source
stringlengths
32
199
text
stringlengths
26
3k
https://en.wikipedia.org/wiki/Comparison%20of%20TLS%20implementations
The Transport Layer Security (TLS) protocol provides the ability to secure communications across or inside networks. This comparison of TLS implementations compares several of the most notable libraries. There are several TLS implementations which are free software and open source. All comparison categories use the stable version of each implementation listed in the overview section. The comparison is limited to features that directly relate to the TLS protocol. Overview TLS/SSL protocol version support Several versions of the TLS protocol exist. SSL 2.0 is a deprecated protocol version with significant weaknesses. SSL 3.0 (1996) and TLS 1.0 (1999) are successors with two weaknesses in CBC-padding that were explained in 2001 by Serge Vaudenay. TLS 1.1 (2006) fixed only one of the problems, by switching to random initialization vectors (IV) for CBC block ciphers, whereas the more problematic use of mac-pad-encrypt instead of the secure pad-mac-encrypt was addressed with RFC 7366. A workaround for SSL 3.0 and TLS 1.0, roughly equivalent to random IVs from TLS 1.1, was widely adopted by many implementations in late 2011,. In 2014, the POODLE vulnerability of SSL 3.0 was discovered, which takes advantage of the known vulnerabilities in CBC, and an insecure fallback negotiation used in browsers. TLS 1.2 (2008) introduced a means to identify the hash used for digital signatures. While permitting the use of stronger hash functions for digital signatures in the future (rsa,sha256/sha384/sha512) over the SSL 3.0 conservative choice (rsa,sha1+md5), the TLS 1.2 protocol change inadvertently and substantially weakened the default digital signatures and provides (rsa,sha1) and even (rsa,md5). Datagram Transport Layer Security (DTLS or Datagram TLS) 1.0 is a modification of TLS 1.1 for a packet-oriented transport layer, where packet loss and packet reordering have to be tolerated. The revision DTLS 1.2 based on TLS 1.2 was published in January 2012. TLS 1.3 (2018) specified in RFC 8446 includes major optimizations and security improvements. QUIC (2021) specified in RFC 9000 and DTLS 1.3 (2022) specified in RFC 9147 builds on TLS 1.3. The publishing of TLS 1.3 and DTLS 1.3 obsoleted TLS 1.2 and DTLS 1.2. Note that there are known vulnerabilities in SSL 2.0 and SSL 3.0. In 2021, IETF published RFC 8996 also forbidding negotiation of TLS 1.0, TLS 1.1, and DTLS 1.0 due to known vulnerabilities. NIST SP 800-52 requires support of TLS 1.3 by January 2024. Support of TLS 1.3 means that two compliant nodes will never negotiate TLS 1.2. NSA Suite B Cryptography Required components for NSA Suite B Cryptography (RFC 6460) are: Advanced Encryption Standard (AES) with key sizes of 128 and 256 bits. For traffic flow, AES should be used with either the Counter Mode (CTR) for low bandwidth traffic or the Galois/Counter Mode (GCM) mode of operation for high bandwidth traffic (see Block cipher modes of operation) — symmetric encryption Elliptic Curve Digital S
https://en.wikipedia.org/wiki/Universal%20gateway
A universal gateway is a device that transacts data between two or more data sources using communication protocols specific to each. Sometimes called a universal protocol gateway, this class of product is designed as a computer appliance, and is used to connect data from one automation system to another. Typical applications Typical applications include: M2M Communications – machine to machine communications between machines from different vendors, typically using different communication protocols. This is often a requirement to optimize the performance of a production line, by effectively communicating machine states upstream and downstream of a piece of equipment. Machine idle times can trigger lower power operation. Inventory Levels can be more effectively managed on a per station basis, by knowing the upstream and downstream demands. M2E Communications – machine to enterprise communications is typically managed through database interactions. In this case, EATM technology is typically leveraged for data interoperability. However, many enterprise systems have real-time data interfaces. When real-time interfaces are involved, a universal gateway, with its ability to support many protocols simultaneously becomes the best choice. In all cases, communications can fall over many different transports, RS-232, RS-485, Ethernet, etc. Universal Gateways have the ability to communicate between protocols and over different transports simultaneously. Design Hardware platform – Industrial Computer, Embedded Computer, Computer Appliance Communications software – Software (Drivers) to support one or more Industrial Protocols. Communications is typically polled or change based. Great care is typically taken to leverage communication protocols for the most efficient transactions of data (Optimized message sizes, communications speeds, and data update rates). Typical protocols; Rockwell Automation CIP, Ethernet/IP, Siemens Industrial Ethernet, Modbus TCP. There are hundreds of automation device protocols and Universal Gateway solutions are typically targeting certain market segments and will be based on automation vendor relationships. Bridging software – Linking software for connecting data from one device to data in another, one being the source of data and one being the destination. Typically data is transferred on data change, on a time basis, or based on process conditions – Run, Stop, etc. Versus protocol converters A universal gateway will typically offer all protocols on a computer appliance, for the benefit of the process engineer, giving them the opportunity to pick and choose one or more protocols, and change them over time, as the application needs demand. Protocol converters are typically designed with a single purpose, to convert protocol X to Y, and are not offering the level of configurability and flexibility of a universal gateway. New markets Special classes of universal gateway are addressing special needs. The Smar
https://en.wikipedia.org/wiki/Kung-Fu%20Live
Kung-Fu Live is an interactive fighting game developed by Virtual Air Guitar Company exclusively for the PlayStation Network. The game tracks the players movement using the PlayStation Eye and free-motion technology. It is quoted as being the best of the PlayStation 3 Fitness Games, "I would say it is a must-have if you’re a fan of fighting games and want to see what the future holds for innovative, creative game design," Reception Kung-Fu Live has received generally mixed reviews. It had an average score of 53.76% at GameRankings, based on 27 reviews and an average score of 50/100 at Metacritic, based on 30 reviews. Ryan Clements, a writer for IGN who rated the game a 40/100, wrote that the game "has an appealing premise and fun visuals, but I can't recommend a game that left me feeling so defeated." Steven Williamson, who writes for PSU.com and rated the game a 5.5/10, says "Meet the strict criteria for set-up and calibration and you might enjoy the novelty of seeing yourself kicking ass on screen, but you'll still have to battle with the controls just as much as you will against the bad guys." References External links Official Webpage Developer Webpage 2010 video games Gamebryo games Indie games Platformers PlayStation Network games PlayStation 3 games PlayStation 3-only games Video games developed in Finland Multiplayer and single-player video games
https://en.wikipedia.org/wiki/Anil%20Menon
Anil Menon is an Indian writer of speculative fiction, as well as a computer scientist with a Ph.D. from Syracuse University, who has authored research papers and edited books on Evolutionary Algorithms. His research addressed the mathematical foundations of replicator systems, majorization, and reconstruction of probabilistic databases, in collaboration with professors Kishan Mehrotra, Chilukuri Mohan, and Sanjay Ranka. After working for several years as a computer scientist, he started to write fiction. His short stories and reviews have appeared in the anthology series Exotic Gothic, Strange Horizons, Interzone, Lady Churchill's Rosebud Wristlet, Chiaroscuro, Sybil's Garage, Apex Digest, and others. In 2009, Zubaan Books, India's leading feminist press, published his debut young adult novel The Beast With Nine Billion Feet. It was shortlisted for the 2010 Vodafone Crossword Book Award and the 2010 Parallax Prize. In 2009, in conjunction with Vandana Singh and Suchitra Mathur, he helped organize India's first in-residence, three-week speculative fiction workshop at IIT-Kanpur. He co-edited the anthology Breaking the Bow. He is the author of the short story collection The Inconceivable Idea Of The Sun: Stories Menon’s novel, Half of What I Say was shortlisted for the 2016 The Hindu Literary Prize. The Coincidence Plot (2013) is his latest novel. Along with Pervin Saket and Akshat Nigam, Menon co-founded the Kolam Writers' Workshop (previously called the Dum Pukht Writers’ Workshop). This annual two-week residential workshop, currently in its fifth iteration, is held at the Adishakti Theatre Complex in the former French colony Puducherry (Pondicherry) in Tamil Nadu. He is editor-in-chief of The Bombay Literary Magazine. Works Short fiction "Love In A Hot Climate" in Tel: Stories (ed. Jay Lake), Wheatland Press, 2005. . "Archipelago" in Strange Horizons Magazine, April 2005. Shortlisted: 2006 Carl Brandon Society Parallax Award. "Eustace Albert" in Time For Bedlam (ed. Roger Arbuckle), Saltboy Publishers, 2005. . "Standard Deviation" in Chiaroscuro Magazine, March 2005. Reprinted in Kalkion Magazine, July 2010. Honorable Mention: Year's Best Fantasy & Horror (ed. Ellen Datlow), 2006. "Dialetheia" in New Genre Magazine, Issue No. 5, Spring 2007. "Invisible Hand" in Lady Churchill's Rosebud Wristlet, No. 20, June 2007. "A Sky Full Of Constants" in Albedo One, Issue 33, 2007. "Vermillion" in Internova Magazine, Issue 10, January 2007. "Harris On The Pig: Practical Hints For The Pig-Farmer" in From The Trenches (ed. J. P. Haines & S. Henderson), Carnifax Press, 2006. . Reprinted in Apex Magazine, December 2008. "Into The Night" in Interzone, January 2008. Reprinted in The Apex Book Of World SF (ed. Lavie Tidhar), 2008. Reprinted Apex Digest, November 2008. Reprinted Galaxies, January 2010. "The Scorching Glass" in Return of the Raven (ed. Maria Grazia Cavicchiolli), 2009. "The Poincaré Sutra" in Sybil's Garage, Issue 7, 2011. Nom
https://en.wikipedia.org/wiki/Aurora%20%28TV%20series%29
Aurora is a Spanish-language telenovela produced by the United States-based television network Telemundo. It starred Sara Maldonado, Eugenio Siller, and Jorge Luis Pila. As part of the 2010–11 season, Telemundo aired the series from November 1, 2010 to May 20, 2011 weeknights at 8pm/7pm central, replacing El Clon. As with most of its other telenovelas, the network broadcasts English subtitles as closed captions on CC3. Role Changes The Main Female protagonists are Sara Maldonado and Lisette Morelos while the main male protagonist are Eugenio Siller and Jorge Luis Pila. The Main Female Antagonist in the telenovelas first episode is initially Vanessa Pose as Vanessa Miller however Aylin Mújica becomes an antagonist from the second episode onwards playing an older Vanessa Miller, Vanessa Pose then went on to play Victoria Houghton, Vanessa’s daughter. Monica Franco went on to play a bigger antagonist as well in the telenovela. Sara Maldonado left the production after 103 episodes for personal reasons and the plot line had to change Aylin Mujica’s character changed, making her a Co-protagonist, Monica Franco’s character was removed also. Vanessa Pose left the telenovela but was asked however to come back and take Sara Maldonado’s place as a Main Female Protagonist she accepted and her character was cryogenically revived, Sonya Smith also came on to replace Sara Maldonado as Angela Amenábar. Zuleyka Rivera went on to play the main female antagonist, while Melvin Cabrera the Main Male Antagonist. Due to Sara Maldonado’s departure and the change of storyline, more actors were added include David Chocarro, Carolina Tejera, Zully Montero, Angelica Maria and Juan Pablo Llano Plot Set in New York City, the story begins in 1990 with a 20-year-old dancer named Aurora Ponce de León (Sara Maldonado). She attends New York School of the Arts with her two best friends, Natalia Suárez (Talina Duclaud) and Vanessa Miller (Vanessa Pose). One night after a dance rehearsal, they all go to a bar, where Aurora meets Lorenzo Lobos (Eugenio Siller), a dance instructor and single father. Aurora and Lorenzo fall madly in love but Vanessa, who had always been jealous of Aurora, is infuriated by this because she is also in love with Lorenzo. She tries everything to separate them, going as far as inviting Lorenzo to Aurora's lavish twentieth birthday party (Lorenzo was unaware that Aurora was wealthy), where she makes sure he sees Federico (Ismael La Rosa) kiss Aurora. Lorenzo storms off, believing that he has been betrayed. Aurora runs after Lorenzo and declares her love for him, but it doesn't work and Lorenzo wants nothing more to do with Aurora. Aurora returns home heartbroken and after an argument with her father, Gustavo (Braulio Castillo), she faints. Gustavo takes her to his cryogenic clinic to run tests. It is discovered that Aurora is pregnant with Lorenzo's baby. Her father refuses to tell Lorenzo about the pregnancy and sends her as far away from him as possible
https://en.wikipedia.org/wiki/Actian%20NoSQL%20Object%20Database
Actian NoSQL Database (formerly known as Versant Object Database or VOD) is an object database software product initially developed by Versant Corporation and currently owned by Actian. The Actian NoSQL Database enables developers using object oriented languages to transactionally store their information by allowing the respective language to act as the Data Definition Language (DDL) for the database. In other words, the memory model is the database schema model. In general, persistence in Actian NoSQL is implemented by declaring a list of classes, then providing a transaction demarcation application programming interface to use cases. Respective language integrations adhere to the constructs of that language, including syntactic and directive sugars. Additional APIs exist, beyond simple transaction demarcation, providing for the more advanced capabilities necessary to address practical issues found when dealing with performance optimization and scalability for systems with large amounts of data, many concurrent users, network latency, disk bottlenecks, etc. References Object-oriented database management systems
https://en.wikipedia.org/wiki/Spinelli%20Group
The Spinelli Group is an initiative founded with a view to reinvigorate the endeavour for federalisation of the European Union (EU), by creating a network of citizens, think tanks, NGOs, academics, writers and politicians who support the idea of a federal and united Europe. Among other goals, the Group aims to "find a federal majority [among members of the European Parliament] on important subjects." Founded on 15 September 2010 in the European Parliament (EP) in Brussels, the group is named after Altiero Spinelli (1907–1986), founder of the Union of European Federalists (UEF) and a founding father of the European integration. The group was founded by Guy Verhofstadt, former head of the liberal Alliance of Liberals and Democrats for Europe (ALDE) group in the Parliament and honorary president of the Union of European Federalists (UEF) in Belgium, former co-chair of the Greens–European Free Alliance (Greens/EFA) group Daniel Cohn-Bendit, French MEP Sylvie Goulard (ALDE) and former EP Vice President Isabelle Durant (Greens/EFA), with the support of the Union of European Federalists. Federalists' movements The Spinelli Group is not the first initiative launched in the European Parliament, gathering together followers of European federalism ideas. On 9 July 1980, the Crocodile Club a group of MEPs was founded by Altiero Spinelli himself. For more than 60 years, Union of European Federalists (UEF) and its youth organisation Young European Federalists (JEF) with a "belief that only a European Federation, based on the idea of unity in diversity, could overcome the division of the European continent" have been actively working to promote the idea of European federalism. MEP Andrew Duff and president of UEF has welcomed the launching of the Spinelli Group saying, that "existing federalist forces and organisations, such as the UEF and the Intergroup, welcome this new initiative". Manifesto With a manifesto online, recalling the Ventotene Manifesto written by Altiero Spinelli, Group activists call members of the European Parliament and Europe's citizens to sign it and add their names to the list of those fighting against nationalism and intergovernmentalism. By supporting the aims and principles laid out in the manifesto, Spinelli group followers try to speed up the process of European integration and promote a federal Europe. Members The Spinelli Group is organised in three sections. The Steering Group gathers the 33 founding members and newcomers—politicians and thinkers dedicated to building a federal Europe. The MEP Spinelli Group gathers 108 MEPs who signed the manifesto. They look for strategies and majorities in the European Parliament to push the pro-European, federal, and post-national agenda. The Spinelli Network Group is made of every citizen who signed the manifesto of the Spinelli Group. As of 8 May 2017, they are 7,327. They participate in debates and fora. This pro-European initiative is supported by prominent political leaders s
https://en.wikipedia.org/wiki/Acer%20Aspire%20laptops
Acer Aspire (stylized as Λspire or ΛSPIRE) is a series of personal computers by Acer Inc. aimed at casual household users or for small business use. The Aspire series covers both desktop computers and laptops. Many of the Aspire laptops, such as model 8920G, have built in Blu-ray drives, 5.1 audio outputs and transflective displays. In 2007, Acer introduced the Gemstone series that marked a milestone in the Acer Aspire line. As with many Windows laptops, different models may have different specification in different parts of the world, but most of the Aspire laptops, produced from 2005 to 2012, were developed with a standardized modular internal design (known as Intel Common Building Block). Aspire series List of Acer Aspire series models The Aspire series was introduced in 2017 with four main models: 1, 3, 5 and 7. In 2018, the Aspire 6 was launched exclusively for Malaysia. The Aspire 6 is simply an Aspire 5 with a Captain America inspired aesthetics. The Aspire 5 was originally launched with Intel Kaby Lake processors (i5-7200u and i7-7500u) and then was updated with Kaby Lake R processors (i5-8250u and i7-8550u) and more recently updated with Whisky Lake processors (i3-8145u, i5-8265u and i7-8565u) which came along with a redesign which involved slimmer bezels but dedicated maintenance panels for RAM and storage was omitted. More recent products such as the A715-74G and A715-75G feature a choice between the Coffee Lake 9th Gen Intel Core i5 and i7 processors, or the AMD Ryzen 3 and 5 processors. Aspire E series List of Acer Aspire E series models The Acer's Aspire E series also contains the Aspire ES sub series. The Aspire E series is a laptop line geared to being more affordable than other offerings. The Aspire E comes with either a 14" or 15.6" 16:9 display named E14 and E15 respectively. The Aspire ES comes with either an 11.6" or 14" 16:9 display named ES11 and ES14 respectively. The Aspire E series has been updated annually with newer Intel Processors. The Aspire E series is currently offered with Intel 8th generation Intel Core i series processors but has been offered with 4th, 5th, 6th and 7th generation Intel Core i series processors. The Aspire E15 weighs 5.27 lb and its dimensions are: 15.02" x 10.20" x 1.19". It has a SD Card slot, 2x USB 3.0 Type-A ports, 1x USB 2.0 Type-A port, RJ-45 Ethernet network port, HDMI Output, 1x USB 3.1 Type-C port and 1x VGA Port. Aspire F series List of Acer Aspire F series models The Acer's Aspire F15 is a 15-inch laptop. Aspire M series List of Acer Aspire M series models This sub-series has since been discontinued. Its unofficial successor is the Acer Swift series. Aspire One Acer Aspire One is a line of Aspire subcompact notebooks (netbooks) similar to the Asus EEE. Aspire P series Aspire P3 The Acer Aspire P3 is an 11.6-inch IPS LCD textured titanium-alloy maid ultrabook with an Intel Core i3-3229Y 1.4 GHz processor for i3 models and Intel Core i5-3329Y 1.5 GHz processor
https://en.wikipedia.org/wiki/Active%20reviews%20for%20intermediate%20designs
In software engineering, active reviews for intermediate designs (ARID) is a method to evaluate software architectures, especially on an intermediate level, i.e. for non-finished architectures. It combines aspects from scenario-based design review techniques, such as the architecture tradeoff analysis method (ATAM) and the software architecture analysis method (SAAM), as well as active design reviews (ADR). See also Architectural analytics References External links Active Reviews for Intermediate Designs Software architecture Enterprise architecture
https://en.wikipedia.org/wiki/Acer%20Aspire%20desktops
Aspire desktops is a part of Aspire personal computer series by Acer Inc. aimed at the casual household user or for small business use. The Aspire series covers both desktop computers and laptops. Acer developed the series in order to cover from the essentials to being more high performance. The AcerPower S series was replaced by the Aspire desktop series in 2002. The AcerPower S Series consisted of two types: the AcerPower Se Series and the AcerPower Sn Series desktop. As of July 2019 Acer offers three desktop Aspire model lines. References Aspire desktops
https://en.wikipedia.org/wiki/NicheStack%20TCP/IPv4
NicheStack is a closed source IPv4 network layer and application implementation for operating systems, written in ANSI "C" and is one of three available from InterNiche Technologies, Inc., designed for use in embedded systems. Its transport layer implementation has historical roots in BSD and the IP layer was derived from a Carnegie Mellon University (CMU) implementation. InterNiche's FTP server, Telnet server, DNS client, DHCP client, and IGMP (v1 and v2) components are included in the base software package. Supporting a wide variety of physical interfaces, NicheStack's IP layer can be configured as a standard client machine, an IP router, or a multi-homed server. NicheStack IPv4 provides a protocol platform for InterNiche's optional Point-to-Point Protocol (PPP), Web server, DHCP server, SMTP protocols and SNMP. Also available to run on NicheStack are a number of security modules, including SSH, IPsec/IKE and two different implementations of SSL. NicheStack is marketed as a small-footprint, RFC compliant embedded protocol stack, portable to commercial or proprietary non-MMU Operating Systems. NicheStack's TCP layer is based on mbufs and BSD 4.4 Sockets. All socket operations can be made in a non-blocking mode, including connect(). The mbuf data, including headers, is organized into buffer chains, allowing more efficient memory usage than the fixed-sized buffers that characterized earlier versions of this product. Tunable parameters such as MSS (Maximum Segment Size) and the TCP window can be left to runtime logic or be customized by the application. The IP layer includes Support for network address translation Fragmentation and re-assembly IP Routing: Routes set via ICMP, SNMP, IGP, etc. Loop back test driver Multi Homed IP support Support for Auto-IP Assignment NicheStack also includes NicheTool, a menu driven utility that assists the process of optimizing NicheStack for the memory usage and performance characteristics of the application. It is customizable by the product development engineers. Vulnerabilities On 4 August 2021 a series of serious vulnerabilities in NicheStack were published by Forescout Research Labs & JFrog Security Research. See also TCP/IP Internet Engineering Task Force External links NicheStack IPv4 Product Page InterNiche Home Page INFRA:HALT Embedded systems
https://en.wikipedia.org/wiki/Measure%20of%20America
