source
stringlengths
32
199
text
stringlengths
26
3k
https://en.wikipedia.org/wiki/Predictive%20buying
Predictive Buying is a marketing industry term describing the use of algorithmic consumer analytics to predict future buying patterns. Predictive buying combines data mining with statistical analysis to predict what a customer wants to buy, and then present that customer with advertisements for that product. It is a type of targeted advertisement. Predictive marketing is used by websites such as Amazon and advertising publishers such as Google and Facebook. Benefits While direct marketing (displaying the same promotional material to all consumers) and content-relevant ads (showing promotional material related to the content of an article) are both personal advertisements, they are independent of the particular consumer. Promoters of predictive marketing argue that it increases purchases by predicting what a consumer wants to buy and then showing them adverts for that. Even if the consumer does not know of a product's existence, predictive buying technology can, through an analysis of the consumer's interactions on other websites, purchase history and other factors, bring that product to the consumer's attention. Criticism The statistical nature of predictive buying means it will never match perfectly every time - some advertising space will be taken up with adverts that do not work. The reduction of this mismatch rate is one of the key goals of an advertisement firm. The amount of mismatch also increases the less information is available to predict from. Critics, such as Cory Doctorow, have pointed out that this mismatch creates a sort of arms race between marketing firms - who try and collect more and more data to further improve their predictions - and consumers, who over time learn to ignore or become desensitized to adverts. Eventually, the amount of data collected requires expensive processing infrastructure - data centers - and this drives the market towards concentration in a few large firms. The more data is collected, the more personally valuable data is collected and additionally the greater the effects of a data breach. There are also concerns about consumer privacy. For the business owner, the consequences of this arms race are that most of the money that is spent on predictive marketing will be wasted because, like all advertisements, they will be ignored. However, the money wasted on predictive marketing is higher than the money wasted on content-relevant adverts (for example), because predictive marketing firms charge a premium for their increased data collection and more complicated processing in exchange for purportedly improved marketing results. References Marketing analytics Customer relationship management Marketing techniques
https://en.wikipedia.org/wiki/Anu%C5%A1ka%20Ferligoj
Anuška Ferligoj is a Slovenian mathematician, born August 19, 1947, in Ljubljana, Slovenia, whose specialty is statistics and network analysis. Her specific interests include multivariate analysis (theory and application in social sciences, medicine, etc.), cluster analysis (constraints, multi-criteria clustering), social network analysis (blockmodeling, reliability and validity of network measurement), methodological research of public opinion, analysis of scientific networks. She is Fellow of the European Academy of Sociology. She is a professor emeritus (2020) at the University of Ljubljana, Slovenia, and has been employed by the Faculty of Social Sciences since 1972. In 2003–2005, she was the dean of the Faculty of Social Sciences. In 1992–2012, she was the head of the Centre for Methodology and Informatics at the Institute of Social Sciences (currently – its associate member). In 2002–2013, she headed the graduate program on statistics, and in 2012–2020 the master program on applied statistics. Since 2017, she is an academic supervisor of the International Laboratory for Applied Network Research of National Research University Higher School of Economics in Moscow, Russia. She is an elected member of the European Academy of Sociology and International Statistical Institute, and has been a member of boards of the International Network for Social Network Analysis, International Federation of Classification Societies, and International Sociological Association. She was an editor of the journal Advances in Methodology and Statistics (Metodološki zvezki) in 1987 – 2012. She has been a member of the editorial boards of several scientific journals, including Methodology, Statistics in Transition, Bulletin of Sociological Methodology, Structure and Dynamics: eJournal of Anthropology and Related Sciences, Journal of Classification, Journal of Mathematical Sociology, and Social Networks. She was a Fulbright scholar in 1990—1991 and visiting professor at the University of Pittsburgh (1996) and at the University of Vienna (2009/10). She was awarded the title of Ambassador of Science of the Republic of Slovenia in 1997. The book Generalized Blockmodeling received Harrison White Outstanding Book Award given by Mathematical Sociology Section at the American Sociological Association. Jointly with Vladimir Batagelj, she received Simmel award from the International Network for Social Network Analysis and was a keynote speaker at the XXVI Sunbelt Social Networks Conference in 2007. Early life and education Anuška Ferligoj obtained her B.S. in mathematics and physics in 1971, and her M.S. in operational research in 1979 from the University of Ljubljana. In 1983 she obtained her Ph.D. in information science from the same university under the supervision of Professor Branislav Ivanović. Since 1972, she was employed as assistant, assistant professor, associate professor and finally from 1994 as full professor at the Faculty of Social Sciences. Research and c
https://en.wikipedia.org/wiki/Max-80
The MAX-80 is a personal computer released in 1982 by Lobo Systems (formerly Lobo Drives International, a company from California). It differed from other TRS-80 compatible computers in that it was not hardware compatible with the TRS-80. Hardware The MAX-80 featured a Zilog Z80-B CPU which ran at 5.07 MHz, a very fast speed for its time. It came standard with 64KB of RAM, and was expandable via sockets for a further 64KB. The standard configuration originally consisted of a 64KB unit (later 128KB) and CP/M. The user could buy a complete system, or provide their own monitor and disk drives. The floppy disk controller could handle 8-inch drives using the standard IBM 3740 format in single-sided or double-sided modes, as well as 5.25-inch floppy drives with up to 80 cylinders. The Max-80 included a hard disk interface and two RS-232 serial ports. The MAX-80's character generator was user programmable. Software Up to 95% of TRS-80 Model III software would function without modification on the MAX-80. This did not include games. The special version of LDOS used was able to run most Model III programs with a patch disk available for those, such as VisiCalc, which it couldn't. The CP/M operating system was offered as well. A patched version of the TRS-80 Model 4's LS-DOS 6.x operating system was later made available for the MAX-80. This was called MAXDOS. Community A users' group called MAXIMUL published a MAX-80 newsletter. MAXIMUL actually outlived Lobo Systems, lasting until 1989. Reception Jerry Pournelle wrote in September 1983 that if the Max-80 came with more bundled software "it would be a strong contender for the best deal in microcomputerland. As it is, it's a lot of machine for the money". He recommended that customers join Maximul. References External links Lobo MAX-80 at Oldcomputers.net The Lobo MAX-80 at trs-80.org Lobo Drives International MAX-80 at Old-Computers.com LDOS and Me- By Tim Mann Z80-based home computers Computer-related introductions in 1982
https://en.wikipedia.org/wiki/Harz%20University%20of%20Applied%20Studies
The Hochschule Harz – University of Applied Studies and Research has two bases in Saxony-Anhalt. The Department of Automation and Computer Sciences as well as the Department of Business Studies are located in Wernigerode. The Department of Public Management can be found in Halberstadt. History In October 1991, Hochschule Harz was founded as “Fachhochschule Harz”. Initially, the courses on offer consisted of Business Administration, Tourism, and Business Informatics at the Department of Business Studies in Wernigerode. 77 students took up their studies in the 1991/1992 winter term. Meanwhile, six Bachelor's degree programs are offered at the Department of Business Studies. Today the number of students has increased to about 1,700. In the 2007/2008 winter term, two Master's degree programs – „Business Consulting“ and „Tourism and Destination Development“ – were launched. In autumn 1992 – one year after the foundation of the University of Applied Sciences – teaching started at the Department of Automation and Computer Sciences. At the beginning of the 1992/1993 winter term, 28 students were enrolled in the degree programs “Electrical Engineering” and “Computer Science” for the first time. Today, about 800 students are enrolled in a total of eight computer science and engineering-based degree programs. The course offer was completed with the Master's degree program “Computer Science/Mobile Systems”. The Department of Public Management in Halberstadt is the youngest department, and at the same time the second base of Hochschule Harz. In the 1998/1999 winter term, with the implementation of the degree programs “Public Administration” and “Administrative Economics/Public Service Management”, university education for the public sector started. The course offer was enlarged by introducing the degree programs “European Administrative Management” and “Administrative Management/eGovernment”. Undergraduate degree programs of the Department of Public Management are currently complemented by the Master's degree program “Public Management”. “Fachhochschule Harz” was renamed “Hochschule Harz – University of Applied Sciences” on January 27, 1998. The courses on offer increased continuously in the following years. In 2003, Hochschule Harz received the award „best practice Hochschule 2003" from „Centrum für Hochschulentwicklung“ (CHE). Campus Wernigerode Wernigerode is the headquarters of Hochschule Harz. The administrative and didactic buildings of the Department of Business Studies as well as the Department of Automation and Computer Sciences are located on a 62,000 sqm large, green campus in Hasserode (district of Wernigerode). In a new building on the site of a former paper mill, central departments like an electronic data processing center, a library, numerous didactic rooms/laboratories, and a media center with integrated recording studio can be found. The Language Self-Learning Center aims to improve language skills of students individually by integ
https://en.wikipedia.org/wiki/Graph-tool
graph-tool is a Python module for manipulation and statistical analysis of graphs (AKA networks). The core data structures and algorithms of graph-tool are implemented in C++, making extensive use of metaprogramming, based heavily on the Boost Graph Library. Many algorithms are implemented in parallel using OpenMP, which provides increased performance on multi-core architectures. Features Creation and manipulation of directed or undirected graphs. Association of arbitrary information to the vertices, edges or even the graph itself, by means of property maps. Filter vertices and/or edges "on the fly", such that they appear to have been removed. Support for dot, Graph Modelling Language and GraphML formats. Convenient and powerful graph drawing based on cairo or Graphviz. Support for typical statistical measurements: degree/property histogram, combined degree/property histogram, vertex-vertex correlations, assortativity, average vertex-vertex shortest path, etc. Support for several graph-theoretical algorithms: such as graph isomorphism, subgraph isomorphism, minimum spanning tree, connected components, dominator tree, maximum flow, etc. Support for several centrality measures. Support for clustering coefficients, as well as network motif statistics and community structure detection. Generation of random graphs, with arbitrary degree distribution and correlations. Support for well-established network models: Price, Barabási-Albert, Geometric Networks, Multidimensional lattice graph, etc. Suitability Graph-tool can be used to work with very large graphs in a variety of contexts, including simulation of cellular tissue, data mining, analysis of social networks, analysis of P2P systems, large-scale modeling of agent-based systems, study of academic Genealogy trees, theoretical assessment and modeling of network clustering, large-scale call graph analysis, and analysis of the brain's Connectome. References External links Numerical software Free mathematics software Free software programmed in Python Free software programmed in C++ Graph drawing software
https://en.wikipedia.org/wiki/Generalized%20entropy%20index
The generalized entropy index has been proposed as a measure of income inequality in a population. It is derived from information theory as a measure of redundancy in data. In information theory a measure of redundancy can be interpreted as non-randomness or data compression; thus this interpretation also applies to this index. In addition, interpretation of biodiversity as entropy has also been proposed leading to uses of generalized entropy to quantify biodiversity. Formula The formula for general entropy for real values of is: where N is the number of cases (e.g., households or families), is the income for case i and is a parameter which regulates the weight given to distances between incomes at different parts of the income distribution. For large the index is especially sensitive to the existence of large incomes, whereas for small the index is especially sensitive to the existence of small incomes. An Atkinson index for any inequality aversion parameter can be derived from a generalized entropy index under the restriction that - i.e. an Atkinson index with high inequality aversion is derived from a GE index with small . Moreover, it is the unique class of inequality measures that is a monotone transformation of the Atkinson index and which is additive decomposable. Many popular indices, including Gini index, do not satisfy additive decomposability. The formula for deriving an Atkinson index with inequality aversion parameter under the restriction is given by: Note that the generalized entropy index has several income inequality metrics as special cases. For example, GE(0) is the mean log deviation, GE(1) is the Theil index, and GE(2) is half the squared coefficient of variation. See also Atkinson index Gini coefficient Hoover index (a.k.a. Robin Hood index) Income inequality metrics Lorenz curve Rényi entropy Suits index Theil index References Income inequality metrics Information theory
https://en.wikipedia.org/wiki/Zuse%20Institute%20Berlin
The Zuse Institute Berlin (abbreviated ZIB, or Konrad-Zuse-Zentrum für Informationstechnik Berlin) is a research institute for applied mathematics and computer science on the campus of Freie Universität Berlin in Dahlem, Berlin, Germany. The ZIB was founded by law as a statutory establishment and as a non-university research institute of the State of Berlin in 1984. In close interdisciplinary cooperation with the Berlin universities and scientific institutions Zuse Institute implements research and development in the field of information technology with a particular focus on application-oriented algorithmic mathematics and practical computer science. ZIB also provides high-performance computer capacity as an accompanying service as part of the Network of high performance computers in Northern Germany (Norddeutscher Verbund von Hoch- und Höchstleistungsrechnern (HLRN)). Konrad Zuse, born in Berlin in 1910, is the namesake of the ZIB. SCIP (optimization software) SCIP (Solving Constraint Integer Programs) is a mixed integer programming solver and a framework for branch and cut and branch and price, developed primarily at Zuse Institute Berlin. Unlike most commercial solvers, SCIP gives the user low-level control of and information about the solving process. Run as a standalone solver, it is one of the fastest non-commercial solvers for mixed integer programs. SCIP is implemented as C callable library. For user plugins, C++ wrapper classes are provided. The solver for the LP relaxations is not a native component of SCIP, an open LP interface is provided instead. Currently supported LP solvers are CLP, CPLEX, MOSEK, SoPlex, and Xpress. SCIP can be run on Linux, Mac, Sun, and Windows operating systems. Prior versions of SCIP were distributed under a source-available license that allowed free academic use. Starting from version 8.0.3 the full suite was released under the Apache 2.0 license. Features The design of SCIP is based on the notion of constraints. It supports about 20 constraint types for mixed-integer linear programming, mixed-integer nonlinear programming, mixed-integer all-quadratic programming and Pseudo-Boolean optimization. It can also solve Steiner Trees and multi-objective optimization problems. Interfaces There are several native interface libraries available for SCIP. SCIP can be accessed through the modeling system of GAMS. Interfaces to MATLAB and AMPL are available within the standard distribution. There are also currently externalized interfaces for Python, Java, Julia, and Rust. References Further reading . External links Homepage Zuse Institute Berlin Research institutes in Berlin Scientific organisations based in Germany Supercomputer sites
https://en.wikipedia.org/wiki/Transportation%20Equity%20Network
