for the Indian market over 60% of the traffic of the American version of the site comes from India.
In 2023 the Irish state broadcaster RTÉ investigated claims that accommodation was being sold in exchange for sex or sexual acts
References
Mashable: 100 Places to Find Jobs
eBay's Kijiji acquires German Classified website Opus Forum
Interview with CEO Klaus Gapp on Killerstartups
Locanto announces launch of weather pages
Locanto Safer Trading Blog
Locanto Mobile Beta
Property Portal Watch reports about expansion of Locanto
MSN India: "Crime: Kannada actress’ picture figures on porn site"
External links
Locanto homepage
Locanto Blog
Locanto on Killerstartups
Interview with founder Klaus P. Gapp (in German)
Online advertising services and affiliate networks
Companies based in Wiesbaden |
https://en.wikipedia.org/wiki/Micro%20Industries | Micro Industries Corporation was a privately held American computer hardware manufacturer and software developer from 1978 to 2015. Based in Ohio and founded by Michael A. Curran, the computer primarily provided engineering services and contract manufacturing services to original equipment manufacturers (OEMs) for most of its existence. In the early 2000s, the company expanded to providing embedded systems for retailers and the healthcare sector in the form of kiosks and other industrial quiet PCs. Curran shuttered the company in 2015, anticipating his retirement.
History
Michael A. Curran founded Micro Industries, a privately held company, in 1978, to provide engineering services to original equipment manufacturers (OEMs). Electronic contract manufacturing services soon followed. In 1982, Micro Industries entered the single-board computer market through a second-source agreement with Intel, followed by similar agreements with National Semiconductor, Motorola, Philips, and Siemens. The following year, the company began a comprehensive engineering and manufacturing automation program to accelerate product development and reduce overall product costs.
Micro Industries was one of the first complete turnkey surface mount technology assembly facilities in the U.S. and one of the founding members of the Surface Mount Technology Association. In 1984 and 1985, Micro was added to the Inc. 500 list.
In November 2015, Curran sought to retire and could not find a suitable replacement, so he closed the company.
Products
The Touch&Go and Touch&Care all-in-one quiet PC computer lines were deployed in 2002 for retail and healthcare markets. By 2004, Micro Industries invented first-of-their kind interactive client systems: a silent, shelf-mountable, 17-inch unit and a 30-inch, portrait-style unit. That same year, Micro Industries founded mCosm, a subsidiary service company. mCosm provided retailers with content development, network infrastructure, remote-system management, and hosted services. Micro Industries built the Center for Interactive Retailing, a unique demonstration environment, in 2004 at the corporate headquarters located in Westerville, Ohio. In 2008, Micro was awarded an Energy Star rating on its Paige17 computer. Micro Industries designed, engineered and manufactured its products in Ohio and partnered with content and software developers to provide premium interactive kiosk and digital signage systems to retailers. Micro Industries was also an affiliate member of the Intel Embedded & Communications Alliance.
Hardware
Broad level computers
PCs (Touch&Go Paige, Paigezilla and Messenger, Touch&Care)
Self-service hardware and kiosks
Custom single board computers
Customer computers
Software
Digital signage software
Kiosk management software
Services
Contract manufacturing services
Hardware design engineering services
Retail Solutions
Managed services
Digital signage solutions
Self-service kiosk solutions
Rapid application developme |
https://en.wikipedia.org/wiki/Plack%20%28software%29 | Plack is a Perl web application programming framework inspired by Rack for Ruby and WSGI for Python, and it is the project behind the PSGI specification used by other frameworks such as Catalyst and Dancer. Plack allows for testing of Perl web applications without a live web server.
Plackup is a command line utility to run PSGI applications from the command line.
PSGI
PSGI or Perl Web Server Gateway Interface is an interface between web servers and web applications and frameworks written in the Perl programming language that allows writing portable applications that can be run as standalone servers or using CGI, FastCGI, mod_perl, et al. It is inspired by the Web Server Gateway Interface for Python, Rack for Ruby and JSGI for JavaScript. A PSGI application is a Perl subroutine that accepts arguments as a single hash reference and returns a reference to an array of three elements: an HTTP status code, a reference to an array of HTTP headers and a reference to an array of HTTP body lines (usually a generated HTML document) or a filehandle-like object.
Supported backends
Plack supports the following server backends:
CGI
SCGI
FastCGI
mod_perl under Apache 1.3 and 2.0
Standalone HTTP server included in Plack
HTTP::Server::Simple
Corona
Starman
Twiggy
AnyEvent::HTTPD
AnyEvent::ReverseHTTP
Examples
Using the default standalone HTTP server:
$ plackup app.psgi
HTTP::Server::PSGI: Accepting connections at http://0:5000/
Running as a FastCGI daemon listening on a Unix socket, ready to be used by any Web server with FastCGI support:
$ plackup -s FCGI -listen /tmp/fcgi.sock app.psgi
FastCGI: manager (pid 3336): initialized
FastCGI: manager (pid 3336): server (pid 3337) started
FastCGI: server (pid 3337): initialized
A working Hello world application run as a one-liner:
$ plackup -e 'sub { [200, ["Content-Type" => "text/plain"], ["Hello, world!"]] }'
HTTP::Server::PSGI: Accepting connections at http://0:5000/
The command above starts an HTTP server listening on port 5000 of every local interface (IP address) and returns this 200 OK response to every HTTP request:
HTTP/1.0 200 OK
Date: Fri, 19 Mar 2010 23:34:10 GMT
Server: HTTP::Server::PSGI
Content-Type: text/plain
Content-Length: 13
Hello, world!
References
External links
PSGI and Plack website
Plack documentation
plackup manual
Perl software |
https://en.wikipedia.org/wiki/Cross-application%20scripting | Cross-application scripting (CAS) is a vulnerability affecting desktop applications that don't check input in an exhaustive way. CAS allows an attacker to insert data that modifies the behaviour of a particular desktop application. This makes it possible to extract data from inside of the users' systems. Attackers may gain the full privileges of the attacked application when exploiting CAS vulnerabilities; the attack is to some degree independent of the underlying operating system and hardware architecture.
Initially discovered by Emanuele Gentili and presented with two other researchers (Alessandro Scoscia and Emanuele Acri) that had participated in the study of the technique and its implications, it was presented for the first time during the Security Summit 2010 in Milan.
The format string attack is very similar in concept to this attack and CAS could be considered as a generalization of this attack method. Some aspects of this technique have been previously demonstrated in clickjacking techniques.
Concept
Like web interfaces, modern frameworks for the realization of graphical applications (in particular GTK+ and Qt) allow the use of tags inside their own widgets.
If an attacker gains the possibility to inject tags, he gains the ability to manipulate the appearance and behaviour of the application. Exactly the same phenomenon was seen with the use of cross-site scripting (XSS) in web pages, which is why this kind of behavior has been named cross-application scripting (CAS).
Typically desktop applications get a considerable amount of input and support a large number of features, certainly more than any web interface. This makes it harder for the developer to check whether all the input a program might get from untrusted sources is filtered correctly.
Cross-application request forgery
If cross-application scripting is the application equivalent for XSS in web applications, then cross-application request forgery (CARF) is the equivalent of cross-site request forgery (CSRF) in desktop applications.
In CARF the concept of “link” and “protocol” inherited from the web has been extended because it involves components of the graphical environment and, in some cases, of the operating system.
Exploiting vulnerabilities amenable to CSRF requires interaction from the user. This requirement isn't particularly limiting because the user can be easily led to execute certain actions if the graphical interface is altered the right way. Many misleading changes in the look of applications can be obtained with the use of CAS: a new kind of “phishing”, whose dangerousness is amplified by a lack of tools to detect this kind of attack outside of websites or emails.
In contrast to XSS techniques, that can manipulate and later execute commands in the users' browser, with CAS it is possible to talk directly to the operating system, and not just its graphical interface.
References
Computer security exploits |
https://en.wikipedia.org/wiki/Open%20Systems%20Accounting%20Software | Open Systems Accounting Software (OSAS) is a business accounting software package for small- to medium-sized businesses using the Microsoft Windows, Linux, and Mac OS X operating systems. It has been developed and sold since 1976 by Open Systems, Inc. of Shakopee, MN.
OSAS is currently programmed in the Java-based BBj language developed by BASIS International. The Java implementation allows installation of OSAS on a variety of platforms.
References
External links
Official website
Accounting software |
https://en.wikipedia.org/wiki/Gone%20Too%20Soon%20%28film%29 | Gone Too Soon is a documentary film about the final year of Michael Jackson's life and career. It first aired on the TV Guide Network on June 25, 2010, exactly one year after Jackson's death.
The documentary was produced and directed by author-filmmaker Ian Halperin, who wrote "Unmasked: The Final Years of Michael Jackson", which hit No. 1 the New York Times' bestsellers list in 2009, after he spent five years investigating Jackson.
In an interview with Halperin in March 2010, he revealed that the film is culled from 300 hours of footage shot inside the singer's camp and includes video and audio of Jackson shot before his death. It also includes interviews with Jackson's personal manager, trainer, and attorney.
According to the filmmakers, Jackson family members were not involved but are aware of the film. Former family attorney Brian Oxman is among the interviewees. The movie is claimed to depict the more scandalous aspects of Jackson's life.
References
External links
2010 films
American documentary films
2010 documentary films
Documentary films about Michael Jackson
2010s English-language films
2010s American films
English-language documentary films |
https://en.wikipedia.org/wiki/List%20of%20Future%20GPX%20Cyber%20Formula%20characters | The following is a list of characters from the anime series Future GPX Cyber Formula, including all the characters in the TV series, the OVAs, and the games.
Drivers
Team(s): Sugo Asurada (2015–2017) ⇒ Sugo Winners (2018–2019) ⇒ Sugo Grand Prix (2020–2021) ⇒ Sugo GIO Grand Prix (2022–)
The protagonist of the series. He is 152 cm tall in 2015 and grows up to 168 cm in 2022. His main nickname is "Ushiwakamaru," and he was born on March 28, 2001 with type A blood. His special skill is that he can make friends with anyone (according to him), and his hobby is riding motorcycles.
He was registered as an Asurada driver by accident due to an incident during transportation and entered the Grand Prix (TV series). He won the 5th round of the 10th World Championship in 2015, the British GP, and took his first win with a pole-to-win. In the following year, 2016 (11), he fell into a slump in the early stages due to the pressure of being the defending champion, and even after recovering from the slump, he was in a fierce battle with Schumacher from the middle of the season onward, but he won the overall championship and became the double-one champion. In the British GP (the beginning of ZERO), he stepped into the "Zero Zone" and crashed heavily with Randall, seriously injuring him, and temporarily retired, but returned the following year in the 5th round of the French GP, and overcame the Zero Zone through the fight with Kaga. In 2020 (SAGA), he overcame the Al-Zard incident and won the overall championship for the third time in four years. The following year, in 2021, he won again, showing his invincible strength, and was even called "the young emperor of the circuit." In 2022 (SIN), he fought a fierce one-on-one battle with Kaga, but narrowly lost.
From the TV series to 11, he is a bright and active boy, with his airheadedness being particularly prominent in the CD dramas, but after overcoming serious injuries in ZERO, he gradually developed a more relaxed personality. However, he is passionate about racing and hates to lose, and when his performance is poor, he is a bit selfish, lashing out at those around him. His drawback was that he was too conscious of his opponents, but by SIN, he has overcome this problem and matured both mentally and physically, becoming an absolute champion. In terms of romantic attraction, he is indifferent to everyone except Asuka, and he marries her at the end of SIN.
Team(s): Union Savior (2015) ⇒ Aoi ZIP Formula (2016) ⇒ Sugo Grand Prix (Manager) (2017–)
Nicknamed "Supersonic Knight," he was born on August 9, 1994, is 182 cm tall, and has a blood type of B. His special skill is giving domineering advice, and his hobby is disguising.
Formerly an F1 driver for Missing Link, he joined Cyber Formula to conceal his true identity. He won his debut race in the opening round in the U.S., and finished second in the following round in Peru, making him a contender for the championship, but he was injured between the third and fourth rou |
https://en.wikipedia.org/wiki/National%20Cycle%20Route%2044 | National Cycle Network Route 44, part of the National Cycle Network, connects Shrewsbury, Shropshire with Cinderford, Gloucestershire. The part of the route from Shrewsbury to Bromfield is signed - the remainder of the route is currently unsigned.
