source
stringlengths 32
199
| text
stringlengths 26
3k
|
|---|---|
https://en.wikipedia.org/wiki/Windows%20Installer%20CleanUp%20Utility
|
The Windows Installer CleanUp Utility (MSICU.exe, MSICUU.exe, MSICUU2.exe) was a software utility for the Microsoft Windows operating system designed to solve uninstallation problems of programs that use the Windows Installer technology. It looks up registry references and files related to Windows Installer that were installed by various programs, and forcibly wipes invalid entries out. It works in all 32-bit and 64-bit versions of Microsoft Windows.
Microsoft first released the utility in 1999 to help Windows-based computers clean up installed programs that would either refuse or pretend not to remove themselves from the "add/remove programs" feature in Microsoft Windows.
The utility only changes registry values and files associated with Windows Installer and does not remove any files associated with installed programs. Only users who have logged in as system administrators may run the utility.
For developers who have problems with the Windows Installer automatically repairing their own installations on developer machines (when the developer has manually updated some of the binaries), this utility is ideal to remove the Windows Installer information whilst leaving the actual installation intact.
Microsoft retired the Windows Installer CleanUp utility on June 25, 2010, due to conflicts with Microsoft Office 2007. A Program Install and Uninstall Troubleshooter for Windows 7, Windows 8, Windows 8.1 and Windows 10 was instead made available.
References
External links
Windows components
Utilities for Windows
|
https://en.wikipedia.org/wiki/Lock%20%27n%27%20Chase
|
Lock 'n' Chase (ロック・ン・チェイス) is a maze chase video game developed by Data East and released in arcades in Japan in 1981. It was licensed to Taito for distribution in North America. Lock 'n' Chase has similarities to Pac-Man, including a goal of collecting dots, with the addition of doors that periodically block pathways. Home versions for the Intellivision and Atari 2600 were published by Mattel in 1982 and an Apple II version in January 1983.
An updated version was published for the Game Boy in 1990.
Gameplay
The game's protagonist is a thief. The object of the game is to enter a maze and collect all the coins and, if possible, any other treasure that may appear. The thief must then exit the maze (a vault) without being apprehended by the Super D (policemen). The thief can close doorways within the maze in order to temporarily trap the Super D and allow him to keep his distance from them. Only two doors can be closed at a time. The Super D policemen are named Stiffy, Scaredy, Smarty, and Silly.
Coins (depicted as dots) are worth 20 points each. In every level, money bags randomly appear in the center of the maze. Money bags are worth 500, 1000, 2000, and up to 4000 points, respectively, for each time they appear. Each level also has a specific treasure that appears near the center of the maze (much like the food items in Pac-Man). These treasures include the following items (listed respectively by level): top hat, crown, briefcase, and telephone. The first three of these treasures are worth 200 points, 300 points and 500 points, respectively. Additional treasures and their point values are revealed as the player completes successive levels.
Legacy
A clone for the Atari 8-bit family was published in 1984 as Money Hungry.
In 1990, Data East produced an updated version of Lock 'n' Chase for the Nintendo Game Boy.
The original Lock 'n' Chase is included in the Nintendo Wii release Data East Arcade Classics and on the PlayStation Network, both in 2010. The Game Boy version was released on the Nintendo 3DS Virtual Console on January 19, 2012.
On June 16, 2018, Jason Vasiloff set a world record of 136,140 points at the Funspot Family Fun Center in New Hampshire.
Lock 'n' Chase is one of several Data East games featured in the video game Heavy Burger.
A remake has been announced for the Intellivision Amico.
See also
Lady Bug
Mouse Trap
References
External links
Lock 'n' Chase at Intellivision Lives
Lock 'n' Chase at Atari Mania
1981 video games
Apple II games
Arcade video games
Atari 2600 games
Data East arcade games
Data East video games
Game Boy games
Intellivision games
Mattel video games
Maze games
Multiplayer and single-player video games
Multiplayer hotseat games
Pac-Man clones
PlayStation Network games
Taito arcade games
Video games about crime
Video games developed in Japan
Virtual Console games
|
https://en.wikipedia.org/wiki/Rivalry%20Week
|
Rivalry Week is a week of programming by ESPN devoted to showing the top rivalries in college basketball. Games that are annually shown during Rivalry Week include:
Indiana vs. Purdue (Indiana–Purdue rivalry)
Duke vs. North Carolina (Carolina–Duke rivalry)
West Virginia vs. Pittsburgh (Backyard Brawl)
Missouri vs. Kansas (Border War)
Syracuse vs. Connecticut
Syracuse vs. Georgetown
Oklahoma vs. Oklahoma State (Bedlam Series)
Villanova vs. Saint Joseph's (Holy War, also part of the Philadelphia Big 5)
Kentucky vs. Florida
UMass vs. Temple
Maryland vs. Duke (Duke–Maryland rivalry)
Ohio State vs. Michigan
Auburn vs. Alabama (Iron Bowl of Basketball)
Ole Miss vs. LSU
ESPN original programming
ESPN College Basketball
College basketball rivalries in the United States
|
https://en.wikipedia.org/wiki/Histidine%20%28data%20page%29
|
References
(D-histidine)
(L-histidine)
(D-histidine)
(L-histidine)
Chemical data pages
Chemical data pages cleanup
|
https://en.wikipedia.org/wiki/List%20of%20films%20about%20computers
|
This is a list of films about computers, featuring fictional films in which activities involving computers play a central role in the development of the plot.
Artificial intelligence plots
Motion picture
2001: A Space Odyssey (1968)
HAL 9000
The Computer Wore Tennis Shoes (1969)
Colossus: The Forbin Project (1970)
The Questor Tapes (1974)
Demon Seed (1977)
Blade Runner (1982)
Tron (1982)
WarGames (1983)
Brainstorm (1983)
2010 (1984)
HAL 9000
SAL 9000
Hide and Seek (1984, TV movie)
Electric Dreams (1984)
The Terminator (1984)
Terminator
Skynet
D.A.R.Y.L. (1985)
Flight of the Navigator (1986)
Short Circuit (1986)
Not Quite Human (1987)
Short Circuit 2 (1988)
Not Quite Human II (1989)
Still Not Quite Human (1992)
Arcade (1993)
Star Trek Generations (1994)
Hackers (1995)
Johnny Mnemonic (1995)
The Net (1995)
Star Trek: First Contact (1996)
Enemy of the State (1998)
Lost in Space (1998)
Star Trek: Insurrection (1998)
Bicentennial Man (1999)
The Matrix (1999)
The Thirteenth Floor (1999)
Universal Soldier: The Return (1999)
Virus (1999)
A.I. Artificial Intelligence (2001)
How to Make a Monster (2001)
Swordfish (2001)
S1M0NE (2002)
Star Trek: Nemesis (2002)
The Matrix Reloaded (2003)
The Matrix Revolutions (2003)
I Robot (2004)
The Hitchhiker's Guide to the Galaxy (2005)
Mercedes Ray (2007)
Live Free or Die Hard (2007)
Eagle Eye (2008)
Iron Man (2008)
Moon (2009)
GERTY 3000
Iron Man 2 (2010)
Person Of Interest (2011-2016)
Wreck-It Ralph (2012)
Computer Chess (2013)
Her (2013)
Iron Man 3 (2013)
The Machine (2013)
Automata (2014)
Transcendence (2014)
Interstellar (2014)
Vice (2015)
Ex Machina (2015)
Avengers: Age of Ultron (2015)
Morgan (2016)
Television series
Person Of Interest (2011-2016)
Next (2020)
Mrs. Davis (2023)
Computers as plot devices
Motion picture
Desk Set (1957)
The Honeymoon Machine (1961)
Alphaville (1965)
Billion Dollar Brain (1967)
The Andromeda Strain (1971)
Revenge of the Nerds (1984)
The Machine That Changed the World (1992, TV miniseries)
The Tower (1993, TV movie)
Code Rush (2000)
The Code (2001 film) (2001)
Revolution OS (2001)
The First $20 Million Is Always the Hardest (2002)
Mercedes Ray (2007)
Micro Men (2009)
The Social Network (2010)
Jobs (2013)
The Imitation Game (2014)
Steve Jobs (2015)
Everything Everywhere All at Once (2022)
Television series
Computer Chronicles (1983 - 2002)
Triumph of the Nerds: The Rise of Accidental Empires (1996)
Nerds 2.0.1: A Brief History of the Internet (1998)
Halt and Catch Fire (2014 - 2017)
Commodore 64
Macintosh 128K
NeXT Computer
Silicon Valley (2014 - 2019)
Valley of the Boom (2019)
The IT Crowd (2006-2013)
Documentaries
All Watched Over by Machines of Loving Grace (2011)
Silicon Cowboys (2016)
Hacking as a plot narrative
Motion picture
The Italian Job (1969)
Tron (1982)
WarGames (1983)
IMSAI 8080
Prime Risk (1985)
Ferris Bueller's Day Off (1986)
Sneakers (1992)
Blank Check (1994)
Hackers (1995)
The Net (1995)
Under Siege 2: Dark Territory (1995)
Mas
|
https://en.wikipedia.org/wiki/On%20the%20Money%20%282005%20TV%20program%29
|
CNBC's On the Money, hosted by Carmen Wong Ulrich, is a television program that focuses primarily on personal finance, a programming departure from CNBC's "investor focused" weekday programming.
The program premiered on October 10, 2005 with Dylan Ratigan as host. Ratigan was replaced by Melissa Francis in 2007 and remained on CNBC's schedule until October 5, 2007. On September 27, it was announced that the program would be removed from the schedule effective October 10, due in part to low ratings, but the last edition was aired on October 5.
The program was completely revamped and relaunched on August 4, 2008 featuring new CNBC personality Carmen Wong Ulrich The program is now more of a financial advice show, similar to The Suze Orman Show.
On the Money was reduced from a daily 10pm program, to a single Saturday night airing (at 8pm ET) effective June 1, 2009. On August 25, 2009, CNBC announced that it would be canceling the program for the second time, shifting resources to their more successful documentary unit.
This program is not to be confused with the current program On the Money produced by CNBC for broadcast syndication. That program was retitled as On the Money with Maria Bartiromo in January 2013 from The Wall Street Journal Report after the end of the NBC/Dow Jones partnership deal, then cut down to the first part of the title upon Bartiromo's departure from CNBC in late November 2013 for Fox Business Network.
About the program
In its original format, On the Money wrapped up the day's news from the worlds of business and everyday life, took a closer look at the money in every story. On the Money literally followed the money through everything from breaking news to politics, to pop culture, and even sports.
The later weekly format was more of a financial advice show, with Carmen Wong Ulrich giving financial advice to viewers through phone calls and email, as is traditional with financial talk radio programming.
History
On the Money, which originally started as a nightly business news program, premiered as "Hurricane Katrina: Crisis and Recovery" (which was hosted by Bill Griffeth) on August 29, 2005, replacing reruns of Late Night with Conan O'Brien. Five weeks later (October 5), the program rechristened as On the Money. Dylan Ratigan, who previously hosted Bullseye (which ended its run on March 11 of that year), was given the hosting duties for the latter as well.
On July 6, 2006, On the Money debuted a new look, which included the program's second logo, a new set, and new graphics. The entire graphics package was designed and redesigned in house at CNBC. Gary Keenan and by Felix Thoo of Creative Group, a post production house in NYC created some promotional work for a prior version of the graphics.
Ratigan, who was the original host of this program since October 3, 2005, left the program in December 2006 in preparation for his nightly hosting duties on Fast Money, which redebuted as a nightly series on January 8, 2007
|
https://en.wikipedia.org/wiki/Centre%20for%20Development%20of%20Advanced%20Computing
|
The Centre for Development of Advanced Computing (C-DAC) is an Indian autonomous scientific society, operating under the Ministry of Electronics and Information Technology.
History
C-DAC was created in November 1987, initially as the Centre for Development of Advanced Computing Technology (C-DACT). In 1988, the US Government refused to sell India a Cray supercomputer due to concerns about India using it to develop nuclear weapons. In response India started development of its own supercomputer, and C-DACT was created as part of this programme.
Dr Vijay Bhatkar was hired as the director of C-DACT. The project was given an initial run of three years and an initial funding of 30,00,00,000, the cost of a Cray supercomputer.
A prototype computer was benchmarked at the 1990 Zurich Super-computing Show. It demonstrated that India had the second most powerful, publicly demonstrated, supercomputer in the world after the United States.
The final result of the effort was the PARAM 8000, released in 1991.
The National Centre for Software Technology, Electronic Research and Development Centre and CEDTI were merged into C-DAC in 2003.
Research activities
Originally established to research and assemble High Performance Computers, the research of C-DAC now includes:
High Performance Computing
Grid Computing
Cloud Computing
Multilingual and Heritage Computing
VLSI and Processor design
Embedded Systems
Speech and Natural Language Processing
Information and Cyber Security
Ubiquitous Computing
Bioinformatics
Geomatics
Digital forensics
Big data analytics
Blockchain
Health Informatics
Quantum computing
Centres
C-DAC branches and training centres include:
C-DAC Pune (Headquarters)
C-DAC Mumbai
C-DAC Bangalore
C-DAC Chennai
C-DAC Delhi
C-DAC Kolkata
C-DAC Patna
C-DAC Mohali
C-DAC Noida
C-DAC Hyderabad
C-DAC Thiruvananthapuram
C-DAC Silchar
Education and training
C-DAC provides several courses in the field of advanced computing and software development. Among these are the HPC certification course- C-DAC Certified HPC Professional Certification Programme (CCHPCP). C-DAC organises advanced computing diploma programmes through the Advanced Computing Training School (ACTS) located all over India. The PG Diploma courses include
Specialisations in Embedded System Design,
VLSI,
Big Data Analytics,
Geoinformatics,
Artificial Intelligence
C-DAC has also established Centres of Excellence in Information Technology (CEIT) abroad under the Ministry of External Affairs' s development partnership projects.
Products and developments
PARAM series of supercomputers
VEGA Microprocessors, India's first indigenous 64-bit Multi-core Superscalar Out-of-Order RISC-V Processor
M-Kavach 2, an android-based mobile device security solution addressing emerging threats.
Mobile Seva AppStore, a mobile app marketplace
Bharat Operating System Solutions, a Linux-based general purpose operating system
Anvaya, a workflow environment for automated g
|
https://en.wikipedia.org/wiki/Orroral%20Valley%20Tracking%20Station
|
The Orroral Valley tracking station was an Earth station in Australia, supported Earth-orbiting satellites, as part of NASA's Spacecraft Tracking and Data Acquisition Network (STADAN). It was located approximately 50 km south of Canberra, Australian Capital Territory (ACT), and was one of three tracking stations in the ACT, and seven in Australia.
Construction of the site commenced shortly after site selection in 1963 and was completed in May 1965. It was home to a 26 m antenna and several smaller VHF and microwave frequency antennas.
The main requirement of the station, as distinct from the long-range communication tasks of Tidbinbilla and Honeysuckle Creek, was to be able to quickly switch from supporting one satellite to another. The signal received from satellites in Earth orbit are relatively strong but view periods are short, a few minutes being typical. Many of the supported satellites used different systems for transmitting data, or for receiving commands so the station had to cope with a variety of equipment for support of the individual satellites. Data from the satellites were recorded on magnetic tape and air-freighted to the United States for study.
The station supported the joint Apollo-Soyuz project in 1975, which saw American astronauts and Soviet cosmonauts link in Earth orbit and conduct joint experiments in space. In April 1981, Orroral tracking station supported the Space Shuttle Columbia. It provided telecommunication support to Space Shuttle missions until its closure in 1985.
The 26 m telescope was moved in 1985 to Tasmania, Australia, and now forms the core of the Mount Pleasant Radio Observatory run by the School of Mathematics and Physics, University of Tasmania.
In 2018, Orroral Valley Tracking Station was the endpoint for the annual ANU Inward Bound.
In 2019, a paraglider landed at the Orroral Valley Tracking Station and was promptly attacked by a wild kangaroo. The pilot suffered no injuries from the attack.
See also
Spacecraft Tracking and Data Acquisition Network
Canberra Deep Space Communication Complex
Carnarvon Tracking Station
Honeysuckle Creek Tracking Station
References
Apollo program facilities
Space Shuttle facilities
NASA facilities in Australia
NASA radio communications and spacecraft tracking facilities
Earth stations in the Australian Capital Territory
1965 establishments in Australia
1985 disestablishments in Australia
|
https://en.wikipedia.org/wiki/CDAC
|
CDAC may refer to:
Commission on Dental Accreditation of Canada
Communicating with Disaster Affected Communities Network
Canadian American Railroad
Centre for Development of Advanced Computing
Chinese Development Assistance Council, a self-help and non-profit organization set up by the Chinese community in Singapore to help the lower-income group and academically-weak students
|
https://en.wikipedia.org/wiki/Minifloat
|
In computing, minifloats are floating-point values represented with very few bits. Predictably, they are not well suited for general-purpose numerical calculations. They are used for special purposes, most often in computer graphics, where iterations are small and precision has aesthetic effects. Machine learning also uses similar formats like bfloat16. Additionally, they are frequently encountered as a pedagogical tool in computer-science courses to demonstrate the properties and structures of floating-point arithmetic and IEEE 754 numbers.
Minifloats with 16 bits are half-precision numbers (opposed to single and double precision). There are also minifloats with 8 bits or even fewer.
Minifloats can be designed following the principles of the IEEE 754 standard. In this case they must obey the (not explicitly written) rules for the frontier between subnormal and normal numbers and must have special patterns for infinity and NaN. Normalized numbers are stored with a biased exponent. The new revision of the standard, IEEE 754-2008, has 16-bit binary minifloats.
Notation
A minifloat is usually described using a tuple of four numbers, (S, E, M, B):
S is the length of the sign field. It is usually either 0 or 1.
E is the length of the exponent field.
M is the length of the mantissa (significand) field.
B is the exponent bias.
A minifloat format denoted by (S, E, M, B) is, therefore, bits long.
In computer graphics minifloats are sometimes used to represent only integral values. If at the same time subnormal values should exist, the least subnormal number has to be 1. The bias value would be in this case, assuming two special exponent values are used per IEEE.
The (S, E, M, B) notation can be converted to a (B, P, L, U) format as (with IEEE use of exponents).
Example 8-bit float
A minifloat in 1 byte (8 bit) with 1 sign bit, 4 exponent bits and 3 significand bits (in short, a 1.4.3 minifloat) is demonstrated here. The exponent bias is defined as 7 to center the values around 1 to match other IEEE 754 floats so (for most values) the actual multiplier for exponent is . All IEEE 754 principles should be valid.
Numbers in a different base are marked as ..., for example, 101 = 5. The bit patterns have spaces to visualize their parts.
Alternative bias values
At these small sizes other bias values may be interesting, for instance a bias of -2 will make the numbers 0-16 have the same bit representation as the integers 0-16, with the loss that no non-integer values can be represented.
0 0000 000 = 0.0002 × 21 - (-2) = 0.0 × 23 = 0 (subnormal number)
0 0000 001 = 0.0012 × 21 - (-2) = 0.125 × 23 = 1 (subnormal number)
0 0000 111 = 0.1112 × 21 - (-2) = 0.875 × 23 = 7 (subnormal number)
0 0001 000 = 1.0002 × 21 - (-2) = 1.000 × 23 = 8 (normalized number)
0 0001 111 = 1.1112 × 21 - (-2) = 1.875 × 23 = 15 (normalized number)
0 0010 000 = 1.0002 × 22 - (-2) = 1.000 × 24 = 16 (normalized number)
Representation of zero
Zero is represented
|
https://en.wikipedia.org/wiki/Georg%20Nees
|
Georg Nees (23 June 1926 – 3 January 2016) was a German academic who was a pioneer of computer art and generative graphics. He studied mathematics, physics and philosophy in Erlangen and Stuttgart and was scientific advisor at the SEMIOSIS, International Journal of semiotics and aesthetics. In 1977, he was appointed Honorary Professor of Applied computer science at the University of Erlangen Nees is one of the "3N" computer pioneers, an abbreviation that has become acknowledged for Frieder Nake, Georg Nees and A. Michael Noll, whose computer graphics were created with digital computers.
Early life and studies
Georg Nees was born in 1926 in Nuremberg, where he spent his childhood. He showed scientific curiosity and interest in art from a young age and among his favorite pastimes were viewing art postcards and looking through a microscope. He attended a school in Schwabach near Nuremberg, graduating in 1945. From 1945 to 1951, he studied mathematics and physics at the University of Erlangen then worked as an industry mathematician for the Siemens Schuckertwerk in Erlangen from 1951 to 1985. There he started to write his first programs in 1959. The company was later incorporated into the Siemens AG.
From 1964 onwards, he studied philosophy at the Technische Hochschule Stuttgart (since 1967 the University of Stuttgart), under Max Bense. He received his doctorate with his thesis on Generative Computergraphik under Max Bense in 1969. His work is considered one of the first theses on Generative Computer Graphics. In 1969, his thesis was published as a book entitled "Generative Computergraphik" and also included examples of program code and graphics produced thereby. After his retirement in 1985 Nees worked as an author and in the field of computer art.
Computer art
In February 1965, Nees showed - as works of art - the world's first computer graphics created with a digital computer. The exhibition, titled computer graphik took place at the public premises of the "Study Gallery of Stuttgart College". In 1966, he started to work on "computer-sculptures". In the catalog of the Biennale 1969 Nuremberg, Nees describes how the computer program controlled the milling machine so that instead of a workpiece, a sculpture was created. Three painted wooden sculptures and several graphics were shown at the Biennale 1969 Nuremberg. In 1970 at the 35th Venice Biennale his work was part of the special exhibition "Research and Design. Proposals for an experimental exposure" and showcased his sculptures and graphics of art and architectural design.