Measure of America is a non-partisan, non-profit initiative of the Social Science Research Council in Brooklyn, New York. It conducts research and analysis primarily on human development data from the United States at the national, state, and county levels. Measure of America aims to stimulate fact-based dialogue about human development issues in the United States by “[breathing] life into numbers, [and] using data to create compelling narratives that foster greater understanding of our shared challenges and greater support for people-centered policies.” Measure of America’s seminal work is the American Human Development Index. Its U.S. specific index is based on human development concepts introduced by Mahbub ul Haq and Amartya Sen. In partnership with foundations, non-profit organizations, government offices, and corporations, Measure of America has produced reports, interactive tools, and services focused on data analysis and data visualization. American Human Development Reports The American Human Development Report is a biennial report on human well-being in the United States produced by Measure of America. It follows the human development concept, which is the process of expanding the well-being of individuals to develop their full potential, by increasing opportunities in the arenas of health, education, and income. Similar to the global Human Development Report, published annually by the United Nations Development Programme, and the National Human Development Reports (NHDRs), the American Human Development Reports serve as advocacy tools to spur lively debates and mobilize support for action and change. The Measure of America, 2013–2014 The Measure of America, 2013–2014 was co-authored by Sarah Burd-Sharps and Kristen Lewis. It is the third in the American Human Development Reports series and, like its predecessors, includes updated Index rankings while examining changes in well-being since 2000, as well as before and after the Great Recession. The report provides information for the country as a whole, the 50 U.S. states, the 25 largest metropolitan areas, and racial and ethnic groups within those regions. The report was funded by the Conrad N. Hilton Foundation. The Measure of America, 2010–2011 The Measure of America, 2010–2011: Mapping Risks and Resilience was co-authored by Sarah Burd-Sharps and Kristen Lewis, and includes a foreword by Jeffrey Sachs. The second in the American Human Development Reports series, the 2010–2011 edition features updated Index rankings of the 50 states and 435 congressional districts; reveals huge disparities in the health, education, and the standard of living of different racial and ethnic groups from state to state; and shines a spotlight on disparities within the ten largest metropolitan areas in the country. The report was funded by the Conrad N. Hilton Foundation and The Lincy Foundation, and is a joint publication of the Social Science Research Council and New York University Press. The
https://en.wikipedia.org/wiki/Smeegol%20Linux
Smeegol Linux is a MeeGo and openSUSE Linux-based open source mobile operating system made available from Novell and their openSUSE Goblin Team under the name Smeegol Linux. This Linux distribution combines openSUSE with MeeGo's netbook oriented user interface to get a new Linux distribution designed for netbooks. What makes Smeegol Linux unique when compared to the upstream MeeGo or openSUSE is that this distribution is at its core based on openSUSE but has the MeeGo User Experience as well as a few other changes such as adding the Mono-based Banshee media player, NetworkManager-powered network configuration, a newer version of Evolution Express, and a range of social networking features for Facebook, Twitter, MySpace, Flickr and Digg, plus Firefox and Chromium web browsers already pre-installed. Any end-users can also build their own customized Smeegol Linux OS using SUSE Studio. See also MeeGo openSUSE Linux distribution Linux References External links Smeegol Linux ISO images download Smeegol Linux Repo Mobile operating systems SUSE Linux Linux distributions
https://en.wikipedia.org/wiki/Linaro
Linaro is an engineering organization that works on free and open-source software such as the Linux kernel, the GNU Compiler Collection (GCC), QEMU, power management, graphics and multimedia interfaces for the ARM family of instruction sets and implementations thereof as well as for the Heterogeneous System Architecture (HSA). The company provides a collaborative engineering forum for companies to share engineering resources and funding to solve common problems on ARM software. In addition to Linaro's collaborative engineering forum, Linaro also works with companies on a one-to-one basis through its Services division. Linaro works on software that is close to the silicon such as kernel, multimedia, power management, graphics and security. The company aims to provide stable, tested tools and code for multiple software distributions to use to reduce low-level fragmentation of embedded Linux software. It also provides engineering and investment in upstream open source projects and support to silicon companies in upstreaming code to be used with their systems-on-a-chip (SoC). Since the 3.10 Linux kernel release, Linaro has consistently been listed in the top ten contributors to the Linux kernel. Every six months, Linaro hosts Linaro Connect - an engineering conference, where leading hardware and software companies in the ARM ecosystem come together to collaborate, hack and develop technical road maps and strategy. History The founding of Linaro was announced at Computex in June 2010 by ARM, Freescale Semiconductor, IBM, Samsung, ST-Ericsson, and Texas Instruments in a joint press conference. Linaro was formed to provide ”new resources and industry alignment for open source software developers using Linux on the world’s most sophisticated semiconductor System-on-Chips (SoCs).” Since its formation, Linaro has continued to deliver tools, security and Linux kernel quality to the ARM ecosystem as a whole. In addition, the company has created groups tasked with addressing fragmentation in the following market segments: Consumer Devices, Datacenter & Cloud, Edge & Fog Computing and Windows on Arm. In 2012, Linaro formed the Linaro Datacenter & Cloud Group (formerly known as the Linaro Enterprise Group) to drive adoption of ARM in the server market. In February 2013, Linaro launched the Linaro Networking Group. This group went on to start the OpenDataPlane initiative which “defined a set of APIs to be used across the full range of processor architectures and networking offloads available”. In 2018, project governance of the OpenDataPlane project was moved to the Openfastpath Foundation. In February 2014, Linaro formed the Linaro Security Working group to “create open source Android and Linux reference designs for Trusted execution environment (TEE) technology.” Shortly after its formation, the Security Working Group took over project governance of (Open Portable Trusted Execution Environment), initially a proprietary TEE project developed by ST-Eri
https://en.wikipedia.org/wiki/Koahnic%20Broadcast%20Corporation
Koahnic Broadcast Corporation (KBC) is a nonprofit media center that provides Native radio programming through Alaska Native governance and operation. KBC’s radio programming consists of National Native News, Native America Calling, and Indigefi, some of which can be heard nationally through their Native Voice One service. KBC also owns and operates KNBA (90.3 FM) located in Anchorage, Alaska, the first Native radio station in an urban market, and Rising Indigenous Voices Radio (RIVR), an internet radio station streaming modern Native music. Background Cook Inlet Region, Inc., a corporation created under the 1971 Alaska Native Claims Settlement Act, was instrumental in developing KBC. KBC was founded in 1996 and is located in Anchorage, Alaska, with a satellite office in Albuquerque, N.M. The word "koahnic" is of Athabascan origin and was chosen for the name of the corporation due to its meaning "live air." KBC is funded in part by the Corporation for Public Broadcasting. On June 28, 2010, KBC aired its first international broadcast broadcasting the 11th Inuit Circumpolar Council's General Assembly from Greenland to North America. Mission statement The primary mission of KBC is to bring Native voices to Alaska and the nation with its core purpose being to broadcast the Native voice. Programming National Native News (NNN) is a radio show which airs news relating to Native issues on 137 radio stations. This show began in 1987 with a distribution to 30 stations and is the “only daily news and information program produced from a Native perspective”. NNN is a five-minute program that is distributed by Native Voice One (NV1). This show is produced in Albuquerque. Native America Calling (NAC) is a live radio show that allows listeners to call in and discuss issues that are relevant to Native communities. NAC is distributed via Native Voice One (NV1) to 52 stations and on the internet. Indigefi is a radio show that features Native music. Indigefi is produced by KBC, hosted by Alexis Sallee, and distributed by Native Voice One (NV1). Stories of our People is a radio show that is edited from 50 hours of taped interviews and narratives told by Native Americans. Native Word of the Day is a radio program that delivers a Native American word of the day. UnderCurrents is a culturally diverse, freeform daily music mix heard on 203 stations and the internet. UnderCurrents is independently produced by Gregg McVicar (Tlingit) of RadioCamp, LLC and is distributed by Native Voice One (NV1). Gae:no' is a weekly one-hour program devoted to traditional Native American music, with a focus on Iroquois music. It is hosted by Brett Maybee. From 2010 to 2021, the program was a local program on NV1 affiliate WGWE, before the Seneca Nation of Indians shut that station down. National Training Center KBC's National Training Center, once known as the Indigenous Broadcast Center and founded in 1992, provided training opportunities for Alaska Natives and Native A
https://en.wikipedia.org/wiki/Reuters%20Market%20Light
RML AgTech Pvt. Ltd. (RML AgTech), RML AgTech Pvt. Ltd. (RML AgTech), formerly known as Reuters Market Light ''founded and earlier led by Amit Mehra'' was a business that provided technology and Data Analytics Solutions to farmers and the agriculture value chain. The Decision Support Technology provided farmers with personalised agricultural data analytics. They received data on topics like pre-sowing or post-harvest via a mobile application or SMS during the initial phase. Approximately 3.4 million Indian farmers across 18 states were part of this service. They received information on 450 crop varieties and more than 1300 markets. Core Business At its core, RML AgTech Pvt. Ltd. was an information service provider to farmers. They offered services to farmers including tailored information about crops and markets, information sharing through SMS, communication in the local language, farming tips based on local and international standards, user-friendly interface across all handsets and telecom operators, and easy accessibility for farmers to reach out in case of grievances through rural outlets. History Thomson Reuters (then Reuters) began with a one-page idea of a Reuters employee to use mobile solutions to address the state of farmers around the developing world. Initial research suggested that farmers lacked relevant, reliable, timely and consistent information and commerce support to improve their productivity, reduce their crop losses and realize fair prices for their produce. The findings prompted the company to develop a system that addressed these problems with the help of technology. RML was designed keeping in mind the holistic approach to create a structured ecosystem for farmers. Hence, RML approached the problem keeping in mind the individual requirement of each farmer. Therefore, the farmers received customized information based depending on their data. The type of crop, soil, location, irrigation type, and even the stage of the crop cycle was considered when a piece of information was sent out. Realizing the potential in the idea, Thomson Reuters incubated RML as an internal start-up as part of its global innovation program. Spearheading this development was Mr Premprakash Saboo, co-founder, CFO, Head of Institutional Sales. Following nearly 18 months of market research, user-led prototyping, and market trials, RML AgTech was officially launched on October 1, 2007, in Maharashtra by Sharad Pawar, the union minister of agriculture of India followed by launch in Punjab in 2008 by Mr. Prakash Badal, the state's Chief Minister. The business received funding from Thomson Reuters and IvyCap Ventures Advisors Private Limited (IvyCap), a fund management company. IvyCap, which is backed by the IIT Alumni Network, was the lead investor in RML AgTech. Thomson Reuters remained a shareholder and partner in the newly formed RML AgTech Pvt Ltd (formerly RML Information Services Private Limited). The company evolved from a phone-led produ
https://en.wikipedia.org/wiki/Cape%20Cod%20System
The Cape Cod System was a computer system designed to simulate an air defense system covering southern New England. It was named after Cape Cod, the location of many of the radars. History The Cape Cod System was designed to demonstrate a computerized air defense system, covering southern New England. Signals from three long range (AN/FPS-3) radars, eleven gap-filler radars, and three height-finding radars were converted from analog to digital format and transmitted over telephone lines to the Whirlwind I computer in Cambridge, Massachusetts. The first tests of the Cape Cod System, beginning in September 1953, used only simulated data, but later tests used U.S. Air Force B-47 Stratojet bombers as stand-ins for Soviet bombers, and real interceptors scrambled from four Air Force bases. The Cape Cod System verified that the new core-based machine was fast enough for use in SAGE, and an industrial effort was started in order to mass-produce the AN/FSQ-7 computers for this role. RCA was a front-runner, but IBM was eventually selected instead. They started production in 1957, along with a massive construction project to erect the buildings, power and communications network needed to feed the SAGE systems with data. External links The SAGE Air Defense System Building information North American Aerospace Defense Command Cape Cod and the Islands
https://en.wikipedia.org/wiki/KonaKart
KonaKart is a Java eCommerce system aimed at medium to large online retailers. The KonaKart product is owned by DS Data Systems UK Ltd with staff in Italy and the UK. DS Data Systems UK Ltd is part of the Zucchetti Group. KonaKart provides an extensive set of features to enable retailers to successfully sell their products over the internet. It is a Java / JSP / Javascript / XML based solution with easy to use java APIs (POJO, SOAP, JAXWS, JSON and RMI) that allow retailers to quickly integrate eCommerce functionality into existing systems. The customizable parts of KonaKart are Open Source and available under the GNU LGPL. KonaKart includes both a Storefront application (with a Responsive Design) and an AJAX-enabled Administration Application. The Administration Application includes role-based security which allows companies to define the administrative functions that should be allowed for different user groups. Key Features of KonaKart include: Comprehensive eCommerce / shopping cart functionality Ease of integration through its complete set of Java, SOAP, JAXWS, JSON and RMI APIs Ease of creation of unique storefronts by using the jQuery / Javascript libraries Ease of customization - with examples, tutorials and source code available High performance, scalability and reliability Ability to run as a portlet - e.g. in Liferay Easy to integrate with any CMS or ERP system Wide choice of supported databases (MySQL, Oracle, PostgreSQL, DB2, MS SQL Server) There are two versions of KonaKart: The Community Edition of is free and can be downloaded from the KonaKart website. The Enterprise Extensions Edition is chargeable and has more features that tend to appeal to larger Enterprises. Clients KonaKart has a number of notable clients worldwide including Sony, Treasury Wine Estates, Audi, Tesco, Coop, O2, Leroy Merlin, MasterCard, RAND Corporation, The Vatican, Si.mobil, Selgros, Tallink, Weleda, dm-drogerie markt, Verizon Communications Inc. and Edeka. References External links KonaKart Official Website Providers of services to on-line companies Java (programming language)
https://en.wikipedia.org/wiki/Pdf-parser
Pdf-parser is a command-line program that parses and analyses PDF documents. It provides features to extract raw data from PDF documents, like compressed images. pdf-parser can deal with malicious PDF documents that use obfuscation features of the PDF language. The tool can also be used to extract data from damaged or corrupt PDF documents. References PDF software Public-domain software with source code 2008 software
https://en.wikipedia.org/wiki/Deltacloud
Deltacloud is an application programming interface (API) developed by Red Hat and the Apache Software Foundation that abstracts differences between cloud computing implementations. It was announced on September 3, 2009. Each Infrastructure-as-a-Service cloud existing today provides its own API. The purpose of Deltacloud is to provide one unified REST-based API that can be used to manage services on any cloud. Each particular cloud is controlled through an adapter called a "driver". As of June 2012, drivers exist for the following cloud platforms: Amazon EC2, Fujitsu Global Cloud Platform, GoGrid, OpenNebula, Rackspace, RHEV-M, RimuHosting, Terremark and VMware vCloud. Next to the 'classic' front-end, it also offers CIMI and EC2 front-ends. Deltacloud is used in applications such as Aeolus to prevent the need to implement cloud-specific logic. On May 17, 2010 Red Hat contributed Deltacloud to the Apache Incubator project. It graduated Incubator on October 26, 2011 and became Apache Software Foundation TLP (Top-Level Project). In July 2013 Fujitsu and VMware used Deltacloud in a demonstration of CIMI at a Management Developers Conference to manage their cloud infrastructure. Im May 2013, RedHat announced that it was scaling back its sponsorship of the Apache Deltacloud project, effective immediately. In July 2015, Deltacloud was moved to the Apache Attic due to inactivity. See also Aeolus (software) References External links Official website Deltacloud Project Incubation page Mailing list and archive Red Hat software Cloud applications Application programming interfaces
https://en.wikipedia.org/wiki/Babak%20Pasdar
Babak Pasdar is an Iranian-American innovator, cyber security expert, author, and entrepreneur best known for his contributions in the areas of cloud-based security innovations and as a whistle blower on government warrantless wiretapping. Pasdar has been credited for being one of the leading innovators of Cloud Delivered Security via two technology startups he founded. IGX Global in 1997 and Bat Blue Networks (Now OPAQ Networks) in 2007, in both cases serving as CEO and CTO. Pasdar exited Bat Blue Networks in 2016 with the sale of his company to OPAQ Networks. He is now serving as founder, CEO and CTO of Acreto IoT Security, focused on addressing emerging security challenges posed by highly distributed and mobile purpose-built internet of things (IoT) devices that have seeped into every day life. Pasdar was selected as one of New York's Top Ten Startup Founders in 2017. Early years Pasdar the eldest of three sons was born in Kermanshah, Iran. His father was Koocheck Pasdar, a General in the Iranian Army under the Shah of Iran. His mother Simin Fardsavar-Pasdar was a school teacher from Shiraz, Iran. Pasdar is also related to actor Adrian Pasdar. His family fled Iran to the United States in 1979 to escape the revolution. Arriving to the U.S. under a tourist visa, his family's requests for political asylum were denied, driving a long process for the family to establish themselves legally and financially in the United States. Professional career Pasdar was an early entrepreneur, starting his first business while still in high school. At a time when computer memory chips were in significant demand with high prices, Pasdar purchased used mainframe computers at auctions and extracted their memory chips using special techniques he developed. Throughout his career he has been credited for evolving ahead of a constantly commoditizing technology market-space moving from harvesting memory chips, to building PCs, networking, multi-platform integration, Internet communications and eventually cyber security. In 1992, Pasdar discovered the Internet and quickly moved to start his first Internet Services Company where he developed experience and expertise in Internet Communications technologies. In 1995 while experimenting with unorthodox Internet communications, Pasdar inadvertently compromised the Microsoft corporation. This highlighted to Pasdar the importance of cyber security and how challenged the industry's approach was. In 1997, Pasdar founded IGX Global, a cyber security company delivering fully operationalized Security as-a-Service. He developed a reputation for effective handling of large-scale and complex projects. This reputation drove Juniper Networks to engage Pasdar in the Verizon Wireless project which led to his whistleblowing on Verizon's warrant-less wiretapping. At IGX Global, Pasdar also invented the first Proxy in-the-Cloud technology called Security Anywhere. This Proxy in-the-Cloud approach became the foundations of many
https://en.wikipedia.org/wiki/Halloween%20%28Modern%20Family%29
"Halloween" is the sixth episode of Modern Family's second season and 30th episode overall. It was originally broadcast on October 27, 2010, on the ABC network in the United States. The episode was written by Jeffrey Richman and directed by Michael Spiller and was based on an idea by cast member Eric Stonestreet. The episode follows Claire's love for Halloween, which leads her to transform the Dunphy residence into a haunted house for trick-or-treaters. Cameron cannot shake a childhood trauma related to the holiday and Mitchell has a terrible day at work. Gloria acts weird after Jay and Manny tease her about her accent. "Halloween" received mostly positive reviews from critics. According to Nielsen Media Research, "Halloween" became the most viewed episode of the series and tied for the series' highest-rated episode among adults between ages 18 and 49. It later became the second highest-rated show for the week as well as the week's highest-rated scripted program. This episode received multiple Primetime Emmy Award nominations at the 63rd Primetime Emmy Awards, and won for Outstanding Directing for a Comedy Series for Michael Spiller. Jesse Tyler Ferguson was nominated for Outstanding Supporting Actor in a Comedy Series for his performance in this episode. Plot At the Dunphy house, Phil (Ty Burrell) learns that his neighbor, Jerry (Matt Besser) has divorced. Phil is initially sad for Jerry, but soon fears that the same thing might happen to him and his wife, Claire (Julie Bowen). Phil soon assumes Claire's concentration on completing the haunted house is a sign that she no longer loves him. He soon does the opposite of what Jerry did that caused the demise of his marriage, like being spontaneous, with all of Phil's attempts failing. Mitchell (Jesse Tyler Ferguson) also gets excited when he learns that his new law firm allows employees to wear Halloween costumes, and decides to wear a Spider-Man costume to work. Unfortunately, he learns too late that "only tools and douches wear costumes". He quickly puts on a suit over the costume, thinking that he can change out of the costume later, but he is pulled into several meetings and is unable to get the chance to take it off. Meanwhile, Gloria (Sofía Vergara) gets offended by Manny (Rico Rodriguez) and Jay (Ed O'Neill) correcting her accent so she starts acting weird and talking differently. At Claire's finished haunted house, everything goes wrong with Jay late at activating the effects, Gloria speaking in her "English" voice, Alex poorly imitating being held prisoner and Cameron still talking about his "traumatic" Halloween story. After two failed attempts at scaring trick-or-treaters, Claire and Gloria both become furious and walk out of the haunted house. Jay reveals to Gloria that it was the sound of her accented voice that made him fall in love with her on the day he met her, which reassures her. Phil asks Claire if she is tired of him, to which she responds that they are happily stuck toge