The section from Shrewsbury to Leominster is advertised as the Six Castles Cycleway. The six castles on or near the route are (in geographical order from north to south): Shrewsbury Castle, Bishop's Castle, Stokesay Castle, Ludlow Castle, Richard's Castle and Croft Castle.
Route
Shrewsbury-Bromfield
The route begins in Shrewsbury, one mile west of the town centre, where it links up with National Cycle Route 81. The formal start point of the route is on Shelton Road (the B4380), at the junction with Woodfield Avenue, where route 81 exists on its way between Shelton and the town centre. Route 44 heads southeast along the B4380 to Longden Road Roundabout, where it turns off onto Longden Road out of Shrewsbury, passing the Priory and Meole Brace secondary schools. The first village outside of Shrewsbury is Hook-a-Gate. After passing through Hook-a-Gate and the neighbouring hamlet of Annscroft, the route turns off along country lanes to Arscott and then Shorthill, where it meets the A488. The route crosses over the main road and along country lanes again to the large village of Pontesbury, where again it meets the A488.
After Pontesbury the route again follows country lanes and heads south to Habberley and then after this village, west to Minsterley, where the route again meets the A488. The route then heads along the B4499 to Priest Weston, on the Shropshire-Wales border, passing to the west of the Stiperstones hills. It briefly enters Powys, including the village of Churchstoke (or Church Stoke), where it meets the A489. After Church Stoke, the route is on country lanes again and heads roughly southeast to the small (English) town of Bishop's Castle.
After passing through Bishop's Castle and crossing the A488, the route then roughly runs southeast to Craven Arms, passing to the north of the village of Lydbury North and running through the hamlet of Round Oak. At Craven Arms the route crosses the Marches railway line and the busy A49 to the hamlet of Halford, after which it runs along the B4368 east-bound for a short distance, before heading south on a country lane to Onibury and after that village, southeast on another country lane, passing through Ludlow Racecourse and Golf Club, before reaching the village of Bromfield. At Bromfield is the Ludlow Food Centre and the route meets the A49 again.
Bromfield-Cinderford
After Bromfield it passes just to the west of the historic market town of Ludlow and then continues in a southerly direction into Herefordshire, first to Leominster (where the route goes through the town) and then to Hereford, where it joins up with National Cycle Route 46. After Hereford, route 44 heads in a roughly southeast direction to Cinderford, via Ross-on-Wye. At Cinderford it link |
https://en.wikipedia.org/wiki/National%20Collegiate%20Cyber%20Defense%20Competition | The National Collegiate Cyber Defense Competition (NCCDC) is the championship event for the Collegiate Cyber Defense Competition system – the largest college-level cyber defense competition in the USA. The event is held annually in the San Antonio area.
In an effort to help facilitate the development of a regular, national level cyber security exercise, the Center for Infrastructure Assurance and Security at the University of Texas at San Antonio (UTSA) hosted the first Collegiate Cyber Defense Competition for the Southwestern region in May 2005. On June 29, 2010, United States House legislature passed recognizing the National CCDC for promoting cyber security curriculum.
While similar to other cyber defense competitions in many aspects, the NCCDC, is unique in that it focuses on the operational aspect of managing and protecting an existing network infrastructure. While other exercises examine the abilities of a group of students to design, configure, and protect a network over the course of an entire semester, this competition is focused on the more operational task of assuming administrative and protective duties for an existing commercial network. Teams are assessed based on their ability to detect and respond to outside threats, maintain availability of existing services such as mail servers and web servers, respond to business requests such as the addition or removal of additional services, and balance security needs against business needs.
Rules
The NCCDC is operated under the rules as published by the Center for Infrastructure Assurance and Security at UTSA. The current rules can be found at Homepage.
Regional competitions
Several regional groups have formed to provide qualifying events for the NCCDC annual event. Some regions share and overlap various states. Every effort is made to make each regional event consistent with the NCCDC event.
Past competitions
See also
List of computer science awards
Notes
References
External links
http://seccdc.org
http://maccdc.org
Computer science competitions
Computer security |
https://en.wikipedia.org/wiki/HD-Rosetta | High-Density Rosetta (HD-Rosetta) is a permanent data storage device which contains engraved microscopic information on a small nickel plate. Up to 196,000 pages of information can be stored onto the plate using a focused ion beam. The image capacity for an HD-Rosetta disc can range from 10,000 to 100,000 images on a 4096 by 4096 pixel x vs. y plane. Similar to hieroglyphics and microfilm, HD-Rosetta is used for preserving information. Norsam Technologies has made HD-Rosetta extremely durable, compared to most archival data devices. It has an estimated longevity of 10,000 years, and it can withstand a minimum of 1000 years. HD-Rosetta has also been used for purposes other than archival. De Beers has currently used HD-Rosetta technology to provide clear marking on diamonds and other gemstones. HD-Rosetta does not require any specific software or operating systems to read the information: the information engraved onto the HD-Rosetta disc is easily accessed with a microscope.
Writing process
To record information on HD-Rosetta, special formatting and tools must be used during the writing process. First, information is converted to digital format, or Norsam Technologies receives information in digital format. Digital format is required so the information can be written in micrometers, pixel by pixel, by the focused ion beam. The focused ion beam forces gallium ions down the main chamber and onto the surface of contact. At the point of contact, atoms from the nickel surface of HD-Rosetta are knocked off the plate; essentially, an etch is made. After lightly milling or doping the surface, the mills are chemically treated. This speeds up the writing process by 100 times.
Reading process
While HD-Rosetta disc can be accessed with a microscope, depending on the size of the etchings, different types of microscopes may be needed. For more than 196,000 pages, a scanning electron microscope would be utilized. For between 5,000 and 180,000 pages, an optical microscope would be used. To locate information rapidly, Norsam Technologies has developed a special HD-Rosetta reader to locate x,y,z coordinates. By typing a page number, the HD-Rosetta reader can locate the appropriate information and display it on a screen.
History
HD-Rosetta was first developed in the Los Alamos National Laboratory. The purpose was to develop a permanent data storage disc that would withstand nuclear war. Primarily focusing on archiving information, HD-Rosetta is thought as a method for preserving history. In 1999, The New York Times used HD-Rosetta for their "Times Capsule". Their HD-Rosetta disk contains six New York Times Millennium issues. The disk, along with acid-free archival paper, was put in a container filled with argon gas. Hoping to increase longevity of the disk and capsule, the subcontainer was suspended in thermal-gel insulation. The Times Capsule, along with a HD-Rosetta disc, currently resides in the American Museum of Natural History.
In a direct analogy to i |
https://en.wikipedia.org/wiki/Discover%20Tasmania | Discover Tasmania is an Australian lifestyle television series that airs on the Seven Network.
Originally broadcast from October to December 2007 in Tasmania only, it won all but one of its timeslots, with each episode receiving around 75,000 Tasmanian viewers. After its success there, and a push from the Tasmanian government, the show has since been shown across mainland Australia. In NSW, season one episodes averaged 218,000 viewers.
The first season was hosted by 'Fast Ed' (Better Homes and Gardens) and Tim Campbell (Home and Away).
The program was renewed for a second season which began airing nationally on 20 March 2010 on Saturday afternoons. Fast Ed returned, joined by Jack Campbell (All Saints) as new co-host, following Tim's move to the Nine Network.
Past episodes are also shown on 7two and available to watch online from the official website.
References
External links
Official website
Seven Network original programming
2007 Australian television series debuts
2010s Australian television series
Australian non-fiction television series
Television shows set in Tasmania
Tourism in Tasmania |
https://en.wikipedia.org/wiki/1C%20Company | 1C Company (, ) is a Russian software developer, distributor and publisher based in Moscow. It develops, manufactures, licenses, supports and sells computer software, related services and video games.
In Russia, 1C is considered a leader in business software for its comprehensive business software suite 1C:Enterprise (Russian: 1С:Предприятие, 1C:Predpriyatie). 1C is known as a video game developer and publisher. Titles produced by the company include IL-2 Sturmovik, King's Bounty, Men of War and the Space Rangers series.
History
1C was founded in 1991 by Boris Nuraliev in Moscow, Russia. In 1992, the company published ''1C:Accounting'' (ru), a bookkeeping software. The simplicity, wealth of customization options and its reach through the wide network of dealers, who were entitled to 50% of the sales income, made it possible for the 1C:Accounting software to become the most widespread accounting program across Russia and former USSR states.
In 1999, the first game developed by 1C was published - Konung: Legends of the North. 1C also acquired company. In 2006, 1C announced that their trademark was considered "well-known" by Rospatent as an intellectual property status in Russia.
In 2008, 1C declared its plan of transforming into a large multisectoral holding company. Part of its growth strategy was establishing joint ventures with leading and promising enterprises within the IT industry.
In May 2005, 1C bought Cenega Publishing, a Prague-based publisher and distributor. This arm was rebranded 1C Publishing EU in May 2007. 1C Publishing EU uses the trade name 1C Entertainment since late 2018.
In 2008, 1C declared it would become a holding company, stating it would establish joint ventures with companies within the IT industry. In October 2011, Baring Vostok Capital Fund acquired a 9% stake of 1C.
In 2012, 1C partnered with 777 Studios to create 1C Game Studios.
By 2015, according to the founder and head of the company Boris Nuraliev, the number of subsidiaries and joint ventures of 1C is about 200 companies.
In April 2016, 1C bought out 27.06% in Megaplan and increased its stake in the company to 99%. In August of the same year, a controlling stake was acquired in the restaurant business automation service Quick Resto. In October, 1C announced the purchase of a controlling stake in the developer of the cloud-based CRM system amoCRM.
In September 2016, 1C together with ASCON, created the Renga Software company - the Russian developer of the Renga integrated BIM system.
In April 2022, 1C Poland was sanctioned by Poland as part of the sanctions against the 2022 Russian invasion of Ukraine
Products
List of business applications
• 1С:ERP 2
Information system for enterprise management.
• 1С:Corporate Performance Management
Planning, accounting, and performance monitoring for holdings and corporations.
• 1С:Document Management (ECM)
Automates document flow, both paper and electronic, for businesses and public institutions.
• 1C:Account |
https://en.wikipedia.org/wiki/Makoto%20Nagao | was a Japanese computer scientist. He contributed to various fields: machine translation, natural language processing, pattern recognition, image processing and library science. He was the 23rd president of Kyoto University (1997–2003) and the 14th director of National Diet Library in Japan (2007–2012).
Biography
Born in Mie Prefecture, Japan, Makoto Nagao graduated from Kyoto University in 1959, and received a master's degree in engineering in 1961 and a Ph.D. in engineering in 1966 from the university.
In Kyoto University, he became an assistant professor in 1967, an associate professor in 1968, and a professor in 1973. He served as the 23rd president of Kyoto University (1997–2003).
After retirement from the university, he was appointed to the director of National Diet Library in 2007 and held the position until 2012.
He was the 20th director of the Information Processing Society of Japan (IPSJ) (1999–2000). Each year since 2005, IPSJ Nagao Special Researcher Award has been awarded to young Japanese computer scientists who accomplished notable research.
He was the first president of the Asia-Pacific Association for Machine Translation (AAMT), and in each year from 2006, AAMT Nagao Award is awarded to individuals or groups who made contribution to machine translation.
Work
Nagao was one of the first scientists who developed practical machine translation (MT) systems. Between 1982 and 1986, he led the Mu project which aimed at translations for technical papers and became the first successful MT system between English and Japanese. In addition, example-based machine translation, an important approach for MT, is the method proposed by him in the early 1980s. In 1984 he introduced the analogy principle into the machine translation, which is adapted to the translation between two totally different languages, such as Japanese and English.
He was also a pioneer of natural language processing (NLP) for the Japanese language. In 1994, he created KNP, a dependency analyzer for Japanese, with Sadao Kurohashi.
In the 1990s, he directed a project to make a Japanese parsed corpus, which is now called Kyoto University Text Corpus.
Another NLP resource developed under his laboratory is Juman, a Japanese morphological parser and the first system which merged word segmentation and morphological analysis for languages which do not have explicit word boundaries (such as Japanese or Chinese).
In pattern recognition and image processing, he was the first engineer who applied feedback analysis mechanisms to facial recognition systems, and he introduced various artificial intelligence techniques into the image processing.
