source stringlengths 32 199 | text stringlengths 26 3k |
|---|---|
https://en.wikipedia.org/wiki/Stephen%20Mellor | Stephen, Steven, or Steve Mellor may refer to:
Stephen J. Mellor (also known as Steve Mellor), computer scientist
Steven Mellor (swimmer) (also known as Steve Mellor), British Olympic swimmer |
https://en.wikipedia.org/wiki/Grist%20%28computing%29 | In computing, grist is the addition of characters before and/or after a parameter to ensure uniqueness to a software interpreter. For example, in a UNIX shell, if there is a file named "-f" in the current directory, the following command
> rm -f
will not work, because "-f" is interpreted as an option to the "rm" command. Rather, one needs to "add grist" to get the appropriate behavior:
> rm ./-f
In this case, "./" is grist because it prevents "-f" from being interpreted as an option.
In popular culture
In the series Homestuck by Andrew Hussie, a material called grist exists, and it is a fundamental material in the computer simulation-like world in which the work is set.
Computer programming |
https://en.wikipedia.org/wiki/Rene%20Anselmo | Reynold Vincent "Rene" Anselmo (January 14, 1926September 20, 1995) was an American businessman who founded the satellite company PanAmSat and co-founded the television network Univision.
Early life
Anselmo was born in Bedford, Massachusetts. His father was of Italian descent and the postmaster in Quincy. At the age of 16, he enlisted in the United States Marine Corps and flew 37 missions as a tail gunner on a dive bomber in the Pacific Theatre of Operations during World War II.
He graduated from the University of Chicago in 1951.
Career
Anselmo travelled to Mexico, where he was hired by Televisa to produce television shows for Mexican television. He wed his wife Mary during his residence in Mexico. Anselmo returned to the United States in 1963 to help run the Spanish International Network Spanish language television network (the current day Univision). In 1984, he co-founded PanAmSat. PanAmSat gained a foothold in the television market by providing satellite services for private commercial communication networks, such as those used by international conglomerates to connect far flung manufacturing operations around the globe or provide data connections between a large number of retail outlets and corporate headquarters.
Personal life
Anselmo was married to Mary Anselmo, with whom he had three children, daughter Pier and sons, Rayce and Reverge.
Anselmo was described as having "unflinching self-confidence and willingness to risk all in his fight to upend the status quo" in a tribute by SpaceNews. He challenged the monopoly in satellite provision held by Intelsat in the 1980s, taking out full-page ads in the Wall Street Journal asking political leaders, including former U.S. President Ronald Reagan, to open up the satellite telecommunications market. He donated over 100,000 daffodils and tulips to the city of Greenwich, Connecticut.
Anselmo died September 20, 1995, from heart disease, aged 69. PanAmSat was left to his wife and his son-in-law, Fred Landman.
Reverge Anselmo
Anselmo's son Reverge owned Anselmo Vineyards before selling it in 2014, after a publicized battle with Shasta County, California.
As of 2020, Reverge Anselmo, who lives in Connecticut, contributed more than $100,000 to Patrick Jones' Shasta County District 4 Supervisor successful election campaign, "believed to be, at that time, the largest individual dollar contribution ever, to a local political campaign". In 2020, the Shasta County District Supervisor salary was $54,948 or $53,508. In addition, he has contributed more than a half-million dollars to Shasta County political committees, including $400,000 in November to Shasta General Purpose Committee/Recall Shasta, a group for the recall of three supervisors, after giving them $50,000 in August.
References
External links
1995 deaths
1926 births
20th-century American businesspeople
American television executives
United States Marine Corps personnel of World War II
United States Marines
Businesspeople from Bosto |
https://en.wikipedia.org/wiki/CADKEY | CADKEY is a 2D/3D mechanical CAD (computer aided design or computer aided drafting) software application released for various DOS, Solaris, and Microsoft Windows operating systems. Originally released for DOS in 1984, CADKEY was among the first CAD programs with 3D capabilities for personal computers.
History
Peter Smith and Livingston Davies founded Micro Control Systems (MCS) in 1981. MCS released CADKEY in 1984, the first 3D PC CAD product. After the success of the product the company took the name CADKEY, Inc. and set up headquarters in Windsor, Connecticut. CADKEY won editor's choice and CAD product of the year awards from PC Magazine in 1986 and 1988.
In June 1989, Cadkey, Inc. purchased the rights to DataCAD from Microtecture Inc.
In September 1992, Dr. Malcolm Davies (no relation to Livingston Davies) was elected president/CEO of Cadkey, Inc. Dr. Davies joined Cadkey, Inc. from Autodesk where from 1988 to 1992 he was V.P. marketing and sales. As part of a strategic shift to direct mail-based sales, Malcolm Davies reduced the price of the flagship CADKEY product from US $3,500 to $495.
By 1995, a Microsoft Windows version named CADKEY for Windows was introduced. Around this time CADKEY claimed 240,000 users.
In June 1996, Baystate Technologies of Marlborough, Massachusetts, purchased the rights to the CADKEY product. Previous to the CADKEY acquisition Baystate Technologies had developed third-party software component modules for CADKEY, AutoCAD, Ashlar-Vellum, and Microstation.
By 1999, Baystate Technologies was doing business as CADKEY Corporation, had added significant history-free solid modeling and freeform surface modeling capabilities to the product. A CADKEY variant without any solid or surface modeling capabilities was sold under the name CADKEY Wireframe.
In October 2003 Kubotek Corporation of Osaka, Japan, acquired Baystate Technologies. Kubotek formed Kubotek USA, Inc. based in Marlborough, Massachusetts, and continues development under the name KeyCreator. The first version of KeyCreator was shipped in early 2004.
References
External links
kubotekusa.com
Computer-aided design software
Computer-aided design software for Windows
Computer-aided design software for Linux |
https://en.wikipedia.org/wiki/Lamparello%20v.%20Falwell | Lamparello v. Falwell, 420 F.3d 309 (4th Cir., 2005), was a legal case heard by the United States Court of Appeals for the Fourth Circuit concerning allegations of cybersquatting and trademark infringement. The dispute centered on the right to use the domain name fallwell.com, and provides discussion on cybersquatting as it applies to criticism of a trademark.
In 1999, Christopher Lamparello created a website to respond to and criticize the anti-homosexual statements by the American Christian evangelical preacher Jerry Falwell. Lamparello's website was located at fallwell.com (note the misspelling). Believing that there was confusing similarity between the domain name and Falwell's own name, domain name, and other trademarks, Falwell and his ministries attempted to legally block Lamparello from using the mark "fallwell" and transfer the ownership of the domain name to Falwell.
The initial decisions (ruled by the National Arbitration Forum in 2003 and the United States District Court for the Eastern District of Virginia in 2004) decided in favor of Falwell, granting Falwell's claims of federal trademark infringement, false designation of origin, unfair competition, and cybersquatting.
On appeal in 2005, the United States Court of Appeals for the Fourth Circuit reversed the earlier decisions, ruling that there was not a "likelihood of confusion" between Lamparello's and Falwell's official site; that there was no trademark infringement based on "initial interest confusion" for sites that were non-commercial and critical of the trademark holder; and since Lamparello's site was non-commercial, there was no "bad faith intent to profit" and it was not cybersquatting.
Background
In 1999, Christopher Lamparello registered the domain name fallwell.com and used the affiliated website as a gripe site to express his negative opinions about the Fundamentalist Christian preacher Jerry Falwell's public statements against homosexuality.
Lamparello's site was plainly critical of Falwell and had very little viewership. The website offered no goods or services for sale, though the website contained a link to a separate Amazon.com webpage selling a book supporting his views, but Lamparello did not stand to financially gain from the sales of the book. Lamparello's website also contained prominent statements declaring that it was not affiliated with Falwell and his ministry, and provided a hyperlink to redirect viewers to Falwell's official website. Lamparello claimed that the domain name was chosen as a parody of Falwell's name, combining "fall" and "well".
Falwell had a registered trademark in the name "Listen America with Jerry Falwell". At the time, Falwell did not have any registered trademarks in the names "Falwell" or "Fallwell", but was in the process of registering the name "Jerry Falwell". Falwell had an official website at the domain name falwell.com, where he also sold goods.
Believing in a confusing similarity between the two domain names, |
https://en.wikipedia.org/wiki/ISO%2015765-2 | ISO 15765-2, or ISO-TP (Transport Layer), is an international standard for sending data packets over a CAN-Bus. The protocol allows for the transport of messages that exceed the eight byte maximum payload of CAN frames. ISO-TP segments longer messages into multiple frames, adding metadata (CAN-TP Header) that allows the interpretation of individual frames and reassembly into a complete message packet by the recipient. It can carry up to 232-1 (4294967295) bytes of payload per message packet starting from the 2016 version. Prior version were limited to a maximum payload size of 4095 bytes.
In the OSI Model, ISO-TP covers the layer 3 (network layer) and 4 (transport layer).
The most common application for ISO-TP is the transfer of diagnostic messages with OBD-2 equipped vehicles using KWP2000 and UDS, but is used broadly in other application-specific CAN implementations also where e might need to send more than the general Physical layer of CAN Protocol. It can be 8 bytes for CAN, 64 bytes for CAN-FD, and 2048 bytes for CAN-XL Protocol.
ISO-TP can be operated with its own addressing as so-called Extended Addressing or without address using only the CAN ID (so-called Normal Addressing). Extended addressing uses the first data byte of each frame as an additional element of the address, reducing the application payload by one byte. For clarity the protocol description below is based on Normal Addressing with eight byte CAN frames. In total, six types of addressing are allowed by the ISO 15765-2 Protocol.
ISO-TP prepends one or more metadata bytes to the payload data in the eight byte CAN frame, reducing the payload to seven or fewer bytes per frame. The metadata is called the Protocol Control Information, or PCI. The PCI is one, two or three bytes. The initial field is four bits indicating the frame type, and implicitly describing the PCI length.
ISO 15765-2 is a part of ISO 15765 (headlined Road vehicles — Diagnostic communication over Controller Area Network (DoCAN)), which has the following parts:
ISO 15765-1 Part 1: General information and use case definition
ISO 15765-2 Part 2: Transport protocol and network layer services
ISO 15765-3 Part 3: Implementation of unified diagnostic services (UDS on CAN) – replaced by ISO 14229-3 Road vehicles — Unified diagnostic services
ISO 15765-4 Part 4: Requirements for emissions-related systems
List of protocol control information field types
The ISO-TP defines four frame types:
A message of seven bytes or less is sent in a single frame, with the initial byte containing the type (0) and payload length (1-7 bytes). With the 0 in the type field, this can also pass as a simpler protocol with a length-data format and is often misinterpreted as such.
A message longer than 7 bytes requires segmenting the message packet over multiple frames. A segmented transfer starts with a First Frame. The PCI is two bytes in this case, with the first 4 bit field the type (type 1) and the following 12 bits the messa |
https://en.wikipedia.org/wiki/XKL | XKL, LLC is an American company that develops optical transport networking technologies. Founded in 1991 and based in Redmond, Washington, XKL is led by Cisco Systems co-founder Len Bosack.
History of XKL
In its earliest days XKL developed, and in 1995 introduced, the TOAD-1, a compact, modern replacement for PDP-10 systems, mainframe computer systems that had gone out of production.
Products
Current Products
Products include transponder, muxponder, mux/demux (multiplexing/demultiplexing) and (optical) amplifier models.
DarkStar DQT10 Transponder
Supports 12, 24 or 36 10G channels.
DarkStar DQT100 Transponder
Aggregates up to 96 100G channels onto a single pair of fibers.
DarkStar DQT400 Transponder
Aggregates up to 48 100G / 400G channels
DarkStar DQM100 Muxponder
Aggregates up to 12 100G channels via statistical multiplexing.
DarkStar DQM10 Muxponder
Aggregates up to 36 10G channels.
DarkStar DSM10-10 Muxponder
Aggregates up to 100G services.
DarkStar DXM
First released in 2007, the Darkstar DXM is a high-performance optical switch first installed at the California Institute of Technology as part of their Supercomputing Bandwidth Challenge. It provides 5 times the bandwidth, in excess of 100 Gigabits/sec, than the existing system but is also smaller and uses less power.
Historical Products
TOAD-1
The TOAD-1 System, also known as TD-1, was announced in 1993 and built as an extended version of the DECSYSTEM-20 from Digital Equipment Corporation. The original inspiration was to build a desktop version of the popular PDP-10 and the name began as an acronym for "Ten On A Desk". It was eventually built at XKL by veteran engineers from Cisco, DEC, Hewlett-Packard, and CDC.
It was the first XKL product produced and it became available for purchase in late 1995. The TOAD-1 is a high-performance I/O oriented system with a 36-bit processor running TOPS-20. It is a 36-bit multi-user system that can provide service to over 100 users at a time. The TOAD-1 architecture incorporates modern peripherals, and open bus architecture, expanded physical and virtual memory while maintaining the TOPS-20 user environment.
TOAD-2
The TOAD-2 was built to replace the TOAD-1. It is a single chip reimplementation used as redundant control processors in networking equipment from XKL. It can be configured for TOPS-20 timesharing.
See also
Other companies that produced PDP-10 compatible computers:
Foonly
Systems Concepts
Notes
References
External links
Login into the Living Computer Museum, a portal into the Paul Allen collection of timesharing and interactive computers, including an operational XKL TOAD-2
American companies established in 1991 |
https://en.wikipedia.org/wiki/Israel%20Inter-University%20Computation%20Center | The Israel InterUniversity Computation Center (IUCC), implements, operates and maintains the national research and education network (NREN) of Israel.
IUCC (Hebrew: מחב”א, MACHBA), was established in 1984 by Israel’s research universities and supported by the Planning and Budgeting Committee of the Council for Higher Education. It operates as a non-profit organization. Through its centers and divisions, IUCC delivers communication and network infrastructure services, digital information services, and learning technologies, as well as operating and handling all inter-university joint procurement and the legal aspects of operating Israel’s National Research and Education Network (NREN). IUCC promotes cooperation in these areas among member institutions, and between research institutes and organizations.
Network
History
IUCC's telecommunications infrastructure was created in 1984 with a pre-Internet 9.6 kbit/s international line to the European EARN network. In 1990, the first international Internet line from Israel to the USA began operating, at a rate of 64 kbit/s.
For a period of three years (1994-1996), IUCC operated a central node for Internet access for high-tech companies in Israel, as well as for various telecommunications providers (prior to the establishment of the Israeli Internet Society's central peering node known as the IIX). In 1997, the responsibility for commercial domestic internet traffic routing via the Israeli Internet eXchange (IIX) was transferred to the Israel Internet Association (ISOC-IL), and in 1999 IUCC was connected to the Internet2 network in the USA and to the European research network GÉANT.
Network
The Israeli university telecommunications infrastructure is based on a dual-star, eight-node network known as the ILAN-2 network. Interconnecting the network's two central points of presence (POPs), one located at Tel Aviv University and the other at a neutral colocation site called Med-1, is a dark fiber link operating at 20 Gbit/s. Each of the eight Israeli universities in the consortium connects to both POPS via a primary 10-20Gbit/s and a 2Gbit/s backup link. These links are provided by Cellcom (primary) and HOT (failover). Automatic failover of these links is handled by the Open Shortest Path First routing protocol.
The IUCC network is connected abroad via two 30Gbit/s links, one which runs from the Med-1 site in Petach Tikva and terminates in Frankfurt, Germany and the other from Tel Aviv University to London, UK. These links connect IUCC to the GÉANT network in Europe and through it also to the American research network - Internet2 and the wider internet. Additionally, the IUCC connects to the Israeli domestic internet using a 10 Gigabit Ethernet link to the IIX, as well as maintaining smaller dedicated links to about a dozen selected educational and research institutions in the country.
Collaboration
IUCC collaborates with a number of organisations, both nationally and internationally:
PRACE
GEANT
Exte |
https://en.wikipedia.org/wiki/Adobe%20Systems%2C%20Inc.%20v.%20Southern%20Software%2C%20Inc. | Adobe Systems, Inc. v. Southern Software, Inc. was a case in the United States District Court for the Northern District of California regarding the copyrightability of digitized typefaces (computer fonts). The case is notable since typeface designs in general are not protected under United States copyright law, as determined in Eltra Corp. v. Ringer. Since that case, the United States Copyright Office has published policy decisions acknowledging the registration of computer programs that generate typefaces. In this case, the court held that Adobe's Utopia font was protectable under copyright and Southern Software, Inc.'s Veracity font was substantially similar and infringing.
Background
Eltra Corp. v. Ringer
In 1979, The United States Court of Appeals for the Fourth Circuit held in Eltra Corp. v. Ringer that typefaces are industrial designs which cannot exist independently as works of art.
1988: Policy Decision On Copyrightability Of Digitized Typefaces
In 1988, the U.S. Copyright Office published a policy decision specifically addressing attempts to register fonts. The Copyright Office stated that the representation of a glyph as pixels was not protectable expression, since the raw source typeface design was not protectable, and no original authorship occurred in the conversion process.
The policy decision described the digitization of typefaces as bitmap images, which was the leading format for fonts at the time. A limitation of this format is that different sizes of the font must have different bitmap representations.
1992: Registrability Of Computer Programs That Generate Typefaces
Having received applications to register copyrights for computer programs that generated typefaces using "typeface in digitized form", the Copyright Office revisited the 1988 Policy Decision in 1992. The Office was concerned that the claims indicated a significant technological advance since the previous policy decision. One advance was scalable font representations (Bézier curves). This format can output a font at any resolution, and stores its data as control points rather than pixels. The Office acknowledged that these fonts might involve original computer instructions to generate typefaces, and thus be protectable as computer programs, but ended saying that "The scope of the copyright will be, as in the past, a matter for the courts to determine."
Case background
Adobe filed suit against Southern Software in multiple complaints between 1995 and 1997. Adobe's allegations were:
Copyright infringement related to SSI's Key Fonts Pro products 1555 ('Veracity'), 2002 and 2003
Copyright infringement on intermediate copying
Patent infringement on Adobe's design patents
Adobe's fonts under dispute were created from previously digitized font files in bitmap form. Such bitmap images are not protectable under copyright, as addressed by the 1988 Policy Decision. These were imported into a program where an Adobe editor dragged control points to best match the outli |
https://en.wikipedia.org/wiki/Sequence%20labeling | In machine learning, sequence labeling is a type of pattern recognition task that involves the algorithmic assignment of a categorical label to each member of a sequence of observed values. A common example of a sequence labeling task is part of speech tagging, which seeks to assign a part of speech to each word in an input sentence or document. Sequence labeling can be treated as a set of independent classification tasks, one per member of the sequence. However, accuracy is generally improved by making the optimal label for a given element dependent on the choices of nearby elements, using special algorithms to choose the globally best set of labels for the entire sequence at once.
As an example of why finding the globally best label sequence might produce better results than labeling one item at a time, consider the part-of-speech tagging task just described. Frequently, many words are members of multiple parts of speech, and the correct label of such a word can often be deduced from the correct label of the word to the immediate left or right. For example, the word "sets" can be either a noun or verb. In a phrase like "he sets the books down", the word "he" is unambiguously a pronoun, and "the" unambiguously a determiner, and using either of these labels, "sets" can be deduced to be a verb, since nouns very rarely follow pronouns and are less likely to precede determiners than verbs are. But in other cases, only one of the adjacent words is similarly helpful. In "he sets and then knocks over the table", only the word "he" to the left is helpful (cf. "...picks up the sets and then knocks over..."). Conversely, in "... and also sets the table" only the word "the" to the right is helpful (cf. "... and also sets of books were ..."). An algorithm that proceeds from left to right, labeling one word at a time, can only use the tags of left-adjacent words and might fail in the second example above; vice versa for an algorithm that proceeds from right to left.
Most sequence labeling algorithms are probabilistic in nature, relying on statistical inference to find the best sequence. The most common statistical models in use for sequence labeling make a Markov assumption, i.e. that the choice of label for a particular word is directly dependent only on the immediately adjacent labels; hence the set of labels forms a Markov chain. This leads naturally to the hidden Markov model (HMM), one of the most common statistical models used for sequence labeling. Other common models in use are the maximum entropy Markov model and conditional random field.
See also
Artificial intelligence
Bayesian networks (of which HMMs are an example)
Classification (machine learning)
Linear dynamical system, which applies to tasks where the "label" is actually a real number
Machine learning
Pattern recognition
Sequence mining
References
Further reading
Erdogan H., . "Sequence labeling: generative and discriminative approaches, hidden Markov models, cond |
https://en.wikipedia.org/wiki/List%20of%20funding%20opportunity%20databases | This is a list of online databases that publish funding opportunities.
Australian Directory of Philanthropy, Philanthropy Australia
Canada Business Network, Canadian federal government grants, loans and financing programs
ProQuest Pivot (formerly Community of Science Funding Opportunities), ProQuest
Dialog OnDisc Grants Database, Dialog OnDisc
FC Search, Foundation Center, replaced by Foundation Directory Online
Federal Assistance Program Retrieval System (FAPRS)
Federal Information Exchange (FEDIX), merged with RAMS
Federal Research in Progress (FEDRIP), National Technical Information Service
Fundica.com, private sector and public sector funding for Canadian businesses
Grants.gov, U.S. federal government grants
GrantGopher.com, grants for U.S.-based nonprofit organizations
GrantSearch, Australian grants, scholarships and funding opportunities for all sectors
GrantSelect
GrantScape, Catalog of Federal Domestic Assistance
GrantSelect, American Association of State Colleges and Universities
Illinois Researcher Information Service (IRIS)
Research Professional, Research Limited
SciVal Funding, Elsevier
Sponsored Programs Information Network (SPIN), InfoEd
The Funding Portal, public sector funding for Canadian businesses, nonprofit organizations and academia
World Academy of Young Scientists
1DANA Portal, public funding platform for Researchers, Entrepreneurs, Academia, Industry for Malaysia by Agensi Inovasi Malaysia
Research-related lists
Online databases
Database-related lists |
https://en.wikipedia.org/wiki/Partha%20Niyogi | Partha Niyogi (July 31, 1967 – October 1, 2010) was the Louis Block Professor in Computer Science and Statistics at the University of Chicago.
He is known for his work in artificial intelligence, especially in the field of manifold learning and evolutionary linguistics.
He wrote more than 90 academic publications and two books.
Notable work
Laplacian eigenmaps
References
External links
Personal website
Technical Reports
1967 births
2010 deaths
American computer scientists
University of Chicago faculty |
https://en.wikipedia.org/wiki/List%20of%20Mantracker%20episodes | Mantracker is a Canadian reality television series that premiered in April 2006 on the Outdoor Life Network (OLN). In the United States, the show airs on the Science Channel.
Series overview
Episodes
Season 1 (2006)
Season 2 (2007)
Season 3 (2008)
Season 4 (2009)
The fourth season premiered on July 26, 2009 on OLN, with an encore on August 1, 2009.
Season 5 (2010)
The series was renewed for a fifth season on August 11, 2010.
Season 6 (2011)
Season 7 (2012)
Mantracker was renewed for a seventh season, that premiered on May 21, 2012. Chad Savage Lenz was announced as the new mantracker at the end of the premiere episode.
References
External links
(Canada)
Mantracker – OLN website (Canada)
Mantracker – Science Channel website (United States)
of Terry Grant
Lists of reality television series episodes |
https://en.wikipedia.org/wiki/RealNetworks%2C%20Inc.%20v.%20DVD%20Copy%20Control%20Ass%27n%2C%20Inc. | RealNetworks, Inc. v. DVD Copy Control Association, Inc., 641 F. Supp. 2d 913 (2009), is a United States District Court case involving RealNetworks, the movie studios and DVD Copy Control Association regarding the Digital Millennium Copyright Act (DMCA) claims on the manufacturing and distribution of RealDVD, and a breach of license agreement. The district court concluded that RealNetworks violated the anti-circumvention and anti-trafficking provisions of the DMCA when the DVD copying software RealDVD bypasses the copy protection technologies of DVD.