https://en.wikipedia.org/wiki/Community%20Access%20Media%20Alliance
The Community Access Media Alliance (CAMA) (formerly the Association of Community Access Broadcasters (ACAB)), also known as the Access Radio Network, is a group of twelve New Zealand community radio media organisations. The stations were established between 1981 and 2010 and have received government funding since 1989 to broadcast community programming and provide facilities, training and on-air time for individuals and community groups to produce programming. In addition to government funding conditions, the stations also have an individual and collective mandate to broadcast programmes for people of a wide range of particular religions, cultures, languages, ages and sexualities. Stations operate independently and locally, with each station expected to make decisions on programming and scheduling by internal consensus. In total, they produce content in at least 40 different languages. The member stations currently serve Auckland, Waikato, Taranaki, Hawke's Bay, Manawatu, Wairarapa, Kāpiti, Wellington, Nelson, Canterbury, Otago and Southland. Some community stations have powerful frequencies, while others are low-power stations with a small local reach. History Establishment The stations of the Access Radio Network were established between 1981 and 2010: April 1981: Wellington Access Radio March 1986: Arrow FM Wairarapa 1987: Planet FM Auckland 28 February 1988: Plains FM Canterbury 1990: Otago Access Radio 1992: Free FM Hamilton 1994: Fresh FM Nelson 1995: Radio Hawke's Bay (renamed from Radio Kidnappers August 2022) 1996: Coast Access Radio (Kapiti) 1998: Access Manawatu 2010: Access Radio Taranaki The association was set up in the early 1990s following a meeting between community station managers and New Zealand on Air officials in Wellington. It was the first opportunity many station managers had to meet each other and share the challenges each station had faced, including operating on limited resources, relying on volunteer support, serving diverse communities or operating from remote locations. Funding In 1989, the Broadcasting Act set up the Broadcasting Commission - known publicly as New Zealand On Air - to fund New Zealand content for both mainstream and minority audiences. Funding of access radio has always been a part of that function, and the ongoing funding of the Association member stations remains a core component of the commission's Community Broadcasting Strategy. A government funding pool of approximately $2 million is now allocated annually for the eleven stations to produce programming for women, youth, children, ethnic and other minorities and people with disabilities in accordance with section 36(c) of the Broadcasting Act. Individual station funding is allocated on a four-tier system based on audience reach, with each station receiving between $110,000 and $220,000 in annual, contestable and publicly transparent funding rounds. Auckland's Planet FM is in the highest-funded Tier One; and Free FM Hami
https://en.wikipedia.org/wiki/GTRI%20Cyber%20Technology%20and%20Information%20Security%20Laboratory
The Cybersecurity, Information Protection, and Hardware Evaluation Research Laboratory (CIPHER) is one of eight labs in the Georgia Tech Research Institute. It was created on October 1, 2010 and focuses on cyber security. Along with the GTRI Information and Communications Laboratory, it is part of the Information and Cyber Sciences directorate. GTRI CIPHER is known for its commitment to Open Source Software It will feature existing business areas such as secure information systems and resilient command and control with emerging areas such as cyberwarfare. The laboratory will additionally be a part of the Georgia Tech Information Security Center. References External links CIPHER official website CIPHER Computer security organizations
https://en.wikipedia.org/wiki/Papaya%20CMS
papaya CMS is an open-source content management system, free of charge and complying with open standards like XML as data format, XSLT as templating language, and PHP for programming. History Development started in 2000 as a commercial project, papaya CMS was then released as an open-source CMS under the GNU General Public License in 2005. Its architecture and feature set are derived from the initial use case in commercial/larger installations. System architecture papaya CMS is a software build upon a modular concept, to use it as framework for special applications beside the typical tasks of a content management system. It fully supports unicode, multi-language and multi-site installations. All texts, configuration data etc. is stored as XML in a relational database. Media files such as images and videos are located in the file system and will be managed by papaya and referenced as needed. Many functions (such as database access, authentication, build methods for backend menus, etc.) are defined centrally and can be accessed through an abstraction layer. papaya CMS is developed in PHP and object-oriented. Data is stored in XML, XSLT is used as template language. The system does not use self-developed or proprietary script- or templating languages. Special features Unlike many other CMS papaya CMS is characterized by the fact that it is available under the GPL on the one side. On the other side, a company behind the product is available that provides support and training. Accessibility With its clear separation of content, layout and formatting using XSLT, anything possible in XHTML/HTML can be implemented in papaya CMS - this is in the hands of the developer. So papaya is an option for accessibility. Features and functions Base system based on open technologies (PHP/XSLT/XML, MySQL and PostgreSQL) compatible with MySQL, PostgreSQL, SQLite strict separation of layout and logic by XSLT templates accessible pages no problem optimized for search engines intelligent caching system for pages and sub-content automatic scaling of images, flash files etc. picture browser for easy viewing WYSIWYG editor separate user management for page authors and visitors work-flow mapping easily expandable with PHP classes versioning / staging automatic generation of sitemaps integrated messaging system creation of aliases ("short URLs") cronjobs to automate tasks logging of user actions and system messages Translation module for the backend to add more languages synchronous multi-language features for content and article types (each item can be present in as many languages as wanted) 100% unicode support Output filters (to output items as HTML and as an alternative as PDF or others) central task overview ("papaya Today"), in which all tasks, messages and unpublished articles, etc. are displayed Multi-Site features (Delivery of different webpage contents with customizable domain options (output formats, templates, designs, etc.) p
https://en.wikipedia.org/wiki/Severo%20Tiago
Severo Tiago (born 10 February 1903) was a Portuguese footballer who played as forward. External links Data at WorldFootball 1903 births Portuguese men's footballers Men's association football forwards C.F. Os Belenenses players Portugal men's international footballers Year of death missing Place of birth missing
https://en.wikipedia.org/wiki/Southern%20Belles%3A%20Louisville
Southern Belles: Louisville is an American reality television series on the Soapnet cable network that aired for one season from May 21 to July 23, 2009. The show focused on the lives of five women in Louisville, Kentucky. Cast Emily Gimmel Hadley Hartz Julie Smith Kellie Frey Shea Johnson Episodes Season 1 (2009) References External links Official Website Official Facebook Culture of Louisville, Kentucky Women in Kentucky 2009 American television series debuts 2009 American television series endings 2000s American reality television series Soapnet original programming Television shows set in Kentucky Television series by Endemol
https://en.wikipedia.org/wiki/Christopher%20Abad
Christopher Abad is an American hacker, museum curator, artist, network engineer and programmer. He is best known for his qualitative analysis of specialization stratification in the underground economies related to computer crime. Academic publication and mainstream news coverage While at UCLA, Abad discovered a method by which collisions in the hash function used in Internet Protocol datagrams may be leveraged to enable covert channel communications. His discovery was a centerpiece of covert communications methodology and was the primary citation for an Association for Computing Machinery paper on covert channel detection and another on a similar technique using TCP timestamps, the two most well-cited and widely republished papers on the subject. In 2005 while working at Cloudmark, Abad spent six months examining the phishing underworld from the inside. Abad discovered that phishers were using IRC channels in order to trade personal information. He stalked and collected messages from thirteen chat rooms phishers use. Whereas past phishing researchers believed that phishing was coordinated by highly organized criminals, Abad discovered that phishing rings were decentralized. Abad published his findings in First Monday. This paper was the first examination of how the economy of phishing agents functioned, and highlighted the high degree of specialization within the economy. 20 GOTO 10 Abad was the founder and owner of 20 GOTO 10 (2008–2012), a former gallery which caters not only to fine art, but to "hacker" art, with an emphasis on technology as art, or exhibits which make the potentially criminal or unethical aspects of computer security accessible to the public. The gallery received many favorable reviews coverage for its airing of art related to the computer underground, including ANSI and 3D art. References American computer programmers Hackers Living people University of California, Los Angeles alumni 20th-century births Year of birth missing (living people)
https://en.wikipedia.org/wiki/List%20of%20freeways%20in%20Victoria
This is a list of freeways in Victoria, Australia. The Victorian road network services the population centres, with highways generally radiating from Melbourne and other major cities and rural centres with secondary roads interconnecting the highways to each other. Many of the highways are built to freeway standard. Victoria has the most extensive freeway and road network in Australia. Freeways denoted as M1 Princes Freeway The Princes Freeway is the second longest freeway after the Hume Freeway. It is 159 kilometres long. It continues on from the Princes Highway at Tralagon and ends at the Princes Highway at Geelong. It replaces the Princes Highway between Melbourne and Geelong. It has 4-6 lanes between Tralagon and Narre Warren, from there it is the Monash Freeway to Toorak Road where it continues as CityLink to the Burnley Tunnel before turning into the Westgate Freeway, at the Western Ring Road it turns back into the normal Princes Freeway, where it has eight lanes. Its major junctions are Western Ring Road, Princes Highway, Berwick-Cranbourne Road and Strzelecki Highway. It is the second busiest freeway in Victoria after the Monash Freeway. The major towns it passes through are Tralagon, Morwell, Moe, Warragul, Pakenham, Berwick and Geelong. At the Victoria/New South Wales border the freeway becomes the Princes Highway and continues up the New South Wales coast. The South Australia/Victoria border has the Princes Highway crossing the border, going through Warrnambool back up to Melbourne. Monash Freeway The Monash Freeway is 34 kilometres long. It continues on from the Princes Freeway at Narre Warren and turns into CityLink at Toorak. The Monash Freeway replaces the Princes Freeway between Melbourne and Narre Warren. It has 10 lanes for all the Monash Freeway's length. The Monash Freeways major junctions are South Gippsland Freeway, EastLink, Springvale Road, Burke Road and Warrigal Road. The major suburbs it passes through are Berwick, Narre Warren, Hallam, Dandenong, Mulgrave, Chadstone and Toorak. CityLink The underground CityLink directly connects the ends of the West Gate and Monash Freeways into one continuous through-way. This link comprises the twin Burnley and Domain Tunnels which pass under the Royal Botanic Gardens and the Yarra River, each tunnel channelling traffic in different directions. West Gate Freeway The West Gate Freeway is a 14 kilometre Freeway which starts at the Burnley Tunnel at Southbank and turns into the Princes Freeway near Laverton North. The Westgate Freeway replaces the Princes Freeway between Laverton and Melbourne. The West Gate Bridge is on the Westgate Freeway. The Westgate Freeway has eight lanes for its entire length. Its major junctions are the CityLink, Western Ring Road, Geelong Road, Docklands Highway, Montague Street and St Kilda Road. The major suburbs are Melbourne central business district and Laverton North. Geelong Ring Road The Geelong Ring Road is a freeway that bypasses Geelong.S
https://en.wikipedia.org/wiki/National%20Trauma%20Data%20Bank
The National Trauma Data Bank (NTDB), also called the American College of Surgeons National Trauma Data Bank, is a compilation of information about traumatic injuries and outcomes in the United States. Hospital emergency rooms and other institutions such as trauma centers which are participants submit data and receive in return access to reports analyzing data about both their own operations and trauma medicine in the United States as a whole. Annual reports, an annual report and a pediatric report, which include demographic information is issued. Access to data sets is available to researchers who apply and are approved. Notes External links Homepage National Trauma Data Bank NTDB Reports and Publications 2010 National Trauma Data Bank Annual Report 2010 National Trauma Data Bank Pediatric Report Statistical service organizations Medical emergencies Traumatology Healthcare in the United States
https://en.wikipedia.org/wiki/Semantic%20analysis%20%28computational%29
Semantic analysis (computational) within applied linguistics and computer science, is a composite of semantic analysis and computational components. Semantic analysis refers to a formal analysis of meaning, and computational refers to approaches that in principle support effective implementation in digital computers. See also Computational semantics Natural language processing Semantic analytics Semantic analysis (machine learning) Semantic Web SemEval References Further reading Chris Fox (2010), "Computational Semantics", In Alexander Clark, Chris Fox, and Shalom Lappin, editors. The Handbook of Computational Linguistics and Natural Language Processing. Malden, MA: Wiley-Blackwell, 394–428. Agirre, Eneko, Lluis Marquez & Richard Wincentowski (2009), "Computational semantic analysis of language: SemEval-2007 and beyond", Language Resources and Evaluation 43(2):97–104 Computational linguistics Natural language processing Semantics Computational fields of study
https://en.wikipedia.org/wiki/Chntpw
chntpw is a software utility for resetting or blanking local passwords used by Windows NT operating systems on Linux. It does this by editing the SAM database where Windows stores password hashes. Features There are two ways to use the program: via the standalone chntpw utility installed as a package available in most modern Linux distributions (e.g. Ubuntu) or via a bootable CD/USB image. There also was a floppy release, but its support has been dropped. Limitations chntpw has no support for fully encrypted NTFS partitions (the only possible exceptions to this are encrypted partitions readable by Linux such as LUKS), usernames containing Unicode characters, or Active Directory passwords (with the exception of local users of systems that are members of an AD domain). The password changing feature is also prone to errors, so password blanking is highly recommended (in fact, for later versions of Windows it is the only possible option). Furthermore, the bootable image might have problems with controllers requiring 3rd party drivers. In such cases use of the stand-alone program in a full-featured Linux environment is recommended. Where it is used The chntpw utility is included in many various Linux distributions, including ones focused on security: Kali – security-focused Linux distribution SystemRescueCD – recovery-focused Linux distribution Fedora – general distribution Ubuntu – Linux distribution published by Canonical License change For the software's 10th anniversary, the author changed the license from a non-commercial one to the GNU General Public License (GPL) Version 2. References External links Free security software Operating system distributions bootable from read-only media
https://en.wikipedia.org/wiki/PeopleBrowsr
PeopleBrowsr is a technology company that provides enterprise, government and Top Level Domain owners with the ability to launch their own blockchain integrated social networks and analyze and engage the members of those networks. An owner of new TLDs itself, PeopleBrowsr is the creator of .CEO, .Best (sold to The Best SAS in July 2018) and .Kred. Company profile PeopleBrowsr works with enterprise, government and TLD owners in multiple industries. In December 2008, it launched a deep search dashboard for managing and engaging with the social stream. PeopleBrowsr has been receiving, analyzing and indexing the full Twitter firehose since 2008. In combination with other sources, PeopleBrowsr has compiled a trillion conversation datamine which enables it to conduct analytics using Kred Influence Measurement Company has combined its trillion conversation datamine, Kred Influencer Analytics, SocialOS network platform and three TLDs, to become the leading Social Network provider for organizations around the world. Kred In October 2011, the company debuted Kred for measuring influence and outreach on social networks. Experimental projects PeopleBrowsr is engaged in research projects including the development of artificial intelligence and new social networking platforms. PeopleBrowsr CEO Jodee Rich believes that the documenting of history in real time with social networking platforms is creating a wealth of data that can be used to help computers better understand human behavior. In this way, machines can be trained to mine the human data to learn behavior, rather than having to be taught how to think like humans. SocialOS In June 2013 PeopleBrowsr launched SocialOS which is a set of APIs which bridges existing networks and enables new social networks to be rapidly rolled-out. Top Level Domains PeopleBrowsr owns Top Level Domains .CEO, .Kred, and formerly .Best. These domains were released in late 2013 and early 2014 and are powered by the Company's products: SocialOS, Kred and its Trillion Conversation Datamine. Sale of the .Best Top Level Domain In June 2018, PeopleBrowsr received approval from ICANN (Internet Corporation for Assigned Names and Numbers) to sell its BestTLD Pty Ltd subsidiary to The Best SAS, a Paris-based company led by President, Cyril Fremont, in a strategic deal that would leverage PeopleBrowsr's SocialOS technology. BestTLD Pty Ltd owns the .Best Top Level Domain. It has distribution agreements with GoDaddy and over 50 other Domain Registrars. Litigation In November 2012, PeopleBrowsr sued Twitter over a proposed shutdown of PeopleBrowser's access to the Twitter firehose, which was set to occur on November 30, 2012. After PeopleBrowsr won an injunction to prevent the disconnection of the Twitter firehose, Twitter attempted to move the case into Federal court, which may have invalidated the injunction. In March 2013 PeopleBrowsr won a battle to keep the case within the California court system, thereby keeping the injunctio
https://en.wikipedia.org/wiki/List%20of%20Gaon%20Album%20Chart%20number%20ones%20of%202010
The Gaon Album Chart is a record chart that ranks the best-selling albums and EPs in South Korea. It is part of the Gaon Music Chart which launched in February 2010. The data for the chart is compiled by the Ministry of Culture, Sports and Tourism and the Korean Music Content Industry Association based on weekly and monthly physical albums and digital sales by six major distributors: LOEN Entertainment, S.M. Entertainment, Sony Music Korea, Warner Music Korea, Universal Music and Mnet Media. In 2010, there were 40 number one albums on the weekly chart. 2PM, and Girls' Generation topped the chart with three different albums each, more than other act. On the monthly chart, Girls' Generation had four number ones with three different albums, more than other act. Overall, Super Junior's Bonamana album was Gaon Album Chart best selling album of 2010, selling 200,193 copies. The second highest-selling album was Girls' Generation's Oh! which sold 197,934 copies; a repackaged version titled Run Devil Run sold 136,851 copies. Girls' Generation sold South Korea best-selling album of 2010 with 334,785 units sold for both albums. Weekly chart Monthly chart Notes References External links Gaon Album Chart - official homepage 2010 Korea, South albums 2010 in South Korean music
https://en.wikipedia.org/wiki/Stock%20Car%20%28video%20game%29
Stock Car is an overhead-view racing video game written by A. W. Halse and published in the UK by Micro Power. It was released in 1984 for the BBC Micro, Acorn Electron, and Commodore 64 computers. Although the cassette inlay gives the release date as 1984, some sources state the release date as 1983, and the game is also known as Stock Car Racer. Stock Car is similar to Atari, Inc.'s Sprint 2 arcade game (1976) and Indy 500 for the Atari VCS (1977). Gameplay The game provides a top-down view of one of six user-selectable racing tracks. One or two human players in red cars compete against yellow computer-controlled cars. Oil slicks can be added which cause the cars to veer off-course, making the game more challenging. The amount of skidding can also be selected by the player. A race consists of anything between 1 and 40 laps. Players can steer their car left and right, but unlike most racing games, there are no keys for directly braking or accelerating. Instead, the player drives by selecting one of four gears (or neutral) and the car will accelerate according to the currently selected gear. Reception Tom Bowker describes the game as "primitive", but he "loved it deeply". The game was reviewed in the August 1984 edition of Acorn User (Issue 25) and later briefly mentioned in issue 4.03 of Electron User as part of the ten-game Micro Power Magic compilation, where it was described as "very realistic". Legacy Another game, Grand Prix by S. Merrigan on the Triple Deckers volume 1 compilation was described by Dave Reeder as "a very poor copy of Stock Car". References External links Stock Car at Gamebase 64 Video of the game on the Acorn Electron Video of the game on the BBC Micro 1984 video games BBC Micro and Acorn Electron games Commodore 64 games Micro Power games Multiplayer and single-player video games Top-down racing video games Video games developed in the United Kingdom
https://en.wikipedia.org/wiki/C%2B%2B%20Report
C++ Report was a bi-monthly professional computer magazine published by SIGS Publications Group. It was edited by Robert Murray, Stanley B. Lippman, Douglas C. Schmidt, Brad Appleton, Robert Cecil Martin, and Herb Sutter and aimed to cover various issues related to C++ programming language. It was recognized as an important publication related to C++. Notable contributors Douglas C. Schmidt Robert Cecil Martin Scott Meyers Tom Cargill Jim Coplien (a.k.a. James O. Coplien) David Abrahams Andrew Koenig References Bimonthly magazines published in the United States C++ Defunct computer magazines published in the United States Magazines established in 1989 Magazines disestablished in 2002 Magazines published in New York City
https://en.wikipedia.org/wiki/Plant%20floor%20communication