The Transportation Equity Network (TEN) is a project of the Gamaliel Foundation and a grassroots organization with more than 350 community organizations in 41 states in the United States. TEN's stated goal is "to create an equity-based transportation system by connecting local transportation campaigns with D.C.-based advocacy." History The Transportation Equity Network was founded in 1997 by the Center for Community Change but has since been adopted as a project of the Gamaliel Foundation. TEN was founded to advocate for public transportation on a national level, to provide assistance to community organizations on the local level, and to advocate for public transportation as a civil rights issue. Notable actions TEN worked in 2005 with then-Senator Barack Obama to put workforce development language into a federal transportation authorization bill. This allowed local and state officials to craft local hiring agreements to create employment and training opportunities in the transportation construction sector. One early success was in St. Louis, Missouri, where TEN affiliate Metropolitan Congregations United brought the Missouri Department of Transportation to the table and won an agreement that 30% of the workforce on a $500 million highway project would be low-income apprentices and that 1/2 of 1% of the project budget ($2.5 million) would go to job training. This became known as the Missouri Model. Recently, TEN won a commitment from Secretary of Transportation Ray LaHood to encourage state Departments of Transportation to adopt TEN’s “Green Construction Careers (Missouri Model)” of workforce development nationwide. TEN also recently worked with Rep. Russ Carnahan to secure language in the jobs bill that passed the U.S. House of Representatives on December 17, 2009, to give transit authorities local control over spending priorities for up to 10 percent of the bill’s $8.4 billion in emergency public transit funding. In December 2009, the Congressional Black Caucus lifted up TEN’s “Green Construction Careers (Missouri Model)” in an open letter to President Obama. TEN and its affiliates also pursue causes on a local level. In April 2010, TEN member Metropolitan Congregations United (MCU) and allies led a successful campaign in support of a ballot initiative to reinvest in transit in St. Louis city and county. Voters overwhelmingly supported the measure, which will provide $75 million a year to restore service cuts. In the San Francisco Bay Area, TEN affiliate GENESIS was among several civil rights groups that filed a federal civil rights complaint and successfully stopped the use of $70 million in stimulus funds for a rail project that would have violated the Civil Rights Act. Instead, the money will be used to avoid cuts in the region’s other transit lines. In August 2010, in Kansas City, Missouri, TEN member MORE2 secured $11 million in local transit funding over 10 years, an increase of $5 million over previous levels. In Minnesota, TEN membe
https://en.wikipedia.org/wiki/CONFER%20%28software%29
CONFER is one of the first computer conferencing systems. Highly sophisticated for its time, it was developed in 1975 at the University of Michigan by then graduate student Robert Parnes. The CONFER system continued to be a widely used communication tool until 1999. CONFER is the progenitor of the computer conferencing systems Caucus, PicoSpan, and YAPP. Origins and history CONFER was developed in the mid-1970s when University of Michigan experimental psychology graduate student Bob Parnes attended a seminar where Professor Merrill M. Flood discussed aspects of electronic mail and conferencing on group decision making. Flood had a magnetic tape of a prototype system and approached Parnes about getting it to run on the Michigan Terminal System (MTS), the university's time-sharing system. Parnes declined, but offered instead to attempt writing a similar program for MTS. With encouragement from Fred Goodman and LeVerne Collet at the School of Education and Karl Zinn at the Center for Research on Learning and Teaching (CRLT), CONFER was developed. Because of a graduate teaching assistant strike, Parnes was temporarily relieved of his teaching duties and had some extra time to devote to his experimental system, which he called "CONFER". MTS served as an excellent development environment for CONFER, which was built on top of the MTS file structure and exploited its file sharing features. According to Parnes, "I don't think I could have written CONFER anywhere but on MTS." MTS at U-M and later at Wayne State University (WSU) was a good match for CONFER because both systems were attached to the Merit Network and thus had a broader reach within Michigan via Merit and within the U.S. and internationally via Merit's interconnections to Telenet (later SprintNet), Tymnet, ADP's Autonet, and later still the IBM Global Network and the Internet. Parnes' vision of the system was one where the individual group participant would alternate between being a producer and being a consumer of information. The unique CONFER feature in this regard was initially the functionality of the "vote." This feature allowed the consumer to voice their "feelings" or opinion on a statement by voting. Parnes went on to form his own company — Advertel Communication Systems, Inc. — which marketed and supported CONFER. The CONFER system continued to be a widely used communication tool until 1999. By this time, U-M, WSU, and the University of Alberta had moved from the Michigan Terminal System to distributed computing environments and several newer digital technologies replaced the functionality provided by CONFER. Sites where CONFER was used In addition to the University of Michigan CONFER was used at Wayne State University (WSU), the University of Alberta (UQV), Michigan State University (MSU), and at Hewlett-Packard (HP). MSU and HP both ran MTS so they could run CONFER. A Unix version, known as CONFER U, was created by the University of Michigan's Information Technology Divis
https://en.wikipedia.org/wiki/Computer-aided%20call%20handling
Computer aided call handling is a methodology for managing calls to service providers, such as emergency services, through the use of computer based algorithms in order to make consistent and objective decisions on action to be taken. The computer software can provide scripting, prompts or interactive questioning to assist the call handler in gathering information. The algorithms in the software will depend on the requirements of the service provider, the resources they have available, and the information that may be useful to resources dispatched or assigned to the call. The output is likely to be a prioritised list of tasks for action, where the action could be passing to another remote service (such as a telephony centre), dispatching a physical resource (such as an ambulance, police car or recovery truck) or closing the call without action. The advantage in using a computer based system is objectivity in decisions made, meaning a consistent service delivery. Call handling software can be linked to computer aided dispatch in order that this process is fully integrated, and information from the call handling software is passed directly to dispatch software where appropriate. This could also mean dispatching services which are not part of the organisation using the call handling software, such as an ambulance control centre automatically dispatching police to a violent incident, without the requirement to involve a further operator. References Logistics Public safety communications
https://en.wikipedia.org/wiki/Nakazato%20Dam
Nakazato Dam () is a dam in Mie Prefecture, Japan, completed in 1976. References External links Nakazato Dam - Network camera Dams in Mie Prefecture Dams completed in 1976
https://en.wikipedia.org/wiki/Jim%20Stickley
James Nelson Stickley III (born September 3, 1970) is the CEO of Stickley on Security, a co-founder and board member of TraceSecurity, Inc., and a published author. He is a cyber security expert who is known for his unique research into vulnerabilities that affect organizations as well as exposing identity theft risks to the average person. Stickley is also the founder of Stickley on Security Inc., a cyber security education company and since 2015 has been the featured cyber security expert in Lifelock infomercials. Early years In May 2000, Stickley discovered a buffer overflow vulnerability in the Gauntlet Firewall manufactured by Network Associates (known today as McAfee). This vulnerability allowed an attacker to remotely execute arbitrary code which resulted in complete compromise of the firewall. Before this discovery, application firewalls had been considered by many security experts to be the most secure solution for protecting networks on the Internet, and Network Associates had claimed Gauntlet to be the "Worlds most secure firewall". In September 2001, Stickley discovered an additional buffer overflow vulnerability in the same Gauntlet product. Discoveries and demonstrations Stickley continues to educate the public about new cyber security risks and vulnerabilities. Many of his discoveries are featured in news publications and on network news. In 2012 Stickley created a device that was hidden inside a magic marker that allowed him to bypass the locks on hotel rooms throughout the United States. In 2015 Stickley released a video showing the weaknesses in hotel safes after discovering he could bypass the digital locks. In 2017 Stickley discovered a vulnerability in Nordstrom Gift Cards that allowed him to use any Nordstrom Gift Card that was currently active. These discoveries and demonstrations as well as the many other discoveries he has made over the years have led to increased security worldwide through updates to products and applications based on his findings. Television Stickley has appeared as an expert on several networks, including CNN, Fox News Channel, NBC, and CNBC. Since 2015, Stickley has appeared as the "Cyber Security Expert" for LifeLock Inc. (NYSE:LOCK) in their televised and online infomercials. Books The Truth About Identity Theft (2008) Que Publishing Beautiful Security – Contributing Author (2009) O'Reilly Corporate Insecurity – (In Development) Que Publishing References 1970 births Living people American chief executives
https://en.wikipedia.org/wiki/State%20Policy%20Network
The State Policy Network (SPN) is a nonprofit organization that serves as a network for conservative and libertarian think tanks focusing on state-level policy in the United States. The network serves as a public policy clearinghouse and advises its member think tanks on fundraising, running a nonprofit, and communicating ideas. Founded in 1992, it is headquartered in Arlington, Virginia, with member groups located in all fifty states. Overview SPN describes itself as a "professional service organization" for a network of state-level think tanks across the United States. The president of SPN is Tracie Sharp, formerly the executive director of the Cascade Policy Institute, SPN's Oregon affiliate. She has described her organizing philosophy as "the IKEA model", because like a ready-to-assemble furniture retailer, the network offers a catalog of policy projects that state-level groups can build. History The State Policy Network was founded in 1992 by Thomas A. Roe, a South Carolina businessman who was a member of the board of trustees of The Heritage Foundation. Roe told U.S. President Ronald Reagan that he thought each of the states needed something like the Heritage Foundation. Reagan's reply was "do something about it," which led Roe to establish the South Carolina Policy Council (SCPC). SCPC adapted Heritage Foundation national policy recommendations, such as school choice and environmental deregulation, to the state legislative level. SPN was an outgrowth of the Madison Group, a collection of state-level think tanks in states including South Carolina, Colorado, Illinois, and Michigan that had been meeting periodically at the Madison Hotel in Washington, D.C. Roe was chairman of the board of directors of SPN from its founding until his death in 2000. Gary Palmer, co-founder and president of the conservative think tank the Alabama Policy Institute from 1989 until 2014, helped found SPN and served as its president. Initially, SPN's network consisted of fewer than 20 member organizations. Lawrence Reed, the first president of the Mackinac Center for Public Policy, a Michigan-based free market think tank, fostered new state-level regular member organizations through delivery of his think tank training course. By the mid-1990s, SPN had a network of 37 think tanks in 30 states. By 2014, there were 65 member organizations, including at least one in each state. Starting in 1993, the SPN has held an annual meeting in various U.S. cities. These meetings serve as a chance for members to discuss and analyze policy priorities, train and build members, and refine operations, among other topics. Policy positions Policy initiatives supported by SPN members have included reductions in state health and welfare programs, state constitutional amendments to limit state government spending, expanded access to charter schools, and school vouchers. Another area of activity has been opposition to public-sector trade unions. Tracie Sharp, SPN's president, has said
https://en.wikipedia.org/wiki/Fastpoint%20Games
Fastpoint Games was a developer of data-driven games for businesses in the fortune 500, and was the parent company of fantasy sports developer, RotoHog. Under the Fastpoint Games banner, the company had applied RotoHog's configurable game platform to use structured data to drive consumer engagement and help brands in markets like social media, entertainment, MMO, politics and regulated gaming to grow their audience, engage their users and monetize them. On 7 January 2011, Fastpoint Games and Sony Online Entertainment announced the alpha launch of the Facebook game Fortune League. The casual strategy game is based on the world of EverQuest II (EQII). In Fortune League, players assess quests, hero performance, situational threats and the actions of other players in a live trade market and compensates leaders with points, cosmetic upgrades and prizes that can be used in the free-to-play and subscription versions of EQII. Fortune League integrates real-time performance data such as damages, deaths and healings directly from the MMO environment and uses them to form Hero Stats that drive the game. Therefore, player actions inside EQII will affect what happens in Fortune League and prizes from Fortune League will help users advance back in the EQII environment. Fastpoint Games CEO, Kelly Perdew, positions Fortune League as a new category of snackable data-driven games that will help MMO franchises acquire users and tap new revenue streams. On 11 July 2011, Fortune League was sunsetted. Between September 2009 and November 2010, the company has leveraged its technology platform to power games outside of the fantasy sports segment and launched games in the entertainment and casual games space. They have partnered with social media platforms including hi5, Facebook and MySpace, and released 58 games for 16 clients across 21 sports and entertainment seasons for marquee clients including US Weekly, NASCAR, ABC, Los Angeles Times, Go Daddy.com and Sports Illustrated online. Weplay Acquired the assets of Fastpoint Games in May 2012, but the games and domains did not continue. See also RotoHog Fantasy Sports References External links Official Site Fastpoint Games' Fantasy Sports Site - rotohog.com Privately held companies based in Delaware Companies established in 2006
https://en.wikipedia.org/wiki/Wayne%20State%20University%20Computer%20Science%20Department
Wayne State University Department of Computer Science is part of the College of Engineering. The department offers core academic strength in many areas including artificial intelligence, bioinformatics, data mining and machine learning, networking, databases, distributed and parallel computing, computer security, computer graphics and visualizations, and software engineering. Undergraduate (Bachelor of Science and Bachelor of Arts) and graduate degrees (Master of Science and PhD) in Computer Science, as well as an undergraduate degree in Information Systems Technology and a certificate in Scientific Computing are offered in the department. In addition, graduate students have the opportunity to complete their Ph.D. work in Computer Science with a concentration in Bioinformatics and Computational Biology. Undergraduate curriculum includes a high degree of hands-on experience with real-world systems, increased personal attention; undergraduate participation in research projects. Undergraduate students have the opportunity to choose among a variety of concentrations including Software Engineering, Databases, Web Technology and Computer Gaming. Study abroad opportunities are available with European schools including the École Polytechnique de l'Université de Nantes, France. The Department of Computer Science is a major focus for interdisciplinary activities within the university with annual R&D expenditures are between $2 and $3 million. The department's commitment to community service includes a new joint degree program with Focus: HOPE, as well as offering summer computer camps for middle and high school students. It is located in the Maccabees Building, in Detroit References External links Wayne State University Department of Computer Science Computer Science Department Computer science departments in the United States Science and technology in Michigan
https://en.wikipedia.org/wiki/Computer%20surveillance%20in%20the%20workplace
Computer surveillance in the workplace is the use of computers to monitor activity in a workplace. Computer monitoring is a method of collecting performance data which employers obtain through digitalised employee monitoring. Computer surveillance may nowadays be used alongside traditional security applications, such as closed-circuit television. Computer usage monitoring Depending upon the technology and methods used, monitoring applications may track all activity or may target specific activities of employees on a company-owned computer or terminal. They may monitor various devices installed on the computer (e.g., web cameras and microphones). This includes not only recordings from these devices but also remote broadcasting of live feed from webcams and microphones. Tools used for monitoring employee computer usage incorporate: Screen monitoring records video or static images detailing the contents, or screen capture, of the entire video display or the content of the screen activity within a particular program or computer application. Monitoring tools may collect real time video, accelerated or time-lapse video or screen shots, or may take video or still image captures at regular intervals (e.g., once every 4 minutes). They may collect images constantly or only collect information while the user is interacting with the equipment (e.g., capturing screens when the mouse or keyboard is active). Data monitoring tracks the content of and changes to files stored on the local hard drive or in the user's "private" network share. Keystroke monitoring (e.g., number of keystrokes per minute) may track the performance of keyboard-intensive work such as word processing or data entry. Keystroke logging captures all keyboard input to enable the employer to monitor anything typed into the monitored machine. Idle time monitoring keeps track of time when the employee is away from the computer or the computer is not being actively used. Printer monitoring records documents files that are printed from the computer. Removable drives monitoring tracks external devices that are connected to the computer. Video/audio monitoring makes recordings and snapshots from connected devices webcam and microphone and broadcasts video/sound live. This is also known as employee monitoring in the industry. Employee monitoring is used for multiple reasons, including compliance and Insider threat management. Employee monitoring software can monitor application software, including email, instant message, filesystem and print jobs. Internet usage Internet surveillance is the monitoring of Internet data traffic, web access, and other online activity. This may include monitoring any Internet traffic including encrypted web browser traffic via Transport Layer Security and Secure Sockets Layer connections, personal web-based email, and personal banking sites. Research done by American Management Association that nearly 30 percent of all employers in the United States monitor employe