This lawsuit is one of the many legal actions taken by the movie studios in an attempt to restrict the copying of DVDs.
Background
This case involves the digital media company RealNetworks, DVD Copy Control Association (DVD CCA) and the major motion picture studios. RealNetworks licensed the Content Scramble System (CSS), a technology commonly used on copyrighted DVDs to prevent unauthorized copying, from DVD CCA and released the product RealDVD that allows users to make hard drive copies of copyrighted DVDs. However, some major movie studios feel that RealDVD can threaten the emerging market in digital downloads and encourage people to make copies of rental DVDs instead of purchasing. RealNetworks, on the other hand, believes that copying of DVD is now legal after the favorable ruling of a 2007 California Superior Court case against Kaleidescape, a manufacturer of high-end media servers capable of copying copyrighted DVD content to the servers. Therefore, RealNetworks sued the DVD CCA and several major movie studios on September 30, 2008 seeking for a declaratory judgment that RealDVD neither violated the Digital Millennium Copyright Act (DMCA) nor breached the licensing contract with DVD CCA. On the same day, the studios sued RealNetworks by alleging that RealNetworks violated the DMCA and breached the contract.
District court ruling
The district court issued a temporary restraining order on October 3, 2008 after the initial hearing of the case to prevent the sale and distribution of RealDVD. The temporary restraining order was turned into a preliminary injunction against RealNetworks on August 11, 2009 by Judge Marilyn Hall Patel, barring the manufacturing and distribution of RealDVD or any other similar software product after the court found that RealNetworks violated the DMCA and breached the CSS licensing agreement with DVD CCA.
DMCA claims on Content Scramble System
The DMCA prohibits circumvention of "effective" access control of copyrighted works and the trafficking of tools that are designed primarily to circumvent "effective" access control or copy control of copyrighted works. RealNetworks alleged that that CSS is not effective anymore because it has been cracked or hacked. However, the court ruled that the DMCA statute does not require the access control or copy control technology to be strong as long as it prevents unauthorized access and/or copying under ordinary course of oper |
https://en.wikipedia.org/wiki/Bloomberg%20Law | Bloomberg Law is a subscription-based service that uses data analytics and artificial intelligence for online legal research. The service, which Bloomberg L.P. introduced in 2009, provides legal content, proprietary company information and news information to attorneys, law students, and other legal professionals. More specifically, this commercial legal and business technology platform integrates Bloomberg Law News with Bloomberg Industry Group's primary and secondary legal content and business development tools.
Creation and services
Bloomberg Law's web-based platform was first released under a pilot program in late 2009. According to the Financial Times, "the unit forms part of the data provider's drive to diversify beyond the banks and investment groups that make up the core customers for its eponymous terminals." In 2010, the service was formally launched. According to Bloomberg BNA, the platform was developed to help law firms grow their top line revenue, provide counsel by getting answers quickly and efficiently, and maintain and increase their profitability.
Prior to the creation of Bloomberg Law, two services, LexisNexis and Westlaw, comprised the majority of the legal research market. Bloomberg L.P. sought to separate itself from the competition by offering an integration of the Bloomberg company and financial data with legal research. Bloomberg Law combines content from Bloomberg's global news network, legal analysis, court dockets, legal filings and reports from Bloomberg legal analysts as well as business news and information. Attorneys can also draw upon stock charts, search patent histories and find information about relevant judges and attorneys. The service is priced to include all features under a fixed monthly fee.
In 2011, Bloomberg L.P. purchased Bureau of National Affairs (BNA), and integrated legal materials from BNA into Bloomberg Law. Features include Litigation and Dockets, Legal and Financial Analytics, Business Development Center, Practice Tools and News and Law Reports. In September 2019, Bloomberg BNA changed its name to Bloomberg Industry Group, which includes Bloomberg Law, Bloomberg Tax, Bloomberg Government, and Bloomberg Environment.
Growth and expansion
In October 2010, Lou Andreozzi, a former chief executive officer of LexisNexis North American Legal Markets, joined Bloomberg Law as chairman and Larry Thompson, a former global marketing officer of LexisNexis, joined as chief operating officer. In September 2011, Bloomberg acquired legal publisher Bureau of National Affairs (BNA) to bolster its proprietary data and content.
In September 2012, Greg McCaffery was named chief executive officer of Bloomberg Law. McCaffery had previously served as chief executive officer and president of Bloomberg BNA. In January 2014, Bloomberg BNA, a Bloomberg L.P. subsidiary, took over day-to-day operations of Bloomberg Law. In 2018, Josh Eastright assumed the role of CEO of Bloomberg BNA.
Between 2014 and 2015, Bloomberg |
https://en.wikipedia.org/wiki/TCA%20Award%20for%20Outstanding%20Achievement%20in%20Movies%2C%20Miniseries%20and%20Specials | The TCA Award for Outstanding Achievement in Movies, Miniseries, and Specials is an award given by the Television Critics Association.
Winners and nominees
Total awards by network
HBO – 16
PBS – 6
ABC – 4
CBS – 2
FX – 2
NBC – 2
A&E – 1
BBC America – 1
Discovery Channel – 1
Hulu — 1
MTV – 1
Netflix – 1
Sci Fi – 1
Showtime – 1
Total nominations by network
HBO – 54
PBS – 24
CBS – 20
ABC – 15
FX – 13
NBC – 11
Netflix - 9
Showtime – 8
BBC America – 6
Hulu - 5
A&E – 4
SundanceTV - 4
Discovery Channel – 3
HBO Max - 3
Amazon - 2
AMC - 2
Fox - 2
History - 2
TNT - 2
Apple TV+ - 1
Disney+ - 1
MTV – 1
NatGeo - 1
Peacock - 1
Roku Channel - 1
Sci Fi – 1
Starz - 1
References
External links
Official website
Movies |
https://en.wikipedia.org/wiki/CoreLogic | CoreLogic, Inc. is an Irvine, CA-based corporation providing financial, property, and consumer information, analytics, and business intelligence. The company analyzes information assets and data to provide clients with analytics and customized data services. The company also develops proprietary research, and tracks current and historical trends in a number of categories, including consumer credit, capital markets, real estate, fraud, regulatory compliance, natural hazards, and disaster projections. The company reported full 2020 revenue of $1.6 billion. As of 2021, CoreLogic is a Fortune 1000 company.
History
CoreLogic dates back to September 1991, when TRW Real Estate Information Services entered into a partnership with three real estate information service units from Elsevier, the Dutch Publishing company now known as Reed Elsevier.
In September 1996, the group, then known as TRW Information Systems & Services, split away from their parent company and was renamed Experian.
In September 1997, majority ownership of Experian's real estate information business was acquired by The First American Corporation, in a partnership with Experian. The partnership was called FARES LLC, and the new entity began operating under the name First American Real Estate Solutions (RES).
Also in 1997, Kraig Clark and Steve Schroeder co-founded C&S Marketing in Sacramento, CA. Created to provide fraud prevention and collateral risk management solutions to the mortgage banking industry, the company was later renamed as CoreLogic Systems.
In October 2003, First American RES acquired Transamerica's property information business, combining their real estate information and analytics businesses.
In March 2007, First American Corporation merged its First American RES subsidiary with CoreLogic Systems, under the FARES LLC subsidiary. The division began operating under the name First American CoreLogic.
In June 2010, CoreLogic, Inc. was established as a standalone business when The First American Corporation split its businesses to create two separate legal entities, CoreLogic, Inc and First American Corporation which provides title and financial services.
In January 2011, the company acquired Australia-RP Data, a provider of residential and commercial property information in Australia and New Zealand, for $194 million.
In March 2011, CoreLogic acquired Dorado Network Systems Corp, a San Mateo-CA based cloud application and architecture development company servicing the financial services industry.
In July 2011, the company sold its CoreLogic India operations to Cognizant, for $50 million. As part of the transaction, the companies also announced five year, $324 million services agreement.
In January 2013 CoreLogic bought Middletown, CT-based CDS Business mapping, a provider of geospatial hazard reports including distance to coast, flood zones, rating territories, proximity to brush, wind pool eligibility and earthquake information. CoreLogic reported it would |
https://en.wikipedia.org/wiki/Balkan%20Universities%20Network | The Balkan Universities Network or Balkan Universities Association (BAUNAS) is an association of universities in Southeast Europe. In its present form the body was created after the breakup of the SFR Yugoslavia and the end of the Yugoslav Wars. Association facilitates the regional cooperation in the context of expansion of higher education sector caused by the establishment of new private and public universities (in addition to traditional schools with their existing institutional links).
Association helped in the exchange of experiences in the implementation of the Bologna Process at Balkan universities. The aim of the network is the exchange of know how and experience in research and education, mutual acceptance of certificates, encouragement of professors and students for more mobility between the universities and the use of support programs for student exchange. Besides bilateral meetings, conferences rotating between the member universities take place.
The 2010 conference was organized by the Trakya University in Edirne. Rector Enver Duran Trakya University Edirne (Turkey), President; Dean Hilmi Ibar Trakya University Edirne (Turkey), Vice-President; Rector Faruk Čaklovica University of Sarajevo (Bosnia and Herzegovina), Member; Rector Dhori Kule University of Tirana (Albania), Member; Rector Ioannis P Gerothanassis, University Ioannina (Greece), Member; Rector Anelia Klissarova, Varna Medical University (Bulgaria), Member.
In addition to the bilateral meetings, conferences of the Balkan universities take place at changing member locations. The 2018 meeting took place in the University of Tetovo.
In 2016, the Rector of Trakya University Erhan Tabakoglu in Edirne has taken over the general secretariat of the association.
Since 2018, Enver Duran has been honorary president and Pericles A. Mitkas president of BAUNAS. The new additional goal is to work more closely with the network of Black Sea Universities Network (BSUN).
Members
Guest members
Baku State University
Baden-Wuerttemberg Cooperative State University Loerrach
University of Graz
See also
National Institutes of Technology – 31 leading public engineering universities in India
Further reading
Enver Duran: Challenges of Higher Education Institutions in the Balkans, III Balkan Universities Network Meeting, Trakya Universität Edirne Mai 2010,
Manfred G. Raupp: ''Lörrach Symposium - Lörrach Sempozyumu, Trakya Universität Edirne Mai 2011,
References
College and university associations and consortia in Europe
International college and university associations and consortia |
https://en.wikipedia.org/wiki/VenueGen | VenueGen is a browser-based web conferencing service created and marketed by The Venue Network. It is a 3D virtual meeting software that enables users to interact with each other using avatars. Users can host and attend meetings, conferences, and training with other colleagues and upload rich media into virtual meeting rooms for real-time collaboration.
Technology
Avatars
The avatars in VenueGen are created using a licensed technology developed at the University of Southern California that converts a photo into a 3D model. The realistic photo-generated 3D avatar face features a set of morph targets that convey facial expressions. Facial expressions can be controlled by the user through preset buttons in-world.
Prior to entering a meeting, users can upload images of their own faces to create their photo-realistic avatars and choose from a built-in selection of hairstyles, clothing and accessories to resemble themselves as they are in real life.
During a virtual meeting, avatars make conversational gestures that are automatically driven by a user's own voice. Users also have the option to control the mood, body posture, and nonverbal language of their avatars to communicate as they would in a real meeting. The avatars movements and gestures are intentionally limited to those that would be useful in a meeting.
Venues
VenueGen has over 36 different virtual meeting spaces including a board room, executive office, lecture hall, theater, sailboat, campfire, coffee shop, amphitheater and talk show studio where users can conduct their online meetings, conferences, interviews, or trainings. The largest virtual room can accommodate up to 50 guests. The smallest is suitable for 2 guests.
Audio
Users with a headset and a broadband connection can communicate through VoIP or dial-in from a phone line using one of VenueGen's designated conference phone numbers. Voices of participants are heard in-world through 3D positional sound audio that enables users to locate and identify users speaking around the room.
Integrated Content
Screen sharing and content sharing supports integration of word processing, spreadsheet, presentation and digital media files. Documents used during the meeting are displayed on a viewer within the virtual rooms. The viewer(s) can be viewable by anyone in the meeting, or just one person depending on the venue and viewer chosen. Each viewer may display several forms of content simultaneously, including documents, or streamed feeds such as a webcam or Desktop sharing session.
Virtual Technology
VenueGen is a software as a service (SaaS) that is built on a MMO engine and runs 3D graphics technology. It is a browser-based plug-in that is available as a download once logged on the VenueGen website. The software application runs on Windows XP, Windows Vista, Windows 7, and Mac OS X operating systems and is compatible with browsers Mozilla Firefox 2.0 or above and Microsoft Internet Explorer 6.0 or above.
History
In 2007, VenueGen was fo |
https://en.wikipedia.org/wiki/Ask%20Ubuntu | Ask Ubuntu is a community-driven question and answer website for the Ubuntu operating system. It is part of the Stack Exchange Network, running the same software as Stack Overflow.
Members gain reputation based on the community's response (through voting) to their questions and answers. Reputation signifies trust for users in the answers they give. Privileges are given based on reputation levels, with users with the highest reputation having similar privileges to moderators. All the user-generated content is licensed under a Creative Commons Attribution-ShareAlike license.
The site came out of public beta on 10 October 2010, launching alongside Ubuntu 10.10.
, Ask Ubuntu has about 1.3 million registered users and more than 380,000 questions.
History
Ask Ubuntu came into existence as a "Proposed Q&A site for Ubuntu users and developers" on the Stack Exchange Area 51. With other Internet users supporting the proposal of the site through "commitment", Stack Exchange chose to launch Ask Ubuntu in private beta. Eventually, the site came out of public beta with the name Ask Ubuntu, which was chosen through a community voting process, and was launched alongside Ubuntu 10.10 Maverick Meerkat in October 2010.
Despite the Stack Exchange policy against fragmentation, after deliberation and voting, Ask Ubuntu was allowed to continue alongside a separate 'Linux and Unix' site.
Ask Ubuntu has received help from Canonical Ltd., which has allowed the site to use their trademark. Canonical Ltd has also helped in the designing of the site, ensuring that Ask Ubuntu's theme follows the Ubuntu brand guidelines.
Format
The website allows the users to ask and answer questions. The users are given the ability to vote the questions and answers up or down. They can also earn reputation points and "badges" for their various contributions to the site. For example, a person is rewarded with 10 reputation points if their answer for a question receives an "up" vote.
All users can submit edits to the questions and answers in a wiki style, and their suggested edits go through a peer review process. Users with 2,000 reputation points or more can edit the questions and answers directly, without having their edits go through a similar peer review process. Some posts are designated as "community wiki", which have a lower reputation requirement for editing.
Ask Ubuntu has two sub-sites: a "meta" where users can ask and answer questions about the site itself, and a set of real time chat rooms as part of the Stack Exchange network of sites.
Notes
References
External links
Computing websites
Internet properties established in 2010
Ubuntu
Stack Exchange network
Linux websites
Question-and-answer websites |
https://en.wikipedia.org/wiki/TCA%20Award%20for%20Outstanding%20Achievement%20in%20Youth%20Programming | The TCA Award for Outstanding Achievement in Youth Programming is an award given by the Television Critics Association. Beginning with the 39th ceremony in 2023 the category was split into programming created for children under seven, awarded under "Children's Programming", and programs for older youths, awarded under "Family Programming".
Winners and nominees
See also
Daytime Emmy Award for Outstanding Children's Animated Program
References
External links
Official website
Youth
Children's television awards
Awards established in 1985 |
https://en.wikipedia.org/wiki/VMware%20Carbon%20Black | VMware Carbon Black (formerly Bit9, Bit9 + Carbon Black, and Carbon Black) is a cybersecurity company based in Waltham, Massachusetts. The company develops cloud-native endpoint security software that is designed to detect malicious behavior and to help prevent malicious files from attacking an organization. The company leverages technology known as the Predictive Security Cloud (PSC), a big data and analytics cloud platform that analyzes customers’ unfiltered data for threats.
The company has approximately 100 partners. It has over 5,600 customers including approximately one-third of the Fortune 100.
In October 2019, the company was acquired by VMware.
History
Carbon Black was founded as Bit9 in 2002 by Todd Brennan, Allen Hillery, and John Hanratty. The company's first CEO was George Kassabgi. In 2007, Patrick Morley, the former chief operating officer of Corel, took over as CEO.
In 2013, the company's network was broken into by malicious actors who copied a private signing key for a certificate and used it to sign malware.
In February 2014, Bit9 acquired start-up security firm Carbon Black. At the time of the acquisition, the company also raised $38.25 million in Series E funding, bringing Bit9’s total venture capital raised to approximately $120 million. The company acquired Objective Logistics in June 2015. In August 2015, the company announced that it had acquired data analytics firm Visitrend and would open a technology development center in downtown Boston. A month later, the company announced it would partner with SecureWorks, Ernst & Young, Kroll, Trustwave, and Rapid7 to provide managed security and incident response services.
The company changed its name to Carbon Black on February 1, 2016, after being known as "Bit9 + Carbon Black" for approximately two years.
In July 2016, Carbon Black announced it had acquired next-generation antivirus software provider Confer for an undisclosed sum. Prior to the deal, Confer had raised $25 million in venture funding and had more than 50 employees. According to The Wall Street Journal, the deal was valued at $100 million.
On May 4, 2018, the company joined public markets, listing as "CBLK" on the Nasdaq exchange. As part of its initial public offering (IPO), Carbon Black raised approximately $152 million at a valuation of $1.25 billion. Prior to its IPO, the firm had raised $190M from investors including Kleiner Perkins, Highland Capital, Sequoia, Accomplice, and Blackstone.
In October 2019, the company was acquired by VMware for $2.1 billion.
References
External links
Software companies based in Massachusetts
Companies based in Waltham, Massachusetts
Software companies established in 2002
2002 establishments in Massachusetts
Computer security companies
Computer security software companies
Companies formerly listed on the Nasdaq
2018 initial public offerings
2019 mergers and acquisitions
VMware
Software companies of the United States |
https://en.wikipedia.org/wiki/TCA%20Award%20for%20Outstanding%20Achievement%20in%20News%20and%20Information | The TCA Award for Outstanding Achievement in News and Information is an award given by the Television Critics Association.
Winners and nominees
Networks with multiple wins
PBS - 15
ABC - 6
CNN - 6
HBO - 3
Discovery Channel – 2
ESPN - 2
National Geographic Channel – 2
See also
Peabody Awards
Primetime Emmy Award for Outstanding Documentary or Nonfiction Series
Primetime Emmy Award for Outstanding Documentary or Nonfiction Special
References
External links
Official website
News |
https://en.wikipedia.org/wiki/OpenHMPP | OpenHMPP (HMPP for Hybrid Multicore Parallel Programming) - programming standard for heterogeneous computing. Based on a set of compiler directives, standard is a programming model designed to handle hardware accelerators without the complexity associated with GPU programming. This approach based on directives has been implemented because they enable a loose relationship between an application code and the use of a hardware accelerator (HWA).
Introduction
The OpenHMPP directive-based programming model offers a syntax to offload computations on hardware accelerators and to optimize data movement to/from the hardware memory.
The model is based on works initialized by CAPS (Compiler and Architecture for Embedded and Superscalar Processors), a common project from INRIA, CNRS, the University of Rennes 1 and the INSA of Rennes.
OpenHMPP concept
OpenHMPP is based on the concept of codelets, functions that can be remotely executed on HWAs.
The OpenHMPP codelet concept
A codelet has the following properties:
It is a pure function.
It does not contain static or volatile variable declarations nor refer to any global variables except if these have been declared by a HMPP directive “resident”
It does not contain any function calls with an invisible body (that cannot be inlined). This includes the use of libraries and system functions such as malloc, printf, ...
Every function call must refer to a static pure function (no function pointers).
It does not return any value (void function in C or a subroutine in Fortran).
The number of arguments should be fixed (i.e. it can not be a variadic function as in stdarg.h in C).
It is not recursive.
Its parameters are assumed to be non-aliased (see Aliasing (computing) and Pointer aliasing).
It does not contain callsite directives (i.e. RPC to another codelet) or other HMPP directives.
These properties ensure that a codelet RPC can be remotely executed by a HWA. This RPC and its associated data transfers can be asynchronous.
Codelet RPCs
HMPP provides synchronous and asynchronous RPC. Implementation of asynchronous operation is hardware dependent.
HMPP Memory Model
HMPP considers two address spaces: the host processor one and the HWA memory.
Directives concept
The OpenHMPP directives may be seen as “meta-information” added in the application source code. They are safe meta-information i.e. they do not change the original code behavior. They address the remote execution (RPC) of a function as well as the transfers of data to/from the HWA memory.
The table below introduces the OpenHMPP directives. OpenHMPP directives address different needs: some of them are dedicated to declarations and others are dedicated to the management of the execution.
Concept of set of directives
One of the fundamental points of the HMPP approach is the concept of directives and their associated labels which makes it possible to expose a coherent structure on a whole set of directives disseminated in an application.
The |
https://en.wikipedia.org/wiki/OpenURL%20knowledge%20base | An OpenURL knowledge base is an extensive database containing information about electronic resources such as electronic journals or ebooks and their availability and accessibility. Using the knowledge base, an OpenURL link resolver can determine if an item (article, book etc.) is available electronically and what the appropriate copy for a user is.
The knowledge base helps a library to identify the content they have access to and present it to the users for access. Vendor-maintained knowledge bases seek to offer comprehensive coverage of items that are available to a wider community. As not every institution has access to all content under their individual license agreements the knowledge bases usually offer customization tools to localize its content. Individual institutions can then modify a knowledge base to reflect their local collections, for example, which titles can be accessed electronically by their users; which website provides access to their users; and which resources are owned by the library in print format.
Contents
Information stored include metadata describing individual journals and books, serials title lists available from specific platforms, what years are in the subscription (also called coverage dates) for each title and platform and inbound hyperlink syntax.
Use
The knowledge base is essential in directing the user from a citation to available full text or other services. The link resolver extracts information received in an OpenURL and uses the knowledge base to augment and correct the data and to find services available to this user for this item. If it is available, the knowledge base provides the link resolver with the data needed to create a link to the desired item, ideally to the electronic full text.
OpenURL knowledge bases often have a close relationship with electronic resource management systems (ERMS) as both the link resolver and the ERMS essentially use the same core metadata.
In order for OpenURL linking to be successful in directing users to full text and other services; two components are required. Firstly the OpenURL query must direct the user to the appropriate level of access (be that the article; issue or journal title level for example) using the link server base URL appropriate to the user's institution. Secondly the knowledge base that is queried by the link resolver must reference the appropriate copy of the full text service for that user based on active subscription that their parent institution might hold. This requires the knowledge base to be accurate; up to date; and comprehensive and much time is expended by libraries and link resolver vendors in ensuring the knowledge base satisfies this goal. Both of the above components must be accurate in order to allow end users to discover and access the electronic services they require. This in turn leads to more successful linking to full text which can increase content usage which benefits the whole supply chain for electronic content.
Challeng |
https://en.wikipedia.org/wiki/ATLAS-TIM%20AT%2032 | The ATLAS-TIM AT 32 was the process computer developed by Mihajlo Pupin Institute in Belgrade in the 1980s. The designers were Dr Vukasin Masnikosa, Dr Bozidar Levi, Mr Milenko Nikolic and their associates. Professor Bozidar Levi with 2 coauthors got the Nikola Tesla award for his ATLAS design in 1988.