Plant floor communications refers to the control and data communications typically found in automation environments, on a manufacturing plant floor or process plant. The difference between manufacturing and process is typically the types of control involved, discrete control or continuous control (aka process control). Many plants offer a hybrid of both discrete and continuous control. The underlying commonality between them all is that the automation systems are often an integration of multi-vendor products to form one system. Each vendor product typically offers communication capability for programming, maintaining and collecting data from their products. A properly orchestrated plant floor environment will likely include a variety of communications, some for machine to machine (M2M) communications – to facilitate efficient primary control over the process and some for Machine to Enterprise (M2E) communications – to facilitate connectivity with Business Systems that provide overall reporting, scheduling and inventory management functions. Machine to machine (M2M) communications Automation controllers typically offer communication modules to enable them to support a variety of industrial protocols, to facilitate machine to machine communications. These modules are often special designed for the protocol. A new class of module, the universal gateway, is becoming more prevalent as it offers the ability for an automation controller to communicate over one or more protocols simultaneously, and can be reconfigured for additional protocols without a module change. Machine to enterprise (M2E) communications Few automation controllers offer direct connectivity to business systems such as MES and ERP systems. Overall integration of automation controllers to business systems are typically configured by system integrators, able to bring their unique knowledge on process, equipment and vendor solutions. Integration Integration is typically managed through one of three mechanisms: Direct Integration – Business systems include connectivity (communications to plant floor equipment) as part of their product offering. This requires the business system developers to offer specific support for the variety of plant floor equipment that they want to interface with. Business system vendors must be expert in their own products, and connectivity to other vendor products, often those offered by competitors. Relational Database (RDB) Integration – Business systems connect to plant floor data sources through a Relational Database Staging Table. Plant floor systems will deposit the necessary information into a Relational Data Base. The business system will remove and use the information from the RDB Table. The benefit of RDB Staging is that business system vendors do not need to get involved in the complexities of plant floor equipment integration. Connectivity becomes the responsibility of the system integrator. EATM (Enterprise Transaction Modules) –
https://en.wikipedia.org/wiki/Cinder%20%28programming%20library%29
Cinder is an open-source programming library designed to give the C++ language advanced visualization abilities. It was released as a public tool in spring 2010 and can be viewed in many ways as a C++-based alternative to tools like the Java-based Processing library, Microsoft Silverlight or Adobe Flash. It is also comparable to the C++ based openFrameworks; the main difference is that Cinder uses more system-specific libraries for better performance while openFrameworks affords better control over its underlying libraries. Unlike Flash and Silverlight, Cinder is generally used in a non-browser environment. This, combined with the speed provided by C++, makes the library more appropriate for heavily abstracted projects, including art installations, commercial campaigns and other advanced animation work. See also Processing (Java) openFrameworks (C++) References External links C++ libraries Software using the BSD license Creative coding
https://en.wikipedia.org/wiki/Ftype
In computing, ftype is a command-line utility on Microsoft Windows that is used to display or change the link between a file type and an executable program. Overview The ftype command was introduced as a shell builtin to cmd.exe with the release of Windows NT 4.0. It lists all Registry keys in HKEY CLASSES ROOT which contain the subkey, and prints out the REG SZ contents of the value within these keys. Since it is an internal command built into cmd.exe, there is no FTYPE.EXE. Because values in contain information on how to open file types with registered extensions, this command essentially lists all registered file types, and which executables are used to open them, along with any switches used by the executable. Multiple file extensions can be associated with the same file type and several file types can be linked to the same executable application. See also File format Filename extension File association References Further reading External links ftype | Microsoft Docs Command-line software Utilities for Windows
https://en.wikipedia.org/wiki/Paper%20cut%20bug
In usability and interaction design, a paper cut bug is defined as "a trivially fixable usability bug". The developers of the Ubuntu Linux-based operating system describe it as a bug that average users would encounter on their first day of using a brand new installation of the latest version of Ubuntu Desktop Edition. The analogy is with a paper cut wound—small, not seriously damaging, but surprisingly painful. The use of the term has since spread to other software projects. While some projects have dedicated projects or teams for it, others rely on regular practices to encourage paper cuts to be fixed. History The first "paper cut" campaign was in June 2009, and each such release has been accompanied by a paper cut project. Initially the project was intended to have Ubuntu developers and users identify and fix one hundred minor bugs that adversely affect the Ubuntu user experience and complete the work to be included in the release of Ubuntu 9.10 Karmic Koala. The intention was that each of these bugs would require no more than a day's work for a competent programmer. The first ten of the original paper cuts were: Dim file icons when they were "cut" for later "paste" action "Move to Trash" option misleading Ambiguous wording in confirmation alert box "Eject/Unmount" Human theme icon in Nautilus should have hover and click states Default folders inside Home Folder, e.g., Documents, Music, should have special icons/emblems Update manager should warn about laptop running on battery when installing big updates Consistent Volume "Safe to remove" notifications "Create Document" sub-menu superfluous when no templates are installed Nautilus doesn't assign custom icon to "Downloads" folder Wi-Fi auto-connection asks for keyring password Dedicated projects Some organisations, like GitHub, have created dedicated projects to solve paper cuts. They also categorise small missing features that are hard to make part of the regular processes as paper cuts. Combining this with amplifying each of the solved problems social media presence also helped seeing the value of each of the fixes. In GitHub's case the project was started when other community efforts like the browser extension Refined GitHub were started for solving similar projects. References Ubuntu Canonical (company) Usability
https://en.wikipedia.org/wiki/Hill%20FM
2HIL, branded on-air as Hill FM, is an Australian radio station owned by the Super Radio Network. The station serves Broken Hill, New South Wales, and has a reach of about 70 km outside of Broken Hill. Hill FM 96.5 have a Facebook page and Instagram account. Previous Staff and Announcers Amy Casey Phil Spurr Riley Phelan Steve Baker (PD: 1996–2004) Jonothan Wright (PD: 1993–1996) Vashti Stewart Tod Campbell Pat Gurry Seranna Shutt Rockin' Richie Daniel Jason "Milton" Lee Damien "the Fish" Fisher Cameron Sullings David Illiffe Andrew Andrews "Zorba" Dave "Davey Damaged" McLennan Jenny Robertson Michael Cetinich Brenton "Thommo" Thompson Chris Hutton Michael Taafe Andrew "AD" Doman Talissa "Tali" Eley Ophelia "Opho" Standley-Thompson Daniel "Dan" Howden Greg "Sexy Greg" Magnus Stan "The platter man" Harris Vicki "vinyl" Johnson John "Parrot" Birdmen Brett "Combat" Small Kooka and the Wombat's Animal Farm in the Morning. Rocky Renalds Awards and nominations Jonothan Wright won best Program Director category RAWARD for his work at Hill FM. Steve Baker and Riley Phelan were finalists in "Best On-air Team" for "The Morning Mix with Steve & Riley" over the 1996–1997 period in the RAWARDS. History of the Station Sister station (supplementary Licence) for 2BH in Broken Hill NSW Originally broadcast on the 106.9 FM frequency until a transmitter upgrade and power increase moved the station to 96.5. It was broadcasting on both frequencies during a 12-month transition, and still can be heard on 106.9 within a 2 km radius of the station.. Founding Owner - Far West Radio Pty Ltd owned by David Tunkin and John Curtis The launch of the station in 1993 saw a large parade in the main street of Broken Hill to a soundtrack highlighting the new sound of the FM station using the slogan "Putting the Rock back in the Hill" a reference to the mining history of Broken Hill. During the first few years of the station, the Friday Night "Coca-Cola Request Line" was a popular program with live callers answering a topical question and requesting their favourite songs with a weekly prize from the sponsor given out at the end of each show. The theme music for the show introduction was the Theme to Beverly Hills, 90210 as this was the popular show of the time with the audience. The station was one of the first in Australia to be run under Automation using a system called "Systemation" designed in the US and used exclusively in Australia by Far West Radio Pty Ltd. The hardware was operated by a Commodore 64 computer and serial ports and consisted of a hard disk DOS program to play "Voice tracks" and commercials and a rack of up to 14 Super VHS 4 track players that contained 4 stereo tracks on a 240-minute tape, the tapes for each category were changed daily to "rotate" the playlist. Current Hit back announces and a dedicated "time call" deck was also in the system to play at pre-programmed times. Eventually the video tape players were
https://en.wikipedia.org/wiki/L%C3%A1szl%C3%B3%20M%C3%A9sz%C3%A1ros
László Mészáros (born 12 May 1977) is a former Hungarian football player. References Data Retrieved 10 October 2010 1977 births Living people Hungarian men's footballers Fortuna Sittard players VVV-Venlo players Debreceni VSC players Hungarian expatriate men's footballers Expatriate men's footballers in the Netherlands Men's association football midfielders
https://en.wikipedia.org/wiki/White%20space
White space or whitespace may refer to: Technology Whitespace characters, characters in computing that represent horizontal or vertical space White spaces (radio), allocated but locally unused radio frequencies TV White Space Database, a mechanism to enable utilization of the allocated but locally unused radio frequencies Whitespace (programming language), an esoteric programming language Other uses White space (visual arts), portions of a page layout or image left unmarked Negative space, portions of a page layout or image deliberately left unmarked and used as a component Space (punctuation), the space between two words of text The White Space, a 2009 drama film White Space, a two-book science fiction series by Elizabeth Bear A location in the video game OMORI See also Space (disambiguation) White room (disambiguation)
https://en.wikipedia.org/wiki/CAZy
CAZy is a database of Carbohydrate-Active enZYmes (CAZymes). The database contains a classification and associated information about enzymes involved in the synthesis, metabolism, and recognition of complex carbohydrates, i.e. disaccharides, oligosaccharides, polysaccharides, and glycoconjugates. Included in the database are families of glycoside hydrolases, glycosyltransferases, polysaccharide lyases, carbohydrate esterases, and non-catalytic carbohydrate-binding modules. The CAZy database also includes a classification of Auxiliary Activity redox enzymes involved in the breakdown of lignocellulose. CAZy was established in 1999 in order to provide online and constantly updated access to the protein sequence-based family classification of CAZymes, which was originally developed in early 1990s to classify the glycoside hydrolases. New entries are added shortly after they appear in the daily releases of GenBank. The rapid evolution of high-throughput DNA sequencing has resulted in the continuing exponential growth of the CAZy database, which now covers hundreds of thousands of sequences. CAZy continues to be curated and developed by the Glycogenomics group at AFMB, a research centre affiliated with the French National Centre for Scientific Research and Aix-Marseille University. The CAZy database is coupled with CAZypedia, which was launched in 2007 as a research community-driven, wiki-based encyclopedia of CAZymes. Classification CAZy identifies evolutionarily related families of glycosyl hydrolases using the classification introduced by Bernard Henrissat. These families are given a number to identify them, so for example Glycosyl hydrolase family 1 contains enzymes that possess a TIM barrel fold. These families are clustered into 14 different clans that share structural similarity. CAZy contains 94 families of Glycosyl transferase enzymes, 22 families of polysaccharide lysases and 16 families of carbohydrate esterases. References External links Enzyme databases Protein classification
https://en.wikipedia.org/wiki/Frenzy%20%281984%20video%20game%29
Frenzy is an 8-bit computer game published in the UK by Micro Power in 1984. It is a version of the arcade game Qix. The game was released for the Acorn Electron and BBC Micro in 1984 and for the Commodore 64 in 1985. Description Although the gameplay is similar to Qix, the backstory for Frenzy involves the player controlling a robot craft, attempting to capture deadly sub-atomic Leptons from inside a scientific research centre. In Frenzy, a Lepton is captured if it is trapped in an area enclosed by the player's robot craft or if 95% of the screen area has been filled. The robot craft has two speeds and the score for filling in an area using only the slower speed is subject to a 2x multiplier. Chasers appear in higher levels which can collide with the player's robot craft, causing a life to be lost. The number of Leptons and Chasers increase as the levels progress, up to a maximum of five of each on the most difficult screens—except for Levels 12 and 14, which have a smaller number of Leptons (and no Chasers) but the Leptons move much faster. The player obtains an extra craft on completing the third, sixth and ninth screens. It has been found that after level 14, the last two screens repeat indefinitely. It is stated in the instructions that a good strategy is to build narrow filled blocks using the faster speed across the centre of an unfilled area, and then finally seal the area off by using only the slower mode. This maximises the score while reducing the risk of using "slow mode" to a minimum. It can be seen that players of the game tend to stick to this strategy. Some players remark that Frenzy is not an exact Qix clone. Although the game is clearly derived from Qix, there are crucial differences. In Qix, completing a line fills in the area not containing the Qix regardless of size, whereas in Frenzy, the smaller area is always coloured, allowing Leptons to be trapped (which kills them). In Qix, filling a set percentage is the only way to complete levels; in Frenzy it is more common to complete levels by killing all the Leptons. Also, in Frenzy, the Leptons move in a regular, completely deterministic pattern, and the player's robot craft is permitted to hesitate, making Frenzy a different playing experience to Qix. Critical reception Generally, the game has received a positive response from both players and reviewers. Frenzy was reviewed in the August 1984 edition of Acorn User (Issue 25) and also in issue 2.06 of Electron User. Adam Young in his review entitled "Simplicity Makes a Winner" described the game as "one of the most amusing and compulsive games on the market" and "excellent". Oliver Robinson enjoyed playing Frenzy by Micropower. Comparing the game to another similar game called Kix he wrote: "Although, Kix arguably had better music, Frenzy had better gameplay". The music to Kix is "Scarborough Fair" and "House of the Rising Sun"; Frenzy has no music at all. Other players have described the game as "a great family favo
https://en.wikipedia.org/wiki/Check%20Point%20GO
Check Point GO is a USB drive that combines an encrypted USB flash drive with virtualization, VPN and computer security technologies to turn a PC into a secure corporate desktop. By plugging Check Point GO into the USB port of a Microsoft Windows OS-based PC or laptop, users can launch a secure virtual workspace that is segregated from the host PC. This allows users to securely access company files and applications from any remote location, including insecure host environments such as a hotel business center or Internet café. Check Point GO uses hardware and software encryption to protect user credentials, documents, and other sensitive data, so that data cannot be compromised in transit or in the event the device is lost. The system uses an authentication process that enforces minimum levels of password strength, as well as certificates and security tokens for multifactor authentication for remote connectivity. The device interfaces with software on a corporate server to support company policies and security updates through security gateways. History Check Point GO (formerly Abra) was first introduced by Check Point Software Technologies Ltd. and SanDisk Corporation in March 2010 to address security and compliance issues for companies with remote employees. Workers have been increasingly demanding remote access to company applications and data. Personal equipment accessing the network can pose a risk to corporate networks, creating a potential avenue for corporate data loss or allowing unsecure connections. The companies cite that the Check Point GO system provides a solution for companies that want to let their employees purchase and manage their own PCs and laptops, for those needing high security (including encryption) for computing devices outside the workplace, as well as contractors/vendors who require access to the company network while working on site. Since its release, the product has won industry awards including "IT Product of 2010" by Computerworld and was named one of the “25 Hot Products to Watch” at the 2010 RSA Conference by CRN Magazine. Checkpoint GO went end-of-sale 31-DEC-2013, with support ending 31-DEC-2018 Technology Architecture When Check Point GO is inserted into the USB port of any PC, the user is presented with a login screen. Upon successful login, a new explorer.exe instance is started in the Check Point GO Secure Workspace. All subsequent processes are started as child processes of this new explorer. Check Point GO uses the software installed on the host PC to run applications such as Microsoft Word and Microsoft Excel, but the user’s documents remain secure in the Check Point GO environment – a virtual workspace that runs parallel to the host environment. All file and registry input/output calls for the secure application inside Check Point GO are redirected to the flash drive. All applications running on the Check Point GO desktop (including the new explorer) operate in a virtual file system and re
https://en.wikipedia.org/wiki/Avanti%20Communications
Avanti Communications is a UK based satellite operator, selling wholesale satellite broadband and satellite connectivity services to Internet Service Providers, Mobile Network Operators, Enterprises, Governments and other satellite operators. The Avanti HYLAS fleet of satellites provides coverage of the Americas, Europe, the Middle East and Africa. The company was listed on London's Alternative Investment Market (AIM) as LSE: AVN and employs approximately 200 staff across the UK, Europe, US, the Middle East and Africa. Its headquarters are in London (UK) with offices in Goonhilly (UK), Limassol (Cyprus), Istanbul (Turkey) Nairobi (Kenya), Dar es Salaam (Tanzania), Johannesburg (South Africa) and Lagos (Nigeria). Kyle Whitehill joined as CEO in April 2018, with the long-standing CEO and co-founder, David Williams, stepping down in August 2017. Avanti currently has 4 Geostationary orbit (GEO) High-throughput satellite (HTS), HYLAS-1, HYLAS-2 and HYLAS-4 in orbit. Its latest HTS, HYLAS 3, launched in July 2019 as a payload on board Airbus/European Space Agency's EDRS-C satellite. Avanti has dual geo-redundant Gateway Earth Stations (GES) across Europe the Middle East and Africa to provide high levels of network resiliency and resulting in a claimed 99.9% uptime service level. The company has GES in the UK, Cyprus, Germany, Turkey, South Africa and Nigeria. In September 2019, Avanti announced it will delist from London Stock Exchange. The trading with Avanti's stock ended 17 September 2019. At the time, Avanti had 3 geostationary communications satellites (HYLAS-1, HYLAS-2, HYLAS-4), a hosted payload on Airbus’ and the European Space Agency's EDRS-C satellite (HYLAS-3), and a leased payload on SES's Astra 5B satellite. References External links Avanti official website Technology companies based in London
https://en.wikipedia.org/wiki/Camelot%20%28video%20game%29
Camelot is a computer game written by Tony Oakden and published in the UK in 1989/90 for the BBC Micro and Acorn Electron. The game was first published by Superior Software and Acornsoft as part of the Play it Again Sam 9 compilation in 1989 and was subsequently re-published as a standalone title in 1990 by Superior Software and Blue Ribbon. Description The game is very similar to Oakden's previous game Quest which itself has some elements in common with an earlier BBC/Electron title, Citadel. Camelot is also a platform adventure game set in a large flip-screen castle and the player also has a set amount of energy which runs down when in contact with enemy sprites or hazards. The backstory given in the cassette inlay indicates that the player (as the King) has been deposed from the throne for mismanaging the kingdom. To convince the people that the king deserves another chance to return to throne again, the player must fight their way through the castle and surrounding terrain, facing various enemies such as witches, warlocks and soldiers. To complete the quest, 3000 points are needed, which can be obtained by finding six bags of gold, scattered around the game. Each bag is worth 450 points, although the player can gain extra points by killing the enemy sprites. The player has four-way directional controls, left, right, up and down (for climbing ladders) and there are also separate keys for jump, firing a fireball, picking up objects and using a spell book. Energy can be replenished by finding hearts hidden in caskets, although some caskets contain daemons instead, which drain the player's energy. The game does have a time limit, but extra time is gained by opening doors and solving puzzles, so the player must work out a logical sequence of puzzle-solving such that the clock does not run down to zero. The game is considered quite challenging, although a small program has been written by C.J. Richardson which enables POKEs for various cheat modes such as infinite time and energy, big jumps and climb anywhere. Reception In the Electron User review of the Play It Again Sam 9 compilation, Camelot received a glowing review with main reviewer Jon Revis concluding "first rate graphics and difficult gameplay make Camelot a suitable challenge for even the most accomplished arcade adventurers" and in his second opinion, Roland Waddilove said "forget the other games - they can be considered freebies - the main attraction is Camelot. I loved it". Crispin Boylan's review of Camelot praises the graphics as "good" and the colours as "nice and bright" however he also states that the game's plot is "a bit thin on the ground" and the animation is not really up the standard of contemporary titles. He also notes that the game has some "beeps" but that there is no in-game music. References 1989 video games Acornsoft games Action-adventure games BBC Micro and Acorn Electron games BBC Micro and Acorn Electron-only games Platformers Single-player video games S
