source
stringlengths
32
199
text
stringlengths
26
3k
https://en.wikipedia.org/wiki/ATN%20DD%20Sports
ATN DD Sports is a Canadian discretionary English language digital cable specialty channel owned by Asian Television Network (ATN). It airs live and tape-delayed Cricket matches as well as other Asian sports such as Kabaddi, Kho-kho, Field hockey, Archery and Badminton. Programming is derived from DD Sports, India's only free-to-air national Sports channel. History In June 2009, Asian Television Network was granted approval from the Canadian Radio-television and Telecommunications Commission (CRTC) to launch a television channel called ATN Cricket Channel Two, described as "a national, English-language ethnic Category 2 specialty programming service devoted to cricket matches from around the world and Canada as well as other sports from India." The channel was launched on October 28, 2010 as ATN NEO Sports under a licensing agreement from the parent company of the Indian channel NEO Cricket. It sourced much of its programming from the India-based channel. ATN NEO Cricket was renamed ATN Cricket in March 2012. Shortly thereafter, in June 2012, the channel was renamed again, this time as ATN Sports. The Indian channel renamed NEO Prime on June 3, 2012. In May 2013, ATN announced a partnership with Doordarshan, India's public broadcaster. Along with the launch of several Doordarshan channels, ATN also acquired the rights to content from DD Sports for ATN Sports. As of 2015, the channel goes by the name ATN DD Sports. Logos See also ATN Cricket Plus References External links Sports television networks in Canada Television channels and stations established in 2010 English-language television stations in Canada South Asian television in Canada 2010 establishments in Ontario
https://en.wikipedia.org/wiki/Paul%20K.%20Wright
Paul Kenneth Wright is a mechanical engineer best known for his work on the UC Berkeley-based CyberCut/CyberBuild project, which established a set of standards that streamlined the conversion of creative manufacturing designs into rapid prototyping. Wright's NYU research group (led by Israel Greenfeld, Fred Hansen, and Louie Pavlakos) is also known for developing the first open-architecture control-of-manufacturing systems, and for developing Internet-based CAD/CAM systems. CITRIS and other positions Wright was the director of the Center for Information Technology in the Interest of Society (CITRIS), a four-campus University of California research institute that applies information technology to large-scale societal problems. Wright also holds the A. Martin Berlin Chair in the University of California at Berkeley's Mechanical Engineering Department. He is co-director of the Berkeley Manufacturing Institute (BMI) and co-director of the Berkeley Wireless Research Center (BWRC). From 1995 to 2005 Wright was the co-chair of the Management of Technology Program, a multi-disciplinary program at UC Berkeley dedicated to bringing high-tech products to the marketplace. Education He born in London, in 1947, Wright earned his B.Sc. and Ph.D. from the University of Birmingham, England. He came to the United States in 1979 following appointments at the University of Auckland, in New Zealand, and Cambridge University, in England. Publications and awards Wright is author or co-author of more than 200 journal and conference articles and is co-author, with David A. Bourne, of the book Manufacturing Intelligence. Wright also co-authored the book Metal Cutting with E. M. Trent. His book 21st Century Manufacturing won the Society of Manufacturing Engineers Eugene M. Merchant Book of the Year Award in 2001. Memberships Wright became a member of the National Academy of Engineering in 2007, a Fellow of the American Society of Mechanical Engineers in 2003; and a Fellow of the Society of Manufacturing Engineers in 1998. Current research His current research focuses on energy scavenging and storage for micro-scale motes, smart materials, design and manufacturing for micro-integration of 'intelligent objects," and the applications of wireless sensor systems. For example, beginning in 2002, following California's electricity crisis, CITRIS and Lawrence Berkeley National Laboratory researchers worked on Demand Response (DR) with the California Energy Commission [through its Public Interest Energy Research (PIER) program and the California Institute for Energy and the Environment (CIEE)] to create a multi-disciplinary team of architects, engineers, and user-interface specialists. Working with colleagues David Auslander and Dick White, Wright was part of the group that created a reference design for open system programmable communicating thermostats (PCTs). Combined with related work on smart sensors, and grid-level IT techniques, Demand Response (DR) can reduce peak-l
https://en.wikipedia.org/wiki/Vladimir%20Lifschitz
Vladimir Lifschitz (born 30 May 1947) is the Gottesman Family Centennial Professor in Computer Sciences at the University of Texas at Austin. He received a degree in mathematics from the Steklov Institute of Mathematics in Russia in 1971 and emigrated to the United States in 1976. Lifschitz's research interests are in the areas of computational logic and knowledge representation. He is a Fellow of the Association for the Advancement of Artificial Intelligence, the Editor-in-Chief of the ACM Transactions on Computational Logic, and an Editorial Advisor of the journal Theory and Practice of Logic Programming. He, together with Michael Gelfond, defined stable model semantics for logic programs, which later became the theoretical foundation for Answer Set Programming, a new declarative programming paradigm. References External links Vladimir Lifschitz's homepage at University of Texas at Austin Vladimir Lifschitz's publications on DBLP Living people American computer scientists University of Texas at Austin faculty Logic programming researchers Fellows of the Association for the Advancement of Artificial Intelligence 1947 births
https://en.wikipedia.org/wiki/Thinking%20machine
Thinking machine or thinking machines may refer to: Thinking Machines Corporation, defunct supercomputer manufacturer, in business from 1982 to 1994 Thinking machines (Dune), fictional intelligent robots from the Dune universe created by Frank Herbert in 1965 Professor Augustus S. F. X. Van Dusen, fictional detective known as "The Thinking Machine" in two 1900s novels and a series of detective short stories by Jacques Futrelle See also Artificial intelligence
https://en.wikipedia.org/wiki/List%20of%20Pirate%20Islands%20episodes
Pirate Islands is an Australian children's television series conceived for Network Ten by Jonathan M. Shiff and Greg Millin. The series is produced by the Film Finance Corporation Australia, Jonathan M. Shiff Productions, Tele Images International, Network Ten Australia and Film Victoria. Episodes External links Pirate Islands
https://en.wikipedia.org/wiki/Data%20Sharing%20for%20Demographic%20Research
Data Sharing for Demographic Research (DSDR) advances research on maternal and child health and the life course by making data discoverable and accessible for secondary analysis. DSDR is a research data and information repository that adheres to the FAIR (Findable, Accessible, Interoperable, Reusable) principals. DSDR focuses on data with external validity that can be generalized to populations. The Population Dynamics Branch (PDB) of the Eunice Kennedy Shriver National Institute of Child Health and Human Development (NICHD) funds DSDR. DSDR is located within the ICPSR, the world's largest social science data archive, and is part of the University of Michigan's Institute for Social Research. DSDR provides a platform through which researchers can discover, access, analyze, and preserve data for population studies. Description DSDR distributes public-use and restricted-use studies including those with national, international, and small-area geographies; longitudinal panel and repeated cross-sectional designs; genomic data; and biomarkers. DSDR staff provide assistance with public-use and restricted-use data access, data and metadata preparation, and long-term, secure preservation of data. From the DSDR website, data users can: Download public-use data ready for use in a variety of statistical packages. Search for studies, variables, and data-related publications. Compare variables across studies. Analyze data, create new variables, and generate custom subsets online without specialized software. View survey instruments and measures used for data collection. Explore a catalog of NICHD-funded projects. Deposit data for preservation and secondary analysis. Access tutorials, videos, and receive technical assistance. References External links Official website Eunice Kennedy Shriver National Institute of Child Health and Human Development (NICHD) National Institutes of Health (NIH) Demography University of Michigan
https://en.wikipedia.org/wiki/Molecular%20Evolutionary%20Genetics%20Analysis
Molecular Evolutionary Genetics Analysis (MEGA) is computer software for conducting statistical analysis of molecular evolution and for constructing phylogenetic trees. It includes many sophisticated methods and tools for phylogenomics and phylomedicine. It is licensed as proprietary freeware. The project for developing this software was initiated by the leadership of Masatoshi Nei in his laboratory at the Pennsylvania State University in collaboration with his graduate student Sudhir Kumar and postdoctoral fellow Koichiro Tamura. Nei wrote a monograph (pp. 130) outlining the scope of the software and presenting new statistical methods that were included in MEGA. The entire set of computer programs was written by Kumar and Tamura. The personal computers then lacked the ability to send the monograph and software electronically, so they were delivered by postal mail. From the start, MEGA was intended to be easy-to-use and include solid statistical methods only. MEGA version 2 (MEGA2), which was coauthored by an additional investigator Ingrid Jakobson, was released in 2001. All the computer programs and the readme files of this version could be sent electronically due to advances in computer technology. Around this time, the leadership of the MEGA project was taken over by Kumar (now at Temple University) and Tamura (now at Tokyo Metropolitan University). The monograph Molecular Evolutionary Genetics Analysis was often used as a textbook for new ways to study molecular evolution. MEGA has been updated and expanded several times and currently all these versions are available from the MEGA website. The latest release, MEGA7, has been optimized for use on 64-bit computing systems. MEGA is in two version. A graphical user interface is available as a native Microsoft Windows program. A command line version, MEGA-Computing Core (MEGA-CC), is available for native cross-platform operation. The method is widely used and cited. With millions of downloads across the releases, MEGA is cited in more than 85,000 papers. The 5th version has been cited over 25,000 times in 4 years. Release history Features Sequence alignment construction Alignment Editor ― Within MEGA, the Alignment Editor is a tool that may be used for editing and building multiple sequence alignments. The Alignment Editor in MEGA includes an integrated tool for both ClustalW and MUSCLE programs. All actions take place in the Analysis Explorer, which can be found in the main menu of MEGA. When a new alignment is being created, the user is presented with three options: create a new alignment, open a saved alignment session, or retrieve sequences from a file (importing sequences from NCBI). Once an option is selected, the user can choose either ClustalW or MUSCLE from the Alignment tab located at the top of the page. Parameters for the selected alignment program can then be specified and a progress bar will appear while the tool is being computer. Aligned sequences will replace unaligned ones
https://en.wikipedia.org/wiki/Uppland%20Runic%20Inscription%20993
Uppland Runic Inscription 993 or U 993 is the Rundata catalog number for a Viking Age memorial runestone located in Brunnby, which is one kilometer west of Gunsta, Uppsala County, Sweden, which was part of the historical province of Uppland. Description This inscription consists of runic text on a serpent that circles and then becomes intertwined in the center of the design under a Christian cross. The stone, which is 1.5 meters in height, is classified as being carved in runestone style Pr4, which is also known as Urnes style. This runestone style is characterized by slim and stylized animals that are interwoven into tight patterns. The animal heads are typically seen in profile with slender almond-shaped eyes and upwardly curled appendages on the noses and the necks. The runic inscription was carved and signed by runemasters named Öpir and Bjorn. Öpir was active in the Uppland region during the late eleventh or early twelfth centuries and signed almost fifty inscriptions, with another fifty attributed to him based on stylistic analysis. Runic inscriptions are often dated based upon comparative linguistic and stylistic analysis, and the inscription on U 181 has been dated as being carved approximately during the period of 1070 to 1100 C.E. The runic text states that the stone was raised by two sons, Jón and Jǫfurfast, as a memorial to their father Vígi, who was the son of a man named Eysteinn. The runic text is missing a possessive pronoun, the word "their" before "father." Öpir is known to have left off pronouns in some of his other inscricriptions, such as U Fv1976;107 at the Uppsala Cathedral, U 961 in Vaksala, and U 984 in Ekeby. Inscription Transliteration of the runes into Latin characters ion * u(k) iufur[-ast litu r]aisa ' stin uk ' bru ' iftiʀ ' uiha ' faþur ' su[n] ' istin[s ybiʀ * rist-] biarn Transcription into Old Norse Ion ok Iofur[f]ast letu ræisa stæin ok bro æftiʀ Viga, faður, sun Øystæins/Æistæins. Øpiʀ rist[i]. Biorn. Translation in English Jón and Jǫfurfast had the stone raised and the bridge (made) in memory of Vígi, (their) father, Eysteinn's son. Œpir carved. Bjǫrn. References Uppland Runic Inscription 0993
https://en.wikipedia.org/wiki/Junior%20MasterChef%20Australia%20%28series%201%29
The first series of Junior MasterChef Australia, the second spin off of the Australian reality television series MasterChef Australia, began on 12 September 2010 and aired on Network Ten. Matt Preston, George Calombaris and Gary Mehigan returned alongside new judge, Anna Gare. The series finale was won by Isabella Bliss a 12-year-old girl from New South Wales. Changes In contrast to prior series, Junior MasterChef Australia is produced by Shine Australia. The series premiered on Sunday, 12 September 2010. It also added Anna Gare as fourth judge during individual challenges. The series began with the Top 50 selected from the 5,500 applicants who auditioned for the show. The Top 50 featured five heats, with ten from the Top 50 who were best at the heat's team participating in each heat. Afterwards, the judges selected four to move forward to the Top 20. Furthermore, the Top 20 competed in two challenges to pick the Top 12. Contrast to other versions, contestants are not eliminated every week; rather, four are eliminated at every stage of the competition. Every eliminated contestant received a range of prizes, including those in the Top 50. Contestants The top 12 contestants were chosen throughout the first week of challenges amongst the Top 50 and the Top 20. The full group of 12 were all revealed on Sunday, 26 September 2010: Notes: – Isabella and Sofia Bliss are fraternal twins. – Jack Lark was 12 years old during his audition for the show, the maximum age for the cooks who auditioned. Afterwards, he turned 13 during their first week in the MasterChef Kitchen. Special guests Callum Hann – Top 20 Cooking Challenge Mark Jensen – MasterClass 1 Poh Ling Yeow – MasterClass 1 Donna Hay – Pressure Test 2 and Elimination Challenge 3 John Lanzafáme – Elimination Challenge 1 Justin North – Team Challenge 2 Matt Moran – Team Challenge 2, MasterClass Réunion, and Elimination Challenge 3 Jude Bolton – Team Challenge 3 Adam Goodes – Team Challenge 3 Luke Mangan – Team Challenge 3 Stephanie Alexander – MasterClass 3 and MasterClass Réunion Peter Gilmore – Mystery Box 3 Peter Kuruvita – Elimination Challenge 2 Kylie Kwong – MasterClass Réunion Guillaume Brahimi – MasterClass Réunion Christine Manfield – MasterClass Réunion and Elimination Challenge 3 Giovanni Pilu – MasterClass Réunion Shannon Bennett – Finale Night Adriano Zumbo – Finale Night Episodes Elimination table Choose a Box Challenge was played as a Mystery Box variant. Sam was awarded one additional point for being most improved. Alex and Emily were awarded one additional point for being most improved. The Top 4 at this point (Sofia, Nick, Isabella and Pierre) were given a free pass to the Final 8. A Tag Team Challenge was played as a Team Challenge variant. Nick was awarded one point after being excused from the challenge as he was not feeling well. Nick and Pierre were awarded one point after being excused from the challenge as they were not feeling well. N
https://en.wikipedia.org/wiki/So%20You%20Think%20You%20Can%20Dance%20%28American%20season%208%29
So You Think You Can Dance is an American television reality program and dance competition airing on the Fox network. The show's eighth season premiered on May 26, 2011. It features the return of Mary Murphy and Nigel Lythgoe as permanent judges and Cat Deeley as host. Also returning is the selection of a Top 20 for the finals, in contrast to season 7's Top 11. This is the final season to feature Results Show episodes. Contemporary dancer Melanie Moore won the season and Sasha Mallory was the runner-up. This is the first season where both the winner and runner-up were female. Judging panel Mary Murphy returned and replaced Mia Michaels as a permanent judge after being absent in season 7 due to contract disputes and to undergo surgery to remove a thyroid tumor. Adam Shankman's permanent judge spot—to which he was unable to return due to conflict with directing the film Rock of Ages—was filled with rotating guest judges Robin Antin, Lil' C, Tyce Diorio, Toni Redpath, and Jason Gilkison. Auditions Open auditions for this season took place in the following five cities: Las Vegas week Judges: Nigel Lythgoe, Mary Murphy, Debbie Allen, Tyce Diorio, Robin Antin, and Adam Shankman, who was replaced by Jason Gilkison on Day 2 due to a conflict with his schedule. The Las Vegas callbacks, which started on April 8, 2011, were held at Planet Hollywood Resort and Casino in Las Vegas, Nevada. Thirty-one dancers made it through to the final stage before the selection of the Top 20. Finals Format changes This season featured a combination of the Top 20 format from seasons 2–6 and the All-Star format from season 7. The finals began with a Top 20. When the show reached Top 10 week, contestants from previous seasons (the All-Stars) partnered current contestants in individual dance genres. Lythgoe has noted that although fans of the show complained about season 7's format and missed "the interconnection between people who had never been in competition before," "putting [contestants] with an All-Star lifted their game immensely," which informed his decision to combine the two formats and try to "have the best of both worlds." This season also marked the first time that the public was able to cast their votes by SMS or online, in addition to calling in, with a limit of 50 votes per viewer. Top 20 Contestants Female contestants Jordan turned 19 on June 15, 2011. Male contestants Robert was 30 at the time of application. His age on the website is 31 years old. Elimination chart Contestants are listed alphabetically by first name, then in reverse chronological order of elimination. The judges elected not to eliminate anyone the first week. As a result, two couples were eliminated the following week. Due to Mitchell Kelly having an elbow injury, he was barred from performing the routine. See below for more information. Performance shows Meet the Top 20 (June 9, 2011) Judges: Nigel Lythgoe, Mary Murphy, Tyce Diorio, Lil' C, Robin Antin Performances: To
https://en.wikipedia.org/wiki/Intercontinental%20Dictionary%20Series
The Intercontinental Dictionary Series (commonly abbreviated as IDS) is a large database of topical vocabulary lists in various world languages. The general editor of the database is Bernard Comrie of the Max Planck Institute for Evolutionary Anthropology, Leipzig. Mary Ritchie Key of the University of California, Irvine is the founding editor. The database has an especially large selection of indigenous South American languages and Northeast Caucasian languages. The Intercontinental Dictionary Series' advanced browsing function allows users to make custom tables which compare languages in side-by-side columns. Below are the languages that are currently included in the Intercontinental Dictionary Series. The languages are grouped by language families, some of which are still hypothetical. It is part of the Cross-Linguistic Linked Data project hosted by the Max Planck Institute for the Science of Human History. Amerindian North America Tlingit Haida Tsimshian Wakashan Nootka Salishan Bella Coola Chehalis Hokan? Karok Seri Zuni Nahuatl (Sierra de Zacapoaxtla, Puebla) Chatino, Zacatepec Northern South America Chocoan Emberá Embera – Colombia Epena – Colombia Chibchan Muisca – Colombia Barí (Tairona) – Colombia / Venezuela Cofán – Colombia / Ecuador Barbacoan Cayapa (Cha'palaachi) – Ecuador Colorado (Tsafiki) – Ecuador Páez – Colombia Yanomaman Yanomami Ninam Yaruro – Venezuela Tucanoan Siona – Ecuador Tuyuca – Colombia / Brazil Jivaroan Aguaruna – Peru / Ecuador Waorani (Huaorani) – Ecuador Amazonia Arawakan Goajiro (Wayuu) – Colombia Wapishana – Guyana / Brazil Yavitero – Venezuela (extinct) Mashco Piro (Yine) – Peru / Brazil Waurá – Brazil Baure – Bolivia Moxos – Bolivia Ignaciano – Bolivia Trinitario – Bolivia Macro-Gê Karajá Gê Kaingáng Canela Tupian Tupinambá – Brazil Guaraní – Paraguay Chiriguano – Bolivia Aché – Paraguay Mundurukú – Brazil Sirionó – Bolivia Wayampi – French Guiana Cariban Carib (De'kwana) Panare – Venezuela Macushi – Brazil / Guyana Wai Wai – Brazil / Guyana Panoan Cashibo – Peru Shipibo-Conibo – Peru Yaminahua – Peru Chácobo – Bolivia Pacahuara – Bolivia Tacanan Ese Ejja (Huarayo) – Peru / Bolivia Tacana – Bolivia Cavineña – Bolivia Araona – Bolivia Catuquina – Acre, Brazil Puinavean (Nadahup/Makú) Hup – Brazil / Colombia Yuwana (Hodï)? – Venezuela Peba-Yaguan Yagua – Brazil Chapacuran Pacaas Novos – Brazil Uru-Chipaya Chipaya – Bolivia Trumai – Brazil Aymara Cayuvava – Bolivia (extinct) Itonama – Bolivia Movima – Bolivia Southern South America Guaicuruan Pilagá – Argentina Toba – Argentina / Paraguay Mocoví – Argentina Matacoan Chorote – Argentina Maká – Paraguay Nivaclé – Paraguay Wichi – Argentina Zamucoan Ayoreo – Paraguay / Bolivia Mascoian Sanapaná – Paraguay Moseten Mosetén (Tsimané) – Bolivia Chon Selknam Tehuelche Qawasqar Puelche (Gününa Küne) – Argentina Pampas Kunza – Chile (extinct) Mapudungun – Chile / Argentina Yagán (Yaghan) Northeast Caucasian Northeast Caucasian Nakh Chechen Avar–Andic Avar Andi B
https://en.wikipedia.org/wiki/Proteostasis
Proteostasis is the dynamic regulation of a balanced, functional proteome. The proteostasis network includes competing and integrated biological pathways within cells that control the biogenesis, folding, trafficking, and degradation of proteins present within and outside the cell. Loss of proteostasis is central to understanding the cause of diseases associated with excessive protein misfolding and degradation leading to loss-of-function phenotypes, as well as aggregation-associated degenerative disorders. Therapeutic restoration of proteostasis may treat or resolve these pathologies. Cellular proteostasis is key to ensuring successful development, healthy aging, resistance to environmental stresses, and to minimize homeostatic perturbations from pathogens such as viruses. Cellular mechanisms for maintaining proteostasis include regulated protein translation, chaperone assisted protein folding, and protein degradation pathways. Adjusting each of these mechanisms based on the need for specific proteins is essential to maintain all cellular functions relying on a correctly folded proteome. Mechanisms of proteostasis The roles of the ribosome in proteostasis One of the first points of regulation for proteostasis is during translation. This regulation is accomplished via the structure of the ribosome, a complex central to translation. Its characteristics shape the way the protein folds, and influence the protein's future interactions. The synthesis of a new peptide chain using the ribosome is very slow; the ribosome can even be stalled when it encounters a rare codon, a codon found at low concentrations in the cell. The slow synthesis rate and any such pauses provide an individual protein domain with the necessary time to become folded before the production of subsequent domains. This facilitates the correct folding of multi-domain proteins. The newly synthesized peptide chain exits the ribosome into the cellular environment through the narrow ribosome exit channel (width: 10Å to 20Å, length 80Å). Characteristics of the exit channel control the formation of secondary and limited tertiary structures in the nascent chain. For example, an alpha helix is a structural property that is commonly induced in this exit channel. At the same time, the exit channel prevents premature folding by impeding large scale interactions within the peptide chain that would require more space. Molecular chaperones and post-translational maintenance in proteostasis In order to maintain protein homeostasis post-translationally, the cell makes use of molecular chaperones sometimes including chaperonins, which aid in the assembly or disassembly of proteins. They recognize exposed segments of hydrophobic amino acids in the nascent peptide chain and then work to promote the proper formation of noncovalent interactions that lead to the desired folded state. Chaperones begin to assist in protein folding as soon as a nascent chain longer than 60 amino acids emerges from
https://en.wikipedia.org/wiki/Identifier-Locator%20Network%20Protocol