The SCADA (Supervisory, Control And Data Acquisition) software systems, such as SCADA VIEW 6000 and SCADA VIEW2, were used in many Serbian Hydro and Termal Power plants. The SCADA hardware developed and manufactured in the M. Pupin Institute includes ATLAS AT 32 (with Intel 386 microprocessors and VLSI circuitry), ATLAS MAX PLC (Intel 486), ATLAS MTU, Programmable controllers TIMKO), Atlas-2000, ATLAS XP, ATLAS-NANO, pico-ATLAS modular RTU devices etc.
References
External links
Technical description
Computing by computer model
Mihajlo Pupin Institute
Serbian inventions |
https://en.wikipedia.org/wiki/AbuseHelper | AbuseHelper is an open-source project initiated by the computer emergency response teams (CERTs) of Finland and Estonia with ClarifiedNetworks to automatically process incidents notifications.
This tool is being developed for CERTs and Internet Service Providers (ISPs) to help them in their daily job of following and treating a wide range of high-volume information sources. The framework can also be used for automatically processing (standardized) information from a wide range of sources.
Context
CERTs and ISPs have to handle a very high-volume of notifications (E-mail spam, Botnets, ...). These notifications are often normalized per feed (each feed typically uses different formats to report). There is also a lot of information about Internet abuse, available by different feed providers (Zone-H Zone-H, DShield Dshield, Zeus Tracker Zeus (Trojan horse) ...). This information is not well utilized, as the amount of information is too big for manual processing. AbuseHelper follows a number of sources and produces actionable reports and dashboard for the people that need to treat all these notifications. AbuseHelper also automates the enriching of information, such as finding the owners of reported IP addresses from public databases (such as Whois).
History
Technical developments that led to collaborative effort on solving the automated collection of Abuse Information
2005 CERT-FI Autoreporter gen1, implemented with Perl
2006-2007 CERT-FI Autoreporter generations 2&3 (incremental updates to gen1). Plans to rewrite
2008-2009 CERT-FI Autoreporter gen4, proof-of-concept implementation using sh. Paper describing the prototype won the joint FIRST.org & CERT/CC contest for the best practices and advances in safeguarding the security of computer systems and networks in 2009
2009 CERT-FI gen5, implemented with Python. Full rewrite
2009-10 Clarified Networks & CERT-EE Abusehelper collaboration starts
2009-11 CERT-FI joins.
2010-01 AbuseHelper first public release
2010-01 First training @ TF-CSIRT event in Germany
2010-03 CERT.BE (Belgium) / BELNET CERT joined.
2011-07 CERT.IS (Iceland) joined
Architecture
AbuseHelper is written in Python and developed relying on XMPP protocol (not mandatory) and agents. The base principle is to control agents via a central chat room where all bots are listening. Agents are exchanging information in subrooms. AbuseHelper relies on a modular approach to workflows and attempts to be scalable by keeping every agent simple.
Sources
The goal of AbuseHelper is to handle a large panel of sources and try to extract useful information to follow-up on events. Currently, AbuseHelper is able to parse the following types of sources:
email containing an ARF attachment (Abuse Report Format) (like CleanMX or abusix or cyscon's C-SIRT);
email with a CSV (could be zipped) attachment or an URL to a CSV file (like ShadowServer) ;
IRC events (live feed);
XMPP events (live feed);
DShield events.
The community is working on |
https://en.wikipedia.org/wiki/GIFBuilder | GIFBuilder was an early animated GIF creation program for Apple Macintosh computers. It was written by Yves Piguet and released as freeware. It is one of the few freeware applications to support the GIF format.
GIFBuilder was released in 1996 and that year won the Ziff Davis Shareware Award in the Graphics and Multimedia category. GIFBuilder was developed from clip2gif, an earlier program by the same author, which was an Apple Event-based CGI script for generating GIF images on WebSTAR and other Macintosh web servers of the era.
It was ported to Mac OS X using the Carbon (API) library, but has not been updated to function with OS X version after Lion.
See also
Microsoft GIF Animator
References
External links
Home page
Download link
Graphics software
Macintosh-only software
Discontinued software
1996 software |
https://en.wikipedia.org/wiki/Volunteers%20in%20Medicine | Volunteers in Medicine (VIM) is national nonprofit dedicated to building a network of free primary health care clinics for the uninsured and medically underserved.
Mission
The organization's stated mission is "To promote and guide the development of a national network of free clinics emphasizing the use of retired medical and community volunteers within a culture of caring to improve access to health care for America’s underserved, particularly the uninsured."
History
For two decades, the Volunteers in Medicine national office assisted local communities and built a national network of free health care clinics to care for the uninsured and medically underserved. This network is known as the VIM Alliance. Volunteers in Medicine has withstood many changes in the health care landscape. Recognizing that free clinics continue to hold a distinctive place in the health care safety net, in 2018 the national office made a strategic decision to expand the VIM Alliance to include established free clinics that are aligned with the VIM Model. Established clinics that join the VIM Alliance are referred to as expansion sites.
Expert VIM national office staff provide individualized assistance to developing free clinics and established sites that wish to join the VIM Alliance. For both groups, the emphasis is on upholding the VIM Model. Developing sites receive guidance through each phase of the clinic development process, from the initial feasibility study through the opening of the clinic. Expansion sites that are aligned with the VIM Model receive assistance and educational resources to assist them in attaining VIM Alliance membership status.
VIM Alliance
The VIM Alliance is a national network of free clinics that provide health care services to the uninsured and medically underserved. This peer-to-peer network links clinic leaders and provides access to information related to all aspects of clinic operations.
Further reading
Volunteers in Medicine: A Culture of Caring by Kristine Wyer
Authentic Patriotism by Stephen Kiernan
Circle of Caring: The Story of the Volunteers in Medicine Clinic by Jack B. McConnell, M.D.
References
External links
Volunteers In Medicine Website
VIM Clinic Directory
Non-profit organizations based in Vermont
Organizations based in Burlington, Vermont
Medical volunteerism |
https://en.wikipedia.org/wiki/Moms%20I%27d%20Like%20to%20Forget | "Moms I'd Like to Forget" is the tenth episode of the twenty-second season of the American animated television series The Simpsons. It originally aired on the Fox network in the United States on January 9, 2011. In the episode, Marge reveals that she used to be in a group called "The Cool Moms" and decides to reconnect with the group. It was directed by Chris Clements and written by Brian Kelley.
"Moms I'd Like to Forget" received mixed reviews from critics and acquired a Nielsen rating of 6.9. The name of this episode also plays on the acronym MILF.
Plot
The episode opens with a dodge ball match between the 4th and 5th graders. Bart ends up hitting the last 5th grader, but he catches it after it comes back down, making the 5th graders win the match. In the days that follow, the 4th and 5th graders commit acts of war against each other, even dragging the teachers into it when a 5th grade teacher insults Edna Krabappel's class and it sparks a mass teacher brawl in the faculty room (in reference to a scene in the 1973 film Westworld). Eventually it gets to the point that they organize a fight after school. Before the fight begins, however, Bart realizes that one of the 5th graders has the same scar as he does, in the shape of a sword on his fist.
Bart confronts Marge about the scar. Marge explains that when he was in preschool, he was in a "Mommy and Me" class with three other kids. Marge became very close with the other mothers, and they became "the Cool Moms." However, the other kids were a bad influence on Bart. But she does not explain the scar. Marge then decides to get back together with her old group.
Marge's old friends reconcile while Bart gets together with the other kids, where he realizes he still does not know where the scar came from. Marge and her friends decide to get together every Tuesday. Meeting with the other kids every week, their antics become more and more dangerous, so Bart decides to break up the group. Knowing they broke up before, Bart realizes it must have something to do with the scar and consults Dr. Hibbert, who suggests he ask Comic Book Guy.
Comic Book Guy is reluctant to explain but, after some coercion, he reveals what happened: About seven years ago, on the 4th of July, he was in charge of the fireworks. While Marge and the other moms talked, Bart and the boys stumbled off towards the fireworks controls and pressed all the buttons, setting off all the fireworks. In the fiery explosion that followed, Comic Book Guy's sandwich was hit by a firework, sending the burning hot, sword-shaped skewers onto the boys' fists, branding them.
Knowing it was an explosion that split the group apart, Bart and Milhouse create a big ball of firecrackers to break them up again. When Marge catches them in the act, Bart confesses. That evening, Marge tells the group of Bart's scheme to break them up, and they tell her Bart was always a bad influence to their kids. Marge becomes angry and leaves the group in a rage. After Marge' |
https://en.wikipedia.org/wiki/Dorothea%20Austin | Dorothea Austin Banner (1921 – 25 June 2011) was an Austrian-born American pianist and composer who specialized in electronic and computer generated music.
Biography
Austin was born Dorothea Blaukopf into a Jewish family in Vienna, Austria. As a child, she was already performing as a concert pianist. She fled to England before World War II on the last Kindertransport sponsored by the Red Cross. Her brother Viktor and her parents died during the war.
In England she worked at a factory for a while to support herself, but was eventually taken in by Quaker philanthropists Nelly and Rachel Leighton. She studied piano at the Royal College of Music and the Royal Academy of Music with Tobias Matthay in London, and afterward worked as a concert pianist.
She married Dr. Hermann Augapfel (Harry Austin), who was held during the war in a British camp for foreigners from enemy countries. She began serving as a piano teacher at that time, and continued this work after the couple emigrated to the United States in 1949. The Austins settled in Valley Stream, Long Island, where they lived until Harry Austin died in 1974.
As her performing career had been interrupted by the war, Austin attended Queens College (CUNY) in New York City, where she studied composition with Leo Kraft and George Perle. She developed an interest in electronic forms and composition with synthesizer, working successfully as a composer. Austin took a position as professor at Queensborough Community College, where she remained for nearly forty years, also serving as department chair. Austin was a member of the New York Women Composers Association.
After the death of Harry Austin, she married Gerson Banner, who died in 2004. Austin had three daughters. Her papers are stored at Queensborough Community College Library.
Selected works
Transformation for viola, piano and tape (1973)
Fantasia for piano and orchestra (1984)
Syndetos for piano (1984)
Analogy for viola, cello and piano (1985)
Metamorphosis for cello and piano (1986)
Reflections I
Reflections II for high voice, flute (piccolo), oboe (English horn), clarinet, horn and bassoon; words by Stephen Crane
Notes
References
External links
Dorothea Austin Banner obituary with photograph
1921 births
2011 deaths
20th-century classical composers
21st-century classical composers
American women classical pianists
American classical pianists
American women classical composers
American classical composers
Austrian classical composers
Austrian classical pianists
Jewish American classical composers
21st-century American composers
20th-century classical pianists
Queensborough Community College faculty
People from Valley Stream, New York
20th-century American women pianists
20th-century American pianists
20th-century American composers
21st-century American women pianists
21st-century American pianists
20th-century women composers
21st-century women composers
Austrian emigrants to the United States
21st-century American Jews |
https://en.wikipedia.org/wiki/Little%20Star%20%28TV%20series%29 | Little Star is a Philippine television drama musical series broadcast by GMA Network. Directed by Maryo J. de los Reyes, it stars Nicki Castro in the title role, Jennylyn Mercado, Mark Anthony Fernandez, Lovi Poe and Paolo Contis. It premiered on October 25, 2010 on the network's Haponalo line up replacing Trudis Liit. The series concluded on February 11, 2011 with a total of 80 episodes. It was replaced by Nita Negrita in its timeslot.
Cast and characters
Main cast
Jennylyn Mercado as Helen Estrella
Mark Anthony Fernandez as Dave de Leon
Lovi Poe as Gwyneth Cordova
Paolo Contis as Lester Lumibao
Nicky Castro as Niño Estrella
Recurring cast
Sarah Lahbati as Paula Estrella
Divina Valencia as Madame Divina de Leon
Nina Kodaka as Aurora Wang
Jiro Manio as Joross
Allan Paule as Gener Estrella
Maricel Morales as Ruby
Chinggay Riego as Angge
Rich Asuncion as Bianca Valerio
Shamaine Buencamino as Cecilla "Cecile" Cordova
Orlando Sol as Borgs
Hershey de Guzman as Rachel
Mymy Davao as Madame Elle
Miggs Cuaderno as Niño
Ratings
According to AGB Nielsen Philippines' Mega Manila People/Individual television ratings, the pilot episode of Little Star earned a 5.6% rating. While the final episode scored a 7.7% rating.
Accolades
References
External links
2010 Philippine television series debuts
2011 Philippine television series endings
Filipino-language television shows
GMA Network drama series
Television series by TAPE Inc.
Television shows set in the Philippines |
https://en.wikipedia.org/wiki/List%20of%20ceremonial%20counties%20in%20England%20by%20gross%20value%20added | This is a list of ceremonial counties in England by gross value added for the year 2013. Data is gathered by the Office for National Statistics (ONS) and is given in terms of Nomenclature of Territorial Units for Statistics (NUTS), statistical area codes used for the European Union, which loosely follow administrative units of the United Kingdom.
Gross value added (GVA) is a measure of the value of goods and services produced in a localized area without considering taxes and subsidies (unlike gross domestic product (GDP)). Additionally, the ONS's estimates on GVA adapt to regional disparities in commuting regions by allocating the GVA to the area in which an employee commuted from. They also use five-period moving averages to smooth data.
Table
See also
List of UK cities by GVA
List of ceremonial counties of England
Notes
Sources
Economies by county in England |
https://en.wikipedia.org/wiki/Regular%20semi-algebraic%20system | In computer algebra, a regular semi-algebraic system is a particular kind of triangular system of multivariate polynomials over a real closed field.
Introduction
Regular chains and triangular decompositions are fundamental and well-developed tools for describing the complex solutions of polynomial systems. The notion of a regular semi-algebraic system is an adaptation of the concept of a regular chain focusing on solutions of the real analogue: semi-algebraic systems.
Any semi-algebraic system can be decomposed into finitely many regular semi-algebraic systems such that a point (with real coordinates) is a solution of if and only if it is a solution of one of the systems .
Formal definition
Let be a regular chain of for some ordering of the variables and a real closed field . Let and designate respectively the variables of that are free and algebraic with respect to . Let be finite such that each polynomial in is regular with respect to the saturated ideal of . Define . Let be a quantifier-free formula of involving only the variables of . We say that is a regular semi-algebraic system if the following three conditions hold.
defines a non-empty open semi-algebraic set of ,
the regular system specializes well at every point of ,
at each point of , the specialized system has at least one real zero.
The zero set of , denoted by , is defined as the set of points such that is true and , for all and all . Observe that has dimension in the affine space .
See also
Real algebraic geometry
References
Equations
Algebra
Polynomials
Algebraic geometry
Computer algebra |
https://en.wikipedia.org/wiki/Wagner%E2%80%93Fischer%20algorithm | In computer science, the Wagner–Fischer algorithm is a dynamic programming algorithm that computes the edit distance between two strings of characters.
History
The Wagner–Fischer algorithm has a history of multiple invention. Navarro lists the following inventors of it, with date of publication, and acknowledges that the list is incomplete:
Vintsyuk, 1968
Needleman and Wunsch, 1970
Sankoff, 1972
Sellers, 1974
Wagner and Fischer, 1974
Lowrance and Wagner, 1975
Calculating distance
The Wagner–Fischer algorithm computes edit distance based on the observation that if we reserve a matrix to hold the edit distances between all prefixes of the first string and all prefixes of the second, then we can compute the values in the matrix by flood filling the matrix, and thus find the distance between the two full strings as the last value computed.
A straightforward implementation, as pseudocode for a function Distance that takes two strings, s of length m, and t of length n, and returns the Levenshtein distance between them, looks as follows. The input strings are one-indexed, while the matrix d is zero-indexed, and [i..k] is a closed range.
function Distance(char s[1..m], char t[1..n]):
// for all i and j, d[i,j] will hold the distance between
// the first i characters of s and the first j characters of t
// note that d has (m+1)*(n+1) values
declare int d[0..m, 0..n]
set each element in d to zero
// source prefixes can be transformed into empty string by
// dropping all characters
for i from 1 to m:
d[i, 0] := i
// target prefixes can be reached from empty source prefix
// by inserting every character
for j from 1 to n:
d[0, j] := j
for j from 1 to n:
for i from 1 to m:
if s[i] = t[j]:
substitutionCost := 0
else:
substitutionCost := 1
d[i, j] := minimum(d[i-1, j] + 1, // deletion
d[i, j-1] + 1, // insertion
d[i-1, j-1] + substitutionCost) // substitution
return d[m, n]
Two examples of the resulting matrix (hovering over an underlined number reveals the operation performed to get that number):
The invariant maintained throughout the algorithm is that we can transform the initial segment s[1..i] into t[1..j] using a minimum of d[i,j] operations. At the end, the bottom-right element of the array contains the answer.
Proof of correctness
As mentioned earlier, the invariant is that we can transform the initial segment s[1..i] into t[1..j] using a minimum of d[i,j] operations. This invariant holds since:
It is initially true on row and column 0 because s[1..i] can be transformed into the empty string t[1..0] by simply dropping all i characters. Similarly, we can transform s[1..0] to t[1..j] by simply adding all j characters.
If s[i] = t[j], and we can transform s[1..i-1] to t[1..j-1] in k operations, then we can do the same to s[1..i] and just lea |
https://en.wikipedia.org/wiki/RubySpec | The RubySpec project aimed to write a complete executable specification for the Ruby programming language. This project contains specs that describe Ruby language syntax and standard library classes. The project contains two main components:
the RubySpec sources
the MSpec framework
The RubySpec test suite captured most of 1.8.6/1.8.7/1.9 behavior as a reference conformance tool. Ruby MRI 1.9.2 passed over 99% of RubySpec, while version 2.2.0 crashed on one of the tests.
History
The RubySpec tests were initially created in 2006 for the Rubinius project, with significant contribution from the JRuby project. It is now used in other Ruby implementation projects such as IronRuby.
The RubySpec project was discontinued at the end of 2014 due to a lack of uptake from mainstream ruby developers.
It was later revived by Benoit Daloze as "The Ruby Spec Suite", and is as of 2023-08-15 actively maintained at https://github.com/ruby/spec.
References
Free software programmed in Ruby
Ruby (programming language) |
https://en.wikipedia.org/wiki/Evercookie | Evercookie (also known as supercookie) is a JavaScript application programming interface (API) that identifies and reproduces intentionally deleted cookies on the clients' browser storage. It was created by Samy Kamkar in 2010 to demonstrate the possible infiltration from the websites that use respawning. Websites that have adopted this mechanism can identify users even if they attempt to delete the previously stored cookies.
In 2013, Edward Snowden leaked a top-secret NSA document that showed Evercookie can track Tor (anonymity networks) users. Many popular companies use functionality similar to Evercookie to collect user information and track users. Further research on fingerprinting and search engines also draws inspiration from Evercookie's ability to track a user persistently.
Background
There are three commonly used data storages, including HTTP cookies, flash cookies, HTML5 Storage, and others. When the user visits a website for the first time, the web server may generate a unique identifier and store it on the user's browser or local space. The website can read and identify the user in its future visits with the stored identifier, and the website can save user's preferences and display marketing advertisements. Due to privacy concerns, all major browsers include mechanisms for deleting and/or refusing cookies from websites.
In response to the users' increased unwillingness to accept cookies, many websites employ methods to circumvent users' deletion of cookies. Started from 2009, many research teams found popular websites used flash cookies, ETags, and various other data storage to rebuild the deleted cookies by users, including hulu.com, foxnews.com, spotify.com, etc. In 2010, Samy Kamkar, a Californian programmer, built an Evercookie project to further illustrate the tracking mechanism with respawning across various storage mechanisms on browsers.
Description
Evercookie allows website authors to be able to identify users even after said users have attempted to delete cookies. Samy Kamkar released v0.4 beta of the evercookie on September 13, 2010, as an open source project. Evercookie is capable of respawning deleted HTTP cookies by storing the cookies on multiple different storage systems typically exposed by web browsers. When a browser visits a website with the Evercookie API on its server, the web server can generate an identifier and store it on various storage mechanisms available on that browser. If the user removes some but not all of the stored identifiers on the browser and revisits the website, the web server retrieves the identifier from storage areas that the user failed to delete. Then the web server will copy and restore this identifier to the previously cleared storage areas.
By abusing the various available storage mechanisms, Evercookie creates persistent data identifiers, because users are not likely to clear all storing mechanisms. From the list provided by Samy Kamkar, 17 storage mechanisms could be used for th |
https://en.wikipedia.org/wiki/Triangular%20decomposition | In computer algebra, a triangular decomposition of a polynomial system is a set of simpler polynomial systems such that a point is a solution of if and only if it is a solution of one of the systems .
When the purpose is to describe the solution set of in the algebraic closure of its coefficient field, those simpler systems are regular chains. If the coefficients of the polynomial systems are real numbers, then the real solutions of can be obtained by a triangular decomposition into regular semi-algebraic systems. In both cases, each of these simpler systems has a triangular shape and remarkable properties, which justifies the terminology.
History
The Characteristic Set Method is the first factorization-free algorithm, which was proposed for decomposing an algebraic variety into equidimensional components. Moreover, the Author, Wen-Tsun Wu, realized an implementation of this method and reported experimental data in his 1987 pioneer article titled "A zero structure theorem for polynomial equations solving". To put this work into context, let us recall what was the common idea of an algebraic set decomposition at the time this article was written.
Let be an algebraically closed field and be a subfield of . A subset is an (affine) algebraic variety over if there exists a polynomial set such that the zero set of equals .
Recall that is said irreducible if for all algebraic varieties the relation implies either or . A first algebraic variety decomposition result is the famous Lasker–Noether theorem which implies the following.
Theorem (Lasker - Noether). For each algebraic variety there exist finitely many irreducible algebraic varieties such that we have
Moreover, if holds for then the set is unique and forms the irreducible decomposition of .
The varieties in the above Theorem are called the irreducible components of and can be regarded as a natural output for a decomposition algorithm, or, in other words, for an algorithm solving a system of equations in .
In order to lead to a computer program, this algorithm specification should prescribe how irreducible components are represented. Such an encoding is introduced by Joseph Ritt through the following result.
Theorem (Ritt). If is a non-empty and irreducible variety then one can compute a reduced triangular set contained in the ideal generated by in and such that all polynomials in reduces to zero by pseudo-division w.r.t .
We call the set in Ritt's Theorem a Ritt characteristic set of the ideal . Please refer to regular chain for the notion of a triangular set.
Joseph Ritt described a method for solving polynomial systems based on polynomial factorization over field extensions and computation of characteristic sets of prime ideals.
Deriving a practical implementation of this method, however, was and remains a difficult problem. In the 1980s, when the Characteristic set Method was introduced, polynomial factorization was an active research area |
https://en.wikipedia.org/wiki/ISO/IEC%2019794-5 | ISO/IEC 19794 Information technology—Biometric data interchange formats—Part 5: Face image data, or ISO/IEC 19794-5 for short, is the fifth of 8 parts of the ISO/IEC standard ISO/IEC 19794, published in 2005, which describes interchange formats for several types of biometric data. ISO/IEC 19794-5 defines specifically a standard scheme for codifying data describing human faces within a CBEFF-compliant data structure, for use in facial recognition systems. Modern biometric passport photos should comply with this standard. Many organizations and have already started enforcing its directives, and several software applications have been created to automatically test compliance to the specifications.
The standard is intended to allow computer analysis of face images for automated face identification and authentication, as well as human identification of distinctive facial features and human verification of computer identification results.