He supervised the Ariadne software system, a digital library system, which made an impact upon digital library research in Japan and over the world. While the National Diet Library of Japan holds a traditional slogan "Truth makes us free" (John 8:32), a new slogan "Through knowledge we prosper" was proposed by him as the director. He gave a k |
https://en.wikipedia.org/wiki/Syfy%20%28Latin%20American%20TV%20channel%29 | Syfy was a Latin American channel dedicated to science fiction and fantasy programming, owned by NBCUniversal International Networks, a division of NBCUniversal. The local version of the channel, available both in Spanish- and Portuguese-language feeds (for Spanish-speaking countries and for Brazil, respectively), was launched in 2007.
Until October 10, 2010, Syfy was known as Sci Fi.
The Brazilian feed of the channel, as well as its sister network, Studio Universal, is operated since mid-July 2012 by the joint venture between Universal Networks International and Grupo Globo-owned Canais Globo which already operated the Brazilian version of Universal TV.
The channel closed on October 1, 2023 and was replaced by USA Network after 19 years of absence in Latin America.
Programming
12 Monkeys
Caprica
Charmed
Destination Truth
Eureka
Face off
Fact or Faked: Paranormal Files
Ghost Hunters
Ghost Hunters International
Grimm
Haven
Heroes
Knight Rider
Lost
Sanctuary
Stargate SG-1
Stargate Universe
Star Trek: Deep Space Nine
Star Trek: The Next Generation
SurrealEstate
SyFy Games
Taken
The Invisible Man
The Magicians
The Outpost
Xena: Warrior Princess
References
External links
Syfy Latin America
Syfy Brazil
Syfy
Television channels and stations established in 2007
Television channels and stations disestablished in 2023
Science fiction television channels
Spanish-language television stations
Portuguese-language television stations in Brazil
Latin American cable television networks
Television networks in Brazil
Defunct television channels
pt:Syfy |
https://en.wikipedia.org/wiki/Intel%205%20Series | Intel 5 Series is a computing architecture introduced in 2008 that improves the efficiency and balances the use of communication channels in the motherboard. The architecture consists primarily of a central processing unit (CPU) (connected to the graphics card and memory) and a single chipset (connected to motherboard components). All motherboard communications and activities circle around these two devices.
The architecture is a product of adjustments made to the Intel 4 Series to deliver higher performance motherboards while maintaining efficiency and low power. The changes revolve around chipset and processor design, in conjunction with a rearrangement of functions and controllers. The result is the first major change in many years of computing.
Design concept
The concept of the architecture was to improve motherboard mechanics to keep pace with the CPU as it gained more speed and multiplied in number of cores. In the previous architecture, the CPU was communicating heavily with the motherboard's central component, the Northbridge chipset, as it was the intermediary between the CPU, memory, and, in most cases, graphics card. The CPU would communicate with the Northbridge chipset when it needed data from the memory or when it needed to output graphics to the display. This arrangement caused the communication channel known as the front-side bus (FSB) to be heavily used. It was not long till either the FSB would reach full capacity or operate inefficiently with more cores. With the memory controller and/or graphics core moved into the processor, the reliance of separate motherboard chipsets for these functions are reduced.
Ibex Peak
The Ibex Peak chipset includes only Platform Controller Hub (PCH) per model, which provides peripheral connections, and display controllers for CPU with integrated graphics via Flexible Display Interface (excluding P-models). Additionally, the PCH is connected to the CPU via Direct Media Interface (DMI).
Taking advantage of Intel Nehalem CPUs with integrated graphics and PCI Express ports, the Intel Management Engine (ME) and a display controller for integrated graphics, once housed in north bridge, are moved into the Platform Controller Hub (PCH). The I/O Controller Hub (ICH) function is integrated into the PCH, removing the need for separate north bridge and south bridge.
Tylersburg
The Tylersburg family of chipsets is for Socket LGA 1366 supporting CPUs with triple channel memory controllers. Unlike the Ibex Peak chipsets, The Tylersburg family of chipsets do not include the PCH, and the I/O Hub mainly provides extra PCI Express 2.0 ports. Peripheral connections are provided by I/O Controller Hub (ICH) connected to the DMI interface. Intel 5 series IOH support ICH10, while Intel 5500 Series IOH support ICH9 or ICH10.
Single socket Nehalem-based chipset
1 Nehalem moves the memory controller into the processor, thereby obsoleting the north bridge. Despite that, LGA 1366 still features a north and a south b |
https://en.wikipedia.org/wiki/List%20of%20Rock%20Band%20Network%201.0%20songs | The Rock Band Network in the music video games Rock Band 2 and Rock Band 3 supports downloadable songs for the Xbox 360, PlayStation 3, and Wii versions through the consoles' respective online services. The Rock Band Network Store became publicly available on March 4, 2010, for all Xbox 360 players in selected countries (US, Canada, UK, France, Italy, Germany, Spain, Sweden, and Singapore). Rock Band Network songs became available on the PlayStation 3 in five song intervals through their own Rock Band Network Store on April 22, 2010. Starting on April 12, 2011, up to 10 songs were added weekly to the PlayStation 3 platform until June 14, 2011, when it reverted to five song intervals. Also, starting on June 14, 2011, PlayStation 3 Rock Band Network songs will only be compatible with Rock Band 3. Rock Band Network became available on the Wii in six to 10 song intervals from September 7, 2010 to January 18, 2011. Rock Band Network songs will be exclusive to the Xbox 360 for 30 days, after which a selection of songs will be made available on the PlayStation 3 and Wii. As of January 18, 2011, no further Rock Band Network songs will be released on the Wii platform due to Nintendo's small online install base, limited demand for the songs and the significant amount of work each song needs to convert to the Wii.
Players can download songs (and free demos of the songs if being used on the Xbox 360) on a track-by-track basis. Unlike a song released through the regular music store, there are limitations to where the song can be used. Network songs will not appear as a song within the various "Mystery Setlist" challenges within Tour mode (except on Wii, where they are treated as regular DLC), though users can add Network songs to "Make a Setlist". Users can also use Network songs in Quickplay modes. Network songs cannot be played in the head-to-head modes, as this would require Network authors to also balance note tracks for these game modes. Songs can be practiced through Practice Mode, but unlike Harmonix-authored songs, which include hooks to allow the user to practice specific sections of a song, Network songs are not authored with these phrase hooks and can only be practiced in percentage based segments (i.e. short songs would get 10% increments, longer would get 5%, etc.).
With the release of Rock Band Network 2.0, creators can now add songs with harmony vocals, standard and pro mode keyboard tracks, and pro drum tracks, as well as mark specific sections for practicing and the end-of-song breakdown. Support for pro guitar and bass is not included in RBN 2.0 due to the complexity of authoring such tracks and the small base of pro guitar users/testers early on. With the formal launch of RBN 2.0 on February 15, 2011, the previous version of the network was shut down, ending RBN support for Rock Band 2.
Pricing
Prices for Rock Band Network songs are set by the parties involved with authoring and submitting the song, and can be set at either US$1.00, $ |
https://en.wikipedia.org/wiki/Steven%20DeRose | Steven J DeRose (born 1960) is a computer scientist noted for his contributions to Computational Linguistics and to key standards related to document processing, mostly around ISO's Standard Generalized Markup Language (SGML) and W3C's Extensible Markup Language (XML).
His contributions include the following:
HyTime
Text Encoding Initiative
XPath –- editor
XPointer –- editor
XLink –- editor
OSIS—chairman
XML
He served as Chief Scientist of the Scholarly Technology Group, and Adjunct Associate Professor of Computer Science, at Brown University. While there he received NSF and NEH grants and contributed heavily to the Open eBook and Encoded Archival Description standards. Previously, he was co-founder and Chief Scientist at Electronic Book Technologies, Inc., where he designed the first SGML browser (Dynatext), which earned 11 US Patents and won Seybold and other awards.
His 1987 article with James Coombs and Allen Renear, "Markup Systems and the Future of Scholarly Text Processing", is a seminal source for the theory of markup systems, and has been widely cited and reprinted.
The article "What is Text, Really?" has also been widely cited and reprinted, and led to several follow-on articles In addition, he has published 2 books (Making Hypermedia Work: A User's Guide to HyTime and The SGML FAQ Book); as well as articles in a variety of journals, magazines, and proceedings.
He has given papers and tutorials at the ACM Hypertext Conference and various SGML and XML conferences, a keynote address at the ACM Conference on Very Large DataBases (VLDB), and a plenary talk at the Text Encoding Initiative 10 Conference.
In Computational Linguistics, he is known for pioneering the use of dynamic programming methods for part-of-speech tagging (DeRose 1988, 1990).
Selected publications
References
External links
Living people
American computer scientists
Brown University faculty
1960 births |
https://en.wikipedia.org/wiki/Open%20Data%20Protocol | In computing, Open Data Protocol (OData) is an open protocol that allows the creation and consumption of queryable and interoperable REST APIs in a standard way. Microsoft initiated OData in 2007. Versions 1.0, 2.0, and 3.0 are released under the Microsoft Open Specification Promise. Version 4.0 was standardized at OASIS, with a release in March 2014. In April 2015 OASIS submitted OData v4 and OData JSON Format v4 to ISO/IEC JTC 1 for approval as an international standard. In December 2016, ISO/IEC published OData 4.0 Core as ISO/IEC 20802-1:2016 and the OData JSON Format as ISO/IEC 20802-2:2016.
The protocol enables the creation and consumption of REST APIs, which allow Web clients to publish and edit resources, identified using URLs and defined in a data model, using simple HTTP messages. OData shares some similarities with JDBC and with ODBC; like ODBC, OData is not limited to relational databases.
Standardization
After initial development by Microsoft, OData became a standardized protocol of the OASIS OData Technical Committee (TC).
OASIS OData Technical Committee
"The OASIS OData TC works to simplify the querying and sharing of data across disparate applications and multiple stakeholders for re-use in the enterprise, Cloud, and mobile devices. A REST-based protocol, OData builds on HTTP, AtomPub, and JSON using URIs to address and access data feed resources. It enables information to be accessed from a variety of sources including (but not limited to) relational databases, file systems, content management systems, and traditional Web sites. OData provides a way to break down data silos and increase the shared value of data by creating an ecosystem in which data consumers can interoperate with data producers in a way that is far more powerful than currently possible, enabling more applications to make sense of a broader set of data. Every producer and consumer of data that participates in this ecosystem increases its overall value."
TC participants include CA Technologies, Citrix Systems, IBM, Microsoft, Progress Software, Red Hat, SAP SE and SDL.
Architecture
OData is a protocol for the creation and consumption of RESTful APIs. Thus, as common practices of REST, OData builds on HTTP, AtomPub, and JSON using URIs to address and access data feed resources.
Resource identification
OData uses URIs to identify resources. For every OData service whose service root is abbreviated as http://host/service/, the following fixed resources can be found:
The service document
The service document lists entity sets, functions, and singletons that can be retrieved. Clients can use the service document to navigate the model in a hypermedia-driven fashion.
The service document is available at http://host/service/
The metadata document
The metadata document describes the types, sets, functions and actions understood by the OData service. Clients can use the metadata document to understand how to query and interact with entities in the service.
T |
https://en.wikipedia.org/wiki/ELAC | ELAC can refer to:
eLAC Action Plans
East Los Angeles College
Elac, a German loudspeaker manufacturer
Elevator and Aileron Computer of the A320 |
https://en.wikipedia.org/wiki/Gy%C3%B6rgy%20Elekes | György Elekes (19 May 1949 – 29 September 2008) was a Hungarian mathematician and computer scientist who specialized in Combinatorial geometry and Combinatorial set theory. He may be best known for his work in the field that would eventually be called Additive Combinatorics. Particularly notable was his "ingenious" application of the Szemerédi–Trotter theorem to improve the best known lower bound for the sum-product problem. He also proved that any polynomial-time algorithm approximating the volume of convex bodies must have a multiplicative error, and the error grows exponentially on the dimension. With Micha Sharir he set up a framework which eventually led Guth and Katz to the solution of the Erdős distinct distances problem. (See below.)
Life
After graduating from the mathematics program at Fazekas Mihály Gimnázium (i.e., "Fazekas Mihály high school" in Budapest, which is known for its excellence, especially in mathematics), Elekes studied mathematics at the Eötvös Loránd University. Upon completing his degree, he joined the faculty in the Department of Analysis at the university. In 1984, he joined the newly forming Department of Computer Science, which was being headed by László Lovász. Elekes was promoted to full professor in 2005. He received the Doctor of Mathematical Sciences title from the Hungarian Academy of Sciences in 2001.
