source
stringlengths 32
199
| text
stringlengths 26
3k
|
|---|---|
https://en.wikipedia.org/wiki/Tube%20Time
|
Tube Time was a programming block on Comcast Digital Cable's On Demand service which featured free episodes of many classic television series owned by Sony Pictures Television.
On December 31, 2009, Tube Time was discontinued by Comcast, in preparation for the rebranding to Xfinity.
Programs Offered on Tube Time
Barney Miller
Bewitched
Carson's Comedy Classics
Charlie's Angels
Diff'rent Strokes
The Facts of Life
Fantasy Island
Gidget
I Dream of Jeannie
The Larry Sanders Show
Maude
The Monkees
Ned & Stacey
One Day at a Time
The Partridge Family
Party of Five
Sanford and Son
Silver Spoons
Soap
Square Pegs
Starsky & Hutch
S.W.A.T.
The Three Stooges
What's Happening!!
Who's the Boss?
References
Television programming blocks in the United States
|
https://en.wikipedia.org/wiki/Museum%20of%20Tropical%20Queensland
|
The Museum of Tropical Queensland (abbreviated MTQ) is part of the Queensland Museum Network and is located in Townsville, Queensland, Australia. Museum of Tropical Queensland delivers a snapshot of North Queensland with galleries telling the stories of World Heritage-listed rainforests, reefs and the tragic tale of HMS Pandora, the ship sent to capture the Bounty mutineers.
The museum also explores life in the tropics from prehistoric times to the modern-day. The diverse range of exhibitions and displays are designed to captivate audiences of all ages, focussing on natural and cultural history, biodiversity, human science and much more.
History
Museum of Tropical Queensland was first opened in 1987 along Ross Creek in Townsville’s CBD. At the time it was named “Queensland Museum, North Queensland Branch”.
It wouldn’t be until 1990 when it officially adopted the name "Museum of Tropical Queensland" to reflect the museum’s focus on researching and interpreting the cultural and natural heritage of tropical Queensland.
Due to the strong interest in the HMS Pandora expeditions (one of Australia’s most significant shipwrecks) and widespread support from the Townsville community, the Pandora Foundation and government, fundraising efforts ensured the development of a new purpose-built museum on the site of the original, to house and display the artefacts that were recovered from the Pandora wreck site.
In 2000, the new museum was opened which included a 1:1 replica of the bow of the Pandora as homage to the wreck, a dedicated Pandora Gallery and additional two levels of galleries and exhibition spaces. The museum also became home to extensive coral, biodiversity, maritime and cultural collections that now form part of the State Collection of Queensland.
Research
Scientists in the museum have gained international recognition in various fields, particularly those with marine themes.
Maritime archaeology
Queensland Museum Network’s maritime archaeology collection holds over 8,000 artefacts from approximately 25 shipwrecks along the Queensland coast and Great Barrier Reef.
A significant portion relates to the excavated artefacts from the maritime archaeological excavation of HMS Pandora,(1779) shipwreck. As well as other notable sites like Foam (1893), Scottish Prince (1887), HMCS Mermaid (1829) and SS Yongala (1911). Museum of Tropical Queensland houses artefacts recovered from the wreck of Pandora, one of the most significant wrecks in Australian waters. The Pandora sank off the coast of north Queensland in 1791 after capturing some of the participants in the infamous mutiny on the Bounty.
The museum has a broad research focus for maritime archaeology. Primarily, the focus is on understanding the collection and learning more about shipwrecks through the material culture we hold.
Led by Dr Maddy McAllister, current research focuses on the unidentified shipwrecks within the collection: the shipwrecks that have been found but their name and identi
|
https://en.wikipedia.org/wiki/Guduvancheri
|
Guduvancheri is a suburb located to the south of Chennai city, Tamil Nadu, India. It has a railway station on the Chennai Beach–Chengalpattu section of the Chennai Suburban Railway Network and is a municipality in Chengalpattu district, Tamil Nadu, India. It is also part of the Vandalur taluk and lies in the southern part of Chennai metropolitan area. It has a lake known as the Guduvancheri lake and Nandivaram lake. It serves as the connecting hub between Chennai and Chengalpattu. It also lies on the major highway connecting Chennai with Kanyakumari, the southernmost point of the state and the country.
Transportation
By Rail
Guduvancheri is served by Guduvancheri railway station of Chennai suburban railway.
By Bus
Guduvancheri is well connected with roads. The National Highway 45 passes through this place. Guduvancheri is served by Guduvancheri bus stand which connects Chennai by Chennai metropolitan Transport Service buses and also connects various parts of Tamil Nadu by TNSTC buses.
Demographics
According to the 2011 census, Guduvancheri's population was 46,575.
See also
Potheri
SRM Institute of Science and Technology
Valliammai Engineering College
Kattankulathur
Urapakkam
References
External links
Avadi Guduvanchery Rail line
Guduvanchery Rail line project is urged
Cities and towns in Chengalpattu district
Suburbs of Chennai
|
https://en.wikipedia.org/wiki/Frogger%20%281997%20video%20game%29
|
Frogger, also called Frogger: He's Back!, is an action video game remake and expansion of Konami's 1981 Frogger arcade game. It was developed by Sony Computer Entertainment's SCE Cambridge Studio and published by Hasbro Interactive in November 1997 for PlayStation and Windows. It has large maps, 3D graphics, and new gameplay moves. Critical reaction was mixed, with frequent criticism of the gameplay, controls, and difficulty, but the graphics were received positively. It was a commercial success, becoming one of the best-selling PlayStation games.
In 2000, its gameplay elements were expanded in the sequel Frogger 2: Swampy's Revenge.
Gameplay
Like the original game, the objective is to explore the map for five small colored frogs: green, orange, purple, blue and red. However, unlike the original game the maps are more complex, rather than recycling the same basic layout each time. Each frog must be collected within a certain amount of time or the player will lose a life, and on top of this, there are various obstacles, traps and enemies which must be avoided and usually are unique to a certain zone. Hazards range from animals like bees, snakes, tarantulas and dogs to vehicles like cars and lawn mowers to level hazards like water, cacti and lava. There is also a gold frog hidden in one level in each zone; the player will unlock a new zone for each gold frog that is found. Finding every gold frog in the game will unlock an alternate ending sequence. There are a total of 33 levels spread out through nine different zones, with the first zone including five levels (and a multiplayer level) based on the original arcade version of the game.
The player begins with five lives (three on the PlayStation version). Should a player lose a life, they return to the starting point of the level. Frogger's new abilities include being able to eat flies of various types, croak, and jump upwards onto ledges to take advantage of the 3D perspective. Flies and croaking tend to add to the player's score, though select insects allow Frogger to speed up, lengthen his tongue, or earn an extra life.
Up to four players can play simultaneously in a race to complete each level. Frogger has 38 total levels, with 33 of those being single-player levels.
Reception
Sales
The game was a commercial success. By early 1998, it had sold nearly units in North America. Worldwide, the game sold 4 million units by May 2000. The PlayStation version sold 3.37 million units in North America, resulting in the game being one of the best-selling PlayStation titles of all time and subsequently seeing a re-release on the Sony's Greatest Hits lineup. The PC version was also successful, selling almost one million copies within less than four months.
, Frogger has sold units worldwide. In the United States, Froggers jewel case version for computers sold 510,000 copies and earned $4.3 million by August 2006, after its release in October 2000. It was the country's 27th best-selling computer game
|
https://en.wikipedia.org/wiki/Decision%20tree%20pruning
|
Pruning is a data compression technique in machine learning and search algorithms that reduces the size of decision trees by removing sections of the tree that are non-critical and redundant to classify instances. Pruning reduces the complexity of the final classifier, and hence improves predictive accuracy by the reduction of overfitting.
One of the questions that arises in a decision tree algorithm is the optimal size of the final tree. A tree that is too large risks overfitting the training data and poorly generalizing to new samples. A small tree might not capture important structural information about the sample space. However, it is hard to tell when a tree algorithm should stop because it is impossible to tell if the addition of a single extra node will dramatically decrease error. This problem is known as the horizon effect. A common strategy is to grow the tree until each node contains a small number of instances then use pruning to remove nodes that do not provide additional information.
Pruning should reduce the size of a learning tree without reducing predictive accuracy as measured by a cross-validation set. There are many techniques for tree pruning that differ in the measurement that is used to optimize performance.
Techniques
Pruning processes can be divided into two types (pre- and post-pruning).
Pre-pruning procedures prevent a complete induction of the training set by replacing a stop () criterion in the induction algorithm (e.g. max. Tree depth or information gain (Attr)> minGain). Pre-pruning methods are considered to be more efficient because they do not induce an entire set, but rather trees remain small from the start. Prepruning methods share a common problem, the horizon effect. This is to be understood as the undesired premature termination of the induction by the stop () criterion.
Post-pruning (or just pruning) is the most common way of simplifying trees. Here, nodes and subtrees are replaced with leaves to reduce complexity. Pruning can not only significantly reduce the size but also improve the classification accuracy of unseen objects. It may be the case that the accuracy of the assignment on the train set deteriorates, but the accuracy of the classification properties of the tree increases overall.
The procedures are differentiated on the basis of their approach in the tree (top-down or bottom-up).
Bottom-up pruning
These procedures start at the last node in the tree (the lowest point). Following recursively upwards, they determine the relevance of each individual node. If the relevance for the classification is not given, the node is dropped or replaced by a leaf. The advantage is that no relevant sub-trees can be lost with this method.
These methods include Reduced Error Pruning (REP), Minimum Cost Complexity Pruning (MCCP), or Minimum Error Pruning (MEP).
Top-down pruning
In contrast to the bottom-up method, this method starts at the root of the tree. Following the structure below, a relevance c
|
https://en.wikipedia.org/wiki/Adam%20Chandler
|
Adam Chandler is a fictional character from the ABC and The Online Network daytime drama All My Children, portrayed by David Canary from the autumn of 1983 through his departure on April 23, 2010, and briefly reprising the role for the series' final weeks on ABC in September 2011. Canary also appeared several different times on One Life to Live. Adam Chandler was one of the most devious and powerful individuals within the town of Pine Valley, Pennsylvania. He is a member of the powerful and wealthy Chandler family, residing at the Chandler Mansion (300 River Road).
Adam has been one of Pine Valley's most frequently married characters, but his most significant relationships have been with his sunny-natured autistic twin Stuart, and his long-time business rival Palmer Cortlandt; although the feud quieted down when Palmer's appearances within the show significantly decreased.
Five of Adam's eight children have survived into adulthood; Skye Chandler Quartermaine, Hayley Vaughan Santos, JR Chandler, Miguel Reyes, and Colby Chandler. Through them, he has three grandchildren; Lila Rae Alcazar (Skye's daughter), Enzo Santos (Hayley's son), and AJ Chandler (JR's son). Alcoholism seems to run in the Chandler family, affecting Skye, Hayley and JR; Colby briefly followed the same path. His son JR was estranged from Adam because of his marriage to Annie Novak, and he started an affair with Annie to break up his father's marriage. This led to Adam Chandler leaving Pine Valley permanently (it is believed) in April 2010, to be with former wife Brooke English. After leaving town, Adam had his attorney and another ex-wife, Liza, serve Annie divorce papers.
Recognized beyond fiction, Adam has been cited by scholars as one of the "most powerful male figures in television," as well as one of its most complex villains, said to "combine ruthlessness in business and love with wit and sometimes true tenderness."
Notes and references
Further reading
External links
Adam Chandler's Character Bio from ABC.com
Adam Chandler from soapcentral.com
Adam Chandler at All My Children Blog
All My Children characters
Fictional criminals in soap operas
Fictional bartenders
Fictional business executives
Fictional socialites
Male villains
American male characters in television
Television characters introduced in 1983
Fictional characters from West Virginia
Fictional identical twins
Fictional twins
Fictional businesspeople
Crossover characters in television
|
https://en.wikipedia.org/wiki/Shadow%20%28OS/2%29
|
In the graphical Workplace Shell (WPS) of the OS/2 operating system, a shadow is an object that represents another object.
A shadow is a stand-in for any other object on the desktop, such as a document, an application, a folder, a hard disk, a network share or removable medium, or a printer. A target object can have an arbitrary number of shadows. When double-clicked, the desktop acts the same way as if the original object had been double-clicked. The shadow's context menu is the same as the target object's context menu, with the addition of an "Original" sub-menu, that allows the location of, and explicit operation upon, the original object.
A shadow is a dynamic reference to an object. The original may be moved to another place in the file system, without breaking the link. The WPS updates shadows of objects whenever the original target objects are renamed or moved. To do this, it requests notification from the operating system of all file rename operations. (Thus if a target filesystem object is renamed when the WPS is not running, the link between the shadow and the target object is broken.)
Similarities to and differences from other mechanisms
Shadows are similar in operation to aliases in Mac OS, although there are some differences:
Shadows in the WPS are not filesystem objects, as aliases are. They are derived from the WPAbstract class, and thus their backing storage is the user INI file, not a file in the file system. Thus shadows are invisible to applications that do not use the WPS API.
The WPS has no mechanism for re-connecting shadows when the link between them and the target object has been broken. (Although where the link has been broken because target objects are temporarily inaccessible, restarting the WPS after the target becomes accessible once more often restores the link.)
Shadows are different from symbolic links and shortcuts because they are not filesystem objects, and because shadows are dynamically updated as target objects are moved.
Shadows are different from hard links because unlike hard links they can cross volume boundaries and because their names are always the same as those of their target objects.
Distinguishing marks
On (and within nested folders on) the WPS desktop, shadows' "icon titles" can be set to one's preferred font color, independently of the preferred font-color assigned to other non-shadow WPS objects, although they share the font actually selected for that text.
Like the icons for all other 'open' objects on the WPS Desktop, whether for folders or applications, Shadows' icons become diagonally hatched on 'opening' and remain in that state until closed/exited respectively.
Managing shadows
There are several ways to create a shadow. One way is to select the target object and choose "Create Shadow" from its context menu. The desktop then prompts with a dialogue box allowing the user to specify where the shadow should be created. Another way is to employ drag-and-drop to create s
|
https://en.wikipedia.org/wiki/Dynamic%20program%20analysis
|
Dynamic program analysis is analysis of computer software that involves executing the program in question (as opposed to static program analysis, which does not). Dynamic program analysis includes familiar techniques from software engineering such as unit testing, debugging, and measuring code coverage, but also includes lesser-known techniques like program slicing and invariant inference. Dynamic program analysis is widely applied in security in the form of runtime memory error detection, fuzzing, dynamic symbolic execution, and taint tracking.
For dynamic program analysis to be effective, the target program must be executed with sufficient test inputs to cover almost all possible outputs. Use of software testing measures such as code coverage helps increase the chance that an adequate slice of the program's set of possible behaviors has been observed. Also, care must be taken to minimize the effect that instrumentation has on the execution (including temporal properties) of the target program. Dynamic analysis is in contrast to static program analysis. Unit tests, integration tests, system tests and acceptance tests use dynamic testing.
Types of dynamic analysis
Code coverage
Computing the code coverage according to a test suite or a workload is a standard dynamic analysis technique.
Gcov is the GNU source code coverage program.
VB Watch injects dynamic analysis code into Visual Basic programs to monitor code coverage, call stack, execution trace, instantiated objects and variables.
Dynamic testing
Dynamic testing involves executing a program on a set of test cases.
Memory error detection
AddressSanitizer: Memory error detection for Linux, macOS, Windows, and more. Part of LLVM.
BoundsChecker: Memory error detection for Windows based applications. Part of Micro Focus DevPartner.
Dmalloc: Library for checking memory allocation and leaks. Software must be recompiled, and all files must include the special C header file dmalloc.h.
Intel Inspector: Dynamic memory error debugger for C, C++, and Fortran applications that run on Windows and Linux.
Purify: Mainly memory corruption detection and memory leak detection.
Valgrind: Runs programs on a virtual processor and can detect memory errors (e.g., misuse of malloc and free) and race conditions in multithread programs.
Fuzzing
Fuzzing is a testing technique that involves executing a program on a wide variety of inputs; often these inputs are randomly generated (at least in part). Gray-box fuzzers use code coverage to guide input generation.
Dynamic symbolic execution
Dynamic symbolic execution (also known as DSE or concolic execution) involves executing a test program on a concrete input, collecting the path constraints associated with the execution, and using a constraint solver (generally, an SMT solver) to generate new inputs that would cause the program to take a different control-flow path, thus increasing code coverage of the test suite. DSE can considered a type of fuzzi
|
https://en.wikipedia.org/wiki/EMule
|
eMule is a free peer-to-peer file sharing application for Microsoft Windows. Started in May 2002 as an alternative to eDonkey2000, eMule now connects to both the eDonkey network and the Kad network. The distinguishing features of eMule are the direct exchange of sources between client nodes, fast recovery of corrupted downloads, and the use of a credit system to reward frequent uploaders. Furthermore, eMule transmits data in zlib-compressed form to save bandwidth.
eMule is coded in C++ using the Microsoft Foundation Classes. Since July 2002 eMule has been free software, released under the GNU General Public License; its popularity has led to eMule's codebase being used as the basis of cross-platform clients aMule, JMule, xMule, along with the release of many eMule mods (modifications of the original eMule) on the Internet.
it is the fifth most downloaded project on SourceForge, with over 693 million downloads.
Development was later restarted by the community as eMule Community; the latest stable version is 0.70a.
History
The eMule project was started on May 13, 2002 by Hendrik Breitkreuz (also known as Merkur) who was dissatisfied with the original eDonkey2000 client. Over time more developers joined the effort. The source was first released at version 0.02 and published on SourceForge on July 6, 2002.
eMule was first released as a binary on August 4, 2002 at version 0.05a. The 'Credit System' was implemented for the first time on September 14, 2002 in version 0.19a. The eMule project website started up on December 8, 2002.
Current versions (v0.40+) of eMule have added support for the Kad network. This network has an implementation of the Kademlia protocol, which does not rely on central servers as the eDonkey network does, but is an implementation of a distributed hash table.
Also added in recent versions were the ability to search using unicode, allowing for searches for files in non-Latin alphabets, and the ability to search servers for files with complete sources of unfinished files on the eDonkey network.
In new versions, a "Bad source list" was added. The application adds an IP address to this list after one unsuccessful connection. After adding an IP to the "Bad source list", the application treats this IP as a "dead" IP. Unavailable IPs are banned for a time period from 15 to 45 minutes. Some users have complained that it leads to a loss of active sources and subsequently slows download speed.
Other recent additions include: the ability to run eMule from a user account with limited privileges (thus enhancing security), and AICH (so that a corrupted chunk does not need to be re-downloaded entirely).
The 0.46b version added the creation and management of "eMule collection" files, which contain a set of links to files intended to be downloaded as a set.
From 2007, many ISPs have used bandwidth throttling for usual P2P ports, resulting in slow performances. The 0.47b version adds protocol obfuscation and eMule will automatically
|
https://en.wikipedia.org/wiki/AgMES
|
The AgMES (Agricultural Metadata Element set) initiative was developed by the Food and Agriculture Organization (FAO) of the United Nations and aims to encompass issues of semantic standards in the domain of agriculture with respect to description, resource discovery, interoperability, and data exchange for different types of information resources.
There are numerous other metadata schemas for different types of information resources. The following list contains a list of a few examples:
Document-like Information Objects (DLIOs): Dublin Core, Agricultural Metadata Element Set (AgMES)
Events: VCalendar
Geographic and Regional Information: Geographic information—Metadata ISO/IEC 11179 Standards
Persons: Friend-of-a-friend (FOAF), vCard
Plant Production and Protection: Darwin Core (1.0 and 2.0) (DwC)
AgMES as a namespace is designed to include agriculture specific extensions for terms and refinements from established standard metadata namespaces like Dublin Core, AGLS etc. Thus, to be used for Document-like Information Objects, for example like publications, articles, books, web sites, papers, etc., it will have to be used in conjunction with the standard namespaces mentioned before. The AgMES initiative strives to achieve improved interoperability between information resources in agricultural domain by enabling means for exchange of information.
Describing a DLIO with AgMES means exposing its major characteristics and contents in a standard way that can be reused easily in any information system. The more institutions and organizations in the agricultural domain that use AgMES to describe their DLIOs, the easier it will be to interchange data in between information systems like digital libraries and other repositories of agricultural information.
Use of AgMES
Metadata on agricultural Document-like Information Objects (DLIOs) can be created and stored in various formats:
embedded in a web site (in the manner as with the HTML meta tag)
in a separate metadata database
in an XML file
in an RDF file
AgMES defines elements that can be used to describe a DLIO that can be used together with other metadata standards such as the Dublin Core, the Australian Government Locator Service. A complete list of all elements, refinements and schemes endorsed by AgMES is available from the AgMES website.
Creating application profiles
Application profiles are defined as schemas which consist of data elements drawn from one or more namespaces, combined by implementers, and optimized for a particular local application. Application profiles share the following four characteristics:
They draw upon existing pool of metadata definition standards to extract suitable application- or requirement oriented elements.
An application profile cannot create new elements.
Application profiles specify the application specific details such as the schemes or controlled vocabularies. An application profile also contains information such as the format for the element val
|
https://en.wikipedia.org/wiki/Recovery%20Console
|
The Recovery Console is a feature of the Windows 2000, Windows XP and Windows Server 2003 operating systems. It provides the means for administrators to perform a limited range of tasks using a command-line interface.