References
External links
ISO/IEC 19794-5 preview
ISO/IEC 19794
Biometrics |
https://en.wikipedia.org/wiki/Limited%20resources | Limited resources may refer to:
Non-renewable resources
Scarcity
Embedded systems, computing devices resource availability
Poverty |
https://en.wikipedia.org/wiki/Mount%20Blunt | Mount Blunt () is a rounded ice-covered mountain (1,500 m) rising from the west flank of Weyerhaeuser Glacier, on the east side of Antarctic Peninsula.
Based on peakery data, it ranks as the 1697th highest mountain in Antarctica.
The mountain was photographed from the air by the United States Antarctic Service (USAS) on September 28, 1940. It was roughly surveyed by Falkland Islands Dependencies Survey (FIDS) in December 1958, and resurveyed in November 1960.
It was named by the United Kingdom Antarctic Place-Names Committee (UK-APC) after Edmund Blunt (1770–1862), American publisher of charts and sailing directions, whose establishment was acquired by U.S. Government to form the nucleus of the U.S. Hydrographic Office (since 1972, the Defense Mapping Agency Hydrographic Center).
See also
Eisner Peak
References
Mountains of Graham Land
Bowman Coast |
https://en.wikipedia.org/wiki/Amazon%20Relational%20Database%20Service | Amazon Relational Database Service (or Amazon RDS) is a distributed relational database service by Amazon Web Services (AWS). It is a web service running "in the cloud" designed to simplify the setup, operation, and scaling of a relational database for use in applications. Administration processes like patching the database software, backing up databases and enabling point-in-time recovery are managed automatically. Scaling storage and compute resources can be performed by a single API call to the AWS control plane on-demand. AWS does not offer an SSH connection to the underlying virtual machine as part of the managed service.
History
Amazon RDS was first released on 22 October 2009, supporting MySQL databases. This was followed by support for Oracle Database in June 2011, Microsoft SQL Server in May 2012, PostgreSQL in November 2013, and MariaDB (a fork of MySQL) in October 2015, and an additional 80 features during 2017.
In November 2014 AWS announced Amazon Aurora, a MySQL-compatible database offering enhanced high availability and performance, and in October 2017 a PostgreSQL-compatible database offering was launched.
In March 2019 AWS announced support of PostgreSQL 11 in RDS, five months after official release.
Features
New database instances can be launched from the AWS Management Console or using the Amazon RDS APIs. Amazon RDS offers different features to support different use cases. Some of the major features are:
Multi-Availability Zone (AZ) deployment
In May 2010 Amazon announced Multi-Availability Zone deployment support. Amazon RDS Multi-Availability Zone (AZ) allows users to automatically provision and maintain a synchronous physical or logical "standby" replica, depending on database engine, in a different Availability Zone (independent infrastructure in a physically separate location). Multi-AZ database instance can be developed at creation time or modified to run as a Multi-AZ deployment later. Multi-AZ deployments aim to provide enhanced availability and data durability for MySQL, MariaDB, Oracle, PostgreSQL and SQL Server instances and are targeted for production environments. In the event of planned database maintenance or unplanned service disruption, Amazon RDS automatically fails over to the up-to-date standby, allowing database operations to resume without administrative intervention.
Multi-AZ RDS instances are optional and have a cost associated with them. When creating a RDS instance, the user is asked if they would like to use a Multi-AZ RDS instance. In Multi-AZ RDS deployments backups are done in the standby instance so I/O activity is not suspended any time but users may experience elevated latencies for a few minutes during backups.
Read replicas
Read replicas allow different use cases such as to scale in for read-heavy database workloads. There are up to five replicas available for MySQL, MariaDB, and PostgreSQL. Instances use the native, asynchronous replication functionality of their respective database e |
https://en.wikipedia.org/wiki/Comwave | Comwave Networks Inc. is a Canadian company that markets telecommunication services. Actual telecommunication services are provided by third party carriers. Based in the Toronto district of North York and run by president and CEO, Yuval Barzakay, Comwave was established in 1999 and it serves all of Canada. Wholesale services are also provided in the United States.
Services
Telephone
Comwave offers phone, Internet & TV services to both business and residential customers.
Predating Apple's iPhone, beginning in 2004, Comwave offered a bundle of hardware and services, sold as an alternative to traditional phone service known as the iPhone. They no longer offer this service under the iPhone name.
In May 2012, Comwave launched its Hosted PBX platform. Comwave Hosted PBX is a cloud-based phone system for business that bundles together Polycom telephones, phone lines, over 40 business-class features, long-distance and a private digital secure connection, for a fixed monthly fee. Comwave Hosted PBX phone systems are managed by Comwave 24x7 on a secure private connection.
In September 2012, the company launched the app for Android (now available on iOS as well). This VoIP Softphone app helps users avoid roaming and long-distance fees by providing a free alternate telephone number in the North American market of their choice.
Internet
In April 2013, Comwave launched high-speed internet services across Canada. Their plans are all-inclusive and includes a modem, dry loop, and in-home installation.
Comwave offers a variety of different internet packages ranging from 30 Mbps - 1000 Mbps.
Television
On September 25, 2017, Comwave Networks announced that the company will enter the television market by announcing their new service named Comwave TV.
Legal issues
Misleading advertising
On September 13, 2016, Comwave Networks was fined $300,000 by the Competition Bureau for misleading advertisements.
The Bureau concluded that Comwave's advertisements misrepresented the charges consumers would face for their services, and that the advertised prices were not attainable because of additional non‑optional fees.
The Competition Bureau had determined that despite Comwave marketing their Voice over IP (VoIP) home phone services and high speed internet services as unlimited, Comwave had applied a monthly minute cap onto their VoIP home phone service, as well as a monthly Bandwidth cap onto all tiers of their internet service regardless; per Comwave's Fair Usage Policy for Internet.
The Bureau has also concluded that while this information was being disclosed in their fine print, and that Comwave's staff had been instructed to provide some of this information to customers when they call into their call centre, it was not sufficient enough to prevent the advertisements from being misleading.
Under a consent agreement filed between The Commissioner of Competition and Comwave Networks, Comwave had agreed to pay $60,000 towards the cost of the Bureau's investigati |
https://en.wikipedia.org/wiki/HMG%20Infosec%20Standard%20No.1 | HMG Information Assurance Standard No.1, usually abbreviated to IS1, was a security standard applied to government computer systems in the UK.
The standard was used to assess – and suggest responses to – technical risks to the confidentiality, integrity and availability of government information.
The modelling technique used in the standard was an adaptation of Domain Based Security.
In confidentiality terms, IS1 did not apply to information which was not protectively marked, but it may still have been used to assess risks to the integrity and availability of such information.
The UK Cabinet Office Security Policy Framework requires that all ICT systems that manage government information or that are interconnected to them are assessed to identify technical risks. IS1 was the standard method for doing this and was mandated by previous versions of the Security Policy Framework, but other methods may now be used.
The results of an IS1 assessment, and the responses to risks, were recorded using HMG Information Assurance Standard No.2, usually abbreviated to IS2, which concerned risk management and was relevant to the accreditation of government computer systems.
CESG provided IS1 risk assessment tools.
Example
An HMG IS2 Full Accreditation Statement based on an HMG IS1 ITSHC (IT Security Health Check) by Deloitte and subsequent remediation by Recipero of its interface between Recipero's NMPR and the UK government's PNC, which are systems used to track mobile devices for law enforcement purposes was posted publicly. A public HMG IS2 Full Accreditation Statement based on an actual ITSHC (by Deloitte in this case) puts the auditor's reputation on the line, in a way that a confidential statement does not.
See also
Cyber Essentials
Information assurance
Joint Services Publication 440
Infosec Standard 5
References
Classified information in the United Kingdom
Computer security in the United Kingdom
Information assurance standards
IT risk management |
https://en.wikipedia.org/wiki/Hawkboard | The Hawkboard is a low-power, low-cost Single-board computer based on the Texas Instruments OMAP-L138. Along with the usage of the OMAP ARM9 processor, it also has a floating point DSP. It is a community supported development platform.
As of date, Hawkboard project is closed because of common hardware issue.
External links
An Open community portal for Texas Instruments AM1808 / OMAPL138 platform — hawkboard.org
References
Embedded systems |
https://en.wikipedia.org/wiki/Joaquim%20Jorge%20%28footballer%29 | Joaquim António Jorge (born 18 February 1939 in Maputo) is a former Portuguese footballer who played as a defender.
External links
Data at World Football
1939 births
Living people
Footballers from Maputo
Portuguese men's footballers
Portugal men's international footballers
Mozambican men's footballers
Mozambican emigrants to Portugal
Portuguese people of Mozambican descent
Men's association football defenders
Primeira Liga players
FC Porto players
Vitória S.C. players |
https://en.wikipedia.org/wiki/Erkki%20Oja | Erkki Oja (born 22 March 1948) is a Finnish computer scientist and Aalto Distinguished Professor in the Department of Information and Computer Science at Aalto University School of Science. He is recognized for developing Oja's rule, which is a model of how neurons in the brain or in artificial neural networks learn over time.
Early life and education
Oja was born in Helsinki and studied at Helsinki University of Technology, where he received his diploma engineer in 1972, licentiate in technology in 1975 and Doctor of Technology in 1977.
Career
Oja was a research associate at the Center for Cognitive Science at Brown University between 1977 and 1978 and a research fellow at the Academy of Finland from 1976 to 1981. Since 1981, he took up a professorship in applied mathematics at Kuopio University (now University of Eastern Finland). He was a visiting research scholar at Tokyo Institute of Technology from 1983 to 1984. From 1987 to 1993, he was a professor in computer science at the Lappeenranta University of Technology. He moved back to the Helsinki University of Technology (now Aalto University) from 1993 as a professor in computer science. He retired in 2015.
Honors and awards
Oja is a Fellow of the International Association for Pattern Recognition and the IEEE, and a member of the Finnish Academy of Sciences. He served as chairman of the European Neural Network Society between 2000 and 2005, and as the chairman of the Academy of Finland’s Research Council for Natural Sciences and Engineering between 2007 and 2012. He was awarded the Frank Rosenblatt Award for his contributions to artificial intelligence research in 2019.
Oja was a member of the Board of Governors for the International Neural Network Society (INNIS) in 2003. He received honorary doctorates from Uppsala University and Lappeenranta University of Technology in 2008.
Bibliography
References
1948 births
Living people
Aalto University alumni
Academic staff of Aalto University
Academic staff of Lappeenranta University of Technology
Academic staff of the University of Eastern Finland
Brown University people
Fellow Members of the IEEE
Fellows of the International Association for Pattern Recognition
Finnish computer scientists
Machine learning researchers
Members of the Finnish Academy of Science and Letters |
https://en.wikipedia.org/wiki/Isyvmon | isyVmon was a computer system and network monitoring software application system created by iT-CUBE SYSTEMS. It was designed to monitor and track the status of various applications, network services, servers, and other network hardware.
Overview
isyVmon was based on the Open Source Software Nagios and Centreon licensed under the GNU GPL V3.
Special features:
monitoring hosts, networks, applications & business processes
ready-to-run distribution
real-time exploitation and management frontends
Web2.0 GUI, dashboards, alerting, databases, reporting, administration
prebuilt content inclusive templates and plugins
extended status-map
integration of extensions
scalability through single or distributed deployment
encrypted communication between core and satellites
freeware edition is limited up to ten hosts
virtual and hardware appliance, vmware ready
History
2013
no further development
2012 (isyVmon v3.0)
isyVmon „Full Discovery (ANH)“ (Freeware / Enterprise Edition)
Enhancements of isyVmon „Simple Discovery (ADI)“ (Freeware / Enterprise Edition)
More than 300 Bugs fixed in the isyVmon Monitoring GUI (Freeware / Enterprise Edition)
Simplified Setup for ESX(i) Monitoring (Freeware / Enterprise Edition)
Improvements of the isyVmon worker (Freeware / Enterprise Edition)
Improvements of the Commandline API (Freeware / Enterprise Edition)
Simplified getting Support for isyVmon (Freeware / Enterprise Edition)
Tactical Overview - Dashboard improvements (Freeware / Enterprise Edition)
Scheduled periodic downtimes available (Freeware / Enterprise Edition)
Secure LDAP (TLS) support (Freeware / Enterprise Edition)
2011 (isyVmon v2.4)
Auto Discovery (ADI) (also available in Freeware Edition)
Advanced Notification (ANO) released (Enterprise Edition only)
Extended Status Map (ESM) v3.0 (also available in Freeware Edition)
Android/iPhone APP turns from "technical preview" to "beta" state
2011 (isyVmon v2.2)
introduced connection for splunk ( www.splunk.com) and isyVmon
introduced several new features you asked for (SMS, license GUI, Satellite GUI, and many more)
many enhancements in usability and functionality based on customer projects.
focus on even more scalability and stability.
participated vmware ready process.
2010 (isyVmon v2.0)
isyVmon's first world open public release.
complete new product website with community based support (KB, Forum, Downloads, ...)
introduced isyVmon Standalone as a freeware edition.
major focus on scalability and stability.
integration of many enhancements from customer projects.
based on complete new development framework.
2009 (isyVmon v1.5 - v1.6)
isyVmon's first official release.
increased development and big steps in the integration of features based on customer needs.
partnership with merethis - the company behind centreon.
opened distributed monitoring for the public version |
https://en.wikipedia.org/wiki/Zoho%20Corporation | Zoho Corporation, is an Indian multinational technology company that makes computer software and web-based business tools. It is best known for the online office suite offering Zoho Office Suite. The company was founded in 1996 by Sridhar Vembu and Tony Thomas and has a presence in seven locations with global headquarters in Chennai, Tamil Nadu, India, and corporate headquarters outside of Austin in Del Valle, Texas. Radha Vembu, Sridhar Vembu's sister, owns a majority stake in the company.
History
From 1996 to 2009, the company was known as AdventNet, Inc. and initially provided network management software.
AdventNet expanded operations into Japan in 2001 and shifted focus to small and medium businesses (SMBs).
Zoho CRM was released in 2005, along with Zoho Writer, the company's first Office suite product. Zoho Projects, Creator, Sheet, and Show were released in 2006. Zoho expanded into the collaboration space with the release of Zoho Docs and Zoho Meeting in 2007. In 2008, the company added invoicing and mail applications, reaching one million users by August of that year.
In 2009, the company was renamed Zoho Corporation after its online office suite. The company remains privately owned.
In 2017, Zoho launched Zoho One, a comprehensive suite of over forty applications. As of October 2021, Zoho One has been expanded to 50 applications. The following year, in November 2022, Zoho worked with more than 50,000 organizations in more than 160 countries.
Zoho reached more than 50 million customers in January 2020. In July 2022, the company announced it had more than 80 million users.
Zoholics India is the name of the company's annual user conference.
Other products include Zoho Books, an accounting software, Zoho Workplace, an enterprise collaboration platform, Zoho Survey, a customer experience management tool, and Zoho People, an HR management platform.
In March of 2023, Zoho collaborated with Payoneer, a financial technology company that assists with businesses to make transactions easier. In April, Zoho also announced a new collaboration platform called Trident that helps users communicate across different channels via email, messages, audio/video calls, etc.
Locations
Zoho is headquartered in Chennai, India. As of 2021, it has 12 offices operating in nine countries around the world. The company operates in China and also has offices in Singapore and Japan. The bulk of its support operations are carried out from its office in Chennai. Zoho also has an office in Renigunta, Andhra Pradesh and has been operating from this office since 2018.
Its US headquarters was in Pleasanton, California until it was moved to Del Valle, Texas in 2019. In April 2019, Zoho purchased the land outside of Austin that was intended for their new headquarters. Instead, in February 2020, they built an organic farm as a food source and place for rest and recreation for its employees during the COVID-19 pandemic. There, employees work out of existing structures. U |
https://en.wikipedia.org/wiki/Umar%20Saif | Umar Saif (; born 1979) is a Pakistani computer scientist and academic. He is the founder and CEO of aiSight.ai (formerly SurveyAuto Inc.) , Chief Digital Officer of the Jang Group and CEO of Khudi Ventures (Pakistan's largest Venture Builder). He is currently serving as interim Federal Minister For Science and Technology, as well as Minister of IT. He is also serving as an advisor to the United Nations Development Programme in Pakistan.
After studying computer science at the Lahore University of Management Sciences (LUMS), Saif received his doctorate from the University of Cambridge at the age of 22. He then moved to the Massachusetts Institute of Technology where he did his postdoc. He returned to Pakistan in 2005 and joined LUMS where he taught as an associate professor of computer science between 2006 and 2013.
In 2011, Saif was appointed as chairman of the Punjab Information Technology Board (PITB) and also became a cabinet member in Government of Punjab. During his tenure as a chair of the PITB between 2011 and 2018, he founded Pakistan's first technology incubator, Plan 9 and carried out more than 300 projects. Simultaneously, he served as the founding vice-chancellor of the Information Technology University from 2013 to 2018.
For his research, entrepreneurial ventures, and for being the brains behind digital governance of Punjab and one of the main driving forces behind the IT ecosystem in the country, he was awarded numerous notable awards and titles such as Young Global Leader by the World Economic Forum, Google's Faculty Research Award, Sitara-i-Imtiaz, UNESCO Chair for using ICT for Development, and was named as one of the top 35 young innovators in the world by the MIT Technology Review (TR35). He was named among The 500 Most Influential Muslims consecutively between 2015 and 2023.
Education
Saif attended Aitchison College before enrolling at Lahore University of Management Sciences where he obtained a Bachelor of Science degree in computer science in 1998. He received a doctor of philosophy degree in computer science from the University of Cambridge at the age of 22 in 2001. In 2002 he did his postdoc at MIT, also in computer science. From 2001 to 2005 he taught at MIT and worked at the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) as a research scientist, becoming part of the team which developed Project Oxygen.
Career
Upon returning to Pakistan in 2005, Saif joined LUMS where he worked as an associate professor of computer sciences between 2006 and 2013. He became one of the youngest tenured professors at LUMS in 2009. While teaching full-time, Saif carried out several research projects.
In 2010 Saif was named as Young Global Leader by the World Economic Forum. In 2011 he was placed on MIT's TR35 list, naming him as one of the world's top 35 young innovators for developing a bittorrent client, BitMate, and a text message-based social network, SMSall. The same year he became the first Pakistani to recei |
https://en.wikipedia.org/wiki/Dragons%20et%20Princesses | Dragons et Princesses (French for "Dragons and Princesses") is a 2010 French computer animation television program written, storyboarded and directed by Michel Ocelot and produced at Studio O for Canal+. It is a fairy tale anthology series of ten further 13-minute episodes in the format established in Ciné si, though made in computer animation rendered in a silhouette instead of traditional silhouette animation made with backlit cut-outs. Five of the episodes are edited, with a feature-exclusive sixth, into the 2011 stereoscopic compilation movie Tales of the Night.
Production
The series, which Ocelot also voice acted in, co-produced, art directed and designed, returns to the format of short silhouette animation fairy tales established by 1989's Ciné si and continued in 1992's Tales of the Night to produce further stories originally conceived for the then-unsuccessful Ciné si, episodes of which have since enjoyed popularity in the form of the compilation movie Princes and Princesses.
At least as early as September 2006, when Azur & Asmar: The Princes' Quest was previewing in France, Ocelot was mentioning in interviews that he was planning to return to silhouettes and the anthology format with a project then planned to be titled Bergères et Dragons ("Shepherdesses and dragons") and released in 2008 but wavered on whether it would it take the format of a feature film or television series and if it would consist of a combination of existing and new or all-new footage (the title suggests the inclusion of the "Bergère qui danse" segment of the earlier Tales of the Night). Instead, 2008 saw the inclusion of these earlier silhouette films in the Les Trésors cachés de Michel Ocelot short film collection and the new project, set back by production of several others, was announced in June 2010 as taking its eventual form of both a television series of ten new silhouette films and a new Tales of the Night for movie theaters drawn from it.
Dragons also notably sees him return to working with once-regular composer Christian Maire, who had last scored Ciné si for him two decades ago, and is the first production animated by his own Studio O in Paris, which previously had covered only pre-production for projects animated at larger animation studios. A total of over 300 characters and 800 sets were designed for the project, which was animated by a team of five in Autodesk Maya.
Release
At least two of the episodes had pre-television premieres, with "L'Élue de la Ville d'or" ("The Electress of the City of Gold") screening at the Festival international de cinéma d'animation de Meknès in May 2010 and "Le Garçon qui ne mentait jamais" ("The Boy Who Never Lied") in competition for the Cristal for best TV production at the Annecy International Animation Film Festival in June, for which it lost to Studio Soi's Der Kleine und das Biest (The Little Boy and the Beast) but was instead given a special award for a television series. The series then began its run on the |
https://en.wikipedia.org/wiki/Scale-invariant%20feature%20operator | In the fields of computer vision and image analysis, the scale-invariant feature operator (or SFOP) is an algorithm to detect local features in images. The algorithm was published by Förstner et al. in 2009.
Algorithm
The scale-invariant feature operator (SFOP) is based on two theoretical concepts:
spiral model
feature operator
Desired properties of keypoint detectors:
Invariance and repeatability for object recognition
Accuracy to support camera calibration
Interpretability: Especially corners and circles, should be part of the detected keypoints (see figure).
As few control parameters as possible with clear semantics
Complementarity to known detectors
scale-invariant corner/circle detector.
Theory
Maximize the weight
Maximize the weight = 1/variance of a point
comprising:
1. the image model
2. the smaller eigenvalue of the structure tensor
Reduce the search space
Reduce the 5-dimensional search space by
linking the differentiation scale to the integration scale
solving for the optimal using the model
and determining the parameters from three angles, e. g.
pre-selection possible:
Filter potential keypoints
non-maxima suppression over scale, space and angle
thresholding the isotropy :eigenvalues characterize the shape of the keypoint, smallest eigenvalue has to be larger than threshold derived from noise variance and significance level :
Algorithm
Results
Interpretability of SFOP keypoints
See also
Corner detection
Feature detection (computer vision)
References
External links
Project website at University of Bonn
Applications of computer vision
Learning in computer vision |
https://en.wikipedia.org/wiki/Care%20Bears%3A%20The%20Giving%20Festival | Care Bears: The Giving Festival is a 2010 Canadian-American computer-animated fantasy film starring the Care Bears characters. It was made by SD Entertainment and released on DVD by Lionsgate on November 2, 2010. In the film, the Care Power Team—which includes Funshine Bear, Cheer Bear and Share Bear—organizes their annual Giving Festival, and must rescue a princess named Starglo from impending weather.
Release
The DVD of The Giving Festival features an episode of the CBS series, Adventures in Care-a-lot, containing the stories "Belly Blanked" and "All Give and No Take".
Reception
As of November 2010, the film has received mixed reviews. C.S. Strowbridge of The Numbers, a box-office tracking website, said that it "is exactly what you would expect from the Care Bears. It's not exactly a feature-length film, and it feels a little episodic, but it is bright and full of adventure." Writing for DVD Talk, Paul Mavis gave it one star out of five. Deeming it "Dishonest right from the get-go", he also said, "When I want a Care Bears Christmas movie ... and I do ... I want it to actually be about Christmas, not some wishy-washy P.C. 'Giving Festival' euphemism."
See also
List of American films of 2010
List of computer-animated films
References
External links
Care Bears: The Giving Festival at starz.com
2010 direct-to-video films
2010 films
American children's animated fantasy films
Canadian children's animated films
American computer-animated films
Canadian computer-animated films
American direct-to-video films
Canadian direct-to-video films
Animated films based on animated series
American Christmas films
Canadian Christmas films
Care Bears films
Direct-to-video animated films
Direct-to-video sequel films
Lionsgate films
Lionsgate animated films
2010 computer-animated films
2010s American animated films
2010s Canadian animated films
Films directed by Davis Doi
2010s children's animated films
2010s English-language films |
https://en.wikipedia.org/wiki/Rolf%20Skoglund | Rolf Fredrik Skoglund (11 August 1940 – 28 June 2022) was a Swedish actor. He won the Eugene O'Neill Award in 2007.