Work
Elekes started his mathematical work in combinatorial set theory, answering some questions posed by Erdős and Hajnal. One of his results states that if the set of infinite subsets of the set of natural numbers is split into countably many parts, then in one of them, there is a solution of the equation A∪B=C. His interest later switched to another favorite topic of Erdős, discrete geometry and geometric algorithm theory. In 1986 he proved that if a deterministic polynomial algorithm computes a number V(K) for every convex body K in any Euclidean space given by a separation oracle such that V(K) always at least vol(K), the volume of K, then for every large enough dimension n, there is a convex body in the n-dimensional Euclidean space such that V(K)>20.99nvol(K). That is, any polynomial-time estimator of volume over K must be inaccurate by at least an exponential factor.
Not long before his death he developed new tools in Algebraic geometry and used them to obtain results in Discrete geometry, proving Purdy's Conjecture. Micha Sharir organized, extended and published Elekes's posthumous notes on these methods. Then Nets Katz and Larry Guth used them to solve (apart from a factor of (log n) 1/2 ) the Erdős distinct distances problem, posed in 1946.
References
External links
Elekes' home page
Number theorists
Combinatorialists
Researchers in geometric algorithms
20th-century Hungarian mathematicians
21st-century Hungarian mathematicians
Hungarian computer scientists
1949 births
2008 deaths |
https://en.wikipedia.org/wiki/KSVT-LD | KSVT-LD (channel 14) is a low-power television station in Twin Falls, Idaho, United States, affiliated with Fox and MyNetworkTV. It is owned by Gray Television alongside dual CBS/CW+ affiliate KMVT (channel 11). The two stations share studios on Blue Lakes Boulevard North/US 93 in Twin Falls; KSVT-LD's transmitter is located on Flat Top Butte in unincorporated Jerome County east of Jerome and US 93.
In addition to its own digital signal, KSVT-LD is simulcast in standard definition on KMVT's third digital subchannel (11.3) from the same transmitter site.
History
KSVT signed-on for the first time on October 8, 1999 as independent station K43FK. It became KTWT-LP in 2000. The station was a UPN affiliate from late 2004 (picking up the UPN affiliation from KIDA, channel 5) until September 2006 when UPN merged with The WB (which was seen on KWTE, via The WB 100+) to form The CW; that network was seen on KTWT (via The CW Plus) until March 2012, when it switched to MyNetworkTV following the closure of sister station KTID-LP. CW programming remains available through the second digital subchannel of KMVT, which previously simulcast with KTWT. It had a construction permit for a low-power digital station on Channel 14 although LPTV stations are not required to broadcast digital signals.
KTWT joined Fox on July 1 of the same year, replacing KXTF (channel 35); the station began broadcasting its digital signal at that time and branded as "Fox 14" (making it one of a handful of digital stations to brand using its physical channel as opposed to its former analog channel); MyNetworkTV programming is shown out-of-pattern weeknights at 10 p.m. KTWT was also added to a new third digital subchannel of KMVT. On February 27, 2014, the station changed its call letters to KSVT-LD to reflect an increased emphasis on Blaine County and the Wood River Valley, including Sun Valley (from which the call letters are derived). (A previous and unrelated low-power TV station in Ketchum had also operated as KSVT-LD, simulcasting with KSVX-CD in Hailey.)
On March 12, 2015, Gray Television announced that it would purchase KSVT-LD and KMVT from Neuhoff Communications for $17.5 million. The sale was completed on July 1.
Newscasts
With KTWT's transition to Fox affiliation, there was a significant expansion of the news operation of sister station KMVT. More specifically, the CBS affiliate began producing a half-hour extension of its morning newscast Rise and Shine that is seen weekdays at 7 a.m. on KSVT. In addition, this station added half-hour newscasts at 5 p.m. on weeknights only and every night at 9 p.m. The news broadcasts on KSVT utilize a separate news anchor on weeknights and feature more regional, national and international news of the day compared to the newscasts seen on KMVT. As with local newscasts on KMVT, daily newscasts seen on KSVT-LD are broadcast in high definition. Concurrent with the relaunch as KSVT, Neuhoff Communications announced that the station will open a |
https://en.wikipedia.org/wiki/Hamner%20House%20%28Schuyler%2C%20Virginia%29 | The Hamner House in Schuyler, Virginia was nominated for listing on the National Register of Historic Places in 2004. Its listing status in the National Register's database is "DR" so it is not clear whether it was listed or not. The house is also known as Jay Hamner House and as Copps House. It has Virginia State DHR# 062–0282.
References
Houses completed in 1915
Houses in Nelson County, Virginia |
https://en.wikipedia.org/wiki/Azerbaijan%20Railways | Azerbaijan Railways () is the national state-owned rail transport operator in the Republic of Azerbaijan. The , gauge network is electrified at 3 kV (3,000 V) DC. The headquarters of the Azerbaijan Railways is in the capital Baku.
Following the collapse of the Soviet Union in 1991 its railway system broke up into national railway systems of various former Soviet republics from which the independent Republic of Azerbaijan and the Azerbaijan Railways both emerged in that year.
The first railway line in Azerbaijan was laid in 1878 and was opened in 1880 in the suburbs outside Baku.
The railway has 176 stations, 2 of which Biləcəri (in Baku) and Şirvan are completely automated, 12 stations have container courts with adapted mechanisms and machines, 3 stations – Keşlə (in Baku), Gəncə and Xırdalan are able to supply high cargo containers.
Along with the Kars–Tbilisi–Baku railway, a regional rail link project that directly connects Turkey, Georgia and Azerbaijan since 2017, the railway lines are being modernised in Azerbaijan with new fast rail stock to replace the old rail stock.
History
1878-1917
The first railway line in Azerbaijan then belonging to the Russian Empire was laid in 1878 and was opened in 1880 within the suburban range of Baku, which led from Sabunçu to Suraxanı, today situated within the city of Baku. The track width corresponded to the Russian gauge.
The first long-distance railway line was opened in 1883, which led from Baku to Tbilisi in Georgia.
In 1900 railway lines were opened which connected Baku via Biləcəri with Derbent and Petrovsk (Makhachkala) in Dagestan and thus connected Azerbaijan with the rest of the Russian Empire (and later the Soviet Union).
In 1908 with extension of the railway line from Ararat in Armenia to Şərur and Julfa in the Nakhchivan exclave of Azerbaijan, this part of Azerbaijan was connected with Armenia.
Thus the development of the Azerbaijani Railway was for the time being considered final.
1917-1991
After the collapse of the Russian Empire and the Russian Revolution the country was transformed into the Soviet Union and the Russian Imperial Railways into the Soviet Railways.
Due to the availability of electricity from the vast water power sources of Azerbaijan, the very early electrification of the railway lines of Azerbaijan began.
In 1926 with the electrification with 1,2 kV (1,200 V) direct current of the railway line between Baku and Sabunçu, it became the first electrically operated railway line of the Soviet Union. Later electrifications took place with 3 kV (3,000 V) direct current.
In 1924 the railway line was extended southwards to Ələt and Neftçala.
In 1941 the railway line was extended from Horadiz and Mincivan through Armenia including a railway line extension to Kapan, to Julfa in the Nakhchivan exclave of Azerbaijan. Thus the Nakhchivan exclave of Azerbaijan was finally connected with Azerbaijan proper.
In 1941 the railway line was also extended southwards to Astara |
https://en.wikipedia.org/wiki/Gradient%20boosting | Gradient boosting is a machine learning technique used in regression and classification tasks, among others. It gives a prediction model in the form of an ensemble of weak prediction models, i.e., models that make very few assumptions about the data, which are typically simple decision trees. When a decision tree is the weak learner, the resulting algorithm is called gradient-boosted trees; it usually outperforms random forest. A gradient-boosted trees model is built in a stage-wise fashion as in other boosting methods, but it generalizes the other methods by allowing optimization of an arbitrary differentiable loss function.
History
The idea of gradient boosting originated in the observation by Leo Breiman that boosting can be interpreted as an optimization algorithm on a suitable cost function. Explicit regression gradient boosting algorithms were subsequently developed, by Jerome H. Friedman, simultaneously with the more general functional gradient boosting perspective of Llew Mason, Jonathan Baxter, Peter Bartlett and Marcus Frean.
The latter two papers introduced the view of boosting algorithms as iterative functional gradient descent algorithms. That is, algorithms that optimize a cost function over function space by iteratively choosing a function (weak hypothesis) that points in the negative gradient direction. This functional gradient view of boosting has led to the development of boosting algorithms in many areas of machine learning and statistics beyond regression and classification.
Informal introduction
(This section follows the exposition of gradient boosting by Cheng Li.)
Like other boosting methods, gradient boosting combines weak "learners" into a single strong learner in an iterative fashion. It is easiest to explain in the least-squares regression setting, where the goal is to "teach" a model to predict values of the form by minimizing the mean squared error , where indexes over some training set of size of actual values of the output variable :
the predicted value
the observed value
the number of samples in
Now, let us consider a gradient boosting algorithm with stages. At each stage () of gradient boosting, suppose some imperfect model (for low , this model may simply return , where the RHS is the mean of ). In order to improve , our algorithm should add some new estimator, . Thus,
or, equivalently,
.
Therefore, gradient boosting will fit to the residual . As in other boosting variants, each attempts to correct the errors of its predecessor . A generalization of this idea to loss functions other than squared error, and to classification and ranking problems, follows from the observation that residuals for a given model are proportional to the negative gradients of the mean squared error (MSE) loss function (with respect to ):
.
So, gradient boosting could be specialized to a gradient descent algorithm, and generalizing it entails "plugging in" a different loss and its gradient.
Algorithm
In ma |
https://en.wikipedia.org/wiki/DZVR | DZVR (711 AM) Bombo Radyo is a radio station owned and operated by Bombo Radyo Philippines through its licensee Newsounds Broadcasting Network. Its studio, offices and transmitter are located at Bombo Radyo Broadcast Center, Brgy. Cabungaan North, Laoag. It airs daily from 4:00 AM to 9:30 PM.
DZVR was formerly owned by Northern Broadcasting Company from its inception in 1967 until 1989, when it was acquired by Bombo Radyo.
References
Radio stations established in 1967
News and talk radio stations in the Philippines
Radio stations in Ilocos Norte |
https://en.wikipedia.org/wiki/Legislative%20Television | Legislative Television (officially The Legislative Television Broadcast and Recording Services) is a cable television network exclusively in the Canadian province of Nova Scotia. Legislative Television was established in 1991 to broadcast the parliamentary proceedings of the Legislative Assembly of Nova Scotia. It is available on EastLink TV digital cable channel 95, as well as on analog cable 10 (or 5 in the Annapolis Valley) during portions of the day from Tuesday to Thursday. The channel is also available on Bell Aliant TV channel 230. The channel does not carry advertising during programming.
Legislative Television also offers audio transcripts of the sessions of government, and broadcasts a live television feed on its website.
External links
Legislative Television
Television channels and stations established in 1991
Commercial-free television networks
Legislature broadcasters in Canada
Politics of Nova Scotia
Television stations in Nova Scotia
General Assembly of Nova Scotia
1991 establishments in Nova Scotia |
https://en.wikipedia.org/wiki/Knowledge%20commons | The term "knowledge commons" refers to information, data, and content that is collectively owned and managed by a community of users, particularly over the Internet. What distinguishes a knowledge commons from a commons of shared physical resources is that digital resources are non-subtractible; that is, multiple users can access the same digital resources with no effect on their quantity or quality.
Conceptual background
The term 'commons' is derived from the medieval economic system the commons. The knowledge commons is a model for a number of domains, including Open Educational Resources such as the MIT OpenCourseWare, free digital media such as Wikipedia, Creative Commons–licensed art, open-source research, and open scientific collections such as the Public Library of Science or the Science Commons, free software and Open Design. According to research by Charlotte Hess and Elinor Ostrom, the conceptual background of the knowledge commons encompasses two intellectual histories: first, a European tradition of battling the enclosure of the "intangible commons of the mind", threatened by expanding intellectual property rights and privatization of knowledge. Second, a tradition rooted in the United States, which sees the knowledge commons as a shared space allowing for free speech and democratic practices, and which is in the tradition of the town commons movement and commons-based production of scholarly work, open science, open libraries, and collective action.
The production of works in the knowledge commons is often driven by collective intelligence respectively the wisdom of crowds and is related to knowledge communism as it was defined by Robert K. Merton, according to whom scientists give up intellectual property rights in exchange for recognition and esteem.