Its primary function is to enable administrators to recover from situations where Windows does not boot as far as presenting its graphical user interface. The recovery console is used to provide a way to access the hard drive in an emergency through the command prompt.
The Recovery Console can be accessed in two ways, either through the original installation media used to install Windows, or by installing it onto the hard drive and adding it to the NTLDR menu. However, the latter option is much more risky than the former one because it requires that the computer can boot to the point that NTLDR loads, or else the Recovery Console will not work at all.
Abilities
The Recovery Console has a simple command-line interpreter (or CLI). Many of the available commands closely resemble the commands that are normally available in cmd.exe, namely attrib, copy, del, and so forth.
From the Recovery Console an administrator can:
create and remove directories, and copy, erase, display, and rename files
enable and disable services (which modifies the service control database in the registry, to take effect when the system is next bootstrapped)
repair boot file, using the bootcfg command
write a new master boot record to a disk, using the fixmbr command
write a new volume boot record to a volume, using the fixboot command
format volumes
expand files from the compressed format in which they are stored on the installation CD-ROM
perform a full chkdsk scan to repair corrupted disks and files, especially if the computer cannot be started properly
Filesystem access on the Recovery Console is by default severely limited. An administrator using the Recovery Console has only read-only access to all volumes except for the boot volume, and even on the boot volume only access to the root directory and to the Windows system directory (e.g. \WINNT). This can be changed by changing Security Policies to enable read/write access to the complete file system including copying files from removable media (i.e. floppy drives).
Commands
The following is a list of the Recovery Console internal commands:
attrib
batch
bootcfg (introduced in Windows XP)
cd
chdir
chkdsk
cls
copy
del
delete
dir
disable
diskpart
enable
exit
expand
fixboot
fixmbr
format
help
listsvc
logon
map
md
mkdir
more
rd
ren
rename
rmdir
set (introduced in Windows XP)
systemroot
type
Although it appears in the list of commands available by using the help command, and in many articles about the Recovery Console (including those authored by Microsoft), the net command is not available. No protocol stacks are loaded, so there is no way to connect to a shared folder on a remote computer as implied.
See also
Emergency Repair Disk
Comparison of command s
|
https://en.wikipedia.org/wiki/Seren
|
Seren may refer to:
Seren (name)
Seren Books, a Welsh publishing house
Seren Network, a Welsh educational organisation to assist high-achieving sixth form students
Seren, a lord of the Biblical Philistines
Seren, an Israel Defense Forces rank
Seren, a student newspaper published by Bangor University Students' Union
See also
Seren taun, an annual traditional Sundanese rice harvest festival and ceremony
|
https://en.wikipedia.org/wiki/Rethink%20Mental%20Illness
|
Rethink Mental Illness improves the lives of people severely affected by mental illness through their networks of local groups and services, information and campaigns. Their goal is to make sure everyone severely affected by mental illness has a good quality of life .
The organisation was founded in 1972 by John Pringle whose son was diagnosed with schizophrenia. The operating name of 'Rethink' was adopted in 2002, and expanded to 'Rethink' Mental Illness' (to be more self-explanatory) in 2011, but the charity remains registered as the National Schizophrenia Fellowship, although it no longer focuses only on schizophrenia.
Rethink Mental Illness now has over 8,300 members, who receive a regular magazine called Your Voice. The charity states that it helps 48,000 people every year, and is for caregivers as well as those with a mental disorders. It provides services (mainly community support, including supported housing projects), support groups, and information through a helpline and publications. The Rethink Mental Illness website receives almost 300,000 visitors every year. Rethink Mental Illness carries out some survey research which informs both their own and national mental health policy, and it actively campaigns against stigma and for change through greater awareness and understanding. It is a member organisation of EUFAMI, the European Federation of Families of People with Mental Illness.
History
John Pringle published an anonymous article in The Times on 9 May 1970, describing the ways that his son's schizophrenia diagnosis had affected his family, and what his experience caring for his son was like. This article and the support it gathered was the starting point for the National Schizophrenia Fellowship, which was founded by Pringle in 1972.
In its early days, the National Schizophrenia Fellowship acted as a support group and charity for individuals caring for loved ones diagnosed with schizophrenia. The organization was more robust than previous charities and support organizations, because of its emphasis on helping its constituents understand more about mental health, seek out community for people affected by schizophrenia, and look after their own mental health while caring for loved ones affected by mental illness.
The National Schizophrenia Fellowship was instrumental in promoting the new early psychosis paradigm in 1995 when they linked with an early psychosis network in the West Midlands, called IRIS (Initiative to reduce impact of schizophrenia). This then led to the Early Psychosis Declaration by the World Health Organization and the subsequent formation of early psychosis services as part of mainstream health policy.
In 2002, the organization rebranded itself as Rethink to reflect its expanded focus on mental health, before later rebranding to Rethink Mental Illness in 2011.
Rethink commissioned a controversial statue of Sir Winston Churchill in a straitjacket, which was unveiled in The Forum building in Norwich on 11 M
|
https://en.wikipedia.org/wiki/Windows%20NT%20processor%20scheduling
|
Windows NT processor scheduling refers to the process by which Windows NT determines which job (task) should be run on the computer processor at which time. Without scheduling, the processor would give attention to jobs based on when they arrived in the queue, which is usually not optimal. As part of the scheduling, the processor gives a priority level to different processes running on the machine. When two processes are requesting service at the same time, the processor performs the jobs for the one with the higher priority.
There are six named priority levels:
Realtime
High
Above Normal
Normal
Below Normal
Low
These levels have associated numbers with them. Applications start at a base priority level of eight. The system dynamically adjusts the priority level to give all applications access to the processor.
Priority levels 0 - 15 are used by dynamic applications. Priority levels 16- 31 are reserved for real-time applications.
Affinity
In a multiprocessing environment with more than one logical processor (i.e. multiple cores or hyperthreading), more than one task can be running at the same time. However, a process or a thread can be set to run on only a subset of the available logical processors. The Windows Task Manager utility offers a user interface for this at the process level.
References
Windows NT kernel
Processor scheduling algorithms
|
https://en.wikipedia.org/wiki/Sins%20of%20a%20Solar%20Empire
|
Sins of a Solar Empire is a 2008 science fiction real-time strategy video game developed by Ironclad Games and published by Stardock Entertainment for Microsoft Windows operating systems. It is a real-time strategy (RTS) game that incorporates some elements from 4X games; its makers describe it as "RT4X". Players are given control of a spacefaring empire in the distant future, and are tasked with conquering star systems using military, economic and diplomatic means.
The game was released on February 4, 2008, receiving positive reviews and multiple awards from the gaming press. Its first content expansion, titled Entrenchment, was released as a download on February 25, 2009, and its second content expansion, titled Diplomacy, was released as a download on February 9, 2010. A package combining the original game with the first two expansions was released at that time, with the title Sins of a Solar Empire: Trinity. A third expansion, the stand-alone Rebellion, was released in June 2012.
A sequel to the game, Sins of a Solar Empire II was announced on September 16, 2022.
Gameplay
Sins of a Solar Empire is a space-bound real-time strategy game in which players control one of three different races: the industrial TEC, the psychic Advent, or the alien Vasari. The playing field is a 3D web of planets and other celestial objects in the orbital plane of one or more stars. The game features a sandbox mode, allowing the player to choose different types of solar systems to unlock achievements. Players can conquer neighboring planets and explore distant star systems in a "massively scaled, fully 3D environment featuring entire galaxies, orbiting planets, clusters of asteroids, space dust and radiant stars." Notably, there is no single-player campaign mode, but games can be played against AI opponents offline and other players online. Ironclad Director Blair Fraser asserted that the game's Iron Engine is specially designed with technologies that allow it to handle very large differences in size, scale, and distance.
Resources and structures
Sins of a Solar Empire has three main resources to gather: Credits, Metal, and Crystal. Credits are the general currency used by the three races in the game, and are gained by completing missions, collecting bounties, creating a trade network, and taxing planets. Metal is the most common resource in the game, and is gathered by building extractors on metallic asteroids; it is used to construct basic ships and structures. Crystal is the rarest resource, which can be mined from asteroids like Metal; it is used for developing new technologies and building certain advanced ships. A Black Market feature allows players to convert unneeded Metal and Crystal into Credits or vice versa. Selling or buying too much of either resource can cause market prices to rise and fall dramatically.
Certain more intangible resources include Supply Points and Capital Ship Crews. Supply Points are used up when ships are purchased, and cannot be
|
https://en.wikipedia.org/wiki/Asia%20Vision%20%28TV%20network%29
|
The Asia Vision Television Network is a small multicultural/ethnic television network with affiliate TV stations in three Mid-Atlantic states. The stations are WIAV-LD channel 58, in Washington, D.C. (the flagship station) and WQAV-CD, channel 34 in Glassboro, New Jersey. Also formerly part of the network was WRAV-LP, channel 8 in Ocean City, Maryland, whose license was cancelled by the Federal Communications Commission on October 2, 2020. The network is similar to ImaginAsian in its programming. AsiaVision, Inc. is the sole owner and operator of its affiliate TV stations.
Television networks in the United States
Television channels and stations established in 1989
|
https://en.wikipedia.org/wiki/Split-C
|
Split-C is a parallel extension of the C programming language. The Split-C project website describes Split-C as:
a parallel extension of the C programming language that supports efficient access to a global address space on current distributed memory multiprocessors. It retains the "small language" character of C and supports careful engineering and optimization of programs by providing a simple, predictable cost model.
Development of Split-C appears to be at a standstill since 1996. Split-C is similar to Cilk.
Notes
References
Krishnamurthy, A., Culler, D. E., Dusseau, A., Goldstein, S. C., Lumetta, S., von Eicken, T., and Yelick, K. 1993. Parallel programming in Split-C. In Proceedings of the 1993 ACM/IEEE Conference on Supercomputing (Portland, Oregon, United States). Supercomputing '93. ACM Press, New York, NY, 262-273. http://doi.acm.org/10.1145/169627.169724, http://www.eecs.berkeley.edu/Research/Projects/CS/parallel/castle/split-c/split-c.tr.html
External links
Parallel Programming in Split-C
Introduction to Split-C
Concurrent programming languages
C programming language family
|
https://en.wikipedia.org/wiki/Hans%20Meuer
|
Hans Meuer was a professor of computer science at the University of Mannheim, managing director of Prometeus GmbH and general chair of the International Supercomputing Conference. In 1986, he became co-founder and organizer of the first Mannheim Supercomputer Conference, which has been held annually but known as the International Supercomputing Conference since 2001.
Meuer served as specialist, project leader, group and department chief during his 11 years at the Jülich Research Centre, Germany. For the following 33 years, he was director of the computer center and professor for computer science at the University of Mannheim, Germany. Since 1998 - 2013, he was the managing director of Prometeus GmbH, a company that runs a series of conferences in fields closely associated with high performance computing.
Meuer studied mathematics, physics and politics at the universities of Marburg, Giessen and Vienna. In 1972, he received his doctorate in mathematics from the Rheinisch Westfälische Technical University (RWTH) of Aachen. Since 1974, he was professor of mathematics and computer science at the University of Mannheim with specialization in software engineering. For more than 20 years, he has been involved intensively in the areas of supercomputing/parallel computing.
In 1993, Meuer started the TOP500 initiative together with Erich Strohmaier, Horst Simon and Jack Dongarra.
References
External links
Hans Meuer's Homepage
The International Supercomputing Conference Homepage
ISC Conference Series
German computer scientists
1936 births
2014 deaths
RWTH Aachen University alumni
Academic staff of the University of Mannheim
|
https://en.wikipedia.org/wiki/Distributed%20design%20patterns
|
In software engineering, a distributed design pattern is a design pattern focused on distributed computing problems.
Classification
Distributed design patterns can be divided into several groups:
Distributed communication patterns
Security and reliability patterns
Event driven patterns
Examples
MapReduce
Bulk synchronous parallel
Remote Session
See also
Software engineering
List of software engineering topics
References
Software design patterns
Distributed computing architecture
|
https://en.wikipedia.org/wiki/Disinformation%20%28TV%20series%29
|
Disinformation, also known as Disinfo Nation, is a television show hosted by Richard Metzger. It was aired for two seasons on Channel 4 in the UK as part of their late night "4Later" programming block. Called a "punk rock 60 Minutes" and "wilder than Jackass" by the Los Angeles Times and Wired magazine respectively, the sixteen 30-minute episodes produced for C4 (and several segments never aired in the UK) were then cut down to four one-hour "specials" intended for the Sci Fi Channel in America, but never aired due to the controversial nature of what was portrayed on screen. According to interviews Metzger was told just twelve days prior to the first specials' air-date that he would have to cut 50% of the material from the show in order to pass the USA Network's corporate lawyers' scrutiny. Those four shows have subsequently been released on a DVD with a second bonus disc presenting highlights of The DisinfoCon, a twelve-hour event featuring shock rocker Marilyn Manson, underground filmmaker Kenneth Anger, painter Joe Coleman, and others such as Douglas Rushkoff, Mark Pesce, Grant Morrison, Brother Theodore, and Robert Anton Wilson.
References
External links
Disinformation at the BFI Film & TV Database
2000 British television series debuts
2001 British television series endings
Channel 4 original programming
|
https://en.wikipedia.org/wiki/Clinton%20Haines
|
Clinton 'Clint' Haines (10 April 1976 – 10 April 1997 in St Lucia, Queensland, Australia) was an Australian computer hacker. He was also known as Harry McBungus, TaLoN and Terminator-Z.
Haines attended Ipswich Grammar School. He wrote his first computer virus in assembly language using the A86 assembler in the early 1990s.
Haines was responsible for the viruses NoFrills, Dudley, X-Fungus/PuKE, Daemaen and 1984. NoFrills infected the Australian Tax Office (ATO). It was described by anti-virus company manager Len Grooves as "totally unimpressive". Grooves added: "This is a very average virus...It could have been written by any first-year computer student. In fact, it had serious design faults and programming bugs. I would not hire the writer." Nevertheless, the ATO decided to turn off all of its 15,000 computers until the virus was eradicated, to avoid the infection spreading.
His virus Dudley also infected the computers of Telstra (then called Telecom Australia), shutting down their system in two hours. The Dudley virus was a variant of the No Frills code with the text [Oi Dudley!][PuKE].
Haines died from a heroin overdose in 1997, in St Lucia, Brisbane, celebrating his 21st birthday. At the time of his death he was completing an undergraduate science degree in microbiology at the University of Queensland. A computer virus was written in his honour (RIP Terminator-Z by VLAD). The virus, named 'Memorial', pays acknowledgement to Haines by placing a message on an infected user's screen.
References
1976 births
1997 deaths
Deaths by heroin overdose in Australia
Hackers
People from Brisbane
Accidental deaths in Queensland
|
https://en.wikipedia.org/wiki/JCSS
|
JCSS is an acronym that may refer to
Japan Calibration Service System
Jesus Christ Superstar - a musical and film adaptation
Journal of Computer and System Sciences
Joint Committee on Structural Safety
|
https://en.wikipedia.org/wiki/ANIMAL%20%28image%20processing%29
|
ANIMAL (first implementation: 1988 - revised: 2004) is an interactive environment for image processing that is oriented toward the rapid prototyping, testing, and modification of algorithms. To create ANIMAL (AN IMage ALgebra), XLISP of David Betz was extended with some new types: sockets, arrays, images, masks, and drawables.
The theoretical framework and the implementation of the working environment is described in the paper "ANIMAL: AN IMage ALgebra".
In the theoretical framework of ANIMAL a digital image is a boundless matrix with its history. However, in the implementation it is bounded by a rectangular region in the discrete plane and the elements outside the region have a constant value. The size and position of the region in the plane (focus) is defined by the coordinates of the rectangle. In this way all the pixels, including those on the border, have the same number of neighbors (useful in local operators, such as digital filters). Furthermore, pixelwise commutative operations remain commutative on image level, independently on focus (size and position of the rectangular regions). The history is a list which tracks the operations and parameters applied to the matrix. This mechanism is useful to document algorithms and generate new functions.
ANIMAL has been ported to R, a freely available language and environment for statistical computing and graphics. The new implementation is free and is used in a recent book to illustrate the use of template matching techniques in computer vision (see the preface of the book code companion).
References
Computer vision software
Image processing software
|
https://en.wikipedia.org/wiki/Application%20profile
|
In the information sciences, an application profile consists of a set of metadata elements, policies, and guidelines defined for a particular application.
The elements may come from one or more element sets, thus allowing a given application to meet its functional requirements by using metadata from several element sets - including locally defined sets. For example, a given application might choose a subset of the Dublin Core that meets its needs, or may include elements from the Dublin Core, another element set, and several locally defined elements, all combined in a single schema. An application profile is not complete without documentation that defines the policies and best practices appropriate to the application. As another example, the legal document standard Akoma Ntoso is universal scope and very flexible, which creates the risk of ambiguous representations. Therefore, when AKN is to be used in a local domain, it can be advisable to reduce the overall flexibility and complexity by specifying a uniform usage of a subset of AKN XML elements for the given use case.
Advantages
Defines an application-appropriate set of properties in a public and communicable manner. This permits the building of loosely coupled systems (i.e. independent of each other's detailed specifications) that still offer powerful capabilities.
Disadvantages
Narrow application scope, which may limit a profile's widespread applicability and also limits the likely synergy from re-use of tools from other projects outside that scope.
Compared to the Dublin Core refinement approach (where a core property set may be made more specific, in a backwards-compatible manner), use of application profiles requires that applications must at least recognise these profiles and their roots. Even if the profile is based simply on Dublin Core, which the application already understands, this is of no use unless the application also recognises that this profile is treatable as Dublin Core.
Example profiles
Bath Profile
An International Z39.50 Specification for Library Applications and Resource Discovery
e-GMS
the UK e-Government Metadata Standard. An application profile of Dublin Core.
References
Metadata
|
https://en.wikipedia.org/wiki/Application%20lifecycle%20management
|
Application lifecycle management (ALM) is the product lifecycle management (governance, development, and maintenance) of computer programs. It encompasses requirements management, software architecture, computer programming, software testing, software maintenance, change management, continuous integration, project management, and release management.
ALM vs. Software Development Life Cycle
ALM is a broader perspective than the Software Development Life Cycle (SDLC), which is limited to the phases of software development such as requirements, design, coding, testing, configuration, project management, and change management. ALM continues after development until the application is no longer used, and may span many SDLCs.
Integrated ALM
Modern software development processes are not restricted to the discrete ALM/SDLC steps managed by different teams using multiple tools from different locations. Real-time collaboration, access to the centralized data repository, cross-tool and cross-project visibility, better project monitoring and reporting are the key to developing quality software in less time.
This has given rise to the practice of integrated application lifecycle management, or integrated ALM, where all the tools and tools' users are synchronized with each other throughout the application development stages. This integration ensures that every team member knows Who, What, When, and Why of any changes made during the development process and there is no last minute surprise causing delivery delays or project failure.
Today's application management vendors focus more on API management capabilities for third party best-of-breed tool integration which ensures that organizations are well-equipped with an internal software development system that can easily integrate with any IT or ALM tools needed in a project.
A research director with research firm Gartner proposed changing the term ALM to ADLM (Application Development Life-cycle Management) to include DevOps, the software engineering culture and practice that aims at unifying software development (Dev) and software operation (Ops).
ALM software suites
Some specialized software suites for ALM are:
See also
Application Lifecycle Framework
Business transaction management
Open Services for Lifecycle Collaboration
Systems development life-cycle
Software project management
Comparison of project management software
Bug tracking system
Forge (software)
References
Further reading
External links
Chappell, David, What is Application Lifecycle Management? (PDF), archived from the original (PDF) on December 7, 2014
Gartner Analyst Sean Kenefick, Market Profile: Application Life Cycle Management (ALM) Tools, 2012
Margaret Rouse, application lifecycle management (ALM)
Dave West, Integrated ALM Tools Are Fundamental to Success
Dominic Tavassoli, Integrating application lifecycle management (ALM) processes provides additional benefits
Zane Galviņa1, Darja Šmite, Software Development P
|
https://en.wikipedia.org/wiki/Demo%20effect
|
The demo effect is a name for computer-based real-time visual effects found in demos created by the demoscene.
The main purpose of demo effects in demos is to show off the skills of the programmer. Because of this, demo coders have often attempted to create new effects whose technical basis cannot be easily figured out by fellow programmers.
Sometimes, particularly in the case of severely limited platforms such as the Commodore 64, a demo effect may make the target machine do things that are supposedly beyond its capabilities. The ability to creatively overcome major technical limitations is greatly appreciated among demosceners.
Modern demos are not as focused on effects as the demos of the 1980s and 1990s. Effects are rarely stand-alone content elements anymore, and their role in programmer showcase has diminished, particularly in PC demos. As for today, PC demosceners are more likely to demonstrate their programming skills with procedural content generation or 3D engine features than with superior visual effects.
Hardware considerations
There are demos written for many different devices that vary considerably in their graphical features and data processing capabilities. The variability in hardware also reflects in types of effects invented for each platform as well as in the methods used in the implementation.