The Identifier-Locator Network Protocol (ILNP) is a network protocol that divides the two functions of network addresses, namely the identification of network endpoints, and assisting routing, by separating topological information from node identity. ILNP is backwards-compatible with existing Internet Protocol functions, and is incrementally deployable. ILNP has an architecture with two different instantiations. ILNPv4 is ILNP engineered to work as a set of IPv4 extensions, while ILNPv6 has a set of IPv6 extensions. At least three independent open-source implementations of ILNPv6 exist. University of St Andrews (Scotland) has a prototype in Linux/x86 and FreeBSD/x86, while Tsinghua U. (China) has a prototype in Linux/x86. The University of St Andrews ILNP group is led by Prof. Saleem Bhatti. Other academics involved in continuing research include Ryo Yanagida, Samuel J. Ivey and Gregor Haywood. In February 2011, the IRTF Routing Research Group (RRG) Chairs recommended that the IETF standardise ILNP () as the preferred evolutionary direction for IPv6. RFC specifications – ILNP Architectural Description – ILNP Engineering Considerations – DNS Resource Records for ILNP – ICMPv6 Locator Update Message for ILNPv6 – IPv6 Nonce Destination Option for ILNPv6 – ICMP Locator Update for IPv4 – IPv4 Options for ILNPv4 – Address Resolution Protocol (ARP) for ILNPv4 – Optional Advanced Deployment Scenarios for ILNP See also Host Identity Protocol Locator/Identifier Separation Protocol Mobile IP Proxy Mobile IPv6 References External links Recommendations for a Routing Architecture () IRTF Routing Research Group (RRG) ILNP Project at University of St Andrews (Scotland) Internet architecture Multihoming Internet protocols Internet layer protocols Network layer protocols
https://en.wikipedia.org/wiki/LinuxCNC
LinuxCNC (formerly Enhanced Machine Controller or EMC2) is a free, open-source Linux software system that implements numerical control capability using general purpose computers to control CNC machines. It's mainly intended to run on PC AMD x86-64 systems. Designed by various volunteer developers at linuxcnc.org, it is typically bundled as an ISO file with a modified version of Debian Linux which provides the required real-time kernel. Due to the tight real-time operating system integration, a standard Linux desktop PC without the real-time kernel will only run the package in demo mode. Purpose LinuxCNC is a software system for numerical control of machines such as milling machines, lathes, plasma cutters, routers, cutting machines, robots and hexapods. It can control up to 9 axes or joints of a CNC machine using G-code (RS-274NGC) as input. It has several GUIs suited to specific kinds of usage (touch screen, interactive development). Currently it is almost exclusively used on x86 PC platforms, but has been ported to other architectures. It makes extensive use of a real time-modified kernel, and supports both stepper- and servo-type drives. It does not provide drawing (CAD - Computer Aided Design) or G-code generation from the drawing (CAM - Computer Automated Manufacturing) functions. History The EMC Public Domain software system was originally developed by NIST, as the next step beyond the National Center for Manufacturing Sciences / Air Force sponsored Next Generation Controller Program[NGC 1989] /Specification for an Open Systems Architecture[SOSAS]. It was called the EMC [Enhanced Machine Controller Architecture 1993]. Government sponsored Public Domain software systems for the control of milling machines were among the first projects developed with the digital computer in the 1950s. It was to be a "vendor-neutral" reference implementation of the industry standard language for numerical control of machining operations, RS-274D (G-code). The software included the RS274 interpreter driving the motion trajectory planner, real-time motor/actuator drivers and a user interface. It demonstrated the feasibility of an advanced numerical control system using off the shelf PC hardware running FreeBSD or Linux, interfacing to various hardware motion control systems. Additional development continues using current and additional architectures (e.g. ARM architecture devices). The demonstration project was very successful and created a community of users and volunteer contributors. Around June 2000, NIST relocated the source code to SourceForge under the Public Domain license in order to allow external contributors to make changes. In 2003, the community rewrote some parts of it, reorganized and simplified other parts, then gave it the new name, EMC2. EMC2 is still being actively developed. Licensing is now under the GNU General Public License. The adoption of the new name EMC2 was prompted by several major changes. Primarily, a new layer known as H
https://en.wikipedia.org/wiki/Parthenocissus%20semicordata
Parthenocissus semicordata (Wall) Planch. 1811 (synonym: P. himalayana) is a creeper related to the grapevine family. It is a native plant of the Himalaya. Its name is derived from Latin 'corda' meaning heart. Growth Parthenocissus semicordata can grow in pots or on slopes. It is propagated from seeds or cuttings. Characteristics Parthenocissus semicordata is a vigorous climber. It has trifoliate leaves. Like most of the species of Parthenocissus it uses suction cups to hold itself to walls or trees. It has small fruit which look like grapes and are dark blue, almost black when ripe. References External links Asianflora.com (Parthenocissus-himalayana) (retrieved on 27-09-2010) semicordata
https://en.wikipedia.org/wiki/Ormiston%20Venture%20Academy
Ormiston Venture Academy (formerly Oriel Specialist Mathematics and Computing College) is a secondary school with academy status located in Oriel Avenue, Gorleston in the English county of Norfolk. The school educates children aged 11 to 16. It is housed in a block constructed in 2008 and a second newer building that stands where the original building, constructed in 1954, was located. The present facility includes a new reception area, Learning Resource Centre, and classrooms; it was opened in March 2014 by alumnus Callum Cooke. History Originally named Great Yarmouth Technical High School, it was opened in 1954 to replace the old Technical High School located in Southtown. It has gone through many different names, including Oriel Grammar School, Oriel High School and Oriel Specialist Maths and Computing College. In c 2007, its houses were: Trinity, Magdalen, Girton and Pembroke. Previously, when the Technical High School and the Oriel Grammar School the houses were Blue - Perebourne, Red - Fastolff, Yellow - Grenfell, and Green - Paget. Also Middleton were black and Nelson wearing white. The current principal as of February 2013 is Simon Gilbert-Barnham. A new building was added to the site, by Net Zero Buildings, to accommodate the Humanities department. The school is sponsored by the Ormiston Academies Trust. Gresham's Scholarship The school has a connection with the privately-funded, boarding school Gresham's in Holt, North Norfolk – whereby one student per academic year is offered a fully-funded scholarship to study at Gresham's for two years. There have been 10 scholars so far. References External links Official website Educational institutions established in 1954 Academies in Norfolk Gorleston-on-Sea Secondary schools in Norfolk 1954 establishments in England Ormiston Academies
https://en.wikipedia.org/wiki/List%20of%20film%20festivals%20in%20Italy
This is a list of film festivals in Italy. Italy External links Movie festivals and events worldwide at the Internet Movie Database International Film Festival Database FilmFestivals.com Ominous Events: The Horror Fests and Cons Database Directory of International Film Festivals Film Italy Italy Film it:Lista dei festival cinematografici
https://en.wikipedia.org/wiki/Bakitone%20International
Bakitone International is a non-profit organization based in Athens, Greece that maintains a network of almost 1000 international classical music competitions around the world. Bakitone International represents interests of European Broadcasting Union members at the international level in the field of classical music since 2010. It was founded in 2008 as a promotional agency for musicians in order to assist them in selecting from the database of music competitions and master-classes to achieve their career goals. In 2009 Bakitone International has opened branches in Moscow, Russia, Shanghai, China and Los Angeles, USA. The organization has quickly earned international acclaim amongst young artists, as well as famous musicians, such as Vladimir Ashkenazy, Daniel Pollack and Yuri Bashmet. In 2009 Bakitone was featured on TV Kultura channel and Newsland channel in Russia, dedicated to classical music and arts. In 2010 the organization published a magazine in Russia featuring interviews with Daniel Pollack and Yuri Bashmet. In September 2010, Bakitone International has established a special award for the best performance at The Muse International Piano Competition in Athens, Greece. The Prize was awarded to a 5-year old prodigy violinist Dunja Kalamir from Serbia. References External links Bakitone International OpenSpace Russia World Federation of International Music Competitions Music competitions
https://en.wikipedia.org/wiki/UnityPoint%20Health
UnityPoint Health (known as Iowa Health System until 2013) is a network of hospitals, clinics and home care services in Iowa, Illinois and Wisconsin. The system began in 1993, when Iowa Lutheran Hospital and Iowa Methodist Hospital in Des Moines merged, forming the state's largest provider of hospital and related health services. The organization grew to encompass eight metropolitan areas and changed its name in 2013 to reflect that it was no longer exclusive to Iowa. In 2022, UnityPoint Health spun off Methodist, Proctor and Pekin hospitals in Peoria, IL, to nonprofit Carle Health. Hospitals See also Hospital network References External links UnityPoint Health official website 1993 establishments in Iowa Hospital networks in the United States
https://en.wikipedia.org/wiki/ACC%20Network%20%28syndication%20package%29
ACC Network was a syndicated package of college sports telecasts featuring football and basketball events from the Atlantic Coast Conference, produced by Raycom Sports, the sports syndication unit of Montgomery, Alabama-based Raycom Media (now owned by Gray Television). The package stemmed from a joint venture between Raycom and Jefferson-Pilot Teleproductions, which acquired the rights to ACC basketball in 1982 under the banner Raycom/JP Sports. In 2004, Jefferson-Pilot's ACC football package (which began in 1984) was also moved under Raycom/JP Sports. Jefferson-Pilot was acquired by Lincoln National Corporation in 2006, who would in turn sell its media assets to Raycom in 2006. In 2010, ESPN acquired the rights to ACC basketball and football, but continued to sublicense games to Raycom Sports to continue the syndicated package, which was relaunched under the ACC Network brand. Broadcast games were shown locally on over-the-air broadcast stations, regional sports networks, as well as streaming on ESPN3 and WatchESPN. In July 2016, ESPN announced an extension of its contract and plans to launch an ACC cable channel of the same name in 2019, and took ownership of the ACC rights that were previously sublicensed to Raycom. In anticipation of the new channel, the "ACC Network" branding during its syndicated telecasts was phased out in 2018. Although ESPN will continue to subcontract Raycom Sports resources for the new channel, Raycom's final syndicated ACC telecast—the 2019 ACC men's basketball championship game—aired March 16, 2019. History ACC men's basketball had been broadcast by Raycom/JP Sports, a joint venture of Raycom Sports and Jefferson-Pilot Teleproductions, since the 1982–83 basketball season. The roots of the current package date to 1957, when Greensboro businessman C.D. Chesley hastily assembled a five-station network to broadcast North Carolina's appearance in that year's Final Four. The Tar Heels went on to win the national championship, and Chesley expanded to a full-season package for the 1957–58 season. Chelsey retained the rights until his retirement in 1981, and then Baltimore-based Metrosports had the ACC rights just for the 1981–82 season. The first ACC basketball telecast by Raycom/JP Sports was an early-season game between the Virginia Cavaliers and the Duke Blue Devils on the night of December 8, 1982. It was uncertain whether this first broadcast was going to happen at all until the 9 p.m. tip-off; many East Coast network affiliates were unexpectedly carrying national coverage of a hostage situation at the Washington Monument, tying up the AT&T network lines required for Raycom to distribute the game. Jefferson-Pilot Teleproductions was the sole producer of ACC football beginning with the 1984 football season, but the Raycom/JP Sports joint venture began to include ACC football for the 2004 season. In 2006, JP Sports' parent company, the Jefferson Pilot Corporation, merged with Lincoln National Corporation, taking
https://en.wikipedia.org/wiki/Earth-Touch
Earth Touch is a South Africa-based multimedia company that disseminates its content across multiple platforms, including television networks, video and DVD, the Internet and mobile phones. Earth Touch focuses on topics relating to natural history and wildlife, particularly nature documentaries. Background Established in 2007, Earth Touch pioneered a rapid filming and production cycle using high definition (HD) cameras and satellites. Earth Touch has since built up an extensive archive of HD footage of animal behaviour, filmed primarily in southern Africa, but also Thailand, Antarctica, Indonesia, Brazil, Ecuador and the United States. The company also produced a number of wildlife and nature broadcast programmes that were screened in South Africa and Australia. Collaborations Earth Touch is a content partner in the WikiProject Lights Camera Wiki!, a collaboration designed to encourage public creation of video content for Wikipedia. Earth Touch videos were used for the Wildlife section of this initiative. Recognition/Awards In 2008, Earth Touch’s Wildlife podcasts received the ARKIVE NEW MEDIA AWARD at the Wildscreen Panda Awards. The award is given to the project that best explores the interactive potential of digital technology to raise awareness and understanding of the natural world. Earth Touch News Network (online) http://www.earthtouchnews.com currently hosts over 2000 wildlife videos and new clips are added on a regular basis. The videos are available for viewing and download on a number of new media distribution platforms, including MIRO, iTunes, VUZE and YouTube. References External links The Earth Touch Website Earth Touch YouTube Channel Earth Touch On Facebook Follow Earth Touch On Twitter Film production companies of South Africa Television production companies of South Africa Articles containing video clips
https://en.wikipedia.org/wiki/MPX%20Microsoft%20Project%20Exchange%20File%20Format
MPX Microsoft Project File Exchange Format is a file format developed by Microsoft which was introduced with Microsoft Project 4.0 (1994) for sharing project data with other project management applications. It was adopted by other project management applications, such as Primavera Project Planner and Sciforma. Microsoft discontinued the ability to save in the MPX format with Microsoft Project 2000, but the ability to read the MPX format is supported up to Microsoft Project 2010. References External links Microsoft Knowledge Base Article Computer file formats
https://en.wikipedia.org/wiki/Countermeasure%20%28computer%29
In computer security a countermeasure is an action, device, procedure, or technique that reduces a threat, a vulnerability, or an attack by eliminating or preventing it, by minimizing the harm it can cause, or by discovering and reporting it so that corrective action can be taken. The definition is as IETF RFC 2828 that is the same as CNSS Instruction No. 4009 dated 26 April 2010 by Committee on National Security Systems of United States of America. According to the Glossary by InfosecToday, the meaning of countermeasure is: The deployment of a set of security services to protect against a security threat. A synonym is security control. In telecommunications, communication countermeasures are defined as security services as part of OSI Reference model by ITU-T X.800 Recommendation. X.800 and ISO ISO 7498-2 (Information processing systems – Open systems interconnection – Basic Reference Model – Part 2: Security architecture are technically aligned. The following picture explain the relationships between these concepts and terms: + - - - - - - - - - - - - + + - - - - + + - - - - - - - - - - -+ | An Attack: | |Counter- | | A System Resource: | | i.e., A Threat Action | | measure | | Target of the Attack | | +----------+ | | | | +-----------------+ | | | Attacker |<==================||<========= | | | | i.e., | Passive | | | | | Vulnerability | | | | A Threat |<=================>||<========> | | | | Agent | or Active | | | | +-------|||-------+ | | +----------+ Attack | | | | VVV | | | | | | Threat Consequences | + - - - - - - - - - - - - + + - - - - + + - - - - - - - - - - -+ A resource (both physical or logical) can have one or more vulnerabilities that can be exploited by a threat agent in a threat action. The result can potentially compromises the confidentiality, integrity or availability properties of resources (potentially different that the vulnerable one) of the organization and others involved parties (customers, suppliers). The so-called CIA triad is the basis of information security. The attack can be active when it attempts to alter system resources or affect their operation: so it compromises integrity or availability. A "passive attack" attempts to learn or make use of information from the system but does not affect system resources, compromising confidentiality. A threat is a potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm. That is, a threat is a possible danger enabling the exploitation of a vulnerability. A threat can be either "intentional" (i.e., intelligent; e.g., an individual cracker or a criminal organization) or "accidental" (e.g., the possibility of a computer malfunctioning,
https://en.wikipedia.org/wiki/Improvement%20Science%20Research%20Network
The Improvement Science Research Network (ISRN) is a research network for academics and physicians who are conducting studies in the new medical field of improvement science. Founded in 2009, ISRN is part of the Institute for Integration of Medicine and Science at the University of Texas Health Science Center San Antonio (UTHSCSA). It is housed in the UTHSCSA School of Nursing. The principal investigator is Kathleen R. Stevens, EdD, MS, RN, ANEF, FAAN). ISRN is supported by the National Institutes of Health (NIH) through funds from the American Recovery and Reinvestment Act. ISRN Membership is open to healthcare researchers, academic and clinical scientists, clinicians, clinical leaders, administrators, and those with a specific interest in patient safety and improvement research. Services ISRN provides a national laboratory for investigators from across broad geographical range to study improvement, healthcare delivery systems, dissemination, implementation, translation, safety, and patient outcomes. ISRN infrastructure supports virtual collaboration in the conduct of network studies through direct engagement of study partners and sites, network study principal investigators, and centralized support. ISRN is registered with the Agency for Healthcare Research and Quality as an active PBRN. Improvement science improvement science is an emerging field that shares common aspects with implementation science, translational science, healthcare delivery science, and knowledge translation. These fields are similar in their focus on transforming what is learned from research into common practice to improve care processes and outcomes. "Improvement science" is proposed as the most inclusive term in this list and is proposed as a specialty within health services research. Terminology The ISRN framework and the Stevens Star Model of Knowledge Transformation (Stevens, 2015) are reflected in an international effort to create common terminology of organizational interventions for implementing best evidence-based practices into health practices, systems and policies. To date, this effort resulted in development of a simplified model of interventions to promote and integrate evidence into health practices, systems, and policies (Colquhoun, et al., 2013) and a review of classification schemes for these interventions (Lokker, C., et al., 2015). Research priorities ISRN has established national stakeholder consensus on research priorities that distinguish it from other practice-based research networks (Stevens & Ovretveit, 2013). These priorities highlight gaps in improvement knowledge as identified by clinical and academic scholars, leaders, and change agents across major healthcare disciplines. The research priorities guide decisions about the direction of ISRN discovery and dissemination efforts toward ISRN-sponsored knowledge in each of the following domains of improvement science: Coordination and Transitions of Care – this category emphasizes str
https://en.wikipedia.org/wiki/Keithley%20Instruments
Keithley Instruments is a measurement and instrument company headquartered in Solon, Ohio, that develops, manufactures, markets, and sells data acquisition products, as well as complete systems for high-volume production and assembly testing. In September, 2010, the company agreed to sell itself to the Danaher Corporation, a Washington, D.C.-based conglomerate, for $21.60 per share. It was soon merged with Tektronix, Inc, which had been acquired by Danaher in 2007, and now exists wholly as a brand of Tektronix. History Joseph F. Keithley founded Keithley Instrument in 1946. His first product, the "Phantom Repeater," amplified low-level electric signals so that they could be measured by more standard equipment. The device was used by physicists, chemists, and engineers in the development of hearing aids and amplifiers. The product enjoyed some success in sales, but it was the next product, an electrometer, that clinched the future for Keithley's fledgling company. General The company designs, develops, manufactures and markets electronic instruments and systems geared to the specialized needs of electronics manufacturers for production testing, process monitoring, product development, and research. The company has approximately 500 products used to source, measure, connect, control or communicate direct current (DC), radio frequency (RF), or optical signals. Product offerings include integrated systems solutions, instruments, and personal computer (PC) plug-in boards that can be used as system components or as stand-alone solutions. The company's markets are engineers, technicians, and scientists in manufacturing, product development, and research functions. Keithley operates throughout North America, Asia, and Europe. It develops new solutions for the broader electronics industry, as well as electronic manufacturing production test, semiconductor, telecommunications/wireless and research/education. Products Keithley Instruments' major product lines included testing and measurement products such as electrometers, voltmeters, signal generators, data acquisition, and production and benchtop parametric testers and analyzers. Historical highlights 1946 - Founded in Cleveland, Ohio, U.S.A., by Joseph F. Keithley 1950 - First employee hired John Yeager, the first employee, died January 10, 2018. 1964 - Moved headquarters to Solon, OH 1966 - German office opened 1967 - UK office opened 1991 - Joseph P. Keithley becomes chairman 1995 - Listed on New York Stock Exchange 1998 - Taiwan office opened 2000 - Korea office opened 2003 - Santa Rosa, California RF Design center opened (sold to Agilent Technologies 2009) 2005 - Singapore office opened 2009 - S600 Series parametric test product line discontinued 2010 - Agreed to sell itself to the Danaher Corporation, many operations merged with Tektronix 2011 - Announcement that most manufacturing will shift from Ohio to China References External links "Understanding Current Switc
https://en.wikipedia.org/wiki/CBS%2010
CBS 10 may refer to: Network 10, an Australian television network owned by Paramount Global United States television stations KFDA-TV, Amarillo, Texas KLFY-TV, Lafayette, Louisiana KOLN; Lincoln, Nebraska KOLR-TV, Springfield, Missouri KTVL, Medford, Oregon KWTX-TV, Waco, Texas KZTV, Corpus Christi, Texas WBNS-TV, Columbus, Ohio WTAJ-TV, Altoona, Pennsylvania WTHI-TV, Terre Haute, Indiana WTSP-TV, Tampa, Florida Formerly affiliated KSAZ-TV, Phoenix, Arizona (affiliated with CBS from 1953 to 1994; now a Fox owned-and-operated station) KXTV, Sacramento, California (affiliated with CBS from 1955 to 1995, now an ABC affiliate) WBIR-TV, Knoxville, Tennessee (affiliated with CBS from 1956 to 1988, now an NBC affiliate) WBNB-TV, U.S. Virgin Islands (affiliated with CBS from 1961 to 1989, now defunct) WCAU, Philadelphia, PA (affiliated with CBS from 1946 to 1995, now an NBC owned-and-operated station) WHEC-TV, Rochester, New York (affiliated with CBS from 1953 to 1989, now an NBC affiliate) WILM-LD, Wilmington, North Carolina (affiliated with CBS from 2000 to 2016; now an independent station)
https://en.wikipedia.org/wiki/List%20of%20Bonanza%20episodes