Ferenc Gyuris argues, that it is important to distinguish "information" from "knowledge" in defining the term "knowledge commons". He argues that "knowledge as a shared resource" requires that both information must become accessible and potential recipients must become able and willing to internalize it as 'knowledge'. "Therefore, knowledge cannot become a shared resource without a complex set of institutions and practices that give the opportunity to potential recipients to gain the necessary abilities and willingness".
Copyleft
Copyleft licenses are institutions which support a knowledge commons of executable software. Copyleft licenses grant licensees all necessary rights such as right to study, use, change and redistribute—under the condition that all future works building on the license are again kept in the commons. Popular applications of the 'copyleft' principle are the GNU Software Licenses (GPL, LGPL and GFDL by Free Software Foundation) and the share-alike licenses under creative commons.
See also
Commons
Commons-based peer production
Digital commons (economics)
Information commons
Noogenesis
Open content
Open Knowledge Foundation
Open source
Open source a |
https://en.wikipedia.org/wiki/GUIDO%20music%20notation | GUIDO Music Notation is a computer music notation format designed to logically represent all aspects of music in a manner that is both computer-readable and easily readable by human beings. It was named after Guido of Arezzo, who pioneered today's conventional musical notation 1,000 years ago.
GUIDO was first designed by Holger H. Hoos (then at Technische Universität Darmstadt, Germany, now at University of British Columbia, Canada) and Keith Hamel (University of British Columbia, Canada).
Later developments have been done by the SALIERI Project by Holger H. Hoos, Kai Renz and Jürgen F. Kilian.
GUIDO Music Notation has been designed to represent music in a logical format (with the ability to render to sheet music), whereas LilyPond is more narrowly focused on typesetting sheet music.
The basic idea behind the GUIDO design is representational adequacy which means that simple musical concepts are represented in a simple way and only complex notions require more complex representations.
GUIDO is not primarily focused on conventional music notation, but has been invented as an open format, capable of storing musical, structural, and notational information.
GUIDO Music Notation is designed as a flexible and easily extensible open standard. In particular, its syntax does not restrict the features it can represent. Thus, GUIDO can be easily adapted and customized to cover specialized musical concepts as might be required in the context of research projects in computational musicology. More importantly, GUIDO is designed in a way that when using such custom extensions, the resulting GUIDO data can still be processed by other applications that support GUIDO but are not aware of the custom extensions, which are gracefully ignored. This design also greatly facilitates the incremental implementation of GUIDO support in music software, which can speed up the software development process significantly, especially for research software and prototypes.
GUIDO has been split into three consecutive layers: Basic
GUIDO introduces the main concepts of the GUIDO design and allows to represent much of the conventional music of today. Advanced GUIDO extends Basic GUIDO by adding exact score-formatting and some more advanced musical concepts. Finally, Extended GUIDO can represent user-defined extensions, like microtonal information or user defined pitch classes.
Example of a GUIDO input file
Basic GUIDO notation is similar to that of the LilyPond input format. Two obvious differences are the specification of octaves
and durations, as shown in the example below. Both formats are to some extent inspired by the LaTeX format for typesetting text.
Sources
Holger H. Hoos, Keith A. Hamel, Kai Renz, and Jürgen Kilian: Representing Score-Level Music Using the GUIDO Music-Notation Format. Computing in Musicology, Vol 12, MIT Press, 2001.
Holger H. Hoos, Keith A. Hamel, Kai Renz, Jürgen Kilian: The GUIDO Music Notation Format - A Novel Approach for Adequately Repres |
https://en.wikipedia.org/wiki/Master%20Tracks%20Pro | Master Tracks Pro (MTP) is music-sequencer software for Windows, to author and/or edit MIDI data. David Kusek and Don Williams et al. at Passport Designs originally created it, continuation of marketing and development by GVOX, and, as of Aug. 8, 2013, by Passport Music Software, LLC.
History
MTP originated in the middle ’80s for the Commodore and Apple II machines, and when the Atari ST implemented its MIDI support. It has continued to be one of the more popular proprietary sequencers, but hasn't seen any major updates since 2003 (after having been acquired by GVOX) other than 6.8.4 for Windows, which is reputed to have compatibility issues of its own. However, MTP's user-friendly interface and ease of use long made it one of the better packages for managing MIDI. See the Passport Designs Wiki for more details. GVOX sold the Passport software to Passport Music Software, LLC, in the second half of 2013.
Future
Passport Music Software, LLC, had announced plans to show MasterTracks Pro 7 at the 2015 NAMM show, but as of January 2019, the latest version offered on its website was Version 6.8.4 for Windows.
Capabilities
MTP's default data rate is 240 ppqn (time base, pulses per quarter note), or can use 480|960, for higher resolution.
A child window is not limited within a parent, but can be placed anywhere on the screen. The user can save this layout by invoking Setup | Save preferences, which creates a new PREFER683.MTP with this information.
MTP's Anastasia font is used for rendering the Notation window's two-stave piano score, and also provides symbols for guitar-tablature display of chording.
Its fixed-size Conductor window at bottom center left in the screen shot allows flexing of tempo, offsetting in real time, by dragging the slider thumb.
The also fixed-size Transport strip-window to its right provides controls analogous to those of a tape deck, to start-stop, index, etc.; displays measure | beat | clock information for the sequence currently being played; and shows the file name on its title bar.
MTP's windows can display continuous data either as a linear curve or filled below, and one can thin MIDI data according to need. It can handle as many as 16 MIDI interfaces, and supports the MCI on Windows, has remote capabilities, a “big counter” mode for visibility at a distance during performance or recording, and also punch-in and -out capabilities.
MTP can insert and manage markers, information about which can be imported into its Notepad along with track information, as well as handle quite complex meter layouts, as long as beats per measure is less than 17.
Appearance and functionality
A GUI application, it uses a hierarchy of windows as listed here:
A master, non-closeable, but resizable/positionable stripe-window at the top in the screen shot at right, which supervises the application's overall user interface via a standard menu with drop-down functions:
File, for standard handling functions, which include saving to its ow |
https://en.wikipedia.org/wiki/PSTN%20network%20topology | PSTN network topology is the switching network topology of a telephone network connected to the public switched telephone network (PSTN).
In the United States and Canada, the Bell System network topology was the switching system hierarchy implemented and operated from c. 1930 to the 1980s for the purpose of integrating the diverse array of local telephone companies and telephone numbering plans to achieve nationwide Direct Distance Dialing (DDD) by telephone subscribers. It was the precursor of the world-wide interconnected public switched telephone network (PSTN) and originated in the efforts of the General Toll Switching Plan that by 1929 formulated the technical infrastructure and the operating principles for connecting long-distance telephone calls in North America.
The ideas were first developed in the Bell System in the United States, but were soon adopted by other countries where telephone companies were facing similar issues, even when servicing smaller geographic areas. The system in the United Kingdom implemented by the General Post Office resulted in fewer switching levels than in the Bell System.
Bell System
In the late 1940s the Bell System devised plans to consolidate the various incompatible local telephone numbering plans of affiliated and independent service provides in North America into a unified numbering and routing system, that later became known as the North American Numbering Plan (NANP). Initially designed for use in Operator Toll Dialing, the reorganization was also a prerequisite for Direct Distance Dialing (DDD) by customers, first implemented in Englewood, New Jersey in 1951. In addition to devising a unified numbering plan, the American Telephone and Telegraph Company (AT&T) reorganized the switching and routing plan under management by AT&T Long Lines into a hierarchical network with five levels, termed "classes of switching systems.
The newly devised hierarchy was maintained into the early 1980s, when technological advances and business models rendered it increasingly obsolete, but the hierarchical features live on in terms, such as Class 4 and Class 5 telephone switch, referring to tandem and end-office switches, respectively. The PSTN in the United States was essentially restructured with the 1984 divestiture of AT&T. The old Long Lines network remained with AT&T, but its internal routing became non-hierarchical with the introduction of advanced computer-controlled switching. Each major long-distance carrier can have its own internal routing policies, though they generally start with the same principles and even components.
With Bell System divestiture, the network in the US was divided into local access and transport areas (LATAs). Calls within LATAs were carried by Local Exchange Carriers (LECs), while calls between them were carried by interexchange carriers (IXCs). LATAs generally have one or more tandem switches which interconnect end office switches.
While the following discussion refers to AT&T an |
https://en.wikipedia.org/wiki/WNAH | WNAH (1360 AM, "Power Gospel") is a radio station broadcasting an urban gospel radio format, with some Christian talk and teaching programming. Licensed to Nashville, Tennessee, United States, the station is currently owned by Hoyt M. Carter, Jr.
By day, WNAH is powered at 1,000 watts as a class D station. To protect other stations on 1360 AM from interference at night, it reduces power to 27 watts. The station's transmitter is on Richardson Avenue in Nashville.Radio-Locator.com/WNAH
History
The station (originally a daytimer station required to sign-off at night) started by Van T. Irwin, Jr. a veteran from WWII, signed on the air on December 24, 1949.
References
External links
FCC History Cards for WNAH
NAH
NAH
1949 establishments in Tennessee
Radio stations established in 1949 |
https://en.wikipedia.org/wiki/Health%20Communication%20Network | Health Communication Network (HCN), trading as MedicalDirector, is a company headquartered in Sydney, with offices located in Bundaberg and Melbourne.
Private equity firm Affinity Equity Partners acquired the company for AU$155 million on 30 March 2016 from HCN's then owner Primary Health Care Limited.
MedicalDirector is a provider of electronic health records, patient management, billing, scheduling, care coordination, medicines information, clinical content, and population health management services for general practitioners, and specialists in the health care industry. MedicalDirector employs about 230 people.
MedicalDirector's annual turnover is approximately AU$65 million.
References
External links
Official site
Electronic health record software companies
Software companies of Australia
Health communication |
https://en.wikipedia.org/wiki/Stropping | Stropping may refer to:
Stropping (blade), a finishing step in sharpening a blade
Stropping (syntax), a way of marking words as special in a programming language |
https://en.wikipedia.org/wiki/Telephone%20exchange | A telephone exchange, telephone switch, or central office is a telecommunications system used in the public switched telephone network (PSTN) or in large enterprises. It interconnects telephone subscriber lines or virtual circuits of digital systems to establish telephone calls between subscribers.
In historical perspective, telecommunication terms have been used with different semantics over time. The term telephone exchange is often used synonymously with central office, a Bell System term. Often, a central office is defined as a building used to house the inside plant equipment of potentially several telephone exchanges, each serving a certain geographical area. Such an area has also been referred to as the exchange or exchange area. In North America, a central office location may also be identified as a wire center, designating a facility to which a telephone is connected and obtains dial tone. For business and billing purposes, telecommunication carriers define rate centers, which in larger cities may be clusters of central offices, to define specified geographical locations for determining distance measurements.
In the United States and Canada, the Bell System established in the 1940s a uniform nationwide numbering system of identifying central offices with a three-digit central office code and a three-digit numbering plan area code (NPA code, or area code). Central office codes were unique in each numbering plan area. The NPA code and the central office code were used as prefixes in subscriber telephone numbers. With the development of international and transoceanic telephone trunks, especially driven by direct customer dialing, similar efforts of systematic organization of the telephone networks occurred in many countries in the mid-20th century.
For corporate or enterprise use, a private telephone exchange is often referred to as a private branch exchange (PBX), when it has connections to the public switched telephone network. A PBX is installed in enterprise facilities, typically near large office spaces or within an organizational campus to serve the organization's telephones and any private leased line circuits. Smaller installations might deploy a PBX or key telephone system in the office of a receptionist.
History
In the era of the electrical telegraph, its principal users were post offices, railway stations, the more important governmental centers (ministries), stock exchanges, very few nationally distributed newspapers, the largest internationally important corporations, and wealthy individuals. Despite the fact that telephone devices existed before the invention of the telephone exchange, their success and economical operation would have been impossible on the same schema and structure of the contemporary telegraph, as prior to the invention of the telephone exchange switchboard, early telephones were hardwired to and communicated with only a single other telephone (such as from an individual's home to the person's busi |
https://en.wikipedia.org/wiki/Compagnie%20des%20Transports%20Strasbourgeois | The Compagnie des Transports Strasbourgeois (CTS, ) is the company responsible for the comprehensive public transport network of the Eurométropole de Strasbourg, the urban community of the French city of Strasbourg.