The demoscene took off on home computers such as the Commodore 64 and the Amiga, which had relatively advanced and very "hackable" custom chips and CPUs. Before the widespread use of advanced computer aided design for integrated circuits, chips were designed by hand and so often had many undocumented or unintended features. A lack of standardisation also meant that hardware design tended to reflect the designers own ideas and creative flair. For this reason, most "old school" demo effects were based on the creative exploitation of the features of particular hardware. A lot of effort was put into the reverse-engineering of the hardware in order to find undocumented possibilities usable for new effects.
The IBM PC compatibles of the 1990s, however, lacked many of the special features typical for the home computers, instead using standard parts. This was compensated for with a greater general-purpose computing power. The possibility of advanced hardware trickery was also limited by the great variability of PC hardware. For these reasons, the PC democoders of the DOS era preferred to focus on pixel-level software rendering algorithms.
Democoders have often looked for challenge and respect by "porting" effects from one platform to another. For example, during the "golden age" of the Amiga demos, many well-known Amiga effects were remade with Atari ST, Commodore 64 and PC, some of which were considered inferior in the key features required in the effects in question. Since the mid-1990s, when the PC had become a major platform, demos for the Amiga and the C-64 started to feature PC-like "pixel effects" as well.
Early history
The earlie
|
https://en.wikipedia.org/wiki/Scale%20space%20implementation
|
In the areas of computer vision, image analysis and signal processing, the notion of scale-space representation is used for processing measurement data at multiple scales, and specifically enhance or suppress image features over different ranges of scale (see the article on scale space). A special type of scale-space representation is provided by the Gaussian scale space, where the image data in N dimensions is subjected to smoothing by Gaussian convolution. Most of the theory for Gaussian scale space deals with continuous images, whereas one when implementing this theory will have to face the fact that most measurement data are discrete. Hence, the theoretical problem arises concerning how to discretize the continuous theory while either preserving or well approximating the desirable theoretical properties that lead to the choice of the Gaussian kernel (see the article on scale-space axioms). This article describes basic approaches for this that have been developed in the literature.
Statement of the problem
The Gaussian scale-space representation of an N-dimensional continuous signal,
is obtained by convolving fC with an N-dimensional Gaussian kernel:
In other words:
However, for implementation, this definition is impractical, since it is continuous. When applying the scale space concept to a discrete signal fD, different approaches can be taken. This article is a brief summary of some of the most frequently used methods.
Separability
Using the separability property of the Gaussian kernel
the N-dimensional convolution operation can be decomposed into a set of separable smoothing steps with a one-dimensional Gaussian kernel G along each dimension
where
and the standard deviation of the Gaussian σ is related to the scale parameter t according to t = σ2.
Separability will be assumed in all that follows, even when the kernel is not exactly Gaussian, since separation of the dimensions is the most practical way to implement multidimensional smoothing, especially at larger scales. Therefore, the rest of the article focuses on the one-dimensional case.
The sampled Gaussian kernel
When implementing the one-dimensional smoothing step in practice, the presumably simplest approach is to convolve the discrete signal fD with a sampled Gaussian kernel:
where
(with t = σ2) which in turn is truncated at the ends to give a filter with finite impulse response
for M chosen sufficiently large (see error function) such that
A common choice is to set M to a constant C times the standard deviation of the Gaussian kernel
where C is often chosen somewhere between 3 and 6.
Using the sampled Gaussian kernel can, however, lead to implementation problems, in particular when computing higher-order derivatives at finer scales by applying sampled derivatives of Gaussian kernels. When accuracy and robustness are primary design criteria, alternative implementation approaches should therefore be considered.
For small values of ε (10−6 to 10−8) the errors intro
|
https://en.wikipedia.org/wiki/Hodj%20%27n%27%20Podj
|
Hodj 'n' Podj is a 1995 computer board game and minigame compilation developed by Boffo Games and published by Media Vision and Virgin Interactive. It was designed by Steve Meretzky, previously known for adventure games such as The Hitchhiker's Guide to the Galaxy. Hodj 'n' Podj features 19 minigames based on peg solitaire, Pac-Man, Battleship and other games. These may be played separately or within an overarching fairy tale story, which follows the suitors Hodj and Podj in their attempts to rescue two princesses.
Meretzky conceived Hodj 'n' Podj in the late 1980s, as a way to revive simpler games that had become hard to obtain. It began production in 1994, and was the first product developed by Meretzky's company Boffo Games. Production was troubled, thanks to a $100 million securities fraud scandal at Media Vision, which led to the project's sale to Virgin. During development, Boffo discovered that Hodj 'n' Podj appealed to a wider demographic than Meretzky's past work, and Meretzky has since cited it as an early casual game.
Selling 40,000 to 50,000 units, Hodj 'n' Podj was commercially unsuccessful. Reviewers found the game simplistic but enjoyable, although Computer Gaming World criticized its reuse of minigames from titles like the Dr. Brain series. Retrospectively, Meretzky has called Hodj 'n' Podj a career turning point that led him toward casual game development, and an inspiration for his subsequent work with WorldWinner and Playdom. In 2009, he reported that Hodj 'n' Podj continued to receive as many fan letters as all of his other games combined.
Gameplay and plot
Hodj 'n' Podj is a computer board game and minigame compilation for one to two players. It is set in a fairy tale world, in the kingdom of Po-Poree, whose twin princesses Mish and Mosh have been kidnapped by the villainous Salmagundi. The player controls the suitor Hodj, and races the competing suitor Podj—controlled by the computer or a second player—to rescue the princesses first. Each turn, a spinner randomly determines the distances Hodj and Podj may travel across the game board.
The board features 19 important locations, each of which contains a minigame that the player completes to earn items or information necessary to rescue the princesses. These include Battlefish, inspired by Battleship; Pack Rat, inspired by Pac-Man; Garfunkel, inspired by Simon; and a peg solitaire game called Peggleboz. All 19 minigames may also be played in "stand-alone mode", without the board game elements. Once one player locates the princesses, they must take them to the center of the board to win. During the journey, the opposing player or computer may intervene and steal the princesses by succeeding in a competitive minigame.
Development and release
After spending several years as a contractor for Legend Entertainment, designer Steve Meretzky started the company Boffo Games with two of his friends in 1994. Discussions about this venture had begun in 1993, but the final decision was
|
https://en.wikipedia.org/wiki/Mark%20Montano
|
Mark Montano is an American interior designer, artist, writer, and TV personality.
Television
Mark Montano is perhaps best known for three series on the Style Network and The Learning Channel: 10 Years Younger, which he hosted, While You Were Out, on which he frequently appears as a designer, and My Celebrity Home on which he is both host and designer. Montano can currently be seen on WE TV's new show, "She's Moving In". Montano has a flamboyant design sense that homeowners on While You Were Out are sometimes less than enthused about at first, but he usually wins them over with his boisterous personality. In 2021 he co-starred with Chrissy Metz (This Is Us) and Leann Rimes to host Meet Your Makers Showdown for Discovery +.
On My Celebrity Home, Mark tours a celebrity's home and gives their style to a fan. Mark filmed MY HOME 2.0 which aired on FOX and FIOS channels nationwide in April 2010.
In 2015 Mark produced and filmed a 12 episode, half-hour series called Make Your Mark. Make Your Mark is a DIY show based on his blog and YouTube channel and currently airs on most public television stations.
The Big-Ass Book of Crafts (2008) and other works
Mark Montano is the author of several successful books. "The Big-Ass Book of Crafts", published through SimonSpotlight, subsidiary of Simon & Schuster, owned by parent company CBS, was released on February 18, 2008, and is now the number 1 selling craft book in America. The Big-Ass Book of Crafts is currently in its 7th printing as of January 2009. The Big-Ass Book of Home Decor was on shelves starting April 2010. In January 2011, Pulp Fiction: Perfect Paper Projects, was published and on October 11, The Big-Ass Book of Crafts 2 was officially on bookstore shelves everywhere. "The Big-Ass Book of bling" is on shelves starting November 1, 2012.
Various projects from Mark's books are available in Tutorial form on his Official Blog and on his YouTube channel.
Bibliography
"The Big Ass Book of Bling" (2012)
"The Big Ass Book of Crafts 2" (2011)
Pulp Fiction: Perfect Paper Projects (2011)
The Big-Ass Book of Home Decor (2010)
The Big-Ass Book of Crafts (2008)
Super Suite: The Ultimate Bedroom Makeover Guide for Girls (2002)
Window Treatments and Slipcovers for Dummies (2005)
Dollar Store Decor: 100 Projects for Lush Living That Won't Break the Bank (2005)
References
External links
Mark Montano Official Site
Mark Montano Official Blog
Mark Montano Blogger
Mark Montano Official Facebook
Mark Montano on Etsy.com
Nest.com article
Mark Montano Crescendoh blog
American columnists
American interior designers
American television hosts
American male non-fiction writers
Design writers
Living people
1965 births
|
https://en.wikipedia.org/wiki/CD-Cops
|
CD-Cops was the first CD-ROM protection system to use the geometry of the CD-ROM media rather than a hidden "mark". It was invented in 1996 by Danish Link Data Security, known for its Cops Copylock key-diskette security used in the 1990s by Lotus 1-2-3.
Overview
As a copy (CD-R or CD-ROM) will have a different geometry, Data Position Measurement needs to be used for copies. The geometry is not known before CDs have been produced, therefore a CD-code expressing the layout of the CD-ROM must be entered the first time a user runs the protected software. Using a special production process in some cases the CD-code is embedded on the CD-ROM. CD-Cops is popular for encyclopaedias/dictionaries and business applications but not used as much for games.
DVD-Cops, based on the same principles, was the first DVD-ROM protection system, made in 1998.
References
Sources
Analysis
Report
cdmediaworld
PDF
article
External links
CD-Cops at linkdata.com
DVD-Cops at linkdata.com
Compact Disc and DVD copy protection
Digital rights management for macOS
|
https://en.wikipedia.org/wiki/Constraint%20grammar
|
Constraint grammar (CG) is a methodological paradigm for natural language processing (NLP). Linguist-written, context-dependent rules are compiled into a grammar that assigns grammatical tags ("readings") to words or other tokens in running text. Typical tags address lemmatisation (lexeme or base form), inflexion, derivation, syntactic function, dependency, valency, case roles, semantic type etc. Each rule either adds, removes, selects or replaces a tag or a set of grammatical tags in a given sentence context. Context conditions can be linked to any tag or tag set of any word anywhere in the sentence, either locally (defined distances) or globally (undefined distances). Context conditions in the same rule may be linked, i.e. conditioned upon each other, negated, or blocked by interfering words or tags. Typical CGs consist of thousands of rules, that are applied set-wise in progressive steps, covering ever more advanced levels of analysis. Within each level, safe rules are used before heuristic rules, and no rule is allowed to remove the last reading of a given kind, thus providing a high degree of robustness.
The CG concept was launched by Fred Karlsson in 1990 (Karlsson 1990; Karlsson et al., eds, 1995), and CG taggers and parsers have since been written for a large variety of languages, routinely achieving accuracy F-scores for part of speech (word class) of over 99%. A number of syntactic CG systems have reported F-scores of around 95% for syntactic function labels. CG systems can be used to create full syntactic trees in other formalisms by adding small, non-terminal based phrase structure grammars or dependency grammars, and a number of Treebank projects have used CG for automatic annotation. CG methodology has also been used in a number of language technology applications, such as spell checkers and machine translation systems.
Rule syntax and format
A Constraint Grammar parser expects as its input a stream of morphologically analysed tokens, typically produced by a Finite-state transducer-based analyser (common ones are the Xerox tools twolc/lexc/xfst, HFST or Apertium's lttoolbox). Each token may be ambiguous and have many readings, the surface form with all its readings is called a cohort. Below is a possible example analysis of ", and X was like “" in the input format expected by VISL CG-3:
"<,>"
"," cm
"<and>"
"and" conj
"<X>"
"X" num pl
"X" noun prop
"<was>"
"be" verb past p1 sg
"be" verb past p3 sg
"<like>"
"like" adj
"like" subj
"like" pr
"like" verb inf
"like" verb pres
"like" verb imp
"<“>"
"“" lquot
This snippet shows 5 cohorts, each with one or more readings. The surface wordforms are in "<anglequotes>" while the lemmas/baseforms are in regular "quotes" followed by an unquoted set of tags, and we see some cohorts have several readings, ie. are ambiguous ("<like>" being ambiguous between 6 readings). The job of the CG parser is now to 1) remove as many wrong readings as it is safe to do given the context, 2) op
|
https://en.wikipedia.org/wiki/Chain%20loading
|
Chain loading is a method used by computer programs to replace the currently executing program with a new program, using a common data area to pass information from the current program to the new program. It occurs in several areas of computing.
Chain loading is similar to the use of overlays. Unlike overlays, however, chain loading replaces the currently executing program in its entirety. Overlays usually replace only a portion of the running program. Like the use of overlays, the use of chain loading increases the I/O load of an application.
Chain loading in boot manager programs
In operating system boot manager programs, chain loading is used to pass control from the boot manager to a boot sector. The target boot sector is loaded in from disk, replacing the in-memory boot sector from which the boot manager itself was bootstrapped, and executed.
Chain loading in Unix
In Unix (and in Unix-like operating systems), the exec() system call is used to perform chain loading. The program image of the current process is replaced with an entirely new image, and the current thread begins execution of that image. The common data area comprises the process' environment variables, which are preserved across the system call.
Chain loading in Linux
In addition to the process level chain loading Linux supports the system call to replace the entire operating system kernel with a different version. The new kernel boots as if it were started from power up and no running processes are preserved.
Chain loading in BASIC programs
In BASIC programs, chain loading is the purview of the CHAIN statement (or, in Commodore BASIC, the LOAD statement), which causes the current program to be terminated and the chained-to program to be loaded and invoked (with, on those dialects of BASIC that support it, an optional parameter specifying the line number from which execution is to commence, rather than the default of the first line of the new program). The common data area varies according to the particular dialect of BASIC that is in use. On BBC BASIC, for example, only a specific subset of all variables are preserved across a CHAIN. On other BASICs, the COM statement can be used in conjunction with CHAIN to specify which variables are to be preserved as common data across a chain operation.
Chain loading permits BASIC programs to execute more program code than could fit into available program and variable memory. Applications written in BASIC could thus be far larger than the size of working memory, via a set of cooperating programs that CHAIN back and forth amongst themselves as program flow moves within the overall application.
Chain loading in FORTRAN programs
Many versions of Fortran include a CALL CHAIN or CALL LINK statement that performs chain loading, preserving the contents of COMMON storage. This is not the same as the unrelated LINK subroutine in GNU Fortran.
Chain loading in OS/360
OS/360 and successors use the XCTL (for "transfer control")
|
https://en.wikipedia.org/wiki/Scale-space%20axioms
|
In image processing and computer vision, a scale space framework can be used to represent an image as a family of gradually smoothed images. This framework is very general and a variety of scale space representations exist. A typical approach for choosing a particular type of scale space representation is to establish a set of scale-space axioms, describing basic properties of the desired scale-space representation and often chosen so as to make the representation useful in practical applications. Once established, the axioms narrow the possible scale-space representations to a smaller class, typically with only a few free parameters.
A set of standard scale space axioms, discussed below, leads to the linear Gaussian scale-space, which is the most common type of scale space used in image processing and computer vision.
Scale space axioms for the linear scale-space representation
The linear scale space representation of signal obtained by smoothing with the Gaussian kernel satisfies a number of properties 'scale-space axioms' that make it a special form of multi-scale representation:
linearity
where and are signals while and are constants,
shift invariance
where denotes the shift (translation) operator
semi-group structure
with the associated cascade smoothing property
existence of an infinitesimal generator
non-creation of local extrema (zero-crossings) in one dimension,
non-enhancement of local extrema in any number of dimensions
at spatial maxima and at spatial minima,
rotational symmetry
for some function ,
scale invariance
for some functions and where denotes the Fourier transform of ,
positivity
,
normalization
.
In fact, it can be shown that the Gaussian kernel is a unique choice given several different combinations of subsets of these scale-space axioms:
most of the axioms (linearity, shift-invariance, semigroup) correspond to scaling being a semigroup of shift-invariant linear operator, which is satisfied by a number of families integral transforms, while "non-creation of local extrema" for one-dimensional signals or "non-enhancement of local extrema" for higher-dimensional signals are the crucial axioms which relate scale-spaces to smoothing (formally, parabolic partial differential equations), and hence select for the Gaussian.
The Gaussian kernel is also separable in Cartesian coordinates, i.e. . Separability is, however, not counted as a scale-space axiom, since it is a coordinate dependent property related to issues of implementation. In addition, the requirement of separability in combination with rotational symmetry per se fixates the smoothing kernel to be a Gaussian.
There exists a generalization of the Gaussian scale-space theory to more general affine and spatio-temporal scale-spaces. In addition to variabilities over scale, which original scale-space theory was designed to handle, this generalized scale-space theory also comprises other types of variabilities, including image deformations caused
|
https://en.wikipedia.org/wiki/C%2B%2B11
|
C++11 is a version of the ISO/IEC 14882 standard for the C++ programming language. C++11 replaced the prior version of the C++ standard, called C++03, and was later replaced by C++14. The name follows the tradition of naming language versions by the publication year of the specification, though it was formerly named C++0x because it was expected to be published before 2010.
Although one of the design goals was to prefer changes to the libraries over changes to the core language, C++11 does make several additions to the core language. Areas of the core language that were significantly improved include multithreading support, generic programming support, uniform initialization, and performance. Significant changes were also made to the C++ Standard Library, incorporating most of the C++ Technical Report 1 (TR1) libraries, except the library of mathematical special functions.
C++11 was published as ISO/IEC 14882:2011 in September 2011 and is available for a fee. The working draft most similar to the published C++11 standard is N3337, dated 16 January 2012; it has only editorial corrections from the C++11 standard.
Design goals
The design committee attempted to stick to a number of goals in designing C++11:
Maintain stability and compatibility with C++98 and possibly with C
Prefer introducing new features via the standard library, rather than extending the core language
Prefer changes that can evolve programming technique
Improve C++ to facilitate systems and library design, rather than introduce new features useful only to specific applications
Increase type safety by providing safer alternatives to earlier unsafe techniques
Increase performance and the ability to work directly with hardware
Provide proper solutions for real-world problems
Implement zero-overhead principle (further support needed by some utilities must be used only if the utility is used)
Make C++ easy to teach and to learn without removing any utility needed by expert programmers
Attention to beginners is considered important, because most computer programmers will always be such, and because many beginners never widen their knowledge, limiting themselves to work in aspects of the language in which they specialize.
Extensions to the C++ core language
One function of the C++ committee is the development of the language core. Areas of the core language that were significantly improved include multithreading support, generic programming support, uniform initialization, and performance.
Core language runtime performance enhancements
These language features primarily exist to provide some kind of performance benefit, either of memory or of computational speed.
Rvalue references and move constructors
In C++03 (and before), temporaries (termed "rvalues", as they often lie on the right side of an assignment) were intended to never be modifiable — just as in C — and were considered to be indistinguishable from const T& types; nevertheless, in some cases, temporaries could h
|
https://en.wikipedia.org/wiki/Catalunya%20R%C3%A0dio
|
Catalunya Ràdio () is Catalonia's public radio network. With headquarters in Barcelona, it is part of the Corporació Catalana de Mitjans Audiovisuals (CCMA), owned by the Generalitat de Catalunya.
Catalunya Ràdio broadcasts exclusively in Catalan and is the major Catalan-language network today, although Ràdio 4 from Radio Nacional de España (founded in 1976) was the first post-Franco Era station to broadcast in the language.
Stations
Catalunya Ràdio began broadcasting on 20 June 1983. Over the years, it has expanded to encompass four separate stations:
Catalunya Ràdio – The first station, and the one that gave the network its name. A generalist station that broadcasts 24 hours a day and is the third largest radio station in Catalonia by audience size.
– Founded on 10 May 1987, Catalunya Música concentrates on classical and contemporary music, plus specialized music programmes. It broadcasts 24 hours a day.
– Created on 11 September 1992, Catalunya Informació was Spain's first all-news station. It broadcasts 24 hours a day.
(formerly iCat FM and iCat.cat) – Launched on 23 April 2006, this a multi-media radio station closely linked to the Internet and promoting both traditional and contemporary culture.
Catalunya Ràdio has grown significantly since its inception, and is currently available in Catalonia, Valencia, the Balearic Islands, Northern Catalonia, La Franja, and Andorra.
Former stations
– Station dedicated to musical successes; first broadcast February 15, 1984. It was born with the name of RAC (Ràdio Associació de Catalunya) in 1984. It ceased to be part of the CCRTV in 1998.
– Cultural station with varied topics. Broadcast from February 2, 1999 to April 23, 2006. It was replaced by iCat.
– A station dedicated to classical music by Catalan authors. Broadcast from February 18, 2008 to 2019.
Main programs
Catalunya Ràdio
Programs here is dedicated to news, magazines and entertainment.
Alguna pregunta més?