https://en.wikipedia.org/wiki/Jeremy%20Gibbons
Jeremy Gibbons is a computer scientist and professor of computing at the University of Oxford. He serves as Deputy Director of the Software Engineering Programme in the Department of Computer Science, Governing Body Fellow at Kellogg College and Pro-Proctor of the University of Oxford. Academic Professor Gibbons obtained a Bachelor of Science (BSc) (Hons) in computer science from the University of Edinburgh (1983–1987), and a Doctor of Philosophy (DPhil) in Computation from the University of Oxford (1987–1991). Before taking his current post, he was, first, lecturer in computer science, University of Auckland (1991–1996), next, lecturer and senior lecturer in computing, Oxford Brookes University (1996–1999), and then reader in software engineering at the University of Oxford. His research activities include programming languages and methods; functional programming; generic programming; object technology; program specification, derivation and transformation. His current projects include CancerGrid; Datatype-Generic Programming; Automatic Generation of Software Components; Workflow for Cancer Bioinformatics. His publications cover generic programming, functional programming, formal methods, computational biology, bioinformatics, and Algorithm Design with Haskell co-authored with Richard Bird. He is a member of the International Federation for Information Processing (IFIP) IFIP Working Group 2.1 on Algorithmic Languages and Calculi, which specified, maintains, and supports the programming languages ALGOL 60 and ALGOL 68. Since 2009, he has been chairperson. References External links , academic Patterns in Functional Programming – his blog Members of the Department of Computer Science, University of Oxford Fellows of Kellogg College, Oxford British computer scientists Living people Academics of Oxford Brookes University Alumni of the University of Oxford Alumni of the University of Edinburgh Academic staff of the University of Auckland Year of birth missing (living people) People educated at Boroughmuir High School
https://en.wikipedia.org/wiki/Globalization%20and%20World%20Cities%20Research%20Network
The Globalization and World Cities Research Network (GaWC) is a think tank that studies the relationships between world cities in the context of globalization. It is based in the geography department of Loughborough University in Leicestershire, United Kingdom. GaWC was founded by Peter J. Taylor in 1998. Together with Jon Beaverstock and Richard G. Smith, they create the GaWC's biennial categorization of world cities into "Alpha", "Beta" and "Gamma" tiers, based upon their international connectedness. GaWC city classification The GaWC examines cities worldwide to narrow them down to a roster of world cities, then ranks these based on their connectivity through four "advanced producer services": accountancy, advertising, banking/finance, and law. The GaWC inventory ranks city economics more heavily than political or cultural factors. Beyond the categories of "Alpha" world cities (with four sub-categories), "Beta" world cities (three sub-categories), and "Gamma" world cities (three sub-categories), the GaWC cities include additional cities at "High sufficiency" and "Sufficiency" level. GaWC published city classifications in 1998, 2000, 2004, 2008, 2010, 2012, 2016, 2018 and 2020. The 2004 rankings added several new indicators while continuing to rank city economics more heavily than political or cultural factors. The 2008 roster, similar to the 1998 version, is sorted into categories of Alpha world cities (with four sub-categories), Beta world cities (three sub-categories), Gamma world cities (three sub-categories), and additional cities with High sufficiency or Sufficiency presence. The list has been prone to change in the ranks. For example, some cities that were selected prior to 2018, such as the United States cities of Greensboro and Providence. are no longer classified as sufficient level. 2020 city classification The classification "results are derived from the activities of 175 leading firms providing advanced producer services across 707 cities worldwide (i.e. the input is 175 x 707 = 123,725 pieces of information). The results should be interpreted as indicating the importance of cities as nodes in the world city network (i.e. enabling corporate globalization)." The cities in the 2020 classification are as follows. (1) or (1) indicates a city moved one category up or down since the 2018 classification. Alpha Alpha level cities are linked to major economic states/regions and highly integrated into the world economy. Alpha level cities are classified into four sections: Alpha ++, Alpha +, Alpha, and Alpha − cities. Alpha ++ Alpha ++ cities are cities most integrated with the global economy: London New York City Alpha + Alpha + are "other highly integrated cities that complement London and New York, largely filling in advanced service needs for the Pacific/Asia [region]": Beijing Dubai Hong Kong Paris Shanghai Singapore Tokyo Alpha Amsterdam (1) Brussels Chicago Frankfurt Jakarta Kuala Lumpur
https://en.wikipedia.org/wiki/Aqua%20Teen%20Hunger%20Force%20%28season%202%29
The second season of the animated television series, Aqua Teen Hunger Force originally aired in the United States on Cartoon Network's late night programming block, Adult Swim. Season two started on May 25, 2003, with "Super Birthday Snake" and ended with "The Last One" on December 31, 2003, with a total of twenty four episodes. Aqua Teen Hunger Force is about the surreal adventures and antics of three anthropomorphic fast food items: Master Shake, Frylock, and Meatwad, who live together as roommates and frequently interact with their human next-door neighbor, Carl Brutananadilewski in a suburban neighborhood in South Jersey, New Jersey. In May 2015, this season became available on Hulu Plus. With twenty four episodes, season two is the longest season of the series. Episodes in season two were written and directed by Dave Willis and Matt Maiellaro. Almost every episode in this season features a special guest appearance, including the season finale "The Last One" which features the return of several guests from the first two seasons, who have reprised their roles. This season has been made available on DVD, and other forms of home media, including on demand streaming. Production Every episode in this season was written and directed by series creators Dave Willis and Matt Maiellaro, who have both written and directed every episode of the series. All episodes originally aired in the United States on Cartoon Network's late night programming block, Adult Swim. This season was one of the original seasons branded under the Aqua Teen Hunger Force title before Willis and Maiellaro started using a different alternative title for each season in 2011. As with most seasons, several episodes originally aired outside of their production order. With a total of twenty four episodes, Season Two is the longest season of Aqua Teen Hunger Force. The first ten episodes in Season Two (except for "The Meat Zone") feature the word "Super" in the title. Many episodes from this season include the word "the" in the title, including one episode that is simply titled "The". Season Two is the last season to feature cold openings with Dr. Weird and Steve. After "The Cloning", Dr. Weird and Steve do not return until the 2007 movie, Aqua Teen Hunger Force Colon Movie Film for Theaters. After the movie, the only mention of them is a non-speaking cameo of Dr. Weird in the season seven episode, "One Hundred", and later makes his final appearance in season eight episode "Allen Part One". Steve is accompanied with Dr. Weird in "Allen Part One", and makes a non-speaking cameo in the season intro, but is never seen following "Last Dance for Napkin Lad." Cast Main Dana Snyder as Master Shake Carey Means as Frylock Dave Willis as Meatwad, Carl Brutananadilewski, Ignignokt and Boxy Brown C. Martin Croker as Dr. Weird and Steve Recurring Matt Maiellaro who voiced Err and Cybernetic Ghost of Christmas Past from the Future George Lowe himself as various characters Andy Merrill
https://en.wikipedia.org/wiki/Rob%20Landeros
Rob Landeros is a computer game designer and graphic artist. Together with Graeme Devine, he co-founded Trilobyte, where he created the highly commercially successful games The 7th Guest and The 11th Hour. After leaving Trilobyte, he co-founded Aftermath Media, where he released the interactive movies Tender Loving Care and Point of View. Biography Landeros was born and raised in Redlands, California. Prior to becoming involved in the computer gaming industry, he worked as an artist in more traditional media between the late 1960s and early 1980s. Amongst other art forms, he drew underground comics and carved scrimshaw. Landeros began his career in computer games in the late 1980s, first working as the Art Director for Cinemaware, where he worked on games such as Defender of the Crown and S.D.I.. In 1991 he began working at Virgin Games, where he would meet Graeme Devine, with whom he would partner to form Trilobyte. Landeros and Devine enjoyed success at Trilobyte with their groundbreaking CD-ROM game The 7th Guest, which sold over 2 million copies. Bill Gates called The 7th Guest "the new standard in interactive entertainment." After leaving Trilobyte, Landeros co-founded Aftermath Media. In 1999, the company released the interactive movie Tender Loving Care. It was followed in 2001 by P.O.V.: Point of View. On April 17, 2001 four chapters of Point of View were streamed over the Internet to promote the DVD. Landeros currently runs his own graphic design business. In 2010 he re-launched Trilobyte who are working on re-releasing versions of its classic games, including The 7th Guest, The 11th Hour, for use on iPhone and iPad. The company is also working on new titles for these devices. References External links Trilobyte Games Aftermath Media Landeros Design Rob Landeros at MobyGames American video game designers Living people People from Redlands, California Year of birth missing (living people) Video game artists
https://en.wikipedia.org/wiki/Deutscher%20Fernsehpreis
The Deutscher Fernsehpreis (German Television Award) is an annual German award for television programming, created in 1999, by German television channels Das Erste, ZDF, RTL and Sat.1. It was created to be an equivalent to the Emmy Awards, though it is not organized by an academy. The Fernsehpreis is the successor to both the Telestar (Das Erste and ZDF) and the Goldener Löwe (RTL) awards. History The first award took place on 2 October 1999 in Cologne. Every year another of the participating stations broadcast the ceremony: Notes References External links Official website German television awards Awards established in 1999 1999 establishments in Germany ZDF ARD (broadcaster) RTL Group ProSiebenSat.1 Media Sat.1
https://en.wikipedia.org/wiki/Dana%20Ulery
Dana Ulery (born January 2, 1938) is an American computer scientist and pioneer in scientific computing applications. Career Ulery received her BA from Grinnell College in 1959, with a double major in English Literature and Mathematics. She earned her MS and PhD in Computer Science from the University of Delaware, in 1972 and 1975 respectively. Ulery began her career in 1961 as the first woman engineer at the NASA Jet Propulsion Laboratory (Pasadena, CA), designing and developing algorithms to model NASA’s Deep Space Network capabilities and automating real-time tracking systems for the Ranger and Mariner space missions using a North American Aviation Recomp II, 40-bit word size computer. Over the course of her career, she has held positions as an applied science and technology researcher and manager in industry, academia, and government. In 2007, she retired from her position as Chief Scientist of the Computational and Information Sciences Directorate at the United States Army Research Laboratory (ARL). In 1976, she accepted visiting faculty appointments at Cairo University in Egypt and the American University in Cairo. On her return to the U.S., she joined the Engineering Services Division of the DuPont Company, where she worked as a computer scientist and technical manager. In the early 1980s, Ulery led initiatives to develop and deploy enterprise application systems to evaluate and control product quality at DuPont sites. For these achievements she was awarded the DuPont Engineering Award for Leadership of Corporate Quality Computer Systems. Ulery also played an active role in establishment of EDI standards, international standards for electronically exchanging technical information used by business and government. She initiated and led multidisciplinary programs at ARL to advance research in multi-source information fusion and situational understanding applied to non-traditional battle environments and homeland defense. In the 1990s, Ulery served for many years as Pan American Delegate to the United Nations Electronic Data Interchange for Administration, Commerce, and Trade (UN/EDIFACT). She was Chair of the UN/EDIFACT Multimedia Objects Working Group and Chair of the UN/EDIFACT Product Data Working Group, leading early international development of standards for electronic commerce. Awards Ulery was among the first group of female managers at the US Army Research Laboratory. In these positions, she was also appointed Chair of the US Army Materiel Command Knowledge Management Council, and in 2002 was awarded the Army Knowledge Award for Best Transformation Initiative. She is listed in American Men and Women of Science, Who’s Who of American Women, Who’s Who in the East, Who’s Who in the World, and Who’s Who in America. She was named a Lifetime Achiever by Marquis Who's Who in 2017. Publications References External links Works by Dana Ulery in Worldcat libraries US Army Research Laboratory NASA Jet Propulsion Laboratory Electro
https://en.wikipedia.org/wiki/Acknowledgement%20%28data%20networks%29
In data networking, telecommunications, and computer buses, an acknowledgment (ACK) is a signal that is passed between communicating processes, computers, or devices to signify acknowledgment, or receipt of message, as part of a communications protocol. The negative-acknowledgement (NAK or NACK) is a signal that is sent to reject a previously received message or to indicate some kind of error. Acknowledgments and negative acknowledgments inform a sender of the receiver's state so that it can adjust its own state accordingly. Many protocols contain checksums to verify the integrity of the payload and header. Checksums are used to detect data corruption. If a message is received with an invalid checksum (that is, the data received would have a different checksum than the message had), the receiver can know that some information was corrupted. Most often, when checksums are employed, a corrupted message received will either not be served an ACK signal, or will be served a NAK signal. Acknowledgment characters ASCII code includes an ACK character (00001102 or 616) which can be transmitted to indicate successful receipt and a NAK character (00101012 or 1516) which can be transmitted to indicate an inability or failure to receive. Unicode provides visible symbols for these characters, U+2406 (␆) and U+2415 (␕). Protocol usage Many protocols are acknowledgement-based, meaning that they positively acknowledge receipt of messages. The internet's Transmission Control Protocol (TCP) is an example of an acknowledgement-based protocol. When computers communicate via TCP, received packets are acknowledged by sending back a packet with an ACK bit set. The TCP protocol allows these acknowledgements to be included with data that is sent in the opposite direction. Some protocols send a single acknowledgement per packet of information. Other protocols such as TCP and ZMODEM allow many packets to be transmitted before receiving acknowledgement for any of them, a procedure necessary to fill high bandwidth-delay product links with a large number of bytes in flight. Other protocols are NAK-based, meaning that they only respond to messages if there is a problem. Examples include most reliable multicast protocols which send a NAK when the receiver detects missing packets. Still other protocols make use of both NAKs and ACKs. Binary Synchronous Communications (Bisync) and Adaptive Link Rate (for Energy-Efficient Ethernet) are examples. Still other protocols such as the RC-5, User Datagram Protocol (UDP), and X10 protocols perform blind transmission with no acknowledgement, often transmitting the same message multiple times in hopes that at least one copy of the message gets through. The acknowledgement function is used in the automatic repeat request (ARQ) function. Acknowledgement frames are numbered in coordination with the frames that have been received and then sent to the transmitter. This allows the transmitter to avoid overflow or underrun at the receiver,
https://en.wikipedia.org/wiki/IBM%20Storwize
IBM Storwize systems were virtualizing RAID computer data storage systems with raw storage capacities up to 32 PB. Storwize is based on the same software as IBM SAN Volume Controller (SVC). Formerly Storwize was an independent data storage organisation. Models Сollateral lines: IBM SAN Volume Controller – virtualizes multiple storage arrays; IBM FlashSystem 9100 line – Flash memory high-end storage; IBM Flex System V7000 Storage Node – was designed for integration with IBM PureSystems (Support withdrawn at SVC v7.3.0) The Storwize family offers several members: High-end 7000 line: IBM Storwize V7000 Gen3 - Capacity on up to 760 modules (32 PB) and the capability to use FlashCore modules IBM Storwize V7000 Gen2 - Capacity up to 4 PB and the capability to virtualize external storage IBM Storwize V7000 – Capacity up to 1.92 PB and the capability to virtualize external storage IBM Storwize V7000 Unified – provides file connectivity Midrange line: IBM Storwize V5100 - Capacity on up to 760 modules and the capability to use FlashCore modules IBM Storwize V5030E - capacity on up to 760 modules IBM Storwize V5010E - capacity on up to 392 modules IBM Storwize V5030 - capacity on up to 760 modules IBM Storwize V5020 - capacity on up to 392 modules IBM Storwize V5010 - capacity on up to 392 modules IBM Storwize V5000 - capacity up to 960 TB Entry line: IBM Storwize V3700 – capacity up to 480 TB IBM Storwize V3500 – capacity up to 48 TB (available in China, Hong Kong and Taiwan only) Each of the above family members run software that is based on a common source codebase, although each has a type specific downloadable package. In Feb 2020 the Storwize V5000 and V5100 are replaced by the FlashSystem 5000 and 5100 respectively; and the FlashSystem 900 and Storwize V7000 are replaced by the FlashSystem 7200. Timeline According to the official availability dates and the days the systems are removed from marketing you can determine the following availability to purchase shown in light green. The graphics only contains the IBM storage systems starting with 'V', .i.e. V3700, V5000, V5010(E), V5020, V5030(E), V5100 and V7000. These systems vary even beyond their names, therefore the graphics also contains IBM type and model. All the displayed systems can still get regular service at the end of the timeline (beginning of 2020). For the IBM SAN Volume Controller's timeline see there. Architecture Storwize V7000 provides a very similar architecture to SVC, using the RAID code from the DS8000 to provide internal managed disks and SSD code from the DS8000 for tiered storage. Features and software All Storwize systems offer the following features: Command line interface Graphical user interface (GUI) for easier use (CLI commands can be displayed as details), with (nearly) all functions available Thin Provisioning known as Space Efficient Volumes Volumes can be resized, i.e. expanded or reduced (only advisable, if supported by the
https://en.wikipedia.org/wiki/Viktor%20Ivannikov
Viktor Petrovich Ivannikov (; 27 February 1940 – 27 November 2016) was a Russian computer scientist, a member of Russian Academy of Sciences, the head of System Programming Chair for the Institute for System Programming, head of the Departments of system programming at the Faculty of Computational Mathematics and Cybernetics, Moscow State University and the Moscow Institute of Physics and Technology. Scientific achievements Viktor Ivannikov worked for Lebedev Institute of Precision Mechanics and Computer Engineering from 1962 to 1980, starting as a computer technician, leaving as a distinguished engineer, where he developed D-68 (operating system) operating system for BESM-6 computer. After that he worked for Delta research facility where he led the development of distributed operating systems and supercomputers. Interests Viktor Ivannikov interests include: system programming, computer architecture, and operating systems. External links Viktor Ivannikov — scientific works on the website Math-Net.Ru RAS person page System Programming Chair 1940 births 2016 deaths Russian computer scientists Full Members of the Russian Academy of Sciences Moscow Institute of Physics and Technology alumni Burials in Troyekurovskoye Cemetery Academic staff of Moscow State University Academic staff of the Higher School of Economics People from Stupinsky District
https://en.wikipedia.org/wiki/Software%20Engineering%20Programme
Software Engineering Programme is a centre for advanced education and applied research at the Department of Computer Science of the University of Oxford. It teaches the principles of modern software engineering, together with the tools, methods, and techniques that support their application. The current Director of Software Engineering Programme is Professor Jim Davies History The Programme has its origins in the industrial courses presented by the Computing Laboratory—the computing science department of the University of Oxford—during the 1980s. Courses The Programme offer a variety of courses, each addressing a different aspect of software engineering, which are organized into three themes, namely: Software Engineering Methods Software Engineering Tools Software and System Security. Awards The courses offered by the Programme may be used as credit towards a master's degree (MSc) from University of Oxford. There are two Masters' awards available: the MSc in Software Engineering, and the specialised MSc in Software and Systems Security. Both awards require the successful completion of 10 courses, together with a Masters'-level project and dissertation. People Most of the courses are taught by University lecturers, with assistance from dedicated teams of researchers and administrators. There are also a number of subject specialists who teach courses in their particular areas of expertise. References Departments of the University of Oxford
https://en.wikipedia.org/wiki/Optical%20mesh%20network
