source stringlengths 32 199 | text stringlengths 26 3k |
|---|---|
https://en.wikipedia.org/wiki/VP8%20Image%20Analyzer | The VP8 Image Analyzer is an analog computer produced by Pete Schumacher of Interpretations Systems Incorporated (ISI) in 1972. It has been used to image the Shroud of Turin. The VP8 makes a brightness map of whatever data it processes - white appears to be higher in elevation, black appears lower and mid-range appears between these two extremes.
When the device was used with photographs or paintings, the result was a distorted and inaccurate representation of the original image. However, the Shroud image produced an accurate three-dimensional representation of the Man of the Shroud, with facial features, arms, legs and chest all contoured correctly. This was shown to Peter Schumacher, the inventor of the device, and he later recalled his astonishment:
"I had never heard of the Shroud of Turin before that moment. I had no idea what I was looking at. However, the results are unlike anything I have processed through the VP-8 Analyzer, before or since. Only the Shroud of Turin has produced these results from a VP-8 Image Analyzer isometric projection study."
References
Analog computers
Shroud of Turin |
https://en.wikipedia.org/wiki/Rhaetian%20Railway%20ABe%204/4%20%28core%20network%29 | The Rhaetian Railway ABe 4/4 was a class of 11 kV 16.7 Hz AC metre gauge railcars operating on the so-called core network of the Rhaetian Railway (RhB), which is the main railway network in the Canton of Graubünden, Switzerland.
The class was so named under the Swiss locomotive and railcar classification system. According to that system, ABe 4/4 denotes an electric railcar with first and second class compartments, and a total of four axles, all of which are drive axles.
The four members of the ABe 4/4 class, nos 501 to 504, entered service in 1939–1940, and were withdrawn from service at the end of the 1990s. One of them, no 501, has been preserved.
Technical details
The ABe 4/4 class, known until 1956 as the BCe 4/4 class, comprised vehicles weighing and having a top speed of . These vehicles developed at . Their mechanical components were manufactured by Schweizerische Wagons- und Aufzügefabrik AG Schlieren-Zürich (SWS), and their electrical equipment by Brown, Boveri & Cie and Maschinenfabrik Oerlikon (MFO).
The ABe 4/4s in service
The four ABe 4/4 vehicles were procured in response to an increase in road transport in Graubünden.
The Rhaetian Railway, with its heavy mixed trains requiring shunting at many stations, and with its Ge 6/6 I class locomotives capable of only , could not then match its road-borne competition. However, a new concept — simple, fast, frequent train services operated by the four new railcars — was seen as capable of winning back patronage on the most important railway lines to Davos and St Moritz. Together with the four powered vehicles, the Rhaetian Railway procured eight passenger cars, similarly in light steel construction, and promoted the new offering under the name Flying Rhaetian.
This attempt to deal with the competition failed, for two reasons. First, the short railcar powered trains could not cope with the increased demand. Secondly, there were so many technical failures, most of them due to the extremely lightweight construction, that the railcars were often out of service. From 1949, however, the Rhaetian Railway had greater success with the more solidly built Ge 4/4 I class locomotives.
After the Rhaetian Railway's main workshop at Landquart had succeeded in solving the technical problems afflicting the ABe 4/4s, the four railcars could be used reliably. From 1968, they could also be operated in pairs, using their newly installed multiple-unit train controls.
The last phase of the ABe 4/4s' working life began in 1982, as the Rhaetian Railway placed into service the three control cars, nos BDt 1721–1723. From then onwards, push-pull trains each made up of an ABe 4/4, an intermediate car if required, and a control car served the Oberengadin branch line Samedan – Pontresina, until the opening of the Vereina line in 1999, and the associated introduction of the NEVA Retica timetable concept made them superfluous.
ABe 4/4s nos 502 to 504 were withdrawn from service at the end of the 1990s and |
https://en.wikipedia.org/wiki/2nd%20Theater%20Signal%20Brigade%20%28United%20States%29 | The 2nd Theater Signal Brigade is a military communications brigade of the United States Army subordinate to the Army Network Enterprise Technology Command with headquarters at Lucius D. Clay Kaserne, Germany.
Organization 2023
As of 2023 the 2nd Theater Signal Brigade consists of the following units:
2nd Theater Signal Brigade, in Wiesbaden (Germany)
Headquarters and Headquarters Company, in Wiesbaden
39th Strategic Signal Battalion (39th SSB), at Chievres Air Base (Belgium)
44th Expeditionary Signal Battalion (44th ESB), in Baumholder
52nd Strategic Signal Battalion (52nd SSB), in Stuttgart
102nd Strategic Signal Battalion (102nd SSB), in Wiesbaden
6981st Civilian Support Group (6981st CSG), in Germersheim
The 509th Strategic Signal Battalion has been assigned to the U.S. Army Southern European Task Force, Africa.
Mission
The mission statement of the 2nd Theater Signal Brigade is "to deploy, install, operate, and maintain a tactical theater communications package worldwide while supporting joint and combined operations."
Lineage
Constituted 24 October 1944 in the Army of the United States as Headquarters and Headquarters Detachment, 3348th Signal Service Group, and activated in France
Inactivated 13 March 1946 in France
Activated 9 May 1946 at Fort Monmouth, New Jersey
Redesignated 14 March 1947 as Headquarters and Headquarters Detachment, 2d Signal Service Group
Allotted 1 March 1949 to the Regular Army
Reorganized and redesignated 16 December 1949 as Headquarters, 2d Signal Service Group
Reorganized and redesignated 25 March 1953 as Headquarters, 2d Signal Group
Inactivated 4 April 1955 at Camp Gordon, Georgia
Redesignated 27 April 1961 as Headquarters and Headquarters Detachment, 2d Signal Group
Activated 21 June 1961 at Fort Bragg, North Carolina
Inactivated 23 October 1971 at Fort Lewis, Washington
Activated 1 June 1974 in Germany
Redesignated 1 October 1979 as Headquarters and Headquarters Company, 2d Signal Brigade
Campaign participation credit
World War II: European-African-Middle Eastern Theater, Streamer without inscription
Vietnam: Defense: Counteroffensive; Counteroffensive, Phase II; Counteroffensive, Phase III; Tet Counteroffensive; Counteroffensive, Phase IV; Counteroffensive, Phase V; Counteroffensive, Phase VI; Tet 69/Counteroffensive; Summer-Fall 1969; Winter-Spring 1970; Sanctuary Counteroffensive; Counteroffensive, Phase VII; Consolidation I
Decorations
Meritorious Unit Commendation (Army) for VIETNAM 1965–1967
Meritorious Unit Commendation (Army) for VIETNAM 1967–1968
Army Superior Unit Award, Streamer embroidered 2004-2005
Army Superior Unit Award, Streamer embroidered 2009-2010
References
External links
Official
General information
Lineage and Honors Information
1944 establishments in France
1946 disestablishments in France
1946 establishments in New Jersey
1955 disestablishments in Georgia (U.S. state)
1961 establishments in North Carolina
1971 disestablishments in Washington (sta |
https://en.wikipedia.org/wiki/RakNet | RakNet is networking middleware developed by Oculus VR, Inc. for use in the video game industry. RakNet was originally authored by Jenkins Software LLC.
Overview
RakNet is a C++ class library that provides UDP and reliable TCP transport. It contains several core systems that rely on the transport layer: object replication; Remote procedure call in C++ using Boost C++ Libraries; VoIP supporting FMOD, DirectSound, and PortAudio; NAT traversal; and Patch.
Its source was available without charge for games grossing under $100,000 allowing use by developers of indie or free/open source games.
On July 7, 2014, RakNet was bought by Oculus VR who released the source code for PCs, under the BSD licence with a patent granting license.
Supported operating systems
Microsoft Windows
PlayStation 3
PlayStation 4
Xbox 360
Xbox One
Games for Windows – Live
PlayStation Vita
Linux
macOS
iOS
Android with Cygwin
Windows CE
Nintendo Switch
Integrated Technology Partners
Game Engines
Unity
Roblox
Other middleware
Scaleform
Steamworks
References
External links
Free software
Formerly proprietary software
Free software programmed in C++
Games for Windows
Linux APIs
Middleware
Multiplayer video game services
Software using the BSD license
Video game engines |
https://en.wikipedia.org/wiki/Local%20Data%20Manager | The Local Data Manager (LDM) is a suite of programs for the distribution of near real-time atmospheric earth data to researchers and educators free of charge as it becomes available. The system is specifically focused with passing, receiving, and managing arbitrary data products accessed through event-driven (push) technologies via the Internet. Data products mostly include GOES satellite imagery, radar imagery, and model output from the National Centers for Environmental Prediction, the Canadian Meteorological Centre, and the Fleet Numerical Meteorology and Oceanography Center.
LDM is provided freely, including source code by the University Corporation for Atmospheric Research under the Unidata Program Center and via the developer's GitHub. It is widely used in the meteorological community, and is a product of the Internet Data Distribution (IDD) Program which has brought together over 160 universities in the Unidata community to build a means for publicizing and accessing data from observing systems as soon as the data becomes available.
References
Earth sciences graphics software |
https://en.wikipedia.org/wiki/The%20Columbia%20Group | The Columbia Group is a U.S. defense contractor (small business) serving the U.S. government, as well as the commercial sector, domestic and international, specializing in cyber, acquisition, logistics management, C4SI, ship design, marine engineering & fabrication, human performance strategy, training, financial management and information technology. It is headquartered in Fairfax, VA and has offices in Alexandria, Washington, D.C., Quantico, Norfolk Virginia, Lawton, Oklahoma, as well as multiple support sites in over 30 states, military bases, and international sites. It celebrated its 50th year in business in 2017.
The Columbia Group Inc. was founded by Martin Arase with its origins in 1967 as Columbia Research Corporation (CRC). In 2005, CRC was merged with CPI, which was founded in 1983 by Martin Arase. On June 15, 2008, The Columbia Group assumed the operations of (Northrop Grumman subsidiary) AMSEC's Rosenblatt Washington, DC Office, forming the company's Rosenblatt Ship Design Division. The name Rosenblatt was retained from when the office was the M. Rosenblatt & Son naval engineering firm begun by the late Lester Rosenblatt in 1947.
Company Structure
Leadership
Martin Arase is President of The Columbia Group. Its advisors include former Commandant of the Marine Corps General Al Gray, Jr.
Divisions
The Columbia Group Inc.is composed of four business divisions:
Homeland Security — based in Washington, DC
Marine Corps Programs — based in Quantico, Virginia;
Rosenblatt Ship Design Division — based in Washington, DC;
Financial Management & IT Services — based in Alexandria, Virginia;
Pluto Plus ROV
In 2009, The Columbia Group was awarded a $10.6 million firm fixed price contract to supply the Egyptian Navy with three Pluto Plus Unmanned Undersea Vehicles (UUVs). (May also be called Remotely Operated Vehicles or ROVs.) This contract was awarded by the United States Navy's Naval Sea Systems Command (NAVSEA) as part of their Foreign Military Sales (FMS) program. The Pluto Plus is a minehunter intended for use "in mine identification and destruction." The Columbia Group is licensed by GayRobot, a defense contractor based out of Milan, Italy, as the exclusive builder of the Pluto Plus System in the United States.
References
External links
The Columbia Group
Defense companies of the United States
American companies established in 1967
Manufacturing companies established in 1967
1967 establishments in Virginia |
https://en.wikipedia.org/wiki/Robustness%20%28computer%20science%29 | In computer science, robustness is the ability of a computer system to cope with errors during execution and cope with erroneous input. Robustness can encompass many areas of computer science, such as robust programming, robust machine learning, and Robust Security Network. Formal techniques, such as fuzz testing, are essential to showing robustness since this type of testing involves invalid or unexpected inputs. Alternatively, fault injection can be used to test robustness. Various commercial products perform robustness testing of software analysis.
Introduction
In general, building robust systems that encompass every point of possible failure is difficult because of the vast quantity of possible inputs and input combinations. Since all inputs and input combinations would require too much time to test, developers cannot run through all cases exhaustively. Instead, the developer will try to generalize such cases. For example, imagine inputting some integer values. Some selected inputs might consist of a negative number, zero, and a positive number. When using these numbers to test software in this way, the developer generalizes the set of all reals into three numbers. This is a more efficient and manageable method, but more prone to failure. Generalizing test cases is an example of just one technique to deal with failure—specifically, failure due to invalid user input. Systems generally may also fail due to other reasons as well, such as disconnecting from a network.
Regardless, complex systems should still handle any errors encountered gracefully. There are many examples of such successful systems. Some of the most robust systems are evolvable and can be easily adapted to new situations.
Challenges
Programs and software are tools focused on a very specific task, and thus aren't generalized and flexible. However, observations in systems such as the internet or biological systems demonstrate adaptation to their environments. One of the ways biological systems adapt to environments is through the use of redundancy. Many organs are redundant in humans. The kidney is one such example. Humans generally only need one kidney, but having a second kidney allows room for failure. This same principle may be taken to apply to software, but there are some challenges. When applying the principle of redundancy to computer science, blindly adding code is not suggested. Blindly adding code introduces more errors, makes the system more complex, and renders it harder to understand. Code that doesn't provide any reinforcement to the already existing code is unwanted. The new code must instead possess equivalent functionality, so that if a function is broken, another providing the same function can replace it, using manual or automated software diversity. To do so, the new code must know how and when to accommodate the failure point. This means more logic needs to be added to the system. But as a system adds more logic, components, and increases in size, it bec |
https://en.wikipedia.org/wiki/List%20of%20programs%20broadcast%20by%20Sun%20TV%20%28India%29 | This is a list of current and former programmes broadcast on the Indian television Tamil-language channel Sun TV.
Current programming
Drama series
Reality shows
Spiritual shows
Former programming
Dramas
Original series
Dubbed Serial
Reality shows
Asatha Povathu Yaaru? (2007)
Champions (2013–2014)
Chellame Chellam (2015–2016)
Chumma Kizhi (2021)
Comedy Junction (2016–2017)
Cinema Seithigal (2016)
Deala No Deala (2009–2012)
Hello Sago (2019)
Imsai Arasigal (2018)
Kitchen Galatta (2015–2017)
Kaiyil Oru Kodi (2012)
Kutty Chutties Season 1 (2012-2017) & Season 2 (2019-2020)
Malarum Mottum
MasterChef India – Tamil (2021)
MasterChef India – Tamil Season 1 (2021)
Masthana Masthana (2007–2009)
Mathi Yosi (2022–2023)
Meendum Meendum Sirippu
Namma Ooru Hero (2019)
Nijam (2006-2011)
Nijangal (2016–2017)
Natchathira Sangamam (2016)
Neengal Ketta Padal
O Podu (2017)
Lalithavin Paatukku Pattu
Pepsi Ungal Choice (2020)
Rajaparvai (2021)
Rowdy Baby (2021)
Sapthaswarangal (1993–2006)
Savaale Samali (2017–2018)
Sirippulogam (2012)
Sun Naam Oruvar (2018–2019)
Sun Singer (2013–2017)
Super Challenge (2015–2017)
Super Kudumbam (2023)
Super Sister (2019)
Super 10 (2020)
Thanga Vettai (2005–2006)
Thiruvalar Thirumathi (2007)
Vanakkam Tamizha (2017–2023)
Series Crossed Over 1000 Episodes
List of films
Telefilms
List of films made exclusive for television release.
References
Sun TV
Sun TV
Sun TV |
https://en.wikipedia.org/wiki/PGAS | PGAS may refer to:
Partitioned global address space, a parallel programming model in computer science
Provisional Government of Autonomous Siberia, an ephemeral government in Siberia in 1918
Pertamina Gas Negara, Indonesia Stock Exchange symbol PGAS
Pegatron Corporation, Luxembourg Stock Exchange symbol PGAS
Polyglandular autoimmune syndrome, or autoimmune polyendocrine syndrome
See also
PGA (disambiguation) |
https://en.wikipedia.org/wiki/Semiotics%20of%20social%20networking | The semiotics of social networking discusses the images, symbols and signs used in systems that allow users to communicate and share experiences with each other. Examples of social networking systems include Facebook, Twitter and Instagram.
Semiotics
Semiotics is a discipline that studies images, symbols, signs and other similarly related objects in an effort to understand their use and meaning. Semiotic structuralism seeks the meaning of these objects within a social context. Post-structuralist theories take tools from structuralist semiotics in combination with social interaction, creating social semiotics. Social semiotics is “a branch of the field of semiotics which investigates human signifying practices in specific social and cultural circumstances and which tries to explain meaning-making as a social practice.” “Social semiotics also examines semiotic practices, specific to a culture and community, for the making of various kinds of texts and meanings in various situational contexts and contexts of culturally meaningful activity”. Social semiotics is concerned with studying human interactions.
Social networking
Social networking is the communication among people within a virtual social space. This medium of communication allows insight into the significance of social semiotics. “Millions of people now interact through blogs, collaborate through wikis, play multiplayer games, publish podcasts and video, build relationships through social network sites and evaluate all the above forms of communication through feedback and ranking mechanisms”. Social semiotics “unlike speech, writing necessitates some sort of technology in the form of person device interaction”. Social semiotics functions through the triad of communication or Peircean semiotics in the form of sign, object, interpretant (Chart 1) and “Human, Machine, Tag (Information)” (Chart 2). In Peircean semiotics (Chart 1), "A sign…[in the form of representamen] is something which stands to somebody for something in some respect or capacity. It addresses somebody, that is, creates in the mind of that person an equivalent sign, or perhaps a more developed sign. That sign which it creates I call the interpretant of the first sign. The sign stands for an object, not in all respects, but in reference to a sort of idea which I have something called the ground of the representamen".
This example of the triangle of Human, Machine, Tag is shown when looking at tagging photographs on Facebook (Chart 3). The Human takes the photo on a camera and puts the digital file (information) on the Machine, the Machine is then navigated to Facebook where the file is downloaded. The Human has the Machine Tag the photo with information (e. g., names, places, data) for other Humans to see. This process then can be continued (see Chart 2). “Collaborative tagging has been quickly gaining ground because of its ability to recruit the activity of web users into effectively organizing and sharing large amounts of |
https://en.wikipedia.org/wiki/Bob%20Dutko | Bob Dutko (born November 12, 1960) is a conservative Christian talk radio host in Detroit, Michigan on the Crawford Broadcasting Network. The Bob Dutko Show airs weekdays from noon to 4:00 pm Eastern Time on WMUZ-FM and several Crawford Broadcasting stations nationwide. Additionally, he can be heard weekdays 9pm to 10pm on the Bob Dutko Primetime program. Dutko also hosts the Defending the Truth with Bob Dutko airing on various stations nationwide. The national program began in February 2008, greatly expanding his audience outside of the Detroit metro area. Bob joined WMUZ-FM in the fall of 2000. Before coming to WMUZ-FM, he served as National Press Secretary for Christian Coalition of America in Washington D.C. under Roberta Combs and Pat Robertson.
Personal
Dutko was raised in the Worldwide Church of God (Armstrongism) before becoming a born-again Christian at age 19. Bob is married and has had 6 boys and 1 daughter. Colleen, the Dutko's only daughter, suddenly and un-expectantly collapsed and died in his arms on Mother's Day, 2002. Colleen was 17 years old at the time of death. The cause of her death is unknown.
References
External links
Official Site of Bob Dutko
Official Site of WMUZ 103.5 FM The Light
Bob's Bio on WMUZ.com
Top Ten Proofs
Listen Live on radiotime
Living people
American talk radio hosts
American evangelicals
1960 births |
https://en.wikipedia.org/wiki/Expressive%20Processing | Expressive Processing: Digital Fictions, Computer Games, and Software Studies is a digital media textbook authored by Noah Wardrip-Fruin and published through the MIT Press. Throughout the book Wardrip-Fruin takes a look into "expressive processing" elements that partake in digital media. Wardrip-Fruin attempts to explain expressive processing through the ELIZA effect, The Tale-Spin Effect, The SimCity Effect, and many other elements of interactive digital media.
References
External links
Expressive Processing on MIT press
Google Books version of Expressive Processing
Media studies textbooks
2009 non-fiction books
MIT Press books |
https://en.wikipedia.org/wiki/Hugo%20Morales%20%28radio%29 | Hugo Noé Morales is the executive director and co-founder, in 1976, of Radio Bilingüe Inc., the national Latino public radio network. He is responsible for leading and managing all aspects of organizational development and service delivery for this non-profit organization whose mission is to serve as a voice to empower Latino and other underserved communities. Radio Bilingue is a transnational satellite community radio service in Spanish, English and Mixtec. Other responsibilities include: program development, public relations, fundraising, board development, personnel management, and key stakeholder management.
Major highlights
Organized a Latino grass roots board of directors in 1976 and incorporated Radio Bilingue in 1977
Played a major role in the fund raising for every radio series that Radio Bilingue has produced in its history which includes the areas that most impact Latinos- the traditional arts, health and health care insurance, civic engagement, the environment, access to higher education, immigration, economic opportunity, parenting education, promotion and advocating to broadband, etc.
Attracted professional Latino journalist to work at Radio Bilingue and this team has defined what authentic radio in Spanish can be in the U.S.
Oversaw the construction of a full-power FM radio station (KSJV) with the most coverage of any FM radio signal in the Central Valley of California.