https://en.wikipedia.org/wiki/Bradfield%20%28surname%29
Bradfield is a surname. Notable people with the surname include: Andrew Bradfield (1966–2001), New Zealand computer game programmer Arthur Bradfield (1892–1978), English cricketer Barry Bradfield (born 1981), Canadian artist Bill Bradfield (1910–2006), Australian aviation engineer and diplomat Cameron Bradfield (born 1987), American football player Carl Bradfield (born 1975), South African cricketer Damian Bradfield (born 1977), British businessman Frances Bradfield (1895–1967), British aeronautical engineer Geoffrey Bradfield (born 1948), South African cricketer George H. Bradfield (1880–1961), associate justice of the Colorado Supreme Court Harold Bradfield (1898–1960), Anglican bishop Henry Joseph Steele Bradfield (1805–1852), British colonial official and author James Dean Bradfield (born 1969), lead singer of the band Manic Street Preachers Jim Bradfield (1933–1989), Australian politician John Bradfield (disambiguation), the name of a number of people John Bradfield (bishop) (died 1283), Bishop of Rochester John Bradfield (engineer) (1867–1943), designer of the Sydney Harbour Bridge Sir John Bradfield (biologist) (1925–2014), British founder of Cambridge Science Park John Ross Bradfield (1899–1983), businessman Ken Bradfield (born 1929), American yachtsman Mary Bradfield, Colorado politician Polly Bradfield, American improvisational violinist Roger Bradfield (1924–2021), children's book illustrator Scott Bradfield (born 1955), American essayist W. Louis Bradfield (1866–1919), English actor and singer William (Bill) Bradfield (1927–2014), Australian amateur astronomer and rocket scientist
https://en.wikipedia.org/wiki/OpenL%20Tablets
OpenL Tablets is a business rule management system (BRMS) and a business rules engine (BRE) based on table representation of rules. Engine implements optimized sequential algorithm. OpenL includes such table types as decision table, decision tree, spreadsheet-like calculator. History The OpenL Tablets project was started as an in-house development project in 2003 and later in 2006 was uploaded to SourceForge. Initially it was an open-source business rule engine for Java. Starting from version 5 it became a BRMS. Technology OpenL Tablets engine is specially designed for business rules and uses table rules presentation. Table format enforces rules to be structured and format itself is close to tables found in various business documents. OpenL Tablets is based on OpenL framework for creating custom languages running on Java VM. The engine is designed to allow pluggable language implementations. Currently, it uses 2 languages: table structure for rules format and java-like for code snippets in rules. Java-like language is Java 5.0 implementation with Business User Extensions. OpenL Tablets rules are mixture of declarative programming for rules logic and imperative programming for workflow control. Table formats are flexible enough to match the semantics of the problem domain. Tests, traces, benchmarks are integral part of the engine. It also provides powerful type definition capabilities to handle rules domain model inside rules files. The project is written in Java, but can be used at any platform using Service-oriented architecture approach, e.g. via web service. Patents The OpenL Tablets engine has patent pending validation feature. There are usages of OpenL Tablets which may be patented. BRMS OpenL Tablets includes several productivity tools and applications addressing BRMS related capabilities. They include web application to edit rules called OpenL WebStudio, web application to deploy rules as web services, Rules Repository to store and manage rules, Eclipse plug-ins to work with rules projects. Related systems CLIPS: public domain software tool for building expert systems. ILOG rules: a business rule management system. JBoss Drools: a business rule management system (BRMS). JESS: a rule engine for the Java platform - it is a superset of CLIPS programming language. Prolog: a general purpose logic programming language. DTRules: a Decision Table-based, open-sourced rule engine for Java. References External links OpenL Tablets at Eclipse marketplace Rule engines Free software Free business software Free software programmed in Java (programming language)
https://en.wikipedia.org/wiki/Rohan%20Murphy
Rohan Mario Murphy (born December 22, 1983) is an American Paralympian, wrestler and motivational speaker. Murphy is also the founder of inspirational networking community CatchSpark.com, and a 2011 candidate for The Leukemia & Lymphoma Society's Man & Woman of the Year fundraising campaign. Murphy has been featured in media such as ABC News, Sports Illustrated and 20/20, as well as Nike's “No Excuses” campaign. Wrestling career During his early years, Murphy was unable and unwilling to participate in sports due to his physical disability. However, when he was in the eighth grade, East Islip coach Ron Croteau offered Murphy a position as equipment manager for the soccer, wrestling and tennis teams. After noticing both Murphy’s dedication as manager and upper-body strength during gym class, Croteau suggested that Murphy begin wrestling. Murphy and Croteau spent the entire summer training, and Murphy joined the East Islip wrestling team in ninth grade. Murphy wrestled his first match in December 1997 at the Sayville Holiday Tournament. Although he lost his first match and several thereafter, Murphy began to train harder and dedicated himself completely to wrestling. He ended up becoming one of the most decorated wrestlers in East Islip Redmen history by finishing his career as a three-time All-League and two-time All-County wrestler. Murphy walked on to wrestle at Penn State for coach Troy Sunderland. He earned three varsity letters while at Penn State. Paralympic career During his time at Penn State, Murphy began participating in Paralympic weightlifting events. In May 2006, Murphy won a Bronze medal in the 56 kg Junior Division of the 2006 IPC World Powerlifting Championships in Busan, South Korea. Murphy lifted 281.1 pounds (127.5 kg), breaking the previous U.S. Paralympic record of 270 pounds for the 56 kg division, which he set earlier that year at the Southeast Regional. Murphy’s feat grabbed the attention of Nike, and Murphy was subsequently featured in Nike’s “No Excuses” campaign. “No Excuses” was a New Year’s campaign that sought to motivate people to create a workout plan and stick to it. Current Murphy is now a professional motivational speaker. He speaks on a wide variety of subjects, most notably overcoming adversity and accepting differences. He also teaches Krankcycle classes at Gold's Gym in Islip, New York. References External links Rohan Murphy’s Website: www.rohanmurphy.com CatchSpark.com: CatchSpark.com Rohan Murphy Nike Commercial: “No Excuses”: https://www.youtube.com/watch?v=qaXfFRx5ZWw 1983 births Living people Penn State Nittany Lions wrestlers American powerlifters People from Jamaica, Queens People from East Islip, New York Sportspeople from Suffolk County, New York
https://en.wikipedia.org/wiki/2010%20Tongan%20Legislative%20Assembly
The 2010 Tongan Legislative Assembly was established following the 2010 elections, the first under a new system which saw the majority of seats elected by universal suffrage. The Taimi Media Network described it as "Tonga's first democratically elected Parliament". The Speaker of the 2010 Assembly was Lord Lasike, until he lost his seat in Parliament on 18 July 2012, following conviction for illicit ammunitions ownership. He was replaced as Speaker by Lord Fakafanua. The Deputy Speaker was initially Lord Tuʻiʻafitu, until he was appointed Minister for Health on 2 July 2012, whereupon he was replaced by Lord Tu'iha'teiho. Initial party standings |- ! style="background-color:#E9E9E9;text-align:left;vertical-align:top;" width=420|Parties ! style="background-color:#E9E9E9;text-align:right;" |Votes ! style="background-color:#E9E9E9;text-align:right;" |% ! style="background-color:#E9E9E9;text-align:right;" |Seats |- | style="text-align:left;" |Democratic Party of the Friendly Islands | style="text-align:right;" |10,953 | style="text-align:right;" |28.49 | style="text-align:right;" |12 |- | style="text-align:left;" |Independents | style="text-align:right;" |25,873 | style="text-align:right;" |67.30 | style="text-align:right;" |5 |- | style="text-align:left;" |People's Democratic Party | style="text-align:right;" |934 | style="text-align:right;" |2.43 | style="text-align:right;" |0 |- | style="text-align:left;" |Sustainable Nation-Building Party | style="text-align:right;" |519 | style="text-align:right;" |1.35 | style="text-align:right;" |0 |- | style="text-align:left;" |Tongan Democratic Labor Party | style="text-align:right;" |168 | style="text-align:right;" |0.44 | style="text-align:right;" |0 |- | style="text-align:left;" |Noble representatives | style="text-align:right;" |54 | style="text-align:right;" |— | style="text-align:right;" |9 |- |style="text-align:left;background-color:#E9E9E9"|Total |width="75" style="text-align:right;background-color:#E9E9E9"| 38,447 |width="30" style="text-align:right;background-color:#E9E9E9"| 100.00 |width="30" style="text-align:right;background-color:#E9E9E9"| 26 |- |colspan=4|Source: |} Members Initial MPs Summary of changes On 8 December 2010, Sosefo Vakata, People's Representative for Ongo Niua 17, left the Democratic Party of the Friendly Islands, to sit as an independent. On 24 July 2011, Kaveinga Faʻanunu, People's Representative for Tongatapu 9, a first term MP from the Democratic Party of the Friendly Islands, died of cancer. A by-election for Tongatapu 9 was held on 15 September 2011, and the seat was retained by the Democratic Party, through its candidate Falisi Tupou. On 18 July 2012, Lord Lasike, Nobles' Representative for ʻEua and Speaker of the Assembly, lost his seat by order of the King in application of the Constitution, following his conviction in court for illegal possession of firearms munitions. He was replaced by Lord Nuku in a by-election on 2 August. Lord Fusituaʻa, Nobles' Repre
https://en.wikipedia.org/wiki/Homebrew%20%28package%20manager%29
Homebrew is a free and open-source software package management system that simplifies the installation of software on Apple's operating system, macOS, as well as Linux. The name is intended to suggest the idea of building software on the Mac depending on the user's taste. Originally written by Max Howell, the package manager has gained popularity in the Ruby on Rails community and earned praise for its extensibility. Homebrew has been recommended for its ease of use as well as its integration into the command-line interface. Homebrew is a member of the Open Source Collective, and is run entirely by unpaid volunteers. Homebrew has made extensive use of GitHub to expand the support of several packages through user contributions. In 2010, Homebrew was the third-most-forked repository on GitHub. In 2012, Homebrew had the largest number of new contributors on GitHub. In 2013, Homebrew had both the largest number of contributors and issues closed of any project on GitHub. Homebrew has spawned several sub-projects such as Linuxbrew, a Linux port now officially merged into Homebrew; Homebrew Cask, which builds upon Homebrew and focuses on the installation of GUI applications; and "taps" dedicated to specific areas or programming languages like PHP. History Homebrew was written by Max Howell in 2009. In March 2013, Homebrew successfully completed a Kickstarter campaign to raise funds for servers to test and build formulae and managed to raise . On December 13, 2013, the Homebrew repository migrated from Howell's GitHub account to its own project account. In February 2015, due to downtime at SourceForge which resulted in binaries being unavailable, Homebrew moved their hosting to Bintray. On September 21, 2016, Homebrew version 1.0.0 was released. As of February 2021, Homebrew is maintained by a team of 34 people. In January 2019, Linuxbrew was merged back into Homebrew, adding beta support for Linux and the Windows Subsystem for Linux to the Homebrew feature set. On February 2, 2019, Homebrew version 2.0.0 was released. On September 21, 2020, Homebrew version 2.5.2 was released with support for bottle taps (binary package repositories) via GitHub Releases. Version 3.0.0 was released almost exactly two years after 2.0.0, on February 5, 2021, and added official support for Macs with Apple silicon. On April 12, 2021, Homebrew version 3.1.0 was released completing their migration of bottles (binary packages) to GitHub Packages before the May 1, 2021 shutdown of Bintray as previously announced by JFrog. On February 16, 2023, Homebrew version 4.0.0 was released which defaults to fetching Homebrew-maintained formulae from hosted JSON files rather than local Git-cloned taps. Implementation Homebrew is written in the Ruby programming language and targets the version of Ruby that comes installed with the macOS operating system. By default, it is installed into /usr/local on Intel-based machines and /opt/homebrew on Apple silicon. The installation consists of a
https://en.wikipedia.org/wiki/El%20Dorado%20High%20School%20%28Arizona%29
El Dorado High School is an AdvancED-accredited public charter high school located in Chandler, Arizona. A part of the Leona Group multi-state network of charter schools, El Dorado serves students in grades 9-12 and offers a curriculum aligned with Arizona state standards in a safe and student-centered small school environment. References Public high schools in Arizona The Leona Group Charter schools in Arizona Schools in Maricopa County, Arizona 1998 establishments in Arizona Educational institutions established in 1998
https://en.wikipedia.org/wiki/Alma%20%28film%29
Alma is a 2009 Spanish computer-animated dark fantasy horror short film produced by ex-Pixar animator Rodrigo Blaas. It had received notable recognition at the Fantastic Fest awards. The word "alma" in Spanish means "Soul". The film is about a girl named Alma who wanders into a deserted town and store. Curiosity gets the better of her and she suffers an unfortunate fate. Summary On a cold day in a quiet city, Alma comes wandering down a quiet alleyway, encountering a wall with names of various children, she then writes her own name on it. Startled by a noise of mechanical clogs behind her, she turns cautiously around and discovers a doll on display in a shop window that looks identical to her. Curious, she tries to enter the shop only to find that the door is locked. Frustrated, Alma throws a snowball at the door. Thinking that the shop is locked, Alma begins to walk away before the door suddenly opens. Alma then enters the store. As Alma walks in, she is presented with shelves filled with dolls. Elated, she notices the doll of herself on a table. Walking towards it, she trips over a small toy of a boy riding a bicycle. She puts the toy upright and it pedals across the floor and heads towards the exit, but the door closes before it could escape. Amused, Alma goes back to grabbing the doll, but she finds that it has disappeared. Looking around for the doll, Alma realises that it has moved to the top of a shelf, and she starts to climb it so that she can reach it. The moment Alma touches the doll, she has weird visions and finds herself looking at the shop below from the doll's perspective. Unable to move and trapped, Alma notices all of the other dolls staring at her as a different doll is raised in the shop's display window for the specific child to see. Proposed film adaptation By October 2010, DreamWorks Animation was developing an animated feature film based on Alma. Short's director Rodrigo Blaas was set to direct the feature, with Guillermo del Toro executive producing it. The studio later hired Megan Holley, a writer of Sunshine Cleaning, to write a script. Del Toro, who was also helping with the story and the design work, said in June 2012 that the film was in visual development. References External links 2009 short films 2009 films Spanish animated short films 2000s animated short films Animated films without speech 2000s Spanish films Spanish dark fantasy films
https://en.wikipedia.org/wiki/Saxony-Anhalt%20Garden%20Dreams
The Garden Dreams Project () is a conservation and tourism network concerned with rediscovering the cultural heritage of gardens in the German state of Saxony-Anhalt. Historical parks which had been, to an extent, forgotten are opened up to a wide audience. The beginnings of the project date back to 1999. Forty parks of varying character across the state of Saxony-Anhalt belong to the network. These include the Elbaue Park in Magdeburg, the former "Accommodation of Romanticism" Reichardt's Garden in Halle (Saale), the Europa Rosarium in Sangerhausen, the maze in Altjeßnitz and the Castle and Park at Dieskau. Since the beginning of 2006, the "garden dreams" have been marketed using their own logo. Sources Ludwig Schumann: Besondere Parks & Gärten in Sachsen-Anhalt. Buchverlag für die Frau, Leipzig 2006; . External links Website of the Garden Dreams project Culture of Saxony-Anhalt Gardens in Saxony-Anhalt Cultural organisations based in Germany
https://en.wikipedia.org/wiki/Hindawi%20Programming%20System
Hindawi Programming System (hereafter referred to as HPS) is a suite of open source programming languages. It allows non-English medium literates to learn and write computer programs. It is a scalable system which supports many programming paradigms. Shaili Prathmik or Indic BASIC and Indic LOGO are for beginners who want to start with computer programming. On the higher end it supports Shaili Guru (Indic C), Shaili Shraeni (Indic C++), Shaili Yantrik (Indic Assembly), Shaily Shabda (Indic Lex), Shaili Vyaakaran (Shaili Vyaaka/Indic Yacc), and Shaili Kritrim, which is an Indic programming language targeting JVM. Mechanism and algorithms HPS uses Romenagri transliteration to first convert the high level source code into a compiler acceptable format and then uses an existing compiler to produce machine code. History The original contributor to HPS is Abhishek Choudhary who also developed APCISR and Romenagri Initial public release - 15 August 2004 Release of version 2 by the ex-education minister of Bihar, Dr. Ram Prakash Mahto - 15 August 2005 Release of Linux port under Sarai fellowship - 16 August 2006 Awards and recognition Computer Society of India's National Young IT Professional Award 2005 Sarai / CSDS FLOSS fellowship Hindawi is recognised by TDIL, Government of India. Hindawi was shortlisted for Manthan Award 2007 References External links Hindawi Project on Sourceforge An independent review of Linux port of Hindawi An article on the need for Indic programming language refers to Hindawi Hindawi Linux (port) home page with training videos Indic computing Non-English-based programming languages BASIC programming language family Software industry in India