The CTS currently operates all six lines of the Tramway de Strasbourg and the bus network with the eight associated Park and Ride facilities, on behalf of the Eurométropole de Strasbourg. It also runs other services through its subsidiary Compagnie des Transports du Bas-Rhin (CTBR) and on behalf of the Conseil départemental du Bas-Rhin. These comprise 27 coach lines, of which 9 serve Strasbourg and participate in the Vélhop cycle network.
History
Establishment
In 1877, the ("Strasbourg Horse Railway Company") was established. The business did not take a French name until 1884, as the (Strasbourg Tramway Company, CTS).
On 22 July 1878 the company opened its first carriage line. It continued to expand its network, with financial support from banks such as the Straehling-Valentin bank, and also the development of a local interest in the activity of the railway.
Electrification of the tram network did not start until 1894, in partnership with the town and AEG. The first lines were electrified the following year at the 1895 .
In 1900, the network ran almost fifteen lines over of route. In 1912 the city of Strasbourg became the major shareholder of the company with 51% ownership. It was the start of its status as a public-private partnership. The city also granted an exclusive contract to run the network and construct any future lines., which gave the city power to control Strasbourg's development.
World War I
The declaration of war in 1914 took most of the company's staff (over 500 men from a labour force of 540). The business resorted to hiring over 260 women to keep the network running.
Between the wars
At the end of the war, the network was heavily damaged and split in two: the outer-Rhine lines were transferred to the Republic of Baden in 1922. It was during this period that the Bas-Rhin invested in the society, which was facing financial difficulties.
Although the first bus only appeared in 1928, the tramway transported over 50 million passengers during 1930. Despite that, traffic declined. The CTS turned towards tourism in 1932 with the creation of the company, with luxury touring coaches.
World War II
To address the shortage of fuel, the Trolleybus made its appearance in 1939 on the Roethig – Ostwald line. The tram network served to evacuate Strasbourg so normal service stopped. Only the suburban network continued to run, to allow adequate provisioning of the French army. But the German authorities restarted the services when they took control of the city in June 1940. During the war, the tram network was one of the only methods on transport with a peak in usage, with nearly 73 million journeys in 1943. When Strasbourg became French again, the CTS faced a crisis, with a loss of human and material resources.
|
https://en.wikipedia.org/wiki/Cartoon%20Network%20%28French%20TV%20channel%29 | Cartoon Network is a French pay television channel aimed at kids, available for France, Belgium, Switzerland, Luxembourg and Francophone Africa. It was launched on 23 August 1999 and is owned by Warner Bros. Discovery International under its French division.
History
In 1993, Turner launched a free-to-air channel, Cartoon Network (during the day) timesharing with TNT Classic Movies, in Europe. Although it was legally licensed in the UK, as it transmitted from London, the French and Belgian authorities objected to the American programming available in the French language.
In June 1998, an autonomic Cartoon Network was launched for Southern Europe (France, Spain and Italy). The Italian channel became independent a few months after, and on 23 August 1999, the French and Spanish channels were split.
In 1999, all shows began to be shown in French. Cartoon Network broadcast mainly Hanna-Barbera and Warner Bros. cartoons in the early 2000s. In 2006, the channel changed its programming to aim a more modern audience by removing old shows. These shows were replaced with movies and some live-action series.
Starting in 2010, less Hanna-Barbera productions have been broadcast. Most of these were moved to sister network Boomerang. An original video game titled Cartoon Network: Punch Time Explosion XL was released on the Xbox 360 and Nintendo 3DS. In December 2012, Cartoon Network began to air the first seasons of Wakfu: The Animated Series. In early 2014, Turner announced the new series Uncle Grandpa, Steven Universe and Clarence.
Since 2014, Cartoon Network France has been available in Sub-Saharan Africa through StarTimes. On 25 July 2016, Cartoon Network France fully rebranded using graphics from the Check It 4.0 branding package. On 4 September 2017, Cartoon Network France fully rebranded using graphics from the Dimensional branding package.
Related services
Cartoon Network feeds
Cartoon Network HD
On 13 May 2014, Cartoon Network Channel HD launched on Canalsat.
Cartoon Network Switzerland
A Swiss feed was launched on 26 February 2007. Its advertising window is operated by Goldbach Media. Unlike in France, Cartoon Network is free in all Swiss TV providers, and it is the most popular kids channel in French.
Boomerang
Boomerang began as a block on Cartoon Network in early 2000s. On 23 April 2003, Boomerang was launched as a channel on TPS.
Cartoonito
Cartoonito was launched as a morning preschool block on Boing on 5 September 2011. The block last aired on 5 July 2013.
In May 2021, WarnerMedia UK and EMEA announced plans to relaunching Cartoonito within their regionre-entering in Spring 2022, with its streaming service HBO Max.
It’s currently unconfirmed when its programming block will launch on Cartoon Network.
Adult Swim
The block was launched on 4 March 2011 and aired every night from 11 p.m. to 1 a.m. on Cartoon Network Switzerland until 2015. It has aired Aqua Teen Hunger Force, Harvey Birdman, Attorney at Law, Metalocalypse, Moral Orel, |
https://en.wikipedia.org/wiki/Time%20in%20Nepal | Time in Nepal is officially represented by Nepal Standard Time (NPT, UTC+05:45).
IANA time zone database
The IANA time zone database contains one zone for Nepal in the file zone.tab, named Asia/Kathmandu.
References |
https://en.wikipedia.org/wiki/DXXL | DXXL (93.9 FM), broadcasting as 93.9 iFM, is a radio station owned and operated by the Radio Mindanao Network. The station's studio is located at the 2/F San Vicente Bldg., Iñigo St. cor. Bonifacio St., Davao City, and its transmitter is located along Broadcast Ave., Shrine Hills, Matina, Davao City.
History
Established in 1977, DXXL was RMN's fourth FM station in Mindanao for soft launch. A year later, the station began operations as 93.9 XL-FM, carrying a CHR/Top 40 with the slogan "The Pride and Joy of Davao City". At that time, its original studio and transmitter were located along Shrine Hills, Matina. During the 80s, it was among the top-rated stations in the city, along with DXSS and DXBM. On August 16, 1992, the station was relaunched as Smile Radio 93.9 XL-FM with a mass-based format. On November 23, 1999, it rebranded as 939 XLFM and switched back to a CHR/Top 40 format, with its slogan "Live it Up!". On May 16, 2002, the station was rebranded as 93.9 iFM and went back to a mass-based format.
References
Radio stations in Davao City
DXXL |
https://en.wikipedia.org/wiki/Orange%20Armenia | Orange Armenia () was the Armenian branch of telecommunications company Orange S.A. It was one of the three licensed mobile networking companies until 2015.
History
Orange entered the Armenian telecommunication market with the mobile services delivery operating licence in fall of 2009, and had 501,000 subscribers by the end of 2014. The business employed 500 people by that date.
In July 2015, Orange decided to withdraw from the Armenian market since, as the leadership explained: "its Armenian unit did not have the scale to carry out the investments required to offer its own converged services in the country".
Orange announced its negotiations with local Armenian ISP Ucom Limited Liability Company in July 2015, stating that the deal would create a "strong Armenian player capable of offering its customers a broad range of fixed and mobile services."
In August 2015, talks were announced to be concluded successfully and the Armenian Public Services Regulatory Commission cleared the deal, admitting that "Orange Armenia lacks the resources required to justify investing in its network, in particular in offering converged fixed and mobile services in the country".
The final merger was officially announced to enter into force as of 21 December 2015. Since that time, Ucom became the only shareholder of Orange Armenia CJSC and legal successor of all its liabilities of Orange Armenia.
References
External links
Telecommunications companies of Armenia
Orange S.A. |
https://en.wikipedia.org/wiki/Geeklog | Geeklog is open-source software that works as a Weblog, CMS or Web Portal." It is written in PHP and during its history has supported MySQL, PostgreSQL, or Microsoft SQL Server as a database backend.
History
Geeklog has historically focused on "performance, privacy, and security." In March 2010, the Geeklog project slogan was changed to "The secure CMS." in an effort to more accurately reflect the differentiating features compared to other content management systems. Other Geeklog features include "comments, polls, calendar, web links, content syndication, and more." Geeklog supports the Trackback and Pingback standards as well as content syndication by way of the automatic publication of RSS Feeds. Geeklog (in a manner similar to Movable Type and pMachine) allows one to "set fine-grained permission levels for each individual user." Geeklog is also "easily extensible via a modules API."
Many web hosting companies "automatically install open source blogging applications like Geeklog" "as part of their basic Web site packages." As such, it is "one of the more popular choices for a Web-based Content Management System along with WordPress and Drupal." Geeklog is available to many webmasters since it is included with the commercial web hosting software installers Fantastico, Softaculous, and Installatron that are bundled with many web hosting plans, although installations of Geeklog via these third-party installers may have support issues.
Geeklog is still under active development, as evidenced by its acceptance as a mentor organization into the Google Summer of Code
for years 2007,
2008,
2009,
and 2010. Geeklog is the content management system used by notable web sites such as Groklaw and Mac OS X Hints which have been in continuous operation since 2003 and 2000, respectively.
References
External links
Official site
Official wiki
Official documentation
Free content management systems
Blog software
Content management systems
Free software programmed in PHP |
https://en.wikipedia.org/wiki/Miracle%20Treat%20Day%20%28Dairy%20Queen%29 | Miracle Treat Day is an American and Canadian fundraising event for the Children's Miracle Network and is sponsored by Dairy Queen. The event is held annually in the United States and in Canada. In the United States, at least $1 of all proceeds from each The Blizzard Treat sold at participating locations was donated to local Children's Miracle Network hospitals on August 2, 2018. In Canada, Miracle Treat Day was held on August 9, 2018, with the net proceeds of every The Blizzard Treat sold at participating Dairy Queen stores going to local Children's Miracle Network member hospitals.
Purpose
The purpose of this event is to raise funds for the 170+ Children's Miracle Network hospital's worldwide. Each year these hospitals treat about 17 million children and they impact the lives of more children than any other children's organization in the world.
History
Dairy Queen has been a supporter of Children’s Miracle Network since 1984. The first-ever Miracle Treat Day was on August 10, 2006 and has been held annually ever since. It is a tradition on the day of the event for the President and CEO of Dairy Queen, John Gainor, to personally deliver hundreds of Blizzard Treats to children and their families at local hospitals.
Spokespersons
In 2006, Grammy-Winning Superstar LeAnn Rimes served as the honorary spokesperson for Dairy Queen's first-ever Miracle Treat Day. LeAnn has also performed many benefit concerts in support of the Children's Miracle Network.
In 2007, Miss America Lauren Nelson served as the honorary spokesperson for Dairy Queen’s Miracle Treat Day. "With my love for children, I am proud to be spokesperson for Miracle Treat Day, as I know this event will do so much to help children all over North America," said Nelson.
In 2008, Miss America Kirsten Haglund served as the honorary spokesperson for Dairy Queen's Miracle Treat Day. Miss America titleholders have been involved with Children's Miracle Network, visiting hospitals and helping with fundraising activities since 1989.
In 2009, Miss America Katie Stam served as the honorary spokesperson for Dairy Queen's Miracle Treat Day. She served Blizzard Treats at a local Dairy Queen for the event and she also promoted the day by conducting several TV and radio interviews.
Success
Dairy Queen marked 30 years in support of the Children's Miracle Network in 2014. In that time, Dairy Queen has helped raise more than $125 million. The biggest fundraising event that Dairy Queen holds for the cause is the Miracle Treat Day. Each year the event makes millions of dollars, and the goal is for the amount to continue to grow.
A Dairy Queen franchise in Madison, South Dakota, owned by DeLon Mork, has sold the most Blizzards of any Dairy Queen in North America on Miracle Treat Day for the past 11 years.
2006: 3,083
2007: 7,011
2008: 12,347
2009: 18,017
2010: 21,405
2011: 25,648
2012: 31,351
2013: 38,412
2014: 47,638
2015: 45,516
2016: 40,059
2017: 40,686
2018: 44,657
2019: 44,061
20 |
https://en.wikipedia.org/wiki/Pionen | Pionen is a former civil defence center built in the White Mountains Södermalm borough of Stockholm, Sweden in 1943 to protect essential government functions. The address of the Pionen data center is Renstiernas gata 35 and 37.