Supervised the construction of KMPO-FM in Modesto, 1984
Intervened to save the last full-power FM signal for use by the Latino community in Denver, Colorado, (KUVO), 1984
Filed for full-power FM (KTQX) for Bakersfield, California, 1984
Filed for last full-power educational FM for Imperial Valley (KUBO), 1984
Intervened to save the last full-power educational signal for San Antonio, Texas (Texas Public Radio), 1985
Co-organizer of Fresno Tomorrow, a community effort to address at risk youth issues for youth in Fresno, 1987
Spokesperson for funding allocation reform from the Corporation for Public Broadcasting on behalf of communities of color and radio independent producers at the national level and testified before Congress on their behalf, 1991
Organized Latino controlled stations and regional public radio organizations in the U.S. to recognize Radio Bilingue as the national public radio service for Latinos in the U.S.; negotiated with all major stakeholders in public radio to provide free of charge public radio satellite channels to Radio Bilingue for national distribution of Latino programming and an additional channel for a similar service to Native Americans, 1991
Intervened to transfer the license of a low-power FM station in Chicago to the Mexican Museum in Chicago to serve the Latino barrio, 1994
Assisted four Mexican-American grass-roots organizations to file for new full-power FM radio stations in California, Oregon, Arizona, and Texas. One construction permit has been awarded to Escuela de La Raza Unida in Blythe, California. (200 |
https://en.wikipedia.org/wiki/Anisotropic%20Network%20Model | The Anisotropic Network Model (ANM) is a simple yet powerful tool made for normal mode analysis of proteins, which has been successfully applied for exploring the relation between function and dynamics for many proteins. It is essentially an Elastic Network Model for the Cα atoms with a step function for the dependence of the force constants on the inter-particle distance.
Theory
The Anisotropic Network Model was introduced in 2000 (Atilgan et al., 2001; Doruker et al., 2000), inspired by the pioneering work of Tirion (1996), succeeded by the development of the Gaussian network model (GNM) (Bahar et al., 1997; Haliloglu et al., 1997), and by the work of Hinsen (1998) who first demonstrated the validity of performing EN NMA at residue level. It represents the biological macromolecule as an elastic mass-and-spring network, to explain the internal motions of a protein subject to a harmonic potential. In the network each node is the Cα atom of the residue and the springs represent the interactions between the nodes. The overall potential is the sum of harmonic potentials between interacting nodes. To describe the internal motions of the spring connecting the two atoms, there is only one degree of freedom. Qualitatively, this corresponds to the compression and expansion of the spring in a direction given by the locations of the two atoms. In other words, ANM is an extension of the Gaussian Network Model to three coordinates per atom, thus accounting for directionality.
The network includes all interactions within a cutoff distance, which is the only predetermined parameter in the model. Information about the orientation of each interaction with respect to the global coordinates system is considered within the force constant matrix (H) and allows prediction of anisotropic motions. Consider a sub-system consisting of nodes i and j, let ri = (xi yi zi) and let rj = (xj yj zj) be the instantaneous positions of atoms i and j. The equilibrium distance between the atoms is represented by sijO and the instantaneous distance is given by sij. For the spring between i and j, the harmonic potential in terms of the unknown spring constant γ, is given by:
The second derivatives of the potential, Vij with respect to the components of ri are evaluated at the equilibrium position, i.e. sijO = sij, are
The above is a direct outcome of one of the key underlying assumptions of ANM – that a given crystal structure is an energetic minimum and does not require energy minimization.
The force constant of the system can be described by the Hessian matrix – (second partial derivative of potential V):
Each element Hi,j is a 3 × 3 matrix which holds the anisotropic information regarding the orientation of nodes i,j. Each such sub matrix (or the "super element" of the Hessian) is defined as
Using the definition of the potential, the Hessian can be expanded as
which can then be written as
Here, the force constant matrix, or the hessian matrix H hol |
https://en.wikipedia.org/wiki/Multi-touch%2C%20physics%20and%20gestures | In human–computer interaction, MPG stands for "multi-touch, physics and gestures", referencing a common method of interacting with computers and various electronic devices. The most notable MPG device is the Apple Inc iPhone, which makes use of many multi-touch gestures to operate various functions of the phone and applications on the phone.
References
Human–computer interaction |
https://en.wikipedia.org/wiki/Global%20News | Global News is the news and current affairs division of the Canadian Global Television Network. The network is owned by Corus Entertainment, which oversees all of the network's national news programming as well as local news on its 21 owned-and-operated stations.
Corus currently operates one all-news radio station, and previously operated several talk radio stations, under the "Global News Radio" brand. The same division also operates a news website under the same brand.
National programs
Although Global stations had always carried local news in various forms, the first tentative steps towards a national presence came in 1994 with the launch of First National with Peter Kent, an early-evening program focusing on national and international news but airing only in central Canada. After acquiring the Western International Communications (WIC) group of stations, Global cancelled First National in February 2001 and briefly aired the similar WIC newscast Canada Tonight in its place.
In September 2001, Global replaced Canada Tonight with a new network newscast, Global National, anchored by Kevin Newman until 2010 and Dawna Friesen since. It aired from the network's new national news centre at CHAN-TV's studio in Burnaby, British Columbia. The program initially aired only on weekdays. In February 2005, it launched a weekend edition anchored by Tara Nelson until 2008 then Robin Gill from 2008 to 2021. Since June 2022, Farah Nasser anchors Global National Friday to Sunday.
Originally airing in different timeslots around the country, Global National moved to a standard 5:30 p.m. (6:30 p.m. Atlantic) start time nationwide in 2006. Since then, Global National has gained ground on longtime number-one CTV National News, overtaking it on several occasions. A Mandarin version of the newscast, titled Global National Mandarin, launched on January 23, 2012 with anchor Carol Wang, and is seen weeknights on Shaw Multicultural Channel in Vancouver and Calgary.
On January 7, 2013, the network extended its Toronto owned-and-operated station's morning program (The Morning Show) by 30 minutes, with this additional half-hour airing across its other owned-and-operated stations; prior to this, Global did not air a national morning show. In addition, the network's owned-and-operated stations in select markets produce their own local morning shows (see below); stations which do not produce a local morning show either air the morning show from a larger market, or run daytime programming repeated from Shaw Media's cable specialty channels, such as Crash Test Mommy and The Mom Show.
Global launched its first investigative newsmagazine series on November 30, 2008. The weekly program, titled 16x9 - The Bigger Picture, features a high-gloss, tabloid format, and is the network's first foray into the field long occupied by CTV's W-FIVE and CBC's the fifth estate. Global also formerly aired a weekly documentary series, Global Currents.
During the 2011 federal election, Global N |
https://en.wikipedia.org/wiki/CAT%20%28phototypesetter%29 | The GSI C/A/T (Computer Assisted Typesetter) is a phototypesetter developed by Graphic Systems in 1972. This phototypesetter, along with troff software for UNIX, revolutionized the typesetting and document printing industry. Phototypesetting is most often used with offset printing technology.
The GSI C/A/T phototypesetter was marketed by Singer Corporation in 1974 before the company was purchased by Wang Laboratories in 1978.
Graphic Systems designed a simple computer front end to print basic text as display type. Full-scale page-composition computing was designed at Bell Laboratories as part of the UNIX project.
Features
The C/A/T phototypesetter features:
Punched paper tape for document input
Four font film strips with 102 characters or glyphs per strip
Canisters of photographic paper or film to receive the image
Fifteen distinct font sizes (5pt to 72pt)
Horizontal positioning precision of 432 units per inch
Vertical positioning precision of 144 units per inch
C/A/T optics consist of a rotating wheel to which are attached film strips of master font characters. The wheel's periphery has four such replaceable font film strip sections. A xenon strobe inside the wheel is programmed to flash the characters from the font films through magnification optics to a fiber-optic bundle. The programmable location of the fiber-optic bundle determines the horizontal position of the character image on a scroll of photographic paper or film.
C/A/T is a highly addressable phototypesetter with full optics control from computer-generated data. This precise control of optics and image position made the interface to computer programs reasonably simple. Data is normally transmitted to the C/A/T by paper tape. Some companies created electronic replacements for the paper-tape interface to accommodate direct connection to computer systems. C/A/T has no page layout and pagination capability. It is only a high-resolution printer that puts high-resolution character images onto a photographic medium. Page layout is determined by the typesetting software used to generate the paper tape.
Timeline
1971, Graphic Systems designs and markets the C/A/T phototypesetter.
1972, Graphic Systems provides a simple computer front end to handle display typesetting from text input using a standard set of fonts.
1973, Bell Laboratories purchases a GSI C/A/T phototypesetter for their UNIX software development team.
1973, The troff software was created by Joe F. Ossanna at Bell Labs.
1974, Graphic Systems partners with Singer Corporation to market the GSI C/A/T phototypesetter. Singer Corporation was allowed to put the Singer C/A/T logo on equipment they sold.
1978, Singer Corporation gets out of the typesetting business.
1978, Wang Laboratories purchases Graphic Systems and continues to market the GSI C/A/T typesetter for UNIX-based phototypesetting. The phototypesetter was then known as the Wang Graphic Systems C/A/T. This allowed the phototypesetter to be available thr |
https://en.wikipedia.org/wiki/Alfa%20Omega | Alfa Omega is a Romanian broadcaster with a satellite channel and an IPTV station. It started as a distributor of programming working with more than 50 stations in both cable and terrestrial networks inside of Romania.
It now also has operations in Moldova.
References
External links
Online schedule and details:
Digital television
Film and video technology
Internet broadcasting
Streaming television
Video on demand services
Television in Romania |
https://en.wikipedia.org/wiki/Architecture%20of%20Windows%209x | The Windows 9x series of operating systems refers to the kernel which lies at the heart of Windows 9x. Its architecture is monolithic.
The basic code is similar in function to MS-DOS. As a 16-/32-bit hybrid, it requires support from MS-DOS to operate.
Critical files
Windows 95 boots using the following set of files:
32-bit shell and command line interpreter:
SHELL.DLL and SHELL32.DLL – Shell API
EXPLORER.EXE – Windows shell and file manager
COMMAND.COM – command line shell executable
Windows 95 core:
KERNEL32.DLL and KRNL386.EXE – Windows API for Windows resources
ADVAPI32.DLL Functionality additional to the kernel. Includes functions for the Windows registry and shutdown and restart functions
GDI32.DLL and GDI.EXE - Graphic device interface
USER32.DLL and USER.EXE - GUI implementation
COMMCTRL.DLL and COMCTL32.DLL - Common controls (user interface)
DDEML.DLL Dynamic Data Exchange Management Library (DDEML) provides an interface that simplifies the task of adding DDE capability to an application
MSGSRV32.EXE Acts as a 32-bit message server and will never appear in the Windows task list
WIN.COM - responsible for loading the GUI and the Windows portion of the system
Registry and other configuration files:
SYSTEM.DAT, USER.DAT - contains the Windows Registry
MSDOS.SYS - contains some low-level boot settings and resources such as disabling double-buffering and the GUI logo
WIN.INI and SYSTEM.INI - configuration files from Windows 3.1, processed in Windows 9x also
Virtual Machine Manager and configuration manager:
VMM32.VXD - Virtual machine manager and default drivers. It takes over from io.sys as kernel
Installable file System Manager:
IFSHLP.SYS - enables Windows to make direct file system calls bypassing MS-DOS methods
IFSMGR.VXD - 32-bit driver for the installable file system
IOS.VXD I/O Supervisor that controls and manages all protected-mode file system and block device drivers
MPREXE.EXE MPRSERV.DLL and MPR.DLL - Multiple Provider Router, required for network authentication and user profiles
MSPWL32.DLL Password list management library
Device drivers:
IO.SYS - executable handling all of the basic functions, such as I/O routines and also serves as kernel until vmm32.vxd takes over
HIMEM.SYS - DOS device driver which allows DOS programs to store data in extended memory via the Extended Memory Specification
SYSTEM.DRV, MMSOUND.DRV, COMM.DRV , VGA.DRV, MOUSE.DRV, BIGMEM.DRV, KEYBOARD.DRV - 16-bit drivers
CP 1252.NLS, CP 437.NLS, UNICODE.NLS, LOCALE.NLS - keyboard layouts
RMM.PDR Real Mode Mapper Virtual Device
The system may also use CONFIG.SYS, which contains settings and commands executed before loading the command interpreter and AUTOEXEC.BAT, which is a batch file automatically executed after loading COMMAND.COM. However, these two files are not critical to the boot process, as IO.SYS contains a default setting for both, in case of absence from the system. In Windows ME, CONFIG.SYS and AUTOEXEC.BAT ar |
https://en.wikipedia.org/wiki/Data%20storage%20tag | A data storage tag (DST), also sometimes known as an archival tag, is a combination of a data logger and multiple sensors that record data at predetermined intervals. DSTs usually have a large memory size and a long lifetime: most are supported by batteries that allow the tag to record positions for several years. Alternatively some tags are solar powered and allow the scientist to set their own interval; this then allows data to be recorded for significantly longer than battery-only powered tags.
Operation
Data storage tags can have a variety of sensors; temperature, depth, light, salinity, pressure, pitch and roll, GPS, magnetic and compass. They can be used internally or externally in fish, marine animals or research animals. They are also used in other industries such as the food and beverage industry.
At the end of the monitoring period, the loggers can be connected to a computer and the data uploaded for analysis. Data collected by data storage tags can be used to infer locations of the animal when it is at large.
Deployment
Archival tags archive data to internal memory. Once they are recovered the data is then extracted by the researcher. The tag is generally mounted to the animal either by cutting a slit into the animal, inserting the tag, and sewing the opening closed. Alternatively researchers externally attach tags to animals by running anchor lines through the tag and into the dorsal fin for most "fish" species. For turtles the tag is epoxied to the shell of the turtle.
See also
Acoustic tag
Animal migration tracking
GIS and aquatic science
Pop-up satellite archival tag
Notes
Digital electronics
Research methods
Data recovery
Fisheries science
Sensors |
https://en.wikipedia.org/wiki/ThinDesk | ThinDesk is a hosted desktop platform for small and mid-sized businesses.
History
The ThinDesk platform allows an organization's users to access company-related data and applications via a web portal. This portal can be accessed using PCs, tablets, or dummy terminals that are connected to the Internet. This type of service is generally called cloud-based, and more specifically referred to as a Platform-as-a-Service (PaaS).
ThinDesk as a company was founded in 2006 and partnered with Telus in 2007 to provide the datacentres necessary to support the platform and its customers. In 2012, ThinDesk was bought by Insite Computer Group. There are currently two versions of ThinDesk, 1.0 of which is ThinDesk Legacy, which consists of the original platform design. The original platform was based on a version of private cloud computing. After the buyout by Insite Computer Group Inc, a 2.0 version was established on an improved underlying architecture to increase service reliability.
In February 2015 Insite Computer Group Inc. Merged with F12.net. ThinDesk was adopted as a cloud brand and will be developed into ThinDesk 3.0 in 2017 under the F12.net banner.
External links
Forrester's Advice to CFOs: Embrace Cloud Computing to Cut Costs eWeek.com, Clint Boulton, October 31, 2008
Centralized computing |
https://en.wikipedia.org/wiki/God%20of%20War%3A%20Ghost%20of%20Sparta | God of War: Ghost of Sparta is an action-adventure hack and slash video game developed by Ready at Dawn and published by Sony Computer Entertainment (SCE). It was first released for the PlayStation Portable (PSP) handheld console on November 2, 2010. The game is the sixth installment in the God of War series and the fourth chronologically. Loosely based on Greek mythology, Ghost of Sparta is set in ancient Greece with vengeance as its central motif. The player controls the protagonist Kratos, the God of War. Kratos is still haunted by the visions of his mortal past and decides to explore his origins. In Atlantis, he finds his mother Callisto, who claims that his brother Deimos is still alive. Kratos journeys to the Domain of Death to rescue his brother. After initial resentment from Deimos, the brothers team up to battle the God of Death, Thanatos, Deimos's capturer.
The gameplay is similar to that of the previous installments, and focuses on combo-based combat, achieved through the player's main weapon—the Blades of Athena—and a secondary weapon acquired later in the game. It features quick time events that require the player to complete various game controller actions in a timed sequence to defeat stronger enemies and bosses. Up to three magical attacks and a power-enhancing ability can be used as alternative combat options. Ghost of Sparta also features puzzles and platforming elements. The combat system was updated with 25 percent more gameplay than its PSP predecessor, God of War: Chains of Olympus.
Ghost of Sparta received positive reviews from critics for its story, cinematographic cutscenes, and graphical illustration, though criticism was given for the general lack of gameplay innovation from its predecessor, Chains of Olympus. Several critics consider it to be the best-looking game on the PSP. Others have compared the overall game to those on the PlayStation 3 (PS3), and some have said that the graphics are better than those of the PlayStation 2 (PS2). Ghost of Sparta received several awards, including "Best Handheld Game", "Best PSP Game", and "PSP Game of Show" at the 2010 Electronic Entertainment Expo (E3), "Best Handheld Game" at the 2010 Spike Video Game Awards, and "Best Portable Game" at the 14th Annual Interactive Achievement Awards. By June 2012, it had sold almost 1.2 million copies worldwide, making it the fifteenth best-selling PlayStation Portable game of all time. Together with Chains of Olympus, Ghost of Sparta was remastered and released on September 13, 2011, as part of the God of War: Origins Collection and the remastered version was re-released on August 28, 2012, as part of the God of War Saga, both for the PlayStation 3.
Gameplay
The gameplay of God of War: Ghost of Sparta resembles that of the previous installments. It is a third-person single player video game viewed from a fixed camera perspective. The player controls the character Kratos in hack and slash combo-based combat, platforming, and puzzle game elem |
https://en.wikipedia.org/wiki/LessWrong | LessWrong (also written Less Wrong) is a community blog and forum focused on discussion of cognitive biases, philosophy, psychology, economics, rationality, and artificial intelligence, among other topics.
Purpose
LessWrong promotes lifestyle changes believed by its community to lead to increased rationality and self-improvement. Posts often focus on avoiding biases related to decision-making and the evaluation of evidence. One suggestion is the use of Bayes' theorem as a decision-making tool. There is also a focus on psychological barriers that prevent good decision-making, including fear conditioning and cognitive biases that have been studied by the psychologist Daniel Kahneman.
LessWrong is also concerned with transhumanism, existential threats and the singularity. The New York Observer noted that "Despite describing itself as a forum on 'the art of human rationality,' the New York Less Wrong group... is fixated on a branch of futurism that would seem more at home in a 3D multiplex than a graduate seminar: the dire existential threat—or, with any luck, utopian promise—known as the technological Singularity... Branding themselves as 'rationalists,' as the Less Wrong crew has done, makes it a lot harder to dismiss them as a 'doomsday cult'."
History
LessWrong developed from Overcoming Bias, an earlier group blog focused on human rationality, which began in November 2006, with artificial intelligence researcher Eliezer Yudkowsky and economist Robin Hanson as the principal contributors. In February 2009, Yudkowsky's posts were used as the seed material to create the community blog LessWrong, and Overcoming Bias became Hanson's personal blog. In 2013, a significant portion of the rationalist community shifted focus to Scott Alexander's Slate Star Codex.
LessWrong and its surrounding movement are the subjects of the 2019 book The AI Does Not Hate You, written by former BuzzFeed science correspondent Tom Chivers.
Roko's basilisk
In July 2010, LessWrong contributor Roko posted a thought experiment to the site in which an otherwise benevolent future AI system tortures people who heard of the AI before it came into existence and failed to work tirelessly to bring it into existence, in order to incentivise said work. Using Yudkowsky's "timeless decision" theory, the post claimed doing so would be beneficial for the AI even though it cannot causally affect people in the present. This idea came to be known as "Roko's basilisk", based on Roko's idea that merely hearing about the idea would give the hypothetical AI system stronger incentives to employ blackmail. Yudkowsky deleted Roko's posts on the topic, saying that posting it was "stupid" as the dissemination of information that can be harmful to even be aware of is itself a harmful act, and that the idea, while critically flawed, represented a space of thinking that could contain "a genuinely dangerous thought", something considered an information hazard. Discussion of Roko's basilisk was banned |
https://en.wikipedia.org/wiki/Nerita%20undata | Nerita undata is a species of sea snail, a marine gastropod mollusk in the family Neritidae.
Synonyms
Nerita undata quadricolor Gmelin, 1791: synonym of Nerita quadricolor Gmelin, 1791
Nerita undata var. micronesica E. von Martens, 1887: synonym of Nerita maura Récluz, 1842 (junior synonym)
Description
Habitat: rocky cliffs (Ruwa, 1984 <109>).
Up to 4 cm, with radial ridges on the shell surface; columella with three teeth. Pale in colour with variable darker markings, sometimes uniformly bluish-black, pale interior.
Distribution
This marine species occurs in the Indo-Pacific. (Richmond, 1997) and off Papua New Guinea.
Habitat: littoral fringe rocks.
References
Hombron, J.B. & Jacquinot, C.H. (1842–1854). Atlas d'histoire Naturelle zoologie par MM. Hombron et Jacquinot, chirurgiens de l'expédition. Voyage au Pole Sud et dans l'Océanie sur les corvettes l'Astrolabe et la Zélée éxecuté par ordre du roi pendant les années 1837–1838–1839–1840 sous le commandement de M. Dumont-d'Urville, capitaine de vaisseau, publié sous les auspices du département de la marine et sous la direction supérieure de M. Jacquinot, capitaine de vaisseau, commandant de la Zélée. Zoologie. Gide & Cie, Paris.
Kei LWK. & Lau SCK. (1994). Baseline information survey of shelter island – a potential marine park. Final report. Submitted to the Agriculture and Fisheries Department, The Hong Kong SAR Government
Drivas, J. & Jay, M. (1987). Coquillages de La Réunion et de l'Île Maurice. Collection Les Beautés de la Nature. Delachaux et Niestlé: Neuchâtel. ISBN 2-603-00654-1. 159 pp
Jarrett, A.G. (2000) Marine Shells of the Seychelles. Carole Green Publishing, Cambridge, xiv + 149 pp. NIZT 682
Steyn, D.G. & Lussi, M. (1998) Marine Shells of South Africa. An Illustrated Collector's Guide to Beached Shells. Ekogilde Publishers, Hartebeespoort, South Africa, ii + 264 pp.
Liu, J.Y. [Ruiyu] (ed.). (2008). Checklist of marine biota of China seas. China Science Press. 1267 pp.
Fowler, O. (2016). Seashells of the Kenya coast. ConchBooks: Harxheim. Pp. 1–170
External links
Linnaeus, C. (1758). Systema Naturae per regna tria naturae, secundum classes, ordines, genera, species, cum characteribus, differentiis, synonymis, locis. Editio decima, reformata (10th revised edition), vol. 1: 824 pp. Laurentius Salvius: Holmiae
Gould, A. A. (1852). Mollusca and shells. In: United States Exploring Expedition during the years 1838, 1839, 1840, 1841, 1842 under the command of Charles Wilkes. Boston. 12: 1–510; atlas 1856: 1-16
Sowerby, G. B., III. (1903). Descriptions of fourteen new species of marine molluscs from Japan. Annals and Magazine of Natural History, Series 7. 12: 496–501.