An optical mesh network is a type of optical telecommunications network employing wired fiber-optic communication or wireless free-space optical communication in a mesh network architecture. Most optical mesh networks use fiber-optic communication and are operated by internet service providers in metropolitan and regional but also national and international scenarios. They are faster and less error prone than other network architectures and support backup and recovery plans for established networks in case of any disaster, damage or failure. Currently planned satellite constellations aim to establish optical mesh networks in space by using wireless laser communication. History of transport networks Transport networks, the underlying optical fiber-based layer of telecommunications networks, have evolved from Digital cross connect system (DCS)-based mesh architectures in the 1980s, to SONET/SDH (Synchronous Optical Networking/Synchronous Digital Hierarchy) ring architectures in the 1990s. In DCS-based mesh architectures, telecommunications carriers deployed restoration systems for DS3 circuits such as AT&T FASTAR (FAST Automatic Restoration) and MCI Real Time Restoration (RTR), restoring circuits in minutes after a network failure. In SONET/SDH rings, carriers implemented ring protection such as SONET Unidirectional Path Switched Ring (UPSR) (also called Sub-Network Connection Protection (SCNP) in SDH networks) or SONET Bidirectional Line Switched Ring (BLSR) (also called Multiplex Section - Shared Protection Ring (MS-SPRing) in SDH networks), protecting against and recovering from a network failure in 50 ms or less, a significant improvement over the recovery time supported in DCS-based mesh restoration, and a key driver for the deployment of SONET/SDH ring-based protection. There have been attempts at improving and/or evolving traditional ring architectures to overcome some of its limitations, with trans-oceanic ring architecture (defined in ITU-T Rec. G.841), "P-cycles" protection, next-generation SONET/SDH equipment that can handle multiple rings, or have the ability to not close the working or protection ring side, or to share protection capacity among rings (e.g., with Virtual Line Switched Ring (VLSR)). Technological advancements in optical transport switches in the first decade of the 21st century, along with continuous deployment of dense wavelength-division multiplexing (DWDM) systems, have led telecommunications service providers to replace their SONET ring architectures by mesh-based architectures for new traffic. The new optical mesh networks support the same fast recovery previously available in ring networks while achieving better capacity efficiency and resulting in lower capital cost. Such fast recovery (in the tens to hundreds of milliseconds) in case of failures (e.g., network link or node failure) is achieved through the intelligence embedded in these new optical transport equipment, which allows recovery to be automatic an
https://en.wikipedia.org/wiki/RRH%20%28disambiguation%29
RRH is the human gene that encodes the visual pigment-like receptor Peropsin. RRH may also refer to: Rrh (trigraph) Remote Radar Head, a network of sites used by the British RAF Remote radio head, a type of radio used in wireless telecommunications networks Regesta Regni Hierosolymitani, an 1893 history of the Crusades by Reinhold Röhricht
https://en.wikipedia.org/wiki/Remote%20radio%20head
A remote radio head (RRH), also called a remote radio unit (RRU) in wireless networks, is a remote radio transceiver that connects to an operator radio control panel via electrical or wireless interface. When used to describe aircraft radio cockpit radio systems, the control panel is often called the radio head. In wireless system technologies such as GSM, CDMA, UMTS, LTE, 5G NR the radio equipment is remote to the BTS/NodeB/eNodeB/gNB. The equipment is used to extend the coverage of a BTS/NodeB/eNodeB/gNB in challenging environments such as rural areas or tunnels. They are generally connected to the BTS/NodeB/eNodeB/gNB via a fiber optic cable using Common Public Radio Interface protocols. RRHs have become one of the most important subsystems of today's new distributed base stations. The RRH contains the base station's RF circuitry plus analog-to-digital/digital-to-analog converters and up/down converters, and connects to, and thus drives the base station's antenna. RRHs also have operation and management processing capabilities and a standardized optical interface to connect to the rest of the base station. This will be increasingly true as LTE and WiMAX are deployed. Remote radio heads make MIMO operation easier; they increase a base station's efficiency and facilitate easier physical location for gap coverage problems. RRHs will use the latest RF component technology including gallium nitride (GaN) RF power devices and envelope tracking technology within the RRH RF power amplifier (RFPA). RRH protection in fiber to the antenna systems Fourth generation (4G) and beyond infrastructure deployments will include the implementation of Fiber to the Antenna (FTTA) architecture. FTTA architecture has enabled lower power requirements, distributed antenna sites, and a reduced base station footprint than conventional tower sites. The use of FTTA will promote the separation of power and signal components from the base station and their relocation to the top of the tower mast in a Remote Radio Head (RRH). According to the Telcordia industry standard that establishes generic requirements for Fiber to the Antenna (FTTA) protection GR-3177, the RRH shifts the entire high-frequency and power electronic segments from the base station to a location adjacent to the antenna. The RRH will be served by optical fiber and DC power for the optical-to-electronic conversion at the RRH. RRHs located on cell towers will require Surge Protective Devices (SPDs) to protect the system from lightning strikes and induced power surges. There is also a change in electrical overstress exposure due to the relocation of the equipment from the base station to the top of the mast. Protection from lightning damage RRHs can be installed in a low-profile arrangement along a rooftop, or can involve a much higher tower arrangement. When installed at the highest point on a structure (whether a building or a dedicated cell tower), they will be more vulnerable to receiving a direct ligh
https://en.wikipedia.org/wiki/Research%20Studios%20Austria
The Research Studios Austria Forschungsgesellschaft mbH (RSA FG) is a non-profit research institution in the area of eTechnologies and Smart Media. It currently operates a network of five research units called Studios cooperating with and creating research synergies among universities in Vienna, Linz, Salzburg and Innsbruck. The RSA FG undertakes applied research projects. The research and development conducted at the Research Studios Austria is based on a process of rapid prototyping and a special research approach MIR (Modular Iterative Re-framing). The Research Studios Austria FG competes for national and European research grants and funding in research excellence. It does contract research for clients in the private and public sectors and it receives the funding for its independent research from the Austrian Federal Ministry for Science and Research. The current director is Peter A. Bruck. History The Research Studios Austria have been established in 2003, and were part of the Austrian Institute of Technology (AIT) formerly known as Austrian Research Centers (ARC) until Spring of 2008. In April 2008, the Research Studios Austria were spun out into a new company and the Research Studios Austria Forschungsgesellschaft mbH was founded. Branches Currently five different Studios are working in applied ICT research: Inter-Organisational Systems: eGovernment-eBusiness (IOS, Vienna) iSPACE (Salzburg) MicroLearning & Information Environments (MINE, Innsbruck/Salzburg/Linz/Vienna) Pervasive Computing Applications (PCA, Linz/Vienna) Smart Agent Technologies (SAT, Vienna) Footnotes External links Official Website Artificial intelligence laboratories Research institutes in Austria Laboratories in Austria
https://en.wikipedia.org/wiki/Blaine%20Price
Blaine Alexander Price (born 1964) is a professor of Computing at The Open University in the United Kingdom. Price was born in Montreal, Quebec, Canada. He obtained his BSc in computing and information science from Queen's University in 1988 and his MSc in computer science from the University of Toronto in 1991. Career In 1989, Price was a summer research intern in Apple Computer's Human Interface Group. In 1990 he completed his MSc dissertation on automatic animation of concurrent programs and began his PhD research in software visualisation with Ronald Baecker. In 1991 he took a one-year assignment in Open University's Human Cognition Research Lab (now the Knowledge Media Institute) and three years later he was appointed to a temporary contract as a lecturer in computing in the faculty of mathematics. The next year he was made a permanent lecturer and launched a 4-year program to transform the delivery of Open University materials from paper and surface postal delivery to electronic delivery. He produced the first automatic system for large scale processing of student electronic assignment submission and return. In 1997 he took a 2-year secondment as chief systems strategist to the Knowledge Media Institute. Upon returning to the renamed faculty of mathematics and computing, he resumed his academic role and conducted research in the use of robotics in teaching computing. In 2007 he launched the Open University's first course in forensic computing. The current version of this module is M812 Digital Forensics. In 2004 he began conducting research into privacy with a focus on mobile computing and lifelogging in particular. More recently he has concentrated on applications of wearables and IoT technologies on health and wellbeing. He continues to supervise students and conduct research in this area and is a principal investigator and co-investigator on a number of large projects funded by the UK and European Research Councils. Blaine has always taken a human-centred approach to computing. He is interested in privacy in mobile and ubiquitous computing and in lifelogging technologies in particular, including both personal lifelogging and logging energy and resource usage. He has supervised PhD students in the areas of privacy, sustainable computing, digital forensics and more recently wearable and ubiquitous computing applied to healthcare. He was principal investigator on a number of Knowledge Transfer Partnership projects with industrial partners from 2009 to 2011, a co-investigator on the £1.2M EPSRC PRiMMA (Privacy Rights Management for Mobile Applications) from 2008 to 2011 and a co-investigator on the 5-year ERC funded ASAP (Adaptive Security and Privacy), where he is looking at security and privacy issues in lifelogging. He was also a co-investigator on the EPSRC funded Privacy Dynamics grant (2013–2017). He is Principal Investigator on the EPSRC funded Monetize Me grant (2014–2017) and Principal Investigator on the EPSRC funded STRETC
https://en.wikipedia.org/wiki/Three-way%20hybrid
A three-way hybrid set-top box is a hybrid device typically used by Pay TV operators and Telecommunications service providers to converge content delivered via three different video transport networks – satellite, terrestrial and IP [managed or public Internet]. Three-way Hybrid [or tribrid] Set-Top Boxes enable consumers to navigate between a wide range of content quickly and intuitively, and view it all on the main household TV set. One of the first operators to deploy a tribrid platform is ITI Neovision's n in Poland, which rolled out their Turbo Dekoder HD in December 2009 using Advanced Digital Broadcast's ADB-5720SX. The n deployment won the 2010 IP TV World Forum award for Best Interactive TV service and "best in show" awards. References http://media2.pl/media/62667-iptv-world-series-award-dla-turbodekodera-hd.html http://www.rapidtvnews.com/index.php/201003246193/adb-wins-iptv-world-award.html http://n.pl/news/show/1291-iptv_world_series_award_dla_turbodekodera_hd_z_cyfrowa_nagrywarka_telewizji_n.html Cable television technology Consumer electronics Satellite television Set-top box
https://en.wikipedia.org/wiki/Seattle%20Community%20Access%20Network
Seattle Community Access Network (SCAN) is one of the Public, educational, and government access (PEG) cable television channels in Seattle, Washington. The station provides camera equipment, television studios and training that allow residents of King County to create and cablecast their own television shows for a small fee. The station is carried on Comcast and Broadstripe cable systems in King County and the greater Puget Sound region except for six cities covered by Puget Sound Access. History Seattle first acquired a Public-access television station in 1983. Known simply as Channel 29, the station was often referred to as Seattle Public Access Network. The station was operated out of the Northwest Access and Production Center and was owned by the cable company. In August 1999, Seattle Community Access Network was formed as a non-profit organization in order to take over station operations from TCI. Part of the reason for creating the organization was to handle complaints about adult material being aired on the channel by local producers. Overview Seattle Community Access Network provides television productions resources to residents in King County and the greater Puget Sound region for use in creating TV shows and local programming. SCAN's facility houses two television studios for producing TV programs. The facility also provides three editing booths, several television cameras and related equipment for local residents to use for producing TV shows. SCAN has 12 full-time and 3 part-time employees that run the facility and train residents on how to use the camera equipment and editing suites. The staff regularly hold classes to teach residents TV production and video editing. Part of SCAN's operations include a Youth Media program to help teach local youth how to become filmmakers. The production facilities are also utilized by Reel grrls program run by 911 Media Arts Center and the local YMCA. Funding SCAN is funded by cable TV subscribers in the form of Cable television franchise fees. These franchise fees are charged to cable subscribers each month and totalled $6,500,000 in 2009. The fees are passed by the cable company to the Seattle city government and placed in the Cable Television Franchise Subfund that pays for Public-access television, Educational-access television and Government-access television (GATV). These are known as PEG channels for Public, educational, and government access television. Starting in 2006, the Cable Television Franchise Subfund is managed by the Department of Information Technology (DoIT) and is used fund things other than PEG channels. SCAN's receives about 10% of the fund or about $650,000 for its yearly budget. Additional funding for the station comes from grants and donations that SCAN actively seeks and a small amount comes from the fees charged to citizens that use SCAN to create programs. Threats to operations There have been several threats to the station's operations over the years. From 199
https://en.wikipedia.org/wiki/Stationary%20subspace%20analysis
Stationary Subspace Analysis (SSA) in statistics is a blind source separation algorithm which factorizes a multivariate time series into stationary and non-stationary components. Introduction In many settings, the measured time series contains contributions from various underlying sources that cannot be measured directly. For instance, in EEG analysis, the electrodes on the scalp record the activity of a large number of sources located inside the brain. These sources can be stationary or non-stationary, but they are not discernible in the electrode signals, which are a mixture of these sources. SSA allows the separation of the stationary from the non-stationary sources in an observed time series. According to the SSA model, the observed multivariate time series is assumed to be generated as a linear superposition of stationary sources and non-stationary sources , where is an unknown but time-constant mixing matrix; and are the basis of the stationary and non-stationary subspace respectively. Given samples from the time series , the aim of Stationary Subspace Analysis is to estimate the inverse mixing matrix separating the stationary from non-stationary sources in the mixture . Identifiability of the solution The true stationary sources are identifiable (up to a linear transformation) and the true non-stationary subspace is identifiable. The true non-stationary sources and the true stationary subspace cannot be identified, because arbitrary contributions from the stationary sources do not change the non-stationary nature of a non-stationary source. Applications and extensions Stationary subspace analysis has been successfully applied to Brain-computer interfacing, computer vision and temporal segmentation. There are variants of the SSA problem that can be solved analytically in closed form, without numerical optimization. See also Blind signal separation (BSS) Factor analysis Independent component analysis Cointegration References Multivariate time series
https://en.wikipedia.org/wiki/New%20York%20Forum
New York Forum may refer to: Austrian Cultural Forum New York, a network of Austrian Cultural Forums founded in New York 411 New York Forum, a community-driven site by on life in New York City and surrounding areas New York Times Youth Forum, a public affairs program that ended June 14, 1953 The New York Forum, a meeting of business leaders at the Grand Hyatt Hotel, New York
https://en.wikipedia.org/wiki/Law%20%26%20Order%3A%20Criminal%20Intent%20%28season%2010%29
The tenth and final season of Law & Order: Criminal Intent premiered Sunday, May 1, 2011, on USA Network. The timeslot was moved to Sunday nights at 9 p.m. (ET) from Tuesday nights at 10:00 pm Eastern/9:00 pm Central. This marks the first and only season since the show's debut that did not air with the original Law & Order still on the air, due to the latter's cancellation by NBC in May 2010. Episodes from this season repeated on NBC on Mondays starting May 30, 2011, at 9 p.m. (ET), leading into new episodes of Law & Order: LA, which was placed on hiatus from January to early April 2011, causing its own new episodes to air through July 2011. Law & Order: Criminal Intent finished its 10 season run on June 26, 2011. It was confirmed by USA Network co-president Jeff Wachtel on July 15, 2011; when asked about a possible 11th season, Wachtel answered "No—and this is said with respect for the show, respect for Dick [Wolf], and most significantly with respect to the audience." Wachtel also cited reasons for not renewing being monetary issues. The episodes in the tenth season averaged 4.43 million total viewers and 1.67 million in the age 18-49 demographic; higher than the numbers the show pulled in the ninth season. Cast and crew changes and returning characters In August 2010, Jeff Goldblum (Detective Zack Nichols) announced his departure from the series after switching agencies and being unsure of the series's future. The options for renewal of Goldblum, Saffron Burrows, and Mary Elizabeth Mastrantonio's contracts formally expired on July 31, 2010, after being extended by a month on June 30 when they were originally up. The series at the time was in limbo. Over a month later, it was confirmed that Criminal Intent was returning for a tenth and final season consisting of eight episodes, with star Vincent D'Onofrio who portrays Detective Robert Goren. The news of Law & Order: CI getting a proper closure was in stark contrast with the abrupt cancellation of the original mothership series by NBC in May 2010. Weeks later, it was announced that Kathryn Erbe would be returning as her character Detective Alex Eames, also confirming that ninth season cast member Saffron Burrows (Detective Serena Stevens) had departed. This meant a return to the single, original pair of Detectives Eames and Goren that featured in the first four seasons of the series. In February 2011, Jay O. Sanders joined the cast as Captain Joseph Hannah, replacing Mary Elizabeth Mastrantonio (Captain Zoe Callas). Sanders has appeared in episodes of both the original Law & Order and L&O: Criminal Intent (in the second season episode Dead). Chris Brancato replaced Walon Green as show runner/executive producer. Green was show runner/EP throughout seasons 8 and 9. Former show runner/executive producer Warren Leight wrote the episode "Trophy Wine", along with all the scenes with D'Onofrio and Julia Ormond, and the final scenes in the finale, "To the Boy In the Blue Knit Cap". Co-creator, dev
https://en.wikipedia.org/wiki/First%20Down%20Classic
The First Down Classic was a National Association of Intercollegiate Athletics endorsed Pre-Season bowl game created by Jason Dannelly of the Victory Sports Network. It began operations in 2007, taking over for the defunct Wheat Bowl that operated from 1995 until 2006. In 2009, two separate games were played under the same name "First Down Classic". The game ceased operations after completion of the 2011 game. Game results Rankings are from the NAIA Coaches' Poll. Game details 2010 The start of the 2010 NAIA football season began at Ottawa University in the College Fanz First Down Classic game between Ottawa and Baker. This game marked the first time the two schools met in football for 17 years. Ottawa began the game by returning the kickoff for a touchdown and led the entire game to a 24-14 victory. 2011 Nationally ranked at #23, Baker University upset #10 ranked Ottawa University in the 2011 match-up played at Liston Stadium in Baldwin City, Kansas. Ottawa scored first when Shane Gimzo completed a 9 yard run for a touchdown with 9:02 remaining in the first quarter. It was the only lead Ottawa would hold for the entire game, which they lost when Baker's Tyler Hatcher ran the kickoff return for 82 yards for a touchdown and Andrew Kimrey completed the PAT kick. Later that same quarter, Baker's Reggie Harris ran a 62 yard punt return for a touchdown to take the lead. Ottawa managed to get close several times with the score at the end of the first half with Baker leading 16–17. Baker managed to hold Ottawa scoreless in the second half of play while scoring three touchdowns and a field goal. Baker recovered two fumbles and intercepted three passes to win with a final score of 41–16. Baker Running Back John Babb was named the game's Offensive MVP with 102 rushing yards on 10 attempts, 1 reception for 11 yards, and a Touchdown. Baker Outside Linebacker Adam Steele was named Defensive MVP with 16 tackles (7 Unassisted), 2 Interceptions and One Tackle for Loss. References Defunct college football bowls American football in Kansas
https://en.wikipedia.org/wiki/OSIAN
OSIAN, or Open Source IPv6 Automation Network, is a free and open-source implementation of IPv6 networking for wireless sensor networks (WSNs). OSIAN extends TinyOS, which started as a collaboration between the University of California, Berkeley in co-operation with Intel Research and Crossbow Technology, and has since grown to be an international consortium, the TinyOS Alliance. OSIAN brings direct Internet-connectivity to smartdust technology. Design Architecturally, OSIAN treats TinyOS as the underlying operating system providing hardware drivers, while OSIAN itself adds Internet networking capabilities. Users are able to download and install OSIAN-enabled firmware to their embedded hardware, form a PPP connection with their computer, and communicate raw IPv6 UDP to other wireless sensors from their favorite programming language on their computer. OSIAN is developed using a style very much like the development of Linux, which requires peer reviews and unit testing before any code moves into core repositories. Platforms OSIAN is designed for deeply embedded systems with very small amounts of memory. One primary platform contains a TI MSP430-based CC430 system-on-a-chip, which contains 32 kB ROM and 4 kB RAM. See also TinyOS Contiki 6LoWPAN External links SuRF Developer Kit supporting OSIAN Wireless sensor network Embedded systems
https://en.wikipedia.org/wiki/List%20of%20ray%20tracing%20software
Ray tracing is a technique that can generate near photo-realistic computer images. A wide range of free software and commercial software is available for producing these images. This article lists notable ray-tracing software. References 3D graphics software Ray tracing Ray tracing (graphics)
https://en.wikipedia.org/wiki/Mymovies.it
MYmovies.it is a website dedicated to Italian cinema. Established in 2000, the website contains a database on Italian films and television series and actors with films from 1895 to present. The website also features reviews of up and coming films, interviews with actors and directors and other notable figures in the Italian film industry and international news related to film. In 2010, it also launched a streaming platform, Mymovieslive!. The website is particularly popular among Italian men aged 25 to 45 according to demographic surveys and is the 56th most popular website with Internet users from Italy. As of 2013, the website included over one million pages, over 200,000 reviews, and it collected over 3 million monthly unique visitors. References External links Official site Italian film websites Internet properties established in 2000
https://en.wikipedia.org/wiki/Acacia%20Technologies