Amb mal peu
Catalunya Migdia
Catalunya Vespre
El Cafè de la República
El lloro, el moro, el mico i el senyor de Puerto Rico
El matí de Josep Cuní
El suplement
Els optimistes
En guàrdia
Generació digital
L'internauta
L'ofici de viure
L'orquestra
La transmissió d'en Puyal
La tribu de Catalunya Ràdio
El matí de Catalunya Ràdio
Les mil i una nits de Maria de la Pau Janer
La nit dels ignorants
El secret
Tarda Tardà
Tot gira
Els viatgers de la Gran Anaconda
Catalunya Informació
As Spain's first all-news station, Catalunya Informació has a strong focus on local news, traffic, weather and information. News bulletins is aired around the clock. At the half past, the station will summary what have been said in 30 minutes ago and what will be said in 30 minutes next. At :33, Catalunya Informació tells listeners the day's three most important news, also local traffic updates from Catalunya Transit Service and the latest weather forecasts for the coming hours at :15 and :45. Weather summaries can also be hear
|
https://en.wikipedia.org/wiki/BBC%20Two%20Scotland
|
BBC Two Scotland () was a Scottish free-to-air television channel owned and operated by BBC Scotland as a variation of the BBC Two network. It was broadcast via digital television and was the sister Scottish channel of BBC One Scotland and Gaelic-language BBC Alba. Unlike BBC One Scotland, which broadcasts its own continuity with only rare exceptions, BBC Two Scotland would opt in and out of BBC Two network continuity throughout the day.
History
Prior to digital switchover, 'BBC Two Scotland' and 'BBC Two Scotland (Digital)' were listed as separate channels by some guides, but were effectively the same channel, broadcasting identical feeds as part of the transition to digital television.
On 24 February 2019, the BBC launched the BBC Scotland channel, a new autonomous service that broadcasts a nightly lineup of Scottish programming. In preparation for its launch, BBC Two Scotland was discontinued and replaced by the national version beginning 18 February. BBC Scotland officially broadcasts from 19:00 to 00:00 nightly, but simulcasts BBC Two daily from 12:00 to 19:00, and may opt out for sport and political broadcasts of regional interest during this period. BBC Two Scotland remained on the Sky EPG on channel 970 until 28 February 2019. From 18 to 27 February 2019, BBC Two Scotland simulcasted BBC Two (England region).
Programming
Similarly to BBC One Scotland, BBC Two Scotland offered differing programming from the UK-wide network specifically aimed at Scottish viewers. Often, this was more specialised programming such as Artworks Scotland, Holyrood Live and the Gaelic strands branded as BBC Two (Dhà) Alba.
During the daytime and overnight schedules, BBC Scotland replaced some of the national education programming for shows better targeted at the separate Scottish education system and replacing some politics strands with coverage of Scottish politics. BBC Sport Scotland would sometimes use BBC Two Scotland to broadcast live coverage of more minority sports, such as athletics and shinty, with some sports such as mountain biking and cross-country showcased in The Adventure Show.
Additionally, on Sunday nights, BBC Two Scotland had become the regular home for Sportscene'''s highlights of the SPFL, preceding Match of the Day 2.
The Music Show was launched on BBC Two Scotland in November 2005, presented by Shantha Roberts. Its programming included live performances from a wide range of musical styles, with bands filmed around the country at different venues and unusual locations, rather than in the studio. Musical styles included indie, jazz, folk, funk, hip hop and electro pop. Its last shows were broadcast in November 2014.
Other examples of BBC Two Scotland programmes include:
ArtWorks Scotland Cunntas Dè a-nis? Holyrood Live Landward Limmy's Show Na Bleigeardan Newsnight Scotland Daily Politics Scotland Rathad an Sutha Scotland 2016 Sport Nation Sportscene The Adventure Show Wildlife Detectives''
References
External links
1966 establis
|
https://en.wikipedia.org/wiki/JN%20Data%20A/S
|
JN Data is a Danish IT company focused on the delivery of IT-operations and infrastructure to the financial sector. The company is owned by Jyske Bank A/S, Nykredit Realkredit A/S, BEC, Bankdata and SDC and has around 670 employees. In Denmark JN Data has locations in Silkeborg and Roskilde, and besides that the company have around 180 IT consultants in Poland.
History
In 2002, Jyske Bank A/S og Nykredit Realkredit A/S merged the internal IT services and production departments and created a new company called JN Data. For the first eight years the company serviced its owners, and since then BEC, Bankdata, SDC and EG Silkeborg Data have also become customers of JN Data. In 2018, the circle of owners was expanded with BEC, Bankdata and SDC.
Management
Management
Søren Lindgaard, CEO
Jacob Moesgaard, CFO
Board of directors
David Hellerman, Nykredit, Chairman
Peter Schleidt, Jyske Bank, Vice Chairman
Esben Kolind Laustrup, Bankdata
Jesper Nielsen, BEC
Jesper Scharff, SDC
Annette Juul, employee representative
Henrik Holm, employee representative
Christoffer Lykbak, employee representative
References
JN Data´s annual report 2021
JN Data´s annual report 2020
JN Data´s annual report 2019
JN Data´s annual report 2018
External links
Official website
2002 establishments in Denmark
Companies established in 2002
Companies based in Silkeborg Municipality
Silkeborg
Software companies of Denmark
|
https://en.wikipedia.org/wiki/Computon
|
A computon is a combined unit of computing power, including processor cycles, memory, disk storage and bandwidth, proposed in 2005 by researchers at Hewlett-Packard, with the word being a cross between "computation" and "photon", the name for a packet of electromagnetic energy. HP hoped that the computon would become the computing industry's equivalent to public utility's watt-hour.
See also
Computron
Grid computing
Distributed computing
Computronium
References
Who wants to buy a computon?, The Economist, 12 March 2005 Grid computing: Electricity is sold by the kilowatt-hour. Now a researcher has proposed that computing power should be sold by the computon
External links
Sun Power Units
Computer performance
|
https://en.wikipedia.org/wiki/Correlogram
|
In the analysis of data, a correlogram is a chart of correlation statistics.
For example, in time series analysis, a plot of the sample autocorrelations versus (the time lags) is an autocorrelogram.
If cross-correlation is plotted, the result is called a cross-correlogram.
The correlogram is a commonly used tool for checking randomness in a data set. If random, autocorrelations should be near zero for any and all time-lag separations. If non-random, then one or more of the autocorrelations will be significantly non-zero.
In addition, correlograms are used in the model identification stage for Box–Jenkins autoregressive moving average time series models. Autocorrelations should be near-zero for randomness; if the analyst does not check for randomness, then the validity of many of the statistical conclusions becomes suspect. The correlogram is an excellent way of checking for such randomness.
In multivariate analysis, correlation matrices shown as color-mapped images may also be called "correlograms" or "corrgrams".
Applications
The correlogram can help provide answers to the following questions:
Are the data random?
Is an observation related to an adjacent observation?
Is an observation related to an observation twice-removed? (etc.)
Is the observed time series white noise?
Is the observed time series sinusoidal?
Is the observed time series autoregressive?
What is an appropriate model for the observed time series?
Is the model
valid and sufficient?
Is the formula valid?
Importance
Randomness (along with fixed model, fixed variation, and fixed distribution) is one of the four assumptions that typically underlie all measurement processes. The randomness assumption is critically important for the following three reasons:
Most standard statistical tests depend on randomness. The validity of the test conclusions is directly linked to the validity of the randomness assumption.
Many commonly used statistical formulae depend on the randomness assumption, the most common formula being the formula for determining the standard error of the sample mean:
where s is the standard deviation of the data. Although heavily used, the results from using this formula are of no value unless the randomness assumption holds.
For univariate data, the default model is
If the data are not random, this model is incorrect and invalid, and the estimates for the parameters (such as the constant) become nonsensical and invalid.
Estimation of autocorrelations
The autocorrelation coefficient at lag h is given by
where ch is the autocovariance function
and c0 is the variance function
The resulting value of rh will range between −1 and +1.
Alternate estimate
Some sources may use the following formula for the autocovariance function:
Although this definition has less bias, the (1/N) formulation has some desirable statistical properties and is the form most commonly used in the statistics literature. See pages 20 and 49–50 in Chatfield for details.
I
|
https://en.wikipedia.org/wiki/List%20of%20Robot%20Chicken%20episodes
|
This is a list of episodes for the stop-motion television series Robot Chicken. The first episode aired on February 20, 2005, at 11:30 p.m. EST on Cartoon Network's Adult Swim block, and the eleventh season premiered on September 7, 2021, at 12:00 a.m. EDT.
There have been a number of half-hour specials.
Series overview
Episodes
Season 1 (2005)
Season 2 (2006)
Season 3 (2007–08)
Season 4 (2008–09)
Season 5 (2010–12)
Season 6 (2012–13)
Season 7 (2014)
Season 8 (2015–16)
Season 9 (2017–18)
Season 10 (2019–20)
Season 11 (2021–22)
Specials
References
External links
Adult Swim's Robot Chicken website
List of
Robot Chicken episodes
Lists of American adult animated television series episodes
Lists of American comedy television series episodes
|
https://en.wikipedia.org/wiki/Jalaluddin%20Haqqani
|
Jalaluddin Haqqani () (1939 – 3 September 2018) was an Afghan insurgent commander who founded the Haqqani network, an insurgent group fighting in guerilla warfare against US-led NATO forces and the now former government of Afghanistan they support.
He distinguished himself as an internationally sponsored insurgent fighter in the 1980s during the Soviet–Afghan War, including in Operation Magistral. He earned U.S. praise and was called "goodness personified" by the U.S. officials. US officials have admitted that during the Soviet–Afghan War, he was a prized asset of the Central Intelligence Agency (CIA). Former U.S. president Ronald Reagan called Jalaluddin Haqqani a "freedom fighter" during the Soviet–Afghan War. By 2004, he was directing pro-Taliban insurgent group to launch a holy war in Afghanistan. In 2016, U.S. Lieutenant General John W. Nicholson Jr. claimed that the U.S. and NATO were not targeting Haqqani's network in Afghanistan.
Media reports emerged in late July 2015 that Haqqani had died the previous year. According to the reports, he died in Afghanistan and was buried in Khost Province of Afghanistan. These reports were denied by the Taliban and some members of the Haqqani family. On 3 September 2018, the Taliban released a statement announcing that Haqqani had died after a long illness in Afghanistan.
Early life
Jalaluddin was born in 1939 in the village of Karezgay in the Zadran District of Paktia Province, Afghanistan. He was an ethnic Pashtun from the Zadran tribe of Khost. His father was a relatively wealthy landowner and trader. The family later moved to Sultankhel. He started advanced religious studies at Darul Uloom Haqqania, a Deobandi Islamic seminary (darul uloom), in Pakistan in 1964. He graduated in 1970 with an advanced qualification that entitled him to the status of mawlawi, and added "Haqqani" to his name, as some alumni of Darul Uloom Haqqania had done.
After King Zahir Shah's exile and President Daoud Khan rose to power in 1973, the political situation in Afghanistan began to slowly change. A number of parties, such as the People's Democratic Party of Afghanistan (PDPA), and other people were seeking power. Haqqani was one of them, and after being suspected of plotting against the government, he went into exile and based himself in and around Miranshah, Pakistan. From there he began to organise a rebellion against the government of Daoud Khan in 1975. After the 1978 Marxist revolution by the PDPA, Haqqani joined the Hezb-i Islami movement of Mawlawi Mohammad Yunus Khalis.
Military career
Mujahideen commander
In the 1980s, Jalaluddin Haqqani was cultivated as a "unilateral" asset of the CIA and received tens of millions of dollars in cash for his work in fighting the Soviet-led Afghan forces in Afghanistan, according to an account in The Bin Ladens, a 2008 book by Steve Coll. He reputedly attracted generous support from prosperous Arab countries compared to other resistance leaders. At that time, Haqqani helped
|
https://en.wikipedia.org/wiki/Power%20Plus%20Pro
|
Power Plus Pro is a piece of financial software produced by Reuters Group in the form of an add-in for Microsoft Office Excel. A real-time data engine, it pushes new data into Excel when it receives notification of updates from a Reuters TIBCO bus or from Thomson Reuters' RMDS. This commonly involves live market data, such as stock prices, from a financial exchange. Using the addin, Excel can also contribute information to the TIBCO bus or to RMDS; such information then becomes available to other permissioned users using the addin on another computer or using Reuters 3000 Xtra stand-alone software. Power Plus Pro also has features which allow retrieval of historical market data.
A typical Excel formula call might read: =RtGet("IDN_SELECTFEED","AAPL","LAST").
Competitors include; Arcontech's Excelerator , MDX Technology's Connect, Vistasource's RTW, and the addin associated with the Bloomberg Terminal (Bloomberg L.P.'s equivalent of Reuters 3000 Xtra). Arcontech Excelerator, MDXT Connect and Vistasource RTW, provide real-time data engines and Excel add-ins and will generally source data from Bloomberg, Reuters and/or other market data sources. Due to the widespread use of Reuters Power Plus Pro, some of the competitors provide conversion utilities to convert from Power Plus Pro functions to their own equivalents (e.g., Arcontech Excelerator) and/or emulation functionality so that Power Plus Pro functions can be used directly without modifications to spreadsheets (e.g., Arcontech Excelerator, MDXT Connect).
Power Plus Pro has been succeeded by Thomson Reuters' Eikon Excel which can convert Power Plus Pro spreadsheets to use new functions.
References
Financial software
|
https://en.wikipedia.org/wiki/WGPB
|
WGPB FM 97.7 is a public radio station in Rome, Georgia. It is part of the Georgia Public Broadcasting radio network, a state network which in turn is a member of National Public Radio, Public Radio Exchange, and American Public Media. Unlike most stations on the GPB network, WGPB does not completely simulcast with the network. WGPB also produces its own programs. The studios are located at Georgia Highlands College's Heritage Hall campus in downtown Rome, from which locally produced programming originates. The station began broadcasting as WGPB at 5 AM on June 30, 2006.
History
The station began broadcasting May 22, 1965 as WROM-FM, sister station to WROM AM 710. It had that callsign until November 1979 when it became WKCX, known as "K98", most recently with a hot adult contemporary format. A satellite-delivered format was used during most of the broadcast day, except for mornings and afternoons. The station was previously owned by Mills Fitzner, who owned WKCX for 20 years under the name Briar Creek Broadcasting Corp.
Format and callsign change
In 2006, WKCX was sold to Georgia Public Broadcasting, with the format changed from hot adult contemporary, to public broadcasting. The deal was announced in March 2006, and was finalized after a 45-day waiting period on June 29, one day before GPB began broadcasting on the frequency. Most of WKCX's staff left the station on May 31 in preparation for the changeover. The station began broadcasting as WGPB at 5 AM on June 30, 2006.
Coverage
WGPB is the first GPB or NPR radio station in northwest Georgia, and covers all of Floyd and about half of each neighboring county reliably. The only other NPR/PRI stations available are WABE FM 90.1 from Atlanta, and WUTC FM 88.1 and WSMC-FM 90.5 from Chattanooga, both of which have marginal to poor reception in the Rome area. GPB Radio is also usually available on the second audio program of GPB TV station WNGH-TV 18, from near Chatsworth, except for when WNGH is using the SAP channel for other uses.
The station broadcasts with a power of 4,200 watts at HAAT, and is class C3. Despite what seems like a low effective radiated power, its height makes it approximately equivalent to the class C3 maximum of 25,000 watts at 100 meters, which gives a reference distance of nearly 40 km or 25 miles from the radio antenna site. This is the first GPB station, and one of the few non-commercial educational stations in the country, that use a channel outside of the 88-92 MHz reserved band. WQMT FM 98.9 in Chatsworth was purchased under similar circumstances for $3.2 million and switched to GPB programming on January 2, 2008 as WNGH-FM. Both stations have a single station ID done together each hour and heard on both stations, indicating they use the same feed.
In early February 2013, GPB applied to the FCC to move the station eastward, which would reduce coverage in northeast Alabama and increase it in northwestern metro Atlanta, bringing Cartersville and Acworth
|
https://en.wikipedia.org/wiki/Sorbonne%20declaration
|
The Sorbonne declaration may refer to either:
The Sorbonne Declaration (1998), part of the Bologna Process relating to higher education.
The Sorbonne declaration on research data rights (2020), a declaration in support of FAIR data.
|
https://en.wikipedia.org/wiki/European%20route%20E81
|
European route E 81 is a road part of the International E-road network. It begins in Constanța, Romania and ends in Mukachevo, Ukraine. The road is long.
The road follows the route: Mukachevo – Halmeu – Satu Mare – Zalău – Cluj-Napoca – Turda – Sebeș – Sibiu – Pitești – București – Lehliu – Fetești – Cernavodă – Constanța.
Itinerary
: Mukachevo () () (Start of concurrency with ) – Berehove
: Berehove – Vylok
: Vylok – Nevetlenfolu
: Halmeu – Livada
: Livada (End of concurrency with ) – Satu Mare
: Satu Mare () – Supuru de Sus
: Supuru de Sus – Zalău – Cluj-Napoca
: Cluj-Napoca (Start of concurrency with ) – Turda (End of concurrency with ) – Alba Iulia – Sebeș (Start of concurrency with ) – Sibiu (End of concurrency with )
: Sibiu
: Sibiu (Start of concurrency with ) – Veștem (End of concurrency with )
: Veștem – Râmnicu Vâlcea – Pitești
: Pitești () – Bucharest () ()
: Bucharest – Fetești – Cernavodă – Constanța
: Constanța – Agigea – Port of Constanța
References
External links
UN Economic Commission for Europe: Overall Map of E-road Network (2007)
81
E081
European routes in Ukraine
|
https://en.wikipedia.org/wiki/Vic%20Rauter
|
Victor "Vic" Rauter (born 1955) is a Canadian sportscaster for TSN, having joined the network in 1985. Rauter has anchored TSN's curling coverage for more than 25 years, providing play-by-play curling commentary for the Season of Champions on TSN, including events such as the Tim Hortons Brier, Scotties Tournament of Hearts, and the World Curling Championships. He lives in Orillia, Ontario.
Broadcasting career
Before joining TSN, Rauter was a sportscaster at the Canadian Broadcasting Corporation in Toronto covering the Olympic Games. He also worked for CFTR radio in Toronto as a news and sports reader before joining the Global Television Network in Toronto for four years.
Known as “the voice of curling” in Canada, Rauter currently provides play-by-play curling commentary for the Season of Champions on TSN, including events such as the Tim Hortons Brier, Scotties Tournament of Hearts, and the World Curling Championships. In addition to his curling coverage for TSN, Rauter has covered auto racing and soccer since 1986 as well as hockey, baseball, bowling, squash, volleyball, cycling, rugby, equestrian, and skiing. He was the first host for the CFL on TSN from 1987 to 1991.
Rauter handled curling play-by-play duties for Canada's Olympic Broadcast Media Consortium during the Vancouver 2010 Olympic Winter Games.
Rauter's best-known catch phrases are "Make the final..." with the final score at the end of a game, and "Count 'em up—1, 2, 3, 4..." [or more] after the last stone of an end scoring three or more.
Awards
In 1999, Rauter was nominated for a Gemini Award as Canada's top sportscaster. In 2018, he was nominated for a Canadian Screen Award as Best Sports Play-by-Play Announcer.
In 2006, Rauter was inducted into the Canadian Curling Hall of Fame.
References
External links
TSN biography of Vic Rauter
1955 births
Canadian television sportscasters
Canadian soccer commentators
Canadian colour commentators
Curling broadcasters
Canadian Football League announcers
Canadian people of Swiss-German descent
Bowling broadcasters
Living people
Major League Baseball broadcasters
Motorsport announcers
National Hockey League broadcasters
Olympic Games broadcasters
North American Soccer League (1968–1984) commentators
People from Orillia
|
https://en.wikipedia.org/wiki/Representational%20systems%20%28NLP%29
|
Representational systems (also abbreviated to VAKOG) is a postulated model from neuro-linguistic programming, a collection of models and methods regarding how the human mind processes and stores information. The central idea of this model is that experience is represented in the mind in sensorial terms, i.e. in terms of the putative five senses, qualia.
According to Bandler and Grinder our chosen words, phrases and sentences are indicative of our referencing of each of the representational systems. So for example the words "black", "clear", "spiral" and "image" reference the visual representation system; similarly the words "tinkling", "silent", "squeal" and "blast" reference the auditory representation system. Bandler and Grinder also propose that ostensibly metaphorical or figurative language indicates a reference to a representational system such that it is actually literal. For example, the comment "I see what you're saying" is taken to indicate a visual representation.
Further, Bandler and Grinder claim that each person has a "most highly valued" (now commonly termed preferred) representational system in which they are more able to vividly create an experience (in their mind) in terms of that representational system, tend to use that representational system more often than the others, and have more distinctions available in that representation system than the others. So for example a person that most highly values their visual representation system is able to easily and vividly visualise things, and has a tendency to do this more often than recreating sounds, feelings, etc.
Representational systems are one of the foundational ideas of NLP and form the basis of many NLP techniques and methods.
Representational systems within NLP
For many practical purposes, according to NLP, mental processing of events and memories can be treated as if performed by the five senses. For example, Albert Einstein credited his discovery of special relativity to a mental visualization strategy of "sitting on the end of a ray of light", and many people as part of decision-making talk to themselves in their heads.
The manner in which this is done, and the effectiveness of the mental strategy employed, is stated by NLP to play a critical part in the way mental processing takes place. This observation led to the concept of a preferred representational system, the classification of people into fixed visual, auditory or kinesthetic stereotypes. This idea was later discredited and dropped within NLP by the early 1980s, in favor of the understanding that most people use all of their senses (whether consciously or unconsciously), and that whilst one system may seem to dominate, this is often contextualized – globally there is a balance that dynamically varies according to circumstance and mood.