Martens, E. von. (1856–1889). Die Gattungen Nerita und Neritopsis. In: W. Kobelt, Ed. Systematisches Conchylien-Cabinet von Martini und Chemnitz. Neu herausgegeben und vervollständigt. Zweiten Bandes elfte Abtheilung. 2 (11): 1–147, plates A, 1-15. Nürnberg: Bauer & Raspe
Dekker, H. (2000). The Neritidae f |
https://en.wikipedia.org/wiki/GNUstepWeb | GNUstepWeb is a development environment and an application server for Web Applications. It is characterized by strict separation of data storage, processing and user interface development.
GNUstepWeb is based on GNUstep. Its goals are to be compatible to WebObjects version 4.5.x with some extensions.
Apple's WebObjects was ported to Java with version 5. GNUstepWeb continues using Objective-C.
External links
GNUstep.org - homepage
GNUstepWiki - homepage of GNUstep wiki
lists.turbocat.net/mailman/listinfo.cgi/gswhackers – developer mailing list.
Servers (computing)
NeXT
Software that uses GNUstep |
https://en.wikipedia.org/wiki/Andalucia%20%28genus%29 | Andalucia is a genus of jakobids.
Classification
The morphology of Andalucia broadly resembles that of other jakobids. Molecular data has not always been conclusive, but recent phylogenomic analyses indicate that Andalucia is a sister group to the other jakobids, in other words more closely related to them than to the Heterolobosea or Euglenozoa (the other two groups in the Discoba). The α-tubulin gene of Andalucia more closely resembles that of opisthokonts and diplomonads than its closer relatives, the apparent result of horizontal gene transfer.
Species
As of 2015, the soil heterotroph A. godoyi is the only described species in the genus.
The species Stygiella incarcerata, living in sulfide-rich marine intertidal sediments, was known as Andalucia incarcerata from 2006, the year of this genus' creation, to 2015.
Analysis of DNA sequences from the environment suggest at least two additional species which have not been isolated or formally described.
References
Excavata genera
Jakobids
Taxa described in 2006 |
https://en.wikipedia.org/wiki/GG%20Bond | GG Bond () is a Chinese computer-animated fantasy television show created by Zhibin "Ben" Gu and produced by WinSing Animation. The series began in 2005 and has aired for 17 seasons in 3D computer-generated animation. The production company has distributed one season of episodes yearly since 2005.
For the 17th season, the show was completely redesigned and the characters were given new names. This revamp was developed with the help of Al Kahn, the former CEO of 4Kids Entertainment, who brought in some American writers. Starting with this season, the show was given the new English title Kung Fu Pork Choppers(GG Bond 我男神!!!)
There are currently four theatrical films based on the TV series: GG Bond Hatching (2012), GG Bond 2 (2014), GG Bond Movie: Ultimate Battle (2015) and GG Bond: Guarding (2017).
Plot
The show follows the titular GG Bond, an intelligent, immature, and mischievous humanoid pig living in a world where the magic of fairy tales has coalesced with modern society. He retains a close circle of acquaintances in the fellow pigs Pheobe (菲菲), Super Q (超人强), Bobby (波比), S-Daddy (小呆呆), and Dr. Mihoo (迷糊博士). Each season follows a different iteration of this team in the series' multiverse, with only their names and broad personalities remaining consistent. These universes occasionally cross over with each other in central story arcs.
Most episodes of GG Bond are comedies with moral lessons regarding the values of courage, friendship, harmony, integrity, perseverance, and respect for elders. Environmental issues often discussed include environmental damage, deforestation, and pollution. Episodes of the series often include humorous takes on classic fairy tales with modern technology.
Kung Fu Pork Choppers
Hampton is the leader of the Kung Fu Pork Choppers. His superpower is super speed.
Hamgelina is the smartest member of the team. Her superpower is the manipulation of gravity.
Pigcasso is the fun-loving trickster of the team. His superpower is multiplying himself into clones.
La Puerca is the tallest and strongest member of the team. Her superpower is super strength.
Glorious P.I.G. is the team's pompous jock. His superpower is invisibility.
Villains
Blort is a hotheaded robot who is the commander of the Stormfront Troopers.
Carl is Blort's sidekick, a neurotic bat-like creature who wears metal armor.
Karnage is an eagle who is the strategist of the Stormfront Troopers.
Foggy is a bat-like creature with the ability to create fog.
Supporting characters
Ziglet is a martial artist pig who trains the Kung Fu Pork Choppers.
Swinestyn is a scientist pig who helps the Kung Fu Pork Choppers.
Mr. Spork is Swinestyn's mechanical helper.
Reception and awards
Winner of "Domestic Animation Golden Award" of the 17th Shanghai TV Festival.
Nominated for the 2009 "Best Domestic Animation" at Shanghai TV Festival.
Winner of the 2009 KAKU Annual "Best Animated Series" as reported by Beijing Review.
References
2005 Chinese television seri |
https://en.wikipedia.org/wiki/Elias%20Bassalygo%20bound | The Elias Bassalygo bound is a mathematical limit used in coding theory for error correction during data transmission or communications.
Definition
Let be a -ary code of length , i.e. a subset of . Let be the rate of , the relative distance and
be the Hamming ball of radius centered at . Let be the volume of the Hamming ball of radius . It is obvious that the volume of a Hamming Ball is translation-invariant, i.e. indifferent to In particular,
With large enough , the rate and the relative distance satisfy the Elias-Bassalygo bound:
where
is the q-ary entropy function and
is a function related with Johnson bound.
Proof
To prove the Elias–Bassalygo bound, start with the following Lemma:
Lemma. For and , there exists a Hamming ball of radius with at least
codewords in it.
Proof of Lemma. Randomly pick a received word and let be the Hamming ball centered at with radius . Since is (uniform) randomly selected the expected size of overlapped region is
Since this is the expected value of the size, there must exist at least one such that
otherwise the expectation must be smaller than this value.
Now we prove the Elias–Bassalygo bound. Define By Lemma, there exists a Hamming ball with codewords such that:
By the Johnson bound, we have . Thus,
The second inequality follows from lower bound on the volume of a Hamming ball:
Putting in and gives the second inequality.
Therefore we have
See also
Singleton bound
Hamming bound
Plotkin bound
Gilbert–Varshamov bound
Johnson bound
References
Coding theory
Articles containing proofs |
https://en.wikipedia.org/wiki/Mass%20Rapid%20Transit%20Master%20Plan%20in%20Bangkok%20Metropolitan%20Region | The Mass Rapid Transit Master Plan in Bangkok Metropolitan Region, or M-Map, is the latest version in a series of Thai government plans for the development of an urban rail transit network serving the Greater Bangkok area. It was drafted under the care of the Office of Transport and Traffic Policy and Planning (OTP) of the Ministry of Transport.
Early versions (Old plans)
Mass Rapid Transit Systems Master Plan (MTMP)
The first version of the plan, endorsed by the cabinet on 27 September 1994 and to be implemented from 1995 to 2011, consisted of an extension of to the three systems already in progress (the MRT Blue Line, the Sukhumvit and Silom lines of the BTS Skytrain and the Bangkok Elevated Road and Train System (BERTS)), which would have had a combined length of .
Urban Rail Transportation Master Plan in Bangkok and Surrounding Areas (URMAP)
Following the 1997 Asian Financial Crisis and the cancellation of the BERTS, a system totalling to begin in 2001 was proposed, to be developed in three stages: during 2001–11, during 2012–21 and from 2022 onwards.
Bangkok Mass Transit Master Plan (BMT)
Due to the slow progress of development following URMAP, a new plan was drafted consisting of of rail in addition to the then-completed MRT Blue Line, the Sukhumvit and Silom BTS lines, the MRT purple line, and the Airport Rail Link to undergo rapid development during 2010–29. The plan was approved by the cabinet in 2016, and consisted of the following extensions:
Light Green Line: North–south extension of the BTS to Khu Khot and Kheha Samut Prakan
Dark Green Line: West extension of the BTS to Yot Se
Blue Line: Extension of the MRT Blue Line to complete a quasi circle line with a branch to Lak Song
Purple Line: South extension to Rat Burana is under construction
Orange Line: Running east–west Min Buri to Bang Khun Non
SRT Dark Red Line: Running north–southwest from Rangsit to Krung Thep Aphiwat to Maha Chai
SRT Light Red Line: running east–west from Hua Mak to Sala Ya
Airport Rail Link: North extension to Don Mueang
M-Map development
Original M-Map (2010)
The first M-Map plan was endorsed by the Commission for the Management of Land Traffic in 2010. It designated eight primary routes, consisting of two commuter rail lines, an airport rail link, and five rapid transit lines, as well as five feeder lines. The routes, totaling , were to be constructed within a development period of twenty years (2010–29). They were:
Development would be divided into three stages, in addition to those lines already open or under construction.
M-Map 2 (2017)
The 2010 M-Map did not reflect more recent changes to the priority of constructing new rapid transit lines in Bangkok. While the Orange, Yellow and Pink lines received approval in the years that followed, the Grey and Light Blue lines remained unapproved at the time of the next M-Map. In March 2017, the Minister of Transport announced the development of the Second Mass Rapid Transit Master |
https://en.wikipedia.org/wiki/Dragon%20%28remote%20sensing%29 | Dragon is a remote sensing image processing software package. This software provides capabilities for displaying, analyzing, and interpreting digital images from earth satellites and raster data files that represent spatially distributed data. All the Dragon packages are derived from the code created by Goldin-Rudahl.
Open Dragon is free to educational users. It was intended to be free worldwide, as well as open source (hence the name) but due to funding problems, it is currently available only in Southeast Asia.
Dragon Academic is functionally identical to Open Dragon.
Dragon Professional is expanded to handle full-scene data sets from sensors such as Landsat TM, SPOT, and Aster.
History
The initial version of Dragon was released in 1987 and ran on the MS-DOS
operating system. Dragon was the first commercial remote sensing software
package designed to use only the native capabilities of off-the-shelf personal
computers. At the time Dragon was developed, other PC remote sensing products
such as Erdas required expensive special purpose graphics
devices. Dragon was intended to be used for education in geography, geology,
forestry and other disciplines that use spatial information; thus it was very
important to minimize the costs of required hardware. The first version
of Dragon ran on a basic IBM-PC with two floppy disks and a
four-color or gray-level graphics display. Alternatively, it could use any of several models of Japanese PC.
The MS-DOS phase of Dragon development focused on trying to squeeze
functionality into very limited disk and memory space, and to get full-color
image display using rapidly changing graphics
hardware with no standardized drivers. The VESA display standard was a
turning point in making full-color display functionality available in
MS-DOS. This VESA/SVGA/MS-DOS version of Dragon can still be adapted
for embedded systems use.
The move to Microsoft Windows 95/98 was painful because these
operating systems did not provide true multitasking. Unfortunately this phase
coincided with the publication of the well-known Gibson and Powers textbook
(Gibson,2000) which included a copy of the Windows 95 Dragon. With the advent
of Windows NT and successors (Windows 2000, XP, Vista, etc.), it became
possible to create a Windows version of Dragon that allowed simultaneous
display of and interaction with multiple images.
In 2004, funding became available from Thailand to create a free educational
version of the software which became known as OpenDragon. This project lasted
for three years. The software is still available at no cost in Thailand,
Laos, Cambodia and Vietnam (although it has only been translated into Thai).
After funding for OpenDragon was discontinued, Dragon Professional was
developed to reach beyond the customary educational users. New personal
computer capabilities, which by then extended to gigabytes of memory and
hundreds of gigabytes of disk storage, all at low cost, made it possible to
store and process th |
https://en.wikipedia.org/wiki/41%20Club | 41 Club is the more commonly used shorter name for The Association of Ex-Round Tablers' Clubs a social networking organisation for men aged over 40 who are also former members of Round Table. Thus, 41 Club forms part of the Round Table Family of clubs, together with Round Table, Ladies Circle, Tangent and Agora Club International.
Round Table itself was formed in 1927, exclusively for men aged under 40, with the intention of offering younger men the benefits afforded by similar groups such as Rotary Club, which were dominated by older people. It took off quickly, and within a few years there were more than a hundred Tables in towns and cities across the UK.
It became common practice for retiring Tablers to stay on after retiring age as so-called "honorary members", however it soon became clear that Table risked itself becoming over time a group largely of older people.
The first Ex-Tablers Club was formed in Liverpool in 1936. Former Round Table members from other parts of the UK quickly followed suit, as later did former Tablers overseas (Round Table having become an international group in the post-war years).
The Association was formed in 1945 at a meeting of 41 Clubs in Wakefield and the first President, John Shuter of London Old Tablers Society, was elected. Today there over 18,000 members in 820 clubs across Great Britain and Ireland . Their primary objective remains to support The Round Table in its activities.
Members of Round Table are obliged to end their membership when they reach the age of 40 or 45, according to the country in which they reside.
Round Table was formed by Louis Marchesi in Great Britain in 1927 and 41 Clubs, which are clubs for former members of Round Table (‘Ex-Tablers’ or ‘Old Tablers’), started to be formed in the early 1940s. The Association of Ex-Tablers’ Clubs – 41 Club of Great Britain and Ireland – was formed in 1945.
41 International was formed in 1975 and is the association of (currently) twenty-eight 41 Clubs throughout the world. 41 Club is an organisation which further develops the friendship and comradeship that the members enjoyed when they were members of Round Table.
Today the associations of Austria, Belgium, Cyprus, Denmark, Finland, Germany, Great Britain & Ireland, Hungary, Iceland, India, Israel, Italy, Kenya, Malta, Mauritius, Morocco, Netherlands, Norway, Portugal, Romania, Senegal, South Africa, Sri Lanka, Suriname, Sweden, Switzerland, USA and Zambia are the full members of 41 International, but there are individual 41 Clubs in many other countries throughout the world.
41 International is led by a board which comprises a President, a Vice-President, a Secretary, a Treasurer and an Immediate Past President. An Annual General Meeting and a Half Yearly Meeting are held by the members each year. The main objectives of 41 International are to maintain, at international level, contacts between clubs and their members throughout the world and to maintain the bonds of friendship that unite |
https://en.wikipedia.org/wiki/Tangent%20%28club%29 | Tangent is a social networking organisation for ladies aged over 45, primarily intended for former members of Ladies Circle. It is part of the Round Table Family of clubs, together with Round Table (club), Ladies Circle and 41 Club.
Ladies who are either (a) the wife or partner of a former member of Round Table or (b) a former member of Ladies Circle are eligible to join Tangent. (From 2009 some Tangent clubs have open membership and accept women who were not previously members of Ladies Circle).
Round Table itself was formed in 1927, a social networking and community group exclusively for men aged under 40. Within three years, their wives had formed their own group, Ladies Circle. Like Round Table, Ladies Circle was specifically intended for younger ladies, and so was only open to under 40s. In 1953, former members of Bournemouth Ladies Circle formed their own group, Tangent.
In the 1990s, Ladies Circle opened up membership to non wives/female partners of Tablers/ ex Tablers
Like the three other clubs in the movement, there are various Tangent clubs in towns and cities across the UK, and overseas.
Recently, some Tangent clubs have opened their doors to non ex Circlers.
Tangent clubs are affiliated to the National Association of Tangent Clubs (NATC). The members of each club will usually meet monthly, and organise various social events, and also activities to raise funds for charity or to support the community. Clubs will often hold Friendship or Fellowship evenings and invite other clubs in the neighbourhood to attend. Members of different clubs also have the opportunity to meet at a number of Regional Lunches held throughout the year.
A National AGM is held in April each year at a different venue. The members of the National Executive are elected at this meeting, and various proposals will be debated and voted on.
The Club motto is "Let Friendship Continue".
External links
National Association of Tangent Clubs
The Round Table Family
The National Association of Ladies Circles of Great Britain and Ireland
Round Table home
References
Clubs and societies in the United Kingdom |
https://en.wikipedia.org/wiki/Intensive%20Care%20Unit%20%28TV%20series%29 | Intensive Care Unit or ICU A Matter of Life and Death is a 2010 Television Factual Program that aired on the Seven Network. It was thought the show was axed with "The White Room", however it was later revealed by a Seven Spokesperson that the show would return at a later point. The show is narrated by Caroline Craig
Format
The show explores the lives of patients inside the Intensive Care Unit at the Alfred Hospital, each episodes shows a number of patients trying to recover from their injuries. The series follows the patients for days, weeks and months, with their stay in the ICU and other parts of the Alfred Hospital and the work that the medical and nursing staff perform each day.
Production
The show is produced by the Seven Network Limited, who also produces The Force and Find My Family. It was thought the show was axed due to the poor ratings it received however a spokesperson for the Seven Network said that the show would return later on in the year. It first premiered on 3 February.
References
Seven Network original programming
2010s Australian reality television series
2010 Australian television series debuts
2010 Australian television series endings |
https://en.wikipedia.org/wiki/Union%20Investment | Union Investment (; formal name Union Asset Management Holding AG) is the investment arm of the DZ Bank Group and part of the cooperative financial services network. It was founded in 1956 and is headquartered in Frankfurt.
Trading in open-end funds occurs in part through the 1,101 credit unions in Germany (Volksbanken Raiffeisenbanken Co-operative, including Sparda-Banks, PSD-banks, etc.) and in part through the external services of Bausparkasse Schwäbisch Hall AG, DZ Bank Group's building society.
The primary shareholders in Union Investment are DZ Bank with 54.44% and WGZ Bank (the central bank of the credit unions in the Rhineland and Westphalia) with 17.72%. Other shareholders include BBBank and the credit unions through their membership associations.
, Union Investment has self-declared assets under management of approximately 368.2 billion euro.
Subsidiaries
Union Asset Management Holding AG has 15 subsidiaries, including:
Attrax S.A. in Luxembourg for funds brokerage, distribution, share administration and custody services
Union Investment Institutional GmbH for institutional clients
Union Investment Institutional Property for institutional property investments
Union Investment Luxembourg S.A. in Luxembourg
Union Investment Privatfonds GmbH offers open-end funds to private investors
Union Investment Real Estate GmbH (formerly DIFA Deutsche Immobilien Fonds AG) is the second largest German property investment association
Quoniam Asset Management GmbH follows a quantitative approach to investment and manages funds for institutional clients
History
The Union-Investment-Gesellschaft mbH was the third German investment association to be founded, on 26 January 1956, by 14 credit unions. The UniFonds stock fund was created the same year as its first open-end fund. The first offering of investment vehicles outside Germany was in 1961, in Belgium.
Co op Immobilienfonds Verwaltung AG was founded in Hamburg in 1965 and in 1980 renamed Deutsche Immobilien Fonds AG or DIFA. The initial stockholders were the Central Institute of Consumer Cooperatives and the Bank für Gemeinwirtschaft. In 1966 DIFA launched an open-end property fund, Co op Immobilienfonds, later renamed DIFA-Fonds Nr. 1 (DIFA Fund No. 1). Starting on 15 January 2007, DIFA did business under the name Union Investment Real Estate AG; in 2009 it was converted to a GmbH.
Since 1967, Union Investment has offered management of investment accounts. In 1968, it offered its first retirement fund, UniRenta. In 1969, it reached a fund capitalization of 1 billion DM.
Union Investment Luxembourg S.A. was founded in 1988. The total capitalization of the group was now 10 billion DM.
In April 1994 Union Investment began offering stock-based wealth management with three strategic variants: chance, growth and security. In 1996 it introduced stock-based life insurance under the name Opti Plan.
The holding company Union-Fonds-Holding AG was founded in 1999 and changed its name in July 2002 |
https://en.wikipedia.org/wiki/Cray%20XT6 | The Cray XT6 is an updated version of the Cray XT5 supercomputer, launched on 16 November 2009. The dual- or quad-core AMD Opteron 2000-series processors of the XT5 are replaced in the XT6 with eight- or 12-core Opteron 6100 processors, giving up to 2,304 cores per cabinet. The XT6 includes the same SeaStar2+ interconnect router as the XT5, which is used to provide a 3-dimensional torus network topology between nodes. Each XT6 node has two processor sockets, one SeaStar2+ router and either 32 or 64 GB of DDR3 SDRAM memory. Four nodes form one X6 compute blade.
The XT6 family run the Cray Linux Environment version 3. This incorporates SUSE Linux Enterprise Server and Cray's Compute Node Linux.
The XT6m variant, announced at the same time as the XT6, is a mid-ranged supercomputer with most of the features of the XT6, but with a processor interconnect optimized for system sizes between 700 and 13000 cores and scalable up to 6 cabinets.
The first customer for the XT6 was the Engineering and Physical Sciences Research Council (EPSRC) of the United Kingdom, which upgraded the existing XT5h system, named HECToR, at the University of Edinburgh in 2010.
References
External links
Cray XT6 product page
Xt6
X86 supercomputers |
https://en.wikipedia.org/wiki/XT6 | XT6 may refer to:
Cray XT6, an updated version of the Cray XT5 supercomputer
Cadillac XT6, a luxury automobile
Subaru XT6, a six cylinder version of the Subaru XT automobile |
https://en.wikipedia.org/wiki/Lindsay%20Pulsipher | Lindsay Pulsipher (born May 6, 1979) is an American actress. She has had several roles in film and television and is known for her series regular role as Rose Lawrence on A&E Network's The Beast (2009). She joined the third season of HBO's True Blood (2010), playing were-panther Crystal Norris and love interest to Jason Stackhouse. She has a recurring role as Detective Amanda Rollins’ troubled sister, Kim, on NBC's Law & Order: Special Victims Unit.
Childhood
Lindsay Pulsipher was born and grew up in Salt Lake City, Utah, with five siblings, and was inspired to be an actor by her mother, a theater actress. As she puts it: She was influenced by Julie Christie and Audrey Hepburn, who showed her "a whole new world as far as acting goes".