In 1963, Nees was instrumental in the purchase of a flatbed plotter, the Zuse Graphomat Z64 designed by Konrad Zuse, for the data center at the Schuckertwerke in Erlangen. At the exhibition Georg Nees – The Great Temptation at the ZKM Nees said: ″There it was, the great temptation for me, for once not to represent something technical with this machine but rather something ‘useless’ – geometrical patterns.″
Using the ALG
|
https://en.wikipedia.org/wiki/Debug%20%28command%29
|
The line-oriented debugger DEBUG.EXE is an external command in operating systems such as DOS, OS/2 and Windows (only in 16-bit/32-bit versions).
DEBUG can act as an assembler, disassembler, or hex dump program allowing users to interactively examine memory contents (in assembly language, hexadecimal or ASCII), make changes, and selectively execute COM, EXE and other file types. It also has several subcommands which are used to access specific disk sectors, I/O ports and memory addresses.
Overview
Traditionally, all computers and operating systems have included a maintenance function, used to determine whether a program is working correctly. DEBUG was originally written by Tim Paterson to serve this purpose in 86-DOS. When Paterson began working for Microsoft in the early 1980s he brought the program with him. DEBUG was part of and has been included in MS-DOS/PC DOS and certain versions of Microsoft Windows. Originally named DEBUG.COM, the executable was renamed into DEBUG.EXE with MS-DOS 3.2.
Windows XP and later versions included DEBUG for the MS-DOS subsystem to maintain MS-DOS compatibility. The 16-bit DOS commands are not available on 64-bit editions of Windows.
The MS-DOS/PC DOS DEBUG has several limitations:
In assembly/disassembly modes it only supports 8086 opcodes.
It can only access 16-bit registers and not 32-bit extended registers.
When the "N" subcommand for naming files is used, the filename is stored from offset DS:5D to DS:67 (the Program Segment Prefix File Control Block area), meaning that the program can only save files in FAT 8.3 filename format.
Enhanced DEBUG packages include the DEBUG command in Novell DOS 7, OpenDOS 7.01 and DR-DOS 7.02 and higher, a reimplementation of Digital Research's former Symbolic Instruction Debugger SID/SID86, which came with former versions of DR DOS. It is fully compatible with the DEBUG command line syntax of MS-DOS/PC DOS, but offers many enhancements, including supporting 16-bit and 32-bit opcodes up to the Pentium, an extended mode (/X) with dozens of additional commands and sub-modes, a much enhanced command line syntax with user-definable macros and symbolic debugging facilities with named registers, loaded symbol tables, mathematical operations and base conversions, as well as a commenting disassembler. Some versions also utilized DPMS to function as a "stealth mode" protected-mode debugger.
The FreeDOS version of DEBUG was developed by Paul Vojta and is licensed under the MIT License.
A 32-bit clone "DEBUGX" version supporting 32-bit DPMI programs exists as well. Andreas "Japheth" Grech, the author of the HX DOS extender, developed enhanced DEBUG versions 0.98 to 1.25, and former PC DOS developer Vernon C. Brooks added versions 1.26 to 1.32.
Syntax
DEBUG [[drive:][path] filename [parameters]]
When DEBUG is started without any parameters the DEBUG prompt, a "-" appears. The user can then enter one of several one or two-letter subcommands, including "A" to enter the assemble
|
https://en.wikipedia.org/wiki/Blokus%20Portable%3A%20Steambot%20Championship
|
Blokus Portable: Steambot Championship, known in Japan as , is a 2005 puzzle video game developed and published by Irem Software Engineering for the PlayStation 2 and later ported to the PlayStation Portable in Japan. The PlayStation Portable version was later published outside Japan by Majesco Entertainment. It is based on the board game Blokus and features characters from Steambot Chronicles (known in Japan as Bumpy Trot). Like in Steambot Chronicles, players are able to customize the appearance of their characters.
Gameplay
Each player receives a pile of blocks that resemble polyominoes. Players must place blocks on the board starting at the corners and then extend it from the corners of the pieces they have placed. The game is over when no one can place any more pieces. The player with the fewest pieces remaining wins.
Reception
In Japan, Famitsu gave the PlayStation 2 version a score of two sixes and two fives, for a total of 22 out of 40. Elsewhere, the PSP version received "mixed" reviews according to video game review aggregator Metacritic.
References
External links
Blokus Portable: Steambot Championship at Majesco Entertainment America
Blokus Portable: Steambot Championship at Majesco Entertainment Europe
2005 video games
Irem games
Majesco Entertainment games
Multiplayer and single-player video games
PlayStation 2 games
PlayStation Portable games
Puzzle video games
Tomcat System games
Video game spin-offs
Video games based on board games
Video games developed in Japan
Video games with gender-selectable protagonists
|
https://en.wikipedia.org/wiki/AATF
|
AATF may refer to:
Air Assault Task Force, a computer wargame
Airport and Airway Trust Fund, a fund for the federal commitment to the USA's aviation system
American Association of Teachers of French, a professional organisation for teachers of French in the United States
Apoptosis antagonizing transcription factor, a human gene
|
https://en.wikipedia.org/wiki/Free%20State%20Stars%20F.C.
|
Free State Stars Football club is a South African professional football club based in Bethlehem, Free State that plays in the National First Division. Formerly known as Makwane Computer Stars, Fairway Stars and Qwa Qwa Stars, their most significant honour is winning the 1994 Coca-Cola Cup and 2018 Nedbank Cup.
The club sold their National First Division status to Casric F.C. at the start of the 2022–23 season. Following the sale of Bloemfontein Celtic the previous year, this left the Free State without any representatives in professional football.
History
Founded in 1977 in a small village of Makwane in an area then known as QwaQwa, the club gained promotion to the National Premier Soccer League in 1986.
The team won the league cup (then known as The Coca-Cola Cup) in 1994 with Bunene Ngaduane leading the scoring charts.
To avoid fixture congestion the club's franchise was sold to the Premier Soccer League in 2002.
The following year, Mike Mokoena revived the club as he bought and renamed the franchise of National First Division side Maholosiane. FS Stars regained their Premiership status in 2005 after winning the Mvela Golden League.
After a disappointing season in the top-flight, with the first team finishing bottom of the table, the club was relegated. The 2006–07 season however proved to be a huge success with Stars dominating the First Division and securing promotion to the Premier League once again.
They also won the inaugural Baymed Cup in December 2006 beating FC AK in the final.
Shirt sponsor & kit manufacturer
Shirt sponsor:
Kit manufacturer: Lotto
Honours
Nedbank Cup:
Winners – 2018
Coca-Cola Cup:
Winners – 1994
Baymed Cup:
Winners – 2006
Mvela Golden League:
Champions – 2004–05, 2006–07
Second Division:
Champions – 1985
Club records
Most appearances: Edward Salomane 299
Most goals: Bunene Ngaduane 79
Most capped player: Kennedy Mweene
Most appearances in a season: Themba Sithole 45 (1992)
Most goals in a season: Bunene Ngaduane 19 (1993)
Record win: 8–1 v Ikapa Sporting (29 March 2008, Nedbank Cup)
Record loss: 1–7 v Arcadia (31 October 1986, NSL), 1–7 v Mamelodi Sundowns (19 April 1998, PSL)
Premier Soccer League record
2018–19 – 16th (relegated)
2017–18 – 6th
2016–17 – 14th
2015–16 – 12th
2014–15 – 9th
2013–14 – 14th
2012–13 – 7th
2011–12 – 6th
2010–11 – 9th
2009–10 – 13th
2008–09 – 4th
2007–08 – 5th
2005–06 – 16th (relegated)
2001–02 – 11th (bought out)
2000–01 – 6th
1999–2000 – 15th
1998–99 – 6th
1997–98 – 9th
1996–97 – 13th
Club officials
Chairman: Mike Mokoena Deceased 17 June 2020
General manager: Rantsi Mokoena
Football manager: Kootso Mokoena
First team squad
Updated 16 May 2020
Notable former coaches
Milo Bjelica (1992)
Clive Hachilensa (2005–07)
Kinnah Phiri (1 July 2007 – 8 May 2008)
David Duncan (1 July 2008 – 18 Aug 2008)
Owen Da Gama (19 Aug 2008 – 7 Oct 2008)
Themba Sithole (14 Oct 2008 – 17 Nov 2008)
Steve Komphela (18 Nov 2008 – 30 June 2009)
Themba Sithole (interim) (1 July 2009 –
|
https://en.wikipedia.org/wiki/Operational%20Control%20Language
|
Operational Control Language (OCL) is the control language of the IBM System/3, System/32, System/34 and System/36 minicomputer family. It is supported on IBM i's System/36 Environment for backwards compatibility purposes. It is similar to the older control languages JCL (System/370), and unrelated to the later Control Language (System/38 and IBM AS/400), and REXX (AS/400).
Overview
OCL statements are used to directly load user or system programs into memory, assign system resources to them, and transfer system control to them in a process called execution. The fact that a program is stored on a computer's disk drive does not in itself cause the computer to process or execute the program.
OCL statements can be entered manually from the keyboard, but are generally stored as a procedure member. A procedure member is a freely editable member within a library, it is a source file. On the S/32, S/34, and S/36, procedures are not compiled, they are interpreted.
Example
OCL statements usually begin with two slashes and at least one space character. Here's an example of a procedure stored on a System/36 as member PROC1:
** Procedure PROC1 Optional documentation
**
** Written by Joe User 2006-05-29
**
**
// * 'PROC1 procedure is running'
// * ' '
// IFF ACTIVE-'PROC2,PROC3' GOTO OKAY
** IFF means 'if false'
** ACTIVE-'name1,name2' means true
** if at least one of the listed programs is currently running
** GOTO xxx means skip to the statement
** that has a TAG xxx and resume processing
// PAUSE 'Cannot continue because other Payroll is running'
** Halts execution with a message
// CANCEL Stops execution of this procedure
// TAG OKAY
// IFF DATAF1-PFILE1 IFF DATAF1-PFILE2 GOTO NODELT
// * 'Caution, Pay Data Exists' Displays information on terminal
// * ' '
// * 'Press 1 to continue and DELETE existing files'
// IFF '1'=?1R? CANCEL A parameter is indicated by question marks surrounding a number
** Using 1R between question marks indicates
** that the parameter is required
** and processing waits for user input.
** CANCEL means immediately go to end of job.
// LOAD $DELET $DELET is used to delete files
// RUN
** This program requires and processes, consumes,
** succeeding statements as data up until an END statement
// IF DATAF1-PFILE1 SCRATCH UNIT-F1,LABEL-PFILE1
** Conditionally deletes an existing disk file
// IF DATAF1-PFILE2 SCRATCH UNIT-F1,LABEL-PFILE2
// END
**
// TAG NODELT
// LOAD PR101 PR101 could be an RPG or COBOL p
|
https://en.wikipedia.org/wiki/Tarbell
|
Tarbell may refer to:
USS Tarbell (DD-142), a US Navy destroyer
Tarbell Cassette Interface, for storing computer data on audio cassette
Tarbell Course in Magic, an encyclopedia of magic written by Harlan Tarbell
People with the surname Tarbell:
Edmund C. Tarbell (1862–1938), American impressionist painter
Frank Bigelow Tarbell (1853–1920), American historian and archeologist
Harlan Tarbell (1890–1960), American stage magician and illustrator
Ida Tarbell (1857–1944), American author and journalist
Jim Tarbell (fl. 1940s–2010s), Cincinnati councilman
Jonathan Tarbell (1820–1888), Justice of the Supreme Court of Mississippi
Joseph Tarbell (1780–1815), American naval officer
See also
Tarbell Brook, a New Hampshire stream
Tarball (disambiguation)
|
https://en.wikipedia.org/wiki/List%20of%20Macmillan%20Ways
|
The Macmillan Ways are a network of long-distance footpaths in England that link points on the Bristol Channel, English Channel and North Sea. They are promoted to raise money for Macmillan Cancer Relief, a charity.
The Macmillan Ways are:
The Macmillan Way - Abbotsbury in Dorset to Boston, Lincolnshire ;
The Macmillan Way West from Castle Cary in Somerset to Barnstaple in Devon, (Boston to Barnstaple is );
The Macmillan Abbotsbury Langport Link, which creates a short-cut for walkers from Abbotsbury to Barnstaple, a total of ;
The Macmillan Cross Cotswold Pathway from Banbury to Bath, , mostly on the main Macmillan Way;
The Cotswold Link, from Banbury to Chipping Campden where it links to the Cotswold Way National Trail
The Cross Britain Way, from Barmouth to Boston across Wales and England, launched in 2014
See also
List of long-distance footpaths in the United Kingdom
External links
Long-distance footpaths in England
Macmillan Ways
Macmillan Ways
|
https://en.wikipedia.org/wiki/Mark%20H.%20Walker
|
Mark H. Walker is a writer and board wargame designer. He has written articles about information technology and video games for publications including AutoWeek, PC Gamer, Computer Gaming World, Armchair General, and Playboy and websites such as GameSpy and Science Fiction Weekly.
Background
Walker spent over 23 years in the U.S. Navy, (17 years active and 6 in the Naval Reserve) reaching the rank of Commander. He has a master's degree in Warfighting and International Relations from the Naval War College.
Writing
Walker has written or co-authored dozens of computer-related books, including the official game guides for several computer games.
His first novel, A Craving for Blood (), was published on October 2, 2006. He has since published two novels, World at War: Revelation and Everyone Dies in the End, as well as several short stories.
Game designs
Walker designed an award-winning series of board wargames called Lock 'n Load. The games are squad-level wargames in which a counter can represent a squad, a vehicle or a person such as a sniper or a commanding officer. The first of these games, Lock 'n Load: Forgotten Heroes: Vietnam was published by Shrapnel Games in 2003. Lock 'n Load: ANZAC Attack, an expansion pack was released in 2004. Lock ’n Load: Band of Heroes, published in 2006 by Matrix Games, is set during World War II. Both Forgotten Heroes and Band of Heroes were voted best boardgame of the year by readers of The Wargamer.
Walker subsequently designed the award-winning Mark H. Walker's World at War. A platoon-level game system set in an alternate history in which NATO and Warsaw Pact fought a Third World War beginning in May 1985. The game system ties in with Walker's novel World at War: Revelation, which tells the tale of the darker side of the war, mixing military adventure with elements of horror and paranormal events.
In 2010 Walker, then the owner of Lock 'n Load Publishing, published a third tactical series with the release of Nations at War: White Star Rising, a platoon-level game set in Western Europe between 1944-45.
Walker also designed several smaller board wargames for free publication in Armchair General Magazine, although none of them were particularly challenging to hardcore gamers.
Publishing companies
Lock 'n Load Publishing: From June of 2006 until March of 2013, Walker owned Lock 'n Load Publishing. Under his ownership the company released 61 products. After the company's sale, Walker remained with the firm as a designer until November 2014.
Flying Pig Games: In December 2014, Walker announced the founding of a new company, Flying Pig Games.
References
External links
Walker's personal web site
Living people
Year of birth missing (living people)
Board game designers
American game designers
21st-century American novelists
American male novelists
|
https://en.wikipedia.org/wiki/Artillery%20sound%20ranging
|
In land warfare, artillery sound ranging is a method of determining the coordinates of a hostile battery using data derived from the sound of its guns (or mortar or rockets) firing, so called target acquisition.
The same methods can also be used to direct artillery fire at a position with known coordinates, so called fire control.
It is an application of sound (or acoustic) location, which is location of the source of sounds that may originate in the air, on the ground or on or below the water's surface. Sound ranging was one of three methods of locating hostile artillery that rapidly developed in World War I. The others were aerial reconnaissance (visual and photographic) and flash spotting.
A sound ranger used aural and stop-watch methods which first emerged before World War I. Stop-watch methods involved spotting a gun firing, measuring the bearing to it and the length of time it took the sound to arrive. Aural methods typically involved a person listening to a pair of microphones a few kilometres apart and measuring the time between the sound arriving at the microphones. This method appears to have been used by the Germans throughout that war, but was quickly discarded as ineffective by the western allies, who developed scientific methods of sound ranging whose descendants are still used.
The basis of scientific sound ranging is to use a sensor post, consisting of at least a pair of microphones, to produce a bearing to the source of the sound. When using a number of sensor posts, the intersection of these bearings gives the location of the battery. The bearings are derived from the differences in the time of arrival at the microphones located in each of these sensor posts.
Typically, the sensor posts have three microphones placed in a triangular shape, typical size around 10 meters, a distance needed to obtain optimal signal to noise ratio in the lower frequency range.
Since 2018, a new approach is being developed, using socalled Acoustic Multi Mission Sensors, that contain both microphones and particle velocity sensors.
As the particle velocity sensors have broad banded directionality, also for lower frequencies, the large (ground based) sensor post can be shrunk to the size of a "molehill".
Background
Basic equipment setup
A scientific method of sound ranging system requires the following equipment.
An array of 4 to 6 microphones extending several kilometres
A system capable of measuring the sound wave arrival time differences between the microphones.
A means of analyzing the time differences to compute the position of the sound source.
The basic method is to use microphones in pairs and measure the difference in the time of arrival of a sound wave at each microphone in the pair (inner microphones are members of two pairs). From this a bearing to the origin of the sound can be found from the point midway between the two microphones. The intersection of at least three bearings will be the location of the sound source.
F
|
https://en.wikipedia.org/wiki/RBT
|
RBT may refer to:
Computing
Red–black tree, in computer science
Residual block termination, in cryptography
Risk-based testing, in software testing
Other uses
Random breath test or sobriety checkpoints
RBT (TV series), an Australian docuseries
Residence-based taxation
Ringback tone, in telephony
|
https://en.wikipedia.org/wiki/Dragon%20User
|
Dragon User was a British magazine for users of the Dragon 32/64 computers published from 1982 by Sunshine Publications. Production of the computers themselves had ceased by 1985 but the user community remained sufficiently active to justify the magazine's continuation until 1989.
Publication
From its launch until June 1986, Dragon User appeared on the shelves of major newsagents such as WHSmith in a full-colour glossy picture cover. A number of different editors were involved during this initial period, including Brendon Gore, Martin Croft and John Cook. From July 1986, the magazine was available only by subscription and the cover changed to a simple red and black print with a contents listing on the front. Hereafter, Dragon User was edited by Helen Armstrong. In June 1988, publication moved from Sunshine at Little Newport Street, London to Dragon Publications, an operation set up by software producer Bob Harris specifically to continue the magazine. Helen Armstrong remained Editor. This new venture did not last long, however. By the new year, only 1500 or so of the subscribers had renewed compared to about 2400 the year before. Insufficient money was available to send any further issues to print and so the final Dragon User was the January 1989 issue. Armstrong seemed genuinely surprised by the sudden lack of interest and her final editorial column was a slightly bitter apology to the remaining user base, urging them to support the National Dragon Users Group (NDUG) and the other remaining independent Dragon publications.
Content
Dragon User followed a fairly standard model for computer magazines of the time: news, software and book reviews, technical Q+A, a number of regular columns and many program listings (in those days it was common for magazines to print the text of programs written in BASIC to be laboriously typed in by the reader). Special features, such as interviews with prominent figures in the software world were also quite common and of course there were many advertisements, mostly for Microdeal, the largest Dragon software producer.
Before November 1984, the software reviews were in the form of a continuous column written by John Scriven. Thereafter, the reviews appeared in a section called "Dragonsoft" where each program was reviewed separately and given a score of 1 to 5 Dragons. Various writers contributed reviews from then on, most notably Jason Orbaum, but also established Dragon programmers like Pam D'Arcy and Roy Coates.
Regular Columns
Bob Liddil's Magic Software Machine (Launch-June 1984) - a fantastical account of a user's adventures with his talking computer
Mike Gerrard's Adventure Trail (August 1984 - January 1989) - Reviews and tips for text adventures, a popular genre of the time. The column was eventually taken over by Mike's brother Pete
Expert's Arcade Arena (May 1986 - January 1989) - tips and cheats for realtime interactive games from an anonymous "expert" who was, in reality, Jason Orbaum.
Dragon Answ
|
https://en.wikipedia.org/wiki/OPIE%20Authentication%20System
|
OPIE is the initialism of "One time Passwords In Everything".
Opie is a mature, Unix-like login and password package
installed on the server and the client which makes untrusted networks safer against password-sniffing packet-analysis software like dSniff and safe against shoulder surfing.
It works by circumventing the delayed attack method because the same password is never used twice after installing Opie.
OPIE implements a one-time password (OTP) scheme based on S/KEY, which will require a secret passphrase (not echoed) to generate a password for the current session, or a list of passwords you can print and carry on your person.
OPIE uses an MD4 or MD5 hash function to generate passwords.
OPIE can restrict its logins based on IP address. It uses its own passwd and login modules.
If the Enter key is pressed at the password prompt, it will turn echo on, so what is being typed can be seen when entering an unfamiliar password from a printout.
OPIE can improve security when accessing online banking at conferences, hotels and airports. Some countries require banks to implement OTP.
OPIE shipped with DragonFly BSD, FreeBSD and OpenSUSE. It can be installed on a Unix-like server and clients for improved security.
The commands are
opiepasswd
opiekey
See also
OTPW
External links
OPIE @ Linux wiki
Opie text from FreeBSD Manual
Cryptographic software | Password authentication
|
https://en.wikipedia.org/wiki/WICZ-TV
|
WICZ-TV (channel 40) is a television station in Binghamton, New York, United States, affiliated with Fox and MyNetworkTV. Owned by Imagicomm Communications, the station has studios on Vestal Parkway East (NY 434) in Vestal, and its transmitter is located on Ingraham Hill Road in the town of Binghamton.