NLP asserts that for most circumstances and most people, three of the five sensory based modes seem to dominate in mental processing:
visual thoughts – sight, mental imager
|
https://en.wikipedia.org/wiki/Computational%20visualistics
|
The term Computational visualistics addresses the whole range of scientifically investigating pictures "in" the computer.
Overview
Images take a rather prominent place in contemporary life in western societies. Together with language, they have been connected to human culture from the very beginning. For about one century – after several millennia of written word's dominance – their part is increasing again remarkably. Steps toward a general science of images, which we may call 'general visualistics' in analogy to general linguistics, have only been taken recently. So far, a unique scientific basis for circumscribing and describing the heterogeneous phenomenon "image" in an interpersonally verifiable manner has still been missing while distinct aspects falling in the domain of visualistics have predominantly been dealt with in several other disciplines, among them in particular philosophy, psychology, and art history. Last (though not least), important contributions to certain aspects of the new science of images have come from computer science.
In computer science, too, considering pictures evolved originally along several more or less independent questions, which lead to proper sub-disciplines: computer graphics is certainly the most "visible" among them. Only recently, the effort has been increased to finally form a unique and partially autonomous branch of computer science dedicated to images. In analogy to computational linguistics, the artificial expression computational visualistics is used for addressing the whole range of investigating scientific pictures "in" the computer.
Areas covered
For a science of images within computer science, the abstract data type "image" (or perhaps several such types) stands in the center of interest together with the potential implementations. There are three main groups of algorithms for that data type to be considered in computational visualistics:
Algorithms from "image" to "image"
In the field called image processing, the focus of attention is formed by the operations that take (at least) one picture (and potentially several secondary parameters that are not images) and relate it to another picture. With these operations, we can define algorithms for improving the quality of images (e.g., contrast reinforcement), and procedures for extracting certain parts of an image (e.g., edge finding) or for stamping out pictorial patterns following a particular Gestalt criterion (e.g., blue screen technique). Compression algorithms for efficiently storing or transmitting pictorial data also belong to this field.
Algorithms from "image" to "not-image"
Two disciplines share the operations of transforming images into non-pictorial data items. The pattern recognition field is not restricted to pictures. But it has performed important precursory work for computational visualistics since the early 1950s in those areas that essentially classify information in given images: the identification of simple geometric G
|
https://en.wikipedia.org/wiki/WLCN-CD
|
WLCN-CD (channel 18) is a low-power, Class A television station in Charleston, South Carolina, United States, owned and operated by the Christian Television Network (CTN). The station's transmitter is located in Summerville, South Carolina. WLCN-CD offers 24-hour religious programming, much of which is produced either locally or at the CTN home base in Clearwater, Florida.
History
WLCN-CD began broadcasting on June 12, 2009 under the ownership of Jen Rose Broadcasting. The station offered local news, weather, and sports programming along with syndicated programming from America One and My Family TV. After its conversion to digital, the station added Retro TV and Untamed Sports to its subchannels. WLCN produced local shows with emphasis on political, financial and spiritual support, as well as local sports such as South Carolina Stingrays ice hockey and Summerville High School Greenwave football.
On January 23, 2011, the station's previous owners, Faith Assembly of God of Summerville, sold the station to the Christian Television Network. The sale closed on January 23, 2012. Soon afterward, programming on WLCN switched to programming and services similar to other CTN stations.
Subchannels
The station's digital signal is multiplexed:
References
External links
Jen Rose Broadcasting (former owners of WLCN, as WJRB)
LCN-CD
LCN-CD
Television channels and stations established in 1997
1997 establishments in South Carolina
Christian Television Network affiliates
|
https://en.wikipedia.org/wiki/ABMAP
|
ABMAP, also known as the Animal Bone Metrical Archive Project, consists of a collection of metric data on the main domestic animals recorded at the University of Southampton, together with the data from some other sources, in particular the Museum of London Archaeology Service (MoLAS). Whilst the data is primarily from England, it is applicable to a wider geographical area. Stored in a neutral archival format, it is freely available for teaching, learning and research.
History of the Project
In the 1990s English Heritage funded a project at the University of Southampton to collect and synthesize metrical data recorded over the past twenty years. The main aim was to assemble the data and ensure that it was kept in a format in which it would be maintained and made accessible.
The Database
The project aimed to collect measurements of the main domestic species found on archaeological sites in England. The database included approximately 25,000 bones, predominantly of cattle and sheep, but also of pig, horse, dog, goat, domestic fowl, and goose. The data set is organized by species, anatomical element, period, and site type.
Sources
Serjeantson, D. (2005). 'Science is Measurement'; ABMAP, a Database of Domestic Animal Bone Measurements. Environmental Archaeology 10 (1): 97-103
External links
ABMAP
Archaeological databases
Zooarchaeology
|
https://en.wikipedia.org/wiki/Eamonn
|
Eamonn or Éamon or Eamon may refer to:
Eamonn (given name), an Irish male given name
Eamon (singer) (born 1983), American R&B singer-songwriter and harmonicist
Eamon (video game), a 1980 computer role-playing game for the Apple II
"Éamonn an Chnoic" (Ned of the Hill), an Irish song
Eamon Valda, fictional character in Robert Jordan's fantasy book series The Wheel of Time
See also
Ayman
|
https://en.wikipedia.org/wiki/Basil%20the%20Great%20Mouse%20Detective
|
Basil the Great Mouse Detective is a platform, action-adventure game designed by Bob Armour and published by Gremlin Graphics in 1987 for the Amstrad CPC, Atari 8-bit and Commodore 64 home computers. The game is based on the 1986 Disney animated film The Great Mouse Detective.
Plot
The protagonist of the game is a mouse named Basil who resides in the basement of the fabled 221b Baker Street home of Sherlock Holmes. The evil Professor Ratigan has abducted Basil's friend Dr. Dawson, and he now has to scour London for hints that will help him find the villain's hideout.
Gameplay
The player controls Basil by walking around the chambers, passing from one to another through the edges of the screen (if possible) or squeezing through letter slots and other holes in the walls. In the locations, in addition to numerous enemies, there are various objects. Most of them are just decorations, but in each level there are at least two types of containers in which Basil can find items. So when the player spots a container, bin, jar or something similar they should search it. Once the player has collected all the evidence in a level, they need to find the passage to the next stage, which was previously masked. The above steps must be repeated until the game is completed, and there are a total of 3 levels: London's shops and docks, the sewers and finally the hideout of the evil Ratigan.
Reception
John S. Davison for Page 6 said: "Overall, the game looks good, sounds good, plays well, and has just the right balance of intellectual challenge to keep players of all ages coming back for more".
What? said: "A lovely game with lots of atmosphere and excitement".
Adam Rigby for The Australian Commodore and Amiga Review said: "Basil the Great Mouse Detective is a good game with a rather refreshing plot".
Crash said that "the characters are very Walt Disneyesque, though the wiry graphics aren't as attractive as they could have been".
Zzap! wrote: "Check this out if you like arcade adventures, but don't expect anything especially innovative".
Sinclair User wrote that "the game play is strong, and the graphics are rather smart".
Reviews
Game Mag (French)
Pelit (Finnish)
Micro Mania (Spanish)
Micro Hobby (Spanish)
Your Sinclair - Jan, 1988
Tilt - Feb, 1988
ASM (Aktueller Software Markt) - Dec, 1987
References
1987 video games
Action-adventure games
Amstrad CPC games
Atari 8-bit family games
Commodore 64 games
Detective video games
Disney video games
Gremlin Interactive games
Platformers
Video games about mice and rats
Video games based on animated films
Video games developed in the United Kingdom
Video games scored by Ben Daglish
Video games set in London
Video games set in the 19th century
ZX Spectrum games
|
https://en.wikipedia.org/wiki/Up%20the%20Elephant%20and%20Round%20the%20Castle
|
Up the Elephant and Round the Castle is a British television sitcom, which aired from 1983 to 1985, and was produced by Thames Television for the ITV network. Starring comedian Jim Davidson, who played the role of Jim London, the show spawned a sequel, Home James!, which was also made by Thames. Home James ran from 1987 to 1990.
Plot
Jim London is a young lovable rogue who becomes a man of property when a relative dies, leaving him a run-down Victorian property at 17 Railway Terrace in the Elephant and Castle area of south London. He gets into various problems with the police and spends most of his time getting drunk and chasing women.
Cast
Jim Davidson as Jim London
John Bardon as Ernie London
Sue Nicholls as Wanda Pickles
Nicholas Day as Arnold Moggs
Brian Hall as Brian
Brian Capron as Tosh Carey
Anita Dobson as Lois Tight
Sara Corper as Vera Spiggot
Rosalind Knight as Jim's mum
Production
The sitcom's theme tune was composed by Keith Emerson. The full length version can be heard on two of his albums, Hammer It Out and Off the Shelf.
Episodes
Series 1 (1983–84)
Series 2 (1985)
Series 3 (1985)
This series saw a change in the title sequences. The "Morning world..." monologues by Jim have been removed, and the opening video is the video of the closing titles for the previous two series; the closing titles for this series is the opening titles in reverse so instead of zooming into Jim, the camera zooms out.
Home releases
Series one was released on DVD in September 2007. The complete series was released on 5 May 2008 and was later re-released by Network on 3 October 2016.
Footnotes
References
External links
Up the Elephant and Round the Castle at British TV Comedy Guide
1980s British sitcoms
1983 British television series debuts
1985 British television series endings
ITV sitcoms
Television shows set in London
English-language television shows
Television shows produced by Thames Television
Television series by Fremantle (company)
|
https://en.wikipedia.org/wiki/Lee%20Leonard
|
Lee Leonard (April 3, 1929 – December 16, 2018) was an American television personality who was involved in the launch of cable television networks ESPN and CNN.
Early life
Leonard was born Maxwell Lefkowitz on April 3, 1929, in New York City, the son of Estelle (Cohn), a beautician, and Daniel Lefkowitz.
After graduating from DeWitt Clinton High School in the Bronx, he attended Columbia University in New York City but did not graduate.
Leonard then served in the United States Army in Germany during the Korean War and developed an interest in broadcasting.
He was a midday radio personality on New York's WNBC-AM (660), shortly after it launched its "Conversation Station," a talk format, in 1964. He was part of a weekday talk-variety lineup that included "Big" Wilson, Robert Alda, Mimi Benzell, Sterling Yates, Bill Mazer, Brad Crandall and Long John Nebel and hosted a competition/quiz show for listeners called Fortune Phone.
At CBS and NBC
In the early 1970s, Leonard was part of an even earlier network TV innovation, partnering on CBS-TV with Jack Whitaker on The NFL on CBS, a studio-based show wrapping around the network's coverage of the National Football League with pregame features and halftime and postgame highlights from around the league. As producers changed, Leonard and Whitaker were eventually succeeded by The NFL Today with Brent Musburger, Phyllis George, Jimmy "The Greek" Snyder and Irv Cross on one of network TV sports' longest-running studio-based programs. The core of the team would stay until the mid-1980s, while the show itself has aired continuously ever since, except for several years in the 1990s when CBS did not have NFL television rights.
As for Leonard, he would move to NBC and be teamed with Bryant Gumbel on its GrandStand show, where he would stay until just before ESPN launched. Also during the mid-1970s, Leonard hosted Midday Live, the daily talk show on WNEW-TV (now WNYW) in New York City (he was replaced by Bill Boggs). While at WNEW, Leonard was one of the original co-hosts with Bill Mazer of Sports Extra - considered a pioneering show for the Sunday Evening Sports Wrap-Up show format.
At ESPN and CNN
On September 7, 1979, he was the first person to ever speak on ESPN. He gave a brief introduction before the network aired its first programming, which was the first episode of SportsCenter. Afterwards, he made occasional appearances on the show.
A year later (1980), Leonard moved over to CNN, where he hosted People Tonight, the network's first Los Angeles-based live entertainment news talk show. Many of today's major name celebrities made their first national talk show appearances on People Tonight, including Tom Cruise, Tom Hanks and Pee-wee Herman. The show was groundbreaking in its coverage of Hollywood red carpet premieres and many important breaking stories including the deaths of John Lennon and Natalie Wood. Robin Leach cut his teeth as a New York-based correspondent before signing on to do Entertainmen
|
https://en.wikipedia.org/wiki/SX%20News
|
SX News was a weekly gay and lesbian newspaper based in Sydney, Australia.
One of several titles published by Evo Media under the Gay News Network banner. SX News (commonly referred to as SX) was distributed throughout Sydney and New South Wales.
Features
The publication covered local, national and international news of interest to the gay and lesbian community, and had a strong focus on the arts and entertainment.
SX featured interviews with high-profile people of interest to the gay and lesbian community. Interviews over the years included Kylie Minogue, Scissor Sisters, The Hon. Michael Kirby, Louie Spence, Sydney Lord Mayor Clover Moore MP, NSW Premier Nathan Rees, Dr Brad McKay, Rupert Everett, Perez Hilton, Janet Jackson, k.d. lang, Liza Minnelli, Pam Ann, and the Pet Shop Boys.
Editors
Previous SX editors included founding editor Martin de Courtenay, Reg Domingo, Peter Hackney and Brad Johnston. The publication drew on a stable of regular contributors, including political commentators Rodney Croome and Sam Butler, theatre critic Veronica Hannon, Gay media identity Trevor Ashley, Sydney drag identity Joyce Mange and gay Australian author C. S. Burrough, whose novel Not Grunting, Squealing was serialised in 23 weekly instalments between 25 January 2001 and 21 June 2001.
History
In late 2006, the publication changed from a newsprint format to a high-quality, full-colour full-gloss format.
SX was the official media sponsor of the Sydney Gay and Lesbian Mardi Gras.
In July 2010, SX celebrated its 500th issue with a special retrospective edition.
In 2015, SX began an LGBTI Health and HIV online hub called Check Up.
In 2015, television doctor Dr Brad McKay began a regular column called "Ask Dr Brad" in SX magazine and on the CheckUp web portal.
In March 2017, after allegations of insolvent trading, non payment of creditors, including staff and the Australian Taxation Office, the group's main website http://www.gaynewsnetwork.com.au was taken offline by their hosting provider due to non payment. Since then no explanation has been provided to staff, suppliers or advertisers as to the status of the publications. As at 7 May 2017, all sites associated with EvoMedia remain offline with no sign as to when if ever they will come online again.
References
External links
SX News website
True Crime News Weekly
2000 establishments in Australia
LGBT culture in Sydney
LGBT-related newspapers published in Australia
Defunct newspapers published in Sydney
Newspapers established in 2000
Weekly newspapers published in Australia
2017 disestablishments in Australia
Publications disestablished in 2017
Defunct weekly newspapers
|
https://en.wikipedia.org/wiki/Cairn%20Valley%20Light%20Railway
|
The Cairn Valley Light Railway was a rural railway line built to connect Moniaive and other communities in the Cairn Valley with the main railway network at Dumfries. It opened in 1905 but usage was disappointing, and declined further when bus companies started competing. It was closed to passengers in 1943, and completely closed in 1949.
History
Early proposals
The Glasgow and South Western Railway (G&SWR) fully opened its main line between Glasgow and Carlisle via Dumfries in 1850, revolutionising transport facilities at the places served. Communities that were by-passed began to feel disadvantages of not having a railway connection.
As early as 1865 a branch railway to Moniaive was proposed: the G&SWR paid two-thirds of the cost of a survey. In 1867 a determined effort was made to start construction. The cost of a line connecting Moniaive to the G&SWR was estimated at £66,000, but local promoters only got commitment to £20,150 in subscriptions. They approached the G&SWR with a request to subscribe the difference, but the G&SWR took the view that any advantages would come to the inhabitants themselves, and it was for them to put up the money. The scheme came to nothing. A further scheme was proposed in 1872, the Glencairn Railway from Auldgirth to Moniaive; this scheme obtained Parliamentary authorisation, but was unable to raise the needed capital. Another unsuccessful proposal followed in 1879.
In 1896 two proposed lines were put forward; they planned different routes. One would strike east following the valley of the Shinnel Water to connect with the G&SWR main line at Thornhill; this was the shortest path to the main line, but would involve challenging gradients. The second proposed to descend south-south-east with the Cairn Water and the Cluden Water to join the G&SWR a short distance north of Dumfries, near Holywood. While also having significant gradients this route would be more moderate, and involved easier civil engineering, and had the advantage of reaching close to the County Burgh.
A viable scheme
This time the G&SWR was persuaded of the advantage of having the railway constructed, and it adopted the Holywood scheme. The GS&WR Act of 6 August 1897 authorised the construction (along with several other G&SWR proposals): the line was named the Cairn Valley Railway, and its estimated cost was £165,840.
The Light Railways Act of 1896 had been enacted in order to permit the construction of local railways with some of the requirements for main line routes somewhat relaxed, to allow cheaper construction, and the G&SWR belatedly considered that the Cairn Valley line was well suited to the arrangement. Some changes to the route were suggested by them at this stage, but they were advised that the Act authorising the line could not be varied without a further Act of Parliament. Inaction followed until the Board resolved to apply for a Light Railway Order (LRO) for the originally determined route, on 4 October 1898; the budget was reduce
|
https://en.wikipedia.org/wiki/480th%20Intelligence%2C%20Surveillance%20and%20Reconnaissance%20Wing
|
The 480th Intelligence, Surveillance, and Reconnaissance Wing (480th ISR Wing) is headquartered at Langley Air Force Base, Virginia.
Mission
The 480th ISR Wing leads Air Force globally networked ISR operations. The wing operates and maintains the Air Force Distributed Common Ground System (DCGS), also known as the AN/GSQ-272 "Sentinel" weapon system, conducting imagery, cryptologic, and measurement and signatures intelligence activities. The unit processes twenty terabytes of data each day.
The 480th ISR Wing employs more than 6,000 civilian and military personnel, and operates and manages over $5 billion of intelligence resources.
The 27th Intelligence Squadron is assigned directly to the wing and provides communication and network services. Tests and evaluates emerging information technologies and handles all aspects of the 480th ISR Wing security program.
480th Intelligence, Surveillance and Reconnaissance Group
Based at Fort Gordon, Georgia (13 May 2010 – present). Conducts real-time tactical and national intelligence collection, exploitation, analysis and reporting operations. The Group provides cryptologic products and services to war fighters and decision makers operating in, or concerned with, the CENTCOM, EUCOM, AFRICOM and SOCOM areas of responsibility. The Group also conducts Air Force National Tactical Integration and Tactics Analysis Studies Element missions for the 609th Air and Space Operations Center and is the Air Force component of the National Security Agency-Central Security Service-Georgia. The Group consists of the 3rd Intelligence Squadron, the 31st Intelligence Squadron, and the 451st Intelligence Squadron; all located at Fort Gordon, Georgia.
497th Intelligence, Surveillance and Reconnaissance Group
Based at Langley Air Force Base, Virginia. Delivers real-time high-confidence intelligence, surveillance and reconnaissance products and services to Joint and Coalition forces and other designated government agencies. The Group consists of two active duty Squadrons, the 30th Intelligence Squadron and 10th Intelligence Squadron, one Air National Guard unit, the 192nd Intelligence Squadron (VA ANG), and a new classic Air Reserve unit, the 718th Intelligence Squadron, stood up to support the total force integration of the Wing and combat ISR operations.
548th Intelligence, Surveillance and Reconnaissance Group
Delivers real-time high-confidence intelligence, surveillance and reconnaissance products and services to Joint and Coalition forces and other designated government agencies. The Group also processes, exploits and disseminates broad area, synoptic, high-resolution imagery collected by the U-2 Optical Bar Camera for combatant commanders and war fighting forces worldwide.
The following Air National Guard squadrons are operationally gained by the group when federalized.
222d Intelligence Squadron (CA ANG), Beale AFB, California
222d Operational Support Squadron (CA ANG), Beale AFB, California
234th Intelligence S
|
https://en.wikipedia.org/wiki/Vallensb%C3%A6k%20station
|
Vallensbæk station is a railway station on the Køge radial of the S-train network in Copenhagen, Denmark. It serves the southern end of Vallensbæk Municipality.
See also
List of railway stations in Denmark
References
S-train (Copenhagen) stations
Railway stations opened in 1972
Buildings and structures in Vallensbæk Municipality
Railway stations in Denmark opened in the 1970s
|
https://en.wikipedia.org/wiki/Ish%C3%B8j%20station
|
Ishøj station is a railway station on the Køge radial of the S-train network in Copenhagen, Denmark. It serves the urbanized coastal end of Ishøj municipality.
The Greater Copenhagen Light Rail is expected to have its southern terminus at Ishøj station.
See also
List of railway stations in Denmark
References
External links
S-train (Copenhagen) stations
Railway stations opened in 1976
Buildings and structures in Ishøj Municipality
Railway stations in Denmark opened in the 1970s
|
https://en.wikipedia.org/wiki/Greve%20station
|
Greve station is on the Køge radial of the S-train network in Copenhagen, Denmark. It is the middle of three stations in the urbanized coastal end of Greve municipality, and serves the mainly residential areas Greve and Mosede.