Pulsipher's parents were members of the Church of Jesus Christ of Latter-day Saints, but she has since stopped practicing the religion.
Career
After appearing in several roles from 2000 to 2003 in the television series, Touched by an Angel, filmed in her hometown of Salt Lake City, and after starring in a couple of indie films, Pulsipher moved to Los Angeles to pursue a lifelong dream of a career in acting.
She was given several guest starring roles in popular television series including House, M.D., CSI: NY (Crime Scene Investigation: New York) and NCIS: Naval Criminal Investigative Service, and eventually received a regular role with Patrick Swayze in The Beast (2009). She took the role of Crystal Norris beginning with the third season of the True Blood (2010). She has starred in two features directed by Calvin Reeder: The Oregonian (2011), and The Rambler (2013), and most recently, she guest-starred as Kim Rollins, Amanda Rollins' troubled sister on Law & Order: Special Victims Unit.
Pulsipher was confirmed as the replacement for Hilary Duff as Bonnie Parker in the remake of The Bonnie and Clyde Story, but she was later replaced with English actress Holliday Grainger.
Quotes
Filmography
Film
Television
References
External links
American film actresses
Living people
Actresses from Salt Lake City
21st-century American actresses
American television actresses
1979 births |
https://en.wikipedia.org/wiki/RTP1%20HD | RTP1 HD was RTP's HDTV channel. In 2008 it broadcast the 2008 Summer Olympics in HD on ZON's cable and satellite platforms. It is also marketed as RTP1 HD, when broadcasting RTP1 programming.
The channel closed on November 28, 2017, after the test period ended and RTP1 got a proper HD simulcast. The channel reopened for a few days after technical problems arose, but was shut down after the proper HD simulcast was able to broadcast once more.
Programming
Sports
UEFA Champions League
Portugal national football team qualifying matches
Volta a Portugal
Series
Bem-Vindos a Beirais
Soap operas
Os Nossos Dias (now)
Other
Festival RTP da Canção
Eurovision Song Contest
Television stations in Portugal
Television channels and stations established in 2009
Rádio e Televisão de Portugal
2009 establishments in Portugal |
https://en.wikipedia.org/wiki/International%20Association%20for%20Statistical%20Computing | The International Association for Statistical Computing was founded during the 41st Session of the International Statistical Institute in 1977, as a section of the ISI.
The objectives of the association are to foster worldwide interest in effective statistical computing and to exchange technical knowledge through international contacts and meetings between statisticians, computing professionals, organizations, institutions, governments and the general public.
The association is affiliated with the International Federation for Information Processing (IFIP). It publishes the journal called Computational Statistics & Data Analysis (CSDA) and Statistical Software Newsletter (CSDA SSN).
Past presidents
Mervin E. Muller (USA) 1977–1979
Sir Maurice Kendall (UK) and Wilfried J. Dixon (USA) 1979–1981
Ramanathan Gnanadesikan (India) 1981–1983
Svein Nordbotten (Norway) 1983–1985
Klaus Neumann (GDR) 1985–1987
Masashi Okamoto (Japan) 1987–1989
John M. Chambers (USA) 1989–1991
Norbert Victor (Germany) 1991–1993
Natale Carlo Lauro (Italy) 1993–1995
Murray A. Cameron (Australia) 1995–1997
Edward J. Wegman (USA) 1997–1999
Lutz Edler (Germany) 1999–2001
Jae C. Lee (Korea) 2001–2003
Stanley P. Azen (USA) 2003–2005
Gilbert Saporta (France) 2005–2007
Jaromir Antoch (France) 2007–2009
Yutaka Tanaka (Japan) 2009–2011
Karen Kafadar (USA) 2011–2013
Paula Brito (Portugal) 2013–2015
Patrick Groenen (Netherlands) 2015–2017
Wing Kam Fung (Hong Kong) 2017–2019
Jürgen Symanzik (USA) 2019-2021
Current president
Christophe Croux (France) 2021-2023
Data Analysis Competition
Notes
External links
International Association for Statistical Computing IASC home page
Computational Statistics & Data Analysis Journal home page
International Statistical Institute |
https://en.wikipedia.org/wiki/Ramanathan%20Gnanadesikan | Ramanathan Gnanadesikan (2 November 1932 – 6 July 2015) was an Indian statistician, known for his work in multivariate data analysis and leadership in the field. He received his Ph.D. at the University of North Carolina and headed research groups in statistics at Bell Laboratories and Bellcore. He was a fellow of American Association for the Advancement of Science, American Statistical Association, Institute of Mathematical Statistics and Royal Statistical Society, and elected member of the International Statistical Institute. He served as President of Institute of Mathematical Statistics and the International Association for Statistical Computing, the latter of which he helped found.
Early life
He was born in Madras (now Chennai, India). His father A. Ramanathan Pillai, was a zoologist and university vice-chancellor. As a 12-year-old boy, he sympathized with the Indian Independence movement and spent two weeks at the ashram founded by Mahatma Gandhi. He credited this experience for inspiring a lifelong concern with social justice. He attended the University of Madras, from which he received both bachelor's and master's degrees in statistics. The latter of these was based on work done at the Indian Statistical Institute in Calcutta.
Career
At the age of 20, he came to the United States to work on his Ph.D. at the University of North Carolina at Chapel Hill. While there he was involved with the civil rights movement and participated in lunch counter protests. When the first African-American undergraduates were admitted to the university, he helped arrange their accommodation in the International Student House. For his contributions to the university he was elected to the Order of the Golden Fleece.
His Ph.D. work was with Prof. S.N.Roy in the area of factor analysis. This line of research (which can be seen in the monograph Roy, Gnanadesikan
and Srivastava, 1971), was concerned with extracting information from experiments where a large number of input variables result in a large
number of output variables. One important thrust of this work was how to deal with both structured variables (i.e. data where the variable varies across some range of values) and unstructured variables (variables like disease state or color where the order is essentially arbitrary). A second thrust was evaluating whether the results of such analyses were dependent on small changes in the input variables, leading to an unrealistic sensitivity to errors of measurement.
After two years working at Procter & Gamble, he was hired by John Tukey to work in the nascent statistics group at Bell Telephone Laboratories and became a department head shortly afterwards. He worked closely with Martin Wilk, with whom he wrote a number of papers on graphical methods for data analysis. The most widely cited of these (Wilk and Gnanadesikan, 1968) describes the Q–Q and [[P–P plots, which are used to compare different statistical distributions. This work arose in part out of work in spe |
https://en.wikipedia.org/wiki/Rentboy.com | Rentboy.com was a commercial social networking site which connected male sex workers and masseurs with potential clients. Rentboy.com was also the major organizer of the International Escort Awards and a traveling cabaret called "Hustlaball."
Formerly, Rentboy.com published a manifesto on their website intended for sex workers and clients. This statement promoted a philosophy of "safer sex because the vast majority of sex-workers will not engage in unsafe sex," and stated, "while this job may not be for everyone, it has its rightful place among honorable careers." On August 25, 2015, CEO Jeffrey Hurant and six others were arrested at Rentboy.com headquarters.
Company profile
Rentboy.com was started by Jeffrey Hurant in 1997, making it the first male escorting website. From its founding, Davids served as CEO, and Sean Van Sant served as company director. The company was headquartered in Manhattan. Rentboy.com is described by Van Sant as follows:
Rentboy.com is not an escort agency. We are an ad listing service for male escorts, where men place their own ads and work for themselves, so that clients can contact them directly. Our mission is to create a non-judgmental space where anyone curious about exploring male-male companionship can hire a man by the hour.
, rentboy.com employed 10 people in three offices and hosted 40,000 escort profiles. In 2009, 1.4 million clients visited the website.
On August 25, 2015, Federal agents from the Department of Homeland Security and members of the New York Police Department raided Rentboy.com's headquarters.
Sponsorships
Rentboy.com sponsored its own float every year in the New York City Gay Pride March.
International Escort Awards
The International Escort Awards, also known as the "Hookies," were founded by rentboy.com's Jeff Davids and Sean Van Sant. The first ceremony was held at the Roxy in New York City in October 2006.
Hustlaball
Hustlaball was a sex cabaret and dance party organized in part by rentboy.com as a party to destigmatize and honor sex workers. Starting in 2007, Rentboy.com hosted Hustlaball three times yearly with a Las Vegas show in January, a London show in May, and a Berlin show in October. Part of the proceeds from this event go to charities such as the Lambeth Hate Crime Initiative, the Terrence Higgins Trust, and the Gay Men's Health Crisis.
History
Founder Davids said of Hustlaball, "This is a chance for sex workers to be open and proud of what they do."
Federal and state investigation
On August 25, 2015, DHS and NYPD agents raided the Manhattan headquarters of Rentboy.com as part of a money laundering and state prostitution investigation. Seven people, including CEO Jeffrey Davids, were arrested. "As alleged, Rentboy.com attempted to present a veneer of legality, when in fact this Internet brothel made millions of dollars from the promotion of illegal prostitution," acting U.S. Attorney for the Eastern District of New York Kelly Currie said in a statement. DHS was involved |
https://en.wikipedia.org/wiki/Online%20vetting | Online vetting, also known as cyber-vetting is used by potential employers and other acquaintances to vet people's online presence or "internet reputation" ("netrep") on search engines such as Google and Yahoo, and social networking services such as Facebook, Twitter, Instagram and LinkedIn. Employers may check profiles, posts, and photographs for indications that the candidate is unsuitable for a certain job or position.
Views and practice
Social media has tremendously increased over the decades. In the United States, there are about 327 million users on social media platforms as of 2021. With so many users online, recruiters have pivoted to directly asking candidates' for their social media platforms on the initial application. This allows for recruiters to fully access and see what their candidates are doing and posting online.
A survey in 2007 found that half of UK employees would be outraged if their employers looked up information about them on social networking sites, and 56% thought it would be unethical. Employer surveys found that between approximately 20-67% of employers conduct internet searches, including of social networking sites, and that some have turned down applicants as a result of their searches. 21% of colleges and universities surveyed said they looked at the social networking of prospective students, usually for those applying for scholarships and other limited awards and programmes. Prospective political appointees to the Obama administration were asked to list all their blog posts, any emails, text messages, and instant messages that could suggest a conflict of interest or public source of embarrassment, the URLs of any sites that featured them in a personal or professional capacity, and all of their online aliases.
Job applicants have been refused due to criticising previous employers and discussing company information online, as well as for posting provocative and inappropriate photographs, drinking or drug use, poor communication skills, making discriminatory comments, and lying about qualifications. Several companies offer online reputation management services, including helping to remove embarrassing information from websites. According to a CareerBuilder study, it found that 57% of employers rejected potential employees when an online vetting scan happened.
In 2017, research findings conducted with recruiters listed three primary function of a cybervetting process:
Screening - Process considered analogous to conventional background check and résumé analysis;
Efficiency - A more effective way to gather information from a candidate than the conventional process;
Relational - Analysis of a candidate relationship and behavior through social network posts.
While online vetting can be an advantage for recruiters who want to learn more about their candidates, online vetting can also cause recruiters to learn false information about their candidates. With people knowing their online presence is being seen by hundr |
https://en.wikipedia.org/wiki/1-2-AX%20working%20memory%20task | The 1-2-AX working memory task is a cognitive test which requires working memory to be solved.
It can be used as a test case for learning algorithms to test their ability to remember some old data. This task can be used to demonstrate the working memory abilities of algorithms like PBWM or Long short-term memory.
Description
The input of the task is a sequence of the numbers/letters 1, 2, A, X, B and Y, and additional distracting instances of 3, C and Z which should be ignored. For each character of input in sequence, the subject must respond with left (L) or right (R).
The two target sequences that the subject is looking for are A-X and B-Y. When the subject encounters a 1 they must switch to looking for A-X, and when they encounter a 2 they must switch to looking for B-Y.
While looking for A-X, if the subject encounters an X having seen an A previously (and similarly for a Y while looking for B-Y), and where that previous letter was not part of an earlier sequence, they respond R to mark the end of that sequence; their response to all other characters should be L.
Examples
Requirements for algorithms
To solve this task, an algorithm must be able to both remember the last number 1 or 2 and the last letter A or B independently. We refer to this memory as the working memory. This memory must persist all other input. In addition, the algorithm must be able to strip out and ignore the letters C and Z.
Solutions
Pseudocode
For traditional computer models, both requirements are easy to solve. Here is some Python code (kind of pseudocode but works) where the function next_output gets one single number/letter as input and returns either a letter or nothing. next_outputs is there for convenience to operate on a whole sequence.
last_num = ""
last_letter = ""
def next_output(next_input: str) -> str | None:
"""
Args:
next_input: A string containing a single character.
Returns:
A string containing the letters "L", "R" or None.
Example:
>>> next_output("2")
'L'
"""
global last_num, last_letter
if next_input in ["1", "2"]:
last_num = next_input
last_letter = ""
return "L"
elif next_input in ["A", "B"]:
last_letter = next_input
return "L"
elif next_input in ["X", "Y"]:
seq = last_num + last_letter + next_input
last_letter = next_input
if seq in ["1AX", "2BY"]:
return "R"
return "L"
return None
def next_outputs(next_inputs: str) -> list[str]:
"""
Args:
next_input: A string.
Returns:
A list of strings containing the letters "L" or "R".
Example:
>>> next_outputs("21AAXBYAX")
["L", "L", "L", "L", "R", "L", "L", "L", "R"]
"""
return [next_output(c) for c in next_inputs]
Example:
>>> next_outputs("21AAXBYAX")
['L', 'L', 'L', 'L', 'R', 'L', 'L', 'L', 'R']
>>> next_outputs("12CBZY")
['L', 'L', None, 'L', None, 'R']
Finite-state machine
Similarly, this tas |
https://en.wikipedia.org/wiki/Kobo%20Inc. | Rakuten Kobo Inc., or simply Kobo, is a Canadian company that sells ebooks, audiobooks, ereaders and tablet computers. It is headquartered in Toronto, Ontario, and is a subsidiary of the Japanese ecommerce conglomerate Rakuten. The name Kobo is an anagram of book.
History
Kobo originated as Shortcovers, a cloud eReading service launched by the Canadian bookstore chain Indigo Books and Music in February 2009. In December 2009, Indigo renamed the service Kobo and spun it off into an independent company. Indigo remained the majority owner, with investors including Borders Group, Cheung Kong Holdings, and REDgroup Retail taking minority stakes. , Indigo Books & Music owned 58% of Kobo Inc. Rakuten acquired the company from these owners in January 2012. On 23 May 2016, Waterstones announced it had sold its eBook business to Rakuten Kobo Inc., and as of 14 June 2016, users were required to access their eBooks via Kobo's eBook site.
During the COVID pandemic, Kobo worked with governments, publishers, and retail partners to provide more than 20 million free books through the “Stay Home and Read” program. The company reported that romance and mystery novels continued to be bestsellers during the pandemic, and that there was a rise in books for kids and young adults.
Products
E-readers
Kobo produces several eReaders with ePaper screens. The first Kobo eReader was introduced in 2010. The product lineup went on to consist of the base model Kobo Touch, the smaller Kobo Mini, and the Kobo Glo, which has an illuminated screen. On the higher end, the Kobo Aura; the Kobo Aura HD, which added a higher-resolution screen, the waterproof Kobo Aura H2O; and the waterproof Kobo Forma which added physical buttons and a choice of orientation. In 2018, the company released the Kobo Clara HD as another 6-inch option (the Aura Edition 2 being the first).
In 2019, the Kobo Libra H2O was released. Kobo partnered with Hotel Viu Milan to create a Reader in Residence program and for a month, the Kobo Libra H2O was placed in hotel rooms for guests to use. In 2020, Kobo introduced the Kobo Nia, an entry level eReader to replace the discontinued Kobo Aura. In 2021, Kobo introduced the Kobo Elipsa, an eReader and smart notebook that allows users to write on the screen.
These eReaders compete with the Amazon Kindle and Barnes & Noble Nook product lines.
Kobo's eReaders use Wi-Fi to sync a user's book collection and bookmarks with Kobo's cloud service, which can also be accessed from Kobo eReading apps for Windows and macOS computers, Android and iOS smartphones.
Tablets
Kobo produced the Kobo Arc family of Android tablets, which it introduced in 2012 and refreshed in 2013. It previously sold the Kobo Vox, a 7-inch Android tablet released in 2011. In 2014, Kobo discontinued the Arc tablets and did not develop another one.
Applications
Kobo offers free reading applications for Windows and MacOS computers, Android and iOS smartphones. In June 2015, Kobo received a Top Deve |
https://en.wikipedia.org/wiki/Pichanal | Pichanal is a town and municipality in Orán Department, located in northeastern Salta Province, Argentina. It is connected to the national road network by National Route 34, and to nearby San Ramón de la Nueva Orán by National Route 50. It has economic significance because of its position as a junction on these routes. It is within the bounds of the Yungas Biosphere Reserve.
History
The town emerged with the arrival of the railroad. At the time, it was a small trading area where people converged from different places to exchange their goods. On 4 January 1911, a railroad terminus was built at the spot that is now the city of Pichanal. With warehouses and camps, and all the feverish railway activity that was carried out at that point, it became the place of settlement for several residents of the Chaco de Rivadavia. The first train finally arrived on March 4, 1911.
In October of the same year, the construction of the railway bridge over the Bermejo River was completed. Three years later, the construction of the railway bridge over the Colorado River was completed, thus placing the housing conglomeration, now Pichanal, in a strategic place for commerce and population development. The population of Pichanal increased immediately due to the new sources of work that were now available to them.
In March 1912, the first educational institution, the Escuela Coronel Apolinario de Figueroa, was founded. It currently has an enrollment of more than 1,000 students. Its current director is Ms. Zunilda Morales of Valencia, deputy director Maria Rodriguez.
Every April 23, the city celebrates its patron saint festivities in honor of St. George.
Sister cities
Dikhil, Djibouti
References
Populated places in Salta Province |
https://en.wikipedia.org/wiki/Roger%20Keating | Roger Keating is an Australian computer game designer. Along with Ian Trout, Keating co-founded of the video game company Strategic Studies Group, which is known for its strategic war and fantasy games with artificial intelligence. Keating and Trout worked together on the majority of SSG titles.
Early life
Keating was born in New Zealand. He moved to Australia in 1978 and worked as a mathematics and physics teacher.
Career in game design
Keating created his first game, Conflict, in 1979. It was published by American software house Strategic Simulations. Keating left his teaching job to program full-time, and published seven games while working with SSI during 1981 and 1982. Keating later worked as a school teacher in New Zealand.
In 1983 Keating, along with Ian Trout formed Strategic Studies Group. Gregor Whiley joined the company in 1986 for the development of BattleFront. The company created many strategy games over the following 25 years.
After his business partner Ian Trout's death, both Keating and Whiley worked part-time at The Northern Sydney Institute for four years between 2011 and 2014 while developing their games part-time. They both moved to work for the Academy of Interactive Entertainment in 2015, where Keating taught programming.
List of games
Computer Conflict (1980)
Operation Apocalypse (1981)
Southern Command (1981)
Germany 1985 (1983)
RDF 1985 (1983)
Reach for the Stars (1983)
Baltic 1985: Corridor to Berlin (1984)
Carriers at War (1984)
Norway 1985 (1985)
Europe Ablaze (1985)
Battlefront
Russia: The Great War in the East 1941-1945 (1987)
Halls of Montezuma: A Battle History of the U.S. Marine Corps (1987)
Rommel: Battles for North Africa (1988)
Decisive Battles of the American Civil War Volume 1: Bull Run to Chancellorsville (1988)
Decisive Battles of the American Civil War Volume 2: Gaines Mill to Chattanooga (1988)
Decisive Battles of the American Civil War Volume 3: Wilderness to Nashville (1988)
Gold of the Americas (1989)
Panzer Battles (1990)
MacArthur's War: Battles for Korea (1990)
Warlords (1990)
Carriers at War (1992)
Carriers at War: Construction Kit (1993)
Carriers at War II (1993)
Warlords II (1993)
Warlords II Scenario Builder (1994)
Warlords II Deluxe (1995)
Decisive Battles of WWII: The Ardennes Offensive (1997)
Warlords III: Reign of Heroes (1997)
Warlords III: Darklords Rising (1998)
Warlords Battlecry (2000)
Warlords Battlecry II (2002)
Decisive Battles of WWII: Korsun Pocket (2003)
Decisive Battles of WWII: Battles in Normandy (2004)
Decisive Battles of WWII: Battles in Italy (2005)
Battlefront (2007)
Kharkov: Disaster on the Donets (2008)
References
External links
SSG Website, last updated in 2010
Roger Keating at MobyGames
Year of birth missing (living people)
Living people
Australian video game designers
Australian computer programmers
New Zealand emigrants to Australia
Video game programmers |
https://en.wikipedia.org/wiki/ERacks | eRacks Open Source Systems was founded in 1999. The company provides computer systems based on open source software, including various distributions of Linux, *BSD and OpenSolaris, and manufactures rack-mounted servers (including NAS systems, firewalls, mail and web servers), desktops, laptops and netbooks.
Business
eRacks also manufactures quiet systems for recording studios.
References
Computer storage companies
Computer companies of the United States |
https://en.wikipedia.org/wiki/Redjack%3A%20Revenge%20of%20the%20Brethren | Redjack: Revenge of the Brethren is an action-adventure video game developed by Cyberflix and released by THQ in 1998.
Gameplay
Redjack uses several different engines: the main engine is a rotatory 3D engine, which is used for exploration. When the character enters a fight, the game loads a new screen. There are also different screens for different scenarios, such as concocting volatile drinks, shooting from a cannon on a speeding cart, and puzzles.
Plot
The player assumes the role of a young blond-haired man named Nicholas Dove who inhabits Lizard Point. He is pressured by people that are close to him to make something of himself. Nicholas decides to join a pirate crew in order to make a living. He meets a pirate named Lyle who, after saving him from assassins, tells him that Captain Justice is hiring men because he lost some in an "accident". Captain Justice only hires those that are generally brave enough to form his crew and dares Nicholas to kill a shark. After killing the shark (with poison) and finding a sword and learning to fight from Lyle, Nicholas joins the crew.