https://en.wikipedia.org/wiki/Werner%20E.%20Reichardt
Werner E. Reichardt (30 January 1924 – 18 September 1992) was a German physicist and biologist who helped to establish the field of biological cybernetics. He co-founded the Max Planck Institute for Biological Cybernetics, and the Journal of Biological Cybernetics. Life As a young student, Werner Reichardt was a pupil in the laboratory of Hans Erich Hollmann, a pioneer of ultra-shortwave communication. Because of his knowledge he was drafted in 1941 to the German air force as a radio technician.There he met members of the resistance and established a covert radio connection with the Western Allies. In 1944 Reichardt was arrested by the Gestapo and sentenced to death, but escaped, and hid in Berlin until the end of the war. From 1946 to 1950 he studied physics at the Technical University of Berlin. From 1950 he was a doctoral student of Ernst Ruska, studying solid state semiconductors at the Fritz-Haber-Institut of the Max-Planck-Gesellschaft, and received his doctorate in 1952. From 1952 to 1954 he was an assistant at the Institute where his teacher Max von Laue was a large influence to his later research. During the war, Reichardt had known Bernhard Hassenstein, who had studied optomotor turning behaviour after the war. Realising these experiments could be formalised in a similar way to electronics experiments, he developed interdisciplinary theories of motion perception. In 1954, Reichardt became a Postdoctoral Fellow at the California Institute of Technology at the invitation of Max Delbrück. From 1955 he was assistant at the Max Planck Institute for Biophysical Chemistry in Göttingen under Karl Friedrich Bonhoeffer. In 1958 he founded together with Bernhard Hassenstein and Hans Wenking the cybernetics research group at the Max-Planck-Institute of Biology in Tübingen. In 1968 the department was transformed into the independent Max Planck Institute for Biological Cybernetics. Reichardt died at the age of 68 years after collapsing at the end of a symposium organised in his honour. Work Reichardt's findings have contributed to understanding of information processing in nervous systems. From joint work (with Bernhard Hassenstein and Hans Wenking) on the visual system of insects and its effect on the flight orientation, the correlation model developed the idea that the visual system of man could be similarly investigated, and led to a general theory of motion perception Reichardt detectors See Motion perception#First-order motion perceptionIn the 1950s, Reichardt, along with Hassenstein proposed a model of how a neuron receiving input from photoreceptors, which only respond to changes in luminance, could be used to compute motion. Each photoreceptor, responded to a change in luminance at a given location in visual space. Comparison of the phase shift of activity in adjacent cells indicated the direction of movement from one neuron's receptive field to the other. This model of micro-circuitry became known as a Reichardt detector. Whilst there
https://en.wikipedia.org/wiki/OpSource
OpSource, Inc. is a cloud and managed services hosting company headquartered in Santa Clara, California. The company also has offices in Ashburn, Virginia, Ireland and India, and data centers in California, Virginia and the United Kingdom. OpSource is now part of the ICT company Dimension Data which acquired OpSource in 2011 for their Cloud Business Unit. History In 2002, Michael Piacente, Dan Rasmussen, John Rowell and Treb Ryan founded OpSource in Sunnyvale, California. The company initially began to provide application support to Microsoft's HotMail product and other customers. In 2005 the term software as a service (SaaS) was becoming popular. OpSource began to focus on SaaS, helping ISVs focus on software development, marketing and sales. As part of this product OpSource created a SaaS Enablement product which helped ISVs (Adobe, Business Objects, BMC) take their product to market, created a SaaS Incubation program for small businesses. In 2006, OpSource launched the annual "SaaS Summit" conference held in the San Francisco area. Since 2010, the event has been renamed "All About the Cloud" and is presented in conjunction with the Software and Information Industry Association In 2009, OpSource released a cloud computing service that bills on a utility computing basis. OpSource received $56.5M in funding from Artiman Ventures, Crosslink Capital, Intel Capital, Key Venture Partners, NTT (Nippon Telegraph and Telephone Corporation) and Velocity. Mark Spagnolo (past CEO - UUNET, Flag Telecom, Universal Access, Metromedia Fiber Network) was chairman of the board. OpSource acquired Dublin, Ireland based Lecayla Technologies in 2008. Founded in 2004, LeCayla Technologies' metering and billing services allowed ISVs to offer software applications on a utility, perpetual licensing or hybrid pricing basis. On June 30, 2011, OpSource Inc. was acquired by Dimension Data Holdings, which named Steve Nola the CEO of Dimension Data Cloud Solutions, a new division that included OpSource. Business model OpSource has two main products: managed hosting and cloud computing. Managed hosting is a dedicated hosting service with support for multiple applications, operating systems and databases. Originally called "Optimal On-Demand", these services are designed to support the software as a service market. OpSource offers a 100% uptime guarantee to customers who host their applications with them under the managed hosting product. Cloud computing is delivered as an infrastructure as a service offering. Cloud computing customers do not own the physical infrastructure, instead avoiding capital expenditure by renting usage from a third-party provider. They consume resources as a service and pay only for resources that they use under a utility computing model, paying only for the services that are consumed. OpSource Cloud offers a 100% network uptime and <1ms intra network latency guarantee. The OpSource Cloud product competes with similar offerings from
https://en.wikipedia.org/wiki/Metnet%20%28website%29
Metnet (Metropolitan Educational Telecommunications Network) is a distance learning network for the MnSCU college and universities system. Metnet is one of the six major educational telecommunications networks of the Learning Network of Minnesota. Services Email Metnet currently provides three email services: Gophermail, METNET WebMail 3.0, and METNET WebMail 2.0. Webmail 3.0 and Webmail 2.0 are being discontinued on January 3, 2011. All email addresses, or "Internet IDs" are assigned by Metnet based on the first four letters of the user's last name, e.g. "jone0012@metnet.edu" Participating Colleges Anoka Technical College Anoka-Ramsey Community College-Coon Rapids Campus Anoka-Ramsey Community College-Cambridge Campus Century College Dakota County Technical College Hennepin Technical College-Brooklyn Park Campus Hennepin Technical College-Eden Prairie Campus Inver Hills Community College Metropolitan State University Minneapolis Community and Technical College Normandale Community College North Hennepin Community College Saint Paul College University of Minnesota Logo The logo of Metnet is the seven-county metropolitan area of Minneapolis-St. Paul. References Distance education institutions based in the United States American educational websites
https://en.wikipedia.org/wiki/State%20Statistics%20Committee
The State Statistics Committee of Azerbaijan Republic () is a governmental agency within the Cabinet of Azerbaijan in charge of collection, processing and disseminating statistical data on the economy, demographics and other sectors of activity in Azerbaijan Republic. The agency is headed by Arif Valiyev. History The statistics offices were initially created and operated in Shamakhi from 1846 through 1859, in Baku from 1859 and in Ganja from 1867 after their incorporation into Russian governorates. Until 1917, statistical data was given in 20 to 27 tables and contained information on population, labor, job markets, number of factories and plants, agricultural data, prices on commodities, military data, etc. With the establishment of the Azerbaijan Democratic Republic, the authorities tried to create a centralized office for statistical data collection but succeeded only in establishment of separate statistics offices within various ministries such as within State Property Ministry on November 15, 1918, and within the Department of Land of the Ministry of Agriculture in July 1919. After establishment of Soviet rule on July 8, 1920 Nariman Narimanov created an interim collegium of statistics within the Azerbaijan Revolutionary Committee. From 1924 forward, regional statistical bodies were created in each region. In 1928, a new statute was approved by the Council of People's Commissars of Azerbaijan SSR for creation of Central Statistics Department. In 1948, the Central Statistics Department was transferred to the Cabinet of Ministers of Azerbaijan. In 1987, the Central Statistics Department was transformed into State Statistics Committee of Azerbaijan SSR and its statute was approved by the Council of Ministers of March 1988. On February 18, 1994 President of independent Azerbaijan, Heydar Aliyev signed the Law on Statistics establishing the State Statistics Committee of Azerbaijan Republic. Structure The committee is headed by its chairman. It consists of the Central Administration, State Statistics Committee of Nakhichevan AR, Baku City Statistics Department, 81 raion statistics offices, Main Accounting Office and Department for Scientific Research and Projection of Statistical Data. The State Statistical Committee of the Republic of Azerbaijan ensures the activity of the statistical information system on the basis of the single methodology in the social and economic spheres in the country. The State Statistical Committee of Azerbaijan is an independent central economic body regulating the statistical and registration activity and operating in the system of the central executive bodies. The committee carries out its activities on the basis of the comprehensive and objective study of socioeconomic processes taking place in the country, provides the information on the socioeconomic state of the country and is responsible for the implementation of the policy, aiming at the increase of the role of statistical information through respecting the
https://en.wikipedia.org/wiki/Kevin%20Reilly
Kevin Reilly may refer to: Kevin Reilly (American football) (born 1951), NFL player; motivational speaker Kevin Reilly (executive), Chief Creative Officer for Turner Entertainment Networks Kevin Reilly (Gaelic footballer) (born 1986), Gaelic football player from County Meath Kevin P. Reilly (born 1949), sixth president of the University of Wisconsin System See also Kevin Riley (disambiguation)
https://en.wikipedia.org/wiki/Kenneth%20C.%20Coleman%20Generating%20Station
The Kenneth C. Coleman Generating Station is a coal-fired power plant owned and operated by Big Rivers Electric Corporation near Hawesville, Kentucky. Plant Data Owner: Big Rivers Electric Corporation Plant Nameplate Capacity: 521 MW (Megawatts) Units and In-Service Dates: 174 MW (1969), 174 MW (1970), 173 MW (1971) Location: 4982 River Rd., Hawesville, KY 42348 GPS Coordinates: 37.9625, -86.791667 Coal Consumption: Coal Source: Number of Employees: Emissions Data 2006 CO2 Emissions: 3,404,057 tons 2006 SO2 Emissions: 10,899 tons 2006 SO2 Emissions per MWh: 2006 NOx Emissions: 5,320 tons 2005 Mercury Emissions: 110 lb. See also Coal mining in Kentucky References External links Big Rivers website Existing Electric Generating Units in the United States, 2005, Energy Information Administration, accessed January 2009. Environmental Integrity Project, "Dirty Kilowatts: America's Most Polluting Power Plants", July 2007. Facility Registry System, U.S. Environmental Protection Agency, accessed January 2009. Carbon Monitoring for Action database, accessed February 2009. Energy infrastructure completed in 1963 Energy infrastructure completed in 1969 Coal-fired power plants in Kentucky Buildings and structures in Hancock County, Kentucky 1963 establishments in Kentucky 1969 establishments in Kentucky 2020 disestablishments in Kentucky
https://en.wikipedia.org/wiki/List%20of%20Young%20Justice%20episodes
Young Justice is an American animated television series created by Greg Weisman and Brandon Vietti for Cartoon Network. The series follows the lives of teenaged heroes who are members of a covert operations team that takes orders from the Justice League. The series debuted on January 7, 2011, with a two-week reairing of the first two episodes, which originally aired as an hour-long special on November 26, 2010. Warner Bros. Animation announced the show's return in November 2016 after an extended hiatus since 2013; new episodes were released in 2019. Series overview Episode list Season 1 (2010–12) Season 2: Invasion (2012–13) Season 3: Outsiders (2019) The first letter of each episode spells out a hidden phrase: "Prepare the Anti-Life Equation". Season 4: Phantoms (2021–22) The first letter of each episode spells out a hidden phrase: "Invitation to Kneel Before Zod". References Lists of American children's animated television series episodes Lists of DC Nation television series episodes Young Justice (TV series)
https://en.wikipedia.org/wiki/TUDN%20%28Mexican%20TV%20channel%29
TUDN, formerly Televisa Deportes Network (abbr. TDN), is a Mexican television sports channel operated by TelevisaUnivision Mexico through its specialty channels subsidiary TelevisaUnivision Networks. Launched on July 22, 2009, the channel is available on major Mexican multichannel television providers, with the separate Central American feed being also available for providers there. The channel has ties with the U.S. sports channel of the same name, sharing some of its programming. Before July 20, 2019, when the U.S. counterpart was known as Univision Deportes Network (UDN), the channel was referred to as Univision TDN during these programs. In 2019, it was announced that TDN and UDN would jointly relaunch as TUDN—signifying a greater amount of collaboration between the two channels. History In May 2019, it was announced that both Televisa Deportes Network and Univision Deportes Network would be jointly rebranded as TUDN. The new branding is a combination of abbreviations TDN and UDN, but the first two letters are also pronounced as the Spanish adjective "tu" (your), allowing the name to also be read as "Tu deportes network" ("Your sports network"). TUDN will be promoted as a multi-platform brand, and there will be closer collaboration between the Mexican and American channels—allowing for expanded studio programming in the morning and daytime hours (to bolster its expansion into European soccer with its recent acquisition of UEFA rights, and existing content such as Liga MX soccer). Programming Soccer Liga BBVA Liga MX Zona _ Sports show, where the conductors are fans of a Mexican Sports team. Teams like CD Guadalajara and America. Baseball Major League Baseball Basketball NBA NCAA March Madness Billiards Matchroom Pool Events World Pool Championship World Pool Masters World Cup of Pool World 10-ball Championship American football Arena Football Ice hockey CHL NHL Golf LPGA PGA Tour Mixed martial arts and boxing Sabados de Corona UFC ONE Fighting Championship Motor sports Formula One Formula Two TC2000 Championship TC2000 Series Top Race V6 Top Race Series Tennis Australian Open French Open Wimbledon Championships US Open Bull riding Professional Bull Riders Professional wrestling All Elite Wrestling Personalities Adolfo Peñaloza Adrián Esparza Oteo Adriana Monsalve Aldo Farías Arlene Maciel Alberto "Tito" Etcheverry Alberto Lati Alejandro Berry Alejandro de la Rosa Alejandro Zenteno Alfredo Tame Alonso Cabral Ana Caty Hernández Anselmo Alonso Antonio de Valdés Antonio Gómez Luna Antonio Nelli Alfredo Ruiz André Marin Andrés Vaca Benito Archundia Axel Solís Carla Mondragón Carlos Aguilar Carlos López Silanes Carlos Moreno Carlos Pavón Carolina Morán Carolina Weigend César Martínez Christelle Patterson Christian Elguea Cristina Romero Damián "El Ruso" Zamogilny Daniel Schvartzman David Faitelson Deneva Cagigas Dian
https://en.wikipedia.org/wiki/Patrick%20O%27Neil
Patrick Eugene O'Neil (1942 – September 20, 2019) was an American computer scientist, an expert on databases, and a professor of computer science at the University of Massachusetts Boston. O'Neil did his undergraduate studies at the Massachusetts Institute of Technology, receiving a B.S. in mathematics in 1963. After earning a master's degree at the University of Chicago, he moved to Rockefeller University, where he earned a Ph.D. in combinatorial mathematics in 1969 under the supervision of Gian-Carlo Rota. He was an assistant professor at MIT from 1970 to 1972, but then left academia for industry, returning in 1988 as a member of the UMass/Boston faculty. He became a full professor in 1996. He wrote highly cited papers on replication in distributed databases, page replacement strategies for databases, SQL isolation, and database indexing strategies. With Elizabeth O'Neil, he is the author of the database textbook Database Principles, Programming, and Performance (Morgan Kaufmann, 2nd ed., 2000). O'Neil published the algorithms of the bitmap indices he found working in the CCA Model 204 DBMS in the mid-1980s, and implemented B-tree for that database. This work was first published in 1987. O’Neil invented the Log-Structured Merge Tree (LSM Tree) along with Dieter Gawlick and Edward Cheng in 1991 while spending the summer at Gawlick's database research group at Digital Equipment Corporation in California. The resulting paper, published in 1996, also included a performance analysis by Elizabeth O'Neil. This access method supports very fast inserts without hobbling lookup times, and now underlies many NoSQL data stores, such as Bigtable, HBase, LevelDB, SQLite4, Tarantool, RocksDB, WiredTiger, Apache Cassandra, InfluxDB, and ScyllaDB. References American computer scientists Massachusetts Institute of Technology School of Science alumni University of Chicago alumni Rockefeller University alumni Massachusetts Institute of Technology faculty University of Massachusetts Boston faculty 1942 births 2019 deaths
https://en.wikipedia.org/wiki/Tunnelblick