References
External links
Rolf Skoglund on Swedish Film Database
Rolf Skoglund, Dramaten
1940 births
2022 deaths
Swedish stage actors
Male actors from Stockholm
Eugene O'Neill Award winners
20th-century Swedish male actors
21st-century Swedish male actors |
https://en.wikipedia.org/wiki/Barry-Roubaix | Barry-Roubaix is a classic-style road/off-road cycling race featuring a variety of terrain and surfaces to test cyclists of all skill levels. Named to the Global Cycling Network's Top Five Gravel Events and Nine Coolest Races of 2018, the event is known as the World's Largest Gravel Road Race.
The course is located in Barry County, Michigan near the Gun Lake Unit of Yankee Springs Recreation Area. Most years, Barry-Roubaix consists of rolling gravel roads (80%), pavement, one mile of rough two-track, rocks, sand, mud, and possibly snow and ice, along with 2200 feet of climbing. The race features three distinct levels of competition corresponding to different race course distances. The Beginner/Intermediate riders complete a 22-mile course, the Expert riders complete a 36-mile course, and the Elite/Pro riders complete a 62-mile course. The name "Barry-Roubaix" was selected in a naming competition; it is a reference to the famous spring classic Paris–Roubaix one day professional cycling race held in France. Barry-Roubaix is held annually on the third Saturday in March unless Easter happens to fall on that weekend. Participants use a variety of bicycle types (cyclocross, mountain, road, fat), depending on course conditions and individual preferences.
Results
Summary Results Table
History
2009
Started in 2009, Barry-Roubaix's inaugural event staging took place at the historic Long Lake Outdoor Center, in Middleville, Michigan, a Barry County, Michigan community. On March 28, the 274 racers were treated to perfect conditions; cool and sunny weather prevailed.
2010
For 2010, the race start/finish location moved to the Gun Lake beach area at Yankee Springs Recreation Area to accommodate the anticipated growth in attendance. On race day (March 27), the Sheriff escorted the 673 racers through a controlled, neutral roll out of 2.5 miles. Racers faced sunny but cold conditions; the temperature at the time of the race start was only degrees, while a biting wind blew out of the southeast.
2011
The 2011 edition was held on March 26, in very cold conditions. Over 1000 participants started the race, but only 896 finished; 114 racers completed the 65 mile course (male winner: Erik Box, female winner: Samantha Brode); 564 racers completed the 35 mile course (male winner: Don Cameron; female winner: Kathy Everts); and 218 racers completed the 23 mile course (male winner: Trevor Smela; female winner: Sherry Martin).
2012
In 2012, Barry-Roubaix: Killer Gravel Road Race served as the second of five events in the American UltraCx Championship Series (stages ranging from 80 to 115 km). In the weeks leading up to the race, kolo t.c. riders previewed the course, sharing elevation profiles and tips for succeeding on challenging course sections including the Eye of the Tiger climb, Sager Road, and the Three Sisters.
2013
Consistent with the increase in popularity of gravel road racing (also known as 'Gravel Grinders') in the United States, the 2013 event was move |
https://en.wikipedia.org/wiki/CBS%20Cares | CBS Cares is a television public service announcement (PSA) campaign that usually feature performers from CBS Television Network programming. The PSAs have addressed numerous causes, including an array of health issues affecting a large portion of their target audience. Each year, close to 200 million Americans see one or more of the CBS Cares campaigns.
Special broadcasts
In 2006, CBS Cares partnered with the Nelson Mandela Foundation to produce the first-ever Tolerance PSAs in which Nelson Mandela, in his own words, addressed the U.S. audience. According to the foundation, Mr. Mandela chose CBS Cares for the strength of its messaging. These Nelson Mandela messages continue to air on CBS and have been seen in 82 countries around the world.
CBS Cares has produced campaigns to celebrate Black History Month, Asian Pacific American Heritage Month, Hispanic Heritage Month, and Native American Heritage Month.
CBS Cares has also worked with the NAACP in developing PSAs to mark its 100th Anniversary. Additionally, it worked with the Martin Luther King Jr. Memorial Trust on PSAs to raise funds for the Martin Luther King Jr. Memorial in Washington, D.C.. CBS Cares annually marks the Martin Luther King Jr. holiday with PSAs featuring Congressman John Lewis, who marched with Dr. King.
CBS Cares annually marks Memorial Day and Veterans Day with special PSAs honoring American military veterans. Another set of PSAs honors the victims of the Nazi Holocaust. These run annually on International Holocaust Remembrance Day.
CBS Cares has marked the holiday season with special messages on important health issues. This humorous campaign promoted giving gifts of prostate exams and pap smears to loved ones. It was ranked 17th by the TV Guide Channel on its 2010 show, 25 Most Hilarious Holiday TV Moments.
Relief efforts
When major natural disasters have struck, CBS Cares has often partnered with the American Red Cross to develop multimedia PSAs featuring numerous CBS talent to raise funds for disaster relief. Most recently, CBS Cares released several PSAs discussing how to help the victims of Hurricane Sandy and the Oklahoma Tornado. Viewers were urged to help those affected by donating $10 to the American Red Cross Disaster Relief via text message.
Health issues
CBS Cares also undertook a project on depression. The fulcrum of this campaign were PSAs and an in-depth interview with 60 Minutes icon Mike Wallace on his personal struggle and triumph over depression. The depression campaign was followed by a series of PSAs on bipolar disorder, featuring NCIS star Mark Harmon.
CBS Cares also addressed the issue of postpartum depression in a series of PSAs featuring Cold Case star Kathryn Morris. A PSA was also created in Spanish and featured co-star Danny Pino. Postpartum Support International credited the CBS Cares campaign as one of the major factors in boosting awareness and helping women’s health advocates place postpartum on the national agenda.
CBS Cares discuss |
https://en.wikipedia.org/wiki/TNN%20Motor%20Sports | TNN Motor Sports was a sports programming block on The Nashville Network from the network's launch in 1983 to 2000. TNN Motor Sports specialized in coverage of motorsports of various formats, most commonly auto racing. From 2000 to 2003, the network expanded its offerings to include alternative professional football and rebranded the block as TNN Sports. The block shut down in TNN's 2003 rebranding as Spike TV.
History
TNN Motor Sports began when the network itself launched in 1983. During that time, TNN started airing a motor sports and auto racing themed program during the racing season known as American Sports Cavalcade. American Sports Cavalcade was produced by a production company called Diamond P Sports. On the very first episode, the sport of swamp buggy racing from Naples, Florida, was featured. Diamond P produced all of TNN's motor sports coverage through 1992. Then, in 1993, TNN began working with World Sports Enterprises to produce their NASCAR coverage, and Group 5 Sports to produce their coverage of the ASA. Diamond P would continue to produce most of the rest of their motor sports coverage.
TNN had a self-operating and self-promoting sub-division called TNN Motor Sports, and aired races produced by that division from 1991 to 2000. Under the TNN Motor Sports umbrella, NASCAR series races (including those of the then-Winston Cup Series and Busch Grand National Series, as well as the Craftsman Truck Series) were the most prominently featured, but other racing organizations, such as IRL, IMSA and SCCA sports car series, ASA stock car series, USAC and World of Outlaws sprint car series, the NHRA drag racing series, AMA supercross and superbikes, and monster truck racing and truck and tractor pulling from TNT Motorsports were also showcased. From 1991–2001, TNN aired the RaceDay magazine show on Sunday mornings, anchored first by Pat Patterson and later by Rick Benjamin.
In 1995, the motorsports operations were moved into the industrial park located at Charlotte Motor Speedway in Concord, North Carolina, where TNN had purchased a controlling interest in World Sports Enterprises, a motorsports production company, from WSE's founder Ken Squier.
Also by 1995, Westinghouse Electric Corporation, who at the time owned the CBS networks and had an existing relationship with TNN through its Group W division, purchased TNN and its sister network CMT outright to form CBS Cable, along with a short-lived startup network entitled Eye On People. TNN's ties to CBS allowed it to carry CBS Sports' run overs, which happened during a NASCAR Busch Series race at Texas Motor Speedway in 1999; the 1998 Pepsi 400 was also moved to TNN when the race was postponed from the then-traditional July date to October 17, 1998, as a result of the 1998 Florida wildfires. Other motorsports events during this era were broadcast under the banner of Motor Madness.
Starting in 2000, the name changed from TNN Motor Sports to TNN Sports when the network started airing games |
https://en.wikipedia.org/wiki/Article%2029%20Data%20Protection%20Working%20Party | The Article 29 Working Party (Art. 29 WP), in full the Working Party on the Protection of Individuals with regard to the Processing of Personal Data, was an independent European Union advisory body on data protection and privacy. It was made up of a representative from the data protection authority of each EU Member State, the European Data Protection Supervisor and the European Commission.
The composition and purpose of Art. 29 WP was set out in Article 29 of the Data Protection Directive (Directive 95/46/EC), and it was launched in 1996. It was replaced by the European Data Protection Board (EDPB) on 25 May 2018 in accordance with the EU General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679).
Its main stated missions were to:
provide expert advice to the States regarding data protection;
promote the consistent application of the Data Protection Directive in all EU state members, as well as Norway, Liechtenstein and Iceland;
give to the Commission an opinion on community laws (first pillar) affecting the right to protection of personal data; and
make recommendations to the public on matters relating to the protection of persons with regard to the processing of personal data and privacy in the European Community.
The Working Party elected a chairman and two vice-chairmen, each with a two-year term of office. Their term of office was renewable only once. The Working Party's secretariat was provided by the European Commission.
The European Commission also hosts a website with documents adopted by the Art. 29 WP, press released from their plenary meetings, and other relevant information, such as on standard contractual clauses.
See also
Right to be forgotten
EU–US Privacy Shield
References
External links
Art.29 Data Protection Working Party
European Union page regarding Data Protection
European Data Protection Supervisor
Data protection authorities
European Union law
1996 establishments in Europe |
https://en.wikipedia.org/wiki/List%20of%20Top%20Gear%20Australia%20episodes | The following is a complete episode list of the television series Top Gear Australia since its launch in 2008 on SBS One, and its subsequent move to the Nine Network in 2010. As of 13 September 2011, there have been 23 episodes spanning 4 seasons, as well as 1 promotional special, and the final episode of 4th season is currently not shown, because of the cancellation of the show. The show was presented by Steve Pizzati, Shane Jacobson, Ewen Page and The Stig. Pizzati was the only host to make the move from SBS to Nine, with Jacobson & Page replacing Warren Brown & James Morrison. Motorcycling commentator Charlie Cox presented in series 1.
Series overview
Episodes
Series 1 (2008)
Series 2 (2009)
Series 3 (2010)
Series 4 (2011–12)
External links
Top Gear Australia |
https://en.wikipedia.org/wiki/Sesame%20Street%20research | In 1969, the children's television show Sesame Street premiered on the National Educational Television network (later succeeded by PBS) in the United States. Unlike earlier children's programming, the show's producers used research and over 1,000 studies and experiments to create the show and test its impact on its young viewers' learning. By the end of the program's first season, Children's Television Workshop (CTW), the organization founded to oversee Sesame Street production, had developed what came to be called "the CTW model": a system of planning, production, and evaluation that combined the expertise of researchers and early childhood educators with that of the program's writers, producers, and directors.
CTW conducted research in two ways: in-house formative research that informed and improved production, and independent summative evaluations conducted by the Educational Testing Service (ETS) during the show's first two seasons to measure the program's educational effectiveness. CTW researchers invented tools to measure young viewers' attention to the program. Based on these findings, the researchers compiled a body of data and the producers changed the show accordingly.
Summative research conducted over the years, including two landmark evaluations in 1970 and 1971, demonstrated that viewing the program had positive effects on young viewers' learning, school readiness, and social skills. Subsequent studies have replicated these findings, such as the effect of the show in countries outside of the U.S., several longitudinal studies, the effects of war and natural disasters on young children, and studies about how the show affected viewers' cognition. CTW researcher Gerald S. Lesser stated in 1974 that early tests conducted on the show (both formative and summative) "suggested that Sesame Street was making strides towards teaching what it had set out to teach".
Background and development
According to author Louise A. Gikow, Sesame Street's use of research to create individual episodes and to test its effect on its young viewers set it apart from other children's programs Co-creator Joan Ganz Cooney called the idea of combining research with television production "positively heretical" because it had never been done before. Before Sesame Street, most television shows aimed at children were locally produced, with hosts who, according to researchers Edward L. Palmer and Shalom M. Fisch, "represented the scope and vision of a single individual" and were often condescending to their audience. Scriptwriters of these shows had no training in education or child development.
The Carnegie Corporation, one of Sesame Street's first financial backers, hired Cooney, a producer of educational talk shows and documentaries with little experience in education, during the summer of 1967 to visit experts in child development, education, and media across the U.S. and Canada. She researched their ideas about the viewing habits of young children, and wrote a |
https://en.wikipedia.org/wiki/Tutuban%20station | Tutuban station (also known as Manila station or Divisoria station) is the central railway terminus of the Philippine National Railways (PNR) network located in the city of Manila, Philippines.
The name refers to two stations: the original Tutuban station, which today forms part of Tutuban Center, and the PNR Executive Building, which houses PNR offices.
History
Tutuban station was built as part of the "Ferrocarril de Manila-Dagupan" or the Manila-Dagupan Line, which constitutes much of the North Main Line today. The cornerstone of the main station building at Tutuban was laid on July 31, 1887. The railway was long at the time of its opening on November 24, 1892, running from Manila to Dagupan in Pangasinan. The Manila Railroad Company (MRR) was renamed Philippine National Railways (PNR) under Republic Act No. 4156 enacted after World War II.
In 1988, PNR evaluated the possibility of renting of land to Tutuban at C.M. Recto Avenue in response to the challenges of development and help promote the site to be the center of trade. PNR implemented the first part of the master development plan of Tutuban Properties, Inc. in 1991, and later entrusted the management and development of the land. The Tutuban Center Mall was formally inaugurated to the public led by President Fidel V. Ramos on February 21, 1994.
The following years have witnessed the continued efforts among PNR, Tutuban Properties, Inc., and the Philippine Government to advance the methods of travel by reorganizing the overall railroad system, improve the civic and business buildings around the Tutuban, and keep the emphasis on history. The development of PNR Plaza is a step to verify the cause of reactivating the overall railroad system as one method of travel and trading.
The Tutuban Station Executive Building was inaugurated on May 30, 1996.
Tutuban station will be renovated to become more transit-oriented and a newer station will be built for the North–South Commuter Railway while the 1996 station will serve only the Manila-Legazpi long-haul intercity services if revived. According to a presentation by JICA in 2019, the old station building nicknamed the "Heritage Building" will be once more included in a transit-oriented mixed-use zone. Therefore, the Tutuban Center Mall that sits in the area of the station will be removed. It will also connect to the LRT Line 2 for ease of transferring between lines.
Gallery
See also
Paco station
References
External links
Coordinates
Philippine National Railways stations
Railway stations in Metro Manila
Railway stations opened in 1892
Buildings and structures in Tondo, Manila
Spanish colonial infrastructure in the Philippines |
https://en.wikipedia.org/wiki/Sleaford%20Joint%20Sixth%20Form | Sleaford Joint Sixth Form is a partnership in Sleaford, England, between Carre's Grammar School and St George's Academy. It has a specialism in Mathematics, Science and Computing.
The Sixth Form was amalgamated in 1983 for students from Sleaford's three secondary schools. At the time it was a partnership between Grammar and comprehensive schools. It was considered to be highly advantageous to all the schools concerned and was featured as a Case Study in a book considering how best to improve schools.
Until 2010 the Joint Sixth Form was inclusive of all Sleaford Secondary Schools: Carre's Grammar School, St George's Academy (formerly St Georges College of Technology) and Kesteven and Sleaford High School. However, before the beginning of the 2010–11 academic year, Kesteven and Sleaford High School left the partnership.
Kesteven and Sleaford High School ceased to take new sixth form students from the Joint Sixth Form from September 2010. Existing students were taught to the end of their courses in June 2011. The other two schools have continued to operate the Joint Sixth Form. The break-up was and remains controversial with the parties disputing responsibility for the decision. A local paper stated that the High School had decided to go its own way, quoting the headteachers from the other two schools, and this is the reason still cited on the Carre's Grammar School website. Conversely, Kesteven and Sleaford High School blamed the fact that St George's had become an academy, which therefore made it impossible for the two schools to operate under a formal and legal agreement together. In February 2015, the Kesteven school expressed its intention to join the Robert Carre Trust along with Carre's which then came into place 1 September 2015. Although the Girl's High School is part of this trust it still operates on its own site, having its own staff, students and facilities.
References
Sixth form colleges in Lincolnshire
Sleaford |
https://en.wikipedia.org/wiki/PMPC%20Star%20Awards%20for%20Television | PMPC Star Awards for Television is an annual award-giving body recognizing the outstanding programming produced by the several TV networks in the Philippines.
It was founded by the Philippine Movie Press Club, an organization of tabloid reporters, in 1987.
The PMPC Star Awards for Television is generally held in October (1987–2004, 2006, 2016, 2018–2019 and 2021), November (2007–2014 and 2017) and/or December (2005 and 2015). But due to the awarding event skips the 4th quarter of a previous year, It is held in January 2023. They are seen in rotation among the television channels such as ABS-CBN 2 (1988–1989 and 2009–2019), TV5 (2008), RPN 9 (1987, 2000–2004 and 2006–2007), IBC 13 (1990–1999 and 2005) and STV (2021).
Ceremonies
Categories
Programming
Best Children Show (not given in 2005 and 2016-2017)
Best Educational Program (not given in 1998)
Best Lifestyle Show (since 2001)
Best Travel Show (since 2006)
Best Morning Show (since 1999)
Best Public Affairs Program
Best Magazine Show
Best Documentary Program
Best Public Service Program (not given in 1998)
Best News Program
Best Talent Search Program (since 2004; not given in 2018) [or Best Talent Show since 1987 to early 1990s]
Best Comedy Show
Best Celebrity Talk Show
Best Variety Show (not given in 2015)
Best Musical Variety Show
Best Drama Series [a single category] (1987–2003, 2012)
Best Primetime Drama Series (2004–2011, 2013 to present)
Best Daytime Drama Series (2004–2011, 2013 to present)
Best Drama Mini-Series (1992, 1998, 2000-2002, 2009–2011, 2015)
Best Drama Anthology (since 1992)
Best Horror / Fantasy Program (2000-2013, 2017 to present)
Performing
List of PMPC Star Awards for TV's Multi-Award Winning Performers & Personalities
Best Travel Show Host (since 2006)
Best Children Show Host (not given in 2005, 2016 and 2017)
Best Educational Program Host (not given in 1998)
Best Lifestyle Show Host (since 2001)
Best Morning Show Host (since 1999)
Best Public Service Program Host (not given in 1998)
Best Public Affairs Program Host
Best Magazine Show Host
Best Documentary Program Host
Best Talent Search Program Host (since 2004) [or Best Talent Show Host since 1987 to early 1990s]
Best Celebrity Talk Show Host
Best Male TV Host
Best Female TV Host
Best Male Newscaster
Best Female Newscaster
Best Comedy Actor
Best Comedy Actress
Best Drama Actor
Best Drama Actress
Best Drama Supporting Actor (Since 2013)
Best Drama Supporting Actress (Since 2013)
Best Child Performer (Since 2012)
Best Single Performance by an Actor
Best Single Performance by an Actress
Best New TV Personality {a single category} (1987-1999, not given in 1988 which is "Most Promising TV Personality" a special award and 1989)
Best New Male TV Personality(2000 to present)
Best New Female TV Personality(2000 to present)
Merged Categories
Best Educational & Children Program (2012)
Best Reality & Game Show (2012)
Best Lifestyle & Travel Show (2012)
Best Educational & Children Program Host (2012)
Best Reality & Game Show |
https://en.wikipedia.org/wiki/Cyberwarfare%20by%20China | Cyberwarfare by China is the aggregate of all combative activities in the cyberspace which are taken by organs of the People's Republic of China, including affiliated advanced persistent threat groups, against other countries.
Organization
While some details remain unconfirmed, it is understood that China organizes its resources as follows:
“Specialized military network warfare forces” () - Military units specialized in network attack and defense.
"PLA - authorized forces” () - network warfare specialists in the Ministry of State Security (MSS) and the Ministry of Public Security (MPS).
“Non-governmental forces” () - civilian and semi-civilian groups that spontaneously engage in network attack and defense.
In 2017, Foreign Policy provided an estimated range for China's "hacker army" personnel, anywhere from 50,000 to 100,000 individuals.
In response to claims that Chinese universities, businesses, and politicians have been subject to cyber espionage by the United States National Security Agency since 2009, the PLA announced a cyber security squad in May 2011 to defend their own networks.
Accusations of espionage and cyber-attacks
Australia
In May 2013, ABC News claimed that China stole blueprints to the headquarters of the Australian Security Intelligence Organisation.
Canada
Officials in the Canadian government claimed that Chinese hackers compromised several departments within the federal government in early 2011, though the Chinese government has denied involvement. In 2014, Canada's Chief Information Officer claimed that Chinese hackers compromised computer systems within the National Research Council.
India
Officials in the Indian government believe that attacks on Indian government networks, such as the attack on the Indian National Security Council, have originated from China. According to the Indian government, Chinese hackers are experts in operating botnets, of which were used in these attacks. Additionally, other instances of Chinese cyberattacks against India's cyberspace have been reported in multitude.
Japan
In April 2021 Japan claimed that the Chinese military ordered cyberattacks on about 200 Japanese companies and research institutes, including JAXA.
United States
The United States of America has accused China of cyberwarfare attacks that targeted the networks of important American military, commercial, research, and industrial organizations. A Congressional advisory group has declared China "the single greatest risk to the security of American technologies" and "there has been a marked increase in cyber intrusions originating in China and targeting U.S. government and defense-related computer systems".
In January 2010, Google reported targeted attacks on its corporate infrastructure originating from China "that resulted in the theft of intellectual property from Google." Gmail accounts belonging to two human rights activists were compromised in an attack on Google's password system. American security experts con |
https://en.wikipedia.org/wiki/Biological%20Computer%20Laboratory | The Biological Computer Laboratory (BCL) was a research institute of the Department of Electrical Engineering at the University of Illinois Urbana-Champaign. It was founded on 1 January 1958, by then Professor of Electrical Engineering Heinz von Foerster. He was head of BCL until his retirement in 1975.
The focus of research at BCL was systems theory and specifically the area of self-organizing systems, bionics, and bio-inspired computing; that is, analyzing, formalizing, and implementing biological processes using computers. BCL was inspired by the ideas of Warren McCulloch and the Macy Conferences, as well as many other thinkers in the field of cybernetics.
In the first decade of its existence, BCL was primarily a non-teaching research lab. Although students could work at BCL, they were not trained.
Until 1965, many researchers had a visiting professorship at BCL: W. William Ainsworth (England), Alex Andrew (England), W. Ross Ashby (England), Gordon Pask (England), Gotthard Günther (USA, Germany), Dan Cohen (Israel), Lars Löfgren (Sweden), Humberto Maturana (Chile), Francisco Varela (Chile), Ernst von Glasersfeld (Austria), Stafford Beer (England), John C. Lilly (USA). Ashby (since 1961) and Günther (since 1967) received regular professorships, and Löfgren and Pask remained in constant contact with BCL even after their visiting professorship.