It was converted into a data center by the Swedish Internet service provider Bahnhof. It opened on 11 September 2008 and Bahnhof continues to use the facility today. Because of the facility being buried under the mountain, secured by a 40-centimeter thick door, and only reachable by an entrance tunnel, the data center is capable of withstanding a hydrogen bomb. The Pionen data center is also a colocation centre. In 2010 WikiLeaks used Pionen's colocation services to store their servers.
Environment
Pionen is a data center deep below 30 meters of granite, with three physical datalinks into the mountain. Also, Pionen is located in Central Stockholm, with 1,100 square meters of space. Pionen features fountains, greenhouses, simulated daylight and a huge salt water fish tank. Its data center has two backup power generators, which are actually submarine engines.
It previously hosted WikiLeaks.
References
External links
Buildings and structures in Stockholm
Data centers
Air raid shelters |
https://en.wikipedia.org/wiki/John%20P.%20Moon | John P. Moon (born July 15, 1938) is an Apple Computers executive. He has engineering degrees from Pennsylvania State University and New York University. From the 1960s to the 1980s, Moon worked for companies including IBM, National Micronetics Corporation, Tandon Magnetics Corporation, and Apple.
Early life
Moon was born in Philadelphia, on July 15, 1938. His father, Perry Moon was a construction worker who often answered John's questions about how things work. John spent his time building model cars in the family basement where he assembled and took apart electronic devices. Since he worked so well with his hands, he was quick at repairing things like radios, earning him the nickname "fix-it boy", which was given to him by his neighbors.
Education
Moon's best subjects in school were Mathematics, Science and English. After he graduated high school with honors, he enrolled at Pennsylvania State University where he received a degree in mechanical engineering in 1960. After graduating from there he decided to further pursue his education and get his masters from New York University (NYU) where he continued his studies in engineering.
Careers
IBM
During the 1960s major companies started recruiting African Americans to work with and for them due to the change of the race relations and they were responding to the demands that the Civil Rights Movement put on government and businesses suggesting that there should be equal opportunities for all. Moon was hired at IBM (International Business Machines) in New York City through a program that was hiring African Americans who have experience in the math and science fields; particularly engineers. Though Moon knew very little about computers when he began his career at IBM he thrived throughout the remainder of his time there. He was hired when computer technology was changing rapidly. He joined other IBM scientists in physics, electrical and mechanical engineering and chemistry who were looking at ways to better computers and how they function. He left IBM in 1970.
National Micronetics Corporation
In 1970, Moon established the National Micronetics Corporation with a few other engineers in a garage. There, they researched ways to use a magnetic substance called ferrite. From there, he and his colleagues found a way to make ferrite recording heads which were in high demand. Within a couple years their business grew from five people working in a garage to a multimillion-dollar company. Four years later, he moved to California where he worked for several different technology companies.
Tandon Magnetics Corporation
In 1976, he started working with Tandon Magnetics Corporation. The double side disc that could save more data was invented by Jugi Tandon, and Moon contributed to the success of this product by finding a new way to manufacture this new technological advance by making these ferrite recording heads through mass production rather than one at a time. The implication of Moon's mass production b |
https://en.wikipedia.org/wiki/Planet%20Minigolf | Planet Minigolf is a PlayStation 3-exclusive minigolf video game that was released on the PlayStation Network on 1 June 2010. It features support for Sony's PlayStation Move control system. The game features four locations and 144 holes to play, and new courses can be created by players. A downloadable content pack entitled Stronghold Island was released on 21 September 2010.
The game were mixed by critics with an average of 68.40% at GameRankings and 66/100 at Metacritic, two aggregate websites. Reviewers generally praised the game's visuals, ability to customize and create new courses, and multiplayer components. They were critical of the game's camera angles, and some reviewers felt that the visuals were inconsistent. As of September 2010 the game has sold over 68,000 copies. That number rose to over 90,000 at the end of 2010.
Gameplay
Planet Minigolf is a minigolf game which features 144 unique holes spread across four worldwide locations; Buccaneer's Hideout, Soho, Polar Station and Ancient Valley, each with four 9-hole courses. They progress in difficulty from Warm-up through Pro, Extreme and finally Wacky. The game can be played as part of a single-player campaign or as part of any weekly online tournaments against players around the world. Local multiplayer is also supported. Planet Minigolf also features a leaderboard which organizes scores by nationality.
Powerup items can sometimes be found on the courses which allow you to control the ball in various ways to improve your score. Keys can be earned which allow players to purchase wardrobe items, various putters, and golf balls for the five playable characters. These are earned by winning single-player tournaments on the various courses. Players can also create their own golf courses and upload them for other players to download similar to LittleBigPlanet. The game also supports the PlayStation Move controller; players swing the controller in a similar fashion to an actual putter. As of December 2010 over 2,300 custom courses are available, with over 37,000 individual holes also available.
Development
On 14 October 2009, Planet Minigolf was announced as a PlayStation 3-exclusive title that would be available via the PlayStation Network. On 29 March 2010 Zen Studios announced that the game would be fully compatible with PlayStation Move, Sony's motion controller for the PlayStation 3. A trailer released 22 April 2010 showcased the ability to customize minigolf courses, which would allow players to create new scenarios in each of the game's locations. It was revealed under Sony's Play, Create, Share banner, which encourages customization and sharing of user-generated content in games. Other games under this banner include the LittleBigPlanet series and ModNation Racers.
On 6 May 2010 Zen Studios revealed that the game would make use of the PlayStation 3's ability to upload replays directly to YouTube. Planet Minigolf was released 1 June 2010. The game received a |
https://en.wikipedia.org/wiki/Data%20validation%20and%20reconciliation | Industrial process data validation and reconciliation, or more briefly, process data reconciliation (PDR), is a technology that uses process information and mathematical methods in order to automatically ensure data validation and reconciliation by correcting measurements in industrial processes. The use of PDR allows for extracting accurate and reliable information about the state of industry processes from raw measurement data and produces a single consistent set of data representing the most likely process operation.
Models, data and measurement errors
Industrial processes, for example chemical or thermodynamic processes in chemical plants, refineries, oil or gas production sites, or power plants, are often represented by two fundamental means:
Models that express the general structure of the processes,
Data that reflects the state of the processes at a given point in time.
Models can have different levels of detail, for example one can incorporate simple mass or compound conservation balances, or more advanced thermodynamic models including energy conservation laws. Mathematically the model can be expressed by a nonlinear system of equations in the variables , which incorporates all the above-mentioned system constraints (for example the mass or heat balances around a unit). A variable could be the temperature or the pressure at a certain place in the plant.
Error types
Data originates typically from measurements taken at different places throughout the industrial site, for example temperature, pressure, volumetric flow rate measurements etc. To understand the basic principles of PDR, it is important to first recognize that plant measurements are never 100% correct, i.e. raw measurement is not a solution of the nonlinear system . When using measurements without correction to generate plant balances, it is common to have incoherencies. Measurement errors can be categorized into two basic types:
random errors due to intrinsic sensor accuracy and
systematic errors (or gross errors) due to sensor calibration or faulty data transmission.
Random errors means that the measurement is a random variable with mean , where is the true value that is typically not known. A systematic error on the other hand is characterized by a measurement which is a random variable with mean , which is not equal to the true value . For ease in deriving and implementing an optimal estimation solution, and based on arguments that errors are the sum of many factors (so that the Central limit theorem has some effect), data reconciliation assumes these errors are normally distributed.
Other sources of errors when calculating plant balances include process faults such as leaks, unmodeled heat losses, incorrect physical properties or other physical parameters used in equations, and incorrect structure such as unmodeled bypass lines. Other errors include unmodeled plant dynamics such as holdup changes, and other instabilities in plant operations that violate stea |
https://en.wikipedia.org/wiki/Signal%20chain | Signal chain, or signal-processing chain is a term used in signal processing and mixed-signal system design to describe a series of signal-conditioning electronic components that receive input (data acquired from sampling either real-time phenomena or from stored data) sequentially, with the output of one portion of the chain supplying input to the next.
Signal chains are often used in signal processing applications to gather and process data or to apply system controls based on analysis of real-time phenomena.
Definition
This definition comes from common usage in the electronics industry and can be derived from definitions of its parts:
Signal: "The event, phenomenon, or electrical quantity, that conveys information from one point to another".
Chain: "1. Any series of items linked together. 2. Pertaining to a routine consisting of segments which are run through the computer in tandem, only one segment being within the computer at any one time and each segment using the output from the previous program as its input".
The concept of a signal chain is familiar to electrical engineers, but the term has many synonyms such as circuit topology. The goal of any signal chain is to process a variety of signals to monitor or control an analog-, digital-, or analog-digital system.
See also
Audio signal flow
Daisy chain (electrical engineering)
Feedback
References
External links
Signal Chain Basics from www.planetanalog.com
Signal processing systems |
https://en.wikipedia.org/wiki/Proxy%20Networks%2C%20Inc. | Proxy Networks, Inc. is a provider of Remote Desktop Software and remote collaboration software designed to help technicians, network administrators, and IT managers. The company was formed in 2006 by a venture capital-backed acquisition from Juniper Networks. Headquartered in Boston, Massachusetts, and Proxy Networks is led by chief executive officer Andy Kim.
Software Editions
As of 11/16/2022, the latest version is v10.5 Hotfix #2. The PROXY Pro remote control software series is composed of two on-premise elements while the third is hosted:
PROXY Pro P2P Edition provides remote desktop access directly from one computer to another in peer-to-peer fashion. It consists of the PROXY Pro Master (viewer) and the PROXY Pro Host (client) and the PROXY Pro Deployment Tool.
PROXY Pro RAS Edition (Remote Access Server) utilizes the same PROXY Pro Master and PROXY Pro Host components and adds the Web Console, a server-side component that allows for the access, management and remote control of Host machines from a browser. It is an on-premises remote desktop software for remote support and collaboration with configurable service management tools, screen recording, real-time reporting and historical connection reporting.
PROXY Air is a hosted remote desktop service eliminating the need for a customer to manage a server on premise.
Company history
Proxy Networks’ technology was originally developed by Funk Software, which introduced the first remote desktop support software for the Windows 3.1 platform circa 1993.
In late 2005, Funk Software was taken over by Juniper Networks.
In July 2006, with financial backing from de Anda Capital LLC (a private equity firm with investments in companies such as Asurion and ServiceSource), newly incorporated Proxy Networks Inc. acquired the remote desktop software product line from Juniper Networks for an undisclosed amount.
At this time the Proxy Networks team consisted of ten employees, and was headed by chief executive officer Andy Kim. According to Kim, at the time of the acquisition, the proprietary software (later renamed “Proxy Pro”) was already installed at hundreds of companies such as Boeing Co., Fidelity Investments and the U.S. Secret Service.
Regarding the acquisition, Juniper VP Joe Ryan commented that the remote desktop software was “not in Juniper’s area of focus,” and that Juniper would concentrate more on network security than management of computers and servers.
Product Distribution
Proxy Networks' products are sold directly to customers in North America. They are sold through third-party vendors in Europe, Asia, Africa, the Middle East, South America, and Latin America.
Version history
Clients
The following companies and organizations are among those that have used PROXY Pro remote desktop software.
Boeing Co.
Fidelity Investments
U.S. Secret Service
Kisco Senior Living
U.S. Department of the Interior
Hitachi
Toyoda Gosei
Colorado Rockies |
https://en.wikipedia.org/wiki/Jim%20Hendricks | Jim Hendricks was an American actor and former disc jockey best known for his role as movie host Commander USA on USA Network's Commander USA's Groovie Movies that ran from 1985 to 1989.
Hendricks also acted in theater and on television in such series as Law & Order: Special Victims Unit.
Hendricks' starred in Michael Imperioli's 2009 film The Hungry Ghosts.
Hendricks died on March 17, 2018.
References
External links
1946 births
2018 deaths
American male television actors
American male stage actors
American television personalities
Male television personalities
American male film actors |
https://en.wikipedia.org/wiki/Stigmella%20bicuspidata | Stigmella bicuspidata is a moth of the family Nepticulidae. It is only known from three widely separate localities in Turkey.
The wingspan is . Adults are on wing from July to September.
External links
The Quercus Feeding Stigmella Species Of The West Palaearctic: New Species, Key And Distribution (Lepidoptera: Nepticulidae)
Nepticulidae
Endemic fauna of Turkey
Moths described in 2003
Moths of Asia |
https://en.wikipedia.org/wiki/Ada%20Lovelace%20Day | Ada Lovelace Day is an annual event held on the second Tuesday of October to celebrate and raise awareness of the contributions of women to STEM fields. It is named after mathematician and computer science pioneer Ada Lovelace. It started in 2009 as a "day of blogging" and has since become a multi-national event with conferences.