After taking the pirate's oath, Nicholas roams the ship and meets Sullivan, who is revealed to be a woman named Anne disguised as a man. When the ship docks at Port Royal, Nicholas is given a watch by Captain Justice. He visits Erzulie who tells him of his future. Nicholas witnesses Captain Justice being murdered by assassins and is blamed for it as he has the captain's watch. After escaping from prison he is captured by Bone and saved later on by Lyle, who maroons him with Sullivan, who was found out.
Nicholas washes ashore onto Redjack Island where he discovers Redjack's corpse. He lights a fire signal and is found by a balloon ship. He is escorted to Blackbeard's fortress and requests an audience. Blackbeard tells Nicholas some of the mythology of the brethren but is knocked unconscious by Bone and his men. Nicholas kills Bone and set sail for Cartagena.
Nicholas enters the city through a secret sewer entrance. He frees his captive friends, Elizabeth and his brother. He enters the Viceroy's room and get captured by a man named Marquez, who is revealed to have betrayed Redjack. After breaking up the reunion of the brethren, Nicholas kills Marquez and rescues Anne before sinking the Spanish fleet and rescuing Blackbeard. The game ends with Nicholas finding treasure at the wreckage of Redjack's ship.
Characters
Nicholas Dove - the main character, Nicholas is a pirate charged with the safety of Redjack's daughter and with finding his betrayer.
Lyle - a drunken pirate who teaches Nicholas to fight.
Anne/Sullivan - Redjack's daughter and a disguised crew member aboard Captain Justice's ship.
Redjack - the leader of the brethren.
Elizabeth - a possible love interest in the game.
Captain Justice - one of the brethren and captain of the ship which sets sail from Lizard Point.
Blackbeard - a pirate captain.
Marquez - the viceroy and Redjack's betrayer.
Bone - a nasty p |
https://en.wikipedia.org/wiki/Open%20Blueprint | Open Blueprint was an IBM framework developed in the early 1990s (and released in March 1992) that provided a standard for connecting network computers. The open blueprint structure reduced redundancy by combining protocols.
References
IBM software |
https://en.wikipedia.org/wiki/Efficiency%20%28statistics%29 | In statistics, efficiency is a measure of quality of an estimator, of an experimental design, or of a hypothesis testing procedure. Essentially, a more efficient estimator needs fewer input data or observations than a less efficient one to achieve the Cramér–Rao bound.
An efficient estimator is characterized by having the smallest possible variance, indicating that there is a small deviance between the estimated value and the "true" value in the L2 norm sense.
The relative efficiency of two procedures is the ratio of their efficiencies, although often this concept is used where the comparison is made between a given procedure and a notional "best possible" procedure. The efficiencies and the relative efficiency of two procedures theoretically depend on the sample size available for the given procedure, but it is often possible to use the asymptotic relative efficiency (defined as the limit of the relative efficiencies as the sample size grows) as the principal comparison measure.
Estimators
The efficiency of an unbiased estimator, T, of a parameter θ is defined as
where is the Fisher information of the sample. Thus e(T) is the minimum possible variance for an unbiased estimator divided by its actual variance. The Cramér–Rao bound can be used to prove that e(T) ≤ 1.
Efficient estimators
An efficient estimator is an estimator that estimates the quantity of interest in some “best possible” manner. The notion of “best possible” relies upon the choice of a particular loss function — the function which quantifies the relative degree of undesirability of estimation errors of different magnitudes. The most common choice of the loss function is quadratic, resulting in the mean squared error criterion of optimality.
In general, the spread of an estimator around the parameter θ is a measure of estimator efficiency and performance. This performance can be calculated by finding the mean squared error. More formally, let T be an estimator for the parameter θ. The mean squared error of T is the value , which can be decomposed as a sum of its variance and bias:
An estimator T1 performs better than an estimator T2 if . For a more specific case, if T1 and T2 are two unbiased estimators for the same parameter θ, then the variance can be compared to determine performance. In this case, T2 is more efficient than T1 if the variance of T2 is smaller than the variance of T1, i.e. for all values of θ. This relationship can be determined by simplifying the more general case above for mean squared error; since the expected value of an unbiased estimator is equal to the parameter value, . Therefore, for an unbiased estimator, , as the term drops out for being equal to 0.
If an unbiased estimator of a parameter θ attains for all values of the parameter, then the estimator is called efficient.
Equivalently, the estimator achieves equality in the Cramér–Rao inequality for all θ. The Cramér–Rao lower bound is a lower bound of the variance of an unbiased estimat |
https://en.wikipedia.org/wiki/Green%20card%20%28IBM/360%29 | Green card was the abbreviated name given to the IBM/360 Reference data card that served as the shorthand "bible" for programmers during the late 1960s and 1970s. It rapidly became an icon of the 360 era of programming and was later replaced by the "yellow card" for the IBM/370 product line. The same concept was also later used for an "orange card" for CICS application programming - that showed some internal CICS data structures and their relationships.
The card was published by IBM and was available by mail order directly from IBM, from university book stores associated with IBM 360 systems, some technical book stores, and other sellers of published technical material.
Page 8 of the card provides both the then mailing address to contact for pricing and the part number of GX20-1703.
Card contents
The reference card contained details of all assembler instructions and other 360 "essential facts" condensed to a very convenient fold-up, pocket sized format:
IBM/360 instructions (e.g. LR, ZAP, CLC)
Assembler directives (e.g. START, CSECT, DC, LTORG, EQU, AIF, END)
EBCDIC codes
Condition code summary
I/O "channel commands" for various devices
Hexadecimal conversion
References
External links
IBM/360 Green card image by Charles Eicher
Green, yellow and other cards by Dave Alcock
Complete reference card in PDF format.
A "green card" for OOP by Leslie J. Waguespack, Jr., Ph.D. from 2007
Handbooks and manuals |
https://en.wikipedia.org/wiki/Sundaraja%20Sitharama%20Iyengar | Sundaraja Sitharama Iyengar (born August 26, 1947) is an Indian-born American computer scientist and the Distinguished University Professor, Ryder Professor and Director of Computer Science at Florida International University, Miami, Florida, USA. He also founded and directs the Robotics Research Laboratory at Louisiana State University (LSU). He has been a visiting professor or scientist at Oak Ridge National Laboratory, Jet Propulsion Laboratory, Naval Research Laboratory, and has been awarded the Satish Dhawan Visiting Chaired Professorship at the Indian Institute of Science, the Homi Bhaba Visiting Chaired Professor (IGCAR), and a professorship at the University of Paris (Sorbonne).
Personal life
S. Sitharama Iyengar was born on 26 August 1947 in Hemmige, a village along the side of Kaveri River situated about 7 km. from Tirumakudal Narsipur in Karnataka. S. S. Iyengar's father, S.N. Sundaraj Iyengar worked as a Divisional Accountant in the Mysore State Electricity Board, and later moved to Bangalore in 1949. S. S. Iyengar's mother is S. Mahalakshmi.
Education
Professor Iyengar graduated from University Visvesvaraya College of Engineering (UVCE) in India with a B.S. degree in Mechanical Engineering, and M.S. degree in Mechanical Engineering from the Indian Institute of Science, Bangalore, then a Ph.D. in engineering from Mississippi State University in the United States in 1974. He was a faculty fellow at JPL-Caltech and ASEE faculty fellow at Oak Ridge national Lab. He joined the Computer Science Department as one of the only five faculty members at Louisiana State University. Soon after, he became the department chair and had stayed at the position for 22 years. Meanwhile, Professor Iyengar was very active to collaborate for any research topic with colleagues all over the world.
Research
Professor Iyengar has been a PI/Co-PI on many NSF, DARPA, and MURI funded projects and has been an active participant in numerous government sponsored studies. He has chaired many international conferences on Distributed Sensor Networks and served on many programming committees on sensor networks around the world. Professor Iyengar has published over 600 research papers in journals and conferences and he has authored, co-authored or edited over 22 books published in MIT Press, John Wiley, Prentice Hall, IEEE Computer Society Press, etc. These publications have been used in major universities all over the world. He has won many Best-Paper Awards sponsored by international conferences and his research publications are on data structures, robotics, parallel computing, and sensor networks. Professor Iyengar has graduated over 55 Ph.D. students, 100 Master's students, many undergraduate students, and large numbers of post-doctoral fellows at various institutions in the world who are now faculty at Major Universities worldwide or scientists or engineers at National Labs / Industries around the world.
Publications
Mario Mastriani,Sundaraja Sitharama Iyen |
https://en.wikipedia.org/wiki/Carrier-grade%20NAT | Carrier-grade NAT (CGN or CGNAT), also known as large-scale NAT (LSN), is a type of network address translation (NAT) used by ISPs in IPv4 network design. With CGNAT, end sites, in particular residential networks, are configured with private network addresses that are translated to public IPv4 addresses by middlebox network address translator devices embedded in the network operator's network, permitting the sharing of small pools of public addresses among many end users. This essentially repeats the traditional customer-premise NAT function at the ISP level.
Carrier-grade NAT is often used for mitigating IPv4 address exhaustion.
One use scenario of CGN has been labeled as NAT444, because some customer connections to Internet services on the public Internet would pass through three different IPv4 addressing domains: the customer's own private network, the carrier's private network and the public Internet.
Another CGN scenario is Dual-Stack Lite, in which the carrier's network uses IPv6 and thus only two IPv4 addressing domains are needed.
CGNAT techniques were first used in 2000 to accommodate the immediate need for large numbers of IPv4 addresses in General Packet Radio Service (GPRS) deployments of mobile networks. Estimated CGNAT deployments increased from 1200 in 2014 to 3400 in 2016, with 28.85% of the studied deployments appearing to be in mobile operator networks.
Shared address space
If an ISP deploys a CGN, and uses address space to number customer gateways, the risk of address collision, and therefore routing failures, arises when the customer network already uses an address space.
This prompted some ISPs to develop a policy within the American Registry for Internet Numbers (ARIN) to allocate new private address space for CGNs, but ARIN deferred to the IETF before implementing the policy indicating that the matter was not a typical allocation issue but a reservation of addresses for technical purposes (per RFC 2860).
IETF published , detailing a shared address space for use in ISP CGN deployments that can handle the same network prefixes occurring both on inbound and outbound interfaces. ARIN returned address space to the Internet Assigned Numbers Authority (IANA) for this allocation. The allocated address block is 100.64.0.0/10, i.e. IP addresses from 100.64.0.0 to 100.127.255.255.
Devices evaluating whether an IPv4 address is public must be updated to recognize the new address space. Allocating more private IPv4 address space for NAT devices might prolong the transition to IPv6.
Advantages
Maximises use of limited public IP4 address space.
May provide additional security for customers against attacks targeting their public IP address.
Disadvantages
Critics of carrier-grade NAT argue the following aspects:
Like any form of NAT, it breaks the end-to-end principle.
It has significant security and reliability problems, by virtue of being stateful.
It does not solve the IPv4 address exhaustion problem when a public |
https://en.wikipedia.org/wiki/Noctua%20%28company%29 | Noctua is an Austrian computer hardware manufacturer, particularly CPU-coolers and computer fans with a primary focus on the enthusiast market. The company's inception occurred in 2005 through a joint venture partnership between the Austrian company Rascom Computerdistribution Ges.M.B.H., established in August 2000, and the Taiwanese cooling specialist Kolink International Corporation.
The name "Noctua" draws inspiration from the scientific name of the little owl, Athene noctua, signifying wisdom and intelligence in Greek mythology. This connection is reflected in the owl present within the company's logo.
Products range
Noctua offers products such as CPU-coolers, computer fans, thermal compounds, solutions for industrial applications, and collaborative offerings like graphics cards.
A unique aspect of Noctua's computer fan products is their brown and beige color scheme. However, this color choice has elicited mixed opinions within the customer and enthusiast community. The color palette has faced criticism with PC Gamer characterizing it as an "an ugly... khaki-and-mud color-scheme straight out of the '70s".
Noctua has introduced more conventional color options within their chromax line. This line encompasses black editions of certain CPU coolers and fans, along with a variety of colored heatsink covers, cables, and anti-vibration accessories.[ ] During Computex Taipei in 2018, Noctua unveiled all-black versions of their most popular CPU coolers as part of the chromax.black series, which were formally introduced in October 2019.
Noctua's redux line reissues some of their most favored fans and coolers at a reduced cost, characterized by a light/dark gray color scheme. The redux line fans lack some of the advanced features present in the standard offerings, instead featuring Noctua's first-generation SSO bearing and minimal accessories.
The industrialPPC (Protected Performance Cooling) line by Noctua comprises robust high-speed variants of their retail models, purpose-built for industrial applications.
Collaborative Ventures
In October 2021, Noctua joined forces with Asus to release a Noctua-branded Nvidia GeForce RTX 3070 graphics processing unit (GPU) featuring Noctua cooling technology. This cooling solution incorporates a substantial heatsink and two full-sized Noctua NF-A12x25 PC fans, resulting in an effective thickness of five slots (actual thickness of 4.3 slots). Further collaboration between Noctua and Asus for graphics card offerings was confirmed in March 2022.
See also
Computer cooling
Quiet PC
Be quiet!
Cooler Master
References
External links
Computer hardware companies
Computer hardware cooling
2005 establishments in Austria
Technology companies of Austria
2005 establishments |
https://en.wikipedia.org/wiki/Bruce%20Daniels | Bruce Daniels is an American hydroclimatologist, business executive and computer programmer. He is known in Silicon Valley as one of the pioneers of the personal computer and user-friendly interfaces.
Daniels earned his Ph.D. from the University of California at Santa Cruz after receiving an Sc.B. and S.M. in computer science from MIT. He specializes in water-related impacts of climate change, especially in the American West. His contributions to decisions concerning California water quality date to 2003, when he was appointed to the state's Regional Water Quality Control Board. In 2011, he was honored as an ARCS Scholar in Northern California. In 2016, he serves as the elected president of the board of directors of the Soquel Creek Water District in Santa Cruz County, California.
Daniels has also been a computer programmer and business executive who has worked for Hewlett Packard, Apple Computer, Oracle, Borland, Sun Microsystems and his own start-up, Singular Software, which created relational database management software for the Apple Macintosh. He was a lead programmer for the Macintosh, and a software manager for the Apple Lisa. When he was still a student at the Massachusetts Institute of Technology, he was one of the creators of an early personal computer game, Zork.
References
Apple Inc. employees
Living people
American video game programmers
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/European%20Volunteer%20Centre | The Centre for European Volunteering (CEV) (until 1 July 2020 known as the European Volunteer Centre), established in 1992, is the European network of over 60 organisations dedicated to the promotion of, and support to, volunteers and volunteering in Europe at European, national or regional level. Through the network, CEV works to ensure that: the value of quality volunteering as an expression of Solidarity and European values is understood, supported and celebrated; policies & programmes, together with the European social environment, inspires, encourages and supports quality European Volunteering; Individuals and organisations that are active in the volunteering and civil society sphere share, learn and are inspired from one another in the framework of CEV . In this way CEV reaches out to the many thousands of volunteers and volunteer organisations in Europe as a source of support bringing the European dimension to their work.
History
CEV's origins lie in an initiative by 7 volunteer centres, Association pour le Volontariat (Belgium), Centre National du Volontariat (France), the National Centre for Volunteering (UK), Centro Nazionale per il Volontariato (Italy), Landelijk Steunpunt Vrijwilligerswerk (Netherlands) and Plataforma para la Promoción del Voluntariado en España (Spain). These organisations convened at a meeting organised in Lucca, Italy, in 1989, for the representatives of National and Regional Volunteer Centres from seven European countries. The outcome of the meeting was a joint declaration for increased European cooperation.
CEV was founded in February 1990 on the basis of this declaration and in 1992 was officially granted the status of “international non-profit organisation" registered under Belgian law. The Vlaams Steunpunt Vrijwilligerswerk, Flemish Volunteer Centre, was granted the responsibility to put in place the new organisation. On 5 December 1995, CEV organised the first ever "European Day for Volunteering in the European Parliament", Brussels, Belgium, with the active support of the European Parliament, the European Commission, the Council of the European Union and UNESCO.
Between 1994 and 2002 CEV administered as Technical Assistance Office over 13 contracts of the European Commission's PHARE and TACIS-LIEN Programme in Central and Eastern Europe and the Commonwealth of Independent States (CIS) and released a series of publications within these programmes.
As of July 1, 2020, the CEV went through a process of rebranding. This rebranding consisted of changing the English name of CEV from “European Volunteer Centre” to “Centre for European Volunteering” in order to align the name with the already used acronym “CEV”, which was taken from the French name for the organisation “Centre Européen du Volontariat”. The rebranding also introduced a new logo and visual identity for the organisation, which was first used during the candidacy application stage for the European Volunteering Capital 2022.
On its 25th annivers |
https://en.wikipedia.org/wiki/Command-line%20argument%20parsing | Different command-line argument parsing methods are used by different programming languages to parse command-line arguments.
Programming languages
C
C uses argv to process command-line arguments.
An example of C argument parsing would be:
#include <stdio.h>
int main (int argc, char *argv[])
{
int count;
for (count=0; count<argc; count++)
puts (argv[count]);
}
C also has functions called getopt and getopt_long.
C#
class TestClass
{
static void Main(string[] args)
{
// Display the number of command line arguments.
Console.WriteLine(args.Length);
}
}
Java
An example of Java argument parsing would be:
public class Echo {
public static void main (String[] args) {
for (String s: args) {
System.out.println(s);
}
}
}
Kotlin
Here are some possible ways to print arguments in Kotlin:
fun main(args: Array<String>) = println(args.joinToString())
fun main(args: Array<String>) = println(args.contentToString())
fun main(args: Array<String>) {
for (arg in args)
println(arg)
}
Perl
Perl uses @ARGV.
foreach $arg (@ARGV)GT
{
print $arg;
}FT
or
foreach $argnum (0 .. $#ARGV)ST
{
print $ARGV[$argnum];
}
AWK
AWK uses ARGV also.
BEGIN {
for ( i = 0; i < ARGC; i++ )
{
print ARGV[i]
}
}
PHP
PHP uses argc as a count of arguments and argv as an array containing the values of the arguments. To create an array from command-line arguments in the -foo:bar format, the following might be used:
$args = parseArgs($argv);
echo getArg($args, 'foo');
function parseArgs(array $args)
{
foreach ($args as $arg) {
$tmp = explode(':', $arg, 2);
if ($arg[0] === '-') {
$args[substr($tmp[0], 1)] = $tmp[1];
}
}
return $args;
}
function getArg(array $args, string $arg)
{
if (isset($args[$arg])) {
return $args[$arg];
}
return false;
}
PHP can also use getopt().
Python
Python uses sys.argv, e.g.:
import sys
for arg in sys.argv:
print arg
Python also has a module called argparse in the standard library for parsing command-line arguments.
Racket
Racket uses a current-command-line-arguments parameter, and provides a racket/cmdline library for parsing these arguments. Example:
#lang racket
(require racket/cmdline)
(define smile? (make-parameter #t))
(define nose? (make-parameter #false))
(define eyes (make-parameter ":"))
(command-line #:program "emoticon"
#:once-any ; the following two are mutually exclusive
[("-s" "--smile") "smile mode" (smile? #true)]
[("-f" "--frown") "frown mode" (smile? #false)]
#:once-each
[("-n" "--nose") "add a nose" (nose? #true)]
[("-e" "--eyes") char "use <char> for the eyes" (eyes char)])
(printf "~a~a~a\n"
(eyes)
(if (nose?) "-" "")
(if (smile?) ")" "("))
The library parses long and short flags, handles arguments, allows combining short flags, and |
https://en.wikipedia.org/wiki/Logro%C3%B1o%2C%20Ecuador | Logroño is a town in Morona-Santiago Province, Ecuador. It is the seat of Logroño Canton. It has a population of 5,723, the majority of which are Shuar. There is a network of limestone caves 2 km from the town, "Caverna de Las Cascadas".
History
Logroño has been inhabited for over 500 years by the Shuar. In 1930, the first to explore the area were missionaries who traveled down from the highlands of Ecuador (Azuay and Canar). The first evangelical missionary settlements were located south of Logrono (in Chupiankas) and the first catholic missionaries were located in the town center of Logroño. Due to its geographic location and economic assets, Logroño began its intent to become a canton on 14 October 1992, and official canton and political status were recognized on 22 January 1997.
Yaupi, a sector located within canton Logroño has its own governor in the area of 'Cordillera de Kutukú'.
The first mayor of Logroño was Jorge Enriquez (1997-2001), born in Quito, Ecuador and raised in canton Logroño, the second Angel Moises Molina (2001-2005) from near-by town, El Tesoro, the third Gregorio Unkuch (2005-2009) from Yaupi, and fourth Galo Utitiaj from Shimpis (2009-2013).
Local Culture
About 70% of the population of canton Logroño is nationality Shuar, and the remaining 30% is made up a 'mestizos' or of mixed origin. Both the Shuar and mestizo cultures are visible throughout canton Logroño in the local food, dance and customs.
90% of Shuar live in the sectors of Yaupi and Shimpis, and 10% live in the sector of Logroño. In the Shuar culture it is common to have many children, and for men to have more than one wife. Shuar live either a communal or solitary lifestyle. The men are responsible for fishing and hunting, their sons are responsible for tending to the gardens and constructing houses, while the women cook for the house, weave crafts, and collect wild edible plants.
The traditional 'mestizo' cuisine includes roast guinea pig, chicken, a variety of soups, roasted and baked pork, local fish (Huambi, Cat Fish, Boca Chicas, Cachama etc.), or beef, all of which are all accompanied by rice and cassava, plantain, sweet potato, chonta, or other fruits and vegetables grown locally.
The main staple of the Shuar diet is 'chicha de yuca' (nijiamanch), and traditional food includes ayampacos which includes grubs, fish, or chicken wrapped in leaves and cooked over an open fire, and grilled wild game (armadillo, guanta, guatusa etc.), accompanied by cassava, plantains, papa china, sweet potato, or local plants from the jungle (col del monte, yuyo, wanchup, taro etc.) and local fruits (papaya, pineapple, mome, zapote etc.).