BCL was financed primarily by grants. This came in part from military organizations such as U.S. Air Force and U.S. Navy which, in the 1950s and 60s, possessed large budgets for basic research. Non-military donors included the Department of Health, Education and Welfare, Public Health Service, National Institutes of Health, National Science Foundation, Wenner-Gren Foundation for Anthropological Research in New York, National Aeronautics and Space Administration, Electronics Research Center, Boston, Massachusetts Office of Education, Bureau of Research, Washington, DC and the Point Foundation in San Francisco, California. With the beginning of the 1970s, military research funding became limited to projects that provided militarily useful results, and von Foerster was unable to identify adequate sponsors. In 1974, the BCL was closed due to lack of research funds.
Sources
Albert Mueller, A brief history of the BCL. In: Austrian Journal of History. 11 (1), 2000, pp. 9–30.
Bernard Scott, Heinz von Foerster obituary, The Independent, 25 October 2002.
Heinz von Foerster, Understanding systems: Conversations on epistemology and ethics, Springer, 2002.
Books
Albert Muller, Karl Muller (eds), An Unfinished Revolution?: Heinz von Foerster and the Biological Computer Laboratory / BCL 1958–1976, Edition Echoraum, 2007.
External links
BCL homepage
Heinz von Foerster Homepage
The End of the BCL (PDF 478 kB)
University of Illinois Urbana-Champaign centers and institutes
1958 establishments in Illinois
1974 disestablishments in Illinois |
https://en.wikipedia.org/wiki/Teresa%20Rampazzi | Teresa Rampazzi née Teresa Rossi (31 October 191416 December 2001) was an Italian pianist and composer who was a pioneer of electronic and computer generated music.
Biography
Teresa Rampazzi was born in Vicenza, Italy, and studied piano as a child, then continued her studies at the Milan Conservatory and graduated with a diploma in piano in 1933. During these conservatory years, she met Severino Gazzelloni, René Leibowitz, Franco Donatoni who became close friends. She married and lived for a while in Vicenza until 1948, Venice until 1959, and Verona. In 1955 she moved with her husband to Padua where she became a member of the Trio Bartók and the Circolo Pozzetto music ensembles.
Rampazzi developed an interest in avant-garde music and attended the Ferienkurse Darmstadt during the 1950s where she heard a frequency generator for the first time in her life, introduced by Herbert Eimert. In February 1959 John Cage arrived in Padova (during one of his first journeys in Italy) and Teresa Rampazzi gave a concert with him and with Heinz-Klaus Metzger and Sylvano Bussotti. They played Music for Piano, Winter Music, Variations I & II, Music Walk.
Later she sold her piano and with Ennio Chiggio formed the NPS Group (Nuove Proposte Sonore), an experimental collective to research sound generation with analogue devices. (Her husband bought back the piano.) She continued to work with Chiggio until 1968, and continue her activity with the NPS group until 1972 when she took a teaching position in 1972 as professor of electronic music at the Padova Conservatory (one of the first electronic music courses in Italy), where she continued to work on tone research and to publish professional articles on electronic music. She worked internationally at the Institute of Sonology in Utrecht, at Catholic University in Washington, at the electromusic studio in Stockholm, at the department of computer music at the University of Pisa and at the CSC Computer Music Center in Padova.
After her husband died in 1983, Rampazzi moved to Assisi and then to Bassano, where she continued to compose. She died in Bassano del Grappa in 2001.
Works
Rampazzi's works were composed through electronic sound generation and recorded on tape, and have been used on the soundtracks of documentary films and for ballets. Selected works include:
ipotesi1 (1965)
ipotesi2 (1965)
Research1 (1965)
Ricerca2 (1965)
Ricerca3 (1965)
Ricerca4 (1965)
Operation 1 (1966)
Operation 2 (1966)
Operation 3 (1966)
Function 1 (1966)
Function 3 (1966)
Function 4 (2 tracks)(1966)
Function 3 (1966)
Function 5 (1966)
5th Function (1966)
Rhythm 1 (1967)
Rhythm 2 (1967)
Rhythm 3 (1967)
Module 1 (1967)
Module 2 (1967)
Module 3 (1967)
Module 4 (1967)
Module 5 (1967)
Interference 1 (1968)
Interference 2 (1968)
Dynamics 1 (1968)
Masse 1 (1968)
Masse 2 (1968)
Freq Mod 1 (1969)
Freq Mod 2 (1969)
Imp & Ritha (1970)
Environ (1970)
Collections (1970)
Eco 1 (1971)
Filter 1 (1971)
Taras on 3 (1971)
Im |
https://en.wikipedia.org/wiki/Douglas%20C.%20Schmidt | Douglas C. Schmidt (born July 18, 1962) is a computer scientist and author in the fields of object-oriented programming, distributed computing and design patterns.
Biography
In August 1994 he joined the faculty of Washington University in St. Louis.
From August 1999 to December 2002 he was associate professor with tenure at the University of California, Irvine.
During much of this time he worked for DARPA managing US federal funded research programs.
In 2003 he became professor of computer Science at Vanderbilt University, and associate chair of computer science and engineering in December 2004.
In August 2010 he became a deputy director, research, and chief technology officer at Software Engineering Institute. In April 2013 he became a director at Real-Time Innovations.
He led teams that developed an Adaptive Communication Environment (ACE), The ACE ORB (TAO), a component-integrated ACE ORB (CIAO), and an implementation of the Deployment and Configuration standard built on top of TAO (DAnCE).
"ORB" refers to a key piece of the Common Object Request Broker Architecture.
They were made available as open-source software.
Publications
Articles
Douglas C. Schmidt published articles in C++ Report and C/C++ Users Journal. He edited "Object Interconnections" column in C/C++ Users Journal, and "Patterns++" column in C++ Report.
Books
References
American computer scientists
American technology writers
Living people
1962 births
Washington University in St. Louis faculty
University of California, Irvine faculty
Vanderbilt University faculty |
https://en.wikipedia.org/wiki/Asset%20Marketing%20Systems%2C%20Inc.%20v.%20Gagnon | Asset Marketing Systems, Inc. v. Gagnon was a case heard by the United States Court of Appeals for the Ninth Circuit regarding implied licenses to use, modify and retain the source code of computer programs, and the enforceability of non-competition agreements. The court affirmed the ruling from the United States District Court for the Southern District of California that Kevin Gagnon, a software contractor doing business as "Mr. Computer", had implicitly granted Asset Marketing Systems (AMS) an unlimited license to use, modify and retain the source code of the programs that Gagnon created. The case is notable because the Court held that an implied software license is granted when the licensee requests the creation of a work, the licensor creates and delivers the work, and the licensor intends the licensee to copy and distribute the work.
Background
Factual background
AMS is a field marketing organization offering sales and marketing support to insurance marketing entities. From May 1999 to September 2003, AMS hired Gagnon, an at-will, independent contractor, to develop custom software to assist with its information technology needs. AMS was Gagnon’s largest client, accounting for $2 million of revenue and 98 percent of his business. From May 2000 through April 2001, AMS and Gagnon entered a Technical Services Agreement, but nothing about a license was mentioned.
AMS claimed that on June 12, 2002, Gagnon signed a Vendor Non-disclosure agreement (NDA) that would have given AMS ownership of all intellectual property developed for AMS by Gagnon. However, Gagnon claimed the document was a forgery.
In June 2003, Gagnon proposed that AMS execute an Outside Vendor Agreement (OVA) to state that all information produced by the contractor would remain property of the contractor, and be licensed to the client on a non-exclusive basis. AMS declined to execute the OVA, but instead countered with a redlined version to read that all information produced by the contractor would be the sole property of the client. The parties never executed the OVA, however. By the end of June 2003, AMS decided to terminate Gagnon's services. AMS extended an employment offer to Gagnon, but Gagnon declined. The two parties then set a target exit date of September 15, 2003.
On September 18, 2003, Gagnon demanded $1.75 million from AMS for the right to continue using the programs, and $2 million for Gagnon's agreement not to sell or disclose the programs to AMS's competitors.
On September 23, 2003, AMS responded by terminating the relationship with Gagnon. AMS's consultant also alleged numerous problems with Gagnon's work. In particular, Gagnon still possessed the source code of the programs and databases that he developed for AMS. Therefore, AMS demanded Gagnon to hand over all copies of the source code immediately, as AMS's trade secrets were allegedly embedded in the software, which AMS argued would preclude any use by Gagnon.
Also on September 23, 2003, seven of Gagnon's |
https://en.wikipedia.org/wiki/Tiss%C3%A9o | Tisséo is the brand adopted in 2002 for the transport network of Toulouse, under the authority of the Syndicat mixte des transports en commun (SMTC).
Tisséo operates two metro lines, two tramway lines, a hundred buses, and shuttle services (bus, mobibus, TAD), with a unified magnetic ticketing and RFID card system.
The position and live schedules of all buses, subway trains, and trams are available on the website and Tisséo app.
Subway
Opened in 1993, the Tisséo metro has two lines, fully automated.
Subway access requires a magnetic ticket or an RFID card, usable both on metro networks, bus, tramway and TAD (on-demand bus).
See also
List of Toulouse metro stations
Toulouse tramway
References
External links
Tisséo Official Website
Railway companies of France
Rapid transit in France
Transport in Toulouse |
https://en.wikipedia.org/wiki/MyDLP | MyDLP is a data loss prevention solution originally available released as free and open source software. Supported data inspection channels include web, mail, instant messaging, file transfer to removable storage devices and printers. The MyDLP development project originally made its source code available under the terms of the GNU General Public License.
MyDLP was one of the first free software projects for data loss prevention, but was acquired by the Comodo Group in May 2014. Comodo has since begun marketing the Enterprise version through its Comodo Security Solutions subsidiary, while the free version has been removed from the website. The open source code has not been updated since early 2014.
Subprojects
As of October 2010, MyDLP included the following subprojects:
MyDLP Network: Network server of the project, which was used for high load network operations such as intercepting TCP connections and hosting MyDLP network services.
MyDLP Endpoint: Remote agent of the project, which ran on endpoint machines in order to inspect end user operations such as copying a file to an external device, printing a document and capturing screenshots.
MyDLP Web UI: Management interface for system administrators to configure MyDLP. It pushed relevant parts of system configuration to both MyDLP Network and MyDLP Endpoint.
Platforms and interfaces
MyDLP Network was mostly written in Erlang, because of its performance on concurrent network operations. Python was also used for a few exceptional cases. This subsystem could run on any platform that supported Erlang and Python.
MyDLP Endpoint was developed for Windows platforms, and it was written in C++, C#.
MyDLP Web UI was written in PHP and Adobe Flex. It used MySQL in order to store user configurations.
Features
As of October 2010, MyDLP included widespread data loss prevention features such as text extraction from binary formats, incident management queue, source code detection and data identification methods for bank account, credit card and several national identification numbers. Besides, features like data classification through statistical analysis of trained sentences and native language processor integrated Naive Bayes classifier were claimed to be included.
References
External links
Free security software
Data security
Free software |
https://en.wikipedia.org/wiki/2APL | 2APL (A Practical Agent Programming Language) is a modular BDI-based programming language that supports the development of multi-agent systems. 2APL provides a rich set of programming constructs allowing direct implementation of concepts such as beliefs, declarative goals, actions, plans, events, and reasoning rules. The reasoning rules allow run-time selection and generation of plans based on declarative goals, received events and messages, and failed plans. 2APL can be used to implement muti-agent systems consisting of software agents with reactive as well as pro-active behaviours.
Overview
2APL provides programming constructs to specify both multi-agent systems and individual agents. Multi-agent systems are specified in terms of individual agents and the environments with which they interact. Individual agents are specified in terms of the following ingredients.
Beliefs: It implements an agent's initial information about its environments and other agents with which it interacts. An agent's beliefs may change during its execution.
Goals: It implements an agent's initial objectives. Each objective denote a state the agent desires to achieve. A goal will be removed as soon as it is achieved. Different goals may not be achievable at the same time as they may denote conflicting states.
Basic Actions: 2APL provides different types of actions, among which,
Belief Update Action is to update an agent's beliefs.
Communication Action is to pass a message to another agent.
External Action is to interact with an environment.
Abstract Action is to encapsulation a plan by a single action.
Belief Test Action is to query an agent's beliefs.
Goal Test Action is to query an agent's goals.
Adopt Goal Action is to add a goal to an agent's goals.
Drop Goal Action is to remove a goal from an agent's goals.
Plans: A plan consists of basic actions composed by operators such as sequence, conditional choice, conditional iteration, and a unary operator to identify (region of) plans that should be executed atomically, i.e., the actions should not be interleaved with the actions of other plans of the agent.
Reasoning Rules: Three types of (practical) reasoning rules are provided to implement the generation of plans. The rules have a belief condition indicating when the rule can be applied.
Planning Goal Rule is to generate a plan to achieve a goal.
Procedural Rule is to generate a plan to react to either an event (received from environment) or a message (received from an agent). This rule can also be used to relate an abstract action to the plan it encapsulate.
Plan Repair Rule is to generate a plan to replace a failed plan.
Modules: A 2APL agent's program can be developed in separate modules. Each module encapsulates cognitive components such as beliefs, goals, plans, and reasoning rules. In practice, a 2APL module can be used to program a specific functionality, such as a role or an agent profile. A programmer can perform a wide range of operations on |
https://en.wikipedia.org/wiki/Resource%20Monitor | Resource Monitor, a utility in Windows Vista and later, displays information about the use of hardware (CPU, memory, disk, and network) and software (file handles and modules) resources in real time. Users can launch Resource Monitor by executing resmon.exe (perfmon.exe in Windows Vista).
The Vista and later Resource Monitor heavily leverages the Event Tracing for Windows (ETW) facilities introduced in Windows 7;
the counter setup (event tracing session) used by the Resource Monitor can provide logging as well.
Features
The Resource Monitor window includes five tabs:
Overview
CPU
displays column lists of Processes, Services, Associated Handles and Associated Modules; charts of CPU Usage (separate for every core)
Memory
displays overall Physical Memory consumption and separate consumption of every Process; charts of Used Physical Memory, Commit Charge and Hard Faults/sec
Disk
displays Processes with Disk Activity and Storage; charts of Disk Usage (KB/sec) and Disk Queue Length
Network
displays Processes with Network Activity, TCP Connections and Listening Ports; charts of Network Usage (separate for every adapter) and TCP Connections
Ways to start the application
Choose Start→Type to search "Resource Monitor".
Start Windows Task Manager→select Performance tab→Click the "Open Resource Monitor" link at the lower left corner.
Choose Start→All Programs→Accessories→System Tools→Resource Monitor.
%windir%\system32\perfmon.exe /res
%windir%\system32\resmon.exe
See also
Activity Monitor in macOS
System Monitor was available on Windows 95, 95 OSR, 95 OSR2, 98, 98SE, ME
Performance Monitor introduced in Windows NT
References
Windows components |
https://en.wikipedia.org/wiki/Hilary%20Farr | Hilary Elizabeth Farr (née Labow) is a British-Canadian designer, businesswoman, television host and former actress. She is known as the co-host of the HGTV and W Network television series Love It or List It with David Visentin.
Born in Toronto and raised in London, Farr began her career in Los Angeles working as a home renovator as well as designing film and television sets. During this time, she occasionally worked as an actress, appearing in minor roles in such films as The Rocky Horror Picture Show (1975), City on Fire (1979), and The Return (1980).
She continued to work in home renovation and design in the ensuing years before establishing herself as a designer and co-host of Love It or List It in 2010. She is president of Hilary Farr's Designs, established in Toronto and in New York City.
Early life
Farr was born in Toronto, Ontario, Canada to a British mother and a Canadian father. Her mother was an Anglican and a member of the Church of England, and her father was Jewish. Farr was raised celebrating both Jewish and Christian religious traditions.
Farr was raised in London, where she attended the Royal Ballet School until age 11, and aspired to have a career as a ballerina. She took an interest in theatre and was introduced to interior design by helping her mother to decorate her childhood home.
Career
Farr began her career in Los Angeles, where she began purchasing and renovating homes, as well working as a film and television set designer. Acting under the name Hilary Labow, Farr made small appearances in Layout for 5 Models (1972), Sex Farm (1973), Never Mind the Quality, Feel the Width (1973), Legend of the Werewolf (1975), The Rocky Horror Picture Show (1975), City on Fire (1979) and The Return (1980). She also performed a singing role in Grease in London in 1973. In the early 1980s, she had small parts in television sitcoms.
Farr designed and renovated properties in Australia, the United Kingdom, California, New York and later Toronto. She renovated homes for notable celebrities, including Jenna Elfman's home and Jennifer Hudson's loft in Chicago.
Farr returned to Toronto in 2008 after a divorce. She was signed as a co-host of Love It or List It by the W Network, Big Coat Productions and Corus Entertainment, along with David Visentin. The show was broadcast on HGTV and W Network. In Spain, the show was broadcast with a dual soundtrack on Divinity.
Farr also served as a judge on W Network's Search for the Next W Expert 2010. In 2011, she made a number of guest appearances at the Canadian International Interior Design Show, hosted in the cities of Toronto, Edmonton and Vancouver. She also made guest appearances on The Marilyn Denis Show and is a regular contributor to the Huffington Post.
In June 2014, Farr was a guest and design expert along with CNN and USA Today pundit and journalist Amy Tara Koch at the Art Van Furniture convention in Orland Park and Chicago, Illinois.
In 2016, Farr appeared in Ross Petty's stage version |
https://en.wikipedia.org/wiki/Medidata%20Solutions | Medidata Solutions is an American technology company that develops and markets software as a service (SaaS) for clinical trials. These include protocol development, clinical site collaboration and management; randomization and trial supply management; capturing patient data through web forms, mobile health (mHealth) devices, laboratory reports, and imaging systems; quality monitor management; safety event capture; and monitoring and business analytics. Headquartered in New York City, Medidata has locations in China, Japan, Singapore, South Korea, the United Kingdom, and the United States.
Medidata's customers include pharmaceutical, biotechnology, medical device, and diagnostic companies; academic and government institutions; contract research organizations; and other life sciences organizations around the world that develop and bring medical therapies and products to market.
History
The company was founded in June 1999 by Tarek Sherif, Glen de Vries and Ed Ikeguchi. In 1994, de Vries and Ikeguchi created OceanTek, a startup that developed Web applications for conducting clinical trials and was the precursor to Medidata. In 1999, they restarted the company as a new firm and, together with Sherif, formed Medidata, to provide online systems for designing and running clinical trials. In 2004, they completed a $10 million round of financing with Insight Venture Partners, and were later backed by investors including Milestone Venture Partners and Stonehenge Capital Fund. Ikeguchi left the company in 2008, and de Vries moved from chief technology officer to president, with Tarek as chief executive officer.
On January 26, 2009, Medidata filed to raise $86 million in an initial public offering (IPO). It made its IPO on the Nasdaq Stock Market on June 25, 2009, with its market capitalization at $313 million. It debuted on the Nasdaq at $18 per share. The company was ranked #11 on Fortune magazine's 2017 Fortune Future 50 list,#51 on the Fortune 100 Fastest Growing Companies list, and #59 on the Forbes list of Most Innovative Growth Companies, at a value of $3.3 billion as of May 2017. In 2018, Medidata was ranked #70 on Barron's 100 Most Sustainable Companies list.
In December 2019, Medidata was acquired by Dassault Systèmes.
Medidata now functions as a subsidiary.
Acquisitions
Software
Medidata offers a cloud-based platform for clients to build their own clinical trials and perform medical research. On the platform, physicians and scientists can collect and share clinical trial data. The company helps biopharmaceutical and medical device companies run clinical trials, and streamlines the process for life science firms designing the trials. As of 2017, Medidata customers include 18 of the world's top 25 pharmaceutical companies, with clients such as Johnson & Johnson, AstraZeneca, Amgen, Cancer Research UK, GlaxoSmithKline, Novartis and Hoffmann-La Roche. Clients also include biotechnology companies, government institutions, and contract research |
https://en.wikipedia.org/wiki/John%20F.%20Hughes | John F. "Spike" Hughes is a Professor of Computer Science at Brown University.
Contributions
Hughes' research is in computer graphics, particularly those aspects of graphics involving substantial mathematics. He is perhaps best known as the co-author of many widely used textbooks in the field of computer graphics.
Hughes is an avid sailor, and for years maintained the FAQ for the Usenet rec.boats group.
Selected publications
References
External links
John Hughes home page
Living people
Computer graphics professionals
Computer graphics researchers
Human–computer interaction researchers
Computer vision researchers
Brown University faculty
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/Nook%20Color | The Nook Color is a tablet computer/e-reader that was marketed by Barnes & Noble. A tablet with multitouch touchscreen input, it is the first device in the Nook line to feature a full-color screen. The device is designed for viewing of books, newspapers, magazines, and children's picture books. A limited number of the children's books available for the Nook Color include interactive animations and the option to have a professional voice actor read the story. It was announced on 26 October 2010 and shipped on 16 November 2010. Nook Color became available at the introductory price of US$249. In December 2011, with the release of the Nook Tablet, it lowered to US$169. On 12 August 2012, the price lowered to US$149. On 4 November 2012, the price was further lowered to US$139. The tablet ran on Android.
As of December 2012, Barnes and Noble discontinued the Nook Color in favor of the Nook HD and Nook HD+.
Design
The device was designed by Yves Behar from fuseproject. Its frame is graphite in color, with an angled lower corner intended to evoke a turned page. The soft back is designed to make holding the device more comfortable.
Features
The Nook color has a 1024x600 resolution multi-touch touchscreen LCD display, presenting a very vivid image, as opposed to the original Nook's secondary touchscreen. It does not feature an electronic paper display, making it a tablet computer and an e-reader. It has a customized display with color options, six font sizes, and Internet browsing over Wi-Fi, as well as a built-in media player that supports audio and video. The Nook Color allows installing applications approved by Barnes & Noble, with the company planning to provide tools for third-party software developers and an app store. Applications pre-loaded on the Nook Color include Chess, Sudoku, crossword puzzles, Pandora Radio, and a media gallery for viewing pictures and video.
As with the prior Nook, the Nook Color provides a "LendMe" feature allowing users to share some books with other people depending upon licensing by the book's publisher. The purchaser is permitted to share a book once with one other user for up to two weeks. The other users may view the borrowed book using a Nook, Nook Color, or Barnes & Noble's free reader software on any other device running iOS (iPhone, iPod Touch, iPad), BlackBerry OS, Windows, Mac OS X, or Android. Adobe Digital Editions installed on Laptops paired to the Nook Color enables downloads from public libraries (epub). The Share feature on the Nook is only accessible to a small percentage of books purchased from B&N. The Nook works better and easier with purchased publications from B&N than other sources with its easier access.
The Nook Color uses a Texas Instruments ARM Cortex-A8 processor running at 800 MHz. The device has 8 GB of internal memory supplied by Sandisk, but only 5 GB is user-accessible and can store an estimated 6,000 books or 100 hours of audio. As with the original Nook, microSD and microSDHC me |
https://en.wikipedia.org/wiki/Game%20Sprockets | Game Sprockets is a collection of application programming interfaces (APIs) supporting gaming on the classic Mac OS. It consisted of four main parts, DrawSprocket, InputSprocket, SoundSprocket and NetSprocket, each providing a library of pre-rolled routines for common gaming tasks. SpeechSprocket was a relabelled version of the Speech Recognition Manager that provided speech recognition support, and QuickDraw 3D RAVE provided 3D hardware acceleration.
Game Sprockets was first released in 1996, and saw only minor use before development was cancelled in 1997. OS X included many of the same features in the built-in libraries, while OpenGL replaced RAVE as the 3D acceleration layer. NetSprocket lives on as OpenPlay, although adoption is limited.