Bonanza is an American western television series developed and produced by David Dortort and broadcast in the United States for 14 seasons on the NBC network. The entire run of the series' 431 hour-long episodes was produced in color. The premiere was on September 12, 1959, and the final episode broadcast on January 16, 1973. In its initial season, Bonanza aired on Saturday evenings and placed at number 45 in the Nielsen ratings. During its second season, the series moved up to number 17. Bonanza was moved to Sundays at 9:00 PM Eastern Time at the start of its third season. In that time slot, the ratings soared and the series become second only to Wagon Train as the most popular program on American prime time television. It remained in the top ten of the ratings through its twelfth season and ranked at number one in its sixth, seventh, and eighth seasons. Bonanza also became a worldwide success as it was broadcast in nearly 50 countries, including Canada, Brazil, Yugoslavia, the United Kingdom, France, Italy, Switzerland, Saudi Arabia, Thailand, Australia, and Japan. Bonanza is set around the Ponderosa Ranch near Virginia City, Nevada and chronicles the weekly adventures of the Cartwright family, consisting of Ben Cartwright (Lorne Greene) and his three sons (each by a different wife), Adam (Pernell Roberts), Eric "Hoss" (Dan Blocker), and Joseph (Michael Landon). Veteran actor Victor Sen Yung played the ranch cook, Hop Sing. In 1964, Pernell Roberts began expressing a desire to leave the series, and so prospective replacements were introduced via Barry Coe as Little Joe's wayward maternal half-brother Clay, and Guy Williams as Ben's nephew Will Cartwright. However, Roberts was persuaded to complete his contract, and remained through season six. The characters of Clay and Will were discontinued. In the ninth season, David Canary was added to the cast as ranch hand/foreman Candy Canady. After four years with the series, Canary left due to a contract dispute. In the twelfth season, Mitch Vogel joined the cast as Jamie Hunter, a teenage orphan who is adopted by Ben Cartwright. Following Dan Blocker's death in May 1972 after season thirteen ended, Greene, Landon, and Vogel continued the series into a fourteenth season, with Canary returning as Candy (reportedly approached by Landon) and Tim Matheson was introduced as ex-prisoner and newly hired ranch-hand Griff King. The program was moved to Tuesday nights where it slipped badly in the ratings to number 52 and was subsequently cancelled. Bonanza has, however, continued to be popular in syndication. From 1964–1967, Bonanza became the most watched show in the U.S. All 14 seasons have been released on DVD in Region 1, both individually, and as a complete series box set. Series overview Episodes Season 1 (1959–60) Season 2 (1960–61) Season 3 (1961–62) Season 4 (1962–63) Season 5 (1963–64) Season 6 (1964–65) Season 7 (1965–66) Season 8 (1966–67) Season 9 (1967–68) Season 10 (1968–69) Season
https://en.wikipedia.org/wiki/Yakhroma%20%28river%29
The Yakhroma () is a right tributary of the Sestra that flows through a network of peat marshes in the north of Moscow Oblast, Russia. It passes through the towns of Dmitrov and Yakhroma, crossing the Moscow Canal on its way. The construction of the Moscow Canal has separated the upper course of the Yakhroma from its lower course. The lower course is long, and has a drainage basin of . Tributaries Volgusha Berezovetc Kuholka Dyatlinka Lbovka References Rivers of Moscow Oblast
https://en.wikipedia.org/wiki/S%C3%B6dermanland%20Runic%20Inscription%20178
Södermanland Runic Inscription 178 or Sö 178 is the Rundata catalog number for a Viking Age memorial runestone which is located at Gripsholm Castle, Södermanland County, Sweden, which is in the historic province of Södermanland. Description This runestone, which is made of sandstone and is 1.9 meters in height, consists of runic text carved on two serpents that bracket a Christian cross. The serpents have binding at their heads and near the end of their tails as if to bind them to the stone. The inscription is classified as being carved in runestone style Pr4, which is also known as Urnes style. This runestone style is characterized by slim and stylized animals that are interwoven into tight patterns. The animal heads are typically seen in profile with slender almond-shaped eyes and upwardly curled appendages on the noses and the necks. The stone was discovered in 1730 during excavation work near the castle and moved to its current location in 1926. It is located near Sö 179 which is one of the Ingvar runestones. The runic text states that two brothers named Helgulfr and Eyjulfr raised the stone as a memorial to their brother Ketilmundr and a bridge in memory of their mother Sóma. The use of the word "stones" indicates that the memorial once consisted of a second stone, which has been lost. The Old Norse word for bridge could also mean an embankment or ford. The reference to bridge-building is fairly common in runestones during this time period. Some are Christian references related to passing the bridge into the afterlife. At this time, the Catholic Church sponsored the building of roads and bridges through a practice similar to the use of indulgences in return for the church's intercession for the soul of the departed. There are over one hundred examples of bridge runestones that are dated from the eleventh century, including inscriptions Sö 101 in Ramsundsberget, U 489 in Morby, and U 617 in Bro. The first word of the runic text hikkulfr has a double k-rune. Since double consonants are rare in Viking Age runic inscriptions, if the first rune is considered to have been a carving error for an l-rune, the word would be the unusual name Helgulfr. Another possibility is that the word is the name Häggulv. The mother's name Sóma is otherwise unknown from this period, and may be related to the Old Norse word somi meaning "glory" or "honor." The inscription is signed by a runemaster named Brúni, which is normalized as Brune, who was the brother of Sóma. The names of runemasters on many inscriptions are not located on the larger, main loop serpent with the main text, but are often on smaller serpents or adjacent to the main serpent. On Sö 178 Brune's name is on one of the two serpents with the main text, and that may be because he was related to the sponsors of the runestone. Brune also signed inscription Sö 55 in Bjudby, which is one of the England runestones, and the inscription Sö 177 from Kärnbo is attributed to him based upon stylistic analysis
https://en.wikipedia.org/wiki/KMYO
KMYO (95.1 FM, "Amor 95.1") is a Spanish AC radio station owned by Uforia Audio Network in the San Antonio, Texas area. The city of license is Comfort, Texas. Its studios are located in Northwest San Antonio, and the transmitter site is in Lakehills, Texas. History KYBC signed on 95.3 MHz in 1991. Three years later, the station became KRNH at 95.1, with the Satellite Music Networks Real Country format. "La Kalle" and first era of "Latino Mix" In 2008, KGSX switched to Latin Pop as "95.1 La Kalle". In September 2014, the station rebranded as "Latino Mix". Yo! 95.1: Classic Hip-Hop On December 19, 2014, KGSX flipped to classic hip hop as "Yo! 95.1" and changed their call letters to KCOR-FM. On January 20, 2015, KCOR-FM changed their call letters to KMYO, to go with the "Yo! 95.1" branding. Return of "Latino Mix" On April 19, 2017, at 5 p.m., KMYO dropped its Classic Hip-Hop format and changed to Spanish Top 40, returning to its former branding as "Latino Mix 95.1". Two days after the switch, Alpha Media's KTFM-HD2/K277CX dropped its struggling Alternative Rock format and picked up the Classic Hip-Hop format, in response to KMYO's flip. Amor 95.1 On September 15, 2022, at 5 p.m., after an hour of stunting with songs about Mexico, KMYO flipped to Spanish AC as "Amor 95.1", with the first song being "Fotos y Recuerdos" by Selena. Former logos References External links MYO Univision Radio Network stations MYO Mainstream adult contemporary radio stations in the United States
https://en.wikipedia.org/wiki/Xu%20Ling
Xu Ling () (507–583) was the compiler and editor of the famous poetry anthology New Songs from the Jade Terrace during the poetically prolific Southern Dynasties era, 420–589. His courtesy name (zi) was Xiao Mu (). Biography Xu Ling was born in what is now Tancheng County, Shandong Province, China, and early in life achieved fame for poetry and literature. He has achieved lasting renown for his anthology New Songs from the Jade Terrace, which he compiled under the patronage of Xiao Gang (503-551), first a prince, and who was then later known as Liang Jianwendi, after becoming Emperor of the Liang Dynasty, 549-551. See also Six Dynasties New Songs from the Jade Terrace Yu Xin References Web Other Watson, Burton (1971). Chinese Lyricism: Shih Poetry from the Second to the Twelfth Century. New York: Columbia University Press. Liang dynasty poets 507 births 583 deaths Liang dynasty government officials Chen dynasty poets Chen dynasty government officials 6th-century Chinese poets 6th-century Chinese writers
https://en.wikipedia.org/wiki/Cornell%20University%20Programming%20Language
Cornell University Programming Language (also called CUPL) is a procedural computer programming language developed at Cornell University in the late 1960s. CUPL was based on an earlier Cornell-developed programming language, CORC. It was used to teach introductory computer programming classes. CUPL was developed by Richard W. Conway, W. L. Maxwell, G. Blomgren, Howard Elder, H. Morgan, C. Pottle, W. Riddle, and Robert Walker. CUPL had a very simple syntax similar to BASIC and to PL/I. The processor was designed to offer extensive error correction and diagnostic capabilities. This would allow student programs to execute even if they contained minor syntax errors. The compiler also included spelling correction capabilities so that if a variable name is referenced only once, the compiler would assume that it was a misspelling of some other intended name. CUPL also offered an extensive set of matrix operations and offered dynamic run-time memory allocation. At the time, Cornell's computer was an IBM System/360 Model 40 batch processing system with only 64 KB of core memory. CUPL was able to process a large number of student programs quickly by remaining resident in core memory, but the compiler occupied 58 KB of memory, leaving only a small amount for the program code and variable storage. Derivative projects Additional computer language projects grew out of CUPL. The CUPL compiler was reworked to implement a subset of the PL/I programming language, called PL/C. PL/C retained the diagnostic and error correction features of CUPL. Audio CUPL was an implementation to accept verbal CUPL statements spoken by the programmer. Each programmer trained the system by first speaking a standard set of CUPL vocabulary words for reference. Retrocomputing implementation There is an implementation of CUPL and CORC in modern C for Unix-like systems that includes both transcriptions of the original manuals and a chrestomathy of programs in these languages. It is available at the Retrocomputing Museum. References External links Resource page for cupl 1.6, providing binary and source code and background information about CUPL and CORC. Educational programming languages Structured programming languages Procedural programming languages PL/I programming language family Programming languages created in the 1960s
https://en.wikipedia.org/wiki/DreamForge%20Intertainment
DreamForge Intertainment, Inc. was an American computer game developer. History DreamForge was founded as Event Horizon Software, Inc. by the computer game developers Thomas Holmes, Christopher Straka and James Namestka in Greensburg. Until its dissolution the company produced several well-known and awarded computer games, most of them in the genre of role-playing games and strategy video games. After producing several games, the team changed its name to DreamForge Intertainment after learning that its Event Horizon name was shared with a developer of pornographic software. The company was dissolved in 2001 after struggles with its publishers while working on several titles, including the never finished game Werewolf: The Apocalypse - The Heart of Gaia, as well as Myst IV, with the latter being subsequently continued by a different studio. List of games DarkSpyre Dusk of the Gods The Summoning Dungeon Hack Veil of Darkness Ravenloft: Strahd's Possession Menzoberranzan Anvil of Dawn Ravenloft: Stone Prophet Chronomaster War Wind War Wind II: Human Onslaught 101 Dalmatians: Escape from DeVil Manor Sanitarium TNN Outdoors Pro Hunter Warhammer 40,000: Rites of War Unfinished Kehl: Fury Unbound (unfinished Xbox title) Myst IV Werewolf: The Apocalypse – The Heart of Gaia References External links 1990 establishments in Pennsylvania 2001 disestablishments in Pennsylvania American companies established in 1990 American companies disestablished in 2001 Defunct video game companies of the United States Game manufacturers Video game development companies Video game companies established in 1990 Video game companies disestablished in 2001
https://en.wikipedia.org/wiki/GEOBASE
GEOBASE is a database, multidisciplinary in scope, which indexes bibliographic information and abstracts for the Geographical, Earth, and Ecological sciences, published by Engineering Information, a subsidiary of Elsevier. The broad subject coverage includes earth sciences, ecology, geomechanics, human geography, physical geography, social geography and oceanography. Development studies are also included in this database. Coverage Coverage includes 2000 peer reviewed journal, and trade journal titles. Other journal titles and books are included in the archival coverage of this database. With more than 2 million records, it has temporal coverage from 1980 to the present. Each year, at least 100,000 additional citations and abstracts are added, and it is updated every two weeks. Access is covered through both online (internet), and CD-ROM. Other types of publications indexed in this database are magazine articles, product reviews, directories and all related materials. International literature coverage pertains to Non-English language papers, and lesser available books, conference proceedings and reports. Subject coverage also includes cartography, hydrology, climatology, meteorology, energy, paleontology, environment, petrology, geochemistry, photogrammetry, geomorphology, sedimentology, geophysics, and volcanology. Print counterparts The GEOBASE database is covered in print, in the following abstracts journals: Geographical Abstracts: Human Geography Geographical Abstracts: Physical Geography Geological Abstracts Ecological Abstracts International Development Abstracts Oceanographic Literature Review Geomechanics Abstracts Geographical Abstracts: Human Geography ISSN 0953-9611, LCCN:89646812 This database is published monthly, and contains abstracts from 2000 journals. It provides bibliographic coverage of each abstracted journal. Geographical Abstracts: Physical Geography, and Fluid Abstracts: Civil Engineering are considered to be of related interest. This database was formed by the union of the following abstracts journals: Geographical abstracts. C, Economic geography (1986) OCoLC: 13548872 Geographical abstracts. D, Social and historical geography (OCoLC)13645587 Geographical abstracts. F, Regional and community planning (OCoLC)13646354. Geographical Abstracts: Physical Geography ISSN 0954-0504 This database is published monthly, and contains abstracts from 2000 journals. It provides bibliographic coverage of each abstracted journal. References External links History of Geographical Abstracts. University of Chicago (library). October 2010. (Very brief) Bibliographic databases and indexes Earth sciences Geographical databases Ecological databases
https://en.wikipedia.org/wiki/Jay%20Davies
Jay Andrew John Raymond Davies is an English footballer who plays for Green Gully as a midfielder. References External links Profile at UpThePosh! The Peterborough United Database Jay Davies at vicfootball 1991 births Living people English men's footballers Men's association football midfielders Peterborough United F.C. players Farnborough F.C. players Woking F.C. players St Neots Town F.C. players Bishop's Stortford F.C. players Biggleswade Town F.C. players National League (English football) players Southern Football League players Isthmian League players Footballers from Dagenham
https://en.wikipedia.org/wiki/Security%20service%20%28telecommunication%29
Security service is a service, provided by a layer of communicating open systems, which ensures adequate security of the systems or of data transfers as defined by ITU-T X.800 Recommendation. X.800 and ISO 7498-2 (Information processing systems – Open systems interconnection – Basic Reference Model – Part 2: Security architecture) are technically aligned. This model is widely recognized A more general definition is in CNSS Instruction No. 4009 dated 26 April 2010 by Committee on National Security Systems of United States of America: A capability that supports one, or more, of the security requirements (Confidentiality, Integrity, Availability). Examples of security services are key management, access control, and authentication. Another authoritative definition is in W3C Web service Glossary adopted by NIST SP 800-95: A processing or communication service that is provided by a system to give a specific kind of protection to resources, where said resources may reside with said system or reside with other systems, for example, an authentication service or a PKI-based document attribution and authentication service. A security service is a superset of AAA services. Security services typically implement portions of security policies and are implemented via security mechanisms. Basic security terminology Information security and Computer security are disciplines that are dealing with the requirements of Confidentiality, Integrity, Availability, the so-called CIA Triad, of information asset of an organization (company or agency) or the information managed by computers respectively. There are threats that can attack the resources (information or devices to manage it) exploiting one or more vulnerabilities. The resources can be protected by one or more countermeasures or security controls. So security services implement part of the countermeasures, trying to achieve the security requirements of an organization. Basic OSI terminology In order to let different devices (computers, routers, cellular phones) to communicate data in a standardized way, communication protocols had been defined. The ITU-T organization published a large set of protocols. The general architecture of these protocols is defined in recommendation X.200. The different means (air, cables) and ways (protocols and protocol stacks) to communicate are called a communication network. Security requirements are applicable to the information sent over the network. The discipline dealing with security over a network is called Network security. The X.800 Recommendation: provides a general description of security services and related mechanisms, which may be provided by the Reference Model; and defines the positions within the Reference Model where the services and mechanisms may be provided. This Recommendation extends the field of application of Recommendation X.200, to cover secure communications between open systems. According to X.200 Recommendation, in the so-called OSI
https://en.wikipedia.org/wiki/Samsung%20Galaxy%20Player
The Samsung Galaxy Player (known as the Samsung Galaxy S WiFi in Europe) was a line of Android-based all-purpose pocket computers produced by Samsung. The product was debuted on 2 September at the 2010 IFA in Berlin, and was showcased at the 2011 CES in Las Vegas. Models All of the Galaxy Player models support 3-axis accelerometer. The Galaxy Player 4.2 also supports 3-axis gyroscope. Galaxy Player 50 (YP-G50) The Galaxy Player 50 (not to be confused with Galaxy Player 5.0) was the first Samsung Android-based media player, announced at the 2010 IFA and released early 2011. It features a 3.2 inch 400 x 240 pixels TFT-LCD display, 8 or 16GB internal memory, a microSDHC slot, 1000mAh battery, Bluetooth 3.0, RDS FM tuner and 2 MP rear camera. It runs on Android 2.1 Eclair. Galaxy Player 4.0 or Galaxy S WiFi 4.0 (YP-G1) The Galaxy Player 4.0 features a 4" multi-touch capacitative touchscreen, a "Super Clear" LCD with 800x480 resolution (WVGA). It has 8 GB of internal flash storage, that can be expanded with a microSD card (up to 32 GB cards are supported). It has two cameras (a VGA front camera, and a 3.2 megapixel back camera), WiFi, FM radio, and a GPS, and runs Android 2.3.5 ("Gingerbread"). Development teams have created an unofficial Android 4.0 ("Ice Cream Sandwich") port. Its design is almost the same of the Samsung Galaxy S phone (I9000) but with a lower resolution camera (3.2 MP instead of 5.0 MP) and without phone functions or 3G. The CPU is a Samsung Exynos 3110 Applications Processor. Samsung announced that the Galaxy S WiFi 4.0 would be released in the first half of 2011, starting with the UK. The Galaxy Player 4.0 and 5.0 launched in U.S. in October 2011. Galaxy Player 5.0 or Galaxy S WiFi 5.0 (YP-G70) The Galaxy Player 5.0 features a micro-SD card slot allowing for up to an additional 32 GB of storage. The CPU is an Exynos 3110 1Ghz Application Processor. It has an estimated 60-hour battery life during music playback and 8 hours during video playback. As of now, the Galaxy Player 5.0 comes preloaded with Android 2.2.2 Froyo in Europe, and Android 2.3.5 Gingerbread in the US. Development teams have created an unofficial Android 4.0 ("Ice Cream Sandwich"), Android 4.4 ("KitKat") up to Android 5.1.1 ("Lollipop"). Galaxy Player 3.6 or Galaxy S WiFi 3.6 (YP-GS1) The Galaxy Player 3.6 carries a 3.65" LCD TFT (with a resolution of 480×320) instead of the AMOLED which is used by Samsung in most of its phones. The internal storage is flash 8 GB that can be expanded via a microSD card. The CPU is a single core 1 GHz based on ARM Cortex-A8 based CPU core (OMAP3630). It has a removable battery. It runs on the Android 2.3 Gingerbread OS. The player has a 2.0 MP camera on the back, GPS location services, and an accelerometer. The player supports Wi-Fi (802.11b/g/n) as well as Bluetooth 3.0 (A2DP, AVRCP, OPP, PBAP). Galaxy Player 4.2 or Galaxy S WiFi 4.2 (YP-GI1) The Galaxy Player 4.2 has a 4.2" IPS display at 800 x 480, 1 GHz processor,
https://en.wikipedia.org/wiki/Mohammad%20S.%20Obaidat
Mohammad Salameh Obaidat is a Jordanian American Academic/ Computer Engineer/computer Scientist and Founding Dean of College of Computing and Informatics at the University of Sharjah, UAE. He is the Past President & Chair of Board of Directors of and a Fellow of the Society for Modeling and Simulation International (SCS), and a Fellow of the Institute of Electrical and Electronics Engineers (IEEE) for contributions to adaptive learning, pattern recognition and system simulation . He was born in Jordan to The Obaidat known Family. He is the cousin of the Former Prime Minister of Jordan, Ahmed Obaidat (also spelled Obeidat) and received his M.S. and Ph.D. in computer engineering from the Ohio State University, Columbus, Ohio, USA. He is known for his contributions in the fields of cybersecurity, Biometrics-based Cybersecurity, wireless networks, modeling and simulation, AI/Data Analytics. He served as President and Char of Board of Directors of the Society for Modeling and Simulation International, SCS, a Tenured Professor & Chair of Department of Computer Science at Monmouth University, Tenured Professor & Chair of Department of computer and Information Sciences at Fordham University, USA, Dean of College of Engineering at Prince Sultan University, and Advisor to the President of Philadelphia University for Research, Development and IT. He has chaired numerous international conferences and has given numerous keynote speeches. Biography Obaidat was born in Kufr Soum, Irbid, Jordan to The Obaidat known Family. He is the cousin of the Former Prime Minister of Jordan, Ahmed Obaidat (also spelled Obeidat). He obtained his Master of Science and Ph.D. degrees from The Ohio State University, Columbus, Ohio, USA, where he was on a scholarship. After graduation he worked briefly at Jordan University of Science and Technology, JUST, and then moved to the USA and worked at several universities, as an assistant professor, associate professor and full professor as well as an academic leader, including City University of New York, Monmouth University and Fordham University. During the 2014/2015 academic year, he was awarded the Fulbright Distinguished Award and served in Jordan as Advisor to the President of Philadelphia University for Research, Development and IT- The later, Dr. Adnan Badran, became the Prime Minister of Jordan in 2005. He has received extensive research funding and published to Date (2020) about one thousand (1,000) refereed technical articles -about half of them are journal articles, over 95 books, and 55 book chapters. He is the Editor-in-Chief of the Wiley International Journal of Communication Systems, the Founding Editor-in Chief of Wiley Security and Privacy Journal and an editor of other international journals. Moreover, he is founder or co-founder of 5 International Conferences: SPECTS, CITS, CCCI, DCNET, SIMULTECH. Among his previous positions are Advisor to the Former President of President of Philadelphia University (HE Dr. Dr
https://en.wikipedia.org/wiki/Royal%20Westphalian%20Railway%20Company
The Royal Westphalian Railway (, KWE) was a German rail company established in 1848 with funding from the Prussian government, which later became part of the Prussian State Railways. The network eventually extended about 315 km from Rheine via Hamm to Warburg and from Welver (near Hamm) to Oberhausen. History The Royal Westphalian Railway was initially established only to fill the 32 km-long gap between Hamm and Lippstadt, connecting the Münster–Hamm line of the Munster–Hamm Railway Company (Münster-Hammer Eisenbahn-Gesellschaft) opened in 1848 with the line being constructed at the same time by the Cologne-Minden-Thuringian Connection Railway Company (Köln-Minden-Thüringischen-Verbindungs-Eisenbahn-Gesellschaft, KMTVEG). The latter company, however, went bankrupt in 1848 and further construction and the line's later operations were taken over by the Prussian government. The cause of the bankruptcy of the KMTVEG was the difficulty of building a 600-metre-long tunnel at Willebadessen under the main ridge of the Eggegebirge range. The tunnel, which was never completed, was designed to avoid bridging the valley at Altenbeken. The remains of the site are still visible after more than 150 years; these ruins are known as the Old Railway (Alte Eisenbahn). The main line of the Royal Westphalian Railway ran from Hamm via Soest, Lippstadt, Paderborn and Altenbeken to Warburg. It was opened on 4 October 1850 to Paderborn and on 21 June 1853 to Warburg. The line was first railway in western Germany to cross mountainous country. The Altenbeken Viaduct was a significant achievement of the early German railways. After the company took over the Münster–Hamm Railway Company in 1855, it extended the Münster–Hamm line to Rheine in 1856 and to German ports on the North Sea. Together with the Royal Hanoverian State Railways, it built a connection from Rheine to the German ports on the North Sea. This was a very important connection for Prussia because of the high tariffs charged by the Dutch Rhine ports. The Kingdom of Hanover was annexed by Prussia after the Austro-Prussian War of 1866 and two years later this line became part of the Westphalian Railway. Together with the Rhenish Railway Company, it built and operated a generally straight line, opened in 1876, from Welver station (between Hamm and Soest), via Unna-Königsborn to Dortmund South station (which was destroyed in World War II). The line was extended to the west in 1879 as the Westphalian Emscher Valley Railway (westfälische Emschertalbahn, WfE) via Dorstfeld, Bodelschwingh, Mengede, Herne, Gelsenkirchen, Horst to Osterfeld WfE station. Operations on this line proved to be uneconomic and sections of it were soon closed, following the nationalisation of its main competitors. Network Notes References Defunct railway companies of Germany 1848 establishments in Prussia