History
The station signed on November 1, 1957, as WINR-TV, the area's second television station, and aired an analog signal on UHF channel 40. The station was originally owned by the then-Rochester-based Gannett Company, which purchased the station's construction permit along with NBC Radio Network affiliate WINR (680 AM) in January of that year. The WINR stations were part of a newspaper-broadcast combination owned by Gannett in Binghamton, operating alongside the Binghamton Press. Upon its purchase of WINR, the Press went to work towards completing the construction of channel 40, and used its pages to educate readers on how to receive the new UHF signal. At its sign-on WINR-TV was primarily an NBC television affiliate, though it also carried some ABC programming before WBJA-TV (channel 34, now WIVT) went on the air in 1962.
Gannett announced on July 30, 1970, that it would sell its Binghamton broadcasting interests, while retaining the Binghamton Press. Broadcast tower manufacturer Stainless, Inc. acquired WINR-TV as part of this divestiture. Upon receiving approval of the sale, the station changed its call letters to the current WICZ-TV (for company owner Henry Guzewicz) on April 7, 1971. That fall, the station moved to an tower on Ingraham Hill; it had previously shared a transmitter location with WINR radio.
In November 1995, WICZ-TV announced it would be dropping its NBC affiliation and switching to Fox; the station stated that the switch would allow it to expand its news programming. WICZ already had a secondary affiliation with Fox to carry Fox Kids, which resulted in the station beginning to preempt much of NBC's programming (especially its daytime soap operas). Prior to the station's affiliation with Fox, the network's two closest over-the-air affiliates were Syracuse affiliate WSYT and Scranton affiliate WOLF-TV, neither of which had a strong signal to cover the city of Binghamton proper owing to the area's rugged terrain. The majority of Fox's programming was only available on cable via Foxnet, WOLF-TV, or New York City owned-and-operated station WNYW, depending on the location. The affiliation change took place April 4, 1996, after WICZ's contract with NBC expired. NBC programming was then seen on cable via a localized version of Elmira's WETM-TV; the network regained an over-the-air affiliate in Binghamton a year later when WETM's owners, Smith Broadcasting, purchased WBGH-LP (channel 8, now WBGH-CD channel 20) and made it a semi-satellite of WETM.
Stainless, whose holdings by this point included its tower manufacturing business, WICZ-TV, and KTVZ in Bend, Oregon, was sold to Northwest Broadcasting for $17 million in 1997. Thoug
|
https://en.wikipedia.org/wiki/KDUS
|
KDUS (1060 kHz) is a commercial AM radio station licensed to Tempe, Arizona, and serving the Phoenix metropolitan area. It airs a sports radio format and is an affiliate of the SportsMap network. It is owned by Hubbard Broadcasting, Inc., with the license held by Phoenix FCC License Sub, LLC. Its studios are on North 52nd Street west of Papago Park.
By day, KDUS is powered at 5,000 watts non-directional. But 1060 AM is a clear channel frequency. So at night, it reduces power to 500 watts to avoid interference with Class A stations KYW Philadelphia and XEEP Mexico City. It uses a directional antenna with a three-tower array after sunset. The transmitter is on Calle Bella Vista near Interstate 10 in Guadalupe. The station can also be heard on HD Radio receivers at 100.7 FM KSLX-FM-HD2.
History
MOR and Top 40
The station signed on the air on . The original call sign was KUPD (pronounced Cupid). It was owned by the Tri-State Broadcasting Co. and by the 1960s featured Phoenix veteran disc jockey Bill Heywood in the morning. KUPD had a full-service Middle of the Road (MOR) format. It competed with KOY 550 AM.
As the Top 40 format became more popular, KUPD flipped to a contemporary hits sound in the early 1970s. Around 1971, the station added a simulcast on 97.9 KUPD-FM, which remained Top 40 until about 1978 when the FM station switched to album rock and became a dominant presence in the Phoenix radio market.
The flip of KUPD-FM to rock sparked 1060 AM to also change. It became KKKQ "The New KQ" under Program Director Steve Casey, formerly with Top 40 leader KHJ Los Angeles and later one of the co-creators of MTV. KKKQ played oldies with a less talk, more music approach. The staff included Joe Bailey - mornings; Don Richards - Middays; Steve Casey - Afternoons. Don Richards would later take over as PD when Steve Casey left for MTV.
R&B, Country, Alternative
In the 1980s and early 1990s, AM 1060 cycled through various musical formats such as R&B 'KQ' from 1981 to 1987. The call letters slightly changed to KUKQ after a public outcry about having 'KKK' in the call letters for an R&B station. It then tried country music as "KQ Country") from 1987 to 1989. Then it flipped to alternative rock from 1989 to 1993.
During this time, KUKQ's original license was not renewed as the result of a 1988 comparative renewal hearing for KUKQ and KUPD-FM. Both stations lost their original licenses for lying to the Federal Communications Commission (FCC) about an alleged secret owner. An additional owner was ruled unfit to hold a license due to a 1982 criminal conviction in Arizona. The stations were instead awarded to former owner Jack Grimm, his wife Jackie, Ruth Clifford, and radio executive Robert Fish, doing business as G&C Broadcasting. In 1992, G&C took over KUKQ and KUPD-FM on new licenses, retaining the call letters, facilities and formats of the stations.
Talk and Sports
The new owners switched to a talk radio format in 1993. The statio
|
https://en.wikipedia.org/wiki/Avobenzone%20%28data%20page%29
|
References
Chemical data pages
Chemical data pages cleanup
|
https://en.wikipedia.org/wiki/Adaptive%20Simpson%27s%20method
|
Adaptive Simpson's method, also called adaptive Simpson's rule, is a method of numerical integration proposed by G.F. Kuncir in 1962. It is probably the first recursive adaptive algorithm for numerical integration to appear in print, although more modern adaptive methods based on Gauss–Kronrod quadrature and Clenshaw–Curtis quadrature are now generally preferred. Adaptive Simpson's method uses an estimate of the error we get from calculating a definite integral using Simpson's rule. If the error exceeds a user-specified tolerance, the algorithm calls for subdividing the interval of integration in two and applying adaptive Simpson's method to each subinterval in a recursive manner. The technique is usually much more efficient than composite Simpson's rule since it uses fewer function evaluations in places where the function is well-approximated by a cubic function.
Simpson's rule is an interpolatory quadrature rule which is exact when the integrand is a polynomial of degree three or lower. Using Richardson extrapolation, the more accurate Simpson estimate for six function values is combined with the less accurate estimate for three function values by applying the correction . So, the obtained estimate is exact for polynomials of degree five or less.
Mathematical Procedure
Defining Terms
A criterion for determining when to stop subdividing an interval, suggested by J.N. Lyness, is
where is an interval with midpoint , while , , and given by Simpson's rule are the estimates of , , and respectively, and is the desired maximum error tolerance for the interval.
Note, .
Procedural Steps
To perform adaptive Simpson's method, do the following: if , add and to the sum of Simpson's rules which are used to approximate the integral, otherwise, perform the same operation with and instead of .
Numerical consideration
Some inputs will fail to converge in adaptive Simpson's method quickly, resulting in the tolerance underflowing and producing an infinite loop. Simple methods of guarding against this problem include adding a depth limitation (like in the C sample and in McKeeman), verifying that in floating-point arithmetics, or both (like Kuncir). The interval size may also approach the local machine epsilon, giving .
Lyness's 1969 paper includes a "Modification 4" that addresses this problem in a more concrete way:
Let the initial interval be . Let the original tolerance be .
For each subinterval , define , the error estimate, as Define . The original termination criteria would then become .
If the , either the round-off level have been reached or a zero for is found in the interval. A change in the tolerance ε0 to ε′0 is necessary.
The recursive routines now need to return a D level for the current interval. A routine-static variable {{math|1=E' = 180 ε'''0 / (B - A)}} is defined and initialized to E.
(Modification 4 i, ii) If further recursion is used on an interval:
If round-off appears to have been reached, change the E' to
|
https://en.wikipedia.org/wiki/List%20of%20University%20of%20California%2C%20Davis%20alumni
|
This page lists notable alumni of the University of California, Davis.
Academics
University presidents
Professors
Science
Astronauts
Tracy Caldwell Dyson
Stephen K. Robinson
Computer science
Engineering
Economics
Ahmad Faruqui, defense analyst and economist
Masami Imai, Japanese economist
Timothy Francis McCarthy, financial services chief executive
Mahmoud Solh, Lebanese agricultural economist and genetic scientist; Director General of the International Center for Agricultural Research in the Dry Areas
Biology
Geosciences
Christopher G. Newhall, volcanologist
Gabriel Filippelli, biogeochemist
Other
Arts, entertainment, and literature
Fine art
Music
Literature
Film and television
Comedy
Bruce Baum, comedian
Tim Lee, comedian
Hasan Minhaj, comedian
Other
Jenny Cho, broadcaster
Jenn Im, fashion and beauty vlogger
Meghan Kalkstein, broadcast journalist
Tiffany Lam, beauty queen, Miss Hong Kong 2002
Mike Pondsmith, game designer
Henry Wofford, SportsNet Central anchor/reporter for Comcast SportsNet in San Francisco
Athletics
Olympians
Baseball
Basketball
Football
Nick Aliotti, defensive coordinator for University of Oregon
Mike Bellotti, former head football coach for the University of Oregon
Rolf Benirschke, placekicker for the San Diego Chargers of the NFL
Bob Biggs, former head coach for UC Davis
Chris Carter, former wide receiver for Seattle Seahawks
Jonathan Compas, former NFL offensive lineman, Tampa Bay Buccaneers
Kevin Daft, offensive coordinator for UC Davis
Bo Eason, safety for the Houston Oilers of the NFL
Daniel Fells, tight end for the Denver Broncos
Bakari Grant, wide receiver for Calgary Stampeders
Mark Grieb, quarterback for the San Jose Sabercats of the Arena Football League
Daryl Gross, Athletic Director, Syracuse University
Nathaniel Hackett, offensive coordinator for the Buffalo Bills
Ejiro Evero defensive coordinator for the Denver Broncos
Paul Hackett, former head coach for University of Pittsburgh and University of Southern California
Dan Hawkins, former head coach for the University of Colorado and Boise State, current head coach of UC Davis Aggies football
Khari Jones, Arena Football League and Canadian Football League quarterback and sports reporter
Bryan Lee-Lauduski, former quarterback for Iowa Barnstormers
Brad Lekkerkerker, offensive lineman for the Oakland Raiders of the NFL
Cory Lekkerkerker, offensive lineman for the Los Angeles Chargers of the NFL
Chris Mandeville, defensive back
Rich Martini, former wide receiver for Oakland Raiders
Casey Merrill, NFL defensive end
Mike Moroski, NFL quarterback for the Atlanta Falcons and San Francisco 49ers
Ken O'Brien, 11-year quarterback for the New York Jets and Philadelphia Eagles, first round selection in 1983 NFL Draft
J. T. O'Sullivan, former quarterback for the New Orleans Saints and Cincinnati Bengals
Chris Petersen, former head coach for the University of Washington and Boise State
Frank Scalercio, forme
|
https://en.wikipedia.org/wiki/SPARCstation%20ZX
|
The SPARCstation ZX is a computer workstation produced by Sun Microsystems and launched in August 1993. It was end-of-lifed in March 1994. The original price was USD $19,995.00.
The SPARCstation ZX was identical to the SPARCstation LX, with the addition of a Sun ZX (also known as LEO) accelerated 3D framebuffer card. This was a double-width, double-decked SBus card providing 24-bit color and a performance of 750,000 3D vectors per second and 310,000 triangle mesh/second.
See also
SPARCstation
SPARCstation LX
References
Sun-4/10/15/30 Handbook
Exciting New Graphics, Imaging And Video Solutions On Sun, SunFLASH, Vol 55 #7
Sun workstations
SPARC microprocessor products
|
https://en.wikipedia.org/wiki/Vet%20Emergency%202
|
Vet Emergency 2 is a PC CD-ROM computer game in which the player is a veterinarian and must take care of animals, earning points for treatment and efficiency. It was created by Legacy Interactive, and is the sequel to Vet Emergency.
References
External links
2003 video games
Medical video games
Video game sequels
Video games developed in the United States
Windows games
Windows-only games
Legacy Games games
|
https://en.wikipedia.org/wiki/Ken%20Knowlton
|
Kenneth Charles Knowlton (June 6, 1931 – June 16, 2022) was an American computer graphics pioneer, artist, mosaicist and portraitist. In 1963, while working at Bell Labs, he developed the BEFLIX programming language for creating bitmap computer-produced movies. In 1966, also at Bell Labs, he and Leon Harmon created the computer artwork Computer Nude (Studies in Perception I).
Early life and education
Kenneth Charles Knowlton was born to Frank and Eva (Reith) Knowlton in Springville, New York, on June 6, 1931. He completed high school one year early, then entered Cornell University to study engineering physics. After finishing his undergraduate degree, he continued to a master's degree. He completed his M.S. in 1955; the title of his thesis was "X-Ray Microscopy with a Modified RCA Electron Microscope."
In 1962, Knowlton earned his Ph.D. degree from the Department of Electrical Engineering at the Massachusetts Institute of Technology in 1962 under the supervision of Victor Yngve. His thesis was titled "Sentence Parsing with a Self-Organizing Heuristic Program".
Career
In 1963, Knowlton developed the BEFLIX (Bell Flicks) programming language for bitmap computer-produced movies, created using an IBM 7094 computer and a Stromberg-Carlson 4020 microfilm recorder. Each frame contained eight shades of grey and a resolution of 252 x 184. Knowlton worked with artists, including Stan VanDerBeek and Lillian Schwartz. He and VanDerBeek created the Poem Field animations. Knowlton also created another programming language named EXPLOR (EXplicit Patterns, Local Operations and Randomness).
In 1966, he prepared an animated film as an introduction to the Bell Telephone Laboratories' Low-Level Linked List Language (L6).
In 1966, Knowlton and Leon Harmon were experimenting with photomosaics, creating large prints from collections of small symbols or images. In Computer Nude (Studies in Perception I) they created an image of a reclining nude (choreographer Deborah Hay), by scanning a photograph with a camera and converting the analog voltages to binary numbers, which were assigned typographic symbols based on halftone densities. It was printed in The New York Times on October 11, 1967, as the first full frontal nude published in the paper, and exhibited at one of the earliest computer art exhibitions, The Machine as Seen at the End of the Mechanical Age, held at the Museum of Modern Art in New York City from November 25, 1968, through February 9, 1969. The artwork in Studies in Perception also launched Robert Rauschenberg's Experiments in Art and Technology (E.A.T.). In 1969, Knowlton and Harmon continued the series with Gulls (Studies in Perception II) and Gargoyle (Studies in Perception III).
Knowlton's work had been previously exhibited at Cybernetic Serendipity, an exhibition held at the Institute of Contemporary Arts in London from August 2 to October 20, 1968.
Knowlton co-invented Ji Ga Zo with Mark Setteducati, released in the United States on March
|
https://en.wikipedia.org/wiki/Professionals%20in%20the%20City
|
Professionals in the City (commonly known as PNC) is a socializing and networking private organization based out in Washington, DC, with branches in New York City, Los Angeles, Philadelphia, Baltimore, and Boston.
It was founded in 1999 by Michael Karlan, who serves as the incumbent president of the organization. PNC has 200,000 members and hosts more than 1,000 events a year.
History
The organization was established in 1999 in Washington D.C. by Michael Karlan, an American attorney and social entrepreneur. From the beginning, it started as a social club for various events, including singles dinners, museum outings, wine tastings, and paintball trips.
In 2020, during the COVID-19 pandemic and lockdown restrictions in the United States, PNC switched to "virtual speed dating" by using video-conferencing applications such as Zoom.
Organization and activities
PNC consistently organizes community events in Washington DC, Baltimore, Boston, Los Angeles, New York, and Philadelphia. It hosts events showcasing cities' diverse offerings, including their nightlife, arts, cultural and sporting events, and neighborhoods. Many of the events have a matchmaking focus, such as speed dating. The organization also hosts various local dating coaches who give seminars on general principles of dating and attraction, as well as specific topics, such as body language. PNC is also known for organizing dating events for various ethnic, age and LGBT groups.
References
External links
Professionals in the City website
Michael Karlan website
Organizations based in Washington, D.C.
Clubs and societies in the United States
|
https://en.wikipedia.org/wiki/Ancient%20Society
|
Ancient Society is an 1877 book by the American anthropologist Lewis H. Morgan. Building on the data about kinship and social organization presented in his 1871 Systems of Consanguinity and Affinity of the Human Family, Morgan develops his theory of the three stages of human progress, i.e., from Savagery through Barbarism to Civilization. Contemporary European social theorists such as Karl Marx and Friedrich Engels were influenced by Morgan's work on social structure and material culture, as shown by Engels' The Origin of the Family, Private Property, and the State (1884).
The concept of progress
The dominant idea of Morgan's thought is that of progress. He conceived it as a career of social states arranged in a scale on which man has worked his way up from the bottom. Progress is historically true of the entire human family, but not uniformly. Different branches of the family have evidenced human advancement to different conditions. He thought the scale had universal application or substantially the same in kind, with deviations from uniformity ... produced by special causes. Morgan hopes therefore to discern the principal stages of human development.
Morgan arrived at the idea of a society's progress in part through analogy to individual development. It is an ascent to human supremacy on the earth. The prime analogate is an individual working his way up in society; that is, Morgan, who was well read in classics, relies on the Roman cursus honorum, rising through the ranks, which became the basis of the English ideas of career and working your way up, to which he blends in the rationalist idea of a scala, or ladder, of life. The idea of growth or development is also borrowed from individuals. He proposed that a society has a life like that of an individual, which develops and grows.
He gives the analogy an anthropological twist and introduces the comparative method coming into vogue in other disciplines. Lewis names units called ethna, by which he means inventions, discoveries and domestic institutions. The ethna are compared and judged higher or lower on the scale, pair by pair. Morgan's ethna appear to comprise at least some of Edward Burnett Tylor's cultural objects. Morgan mentions Tylor a number of times in the book.
Morgan's standard of higher or lower is not clearly expressed. By higher he appears to mean whatever contributes better to control over the environment, victory over competitors, and spread of population. He does not mention Charles Darwin's theory of evolution, but Darwin referred to Morgan's work in his own.
The lines of progress
The substitutions of ethna better than the previous follow several lines of progress. Morgan admits to a deficit in knowledge of language development, which he does not think important. The little knowledge he shares can be found in Chapter 3. His brief scheme is in fact speculative only. Many Sino-Tibetan languages and Tai–Kadai languages, which may appear to non-speakers be "monosyllabic",
|
https://en.wikipedia.org/wiki/Fantasy%20television
|
Fantasy television is a genre of television programming featuring elements of the fantastic, often including magic, supernatural forces, or exotic fantasy worlds. Fantasy television programs are often based on tales from mythology and folklore, or are adapted from fantasy stories in other media. The boundaries of fantasy television often overlap with science fiction and horror but also realistic fiction.
Genre and subgenres
Similar to the difficulty faced by scholars of fantasy film, classifying a television program as fantasy can be somewhat problematic given the fluid boundaries of the genre. Not all programs with fantastic elements may qualify as fantasy. Children's programs in particular often feature fantastic elements that do not qualify the program as fantasy, such as the giant talking avian Big Bird of the popular PBS series Sesame Street. Nevertheless, some critics classify certain children's programs that feature traditional fantasy elements such as barbarian characters, wizards, and magic swords as part of the genre. See, for example, He-Man and the Masters of the Universe.
Programs for general audiences may also be difficult to classify. The program The Twilight Zone presented a series of unrelated stories, some of which were works of science fiction and some of which were tales of fantasy. The more generic term "speculative fiction" might be appropriate for such shows. Other series blend the fantasy and horror genres, such as Buffy the Vampire Slayer and Angel. And still other programs feature dream sequences or other surreal elements, yet would not be considered fantasy shows by most fans or critics. Some of these programs serve as examples of the magical realism genre rather than fantasy, such as HBO's Six Feet Under, which featured a realistic setting except for occasional scenes in which living and dead characters interact. In the United Kingdom, the term "telefantasy" is used as an umbrella term to collectively describe all types of programs that feature elements of the fantastic.
Some critics consider Superhero programs to be works of fantasy ("Superhero fantasy"), but others classify them as science fiction and still others consider them to be their own genre of programming. See, for example Wonder Woman and Lois & Clark. Proper classification is similarly ambiguous for the Tokusatsu superhero programs from Japan, such as Magical Squadron Magic Ranger.
A wide variety of fantasy subgenres have been represented on television, both as original series and as television broadcasts of fantasy films. Typical examples of original programming in various subgenres include:
Comic fantasy: Bewitched, I Dream of Jeannie, Sabrina the Teenage Witch, My Babysitter's A Vampire
Contemporary fantasy: Buffy the Vampire Slayer, Angel, Charmed, True Blood, Lost, Heroes, Supernatural, The Secret Circle, The Vampire Diaries, Once Upon a Time, Grimm
High fantasy: The Sci-Fi Channel's Earthsea miniseries, Game of Thrones, Alif La
|
https://en.wikipedia.org/wiki/KUIL-LD
|
KUIL-LD (channel 12.5) is a low-power television station in Beaumont, Texas, United States, affiliated with MyNetworkTV. It is owned by Tegna Inc. alongside dual ABC/NBC affiliate KBMT (channel 12). Both stations share studios along I-10/US 69/US 96/US 287 in Beaumont, while KUIL-LD's transmitter is located in Mauriceville, Texas.