In this area, the twin railroad sits on a ridge raised above the surrounding terrain. Greve station has a single platform between the two tracks, running in a south-western to north-eastern direction. The platform can be accessed via staircases at both ends, but facilities such as the elevator, automatic ticket machines, the adjacent convenience store and bus stops are "concentrated" at the south-western end. Likewise, the "short" S-Trains (4 carriages rather than 8, used outside rush hours) also stop at this end of the platform.
In 2016 a construction project began at Greve station. More open space, more bicycle stands, and more nice and reliable area. In the municipality of Greve, the station is a central point in the city and they want it to be a nice area to get into when walking out of the train. New, and more, lights are coming to the "plaza" of the station area. New coating to the ground is getting laid out and more green space is coming. The project is expected to be finished in November or December 2017.
The project is a 15 million Danish kroner project, where the municipality of Greve is paying the half.
See also
List of railway stations in Denmark
References
S-train (Copenhagen) stations
Railway stations opened in 1979
1979 establishments in Denmark
Railway stations in Denmark opened in the 1970s
|
https://en.wikipedia.org/wiki/Z%20Rock
|
Z Rock was a nationally syndicated radio network based in Dallas, Texas, United States that, from the mid-1980s through the mid-1990s, played heavy metal and hard rock music. The format was one of several 24-hour satellite-delivered music formats offered by the pioneering Satellite Music Network (a company which in 1989 merged with ABC Radio Networks and later became Cumulus Media Networks). Z Rock debuted on Labor Day in 1986 with WZRC in Chicago as its first affiliate. During its early days, Z Rock drew attention for playing unedited, explicit versions of songs. In March 1990, Z Rock was nominated for the Billboard Awards, the only time a full-time hard rock/metal programming service has ever been so honored in the history of Billboard magazine. After several changes in personnel and programming direction, the network was discontinued on December 31, 1996.
Programming
Marketing
Z Rock targeted fans of heavy metal and hard rock, a group that was increasingly ignored by conventional album-oriented rock (AOR) stations. As a result, the network had a massive economic impact on record labels, affiliate stations, and other businesses serving this largely untapped market. Metal and hard rock recording artists, particularly those signed to independent music labels, enjoyed greater exposure. Advertising sales to record companies as well as music retailers such as Camelot Music and Musicland increased significantly at Z Rock affiliates and music publications; Rolling Stone reported that accounts doubled in the several months since the network's launch.
The opening bumper for commercial breaks was an 8-note guitar riff from the first part of the song "House of 1,000 Pleasures" by Japanese band Ezo.
Various slogans used for Z Rock's imaging and promotions exuded a sense of rebellion and irreverence. Such sayings included the following:
"If it's too loud, you're too old!"
"Flip us on and flip them off"
"We don't brake for wimps"
"If you're not crankin' it, you must be yankin' it!"
"Lock it in, and rip your knob off"
Another such slogan mocked classic rock programming, followed by "Who cares?! Z-Rock RULES!"
Marketed nationally for local broadcast with local commercials inserted, Z Rock's market penetration across the country varied considerably. While the local broadcasts were usually presented on FM radio, in some areas the network was carried by small AM outlets. Some publicity was provided for several years by the comic strip Funky Winkerbean, in which one of the main characters often wore a Z Rock T-shirt.
From 1989 to 1991, Z Rock produced Z-Rock Magazine, a print publication distributed free of charge in network affiliate cities.
Z Rock gained notoriety for its "mascot" vehicle, the "Z Rock hearse", which was displayed at various events and locations throughout the Dallas–Fort Worth metroplex. The vehicle ultimately was awarded to a lucky winner in a promotional giveaway. Dennis C. Weaver of Dallas drew the "lucky key" in a drawing held at Soun
|
https://en.wikipedia.org/wiki/67th%20Cyberspace%20Operations%20Group
|
The 67th Cyberspace Operations Group is a unit of the 67th Cyberspace Wing. Headquartered on Kelly Field Annex's Security Hill, the group is an Air Force information operations unit.
The group was first organized during World War II as the 67th Observation Group and saw combat with Eighth and Ninth Air Forces in the European Theater of Operations. It was deployed for 36 months overseas and 18 months of combat action. The group performed tactical reconnaissance during the D-Day invasion of Europe and the campaign against Germany. For its World War II operations, the group earned the Distinguished Unit Citation, two foreign decorations, and the Belgian Fourragère.
Mission
The 67th COG is the principal Air Force group conducting Offensive Cyber Operations (OCO) to "Engage the Enemy." Provides forces to conduct Air Force computer network operations for United States Strategic Command, United States Cyber Command and other combatant commands. The group conducts computer network operations and warfare planning for the Air Force, joint task forces and combatant commanders. The group also conducts Secretary of Defense-directed special network warfare missions.
History
For related history, see 67th Cyberspace Wing
World War II
Flew antisubmarine patrols along the east coast of the US after the Japanese attacked Pearl Harbor. Began training in January 1942 for duty overseas. Operational squadrons were the 12th, 107th, 109th, and 153d Observation Squadrons.
Moved to the European theater, August–October 1942. Assigned first to Eighth and later (October 1943) to Ninth Air Force. At RAF Membury, the group received well-used Supermarine Spitfire Vs and early Douglas A-20 Havoc and Boston aircraft from the RAF plus a few L-4B Grasshopper observation aircraft to train with until their Lockheed F-5/P-38 Lightning aircraft arrived from the United States. The 67th Group operated as the nucleus of the USAAF tactical reconnaissance organization in the UK, a task acknowledged by the redesignation as such soon after the Membury units were transferred to the Ninth Air Force in October 1943. At the time of the transfer to Ninth Air Force, the group was redesignated the 67th Reconnaissance Group.
At the time, the 107th and 109th Squadrons were converting to North American P-51 Mustangs. However, before this was completed, the 107th Squadron was moved to RAF Aldermaston and the 109th to RAF Middle Wallop so that their reconnaissance photographs and visual intelligence would be quickly available to IX Troop Carrier Command and IX Fighter Command Headquarters based there.
The group received a DUC for operations along the coast of France, 15 February – 20 March 1944, when the group flew at low altitude in the face of intense flak to obtain photographs that aided the invasion of the Continent. Flew weather missions, made visual reconnaissance for ground forces, and photographed enemy positions to support the Normandy campaign and later to assist First Army and other A
|
https://en.wikipedia.org/wiki/Benedek%20Broadcasting
|
Benedek Broadcasting was a television broadcasting company, who owned and operated 22 network-affiliated television stations throughout the United States, all affiliated with major television networks, serving mainly small and medium-size markets. The company was founded in the late 1970s by A. Richard Benedek but grew in the 1990s with buyouts of Brisette Broadcasting and Stauffer Communications. The company was based in Hoffman Estates, Illinois. Throughout its existence, namesake Benedek served as chairman and chief executive officer.
Benedek also owned U.S. Virgin Islands station WBNB-TV starting in 1986, but was knocked off the air by Hurricane Hugo in 1989. Its facilities were so badly damaged that Benedek, with no financial resources to rebuild, essentially chose to abandon the station, and its license was deleted in 1995.
Benedek Broadcasting filed for bankruptcy in 2002, and sold off its 22 stations to different owners, many of them to Gray Television with the balance (all small or struggling stations) going to Chelsey Broadcasting. Barrington Broadcasting which began operations in 2004 with former Benedek president and COO K. James Yager as CEO, occupied what had been Benedek's headquarters and purchased two of the former Benedek stations which had been purchased by Chelsey, until it was acquired by Sinclair Broadcast Group in 2013.
Benedek Broadcasting had also operated Benedek Interactive Media, an 'Internet newsroom' that extended web-only coverage and editorial capabilities to its stations.
Former stations
Stations are arranged alphabetically by state and by city of license.
Defunct television broadcasting companies of the United States
Defunct companies based in Illinois
Companies disestablished in 2002
Companies based in Cook County, Illinois
Hoffman Estates, Illinois
2002 disestablishments in Illinois
Gray Television
|
https://en.wikipedia.org/wiki/Check%20Point%20Integrity
|
Check Point Integrity is an endpoint security software product developed by Check Point Software Technologies. It is designed to protect personal computers and the networks they connect to from computer worms, Trojan horses, spyware, and intrusion attempts by hackers. The software aims to stop new PC threats and attacks before signature updates have been installed on the PC. The software includes.
network access controls that detect and remedy security policy violations before a PC is allowed to connect to a network;
application controls that block or terminate malicious software programs before they can transmit information to an unauthorized party;
a personal firewall;
an intrusion prevention system (IPS) Check Point Intrusion Prevention System – IPS;
spyware detection and removal;
and instant messaging security tools.
An administrator manages the security policies that apply to groups of users from a central console and server.
Check Point acquired the Integrity software as part of its acquisition of endpoint security start-up Zone Labs in 2004. The Integrity software, released in early 2002, was derived from the ZoneAlarm security technology and added central policy management and network access control functions. Integrity was integrated with network gateways (the Cisco VPN 3000 series) to ensure that a PC met security requirements before it was granted access to the network.
Demand for endpoint security grew in 2003 after the SQL Slammer and Blaster computer worms reportedly caused extensive damage, despite widespread use of antivirus software on personal computers. A number of destructive worms that followed, and the subsequent rise of spyware as a significant problem, continued to increase demand for endpoint security products. Data privacy and integrity regulations and required security audits mandated by governmental and professional authorities, along with infections and damage caused by guest PC access, have also prompted use of such security software.
Competitors include Symantec/Sygate, Cisco Security Agent, McAfee Entercept, and even point products like Determina's Memory Firewall.
External links
Check Point Software Technologies website page on Check Point Integrity (aka Check Point Endpoint Security)
InfoWorld review of Check Point Integrity
Techweb story on Check Point Integrity
Firewall software
|
https://en.wikipedia.org/wiki/Shunpei%20Yamazaki
|
is a Japanese inventor in the field of computer science and solid-state physics. He is a prolific inventor who is listed as a named inventor of more than 11,000 patent families and more than 26,000 distinct patent publications for his inventions. In 2005, he was named as the most prolific inventor in history by USA Today. Kia Silverbrook subsequently passed Yamazaki on February 26, 2008. Yamazaki then passed Silverbrook in 2017.
He completed a graduate course at Doshisha University, Graduate School of Engineering.
Semiconductor Energy Laboratory
Shunpei Yamazaki is the president and majority shareholder of research company Semiconductor Energy Laboratory (SEL) in Tokyo. Most of the patents he holds are in relation to computer display technology and held by SEL, with Yamazaki named either individually or jointly as inventor. He has many inventions regarding these.
References
1942 births
Doshisha University alumni
Japanese engineers
Japanese inventors
Living people
Patent holders
Recipients of the Medal with Purple Ribbon
|
https://en.wikipedia.org/wiki/Cell%20microprocessor%20implementations
|
Cell microprocessors are multi-core processors that use cellular architecture for high performance distributed computing. The first commercial Cell microprocessor, the Cell BE, was designed for the Sony PlayStation 3. IBM designed the PowerXCell 8i for use in the Roadrunner supercomputer.
Implementation
First edition Cell on 90 nm CMOS
IBM has published information concerning two different versions of Cell in this process, an early engineering sample designated DD1, and an enhanced version designated DD2 intended for production.
The main enhancement in DD2 was a small lengthening of the die to accommodate a larger PPE core, which is reported to "contain more SIMD/vector execution resources".
Some preliminary information released by IBM references the DD1 variant. As a result, some early journalistic accounts of the Cell's capabilities now differ from production hardware.
Cell floorplan
Powerpoint material accompanying an STI presentation given by Dr Peter Hofstee], includes a photograph of the DD2 Cell die overdrawn with functional unit boundaries which are also captioned by name, which reveals the breakdown of silicon area by function unit as follows:
SPE floorplan
Additional details concerning the internal SPE implementation have been disclosed by IBM engineers, including Peter Hofstee, IBM's chief architect of the synergistic processing element, in a scholarly IEEE publication.
This document includes a photograph of the 2.54 mm × 5.81 mm SPE, as implemented in 90-nm SOI. In this technology, the SPE contains 21 million transistors of which 14 million are contained in arrays (a term presumably designating register files and the local store) and 7 million transistors are logic. This photograph is overdrawn with functional unit boundaries, which are also captioned by name, which reveals the breakdown of silicon area by function unit as follows:
Understanding the dispatch pipes is important to write efficient code. In the SPU architecture, two instructions can be dispatched (started) in each clock cycle using dispatch pipes designated even and odd. The two pipes provide different execution units, as shown in the table above. As IBM partitioned this, most of the arithmetic instructions execute on the even pipe, while most of the memory instructions execute on the odd pipe. The permute unit is closely associated with memory instructions as it serves to pack and unpack data structures located in memory into the SIMD multiple operand format that the SPU computes on most efficiently.
Unlike other processor designs providing distinct execution pipes, each SPU instruction can only dispatch on one designated pipe. In competing designs, more than one pipe might be designed to handle extremely common instructions such as add, permitting more two or more of these instructions to be executed concurrently, which can serve to increase efficiency on unbalanced workflows. In keeping with the extremely Spartan design philosophy, for the SPU no execution
|
https://en.wikipedia.org/wiki/Bridge%20management%20system
|
A bridge management system (BMS) is a set of methodologies and procedures for managing information about bridges. Such system is capable of document and process data along the entire life cycle of the structure steps: project design, construction, monitoring, maintenance and end of operation.
First used in literature in 1987, the acronym BMS is commonly used in structural engineering to refer to a single or a combination of digital tools and software that support the documentation of every practice related to the single structure. Such software architecture has to meet the needs of road asset managers interested on tracking the serviceability status of bridges through a workflow mainly based on 4 components: data inventory, cost and construction management, structural analysis and assessment and maintenance planning. The implementation of BMS usually is built on top of relational databases, geographic information systems (GIS) and building information modeling platform (BIM) also named bridge information modeling (BrIM) with photogrammetric and laser scanning processing software used for the management of data collected during targeted inspections. The output of the whole procedure, as stated also in some national guidelines of different countries, usually consists of a prioritization of intervention on bridges classified in different risk level according to information collected and processed.
History
Since the late 1980s the structural health assessment and monitoring of bridges represented a critical topic in the field of civil infrastructure management. In the 1990s, the Federal Highway Administration (FHWA) of the United States promoted and sponsored PONTIS and BRIDGEIT, two computerized platforms for viaduct inventory and monitoring named BMSs. In the following years, also outside the U.S., the growing need of an organized and digitized road asset management has led responsible national agencies to adopt increasingly complex solutions able to meet their objectives, such as building inventories and inspection databases, planning for maintenance, repair and rehabilitation interventions in a systematic way, optimizing the allocation of financial resources, and increasing the safety of bridge users. Moreover, as of 2020s, the occurrence of some significant bridge collapse events and an increased sensitivity to the environmental impact of large structure management operations has led some national authorities such as France and Italy to the designation of national guidelines with detailed guidance for the development and adoption of multilevel BMS to optimize bridge management.
System components
Researchers in the field of structural engineering have identified 4 main components for the implementation of a functional BMS:
Data inventory.
Cost and construction management.
Structural analysis and assessment.
Maintenance planning.
Data inventory
Data and information referring to each life cycle step of bridges need to be collected and
|
https://en.wikipedia.org/wiki/V%C3%A6rl%C3%B8se%20station
|
Værløse Station is a commuter railway station serving the town of Værløse in Furesø municipality. It is located on the Farum radial of the S-train network in Copenhagen, Denmark.
See also
List of railway stations in Denmark
References
External links
S-train (Copenhagen) stations
Railway stations opened in 1906
1906 establishments in Denmark
Railway stations in Denmark opened in the 1900s
|
https://en.wikipedia.org/wiki/Farum%20station
|
Farum station is the terminus of the Hareskovbanen radial of the S-train network around Copenhagen, Denmark. It is located about 1 km east of the old village Farum, but is the center of the modern Farum, which has grown up around the station.
History
The station opened in 1906 as an intermediate station on the Copenhagen-Slangerup railway. The line between Farum and Slangerup closed in 1954. The station was remodeled completely prior to the line's conversion to S-trains in 1977.
See also
List of railway stations in Denmark
References
External links
S-train (Copenhagen) stations
Railway stations opened in 1906
1906 establishments in Denmark
Farum
Railway stations in Denmark opened in the 1900s
|
https://en.wikipedia.org/wiki/ATV%20Offroad%20Fury%202
|
ATV Offroad Fury 2 is a racing video game developed by Rainbow Studios and published by Sony Computer Entertainment, released exclusively for the PlayStation 2. It is a sequel to ATV Offroad Fury, and is the first in the series to support online multiplayer, using both broadband and dial-up connection. It was released on November 12, 2002 in North America and on October 3, 2003 in Europe.
The game was succeeded by ATV Offroad Fury 3 in 2004.
Gameplay
Expanding from its predecessor, ATV Offroad Fury 2 features more ATVs (including Ravage Talons), along with more vehicles, mini-games, championships, and others. The ATVs do not suffer damage, but their occupants are vulnerable to dismounts from ATVs, if the vehicle lands poorly or another racer lands on the player. Also, after riding for an extended period of time, the ATVs will become dirty. They can be cleaned by resetting or driving into the water. However, if the player stays in the deep water for more than 5 seconds, they are teleported out of the water. If the player drives out of bounds, they will dismount from their ATV and fly through the air. The game also features new point-earning tricks, as well as championships where players can earn profile points for each race completed. Completing championships will unlock a new event such as Freestyle events, which objective the players must complete within the time limit. The game also offers minigames.
ATV Offroad Fury 2 is also the first installment in the series to offer online play, which allows players to challenge other players over an online network (including a set of Lobbies), connected via i-Link, local area network (LAN) or other network connections.
The range of stunts featured in ATV Offroad Fury 2 are typically activated by tapping a combination of buttons while the player's ATV is in the air, to activate stunt-based combo moves. Each set of tricks also require a different amount of time to perform.
Reception
ATV Offroad Fury 2 received "generally favorable" reviews, according to review aggregator Metacritic.
IGN gave the game 9 out of 10, praising the gameplay, but criticizing the soundtrack. GameSpot gave the game 7 out of 10, noting the lack of changes from the previous game.
ATV Offroad Fury 2 received a nomination for "Console Racing Game of the Year" at the AIAS' 6th Annual Interactive Achievement Awards, but lost to Need for Speed: Hot Pursuit 2.
References
External links
2002 video games
ATV Offroad Fury
Multiplayer and single-player video games
MX vs. ATV
PlayStation 2 games
PlayStation 2-only games
Racing video games
Sony Interactive Entertainment games
Video games developed in the United States
Rainbow Studios games
|
https://en.wikipedia.org/wiki/KADF-LD
|
KADF-LD (channel 20) is a low-power television station in Austin, Texas, United States, affiliated with Ace TV. It is owned by Bridge Media Networks. On cable, the station is seen on Spectrum on channel 14 in the Austin area in addition to its over-the-air broadcast signal.
Recent developments
On November 21, 2022, Bridge Media Networks, the parent company of 24/7 headline news service NEWSnet, announced it would acquire KADF-LD from Joseph W. Shaffer for $825,000. Upon the completion of the transaction, Bridge will make KADF-LD the first NEWSnet owned-and-operated station in the state of Texas. The sale was consummated on January 12, 2023.
Technical information
Subchannels
The station's digital channel is multiplexed:
References
External links
ADF-LD
Television channels and stations established in 2006
|
https://en.wikipedia.org/wiki/International%20Journal%20of%20American%20Linguistics
|
The International Journal of American Linguistics (IJAL) is an academic journal devoted to the study of the indigenous languages of the Americas. IJAL focuses on the investigation of linguistic data and the presentation of grammatical fragments and other documents relevant to Amerindian languages.
History
The journal was established in 1917 by anthropologist Franz Boas. it has been published by the University of Chicago Press since 1974.
References
External links
International Journal of American Linguistics homepage
International Journal of American Linguistics-SJR
Linguistics journals
University of Chicago Press academic journals
Academic journals established in 1917
Quarterly journals
English-language journals
|
https://en.wikipedia.org/wiki/Area%2071
|
Area 71 is the unofficial title for Walmart's data center, located in Jane, Missouri, near the Arkansas border. The facility has a capacity of over 460 terabytes (460 trillion bytes) of data. The facility is built directly on bedrock to better withstand natural and man-made disasters. It is self-sufficient, with generators and the capability to retain data connection with the Walmart network using copper wire, fiber optic cable, or satellite communications.
Sales patterns are analyzed here to identify trends in purchasing before major events (e.g., natural disasters, holidays) so that Walmart executives can better stock store shelves in anticipation of this event.
Walmart uses the data facility to control many functions of its stores, including control of lighting, adjusting the climate control, and playing the in-store music. The data center maintains the computer system that employees use to "clock in" at every location, and provides email to keep employees informed of events pertinent to their job function.
References
External links
Wal-Mart's Use of Collected Data
Additional Info About Area-71
"Inside Wal-Mart's 'Threat Research' Operation" WSJ article about Wal-Mart's data collection.
Walmart
|
https://en.wikipedia.org/wiki/California%20Birth%20Index
|
The California Birth Index (CABI) is a database compiled by the California Office of Health Information and Research. The index contains birth records of all registered births in California between 1905 and 1995. Each record is an abstract of a person's birth certificate, including date of birth, full name, county of birth, gender, and mother's maiden name.
The index is available online from a number of sources. See below.