History
Background
Early in its history, the Macintosh computer was a strong gaming platform due to its high-resolution screen, digital sound hardware and the fact that every Mac came equipped with a reasonable gaming controller, the mouse. However, gaming was never supported in any strong way within Apple, and in some cases actively discouraged. By the 1990s the Mac platform had greatly increased in complexity through a profusion of models with different features. Supporting a game across the entire lineup required the programmer to learn the intricacies of different models at a time when even figuring out which machine the program was installed on had no standard solution.
By the mid-90s, PC gaming had evolved into a powerful market of its own, one of the drivers for new computer purchases. During the move from MS-DOS to Microsoft Windows, several Microsoft staffers noticed that game developers were generally ignoring Windows due to the better performance available under DOS. They decided that Windows needed to support first-class gaming, and set about ensuring that Windows would become the preferred gaming platform in the future. The result was the introduction of the DirectX libraries, which greatly reduced complexity and addressed many of the performance concerns. As 3D games became widespread, the library's Direct3D became a decisive advantage, and DirectX grew to become almost universal for PC gaming.
By the mid-90s, gaming on the Mac was largely dead. The combination of high prices, stagnating sales, poor performance and a lack of a DirectX-like system all resulted in the game developers leaving the Mac field in droves. As it was in Microsoft, several Apple staffers took it upon themselves to redress this problem, led by Chris DeSalvo. The result was a two-pronged effort; on one side was the Game Sprockets libraries (along with RAVE), and on the other was a single target gaming platform, the Pippin.
Short life
Game Sprockets was released on 29 March 1996, just before that year's WWDC.
Game Sprockets was one of many Apple technologies that ended development after the return of Steve Jobs to the CEO position at Apple. Its death was announced in a March 1997 press release, as part of a wide series |
https://en.wikipedia.org/wiki/Patrick%20Hayden%20%28scientist%29 | Patrick Hayden is a physicist and computer scientist active in the fields of quantum information theory and quantum computing. He is currently a professor in the Stanford University physics department and a distinguished research chair at the Perimeter Institute for Theoretical Physics. Prior to that he held a Canada Research Chair in the physics of information at McGill University. He received a B.Sc. (1998) from McGill University and won a Rhodes Scholarship to study for a D.Phil. (2001) at the University of Oxford under the supervision of Artur Ekert. In 2007 he was awarded the Sloan Research Fellowship in Computer Science. He was a Canadian Mathematical Society Public Lecturer in 2008 and received a Simons Investigator Award in 2014.
Hayden has contributed substantially to quantum information theory. His contributions range from quantum information approaches to the theory of black holes to the study of quantum entanglement. Hayden and John Preskill considered information retrieval from evaporating black holes. Their study of a black hole's retention time for quantum information before it is revealed in the Hawking radiation; called the Hayden-Preskill thought experiment, turned out to be compatible with the black hole complementarity hypothesis.
References
http://www.perimeterinstitute.ca/people/distinguished-visiting-research-chair
External links
https://sitp.stanford.edu/people/patrick-hayden
http://www.stanford.edu/~phayden/
Living people
Canadian computer scientists
Canadian physicists
Alumni of Balliol College, Oxford
Canada Research Chairs
Canadian Rhodes Scholars
McGill University alumni
Simons Investigator
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/Datanal | Datanal is a village in Dharwad district of Karnataka, India.
Demographics
As of the 2011 Census of India there were 513 households in Datanal and a total population of 2,628 consisting of 1,373 males and 1,255 females. There were 331 children ages 0-6.
References
Villages in Dharwad district |
https://en.wikipedia.org/wiki/Acer%20Aspire%20Timeline | Aspire Timeline is a series of notebook computers manufactured by Acer Inc. designed to achieve battery life in excess of eight hours with ultrathin designs. The first generation Acer Timeline models use Intel's ultra low voltage (ULV) processors and Intel's Laminar Wall Jet technology.
Aspire Timeline
There are six Aspire Timeline models:
Aspire 1810T,
Aspire 1810 Olympic Edition,
Aspire 3810T,
Aspire 4810T,
Aspire 4810 Olympic Edition,
Aspire 5810T.
Aspire TimelineX
In 2010, Acer launched a new Aspire TimelineX series that employ Intel Core processors. The nine – cell battery model is claimed by the company to last up to 12 hours.
Aspire TimelineX (2010) models:
Aspire 3820T
Aspire 4820T
Aspire 5820T
Aspire 3820TG
Aspire 4820TG
Aspire 5820TG
In April 2011, Acer released the third generation of Timeline models in Taiwan which sport the Intel's Sandy Bridge processor.
Aspire Timeline X (2011) lineup:
3830T
The 3830T has two versions: a Core i3-2310M and Core i5-2430M. It measures 13.3 inches and has a 1366×768 LED backlit LCD, Intel HD Graphics 2000/3000, 500/750GB hard drive for storage, 4/6GB DDR3 RAM and 3 USB ports, and weighs 4.08 pounds.
4830T
The 4830T contains the Core i5-2430M. It measures 14 inches and has a 1366×768 LED backlit LCD, Intel HD Graphics 3000, 640GB hard drive for storage, 4/6GB DDR3 RAM and 3 USB ports, and weighs 4.78 pounds.
5830T
The 5830T contains the Core i5-2450M. It measures 15.6 inches and has a 1366×768 LED backlit LCD, Intel HD Graphics 3000, 750GB hard drive for storage, 6GB DDR3 RAM and 3 USB ports, and weighs 5.49 pounds.
3830TG
The 3830TG has several versions: a Core i3-2330M, a core i5-2410m, a Core i5-2430M and a Core i7-2620m. It measures 13.3 inches and has a 1366×768 LED backlit LCD, NVIDIA GeForce GT540M graphics and an Intel Hd 2000/3000, it switches between the two using Nvidia's Optimus technique. A 500GB hard drive for storage, 4GB DDR3 RAM and 3 USB 2.0 ports, of which are USB 2.0 and one of them being a 3.0 port that can be used to charge external devices when the laptop is turned off. It also features Kenwood's Dolby Home Theater speakers and weighs 4.12 pounds.
4830TG
The 4830TG same specification as above (except for Core i3-2330M). It measures 14 inches and weighs 4.67 pounds, contains DVD super multi DL drive (this is not present in the 3830TG). It has a 640GB hard drive for storage. For connectivity and port, you'll find Bluetooth® 2.1+EDR, one faster USB3 port, microphone in, 3.5mm audio jacks for headphone out, memory card reader ( SD Card, Memory Stick, Memory Stick PRO, MultiMediaCard, xD-Picture Card, SDXC Memory Card ), HDMI port, VGA port, Gigabit Ethernet LAN with RJ connector and 802.11 b/g/n wireless for internet connections.
5830TG
The 5830TG has the same specification as above (except for the 3830TG version which runs on Core i3-2330M). Its screen is 15.6 inches and weighs 5.49 pounds, It contains DVD super multi DL drive (this is not present in the 3830TG).
Acer As |
https://en.wikipedia.org/wiki/BT%20Superfast%20Fibre | BT Superfast Fibre (formerly BT Infinity) is a broadband service in the United Kingdom provided by BT Consumer, the consumer sales arm of the BT Group. The underlying network is fibre-to-the-cabinet (FTTC), which uses optical fibre for all except the final few hundred metres (yards) to the consumer, and delivers claimed download speeds of "up to 76 Mbit/s" and upload speeds of "up to 19 Mbit/s" depending on package selected. The fibre terminates in a new roadside cabinet containing a DSLAM, from where the final connection to the customer uses VDSL2 technology.
Ofcom data gathered in November 2014 indicated that only 1% of 76 Mbit/s and 15% of 38 Mbit/s customers received the advertised speed. It adopted its present name on 23 May 2018 as part of BT's renaming of its entire broadband portfolio which is "designed to be simpler and more descriptive".
Deployment
Following a technical trial involving 50 homes in Foxhall, Ipswich, in January 2009, and operational pilots at the Muswell Hill, Whitchurch and Glasgow Halfway telephone exchanges, the service was launched commercially on 25 January 2010. When it was announced, BT expected 4 million customers for the service by the end of the year. Infinity forms part of BT's £1.5bn plan to make superfast broadband available to 40% of the UK by the summer of 2012, using FTTC and FTTP services. Previously, the only major provider of domestic super fast broadband in the UK was Virgin Media's hybrid fibre-coaxial service.
Neither Virgin Media nor BT's 'up-to 76Mbit/s' Infinity actually use optical fibre to supply super fast broadband to the home, but rather still rely on copper, which can be sensitive to electromagnetic interference. BT Infinity does however have a 'fibre to the home' product available.
Wholesale competition
The fibre infrastructure is installed and maintained by Openreach, and is available for use by non-BT ISPs either directly from Openreach, or from BT Wholesale as part of the WBC product family.
Demand
BT Retail ran a competition called "Race to Infinity" in the autumn of 2010 to assess demand for the Infinity product in 2495 mostly-rural communities. The winners would be the 5 areas served by a telephone exchange that received the most percentage votes out of its "total connections" by 31 December 2010.
BT announced on 3 January 2011 that 6, not the originally planned 5, areas would receive Infinity by early 2012. The six winning areas were: Whitchurch, Hampshire (104%); Caxton, Cambridgeshire (103%); Madingley, Cambridgeshire (102%); Innerleithen, Scottish Borders (101%); Blewbury, Oxfordshire (99.8%); Baschurch, Shropshire (95%).
Voting surpassed 100% in several areas because new places had been built and residents without landlines connected to the area's exchange could vote - and were encouraged to do so by very active locally-run volunteer campaigns.
In addition to winning Infinity, each of the six winning areas are to receive £5,000 of computer equipment for a local community |
https://en.wikipedia.org/wiki/AstridBio | AstridBio Ltd. is a privately held Biotechnology company with office in Hungary. AstridBio's focus is biobanking software development, data management and analysis for genomics research. Its clients include academic research institutes, pharmaceutical and biotech companies.
Products
SmartBiobank is a free, online biobank software designed to help clinicians, lab biologists and researchers to integrate translational research elements into one single system. SmartBiobank can store, manage and analyze biospecimen data, clinical data as well as experimental data. It supports the establishment of population or clinical biobanks as well as patient registries.
Disease Discovery Suites are based on the type of disease that is the focus of the investigation: chronic, rare, malignant and infectious diseases. The purpose of the suites is the biological interpretation of structured NGS data - assisting the researcher in revealing the genetic background of diseases or providing an answer to related research questions.
GenoMiner is high-performance IT platform for next generation sequencing data analysis for biologists with or without IT background.
Services
AstridBio has extensive experience in the following fields:
bioinformatics, biostatistics, data analysis and data mining for high-throughput omics data, including genomics, transcriptomics, epigenomics, metagenomics, proteomics, metabolomics
biobank systems for large-scale data gathering, data integration, visualization, and data interpretation
Projects
AstridBio has already been involved in many European research projects:
My Health Avatar is an attempt at a proof of concept for the digital representation of patient health status. It is designed as a lifetime companion for individual citizens that will facilitate the collection of, and access to, long-term health-status information. This will be extremely valuable for clinical decisions and offer a promising approach to acquire population data to support clinical research, leading to strengthened multidisciplinary research excellence in supporting innovative medical care.
Metagenome analysis of moss-associated microbiome project's aim is to explore and analyze the ecology of the area-specific community composition (the Alpine bog) with the help of metagenomic approaches using NGS technology.
BIOREQ (Model Requirements for the Management of Biological Repositories) is a comprehensive guideline which covers the full range of research and operation activities applicable to biological repositories or biobanks.
DRSCREEN (Developing a computer-based image processing system for diabetic retinopathy screening) project's aim is to develop an automated image analysing system for retinopathy screening (ophthalmological application).
SCHIZO (Biobank based biomarker discovery and molecular mechanism research to support antipsychotic drug development) project's aim is to develop biomarkers and methods to support, rationalize and accelerate the discovery |
https://en.wikipedia.org/wiki/Shaw%20Media | Shaw Media was the television broadcasting division of Shaw Communications that consisted the broadcasting assets of the former Canwest. Shaw Media owned the Global Television Network, which broadcasts nationally via 13 television stations, as well as 19 specialty channels including Slice, HGTV Canada, Showcase, Food Network Canada, and History.
On April 1, 2016, Shaw Media's properties were acquired by sister company Corus Entertainment.
History
As Canwest Global
In 1974, a group led by Israel Asper bought the assets of Pembina, North Dakota television station KCND-TV from broadcaster Gordon McLendon, moving the station to Winnipeg as independent station CKND-TV. Asper, through his company, Canwest, eventually bought out his partners in the Winnipeg station. A few months later, the Asper group joined a consortium that bought CKGN-TV, a network of six simulcasting transmitters across Ontario that carried many of CKND's programs and was known on-air as the Global Television Network. Canwest bought controlling interest in 1985, thus becoming the first western-based owner of a major Canadian broadcaster.
Canwest subsequently invested in or acquired other independent TV stations across Canada. Eventually, his station group became known as the "Canwest Global System." In 1997, Canwest bought controlling interest in CKMI-TV, the privately owned CBC affiliate in Quebec City. Canwest then set up CKMI rebroadcasters in Montreal and Sherbrooke. With this move, Canwest's stations now had enough coverage of Canada that on August 18—the day CKMI officially disaffiliated from CBC—Canwest rebranded its station group as "The Global Television Network". Throughout the 1990s, Global (and its antecedents) held Canadian rights to hit U.S. series such as Cheers, Friends, and Frasier.
Canwest also bought broadcasting assets internationally, including outlets in New Zealand, the Republic of Ireland, and Australia, although all were eventually sold off. In 1991, Canwest issued a successful initial public offering on the Toronto Stock Exchange. In June 1996, Canwest was listed on the New York Stock Exchange.
Lacking a presence in Alberta, the company set its sights on Western International Communications, which owned three independent stations in that province that carried Global programming. It eventually bought that company's broadcasting assets in 2000. This not only boosted Global's coverage in western Canada, but prompted the establishment of a second over-the-air service, originally known as CH, since in some areas the combined company had duplicate over-the-air coverage through multiple stations. Later that year, Canwest announced its acquisition of the Southam newspaper chain from Conrad Black, in order to pursue a media convergence strategy.
Canwest was initially slow to invest in specialty channels due to the strength of its terrestrial network. In 1999, seeking to change this, the company announced a deal to buy out the Canadian partners of NetStar Com |
https://en.wikipedia.org/wiki/Sarah%20Jane%27s%20Alien%20Files | Sarah Jane's Alien Files is a BBC series based on The Sarah Jane Adventures. It features the characters Sarah Jane Smith, Luke Smith, Clyde Langer and Rani Chandra entering data on aliens they have encountered during their adventures into Mr Smith, Sarah Jane's extraterrestrial computer, to benefit humanity in the event that Sarah Jane is no longer capable of defending the Earth against alien threats.
Each episode is a clip show summarising the events of episodes in which the featured aliens appeared. The only new footage is the framing and narration, shot entirely on the series' standing attic set. Occasionally, brief clips from Doctor Who are included for context, such as in Episode 6 when the Judoon are compared to the Cheetah People of Survival in that each humanoid species looks superficially like a non-humanoid terrestrial mammal (rhinoceros and cheetah, respectively). The series format was based upon the short "alien files" clips previously produced for the CBBC's The Sarah Jane Adventures website.
The series is similar to the Doctor Who spin-off Monster Files.
Episode list
References
External links
The Sarah Jane Adventures
2010s British science fiction television series
2010 British television series debuts
2010 British television series endings
BBC children's television shows
British science fiction television shows
Doctor Who spin-offs
English-language television shows
British television spin-offs |
https://en.wikipedia.org/wiki/Pilot%20%28Six%20Feet%20Under%29 | "Pilot" (also called "Six Feet Under") is the pilot episode of the American funeral drama television series Six Feet Under. It premiered in the United States on the premium cable network HBO on June 3, 2001. The episode was written and directed by the show's creator, Alan Ball.
Plot
On Christmas Eve 2000, Nathaniel Fisher Sr., owner of Fisher & Sons Funeral Home in Los Angeles, died after he was hit by a bus while driving his brand new hearse. Nathaniel Sr.'s oldest son and namesake, Nate, has flown in from Seattle for the holidays and is informed about his father's untimely death immediately after a sexual encounter with Brenda Chenowith in the airport. Brenda drives Nate to the mortuary where he is re-united with his mother, Ruth, and younger sister, Claire. Brenda departs and after identifying the body, she and Nate return to the family home where Nathaniel Sr.'s younger son, David, is waiting.
Various tensions and conflicts emerge following Nathaniel Sr.'s death and beyond. Claire has been experimenting with drugs, Ruth reveals that she had a long-standing affair with a fellow churchgoer, and David has been concealing his homosexuality and relationship with Keith, a policeman, from his family. David also shows resentment towards Nate for leaving the family and the business which he now manages. Nate becomes frustrated at his family and himself, expressing dissatisfaction with his life. Nathaniel Sr.'s spectre appears to members of his family and engages them in conversation. Ruth requests that Nate delay his return to Seattle and he agrees.
Production
Eric Balfour was only supposed to be introduced as "Claire's Meth Date" for the show's pilot, but director Alan Ball found his chemistry so satisfying with Lauren Ambrose that his role was developed into the character Gabe Dimas. Similarly, Dina Waters's and Gary Hershberger's roles were only listed as "Chatty Mourner" and "Kroehner Representative", whose roles were developed into Tracy Montrose Blair and Matthew Gilardi respectively, and would go on to have recurring roles.
The episode features humorous funeral home related commercials that would start each act, but the idea was abandoned and the pilot is the only episode in which they were used.
Reception
The pilot episode was positively received and earned several award wins and nominations. Creator Alan Ball won for Outstanding Directing for a Drama Series at the 54th Primetime Emmy Awards, while the episode received nominations for Outstanding Art Direction for a Single Camera Series, Outstanding Makeup for a Series (Non-Prosthetic), Outstanding Single Camera Picture Editing for a Series, and Outstanding Single Camera Sound Mixing for a Series. Alan Ball also won for Outstanding Directorial Achievement in Dramatic Series for the 2001 Directors Guild of America Awards. The episode won an Art Directors Guild Award for Excellence in Production Design in 2001.
References
External links
"Pilot" at HBO.com
Six Feet Under (TV series) |
https://en.wikipedia.org/wiki/ObjectDB | ObjectDB is an object database for Java. It can be used in client-server mode and in embedded (in process) mode.
Unlike other object databases, ObjectDB does not provide its own proprietary API. Accordingly, working with ObjectDB requires using one of the two standard Java APIs: JPA or JDO. Both APIs are built-in in ObjectDB, so an intermediate ORM software is not needed.
Features
ObjectDB is a cross platform software and can be used on various operating systems with Java SE 5 or higher. It can be integrated into Java EE and Spring web applications and deployed on servlet containers (Tomcat, Jetty) as well as on Java EE application servers (GlassFish, JBoss). It was tested on various JVMs, including HotSpot, JRockit and IBM J9.
The maximum database size is 128 TB (131,072 GB). The number of objects in a database is unlimited (except by the database size).
All the persistable types of JPA and JDO are supported by ObjectDB, including user defined entity classes, user defined embeddable classes, standard Java collections, basic data types (primitive values, wrapper values, String, Date, Time, Timestamp) and any other serializable classes.
Every object in the database has a unique ID. ObjectDB supports both traditional object database IDs, as well as RDBMS like primary keys, including composite primary keys and auto value generation and assignment, as part of its support of JPA, which is mainly an API for RDBMS.
Two query languages are supported. The JDO Query Language (JDOQL), which is based on Java syntax, and the JPA Query Language (JPQL), which is based on SQL syntax. JPA 2 criteria queries are also supported.
ObjectDB automatic schema evolution handles most changes to classes transparently, including adding and removing of persistent fields, changing types of persistent fields, and modifying class hierarchy. Renaming persistable classes and persistent fields is also supported.
Tools and utilities
The following tools and utilities are included in the ObjectDB distribution:
Database Explorer - GUI tool for querying, viewing and editing database content.
Database Doctor - Diagnoses and repairs possible database problems.
Replication - Master-Slave replication (clustering) with unlimited number of slave nodes.
Online Backup - Database backup by a simple query on an EntityManager.
Class Enhancer - Boosts performance by preparing classes for persistence.
Transaction Replayer - Recorder and replayer of database transactions.
BIRT Reports Driver - Adds ObjectDB as a BIRT data source and JPQL / JDOQL queries as data sets.
References
External links
Proprietary software
Object-oriented database management systems
NoSQL
Cross-platform software |
https://en.wikipedia.org/wiki/Database%20Nation | Database Nation is a non-fiction book written by Simson Garfinkel. Published in January 2000, Database Nation provides the reader with a clear understanding of what privacy is today. Starting with a broad definition of privacy, he goes in depth on various new technologies and practices that have reshaped our lives, at the cost of privacy. Garfinkel goes into great detail to describe each type of privacy intrusion. The current system prevents the individual from resisting; the individual can only do so much to maintain his privacy. His most important point is that the right to privacy is a constitutionally protected right and it does not have to be traded away for our way of life. He calls the government to take a stand for privacy by establishing an agency that will enforce privacy laws and act as a representative of individual privacy. Overall, he hopes to increase public awareness on the issue of privacy and raise the standard for individual privacy.
References
This article is based on:
Garfinkel, Simson. Database Nation. United States: O'Reilly 2000. 1-56592-653-6
External links
http://www.databasenation.com/home.htm
American non-fiction books
2000 non-fiction books |
https://en.wikipedia.org/wiki/The%20Hamnet%20Players | The Hamnet Players, founded in 1993, perform virtual theatre (cyberformance) using IRC chat.
Overview
On 12 December 1993, a dozen people gathered at an event which made cyber-history: an experimental performance on IRC–Internet Relay Chat of a parody of Shakespeare's Hamlet, irreverently renamed "Hamnet." Eighteen persons were to be performers; the rest had come to watch the show. The main source of the humour is playful juxtaposition of Shakespearean plot, characters and language. The Hamnet Players productions are not only experiments in virtual theatre, they are also carnivals of wordplay, chock-ful of wit and humour. "Hamlet" was a particular favorite in 19th Century American parodies. But there was something very new and unusual about this event. Performers didn't have to worry about their makeup or costumes, and it was more important for them to be able to type fast than to project their voices. The performance "took place" not in a real world theatre, but in a virtual auditorium, specially designated channel on IRC called #hamnet. After the name of the group engaged in this experiment in virtual theatre The Hamnet Players had its first production.
The Hamnet Players have had a remarkable amount of attention from conventional media from this emerging art form. But they are still playing to rather modest-sized intimate audiences. The group are not constantly performing together, they split then reconvene to perform other productions. In an off-the-record statement, one member of the company suggested that the cast would like to produce something by Samuel Beckett or Sam Shepard.
General history
The Hamnet Players were founded in 1993 by Stuart Harris, an Englishman living in San Diego, California, a former actor, computer professional and author of computer manuals. In December 1993 they debuted the concept of internet theatre with their debut production of "Hamnet", a parody of William Shakespeare's play "Hamlet", followed later in April 1994 with their second production of "PCbeth: an IBM clone of Macbeth,", another parody of a Shakespeare play, this time using "Macbeth". In February 1995 they moved away from Shakespeare and used the plot of the Tennessee Williams's play "A Streetcar Named Desire", to create their third original piece "An IRC Channel Named #desire". The Hamnet Players performances are a form of virtual theatre, first of all, because they are focused gatherings, just like face-to-face encounters. Although participants could not see one another and their bodies were not co-present to one another, they cooperated to sustain a single focus of attention, taking turns at talking.