Acacia Technologies may refer to A division of Acacia Research A division within Computer Associates that effectively closed down in 2002 when its assets were sold to SSA Global Technologies
https://en.wikipedia.org/wiki/2010%E2%80%9311%20United%20States%20network%20television%20schedule%20%28late%20night%29
These are the late night schedules for the four United States broadcast networks that offer programming during this time period, from September 2010 to August 2011. All times are Eastern or Pacific. Affiliates will fill non-network schedule with local, syndicated, or paid programming. Affiliates also have the option to preempt or delay network programming at their discretion. Legend Schedule Monday-Friday Saturday By network ABC Returning series ABC World News Now America This Morning Jimmy Kimmel Live! Nightline CBS Returning series CBS Morning News Late Show with David Letterman The Late Late Show with Craig Ferguson Up to the Minute FOX Returning series: Encore Programming Not returning from 2009-10: Brothers Sit Down, Shut Up The Wanda Sykes Show NBC Returning series Early Today Last Call with Carson Daly Late Night with Jimmy Fallon Poker After Dark Saturday Night Live The Tonight Show with Jay Leno Not returning from 2009-10: The Tonight Show with Conan O'Brien United States late night network television schedules 2010 in American television 2011 in American television
https://en.wikipedia.org/wiki/North%E2%80%93South%20line%20%28Saudi%20Arabia%29
The SAR North–South Railway line is a 2,750 km (1,709 mi) network of railway lines in central and eastern Saudi Arabia, built and operated by the Saudi Railway Company. The primary line of the network connects the capital of the kingdom, Riyadh, to the border with Jordan at Al Hadithah. The line starts from Al-Jalamid mine which is located in the northeast in the Northern Territory, through Al-Jawf and Hail until arriving at the "AlBaithah railway junction" in the Qassim region. It then heads towards the southeast for processing and export facilities at Ras Al-Khair in the Eastern Province near Jubail. The line shares infrastructure with the SAR Riyadh-Qurayyat Line between Buraidah and Al Nafud. The line is a dedicated freight corridor, however, the SAR Riyadh-Qurayyat Line operates only passenger services. Current rail service The primary line shares infrastructure with the SAR Riyadh–Qurayyat line, and connects Riyadh to the border with Jordan at Al Haditha. Branch lines connect this main line to Ra's al-Khair (via Bauxite Junction), Hazm al-Jalamid (via Phosphate Junction), and Al Baseeta (via Al Baseeta Junction). Stations Operation on long freight part of the project connecting Al-Haditha and Jalamid with new port city Ras Al-Khair was started in Jan 2015. An 85 km link is planned which would connect the North–South railway with the port at Jubail. Infrastructure The first six of 25 EMD SD70ACS freight locomotives ordered in April 2009 were handed over to SAR at Port Dammam on 22 August 2010. Passenger diesel push–pull trains made by Construcciones y Auxiliar de Ferrocarriles arrived in April 2015, and are designed to run at up to 55 degrees C. Each of the SAR trains includes a restaurant car, family zone and a prayer compartment, as well as both seating and sleeping cars. They are expected to run in formations of nine and 13 cars. See also Saudi Railways Organization (SRO) Saudi Railway Company (SAR) Transport in Saudi Arabia References External links Map of the project Saudi Railway Company Railway lines in Saudi Arabia Railway stations
https://en.wikipedia.org/wiki/AdTaily
AdTaily is a self-service advertising network company based in London. The company's service allows online publishers to sell ads directly. Rather than using the popular pay per click or cost per mille method of charging advertisers for displaying ads on a website, AdTaily charges per day, per week, or per month. History AdTaily started in September 2008, as an online project from Jakub Krzych and Marcin Ekiert which qualified for the London 2008 final of Saul Klein's funding competition Seedcamp. The beta release version of the AdTaily self-service ad system appeared online about half a year later. As AdTaily wanted to concentrate on the "Long Tail" of the Internet, the service was made available to only 250 bloggers, who were supposed to test the system on their blogs. For the next two months, the system was available on invitation-only, managing to reach 800 users, before it was publicly available. The company has continued to market the service in Poland since then. In July 2009 the Polish media group Agora SA invested in AdTaily, and started using the AdTaily system across 80 per cent of its portfolio of websites. At the beginning of 2010, Adtaily opened an office in London, and launched an international version of its service. In July 2010, AdTaily was named one of "Europe's 25 Most Creative Companies" by CNBC Business magazine. CNBC said that AdTaily fulfilled the "democratising promise of the internet" for advertising, allowing the small advertisers in the "long tail" of advertising to be able to advertise in a way that is better understood than "buying 1,000 impressions that go away in a couple of minutes," which for them "can seem like a scam." According to CNBC, the AdTaily system is "simple and disruptively cheap to use." By September 2010 16.000 publishers installed the AdTaily widget, generating one billion monthly impressions and 1,5 million clicks. There were 5200 paying customers and 30000 ad units sold monthly. By March 2011 it was among the top 50,000 in Alexa traffic rankings. Self-service advertising system According to AdTaily, all of the people who visit a website are interested in its content, and some of them may also be interested in advertising their business or website to the like-minded audience. The AdTaily self-service advertising widget allows advertisers to buy ads in as few as three clicks, without leaving the publisher's website. It uses the PayPal online payment service both for paying for the ad campaigns, and for charging to sell ads on a website). The service also use a single, 125x125px web banner format, so that advertisers can place the same ad on many websites in the same ad format. Users need to create an account on the AdTaily website, after which they receive the widget code, which they have to paste into their website. The widget "auto-fits" to the section in which it is placed. The user has to know at least some basic HTML in order to know how and where to paste it. For ads sold directly
https://en.wikipedia.org/wiki/Hit102.5%20Mt%20Isa
hit102.5 Mt Isa (ACMA callsign: 4MIC) is an Australian commercial radio station in Queensland. Owned and operated as part of Southern Cross Austereo's Hit Network, it broadcasts a contemporary hit radio format to Mount Isa and Cloncurry, Queensland. First broadcast in 1993, the station was branded as Hot FM until 2016 when it was rebranded to hit102.5 The Cloncurry translator was installed in 2012 References External links hit102.5 Mt Isa website Radio stations in Queensland Radio stations established in 1993 Contemporary hit radio stations in Australia
https://en.wikipedia.org/wiki/Ad%20Hoc%20Configuration%20Protocol
The Ad Hoc Configuration Protocol (AHCP) is an autoconfiguration protocol for IPv6 and dual-stack IPv6/IPv4 networks designed to be used in place of router discovery and DHCP on networks where it is difficult or impossible to configure a server within every link-layer broadcast domain, for example mobile ad hoc networks. AHCP will automatically configure IPv4 and IPv6 addresses, name servers and NTP servers. It will not configure default routes, since it is designed to be run together with a routing protocol (such as Babel or OLSR). External links AHCP development home page Internet draft for the Ad Hoc Configuration Protocol IPv6 Application layer protocols
https://en.wikipedia.org/wiki/Anthony%20McCormack
Anthony McCormack is an Australian television and radio producer. He is best known for his work on "The Naughty Rude Show", a comedic look at the sexual lives of young people. Student Youth Network Anthony was a part of the Student Youth Network. SYN radio broadcasts in Melbourne on the 90.7 FM frequency, as well as internationally, live streaming on the Internet, at the SYN Website. In 2007 he was SYN's first Creative Director. Early Radio Porcelain Slap was Anthony's first radio show. He and his co-host Hugh R. Macdonald hosted the sketch comedy show late Sunday nights in 2005. Anthony soon graduated to the station's flagship drive-time show, The Wind Up. During his tenure on the drive show he took part in various publicity stunts including a campaign to put his co-host onto Neighbours. In 2006 Anthony became heavily involved in The Naughty Rude Show, an informal look at sex and relationships that allowed listeners to SMS questions into the studio. The show started rotating young people around in guest-hosting roles to offer a variety of different viewpoints and opinions. In his time at SYN radio Anthony was also involved with popular shows Sketchy at Best, Panorama and Pen Island, as well as the Get Cereal Breakfast Show. Get Cereal Breakfast Show Anthony was the first Executive Producer of SYN's new Breakfast Show, Get Cereal. First airing on Monday 26 February 2007, the show featured the same three hosts volunteering five days a week from 6am - a first for the station. The show was designed to showcase the diversity of SYN. Naughty Rude Television In 2009 Anthony wrote, directed, produced and anchored a television version of "The Naughty Rude Show" for Channel 31. The show was produced for and by young people and dealt with taboo sexual topics in a light but respectful manner. The show hit a chord with viewers at a time when Channel 31 was being denied a digital broadcast license. The program was often cited as an example of the relevance of the channel and the necessity to grant it a digital license. Channel 31 was finally granted a digital license in November 2009. "The Naughty Rude Show" won two Antenna Awards in 2010: one for Best Youth Program which Anthony accepted, as well as Best Female Presenter for host Jackie Doran. 31 Questions and Beyond Starting in 2012, McCormack served as moderator for the community TV game/comedy show 31 Questions all three seasons it aired. In addition to announcing prizes at the end of the show, McCormack served as a player in skits, writer, editor, and judge, jury, and executioner of all decisions. He also provided a fair amount of comedy. Since 31 Questions, McCormack has been co-host of the Channel 31 political satire show, the Leak. He has also been host of the Leak's spinoff satire quiz show, Quiz Night, since its inception in the fall of 2017. References External links SYN Website Living people Amateur radio people Radio personalities from Melbourne 1983 births
https://en.wikipedia.org/wiki/Marilyn%20Tremaine
Marilyn Mantei Tremaine is an American computer scientist. She is an expert in human–computer interaction and considered a pioneer of the field. Education Tremaine received a BS in mathematics, physics and French from the University of Wisconsin, and later in 1982 obtained a PhD in communication theory at the University of Southern California - with the last two years of her PhD spent at Carnegie Mellon University under the direction of Professor Allen Newell. Awards Marilyn Tremaine received the ACM SIGCHI Lifetime Service Award in 2005, the Canadian Human Computer Communications Society 2010 Achievement Award, the Usability Professionals Association 2010 Lifetime Achievement Award. In 2022, Tremaine was elected into the ACM CHI Academy. Professional career Tremaine's academic career started as a lecturer and later assistant professor in the University of Michigan Business School, then in 1988 she became associate professor in the Computer Science Department of the University of Toronto, Canada, and a part of the Dynamic Graphics Project. In 1997, she returned to the US. She joined Drexel University as Professor of Computer and Information Systems. In 2001, she joined the New Jersey Institute of Technology where she was a professor and chair of the Information Systems Department. In 2008, she was a research professor at Rutgers University with joint appointments in the College of Communication and Information and the Department of Electrical and Computer Engineering. She is currently teaching as an adjunct professor at the University of Toronto. Tremaine is a distinguished alumni of the University of Toronto Knowledge Media Design Institute. Tremaine has also been vice president of product development for three software startup companies and a senior research scientist at the EDS Center for Applied Research. Tremaine co-founded ACM SIGCHI. She was the president of SIGCHI from 1999 to 2002, and served as SIGCHI's vice-president of communications, finance, and conference planning. Tremaine served on six editorial boards for journals and received two university teaching awards. Tremaine is known for psychology studies of early interactive user interfaces, collaborative software, and for developing a framework for cost-justifying usability engineering. Other research interests include auditory and multimodal interface design, global software development, and the development of interfaces for the blind and visually impaired, people with Aphasia, or in rehabilitation following a stroke. Tremaine has developed educational programs in HCI and related fields, such as the Master of Business and Science on User Experience Design at Rudgers University. In addition, she helped develop SIGCHI's Human-Computer Interaction curriculum resources. Personal life Marilyn Tremaine resides in Toronto, Canada, and is married to the astrophysicist Scott Tremaine. Marilyn Tremaine enjoys cooking and catering formal dinners. Bibliography Mantei, M. a
https://en.wikipedia.org/wiki/Hardcover%20Mysteries%20%28TV%20series%29
Hardcover Mysteries is an American true crime television series that airs on the Investigation Discovery network. Debuting on October 11, 2010, Hardcover Mysteries is produced in conjunction with Digital Ranch Productions, Inc. Synopsis The series "travels inside the minds of America's most popular novelists to explore the crossover from fact to fiction." Best-selling crime fiction writers—including David Baldacci, Sandra Brown, and Kathy Reichs—host each episode, telling the story of a real life crime that helped inspire their fiction. The show is a mix of interviews, crime scene photographs, and cinematic reenactments. A New York Post review awarded the documentary series 3-out-of-4 stars. Episodes "David Baldacci" - In 1964, D.C. socialite Mary Meyer was murdered. The revelation of Mary's diary, which detailed an affair with President Kennedy, leads many to conspiracy theories and became the partial basis for Baldacci's best-seller, Absolute Power. "Lisa Scottoline" - Detectives investigating the homicide of a 15-year-old girl uncover a shocking murder-for-hire scheme plotted by the victim herself. Lisa Scottoline, whose thrillers often explore family relationships, untangles the web of this family triangle. "Sandra Brown" - The body of a young man is found brutally murdered in East Texas. Investigators believe a local gang with a hateful agenda is behind the crime. Sandra Brown offers insight into this landmark hate-crime case, which inspired her book, The Witness. "Linda Fairstein" - A vast investigation into the disappearance of millionaire Manhattan socialite Irene Silverman uncovers two prime suspects, a mother-and-son killing team. Linda Fairstein provides a behind-the-scenes account of the police investigation. "Sara Paretsky" - Carmin Ross is found stabbed to death in her Lawrence, KS home. This case captured novelist Sara Paretsky's attention because of how investigators methodically unraveled the suspect's carefully crafted story. "Harlan Coben" - Harlan Coben's two New York Times #1 bestsellers, Long Lost and Caught feature girls who disappear and a community's quest for answers — themes that are found in the true story of Brianna Denison's abduction and the questions that echoed as a result in the community of Reno, Nevada. "Kathy Reichs" - When freelance writer Louise Ellis disappears on a routine weekend getaway, investigators narrow in on two key suspects: her new husband and her ex-boyfriend. Now a critically acclaimed best-selling author, Dr. Kathy Reichs, recounts her real-life involvement as forensic anthropologist in one of the most sensational homicide investigations in Canadian history. "Joseph Wambaugh" - Joseph Wambaugh traces the landmark case that was subject of his bestseller The Blooding. When two English girls are murdered in the small community of Leicester, investigators use a new technique called DNA fingerprinting to bring a serial killer to justice.. References External links 2010s America
https://en.wikipedia.org/wiki/HTC%207%20Mozart
The HTC 7 Mozart (also known as the HTC Mozart), is a mobile smartphone running the Windows Phone operating system. The phone was designed and manufactured by HTC. The HTC 7 Mozart is one of three Windows Phone handsets available from HTC in the UK at launch, and has a focus on high-fidelity audio with Dolby Mobile and SRS surround sound built in. It is also the only Windows Phone product from HTC with a Qualcomm S2 Generation chipset. All others use the S1 generation (As of August 20, 2011). Available exclusively on Orange from 21 October 2010 to 2011, the HTC 7 Mozart is very similar in size and styling to many other HTC handsets, save that it boasts the three standard buttons below the screen specified by Microsoft across all Windows Phone devices. Operating system There was a lot of speculation whether HTC Mozart was to get the 7.8 Update. This was confirmed by HTC and the update was released on 14/03/2013. The most recent update is the Build 7.10.8862.144 live tile fix which can be downloaded via Zune. Since 2012, people have reported they were able to upgrade to 7.8 RTM using a cab sender utility. This method of upgrading has proved successful to many people but it is only recommended for advanced users. The 7.8 update gives the Mozart increased performance and battery life has an easy to spot improvement. The standard life on Windows Phone 7.5 was reported at around 5 hours of heavy usage. Windows Phone 7.8 however has increased battery life up to 10 hours on heavy usage. Announcement Announced at the Windows Phone event in New York City on October 11, 2010. See also Windows Phone References External links Windows Phone devices HTC smartphones Mobile phones introduced in 2010
https://en.wikipedia.org/wiki/GMC-4
The GMC-4 is the only 4-bit microcomputer to be mass-produced in the last 30 years (as of 2009). It was produced by Gakken, a Japanese publisher who distributed it with a magazine attached to a box containing the components required to assemble the computer. The purpose of the GMC-4 is education. It provides an accessible way to learn about assembly language and the principles of computing. References External links Description of the kit, assembly language and example programs Example programs gmc4cc (C Compiler for GMC-4) G4CBASIC Microcomputers Single-board computers
https://en.wikipedia.org/wiki/Dear%20Genevieve
Dear Genevieve is a television show on the U.S. cable network HGTV, hosted by Genevieve Gorder. The series debuted in January 2009, on HGTV. The show focuses on how Gorder designs a room or an area for a family, after they have written to the show asking for help. Episodes Season 1 Season 2 Season 3 Season 4 See also HGTV Design Star References External links Dear Genevieve on HGTV Dear Genevieve on IMDb HGTV original programming 2009 American television series debuts 2012 American television series endings
https://en.wikipedia.org/wiki/Elise%20Gatien
Elise Gatien (born July 14, 1988) is a Canadian actress. She is known for her role as Candice "CJ" Ward in the Cartoon Network live-action series Tower Prep. Life and career Gatien was born in Kamloops, British Columbia, Canada. She is of half German descent on her dad's side. She began performing at the age of four. She trained for a number of years in dance and musical theater. She was discovered at a model/talent convention and had a number of opportunities in Asia. In 2009, Gatien played Mia Dearden in two episodes of Smallville. Her other television credits include Supernatural, Bionic Woman, Eureka, The Guard, and roles in the films In the Land of Women and Dr. Dolittle: Tail to the Chief. In 2010, Gatien was cast as CJ Ward in the Cartoon Network live-action series Tower Prep. She was cast in The CW's 2012 pilot The Selection based on books written by Kiera Cass; however, the pilot was not picked up to series. In 2015, Gatien played the starring role of Jamie in the 1980s horror homage film Lost After Dark. Filmography Film Television References External links 21st-century Canadian actresses Actresses from British Columbia Canadian child actresses Canadian film actresses Canadian television actresses Female models from British Columbia Living people People from Kamloops 1988 births
https://en.wikipedia.org/wiki/BagIt
BagIt is a set of hierarchical file system conventions designed to support disk-based storage and network transfer of arbitrary digital content. A "bag" consists of a "payload" (the arbitrary content) and "tags," which are metadata files intended to document the storage and transfer of the bag. A required tag file contains a manifest listing every file in the payload together with its corresponding checksum. The name, BagIt, is inspired by the "enclose and deposit" method, sometimes referred to as "bag it and tag it." Bags are ideal for digital content normally kept as a collection of files. They are also well-suited to the export, for archival purposes, of content normally kept in database structures that receiving parties are unlikely to support. Relying on cross-platform (Windows and Unix) filesystem naming conventions, a bag's payload may include any number of directories and sub-directories (folders and sub-folders). A bag can specify payload content indirectly via a "fetch.txt" file that lists URLs for content that can be fetched over the network to complete the bag; simple parallelization (e.g. running 10 instances of Wget) can exploit this feature to transfer large bags very quickly. Benefits of bags include: Wide adoption in digital libraries (e.g. the Library of Congress). Easy to implement using ubiquitous and ordinary filesystem tools. Content that originates as files need only be copied to the payload directory. Compared to XML wrapping, content need not be encoded (e.g. Base64), which saves time and storage space. Received content is ready-to-go in a familiar filesystem tree. Easy to implement fast network transfer by running ordinary transfer tools in parallel. Specification BagIt is currently defined in RFC 8493. It defines a simple file naming convention used by the digital curation community for packaging up arbitrary digital content, so that it can be reliably transported via both physical media (hard disk drive, CD-ROM, DVD) and network transfers (FTP, HTTP, rsync, etc.). BagIt is also used for managing the digital preservation of content over time. Discussion about the specification and its future directions takes place on the Digital Curation discussion list. The BagIt specification is organized around the notion of a "bag." A bag is a named file system directory that minimally contains: a "data" directory that includes the payload, or data files that comprise the digital content being preserved. Files can also be placed in subdirectories, but empty directories are not supported. at least one manifest file that itemizes the filenames present in the "data" directory, as well as their checksums. The particular checksum algorithm is included as part of the manifest filename. For instance, a manifest file with MD5 checksums is named "manifest-md5.txt." a "bagit.txt" file that identifies the directory as a bag, the version of the BagIt specification that it adheres to, and the character encoding used for tag files
https://en.wikipedia.org/wiki/NISC