Tunnelblick is a free, open source graphic user interface for OpenVPN, a Virtual Private Network (VPN), on OS X and macOS. It provides easy control of OpenVPN client and/or server connections. History The first stable release was version 3.0 in March 2010. Issues In January 2016, the Sparkle Updater component used by Tunnelblick was found to be vulnerable to a man-in-the-middle attack. This security flaw has since been patched. Any VPN or third party tool like Tunnelblick can cause connectivity problems while syncing with iCloud. References External links Official website GitHub page Utilities for macOS
https://en.wikipedia.org/wiki/Landmark%20detection
In computer science, landmark detection is the process of finding significant landmarks in an image. This originally referred to finding landmarks for navigational purposes – for instance, in robot vision or creating maps from satellite images. Methods used in navigation have been extended to other fields, notably in facial recognition where it is used to identify key points on a face. It also has important applications in medicine, identifying anatomical landmarks in medical images. Applications Navigation Facial landmarks Finding facial landmarks is an important step in facial identification of people in an image. Facial landmarks can also be used to extract information about mood and intention of the person. Methods used fall in to three categories: holistic methods, constrained local model methods, and regression-based methods. Holistic methods are pre-progammed with statistical information on face shape and landmark location coefficients. The classic holistic method is the active appearance model (AAM) introduced in 1998. Since then there has been a number of extensions and improvements to the method. These are largely improvements to the fitting algorithm and can be classified into two groups: analytical fitting methods, and learning-based fitting methods. Analytical methods apply nonlinear optimization methods such as the Gauss–Newton algorithm. This algorithm is very slow but better ones have been proposed such as the project out inverse compositional (POIC) algorithm and the simultaneous inverse compositional (SIC) algorithm. Learning-based fitting methods use machine learning techniques to predict the facial coefficients. These can use linear regression, nonlinear regression and other fitting methods. In general, the analytic fitting methods are more accurate and do not need training, while the learning-based fitting methods are faster, but need to be trained. Other extensions to the basic AAM method analyse wavelets in the image rather than pixel intensity. This helps with fitting unseen parts of the face which basic AAM finds troublesome. Medical images Cephalometry Fashion The purpose of landmark detection in fashion images is for classification purposes. This aids in the retrieval of images with specified features from a database or general search. An example of a fashion landmark is the location of the hemline of a dress. Fashion landmark detection is particularly difficult due to the extreme deformation that can occur in clothing. Some classical methods of feature detection such as scale-invariant feature transform have been used in the past. However, it is now more common to use deep learning methods. This has been helped along enormously by the publication of a number of large fashion datasets that can be used for training. These methods include regression-based models, constraint-based models, and attentive models. The particular problems of fashion landmark detection (deformtion) have led to pos
https://en.wikipedia.org/wiki/List%20of%20CBC%20radio%20AM%20transmitters%20in%20Canada
This article is a list of full-power and low-power CBC Radio AM-only transmitters in Canada for the CBC Radio One and Première Chaîne networks which are still in operation on AM radio frequencies as of 2018. There are a total of about 100 or more AM transmitters which are still in operation by the CBC across Canada, As there may be some transmitters missing from the list below, this list may not necessary be complete. Since the 1980s, a vast number of CBC full and low-power AM transmitters have already moved to the FM band, with some new FM transmitters being added. It is possible that all or most of these AM transmitters listed below may eventually move to the FM band or completely cease broadcasting in the near future. British Columbia CBC Radio One Full-power CBU 690 AM Vancouver (also broadcasts in FM to some of its coverage area on nested transmitters, including to Greater Vancouver, Abbotsford, and Chilliwack) CFPR 860 AM Prince Rupert Low-power CBKA 1450 AM Stewart CBKG 920 AM Granisle CBKJ 860 AM Gold River CBKM 860 AM Blue River CBKN 990 AM Shalalth CBKO 540 AM Coal Harbour CBKU 630 AM Sayward CBKY 1350 AM Keremeos CBKZ 860 AM Clearwater CBPM 1260 AM Sicamous CBRH 1170 AM New Hazelton CBRK 900 AM Kimberley CBRZ 1350 AM Bralorne CBTG 860 AM Gold Bridge CBUG 860 AM Kaslo CBUN 740 AM Salmo CBUP 860 AM Merritt CBWF 920 AM Mackenzie CBXA 1150 AM Mica Dam CBYW 540 AM Wells CFHG 1490 AM Holberg Alberta CBC Radio One Full-power CBR 1010 AM Calgary (also broadcasts in FM to some of its coverage area on a nested transmitter) CBX 740 AM Edmonton (also broadcasts in FM to some of its coverage area on a nested transmitter) Low-power As of February 2013, all the remaining CBC low-power AM transmitters in Alberta have received approval from the CRTC to convert to the FM band. Saskatchewan CBC Radio One Full-power CBK 540 AM Watrous (also broadcasts in FM into some of its coverage area on nested transmitters, including Regina and Saskatoon) Première Chaîne Full-power CBKF-1 690 AM Gravelbourg CBKF-2 860 AM Saskatoon Manitoba CBC Radio One Full-power CBW 990 AM Winnipeg (also broadcasts in FM to some of its coverage area on a nested transmitter) Low-power CFNC 1490 AM Cross Lake (rebroadcasts the programming of CBWK-FM, but are owned by local community groups rather than by the CBC). CHFC 1230 AM Churchill Première Chaîne Full-power CKSB 1050 AM Winnipeg (also operated on FM to some of its coverage area on a nested transmitter) (Both AM transmitter and nested transmitter had moved to 88.1 MHz). Low-power CKSB-2 860 AM St. Lazare Ontario CBC Radio One Low-power CBES 690 AM Ignace CBLE 1240 AM Beardmore CBLF 1450 AM Foleyet CBLO 1240 AM Mattawa Première Chaîne Full-power CJBC 860 AM Toronto CBEF 1550 AM Windsor (also operates on a nested FM transmitter). On November 1, 2012, CBEF began broadcasting on 1550 AM, moving over from 540. Low-power CBOF-4 1400 AM Rolphton (Moving to FM 98.5; approved November 28, 2022) CBON-12 1090 AM
https://en.wikipedia.org/wiki/Kung%20Fu%20Panda%20Holiday
Kung Fu Panda Holiday is a 2010 American computer-animated Christmas comedy-drama television special produced by DreamWorks and directed by Tim Johnson. A spinoff of the Kung Fu Panda franchise, the special stars the voices of Jack Black, Angelina Jolie, Dustin Hoffman, Jackie Chan, Seth Rogen, David Cross, Lucy Liu, James Hong, and Jack McBrayer. The special premiered on NBC on November 24, 2010, and its premiere broadcast drew 5.9 million viewers. Plot Master Shifu (Dustin Hoffman) assigns Po (Jack Black) to host the annual Winter Feast at the Jade Palace, a highly ritualized formal occasion where all the Kung Fu masters of China attend, insisting on the perfection of the event. Although excited, Po also wishes to spend the holiday with his father Mr. Ping (James Hong), and rejects the finest chefs in China in an attempt to have him cater the event. However, Mr. Ping believes Po is more concerned with his duties as the Dragon Warrior, and adamantly remains at his restaurant to feed the townsfolk who have nowhere else to eat for the holiday. Guilt-ridden, Po tries to cook the banquet by himself, but is quickly overwhelmed by the various responsibilities that come with it, further complicated by the interference of Wo Hop (Jack McBrayer), a rabbit chef he had accidentally disgraced earlier and is desperate to die at the hands of the Dragon Warrior to redeem his honor. A comment from Wo Hop that "kung fu can't solve everything" inspires Po to enlist the Furious Five to complete the preparations for the feast while he has the still-suicidal Wo Hop help him in the kitchen. On the night of the Winter Feast, Po comes to realize that he should be with his father for the holiday and excuses himself before the masters to help Mr. Ping prepare food for the townsfolk. For his part, Mr. Ping, who had been struggling with the business alone, realizes that he was being unfair to his son for attending to his larger responsibilities and apologizes to him. With this reconciliation, father and son prepare their feast with polished skill. Moved by Po's loyalty to his family, the Furious Five and the other masters participate in the festivities with the townsfolk. Po is additionally able to restore Wo Hop's honor by presenting him with the Golden Ladle originally intended for the chef selected to cook for the masters' banquet. Shifu is initially mortified that everyone abandoned the feast, but upon seeing the merry time everyone is having at the noodle shop, he realizes Po did the right thing, creating a truly perfect event with his father. Although Shifu turns to leave, Po persuades him to join them, firmly asserting Shifu's place with his family. Voice cast Jack Black as Po Angelina Jolie as Master Tigress Dustin Hoffman as Master Shifu Jack McBrayer as Wo Hop Jackie Chan as Master Monkey Seth Rogen as Master Mantis Jonathan Groff as Master Rhino David Cross as Master Crane Lucy Liu as Master Viper James Hong as Mr. Ping Dan Fogler as Zeng Susan
https://en.wikipedia.org/wiki/Pydoc
Pydoc is the standard documentation module for the programming language Python. Similar to the functionality of Perldoc within Perl and Javadoc within Java, Pydoc allows Python programmers to access Python's documentation help files, generate text and HTML pages with documentation specifics, and find the appropriate module for a particular job. Pydoc can be accessed from a module-specific GUI, from within the Python interpreter, or from a command line shell. Developed by Ka-Ping Yee, it is included by default in all versions of Python since Python 2.1 and is available for download for 1.5.2, 1.6, and 2.0. Pydoc is used to extract documentation from the source code itself. More comprehensive documentation is generated from external reStructuredText documents using the Sphinx documentation system. See also Comparison of documentation generators References External links Archive of Pydoc for Python versions 1.5 to 2.5 Open source package library for PyPI Sphinx documentation Python (programming language) development tools Free documentation generators
https://en.wikipedia.org/wiki/Imperialist%20competitive%20algorithm
In computer science, imperialist competitive algorithms are a type of computational method used to solve optimization problems of different types. Like most of the methods in the area of evolutionary computation, ICA does not need the gradient of the function in its optimization process. From a specific point of view, ICA can be thought of as the social counterpart of genetic algorithms (GAs). ICA is the mathematical model and the computer simulation of human social evolution, while GAs are based on the biological evolution of species. Metaphor Figure 1 shows the flowchart of the Imperialist Competitive Algorithm. This algorithm starts by generating a set of candidate random solutions in the search space of the optimization problem. The generated random points are called the initial Countries. Countries in this algorithm are the counterpart of Chromosomes in GAs and Particles in Particle Swarm Optimization (PSO) and it is an array of values of a candidate solution of the optimization problem. The cost function of the optimization problem determines the power of each country. Based on their power, some of the best initial countries (the countries with the least cost function value), become Imperialists and start taking control of other countries (called colonies) and form the initial Empires. The two main operators of this algorithm are Assimilation and Revolution. Assimilation makes the colonies of each empire get closer to the imperialist state in the space of socio-political characteristics (optimization search space). Revolution brings about sudden random changes in the position of some of the countries in the search space. During assimilation and revolution a colony might reach a better position and has the chance to take the control of the entire empire and replace the current imperialist state of the empire. Imperialistic Competition is another part of this algorithm. All the empires try to win this game and take possession of colonies of other empires. In each step of the algorithm, based on their power, all the empires have a chance to take control of one or more of the colonies of the weakest empire. Algorithm continues with the mentioned steps (Assimilation, Revolution, Competition) until a stop condition is satisfied. Algorithm The above steps can be summarized as the below pseudocode. 0) Define objective function: 1) Initialization of the algorithm. Generate some random solution in the search space and create initial empires. 2) Assimilation: Colonies move towards imperialist states in different directions. 3) Revolution: Random changes occur in the characteristics of some countries. 4) Position exchange between a colony and Imperialist. A colony with a better position than the imperialist, has the chance to take the control of empire by replacing the existing imperialist. 5) Imperialistic competition: All imperialists compete to take possession of colonies of each other. 6) Eliminate the p
https://en.wikipedia.org/wiki/Eisenbud%E2%80%93Levine%E2%80%93Khimshiashvili%20signature%20formula
In mathematics, and especially differential topology and singularity theory, the Eisenbud–Levine–Khimshiashvili signature formula gives a way of computing the Poincaré–Hopf index of a real, analytic vector field at an algebraically isolated singularity. It is named after David Eisenbud, Harold I. Levine, and George Khimshiashvili. Intuitively, the index of a vector field near a zero is the number of times the vector field wraps around the sphere. Because analytic vector fields have a rich algebraic structure, the techniques of commutative algebra can be brought to bear to compute their index. The signature formula expresses the index of an analytic vector field in terms of the signature of a certain quadratic form. Nomenclature Consider the n-dimensional space Rn. Assume that Rn has some fixed coordinate system, and write x for a point in Rn, where Let X be a vector field on Rn. For there exist functions such that one may express X as To say that X is an analytic vector field means that each of the functions is an analytic function. One says that X is singular at a point p in Rn (or that p is a singular point of X) if , i.e. X vanishes at p. In terms of the functions it means that for all . A singular point p of X is called isolated (or that p is an isolated singularity of X) if and there exists an open neighbourhood , containing p, such that for all q in U, different from p. An isolated singularity of X is called algebraically isolated if, when considered over the complex domain, it remains isolated. Since the Poincaré–Hopf index at a point is a purely local invariant (cf. Poincaré–Hopf theorem), one may restrict one's study to that of germs. Assume that each of the ƒk from above are function germs, i.e. In turn, one may call X a vector field germ. Construction Let An,0 denote the ring of analytic function germs . Assume that X is a vector field germ of the form with an algebraically isolated singularity at 0. Where, as mentioned above, each of the ƒk are function germs . Denote by IX the ideal generated by the ƒk, i.e. Then one considers the local algebra, BX, given by the quotient The Eisenbud–Levine–Khimshiashvili signature formula states that the index of the vector field X at 0 is given by the signature of a certain non-degenerate bilinear form (to be defined below) on the local algebra BX. The dimension of is finite if and only if the complexification of X has an isolated singularity at 0 in Cn; i.e. X has an algebraically isolated singularity at 0 in Rn. In this case, BX will be a finite-dimensional, real algebra. Definition of the bilinear form Using the analytic components of X, one defines another analytic germ given by for all . Let denote the determinant of the Jacobian matrix of F with respect to the basis Finally, let denote the equivalence class of JF, modulo IX. Using ∗ to denote multiplication in BX one is able to define a non-degenerate bilinear form β as follows: where is any linear function
https://en.wikipedia.org/wiki/Motion%20chart
A motion chart is a dynamic bubble chart which allows efficient and interactive exploration and visualization of longitudinal multivariate data. Motion charts provide mechanisms for mapping ordinal, nominal and quantitative variables onto time, 2D coordinate axes, size, colors, glyphs and appearance characteristics, which facilitate the interactive display of multidimensional and temporal data. Overview In general, charts, graphs and plots provide the means for summarizing quantitative and qualitative data using diverse graphical representations. The main limitations of such static types of data exploratory and visualization are the low number of variables that can be shown simultaneously on the chart. Many classical data visualization techniques have limitations in terms of the volume, properties or complexity of the dataset. For instance, Scatter plots require bivariate data. Many datasets include multiple measurements like time, space, demographic, phenotypic and functional recording. For instance, the annual US Housing Price Index dataset includes dozens of variable including location (State and US region), year, unemployment rate, state population, percent subprime loans, etc. Motion charts provide a dynamic data visualization paradigm that facilitates the representation and understanding of large and multivariate data. Using the familiar 2D Bubble charts, motion Charts enable the display of large multivariate data with thousands of data points and allow for interactive visualization of the data using additional dimensions like time, the size of the blobs, and color) to show different characteristics of the data. The central object of a motion chart is a blob (or bubble), which is a solid object homeomorphic to a disc. Blobs have 3 important characteristics – size, position and appearance. Using variable mapping, motion charts allow control over the appearance of the blobs at different time points. This mechanism enhances the dynamic appearance of the data in the motion chart and facilitates the visual inspection of associations, patterns and trends in multivariate datasets. Examples of motion charts There are several web-based motion charts graphical data visualization tools including Many-Eyes, Gapminder, Google Motion Charts, nanobi analytics, motion-chart by amCharts and SOCR Motion Charts. These graphical resources allow users to interactively explore relationships and trends of data with temporal characteristics. See also Bar chart Bubble chart Diagram Edward Tufte Exploratory data analysis Information graphics Graphic organizer Mathematical diagram Official statistics Plot (graphics) References Infographics Diagrams Charts