History
The day was founded in the United Kingdom in 2009 by Suw Charman-Anderson on the second Tuesday in October as a means of raising awareness about the contributions of women to science, technology, engineering, and mathematics (STEM) fields.
In 2022, Charman-Anderson announced that this would be the last year in which the organization that she founded, Finding Ada, would organize an annual flagship Ada Lovelace Day event in England.
Since its inception, Ada Lovelace Day has become international in scope, with events organized by groups ranging from museums, professional societies, universities, colleges and high schools. While Ada Lovelace Day is the second Tuesday of October, events celebrating women in STEM typically span the period of October and November, and include diverse activities ranging from in-person and virtual Wikipedia Editathons to panel discussions and film screenings.
While this celebration of the often overlooked contributions of women in STEM was named for Ada Lovelace, activities have expanded since 2009 to highlight the diverse contributions of women in STEM over time and different countries. Events have featured policy initiatives and scholarship relating to equity, diversity and inclusion that provide spaces and platforms for dialogue and discussion about how unconscious bias(es) function to create barriers to women's participation and advancement in the professional fields of STEM.
References
External links
2009 establishments in the United Kingdom
Recurring events established in 2009
Awareness days
Women in science and technology
October observances
Ada Lovelace |
https://en.wikipedia.org/wiki/WJJM-FM | WJJM-FM (94.3 MHz) is a radio station broadcasting a country music format. Licensed to Lewisburg, Tennessee, United States, the station is currently owned by WJJM, Inc. and features programming from Fox News Radio and numerous syndicators; local programming includes various full-service features such as local news updates, tradio services (unusually two-tiered, with one program, "Trading Post," offering free ads and another, "Bargain Finders," offering low-cost paid listings), local church services and extensive high school sports coverage.
References
External links
Country radio stations in the United States
JJM-FM
Marshall County, Tennessee |
https://en.wikipedia.org/wiki/2004%E2%80%9305%20in%20Welsh%20football |
National team
Welsh Cup
Total Network Solutions beat Carmarthen Town 1–0 in the final of the Welsh Cup.
Welsh League Cup
Carmarthen Town beat Rhyl 2–0 in the final of the Welsh League Cup.
Welsh Premier League
Champions: Total Network Solutions
Relegated to Welsh Football League Division One: Afan Lido
Welsh Football League Division One
Champions: Ton Pentre - did not apply for promotion to Welsh Premier League therefore Cardiff Grange Quins promoted to Welsh Premier League
Cymru Alliance League
Champions: Buckley Town - did not apply for promotion to Welsh Premier League
Seasons in Welsh football |
https://en.wikipedia.org/wiki/Tradeshift | Tradeshift is a cloud based business network and platform for supply chain payments, marketplaces, and apps. Its 2018 round of funding, led by Goldman Sachs, raised US$250 million at a valuation of $1.1 billion, giving the company unicorn status. Tradeshift is Headquartered in San Francisco, California. Tradeshift serves 300 companies and has reprocessed over $1Trillion USD through transactions.
History
Tradeshift was founded in 2010 by Christian Lanng, Mikkel Hippe Brun, and Gert Sylvest. Inspiration for Tradeshift came after they created the world's first large scale peer-to-peer infrastructure for an e-business called NemHandel. The founders also had leading roles (Governing board member, Technical Director) in the European Commission project PEPPOL inside the European Union.
In 2010, the Tradeshift platform launched in May in Copenhagen. Tradeshift won the European Startup Awards in the category of "Best Business or Enterprise Startup." In 2011, Tradeshift made its app marketplace available.
In 2012, Tradeshift moved their headquarters from Copenhagen to San Francisco. In 2013, Tradeshift opened an R&D center in Suzhou, China. Tradeshift opened an additional office in London. And LATAM e-invoicing capabilities were added through partnership with Invoiceware.
In 2014, Tradeshift expanded with offices in Tokyo, Paris, and Munich. The EU Commission officially approved the Universal Business Language (UBL) data format – a format Tradeshift supports – as eligible for referencing in tenders from public administrations.
In 2015, Tradeshift won the Circulars "Digital Disruptor" Award at the WEF conference in Davos, Switzerland. Tradeshift also acquired product information management company Merchantry, and launched e-procurement and supplier risk management solutions. In 2016, Tradeshift acquired Hyper Travel and secured a $75 million series-D round funding. In 2017, Tradeshift acquired IBX Business Network and launches Tradeshift Ada.
In 2018, Tradeshift secured a $250 million series-E round funding. and launched Blockchain Payments, the latter as part of Tradeshift Pay. In December 2018 Tradeshift acquired Babelway, an online B2B integration platform. The acquisition added three new office locations to Tradeshift (Salt Lake City, Louvain-la-neuve, Belgium, Cairo Egypt). In Q3 2018, Tradeshift reported year-over-year revenue growth of 400%, new bookings growth of 284%, and gross merchandise volume (GMV) growth of 262%. New total contract value also grew by US$47 million. Additionally, it added 27 new customers including Hertz, Shiseido, ECU and multiple Fortune 500 companies.
In October 2019, Tradeshift partnered with Abreon to help businesses implement new technology and establish new procedures smoothly and effectively.
In March 2020, Tradeshift collaborated with DXC for automation of procure-to-pay processes.
Financials
The company's valuation as of May 2018 was $1.1 billion. Tradeshift is now considered a unicorn, and, according to Bl |
https://en.wikipedia.org/wiki/WHEW | WHEW (1380 AM, "Bonita 1380") is an American radio station licensed to serve the community of Franklin, Tennessee. The station's broadcast license is held by SG Communications, Inc.
Programming
WHEW broadcasts a Spanish Variety format branded as "Bonita 1380".
History
It used to be licensed to an earlier ownership group as WIZO, and was assigned the call sign "WHEW" by the U.S. Federal Communications Commission (FCC) on October 1, 1996. Following a series of missteps by the licensee, WHEW's call sign was deleted from the FCC database and the broadcast license cancelled in August 2012. After a lengthy appeal, the station was fully reinstated in September 2013.
References
External links
Bonita 1380 Nashville Facebook
HEW
HEW
Franklin, Tennessee
Radio stations established in 1975
HEW
Mass media in Williamson County, Tennessee
1973 establishments in Tennessee |
https://en.wikipedia.org/wiki/Fault%20Tolerant%20Ethernet | Fault Tolerant Ethernet (FTE) is proprietary protocol created by Honeywell.
Designed to provide rapid network redundancy, on top of spanning tree protocol. Each node is connected twice to a single LAN through the dual network interface controllers. The driver and the FTE enabled components allow network communication to occur over an alternate path when the primary path fails.
Default time before failure is detected, is Diagnostic Interval (1000ms) multiplier with Disjoin Multiplier (3), for a 3000ms recovery time.
Similar to Switch Fault Tolerance (SFT) in windows and mode=1 (active-backup) in Linux.
Supported hardware and software
Windows 7/2003 or newer
Honeywell Control Firewall (CF9)
Honeywell C300 Controller
Honeywell Series 8 I/O
Technical overview
Uses Multicast ( 234.5.6.7), for FTE community.
Recommended maximum of 300 FTE nodes and 200 single connected Ethernet nodes (A machine with to network cards is considered as two separate single connected Ethernet nodes).
Recommended to have separate broadcast/multicast domain , for different FTE communities.
Recommended maximum of 3 tiers of switches.
Default UDP Source Port: 47837
Default UDP Destination Port : 51966
References
External links
Honeywell Fault Tolerant Ethernet Page
Computer networking |
https://en.wikipedia.org/wiki/Sachs%20Electric | Sachs Electric Company is the largest electrical contractor in Missouri. In addition, Sachs has four specialized divisions: Sachs Automation, for pneumatic and computer-based process control systems; Sachs Systems for communications and security systems; McGraw Electric (in Livonia, Michigan) for automotive industry and other industrial electrical contracting; and Sachs Civil, for in-house support for trenching, excavating and general trades.
The company is based in Fenton, Missouri, a suburb of St. Louis. It was founded as S&S Electric Company, a two-man and one-room company in 1925, by Samuel Sachs in partnership with fellow Washington University in St. Louis graduate Herman Spoehrer. It was renamed S. C. Sachs Company in the early 1930s. Early projects included designing and building the lighting for Sportsman's Park, home of the St. Louis Browns baseball team. Samuel Sachs served as chief executive until 1953, when his son Louis Sachs was promoted to president. Louis Sachs was succeeded as president by Norman Krause in 1973 and Larry Plunkett in 1983, though the company remained family owned through 1990. In 1990, Plunkett, as president and CEO, oversaw his most ambitious project, the employee buyout of the company from the Sachs family with a five-year loan that the company paid off in three and a half years. In 2000, the CEO position went to Robert Murdick and the presidency to Clayton Scharff, and Scharff replaced Murdick as CEO in 2002.
Sachs acquired Detroit-based McGraw Electric in 2003, to expand into the Michigan industrial and automotive sector.
Company revenue grew from $17 million in 1969, when Plunkett joined the company as an engineer under the tutelage of Norman Krause, to $100 million in 1995, $220 million in 2001, and $293 million in 2007.
References
External links
Sachs Electric Official website.
Companies based in St. Louis County, Missouri
Business services companies established in 1925
Engineering companies of the United States
Employee-owned companies of the United States
1925 establishments in Missouri |
https://en.wikipedia.org/wiki/P%C3%A9ter%20Kacsuk | Péter Kacsuk is a Hungarian computer scientist at MTA-SZTAKI, Budapest, Hungary.
Biography
Péter Kacsuk received his MSc and university doctorate degrees from the Technical University of Budapest, Hungary in 1976 and 1984, respectively. He received the Kandidat degree (equivalent to PhD) from the Hungarian Academy in 1989. He habilitated at the University of Vienna in 1997. He received his professor title from the Hungarian President in 1999 and the Doctor of Academy degree (DSc) from the Hungarian Academy of Sciences in 2001. He is currently the Head of the Laboratory of Parallel and Distributed Systems (LPDS), Computer and Automation Research Institute of the Hungarian Academy of Sciences.
Research interests
Parallel and distributed systems
Cluster (computing)
Grid computing
Internet computing
Parallel/distributed programming environments.
Scientific merits
Péter Kacsuk has been a part-time full professor at the Cavendish School of Computer Science of the University of Westminster and the Eötvös Lóránd University of Science since 2001. He served as visiting scientist or professor several times at various universities of Australia, Austria, Canada, England, Germany, Spain, Japan and USA. He has published two books, two lecture notes and more than 200 scientific papers on parallel computer architectures, parallel software engineering and Grid computing.
He was the chair of the "Joint EGEE and SEE-GRID Summer School on Grid Application Support" in 2006 and 2007 and the chair of the "CoreGRID Summer School 2007". He has been involved in many EU Grid projects (EDG, GridLab, EGEE, SEEGRID, CoreGrid, GridCoord, ICEAGE, CancerGrid, etc.). He is the coordinator of the EU FP7 EDGes (Enabling Desktop Grids for e-Science) project. He is co-editor-in-chief of the Journal of Grid Computing published by Springer.
He has received the following awards:
2008 MTA SZTAKI award for outstanding management of the Laboratory of Parallel and Distributed Systems
2001 MTA SZTAKI award for outstanding scientific performance
2000 Kalmár László award of NJSZT (Hungarian Computer Society) for outstanding scientific performance
1999 MTA SZTAKI award for outstanding scientific performance
1998 MTA SZTAKI AKE award for outstanding scientific and publication activities
1998 MTA SZTAKI award for outstanding scientific performance
Selected publications
Kertész and Kacsuk. 2010: GMBS: A new middleware service for making grids interoperable. In: Future Generation Computer Systems 26:4
Kacsuk, Lovas, Németh (Eds.). 2008: Distributed and Parallel Systems. In Focus: Desktop Grid Computing. Springer US
Lovas and Kacsuk. 2007: Correctness debugging of message passing programs using model verification techniques. In: Recent Advances in Parallel Virtual Machine and Message Passing Interface. Proc. of 14th European PVM/MPI User's Group Meeting
Media appearances
Selected media appearances in Hungary, with links to audio/video material:
2006.08.03 : Péter K |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.