https://en.wikipedia.org/wiki/Acer%20Clear.fi
Acer Clear.fi is a wireless home network program by the Taiwanese electronics manufacturer Acer. It allows sharing and playback of media over multiple compatible platform devices. The console can be assembled when the user attaches a wireless router to a DLNA-compliant gadget. When the two are attached, icons will appear onscreen, allowing users to access files through the media console. Acer Clear.fi can also automatically locate Acer smartphones and PCs, enabling users to share media. It was officially presented by the company at a Beijing Conference in May 2010. References External links Acer Inc. products Wireless networking hardware
https://en.wikipedia.org/wiki/Bergen%20Museum%20of%20Art%20%26%20Science
The Bergen Museum of Art & Science is temporarily located in cyberspace while its extensive art collection valued at over one million dollars is being stored in an art warehouse in Hackensack, New Jersey, United States. The museum relocated from the Bergen Mall in 2010 is currently undergoing re-organization and is looking for a new building to contain its entire art collection, sculptures, fossils, artifacts, drawings and other items and collectibles. Exhibitions Tsugio Hattori See also Anderson Outkitchen Hackensack Bus Terminal New Bridge Landing New Jersey Naval Museum References Museums in Bergen County, New Jersey Hackensack, New Jersey Art museums and galleries in New Jersey Science museums in New Jersey Natural history museums in New Jersey
https://en.wikipedia.org/wiki/Correlation%20coefficient
A correlation coefficient is a numerical measure of some type of correlation, meaning a statistical relationship between two variables. The variables may be two columns of a given data set of observations, often called a sample, or two components of a multivariate random variable with a known distribution. Several types of correlation coefficient exist, each with their own definition and own range of usability and characteristics. They all assume values in the range from −1 to +1, where ±1 indicates the strongest possible agreement and 0 the strongest possible disagreement. As tools of analysis, correlation coefficients present certain problems, including the propensity of some types to be distorted by outliers and the possibility of incorrectly being used to infer a causal relationship between the variables (for more, see Correlation does not imply causation). Types There are several different measures for the degree of correlation in data, depending on the kind of data: principally whether the data is a measurement, ordinal, or categorical. Pearson The Pearson product-moment correlation coefficient, also known as , , or Pearson's , is a measure of the strength and direction of the linear relationship between two variables that is defined as the covariance of the variables divided by the product of their standard deviations. This is the best-known and most commonly used type of correlation coefficient. When the term "correlation coefficient" is used without further qualification, it usually refers to the Pearson product-moment correlation coefficient. Intra-class Intraclass correlation (ICC) is a descriptive statistic that can be used, when quantitative measurements are made on units that are organized into groups; it describes how strongly units in the same group resemble each other. Rank Rank correlation is a measure of the relationship between the rankings of two variables, or two rankings of the same variable: Spearman's rank correlation coefficient is a measure of how well the relationship between two variables can be described by a monotonic function. The Kendall tau rank correlation coefficient is a measure of the portion of ranks that match between two data sets. Goodman and Kruskal's gamma is a measure of the strength of association of the cross tabulated data when both variables are measured at the ordinal level. Tetrachoric and polychoric The polychoric correlation coefficient measures association between two ordered-categorical variables. It's technically defined as the estimate of the Pearson correlation coefficient one would obtain if: The two variables were measured on a continuous scale, instead of as ordered-category variables. The two continuous variables followed a bivariate normal distribution. When both variables are dichotomous instead of ordered-categorical, the polychoric correlation coefficient is called the tetrachoric correlation coefficient. See also Correlation disattenuation Coefficient of determinat
https://en.wikipedia.org/wiki/Sr2
Sr2, SR2 and variants may refer to .sr2, a filename extension for Raw image format Manx SR2 a 1970 American kit car Minolta SR-2, a camera Saints Row 2, a computer game Space Rangers 2: Dominators, a computer game SR-2 Veresk, a submachine gun VR Class Sr2, a Finnish electric locomotive Normandy SR-2, a spacecraft from Mass Effect 2 Ormazd, one of the quadrangles of the moon Rhea State Route 2 or State Road 2; see List of highways numbered 2 SR2, a competition class of the FIA Sportscar Championship SR2, the second radio station of the Saarländischer Rundfunk launched 1953 SR2, a high specification version of the Ford Laser
https://en.wikipedia.org/wiki/List%20of%20Mexican%20films%20of%202010
A list of the films produced in Mexico in 2010 (see 2010 in film): 2010 References External links Mexican films of 2010 at the Internet Movie Database List of 2010 box office number-one films in Mexico 2010 Films Lists of 2010 films by country or language
https://en.wikipedia.org/wiki/20th%20Street
20th Street may refer to: 20th Street (BMT Fifth Avenue Line), a defunct New York City Subway station Right Of Way/20th Street station, on the San Francisco Municipal Railway light rail network's J Church line 20th Street station (Muni Metro), a light rail stop on the Muni Metro T Third Street line in Dogpatch, San Francisco Twentieth Street Historic District, a California Registered Historic Place
https://en.wikipedia.org/wiki/Undercover%20Boss%20Australia
Undercover Boss Australia is a localised version and third incarnation of the Undercover Boss franchise, the first series premiered on Network Ten on 18 October 2010 with the CEO of Domino's Pizza Australia, Don Meij. Each episode depicts a high-ranking executive or business owner acting as an entry-level employee to discover the problems in their company. On 15 November 2010, Network Ten renewed the show for a second series. The second series began airing on 12 September 2011. Format Each episode features a high-positioned executive or the owner of a corporation going undercover as an entry-level employee in their own company. The executive changes their appearance and assumes an alias and fictional back-story. The fictitious explanation for the accompanying camera crew is that the executive is being filmed as part of a documentary about entry-level workers in a particular industry. They spend approximately one week undercover, working in various areas of the company's operations, with a different job and in most cases a different location each day. The boss is exposed to a series of predicaments with amusing results. They invariably spend time getting to know the people who work in the company, learning about their professional and personal challenges. At the end of their week undercover, the boss returns to their true identity and requests the employees they worked with individually to corporate headquarters. The boss reveals their identity and rewards hard-working employees through campaign, promotion or financial rewards. Other employees are given training or better working conditions. Episodes The first series premiered on Network Ten on 18 October 2010 with the CEO of Domino's Pizza Australia, Don Meij. The episodes that followed included the CEO of Boost Juice, Janine Allis, and Peter Murray, National Director of Operations of Veolia Environmental Services, and CEO of BIG4 Holiday Parks of Australia, Ray Schleibs A second series was broadcast from 12 September 2011. Production Network Ten planned an Australian version for airing in 2009, however the production never took off and instead, was delayed one year. Ten's Chief Programming Officer, David Mott stated "We’ve defined a few iconic Australian companies. It's a great series. It's a real eye opener. It's a little ripper.", hoping the series will become a ratings success to similar to that of Masterchef Australia. He also explained the Australian version will be based on the American version, not the British version "We saw the UK version, but thought it needed to be upscaled a little bit,"....."That's what the American version was." International broadcasts Selected episodes of Undercover Boss Australia air in the United States on TLC and OWN, as part of Undercover Boss: Abroad. In the United Kingdom, the series rotates with other iterations of the franchise on the Undercover Boss Global channel of Pluto TV; as of 2023 the Australian series and Undercover Boss Canada had beg
https://en.wikipedia.org/wiki/Post-demographics
Post-demographics is a way to study the personal data in social networking platforms, and, in particular, how profiling is, or may be, performed, with which findings as well as consequences. The prefix 'post' shows that it is different from the demographic data that tries to organize groups, markets and voters in society. Where of interests are not the traditional demographics of race, ethnicity, age, income, educational level or derivations thereof such as class, but rather tastes and other information supplied to make and maintain an online profile. From a post-demographics perspective, the profile lies at the core of research into social networking sites, as it provides information that moves beyond the demographic, organized according to ‘interested’ and ‘favorites’, with more specific sub-categories as brands, music, movies, animals, etc. Method The object of study are social networking sites, which are defined as sites where users can create a profile and connect that profile to other profiles for the purposes of making an explicit personal network. Instead of user-participation, observation, surveying as well as other approaches imported from the social sciences, the post-demographic methods depart from a non-user perspective. A non-user perspective is someone who does not use the social networking site to manage friendships or to flirt, but still visit the site and read the profiles. They are particularly interested in the data sets that they can retrieve from profiles. The post-demographic method strives to think through what the profilers would do, and builds upon it. Thus, first it is important to identify the constraints per social networking platform in harvesting data. Once data may be harvested, the further step is to identify the set of relationships that could be studied, e.g., do friends have the same interests? The method tries to understand for which purposes are interests a more significant mode of organizing and recommending action than demographics. References External links Digital Methods Initiative on Post-demographics Demographics
https://en.wikipedia.org/wiki/Jeffrey%20James
Jeffrey James is an Australian television news, business and current affairs anchor. During 2007 and 2008 he presented for international business news network CNBC Asia where he hosted Squawk Australia from the channel's new studio centre in Sydney. The programme was broadcast worldwide each weekday morning. He joined German international network, Deutsche Welle (DW-TV) in 1999 where he presented business news until his departure in 2005. James has worked with networks in Asia, Europe and Australia. At CNBC he interviewed Australian political figures including Prime Ministers John Howard and Kevin Rudd, the Minister of Communications Helen Coonan and the Deputy Prime Minister Julia Gillard. In 1993 James produced and directed The Embraced for SBS-TV Australia. In 1991 he created and jointly produced Pirates & The Policing of the High Seas, a docu-drama for Australia’s Beyond Television. The programme was filmed in the southern Philippines. In 2013 James presented a video advertising feature for Thailand's Bumrungrad International Hospital, used throughout the company's marketing strategy. In 2014 he produced and presented a series of features for Bumrungrad International Hospital related to re-generative medicine and new stem cell therapies. In 2017 James anchored news bulletins for Israeli global-broadcaster, i24News from Tel Aviv Early work In 1983 Australia’s 2GB-Macquarie Radio Network chose James as one of 4 reporter-producers for its primetime episodic investigative current affairs show, Newsfront. He spent 2 years with the network. He interviewed China's representative to Hong Kong that year who provided new details of China's plans for the territory post-1997. He interviewed American Professor Robert Gallo who discovered the AIDS virus. A series on home burglary followed a break in and ended in James seeking the thieves guidance on home protection. The episode resulted in both high ratings and interest from Australian Police. His series titled Homosexuality featured interviews from one of the earliest Sydney Mardi Gras. In 1986 James was hired by 9 Network Australia as a Segment Producer for The Midday Show and then moved in 1987 to ABC TV where he was Associate Producer on interview programme, Mike Walsh. In 1988 he moved to Hong Kong where he anchored television news for HK-TVB. He left the network after a disagreement with management over contractual issues related to hosting public events. In 1994, James relocated to Auckland where he headed international projects as Executive Producer for Communicado. The role saw James and Communicado Chairman Neil Roberts develop co-productions with leading international broadcasters. In 2020, James donated 100 hours of historic interviews from his Australian radio and television work to Australia's Film and Television Archive who featured his work on the museums end-of-year home page review. Personal life Jeffrey James resides in Sydney, Australia References Year of birth missing
https://en.wikipedia.org/wiki/David%20De%20Roure
David Charles De Roure is an English computer scientist who is a professor of e-Research at the University of Oxford, where he is responsible for Digital Humanities in The Oxford Research Centre in the Humanities (TORCH), and is a Turing Fellow at The Alan Turing Institute. He is a supernumerary Fellow of Wolfson College, Oxford, and Oxford Martin School Senior Alumni Fellow. From 2009 to 2013 he held the post of National Strategic Director for e-Social Science. and was subsequently a Strategic Advisor to the UK Economic and Social Research Council in the area of new and emerging forms of data and realtime analytics. He was Director of the Oxford e-Research Centre (OeRC) from 2012 to 2017. Early life and education De Roure grew up in West Sussex and studied for an undergraduate degree in mathematics with Physics at the University of Southampton, completing his studies in 1984. He stayed on to do a Doctor of Philosophy degree in 1990 initially under the supervision of David W. Barron and Peter Henderson on a Lisp environment for modelling distributed computing. Research and career Following an early career in medical electronics at Sonicaid, De Roure held a longstanding position in the School of Electronics and Computer Science, University of Southampton from its formation as a department in 1986, becoming a full professor in 2000. He was Warden of South Stoneham House in the late 80s. He was closely involved in the UK e-Science programme and is best known for the myExperiment website for sharing scientific workflows and research objects, as well as the Semantic Grid initiative, the UK's Open Middleware Infrastructure Institute (OMII-UK) and its successor, the Software Sustainability Institute. De Roure was the Director of Envisense, the DTI Next Wave Centre for Pervasive Computing in the Environment, from 2003 to 2005. He moved to the Oxford e-Research Centre in July 2010. In 2009 he was appointed as the National Strategic Director for e-Social Science by the UK Economic and Social Research Council (ESRC) and subsequently held the post of Strategic Advisor in the area of new and emerging forms of data and realtime analytics, leading to the commissioning of projects under phase 3 of the Big Data Network. His personal research interests include e-Research and Computational musicology and his projects build on Semantic Web, Web 2.0 and Scientific workflow system technologies. A notable contribution to the field of the Semantic Web is his gloss of the common name for the Web Ontology Language, properly 'WOL' and commonly referred to as 'OWL', as deriving from A.A. Milne's character Owl in the Winnie-the-Pooh stories. Characteristically his work focuses on the 'long tail' of researchers through adoption of user-centric methodologies. He currently works on Social Machines, Digital Humanities, Experimental Humanities, and Internet of Things. De Roure is also Technical Director of the Centre for Practice & Research in Science & Music at the Roy
https://en.wikipedia.org/wiki/Uppland%20Runic%20Inscription%20485
Uppland Runic Inscription 485 or U 485 is the Rundata catalog number for a Viking Age memorial runestone that is located in Marma, which is about six kilometers northeast of Knivsta, Uppsala County, Sweden, which was in the historic province of Uppland. Description This inscription consists of runic text in the younger futhark carved on a serpent or lindworm that circles a central area where it then becomes intertwined with a ribbon beast in the center. A Christian cross is near the top of the inscription. The granite runestone, which is 1.8 meters in height, was placed on its current base in 1925. It is classified as being carved in runestone style Pr5, which is also known as Urnes style. This runestone style is characterized by slim and stylized animals that are interwoven into tight patterns. The animal heads are typically seen in profile with slender almond-shaped eyes and upwardly curled appendages on the noses and the necks. This stone is considered to be a good example of an inscription in style Pr5. The inscription is signed with the runes ofaigr ybiʀ by the runemaster Öpir, who was active in the Uppland area in the late 11th and early 12th centuries. The first word in Old Norse is Ofæigʀ, which combines a negative prefix ó with feigr to mean "death bound" or "fated to die" but without any negative connotations intended, thus making a name meaning "Not Doomed." This is the only runic inscription of Öpir with this first name, and it has been suggested that this was the given name of Öpir. The name he used in his other surviving signed inscriptions was the sobriquet or nickname Öpir, which means "Shouter." The runic text states that the stone was raised by two brothers named Þrótti and Ingulfr as a memorial to their father Sigviðr and by a woman named Ingifastr to her husbandman. The name Ingifastr was carved in runes as inkifa=st, which uses a bind rune to combine an a-rune and an s-rune. Another inscription which used a bind rune to combine these same two runes, which was also signed by Öpir, is the Varangian runestone Sö 308 from Vid Järnavägen. Bind runes appear disproportionately in names in runic texts, and it has been suggested that they may have been sometimes used to draw attention to a name, similar to the way that initial capital letters are used to start names in European languages today. Inscription Transliteration of the runes into Latin characters þroti ' uk ' ingulfr ' litu ' rita stain ' iftiʀ ' sihuiþ ' faþur ' sin ' uk ' inkifa=st ' at ' bonta ' sin ' in ' ofaigr ' ybiʀ ' risti Transcription into Old Norse Þrotti ok Ingulfʀ letu retta stæin æftiʀ Sigvið, faður sinn, ok Ingifast at bonda sinn. En Ofæigʀ/ofæigʀ Øpiʀ risti. Translation in English Þrótti and Ingulfr had the stone erected in memory of Sigviðr, their father; and Ingifastr in memory of her husbandman. And Ófeigr / the not doomed Öpir carved. References External links Photograph of U 485 on Arild Hauge's website. Uppland Runic Inscription 0485
https://en.wikipedia.org/wiki/Fred%20Rogers%20Productions
Fred Rogers Productions is an American non-profit organization specializing in children's programming for public television in the United States. The organization was started by Fred Rogers and was initially renamed in his honor to The Fred Rogers Company after his death. Under a previous name, Family Communications, Inc., the organization produced its flagship program, Mister Rogers' Neighborhood. Founded in 1971, Family Communications replaced Small World Enterprises, a for-profit company created in 1955 primarily to license and sell merchandise tied in with Mister Rogers' Neighborhood and his earlier series, The Children's Corner. In 1985, it struck a deal with CBS/Fox Video to release home video titles. In the early 2010s, The Fred Rogers Company began producing new programming, including: Daniel Tiger's Neighborhood, an animated conceptual sequel to Neighborhood starring the young families of characters introduced in the former show's Neighborhood of Make-Believe segments. Peg + Cat, an animated show based on the picture book The Chicken Problem, which introduces concepts of math and problem-solving to young viewers. Odd Squad, a live-action show which focused on math and problem-solving and targets a somewhat older audience than Peg + Cat. Donkey Hodie, in association with Spiffy Pictures, premiered on PBS Kids on May 3, 2021. The series follows the life of the titular Donkey Hodie, who is the granddaughter of the original character appearing in the "Neighborhood of Make Believe" segments of Neighborhood. Alma's Way created by Sesame Street actress Sonia Manzano premiered on PBS Kids on October 4, 2021. Filmography Mister Rogers' Neighborhood (1968-2001) Daniel Tiger's Neighborhood (2012-present) Peg + Cat (2013-2018) Odd Squad (2014-2022) Through the Woods (2017) A Beautiful Day in the Neighborhood (2019; uncredited) Donkey Hodie (2021-present) Alma's Way (2021-present) References External links Fred Rogers Productions Television production companies of the United States Mass media companies established in 1971 Non-profit_organizations based in Pittsburgh 1971 establishments in Pennsylvania Fred Rogers
https://en.wikipedia.org/wiki/Meade%20LX200
The Meade LX200 is a family of commercial telescopes produced by Meade Instruments launched in 1992 with 8" (20.32 cm) and a 10" (25.4 cm) Schmidt–Cassegrain models on computerized altazimuth mounts. Two larger models, a 12" (30.48 cm) and a 16" (40.64 cm), quickly followed. The original version was later informally named the "classic" LX200 as newer upgraded versions replaced it. The first of these was the LX200GPS, which featured global positioning system electronics. A LX200GPS was later added to the line. The advantage of the LX200 was price for its performance, which was accomplished by using electronics and software to equal the pointing performance of more expensive systems. Software and optical encoders corrected for errors, and the telescope also came with auto-guiding CCD and planetarium software. A related series introduced in 2005 was the even higher end RCX400 (later renamed LX400-ACF), with new optics and a motorized focus/collimation system, and with upgraded fork mount electronics. These were available in the same 8" (20.32 cm) to 16" (40.64) size range on the new fork mount, and the 16" (40.64 cm) optical tube assembly (OTA), along with a new 20" (50.8 cm) OTA, were available on a new German equatorial mount. These were all f/8 optical systems, costing up to $50,000 for the 20" on the German equatorial mount. An f/10 version of the new optics later replaced the optics of the existing LX200GPS fork mount models, with the new product line now called the LX200R (later renamed LX200-ACF). The revised optics are called advanced coma free (ACF) after a lawsuit by Star Instruments and RC Optical Systems disallowed implying that they were based on Ritchey–Chrétien optics. In September 2012, an amateur astronomer used an LX200GPS to record an impact on the planet Jupiter. Installations Selected observatories with LX200 telescopes. Grupo de Dinâmica Orbital e Planetologia da UNESP de Guaratinguetá Observatório da Universidade de Brasília at Universidade de Brasília Observatorio de la Universidad Tecnológica de Pereira Mount Wilson Observatory (prototype version) Ball State University Observatory Barus & Holley Observatory Bayfordbury Observatory (University of Hertfordshire Observatory) Bradstreet Observatory Campbelltown Rotary Observatory California Polytechnic State University in San Luis Obispo Chronos Observatory at Calamus Winery, Jordan, ON, Canada Clavius Observatory, Universidad IberoAmericana, Mexico City, Mexico Collins Observatory at Salem State University Curtis Vaughan Jr. Observatory at the University of Texas at San Antonio Dodge City Community College David Cole Observatory Foothill Observatory (at Foothill College) Frosty Drew Observatory Givatayim Observatory Olin Observatory at Gustavus Adolphus College Hereford Arizona Observatory Junk Bond Observatory Letchworth & District Astronomical Society Mead Observatory AMJOCH Observatory at Michigan Technological University Mount Albert Grammar School Observatory