https://en.wikipedia.org/wiki/Ecos
Ecos or ECOS may refer to: Écos, a commune in Eure department, France eCos, an operating system ECOS (BANC magazine), published by the British Association of Nature Conservationists ECOS (CSIRO magazine), published by the Australian Commonwealth Scientific and Industrial Research Organisation European Conodont Symposia See also Eco (disambiguation)
https://en.wikipedia.org/wiki/Insect%20Armageddon
Insect Armageddon may mean Decline in insect populations, a widespread loss of insect numbers and species Earth Defense Force: Insect Armageddon, a computer game
https://en.wikipedia.org/wiki/Orchid%C3%A9e
Orchidée is software developed by IRCAM as a computer-aided orchestration tool. It is a MATLAB-based application that communicates with traditional computer-aided composition environments through Open Sound Control messages. This means that it can be effectively controlled from programs like Max/MSP or OpenMusic. It was developed by Grégoire Carpentier and Damien Tardieu during their PhD studies at IRCAM, with the help and supervision of composer . A recent example of its use for orchestral composition were in Jonathan Harvey's Speakings, premiered in 2008, in which speech was analyzed and computed to provide orchestral combinations for the composer. Given an input target sound, Orchidée creates a musical score which imitates the sound using a mixture of traditional instruments. It then searches within a large instrument sample database for combinations of sounds that perceptually match the target. The application takes into account complex combinatorial possibilities, considering virtually infinite sets of different sounds created by the orchestra. It also considers musical attributes such as instruments and dynamics, and perceptual attributes as brightness and roughness. For example, in Speakings, a mantra ("Oh/Ah/Hum") was analyzed and imputed into Orchidée, which in turn generated different possibilities for orchestration. This mantra was then developed throughout the piece using such possibilities. Other musical works using Orchidée: Daniel Fígols Cuevas, Kaala, 2012, CNSMDP, Paris Marc Garcia Vitoria, Mimesis, 2011, Paris Alec Hall, Striped Noise, New York, 2011 Javier Torres Maldonado, Un posible dia, Paris, 2011 Marc Garcia Vitoria, The P Extensions, 2010, Geneva Christopher Trapani, Cognitive Consonance, Le 104, 2010, Paris Christopher Trapani, Westering, Carnegie Hall, New York, 2010 Marco Suarez Cifuentes, Poetry for //dark-/ dolls, 2009, IRCAM, Paris Fernando Villanueva Carretero, Bukowski Madrigals, 2009, IRCAM, Paris Kenji Sakai, Astral/Chromoprojection, 2009, IRCAM, Paris Gérard Buquet, L'Astre échevelée, 2009, IRCAM, Paris Miguel Farías, Mambo Lines, 2011, Geneva See also List of music software References External links "Chance Music with Jonathan Harvey", interview by Bob Shingleton. Future Radio, 5 September 2010. Audio programming languages Music notation file formats Music software
https://en.wikipedia.org/wiki/WireShare
WireShare (formerly known as LimeWire Pirate Edition) is a revival of the LimeWire software (a gnutella p2p-network client). The original LimeWire Pirate Edition was adapted from LimeWire Basic edition to provide similar features to LimeWire Pro with no adware, advertising, or backdoor control. The Ask toolbar integration was removed, along with dependencies on LimeWire servers and remote settings. The software supports Windows, Linux and Mac and its source code is available on GitHub. History After LimeWire was shut down by the RIAA, a hacker with the alias of "Meta Pirate" created LimeWire Pirate Edition. Lime Wire LLC has stated that the company were "not behind these efforts[, and] LimeWire does not authorize them. LimeWire is complying with the Court’s October 26, 2010 injunction." The LimeWire team acted to shut down the Pirate Edition website. A court order was issued to close down the website but Meta Pirate did not contest the order. After it was shut down, the original LimeWire open source project was reformed into WireShare with the goal of preserving the Gnutella network and maintaining a sincere continuation of the original effort; the software still continues today. See also FrostWire, a former Gnutella client, and also a LimeWire fork, that was created in 2004, also with the purpose of removing adware and backdoors. References External links LimeWire Pirate Edition source code at GitHub Guide to using LimeWire LimeWire Pirate Editions by MetaPirate and File_Girl71 Gnutella clients Free BitTorrent clients Free file sharing software Free software programmed in Java (programming language) Internet services shut down by a legal challenge
https://en.wikipedia.org/wiki/El-Sayyid%20el-Badawi
El-Sayyid el-Badawi Shehata (, ) (born 1950) is an Egyptian businessman and the former President of Al-Wafd Party. He is the head of the Board of Directors of Al-Hayah Egyptian television network. Early life Badawi was born in 1950 and grew up in Tanta governorate. He graduated from the Faculty of Pharmacy of the University of Alexandria in 1973. Career Badawi started his political career in the 1980s and joined Wafd Party in 1980 where he was elected as secretary general of the party in 2000. References 1950 births Living people Egyptian businesspeople Members of the Egyptian Constituent Assembly of 2012 Alexandria University alumni People from Tanta
https://en.wikipedia.org/wiki/AirMosaic
AirMosaic was an early commercial web browser based on the NCSA Mosaic browser. The browser won Datamation's Best Product of the Year award for 1994. The AirMosaic browser was available as part of several packages: the AIR Series, Internet in a Box and Mosaic In A Box, and separately. AirMosaic for Windows could also be downloaded as a demo, and then purchased over the Internet as a separate product. Features Although Mosaic required the user to install Win32s, AirMosaic offered the same feature set as Mosaic as well as several new ones like a configuration menu for not editing an INI file. Other features included: a kiosk mode import existing bookmarks from Mosaic References External links Air Mosaic Demo, Evolt.org 1994 software Discontinued web browsers
https://en.wikipedia.org/wiki/Web%202.0%20Suicide%20Machine
The Web 2.0 Suicide Machine is a service that helps users tired of MySpace, LinkedIn and Twitter, to "commit suicide in social networks", by automatically "removing their private content and friend relationships" (but without deleting or deactivating their accounts). The service is part of the non-profit foundation WORM, based in Rotterdam, Netherlands. The "Web 2.0 Suicide Machine" has, as of January 2010, assisted with more than 1,000 virtual deaths, ending more than 80,500 friendships on Facebook and removing 276,000 tweets from Twitter. How it works Rather than deleting user accounts, it removes private content and friendships. To start the suicide process, the user has to provide their login credential for the social network from which they want to be deleted, and then "watch your life passing by and reflect upon your real & virtual friends", while private content and friend relationships are removed. In the end the user is included in a memorial album of all the suicides, with their profile picture, their name and their "last words". Capabilities "Web 2.0 Suicide Machine" has listed the functions of which the service is capable thus far as the following: The Facebook option is no longer available on Web 2.0 Suicide Machine as Facebook sent a cease and desist (C&D) letter on January 6, 2010, demanding that suicidemachine.org stop their actions. LinkedIn Logging into your account Changing your password and your profile picture Removing all your business connections Logging out Myspace Logging into your account Removing all your friends Leaving a status message that you've committed suicide Logging out Twitter Logging into your account Changing your password and your profile picture Removing all people you follow Removing all your followers Removing all your tweets Logging out Controversy In January 2010, Facebook managed to block the service for a short time and sent a cease and desist letter from its lawyers. The service remained up and running, but the website has since ceased operation. Its creators "consider this project as a piece of socio-political net art". See also Internet relationship Net art Panopticon References External links Web 2.0 Social networking services Internet properties established in 2009
https://en.wikipedia.org/wiki/IFSTTAR
The French Institute of Science and Technology for Transport, Development and Networks (, IFSTTAR) is a public research institution (a Public Scientific and Technical Research Establishment) created in 2011. It results from the merger of The French National Institute for Transport and Safety Research (INRETS) and the French Central Laboratory of Roads and Bridges (LCPC). The IFSTTAR is an associate member of University of Paris-Est and Université Lille Nord de France. Sites Lille-Villeneuve d'Ascq Paris Marne-la-Vallée Versailles-Satory Nantes Lyon-Bron Marseille-Salon de Provence Notes and references External links Official website Research institutes in France Gustave Eiffel University
https://en.wikipedia.org/wiki/Riak
Riak (pronounced "ree-ack" ) is a distributed NoSQL key-value data store that offers high availability, fault tolerance, operational simplicity, and scalability. Riak moved to an entirely open-source project in August 2017, with many of the licensed Enterprise Edition features being incorporated. Riak implements the principles from Amazon's Dynamo paper with heavy influence from the CAP theorem. Written in Erlang, Riak has fault-tolerant data replication and automatic data distribution across the cluster for performance and resilience. Riak has a pluggable backend for its core storage, with the default storage backend being Bitcask. LevelDB is also supported, with other options (such as the pure-Erlang Leveled) available depending on the version. Riak was originally developed by engineers employed by Basho Technologies and maintained by them until 2017 when the rights were sold to bet365 after Basho went into receivership. Main features Fault-tolerant availability Riak replicates key/value stores across a cluster of nodes with a default n_val of three. In the case of node outages due to network partition or hardware failures, data can still be written to a neighboring node beyond the initial three, and read-back due to its "masterless" peer-to-peer architecture. Queries Riak provides a REST-ful API through HTTP and Protocol Buffers for basic PUT, GET, POST, and DELETE functions. More complex queries are also possible, including secondary indexes, search (via Apache Solr), and MapReduce. MapReduce has native support for both JavaScript (using the SpiderMonkey runtime) and Erlang. Predictable latency Riak distributes data across nodes with hashing and can provide latency profile, even in the case of multiple node failures. Storage options Keys/values can be stored in memory, disk, or both. Multi-datacenter replication Multi-Datacenter replication (MDC) provides uni-directional and bi-direction replication of data between Riak clusters, whether locally for resilience or globally for faster regional access. Uni-directional replication is useful for read-only sinks such as backups and Disaster Recovery sites. Bi-directional replication allows for multiple Riak cluster to have eventually consistent data across vast distances. Complex replication scenarios such as chains, hub-and-spoke and mesh networks are possible due to the Cascades feature, which allows replication of data between clusters that are not directly connected. There are two primary modes of operation: fullsync and realtime. Fullsync mode ensures that all data on the source cluster is replicated to the sink cluster. Only the metadata and changes are transferred, making this fast and efficient. Realtime mode sends updates made to a source cluster to the sink cluster in realtime. These modes are designed to work together for best performance All multi-datacenter replication occurs over multiple concurrent TCP connections to maximize performance and network utilization. Tunable co
https://en.wikipedia.org/wiki/KNGN
KNGN (1360 AM) is a radio station broadcasting a religious music format. It is licensed to McCook, Nebraska and owned by My Bridge. History Secular programming KWRV signed on the air on June 23, 1961. It was owned by the Regional Broadcasting Corporation and maintained studios on Norris Street in McCook. KWRV was knocked off the air for two hours one day in May 1962 when a snake pursued a mouse into its transmitter. KWRV was sold in 1966 to Semeco Broadcasting Corporation—named for principals Walter E. Sehnert, Vernon A. Meints, and KWRV general sales manager W. O. Corrick—for $91,000. The new owners changed the station's call letters to KICX effective May 19, 1966. The station maintained a middle-of-the-road music format and affiliations with the ABC Information and Intermountain networks. KICX's programming began to be simulcast on KICX-FM 95.9 when that station signed on January 31, 1979. Change to religion Semeco, now owned by Corrick's estate, sold KICX-AM-FM to Ron Crowe and Associates for $200,000 in 1989. In order to buy another McCook station, KSWN, Crowe had to spin off a station, and he chose to donate KICX AM to the Lutheran Church–Missouri Synod. The station relaunched as KNGN, for "Kansas Nebraska Good News", on April 8, 1990. Locally, the station was operated by Peace Lutheran Church and relied heavily on programming from the synod's KFUO in St. Louis. However, as time went on, the synod could no longer afford to continue running the station. As a result, in 2001, the station's license was transferred to the locally based Kansas Nebraska Good News Broadcasting Corporation. The station also relocated from its original studios at Peace Lutheran to a larger facility at a former country school in McCook. In 2018, the station added an FM translator, K252FV on 98.3 MHz. The new translator enabled the station to go 24-hours for the first time in its history. On August 2, 2022, the station's owners filed to transfer the broadcast license to MyBridge Radio. The sale, which included translator K252FV, was consummated on May 22, 2023 at a price of $40,000. References External links NGN Radio stations established in 1961 1961 establishments in Nebraska NGN
https://en.wikipedia.org/wiki/Orckit-Corrigent
Orckit-Corrigent was an Israel-based supplier of telecommunications networking equipment and products that facilitated the delivery of Carrier Ethernet and TDM migration applications for telecommunication providers. Orckit-Corrigent was founded in 1990 and is headquartered in Tel Aviv, Israel. It went public in 1996, making history as the first Israeli company to face excess public demand at its initial public offering (IPO) in NASDAQ. However, despite those initial large contracts the company was unable to renew them. After years of losses, the company underwent a failed debt restructuring agreement in 2012, and entered bankruptcy and liquidation proceedings in mid-2015. Corporate history Orckit was founded in 1990 by Izhak Tamir and Eric Paneth. In September 1996, Orckit announced an initial public offering (IPO) of 3.3 million of its ordinary shares at a public offering price of $16.00. The company then made history when its initial public offering on the Nasdaq over-the-counter exchange was postponed due to oversubscription. This made Orckit the first Israeli company ever to suffer a deferral on Nasdaq as a result of excess public demand. In 2000, Orckit founded Corrigent Systems as a fully owned subsidiary. This move marked a transformation of the company, which originated as a DSL vendor, into a packet transport network (PTN) vendor. That year, the company began developing and manufacturing PTN products for metro aggregation networks and, Resilient Packet Ring (RPR) technology was developed and introduced to the market as IEEE 802.17 Standard, as part of the company's packet transport technology. In 2007, Orckit-Corrigent launched its CM4000 PTN line of products, which currently serves multiple telecom providers worldwide, including leading Indian carrier Bharat Sanchar Nigam Ltd. (BSNL), Deutsche Telekom, a leading Pan-European Scandinavian Service Provider, Mexican redIT (formerly MetroNet), and others. Global expansion In August 2009, Orckit-Corrigent opened a new office in Brazil to help strengthen its Latin American presence. In January 2010, Lindsay Ryan was hired as regional sales manager to head a new office in Manila, Philippines. At its peak, the company had international offices in Israel, US, India, Japan, Korea, Germany, Russia, Brazil, Mexico, Thailand, and the Philippines. In February 2010, VK Aggarwal was appointed new managing director of Orckit-Corrigent's new India headquarters. The company also hired additional employees to better serve existing customers and develop new opportunities in the region. In March 2010, Orckit-Corrigent opened a new office in Thailand and appointed Monchai Kunwattanakorn as the new VP Sales for Thailand, Laos and Myanmar. In May 2010, Orckit-Corrigent opened a new sales office and service center in Germany, headed by Bernd Muehlhaus. This was an important move for the company, as the European region captured approximately a third of the global carrier ethernet market. Orckit-Corr
https://en.wikipedia.org/wiki/Bridalplasty