KUIL-LD formerly had a translator, K27JJ-D, in Warren.
History
The station went on the air as KUIL-LD (the former KUIL) on analog channel 64 in 2003 as the market's first Fox affiliate. The station was originally owned by National Communications, owner of KVHP in Lake Charles, Louisiana. Prior to 2003, KVHP served Beaumont and Port Arthur as the local Fox affiliate, in addition to Lake Charles (due to its transmitter being located halfway between Beaumont and Lake Charles); KUIL was established as a way to provide local programming just for that region, plus alternate coverage of sports that are more relevant to the Beaumont market (such as Houston Texans and Dallas Cowboys football). At the outset, KUIL also held a secondary affiliation with UPN; when UPN and The WB merged into The CW, KFDM added The CW to its digital subcarrier channel, leaving KUIL as solely a Fox affiliate.
In November 2007, KUIL signed on a digital signal on channel 36 (K36ID-D, now KUIL-LD) near Orange, Texas, to help cover the Orange area where the analog 64 signal could not reach.
On October 24, 2008, it was announced that then-NBC affiliate KBTV-TV would become a Fox affiliate on January 1, 2009, indicating that KUIL lost the affiliation at that time. Despite early reports of KUIL pursuing the NBC affiliation, competing station KBMT would broadcast NBC programming on a digital subchannel. As a result, after the Fox affiliation ceased, KUIL became an independent station. To address the 10% of the schedule previously provided by Fox, the station began to add some local programming, some of which would be produced by Lamar University and additional sitcoms like Scrubs. The station adopted The U as its identity, using the same moniker and logo as unrelated station WCIU-TV in Chicago.
On August 3, 2010, the station launched Azteca América on a new 4th digital subchannel, becoming the first Spanish-language television station offered in the Golden Triangle.
In May 2010, London Broadcasting revealed that the company was developing a state network, MYTX, using subchannels like KUIL's .2 (now KBMT-LD .2) operated by KBMT. MYTX would share Texas news and sports and productions from 41 Entertainment, which was owned by London.
By April 2012, KBMT assumed operations of KUIL through a local service agreement with owner Blue Bonnet. The station at the time was a MyNetworkTV affiliate. Earlier in the year, KUIL had added MeTV. In May 2013, KBMT added another hour of 12News Daybreak to KUIL at 7 AM continuing the show from KBMT and KJAC. The call letters were changed to KBMT-LD on February 28, 2018; the KUIL-LD call sign was concurrently moved to K36I
|
https://en.wikipedia.org/wiki/VKT
|
Vkt or VKT may mean:
Vakarų Kompiuteriniai Tinklai, Western Computer Networks
Всероссийская конфедерация труда, the All-Russian Confederation of Labour
VKT-line, a Finnish defence line during the World War II.
Standard abbreviation for Vuokatti railway station in Finland.
Vehicle Kilometers Traveled.
Vestfold Kollektivtrafikk, the public transport authority for Vestfold, Norway
IATA airport code for Vorkuta Airport
VKT - Valtion Kivääritehdas, the Finnish State Arsenal located in Jyväskylä. 1951 it went into the Valmet conglomerate.
|
https://en.wikipedia.org/wiki/Sparq
|
Sparq may refer to:
SPARQL, programming language
SPARQCode, standard encoding for the contents of a QR barcode
SPARQ Training, creators of a standardized test for athleticism
SyQuest SparQ drive, a short-lived (1998–1999) removable-disk hard drive
See also
Spark (disambiguation)
|
https://en.wikipedia.org/wiki/MDDL
|
MDDL (Market Data Definition Language) is an XML-based messaging format for exchanging information related to
Financial Instruments
Corporate events related to the financial instruments
Market-related data
MDDL was developed by FISD (Financial Information Services Division) of SIIA (Software & Information Industry Association). The initiative for the use of XML in market data exchange was started in 2000 and has been gaining industry-wide acceptance.
External links
archived MDDL web site (9-2-2014)
The Book: MDDL and the Quest for a Market Data Standard
Financial industry XML-based standards
Financial software
|
https://en.wikipedia.org/wiki/Quibble
|
A quibble may refer to:
a trivial objection
a pun, or play on words
Quibble (plot device), in narratology
Quibble (computing), a quad nibble
|
https://en.wikipedia.org/wiki/Task%20Manager%20%28Windows%29
|
Task Manager, previously known as Windows Task Manager, is a task manager, system monitor, and startup manager included with Microsoft Windows systems. It provides information about computer performance and running software, including name of running processes, CPU and GPU load, commit charge, I/O details, logged-in users, and Windows services. Task Manager can also be used to set process priorities, processor affinity, start and stop services, and forcibly terminate processes.
The program can be started in recent versions of Windows by pressing and then typing in taskmgr.exe,or by typing , or by pressing and clicking Task Manager, by pressing , by using Windows Search in the Start Menu and typing taskmgr, by right-clicking on the Windows taskbar and selecting "Task Manager", by typing taskmgr in the File Explorer address bar, or by typing taskmgr in Command Prompt or Windows PowerShell.
Task Manager was introduced in its current form with Windows NT 4.0. Prior versions of Windows NT, as well as Windows 3.x, include the Task List application, are capable of listing currently running processes and killing them, or creating new processes. Windows 9x has a program known as Close Program which lists the programs currently running and offers options to close programs as well shut down the computer.
Functionality
Since Windows 8, Task Manager has two views. The first time Task Manager is invoked by a user, it shows in a simplified summary mode (described in the user experience as Fewer Details). It can be switched to a more detailed mode by clicking More Details. This setting is remembered for that user on that machine.
Since at least Windows 2000, the CPU usage can be displayed as a tray icon in the task bar for quick glance.
Summary mode
In summary mode, Task Manager shows a list of currently running programs that have a main window. It has a "more details" hyperlink that activates a full-fledged Task Manager with several tabs.
Right-clicking any of the applications in the list allows switching to that application or ending the application's task. Issuing an end task causes a request for graceful exit to be sent to the application.
Processes and details
The Processes tab shows a list of all running processes on the system. This list includes Windows Services and processes from other accounts. The Delete key can also be used to terminate processes on the Processes tab. By default, the processes tab shows the user account the process is running under, the amount of CPU, and the amount of memory the process is currently consuming. There are more columns that can be shown. The Processes tab divides the process into three categories:
Apps: Programs with a main window
Windows processes: Components of Windows itself that do not have a main window, including services
Background process: Programs that do not have a main window, including services, and are not part of the Windows itself
This tab shows the name of every main window and every se
|
https://en.wikipedia.org/wiki/Cada%20ma%C3%B1ana
|
Cada mañana () was a morning television program on the Azteca 13 television network in Mexico, which aired from July 2000 to 2005.
History
Cada mañana debuted on July 24, 2000. It was hosted by Leonardo Daniel, Laura Luz, Luz Blanchet, Ana María Alvarado and Paco Lala's, and Darío T. Pie. Daniel left in mid-August, after less than a month on air, and was replaced by actor Omar Fierro; Fierro would leave the program in December 2001 after a dispute with Blanchet and to produce programming for the new Azteca América network in the United States. He was replaced by Francisco de la O.
In November 2003, Laura Luz left for personal reasons. Her place was first taken by Betty Monroe, who became pregnant; she was then replaced by Venezuelan actress Ana La Salvia, who soon became pregnant as well. Blanchet departed the show in July 2004 as part of a relaunch that brought Flans singer Mimí and Francisco de la O on as hosts.
In November 2005, Ingrid Coronado was announced as a new presenter, beginning December 5; de la O would instead host another program for TV Azteca. However, a much larger overhaul was on its way; the program and Con sello de mujer, a women's program, were replaced by Venga la Alegría on January 2, 2006, with Coronado, La Salvia, and Fernando del Solar hosting.
References
Azteca Uno original programming
2000 Mexican television series debuts
2005 Mexican television series endings
Mexican television talk shows
Television series by TV Azteca
|
https://en.wikipedia.org/wiki/Luz%20Blanchet
|
Luz Blanchet (born Luz Blanchet Enríquez de Rivera in Mexico City) is a Mexican TV host she started her career on the network TeleHit.
She also participated on the shows Cada Mañana and Con sello de mujer.
Luz has had long term experience in the media in addition to her career as a graphic designer, studying at the Universidad Iberoamericana. This led to several recognitions as a designer, with an honourable mention during her professional career. Her work was displayed at the Franz Mayer Museum and published at an international level in the book Lo Mejor del Diseño Gráfico de Latinoamérica y el Caribe (Translated: The Best of Latin American and Caribbean Graphic Design).
Television career
She began her career as a TV host in Clásicos, broadcast by TeleHit, Nuevo día, Festival Acapulco. For eleven years, she hosted several shows such as Domingo azteca, Festival Viña del Mar, Fin de siglo, Unidos por la honestidad, Premios Principio, Semana de la Radio y Televisión; and later Con sello de mujer and Gente con chispa.
Later, she became the leader of the Cada mañana project, which she left it on July 23, 2004.
In 2008, she was part of the show called Póker de reinas
She is now separated from her husband Pedro Eguia
Since 2011, she has hosted the Fox Life program Luz en casa in which she makes beautiful home decorations quick and cheap .
She also shares her experiences with his conference "Hablándole a la Pared" (Speaking to the Wall) and "Tres Luces con Madre".
Currently 2018 she has a participation with her weekly section LÚZete at Programa HOY, magazine tv show from Televisa México.
References
External links
Luz en Casa
Mexican television presenters
Mexican women television presenters
1966 births
Living people
Mass media people from Mexico City
|
https://en.wikipedia.org/wiki/Banker%27s%20algorithm
|
Banker's algorithm is a resource allocation and deadlock avoidance algorithm developed by Edsger Dijkstra that tests for safety by simulating the allocation of predetermined maximum possible amounts of all resources, and then makes an "s-state" check to test for possible deadlock conditions for all other pending activities, before deciding whether allocation should be allowed to continue.
The algorithm was developed in the design process for the THE operating system and originally described (in Dutch) in EWD108. When a new process enters a system, it must declare the maximum number of instances of each resource type that it may ever claim; clearly, that number may not exceed the total number of resources in the system. Also, when a process gets all its requested resources it must return them in a finite amount of time.
Resources
For the Banker's algorithm to work, it needs to know three things:
How much of each resource each process could possibly request ("MAX")
How much of each resource each process is currently holding ("ALLOCATED")
How much of each resource the system currently has available ("AVAILABLE")
Resources may be allocated to a process only if the amount of resources requested is less than or equal to the amount available; otherwise, the process waits until resources are available.
Some of the resources that are tracked in real systems are memory, semaphores and interface access.
The Banker's algorithm derives its name from the fact that this algorithm could be used in a banking system to ensure that the bank does not run out of resources, because the bank would never allocate its money in such a way that it can no longer satisfy the needs of all its customers. By using the Banker's algorithm, the bank ensures that when customers request money the bank never leaves a safe state. If the customer's request does not cause the bank to leave a safe state, the cash will be allocated, otherwise the customer must wait until some other customer deposits enough.
Basic data structures to be maintained to implement the Banker's algorithm:
Let be the number of processes in the system and be the number of resource types. Then we need the following data structures:
Available: A vector of length m indicates the number of available resources of each type. If Available[j] = k, there are k instances of resource type Rj available.
Max: An × matrix defines the maximum demand of each process. If Max[i,j] = k, then Pi may request at most k instances of resource type Rj.
Allocation: An × matrix defines the number of resources of each type currently allocated to each process. If Allocation[i,j] = k, then process Pi is currently allocated k instances of resource type Rj.
Need: An × matrix indicates the remaining resource need of each process. If Need[i,j] = k, then Pi may need k more instances of resource type Rj to complete the task.
Note: Need[i,j] = Max[i,j] - Allocation[i,j].
n=m-a.
Example
Total system resources are:
A B C D
|
https://en.wikipedia.org/wiki/Pocket%20Paint
|
Pocket Paint is the Windows CE version of the raster graphics editor Microsoft Paint accessory commonly included with the Windows operating system. Because it is written to run on the leaner Windows CE operating system, it lacks a few of the features found in its bigger brother for the desktop. The only image format supported is BMP.
Pocket Paint was bundled as part of Microsoft's Handheld PC and Palm-size PC Power Toys for Windows CE. Like the desktop Power Toys, the applications included in this freeware distribution were not officially supported by Microsoft, although most if not all were written by the operating system developers.
Pocket Paint has not been included with any of Microsoft's next-generation Power Toys for the CE operating system, such as the Pocket PC platform, and appears to be abandoned.
See also
Comparison of raster graphics editors
Microsoft Fresh Paint
External links
Review of Pocket Paint
Download Pocket Paint with the Plus! Pack for Handheld PC
Raster graphics editors
|
https://en.wikipedia.org/wiki/Arnie%20II
|
Arnie II, developed by Zeppelin Games in 1993, is a computer game and sequel to Arnie. It was written by David Sowerby with graphics by Neil Hislop. The music was created by Andrew Rodger. The game's manual says that "Arnie has been chosen to perform four missions that require stealth, skill and extreme violence."
The muscleman shoots and bombs his way through four enemy-infested territories:
Shutting down a chemical plant by blowing up enough pipeline valves.
Clearing an airfield of enemy soldiers, tanks and helicopters.
Climbing from battleship to battleship in a hostile harbour.
Rescuing as many prisoners as possible from a jungle POW camp.
There are enemies on every level, from simple infantry armed with rifles, mortars or rocket launchers to machine team teams, missile batteries and tanks. Most of the opponents are stationary and stolidly fire in a single direction; however, foxholes release cannon-fodder at a constant rate.
To destroy such nests or to efficiently dispatch groups of soldiers, Arnie has a limited supply of grenades. Some dead foes drop more powerful weapons as well as invaluable first aid kits and extra lives.
Although the game's name alludes to Arnold Schwarzenegger, Arnie II is not a licensed title and is not based on any movie.
Reception
Commodore Force thought this was a disappointing sequel, criticising the poorly implemented isometric perspective and weak enemy AI. It received a score of 57%.
References
1993 video games
Amiga games
DOS games
Shoot 'em ups
Commodore 64 games
Video games developed in the United Kingdom
|
https://en.wikipedia.org/wiki/NVD
|
NVD may refer to:
Avion Express, Lithuania (ICAO airline code)
Dutch Zoo Federation (Dutch: )
HD NVD, a High-definition video standard
National Vulnerability Database
Night vision device
Party for Neighbourly Love, Freedom, and Diversity (Dutch: ), a Dutch political party with only three known members forced by legal action to use the initials "PNVD" instead of "NVD"
Normal vaginal delivery
|
https://en.wikipedia.org/wiki/WNBA%20on%20ESPN
|
The WNBA on ESPN refers to the presentation of Women's National Basketball Association games on the ESPN family of networks. Under the title of WNBA Tuesday, games are broadcast throughout the WNBA season on Tuesday nights on ESPN2.
Background
In June 2003, the WNBA signed a new six-year agreement with ABC Sports and ESPN to televise regular-season games and playoff games from 2003 through 2008. It was also announced that ESPN2 would televise a half-hour pre-game show before each broadcast.
In June 2007, the WNBA signed another contract extension with ESPN. The new television deal ran from 2009 to 2016. A minimum of 18 games would be broadcast on ABC, ESPN, and ESPN2 each season. Additionally, a minimum of 11 postseason games would be broadcast on any of the three stations.
Along with this deal came the first ever rights fees to be paid to a women's professional sports league. WNBA president Donna Orender and John Skipper, ESPN vice president for content, gave no exact figure but said it was worth "millions and millions of dollars".
Beginning with the 2009 WNBA season, all nationally broadcast WNBA games are shown in high definition.
On March 28, 2013, ESPN and the WNBA announced they had extended their agreement through 2022. Under the agreement, there will be up to 30 games a year televised on ABC, ESPN or ESPN2 each season, including the Finals. Although the financial terms of the deal were not stated by ESPN or the WNBA, Sports Business Daily reported that sources said the deal was worth $12 million a year. In 2014, ESPN and the WNBA renegotiated the television rights deal to $25 million per year.
Announcers
Announcers change from year to year, but recent play-by-play personalities have included Terry Gannon, Mark Jones, Marc Kestecher, Beth Mowins, Dave Pasch, Ryan Ruocco, Pam Ward and Bob Wischusen. Generally, game broadcasts include a pair of announcers—alongside those providing play-by-play are the color analysts which have included Doris Burke, Andrea Joyce, Kara Lawson, Nancy Lieberman, Lisa Malosky, Ann Meyers, Stephanie Ready, LaChina Robinson, Carolyn Peck, Rebecca Lobo.
These broadcasts also commonly include a sideline reporter. Recent sideline reporters have included Heather Cox, Andrea Joyce, Lisa Malosky, Stephanie Ready, Holly Rowe, Michele Tafoya and Rebecca Lobo.
During halftime of the broadcasts, Cindy Brunson and more recently Doris Burke provide game analysis and other sports updates.
Wired
One unique aspect of WNBA coverage on the ESPN family of networks is that many of the participants wear live microphones. Starting with the 2003 WNBA All Star Game (which aired on ABC), most games televised have involved coaches, players and referees being wired for sound. On some occasions, the sound of players and coaches talking will overlap with commentary; also, on several occasions, ESPN has had to mute the sound because of expletives.
Controversy
During the 2006 WNBA Finals, Detroit Shock head coach, and former ESPN NBA
|
https://en.wikipedia.org/wiki/Random%20map
|
In video games, a random map is a map generated randomly by the computer, usually in strategy games. Random maps are often the core of single and multiplayer gameplay, aside from story based campaigns that are often shipped with the game. Each new game presents an unknown map, providing a new experience to the player, and an even playing field in multiplayer gaming. Random maps typically have a certain theme - for example a naval random map with many small islands, or a 'gold rush' map with a large amount of gold in the center of the map. The type of random map may also influence the game's artificial intelligence, with the AI employing different strategies optimized for each random map.
Methods for generating such maps vary depending upon the topography of the game itself. A game which requires natural landscapes may use fractal subdivision to create convincing terrain, whereas a game set inside a structure such as a dungeon may use two-dimensional maze algorithms. Some games allow the players to make their own random map scripts (RMS), a form of game modification. Random map scripts provide instructions for generating the map, such as terrain types, resource locations, and many other factors. Random maps can also be used by scenario designer to unlock previously unavailable units. For example in Age of Empires II, designers have used RMS to unlock new terrains and units. The unit-terrain combination of fish on shoreless water is one such application of this technique. Another example is Empire Earth, where an unused dark red coloured cliff can be unlocked through a custom random map script.
See also
Procedural generation
Sources
Video game gameplay
|
https://en.wikipedia.org/wiki/Tanisha%20Harper
|
Tanisha Harper is an American model, actress and television host. She made her screen debut in the 2006 romantic comedy-drama film Something New and later starred in the MyNetworkTV series Desire. Harper was runner-up in the sixth season of the reality competition series Project Runway in 2009 and worked as a fashion model the following years. Harper returned to television playing Jordan Ashford in the ABC daytime soap opera, General Hospital (2022—present).
Early life
Harper was born in Tokyo, Japan. She is of mixed Cherokee and African American descent. At the age of 15 she was discovered in a shopping mall in her hometown of Phoenix, Arizona. At that time, she began her successful modeling career with the Ford Model Agency.
Career
Modeling
At the age of 15, Harper began working in print, runway, and commercial modeling and fashion jobs. She has done editorials for numerous magazines, including, Elle, Cosmopolitan, Vanity Fair, and In Style. She has appeared in adverts and catalogs for companies such as, L'Oréal, Smashbox, MAC Cosmetics, Ralph Lauren, Oscar de la Renta, and Tommy Hilfiger'.
She has appeared on both the Oprah Winfrey and Tyra Banks show, and was interviewed by Katie Couric on The Today Show. She also competed as a model during the sixth season of Project Runway, finishing in second place, behind eventual winner Irina Shabayeva's model Kalyn Hemphill. During the show, she was mostly paired with designer Althea Harper, who also finished second.
Acting
Harper made her first television appearance in 2005, playing Spectra Model in an episode of CBS daytime soap opera, The Bold and the Beautiful. She made another The Bold and the Beautiful in 2010, playing Jackie M. model in one episode. In 2006 she made her big screen debut playing the role of Stacey in the film romantic comedy-drama film Something New. Later that year, Harper starred as series regular on the MyNetworkTV prime time soap opera, Desire. In 2008 she had secondary role in the comedy film Forgetting Sarah Marshall. Ten years ago, Harper guest-starred on Dear White People and Hacks.
In February 2022, Deadline Hollywood announced that Harper had been cast in the role of Jordan Ashford on the ABC soap opera, General Hospital replacing Vinessa Antoine. she will make her first appearance in March.
Filmography
References
External links
Female models from Arizona
American television actresses
Living people
American actresses of Japanese descent
African-American female models
American female models
African-American models
African-American television personalities
American people who self-identify as being of Cherokee descent
African-American actresses
American film actresses
21st-century African-American people
21st-century African-American women
20th-century African-American people
20th-century African-American women
Year of birth missing (living people)
American soap opera actresses
|
https://en.wikipedia.org/wiki/Negation%20%28disambiguation%29
|
Negation is a connective in logic and an operation computing that maps true to false and false to true.
Negation may also refer to:
Negation (linguistics), a grammatical operation by which a proposition is replaced by one that states the opposite, as by the addition of not
Negation (comics), a CrossGen comic
The Negation, a 2004 album by the Polish metal band Decapitated
Negationism, an illegitimate historical revisionist process that minimizes, denies or ignores essential facts
Negation (poem), a 1918 poem by Wallace Stevens
Negation (algebra), negation proper in various algebraic structures
Negation (arithmetic), the operation in mathematics that maps positive numbers to negative numbers and vice versa, also known as sign change and opposite number
Negative number
Minus sign
See also
Negative (disambiguation)
|
https://en.wikipedia.org/wiki/Ikarus%20%28chess%29
|
Ikarus is a computer chess program created by brothers Munjong and Muntsin Kolss.