https://en.wikipedia.org/wiki/European%20route%20E38
European route E38 is a road part of the International E-road network. It begins in Hlukhiv, Ukraine and ends in Shymkent, Kazakhstan. It is long. The E38 is the only signposted European route in Kazakhstan. While the country has a few E-routes other than E38, none of those were signposted. Route : Hlukhiv (E105) 38K-017: Rylsk - Lgov - Kurchatov 38K-010: Kurchatov - Kursk (E105) : within Kursk : Kursk - Voronezh (E115) - Borisoglebsk (E119) : Borisoglebsk - Saratov : Saratov - Yershov - Ozinki : Oral (E121) : Oral - Kyzylorda (E123 / E004) - Shymkent (E40) References External links UN Economic Commission for Europe: Overall Map of E-road Network (2007) 38 European routes in Ukraine E38 E038
https://en.wikipedia.org/wiki/List%20of%20Miami-Dade%20Transit%20metro%20stations
Miami-Dade Transit operates the Metrorail rapid transit system and the Metromover people mover system in Miami and Greater Miami-Dade County, Florida, United States. The network consists of two elevated Metrorail lines (Green Line and Orange Line) and three elevated Metromover lines (Brickell Loop, Inner Loop, and Omni Loop). In the third quarter of 2019, the entire system served 86,600 passengers per weekday, with 59,000 passengers riding the Metrorail and 27,600 riding the Metromover. Miami-Dade Transit operates 42 metro stations, with 23 in the Metrorail system throughout Miami-Dade County and 21 in the Metromover system within Downtown Miami. Brickell and Government Center stations serve both systems, allowing for transfers between Metrorail and Metromover lines. The initial Metrorail line opened in three segments. Service began on May 20, 1984, with the opening of the first segment, featuring 10 stations from Dadeland South station in Kendall to Historic Overtown/Lyric Theatre station in the Overtown neighborhood of Miami. On December 17, 1984, the second segment opened, expanding service to the northwest with the opening of five stations through Earlington Heights station. The third segment opened on May 19, 1985, providing service past Earlington Heights station, with an additional five stations opened through Okeechobee station in Hialeah. Since the opening of the initial line, one infill station and two extensions have been added to the Metrorail. Tri-Rail station was opened in 1989, providing a connection to the Tri-Rail commuter rail service. The line was extended in 2003, with a new northern terminus at Palmetto station in Hialeah. The AirportLink branch and Miami International Airport (MIA) station opened in 2012, and became the second station to connect with Tri-Rail. The branch split the Metrorail system into two lines: the existing service from Palmetto to Dadeland South was designated as the Green Line, and the new service from MIA to Dadeland South was designated as the Orange Line. Metromover service began on April 17, 1986, with the opening of the initial loop through the Miami Central Business District. On May 26, 1994, service expanded with the opening of the Omni Loop and Brickell Loop branches into the Arts & Entertainment District and Brickell districts, respectively. Bicentennial Park station on the Omni Loop closed in 1996 due to low ridership; it was renovated and reopened in 2013 as Museum Park station. MiamiCentral station opened in 2018, serving Brightline inter-city rail service; the station connects with Metrorail and Metromover via Historic Overtown/Lyric Theatre station and Wilkie D. Ferguson Jr. station, respectively. Metrorail stations Metromover stations See also List of Metrobus routes (Miami-Dade County) Notes References Transportation in Miami List of stations Miami-Dade Transit Miami-Dade Transit Miami-related lists Florida transportation-related lists Miami-Dade
https://en.wikipedia.org/wiki/Truecasing
Truecasing, also called capitalization recovery, capitalization correction, or case restoration, is the problem in natural language processing (NLP) of determining the proper capitalization of words where such information is unavailable. This commonly comes up due to the standard practice (in English and many other languages) of automatically capitalizing the first word of a sentence. It can also arise in badly cased or noncased text (for example, all-lowercase or all-uppercase text messages). Truecasing is unnecessary in languages whose scripts do not have a distinction between uppercase and lowercase letters. This includes all languages not written in the Latin, Greek, Cyrillic or Armenian alphabets, such as Korean, Japanese, Chinese, Thai, Hebrew, Arabic, Hindi, and Georgian. Techniques Neural network models that operate at the word level or the character level have been trained to recover capitalization with greater than 90% accuracy. Sentence segmentation can be used to determine where sentences begin, to implement the rule that the first word of every sentence must be capitalized. Part-of-speech tagging can be used to identify proper nouns (such as Africa, Jupiter, Sarah, or Amazon), which must be capitalized. In some cases, the same word can be used as different parts of speech, and is capitalized differently. For example, Xerox the company, as a noun, is capitalized, but to xerox a document, as a verb, is not capitalized. A xerox, as in the copy of a document, can be recognized by the presence of a determiner, which is not used for proper nouns. Named entity recognition can be used to identify proper nouns, which must be capitalized. A spell checker can be used to identify words that are always capitalized. Applications Truecasing aids in other NLP tasks, such as named entity recognition (NER), automatic content extraction (ACE), and machine translation. Proper capitalization allows easier detection of proper nouns, which are the starting points of NER and ACE. Some translation systems use statistical machine learning techniques, which could make use of the information contained in capitalization to increase accuracy. See also Sentence case Title case References Tasks of natural language processing
https://en.wikipedia.org/wiki/History%20of%20hypertext
Hypertext is text displayed on a computer or other electronic device with references (hyperlinks) to other text that the reader can immediately access, usually by a mouse click or keypress sequence. Early conceptions of hypertext defined it as text that could be connected by a linking system to a range of other documents that were stored outside that text. In 1934 Belgian bibliographer, Paul Otlet, developed a blueprint for links that telescoped out from hypertext electrically to allow readers to access documents, books, photographs, and so on, stored anywhere in the world. History Recorders of information have long looked for ways to categorize and compile it. There are various methods of arranging layers of references/annotations within a document. Other reference works (for example dictionaries, encyclopaedias) also developed a precursor to hypertext: the setting of certain words in small capital letters, indicating that an entry existed for that term within the same reference work. Sometimes the term would be preceded by an index, ☞like this, or an arrow, ➧like this. Janet Murray has referenced Jorge Luis Borges' "The Garden of Forking Paths" as a precursor to the hypertext novel and aesthetic: "The concept Borges described in 'The Garden of Forking Paths'—in several layers of the story, but most directly in the combination book and maze of Ts'ui Pen—is that of a novel that can be read in multiple ways, a hypertext novel. Borges described this in 1941, prior to the invention (or at least the public disclosure) of the electromagnetic digital computer. Borges also mentions how hypertext has three similarities of frued to a labyrinth in which each link brings the navigator to a set of new links, in an ever expanding maze. Not only did he invent the hypertext novel—Borges went on to describe a theory of the universe based upon the structure of such a novel." —Wardrip-Fruin and Montfort Umberto Eco has also referenced Finnegans Wake in the same way. Later, several scholars entered the scene who believed that humanity was drowning in information, causing foolish decisions and duplicating efforts among scientists. These scholars proposed or developed proto-hypertext systems predating electronic computer technology. For example, in the early 20th century, two visionaries attacked the cross-referencing problem through proposals based on labor-intensive, brute force methods. Paul Otlet proposed a proto-hypertext concept based on his monographic principle, in which all documents would be decomposed down to unique phrases stored on index cards. In the 1930s, H.G. Wells proposed the creation of a World Brain. Michael Buckland summarized the very advanced pre-World War II development of microfilm based on rapid retrieval devices, specifically the microfilm based workstation proposed by Leonard Townsend in 1938 and the microfilm and photoelectronic based selector, patented by Emanuel Goldberg in 1931. Buckland concluded: "The pre-war information retri
https://en.wikipedia.org/wiki/WOZ
WOZ, WoZ or Woz may refer to: Woz, a nickname of Steve Wozniak (born 1950), an American computer engineer who co-founded Apple, Inc. Wheels of Zeus (WoZ), a company founded by Steve Wozniak Woz Cup, the Segway Polo world championship named after Wozniak Woz U, a tech education platform launched by Wozniak Characters Woz, a character in the Japanese television series Kamen Rider Zi-O Woz, a character in the anime and manga series Eureka Seven Betty Woz, from the song Betty Woz Gone by English girl group Stooshe Television "Woz", an episode of the science fiction television series Lexx "The Woz", the first episode of the American animated television show Code Monkeys Scott the Woz, a program broadcast by the U.S. cable TV channel G4 Other uses La Woz, a cultural society of the Antillean country of Saint Lucia WOZ Die Wochenzeitung, a Swiss newspaper "Woz Not Woz", a 2004 song by Swedish DJs Eric Prydz and Steve Angello See also
https://en.wikipedia.org/wiki/Andrew%20Witkin
Andrew Paul Witkin (July 22, 1952 – September 12, 2010) was an American computer scientist who made major contributions in computer vision and computer graphics. Education Witkin studied psychology at Columbia College, Columbia University, for his bachelor's degree, and at MIT for his Ph.D supervised by Whitman A. Richards. Career After MIT, Witkin worked briefly at SRI International on computer vision. He then moved to Schlumberger's Fairchild Laboratory for Artificial Intelligence Research, later Schlumberger Palo Alto Research, where he led research in computer vision and graphics; here he invented scale-space filtering, scale-space segmentation and Active Contour Models and published several prize-winning papers. From 1988 to 1998, he was a professor of computer science, robotics, and art at Carnegie Mellon University, after which he joined Pixar in Emeryville, California. At CMU and Pixar, with his colleagues he developed the methods and simulators used to model and render natural-looking cloth, hair, water, and other complex aspects of modern computer animation. Awards and honors The paper "Snakes: Active Contour Models" achieved an honorable mention for the Marr Prize in 1987. According to CiteSeer, this paper is the 11th most cited paper ever in computer science. The 1987 paper "Constraints on deformable models: Recovering 3D shape and nonrigid motion" was also a prize winner. In 1992, Witkin and Kass were awarded the Prix Ars Electronica computer graphics award for "Reaction–Diffusion Texture Buttons." Witkin received the ACM SIGGRAPH Computer Graphics Achievement Award in 2001 "for his pioneering work in bringing a physics based approach to computer graphics." As senior scientist at Pixar, Witkin received a technical Academy Award in 2006 for "pioneering work in physically based computer-generated techniques used to simulate realistic cloth in motion pictures." Personal life Andrew Witkin was the son of psychologist Herman Witkin and geneticist Evelyn M. Witkin. He was married to psychologist Sharon Witkin; they had two children. Death He died in a scuba diving accident off the coast of Monterey, California, on September 12, 2010. The 2011 film, Cars 2 was dedicated in his memory along with Japeth Pieper in the credits. References Further reading External links 1952 births American computer scientists 2010 deaths Accidental deaths in California Columbia College (New York) alumni Massachusetts Institute of Technology School of Science alumni 20th-century American Jews Carnegie Mellon University faculty SRI International people Academy Award for Technical Achievement winners 21st-century American Jews
https://en.wikipedia.org/wiki/SmartBike%20DC
SmartBike DC was a bicycle sharing system implemented in August 2008 with 120 bicycles and 10 automated rental locations in the central business district of Washington, D.C. The network was the first of its kind in North America, but was replaced by the much larger, publicly funded Capital Bikeshare system in the fall of 2010. SmartBike DC officially ceased operations in January 2011. The program was a public-private partnership between the District of Columbia Department of Transportation and the advertising firm Clear Channel Outdoor, which operated similar automated bike rental systems in France, Norway, Sweden and Spain. The "computerized bicycle rental program" was included, at the insistence of then DC Department of Transportation (DDOT) Director Dan Tangherlini, in the city's September 2005 bus shelter contract with Clear Channel Adshel. However, it took nearly three years for the program to launch, which was near the end of Mayor Anthony Williams term. Annual operating costs of the system were funded by a combination of advertising revenues and user subscription and/or rental fees, and DC received quarterly payments based on membership dues. It included 100 bikes at 10 stations. New DDOT Director Gabe Klein came into office four months after the program launched eager to expand it, but found the private partner had a "lackluster commitment." The agreement specifically prohibited DDOT from paying for anything related to SmartBike, so an expansion required DDOT to renegotiate the contract. In his first meeting with Clear Channel he found that Clear Channel believed they had gotten a bad deal on the original bus shelter contract, that following their purchase by Bain Capital they were no longer interested in “municipal street furniture” and that they had neither desire nor obligation to expand the program. In addition the technology was already dated. Each dock had to be hard-wired to the electrical grid, requiring coordination with the power company and digging at each location. Installation took nine months. Meanwhile, new solar powered systems that could be installed in a day - and moved as needed - were coming on the market. As a result, Klein chose to fold the program and instead partner with Arlington County, VA to build the regional bikesharing program Capital Bikeshare. A few months after Capital Bikeshare started in late 2010, Smart Bike DC ceased operations. Afterwards, the bikes were donated by ClearChannel to a Baltimore charity, the stations were removed in April of 2011 at ClearChannel's expense and the contract was modified to remove all references to SmartBike. Once closure was guaranteed, the program was criticized by The Washington City Paper for its low usage and limited number of bike stations. Despite this, the program is considered a success by others as it provided proof of concept for its improved and vastly expanded replacement, Capital Bikeshare, as well as other bikeshare systems across the nation. It also all
https://en.wikipedia.org/wiki/Vespella%20de%20Gai%C3%A0
Vespella de Gaià is a municipality in the province of Tarragona, Catalonia, Spain. The parish church is in Romanesque style, and houses a 1579 retablo. References External links Government data pages Municipalities in Tarragonès Populated places in Tarragonès
https://en.wikipedia.org/wiki/JVx%20%28Framework%29
JVx Framework (or JVx - Enterprise Application Framework) is an open source software framework for the Java platform. JVx facilitates the development of professional and efficient database applications, in a short time and using little source code. The framework's architecture is based on the multitier architecture model for the development of software systems. Building on a three-tier architecture and following the dependency inversion principle JVx allows for easy development of efficiently maintained applications. The framework provides full support for all tiers. A database, or alternatives such as the file system, can be used as data tier. The application tier is provided via an integrated communication server. This server supports the administration of sessions and the application logic. The presentation tier is technology-independent and can be used with various technologies, such as Swing, SWT, Vaadin, etc. Goals JVx aims to save developers time so that they can focus their efforts on application-specific tasks. Technological hurdles are cleared by the framework. Less time is spent on simple tasks, such as the creation of templates for master data. JVx reduces the overall development effort by providing solutions for repetitive tasks. Functionality JVx offers the following features, among others: Automatic list boxes based on the database model Generic and technology-independent user interface Uniform active model for all GUI components Data and database independence Data is not loaded until it is accessed (lazy loading) Server side session and object management Internationalization at the component level Complete application framework Synchronous and asynchronous communication Communication using client and server actions Up- und download of data/files Integrated picture management Implementations For the presentation layer (client) the following implementations exist Swing (Application, Applet Java Web Start – JNLP) JavaFX Headless Vaadin react Flutter (native) Enhancements Several enhancements exist for JVx that result in a high level of comfort for use in enterprise applications. These include: Vaadin based online help JVxEE for usage with JPA and Java EE AddOns for use with Android JVx connector for usage with Vert.x See also Rich web application Java (programming language) libraries Widget toolkits Web frameworks
https://en.wikipedia.org/wiki/Angel%20Porrino
Angel Porrino (born May 6, 1989) is an American television personality, actress, dancer and showgirl, best known for appearing on the E! network's reality television show Holly's World as Holly Madison's personal assistant/best friend. She was one of the stars of Absinthe at Caesars Palace, leaving the show in 2014. Early life Porrino grew up in Las Vegas. In her youth, she studied modern dance at Preston's Class Act Dance and Gymnastics and Dance Fx of Las Vegas until she was a freshman in high school. She attended Mountain View Christian School where she was a cheerleader and became student body president. Personal life She first met Holly Madison (then one of Hugh Hefner's girlfriends) in 2007 when Porrino went to Los Angeles, California, to test for Playboy, as depicted on the television show The Girls Next Door. She was not signed as a Playmate, but her friendship with Madison remained, and she appeared on The Girls Next Door show again in 2008, the only girl there who did not appear in the magazine. She and her son Roman (born in 2009) lived in Madison's house in Las Vegas as of 2010. Porrino briefly mentioned in Holly's World that she was married to Roman's father, but they later divorced. For Porrino's 21st birthday, Madison paid for Porrino to undergo surgery in order to enlarge her breasts, reportedly up to three cup sizes larger. Career For one week from September 13–19, 2010, Porrino substituted for Madison as Bo Peep in the lead role of Peepshow, a production show at Planet Hollywood Resort and Casino. The show's producers then signed Porrino to a contract under which she filled in for Madison in the lead role for nine weeks during 2011. Porrino returned to the lead role in Peepshow temporarily in 2012 after Madison left the show during her pregnancy. On April 19, 2011, Porrino debuted a starring role in Spiegelworld's show Absinthe, a carnival burlesque themed show at Caesars Palace, Las Vegas. Porrino also appeared in the music video "Bad" by The Cab. References External links Instagram Living people 1989 births People from the Las Vegas Valley Participants in American reality television series
https://en.wikipedia.org/wiki/Malice%40Doll
Malice@Doll is a 2001 Japanese computer generated original video animation directed by Keitarou Motonaga and written by Chiaki Konaka. Plot Prior to the film, an apocalyptic event eradicated all of humanity from the world. The only animate things left in the world are machines, who continue their programmed tasks as they slowly deteriorate. Among these machines is Malice, a Doll (prostitute robot) who resides in a derelict red-light district with her fellow Dolls and continues looking for clients. Her other friends include Joe Administrator/Joe Admin (a robot governing the area), Freddy (a cleaning robot), and Meliza Piper (a plumbing robot). After having a “dream” of a bouncing ball, dismissed as a memory replaying from Malice's memory banks, Malice goes looking for clients. Upon discovering her damage, Joe Admin sends Malice to the repairer residing in an upper area, warning her that Devo Leukocyte, a former bodyguard unit, had forgotten his original programming and became hostile to anything it crosses. After narrowly escaping Leukocyte (with the help of Meliza), Malice happens upon an area she never saw before and is guided by a little spectral girl holding a ball to a room containing a large, stone-like structure/machine. Upon speaking to the machine, a tentacle-like monster bursts out of it and brutally assaults Malice, causing her to black out as the spectral girl watches. Malice awakens in her room, shocked to find that she has become human. Though enjoying her newfound humanity initially, Joe Admin rejects her, upsetting her enough to run away. However, the Leukocyte attacks Malice, defeating Joe Admin when he tries to rescue her. Malice hides with the help of Meliza but accidentally gives away their position, causing the Leukocyte to bisect Meliza. Heartbroken, Malice kisses Meliza, causing the latter to revive and mutate into a monster that defeats Leukocyte (at the cost of her own life). An encounter with the repairer unit she originally sought out upsets Malice even further, causing her to return to the red-light district to seek comfort with her fellow Dolls. However, she is shunned and flees back to her room, where she hallucinates about her life as a prostitute. Horrified by the visions, she's comforted by Heather, a fellow Doll who usually teases Malice. After a conversation, Malice kisses Heather, resulting in Heather mutating and becoming alive like Meliza. Malice and Heather spread the infection to all the machines in the area, their intent to bring happiness to the despairing machines. The only one to resist the temptation is Joe Admin, who shows Malice the result of her actions, namely, the pain and perverted madness within the hosts of the infection. Malice is led from her room by the little ghost girl again, only to find Heather dying in an alley. Heather professes her affection for Malice before passing on. With Joe Admin by her side, Malice resolves to return to the room with the tentacle monster. Upon reaching t
https://en.wikipedia.org/wiki/Flask%20%28web%20framework%29
Flask is a micro web framework written in Python. It is classified as a microframework because it does not require particular tools or libraries. It has no database abstraction layer, form validation, or any other components where pre-existing third-party libraries provide common functions. However, Flask supports extensions that can add application features as if they were implemented in Flask itself. Extensions exist for object-relational mappers, form validation, upload handling, various open authentication technologies and several common framework related tools. Applications that use the Flask framework include Pinterest and LinkedIn. History Flask was created by Armin Ronacher of Pocoo, an international group of Python enthusiasts formed in 2004. According to Ronacher, the idea was originally an April Fool's joke that was popular enough to make into a serious application. The name is a play on the earlier Bottle framework. When Ronacher and Georg Brandl created a bulletin board system written in Python in 2004, the Pocoo projects Werkzeug and Jinja were developed. In April 2016, the Pocoo team was disbanded and development of Flask and related libraries passed to the newly formed Pallets project. Since 2018, Flask-related data and objects can be rendered with Bootstrap. Flask has become popular among Python enthusiasts. , it has the second-most number of stars on GitHub among Python web-development frameworks, only slightly behind Django, and was voted the most popular web framework in the Python Developers Survey for years between and including 2018 and 2022. Components The microframework Flask is part of the Pallets Projects (formerly Pocoo), and based on several others of them, all under a BSD license. Werkzeug Werkzeug (German for "tool") is a utility library for the Python programming language for Web Server Gateway Interface (WSGI) applications. Werkzeug can instantiate objects for request, response, and utility functions. It can be used as the basis for a custom software framework and supports Python 2.7 and 3.5 and later. Jinja Jinja, also by Ronacher, is a template engine for the Python programming language. Similar to the Django web framework, it handles templates in a sandbox. MarkupSafe MarkupSafe is a string handling library for the Python programming language. The eponymous MarkupSafe type extends the Python string type and marks its contents as "safe"; combining MarkupSafe with regular strings automatically escapes the unmarked strings, while avoiding double escaping of already marked strings. ItsDangerous ItsDangerous is a safe data serialization library for the Python programming language. It is used to store the session of a Flask application in a cookie without allowing users to tamper with the session contents. Features Development server and debugger Integrated support for unit testing RESTful request dispatching Uses Jinja templating Support for secure cookies (client side sessions) 100% WSGI 1.0