NISC may refer to: No instruction set computing, an architecture designed for efficiency National Invitational Softball Championship, an American collegiate sports tournament National center of Incident readiness and Strategy for Cybersecurity, Japan's government institute for cybersecurity National Information Solutions Cooperative, information technology cooperative for utility and broadband companies See also
https://en.wikipedia.org/wiki/Bird%20Technologies
Bird provides radio frequency communication products, services, calibration and training for the semiconductor, public security, cellular networks, broadcasting, military, government and medical industries. Bird's product portfolio includes RF power sensors, RF power meters, wattmeters, spectrum analyzers, antenna and cable testers, attenuators, RF terminations and loads, cellular repeaters, signal boosters, RF IQC recording solutions, RF signal generation, and RF software analysis tools. History In 1942 James Raymond Bird teamed up with a college friend to start a small job shop in Cleveland, Ohio, which led to the development of a line of products used to measure RF power generated by television and radio transmitters. James and his partner founded the Bird Engineering Company which later changed its name to the Bird Electronic Corporation. During his career, James Bird had been awarded several patents. Bird acquired TX RX Systems in 1995. Bird acquired X-COM Systems in 2010, the company designs and manufactures digital communication hardware and software for military and commercial applications. Milestones and patents 2018 Combilent US Acquires Bird's Radio Infrastructure Products Division 2017 Bird Launches the SignalHawk SH-42S Handheld Spectrum Analyzer 2013 Bird Technologies acquires Distributed Antenna System manufacturer DeltaNode 2013 VSG5000A Multi-Channel Phase Coherent Vector Signal Generator launched 2013 IQC5000A Series, RF Spectrum Capture and Playback System launched 2013 X-COM Systems releases Spectro-X 4.0 Signal Analysis Toolkit 2012 X-COM Systems releases Version 3.0 of RF Editor Graphical RF Signal Editor Software 2010 Bird Technologies Group Acquires X-COM Systems for Its Advanced RF Military Technology 2009 Radio Magazine Pick Hits Awarded at NAB Show for PC SignalHawk 2008 Radio Magazine Pick Hits Awarded at NAB Show for Transmit Power Monitor 2007 Ohio Governor's "E" Excellence in exporting award received (2nd time) 2005 Radio Magazine Pick Hits Awarded at NAB Show for Broadcast Power Monitor (BPME) 2003 Radio World Cool Stuff Awarded to Bird Site Analyzer 1999 Antenna Tester patent granted 1959 Thruline power measurement patent granted Model 43 Thruline Directional Wattmeter The Bird Model 43 Thruline Wattmeter was created in the early 1950s. The self-contained instrument uses microwatts of energy from the transmission it measured. Its reference line section made it economical and provided built-in reference accuracy that remained consistent with age. The patent was granted for the Directional Wattmeter in 1958. References External links www.birdrf.com Electronic test equipment manufacturers
https://en.wikipedia.org/wiki/Wrapper%20%28data%20mining%29
Wrapper in data mining is a procedure that extracts regular subcontent of an unstructured or loosely-structured information source and translates it into a relational form, so it can be processed as structured data. Wrapper induction is the problem of devising extraction procedures on an automatic basis, with minimal reliance on hand-crafted rules. Many web pages are automatically generated from structured data – telephone directories, product catalogs, etc. – wrapped in a loosely structured presentation language (usually some variant of HTML), formatted for human browsing and navigation. Structured data are typically descriptions of objects retrieved from underlying databases and displayed in web pages following fixed templates at a low level, injected into pages where the high-level structure can vary from week to week, per the rapidly evolving fashion of the site's presentation skin. The precise dividing line between the fluid high-level skin and the less fluid structured data templates is rarely documented for public consumption, outside of the content management team at the web property. Software systems using such resources must translate HTML content into a relational form. Wrappers are commonly used as such translators. Formally, a wrapper is a function from a page to the set of tuples it contains. Wrapper generation There are two main approaches to wrapper generation: wrapper induction and automated data extraction. Wrapper induction uses supervised learning to learn data extraction rules from manually labeled training examples. The disadvantages of wrapper induction are the time-consuming manual labeling process and the difficulty of wrapper maintenance. Due to the manual labeling effort, it is hard to extract data from a large number of sites as each site has its own templates and requires separate manual labeling for wrapper learning. Wrapper maintenance is also a major issue because whenever a site changes the wrappers built for the site become obsolete. Due to these shortcomings, researchers have studied automated wrapper generation using unsupervised pattern mining. Automated extraction is possible because most Web data objects follow fixed templates. Discovering such templates or patterns enables the system to perform extraction automatically. Wrapper generation on the Web is an important problem with a wide range of applications. Extraction of such data enables one to integrate data/information from multiple Web sites to provide value-added services, e.g., comparative shopping, object search, and information integration. See also Business intelligence (section semi-structured or unstructured data) Web scraping Sources Data mining
https://en.wikipedia.org/wiki/Geneva%20Environment%20Network
The Geneva Environment Network (GEN) is a cooperative partnership of over 75 environment and sustainable development organizations based in the Geneva area, including United Nations offices and programmes, local authorities, academic institutions and non-governmental organizations. Set up in 1999 with the support of the Swiss Federal Office for the Environment, and under the coordination of UNEP Regional Office for Europe (ROE), the GEN Secretariat is based in the International Environment House (IEH), which gathers under a common roof a range of United Nations and non-governmental organizations active in the field of environment and sustainable development. GEN actively promotes increased cooperation and networking between its members by organizing and hosting meetings on the environment and sustainable development, such as roundtables and international workshops. During the past ten years, GEN has provided a welcome centre, a single access point to environmental information and knowledge to its members and public at large, and conference services. The network members contribute actively to the GEN by sharing information and material, co-organizing and attending events. External links www.genevaenvironmentnetwork.org Organisations based in Geneva International environmental organizations
https://en.wikipedia.org/wiki/List%20of%20Russian%20IT%20developers
This list of Russian IT developers includes the hardware engineers, computer scientists and programmers from the Russian Empire, the Soviet Union and the Russian Federation. See also :Category:Russian computer scientists and :Category:Russian computer programmers. Alphabetical list A Georgy Adelson-Velsky, inventor of AVL tree algorithm, developer of Kaissa (the first World Computer Chess Champion) Andrey Andreev, creator of Badoo, one of the world's largest dating sites, and the 10th largest social network in the world Vladimir Arlazarov, DBS Ines, developer of Kaissa (the first World Computer Chess Champion) B Boris Babayan, developer of the Elbrus-series supercomputers, founder of Moscow Center of SPARC Technologies (MCST) Alexander Brudno, described the alpha-beta (α-β) search algorithm Nikolay Brusentsov, inventor of ternary computer (Setun) C Andrei Chernov, one of the founders of the Russian Internet and the creator of the KOI8-R character encoding Alexey Chervonenkis, developed the Vapnik–Chervonenkis theory, also known as the "fundamental theory of learning", a key part of the computational learning theory D Mikhail Donskoy, a leading developer of Kaissa, the first computer chess champion Pavel Durov, founded the VKontakte.ru social network, #35 on Alexa's Top 500 Most Visited Global Websites, the 6th largest social network in the world, and Telegram E Andrey Ershov, developed Rapira programming language, started the predecessor to the Russian National Corpus G Vadim Gerasimov, one of the original co-developers of the famous video game Tetris Victor Glushkov, a founder of cybernetics, inventor of the first personal computer, MIR K Yevgeny Kaspersky, developer of Kaspersky anti-virus products Anatoly Karatsuba, developed the Karatsuba algorithm (the first fast multiplication algorithm) Leonid Khachiyan, developed the Ellipsoid algorithm for linear programming Tigran Khudaverdyan, deputy CEO of Yandex Lev Korolyov, co-developed the first Soviet computers Semen Korsakov, the first to use punched cards for information storage and search Alexander Kronrod, developer of Gauss–Kronrod quadrature formula and Kaissa, the first world computer chess champion L Evgeny Landis, inventor of AVL tree algorithm Sergey Lebedev, developer of the first Soviet and European electronic computers, MESM and BESM Vladimir Levenshtein, developed the Levenshtein automaton, Levenshtein coding and Levenshtein distance Leonid Levin, IT scientist, developed the Cook-Levin theorem (the foundation for computational complexity) Oleg Lupanov, coined the term "Shannon effect"; developed the (k, s)-Lupanov representation of Boolean functions M Yuri Matiyasevich, solved Hilbert's tenth problem Alexander Mikhailov, coined the term "informatics" Anatoly Morozov, worked on automated control systems, problem-focused complexes, modelling, and situational management N Anton Nossik, godfather of the Russian internet who began Russian online news P Alexey Paj
https://en.wikipedia.org/wiki/Panic%20Button%20%282011%20film%29
Panic Button is a British independent film released in 2011. The film is a horror thriller, intended as a cautionary tale on the dangers of online social networking. Plot Four young people win the competition of a lifetime; Jo (Scarlett Alice Johnson), Max (Jack Gordon), Gwen (Elen Rhys) and Dave (Michael Jibson) head off on an all expenses paid trip to New York, courtesy of the social network All2gethr.com. As they board the private jet, they are asked to relinquish their mobile phones and take part in the in-flight entertainment – a new online gaming experience. An animated alligator on-screen asks them a series of personal questions that they are supposed to answer truthfully. The alligator then reveals the embarrassing lies they have told. The next round of questions reveals even more lies about their sexual pasts, which the alligator says have been tracked through their All2gether accounts. When Dave refuses to continue and Max tries unsuccessfully to send an email for help, the screen shows them apparently live footage of friends being tortured and killed. They are all then told to come one at a time to the plane's bathroom to be given an individual task. They are shown someone close to them and told that if they fail in the task that person will die. They have 45 minutes to complete the tasks, after which the plane will be crashed and they will all die. Max reveals that he is not actually Max, he hacked into Max's account to take the prize. Dave and Max fight, and Max kills Dave. They are shown Max's brother having an arm cut off and Dave's fiancée being killed by the alligator. Jo gives Max wine, which he drinks. Gwen tries to seduce Max in the bathroom, as this is now her task. Max realises the plane's hold adjoins the bathroom, and starts to break through with an axe. Gwen tries to stop him and Jo breaks her neck. Gwen's sister is shown being set alight. Max breaks through into the hold and finds the bodies of their friends - they have been watching recordings of them being killed. Max finds his laptop and attempts to get help, but the pilot demands the laptop from him, and destroys it. Jo and Max scuffle with the pilot. Max starts to feel ill; as he dies Jo reveals that she has poisoned him with the wine as her task. Jo and the pilot stand off and the alligator demands he goes back into the cockpit or else his family will die. Jo tries to convince him that they are already dead. Before he goes back into the cockpit, he tazes Jo. She eventually comes back around. Jo, as the only survivor, is shown a video of a girl, Lucy Turner, committing suicide. The alligator reveals that all four of them had watched the video and made disparaging comments about it rather than trying to save her. He is going to release the video of their ordeal and tells Jo he harmed her daughter. With 6 minutes to impact, Jo runs to the exit of the plane and manages to open the plug door, getting sucked out of the plane just before it crashes into the sea. News
https://en.wikipedia.org/wiki/Cyberinfrastructure%20for%20Network%20Science%20Center
The Cyberinfrastructure for Network Science (CNS) Center was founded in October 2005 by Professor Katy Börner at Indiana University, Bloomington. It emerged from the Information Visualization Lab at IU that focused on the analysis and visualization of data since 1999. With the advent of CNS, the mission was broadened from providing a research lab to building an entity that would advance datasets, tools, and services for the study of biomedical, social and behavioral science, physics, and other networks. A specific focus of CNS is research on the structure and evolution of science and technology (S&T) and the communication of results via science maps. The Center organizes international workshops and conferences, promotes network science and visualization at national and international initiatives, organizes and finances a weekly talk series on Network Science, holds an annual open house, hosts about 20 national and international visitors each year, and teaches regular workshops on its infrastructure and tools. CNS is also the creative and administrative home of Places & Spaces: Mapping Science, an international science mapping exhibit. The collection features leading examples of knowledge domain mapping, novel location-based cartographies, data visualizations, and science-inspired art, all created by experts from around the globe. One of the center's primary contributions is research and development of data and information visualization tools. Among these are included: the Cyberinfrastructure Shell (CIShell), the Science of Science (Sci2) Tool, the Network Workbench, the Scholarly Database, the EpiC Marketplace, MAPSustain, and others. In addition, CNS offers several courses at Indiana University on information visualization, structural data mining and modeling, user interface design, and human-computer interaction. In January 2013, CNS offered one of the first massive open online courses (MOOC) at Indiana University. This initial course, entitled Information Visualization MOOC (or IVMOOC), attracted visitors from over 100 countries. Since then, the course has been offered yearly and there are plans for additional iterations in the future. The following year, the course spawned a companion text, Visual Insights, published by The MIT Press. References External links Cyberinfrastructure for Network Science Center Network Science Talks Places & Spaces: Mapping Science CIShell Sci2 (Science of Science) Tool Network Workbench Scholarly Database EpiC Tool MAPSustain VIVO Cyberinfrastructure Indiana University
https://en.wikipedia.org/wiki/CVSA
CVSA may stand for: Computerized Voice Stress Analysis Commercial Vehicle Safety Alliance
https://en.wikipedia.org/wiki/Associated%20Carrier%20Group
Associated Carrier Group (ACG) is an industry association of US CDMA cellular network operators. Mission ACG's stated mission is "to benefit both its members and the consumer by facilitating efficient production and marketing of devices as well as increased competition. The consortium enables its members to work with manufacturers, suppliers and other vendors to develop and procure, for its customers, scarce or unobtainable products in a timely fashion through economies of scale and standardization of coding and other features." Members Alaska Communications Systems (ACS) Alaska Digitel (GCI) Alltel (acquired by Verizon Wireless, some assets sold to AT&T and Atlantic Tele-Network) Appalachian Wireless Bluegrass Cellular acquired by Verizon Wireless Carolina West Wireless Cellcom Cellular One of Northeast Pennsylvania Cellular South became cSpire Copper Valley Wireless Cox Communications ETEX Golden State Cellular acquired by Verizon Wireless Illinois Valley Cellular Inland Cellular James Valley Wireless LEACO Mid-Rivers Wireless Mobi Matanuska Telephone Association Nex-Tech Wireless Northwest Missouri Wireless Open Mobile nTelos Pioneer Cellular PTCI Wireless Revol Wireless Sagebrush Silver Star Communications South Central Communications SRT Communications Strata Networks Syringa Wireless Thumb Cellular United Wireless See also List of United States wireless communications service providers External links www.associatedcarriergroup.com - Official site Telecommunications organizations Business organizations based in the United States
https://en.wikipedia.org/wiki/ITHC
An ITHC, or IT Health Check, is an IT security assessment required, as part of an accreditation process, for many government computer systems in the UK. An ITHC is generally performed by an external service provider, although NCSC personnel may perform ITHCs on especially sensitive systems. It can touch on both applications and infrastructure, and involves an element of penetration testing. CHECK is a scheme for ITHC providers, run by NCSC. References External links National Cyber Security Centre (NSCS) Tigerscheme CREST (Council of Registered Ethical Security Testers) The Cyber Scheme Computer security accreditations
https://en.wikipedia.org/wiki/Journal%20of%20the%20National%20Comprehensive%20Cancer%20Network
The Journal of the National Comprehensive Cancer Network, established in 2003, is a monthly peer-reviewed medical journal of oncology and the official journal of the National Comprehensive Cancer Network (NCCN). It is published by Harborside Press and the editor-in-chief is Margaret Tempero (UCSF Helen Diller Family Comprehensive Cancer Center). It publishes the NCCN Clinical Practice Guidelines in Oncology, updates and review articles elaborating on guideline recommendations, and health services and clinical research papers, as well as correspondence and commentaries. Abstracting and indexing The journal is abstracted and indexed in: Current Contents/Clinical Medicine MEDLINE PubMed Science Citation Index Expanded According to the Journal Citation Reports, the journal has a 2020 impact factor of 11.908. References External links Oncology journals English-language journals Academic journals established in 2003 Monthly journals
https://en.wikipedia.org/wiki/Harold%20Billings
Harold Wayne Billings (November 12, 1931 – November 29, 2017) was an American librarian, editor and author best known for his role in developing national and state library networking and resource sharing among libraries. Career Billings received his BA from Pan American College (now Pan American University) in 1953 and his MLS from University of Texas in 1957. He taught high school English, physics, and chemistry in Pharr, Texas 1953–54 before beginning work at the University of Texas Library, Austin. Billings progressed from cataloguer, 1954–57, to assistant chief catalogue librarian, 1957–64, acquisitions librarian, 1965–67, assistant university librarian, 1967–72, associate director of General Libraries, 1972–1977 and finally director of General Libraries, 1978–2003, when he retired. Commenting on one of his articles, Pam North wrote "I believe he has captured what should be at the heart of every librarian. I know it is at the center of mine." A number of his best professional articles were collected in Magic and Hypersystems: Constructing the Information Sharing Library (2002). As one review concluded, Billings "has been instrumental in guiding the library into the digital future over the past 25 years. His essays challenge librarians to accept needed change and allow it to form the library of the future." In 2003 the American Library Association awarded him its annual Hugh C. Atkinson Memorial Award for his "long commitment to innovation in automation, resource sharing, and creative management." Literary studies In addition to his career as librarian, Billings edited and wrote extensively about various authors. Reflecting a long-time interest in Arthur Conan Doyle, in 2006 he received the Morley-Montgomery Award for his essay "The Materia Medica of Sherlock Holmes". Billings' most extensive literary studies involved two disparate authors who he suggested share a fascination with the Biblical Job, American novelist and essayist Edward Dahlberg (1900–1977) and Anglo-West Indian novelist M. P. Shiel (1865–1947) Billings helped gather a remarkable archive of Shiel's works and documents for the Harry Ransom Humanities Research Center. Beginning in 1958 with 115 books collected by A. Reynolds Morse for his bibliography, The Works of M. P. Shiel (1948), and eventually including hundreds of letters and manuscripts largely obtained from Shiel's literary executor, John Gawsworth, the Harry Ransom Center collection of Shiel material is easily the most extensive in the world. After retirement Billings returned to a biography of Shiel which he started in the 1960s, but set aside to concentrate on Dahlberg. Four chapters from his early draft were included in M. P. Shiel in Diverse Hands: a Collection of Essays on M. P. Shiel (1983). Billings extensively revised and expanded this material with much original research drawn from the Ransom Center archive and other sources. The first volume of a projected trilogy was published in 2005, M.P
https://en.wikipedia.org/wiki/Datana%20major
Datana major, the major datana or azalea caterpillar, is a moth of the family Notodontidae. It is found from Maryland to Florida, west to Kansas and Arkansas. The wingspan is 40–50 mm. Adults are on wing from June to August. Normally, there is one generation per year, although there may be a partial second generation in the southern part of the range. The larvae mainly feed on Rhododendron and Andromeda polifolia, but have also been recorded on apple, blueberry and red oak. First instar larvae feed in a cluster side by side. Young larvae skeletonize the leaves and the larger ones eat the entire leaf. External links Bug Guide Butterflies and Moths of North America Azalea Caterpillar, Datana major Grote & Robinson (Insecta: Lepidoptera: Notodontidae) Notodontidae Moths described in 1866
https://en.wikipedia.org/wiki/Vibo%20A688
The Vibo A688 is a touchscreen smartphone released for the Vibo Telecom network on 18 January 2010. It runs the Google Android software, and is manufactured by Foxconn. Specifications The specifications according to the Vibo website in October 2010: Hardware Screen size: 3.2 in. Screen resolution: HVGA (320 x 480 pixels) Weight: 114.4g Size: 56.8 x 114.9 x 12.6 mm Input devices: touchscreen Battery: 1230 mAh Li-ion Talk time: 180 min Standby time: up to 250 hrs Processor: 600 MHz RAM: 256 MB ROM: 512 MB Memory: up to 32 GB microSD Wi-Fi, 802.11b/g Bluetooth 2.0 GPS/AGPS receiver Accelerometer Proximity sensor Digitcal compass 5 megapixels camera Applications Users may customize their phones by installing apps through the Android Market. Preinstalled applications are: 800 radio telephone Android Market Games Google Talk Google Maps Google Calendar Gmail MuchMarts digital market digital market YouTube Widgets: Weather, stock prices, RSS Clones Vibo A688 was sold in various countries under several different names: Apanda A60, Chinavision Excalibur, Cincinnati Bell Blaze, Commtiva Z71, Gigabyte Gsmart G1305, Motorola Quench XT5 (XT502), Muchtel A1, Nexian Journey, Optimus Boston, Orange Boston, Spice Mi-300, Cherry Mobile Nova and Wellcom A88. See also Galaxy Nexus List of Android devices References Smartphones Android (operating system) devices Mobile phones introduced in 2010 Foxconn