History
Development
Development began in 1997 and it competed in its first ICGA event in 1998 at the 9th World Computer Chess Championship, held in Paderborn, finishing in 26th place with 2 points from 7 games. Three years later in Maastricht it performed much more strongly, finishing in eighth place with 4.5/9 and scoring 5/9 for sixth place in the World Computer Speed Chess Championship.
Champion of the World
Ikarus won the World Computer Speed Chess Championship, held in Turin in May 2006. It finished in ninth place at the World Championship main event.
References
Chess engines
|
https://en.wikipedia.org/wiki/International%20gateway%20exchange
|
In telephony, an international gateway exchange is a telephone switch that forms the gateway between a national telephone network and one or more other international gateway exchanges, thus providing cross-border connectivity.
Requirements
Whereas international gateway exchanges are commonly implemented using hardware that could also serve to build a Class 4 (national transit) switch, some of the differences between an international gateway exchange and a Class 4 switch include:
International variants of signalling protocols, such as International ISUP and #5, in addition to the relevant national signalling protocols.
Support for echo cancellers.
Support for DCME
Support for international accounting and settlement agreements.
Support for A-law/mu-law transcoding
High capacity (some of the largest telephone exchanges in the world are international gateway exchanges).
Support for the numbering plans of each of the countries that may be dialed.
Advanced traffic routing capabilities, in order to take advantage of the best available tariffs for each destination.
Telephone exchanges
|
https://en.wikipedia.org/wiki/Comparison%20of%20file%20systems
|
The following tables compare general and technical information for a number of file systems.
General information
Metadata
Features
File capabilities
Block capabilities
Note that in addition to the below table, block capabilities can be implemented below the file system layer in Linux (LVM, , cryptsetup) or Windows (Volume Shadow Copy Service, SECURITY), etc.
Resize capabilities
"online" and "offline" are synonymous with "mounted" and "not mounted".
Allocation and layout policies
OS support
Limits
While storage devices usually have their size expressed in powers of 10 (for instance a 1 TB Solid State Drive will contain at least 1,000,000,000,000 (1012, 10004) bytes), filesystem limits are invariably powers of 2, so usually expressed with IEC prefixes. For instance, a 1 TiB limit means 240, 10244 bytes. Approximations (rounding down) using power of 10 are also given below to clarify.
See also
List of file systems
Comparison of file archivers
List of archive formats
Comparison of archive formats
Notes
References
External links
A speed comparison of filesystems on Linux 2.4.5 (archived)
Filesystems (ext3, reiser, xfs, jfs) comparison on Debian Etch (April 23, 2006)
Block allocation strategies of various filesystems
What are the (dis)advantages of ext4, ReiserFS, JFS, and XFS? - Unix & Linux Stack Exchange
File systems
|
https://en.wikipedia.org/wiki/Michael%20Fourman
|
Michael Paul Fourman FBCS FRSE (born 12 September 1950) is Professor of Computer Systems at the University of Edinburgh in Scotland, UK, and was Head of the School of Informatics from 2001 to 2009.
Fourman is worked in applications of logic in computer science, artificial intelligence, and cognitive science – more specifically, formal models of digital systems, system design tools, proof assistants, categorical semantics and propositional planning.
Qualifications
Fourman received a BSc in Mathematics and Philosophy from the University of Bristol in 1971, then his MSc in Mathematical Logic from the University of Oxford in 1972. He wrote his DPhil thesis Connections between Category Theory and Logic under the supervision of Dana Scott at Oxford, defending his thesis in 1974.
Career
He continued to work with Scott as an SRC postdoctoral Research Fellow and Junior Research Fellow of Wolfson College, in Oxford, until 1976, when he moved to the USA, first as a Visiting Assistant Professor of Mathematics at Clark University in Worcester, Massachusetts, then, from 1977 to 1982, as JF Ritt Assistant Professor of Mathematics at Columbia University in New York.
In 1983 he moved, with a Science and Engineering Research Council Fellowship, to the Department of Electronic and Electrical Engineering at Brunel University. He was appointed to a Readership, and then to the Chair of Formal Systems, at Brunel in 1986.
Fourman was co-founder and Technical Director of Abstract Hardware Limited (AHL), a company formed in 1986. He was central in the development of the LAMBDA system (Logic And Mathematics Behind Design Automation) to aid hardware design, a tool implemented in the SML programming language and marketed by AHL. He left the company in 1997.
In 1988 he joined the Laboratory for Foundations of Computer Science at the University of Edinburgh, and was appointed to the Chair of Computer Systems in the Department of Computer Science.
In 1998 he was founding Head of the Division of Informatics, which became the current School of Informatics, incorporating the former Department of Artificial Intelligence, the Artificial Intelligence Applications Institute, the Centre for Cognitive Science, the Human Communication Research Centre, and the Department of Computer Science.
He has again been Head of the School of Informatics since August 2002.
He has held visiting positions at universities in Paris (1975), Utrecht (1977, 1980), Cambridge (1979–80), Sydney (1982), Montreal (1983), and Perth (1994).
Bibliography
External links
Full Bibliography
Official home page
Personal home page
Extracurricular home page
Blogger user profile
Clark University faculty
1950 births
Living people
20th-century British mathematicians
21st-century British mathematicians
British computer scientists
Fellows of the British Computer Society
Formal methods people
British bloggers
Alumni of the University of Oxford
Alumni of the University of Bristol
Columbia University faculty
Acad
|
https://en.wikipedia.org/wiki/Cyber%20Groove
|
Cyber Groove (known as 熱舞2000 or Dance 2000 in Chinese) is a Taiwanese dancing game, by Front Fareast Industrial Corporation, played on a Microsoft Windows computer. It was released in January 2000, and can be played on either the keyboard or a dance pad.
Gameplay
Gameplay is similar to Dance Dance Revolution. Arrows (up, down, left and right) scroll from bottom to top. The player must step on the corresponding arrow when it reaches the top of the screen, where stationary arrows (referred to as the Step Zone in DDR terminology) are located. In the background of the game play region, a random, non-selectable dancing character can be seen.
In addition to Dance mode, there exist four gameplay styles which utilize different elements of the pad (or pads), two of which must be unlocked through gameplay. Together mode, where two players play on the same pad, utilizes all eight directional arrows to make the players move in a synchronized pattern. Double mode uses two pads for a single player, with the four main directionals for a total of eight panels. Extra mode (a secret mode) uses the four main directionals, plus the up-right and up-left arrows, similar to Dance Dance Revolution Solo. Jam mode (a secret mode) has extra visual effects and background audio clips with no change to gameplay.
Cyber Groove includes 21 songs, most of which are licensed, and 50 additional songs are available for download from the Front Fareast website.
Cyber Groove Dance Pad
The game pad is a USB-only pad with 10 "panels": up, down, left and right arrows, along with a circle in the up-left position, an X in the up-right position, a square in the bottom-left position, and a triangle in the bottom-right position. It also has Escape (ESC) and pause buttons that when pressed simultaneously exit the game.
Reception
Kevin Rice reviewed the PC version of the game for Next Generation, rating it four stars out of five, and stated that "Those who've envied the 'really good dancers' at the arcade no longer have an excuse not to play this game – there's no embarrassment from the glow of the monitor. And it's a great workout."
IGN gave the game a negative review, saying that "If you're in the mood for something to keep you musically entertained, I suggest you take out your Melvins album and try banging your head against the wall in time with the base drum instead."
Reviews
PC Gamer #8 (4) 2001 April
Daily Radar - Review
See also
Dance Dance Revolution
In the Groove
StepMania
Notes
External links
Front Interactive's Cyber Groove main page
2000 video games
Dance video games
Music video games
Video games developed in Taiwan
Windows games
Windows-only games
|
https://en.wikipedia.org/wiki/Bill%20Kovacs
|
Bill Kovacs (25 October 1949 – 30 May 2006) was a pioneer of commercial computer animation technology.
Early career
Kovacs received a Bachelor of Architecture degree from Carnegie Mellon University in 1971. He worked for Skidmore, Owings and Merrill (New York office) while getting a Masters of Environmental Design from Yale University (1972). He was then transferred to the Chicago Office, where he worked on a computer-aided design system.
Computer animation
In 1978, Kovacs left SOM to become VP of R&D for the early computer animation company Robert Abel and Associates (1978-1984).
At Abel, Kovacs (along with Roy Hall and others) developed the company's animation software. Kovacs used this software, with others in the film Tron. He later co-founded Wavefront Technologies as CTO (1984-1994), leading the development of products such as The Advanced Visualizer as well as animated productions. Along with Richard Childers and Chris Baker, he was a key organizer of the Infinite Illusions at the Smithsonian Institution exhibit in 1991.
Following retirement from Wavefront, Kovacs co-founded Instant Effects, worked as a consultant to Electronic Arts and RezN8, serving as RezN8's CTO from 2000 until his death.
In 1998, Kovacs received a 1997 (Scientific and Engineering) Academy Award from the Academy of Motion Picture Arts and Sciences. In 1980, he received two Clio Awards for his work on animated TV commercials.
Educator
Kovacs was a Visiting Artist at Loyola Marymount University, and he served on the President's Board of Advisors at Academy of Art University from 2002 until his death in 2006 following a stroke.
In 2005, Bill Kovacs, a member of the adjunct faculty in the Department of Animation at Woodbury University, developed and taught The Future of Media: The Evolution of Digital Technology.
From 2004 until his death in 2006, he served as a special advisor to Heather Kurze, the dean of the School of Architecture and Design at Woodbury University. Beginning in 2005, Kovacs advised Dori Littell-Herrick, the new chair of the Department of Animation at Woodbury on the role of technology in the growing department, both in facilities and in curriculum.
Together with other faculty, he participated in creating interdisciplinary classes involving architecture and animation students, including "Urban Environments in Maya". Kovacs also assisted Littell-Herrick to broaden the pool of adjunct faculty for the department.
External links
Visiting Artist profile at Loyola Marymount
Santa Barbara News-Press, "Wavefront founder dies at age 56" June 2, 2006
Bill’s LinkedInpage
1949 births
2006 deaths
Recipients of the Scientific and Engineering Academy Award
American animators
20th-century American educators
Animation educators
Computer animation people
Computer graphics professionals
Yale University alumni
Carnegie Mellon University College of Fine Arts alumni
Loyola Marymount University faculty
Woodbury University faculty
Academy of Art University faculty
|
https://en.wikipedia.org/wiki/Geographic%20Locator%20Codes
|
Worldwide Geographic Location Codes (GLCs) list the number and letter codes federal agencies should use in designating geographic locations anywhere in the United States or abroad in computer programs. Use of standard codes facilitates the interchange of machine-readable data from agency to agency within the federal community and between federal offices and state and local groups. These codes are also used by some companies as a coding standard as well, especially those that must deal with federal, state and local governments for such things as taxes. The GLCs are administered by the U.S. General Services Administration (GSA).
External links
US General Services Administration site
General Services Administration
Geocodes
|
https://en.wikipedia.org/wiki/World%20Computer%20Speed%20Chess%20Championship
|
World Computer Speed Chess Championship is an annual event organized by the International Computer Games Association where computer chess engines compete against each other at blitz chess time controls. It is held in conjunction with the World Computer Chess Championship. Up to 2001, it was held in conjunction with the World Microcomputer Chess Championship (WMCCC) and restricted to microcomputers.
Championship results
Notes
References
External links
Official website of the International Computer Games Association (ICGA)
Paderborn - WMCCC 1995
Computer
Computer chess competitions
|
https://en.wikipedia.org/wiki/AETN
|
AETN may refer to:
Arkansas Educational Television Network, a Public Broadcasting System (PBS) member television stations in Arkansas
A&E Television Networks, parent company of A&E Network and History Channel, among others
|
https://en.wikipedia.org/wiki/Silversword
|
Silversword is a fantasy role-playing game created by Mario J. Gaida. It was released for the iOS operating system on 13 January 2012 and is available for the Apple iPad and iPhone.
Gaida modeled Silversword after the 1980s The Bard's Tale series of games, but provided a new storyline and plot. It retains the dungeon crawl character of the Bard's Tale series (first person party based play). It also integrates some of the mechanics of the original Dungeons & Dragons game, specifically, armor classes and the use of dice rolls (e.g., d20) to determine random factors within the game and is instantly playable by anyone familiar with Ultima or Wizardry.
Frequently updated, the game now offers an expansion, German and French translations, and an online discussion forum with announcements, tips and cheats, feature requests, etc.
Story
The game takes place in the fantasy world of Tarnak, which is now running wild with dangerous monsters and bands of thieves since an evil presence began infecting the land. Players control a band of adventurers (created at the beginning or by using the party provided with the game) who use the Castle Cranbourgh as their base of operations at the outset. The adventurers' mission is to carve a path to the last free city in the land, Annsharbour, to lift the siege that has been placed on it. On the way, the party must explore various dungeons and towers while accomplishing tasks that stand in their way. After building the party's strength by leveling up, learning new spells, finding magical armor and weapons, etc., the party goes to the besieged city of Annsharbour and eventually find the evil Maruziel ruling the otherworldly Inferno.
An in-app purchase ("Rise of the Dragons") allows the party to continue on to a new series of maps, monsters, and adventures as large and complex (if not more so) than the original game. In all, there are almost 70 maps to explore, map, and conquer, most with tricks, hints, chests, and hidden features like traps or monsters.
Gameplay
Parties comprise up to seven possible characters which are created at the start of the game. Seven races are available for players to choose from: barbarians, dwarves, elves, gnomes, hobbits, humans, and high-men, all with different characteristics that affect game play. Including magic users, there are eleven character classes that can be built upon a chosen race, (1) non-magical: bard, hunter, monk, rogue, warrior, and (2) magical: paladin, archmage, conjurer, magician, sorcerer, and wizard. Character attributes include constitution, dexterity, intelligence, luck, and strength.
Many elements of gameplay from the 1980s Bard's Tale games are evident in Silversword. For example, the dungeon crawl character remains. The magic system is also similar, and the magic user classes—archmage, conjurer, magician, sorcerer, and wizard—seen in the Bard's Tale II are seen in Silversword. Nostalgic Bard's Tale players will also see some familiar faces in the game, such as
|
https://en.wikipedia.org/wiki/Overlay%20%28programming%29
|
In a general computing sense, overlaying means "the process of transferring a block of program code or other data into main memory, replacing what is already stored". Overlaying is a programming method that allows programs to be larger than the computer's main memory. An embedded system would normally use overlays because of the limitation of physical memory, which is internal memory for a system-on-chip, and the lack of virtual memory facilities.
Usage
Constructing an overlay program involves manually dividing a program into self-contained object code blocks called overlays or links, generally laid out in a tree structure. Sibling segments, those at the same depth level, share the same memory, called overlay region or destination region. An overlay manager, either part of the operating system or part of the overlay program, loads the required overlay from external memory into its destination region when it is needed; this may be automatic or via explicit code. Often linkers provide support for overlays.
Example
The following example shows the control statements that instruct the OS/360 Linkage Editor to link an overlay program containing a single region, indented to show structure (segment names are arbitrary):
INCLUDE SYSLIB(MOD1)
INCLUDE SYSLIB(MOD2)
OVERLAY A
INCLUDE SYSLIB(MOD3)
OVERLAY AA
INCLUDE SYSLIB(MOD4)
INCLUDE SYSLIB(MOD5)
OVERLAY AB
INCLUDE SYSLIB(MOD6)
OVERLAY B
INCLUDE SYSLIB(MOD7)
+--------------+
| Root Segment |
| MOD1, MOD2 |
+--------------+
|
+----------+----------+
| |
+-------------+ +-------------+
| Overlay A | | Overlay B |
| MOD3 | | MOD7 |
+-------------+ +-------------+
|
+--------+--------+
| |
+-------------+ +-------------+
| Overlay AA | | Overlay AB |
| MOD4, MOD5 | | MOD6 |
+-------------+ +-------------+
These statements define a tree consisting of the permanently resident segment, called the root, and two overlays A and B which will be loaded following the end of MOD2. Overlay A itself consists of two overlay segments, AA, and AB. At execution time overlays A and B will both utilize the same memory locations; AA and AB will both utilize the same locations following the end of MOD3.
All the segments between the root and a given overlay segment are called a path.
Applications
, most business applications are intended to run on platforms with virtual memory. A developer on such a platform can design a program as if the memory constraint does not exist unless the program's working set exceeds the available physical memory. Most importantly, the architect can focus on the problem being solved without the
|
https://en.wikipedia.org/wiki/Robert%20Abel%20and%20Associates
|
Robert Abel and Associates (RA&A) was an American pioneering production company specializing in television commercials made with computer graphics. Robert Abel's company, RA&A was especially known for their art direction and won many Clio Awards.
Abel and his team created some of the most advanced and impressive computer-animated works of their time, including full ray-traced renders and fluid character animation at a time when such things were largely unknown. A variety of high-profile television advertisements, graphics sequences for motion pictures (including The Andromeda Strain and Tron), and work on laserdisc video games such as Cube Quest, put Abel and his team on the map in the early 1980s. The company was also originally commissioned to create the visual effects for Star Trek: The Motion Picture, but were subsequently taken off the project for mishandling funds.
Many people who worked at RA&A went on to other ground-breaking projects, including the founding of Wavefront Technologies, Rhythm & Hues and other studios. Many RA&A people went on to win Academy Awards.
RA&A was on the southwest corner of Highland Avenue and Romaine in the heart of Hollywood, California. The company was also notable on its work for The Jacksons' 1981 music video "Can You Feel It."
RA&A closed in 1987 following an ill-fated merger with now-defunct Omnibus Computer Graphics, Inc., a company which had been based in Toronto.
References
External links
The Bob Abel Project
Rob Abel info at OSU
A demo reel of work from 1982
American animation studios
Visual effects companies
Digital media
Film production companies of the United States
Companies based in Los Angeles
|
https://en.wikipedia.org/wiki/Event%20data%20recorder
|
An event data recorder (EDR), more specifically motor vehicle event data recorder (MVEDR), similar to an accident data recorder, (ADR) sometimes referred to informally as an automotive black box (by analogy with the common nickname for flight recorders), is a device installed in some automobiles to record information related to traffic collisions. In the USA EDRs must meet federal standards, as described within the U.S. Code of Federal Regulations.
The term generally refers to a simple, tamper-proof, read-write memory device. The role of the EDR is limited compared to journey data recorders such as digital tachographs in Europe or electronic logging device in the USA, which may also be referred to as a black box or in-vehicle data recorder.
In modern diesel trucks, EDRs are triggered by electronically sensed problems in the engine (often called faults), or a sudden change in wheel speed. One or more of these conditions may occur because of an accident. Information from these devices can be collected after a crash and analyzed to help determine what the vehicles were doing before, during and after the crash or event.
History
In its efforts to establish the uniform scientific crash data needed to make vehicle and highway transportation safer and reduce fatalities, the IEEE launched IEEE 1616 in 2004. It was the first universal standard for MVEDRs, much like those that monitor crashes on aircraft and trains.
The new standard specifies minimal performance characteristics for onboard tamper- and crash-proof memory devices for all types and classes of highway and roadway vehicles. This international protocol will help manufacturers develop what is commonly called "black boxes" for autos, trucks, buses, ambulances, fire trucks and other vehicles. It includes a data dictionary of 86 data elements and covers device survivability.
Since 2006, the US has prescribed what data must be recorded in event data recorders, if a vehicle has an event data recorder, in American regulation 49 CFR 563.
Since between 2008 and 2019, Korea has fitted vehicles with event data recorders, according to Korean regulation KMVSS Art. 56-2 (MOLIT Ord. 534/2018).
Since between 2008 and 2015, Japan has fitted vehicles with event data recorders, according to Japanese regulation J-EDR (Kokujigi 278/2008), for passenger cars.
Since between 2012 and 2015 Switzerland has fitted vehicles with event data recorders, according to regulation VTS Art. 102, applicable to vehicles with blue lights and sirens.
Since between 2003 and 2005, Uruguay has fitted vehicles with event data recorders, according to Decree 560/003 Art. 11, for dangerous goods vehicles.
China has drafted a regulation which would become mandatory for all passenger cars as of January 2021.
In March 2021, the new UN Regulation 160 on Event Data Recorders is adopted by the World Forum for Harmonization of Vehicle Regulations.
Regulatory framework
In the US 49/563.5 regulatory framework, Event data recorder is
|
https://en.wikipedia.org/wiki/Active%20queue%20management
|
In routers and switches, active queue management (AQM) is the policy of dropping packets inside a buffer associated with a network interface controller (NIC) before that buffer becomes full, often with the goal of reducing network congestion or improving end-to-end latency. This task is performed by the network scheduler, which for this purpose uses various algorithms such as random early detection (RED), Explicit Congestion Notification (ECN), or controlled delay (CoDel). RFC 7567 recommends active queue management as a best practice.
Overview
An Internet router typically maintains a set of queues, one or more per interface, that hold packets scheduled to go out on that interface. Historically, such queues use a drop-tail discipline: a packet is put onto the queue if the queue is shorter than its maximum size (measured in packets or in bytes), and dropped otherwise.
Active queue disciplines drop or mark packets before the queue is full. Typically, they operate by maintaining one or more drop/mark probabilities, and occasionally dropping or marking packets according to the probabilities before the queue is full.