Bridalplasty was an American reality television series which premiered on the E! network, on November 28, 2010. The show features 12 women who compete to win a wedding and transformative plastic surgery procedures. The series concluded on January 30, 2011, after one season. Premise The show followed 12 engaged or already married women competing for the wedding of their dreams and their dream plastic surgery procedure. Each woman had a plastic surgery wishlist, and the winner of each week's wedding-themed challenge would win one plastic surgery procedure from her list. The winner of the competition received the wedding of her dreams, and had her entire wishlist fulfilled. The husband-to-be did not see his fiancée until she revealed her new look on their wedding day. Shanna Moakler hosted, and Dr. Terry Dubrow performed the plastic surgery procedures. Viewership and reception The premise was widely criticized for its embrace of cosmetic surgery and "pushing the limits of medical ethics", as the American Society of Plastic Surgeons prohibits surgeons from performing procedures as the prize for a contest. Jezebel described the show as an "unhealthy" and "dangerous" self-parody of reality TV. The season premiere was watched by 900,000 viewers; as the season progressed, this sank to 600,000 viewers, a figure described as "dismal". Contestants † Indicates that the contestant died after filming ended Elimination and voting chart Below show the list of brides and their statuses in the competition. The first elimination between Alexandra and Ashley was decided by a simple hand raise vote from the other brides. From Episode 2 and on, the voting would be held at the RSVP Ceremony. Kristen was the first bride to finish the challenge, but did not receive any surgeries on her Wish List as all the brides who completed the challenge received botox. Jenessa was the top bride in episode six. Since there was a tie between Netty and Lisa Marie, Jenessa had to vote in this episode's ceremony. She ended up voting for Lisa Marie to stay. Cheyenne, Dominique, and Jenessa competed in a quiz challenge where one of them would automatically be eliminated, which Cheyenne in the end lost. Since Allyson was the previous Top Bride, she got to make the decision at the RSVP Ceremony of whom to compete next to in the finale. Allyson chose Jenessa to compete against her. Lisa Marie's vote at the Final RSVP Ceremony was not revealed due to Allyson already receiving the number of votes to win. The bride who won Bridalplasty. The bride was the top bride after finishing the challenge first. The bride was safe from elimination, and had to vote to save one of the bottom brides. The bride was part of the bottom, and was at risk of being eliminated. The bride was cut from the competition after having the fewest votes to stay. The bride lost the challenge and was immediately cut from the competition. Episodes References External links 2010 American television s
https://en.wikipedia.org/wiki/Yousefi
Yousefi is a Persian patronymic surname, meaning "son of Joseph". It is rare as a given name. People Amir Hossein Yousefi, Iranian footballer Masoud Yousefi, Computer Eng. in the California, USA Ershad Yousefi, Iranian footballer Mohsen Yousefi (footballer, born 1984), Iranian footballer Mohsen Yousefi (footballer, born 1954), Iranian footballer Yousefi Eshkevari, Iranian cleric Persian-language surnames Patronymic surnames Surnames from given names
https://en.wikipedia.org/wiki/Jam2jam
jam2jam is a family of audiovisual software for collaborative performance. The systems use generative algorithms for audio and visual material whose parameters are controlled by users with either a graphical user interface or external hardware controllers. jam2jam software applications can connect over local networks or the internet allowing real-time collaboration. This type of functionality is referred to as Network Jamming and is the topic of ongoing research. Description The jam2jam software has been primarily employed to enable access to collaborative audiovisual performances, and is used in education and community arts settings. The software has also found application in assisting people with disabilities to participate in playful arts activities. The Network Jamming research that surrounds the use of jam2jam is built on a constructivist epistemology and encourages learning about audio and visual media through interactive performances and making by video recording the performances. The jam2jam software facilitates this philosophical approach by enabling collaboration through network connections and allows performances to be recorded for review and sharing. There are a number of academic publications describing this research. References External links Computer music software Educational software
https://en.wikipedia.org/wiki/Into%20Oblivion%20%28video%20game%29
Into Oblivion is a video game written by Stephen N. Curtis and published by Mastertronic in 1986 for the Amstrad CPC. Gameplay The story is set in the aftermath of the destruction of an evil computer. Only its servants remain, from the planet Nonterraqueous, a location used by programmer Steven Curtis in the prequels Nonterraqueous (1985) and Soul of a Robot (1985). The player's objective is to find a safe planet amongst the 42 in the system. The player controls a small vehicle, a "Mk II Seeker", which allows for exploration of the various screens. Joystick or keyboard can be used. The player is supplied with a laser beam to destroy various hazardous lifeforms, and nine lives. Each screen has a group of three enemies that follow different movement patterns. Some screens contain a spacecraft that transports the player to another planet. Reception Amstrad Action gave Into Oblivion an overall rating of 70%, highlighting the large number of screens and the exploration and mapping required to find the safe planet. However, the gameplay was criticized for the lack of excitement from obstacles and enemies. References External links Information, screenshots, interview with the developer CPC Game Reviews CPC Power 1986 video games Amstrad CPC games Platformers Video games developed in the United Kingdom Mastertronic games
https://en.wikipedia.org/wiki/Bicycle%20helmets%20in%20Australia
Australia was the first country to make wearing bicycle helmets mandatory. The majority of early statistical data regarding the effectiveness of bicycle helmets originated from Australia. Their efficacy is still a matter of debate. Between 1990 and 1992, Australian states and territories introduced various laws mandating that cyclists wear bicycle helmets while riding after a campaign by various groups including the Royal Australasian College of Surgeons (RACS). History: lead-up to the laws Modern varieties of bicycle helmet first became commercially available from 1975. Industry helmet standards were developed from the 1970s and are still under development. In 1985, the House of Representatives Standing Committee on Transport Safety recommended that cooperation of states and territories should be sought to "review the benefits of bicycle helmet wearing ... and unless there are persuasive arguments to the contrary introduce compulsory wearing of helmets by cyclists on roads and other public places". A federal parliament committee was set up in 1985. A 1986 report on child cyclist injuries from Redcliffe Hospital, Brisbane, detailed 93% of cases were not life-threatening and from 18 admissions, they included nine with minor head injury for overnight observation. In 1987 a report based on Brisbane hospitals detailed a majority of children aged five to seven years were in favour of wearing helmets, whereas older children were opposed. In 1987 the Victorian Parliamentary Road Safety Committee tabled a report in the Parliament of Victoria which included a recommendation for mandatory wearing of helmets. The terms of reference for the inquiry related to child pedestrians and child cyclists and to report on 'the use of safety helmets by child cyclists'. By 1989, just before the government decided to introduce compulsory wearing of bicycle helmets, an officially-commissioned survey showed that public support for it was 92% for children and 83% for all riders. Opposition was fragmented and ineffective; no major cycling groups opposed the law in public. Introduction of the laws: legal requirements Rule 256 of the Australian Road Rules specifies that "the rider of a bicycle must wear an approved bicycle helmet securely fitted and fastened on the rider’s head, unless the rider is exempt from wearing a bicycle helmet under another law of this jurisdiction." The rules also require helmet use by certain bicycle passengers. , the legally-required standard for a bicycle helmet is AS/NZS 2063. Mandatory helmet laws were first introduced in Victoria in July 1990, followed in January 1991 by laws for adult cyclists in New South Wales and all age-groups in Tasmania. In July 1991, New South Wales extended the law to child cyclists. In the same month, laws covering all cyclists were adopted in South Australia and in Queensland, where the law was not enforced until 1 January 1993. In January 1992 helmet laws were introduced in the Northern Territory (NT) and Wes
https://en.wikipedia.org/wiki/Market%20facilitation%20index
The Market Facilitation Index (MFI) is the creation of Bill Williams. The indicator endeavors to establish the effectiveness of price movement by computing the price movement per volume unit. This is accomplished by subtracting the day's low from the high and dividing the result by the total volume. (See below) Analysis As an indicator on its own the MFI is of no significant value. Nonetheless, if the current price candle's MFI and volume are compared to the previous candle's MFI and volume, the index starts to have some significant tradable data. The four possible groupings of MFI and volume were termed Green, Fade, Fake and Squat by Williams. Green: The MFI increases and the volume increases. This means that the number of participants entering the market increases, therefore the volume increases and the fresh incoming players align their positions in the direction of candlestick growth. Notice the long solid candles in the candlestick chart which indicates that the trend has begun and is picking up speed. Fade: The MFI falls and volume falls. It means that the market participants are indifferent and the price movement is small on small volumes. This usually happens at the end of a trend. (See candlestick chart) Fake: The MFI increases, but the volume falls. It is highly likely that the market is being supported by broker speculation and not any significant client volume. Squat: The MFI falls, but the volume increases. In this particular situation bulls and bears are fighting between themselves to see who will dominate the next trend. These battles are noticeable by the large sell and buy volumes. However, the price does not change appreciably since the strengths are equal. One of the competing parties either the buyers or the sellers will ultimately triumph in the battle. Usually, the fracture of a candle at such a point indicates either the continuation or termination of the trend. References External links How to Calculate MFI Price indices
https://en.wikipedia.org/wiki/Servant%20%28design%20pattern%29
In software engineering, the servant pattern defines an object used to offer some functionality to a group of classes without defining that functionality in each of them. A Servant is a class whose instance (or even just class) provides methods that take care of a desired service, while objects for which (or with whom) the servant does something, are taken as parameters. Description and simple example Servant is used for providing some behavior to a group of classes. Instead of defining that behavior in each class - or when we cannot factor out this behavior in the common parent class - it is defined once in the Servant. For example: we have a few classes representing geometric objects (rectangle, ellipse, and triangle). We can draw these objects on some canvas. When we need to provide a “move” method for these objects we could implement this method in each class, or we can define an interface they implement and then offer the “move” functionality in a servant. An interface is defined to ensure that serviced classes have methods that servant needs to provide desired behavior. If we continue in our example, we define an Interface “Movable” specifying that every class implementing this interface needs to implement method “getPosition” and “setPosition”. The first method gets the position of an object on a canvas and second one sets the position of an object and draws it on a canvas. Then we define a servant class “MoveServant”, which has two methods “moveTo(Movable movedObject, Position where)” and moveBy(Movable movedObject, int dx, int dy). The Servant class can now be used to move every object which implements the Movable. Thus the “moving” code appears in only one class which respects the “Separation of Concerns” rule. Two ways of implementation There are two ways to implement this design pattern. User knows the servant (in which case he doesn’t need to know the serviced classes) and sends messages with his requests to the servant instances, passing the serviced objects as parameters. The serviced classes (geometric objects from our example) don’t know about servant, but they implement the “IServiced” interface. The user class just calls the method of servant and passes serviced objects as parameters. This situation is shown on figure 1. Serviced instances know the servant and the user sends them messages with his requests (in which case she doesn’t have to know the servant). The serviced instances then send messages to the instances of servant, asking for service. On figure 2 is shown opposite situation, where user don’t know about servant class and calls directly serviced classes. Serviced classes then asks servant themselves to achieve desired functionality. How to implement Servant Analyze what behavior servant should take care of. State what methods servant will define and what these methods will need from serviced parameter. By other words, what serviced instance must provide, so that servants methods can achieve their
https://en.wikipedia.org/wiki/Moving%20block
In railway signalling, a moving block is a signalling block system where the blocks are defined in real time by computers as safe zones around each train. This requires both knowledge of the exact location and speed of all trains at any given time, and continual communication between the central signalling system and the train's cab signalling system. Moving block allows trains to run closer together (reduced headway) while maintaining required safety margins, thereby increasing the line's overall capacity. It may be contrasted with fixed block signalling systems. Communications Based Train Control (CBTC) or Transmission Based Signalling (TBS) is required to detect the exact location of trains and to transmit back the permitted operating speed to enable this flexibility. Information about train location can be gathered through active and passive markers along the tracks, and train-borne tachometers and speedometers. Satellite-based systems are not used because they do not work in tunnels. Another version of the moving block system would be the location computers on the trains itself. Each train determines its location in relation to all the other trains and sets its safe speeds using this data. Less wayside equipment is required compared to the off-train system but the number of transmissions is much greater. Implementation Urban Moving block is in use on several London Underground lines, including the Victoria, Jubilee, and Northern lines, and parts of the sub-surface lines. In London it is also used on the Docklands Light Railway and the core section of the Elizabeth line. New York City Subway's BMT Canarsie Line (), Tren Urbano (Puerto Rico), Singapore's MRT, and Vancouver's SkyTrain, also employ moving block signalling. It is also used by the Hong Kong MTR, on the Tuen Ma line, Disneyland Resort line, South Island line and the East Rail line . Inter-city It was supposed to be the enabling technology on the modernisation of Britain's West Coast Main Line which would allow trains to run at a higher maximum speed (), but the technology was deemed not mature enough, considering the large number of junctions on the line, and the plan was dropped. It forms part of the European Rail Traffic Management System's level-3 specification for future installation in the European Train Control System, which will at level 3 feature moving blocks that allow trains to follow each other at exact braking distances. References Railway signalling block systems
https://en.wikipedia.org/wiki/Cisco%20Unified%20Computing%20System
Cisco Unified Computing System (UCS) is a data center server computer product line composed of server hardware, virtualization support, switching fabric, and management software, introduced in 2009 by Cisco Systems. The products are marketed for scalability by integrating many components of a data center that can be managed as a single unit. Computing The UCS product line was announced in March and first installed in September 2009, at the customer premises of Tutor Perini. The first customer purchase of UCS was by Fiserv, a financial services customer in Milwaukee, Wisconsin. The entire project was code named "California". The computing component of the UCS is available in two versions: the B-series (a powered chassis and full and/or half slot blade servers), and the C-series for 19-inch racks (that can be used with fabric interconnects). The computer hardware managed by the UCS Manager software on the fabric Interconnects can be any combination of the two. Both form factors use standard components, including Intel x86-64 processors and DIMM memory. The servers are marketed with converged network adapters and port virtualization. Around 2010, an extended memory technology expanded the number of memory sockets that can be connected to a single memory channel in some models. A fifth generation was announced in July 2018. Virtualization Cisco UCS supports several hypervisors including VMware ESXi, Microsoft Hyper-V and Citrix Systems' Xen server. VMware provides a special version of ESXi. In 2017 Cisco announced a partnership with Docker to include its enterprise software in UCS products to directly provide operating-system-level virtualization (containerization). Networking The Cisco fabric interconnects (FI) provide network connectivity for the chassis, blade servers and rack servers connected to it through different speeds of Ethernet and Fibre Channel over Ethernet (FCoE). The fabric interconnects are derived from the Nexus 5500 and 9300 series switch families and run NX-OS as well as UCS Manager software. FCoE allows connection to storage area network storage, To allow stateless compute in addition to local storage capacity. Cisco has produced the following series for fabric interconnects: 6100 Series (discontinued), 6200 Series (discontinued), 6300 Series, and 6400 Series. The fabric interconnect can further connect to multiple fabric extenders (FEX), into what they call a "unified fabric". By 2012, analysts noticed that Fibre Channel vendors such as Brocade Communications Systems had already lost market share to Cisco. Management Management of the system devices is handled by the UCS Manager software integrated with fabric interconnects. Virtual machines can be moved from one physical chassis to another, applications may be moved between virtual machines, and management may even be conducted remotely from an iPhone using SiMU - Simple iPhone Management of UCS. In addition to the embedded software, administrators may also man
https://en.wikipedia.org/wiki/J%C3%A1nos%20Kert%C3%A9sz
János Kertész is a Hungarian physicist. He is one of the pioneers of econophysics, complex networks and application of fractal geometry in physical problems. He is the director of the Institute of Physics in Budapest University of Technology and Economics, Budapest, Hungary. References External links Personal Homepage 21st-century Hungarian physicists Living people Academic staff of Central European University Year of birth missing (living people)