https://en.wikipedia.org/wiki/Acornsoft%20LISP
Acornsoft LISP (marketed simply as LISP) is a dialect and commercial implementation of the Lisp programming language, released in the early 1980s for the 8-bit Acorn Atom, BBC Micro and Acorn Electron computers. History The interpreter was implemented in 6502 machine-code and was 5.5K in size. It was based on Owl LISP written by Mike Gardner of Owl Computers, which he published for the Apple II in 1979. Acornsoft licensed it from Owl Computers in 1981 and developed it for the Acorn Atom and BBC Microcomputer. Acornsoft LISP was released on cassette, disk and ROM cartridge. The ROM cartridge version had instantaneous loading as well as a greater amount of available free RAM for user definitions. Design In contrast with large-scale LISP implementations, Acornsoft's variant only had a modest number of built-in definitions as it had to fit in the limited memory space of the 8-bit Acorn computers. The supplied LISP workspace image containing commonly used built-in functions and constants was 3K in size, although this could be deleted if not needed by the user to free up more memory. Supported datatypes included nested lists, 16-bit signed integers and strings up to 127 characters in length. LOOP, WHILE and UNTIL keywords were available for program control. A route-finding demo program was supplied as standard with the interpreter. The program can be loaded with the command (LOAD 'ROUTE-M) and tested by typing (ROUTE-M 'OXFORD 'CAMBRIDGE) which for example will display the output (85 CAMBRIDGE BEDFORD WATFORD OXFORD) thus showing the total mileage of the shortest possible route and listing intermediate towns visited. Documentation Acornsoft also commissioned a book "LISP on the BBC Microcomputer", by Arthur Norman and Gillian Cattell, published in 1983. Arthur Norman was a lecturer in computer science at Cambridge University, and Gillian Cattell did research into LISP at Cambridge. The book was sold separately from the software and contained examples illustrating use of the Acornsoft specific features such as the VDU function allowing for machine-specific graphics capabilities. The book also contained working examples including a tree-sorting program, an arbitrary arithmetic package, an animal guessing game, a route finding program, a graphics package, a simple compiler and an adventure game. Acornsoft LISP was reportedly the basis for MetaComCo's QL Lisp product, with Arthur Norman and John Fitch being credited as authors. As a reference, the Acornsoft book by Norman and Cattell was recommended for use with the MetaComCo product. References External links Short discussion of Acornsoft LISP on comp.lang.lisp Acornsoft LISP screenshots, cover art and a list of built-in functions on acornelectron.co.uk Acornsoft LISP at Rosetta Code Lisp (programming language) Acorn Computers
https://en.wikipedia.org/wiki/AUSCANNZUKUS
AUSCANNZUKUS is an abbreviation for the naval Command, Control, Communications and Computers (C4) interoperability organization involving the Anglosphere nations of Australia, Canada, New Zealand, the United Kingdom, and the United States. It is also used as security caveat in the UKUSA Community, where it is also known as "Five Eyes." Objectives, strategies and guiding principles The organization's vision and mission, objectives, strategies and guiding principles, and Structure are presented on the AUSCANNZUKUS Information Portal. Objectives To achieve internal sharing and understanding of Maritime C4 knowledge. To produce products and processes to achieve Maritime C4 interoperability. To increase external sharing and understanding of AUSCANNZUKUS. Strategies Establish C4 policy and standards. Identify C4 interoperability requirements and risks. Identify, develop and utilize new technologies. Exchange information on national C4 capabilities, plans, and projects. To improve national awareness of AUSCANNZUKUS. Leverage exercises, experiments and demonstrations to deliver capability. Inform and influence multi national defence fora. Guiding principles The focus of all activities is to be on the requirements of the naval warfighter. All knowledge-sharing initiatives are to aim at providing innovative options, which are affordable to all AUSCANNZUKUS navies. All relevant information is to be shared with appropriate joint and combined organizations. Structure The current AUSCANNZUKUS organization consists of the supervisory board, C4 Committee, and various other subordinate groups. History Early in World War II communications interoperability between Allied forces was poor. During March 1941 the first high-level proposals to formally structure combined operations between the United States and the United Kingdom were considered; these discussions were the genesis of the current Combined Communications Electronics Board (CCEB). The origins of the AUSCANNZUKUS organization arose from dialogue between Admiral Arleigh Burke, USN, and Admiral Lord Louis Mountbatten, RN, in 1960. Their intention was to align naval communications policies and prevent, or at least limit, any barriers to interoperability, with the imminent introduction of sophisticated new communications equipment. AUSCANNZUKUS matured to the current five-nation organization in 1980 when New Zealand became a full member. The organization's remit has expanded over the years, and its mission now includes fostering knowledge sharing and C4 interoperability between the navies of the five nations in order to increase operational effectiveness. Related organizations AUSCANNZUKUS liaises closely with Washington-based management groups of the Combined Communications Electronics Board (CCEB), Multinational Interoperability Council (MIC), American, British, Canadian, Australian and New Zealand Armies' Interoperability Program (ABCANZ Armies), Air and Space Interoperability Council (ASIC (Air Fo
https://en.wikipedia.org/wiki/MyPaint
MyPaint is a free and open-source raster graphics editor for digital painting. It is available for Windows, macOS, and Unix-like operating systems. History MyPaint versions up to 1.00 and bug/issue tracking were hosted by Gna!. MyPaint uses graphical control elements from GTK and, since 1.2.0, uses GTK 3. In 2020 MyPaint 2.0.0 release succeeds MyPaint 1.2, released back in 2017, and brings a stack of new features and improved tools with it. Features Among MyPaint's capabilities are: Pressure-sensitive graphics tablet support Dynamic brush library, standalone for integration into third-party applications Layer management Simple interface Gamut masking color wheel "Unlimited" canvas not requiring predetermination of image size Symmetry Modes Python 3 support Integrated bug reporting Supports graphics tablets made by Wacom, and similar devices libmypaint MyPaint has a custom procedural brush engine optimized for use with pressure-sensitive graphics tablets. In later MyPaint versions, the engine was broken out into the separately maintained libmypaint library to make it easier to integrate into other applications. MyPaint's brush library is available as a Krita plugin, and also GIMP has support for MyPaint brushes by default. Media attention MyPaint was used by David Revoy, the art director of Sintel (the third computer-animated film by the Blender Foundation). Native file format The Adobe PSD file format changed its license in 2006, and it is now only permitted to develop applications using it in order to interact with Adobe software. As a result, a comprehensive graphics design format, OpenRaster, was developed based on the Open Document format. MyPaint uses Open Raster as its default format, but also supports saving images to PNG or JPEG. References External links 2005 software Free raster graphics editors Free software programmed in C++ Free software programmed in Python Graphics software that uses GTK Raster graphics editors for Linux
https://en.wikipedia.org/wiki/HTC%20HD7
The HTC HD7 (also known as the HTC Schubert, HTC HD3), is a smartphone running the Windows Phone OS operating system. The phone was designed and manufactured by HTC. It is the successor to the HTC HD2, and it has a special variant which is the HTC HD7S. Description The HTC HD7 was announced at the Windows Phone event in New York City on 11 October 2010. Leaked photographs prior to the launch of the HD7 indicated that the HD7 was originally named the HD3. It is possible that HTC changed the name of the product before launch so as to tie in with the Windows Phone brand. Also announced March 2011, was the HD7S, which is largely identical, but with a Super LCD screen. The HD7 shares nearly all its specifications with its older Windows Mobile 6.5-running brother, the HD2, including the screen resolution and size (109 mm diagonal and WVGA 800x480 resolution). HTC HD7S The HTC HD7S is a special variation of the HTC HD7 available exclusively to AT&T. Unlike the original HTC HD7 which has a TFT-LCD, the HTC HD7S has Super-LCD screen. The HTC HD7S's Super LCD screen is brighter and more vivid than the original TFT-LCD screen on the HD7. See also Windows Phone HTC HD2 – The predecessor of the HD7, with mostly similar specifications. HTC Touch HD – The predecessor of the HD2. HTC HD Mini – A miniature of the HD2. HTC Touch HTC Touch family HTC Titan – the successor of the HD7. References External links Official HTC HD7 homepage Microsofts Windows Phone 7 Device Overview HD7 Users Group HD7 Forums on XDA-Developers.com Review HTC HD7 on TheINQUIRER.net Review HTC HD7 on engadget.com Review HTC HD7 on techradar.com Review HTC HD7 on V3.co.uk Windows Phone devices HTC smartphones Mobile phones introduced in 2010 Mobile phones with user-replaceable battery
https://en.wikipedia.org/wiki/Bonbon%20%28mobile%20phone%20operator%29
Bonbon (usually stylised as bonbon, in lowercase) is a mobile network operator based in Croatia. It operates as a mobile virtual network operator using the T-Mobile network. It is owned by T-Hrvatski Telekom (T-HT) and was launched on 1 October 2010. Summary Bonbon offers exclusively prepaid SIM cards and Internet SIM cards. In October 2011, the number of mobile network customers reached more than 300,000. Bonbon was the first network in Croatia not to have a call setup fee. It differs from other conventional mobile phone operators by not having standardized tariffs but instead lets the users choose the specific combination of voice, SMS and data packages. It presents itself as an on-line brand, with customer service operating exclusively via social networks. History (2010 – present) Bonbon commenced operations on 1 October 2010, as a mobile virtual network operator using the T-Mobile network. The name bonbon probably originated from the Croatian word for a top-up card (bon). The name also resembles the Croatian word for candy – bombon. Although the correct number of users is widely unknown, in October 2011 the company announced that the number of customers topped 100,000 and in January 2015 they announced over their Facebook page that they had reached more than 200.000 subscribers. Products and services SIM card The SIM card is the main product. It supports all standard 2G, 3G and LTE services. The SIM card can be acquired in two ways: by purchasing one at the newsstand or ordering one from the bonbon website. As bonbon uses the T-Mobile network, the SIM can function only with mobile phones that are either unlocked or locked to the T-Mobile network. Bonbon is known to offer the smallest top-up card on the market for 10 kunas. Internet SIM card The Internet SIM card can be acquired exclusively on Bonbon’s web shop. It automatically activates once the user starts using it. It allows the user to send and receive SMSs but does not permit voice calls. Services One of the specific and unique features of bonbon is the fact that it does not have standardized tariffs, but instead, lets the users choose the specific combination and quantity of voice, SMS and data packages. It introduced this feature on 15 February 2011. Bonbon was also the first network in Croatia not to have a call setup fee. Bonbon is the only network that permits users the possibility of choosing their own number. In May 2012 it became the first network to allow money transfers from one bonbon account to another, free of charge. The bonbon web shop is the main channel of distribution and one of the main communication channels. Customer service Bonbon’s customer service maintains a permanent on-line presence and can be reached at all times. It relies on members of the service team to provide timely answers to questions raised by users. The customer service consists of a team of approximately 30 people that are on-line 0-24 and can be reached through social media channels – Face
https://en.wikipedia.org/wiki/Immutable%20interface
In object-oriented programming, "immutable interface" is a pattern for designing an immutable object. The immutable interface pattern involves defining a type which does not provide any methods which mutate state. Objects which are referenced by that type are not seen to have any mutable state, and appear immutable. Example Java Consider a Java class which represents a two-dimensional point. public class Point2D { private int x; private int y; public Point2D(int x, int y) { this.x = x; this.y = y; } public int getX() { return this.x; } public int getY() { return this.y; } public void setX(int newX) { this.x = newX; } public void setY(int newY) { this.y = newY; } } The class Point2D is mutable: its state can be changed after construction, by invoking either of the setter methods (setX() or setY()). An immutable interface for Point2D could be defined as: public interface ImmutablePoint2D { public int getX(); public int getY(); } By making Point2D implement ImmutablePoint2D, client code could now reference a type which does not have mutating methods, and thus appears immutable. This is demonstrated in the following example: ImmutablePoint2D point = new Point2D(0,0); // a concrete instance of Point2D is referenced by the immutable interface int x = point.getX(); // valid method call int y = point.setX(42); // compile error: the method setX() does not exist on type ImmutablePoint2D By referencing only the immutable interface, it is not valid to call a method which mutates the state of the concrete object. Advantages Clearly communicates the immutable intent of the type. Unlike types implementing the Immutable Wrapper pattern, does not need to "cancel out" mutating methods by issuing a "No Operation" instruction, or throwing a runtime exception when a mutating method is invoked. Disadvantages It is possible for instances referenced by the immutable interface type to be cast to their concrete, mutable type, and have their state mutated. For example:public void mutate(ImmutablePoint2D point) { ((Point2D)point).setX(42); // this call is legal, since the type has // been converted to the mutable Point2D class } Concrete classes have to explicitly declare they implement the immutable interface. This may not be possible if the concrete class "belongs to" third-party code, for instance, if it is contained within a library. The object is not really immutable and hence not suitable for use in data structures relying on immutability like hash maps. And the object could be modified concurrently from the "mutable side". Some compiler optimizations available for immutable objects might not be available for mutable objects. Alternatives An alternative to the immutable interface pattern is the immutable wrapper pattern. Persistent data structures are effectively immutable while allowing modified views of themselves. References Object-oriented programming Articles with exa
https://en.wikipedia.org/wiki/List%20of%20Gaon%20Digital%20Chart%20number%20ones%20of%202010
The Gaon Digital Chart is a chart that ranks the best-performing singles in South Korea. Managed by the domestic Ministry of Culture, Sports and Tourism (MCST). Its data is compiled by the Korea Music Content Industry Association and published by the Gaon Music Chart. The ranking is based collectively on each single's weekly download sales, stream count, and background music usage. In mid-2008, the Recording Industry Association of Korea ceased publishing music sales data. The MCST established a process to collect music sales in 2009, and began publicly publishing its data with the introduction of the Gaon Music Chart the following February. With the creation of the Gaon Digital Chart, digital data for individual songs was provided in the country for the first time. In 2010, 35 singles claimed the top spot in 52 weeks of rankings. Gain and Jo Kwon's collaboration "We Fell in Love" became the first song to top the Digital Chart, doing so for three consecutive weeks. "Bad Girl Good Girl" by Miss A, the quartet's debut single, spent four consecutive weeks at number one on the Gaon Digital Chart. It went on to become the best-performing single of 2010, topping the year-end chart. Girls' Generation topped the chart with three different songs, more than any other act. On the monthly chart, Girls' Generation and IU had the most number-one singles, with two each. 2AM logged the most entries on the year-end chart, with five songs ranking in the top 100. "Can't Let You Go Even If I Die" was the most-downloaded song with 3,352,827 in sales. Weekly chart Monthly charts References External links Digital Chart at Gaon Music Chart 2010 singles Korea, South singles 2010 in South Korean music
https://en.wikipedia.org/wiki/Mel%20B%3A%20It%27s%20a%20Scary%20World
Mel B: It's a Scary World is an American reality television series starring English singer Mel B. It debuted on Style Network on September 5, 2010. The show's title is a play on Brown's nickname from when she was part of the Spice Girls, "Scary Spice". Series background The series follows the life of British singer/actress/television personality Mel B and her blended family as they deal with Brown's daily life as entertainer, businesswoman, wife and mother. The series is being done in a hybrid docu-comedy type format. Cast The family Mel B - (Stephen's wife at the time),Phoenix, Angel and Madison's mother, stepmother to Giselle; Well known singer. Stephen Belafonte - Melanie's husband/business manager (at the time); father to Madison and Giselle, stepfather to Phoenix and Angel. Phoenix Chi Gulzar - Melanie's first daughter. Angel Iris Murphy Brown - Melanie's second daughter. Giselle Belafonte - Stephen's daughter from a previous relationship and Melanie's step-daughter. Celebrity guest stars Robin Antin The Pussycat Dolls (burlesque revue) Eddie Murphy Damon Elliott Ludacris Kim Kardashian Jay Sean Natasha Bedingfield Critical reception In an interview with the Futon Critic, Brown notes that what viewers will see is what they really do in real life everyday: "I have a job and my husband has a job so they were just following us around. It's not like we had to make anything up or we had to act. It was actually quite easy, to be honest. The kids thoroughly enjoyed it. It was just a very natural thing to do." However, Media Life television critic Tom Conroy had a different take on the show: "Anyone who watches "Mel B: It's a Scary World" will wish Mel the best of luck in her quest to add something memorable to her résumé, but this show isn't it." Episodes Season 1: 2010 References External links 2010 American television series debuts 2010s American reality television series 2010 American television series endings Television series based on singers and musicians English-language television shows Style Network original programming Mel B
https://en.wikipedia.org/wiki/Cycle%20sort
Cycle sort is an in-place, unstable sorting algorithm, a comparison sort that is theoretically optimal in terms of the total number of writes to the original array, unlike any other in-place sorting algorithm. It is based on the idea that the permutation to be sorted can be factored into cycles, which can individually be rotated to give a sorted result. Unlike nearly every other sort, items are never written elsewhere in the array simply to push them out of the way of the action. Each value is either written zero times, if it's already in its correct position, or written one time to its correct position. This matches the minimal number of overwrites required for a completed in-place sort. Minimizing the number of writes is useful when making writes to some huge data set is very expensive, such as with EEPROMs like Flash memory where each write reduces the lifespan of the memory. Algorithm To illustrate the idea of cycle sort, consider a list with distinct elements. Given an element , we can find the index at which it will occur in the sorted list by simply counting the number of elements in the entire list that are smaller than . Now If the element is already at the correct position, do nothing. If it is not, we will write it to its intended position. That position is inhabited by a different element , which we then have to move to its correct position. This process of displacing elements to their correct positions continues until an element is moved to the original position of . This completes a cycle. Repeating this process for every element sorts the list, with a single writing operation if and only if an element is not already at its correct position. While computing the correct positions takes time for every single element, thus resulting in a quadratic time algorithm, the number of writing operations is minimized. Implementation To create a working implementation from the above outline, two issues need to be addressed: When computing the correct positions, we have to make sure not to double-count the first element of the cycle. If there are duplicate elements present, when we try to move an element to its correct position, that position might already be inhabited by an . Simply swapping these would cause the algorithm to cycle indefinitely. Instead, we have to insert the element after any of its duplicates. The following Python implementation performs cycle sort on an array, counting the number of writes to that array that were needed to sort it. Python def cycle_sort(array) -> int: """Sort an array in place and return the number of writes.""" writes = 0 # Loop through the array to find cycles to rotate. # Note that the last item will already be sorted after the first n-1 cycles. for cycle_start in range(0, len(array) - 1): item = array[cycle_start] # Find where to put the item. pos = cycle_start for i in range(cycle_start + 1, len(array)): if array[i] < item
https://en.wikipedia.org/wiki/SFOS
SFOS may refer to: Sailfish OS, the Linux MeeGo Sailfish Operating System School of Fisheries and Ocean Sciences
https://en.wikipedia.org/wiki/Samsung%20Kies
Samsung Kies () is a freeware software application used to communicate between Windows or Macintosh operating systems, and recently manufactured Samsung mobile phone and tablet computer devices, usually using a USB connection (though wireless LAN Kies connectivity is now possible using some devices). Samsung has released new software to replace Kies, named Samsung Smart Switch, which is mainly directed at migrating customers onto new Samsung devices. The name K.I.E.S. originated as an acronym for "Key Intuitive Easy System". After version 2.0, the name was shortened to "Kies". Versions Kies is available in several versions and editions, depending on the specific Samsung device and the OS it is running. Kies (currently in version 2.6.4.20043_5) supports devices with Android 2.1 through 4.2. Kies3 (version 3.x) supports devices with Android Jelly Bean (4.3 and up). Trying to use Kies with newer devices, or Kies3 with older devices results in an error message. There is also a Kies Mini version, which is available only for specific devices such as Samsung Captivate, Infuse, or Vibrant. It is used to update these devices' operating systems (OS versions). Though there are both Windows and Macintosh versions of the full Kies product, there is only a Windows version of Kies Mini for most Samsung devices; however, non-Windows users may overcome this limitation by using a Windows virtual machine, installing Kies Mini within it and connecting a Samsung device via USB cable to accomplish the OS update. On Windows devices, the file transfer happens via a plug-and-play mode. Since 2012, Intel processors mounted the Cache Acceleration Software, which was tuned by system administrators when connected with SSD cards. Although Kies connectivity has traditionally been via mini or micro-USB cable (needing some software, and not plug and play), wireless LAN connectivity between a Samsung device on which the Kies Wireless Android app is running, and any Windows or Macintosh computer running the Kies full version, is now also possible. The Kies Wireless app also supports wireless connectivity with other devices via the other devices' web browsers. All such connectivity, though, must be via a local Wi-Fi connection (and not via cellular 2G, 3G, or 4G data networks) wherein all involved devices are on the same Wi-Fi LAN. The full version of Kies may be downloaded from the Samsung Global Download Center or from the download part of an individual mobile device's technical support web page on the Samsung website. With few exceptions, it is only the Kies Mini version, and not the full version, that is downloadable from a given Samsung device. Smart Switch is part of a technical and commercial strategy finalized to connect all electronics in a unique semi-automation system, which is managed via a smartphone central app of Samsung. Alternative software Since 2012, most of the Intel product line mounted the Cache Acceleration Software, both as an accelerator and
https://en.wikipedia.org/wiki/L.%20V.%20Prasad%20Eye%20Institute