The celebrations of the canton of Logroño are 16–22 January. Throughout the week there are traditional dances, exhibition of local arts, agriculture fair, rodeo, traditional foods, beauty pageants, and a lot of dancing.
Other cultural events include:
March 21- Logroño limpio, compromiso de todos, a day dedicated to caring for the |
https://en.wikipedia.org/wiki/Time-slot%20interchange | A time-slot interchange (TSI) switch is a network switch that stores data in RAM in one sequence, and reads it out in a different sequence. It uses RAM, a small routing memory and a counter. Like any switch, it has input and output ports. The RAM stores the packets or other data that arrive via its input terminal.
Mechanism
In a pure time-slot interchange switch, there is only one physical input, and one physical output. Each physical connection is an opportunity for a switching fabric to fail. The limited number of connections of this switch is therefore valuable in a large switching fabric, because it makes this type of switching very reliable. The disadvantage of this type of switch is that it introduces a delay into the signals.
When a packet (or byte, on telephone switches) comes to the input, the switch stores the data in RAM in one sequence, and reads it out in a different sequence. Switch designs vary, but typically, a repeating counter is incremented with an internal clock. It typically wraps-around to zero. The RAM location chosen for the incoming data is taken from a small memory indexed by the counter. It is usually a location for the desired output time-slot. The current value of the counter also selects the RAM data to forward in the current output time slot. Then the counter is incremented to the next value. The switch repeats the algorithm, eventually sending data from any input time-slot to any output time-slot.
To minimize connections, and therefore improve reliability, the data to reprogram the switch is usually programmed via a single wire that threads through the entire group of integrated circuits in a printed circuit board. The software typically compares the data shifted-in with the data shifted-out, to verify that the ICs remain correctly connected. The switching data entered into the ICs is double-buffered. That is, a new switch set-up is shifted-in, and then a single pulse applies the new configuration instantly to all the connected ICs.
Limitation
In a time-slot interchange (TSI) switch, two memory accesses are required for each connection (one to read and one to store). Let T be the time to access the memory. Therefore, for a connection, 2T time will be taken to access the memory. If there are n connections and t is the operation time for n lines, then
t=2nT which givesn=t/2T
t and n normally come from a higher-level system design of the switching fabric. Hence the technology yielding T determines n for a given t. T also limits t for a given n. Real switching fabrics have real requirements for n and t, and therefore since T must be an actual number set by a possible technology, real switches cannot be arbitrarily large n or small t.
In higher-speed switches, the limit from T can be halved by using a more expensive, less reliable two-port RAM. In these designs, the read and write usually occur at the same time. The switch must still arbitrate when there is an attempt to read and write a RAM slot at |
https://en.wikipedia.org/wiki/Protein%20I-sites | I-sites are short sequence-structure motifs that are mined from the Protein Data Bank (PDB) that correlate strongly with three-dimensional structural elements. These sequence-structure motifs are used for the local structure prediction of proteins. Local structure can be expressed as fragments or as backbone angles. Locations in the protein sequence that have high confidence I-sites predictions may be the initiation sites of folding. I-sites have also been identified as discrete models for folding pathways. I-sites consist of about 250 motifs. Each motif has an amino acid profile, a fragment structure (represented by a "paradigm" fragment chosen from a protein in the PDB) and optionally, a 4-dimensional tensor of pairwise sequence covariance.
Construction of I-site Library
The sequence and structure database
The database initially consisted of 471 protein sequence families from the HSSP database, with an average of 47 aligned sequences per family. Each family contained a single known structure (parent) from the Brookhaven protein Data Bank. These were a subset of the PDBSelect-25 list, having no more than 25% sequence identity between any two alignments. Disordered loops were omitted. Gaps and insertions in the sequence were ignored.
Clustering of sequence segments
Each position in the database is described by a weighted amino acid frequency. A similarity measure in sequence space between a segment (p) and a cluster of segments (q) is defined as:
where Pij(p) is the frequency of amino acid i in position j within the segment p. Nq is the number of sequence segments k in the cluster q. Fi is the frequency of amino acid type i in the database overall. The optimal values of a and a0 were determined empirically to be 0.5 and 15, respectively. Using this similarity measure, segments of a given length (3 to 15) were clustered via the k-means algorithm.
Assessing structure within a cluster; choice of paradigm
The structural similarity between any two peptide segments was evaluated using a combination of the RMS distance matrix error (dme):
where ai->j is the distance between a-carbon atoms i and j in the segment s1 of length L, and the maximum deviation in backbone torsion angles (mda) over the length of the segment is given by:
The paradigm structure for a cluster was chosen from the top-scoring 20 segments in the database as that with the smallest sum of mda values to the other 19. Other structural measures were tried before settling on these two: RMS deviation of a-carbon atoms (rmsd), dme alone, and a structural filter that looked for specific conserved contacts. The latter worked best in discriminating true and false positives, but could not be easily automated. The rmsd and dme were found to be poor discriminators of the two types of helix cap. The mda-dme combined filter best simulates the conserved contacts filter and is rapidly computed.
References
External links
I-sites Library
I-sites/HMMSTR Prediction Server
Protein |
https://en.wikipedia.org/wiki/Access%20to%20Information%20Central%20Clearing%20House | The Access to Information Central Clearing House was established by the UK Government in January 2005. The Central Clearing House was set up to ensure consistent application of the Data Protection Act 1998, the Freedom of Information Act 2000, and the Environmental Information Regulations (EIRs) across Central Government. The Central Clearing House provides expert advice for cases referred to the Information Commissioner or Information Tribunal.
Procedures exist to ensure that all requests which activate one of a number of 'triggers' are referred to the Clearing House.
Controversies
Critics have blamed the Central Clearing House for the rising number of appeals to the Information Commissioner and for 'being bent on blocking as many requests for information as it can'.
In June 2020, openDemocracy published an investigation that found that the House had blocked the release of information related to the Contaminated blood scandal in the United Kingdom. The files, eventually released in 2018, showed that the British government had privately admitted that some health authorities had been negligent.
On 8 of June 2021 the UK government lost a request for a freedom of information request appeal in regards to details about the Clearing house, the action was brought by openDemocracy. In its defence the cabinet office had offered a Wikipedia article. Judge Hughes, concluding said that there was a “profound lack of transparency about the operation” that “might appear … to extend to ministers” and that the tribunal had been misled by the department, headed by Michael Gove.
An investigation by Politico Europe published on 12 June 2021 found that the Clearing House kept a list of journalists that made FOI requests and used it to determine whether those requests would be granted, in breach of the rule that FOI requests should be evaluated applicant-blind. Politico's investigation also found that the House blocked requests even when the Trade Department recommended granting them.
In September 2021, Minister for the Cabinet Office Chloe Smith announced that government would undertake an "assessment of the role of the Clearing House." The House of Commons Public Administration and Constitutional Affairs Committee is also undertaken its own review of the Clearing House. Later that month, openDemocracy further revealed that the Clearing House had interfered with release of information surrounding the Grenfell Tower fire.
Triggers for referring requests to Central Clearing House
The Government has published a list of triggers which will result in request being referred to the Central Clearing House these triggers fall under five main headings:
Prime ministerial and ministerial issues
Royal Household and honours
Procurement and efficiency
Cross-Whitehall issues
Ministerial veto certificates and security
References
Freedom of information in the United Kingdom
Political controversies in the United Kingdom |
https://en.wikipedia.org/wiki/List%20of%20state%20highways%20in%20Gujarat | Gujarat state is one of the most prosperous state in Western India and having a good transportation infrastructure with an extensive road network. The Road & Buildings Department (RBD) of Gujarat government is primarily responsible for construction and maintenance of road Huis including state highways and panchayat roads in Gujarat. This department is operating through 6 wings geographical spread across the state in 26 districts. There are 17 national highways with total length of 4032 km and more than 300 state highways with total length of 19,761 km.
The state highways are arterial routes of a state, linking district headquarters and important towns within the state and connecting them with national highways or highways of the neighboring states.
Type of road and its length
List of state highways
References
Government of Gujarat
State Highways
Gujarat State Highways
State Highways |
https://en.wikipedia.org/wiki/Cloud%20Communications%20Alliance | The Cloud Communications Alliance (CCA) comprises eight hosted IP voice and data communications companies. Launched in April 2010 and creating some stir in the industry, the CCA's mission is to promote awareness of the new standard called cloud communications and drive its development through the pursuit of new technical standards, capabilities and applications. The CCA also delivers services as a group.
Founding members of the Cloud Communications Alliance are:
Alteva
Broadcore
Callis Communications
Consolidated Technologies Inc.
IPFone
SimpleSignal
Stage 2 Networks
Telesphere
Clark Peterson, CEO of Telesphere, is the first and current chairman of the CCA. Together, the regionally owned and operated companies represent more than $100 million in combined annual revenue and collectively serve more than 110,000 business customers in the United States.
Each member of the CCA owns and operates facilities-based, dedicated Multiprotocol Label Switching (MPLS) IP infrastructure that jointly create a cloud-based nationwide, end-to-end high-definition voice/video network to deliver higher voice quality and more user features at a lower cost. This network routes calls from one user to another without touching the Public Switched Telephone Network (PSTN).
The CCA has a code of ethics to assure high standards in all dealings with CCA members. Code enforcement is handled by an ethics committee which can render sanctions, including suspension or expulsion from the CCA.
References
External links
Telecommunications companies of the United States |
https://en.wikipedia.org/wiki/Dream%20Street%20%28Dream%20Street%20album%29 | Dream Street is the self-titled debut album by American boyband Dream Street. It was released on October 31, 2000, by Edel America Records.
Track listing
Credits adapted from Apple Music metadata.
Charts
Weekly charts
Year-end charts
Notes
References
2000 debut albums
Edel Music albums
Teen pop albums |
https://en.wikipedia.org/wiki/Art%20Loss%20Register | The Art Loss Register (ALR) is the world's largest database of stolen art. A computerized international database that captures information about lost and stolen art, antiques, and collectibles, the ALR is a London-based, independent, for-profit corporate offspring of the New York–based, nonprofit International Foundation for Art Research (IFAR). The range of functions served by ALR has grown as the number of its listed items has increased. The database is used by collectors, the art trade, insurers, and law enforcement agencies worldwide. In 1991, IFAR helped create the ALR as a commercial enterprise to expand and market the database. IFAR managed ALR's U.S. operations through 1997. In 1998, the ALR assumed full responsibility for the IFAR database, although IFAR retains ownership. In 1992, the database comprised only 20,000 items, but it grew in size nearly tenfold during its first decade.
History
The first steps toward the ALR began with the establishment of IFAR in New York in 1969.
Among other explicit goals, IFAR was created to compile information about stolen art. In response to the growth of international art thefts, IFAR began publishing the "Stolen Art Alert" in 1976.
By 1990, IFAR was updating its catalogue of stolen art ten times a year. The magnitude of the problem overwhelmed what had grown to be over 20,000 manual records. While IFAR had successfully recorded the details of losses, that was only a good first step.
In 1991, the ALR was established in London as a commercial company, earning fees from insurers and theft victims. Its founding shareholders included insurance and auction houses, which some think is a conflict of interest (Christie's). The majority of shares are owned by its founder, Julian Radcliffe. Significant capital investment was needed so that IFAR could be computerized and so that the database made available to worldwide law enforcement agencies and others.
Development
In response to the growth and development of IFAR, museum officials revised some policies based on the assumption that discussing theft would scare away potential donors. The AFR initially formed a partnership with the ALR, but they split after disagreements over strategy and control issues. The change from policies of secrecy to ones that emphasize openness was gradual, mirroring an expectation that publicizing theft is likely to promote recovery. The ALR has been widely criticised for its methods and the actions of its chairman, Radcliffe. The Register has consistently lost money but for the personal cash infusions of its chairman.
Selected timeline
1990: Artworks stolen from the Isabella Stewart Gardner Museum in Boston includes Vermeer's Concert, three Rembrandts and five works by Degas.
1989: IFAR received reports of about 5,000 thefts.
2003: The ALR obtains information about a Sisley stolen from the Musée des Beaux-Arts d'Orléans in Orleans, France. The museum could not afford the fee, and the Sisley was not recovered.
Criticism of m |
https://en.wikipedia.org/wiki/Delegation%20%28computer%20security%29 | Delegation is the process of a computer user handing over its authentication credentials to another user. In role-based access control models, delegation of authority involves delegating roles that a user can assume or the set of permissions that the user can acquire, to other users.
Types of delegation in IT networks
There are essentially two classes of delegation: delegation at Authentication/Identity Level, and delegation at Authorization/Access Control Level.
Delegation at Authentication/Identity level
It is defined as follows: If an authentication mechanism provides an effective identity different from the validated identity of the user then it is called identity delegation at
the authentication level, provided the owner of the effective identity has previously
authorized the owner of the validated identity to use his identity.
The existing techniques of identity delegation using sudo or su commands of UNIX are very popular. To use the sudo command, a person first has to start his session with his own original identity. It requires the delegated account password or explicit authorizations granted by the system administrator. The user login delegation described in the patent of Mercredi and Frey is also an identity delegation.
Delegation at Authorization/Access Control level
The most common way of ensuring computer security is access control mechanisms provided by operating systems such as UNIX, Linux, Windows, Mac OS, etc.
If the delegation is for very specific rights, also known as fine-grained, such as with Role-based access control (RBAC) delegation, then there is always a risk of under-delegation, i.e., the delegator does not delegate all the necessary permissions to perform a delegated job. This may cause the denial of service, which is very undesirable in some environments, such as in safety critical systems or in health care. In RBAC-based delegation, one option to achieve delegation is by reassigning a set of permissions to the role of a delegatee; however, finding the relevant permissions for a particular job is not an easy task for large and complex systems. Moreover, by assigning these permissions to a delegatee role, all other users who are associated with that particular role get the delegated rights.
If the delegation is achieved by assigning the roles of a delegator to a delegatee then it would not only be a case of over-delegation but also the problem that the delegator has to figure out what roles, in the complex hierarchy of RBAC, are necessary to perform a particular job. These types of problems are not present in identity delegation mechanisms and normally the user interface is simpler.
More details can be found at RBAC.
References
Computer access control |
https://en.wikipedia.org/wiki/Structured%20prediction | Structured prediction or structured (output) learning is an umbrella term for supervised machine learning techniques that involves predicting structured objects, rather than scalar discrete or real values.
Similar to commonly used supervised learning techniques, structured prediction models are typically trained by means of observed data in which the true prediction value is used to adjust model parameters. Due to the complexity of the model and the interrelations of predicted variables the process of prediction using a trained model and of training itself is often computationally infeasible and approximate inference and learning methods are used.
Applications
For example, the problem of translating a natural language sentence into a syntactic representation such as a parse tree can be seen as a structured prediction problem in which the structured output domain is the set of all possible parse trees.
Structured prediction is also used in a wide variety of application domains including bioinformatics, natural language processing, speech recognition, and computer vision.
Example: sequence tagging
Sequence tagging is a class of problems prevalent in natural language processing, where input data are often sequences (e.g. sentences of text). The sequence tagging problem appears in several guises, e.g. part-of-speech tagging and named entity recognition. In POS tagging, for example, each word in a sequence must receive a "tag" (class label) that expresses its "type" of word:
{|
| This
| DT
|-
| is
| VBZ
|-
| a
| DT
|-
| tagged
| JJ
|-
| sentence
| NN
|-
|.
|.
|}
The main challenge of this problem is to resolve ambiguity: the word "sentence" can also be a verb in English, and so can "tagged".
While this problem can be solved by simply performing classification of individual tokens, that approach does not take into account the empirical fact that tags do not occur independently; instead, each tag displays a strong conditional dependence on the tag of the previous word. This fact can be exploited in a sequence model such as a hidden Markov model or conditional random field that predicts the entire tag sequence for a sentence, rather than just individual tags, by means of the Viterbi algorithm.
Techniques
Probabilistic graphical models form a large class of structured prediction models. In particular, Bayesian networks and random fields are popular. Other algorithms and models for structured prediction include inductive logic programming, case-based reasoning, structured SVMs, Markov logic networks, Probabilistic Soft Logic, and constrained conditional models. Main techniques:
Conditional random field
Structured support vector machine
Structured k-Nearest Neighbours
Recurrent neural network, in particular Elman network
Structured perceptron
One of the easiest ways to understand algorithms for general structured prediction is the structured perceptron of Collins.
This algorithm combines the perceptron algorithm for learning linear classifi |
https://en.wikipedia.org/wiki/Digital%20Cinema%20Package | A Digital Cinema Package (DCP) is a collection of digital files used to store and convey digital cinema (DC) audio, image, and data streams.
The term was popularized by Digital Cinema Initiatives, LLC in its original recommendation for packaging DC contents. However, the industry tends to apply the term to the structure more formally known as the composition. ("You PLAY a composition, you do NOT play a Digital Cinema Package".) A DCP is a “packing crate” for compositions, a hierarchical file structure that represents a title version. The DCP may carry a partial composition (e.g. not a complete set of files), a single complete composition, or multiple and complete compositions.
The composition consists of a Composition Playlist (in XML format) that defines the playback sequence of a set of Track Files. Track Files carry the essence, which is wrapped using Material eXchange Format (MXF). Two track files at a minimum must be present in every composition (see SMPTE ST429-2 D-Cinema Packaging – DCP Constraints, or Cinepedia): a track file carrying picture essence, and a track file carrying audio essence. The composition, consisting of a Composition Playlist and associated track files, are distributed as a Digital Cinema Package (DCP). A composition is a complete representation of a title version, while the DCP need not carry a full composition. However, as already noted, it is commonplace in the industry to discuss the title in terms of a DCP, as that is the deliverable to the cinema.
The Picture Track File essence is compressed using JPEG 2000 and the Audio Track File carries a 24-bit linear PCM uncompressed multichannel WAV file. Encryption may optionally be applied to the essence of a track file to protect it from unauthorized use. The encryption used is AES 128-bit in CBC mode.
In practice, there are two versions of composition in use. The original version is called Interop DCP. In 2009, a specification was published by SMPTE (SMPTE ST 429-2 Digital Cinema Packaging – DCP Constraints) for what is commonly referred to as SMPTE DCP. SMPTE DCP is similar but not backwards compatible with Interop DCP, resulting in an uphill effort to transition the industry from Interop DCP to SMPTE DCP. SMPTE DCP requires significant constraints to ensure success in the field, as shown by ISDCF. While legacy support for Interop DCP is necessary for commercial products, new productions are encouraged to distribute in SMPTE DCP.
Technical specifications
The DCP root folder (in the storage medium) contains a number of files, some used to store the image and audio contents, and some other used to organize and manage the whole playlist.
Picture MXF files
Picture contents may be stored in one or more reels corresponding to one or more MXF files. Each reel contains pictures as MPEG-2 or JPEG 2000 essence, depending on the adopted codec. MPEG-2 is no longer compliant with the DCI specification. JPEG 2000 is the only accepted compression format.
Supported frame |
https://en.wikipedia.org/wiki/Bengali%20input%20methods | Bengali input methods refer to different systems developed to type the characters of the Bengali script for Bengali language and others, using a typewriter or a computer keyboard.
Fixed computer layouts
With the advent of graphical user interfaces and word processing in the 1980s, a number of computer typing systems for Bengali were created. Most of these were originally based on Apple Macintosh systems.
Shahidlipi
Shahidlipi was the first Bengali keyboard developed for the computer by Saifuddahar Shahid in 1985. It was a phonetic based layout on QWERTY for Macintosh computer. This keyboard was popular until the release of Bijoy keyboard. There were about 182 characters and half part of conjunct characters under Normal, Shift, AltGr, and Shift AltGr layer.
Munier keyboard
Munier keyboard layout comes from a Bengali typewriter layout named Munier-Optima. In 1965, Munier Choudhury redesigned the keyboard of Bengali typewriter in collaboration with Remington typewriters of the then East Germany. Munier-Optima was the most-used typewriter in Bangladesh. So, many software developers implemented this layout on their keyboard. This layout is optimized for Unicode by Ekushey.
UniJoy keyboard
UniJoy keyboard was standardized by Ekushey for Unicode. It was included in the m17n database by Kenichi Handa under the GNU Lesser General Public License on 7 December 2005 under the copyright of the National Institute of Advanced Industrial Science and Technology (AIST).
Bangla Jatiyo
Bangla Jatiyo Keyboard (National, ) layout developed by Bangladesh Computer Council. It is considered to be the standard layout and used as the official layout in Bangladesh.
In 2004, an initiative was taken to develop a national Bangla computer keyboard. The initiative was taken to solve the problem caused by the existence of multiple keyboards (such as Bijoy, Bashundhara, Munier, Borno, Lekhoni etc.) in Bangladesh during that period, to set a standard standard of Bengali keyboard. In view of this, the Bangladesh Computer Council completed the task of formulating the National Bangla Computer Keyboard by reviewing the various Bangla keyboards existing in the country.
Following the review of Bangladesh Computer Council, BSTI declared the keyboard as the national standard for Bengali computer keyboard known as Bangladesh Standard BDS 1738:2004. Letters and symbols are arranged in total 4 levels in Jatiyo Bangla keyboard. The most frequently used letters, symbols and ligatures are arranged in the 1st and 2nd levels, while the less frequently used letters and symbols are placed in the 3rd and 4th levels.
Meanwhile, the National Committee on Standardization of Bengali Language in Information Technology felt the need to modernize the existing National Bengali Computer Keyboard. In view of this, BCC carried out the modernization work and sent it to BSTI, which approved the work as BDS 1738:2018. Bangladesh Computer Council develops Windows and Linux software for national keyboard |
https://en.wikipedia.org/wiki/Security%20information%20and%20event%20management | Security information and event management (SIEM) is a field within the field of computer security, where software products and services combine security information management (SIM) and security event management (SEM). They provide real-time analysis of security alerts generated by applications and network hardware. Vendors sell SIEM as software, as appliances, or as managed services; these products are also used to log security data and generate reports for compliance purposes. The term and the initialism SIEM was coined by Mark Nicolett and Amrit Williams of Gartner in 2005.