People who have been adopted are sometimes listed by their birth name, sometimes listed by their adopted name, sometimes by both and sometimes not listed at all. The CABI is considered a valuable genealogy tool but is also criticized for privacy issues. California began statewide civil registration of births on 1 July 1905. Earlier birth records may exist in the county where the birth took place or at the church where a baptism took place.
Controversy
Critics of the index claim that the index's information aids in identity theft. Several public record websites have purchased copies of the index from the California Department of Health Services. In 2001, the San Jose Mercury News printed a story about the index, then accessible on genealogical website Rootsweb, causing numerous complaints and requests for removal from the index, and ultimately leading to the index being removed from the site.
The California Birth Index, along with the California Death Index, was at one time available free at Rootsweb. When Rootsweb was purchased by Ancestry.com, the index remained available for a time, but then was removed by Ancestry because of complaints concerning privacy violations. The index was then only available through VitalSearch and later through Family Tree Legends and FamilySearch. Ancestry has restored the index to its content, but has not restored the notes by users posted in the index when it was available on Rootsweb. Ancestry will remove individual listings upon request. California Birth Index listings on the Family Tree Legends website do not include the mother's maiden name, but listings at Ancestry.com, FamilySearch, and VitalSearch websites do.
Despite the controversy, birth records in California are public record. Any person can request and receive a copy of the birth certificate of any other person born in California. To reduce the risk of identity theft, only certain persons may obtain an authorized copy of a birth record. All others may obtain an informational copy. The informational copy will have the same information on it as an authorized copy, but will be stamped "INFORMATIONAL, NOT A VALID DOCUMENT TO ESTABLISH IDENTITY."
See also
Social Security Death Index
WP:BLPPRIMARY: Why you should never use the California Birth Index as a source on Wikipedia.
References
External links
Identity documents of the United States
Birth registration
People from California
|
https://en.wikipedia.org/wiki/Ches
|
Ches may refer to:
Assata Shakur (married name Joanne Chesimard), nickname
CHES (buffer)
William Cheswick ("Ches") a computer security and networking researcher
See also
Chez (disambiguation)
Chess
|
https://en.wikipedia.org/wiki/1957%E2%80%9358%20United%20States%20network%20television%20schedule
|
The following is the 1957–58 network television schedule for the four major English language commercial broadcast networks in the United States. The schedule covers primetime hours from September 1957 through March 1958. The schedule is followed by a list per network of returning series, new series, and series cancelled after the 1956–57 season.
As in previous seasons, both CBS and ABC continued to add Westerns to their schedule, filling prime time with as many "oaters" (as they were derisively called) as possible. In addition to several returning Westerns which the network retained on its fall 1957 schedule, ABC's new western series included Sugarfoot and Broken Arrow on Tuesday nights, Tombstone Territory on Wednesdays, Colt .45 on Fridays, and Maverick on Sundays.
ABC, third in the network Nielsen ratings, placed its new Western Maverick in a difficult time slot: Sunday night against two hit series: The Steve Allen Show on NBC, and The Ed Sullivan Show on CBS. ABC aired Maverick one half-hour prior to the Allen and Sullivan programs; the strategy was designed to "hook the audience before it fell into its usual viewing habits".
NBC, late to the Western format, also began plugging Westerns into its fall schedule. New NBC Western series debuting in the 1957–58 season included Wagon Train, The Restless Gun, and The Californians (though one NBC executive insisted The Californians is not a Western but a drama set in California in the 1850s).
Another programming shift occurred at NBC: the network's flagship news program, The Huntley-Brinkley Report, moved to the 7:15 PM weekday timeslot, for the first time going head to head against both ABC's and CBS's news programs. The face-off between the three networks' news programs would become the standard model for U.S. broadcast television; the three networks still air their network news programs against one another.
1958 saw a number of executive changes at the networks; these presidential shifts would affect the network television schedules. Oliver Treyz became the president of ABC on February 17, Louis G. Cowan became the president of CBS on March 12, and NBC programmer Robert Kintner became the president of NBC on July 11. Dr. Allen B. DuMont resigned as chairman of the board of the DuMont Broadcasting Corporation on May 13, and the name of the company was changed to Metropolitan Broadcasting Corporation. According to Castleman and Podrazik (1982) the final DuMont Network program, Monday Night Fights aired for the last time on August 4, 1958, carried on only five stations nationwide. NBC's Kraft Television Theatre, which had debuted in 1947 and was the oldest program still left on television, was cancelled in spring 1958. It was the dawn of a new era in television; producer David Susskind, who had produced KTT at the end, would call 1958 "the year of the miserable drivel".
New fall series are highlighted in bold. Series ending are highlighted in italics
Each of the 30 highest-rated shows is liste
|
https://en.wikipedia.org/wiki/Railways%20in%20Sydney
|
Sydney, the largest city in Australia, has an extensive network of passenger and freight railways. The passenger system includes an extensive suburban railway network, operated by Sydney Trains, a metro network and a light rail network. A dedicated freight network also exists. Future expansion of the light rail network includes the Parramatta Light Rail. Existing light rail services are the Inner West Light Rail and the CBD & South East Light Rail.
Central station is the major interchange for Sydney Trains suburban services, while Sydney Terminal (now also known as Central Station) serves NSW TrainLink regional and intercity services. Sydney's light rail network also passes through Central. Journey Beyond's Indian Pacific train service to Perth also departs from here.
Sydney's suburban rail network is the busiest in Australia, with over 359 million journeys made in the 2017–18 financial year.
Passenger service
Suburban rail services in Sydney have been operated since 2013 by Sydney Trains. Over 1 million weekday passenger journeys are made on 2,365 daily services over of track and through 306 stations (including interurban lines). Most trains do not operate between midnight and 4.30am. Suburban services operate along the portions of the main lines from Sydney to the north, west, south and south-west, and also along several dedicated suburban lines. All of these lines are electrified at overhead 1500 V DC, starting in 1926. Some of the suburban stations are also served by the intercity and regional trains operated by NSW TrainLink.
Most suburban services operate through central Sydney via the underground City Circle (not a true circle line but a two-way loop extending under the CBD from Central station), the Eastern Suburbs line, or over the Harbour Bridge. There have been long-term plans for a further underground line passing beneath Pitt Street to a new harbour crossing. This is currently under construction as part of the Sydney Metro City & Southwest and expected to be completed in 2024.
Timetables are published for all lines, and most lines run on minimum frequencies of every 15 minutes from early morning to midnight, 7 days a week. Frequencies are higher during peak periods and over shared routes. Although frequencies match metro style operation in the city core, few Sydneysiders use the underground network as a metro, most journeys being commuter trips from suburbs into the central city area. An exception to this is the Eastern Suburbs line which serves the high density inner eastern suburbs and opened in 1979.
Rolling stock
All suburban passenger trains in Sydney are electric multiple units.
Upon electrification in the 1920s Sydney operated single-deck multiple units, but these were progressively withdrawn from the 1960s until their demise in 1993. Single-deck automatic trains were reintroduced to Sydney in May 2019, with the completion of the Sydney Metro Northwest.
Double-deck trailer carriages were delivered to the NSW Governm
|
https://en.wikipedia.org/wiki/Inside%20Outside
|
Inside outside may refer to:
Inside–outside algorithm, a way of re-estimating production probabilities in a probabilistic context-free grammar
Inside/outside, a model of political reform
Inside–outside test, a test used in computer graphics to determine if a point is inside or outside of a polygon
Inside Outside (Petra Blaisse), a design firm founded by Dutch designer Petra Blaisse in 1991
Books
Inside Outside (novel), a 1964 fantasy novel written by Philip José Farmer
Inside, Outside, a 1985 historical novel by Herman Wouk
Music
"Inside Outside" (Delirious? song), a 2004 single by Delirious?, from their album World Service
"Inside Outside" (Sophie Monk song), a 2002 single by Sophie Monk, from her debut album Calendar Girl
"Inside, Outside" (The Grates song), a 2006 song by The Grates from their debut album Gravity Won't Get You High
"Inside to Outside", a 1986 song by Limahl later covered in 1999 by Italian singer Lady Violet
"Inside Outside", song by Keb Mo from The Reflection
Inside/Outside, a 2019 album by Cook Craig released under the moniker Pipe-Eye
See also
Outside Inside (disambiguation)
|
https://en.wikipedia.org/wiki/Peter%20Samson
|
Peter R. Samson (born 1941 in Fitchburg, Massachusetts) is an American computer scientist, best known for creating pioneering computer software for the TX-0 and PDP-1.
Samson studied at the Massachusetts Institute of Technology (MIT) between 1958-1963. He wrote, with characteristic wit, the first editions of the Tech Model Railroad Club (TMRC) dictionary, a predecessor to the Jargon File. He appears in Hackers: Heroes of the Computer Revolution by Steven Levy.
Career
The Tech Model Railroad Club
As a member of the Tech Model Railroad Club in his student days at MIT, Samson was noted for his contributions to the Signals and Power Subcommittee, the technical side of the club. Steven Levy's Hackers: Heroes of the Computer Revolution outlines Samson's interest in trains and electronics, and his influence in the club. Levy explains how the club was in fact Samson's gateway into hacking and his ability to manipulate electronics and machine code to create programs. Levy explains how Samson discovered his programming passion with the IBM 704, but frustration with the high level of security around the machine. Only those with very high clearance were able to actually handle the computer, with all programs submitted to be processed through the machine by someone else. This meant Samson would not find out the results of his programs until a few days after submitting them. Because of these restrictions to the IBM 704, it was not until Samson was introduced to the TX-0 that he could explore his obsession with computer programming, as members of the Railroad Club were able to access the computer directly without having to go through a superior.
Dawn of software
Working with Jack Dennis on the TX-0 at MIT Building 26, he developed an interest in computing waveforms to synthesize music. For the PDP-1 he wrote the Harmony Compiler with which PDP-1 users coded music.
He wrote the Expensive Planetarium star display for Spacewar!.
Also for the PDP-1 he wrote TJ-2 (Type Justifying Program), the predecessor of the troff and nroff page layout programs developed at Bell Labs, a War card game, and, with Alan Kotok, T-Square, a drafting program that used a Spacewar! controller for an input device.
DEC
Samson was a contributing architect to the Digital Equipment Corporation (DEC) PDP-6, and wrote the machine's first Fortran compiler, for Fortran II.
Chinese
At Systems Concepts, he programmed the first Chinese-character digital communication system, while he was director of marketing and director of program development.
Synthesized music
Samson designed the Systems Concepts Digital Synthesizer. Built at Systems Concepts, for ten years it was the primary engine for the computer music group at Stanford University Center for Computer Research in Music and Acoustics (CCRMA).
NASA
Samson oversaw manufacturing and engineering for hardware, including the central memory subsystem for the ILLIAC IV supercomputer complex at the NASA Ames Research Center.
Autodesk
At Aut
|
https://en.wikipedia.org/wiki/Corydoras%20reticulatus
|
Corydoras reticulatus, also called the reticulated corydoras, mosaic corydoras, network catfish, or network corydoras, is a tropical freshwater fish belonging to the Corydoradinae sub-family of the family Callichthyidae. It originates in inland waters in South America, and is found in the Lower Amazon River basin in Brazil.
The fish grows up to 2.4 inches (6.1 centimeters) in length. It lives in a tropical climate in water with a 6.0–8.0 pH, a water hardness of 2–25 dGH, and a temperature range of 72–79 °F (22–26 °C). It feeds on worms, benthic crustaceans, insects, and plant matter. It lays eggs in dense vegetation and adults do not guard the eggs. The female holds 2–4 eggs between her pelvic fins, where the male fertilizes them for about 30 seconds. Only then does the female swim to a suitable spot, where she attaches the very sticky eggs. The pair repeats this process until about 100 eggs have been fertilized and attached.
The reticulated corydoras is of commercial importance in the aquarium trade industry.
See also
List of freshwater aquarium fish species
References
External links
Photos at Fishbase
Care information for Reticulated Cory in the home aquarium at the Aquarium Wiki
Corydoras
Taxa named by Alec Fraser-Brunner
Fish described in 1938
|
https://en.wikipedia.org/wiki/NICS
|
NICS is a four-letter abbreviation with multiple meanings, such as:
Network of International Christian Schools
National Instant Criminal Background Check System in the United States
Northern Ireland Civil Service
Nucleus-independent chemical shift
National Insurance Contributions (NICs) in the United Kingdom
National Institute for Computational Sciences, a supercomputing center managed by the University of Tennessee
See also
NIC (disambiguation)
|
https://en.wikipedia.org/wiki/The%20Lost%20Islands
|
The Lost Islands is an Australian television series which first aired in Australia on Network Ten. It later screened around the world, including the United Kingdom, France, West Germany, Italy, The Netherlands, Greece (and various other parts of Europe), as well as Israel, New Zealand, South Africa, Sri Lanka, Canada and the United States.
Plot
A hurricane nearly sinks the United World, a sailing ship holding 40 teenagers from all around the world. Most of them flee the ship in lifeboats, but the evacuating children are not counted, and five are left behind. The storm blows the battered ship across a reef into the lagoon of an uncharted island.
The island, Tambu, is ruled by a supposedly 200-year-old immortal tyrant called "Q", who came to the island on one of several ships originally bound for New Holland. In the centre of the island is a valley in which the descendants of the original ship still live, in the manner of an 18th-century colonial community. Adjacent to Tambu is a smaller island, Malo, which is a barren wasteland. It is noteworthy because of a lagoon where prisoners are forced to dive for a "blue weed" which, according to the people of Tambu, is refined into a powder which the Q uses to extend his life.
The five children befriend a local family, the Quinns, who help them remain hidden on the island in a swamp avoided by locals because it is, according to local myth, inhabited by the ghosts of the dead. Most of the episode storylines pit the children against the Q, who fears their knowledge of the outside world is a threat to his dominion of Tambu.
In the final episode, the children do not escape the lost islands but instead remain stranded. As the end credits begin, they are seen celebrating the liberation of the village from the tyrant "Q", who has retreated into exile on the far tip of the island, plotting his revenge.
Production history
Unlike most Australian television series of the time, which were either entirely produced by a TV network, or a TV network in association with a local production company, The Lost Islands was a co-production between the Australian Network 10 and a US studio, Paramount Pictures. Both have been owned by Paramount Global since 2019.
Three early episodes were edited together to make a 35mm feature film released in Australia in December 1975.
Cast
Protagonists
Tony Hughes as Tony, an Australian and orphan.
Jane Vallis as Anna, a German.
Robert Edgington as David, an American.
Amanda Ma as Su Yin, a Chinese.
Chris Benaud as Mark, a British.
The People of Tambu/The "Q-People"
Margaret Nelson as Helen Margaret Quinn.
Rodney Bell as Aaron James Quinn, Helen's younger brother.
Michael Howard as Jason Quinn, Helen's older brother.
Ron Haddrick as The Q, the tyrant of Tambu.
Ric Hutton as Rufus Quad, Q's prime minister.
Willie Fennell as Jeremiah Quizzel, a friend of the Quinns and Q's personal servant.
Cornelia Frances as Elizabeth Quinn, Helen's mother.
Don Pascoe as Adam Quinn, Helen
|
https://en.wikipedia.org/wiki/NZR%20K%20class%20%281932%29
|
The NZR K class of 1932 was a class of mixed traffic 4-8-4 steam locomotives built by the New Zealand Railways Department (NZR) that operated on New Zealand's railway network. The locomotives were developed following the failure of the G class Garratt locomotives. The class should not be confused with the much earlier K class of 1877-78, the first American-built engines to arrive in New Zealand.
History
The three G class locomotives were introduced by NZR in response to increased tonnages, especially on the mountainous, demanding North Island Main Trunk Railway. However, various faults led to their swift withdrawal from service and NZR still needed a large and powerful type of locomotive. It decided to develop a conventional rather than articulated locomotive, to avoid a repeat of the G class failure.
Initially conceived as a 4-8-2 locomotive, the K class was to be at least 50% more powerful than the AB class, and due to New Zealand's narrow gauge track and limited loading gauge, the power had to be very carefully compressed into an area smaller than would usually be used for such a locomotive.
Constructed at Hutt Workshops, the class utilised plate frames, partial mechanical lubrication, Franklin butterfly Firehole doors, and roller bearings on all but the trailing bogie. The class had a distinctive appearance when first outshopped, with a pressed smokebox front and the headlight jutting out forward of the top of the smokebox. This latter feature was soon changed at the insistence of one of the Railway’s Board of Management – instead, it was sunken flush into the smokebox, which required some modification and changed the aesthetic look of the class quite markedly.
K 919 was given an ACFI feedwater heater system as a trial, a feature that was continued on the subsequent KA and KB classes.
In service
Upon entering service the class were used on heavy freight and express passenger trains. The K class were best known for spectacular running on the mountainous parts of the North Island Main Trunk in the central North Island and on the Marton - New Plymouth Line around Wanganui. In particular, they took over from the X class locomotives which had been used particularly on the Raurimu Spiral.
While generally reliable, trouble at first was encountered with the long-travel Walschaerts valve gear, and with the plate frames. While the valve gear problems were largely solved by reducing travel from the original 8 inches to inches, the plate frames continued to crack especially in the region of the firebox. While many repairs were undertaken to fix the frames, this problem was only solved by replacing the frame with the new design constructed for the KA and KB classes. This was only done as the replacement was required; as a result not all of the class received the new frames.
After the Second World War, a coal shortage occurred and NZR converted a large number of locomotives to oil burning. The K class were a prime candidate due to the large size
|
https://en.wikipedia.org/wiki/Carry%20flag
|
In computer processors the carry flag (usually indicated as the C flag) is a single bit in a system status register/flag register used to indicate when an arithmetic carry or borrow has been generated out of the most significant arithmetic logic unit (ALU) bit position. The carry flag enables numbers larger than a single ALU width to be added/subtracted by carrying (adding) a binary digit from a partial addition/subtraction to the least significant bit position of a more significant word. This is typically programmed by the user of the processor on the assembly or machine code level, but can also happen internally in certain processors, via digital logic or microcode, where some processors have wider registers and arithmetic instructions than (combinatorial, or "physical") ALU. It is also used to extend bit shifts and rotates in a similar manner on many processors (sometimes done via a dedicated flag). For subtractive operations, two (opposite) conventions are employed as most machines set the carry flag on borrow while some machines (such as the 6502 and the PIC) instead reset the carry flag on borrow (and vice versa).
Uses
The carry flag is affected by the result of most arithmetic (and typically several bit wise) instructions and is also used as an input to many of them. Several of these instructions have two forms which either read or ignore the carry. In assembly languages these instructions are represented by mnemonics such as ADD/SUB, ADC/SBC (ADD/SUB including carry), SHL/SHR (bit shifts), ROL/ROR (bit rotates), RCR/RCL (rotate through carry), and so on. The use of the carry flag in this manner enables multi-word add, subtract, shift, and rotate operations.
An example is what happens if one were to add 255 and 255 using 8-bit registers. The result should be 510 which is the 9-bit value 111111110 in binary. The 8 least significant bits always stored in the register would be 11111110 binary (254 decimal) but since there is carry out of bit 7 (the eight bit), the carry is set, indicating that the result needs 9 bits. The valid 9-bit result is the concatenation of the carry flag with the result.
For x86 ALU size of 8 bits, an 8-bit two's complement interpretation, the addition operation 11111111 + 11111111 results in 111111110, Carry_Flag set, Sign_Flag set, and Overflow_Flag clear.
If 11111111 represents two's complement signed integer −1 (ADD al,-1), then the interpretation of the result is -2 because Overflow_Flag is clear, and Carry_Flag is ignored. The sign of the result is negative, because Sign_Flag is set. 11111110 is the two's complement form of signed integer −2.
If 11111111 represents unsigned integer binary number 255 (ADD al,255), then the interpretation of the result would be 254, which is not correct, because the most significant bit of the result went into the Carry_Flag, which therefore cannot be ignored. The Overflow_Flag and the Sign_Flag are ignored.
Another example may be an 8-bit register with the bit pattern 0101
|
https://en.wikipedia.org/wiki/Parity%20flag
|
In computer processors the parity flag indicates if the numbers of set bits is odd or even in the binary representation of the result of the last operation. It is normally a single bit in a processor status register.
For example, assume a machine where a set parity flag indicates even parity. If the result of the last operation were 26 (11010 in binary), the parity flag would be 0 since the number of set bits is odd. Similarly, if the result were 10 (1010 in binary) then the parity flag would be 1.
x86 processors
In x86 processors, the parity flag reflects the parity only of the least significant byte of the result, and is set if the number of set bits of ones is even (put another way, the parity bit is set if the sum of the bits is even). According to 80386 Intel manual, the parity flag is changed in the x86 processor family by the following instructions:
All arithmetic instructions;
Compare instruction (equivalent to a subtract instruction without storing the result);
Logical instructions - XOR, AND, OR;
the TEST instruction (equivalent to the AND instruction without storing the result).
the POPF instruction
the IRET instruction
an instruction or interrupt that causes a hardware task switch
In conditional jumps, parity flag is used, where e.g. the JP instruction jumps to the given target when the parity flag is set and the JNP instruction jumps if it is not set. The flag may be also read directly with instructions such as PUSHF, which pushes the flags register on the stack.