The L V Prasad Eye Institute (LVPEI) is an eye-care network, established by Dr. Gullapalli Nageswara Rao, an ophthalmologist, at Hyderabad, in 1986. It is a non-profit, multi-campus, non-governmental institution. With more than 275 eye-care centres in India, it is the largest eye-care network in the world. LVPEI is a World Health Organization (WHO) collaborating centre, and an affiliate hospital of Harvard Medical School. It is the first eye hospital to be accredited by the National Accreditation Board for Hospitals & Healthcare Providers (NABH). Establishment Established in 1986, L V Prasad Eye Institute (LVPEI), a World Health Organization Collaborating Centre for Prevention of Blindness, is a comprehensive eye health facility. The institute has ten active arms to its areas of operations: Clinical Services, Education, Research, Vision Rehabilitation, Rural and Community Eye Health, Eye Banking, Advocacy and Policy Planning, Capacity Building, Innovation and Product Development. LVPEI is managed by two not-for-profit entities – Hyderabad Eye Institute (HEI) and Hyderabad Eye Research Foundation (HERF). The beginning, before the brick and mortar of the institute, the renowned Indian film-maker Sri Akkineni Lakshmi Vara Prasad Rao, popularly known as L V Prasad, decided to invest a part of the profits of his blockbuster film Ek Duuje Ke Liye for a worthy cause. He donated rupees one crore and five acres of land for establishing the state-of-the-art Eye Institute. In recognition of this gesture, the board of the institute decided to name the institute after him. Over the years, his family has continued to support the institute's work. His son, Mr Ramesh Prasad, managing director of Prasad Film Laboratories, is a founder trustee of LVPEI and is the longest serving member of the Hyderabad Eye Institute's governing board, along with Dr Rao. It has maintained its tradition of naming its centres and facilities after its benefactors. Among its notable benefactors and donors are several corporate such as Infosys, Microsoft, State Bank of India, Standard Chartered, ICICI, Aditya Birla Group, Dalmia Group, Bajaj Group, Sun Pharma, Natco Pharma, NALCO. Active areas of operation Clinical Services LVPEI has served nearly 34.14 million (3.4 crore) people, with over 50% of them entirely free of cost, irrespective of the complexity of care needed, done over 1.93 million surgeries, trained over 55,000 ophthalmologists and optometrists. The institute offers rehabilitation services for persons with visually impairment, and in 2018 it inaugurated a 'Special Needs Vision Clinic' to provide eye care to children with developmental delays and disabilities. Education and Research Scientists from L V Prasad Eye Institute are listed amongst the world's top 2% by Stanford University. It is an affiliate hospital of Harvard Medical School.It has academic and research linkages with Massachusetts Institute of Technology, BITS Pilani, IIM Ahmedabad, IIT Hyderabad, Univ
https://en.wikipedia.org/wiki/Koreana%20%28TV%20series%29
Koreana (International title: Jenna / ) is a Philippine television drama series broadcast by GMA Network. Directed by Gil Tejada Jr., it stars Kris Bernal in the title role. It premiered on October 11, 2010 on the network's Haponalo line up. The series concluded on February 25, 2011 with a total of 100 episodes. It was replaced by My Lover, My Wife in its timeslot. The series is streaming online on YouTube. Cast and characters Lead cast Kris Bernal as Jennifer "Jenny" Jung / Jenna Bartolome Jung Supporting cast Rocco Nacino as Benjamin "Benjo" Bautista Jr. Eddie Garcia as Chang Hee Jung Eula Valdez as Violeta Jung / Violeta Salcedo Angelu de Leon as Nerissa Jung Saab Magalona as Ivy Jung Steven Silva as Joshua Lee Lotlot de Leon as Josefina Bartolome Sylvia Sanchez as Sandra Rosales Joyce Ching as Amy Shin Luigi Revilla as Jess Romano Marco Morales as Phillip Jung Catherine Kiok Lay as Cathy Ryza Cenon as Darlene Roces Gladys Guevarra as Ada Irene Lee as Louise Min Julienne Rosalio as Bebeng Dennis Roque as Larry Go Sarah Lahbati as Tamara Lee Janna Victoria as Maribel "Bel" Torres Mike Lloren as Melchor Dex Quindoza as Wen Ratings According to AGB Nielsen Philippines' Mega Manila People/Individual television ratings, the pilot episode of Koreana earned a 5.9% rating. While the final episode scored a 10.5% rating. Accolades References External links 2010 Philippine television series debuts 2011 Philippine television series endings Filipino-language television shows GMA Network drama series Television shows set in the Philippines
https://en.wikipedia.org/wiki/Minds%20and%20Machines
Minds and Machines is a peer-reviewed academic journal covering artificial intelligence, philosophy, and cognitive science. The journal was established in 1991 with James Henry Fetzer as founding editor-in-chief. It was published by Kluwer Academic Publishers but was taken over by Springer in 2021 (Springer Science+Business Media). Affiliated with the Society for Machines and Mentality, a special interest group within the International Association for Computing and Philosophy. The current editor-in-chief is Mariarosaria Taddeo (University of Oxford). Editors Previous editors-in-chief of the journal have been James H. Fetzer (1991–2000), James H. Moor (2001–2010), and Gregory Wheeler (2011–2016). Abstracting and indexing The journal is abstracted and indexed by the following services: According to the Journal Citation Reports, the journal has a 2016 impact factor of 0.514. Article categories The journal publishes articles in the categories Research articles, Reviews, Critical and discussion exchanges (debates), Letters to the Editor, and Book reviews. Frequently cited articles According to the Web of Science, the following five articles have been cited most frequently: References External links Springer Science+Business Media academic journals Quarterly journals Computer science journals Philosophy of mind journals Academic journals established in 1991 English-language journals 1991 establishments in the United States
https://en.wikipedia.org/wiki/List%20of%20cities%20in%20Oregon
Oregon is a state located in the Western United States. All population data is based on the 2020 census and 2010 census and the Census Bureau's annual estimates. All area data is based on the 2010 US Gazetteer files. There are 241 municipalities. List of incorporated cities ranked by population Former cities Cities that have disincorporated. Albina Beaver Hill Damascus (Damascus' disincorporation was reversed as of 2019, then restored in 2020) East Portland Freewater Glenada Hammond Juntura Lemati Linnton Milton Orenco Rajneeshpuram St. Johns Sellwood Vanport West Salem Willamette Winchester See also List of counties in Oregon List of census-designated places in Oregon List of ghost towns in Oregon References Oregon Oregon Cities cs:Seznam měst v Oregonu de:Liste der Städte in Oregon fr:Liste des villes de l'Oregon io:Listo di urbi en Oregon id:Daftar kota di Oregon it:Lista delle città dell'Oregon pt:Anexo:Lista de cidades do Oregon vi:Danh sách các thành phố và các cộng đồng chưa hợp nhất tại Oregon
https://en.wikipedia.org/wiki/Kaimri%2C%20Hisar
Kaimri is a village in Hisar tehsil and district in the Indian state of Haryana. History According to the data maintained by the Government of India's Department of Statistics, the Govt Primary School Kaimri was established in 1943, which was upgraded to a high school in 1967 and to senior secondary school in 1997. Occupation Main occupation of people is agriculture and government/private jobs. Some villagers are employed in government services and many people are doing private jobs. Transport Kaimri is connected to nearby villages through the road network with presence of State Transport Service and Private Bus Services which link it to Amardeep colony and beyond to Hisar. Geography Kaimri is located at Hisar-Kaimri road. Demographics Demographics as per 2001 census India Census, Kaimri had a population of 7204. Male population is 3853, while female population is 3351. Demographics as per 2011 census As of 2011 India census, Kaimri had a population of 8399 in 1584 households. Males (4443) constitute 52.89% of the population and females (3956) 47.1%. Kaimri has an average literacy (4968) rate of 59.14%, more than the national average of 74%: male literacy (3018) is 60.74%, and female literacy (1950) is 39.25%. In Kaimri, 11.31% of the population is under 6 years of age (950). Facilities Kaimri village has government school, dispensary, etc. It is also the home of Shri Krishan Pranami Bal Sewa Ashram, Kaimri charitable orphanage and free school. It also contain a Sankatmochan Kaimridham balaji mandir where peoples come from different cities of India. See also Kaimri (disambiguation) Bidhwan Dhillon Hansi City and Tehsil Haryana Hissar Hisar division Hisar (Lok Sabha constituency) Hisar Urban Agglomeration India Jat Siwani Tosham References Villages in Hisar district
https://en.wikipedia.org/wiki/Oak%20Ridge%20National%20Laboratory%20Distributed%20Active%20Archive%20Center
The ORNL DAAC (Oak Ridge National Laboratory Distributed Active Archive Center) for Biogeochemical Dynamics is a National Aeronautics and Space Administration (NASA) Earth Observing System Data and Information System (EOSDIS) data center managed by the Earth Science Data and Information System (ESDIS) Project. Established in 1993, the ORNL DAAC is operated by Oak Ridge National Laboratory in Oak Ridge, Tennessee, under an interagency agreement between NASA and the Department of Energy (DOE). Within the ORNL, the ORNL DAAC is part of the Remote Sensing and Environmental Informatics Group of the Environmental Sciences Division (ESD) and a contributor to the Climate Change Science Institute (CCSI). EOSDIS data centers process, archive, and distribute data collected during Earth Observing System (EOS) satellite and field missions. They also develop tools for accessing data, provide user services, promote data usage, and collect metrics on the use of data and user satisfaction. The ORNL DAAC specializes on data and information relevant to terrestrial biogeochemistry, ecology, and environmental processes, which are critical to understanding the dynamics of Earth's biological, geological, and chemical components. As provided on the website, The ORNL DAAC is listed in the Registry of Research Data Repositories and is a Regular Member of the ISC World Data System. See also Distributed Active Archive Center Earth Observing System Oak Ridge National Laboratory References External links NASA online Earth sciences
https://en.wikipedia.org/wiki/Brett%20Battles
Brett Battles is an American author and computer engineer from Los Angeles, California. Publishing History While employed at Dell Computer, Battles published his first novel, The Cleaner (2007). The novel introduced recurring character Jonathan Quinn, a freelance intelligence operative named for Liam Quinn, an executive at Dell who had served as a mentor to Battles. The Cleaner was nominated for the Barry Award for Best Thriller. His second novel, The Deceived (2008), won the Barry Award for Best Thriller. His third novel, Shadow of Betrayal, continues the adventures of freelance operative and "cleaner" Jonathan Quinn. Shadow of Betrayal was published in the United Kingdom under the title The Unwanted (Preface Publishing, 2009). This fourth novel, The Silenced, was released by Dell in 2011. In the same year, he wrote the computer manufacturer's internal hardware manual. Bibliography Jonathan Quinn Series Note: In the US, The Unwanted was sold under the title Shadow of Betrayal. Logan Harper Thrillers Project Eden Thrillers Rewinder Series Night Man Chronicles Stand-Alone Novels Short stories 2008 – "Perfect Gentleman" (published in Killer Year edited by Lee Child – St. Martin's Press) 2011 – "Just Another Job – A Jonathan Quinn Story" (published by Slam Bang Stories, Available on Amazon Kindle) 2011 – "Off the Clock A Jonathan Quinn Story" – May 20, 2011 Novella July 10, 2011– Becoming Quinn (A Jonathan Quinn Novel): A prequel to the series See also Rewinder References External links Brett Battles' Official Web Site 21st-century American novelists American crime fiction writers American male novelists Barry Award winners Living people People from Ridgecrest, California 21st-century American male writers Novelists from California Year of birth missing (living people)
https://en.wikipedia.org/wiki/Assignment%20cover%20sheet
An assignment cover sheet is a paper used by students when completing assignments at university for their courses. These coversheets generally contain metadata about the assignment (such as the name of the student and the course number). This aids the efficient handling of assignments. Other types of data may be included, depending on the needs of the course. Some universities require and/or provide cover sheets in standardized formats. These are often in the form of computer files which a student can download, print, and personalize. Cover sheets are also required by some educational entities that are not universities. References Educational materials
https://en.wikipedia.org/wiki/Mercury%20%28metadata%20search%20system%29
Mercury is a distributed metadata management, data discovery and access system. It is a scientific data search system to capture and manage biogeochemical and ecological data in support of the Earth science programs funded by the United States Department of Energy (DOE) and United States Geological Survey (USGS) - Department of Interior (DOI). Mercury was originally developed for NASA, but the consortium is now supported by USGS and the DOE. Ongoing development of Mercury is done through an informal consortium at Oak Ridge National Laboratory. Mercury is a part of the Oak Ridge National Laboratory Environmental Sciences Division (ESD) and a contributor to the Climate Change Science Institute (CCSI). Technical features Mercury supports data archiving, data discovery through various search strategies (text string, fielded, spatial, temporal), data reuse , and longer-term scientific digital data stewardship, and supports a range of recognized data exchange and interoperability protocols and supports various metadata standards including XML, Z39.50, FGDC, Dublin Core, Darwin Core, Ecological Metadata Language, and ISO. Mercury also uses OAI-PMH to index metadata records from Global Change Master Directory (GCMD) and redistribute them other data providers References External links USGS Science Data Catalog - powered by Mercury USGS Mercury Metadata Editor Metadata Data management software United States Geological Survey United States Department of Energy Oak Ridge National Laboratory
https://en.wikipedia.org/wiki/Flagellicaudata
Flagellicaudata is a clade of Dinosauria. It belongs to Sauropoda and includes two families, the Dicraeosauridae and the Diplodocidae. Phylogeny The clade Flagellicaudata was erected by Harris and Dodson (2004) for the diplodocoid clade formed by Dicraeosauridae and Diplodocidae in their paper describing a new genus of sauropod dinosaur, Suuwassea. The authors carried out a phylogenetic analysis and noted that Suuwassea, although more derived than Rebbachisauridae, is in a trichotomy with other families belonging to Diplodocoidea (Diplodocidae and Dicraeosauridae). Flagellicaudata was defined as a node-based clade consisting of the most recent common ancestor of Dicraeosaurus and Diplodocus and all of its descendants. The word "Flagellicaudata" refers to long, whip-like tails of that animals (flagellum is a Latin word meaning "whip" and cauda means in Latin "tail"). Fragment of cladogram presented in Harris and Dodson, 2004: References Diplodocimorpha
https://en.wikipedia.org/wiki/The%20Medical%20City
Professional Services Inc. operating as The Medical City (TMC) is a health institution in the Philippines which maintains a network of hospitals and clinics in the Philippines. The TMC also maintains the Guam Regional Medical City in Guam and a network of clinics in the Gulf states. History The Medical City first opened as the ABM Sison Hospital in 1967 along San Miguel Avenue, Mandaluyong, with a change of hospital management occurring in 1969. The health facility was renamed as "The Medical City" or TMC in 1975. In 1996, the first outpatient clinic was opened in Antipolo, Rizal. The main hospital moved to its current location along Ortigas Avenue, Pasig in 2004. The TMC launched the Center for Patient Partnership, its flagship patient partnership program in 2007. TMC began aggressively expanding its presence by acquiring hospitals and clinics outside Metro Manila and in the Visayas and Mindanao as well in the early 2010s. A boardroom coup happened in September 2018, which led to CEO Alfredo Bengzon losing control of TMC. His nephew Jose Xavier Gonzales was elected as Chairperson and Eugenio Ramos was elected as CEO in a special stockholders meeting. The move was legally challenged by Bengzon with the Gonzales-Ramos side insisting Bengzon's tenure has expired and that he has less than 1 percent stakes in the company. Another election was held electing Gonzales and Ramos to the TMC's board The Securities and Exchange Commission ordered TMC in August 2020 to revert its board composition as of 2013, potentially restoring Bengzon as CEO ruling that the 2018 leadership change as illegal. During the 2020 COVID-19 pandemic in the Philippines, the TMC has accommodated patients at its main hospital in Ortigas. By April 2020, the hospital is already among the COVID-19 testing centers in the country and the TMC has entered partnership with the local governments of Pasig and Valenzuela; with the former to convert the Pasig City Children's Hospital to a COVID-19 dedicated facility and with the latter for their mass testing efforts. Facilities The hospital's main facility is located on a property along Ortigas Avenue, almost within the business district of Ortigas Center in Pasig, Metro Manila. TMC also serves as the hub for a network of satellite clinics and hospitals that delivers a range of diagnostic and therapeutic services to patients in Manila and select provinces. It also operates the Guam Regional Medical City, the first private hospital in Guam as well as clinics in the Gulf Cooperation Council countries. In 2021, TMC entered in a partnership with Ascent enabling it to transport patients, medical personnel, and sensitive cargo between TMC's hospitals and Ascent's hubs using Ascent's on-demand helicopter services. Hospitals The Medical City Ortigas – Pasig The Medical City Clark – Clark Freeport Zone (Mabalacat) The Medical City Iloilo – Iloilo City The Medical City Pangasinan – Dagupan The Medical City South Luzon – Santa Rosa, Laguna G
https://en.wikipedia.org/wiki/Never-Ending%20Language%20Learning
Never-Ending Language Learning system (NELL) is a semantic machine learning system that as of 2010 was being developed by a research team at Carnegie Mellon University, and supported by grants from DARPA, Google, NSF, and CNPq with portions of the system running on a supercomputing cluster provided by Yahoo!. Process and goals NELL was programmed by its developers to be able to identify a basic set of fundamental semantic relationships between a few hundred predefined categories of data, such as cities, companies, emotions and sports teams. Since the beginning of 2010, the Carnegie Mellon research team has been running NELL around the clock, sifting through hundreds of millions of web pages looking for connections between the information it already knows and what it finds through its search process – to make new connections in a manner that is intended to mimic the way humans learn new information. For example, in encountering the word pair "Pikes Peak", NELL would notice that both words are capitalized and deduce from the second word that it was the name of a mountain, and then build on the relationship of words surrounding those two words to deduce other connections. The goal of NELL and other semantic learning systems, such as IBM's Watson system, is to be able to develop means of answering questions posed by users in natural language with no human intervention in the process. Oren Etzioni of the University of Washington lauded the system's "continuous learning, as if NELL is exercising curiosity on its own, with little human help". By October 2010, NELL has doubled the number of relationships it has available in its knowledge base and has learned 440,000 new facts, with an accuracy of 87%. Team leader Tom M. Mitchell, chairman of the machine learning department at Carnegie Mellon described how NELL "self-corrects when it has more information, as it learns more", though it does sometimes arrive at incorrect conclusions. Accumulated errors, such as the deduction that Internet cookies were a kind of baked good, led NELL to deduce from the phrases "I deleted my Internet cookies" and "I deleted my files" that "computer files" also belonged in the baked goods category. Clear errors like these are corrected every few weeks by the members of the research team and the system is allowed to continue its learning process. By 2018, NELL had "acquired a knowledge base with 120mn diverse, confidence-weighted beliefs (e.g., servedWith(tea,biscuits)), while learning thousands of interrelated functions that continually improve its reading competence over time." As of September 2023, the project's most recently gathered facts dated from February 2019 (according to its Twitter feed) or September 2018 (according to its home page). Reception In his 2019 book "Human Compatible", Stuart Russell commented that 'Unfortunately NELL has confidence in only 3 percent of its beliefs and relies on human experts to clean out false or meaningless beliefs on a regular b
https://en.wikipedia.org/wiki/In-target%20probe
In-target probe, or ITP is a device used in computer hardware and microprocessor design, to control a target microprocessor or similar ASIC at the register level. It generally allows full control of the target device and allows the computer engineer access to individual processor registers, program counter, and instructions within the device. It allows the processor to be single-stepped or for breakpoints to be set. Unlike an in-circuit emulator (ICE), an In-Target Probe uses the target device to execute, rather than substituting for the target device. See also Hardware-assisted virtualization In-circuit emulator Joint Test Action Group External links ITP700 Debug Port Design Guide - Intel Embedded systems Debugging
https://en.wikipedia.org/wiki/NOWAR-PAIX
NOWAR-PAIX is an anti-war and anti-racist organization based in Ottawa, Ontario, Canada. The group's full name is "Network to Oppose War and Racism – Pacte contre l'Agression, l'Intolérance et la Xénophobie", which form the acronyms "no war" and "paix," which is French for "peace". The group was formed in response to the terrorist attacks of September 11, 2001, and the subsequent military actions of the United States of America and its allies. NOWAR-PAIX's website indicates that it opposes Canada's current military presence in Afghanistan, government attacks on civil liberties, and ongoing racist and xenophobic attacks across North America. History NOWAR-PAIX emerged in 2002, during the buildup to the 2003 American-led invasion of Iraq. Its website featured news updates on rallies and petitions during the war itself, and the Ottawa Citizen described it as one of the two main sites of the Canadian peace movement in this period. In 2004, NOWAR-PAIX attracted attention for its role in organizing anti-war demonstrations at the Republican National Convention in New York City. Later in the same year, the group protested against an Ottawa visit by United States president George W. Bush. In March 2007, NOWAR-PAIX took part in a global protest against the continuing war in Iraq. The Canadian Security Intelligence Service (CSIS) issued an internal report entitled The Creation of a New Peace Movement? in January 2005, hypothesizing that the emergence of NOWAR-PAIX and related groups marked a shift in Canadian protest culture from anti-capitalism to a new anti-war movement. Parts of this document were issued to the Canadian Press in March 2005, following an access to information request. In 2007, NOWAR-PAIX argued that undercover police officers had been used as agents provocateurs to discredit protestors at the North American Leaders' Summit in Montebello, Quebec. NOWAR-PAIX leaders have called for their demonstrations to be peaceful and have condemned acts of violence by attendees. References External links NOWAR-PAIX Organizations based in Ottawa Anti-racist organizations in Canada Peace organizations based in Canada
https://en.wikipedia.org/wiki/Geojit%20Financial%20Services
Geojit Financial Services Ltd. is an investment services company in India headquartered in Kochi, Kerala. It operates a network of offices across India and the Middle East. Geojit was the first company in India to launch online-trading facilities, develop franchise models of sub-broking, form joint ventures in West Asia and the first to begin commodity futures trading in pepper, cardamom, gold and silver in Bharat. The product offerings of the company include equities and derivatives to mutual funds, life and general insurance, commodities derivatives and portfolio management services. The company has 512 offices across the country. Through joint ventures and associates, the company has expanded its presence globally with offices in Dubai, Abu Dhabi, Sharjah, Al Ain, Muscat, Riyadh, Dammam, Bahrain and Kuwait. Geojit is listed on the National Stock Exchange (NSE) and the Bombay Stock Exchange (BSE). About Geojit was founded by C J George in 1987 and the major stakeholders of the company include C J George – Managing Director of Geojit, global banking major BNP Paribas, Kerala State Industrial Development Corporation and Rakesh Jhunjhunwala. As of 31 December 2017, it has over Rs.41,000 crores as assets under custody and management, servicing over 913,000 clients. The network of Geojit covers more than 300 cities in states in India such as Andhra Pradesh, Bihar, Chhattisgarh, Goa, Gujarat, Haryana, Jammu and Kashmir, Karnataka, Kerala, Madhya Pradesh, Maharashtra, New Delhi, Orissa, Punjab, Rajasthan, Tamil Nadu & Pondicherry, Telangana, Uttar Pradesh, Uttaranchal and West Bengal. The company has B2B partnerships with a number banks such as Axis Bank (the partnership received IBA recognition 2007 & 2008), Federal Bank, Andhra Bank, Oriental Bank of Commerce, SVC Bank (Shamrao Vithal Co-operative Bank), Corporation Bank, South Indian Bank and IndusInd Bank. History C J George, founder and CEO of the company set up M/s C.J George and Co. in 1987 with Ranajit Kanjilal as partner. However, a formal partnership was formed in 1988 after Kanjilal acquired membership in the Cochin Stock Exchange. The firm was then renamed as Geojit and Co. The name 'Geojit' was coined by conjoining the first and last three words in the names of the partners who set up the organization – C J George and Ranajit Kanjilal. In 1992, Kanjilal, left the organization and Geojit became sole proprietorship. In 1993, the company opened its first branch in Muvattupuzha in Ernakulam and followed it up with another branch in Trichur in Kerala. Growth and Expansion In 1994, Geojit became a public limited company with a new name – Geojit Securities Ltd. It was the first brokerage firm that became a corporate in Kochi and one of the earliest in India. In 1995, Kerala State Industrial Development Corporation (KSIDC) became a co-promoter of Geojit by acquiring 22% stake in the company. This is the only instance of a government entity participating in the equity of a stock brokin