History
Monitoring system logs has grown more prevalent as complex cyber-attacks force compliance and regulatory mechanisms to mandate logging security controls within a Risk Management Framework. Logging levels of a system started with the primary function of troubleshooting system errors or debugging code compiled and run. As operating systems and networks have increased in complexity, so has the event and log generation on these systems. In comparison, the logging of system, security, and application logs is not the only way to perform incident response. They do offer the capability to trace the activities of nearly any system or user-related movement throughout a given period. From the late 1970s, there was a formation of working groups to help establish the criteria for the management of auditing and monitoring programs and what and how system logs can be used for insider threat, incident response, and troubleshooting. This also established a base discussion for many of the concepts still used in modern cybersecurity. See, Basis for Audit and Evaluation of Computer Security from National Institute of Standards and Technology (NIST) Special Publication 500-19 published in 1977.
With Risk Management Frameworks (RMF) being implemented worldwide in nearly all industry sectors, auditing and monitoring are core elements of information assurance and information security. Information assurance personnel, cybersecurity engineers, and analysts can use logging information to perform critical security functions in real-time. These items are driven by governance models that integrate or use auditing and monitoring as a basis for that analytical work. As information assurance matured in the late 1990s and moved into the 2000s, system logs needed to be centralized. This allows records to be centrally located and viewed and provides centralized management as a 'nerve center' for all machines on a given network.
This centralization and consolidation of system data would provide significantly more than just a holistic view. Still, now organizations could use the logging data for operational use cases and help with performance and networking-based communication troubleshooting. Security Information and Event Management (SIEM) is now commonplace, and there are apparent variations of the same acronym in this article. The word SIEM is primarily a moniker forcing all logs into a single p |
https://en.wikipedia.org/wiki/Love%20Bug%20%28Philippine%20TV%20program%29 | Love Bug is a 2010 Philippine television drama romance anthology broadcast by GMA Network. It premiered on May 23, 2010 replacing Dear Friend. The show concluded on September 19, 2010 with a total of 16 episodes. It was replaced by Reel Love Presents Tween Hearts in its timeslot.
Chapters
"The Last Romance"
A young athlete, Rackie Carla Abellana, meets Hero Dennis Trillo, a handsome young man. They fall in love aboard a cruise going to Hong Kong. Rackie has a terminal illness; Hero is a soon-to-be-wed groom and event organizer working his way to give his soon-to-be wife Iwa Moto the perfect life. Rackie and Hero's encounter makes them realize that love only comes once in a lifetime in all unexpected places.
"The Last Romance" aired for four episodes.
"Exchange of Hearts"
This is the first time for the new StarStruck V competitors to enter a TV series. The production focuses on finalists in the next story about the tests and complicated world of love between young adults.
It starred Diva Montelaba, Sarah Lahbati, Steven Silva, and Enzo Pineda.
"Wish Come True"
The third episode starred Rich Asuncion, Chariz Solomon, Daniel Matsunaga and Kris Bernal.
"Say I Do"
Alvin (Mark Anthony Fernandez) is madly in love with Faye (Lovi Poe). Feeling they are meant to be together, they decide to get married. Alvin wants his divorced parents to come together at the wedding. Chona (Carmi Martin) makes a scene and Ulyeses (Joey Marquez) decides to apologize for the dismay and commotion at the important event. Alvin just wants them to get along (but not be together) after his mother's heartache and hardships. Alvin and Faye go to the same phase as well as they start fighting. Will they realize that sometimes people who are meant to be together should be with the ones they love? Is love better the second time around?
The fourth episode aired August 29, 2010 to September 19, 2010.
Ratings
According to AGB Nielsen Philippines' Mega Manila household television ratings, the pilot episode of Love Bug earned a 9.9% rating. While the final episode scored a 2.7% rating in Mega Manila People/Individual television ratings.
Accolades
References
External links
2010 Philippine television series debuts
2010 Philippine television series endings
Filipino-language television shows
GMA Network original programming
Philippine anthology television series
Philippine romantic comedy television series
Television shows set in the Philippines |
https://en.wikipedia.org/wiki/Effects%20of%20time%20zones%20on%20North%20American%20broadcasting | The scheduling of television programming in North America (namely the United States, Canada, and Mexico) must cope with different time zones. The United States (excluding territories) has six time zones (Hawaii–Aleutian, Alaska, Pacific, Mountain, Central and Eastern), with further variation in the observance of daylight saving time. Canada also has six time zones (Pacific, Mountain, Central, Eastern, Atlantic and Newfoundland). Mexico has four time zones (Pacific, Mountain, Central, and Eastern). This requires broadcast and pay television networks in each country to shift programs in time to show them in different regions.
In Canada
Broadcast networks
Canadian broadcasting networks, with six time zones and a much larger percentage of its audience residing in the Mountain Time Zone than in the Central Time Zone, are sometimes able to avoid the issues that affect American programming by airing pre-recorded programs on local time. CBC Television and CTV created delay centres in Calgary in the early 1960s in order to allow programming to air in each time zone based on the region.
In order to protect local advertising revenue, the "simsub" rules allow broadcast stations to require feeds of U.S. broadcast stations on local pay television to be "substituted" with the Canadian station's signal if they are airing the same program. This can affect how commercial broadcasters schedule their programming outside of Eastern, Central, and Pacific Time areas: the Atlantic and Mountain time zones are one hour ahead of the U.S. stations historically carried on television providers in their respective markets (such as Boston in Atlantic Canada, and Spokane in Alberta), meaning that stations may air certain programs out of pattern in comparison to other markets (such as airing a show scheduled at 8 p.m. ET/PT at 9 p.m. MT), in order to maximize simsub opportunities.
Saskatchewan does not observe Daylight Saving Time, and matches Mountain Time when DST is in effect. However, networked stations follow the schedule grids of their sister stations in Manitoba (which are in Central Time, but do observe DST) year-round, and do not follow the scheduling patterns of their Alberta counterparts when DST is in effect.
Unlike in the United States, virtually all live events, including live entertainment shows and sports television, are simultaneously broadcast nationwide in Canada. For instance, live shows in Canada are aired to entirety at the same time in all time zones based on Eastern time. Several live U.S. shows are also aired simultaneously in all of Canada, including for viewers in the Pacific Coast (unlike in the United States where some viewers on the same side of the continent depend on tape-delayed broadcasts for some otherwise live events). Conversely, live shows aired in Canada are frequently televised simultaneously for some viewers in the U.S. with access to Canadian broadcast networks.
Cable and satellite channels
The vast majority of specialty cable and s |
https://en.wikipedia.org/wiki/FIL%20file | FIL file may refer to:
In Audit Command Language (ACL), a Table Data file.
In Application Generator, a File Template.
In dBASE Application Generator, a Files List Object file.
In Mirror (computing), a file containing a saved File Allocation Table (FAT), created by some DOS mirror programs.
An Overlay (programming) file.
A Symbian Application Logo File, containing bitmap images used for application icons. |
https://en.wikipedia.org/wiki/Paul%20Beynon-Davies | Paul Beynon-Davies (born 1957) is a British academic, author and consultant.
Biography
Born in the Rhondda, Wales, he received his BSc in Economics and Social Science and PhD in Computing from University of Wales College, Cardiff.
Before taking up an academic post he worked for several years in the ICT industry in the UK as a programmer and business analyst both in the public and private sectors. He entered academia in the mid 1980s and has held positions at the University of Glamorgan, Swansea University and most recently at Cardiff University.
His inter-disciplinary interests began with this PhD thesis which considered the application of computing in ethnography. Over nearly three decades of work he has published on a wide range of topics ranging from the nature of informatics, electronic business, electronic government, information systems planning, information systems development and database systems. Details of some of these publications are included below.
His most recent programme of work involves considering the fundamental nature of informatics in terms of the intersection of signs and systems. Some of this work has already been published
A book describing this work is published by Palgrave/Macmillan.
More recently he has been developing a new design theory for business analysis which is theory-driven but practical in application.
A book exploring the constitutive nature of data within society has recently been published.
Paul Beynon-Davies is currently professor emeritus at the Cardiff business school, Cardiff university and still lives in South Wales. He is married with three children.
Books
Beynon-Davies P. (1992). Systemes d'information. Afnor. Translated by David Avison.
Beynon-Davies P. (1991). Expert Database Systems: A Gentle Introduction. McGraw-Hill, Basingstoke.
Beynon-Davies P. (1991). Relational Database Systems. McGraw-Hill, Basingstoke.
Beynon-Davies P. (1992). Knowledge Engineering for Information Systems. McGraw-Hill, Basingstoke.
Beynon-Davies P. (1992). Relational Database Design. McGraw-Hill, Basingstoke.
Beynon-Davies P. (1997). Analysing Information Systems Failures: a practical approach. Pitman/THES Publications, London, UK.
Beynon-Davies P. (1998). Information Systems Development: an introduction to information systems engineering. 3rd Ed. Macmillan.
Beynon-Davies, P. (1998). Systemy Baz Danych. Warsaw, Wydawnictwa Naukowo-Techniczne.
Beynon-Davies, P. (1999). Inzynieria Systemow Informacyjnych. Warsaw, Wydawnictwa Naukowo-Techniczne.
Beynon-Davies P. (2002). Information Systems: an introduction to informatics in Organisations. Palgrave, Basingstoke, UK.
Beynon-Davies P. (2004). E-Business. Palgrave, Basingstoke.
Beynon-Davies P. (2004). Database Systems 3rd Edition. Palgrave, Basingstoke, UK.
Beynon-Davies P. (2011) Significance: Exploring the Nature of Information, Systems and Technology
Beynon-Davies P. (2013). Business Information Systems. 2nd edition. Palgrave, Basingstoke.
Beynon |
https://en.wikipedia.org/wiki/Honest%20Man%3A%20The%20Life%20of%20R.%20Budd%20Dwyer | Honest Man: The Life of R. Budd Dwyer is a 2010 American documentary film by James Dirschberger that chronicles the Computer Technology Associates (CTA) scandal which led to the public suicide of R. Budd Dwyer, the Treasurer of the Commonwealth of Pennsylvania, in 1987.
The documentary features new interviews with Dwyer's family, friends, and colleagues. These interviews include Dwyer's widow Joanne (her last before her death in 2009) and William T. Smith.
The film premiered on October 9, 2010 at the Carmel Art & Film Festival in Carmel, California, where it received positive reviews. In November 2010, the film premiered in Harrisburg, Pennsylvania, the location of Dwyer's death, where it ran for one week at the Midtown Cinema. The director and the Dwyer family attended the screening and participated in a Q&A with the audience. In addition to further screenings around the country, the film was released on DVD on December 7, 2010. That same month it was broadcast on the Pennsylvania Cable Network. The film premiered on Amazon Video in December 2017.
Cast
References
External links
2010 films
American documentary films
R. Budd Dwyer
Documentary films about American politicians
Documentary films about crime in the United States
Documentary films about suicide
2010s English-language films
2010s American films |
https://en.wikipedia.org/wiki/Wilocity | Wilocity was a fabless semiconductor company based in California founded in 2007 developing 60 GHz multi-gigabit wireless chipsets for both the mobile computing platform and peripheral markets. Wilocity was founded in March 2007 by executives and engineers from Intel's Wi-Fi Centrino group. While Wilocity is based in California, most of its employees are in Israel. Based on the WiGig specification, Wilocity's Wireless PCI Express () technology enables multi-gigabit wireless for applications including I/O, networking and video.
The company is involved in 60 GHz multi-gigabit wireless industry organizations. Wilocity was a founding member of the Wireless Gigabit Alliance (WiGig) and serves on its board of directors and chairs the Marketing Work Group. Wilocity initiated the creation of the IEEE 802.11 ad Task Group, which enhances the 802.11n wireless LAN standard to multi-gigabit-per-second speeds in the 60 GHz band. In addition, Wilocity led the creation of the Wi-Fi Alliance 60 GHz Gigabit Wireless Marketing Task Group and serves as its chair.
On July 14, 2010 Wilocity and Atheros, a developer of semiconductors for network communications, announced a technology partnership to build a "tri-band wireless solution." Tri-band devices will leverage the 2.4, 5 and 60 GHz bands, delivering multi-gigabit data transfer speeds while maintaining compatibility with legacy Wi-Fi products.
On May 12, 2014, ZDNet reported that Qualcomm was on the brink of acquiring Wilocity. According to financial website TheMarker, Qualcomm's potential acquisition could cost the company up to $400 million.
On 3 July 2014 the successful purchase was announced, Wilocity now being part of Qualcomm Atheros. The triple-band-WLAN-chip Snapdragon 810 was also announced. Wilocity's founders Tal Tamir, Yaron Elboim, and Alon Yehezkely went on to found supply chain technology startup company Wiliot in 2017.
See also
Wireless Gigabit Alliance
Wi-Fi Alliance
IEEE 802.11
References
External links
Wilocity Wilocity web site
Qualcomm
Electronics companies established in 2007
Fabless semiconductor companies
Defunct semiconductor companies of the United States
2007 establishments in California
Electronics companies disestablished in 2014
2014 disestablishments in California
Defunct computer companies of the United States |
https://en.wikipedia.org/wiki/Time%20triple%20modular%20redundancy | Time triple modular redundancy, also known as TTMR, is a patented single-event upset mitigation technique that detects and corrects errors in a computer or microprocessor. TTMR allows the use of very long instruction word (VLIW) style microprocessors in space or other applications where external sources, such as radiation, would cause an elevated rate of errors. TTMR permits triple modular redundancy (TMR) protection in a single processor.
Space Micro Inc developed and patented TTMR. It has been implemented in Space Micro's space qualified single-board computers, such as the Proton200k.
External links
TTMR Patent
Error detection and correction |
https://en.wikipedia.org/wiki/Islam%20in%20Aceh | Islam is the dominant religion in Aceh and over 98% from about 4 million population identify as Muslims.
According to data from the 2005 census, religions' percentages in Aceh are 98.87% Islam, 0.87% Protestantism, 0.15% Buddhism, 0.09% Catholicism and 0.02% Hinduism.
Islam in Aceh is Sunni with Shafi'i mazhab in Fiqh.
History
The earliest Islamic kingdom in Southeast Asia is Samudra Pasai that located in northern coast of Aceh. Its earliest tombstones dated from 622 Hijri / 1226 CE. The tombstone belongs to Ibnu Mahmud and Teungku Raja Ahmad.
See also
Islamic criminal law in Aceh
References
Culture of Aceh |
https://en.wikipedia.org/wiki/Bigshot%20%28digital%20camera%29 | Bigshot is a digital camera designed by Shree K. Nayar at Columbia University's Computer Vision Laboratory for experiential learning. The design was conceived in 2006, went into prototype in 2009, had trials in 2011, and was put into production and worldwide distribution in August 2013.
History
According to several interviews with Nayar, the idea of creating a camera for experiential learning stemmed from the 2004 film Born into Brothels, an Academy Award-winning documentary by Ross Kauffman and Zana Briski that profiles several children living in the red light district of Kolkata. The filmmaker gave each child a camera and taught them photography so that they could begin to look at their world with a new set of eyes, unveiling hope and uncovering hidden talents from within themselves. As a result, many of them found the strength to break from their circumstances and begin charting out meaningful lives. Nayar launched the Bigshot project in 2006, and the first set of Bigshot cameras were produced for use in pilot workshops in 2009. In August 2013, EduScience, a Hong Kong-based manufacturer of toys and kits for learning, began distribution worldwide.
Features
A build-it-yourself kit that students can use
A transparent back cover with labels for each major component
A companion website with interactive demos that teach the science and engineering concepts behind each component
A normal lens with a 43° field of view
A panoramic lens with a 72° field of view
A stereo prism to take 3D anaglyph images
A polyoptic lens wheel to allow users to change lenses just by rotating the wheel
A hand crank to power the camera without any batteries
Colors inspired by M&M's candies
Reception
, a consumer-level version of Bigshot had not yet been made available for purchase, and thus had not been reviewed by camera and electronics professional reviewers. However, prototypes of the camera have been used for community outreach workshops in New York City, Bangalore, Vũng Tàu, and Tokyo, with over 200 children as well as their parents and teachers. Feedback from workshop participants has generally been positive, with several students reporting an increased interest in photography and many teachers praising its ability to promote STEM education. Nayar has indicated that the purpose of the workshops was to explore ways that the camera might address the challenges of children in under-served communities with low access to technology.
References
External links
Official website
Shree K. Nayar - Home
Columbia University Computer Vision Laboratory (CAVE)
Bigshot video on YouTube
Bigshot Camera Community on Google+
Digital cameras
Experiential learning |
https://en.wikipedia.org/wiki/List%20of%20Cenotaphs%20in%20Northern%20Ireland | Various cenotaphs have been erected in Northern Ireland: the UK National Inventory of War Memorials provides comprehensive details of each monument in their Online Database (links provided). A private website also maintains very detailed information on a number of these monuments.
Most communities in Northern Ireland can account for losses in the conflicts of the 19th and 20th centuries especially the World Wars. To honour those that died, it was common practice for communities to contribute toward a fund to build a memorial or cenotaph. These cenotaphs are often quite striking and frequently the only decorative or sculptural structures to be seen in smaller settlements. Such cenotaphs are rarely the only memorial erected by a community: stained glass windows, plaques and similar artifacts can be found in churches and other public buildings. Indeed, often buildings themselves, especially British Legion Halls, or gardens were constructed as memorials too.
References
Monuments and memorials in Northern Ireland
Cenotaphs in the United Kingdom |
https://en.wikipedia.org/wiki/Monroe%20%28TV%20series%29 | Monroe is a British medical drama television series created and written by Peter Bowker and produced by Mammoth Screen for the ITV network. The series follows a neurosurgeon named Gabriel Monroe, played by James Nesbitt. The six-part series was commissioned by ITV as one of a number of replacements for its long-running police drama series The Bill, which was cancelled in 2010. Filming on Monroe began in Leeds in September 2010, with production based in the old Leeds Girls' High School in Headingley. The first episode was broadcast on ITV on 10 March 2011 to strong ratings. A second series followed in 2012. On 14 November 2012, it was announced that ITV had cancelled Monroe due to low viewing figures.
Development
Screenwriter Peter Bowker announced to the trade magazine Broadcast in July 2009 that he was developing a "big medical drama" for ITV. Bowker had worked on medical dramas early in his career, including Casualty and Medics. ITV's director of drama Laura Mackie told The Stage that the series would be "grown-up" and would be based around a single character, like ITV's Doc Martin. Mackie believed that other broadcasters were reluctant to create series with one lead character—instead making ensemble shows like Casualty and Holby City—so Bowker's series would not overlap with anything already being screened.
Bowker told the Media Guardian that he had been inspired to create a series about a neurologist after his four-year-old daughter was diagnosed with a benign brain tumour. He wanted the drama of Monroe to be similar to the American medical series House; "It may be foolish to compare the two but with neurologists, as with House, there is this very intense 10 days when you work with them on a case and then you say goodbye – it is really quite fascinating and will hopefully make great drama." Independent production company Mammoth Screen developed the series with Bowker, having previously worked with him on his Wuthering Heights adaptation. The drama entered the pre-production stage in March 2010, when Laura Mackie and ITV's director of television Peter Fincham commissioned it for the network. Formal greenlighting was expected to happen in the first week of April 2010.
Film director Paul McGuigan signed on as lead director of Monroe. McGuigan researched the nature of the series by meeting with neurosurgeons and watching a brain operation being performed. Steve Lawes, with whom McGuigan worked on his other television series, Sherlock, was originally announced as the director of photography. McGuigan directed the first three episodes of the series, and David Moore directed the last three. The cast and crew met for a script read-through the week before filming began and the principal cast attended a "boot camp" at Leeds General Infirmary.
Production
Filming on the series commenced on 26 September 2010. The principal setting of St Matthews Hospital has been created within the former Leeds Girls' High School. Eight weeks were spent converting |
https://en.wikipedia.org/wiki/Soesterberg%20Principles | The Soesterberg Principles was adopted by the Trans-Atlantic Network for Clean Production on May 16, 1999. It was a commitment that for new technical innovation in the industry, that innovation should also include improvements in the environment, health, and social issues that follow. It is an electronic sustainability commitment that technical improvements should correspond to environmental and health improvements. The Electronic Sustainability Commitment of the principles reads:
Each new generation of technical improvements in electronic products should include parallel and proportional improvements in environmental, health and safety as well as social attributes
References
Electronics and the environment |
https://en.wikipedia.org/wiki/SpoonWEP/WPA | SpoonWEP/WPA is a GUI that uses Aircrack-ng to autonomously crack WEP and WPA keys. The tool has been included with so-called "network-scrounging cards", which are Chinese USB Wi-Fi adapters that promise Internet access "for free".
See also
BackBox
BackTrack
Kali linux
Metasploit Project
Nmap
BackBox
OpenVAS
Kismet (software)
Aircrack-ng
References
Wireless networking
Cryptanalytic software |
https://en.wikipedia.org/wiki/Ketan%20Mulmuley | Ketan Mulmuley is a professor in the Department of Computer Science at the University of Chicago, and a sometime visiting professor at IIT Bombay. He specializes in theoretical computer science, especially computational complexity theory, and in recent years has been working on "geometric complexity theory", an approach to the P versus NP problem through the techniques of algebraic geometry, with Milind Sohoni of IIT Bombay. He is also known for his result with Umesh Vazirani and Vijay Vazirani that showed that "Matching is as easy as matrix inversion", in a paper that introduced the isolation lemma.
He earned his PhD in computer science from Carnegie Mellon University in 1985 under Dana Scott, winning the 1986 ACM Doctoral Dissertation Award for his thesis Full Abstraction and Semantic Equivalence. He also won a Miller fellowship at the University of California, Berkeley for 1985–1987, and a Guggenheim Foundation Fellowship for the year 1999–2000.