Benefits
Drop-tail queues have a tendency to penalise bursty flows, and to cause global synchronisation between flows. By dropping packets probabilistically, AQM disciplines typically avoid both of these issues.
By providing endpoints with congestion indication before the queue is full, AQM disciplines are able to maintain a shorter queue length than drop-tail queues, which combats bufferbloat and reduces network latency.
Drawbacks
Early AQM disciplines (notably RED and SRED) require careful tuning of their parameters in order to provide good performance. These systems are not optimally behaved from a control theory perspective. Modern AQM disciplines (ARED, Blue, PI, CoDel, CAKE) are self-tuning, and can be run with their default parameters in most circumstances.
Network engineers have historically been trained to avoid packet loss, and have therefore sometimes been critical of AQM systems that drop packets: "Why should I drop perfectly good packets when I still have free buffer space?"
Simulation
An active queue management and denial-of-Service (AQM&DoS) simulation platform is established based on the NS-2 simulation code of the RRED algorithm. The AQM&DoS simulation platform can simulate a variety of DoS attacks (Distributed DoS, Spoofing DoS, Low-rate DoS, etc.) and AQM algorithms (RED, RRED, SFB, etc.). It automatically calculates and records the average throughput of normal TCP flows before and after DoS attacks to facilitate the analysis of the impact of DoS attacks on normal TCP flows and AQM algorithms.
Active queue management algorithms
Blue and Stochastic Fair Blue (SFB)
Common Applications Kept Enhanced (CAKE)
Controlled Delay (CoDel)
FQ-CoDel
Modified-REM (M-REM)
PI controller
Random early detection (RED)
Random Exponential Marking (REM)
RED with Preferential Dropping (RED-PD)
Robust random early det
|
https://en.wikipedia.org/wiki/XWinLogon
|
XWinLogon is an interface to the Cygwin/X Server (The graphical interface of an X Window System) to allow the user to easily connect to a Unix/Linux box from Windows computer. The XWinLogon system is free and stable, but has not been updated since 2004-11-22.
XWinLogon has a Windows installer that makes installation easy. This installer copies the required packages of Cygwin and the frontend window that can be used to easily start an X session on a remote computer.
A known problem with XWinLogon is that it conflicts with an existing Cygwin installation.
See also
xrdp allows remote connection to a Linux installation through the native Windows RDP protocol
External links
XWinLogon home page on SourceForge
XWinLogon Developer Home Page
Cygwin/X home page
X servers
|
https://en.wikipedia.org/wiki/Telenor%20Sverige
|
Telenor Sverige (previously Vodafone Sweden, Europolitan and Nordic Tel), is a mobile phone, IPTV and Internet service provider in Sweden, owned by Telenor. Telenor Sverige's network covers 99 percent of the country's population, with telecom infrastructure sharing on 2G, 4G LTE and 5G NR under the Net4Mobility joint venture with Tele2, and on 3G UMTS with 3 Sverige outside Stockholm, Gothenburg, Malmö, Lund and Karlskrona, where it has its own 3G masts. Today, Telenor Sweden has over 2.5 million mobile subscribers, approximately 645,000 broadband customers and half a million TV customers. Telenor Sweden has a turnover of approximately SEK 13.1 billion (2015) and has approximately 1,900 employees.
History
In September 1992, the network went live under the name Europolitan, owned by Nordic Tel. Europolitan was the first mobile phone network company in Sweden to launch SMS and voice mail. During the late 1990s, Vodafone Group went on an acquisition spree that led to the acquisition of Nordic Tel. In the early-2000s various operating companies in the Vodafone Group changed their names to Vodafone.
After several years of under-performance, Vodafone Sweden was sold on 31 October 2005 to Telenor, the largest telecommunications company in Norway, for approximately €1 billion. It took the Telenor name on 20 April 2006.
In 2014, Telenor Sverige launched the discount prepaid phone flanker brand Vimla, meant to compete against Comviq, Halebop and Hallon, discount prepaid brands owned by Tele2, Telia and 3 Sverige respectively.
On 15 May 2018 the daughter company Bredbandsbolaget merged into Telenor Sweden.
References
Vodafone
Telenor
Mobile phone companies of Sweden
|
https://en.wikipedia.org/wiki/Information%20diving
|
Information diving is the practice of recovering technical data, sometimes confidential or secret, from discarded material. In recent times, this has chiefly been from data storage elements in discarded computers, most notably recoverable data remaining on hard drives. Those in charge of discarding computers usually neglect to erase the hard drive. It is often in such circumstances for an information diver to copy installed software (e.g., word processors, operating systems, computer games, etc.). Other data may also be available, such as credit card information that was stored on the machine. Companies claim to be especially careful with customer data, but the number of data breaches by any type of entity (e.g., education, health care, insurance, government, ...) suggest otherwise. In the UK, information diving has been referred to as "binology."
Today, files, letters, memos, photographs, IDs, passwords, credit cards, and more can be found in dumpsters. Many people do not consider that sensitive information on items they discarded may be recovered. Such information, when recovered, is sometimes usable for fraudulent purposes (see also "identity theft" and physical information security). This method of dumpster diving is also sometimes used by attorneys or their agents when seeking to enforce court-ordered money judgments: the judgment debtor's trash may contain information about assets that can then be more-readily located for levying.
Supposedly, information diving was more common in the 1980s due to lax security; when businesses became aware of the need for increased security in the early 1990s, sensitive documents were shredded before being placed in dumpsters. There is still considerable Internet activity on the subject of dumpster diving, so it is unlikely to have stopped with the widespread introduction of document shredding. Security mythology has it that curious hackers or malicious crackers commonly use this technique.
Cases
Printed manuals
In earlier times, the available discarded data included printed manuals and design records. In a famous case, a student, Jerry Schneider, discovered some discarded manuals for a telephone system ordering/shipping system and was able to build a business selling 'surplus' gear ordered from the telephone company as though it was for an internal company department.
Discarded computers
Two MIT students purchased a large number of obsolete computers at yard sales, and they were able to obtain information such as credit card information and tax return data. They published a paper, Remembrance of Things Past, documenting their discoveries.
Dumpster diving
Dumpster diving is commonly practiced by "watchdog" organizations seeking information on groups they are investigating. The Trinity Foundation successfully used this technique to report on the activities of televangelist Robert Tilton and was also able to obtain information on Benny Hinn.
See also
Dumpster diving
E-waste
Credit card fraud
Copyri
|
https://en.wikipedia.org/wiki/Kwu%20Tung%20station
|
Kwu Tung (Chinese: 古洞站) is a planned underground infill station on the Lok Ma Chau spur line of the of the MTR rapid transit network in Hong Kong. The station will be situated near Kwu Tung in North District, New Territories.
It is part of the first phase of the and act as its eastern terminus when phase 2 is completed.with an expected cost of HK$3.5 billion in December 2015.
History
In 2001, KCR Corporation, then operator of the East Rail line (known then simply as "East Rail"), proposed a spur line that would reach the Lok Ma Chau checkpoint. A small area of land in Kwu Tung, an area in between Sheung Shui and Lok Ma Chau, was acquired by KCR for the construction of an underground station. When construction began in 2002, the length of the spur line was built using tunnel boring machines (TBMs) through Kwu Tung. An underground station box structure was constructed through cut-and-cover, featuring the running tunnels running alongside an island platform. When the spur line finally opened in 2007, trains ran through the unfinished Kwu Tung station but never stopped there. While the station was never completed, in 2007, the design contractor Arup stated the retaining wall would be strong enough for any future construction works. Also, the structures on the edges of the unfinished platforms were strong enough for future installation of any platform screen doors. At present, the station only consists of an underground area excavated allowing for future platforms.
In 2014, after the merger of KCR and MTR, the Government supported the completion of the station and the development of the and recommended the MTR Corporation to do so. The Hong Kong Government investigation found that of land in Kwu Tung North is available for development as part of the government's plan to increase the area's population by 114,300.
In 2021, MTR announced that Arup, the design contractor for the original station box, would be returning for the first phase of the Northern Link. The construction of the station was approved by the government in 2021, in anticipation of rising transport demand in the Kwu Tung North New Development Area. Construction is expected to start in 2023. East Rail Line trains are expected to start operating at this station in 2027. The station will serve as a major public transport hub in the northern New Territories when the Northern Link is completed in 2034.
Gallery
References
External links
Lok Ma Chau Spur Line
Sheung Shui
Kwu Tung
North District, Hong Kong
MTR stations in the New Territories
East Rail line
Proposed railway stations in Hong Kong
|
https://en.wikipedia.org/wiki/Volume%20boot%20record
|
A volume boot record (VBR) (also known as a volume boot sector, a partition boot record or a partition boot sector) is a type of boot sector introduced by the IBM Personal Computer. It may be found on a partitioned data storage device, such as a hard disk, or an unpartitioned device, such as a floppy disk, and contains machine code for bootstrapping programs (usually, but not necessarily, operating systems) stored in other parts of the device. On non-partitioned storage devices, it is the first sector of the device. On partitioned devices, it is the first sector of an individual partition on the device, with the first sector of the entire device being a Master Boot Record (MBR) containing the partition table.
The code in volume boot records is invoked either directly by the machine's firmware or indirectly by code in the master boot record or a boot manager. Code in the MBR and VBR is in essence loaded the same way.
Invoking a VBR via a boot manager is known as chain loading. Some dual-boot systems, such as NTLDR (the boot loader for all releases of Microsoft's Windows NT-derived operating systems up to and including Windows XP and Windows Server 2003), take copies of the bootstrap code that individual operating systems install into a single partition's VBR and store them in disc files, loading the relevant VBR content from file after the boot loader has asked the user which operating system to bootstrap.
In Windows Vista, Windows Server 2008 and newer versions, NTLDR was replaced; the boot-loader functionality is instead provided by two new components: WINLOAD.EXE and the Windows Boot Manager.
In file systems such as FAT12 (except for in DOS 1.x), FAT16, FAT32, HPFS and NTFS, the VBR also contains a BIOS Parameter Block (BPB) that specifies the location and layout of the principal on-disk data structures for the file system. (A detailed discussion of the sector layout of FAT VBRs, the various FAT BPB versions and their entries can be found in the FAT article.)
Technical details
Signature
The presence of an IBM PC compatible boot loader for x86-CPUs in the boot sector is by convention indicated by a two-byte hexadecimal sequence called the boot sector signature ( at fixed offset and at ) for sector sizes of 512 bytes or more. For 512 byte sectors, the boot sector signature also marks the end of the sector. VBRs on smaller and larger sectors may show signatures at the end of the actual sector size as well, however, the semantics described herein apply to the 16-bit signature at only.
This signature indicates the presence of at least a dummy boot loader which is safe to be executed, even if it may not be able to actually load an operating system. It does not indicate the presence of a (or even a particular) file system or operating system, although some old versions of DOS prior to 3.3 relied on it in their process to detect FAT-formatted media (newer versions do not). Boot code for other platforms or CPUs should not use this signature, si
|
https://en.wikipedia.org/wiki/Curtis%20Media%20Group
|
Curtis Media Group is a broadcast media company based in Raleigh, North Carolina, United States. The company owns and operates several North Carolina radio stations and television networks.
Broadcast stations
Curtis Media Group owns and operates the following stations:
Radio
AM
WPTF 680 AM (Raleigh, North Carolina)
WQDR 570 AM (Raleigh, North Carolina)
WGBR 1150 AM (Goldsboro, North Carolina)
WFMC 730 AM (Goldsboro, North Carolina)
WKIX 850 AM (Raleigh, North Carolina)
WXIT 1200 AM (Blowing Rock, North Carolina)
WATA 1450 AM (Boone, North Carolina)
WECR 1130 AM (Newland, North Carolina)
WWMC 1010 AM (Kinston, North Carolina)
WSSG 1300 AM (Goldsboro, North Carolina)
WNCT 1070 AM (Greenville, North Carolina)
FM
WQDR-FM 94.7 FM (Raleigh, North Carolina)
WBBB 96.1 FM (Raleigh, North Carolina)
WPLW-FM 96.9 FM (Goldsboro, North Carolina)
WKJO 102.3 FM (Smithfield, North Carolina)
WKXU 102.5 FM (Hillsborough, North Carolina)
WKIX-FM 102.9 FM (Raleigh, North Carolina)
WYMY 101.1 FM (Burlington, North Carolina)
WZKT 97.7 (Walnut Creek, North Carolina)
WMMY 106.1 FM (Jefferson, North Carolina)
WWMY 102.3 FM (Beech Mountain, North Carolina)
WZJS 100.7 FM (Banner Elk, North Carolina)
WELS-FM 102.9 FM (Kinston, North Carolina)
WMGV 103.3 FM (Newport, North Carolina)
WMJV 99.5 FM (Grifton, North Carolina)
WSFL-FM 106.5 FM (New Bern, North Carolina)
WIKS 101.9 FM (New Bern, North Carolina)
Radio networks
North Carolina News Network, broadcast news service for 75 affiliate stations in North Carolina;
Triangle Traffic Network, traffic reporting service in the Raleigh Durham Metro;
Southern Farm Network, agriculture reporting service for North and South Carolina;
Triad Sports Network, sports programming in the Greensboro, High Point, Winston-Salem market
Internet
North Carolina News Network
www.StateGovernmentRadio.com
SFNtoday.com
ACCsports.com
History
The company was founded in 1968 by Don Curtis as a cable TV provider. CMG is the largest privately held broadcast company in North Carolina, and claims that WQDR-FM is the highest-billing radio station in the state. Don Curtis formed a company, Inner Banks Broadcasting, in partnership with eastern North Carolina broadcaster Henry Hinton, which in 2006 purchased WMFR from CBS Radio, and simulcasts talk WSJS and WSML.
External links
Official website
Mass media in North Carolina
Companies based in North Carolina
Radio broadcasting companies of the United States
|
https://en.wikipedia.org/wiki/KXSP
|
KXSP (590 AM) is a commercial radio station licensed to Omaha, Nebraska. The station is owned by SummitMedia and it airs a sports format. Most weekday afternoon and evening programming is from local hosts, while during mornings, late nights and weekends, KXSP carries the ESPN Radio Network.
KXSP operates with 5,000 watts, using a non-directional transmitter off Sorensen Parkway in North Omaha. Due to its location near the bottom of the AM dial, as well as Nebraska's flat land (with near-perfect ground conductivity), its signal is easily heard in most of the eastern half of Nebraska, as well as parts of Iowa, Missouri, Kansas and South Dakota. It provides grade B coverage as far south as Kansas City as far east as Des Moines, and as far north as Sioux Falls. Offices and studios are located on Mercy Road in Omaha's Aksarben Village. KXSP programming is also carried on the HD2 subchannels of KEZO-FM and KSRZ.
History
On April 2, 1923, the station first signed on, owned by the Woodmen of the World life insurance society, using the call sign WOAW. Management originally sought the call letters WOW (for Woodmen Of the World) but they were already used by the steamship Henry J. Bibble. A call sign beginning with "W" was possible in Nebraska because originally the dividing line between "K" and "W" stations followed the western border of Nebraska. WOAW's call sign was issued on November 27, 1922, shortly before the divide was moved to the Mississippi River in January 1923. Despite this, the station was able to claim the WOW call sign on December 16, 1926, upon retirement of the Bibble. The Woodmen society put the station up for sale in 1945 out of fear that it would jeopardize its tax-exempt status; it eventually leased the station to "Radio Station WOW," a group of local investors. That group later added a television station (now WOWT) in 1949 and an FM station in 1961 (now KEZO-FM).
In 1951, Meredith Corporation bought the WOW stations. The AM station became a Top 40 station in the early 1970s, where former Shindig! host Jimmy O'Neill worked for a time, and a country station in the early 1980s. In 1955, it dropped network affiliations with NBC Radio and agreed to switch to CBS Radio as part of a five-station deal covering TV and radio stations in three cities. Meredith sold channel 6 to Chronicle Publishing Company in 1975, but held on to the radio station until selling it to Great Empire Broadcasting in 1983. Journal Broadcast Group bought it in 1999. On November 22, 1999, the WOW call letters were dropped in favor of KOMJ with adoption of a new format of adult standards, branded as "Magic 590". On April 25, 2005, KOMJ and then-sister station KOSR (1490 AM) swapped formats, with 590 adopting the sports format (as "Big Sports 590") under new call letters KXSP, and 1490 adopting the standards format and KOMJ calls.
On February 1, 2011, KXSP swapped affiliations with KOZN; KOZN took the Fox Sports Radio affiliation, while KXSP took ESPN. Wit
|
https://en.wikipedia.org/wiki/Abstract%20State%20Machine%20Language
|
Abstract State Machine Language (AsmL) is a programming language based on abstract state machines developed by Microsoft. AsmL is a functional language.
XASM is an open source implementation of the language.
References
External links
Microsoft: ASML
XASM
.NET programming languages
|
https://en.wikipedia.org/wiki/Electronic%20data
|
Electronic data can stand for
data in general that is exchanged via electronic communication lines
digital data in particular
Data (computing), i.e. computer-processable data as opposed to executable code
|
https://en.wikipedia.org/wiki/Microsoft%20Reserved%20Partition
|
A Microsoft Reserved Partition (MSR) is a partition of a data storage device, which is created to reserve a portion of disk space for possible subsequent use by a Windows operating system installed on a separate partition. No meaningful data is stored within the MSR; though from the MSR, chunks may be taken for the creation of new partitions, which themselves may contain data structures.
The GUID Partition Table (GPT) label for this partition type is E3C9E316-0B5C-4DB8-817D-F92DF00215AE.
Purpose
Formerly, on disks formatted using the master boot record (MBR) partition layout, certain software components used hidden sectors of the disk for data storage purposes. For example, the Logical Disk Manager (LDM), on dynamic disks, stores metadata in a 1 MB area at the end of the disk which is not allocated to any partition.
The UEFI specification does not allow hidden sectors on GPT-formatted disks. Microsoft reserves a chunk of disk space using this MSR partition type, to provide an alternative data storage space for such software components which previously may have used hidden sectors on MBR formatted disks. Small software-component-specific partitions can be allocated from a portion of the space reserved in the MSR partition.
Size
Beginning in Windows 10, the minimum size of the MSR is 16 MB which the installer allocates by default.
Location
The MSR should be located after the EFI System Partition (ESP) and any OEM service partitions, but it must be located before any primary partitions of bootable Windows operating systems. Microsoft expects an MSR to be present on every GPT disk, and recommends it to be created as the disk is initially partitioned.
See also
Basic data partition (BDP)
EFI System Partition (ESP)
References
Disk partitions
Windows NT architecture
|
https://en.wikipedia.org/wiki/StarCraft%3A%20The%20Board%20Game
|
StarCraft: The Board Game, published by Fantasy Flight Games, is a game inspired by the 1998 computer game StarCraft. Players take control of the three distinctive races featured in the video games, the Terrans, the Protoss, or the Zerg, to engage in battle across multiple worlds in order to achieve victory. Each of the three races features a fairly different playing style. A prototype of the game was shown in BlizzCon 2007, with pre-release copies sold at Gen Con 2007 and Penny Arcade Expo 2007. It was publicly released in October 2007.
Gameplay
Up to six players may play StarCraft: The Board Game. Players take on the roles of one of two major factions of each of StarCrafts three races: the Terran Dominion led by Arcturus Mengsk, Raynor's Raiders led by Jim Raynor, the Protoss Conclave led by Aldaris, the Protoss loyal to Tassadar, the Zerg Overmind, or Sarah Kerrigan, Queen of Blades. Each of the six factions is unique in their starting equipment, and each faction has a unique victory objective, though the Terran factions are more alike with each other (the same with the other races).
At the start of the game, each player claims two of the game's 12 planets as their "home planet" (a 13th planet, Typhon, was given away as a promotion in 2008), and players take turns to build the game board, representing the Koprulu sector, using the planets by linking them up. Each player may then use Z-axis connectors to connect distant planets on the game board to each other, mimicking a 3-dimensional environment, with the planets connected this way representing planets vertically aligned or in proximity. Each planet may have up to four territories, which may generate minerals, Vespene gas, or Conquest Points. At the start of the game, each player has a base on one of their own home planets, with a small detachment of forces at their disposal.
Each turn consists of three phases: the Planning Phase, the Execution Phase, and the Regrouping Phase. In the Planning Phase, players take turns placing four of their Order tokens face-down on any planet where they have forces present (note, since the Orders are placed this way, the Orders placed latest are resolved first); these tokens are resolved in the Execution Phase. Game adjustments, including scoring, occur in the Regrouping Phase. There are three types of Orders that may be allocated:
The Build Order allows Resources to be spent on the purchase of workers (which gather Resources), transports (which allow movement of troops between planets), buildings (increasing the variety of units that may be purchased by the players), modules (upgrades for bases), bases (providing a place for units to deploy), and units. Units (all units from the video games, with the exception of the Infested Terran and Broodling, are represented in StarCraft: The Board Game) are generally associated with the building that they are trained in the video game (or, for Zerg players, the building that allows them to be spawned in t
|
https://en.wikipedia.org/wiki/EFI%20system%20partition
|
The EFI (Extensible Firmware Interface) system partition or ESP is a partition on a data storage device (usually a hard disk drive or solid-state drive) that is used by computers having the Unified Extensible Firmware Interface (UEFI). When a computer is booted, UEFI firmware loads files stored on the ESP to start installing operating systems and various utilities.
An ESP contains the boot loaders or kernel images for all installed operating systems (which are contained in other partitions), device driver files for hardware devices present in a computer and used by the firmware at boot time, system utility programs that are intended to be run before an operating system is booted, and data files such as error logs.