The name "Hamnet Players" is rich in cultural resonances. A "ham" is "an ineffective or overemphatic actor, one who rants or overacts". Thus, besides being an obvious pun on "Hamlet", the expression invites association to "hamming it up on the Net"; behaving in an exaggerated, theatrical fashion while logged onto the Internet. Another meaning of |
https://en.wikipedia.org/wiki/Clive%20Greenbelt%20Trail | Clive Greenbelt Trail is an urban recreational trail in Clive, Iowa and forms part of the Central Iowa Trails network. This very busy recreational trail runs through Polk and Dallas Counties in Iowa. It is a curvy, paved asphalt and concrete trail.
Route
The trail begins at 73rd Street and Walnut Creek at the Walmart in Windsor Heights. It meanders along the north bank of Walnut Creek for to Country Club Blvd. Between the Lake Country Club dam and 142nd Street, the trail is on the street near the northshore of Lake Country Club for . For the next , the trail travels between 1900 142nd Street (at Lakeview Drive) and Lions Park, which is near Eason Elementary School in Waukee. In western Clive, more trails are being developed north of Hickman Road. Additional links and branches bring the total trail mileage to . You are able to access many of the parks, libraries, and the aquatic center by way of these trails. There are mile markers and helpful route directions to help you on your way.
Some access points
Parking is available at
73rd Street at the Walmart parking lot
1400 86th Street - west side of 86th street
10490 Maddox Parkway (restrooms): west of 100th Street and south of 7 Flags Fitness & Racquet Club
1750 114th Street: Clive Aquatic Center, Clive City Hall, Clive Library
11900 Hickman Road: truck stop
3904 123rd Street: Campbell Recreation Area
15166 Wildwood Drive: Wildwood Park
1700 156th Street: Lions Park
Other access points include
(addresses are approximate, parking is either limited or not available)
7750 University Avenue
9250 Swanson Blvd
east of 100th Street near Play It Again Sports
10200 Lincoln Avenue
Rio Valley Park: 10450 Sunset Terrace or 1750 Rio Valley Drive
10500 Greenbelt Drive
10800 Lincoln Avenue
2000 114th Street
2103 128th Street at Walnut Creek Drive
Raccoon River Valley Trail link
13200 Lakeshore Drive
13200 Woodlands Parkway
1634 Country Club Blvd: south of the spillway for the Lake Country Club dam and across from the boat ramp
1900 142nd Street at Lakeview Drive
1910 149th Street at Woodcrest Drive and Lakeview Drive
600 Woodcrest Drive
605 SE Boone Drive at 156th Street: Eason Elementary School, Waukee
Connections to other trails
Waukee
West of Campbell Recreation Area in Clive, a link connects this trail to Waukee and the Raccoon River Valley Trail, which is part of the American Discovery Trail.
Additionally, Lions Park at 1700 156th Street in Clive links westward to the Waukee trails system.
West Des Moines
Southward along the eastside of 128th Street, this trail links to the West Des Moines trail system via the sidewalk along the eastside of 60th Street in West Des Moines.
Additionally, from Campbell Recreation Area, this trail links to the West Des Moines trail system via southward along 123rd Street in Clive and West Lakes Parkway in West Des Moines to the sidewalk along the southside of Westtown Parkway in West Des Moines. This connection between the two trail systems has less traffic and |
https://en.wikipedia.org/wiki/Y-DNA%20haplogroups%20in%20populations%20of%20Sub-Saharan%20Africa | The proportions of various human Y-DNA haplogroups vary significantly from one ethnic or language group to another in Africa.
Data in the table below are based on genetic research. Each group sampled is identified in the second column by linguistic designation: AA = Afroasiatic, KS = Khoisan, NS = Nilo-Saharan and NC = Niger–Congo. The third column gives the total sample size studied, and the other columns indicate the percentage observed of particular haplogroups.
See also
Africa
Ethnic groups in Africa
African people
Languages of Africa
Y-DNA haplogroups by population
Y-DNA haplogroups in populations of the Near East
Y-DNA haplogroups in populations of North Africa
Y-DNA haplogroups in populations of Europe
Y-DNA haplogroups in populations of the Caucasus
Y-DNA haplogroups in populations of South Asia
Y-DNA haplogroups in populations of East and Southeast Asia
Y-DNA haplogroups in populations of Oceania
Y-DNA haplogroups in populations of Central and North Asia
Y-DNA haplogroups in indigenous peoples of the Americas
Notes
References
External links
Y-DNA Ethnographic and Genographic Atlas and Open-Source Data Compilation
Africa Subsaharan |
https://en.wikipedia.org/wiki/WsRadio | wsRadio (World Syndicated Radio) is an Internet talk radio network which started broadcasting on August 15, 2001 with 5 shows and grew to over 120 shows. Broadcasting 24 hours a day, 7 days a week, "the Sun never sets on wsRadio.com." In 2008, wsRadio had over $1 million in advertising revenue, including eBay Radio and PayPal Radio. By early 2021, the station had closed down.
Notable shows
The Peggy Smedley Show, the voice of M2M and connected devices
APS Stamp Talk show for the world of stamp collectors, from the American Philatelic Society
Computer and Technology Radio with Marc Cohen and Marsha Collier
The Coaching Show, providing insights and best practices for the professional coaching community
Leadership Insights Radio, profiling successful and influential business leaders
PriceWaterhouseCoopers' Start-Up Show exploring Venture Capital Opportunities
Randy Jones on Baseball with Randy Jones and Joe Tutino
Washington Times Inside the Beltway Radio with journalist John McCaslin - archives June 2008 to May 2009
The San Diego Union~Tribune Community Spotlight Show showcasing local non-profits and organizations
References
External links
wsRadio blog
Official website (archived)
Alexa site info . Alexa Internet
Internet radio in the United States |
https://en.wikipedia.org/wiki/Dowding%20system | The Dowding system was the world's first wide-area ground-controlled interception network, controlling the airspace across the United Kingdom from northern Scotland to the southern coast of England. It used a widespread dedicated land-line telephone network to rapidly collect information from Chain Home (CH) radar stations and the Royal Observer Corps (ROC) in order to build a single image of the entire UK airspace and then direct defensive interceptor aircraft and anti-aircraft artillery against enemy targets. The system was built by the Royal Air Force just before the start of World War II, and proved decisive in the Battle of Britain.
The Dowding system was developed after tests demonstrated problems relaying information to the fighters before it was out of date. Air Chief Marshal Hugh Dowding, commander of RAF Fighter Command, solved the problem through the use of hierarchical reporting chains. Information was sent to Fighter Command Headquarters (FCHQ) central filter room at Bentley Priory and used to prepare a map of the battle. Details of the map were then relayed to the Group and Sector headquarters, where operators re-created the map at a scale covering their area of operations. Looking at the maps, commanders could make decisions on how to employ their forces quickly and without clutter. Instructions were relayed to the pilots only from the squadron's sector control rooms, normally co-located at the fighters' operating bases.
The Dowding system is considered key to the success of the RAF against the German air force (Luftwaffe) during the Battle of Britain. The combination of early detection and rapid dissemination of that information acted as a force multiplier, allowing the fighter force to be used at extremely high rates of effectiveness. In the pre-war period, interception rates of 30% to 50% were considered excellent; that meant that over half the sorties sent out would return without having encountered the enemy. During the Battle, average rates were around 90%, and several raids were met with 100% success rates. Lacking their own direction system, Luftwaffe fighters had little information on the location of their RAF counterparts, and often returned to base having never seen them. When they did, the RAF fighters were almost always in an advantageous position.
Although many histories of the Battle of Britain comment on the role of radar, it was in conjunction with the Dowding system that radar was truly effective. This was not lost on Winston Churchill, who noted that:
Development
Previous systems
To counter air raids on London during World War I, Edward Ashmore constructed a system known as the London Air Defence Area (LADA). Ashmore put defensive weapons into three rings around the city, searchlights and anti-aircraft artillery in the outer ring, fighter aircraft in the middle ring, and the innermost ring in the city contained more anti-aircraft guns. Ashmore set up a large plotting table at Horse Guards in London. Informa |
https://en.wikipedia.org/wiki/Unity%20%28user%20interface%29 | Unity is a graphical shell for the GNOME desktop environment originally developed by Canonical Ltd. for its Ubuntu operating system. It debuted in 2010 in the netbook edition of Ubuntu 10.10. Since 2017, its development was taken over by the Unity7 Maintainers (Unity7) and UBports (Lomiri, formerly known as Unity8).
Unity7 is the default desktop environment in Ubuntu Unity, an official flavor of Ubuntu since 2022. Ubuntu Unity and Unity7 Maintainers have started working on the successor of Unity7, UnityX.
It was part of the Ayatana project, an initiative with the stated intention of improving the user experience within Ubuntu. It was initially designed to make more efficient use of space given the limited screen size of netbooks, including, for example, a vertical application switcher called the launcher, and a space-saving horizontal multipurpose top menu bar. Unlike GNOME, KDE Plasma, Xfce, or LXDE, Unity is not a collection of applications. It is designed to use existing programs.
Features
The Unity user interface consists of several components:
Top menu bar: a multipurpose top bar, saving space, and containing:
the menu bar of the active application
the title bar of the main window of the active application, including the maximize, minimize and exit buttons
the session menu, including the global system settings, logout, and shut down
the diverse global notification indicators including the time, weather, and the state of the underlying system.
Launcher: a taskbar. Multiple instances of an application are grouped under the same icon, with an indicator showing how many instances are open. The user has a choice whether or not to lock an application to the launcher. If it is not locked, an application may be started using the Dash or via a separately installed menu.
Quicklist: the accessible menu of launcher items
Dash: a desktop search utility that enables searching for information both locally (e.g. installed applications, recent files, or bookmarks) and online (e.g. Twitter or Google Docs). It displays previews of the results.
Head-up display (HUD): Allows hotkey searching for top menu bar items from the keyboard, without the need for using the mouse, by pressing and releasing the Alt key.
Indicators: a notification area containing the clock, network status, battery status, and audio volume controls
Dash
Dash is a desktop search utility with preview ability. It enables searching for applications and files. Dash supports search plug-ins, known as Scopes (formerly Lenses). Out of the box, it can query Google Docs, Ubuntu One Music Store, YouTube, Amazon, and social networks (for example, Twitter, Facebook, and Google+). Starting with Ubuntu 13.10, online search queries are sent to a Canonical web service which determines the type of query and directs them to the appropriate third-party web service. Pornographic results are filtered out.
None of Ubuntu's official derivatives (Kubuntu, Xubuntu, Lubuntu, or Ubuntu GNOME) include |
https://en.wikipedia.org/wiki/Circulation%20Verification%20Council | Circulation Verification Council (CVC) is an American company which acts as an auditor to create circulation data for various periodicals. A common use of their services would be in providing demographic information about the readers of a publication so that the publishers and advertisers would be able to design content for the audience reading that specific publication.
Corporate history
Tim Bingaman founded CVC in 1992. He is currently the president and CEO.
Business model
CVC is a for-profit company.
References
External links
official site
Newspapers circulation audit |
https://en.wikipedia.org/wiki/Web%20browsing%20history | Web browsing history refers to the list of web pages a user has visited, as well as associated metadata such as page title and time of visit. It is usually stored locally by web browsers in order to provide the user with a history list to go back to previously visited pages. It can reflect the user's interests, needs, and browsing habits.
All major browsers have a private browsing mode in which browsing history is not recorded. This is to protect against browsing history being collected by third parties for targeted advertising or other purposes.
Applications
Local history
Locally stored browsing history can facilitate rediscovering lost previously visited web pages of which one only has a vague memory in mind, or pages difficult to find due to being located within deep web. Browsers also utilize it to enable autocompletion in their address bar for quicker and more convenient navigation to frequently visited pages.
The retention span of browsing history varies per internet browser. Mozilla Firefox (desktop version) records history indefinitely by default inside a file named places.sqlite, but automatically erases the earliest history upon exhausted disk space, while Google Chrome (desktop version) stores history for ten weeks by default, automatically pruning earlier entries. An indefinite history file named Archived History was once recorded, but has been removed and automatically deleted in version 37, released in September 2014.
Browser extensions such as History Trends Unlimited for Google Chrome (desktop version) allow the indefinite local storage of browsing history, exporting into a portable file, and self-analysis of browsing habits and statistics.
Browsing history is not recorded when using the private browsing mode provided by most browsers.
Targeted advertising
Targeted advertising means presenting the user with advertisements that are more relevant to one based on one's browsing history. A typical example is a user receiving advertisements on shoes when browsing other websites after searching for shoes on shopping websites. One research shows that targeted advertising doubles the conversion rate of classical online advertising.
Real-time bidding (RTB) is the method used behind targeted advertising. It is a system that automatically bids up the price for presenting advertisements on certain websites. Advertisers decide how much they are willing to pay based on the target audience of the websites. Therefore, more information about the users could encourage advertisers to pay higher prices. The information of users, such as browsing history, is provided to all firms that are involved in the bidding. Since it is a real-time process, information is usually collected without the consent of the user and transferred in unencrypted form. The user has very limited knowledge of how their information is collected, stored, and used.
The response of the user towards targeted advertising depends on whether one knows the information is be |
https://en.wikipedia.org/wiki/Monitor%20Control%20Command%20Set | Monitor Control Command Set or MCCS is a computer standard developed by Video Electronics Standards Association (VESA). It defines a binary protocol for controlling the properties of computer monitors from a host device such as PC, set-top box, etc.
MCCS requires a bidirectional communication protocol like Display Data Channel between host and display, although the specification does not favour any particular protocol.
Controls
A virtual control panel (VCP) code is a binary code that represents a single command entity in the MCCS language. Each command contains variable number of data parameters and command attributes.
The following groups of controls are defined in the standard:
Factory preset Commands for restoring factory defaults, as well as specifically restoring color, geometry, brightness/contrast, and TV settings defaults, and storing/restoring presets.
Color adjustment Commands that control color temperature, hue, and saturation.
Geometry adjustment Commands for adjusting CRT display geometry, such as parallelogram, pincushion, etc.
Image adjustment Various general commands such as display orientation, degauss, gamma, zoom, focus, brightness/contrast, backlight control, etc.
It is possible to select the input source using a VCP command. Some monitors will only take VCP commands from the active input source, others will take commands from any connected input source.
Three categories of controls exist:
Continuous (C) Allow values between zero and a maximum value.
Non-continuous (NC) Only support a limited set of values.
Table (T) Large blocks of data.
Control data may be read and write (RW), read-only (RO), or write-only (WO).
The display exposes its supported internal controls via capability strings.
Versions
The original MCCS standard version 1 was released on September 11, 1998.
MCCS Version 2 was released on October 17, 2003. A major update of the standard, it provided support for flat panel displays, VESA DPVL (Digital Packet Video Link) standard; it added a range of television controls and introduced individual control of multiple windows on a display. New classes of VCP codes associated with asset management, secondary displays (for information, status, etc.) and remote program calls to the display processor are introduced.
MCCS Version 2, Revision 1 was released on May 28, 2005 and included some minor updates, as well as clarifications and improved usability of the standard.
MCCS Version 3, released on July 27, 2006, was a major revision and update which introduced significant changes, however this revision has seen very little support from the industry.
The latest release of V2 standard is version 2.2a, adopted January 2011.
Notes
References
Computer display standards
VESA |
https://en.wikipedia.org/wiki/Charles%20Fraser%20%28businessman%29 | Sir Charles Annand Fraser (born 16 October 1928) is a Scottish businessman and former Chairman, Lothian and Borders Enterprise, Scottish Enterprise network.
Early life
The son of the Very Revd John Fraser who was Moderator of the General Assembly of the Church of Scotland 1958–59, Charles Annand Fraser was born on 16 October 1928 at Humbie in East Lothian, Scotland, and educated at the former Hamilton Academy. His father was at that time Minister at Hamilton Old Parish Church. Charles Fraser was to continue his studies at the University of Edinburgh, graduating MA and LLB.
Business career
A partner (1965 to 1992) in the Edinburgh solicitors W. & J. Burness , Fraser is a former director of British Assets Trust PLC; Scottish Media Group (formerly Scottish Television PLC); Scottish Business in the Community and Stakis PLC. He was also non-executive Vice-Chairman of United Biscuits (Holdings) between 1986 and 1995 and Chairman of the banks Morgan Grenfell (Scotland) and Adam and Company. Fraser has also served as a director of the Scottish Widows Fund, (1978–94).
Other appointments
From 1966 to 1972 Fraser served as a member of the Council of the Law Society of Scotland, and from 1969 to 1988, as Purse Bearer to the Lord High Commissioner to the General Assembly of the Church of Scotland, serving also, from 1972 to 1978, on the Court of Heriot-Watt University.
In 1991, Fraser was appointed Chairman of Lothian & Edinburgh Enterprise, part of the Scottish Enterprise network, a post he held until 1994, from which year, to 1997, he served as Chairman of the Secretary of State for Scotland's Advisory Committee on Sustainable Development. From 1997 to 2000, Fraser was also a Trustee of the World Wildlife Fund (UK).
Honours
Charles Annand Fraser was appointed LVO in 1968; CVO in 1985 and knighted, as KCVO in 1989. He was also appointed a Deputy Lieutenant for East Lothian in 1984 and elected a Fellow of the Royal Society of Edinburgh in 1993.
References
1928 births
People educated at Hamilton Academy
Alumni of the University of Edinburgh
Businesspeople awarded knighthoods
Deputy Lieutenants of East Lothian
Fellows of the Royal Society of Edinburgh
Knights Commander of the Royal Victorian Order
Scottish knights
Scottish businesspeople
Scottish bankers
Scottish solicitors
Living people |
https://en.wikipedia.org/wiki/Advent%20Vega | The Advent Vega (also known as P10AN01) is an Android-based compact tablet computer produced by Dixons Retail plc. It features a LCD touchscreen, Wi-Fi capability, a 1.0 GHz Dual-core ARM Cortex-A9 MPCore processor, and a 1.3 MP front-facing camera. The Advent Vega was released on 19 November 2010 in the UK.
Hardware
The tablet is enclosed in a black plastic body weighing a total of 700 grams (1.5 lb).
The screen has a 1024 x 600 px resolution and supports two-finger multi-touch. It has a flash internal storage of 512 MB and comes with a 4 GB microSD card which can be used to expand its storage.
Its CPU is a 1.0 GHz Dual-core ARM Cortex-A9 MPCore with 512 MB of RAM.
The tablet has a 1.3 MP front-facing camera, 802.11b/g Wi-Fi, Bluetooth 2.1 and EDR connectivity. It also has a HDMI port and USB port, but does not have a Home button and 3G connectivity.
The battery features 6.5 hours of video playback or 16 hours of audio playback time (with the screen powered off). On standby, the battery will last up to four days.
Software
The Advent Vega runs on Google's Android 2.2 Froyo operating system and was never upgraded to newer versions of Android. The installed Android version has been stripped of some functionality compared to similar tablets running on Android 2.2, most notably the absence of the pre-installed Android Market service, which was supposed to be corrected with a future update of Android. The device instead featured the Archos AppsLib store which contains over 5,000 apps.
Several custom ROMs (e.g. Corvus5, MoDaCo) were available to improve the experience on the Vega by giving access to the Android Market. Android 3.2, 4.0.4 and 4.1.2 have been successfully ported to the Advent Vega as "VegaComb", "VegaCream", and "Vegabean" by individuals in the user community, providing access to the Google Play Store, along with full hardware acceleration provided by the Tegra 2 system on a chip (SoC).
Early Impressions
The Advent Vega had good first hands-on impressions and was considered a strong rival to other tablet PCs released earlier in 2010, such as the Apple iPad and Neofonie WeTab, considering both the competitive announced price and the later generation dual-core CPU.
Advent also simultaneously released the Advent Amico, a smaller and slower version of the Advent Vega. The tablet ran on Android 2.1 and had an identical look to the Vega but with a resistive touch-screen.
Availability
The Advent Vega was added to the Currys and PC World web sites on 19 November 2010. It was also sold in Turkey under the name Exper Easypad.
In the Netherlands, as well as in other countries where Point of View operates, released their clone named Mobii 10.1".
See also
Tablet PC
References
External links
Official website – product information, manual and firmware updates
Official Twitter account
Android (operating system) devices
Tablet computers
Tablet computers introduced in 2010 |
https://en.wikipedia.org/wiki/TILEPro64 | TILEPro64 is a VLIW ISA multicore processor (Tile processor) manufactured by Tilera. It consists of a cache-coherent mesh network of 64 "tiles", where each tile houses a general purpose processor, cache, and a non-blocking router, which the tile uses to communicate with the other tiles on the processor.
The short-pipeline, in-order, three-issue cores implement a VLIW instruction set. Each core has a register file and three functional units: two integer arithmetic logic units and a load-store unit. Each of the cores ("tile") has its own L1 and L2 caches plus an overall virtual L3 cache which is an aggregate of all the L2 caches. A core is able to run a full operating system on its own or multiple cores can be used to run a symmetrical multi-processing operating system.
TILEPro64 has four DDR2 controllers at up to 800MT/s, two 10-gigabit Ethernet XAUI interfaces, two four-lane PCIe interfaces, and a "flexible" input/output interface, which can be software-configured to handle a number of protocols. The processor is fabricated using a 90 nm process and runs at speeds of 600 to 866 MHz.
According to the company, Tilera targets the chip at networking equipment, digital video, and wireless infrastructure markets where the demands for computing processing are high. More recently, Tilera has positioned this processor in the cloud computing space with an 8-processor (512-core) 2U server built by Quanta Computer.
TILEPro was supported by the Linux kernel from version 2.6.36 to version 4.16.
Technology
Various sources have stated the specifications of processors in the TILEPro family:
64 RISC processor cores
16 KB L1 instruction and 8 KB L1 data cache per core
64 KB L2 cache per core
4MB L3 cache is achieved through the sharing of other tiles L2 caches with hardware-managed coherency
90 nm manufacturing process at TSMC
4 integrated memory controllers supporting DDR2 SDRAM at up to 800MT/s
supports up to 64GB of attached DDR2 memory
Integrated high-speed I/O
Two 4-lane PCI Express Gen1 interfaces, with root or endpoint capability
Two 10Gbit/s Ethernet XAUI interfaces
Two 10/100/1000 Mbit/s Ethernet RGMII interfaces
Power consumption in the range of 19 - 23 Watts
The TILEPro family incorporates a number of enhancements over Tilera's first generation TILE64 family:
"Distributed Dynamic Cache" (DDC) system that uses a separate mesh network to manage cache-coherency
"TileDirect" I/O enables direct transfer of network data coherently into the processor caches
Double the L1 instruction cache (from 8KB to 16KB), double the L2 associativity
Memory "striping" on the DDR2 interfaces to balance the loading
Instruction set enhancements for multimedia, unaligned data access, offset load/store instructions and memory access hints
The networking software company 6WIND provides high-performance packet processing software for the TILEPro64 platform.
References
External links
Tilera Website
https://www.theregister.co.uk/2008/09/23/tilera_cpu_upg |
https://en.wikipedia.org/wiki/Tile%20processor | Tile processors for computer hardware, are multicore or manycore chips that contain one-dimensional, or more commonly, two-dimensional arrays of identical tiles. Each tile comprises a compute unit (or a processing engine or CPU), caches and a switch. Tiles can be viewed as adding a switch to each core, where a core comprises a compute unit and caches.
In a typical Tile Processor configuration, the switches in each of the tiles are connected to each other using one or more mesh networks. The Tilera TILEPro64, for example, contains 64 tiles. Each of the tiles comprises a CPU, L1 and L2 caches, and switches for several mesh networks.
Other processors in a tile configuration include SEAforth24, Kilocore KC256, XMOS xCORE microcontrollers, and some massively parallel processor arrays.
References
Central processing unit
Manycore processors |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.