https://en.wikipedia.org/wiki/Call%20detail%20record
A call detail record (CDR) is a data record produced by a telephone exchange or other telecommunications equipment that documents the details of a telephone call or other telecommunications transactions (e.g., text message) that passes through that facility or device. The record contains various attributes of the call, such as time, duration, completion status, source number, and destination number. It is the automated equivalent of the paper toll tickets that were written and timed by operators for long-distance calls in a manual telephone exchange. CDR contents A call detail record contains data fields that describe a specific instance of a telecommunication transaction, but does not include the content of that transaction. By way of simplistic example, a call detail record describing a particular phone call might include the phone numbers of both the calling and receiving parties, the start time, and duration of that call. In actual modern practice, call detail records are much more detailed, and contain attributes such as: the phone number of the subscriber originating the call (calling party, A-party) the phone number receiving the call (called party, B-party) the starting time of the call (date and time) the call duration the billing phone number that is charged for the call the identification of the telephone exchange or equipment writing the record a unique sequence number identifying the record additional digits on the called number used to route or charge the call the disposition or the results of the call, indicating, for example, whether or not the call was connected the route by which the call entered the exchange the route by which the call left the exchange call type (voice, SMS, etc.) voice call type (call setup, call continue, call operation, call end, call idle, call busy, out of service call) any fault condition encountered Each exchange manufacturer decides which information is emitted on the tickets and how it is formatted. Examples: Send the timestamp of the end of call instead of duration Voice-only machines may not send call type Some small PBX does not send the calling party In some corporate private branch exchange (PBX) systems, a call detail record is termed a station messaging detail record (SMDR). Uses Call detail records serve a variety of functions. For telephone service providers, they are critical to the production of revenue, in that they provide the basis for the generation of telephone bills. For law enforcement, call detail records provide a wealth of information that can help to identify suspects, in that they can reveal details as to an individual's relationships with associates, communication and behavior patterns, and even location data that can establish the whereabouts of an individual during the entirety of the call. For companies with PBX telephone systems, call detail records provide a means of tracking long-distance access, can monitor telephone usage by department or offi
https://en.wikipedia.org/wiki/Threat%20%28computer%29
In computer security, a threat is a potential negative action or event facilitated by a vulnerability that results in an unwanted impact to a computer system or application. A threat can be either a negative "intentional" event (i.e. hacking: an individual cracker or a criminal organization) or an "accidental" negative event (e.g. the possibility of a computer malfunctioning, or the possibility of a natural disaster event such as an earthquake, a fire, or a tornado) or otherwise a circumstance, capability, action, or event. This is differentiated from a threat actor who is an individual or group that can perform the threat action, such as exploiting a vulnerability to actualise a negative impact. A more comprehensive definition, tied to an Information assurance point of view, can be found in "Federal Information Processing Standards (FIPS) 200, Minimum Security Requirements for Federal Information and Information Systems" by NIST of United States of America Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, or individuals through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service. Also, the potential for a threat-source to successfully exploit a particular information system vulnerability. National Information Assurance Glossary defines threat as: Any circumstance or event with the potential to adversely impact an IS through unauthorized access, destruction, disclosure, modification of data, and/or denial of service. ENISA gives a similar definition: Any circumstance or event with the potential to adversely impact an asset [G.3] through unauthorized access, destruction, disclosure, modification of data, and/or denial of service. The Open Group defines threat as: Anything that is capable of acting in a manner resulting in harm to an asset and/or organization; for example, acts of God (weather, geological events,etc.); malicious actors; errors; failures. Factor analysis of information risk defines threat as: threats are anything (e.g., object, substance, human, etc.) that are capable of acting against an asset in a manner that can result in harm. A tornado is a threat, as is a flood, as is a hacker. The key consideration is that threats apply the force (water, wind, exploit code, etc.) against an asset that can cause a loss event to occur. National Information Assurance Training and Education Center gives a more articulated definition of threat: The means through which the ability or intent of a threat agent to adversely affect an automated system, facility, or operation can be manifest. Categorize and classify threats as follows: Categories Classes Human Intentional Unintentional Environmental Natural Fabricated 2. Any circumstance or event with the potential to cause harm to a system in the form of destruction, disclosure, modification or data, and/o
https://en.wikipedia.org/wiki/Plastic%20SCM
Plastic SCM is a cross-platform commercial distributed version control tool developed by Códice Software Inc. It is available for Microsoft Windows, Mac OS X, Linux, and other operating systems. It includes a command-line tool, native GUIs, diff and merge tool and integration with a number of IDEs. It is a full version control stack not based on Git (although it can communicate with it). Features Plastic SCM is a full version control stack platform. It includes these components: Server Command line client GUIs Diff and merge tools Web GUI Web-based admin interface Some of its features include: Support for heavy branching and merging: According to its creators, Plastic can handle unlimited branching and complex merge scenarios Visual Branch Explorer: A timeline to represent branches, merges and changes in repositories, implemented in all of its GUIs ACL-based security: Every object in the system can be secured with access control lists Built-in 3-way merge and side-by-side diff including language-aware support and history of a specific method or function Directory versioning and support for versioning renames Revision history for branched, renamed, moved, copied, and deleted files Blame/Annotate Centralized operation (SVN/Perforce style) Distributed operation (Git/Mercurial style) Atomic commits—the server assures that changesets are committed in the repository entirely Shelving—users can save and restore work in progress for task switching Support for ASCII, Unicode, binary, symbolic link (on Unix), Mac-specific, and UTF-16 files Support for Mac OS X, Windows and Linux platforms Server-side and client-side event triggers High-latency network support: The network protocol used by Plastic is optimized for high-speed/high-latency networks Gluon: GUI and workflow for non-developers (specially focused on game development) Locking: Binary files and assets that can't be merged can use locking instead of branching/merging Design Plastic is a client/server system although in current terms of version control it can also be defined as a distributed revision control system, due to its ability to have very lightweight servers on the developer computer and push and pull branches between servers (similar to what Git and Mercurial do). Developers work on files in their client workspaces, and check in changed files together in changesets. Storage Plastic SCM has 2 different families of storage for all its data and metadata: Jet: An ad-hoc storage designed for high-performance, released with version 6.0. It is now the default storage. Relational databases: Traditionally Plastic supported storing all data and metadata in relational databases: MySQL, SQL Server, SQLite, SQL Server Compact Edition, Firebird, Firebird Embedded, Postgresql and Oracle. Relational databases are still supported although Jet is now the default option. Modes of operation Plastic can work in 2 modes: Centralized: With workspaces (working copies) connecte
https://en.wikipedia.org/wiki/Data%20classification
Data classification may refer to: Data classification (data management) Data classification (business intelligence) Classification (machine learning), classification of data using machine learning algorithms Assigning a level of sensitivity to classified information In computer science, the data type of a piece of data See also Classification (disambiguation) Categorization
https://en.wikipedia.org/wiki/Evasion%20%28network%20security%29
In network security, evasion is bypassing an information security defense in order to deliver an exploit, attack, or other form of malware to a target network or system, without detection. Evasions are typically used to counter network-based intrusion detection and prevention systems (IPS, IDS) but can also be used to by-pass firewalls and defeat malware analysis. A further target of evasions can be to crash a network security defense, rendering it in-effective to subsequent targeted attacks. Description Evasions can be particularly nasty because a well-planned and implemented evasion can enable full sessions to be carried forth in packets that evade an IDS. Attacks carried in such sessions will happen right under the nose of the network and service administrators. The security systems are rendered ineffective against well-designed evasion techniques, in the same way a stealth fighter can attack without detection by radar and other defensive systems. A good analogy to evasions is a system designed to recognize keywords in speech patterns on a phone system, such as “break into system X”. A simple evasion would be to use a language other than English, but which both parties can still understand, and wishfully a language that as few people as possible can talk. Evasion attacks Various advanced and targeted evasion attacks have been known since the mid-1990s: A seminal text describing the attacks against IDS systems appeared in 1997. One of the first comprehensive description of attacks was reported by Ptacek and Newsham in a technical report in 1998. In 1998, also an article in the Phrack Magazine describes ways to by-pass network intrusion detection. Reports The 1997 article mostly discusses various shell-scripting and character-based tricks to fool an IDS. The Phrack Magazine article and the technical report from Ptacek et al. discusses TCP/IP protocol exploits, evasions and others. More recent discussions on evasions include the report by Kevin Timm. Protecting against evasions The challenge in protecting servers from evasions is to model the end-host operation at the network security device, i.e., the device should be able to know how the target host would interpret the traffic, and if it would be harmful, or not. A key solution in protecting against evasions is traffic normalization at the IDS/IPS device. The other way separation internet access can be implemented based on how endpoint user can be safe accessing the internet segment. Lately there has been discussions on putting more effort on research in evasion techniques. A presentation at Hack.lu discussed some potentially new evasion techniques and how to apply multiple evasion techniques to by-pass network security devices. See also Metasploit Project References Singh, Abhishek. "Evasions In Intrusion Prevention Detection Systems". Virus Bulletin. Retrieved 1 April 2010. Computer security exploits
https://en.wikipedia.org/wiki/Roger%20Craig%20%28Jeopardy%21%20contestant%29
Roger Alan Craig (born 1976/1977) is an American game show contestant and computer scientist. He held the record for highest single-day winnings on the quiz show Jeopardy! from September 14, 2010 (surpassing Ken Jennings) to April 9, 2019 (when James Holzhauer surpassed him). In 2011, Craig returned to win the Jeopardy! Tournament of Champions. In 2014, he competed in the Battle of the Decades tournament, finishing third overall behind Brad Rutter and Ken Jennings. Early life and career Craig, who was 33 years old at the time of his initial Jeopardy! appearance in 2010, is a native of Ferndale, Pennsylvania. He grew up there and later in Virginia, where he graduated from Annandale High School in 1995. Craig holds a first degree in biology and biochemistry from Virginia Tech, and a master's degree and Ph.D. in computer science from the University of Delaware. He was working on his doctorate at the time of his first appearance on Jeopardy!, and completed the degree later in 2010. In his scholarly career, Craig has published eight papers in the field of bioinformatics, specifically on topics of combinatorial protein synthesis and protein-protein prediction. As of November 2011, Craig was living in Newark, Delaware, and working as a computer scientist. He is the founder of Cotinga, a company which performs data analyses and creates learning applications for smartphones. Craig was a guest on KFC Radio of Barstool Sports on August 23, 2012. Jeopardy! Preparation Craig prepared for Jeopardy! by studying the online archive of past questions maintained on the J! Archive website. Using data-mining and text-clustering, he identified the topics most likely to occur in game questions, then used the spaced repetition program Anki for memorization and tested himself using his own program. Craig played quiz bowl as a student at both Virginia Tech and the University of Delaware. Before his Jeopardy appearances, he played numerous Jeopardy scrimmage matches against his friends with quiz bowl experience. Craig believes his attendance at the two universities helped the most in his success:Let's face it, for Jeopardy!, the name of the game is breadth not depth. I think the main reason both universities helped so much is that they cover just about all spheres of learning in extraordinary depth. Appearances Original run Craig set his record of $77,000 on the second day of the 2010–2011 Jeopardy! season on the episode airing September 14, 2010. In his record-setting appearance, he had a score of $47,000 after the game's first two rounds, then wagered and won $30,000 in the Final Jeopardy! round. Prior to Craig, the single-day record of $75,000 was held by Ken Jennings. Craig lost to North Carolina sportswriter Jelisa Castrodale in his seventh appearance. He had the lead going into the Final Jeopardy! round, in the category "Sports and the Media". Castrodale won when she gave the correct response to the Final Jeopardy question about the winner of the 2010 Sup
https://en.wikipedia.org/wiki/Locus%20Reference%20Genomic
Locus Reference Genomic (LRG) is a DNA sequence format that was developed to aid in curating locus specific databases (LSDBs) that record DNA sequence variation which can result in inherited diseases. LRGs have fixed sequences that are independent of the genome so that they provide a stable framework for reporting variants. The LRG format uses extensible markup language (XML) to provide highly structured single records containing the genomic DNA sequence for individual genes along with the mRNAs and proteins encoded by these genes. LRG records are recommended in the Human Genome Variation Society Nomenclature guidelines as reference sequences to report sequence variants in LSDBs and the literature. The LRG concept was developed by the GEN2PHEN project in conjunction with the European Bioinformatics Institute (EBI) and the National Center for Biotechnology Information (NCBI). The LRG homepage provides access to existing LRG sequences and allows the submission of requests for the creation of new LRGs. This page also has a frequently asked questions (FAQs) section. References External links The LRG homepage The Mutalyzer homepage Genomics
https://en.wikipedia.org/wiki/Jump%20server
A jump server, jump host or jump box is a system on a network used to access and manage devices in a separate security zone. A jump server is a hardened and monitored device that spans two dissimilar security zones and provides a controlled means of access between them. The most common example is managing a host in a DMZ from trusted networks or computers. Background In the 1990s when co-location facilities became more common there was a need to provide access between dissimilar security zones. The jump server concept emerged to meet this need. The jump server would span the two networks and typically be used in conjunction with a proxy service such as SOCKS to provide access from an administrative desktop to the managed device. As SSH-based tunneling became common, jump servers became the de facto method of access. Implementation Jump servers are often placed between a secure zone and a DMZ to provide transparent management of devices on the DMZ once a management session has been established. The jump server acts as a single audit point for traffic and also a single place where user accounts can be managed. A prospective administrator must log into the jump server in order to gain access to the DMZ assets and all access can be logged for later audit. Unix A typical configuration is a hardened Unix (or Unix-like) machine configured with SSH and a local firewall. An administrator connects to a target machine in the DMZ by making an SSH connection from the administrator's personal computer to the jump server and then using SSH forwarding to access the target machine. Using SSH port forwarding or an SSH-based tunnel to the target host allows the use of insecure protocols to manage servers without creating special firewall rules or exposing the traffic on the inside network. Windows A typical configuration is a Windows server running Remote Desktop Services that administrators connect to, this isolates the secure infrastructure from the configuration of the administrator's workstation. It is also possible to enable OpenSSH server on Windows 10 (build 1809 and later) and Windows Server editions 2019 & 2022. Security risks A jump server is a potential risk in a network's design. There are several ways of improving the security of the jump server, including: Properly subnetting / segmenting the network, and securing VLANs using a firewall or router. Using higher security authentication, such as multi-factor authentication. Keeping the operating system and software on the jump server up to date. Using ACLs to restrict access. Not allowing outbound access to the rest of the internet from the jump server. Restricting which programs can be run on the jump server. Enabling strong logging for monitoring and alerting of suspicious activity. With the high level of risk that a jump server can represent, a VPN may be a suitable and higher security replacement. In 2015, a compromised jump server allowed attackers access to over 21.5 million recor
https://en.wikipedia.org/wiki/Resistance%20Database%20Initiative
HIV Resistance Response Database Initiative (RDI) is a not-for-profit organisation established in 2002 which states its mission as "To improve the clinical management of HIV infection by developing a large clinical database and bioinformatic techniques that predict accurately any individual's response to any combination of HIV drugs." The RDI states the following specific goals: To be an independent repository of HIV resistance and treatment outcome data To use bioinformatics to explore the relationships between resistance, other clinical and laboratory factors and HIV treatment outcome To develop and make freely available a system to predict treatment response, as an aid to optimising and individualising the clinical management of HIV infection The RDI consists of a small executive group based in the UK, an international advisory group of leading HIV/AIDS scientists and clinicians, and an extensive global network of collaborators and data contributors. Background Human immunodeficiency virus (HIV) is the virus that causes acquired immunodeficiency syndrome (AIDS), a condition in which the immune system begins to fail, leading to life-threatening opportunistic infections. There are approximately 25 HIV antiretroviral drugs that have been approved for the treatment of HIV infection, from six different classes, based on the point in the HIV life-cycle at which they act. They are used in combination; typically 3 or more drugs from 2 or more different classes, a form of therapy known as highly active antiretroviral therapy or HAART. The aim of therapy is to suppress the virus to very low, ideally undetectable, levels in the blood. This prevents the virus from depleting the immune cells that it preferentially attacks (CD4 cells) and prevents or delays illness and death. Despite the expanding availability of these drugs and the impact of their use, treatments continue to fail, often involving to the development of resistance. During drug therapy, low-level virus replication still occurs, particularly when a patient misses a dose. HIV makes errors in copying its genetic material and, if a mutation makes the virus resistant to one or more of the drugs, it may begin to replicate more successfully in the presence of that drug and undermine the effect of the treatment. If this happens, the treatment needs to be changed to re-establish control over the virus. In well-resourced healthcare settings, when treatment fails, a resistance test may be run to predict which drugs the patient's virus is resistant to. The type of test in most common use is the genotype test, which detects mutations in the viral genetic code. This information is then typically interpreted using rules equating individual mutations with resistance against individual drugs. However, there are many different interpretation systems available that do not always agree, the systems only provide categorical results (resistant, sensitive or intermediate) and they do not necessarily rela
https://en.wikipedia.org/wiki/Supertree
A supertree is a single phylogenetic tree assembled from a combination of smaller phylogenetic trees, which may have been assembled using different datasets (e.g. morphological and molecular) or a different selection of taxa. Supertree algorithms can highlight areas where additional data would most usefully resolve any ambiguities. The input trees of a supertree should behave as samples from the larger tree. Construction methods The construction of a supertree scales exponentially with the number of tax included; therefore for a tree of any reasonable size, it is not possible to examine every possible supertree and weigh its success at combining the input information. Heuristic methods are thus essential, although these methods may be unreliable; the result extracted is often biased or affected by irrelevant characteristics of the input data. The most well known method for supertree construction is Matrix Representation with Parsimony (MRP), in which the input source trees are represented by matrices with 0s, 1s, and ?s (i.e., each edge in each source tree defines a bipartition of the leafset into two disjoint parts, and the leaves on one side get 0, the leaves on the other side get 1, and the missing leaves get ?), and the matrices are concatenated and then analyzed using heuristics for maximum parsimony. Another approach for supertree construction include a maximum likelihood version of MRP called "MRL" (matrix representation with likelihood), which analyzes the same MRP matrix but uses heuristics for maximum likelihood instead of for maximum parsimony to construct the supertree. The Robinson-Foulds distance is the most popular of many ways of measuring how similar a supertree is to the input trees. It is a metric for the number of clades from the input trees that are retained in the supertree. Robinson-Foulds optimization methods search for a supertree that minimizes the total (summed) Robinson-Foulds differences between the (binary) supertree and each input tree. In this case the supertree can hence be view as the median of the input tree according to the Robinson-Foulds distance. Alternative approaches have been developped to infer median supertree based on different metrics, e.g relying on triplet or quartet decomposition of the trees. A recent innovation has been the construction of Maximum Likelihood supertrees and the use of "input-tree-wise" likelihood scores to perform tests of two supertrees. Additional methods include the Min Cut Supertree approach, Most Similar Supertree Analysis (MSSA), Distance Fit (DFIT) and Quartet Fit (QFIT), implemented in the software CLANN. Application Supertrees have been applied to produce phylogenies of many groups, notably the angiosperms, eukaryotes and mammals. They have also been applied to larger-scale problems such as the origins of diversity, vulnerability to extinction, and evolutionary models of ecological structure. Further reading References Phylogenetics