Overview
The EFI system partition is formatted with a file system whose specification is based on the FAT file system and maintained as part of the UEFI specification; therefore, the file system specification is independent from the original FAT specification. The actual extent of divergence is unknown: Apple maintains a separate tool that should be used, while other systems use FAT utilities just fine. The globally unique identifier (GUID) for the EFI system partition in the GUID Partition Table (GPT) scheme is , while its ID in the master boot record (MBR) partition-table scheme is . Both GPT- and MBR-partitioned disks can contain an EFI system partition, as UEFI firmware is required to support both partitioning schemes. Also, El Torito bootable format for CD-ROMs and DVDs is supported.
UEFI provides backward compatibility with legacy systems by reserving the first block (sector) of the partition for compatibility code, effectively creating a legacy boot sector. On legacy BIOS-based systems, the first sector of a partition is loaded into memory, and execution is transferred to this code. UEFI firmware does not execute the code in the MBR, except when booting in legacy BIOS mode through the Compatibility Support Module (CSM).
The UEFI specification requires MBR partition tables to be fully supported. However, some UEFI implementations immediately switch to the BIOS-based CSM booting upon detecting certain types of partition table on the boot disk, effectively preventing UEFI booting from being performed from EFI system partitions contained on MBR-partitioned disks.
UEFI firmware supports booting from removable storage devices such as USB flash drives. For that purpose, a removable device is formatted with a FAT12, FAT16 or FAT32 file system, while a boot loader needs to be stored according to the standard ESP file hierarchy, or by providing a complete path of a boot loader to the system's boot manager. On the other hand, FAT32 is always expected on fixed drives.
Usage
Linux
GRUB 2 and elilo serve as conventional, full-fledged standalone UEFI boot loaders for Linux. Once loaded by a UEFI firmware, they both can access and boot kernel images from all devices, partitions and file systems they support, without being limited to th
|
https://en.wikipedia.org/wiki/Wetlands%20%28video%20game%29
|
Wetlands is a video game created by Hypnotix and published by New World Computing in 1995 for DOS.
Gameplay
The game is a rail shooter with 20 levels. The player can move their view left and right slightly to better shoot at enemies. Level 6, in which the player controls a gun turret, is the only time in the game where the player can move their view up and down as well.
On some occasions, the player can take different routes. On such levels, the player must shoot a minimum number of specified targets before the level ends. Failure to do so results in the player character being automatically killed.
During level 9, the game briefly becomes a kind of shoot 'em up with players controlling a small, robotic drone to disable the security system of an oxygen facility.
The game makes extensive use of cutscenes that utilize a mixture of both hand drawn and 3D animations.
Plot
Most of the Wetlands backstory is told through the graphic novel contained in game's manual. A nuclear test conducted in 1995 by the United States of America government under the name Project Othello altered weather patterns worldwide, resulting in years of rain immersing the Earth in water. Phillip Nahj, a once prominent scientist, is considered responsible for the disaster, despite having warned the government about the danger. The earth's population is forced to live in underwater cities. The rise in criminal activity along with the appearance of extraterrestrial invaders has caused the planet to become a haven for all manner of unlikable characters. A number of humans left for space. Interstellar war broke out between a federation of earth's remaining governments and the Volarins, a group of extremists who seek to build an intergalactic empire.
The game begins in the year 2495. The Volarins have taken over a number of the federation's planetary colonies. Nahj has been cryogenically frozen in the maximum security prison Alpha 16 until liberated by a mysterious woman. The game's protagonist, a mercenary named John Cole, is hired by the federation through General Corbett to bring Nahj back alive. He is assigned long-distance communication from his old friend Lieutenant Christine Mills: a technician with direct access to the federation's database.
After fighting hostile forces who attempt to destroy his transport ship, Cole arrives on Earth and begins his search at Omicron Station. Local crime lord Quog points him to an energy station in the blue sector where an agent of the federation was found dead. After evading local mercenaries tasked with killing him, Cole leaves Omicron Station for the energy plant. On his submarine, Cole tells Christine his deduction that Nahj's escape was aided by a special agent of the federation.
Sabotaging a supply depot and a sonar station, Cole arrives at the energy plant in blue sector; he finds the body of the agent who had liberated Nahj, killed with a shot to the back of the head. Christine tells Cole that the agent was attached to Project
|
https://en.wikipedia.org/wiki/Memory%20card%20reader
|
A memory card reader is a device for accessing the data on a memory card such as a CompactFlash (CF), Secure Digital (SD) or MultiMediaCard (MMC). Most card readers also offer write capability, and together with the card, this can function as a pen drive.
Some printers and Smartphones have a built-in card reader, as do many laptops and the majority of Tablet computers.
A multi card reader is used for communication with more than one type of flash memory card. Multi card readers do not have built-in memory capacity, but are able to accept multiple types and styles of memory cards.
Memory card readers, unlike smartphones, telephones and other devices, such as cameras and digital cameras, allow formatting in a file system other than FAT (FAT16, FAT32, exFAT) to NTFS in Windows, ext, ext2, ext3 in Linux or HFS, HFS + for Mac OS. Smartphones or other devices like cameras format them only in FAT. Internal card readers are usually connected to internal USB 1.1 / 2.0 / 3.x ports
The number of compatible memory cards varies from reader to reader and can include more than 20 different types. The number of different memory cards that a multi card reader can accept is expressed as x-in-1, with x being a figure of merit indicating the number of memory cards accepted, such as 35-in-1. There are three categories of card readers sorted by the type and quantity of the card slots: single card reader (e.g. 1x SD-only), multi card reader (e.g. 9-in-1) and series card reader (e.g. 4x SD-only).
Some kinds of memory cards with their own USB functions do not need the card reader, such as the Intelligent Stick memory card, which can plug directly into a USB slot.
The USB device class used is .
Modern UDMA-7 CompactFlash Cards and UHS-I Secure Digital cards provide data rates in excess of 89 MB/s and up to 145 MB/s, when used with memory card readers capable of USB 3.0 data transfer rates. As of 2011, Secure Digital memory cards received an additional option of a UHS-II bus interface. It increased the maximum data transfer speed to 312 MB/s.
See also
Card reader
References
Solid-state computer storage media
USB
|
https://en.wikipedia.org/wiki/Alpha%20Secondary%20School
|
Alpha Secondary is a public high school in Burnaby, British Columbia part of School District 41 Burnaby.
Academics
Alpha Secondary offers a broad range of educational programming, including French Immersion, Mini School, Advanced Placement, Honours courses, and Ace-It programs. Students wishing to earn their professional certification as a hairstylist can enroll in the two year District Hairdressing Program which is located at Alpha. The Fitness Leadership Program is also at Alpha, which provides students with Douglas College credits, and Canadian Fitness Education Services (CFES) weight training instructor and Personal Trainer national certification. Alpha also has an integrated honours program for Grade 8 students called Discovery. In 2008, Alpha students earned over $410,000 in Scholarships.
Clubs and councils
Students at Alpha are provided with a variety of leadership opportunities through their participation in over 30 clubs and councils. The main leadership groups are: Student Government, Music Council, Visual Arts Council, Grad Council, and The Offence. Other groups go beyond the school and organize events that improve both the local and global community. Alpha also has a debate team. Through these groups, students organize school based events that contribute to the school culture.
Athletics
2002 Provincial AAA Boys Soccer – Placed 2nd
2003 Provincial AAA Boys Soccer Champions
2005 Provincial AAA Volleyball – Placed 3rd
2006 Provincial AAA Volleyball Champions
2007 Provincial AAA Volleyball – Placed 2nd
2013 Provincial AAA Rugby – Placed 2nd
2013 BNWSSAA Junior Girls Soccer Champions
2015 BNWSSAA Senior Boys Soccer Champions
2017 BNWSSAA Junior Boys Soccer Champions
2017 VNDS Junior Boys Soccer Champions
2017/18 Provincial Gymnastics Champion
2018/19 BNWSSAA Junior Boys Soccer Champions
2018/19 VNDS Junior Boys Soccer Champion
Notable alumni/current students
Mike James, retired professional rugby player, former Team Canada captain.
Ashley Leitão, former top ten contestant on Canadian Idol, attended Alpha and graduated in 2004.
Devon Sawa, actor (Final Destination, Casper) (Class of 1998)
Don Taylor, grad of 1977 currently working for Sportsnet, and the TEAM 1040
Alfredo Valente, an Olympic soccer player and soccer player for the Vancouver Whitecaps FC, graduated from Alpha in 1998.
Loreto Siniscalchi, Team Canada Junior National Team Baseball, Little League World Series.
Theo Millas, Team Canada Junior National Team Baseball.
References
External links
School website
School Reports - Ministry of Education
Class Size
2005/2006 Satisfaction Survey
School Performance
Skills Assessment
High schools in Burnaby
Educational institutions established in 1950
1950 establishments in British Columbia
|
https://en.wikipedia.org/wiki/Network%20SouthCentral
|
Network SouthCentral (NSC) was a shadow franchise that existed from 4 February 1994 to 13 October 1996, when Connex South Central took over the running of the franchise. The franchise is now part of the Thameslink, Southern and Great Northern franchise operated by Govia Thameslink Railway under the Southern brand. As with all shadow franchises, Network SouthCentral was a wholly owned subsidiary of the British Railways Board.
Origins
In the lead up to the privatisation of British Rail, Network SouthEast was divided into a series of shadow franchises. Network SouthCentral was formed in February 1994.
Geographical Area
Network SouthCentral covered most of Sussex and parts of East Surrey. The core of NSC's operations was the Brighton Main Line, with most other NSC mainline services utilising some part of this alignment. The rough boundaries of the NSC operations were from Hastings in the east to Portsmouth in the west, although services operated by the company did extend further on both sides to Southampton along the West Coastway line in the west, and as the sole operator of the Marshlink line from Hastings to Ashford via Rye.
In London, the company served two major mainline terminals; London Victoria and Charing Cross. NSC's suburban services concentrated on the area directly to the south of these two stations, with routes serving most of south London, including Clapham Junction, Peckham, Tattenham Corner, East Croydon, Caterham, Sutton and Crystal Palace.
The main former Network SouthEast "sub-sectors" that came under the jurisdiction of NSC were the Sussex Coast, Oxted, South London and Marshlink lines.
Stock
During the short time in which NSC existed as an active train operating company, the company ordered no new rolling stock, nor received any new trains that had been ordered, though not delivered, before Network SouthEast handed over operations to NSC. However, the company operated the following types of locomotive, EMU and DEMU:
Livery
NSC branding was standard Network SouthEast lettering and design, but with the word "SouthCentral" in dark blue replacing the word "SouthEast" on leaflets, platforms and stock. The Network SouthEast "rhombus" red, blue and grey logo remained part of NSC's corporate image. Not all stock received NSC branding—the chief units to receive such treatment were NSC's express units—the Class 319s, 421s and 422s in the main being treated. As under NSE, the main corporate colour of Network SouthCentral was red, which was applied to all manner of things from rubbish bins to lamp-posts.
The Cowden rail accident
The only major accident that occurred on the NSC network was the Cowden rail crash when, on 15 October 1994, the driver of a Class 205 failed to see a red signal (this was believed to have been caused by fog), and drove the unit on to a single track section of the Uckfield line, where it collided with a train travelling in the opposite direction. Five people, including the erroneous driver were killed, and t
|
https://en.wikipedia.org/wiki/Alan%20Kotok
|
Alan Kotok (November 9, 1941 – May 26, 2006) was an American computer scientist known for his work at Digital Equipment Corporation (Digital, or DEC) and at the World Wide Web Consortium (W3C). Steven Levy, in his book Hackers: Heroes of the Computer Revolution, describes Kotok and his classmates at the Massachusetts Institute of Technology (MIT) as the first true hackers.
Kotok was a precocious child who skipped two grades before college. At MIT, he became a member of the Tech Model Railroad Club, and after enrolling in MIT's first freshman programming class, he helped develop some of the earliest computer software including a digital audio program and what is sometimes called the first video game (Spacewar!). Together with his teacher John McCarthy and other classmates, he was part of the team that wrote the Kotok-McCarthy program which took part in the first chess match between computers.
After leaving MIT, Kotok joined the computer manufacturer Digital Equipment Corporation (DEC), where he worked for over 30 years. He was the chief architect of the PDP-10 family of computers, and created the company's Internet Business Group, responsible for several forms of Web-based technology including the first popular search engine. Kotok is known for his contributions to the Internet and to the World Wide Web through his work at the World Wide Web Consortium, which he and Digital had helped to found, and where he served as associate chairman.
Personal life
Alan Kotok was born in Philadelphia, Pennsylvania, and was raised as an only child in Vineland, New Jersey. During his childhood, he played with tools in his father's hardware store and learned model railroading. He was a precocious child, skipping two grades at high school, and he matriculated at Massachusetts Institute of Technology (MIT) at the age of 16 in the fall of 1958 and an MBA from Clark University in 1978. Although his interest in computers began at Vineland High School, his first practical experience of computing came at MIT; there he developed a habit of working late at night when more computer time was available.
In 1977, at age 36, Kotok married Judith McCoy, a choir director and piano teacher on the faculty of the Longy School of Music. They lived in Harvard, Massachusetts, Cambridge, Massachusetts and Cape May, New Jersey. The couple shared a love of 16th and 17th-century music and pipe organs, and toured historic pipe organs in Sweden, Germany, Italy and Mexico. They had a daughter, Leah Kotok, and two stepchildren from Judith's prior marriage, Frederica and Daryl Beck.
Kotok recorded an oral history at the Computer History Museum in 2004. He died at his home in Cambridge, apparently from a heart attack, on May 26, 2006, seven months after the death of his wife during her treatment for cancer. He is survived by two daughters, a son, and two grandsons.
MIT: 1958–62
At MIT, Kotok earned bachelor's and master's degrees in electrical engineering. He was influenced by teachers suc
|
https://en.wikipedia.org/wiki/TrueNAS
|
TrueNAS is the branding for a range of free and open-source network-attached storage (NAS) operating systems produced by iXsystems, and based on FreeBSD and Linux, using the OpenZFS file system. It is licensed under the terms of the BSD License and runs on commodity x86-64 hardware.
The TrueNAS range includes free public versions (TrueNAS CORE, previously known as FreeNAS), commercial versions (TrueNAS Enterprise), and Linux versions (TrueNAS SCALE). It also offers hardware, from small home systems to large petabyte arrays, based on the above versions.
TrueNAS supports Windows, macOS and Unix clients and various virtualization hosts such as XenServer and VMware using the SMB, AFP, NFS, iSCSI, SSH, rsync and FTP/TFTP protocols. Advanced TrueNAS features include full-disk encryption and a plug-in architecture for third-party software.
Products
TrueNAS is the brand for iXsystems' open source network attached storage platform. It includes the following:
TrueNAS CORE (previously FreeNAS) – a free file server and expandable platform based on FreeBSD.
TrueNAS Enterprise – an enterprise file server for commercial use, also based on FreeBSD.
TrueNAS SCALE – a free Linux based hyper-converged scale-out version of the TrueNAS platform.
TrueNAS hardware – Enterprise Storage Arrays, a network-attached storage (NAS) systems, storage area network (SAN) devices, and High Availability systems, with up to 22 petabytes raw capacity.
User experience
TrueNAS is managed through a comprehensive web interface that is supplemented by a minimal shell console that handles essential administrative functions. The web interface supports storage pool configuration, user management, sharing configuration and system maintenance. As an embedded system appliance, TrueNAS boots from a USB Flash device or SATA DOM. This image is configured using a USB Flash bootable installer. The TrueNAS operating system is fully independent of its storage disks, allowing its configuration database and encryption keys to be backed up and restored to a fresh installation of the Operating System. This separation also allows for TrueNAS system updates to be performed through the web interface.
History
The FreeNAS project was started in October 2005 by Olivier Cochard-Labbé who based it on the m0n0wall embedded firewall and FreeBSD 6.0. Volker Theile joined the project in July 2006 and became the project lead in April 2008. In September 2009, the development team concluded that the project, then at release .7, was due for a complete rewrite in order to accommodate modern features such as a plug-in architecture. Volker Theile decided that the project best be reimplemented using Debian Linux and shifted his development efforts to the interim CoreNAS project and eventually OpenMediaVault where he continues as the project lead. Cochard-Labbé responded to community objections to "The Debian version of FreeNAS" and resumed activity in the project and oversaw its transfer to FreeNAS user iXsystems.
|
https://en.wikipedia.org/wiki/Android%2013
|
Android 13 is the thirteenth major release and the 20th version of Android, the mobile operating system developed by the Open Handset Alliance led by Google. It was released to the public and the Android Open Source Project (AOSP) on August 15, 2022. The first devices to ship with Android 13 were the Pixel 7 and 7 Pro.
As of August 2023, 33.05% of Android devices ran Android 13, making it the most widely-used version of Android.
History
Android 13 (internally codenamed Tiramisu) was announced in an Android blog posted on February 10, 2022, and the first Developer Preview was immediately released for the Google Pixel series (from Pixel 4 to Pixel 6, dropping support for the Pixel 3 and Pixel 3a). It was released 4 months or so after the stable version of Android 12. Developer Preview 2 followed later, releasing in March. Beta 1 was released on April 26, 2022. Google released beta 2 during Google I/O on May 11, 2022. Two more beta versions were planned for release in June and July. Platform stability was reached in June, with Beta 3. The final release of Android 13 began on August 15 when the update was made available to Pixel phones and pushed to the Android Open Source Project.
Features
Privacy
Android 13 includes several new features intended to enhance user privacy, both user-facing and developer-facing.
A new media picker is added, which improves privacy by allowing users to choose which photos and videos apps have access to. Most apps have not implemented this picker yet. In addition, Android 13 introduces a new permission, NEARBY_WIFI_DEVICES. Previously, Wi-Fi and GPS permissions were bundled into a single setting termed "Location". This change means that apps can now be allowed to search for nearby devices and networks without needing to request access to broader navigational systems.
Also, a new runtime permission feature is being added to apps sending non-exempt notifications which allows users to focus on notifications most important to them.
User experience
Apps are now required to request permission from the user before they are able to send notifications.
Small changes to dialog windows such as the Internet toggle have been added, making them fit better with the design language. The media player has been redesigned, now using the album cover as a background, and including more user controls. The multiple users feature has been improved, with the added option of selecting which apps can be accessed by the guest user. App data is sandboxed for each user, so no information is shared.
New features
The number of active apps is now shown at the bottom of the notifications panel; a tap on it opens a detailed panel which lets the user stop each of them.
Support for Bluetooth LE Audio and the LC3 audio codec, which enables receiving and sharing audio between multiple bluetooth devices simultaneously; it can also improve the audio quality and battery life of the connected devices, as long as they also support it. This version op
|
https://en.wikipedia.org/wiki/Multi-user%20BASIC
|
Multi-user BASIC was a dialect of the BASIC language for the DEC PDP-11 running the RT-11 operating system. One or more users were supported in separate address spaces sharing the same language interpreter. The syntax of the language was similar to but not identical to BASIC-11. A key language element was the support for virtual files. These were similar to the virtual arrays in BASIC-PLUS in but more limited. An array of integers, floating-point, or character strings of length 1, 2, 4, 8, 16, 32, or 64 could be placed in file and accessed with a subscript. The file could actually be opened (or re-opened) with a different definition allowing integers, characters, and floating point numbers to be stored in the same file.
Like BASIC-11, Multi-User BASIC provided some support for lab equipment, support for character terminals (LA30, VT100). Because it was a multi-user system, it did not support real-time data collection.fw.max_users=3
fw.show_multiuserui=1
References
BASIC interpreters
PDP-11
|
https://en.wikipedia.org/wiki/BASIC-11
|
BASIC-11 was a dialect of the basic language for PDP-11 operating systems such as RSX-11, RT-11, TSX and TSX-Plus. It was a classic BASIC in that it used line numbers, supported line number editing, and classic function syntax. It provided extended support for user-defined functions, external sequential disk files, and linking with assembler language modules for device support and operating system interfaces.
References
BASIC programming language
PDP-11
|
https://en.wikipedia.org/wiki/Mallet%20%28software%20project%29
|
MALLET is a Java "Machine Learning for Language Toolkit".
Description
MALLET is an integrated collection of Java code useful for statistical natural language processing, document classification, cluster analysis, information extraction, topic modeling and other machine learning applications to text.
History
MALLET was developed primarily by Andrew McCallum, of the University of Massachusetts Amherst, with assistance from graduate students and faculty from both UMASS and the University of Pennsylvania.
See also
External links
Official website of the project at the University of Massachusetts Amherst
The Topic Modeling Tool is an independently developed GUI that outputs MALLET results in CSV and HTML files
Free artificial intelligence applications
Natural language processing toolkits
Free software programmed in Java (programming language)
Java (programming language) libraries
Data mining and machine learning software
|
https://en.wikipedia.org/wiki/Sydney%20Freight%20Network
|
The Sydney Freight Network is a network of dedicated railway lines for freight in Sydney, Australia, linking the state's rural and interstate rail network with the city's main yard at Enfield and Port Botany. Its primary components are the Southern Sydney Freight Line (SSFL) and a line from Sefton to Enfield and Port Botany. The Network has been managed by the Australian Rail Track Corporation (ARTC) since 2012. Prior to the completion of the SSFL, it was managed by RailCorp as the Metropolitan Freight Network.
Route
One arm of the network starts behind the Flemington Maintenance Depot while another starts at Sefton with both merging at Enfield. Services from the state's north and west approach via the former and from the south via the latter.
From Enfield, the line heads south to Campsie where it turns east and runs parallel to the Bankstown passenger line as far as Marrickville. From here, a connection to the Illawarra line provides a link to a sea terminal at Port Kembla, south of Sydney. From Marrickville, the line continues on its own alignment to the Cooks River and Port Botany container terminals.