One common reason to test the parity flag is to check an unrelated x87-FPU flag. The FPU has four condition flags (C0 to C3), but they can not be tested directly, and must instead be first copied to the flags register. When this happens, C0 is placed in the carry flag, C2 in the parity flag and C3 in the zero flag. The C2 flag is set when e.g. incomparable floating point values (NaN or unsupported format) are compared with the FUCOM instructions.
References
See also
x86 architecture
x86 assembly language
x86 Flags Register
Central processing unit
|
https://en.wikipedia.org/wiki/Negative%20flag
|
In a computer processor the negative flag or sign flag is a single bit in a system status (flag) register used to indicate whether the result of the last mathematical operation produced a value in which the most significant bit (the left most bit) was set. In a two's complement interpretation of the result, the negative flag is set if the result was negative.
For example, in an 8-bit signed number system, -37 will be represented as 1101 1011 in binary (the most significant bit, or sign bit, is 1), while +37 will be represented as 0010 0101 (the most significant bit is 0).
The negative flag is set according to the result in the x86 series processors by the following instructions (referring to the Intel 80386 manual):
All arithmetic operations except multiplication and division;
compare instructions (equivalent to subtract instructions without storing the result);
Logical instructions – XOR, AND, OR;
TEST instructions (equivalent to AND instructions without storing the result).
References
Computer arithmetic
|
https://en.wikipedia.org/wiki/Dumper%20%28computer%20program%29
|
In computer programming, a dumper is a program which copies data from one source (usually a proprietary format) to another (usually in a more easily accessible format).
A dumper is a program that saves data from the computer's memory, usually from a foreign process (program) to a (*.dmp) file. Often the process's memory is dumped automatically to disk if the program crashes. You may recover any unsaved data from this file or send it to the developer so he can investigate what caused the crash.
Another use of 'dumpers' can be dumping Windows Exe-files from memory after they have been unpacked/decrypted for further analysis (in case of malware), or after unwrapping/unpacking certain security envelopes. These security envelopes are applied by the developer or software vendor to 'protect' these applications.
Usually, a security envelope checks if the application has not been modified, if you are still on your evaluation period or if the original CD is inserted before it unpacks and starts the application in memory. However, just dumping is not enough - because structures like the imported API-Call were overwritten or intentionally mangled by the protector at the start and need to be rebuilt to get a running executable.
Data transmission
|
https://en.wikipedia.org/wiki/ITV%20Food
|
ITV Food is the name given to the category of cookery shows broadcast on the ITV Network. Although the ITV Food website has been dropped there are still several cookery programmes and items on other daytime shows.
Shows
External links
British cooking television shows
ITV (TV network) original programming
|
https://en.wikipedia.org/wiki/VTun
|
VTun is a networking application which can set up Virtual Tunnels over TCP/IP networks. It supports Internet Protocol (IP), Point-to-Point Protocol (PPP) and Serial Line Internet Protocol (SLIP) protocols. It exists as the reference implementation of the Tun/Tap user-space tunnel driver which was included in the Linux kernel as of version 2.4, also originally developed by Maxim Krasnyansky. Bishop Clark is the current maintainer.
Networking
Like most other applications of its nature, VTun creates a single connection between two machines, over which it multiplexes all traffic. VTun connections are initiated via a TCP connection from the client to the server. The server then initiates a UDP connection to the client, if the UDP protocol is requested.
The software allows the creation of tunnels, for routing traffic in a manner similar to PPP, as well as a bridge-friendly ethertap connection.
Authentication
VTun uses a Private Shared Key to negotiate a handshake via a challenge and response.
Non-encrypting versions
A continual source of concern, and the target of more than one strongly worded security assessment, is that the VTun server and client binary applications can be completely built without encryption support. When such binaries are used, the encryption between both endpoints is only a simple XOR cipher, which is completely trivial to decode. This type of build is not supported by the developers.
References
External links
Internet protocols
Free security software
|
https://en.wikipedia.org/wiki/Lyngby%20station
|
Lyngby station is a station on the Hillerød radial of the S-train network in Copenhagen, Denmark. It is located centrally in Kongens Lyngby. With its large bus terminal, situated on the east side of the station, it is an important hub for public transport in the northern suburbs of Copenhagen.
The station building contains a shopping arcade with circa 15 stores, including two supermarkets.
The station opened in 1863.
History
Lyngby Station opened on 1 October 1863 as the terminus of the first stage of Nordbanen. The small station building was designed byVilhelm Carl Heinrich Wolf. The railway was extended to Helsingør in 1864. The Lyngby-Vedbæk Railway opened in 1890. The station building was demolished in connection with the introduction of double tracks between Hellerup and Holte. A new and larger station building, located a little to the south of the old one, was built in 1890–91 to design by Heinrich Wenck and N.P.C. Holsøe.
The rail line was electrified and converted S-train service in 1936. The terminus of the Lyngby-Vedbæk Railway was also moved to Jægersborg. The old station building was demolished in 1956.
Building
Lyngby Bypass runs along the roof of the station building which is located on the east side of the railway tracks. The building contains a 200 metre long shopping arcade with circa 15 shops with a total floor area of 8,369 square metres. In 2012, DSB Ejendomme acquired the shopping arcade from Lyngby-Taarbæk Municipality. It was subsequently refurbished with the assistance of Gottlieb Paludan Architects. The shopping arcade was acquired by Nordic Real Estate Partners (NREP) in 2014. Stores include two Fakta and Netto supermarket, a Matas and a Lagkagehuset bakery.
Number of travellers
According to the Østtællingen in 2008:
See also
List of railway stations in Denmark
References
External links
S-train (Copenhagen) stations
Railway stations in Denmark opened in 1863
|
https://en.wikipedia.org/wiki/Sorgenfri%20station
|
Sorgenfri station is a station on the Hillerød radial of the S-train network in Copenhagen, Denmark. It serves Sorgenfri and the southern part of Virum. It is located at Hummeltoftevej 51 and is named for the nearby Sorgenfri palace.
History
The station was established in 1936 in connection with the conversion of Nordbanen into an S-train line. The station opened on 15 May 1936. It was then located at present-day Lottenborgvej which was then called Hummeltoftevej and crossed the railway on a bridge.
The station was moved to the northwest in connection with the construction of the Lyngby Bypass in 1955. Hummeltoftevej was also moved north and the old road was renamed Lottenborgvej after the property Lottenborg.
See also
List of railway stations in Denmark
References
S-train (Copenhagen) stations
Railway stations opened in 1936
1936 establishments in Denmark
Railway stations in Denmark opened in the 1930s
|
https://en.wikipedia.org/wiki/Aller%C3%B8d%20railway%20station
|
Allerød station is a railway station serving the town of Lillerød in Allerød municipality north of Copenhagen, Denmark. It is located on the Hillerød radial of Copenhagen's S-train network. The station opened in 1864. Originally it was named Lillerød, but the name was changed in 1952 to prevent confusion with nearby Hillerød. The station is served by A trains.
Number of travellers
According to the Østtællingen in 2008:
See also
List of railway stations in Denmark
References
External links
S-train (Copenhagen) stations
Buildings and structures in Allerød Municipality
Railway stations in Denmark opened in 1864
|
https://en.wikipedia.org/wiki/Rafed%20Network%20for%20Cultural%20Development
|
Rafed Network for Cultural Development is behind Rafed.net & Rafed.com (شبكة رافد للتنمية الثقافية), one of the most popular Shi'a websites.
Origins
The rafed network is based in Shi'a academic center of the world. It was established by Institute of Ahl al-Bayt (as) for Restoration of Books (Arabic: Institute of āl al-bayt alayhumassalam li-ihya ul-turrāth, ), a large institute that was established in 1983 and has become one of the largest providers of documentation on Shia scholarship in the world, having branches in UK, Germany, Turkey Lebanon and Syria.
Rafed.net & Rafed.com
They are the owners of Rafed.net, a mainly Arabic site, as can be seen from its main page, but it also has an English section. The site is the most third most visited Shi'a site among Alexa Internet users, second only to Irna.com and al-shia.com.
The site has Qur'an translations in multiple languages, including Spanish, French, Russian, English and the original Arabic.
The site is notable for spreading the scholarship of Grand Ayatollah Ali al-Sistani, and is among several Shi'a sites blocked in Saudi Arabia. Joshua Teitelbaum writes:
See also
The Ahlulbayt (a.s.) Global Information Center
Ahlul Bayt Digital Islamic Library Project
References
External links
Rafed.net
Rafed.com
Shia Islamic websites
Shia organizations
|
https://en.wikipedia.org/wiki/Virum%20station
|
Virum station is a station on the Hillerød radial of the S-train network in Copenhagen, Denmark. It serves the neighbourhood of Virum north of Lyngby. The station is served by E trains.
See also
List of railway stations in Denmark
References
S-train (Copenhagen) stations
|
https://en.wikipedia.org/wiki/Pilot%20%28CSI%3A%20Crime%20Scene%20Investigation%29
|
"Pilot" is the first episode and the series premiere of the American crime drama CSI: Crime Scene Investigation. It first aired on October 6, 2000, on the CBS network in the United States. The premise of the show revolves around the crime scene investigators working for the Las Vegas Police Department, in what was known in this episode as the "criminalistics" division. The pilot introduces the main characters of Gil Grissom (William Petersen), Catherine Willows (Marg Helgenberger), Nick Stokes (George Eads), Warrick Brown (Gary Dourdan) and Jim Brass (Paul Guilfoyle); and then-recurring character Greg Sanders (Eric Szmanda). The pilot was written by series creator Anthony E. Zuiker and directed by Danny Cannon.
Plot
Holly Gribbs introduces herself to Gil Grissom, who is the assistant supervisor of the graveyard shift. Grissom then asks her for a pint of blood and after that, Gribbs officially begins her shift.
Nick Stokes and Warrick Brown both realize that they only need to solve one more crime to reach the level of CSI 3. The two eventually agree on a bet of 20 dollars that one of them will be promoted to CSI Level 3 by the end of the night. Catherine Willows jumps out of a car, saying goodbye to her daughter and her sister before rushing into the CSI building. Night Shift supervisor Jim Brass hands the CSIs their assignments for the night.
Brass and Grissom investigate what appears to be the suicide of Royce Harmon. However, the autopsy shows that the entry hole for the bullet is too big for a shot at close range, as would be the case if he had shot himself in the chest, and they realize that Harmon was murdered.
Grissom finds a fingerprint with latex particles in it on the tape-recorder Harmon used to record his "suicide" note. The print belongs to Paul Millander, a man who sells fake Halloween hands made from a mold of his own hand. Grissom realizes that the suspect used one of these hands.
Nick Stokes arrives at his crime scene and meets a man who was drugged by a hooker and had his possessions stolen while he was unconscious. Nick notices a discoloration around the man's mouth that he thereafter ties up with another caseload, Kristy Hopkins, who accidentally crashes her car when she got knocked unconscious while driving. He notices the same discoloration around her nipples and realizes that she put scopolamine on her nipples to knock out her victims and steal their possessions.
Catherine and Warrick arrive at a house where a man lies dead. They have discovered that the dead man had been staying at the house until the owners recently kicked him out. When he tried to kick in the door, the husband shot him. Catherine notices that the husband's left toenail is broken and that the laces of the dead man's shoes are tied differently from each other. Warrick processes the shoes and finds a broken toenail in one of them. He tries to obtain a warrant for the husband's toenails but Brass refuses to call the judge, so Warrick visits Judg
|
https://en.wikipedia.org/wiki/Packard%20Bell%20Navigator
|
Packard Bell Navigator is an alternative shell for the Windows 3.1 and Windows 95 operating systems that shipped with Packard Bell computers in the mid 1990s. The shell was designed to be simpler to use for computer novices by representing applications as objects in a virtual home, similar to Microsoft Bob and At Ease. The software was originally developed by a company called Ark Interface, which was acquired by Packard Bell in 1994.
It was possible for Navigator to function on non-Packard Bell Windows PCs.
Design and functionality
Most pre-1995 versions contained a GUI very similar to Apple Computer's At Ease, but without the folders. Unlike At Ease, programs were grouped in sections such as "Microsoft DOS", "Microsoft Windows", "Service & Support", and "Software". The "Software" section was the only section users could customise and modify program icons, paths, and links. The above sections appeared as icons at startup.
Navigator was a standard Windows program, meaning when the computer was booted, Windows would start and load Navigator from the startup directory. If the Windows icon in Navigator was clicked, the program would become minimized. If Navigator was removed from the Startup folder, it would not load at Windows startup. This is similar to the design of Microsoft Bob, which ran on top of Windows, and At Ease, which ran on top of the classic Mac OS Finder.
A 3D version, named Packard Bell 3D Navigator, shipped in 2000–2001.
Security, user accounts, and passwords
Unlike At Ease, which allowed multiple password-protected user accounts, Navigator only allowed password protection on each of the sections (only one password). However, multiple user accounts were not possible. All users were granted the same privileges.
References
External links
Toasty Technology GUI Gallery - Navigator 1.1 and Navigator 3.5
Packard Bell Navigator 1.0, 2.0, 3.0 and 3.9
Desktop shell replacement
Packard Bell
|
https://en.wikipedia.org/wiki/KMPX
|
KMPX (channel 29) is a television station licensed to Decatur, Texas, United States, serving the Dallas–Fort Worth metroplex as an affiliate of the Spanish-language network Estrella TV. It is owned by Tegna Inc. alongside Dallas-licensed ABC affiliate WFAA (channel 8). KMPX's offices are located on Gateway Drive in Irving, and its transmitter is located in Cedar Hill, Texas. Master control and most internal operations are based at the WFAA Communications Center Studios on Young Street in Downtown Dallas.
KMPX is the largest primary Estrella TV affiliate by market size that is not owned and operated by the network's parent company Estrella Media, although it was previously owned by Estrella Media from 2004 until 2020.
History
Prior history of UHF channel 29 in Dallas–Fort Worth
Channel 29 was originally allocated to Dallas, and two construction permits were issued for the channel. One was to be KLIF-TV, the television counterpart to radio station KLIF (1190 AM), owned by Gordon McLendon. A second attempt was made in 1962 to launch KAEI-TV on channel 29. Owned by and named for Automated Electronics Inc., the station would have broadcast printed quotes, news, and weather information. Since television sets were not required to include UHF tuners until the All-Channel Receiver Act went into effect in 1964, the company proposed to lease converters and UHF antennas to companies to install in their offices. Though the group hoped to be weeks away from signing the station on the air and gave dates of April 15 and June 1 for a planned sign-on, AEI never put it into service. The company's assets were acquired in late 1963.
In 1966, three applicants filed to build new stations on channel 29—Grandview Broadcasting (which later took itself out of the running), Overmyer Communications, and Maxwell Electronics. In a successful bid to give both applicants a channel, Overmyer proposed changing out channel 29 for channels 27 and 33 at Dallas; Overmyer never built its station on channel 27, and Maxwell signed on KMEC-TV on channel 33 in October 1967.
KMPX station history
In 1985, three applicants vied for a license to operate a television station on channel 29, including the Wise County Messenger newspaper, owned by former WBAP-TV (channel 5, now KXAS-TV) anchor Roy Eaton, whose petition had resulted in the allocation to Decatur. After a settlement was reached, the construction permit was granted to Decatur Telecasting, owned by Charlotte, North Carolina, housewife Karen Hicks, in December 1985. However, an unanticipated setback in the form of the sale of its planned tower site to new owners who would not allow the station to locate there led to years of delays and a sale to Word of God Fellowship, the ministry of the Daystar Television Network, owned by Marcus and Joni Lamb.
In 2003, Daystar acquired Denton-licensed noncommercial station KDTN (channel 2) from North Texas Public Broadcasting. KMPX was then sold to Liberman Broadcasting (which was renamed Estre
|
https://en.wikipedia.org/wiki/False%20network%20catfish
|
The false network catfish (Corydoras sodalis) is a tropical freshwater fish belonging to the subfamily Corydoradinae of the family Callichthyidae. It originates in inland waters in South America, and is found in the Amazon River in Loreto, Peru, and Amazonas, Brazil.
The fish will grow up to 1.9 in (4.9 cm) long. It lives in a tropical climate in water with a 6.0–8.0 pH, a water hardness of 2 – 25 dGH, and a temperature range of 72–79 °F (22–26 °C). It feeds on worms, benthic crustaceans, insects, and plant matter. It lays eggs in dense vegetation and adults do not guard the eggs.
See also
List of freshwater aquarium fish species
References
External links
Photos at Fishbase
Corydoras
Fish described in 1986
|
https://en.wikipedia.org/wiki/John%20Daugman
|
John Gustav Daugman is a British-American professor of computer vision and pattern recognition at the University of Cambridge. His major research contributions have been in computational neuroscience, pattern recognition, and in computer vision with the original development of wavelet methods for image encoding and analysis. He invented the IrisCode, a 2D Gabor wavelet-based iris recognition algorithm that is the basis of all publicly deployed automatic iris recognition systems and which has registered more than 1.5 billion persons worldwide in government ID programs.
Education and early life
The son of émigrés Josef Petros Daugmanis from Latvia and Runa Inge Olsson from Sweden, John Daugman was educated in America, receiving an A.B. degree and a Ph.D. degree (1983) from Harvard University.
Career and research
Following his PhD, Daugman held a post-doctoral fellowship, then taught at Harvard for five years. After short appointments in Germany and Japan, he joined the University of Cambridge in England to research and to teach computer vision, neural computing, information theory, and pattern recognition. He held the Johann Bernoulli Chair of Mathematics and Informatics at the University of Groningen in the Netherlands, and the Toshiba Endowed Chair at the Tokyo Institute of Technology in Japan before becoming Professor at Cambridge.
Iris recognition algorithm
Daugman filed for a patent for his iris recognition algorithm in 1991 while working at the University of Cambridge. The algorithm was first commercialized in the late 1990s. His algorithm automatically recognizes persons in real-time by encoding the random patterns visible in the iris of the eye from some distance, and applying a powerful test of statistical independence. It is used in many identification applications such as the Unique IDentification Authority of India (UIDAI) for registering all 1.3 billion citizens of India for government services and entitlements, border crossing controls in United Arab Emirates and passport-free immigration in the UK, the Netherlands, United States, Canada, and other countries.
Daugman's algorithm uses a 2D Gabor wavelet transform to extract the phase structure of the iris. This is encoded into a very compact bit stream, the IrisCode, that is stored in a database for identification at search speeds of millions of iris patterns per second per single CPU core.
Awards and honours
Daugman has received several awards, including:
Presidential Young Investigator Award from the US National Science Foundation
Information Technology Award and Medal from the British Computer Society
"Millennium Product" Award from the UK Design Council
"Time 100" Innovators Award
OBE, Order of the British Empire, from Queen Elizabeth II
Fellow of the Institute of Mathematics and its Applications (FIMA) (2011)
Fellow of the International Association for Pattern Recognition (FIAPR) (2012)
Fellow of the US National Academy of Inventors (FNAI) (2015)
Fellow of the Brit
|
https://en.wikipedia.org/wiki/KCTU-LD
|
KCTU-LD (channel 5) is a low-power television station in Wichita, Kansas, United States. Owned by River City Broadcasters, Inc., the station is affiliated with several digital multicast networks. KCTU-LD's studios are located on Water Street in Wichita's Midtown neighborhood, and its transmitter is located atop 250 Douglas Place in downtown.
It was one of four low-power channels in the United States to distribute RT America (Russia Today), which received funding from the Russian government and was accused of promoting Russian propaganda. The U.S. State Department has declared that Russian media outlets RT and Sputnik are "critical elements in Russia's disinformation and propaganda ecosystem." RT America ceased operations in March 2022 during Russia's invasion of Ukraine; KCTU replaced the network with France 24. It is also one of a few over-the-air stations that carry Infowars, the largely deplatformed fringe/far-right conspiracy channel operated by Alex Jones.
History
The station first signed on the air in 1992. On February 1, 1998, KCTU became the first commercial television station in the world to stream its programming online 24 hours a day to reach more viewers. In 2001, KCTU affiliated with Pax TV (now Ion Television). Because of the local programming and other network affiliations carried by the station (including a secondary affiliation with Urban America Television that lasted until that network's shutdown in May 2006), the station did not air as many infomercials as most Pax/i/Ion affiliates. The station dropped the network in 2008.
On May 10, 2007, the principal owners of KCTU through N&H Publishing Corp. announced the acquisition of the Wichita City Paper. Planned topics are similar to those featured on the local programs seen on the station including local and consumer news, religious topics and veterans' issues. The local television program guide that was formerly featured as an insert in The Prospector, also began appearing in the City Paper.
In August 2010, the station became affiliated with Estrella TV, a Hispanic network. By June 2011, KCTU primary subchannel was pick up by AT&T U-verse.
Ron and Sheryl Nutt, owners, placed the station up for sale in July 2012 with a July 22 deadline for offers.
In late July 2013, TV Scout was added as the station's fourth subchannel with some initial formatting glitches.
Cable carriage
As it is a low-power station, KCTU is not carried on Cox Communications as it is not obligated to carry KCTU under "must-carry" regulations as those rules do not currently apply to low-power stations. According to KCTU, the station presented the provider with a petition from 6,000 Cox subscribers and community leaders to carry the station. Cox refused to give KCTU channel space for free. According to KCTU, Cox increased their lease fee to $70,264 per month. This has led KCTU to encourage Cox subscribers to keep demanding that it carry the station, and to watch KCTU's programming over-the-air and on the int
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.