Books
References
External links
Faculty page
List of recent publications
Living people
Theoretical computer scientists
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/Nickelodeon%20%28Croatian%20TV%20channel%29 | Nickelodeon is a Croatian cable and digital satellite television network dedicated to children. It was launched in December 2011. The channel broadcasts 24 hours a day. All animated dubbed into Croatian and live-action shows are subtitled into Croatian. Dubs are made by NET studio. The channel is served by the Pan-European feed.
Dubs
The channel is completely Animated series and films dubbed into Croatian. The dubs are made by NET studio.
Subs
The channel completely Live-Action series and films subtitled into Croatian.
Programming Blocks
Weekend Awesomeness
This programming block starts every Sunday at 5:00PM sati and airs special episodes and nickelodeon movies.
Saturday Marathons
This programming block starts every Saturday at 12:00PM and airs a marathon of a specific show until 3:00PM
Nick Jr
Nick Jr. is a programming block on Nickelodeon that airs pre school content.
Notes
References
External links
Official website
Croatia
Television channels and stations established in 2011
2011 establishments in Croatia
Television channels in Croatia
Croatian-language television stations |
https://en.wikipedia.org/wiki/Hostage%20Crisis%20%28Star%20Wars%3A%20The%20Clone%20Wars%29 | "Hostage Crisis" is the twenty-second episode and first season finale of Star Wars: The Clone Wars. It first aired on March 20, 2009 on Cartoon Network.
Plot
Cad Bane and his crew of bounty hunters and droid enforcers arrive at the Senate landing zone, where they meet a host of Senate Commandos, who are not happy with their unauthorized arrival. Aurra Sing snipes three of them from long-range and the rest of the bounty hunters overwhelm the rest of the squad. One of the commando droids fools security, via imitating the voice of the squad's leader, into thinking that the guards had taken down a group of protesters before taking their uniforms.
A few levels above, in Senator Padmé Amidala's office, Anakin Skywalker offers to take her to somewhere in the galaxy for a few weeks where no one will recognize them, but Padmé is too focused on her work. He gives her his lightsaber to show his devotion. However, he has to hide, as C-3PO and Bail Organa are about to enter. Organa informs Padmé that they must meet in the lobby to discuss the Enhanced Privacy Invasion Bill. Suddenly, once everyone is gathered, the bounty hunters surround and take them hostage. Senator Philo attempts to leave only to be shot by Bane. He then communicates with Chancellor Palpatine, demanding Ziro the Hutt's release from captivity, but refuses to do so. Unfortunately, Bane proves his point by locking down the entire building, severing all communication with the outside. He takes everyone's comlinks, but before he can search Padmé, who is holding Anakin's lightsaber in her sleeve, Bane notices Anakin in the upper levels and orders an IG-86 sentinel droid and Shahan Alama to get him.
Anakin eludes his pursuers and hot-wires a terminal to communicate with Palpatine, who advises him to get to the central power core to contact for help. Anakin manages to disconnect and hides before the bounty hunters find him, and then uses a mind trick to convince Alama to check the other two floors. As the hunters split up, Anakin follows the IG-86 sentinel droid and bashes it into submission. Alama comes back down to check and finds the droid's mangled remains. Noticing no lightsaber slashes, he quickly figures out that Anakin isn't armed and reports this to Bane, who sends Sing to assist him.
Anakin locates the power core, but a panicked Robonino shuts the door behind him. Alama and Sing then attack Anakin, and Robonino shocks him into unconsciousness.
Bane then gives Palpatine instructions to give a pardon chip to Orn Free Taa to be transported to the prison where Ziro is being held. 3D then comes in to take the Senator. They arrive at the prison and ship Ziro away.
An unconscious Anakin is dragged into the lobby, where the bounty hunters start to plant bombs that can go off if their laser detectors are triggered. This enables the hunters to leave the Senate unhindered, despite an attempt by Orn Free Taa to have them arrested. Anakin wakes up and Padmé gives him back his lightsaber. He the |
https://en.wikipedia.org/wiki/Digital%20researcher | A Digital researcher is a person who uses digital technology such as computers or smartphones and the Internet to do research (see also Internet research). Digital research differs from Internet research in that digital researchers use the Internet as a research tool rather than the Internet itself as the subject of study. A digital researcher seeks knowledge as part of a systematic investigation with the specific intent of publishing research findings in an online open access journal or by other social media information exchange formats.
Although digital research can be both quantitative and qualitative, it does not necessarily follow strict Internet research ethics using the formal scientific method, as it involves collaboration using social media with public input for research and knowledge mobilization. There are a number of objections to this stance, which are all relevant to Wikipedia research and research ethics, for example the blurring of public and private spaces on the internet.
Digital research may also be formally published in academia through peer-reviewed journals or through the further use of social media. Digital researchers are involved with basic research or applied research using data analysis software which includes, but is not limited to, SPSS or JMP.
The term Digital Research was originally used to describe a now defunct company created by Dr. Gary Kildall to market and develop his CP/M operating system and related products. It was the first large software company in the microcomputer world.
The term Digital Researcher was also used by UK researcher development organization Vitae to form an event for postgraduate researchers and research staff focusing on the use of technology by researchers for collaboration, information gathering, and dissemination. The event encouraged researchers to become digital researchers.
References
Ferguson, Rebecca (2010). Internet research ethics. Slideshare presentation (12 slides). "Which ethics apply to Internet research? If the Internet is conceptualised as space, then social science research ethics apply. However, if it is conceptualised as text/art, then the ethics of the humanities are more relevant."
Berry, David M. (2004). Internet Research: Privacy, Ethics and Alienation - An Open Source Approach. The Journal of Internet Research, 14(4) PDF, 105 KB. Emphasis on Internet research ethics within the larger context of "open-source ethics".
Gunther Eysenbach and James Till. Ethical issues in qualitative research on Internet communities. BMJ 2001(10 November); 323(7321): 1103–1105. Emphasis on a perspective from the biomedical and health sciences.
Charles Ess and the ethics working committee of the Association of Internet Researchers. Provides access to the Ethics Working Committee document on Internet research ethics that was approved by voting members of the AoIR on November 27, 2002, Recommendations from the aoir ethics working committee1, 330 KB.
Internet Research Ethics: Intr |
https://en.wikipedia.org/wiki/%28%20%29%20%28disambiguation%29 | "( )" or two parentheses (40 and 41 in ASCII) may refer to:
Function prototype, no arguments or unknown arguments, in some programming languages
The empty list or tuple in some programming languages
The unit type in the Haskell programming language
( ) (album), a 2002 album by Sigur Rós
( ) (film), a 2003 short film directed by Morgan Fisher
A hug, in emoticon
The stage name of Kim Carlsson, a member of the Swedish black metal band Lifelover
See also
Parenthesis (disambiguation) |
https://en.wikipedia.org/wiki/Saint-Cloud%20station | Saint-Cloud is a station in the commune of Saint-Cloud (department of Hauts-de-Seine). It is in the Île-de-France region of France and is part of the Transilien rail network.
The station
The station is on line L and U trains of the Transilien Paris–Saint Lazare network. It is at the junction of the Saint-Nom-la-Bretèche and Versailles–Rive Droite branches. Up until 1930, there was a branch about 160 m long providing service to the Château de Saint-Cloud.
References
External links
Railway stations in Hauts-de-Seine
Railway stations in France opened in 1839 |
https://en.wikipedia.org/wiki/Isolation%20lemma | In theoretical computer science, the term isolation lemma (or isolating lemma) refers to randomized algorithms that reduce the number of solutions to a problem to one, should a solution exist.
This is achieved by constructing random constraints such that, with non-negligible probability, exactly one solution satisfies these additional constraints if the solution space is not empty.
Isolation lemmas have important applications in computer science, such as the Valiant–Vazirani theorem and Toda's theorem in computational complexity theory.
The first isolation lemma was introduced by , albeit not under that name.
Their isolation lemma chooses a random number of random hyperplanes, and has the property that, with non-negligible probability, the intersection of any fixed non-empty solution space with the chosen hyperplanes contains exactly one element. This suffices to show the Valiant–Vazirani theorem:
there exists a randomized polynomial-time reduction from the satisfiability problem for Boolean formulas to the problem of detecting whether a Boolean formula has a unique solution.
introduced an isolation lemma of a slightly different kind:
Here every coordinate of the solution space gets assigned a random weight in a certain range of integers, and the property is that, with non-negligible probability, there is exactly one element in the solution space that has minimum weight. This can be used to obtain a randomized parallel algorithm for the maximum matching problem.
Stronger isolation lemmas have been introduced in the literature to fit different needs in various settings.
For example, the isolation lemma of has similar guarantees as that of Mulmuley et al., but it uses fewer random bits.
In the context of the exponential time hypothesis, prove an isolation lemma for k-CNF formulas.
Noam Ta-Shma gives an isolation lemma with slightly stronger parameters, and gives non-trivial results even when the size of the weight domain is smaller than the number of variables.
The isolation lemma of Mulmuley, Vazirani, and Vazirani
Lemma. Let and be positive integers, and let be an arbitrary nonempty family of subsets of the universe . Suppose each element in the universe receives an integer weight , each of which is chosen independently and uniformly at random from . The weight of a set S in is defined as
Then, with probability at least , there is a unique set in that has the minimum weight among all sets of .
It is remarkable that the lemma assumes nothing about the nature of the family : for instance may include all nonempty subsets. Since the weight of each set in is between and on average there will be sets of each possible weight.
Still, with high probability, there is a unique set that has minimum weight.
Mulmuley, Vazirani, and Vazirani's proof
Suppose we have fixed the weights of all elements except an element x. Then x has a threshold weight α, such that if the weight w(x) of x is greater than α, then it is not contained in any mini |
https://en.wikipedia.org/wiki/Red%20Studio | Red Studio may refer to:
The Red Studio or L'Atelier Rouge, a painting by Henri Matisse from 1911
Red 5 Studios, a computer game
RED STUDIO, a game project of CD Projekt
Red Studios Hollywood, a motion picture studio |
https://en.wikipedia.org/wiki/Selectable%20Output%20Control | Selectable Output Control (SOC) is a content protection Digital Rights Management (DRM) technology that is incorporated into approved devices that enables the Multichannel Video Programming Distributor (MVPD, your cable company) to disable non-secure audio-video output by encoding the video with a specific signal. In practice, SOC aims to limit the output of high definition video over non-secure analog outputs such as component video connections. When enabled, SOC will only output high definition content over a High-Definition Multimedia Interface (HDMI) to devices that are High-bandwidth Digital Content Protection (HDCP) approved. This means that when SOC is enabled for a program, older televisions that do not have an HDMI port or are not HDCP compliant will not be able to view content. The U.S. Federal Communications Commission (FCC) has, until recently, had a ban on the use of SOC.
On May 7, 2010 the FCC granted a limited waiver of Section 76.1903 to allow the use of SOC. This waiver was filed by the Motion Picture Association of America (MPAA) to allow the use of SOC to broadcast first run movies shortly after theatrical release, but prior to home video release. The MPAA argued that member companies (the studios) would not agree to releasing these movies to the On-Demand market without the ability to enforce copy protection, which analog outputs such as component video connections lack. The concern being that unprotected analog output is open to piracy. The FCC agreed that it would be in the public interest to allow the use of SOC since it would allow more Americans who may have difficulty getting to the movies the opportunity to enjoy first run movies in the home. The FCC cites an example using homebound parents with young children that may have a hard time getting to the movies due to not being able to find a babysitter. The American Association of People with Disabilities is also in favor of the MPAA's plan to offer high-definition first run movies before home video release because it would increase the entertainment options that disabled Americans have in the home.
The waiver granted by the FCC is limited in that it does not enable all of the actions requested by the MPAA in its waiver application, citing the request as being broad and undefined. According to the FCC waiver on SOC, the following limitations would be placed on the granted waiver.
There would be an SOC Activation Window Limitation. SOC can only be used for 90 days from the first day it is implemented, or until the movie is available on any pre-recorded media (DVD, Blu-ray Disc), whichever comes first. That way, according to the FCC, owners of legacy HDTVs (those without HDMI connections or HDCP certification) will not lose access to any content that they previously had access to. The FCC's 90-day limitation window is an effort to limit the potential of the MPAA to circumvent the rule by not releasing content on pre-recorded media. For example, as the world moves toward v |
https://en.wikipedia.org/wiki/Splinternet | The splinternet (also referred to as cyber-balkanization or internet balkanization) is a characterization of the Internet as splintering and dividing due to various factors, such as technology, commerce, politics, nationalism, religion, and divergent national interests. "Powerful forces are threatening to balkanise it", wrote the Economist weekly in 2010, arguing it could soon splinter along geographic and commercial boundaries. The Chinese government erected the "Great Firewall" for political reasons, and Russia, has enacted the Sovereign Internet Law that allows it to partition itself from the rest of the Internet, while other nations, such as the US and Australia, discussed plans to create a similar firewall to block child pornography or weapon-making instructions.
Clyde Wayne Crews, a researcher at the Cato Institute, first used the term in 2001 to describe his concept of "parallel Internets that would be run as distinct, private, and autonomous universes." Crews used the term in a positive sense, but more recent writers, like Scott Malcomson, a fellow in New America's International Security program, use the term pejoratively to describe a growing threat to the internet's status as a globe-spanning network of networks.
Technology
Describing the splintering of Internet technology, some writers see the problem in terms of new devices using different standards. Users no longer require web browsers to access the Web, as new hardware tools often come with their own "unique set of standards" for displaying information.
Journalist and author Doc Searls uses the term "splinternet" to describe the "growing distance between the ideals of the Internet and the realities of dysfunctional nationalisms...", which contribute to the various, and sometimes incompatible standards which often make it hard for search engines to use the data. He notes that "it all works because the Web is standardized. Google works because the Web is standardized". However, as new devices incorporate their own ad networks, formats, and technology, many are able to "hide content" from search engines".
Others, including information manager Stephen Lewis, describe the causes primarily in terms of the technology "infrastructure", leading to a "conundrum" whereby the Internet could eventually be carved up into numerous geopolitical entities and borders, much as the physical world is today.
Commercial lock-in
The Atlantic magazine speculates that many of the new "gadgets have a 'hidden agenda' to hold you in their ecosystem". Writer Derek Thomson explains that "in the Splinternet age, ads are more tightly controlled by platform. My old BlackBerry defaulted to Bing search because (network operator) Verizon has a deal with Microsoft. But my new phone that runs Google Android software serves Google ads under apps for programs like Pandora". They rationalize the new standards as possibly a result of companies wishing to increase their revenue through targeted advertising to their own p |
https://en.wikipedia.org/wiki/S%C3%A8vres%E2%80%93Ville-d%27Avray%20station | Sèvres–Ville-d'Avray is a railway station in the commune of Sèvres (department of Hauts-de-Seine). It is in the Île-de-France region of France and is part of the Transilien rail network.
The station
The station is on line L trains of the Transilien Paris-Saint-Lazare network, as well as line U providing service between La Défense and La Verrière. There is a train in each direction every 15 minutes during the day, and every 30 minutes in the evening.
External links
Railway stations in Hauts-de-Seine
Railway stations in France opened in 1839 |
https://en.wikipedia.org/wiki/It%27s%20So%20Funny | It's So Funny () is a type of North Korean comedy television show. These types of shows have been on the air since the 1970s, the start of state programming in North Korea, making them some of the world's longest-running television comedies as well as a staple of North Korean television.
The show usually consists of a man and a woman in military uniform having a conversation. The two protagonists sometimes sing, dance and try slapstick, involving activities which exceed the boundaries of common sense. The show is intended to improve troop morale. Its themes are often repetitive and its humor obscure, but its propaganda content in favor of the North Korean leadership is blunt.
See also
List of North Korean television series
Notes
References
External links
A skit from the show
North Korean television shows
Television sketch shows
Propaganda television broadcasts
1970s North Korean television series
1980s North Korean television series
1990s North Korean television series
2000s North Korean television series
2010s North Korean television series |
https://en.wikipedia.org/wiki/Rastrigin%20function | In mathematical optimization, the Rastrigin function is a non-convex function used as a performance test problem for optimization algorithms. It is a typical example of non-linear multimodal function. It was first proposed in 1974 by Rastrigin as a 2-dimensional function and has been generalized by Rudolph. The generalized version was popularized by Hoffmeister & Bäck and Mühlenbein et al. Finding the minimum of this function is a fairly difficult problem due to its large search space and its large number of local minima.
On an -dimensional domain it is defined by:
where and . There are many extrema:
The global minimum is at where .
The maximum function value for is located around :
Here are all the values at 0.5 interval listed for the 2D Rastrigin function with :
The abundance of local minima underlines the necessity of a global optimization algorithm when needing to find the global minimum. Local optimization algorithms are likely to get stuck in a local minimum.
See also
Test functions for optimization
Notes
Mathematical optimization |
https://en.wikipedia.org/wiki/Common%20Programming%20Interface%20for%20Communications | Common Programming Interface for Communications (CPI-C) is an application programming interface (API) developed by IBM in 1987 to provide a platform-independent communications interface for the IBM Systems Application Architecture-based network, and to standardise programming access to SNA LU 6.2.
CPI-C was part of IBM Systems Application Architecture (SAA), an attempt to standardise APIs across all IBM platforms.
It was adopted in 1992 by X/Open as an open systems standard, identified as standard C210, and documented in X/Open Developers Specification: CPI-C.
See also
IBM Advanced Program-to-Program Communication
References
External links
Distributed Transaction Processing: The XCPI-C Specification Version 2
CPIC Reference Manual
CPI-C for MVS
Chapter 21. Using CPIC-C for Java, IBM SecureWay Communications Server
Programming with the CPI-C API, John Lyons, 31 May 1997
IBM software
Systems Network Architecture
Network software |
https://en.wikipedia.org/wiki/Louis%20Hodes | Louis Hodes (June 19, 1934 – June 30, 2008) was an American mathematician, computer scientist, and cancer researcher.
Early life and computer science work
Louis Hodes got his Bachelor of Science (B.S.) from the Polytechnic Institute of Brooklyn. He got his Doctor of Philosophy (Ph.D.) from the Massachusetts Institute of Technology (MIT) in 1962, under Hartley Rogers with a thesis on computability. With John McCarthy, in the late 1950s and early 1960s, he helped produce the earliest implementations of the programming language Lisp,
and under Marvin Minsky he did early research on visual pattern recognition in Lisp. He is also credited by some with the idea, and an initial implementation, of logic programming.
Cancer research
In 1966 he moved into cancer-related research, specifically at National Institutes of Health and later the National Cancer Institute where he turned his interest in visual pattern recognition to medical imaging applications. He also worked on efficient algorithms for screening chemical compounds for studying chemical carcinogenesis. His work on models of clustering for chemical compounds was pronounced a "milestone" by the Developmental Therapeutics Program of the National Cancer Institute, for "revolutioniz[ing] the selection of compounds of interest by measuring the novelty of a chemical structure by comparing it to known compounds."
References
1934 births
2008 deaths
American computer scientists
Artificial intelligence researchers
Massachusetts Institute of Technology alumni
Lisp (programming language) people
Scientists from New York City
Programming language designers
Cancer researchers |
https://en.wikipedia.org/wiki/David%20Park%20%28computer%20scientist%29 | David Michael Ritchie Park (1935 – 29 September 1990) was a British computer scientist. He worked on the first implementation of the programming language Lisp.
He became an authority on the topics of fairness, program schemas and bisimulation in concurrent computing. At the University of Warwick, he was one of the earliest members of the computer science department, and served as chairperson.
Notes
External links
1935 births
1990 deaths
British computer scientists
Massachusetts Institute of Technology alumni |
https://en.wikipedia.org/wiki/Indiana%20Humanities | Indiana Humanities is a nonprofit organization based in Indianapolis that funds and produces public humanities programming throughout the state of Indiana. It is one of 56 humanities councils in the United States and is affiliated with the National Endowment for the Humanities.
History
The first iteration of Indiana Humanities was established in 1972 when the National Endowment for the Humanities encouraged the formation of the Indiana Committee for the Humanities, a statewide grantmaking organization made up of five Hoosiers. Since its inception Indiana Humanities has been a part of many special projects around the state, including leading a task force in 1991 that resulted in the establishment of the International School of Indiana.
Indiana Humanities has been headquartered in the historic Georgian Revival home of Indiana author Meredith Nicholson since 1986.
Current Activities
Grants
Humanities Initiative Grant: provides nonprofit organizations in Indiana with funds to support humanities programs for public audiences.
Historic Preservation Education Grant: given in partnership with Indiana Landmarks to fund educational projects related to historic properties in Indiana.
Programs
Next Indiana Campfires: a series of statewide programming that blends nature walks, literature and discussion with the help of local humanities scholars and naturalists. This program won the Schwartz Prize for best humanities program in 2017.
Novel Conversations: a free statewide lending library that loans more than 600 titles to reading groups across Indiana.
Historic Bar Crawl: an annual bar crawl presented in partnership with Indiana Historical Society in its sixth year that reenacts notable scenes in Indianapolis history at surprising locations. Past themes have included the 1970s and the Cold War.
INconversation: a speaker program that brings thought leaders from around the country to Indiana for small group discussions.
Indiana Authors Awards: a biannual book award celebrating Indiana literature. First established in 2009, The Eugene and Marilyn Glick Indiana Authors Awards are given to the best books by Indiana authors written in eight different categories and published during the previous two years.
Thematic initiatives
In 2017–2018, Indiana Humanities deployed a series of programming exploring the relationship between STEM disciplines and the humanities called Quantum Leap. This initiative included a slate of statewide programming around the classic novel Frankenstein, for which Indiana Humanities was given a $300,000 grant from the National Endowment for the Humanities.
Past thematic initiatives include Food for Thought, Spirit of Competition and Next Indiana.
References
Footnotes
Sources
Bennett, Taylor. "Indiana to Mark Frankenstein's 200th Birthday." WFYI Indianapolis. Web. 2 January 2018.Indiana to celebrate Frankenstein's 200th birthday
"Indiana Nonprofit Wins National Award For Campfires Program." WFYI Indianapolis. Web. 21 Novem |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.