There was previously a loop line that completed a circuitous route of the inner suburbs. Diverging at Dulwich Hill, it headed north beneath the Main Suburban line at Lewisham to Lilyfield before heading east to Rozelle and Pyrmont, and then south under Railway Square through NSW's oldest tunnel to join the Main Suburban line outside Central. This line served the ports at Glebe Island (diverging via a spur from Lilyfield) and Darling Harbour.
With the exception of the Marrickville to Port Botany and Lilyfield to Central sections, the network was electrified in stages. The Dulwich Hill to Rozelle section was electrified in October 1967 while the Marrickville to Tempe section was completed in 1985. But with electric haulage of freight trains ceasing in the late 1990s, this infrastructure is no longer used and has been removed in parts. As of December 2018, the only remaining sections of overhead wires are a short section from the tunnel under the Bankstown line to Tempe, along the Down line from Dulwich Hill to Campsie and both tracks from Campsie to where the line separates from the Bankstown line.
The line had connections to allow suburban passenger services to operate on it including accessing the Canterbury Park Racecourse sidings on race days but these were out of use by the mid-1980s and have since been removed.
History
From the time when the Sydney Railway Company was formed in 1848, it had been the intention of the company to build a freight terminal at Darling Harbour. To this end, a railway line was constructed between the Sydney Railway Station (the predecessor to Central railway station) and Darling Harbour, which opened on 26 September 1855. Initial traffic was spoil for the construction of the Main Suburban Line between Sydney and Parramatta, then for the carriage of departmental coke for steam engines, and a small amount of ti
|
https://en.wikipedia.org/wiki/Voice%20print
|
Voice print may refer to:
VoicePrint, a Canadian audio-only TV network
Spectrogram, an image representing the sounds in a voice
Voice print, a verification method of speaker recognition
Voiceprint Records, an English record label
|
https://en.wikipedia.org/wiki/Mong%20Kok%20Computer%20Centre
|
Mong Kok Computer Centre () is a shopping mall for computers and computer related products in Nelson Street, in Mong Kok, Hong Kong.
The three floor mall houses more than 70 computer shops and attracts some 10,000 customers daily. Shops sell various kinds of products, including laptops, computer software, hardware and other accessories. Most shops offer made-to-order computers with customizable configurations, while others offer individual parts for customers who prefer to build own machines.
Free Wi-Fi access is offered in the shopping mall.
Ownership
In the 1990s, the building was owned by Tang Shing-bor (), a major property investor in Mong Kok. Alpha Investment Partners, the property investment fund of Keppel Land of Singapore, bought it for HK$750 million in January 2007.
Strikes by tenants
In February 2009, shop operators and tenants went on strikes to demand a rent cut during the economic downturn. Another strike occurred in April 2009, over complaints that computer festival bargains were cutting into their sales.
Transportation
Mong Kok station Exit D3, E2
See also
Golden Computer Centre and Golden Computer Arcade
Wan Chai Computer Centre
References
External links
http://www.mongkokcc.com/
Mong Kok
Shopping centres in Hong Kong
|
https://en.wikipedia.org/wiki/Nasan
|
The Nasan Clustered File System is a shared disk file system created by the company DataPlow. Nasan software enables high-speed access to shared files located on shared, storage area network (SAN)-attached storage devices by utilizing the high-performance, scalable data transfers inherent to storage area networks and the manageability of network attached storage (NAS).
Nasan derives its name from the combination of network attached storage (NAS) and storage area network (SAN). Nasan clustered file sharing is an extension of traditional LAN file sharing yet utilizes storage area networks for data transfers. Deploying a Nasan cluster entails configuring LAN file sharing, installing Nasan file system software, and connecting computers and storage devices to the SAN.
Platforms
Supports Linux and Solaris operating systems.
Supports all SAN-based, block-level storage protocols including Fibre Channel and iSCSI.
References
External links
Computer file systems
Disk file systems
Network file systems
Shared disk file systems
|
https://en.wikipedia.org/wiki/Remote%20data%20entry
|
A remote data entry (RDE) system is a computerized system designed for the collection of data in electronic format. The term is most commonly applied to a class of software used in the life sciences industry for collecting patient data from participants in clinical research studies—research of new drugs and/or medical devices.
Typically, RDE systems provide:
a graphical user interface component for data entry
a validation component to check user data
a reporting tool for analysis of the collected data
RDE software was started in the mid- to late-1980s as software installed locally on portable computers with modems. It has largely been replaced by a newer generation of software called electronic data capture, or EDC, that provides the same type of functionality over the Internet using web pages.
See also
Clinical data acquisition
Electronic data capture, provides a brief history of the RDE and EDC software landscape, remote jobs.
Clinical research
Pharmaceutical industry
Clinical data management
|
https://en.wikipedia.org/wiki/Dinakaran
|
Dinakaran is a Tamil daily newspaper distributed in Tamil Nadu, India. It was founded by K. P. Kandasamy in 1977 and is currently owned by media conglomerate Sun Group's Sun Network. Dinakaran is the second largest circulated Tamil daily in India after Dina Thanthi . It is printed in 12 cities across India. Dinakaran was founded in 1977 by K. P. Kandasamy after he split from Dina Thanthi owned by his father-in-law S. P. Adithanar during the split of All India Anna Dravida Munnetra Kazhagam from Dravida Munnetra Kazhagam. In 2005, the newspaper was acquired from K. P. K. Kumaran by Kalanithi Maran's Sun Group.
Dinakaran is published from 12 cities in India namely Bengaluru, Chennai, Coimbatore, Madurai, Mumbai, New Delhi, Nagercoil, Puducherry, Salem, Tiruchirappalli, Tirunelveli and Vellore. As of 2014, the newspaper has a circulation of 1,215,583.
See also
Dinakaran attack case
References
Tamil-language newspapers published in India
Companies based in Chennai
Mass media in Bangalore
Mass media in Chennai
Mass media in Coimbatore
Mass media in Madurai
Mass media in Puducherry
Newspapers published in Tiruchirappalli
Newspapers established in 1977
1977 establishments in Karnataka
Sun Group
|
https://en.wikipedia.org/wiki/Wide%20World%20of%20Sports%20%28Australian%20TV%20program%29
|
Wide World of Sports is an Australian sports television program. It was broadcast on the Nine Network.
The show originally aired from 23 May 1981, until the end of 1999. After a nine-year hiatus, it returned on 16 March 2008 and had its last episode in 2016 following Ken Sutcliffe's retirement. It was replaced by a new sport talk show Sports Sunday airing its first episode on 5 March 2017.
History
1981–1999 – Weekly shows
Wide World of Sports (WWoS) is a long-used title for Nine's sport programming. All sports broadcasts on Nine air under the WWoS brand. It was also the name of a popular sports magazine program that aired most Saturdays and Sundays. This program filled many of the summer daytime hours. The program premiered at 1:00 pm on Saturday, 23 May 1981, and was initially hosted by Mike Gibson and Ian Chappell, before being hosted in the 1990s by Max Walker and Ken Sutcliffe. Ian Maurice was the regular anchor at the WWOS Update Desk. The show ended in 1999, due in large part to the rise of Fox Sports (which Nine's owner owned half of) and other subscription sport channels, but the show returned in 2008 on Sunday mornings.
It was unrelated to the series Wide World of Sports aired by ABC in the United States, which started in 1961.
In the early 1980s, well-known hosts and presenters on Wide World of Sports included Mike Gibson and Ian Chappell, both the inaugural hosts of the Saturday afternoon program in 1981. Billy Birmingham in 1984 released a comedy album that satirized cricket "and in particular Channel Nine’s iconic commentary team with Richie Benaud the central figure," which became popular in Australia, A later album was called The Wired World of Sports. Among the hosts satirized were his friend Mike Gibson. The television show won "Most Popular Sports Program" at the Logie Awards in 1986.
In 1990s, the Wide World of Sports marketed sports paraphernalia such as signed and framed bats, and items from the Australian Rugby League. Paul Sheahan hosted Nine's Wide World of Sports program until 1999. Max Walker hosted until it ended in 1999.
2008–2020 – Show's return to TV
After a ten-year hiatus, it was announced that the Wide World of Sports weekly television program would return to Nine on 16 March 2008, using the same theme song as the old version, as well as accessing old footage for replays. This show was hosted by the previous host Ken Sutcliffe, with footy show star James Brayshaw as well as former Australian cricketer Adam Gilchrist. Revolving co-hosts included former swimmers Giaan Rooney, Nicole Livingstone and former cricketer Michael Slater. The show originally aired for 90 minutes but was recently extended to two hours. It aired on Sunday mornings at 9am till 11am.
In 2009, Grant Hackett and Michael Slater joined the team as co-hosts alongside Sutcliffe and Rooney.
After she was fired in 2014 as a cost-cutting measure, in 2016 Emma Freedman again signed up with Channel Nine's Wide World of Sports as an announcer. The
|
https://en.wikipedia.org/wiki/Interim%20analysis
|
In clinical trials and other scientific studies, an interim analysis is an analysis of data that is conducted before data collection has been completed. Clinical trials are unusual in that enrollment of subjects is a continual process staggered in time. If a treatment can be proven to be clearly beneficial or harmful compared to the concurrent control, or to be obviously futile, based on a pre-defined analysis of an incomplete data set while the study is on-going, the investigators may stop the study early.
Statistical methods
The design of many clinical trials includes some strategy for early stopping if an interim analysis reveals large differences between treatment groups, or shows obvious futility such that there is no chance that continuing to the end would show a clinically meaningful effect. In addition to saving time and resources, such a design feature can reduce study participants' exposure to an inferior or useless treatment. However, when repeated significance testing on accumulating data is done, some adjustment of the usual hypothesis testing procedure must be made to maintain an overall significance level. The methods described by Pocock and O'Brien & Fleming, among others, are popular implementations of group sequential testing for clinical trials. Sometimes interim analyses are equally spaced in terms of calendar time or the information available from the data, but this assumption can be relaxed to allow for unplanned or unequally spaced analyses.
Example
The second Multicenter Automatic Defibrillator Implantation Trial (MADIT II) was conducted to help better identify patients with coronary heart disease who would benefit from an ICD. MADIT II is the latest in a series of trials involving the use of ICDs to improve management and clinical treatment of arrhythmia patients. The Antiarrhythmics versus Implantable Defibrillators (AVID) Trial compared ICDs with antiarrhythmic-drug therapy (amiodarone or sotalol, predominantly the former) in patients who had survived life-threatening ventricular arrhythmias. After inclusion of 1,232 patients, the MADIT II study was terminated when interim analysis showed significant (31%) reduction in all-cause death in patients assigned to ICD therapy.
References
Clinical trials
Medical statistics
Clinical research
|
https://en.wikipedia.org/wiki/Robert%20Abel%20%28animator%29
|
Robert Abel (March 10, 1937 – September 23, 2001) was an American pioneer in visual effects, computer animation and interactive media, best known for the work of his company, Robert Abel and Associates.
Born in Cleveland, he received degrees in Design and Film from UCLA. He began his work in computer graphics in the 1950s, as an apprentice to John Whitney.
In the 1960s and early 1970s, Abel wrote or directed several films, including The Making of the President, 1968, Elvis on Tour and Let the Good Times Roll.
In 1971, Abel and Con Pederson founded Robert Abel and Associates (RA&A), creating slit-scan effects and using motion-controlled cameras for television commercials and films. RA&A began using Evans & Sutherland computers to previsualize their effects; this led to the creation of the trailer for The Black Hole, and the development of their own software for digitally animating films (including Tron).
Abel and Associates was contracted to provide Paramount Pictures the special effects for Star Trek: The Motion Picture, but was not able to deliver them, and was taken off the film.
In 1984, Robert Abel and Associates produced a commercial named Brilliance for the Canned Food Information Council for airing during the Super Bowl XIX telecast. It featured a sexy robot with reflective environment mapping and human-like motion.
Abel & Associates closed in 1987 following an ill-fated merger with now defunct Omnibus Computer Graphics, Inc., a company which had been based in Toronto.
In the 1990s, Abel founded Synapse Technologies, an early interactive media company, which produced pioneering educational projects for IBM, including "Columbus: Discovery, Encounter and Beyond" and "Evolution/Revolution: The World from 1890-1930".
He received numerous honors, including a Golden Globe Award (for Elvis on Tour), 2 Emmy Awards, and 33 Clios.
Abel died from complications following a myocardial infarction at the age of 64.
Abel's film By the Sea, made with Pat O'Neill, was preserved by the Academy Film Archive in 2007.
References
External links
1937 births
2001 deaths
Computer graphics professionals
Artists from Cleveland
UCLA Film School alumni
|
https://en.wikipedia.org/wiki/European%20Unitarian%20Universalists
|
The European Unitarian Universalists (EUU) is a network of English-speaking Unitarian Universalist fellowships and individuals in Western Continental Europe. It was founded in 1982 to provide support and religious community for expatriate American Unitarian Universalists in Europe, although it increasingly includes European natives.
About half of the over 200 members belong to lay-led fellowships that share resources and programs. The largest fellowship is in Paris (France). Other fellowships are located in different cities in Germany, the Netherlands, Belgium, Switzerland, and other countries. The EUU sponsors two continental gatherings per year and publishes a bi-monthly newsletter.
External links
Website of the European Unitarian Universalists
Unitarian Universalist Fellowship of Paris
Netherlands Unitarian Universalist Fellowship
Unitarian Universalist organizations
Religious organizations established in 1982
Religion in Europe
1982 establishments in Europe
|
https://en.wikipedia.org/wiki/Relay%20attack
|
A relay attack (also known as the two-thief attack) in computer security is a type of hacking technique related to man-in-the-middle and replay attacks. In a classic man-in-the-middle attack, an attacker intercepts and manipulates communications between two parties initiated by one of the parties. In a classic relay attack, communication with both parties is initiated by the attacker who then merely relays messages between the two parties without manipulating them or even necessarily reading them.
Example attack
Peggy works in a high security building that she accesses using a smart card in her purse. When she approaches the door of the building, the building detects the presence of a smart card and initiates an exchange of messages that constitute a zero-knowledge password proof that the card is Peggy's. The building then allows Peggy to enter.
Mallory wants to break into the building.
Mallory approaches the building with a device that simulates a smart card, and the building responds by initiating the exchange of messages.
Mallory forwards the message to her accomplice Evelyn who is tailing Peggy as she runs errands in another part of town.
Evelyn relays the message to Peggy's smart card, listens for the answer, and forwards the answer to Mallory, who relays it to the building. Continuing in this way, Mallory and Evelyn relay messages between the building and Peggy's smart card until the building is satisfied that it is communicating with Peggy's smart card.
The building opens and Mallory enters.
References
External links
Academic Survey on Relay Attacks
Detailed Practical Example of Relay Attack on RFID system
Relay Attack Demonstration (and related Software and Paper)
Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones
Hacking (computer security)
Computer security exploits
|
https://en.wikipedia.org/wiki/Discovery%20Home%20%26%20Health
|
Discovery Home & Health is a television channel owned by Warner Bros. Discovery that features lifestyle programming.
Discovery Home & Health is available in Latin America, Australia, Republic of Ireland, Hong Kong, Philippines, Indonesia, Thailand and Malaysia.
It was formerly available on Australia's SelecTV from March 2007 until the closure of its English service in late 2007, but remained available through Foxtel and Austar. The channel was closed in Australia on 3 November 2014 and replaced with Discovery Kids, with select programming moving to sister channel TLC; Discovery Kids ceased operations on 1 February 2020.
Programming (Latin America)
From Head to Toe
I Didn't Know I Was Pregnant
I'm Pregnant and...
A Baby Story
A Wedding Story
Bridezillas
Newlywed, Nearly Dead?
One Week to Save Your Marriage
Say Yes to the Dress
Whose Wedding Is It Anyway?
Wife Swap UK
Wife Swap US
Sister Wives
Strange Sex
Who the (Bleep) Did I Marry?
Tim Gunn's Guide to Style
What Not to Wear
10 Years Younger (US, Latin America)
Style Her Famous (also seen on E!)
How Do I Look?
What I Hate About Me
You're Wearing That?!?
Ultimate Shopper
Clean House
Dress My Nest
Divine Design
Emeril Green
Renovation Nation
Trading Spaces
Extreme Makeover: Home Edition
Extreme Weight Loss
Hoarding: Buried Alive
Jon & Kate Plus 8 / Kate Plus 8
Little People, Big World
Supernanny
World's Strictest Parents
17 Kids and Counting
Split Ends
The Biggest Loser
The Rachael Ray Show
Toddlers & Tiaras
Extreme Couponing
Mystery Diagnosis
Dating Naked (Brazil)
References
External links
Discovery Home & Health Latin America
Home Health
Warner Bros. Discovery networks
Television channels and stations established in 1998
Defunct television channels in Australia
English-language television stations in Australia
ms:Discovery Real Time
|
https://en.wikipedia.org/wiki/King%20David%20Schools%2C%20Johannesburg
|
The King David Schools are a network of Jewish day schools in Johannesburg, South Africa, offering nursery through high school education. There are three campuses across Johannesburg: Linksfield, Victory Park, and Sandton; "each school has an atmosphere of its own serving the specific community". The schools are under the auspices of the South African Board of Jewish Education.
King David aims to deliver "an excellent general education together with the study of Hebrew, Jewish Studies and the living of the Jewish calendar and year cycle" and to produce "graduates who are menschen, confident and equipped to pursue any opportunity they wish to, who are proud of their Jewish heritage and its traditions, who have a love for learning, and a determination to contribute to their society."
The Linksfield campus, in northeastern Johannesburg, was established in 1948 as South Africa's first Jewish day school (the high school was founded in 1955); see further under History of the Jews in South Africa. Many of the original buildings of the high school from 1948 still exist on the campus. As a relatively large school, King David Linksfield fields strong teams in several sports. The Victory Park campus (primary school, 1960; high school, 1964) serves northern and northwestern Johannesburg. It has fewer students than Linksfield. The Sandton campus, a primary school, is the most recently established (1982), and feeds into both high schools. Each campus also has its own nursery school.
The schools write the Independent Examination Board examinations for Matriculation; pass rates are very high, and pupils are often amongst the top-ranked, nationwide. The King Davids also achieve in various cultural activities, and, particularly Linksfield, in sporting activities. Each school is involved in several outreach and charity programs, focused on the Jewish and broader communities, including (matriculation) support and enrichment programs for Schools in Alexandra and Soweto. Many King David alumni are noted for their achievements, in South Africa and internationally – see Links below.
Although only a small minority of the pupils are observant – Johannesburg has several Religious day schools – the schools are (nominally) Orthodox. Practically, no school activities take place on Shabbat or on Jewish Holidays, all catering is Kosher, and the school day begins with Shacharit (Morning prayers). Educationally, each school has a Rabbi on staff, Hebrew and/or Jewish Studies are compulsory subjects until Grade 11 (Form IV), and the schools offer a "Beit Midrash stream" – established by Chief Rabbi, Dr. Warren Goldstein – for Grade 10s and 11s who choose this over the regular Jewish Studies classes. The schools are also served by "the DIJE" (Division of Informal Jewish Education), offering programmes which "complement the formal classroom and allow learners to engage with and experience their Judaism". "Encounter", for Grade 11s, is the DIJE's premier educational programme – i
|
https://en.wikipedia.org/wiki/Google%20Developers
|
Google Developers (previously Google Code) , application programming interfaces (APIs), and technical resources. The site contains documentation on using Google developer tools and APIs—including discussion groups and blogs for developers using Google's developer products.
There are APIs offered for almost all of Google's popular consumer products, like Google Maps, YouTube, Google Apps, and others.
The site also features a variety of developer products and tools built specifically for developers. Google App Engine is a hosting service for web apps. Project Hosting gives users version control for open source code. Google Web Toolkit (GWT) allows developers to create Ajax applications in the Java programming language.(All languages)
The site contains reference information for community based developer products that Google is involved with like Android from the Open Handset Alliance and OpenSocial from the OpenSocial Foundation.
Google APIs
Google offers a variety of APIs, mostly web APIs for web developers. The APIs are based on popular Google consumer products, including Google Maps, Google Earth, AdSense, Adwords, Google Apps and YouTube.
Google Data APIs
The Google Data APIs allow programmers to create applications that read and write data from Google services. Currently, these include APIs for Google Apps, Google Analytics, Blogger, Google Base, Google Book Search, Google Calendar, Google Code Search, Google Earth, Google Spreadsheets, Google Notebook,
Ajax APIs
Google's Ajax APIs let a developer implement rich, dynamic websites entirely in JavaScript and HTML. A developer can create a map to a site, a dynamic search box, or download feeds with just a few lines of javascript.
Ads APIs
The AdSense and AdWords APIs, based on the SOAP data exchange standard, allow developers to integrate their own applications with these Google services. The AdSense API allows owners of websites and blogs to manage AdSense sign-up, content and reporting, while the AdWords API gives AdWords customers programmatic access to their AdWords accounts and campaigns.
Developer tools and open-source projects
App Engine
Google App Engine lets developers run web applications on Google Cloud. Google App Engine supports apps written in several programming languages. With App Engine's Java runtime environment, one can build their app using standard Java technologies, including the JVM, Java servlets, and the Java programming language—or any other language using a JVM-based interpreter or compiler, such as JavaScript or Ruby. App Engine also features a dedicated Python runtime environment, which includes a fast Python interpreter and the Python standard library.
Google Plugin for Eclipse
Google Plugin for Eclipse (GPE) is a set of software development tools that enables Java developers to design, build, optimize, and deploy cloud computing applications. GPE assists developers in creating complex user interfaces, generating Ajax code using the Google Web Too
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.