https://en.wikipedia.org/wiki/Bait%20Car%20%28TV%20series%29
Bait Car is an American television series that aired on the truTV network. The show depicted police officers targeting criminals with a high-tech bait car, rigged with hidden cameras and radio trackers. Footage is shown from in-car cameras, police car dashcams, and film crews with the police officers. The show holds a TV-14 rating due to strong language, although most of the profanity is censored. Production and broadcast history The Bait Car series premiered on August 6, 2007, on Court TV (now truTV). Season two of the show premiered in August 2009 on truTV, and season three premiered in June 2010. The first three seasons of the show were primarily shot in Los Angeles and New Orleans. After nearly four months with no new episodes, Bait Car began airing a fourth season in December 2010 on Mondays at 8:30p.m. EST. Shot in San Francisco, this fourth season was produced by KKI Productions, and a 2007 Honda Accord was used as the bait car. Season 5 aired from January 2012 to October 2012. The show was not renewed for a sixth season. Reruns of Bait Car continue to air on truTV, and as of January 2015, on the Justice Network—a newly formed OTA digital subchannel. Format In this crime reality series, teams of undercover officers drive the bait car to areas with high rates of auto theft, where they park it and leave it unattended with the engine running. The idea is that would-be car thieves will hop in and drive away. Unbeknownst to the criminals, a hidden camera and a radio tracker have been placed on the dashboard, and a police force is watching their every move. The thief is then tracked down and arrested. Bait Car operations typically call for about a dozen officers on duty, and the cases are often charged as misdemeanors. Chicago police officers stage the car in a different manner, allowing offenders to be charged with felony possession of a stolen motor vehicle, burglary, or both. Chicago Police Officers do not leave the car running with the keys in the ignition or with the doors open. In rare instances, teams suspend the bait car operations to pursue a vehicle that was already stolen. The show was created by production company Departure Films, based out of New York, NY. Controversy Opponents of Bait Car have expressed concern that the show merely creates crime and might even be considered entrapment. Those in law enforcement argue that the show is a legitimate and effective way to catch auto thieves. "John Q Public doesn't climb into bait cars," a Florida officer states. "We are talking about people who have been arrested time and time again. Everybody we've arrested with a bait car has had an extensive criminal record." During season 5, LA prosecutors dropped charges against Keenen Alex after TV footage showed Detective Anthony Shapiro failed to read him a Miranda warning. Detective Shapiro asked Alex, "You watch TV. You know your rights and all that?" Departments featured References External links 2007 American television series deb
https://en.wikipedia.org/wiki/HIJRA
Humanitarian Initiative Just Relief Aid (HIJRA) is an African humanitarian organization focused on the implementation of emergency and resilience programming in the greater Horn of Africa; Somalia, Kenya and Uganda. Background and administration Humanitarian Initiative Just Relief Aid (HIJRA) is an international African humanitarian and development organization that aims to positively contribute towards improving the living standards and conditions of those adversely affected by disasters and conflict in the Horn and East Africa. The organization roots are in Somalia, where a devastating humanitarian crisis emerged after the collapse of the Somali state in 1991. This prompted a group of like minded professionals to come together to form the organization in response to the glaring humanitarian needs. Humanitarian Initiative Just Relief Aid (HIJRA) is an African humanitarian organization focused on the implementation of emergency and resilience programming in the greater Horn of Africa; Somalia, Kenya and Uganda. HIJRA works to implement water, sanitation and hygiene (WASH); health; education; and livelihood projects, addressing immediate needs at the grassroots level. Program components include the construction of water and sanitation facilities, hygiene promotion, cash distribution, primary healthcare including communicable disease control, and preventative as well as maternal and child healthcare. HIJRA is an immediate responder working to provide impartial assistance. As such, the organization works to ensure the safety of its beneficiaries and staff by adhering to a strict policy of transparency, neutrality and accountability. HIJRA is one of the largest organisations in South Central Somalia, providing aid to over 371,000 of the region's most vulnerable. Actions HIJRA is an emergency response organization. HIJRA endeavors to provide the best care possible, employing the SPHERE standards before entering new program areas. HIJRA supports community development by hiring locally, drawing staff from local regions, encouraging beneficiaries to participate in program development. Methods HIJRA is a direct implementer. The majority of its staff comes from its program areas, supported by a smaller number of equally significant international staff. In 2011, HIJRA worked through 126 staff to deliver lifesaving programs in Somalia, Kenya and Uganda. Members and staff of HIJRA make a commitment to the following values: Professionalism Equality and justice Transparency Independence and neutrality HIJRA focuses its work on bridging gaps in aid through strategic partnerships participating in consortiums, working groups and clusters, serving as one of six NGOs in the Somalia Humanitarian Country Team. Water, sanitation and hygiene HIJRA's programmes in Water, Sanitation and Hygiene (WASH) focus on increasing access to water, sanitation and hygiene services, while building the capacity to manage WASH interventions at the local level. HIJ
https://en.wikipedia.org/wiki/E%21%20%28Canadian%20TV%20channel%29
The current incarnation of E! is a Canadian English language specialty channel owned by Bell Media. Based on the U.S. cable network of the same name, E! is devoted to entertainment programming including news, film, television, celebrities and fashion. Comcast / NBCUniversal licenses the name and programming for the channel under a brand licensing agreement, but it doesn't hold an ownership interest. The network was originally launched in 1999 as the similarly formatted Star!, under the ownership of CHUM Limited. In 2010, the channel reached a deal to license the name and branding of the U.S. E! network (following a short-lived incarnation as a television system formerly known as CH). History The channel was licensed in 1996 by the Canadian Radio-television and Telecommunications Commission and was launched on September 10, 1999 as Star!, which was originally owned by CHUM Limited. In July 2006, Bell Globemedia (later renamed CTVglobemedia) announced that it would purchase CHUM for an estimated $1.7 billion CAD, including Star!. The sale was subject to CRTC approval and was approved in June 2007, with the transaction completed on June 22, 2007. That fall, Star!'s daily entertainment news program Star! Daily was cancelled and replaced with its CTV-produced competitor, etalk. As a result of the changes, the Citytv stations were sold to Rogers Media that same year. The channel broadcast programming from the equivalent U.S. cable channel E! until 2007 (thus the likely nod to that agreement with the exclamation mark as part of its name), when that channel licensed its name to Global's secondary television system CH and transferred its programming to that service, which became known as E!. Although the broadcast version of E! Canada ceased operations in 2009, Canwest is believed to have retained Canadian rights to E! (U.S.) programming (despite not airing it on any of its channels), preventing these series from returning to Star! Instead, the channel's schedule in these earliest days consisted mostly of second-run talk shows and entertainment news shows repeated from CTV and its secondary A system (formerly A-Channel, now CTV Two), including FashionTelevision, The Tonight Show with Jay Leno, The Ellen DeGeneres Show and TMZ. On November 1, 2010, CTVglobemedia announced it had signed a multi-year and multi-platform deal with Comcast, to return the E! brand back to Canada. Under the agreement, Star! was relaunched as E!: Entertainment Television on November 29, 2010. Ownership changed hands again, when on April 1, 2011, Bell Canada gained full control of E! as a result of a takeover of CTVglobemedia, with the latter company becoming known as Bell Media. At the U.S. E!'s upfronts presentation on April 30, 2012, the network unveiled a new logo and slogan, "Pop of Culture", to debut on July 9, 2012. On the same day, Bell announced that the Canadian version of the channel would adopt E!'s new branding on the same day as its debut in the U.S. The networ
https://en.wikipedia.org/wiki/List%20of%20university%20networks
This is a list of university networks, showing formalized cooperations among institutions of tertiary education. Global Networks Matariki Network of Universities McDonnell International Scholars Academy Universitas 21 World Universities Congress Worldwide Universities Network Regional Networks Association of Pacific Rim Universities Aurora (university network) ASEAN University Network Balkan Universities Network Black Sea Universities Network Compostela Group of Universities Euroleague for Life Sciences EUROSCI Network Mediterranean Universities Union University Network of the European Capitals of Culture Utrecht Network Vives University Network Young European Research University Network University Networks
https://en.wikipedia.org/wiki/Computer%20security%20compromised%20by%20hardware%20failure
Computer security compromised by hardware failure is a branch of computer security applied to hardware. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. Such secret information could be retrieved by different ways. This article focus on the retrieval of data thanks to misused hardware or hardware failure. Hardware could be misused or exploited to get secret data. This article collects main types of attack that can lead to data theft. Computer security can be comprised by devices, such as keyboards, monitors or printers (thanks to electromagnetic or acoustic emanation for example) or by components of the computer, such as the memory, the network card or the processor (thanks to time or temperature analysis for example). Devices Monitor The monitor is the main device used to access data on a computer. It has been shown that monitors radiate or reflect data on their environment, potentially giving attackers access to information displayed on the monitor. Electromagnetic emanations Video display units radiate: narrowband harmonics of the digital clock signals ; broadband harmonics of the various 'random' digital signals such as the video signal. Known as compromising emanations or TEMPEST radiation, a code word for a U.S. government programme aimed at attacking the problem, the electromagnetic broadcast of data has been a significant concern in sensitive computer applications. Eavesdroppers can reconstruct video screen content from radio frequency emanations. Each (radiated) harmonic of the video signal shows a remarkable resemblance to a broadcast TV signal. It is therefore possible to reconstruct the picture displayed on the video display unit from the radiated emission by means of a normal television receiver. If no preventive measures are taken, eavesdropping on a video display unit is possible at distances up to several hundreds of meters, using only a normal black-and-white TV receiver, a directional antenna and an antenna amplifier. It is even possible to pick up information from some types of video display units at a distance of over 1 kilometer. If more sophisticated receiving and decoding equipment is used, the maximum distance can be much greater. Compromising reflections What is displayed by the monitor is reflected on the environment. The time-varying diffuse reflections of the light emitted by a CRT monitor can be exploited to recover the original monitor image. This is an eavesdropping technique for spying at a distance on data that is displayed on an arbitrary computer screen, including the currently prevalent LCD monitors. The technique exploits reflections of the screen's optical emanations in various objects that one commonly finds close to the screen and uses those reflections to recover the original screen content. Such objects include e
https://en.wikipedia.org/wiki/Risk%20factor%20%28computing%29
In information security, risk factor is a collective name for circumstances affecting the likelihood or impact of a security risk. Definitions FAIR Factor Analysis of Information Risk (FAIR) is devoted to the analysis of different factors influencing IT risk. It decompose at various levels, starting from the first level Loss Event Frequency and Probable Loss Magnitude, going on examining the asset, the threat agent capability compared to the vulnerability (computing) and the security control (also called countermeasure) strength, the probability that the agent get in contact and actually act against the asset, the organization capability to react to the event and the impact on stakeholders. ISACA Risk factors are those factors that influence the frequency and/or business impact of risk scenarios; they can be of different natures, and can be classified in two major categories: Environmental, further subdivided in: Internal environmental factors are, to a large extent, under the control of the enterprise, although they may not always be easy to change. External environmental factors are, to a large extent, outside the control of the enterprise. Capability of the organization, further subdivided in: IT risk management capabilities—To what extent is the enterprise mature in performing the risk management processes defined in the Risk IT framework IT capabilities—How good is the enterprise at performing the IT processes defined in COBIT IT-related business capabilities (or value management)—How closely do the enterprise's value management activities align with those expressed in the Val IT processes Risk scenario An IT risk risk scenario is a description of an IT related event that can lead to a business impact, when and if it should occur. Risk factors can also be interpreted as causal factors of the scenario that is materialising, or as vulnerabilities or weaknesses. These are terms often used in risk management frameworks. Risk scenario is characterized by: A threat actor that can be: Internal to the organization (employee, contractor) External to the organization (competitor, business partner, regulator, act of god) A threat type: Malicious, Accidental Failure Natural Event Disclosure Modification Theft Destruction Bad design Ineffective execution Inappropriate use Asset or resource People and organization Process Infrastructure or facilities IT infrastructure Information Application Time Duration Timing of occurrence (critical or not) Timing to detect Timing to react The risk scenario structure differentiates between loss events (events generating the negative impact), vulnerabilities or vulnerability events (events contributing to the magnitude or frequency of loss events occurring), and threat events (circumstances or events that can trigger loss events). It is important not to confuse these risks or throw them into one large risk list. See also Asset Attack (computing) Countermeasure (comput
https://en.wikipedia.org/wiki/Douglas%20A.%20Lawson
Douglas A. Lawson (born 1947) is a geologist, paleontologist, and computer scientist. In 1971 Lawson discovered wing bone fossils from a giant pterosaur embedded in a sandstone outcropping at Big Bend National Park, Texas. At the time the fossils were found, Lawson was working with Professor Wann Langston, Jr. of the University of Texas at Austin. Lawson was at Big Bend searching for the bones of titanosaur sauropods, such as Alamosaurus, when the pterosaur bones, which he later named Quetzalcoatlus, were discovered. When the discovery of the fossils was reported in 1975, Quetzalcoatlus was the largest flying creature known to have lived. A fellow researcher challenged Lawson's estimates of the dimensions of the wing architecture of Quetzalcoatlus. However, Lawson responded by demonstrating that while inconsistent with those of modern-day birds, his estimates were consistent with extrapolations of other pterosaurs, such as Pterodactylus antiquus. In 2010 the U.S. National Park Service described Quetzalcoatlus as the world's second-largest known flying creature. Lawson's discovery of the remains of Quetzalcoatlus northropi caused scientists to rethink both the evolution of flight and the habitats of giant fliers. Lawson appears in Sir David Attenborough's motion picture documentary, Flying Monsters 3D (2010), discussing the impressive wingspan of Quetzalcoatlus and how estimates of that wingspan have changed over time. Lawson's interest in evolving systems and swarming led him to develop as a computer scientist. While working at Southwest Airlines, Lawson used evolutionary computation methods to evaluate alternate means of having passengers board aircraft. Based upon the behavior of ants, Lawson determined whether assigned seating would be faster than Southwest's "festival seating" by creating an ant-based routing computer simulation of passengers boarding a plane, and then trying each pattern. Additionally, Lawson has used ant-based routing in assigning aircraft arrivals to airport gates. At Southwest Airlines a software program uses swarm theory, or swarm intelligence — the idea that a colony of ants works better than one alone. "People don't like being only 500 yards away from a gate and having to sit out there until another aircraft leaves." "Each pilot or plane acts like an ant searching for the best airport gate. "The pilot learns from his experience what's the best for him, and it turns out that that's the best solution for the airline," Lawson explained. As a result, the "colony" of pilots always go to gates from which they can arrive and depart quickly. The program can even alert a pilot of plane back-ups before they happen. "We can anticipate that it's going to happen, so we'll have a gate available," Lawson says. Lawson was one of 100 alumni featured in Celebrating 100 Years: 1910-2010, marking the 100th anniversary of the Graduate School at the University of Texas at Austin. He was among individuals selected to represent the Ja
https://en.wikipedia.org/wiki/Darwin%20Core%20Archive
Darwin Core Archive (DwC-A) is a biodiversity informatics data standard that makes use of the Darwin Core terms to produce a single, self-contained dataset for species occurrence, checklist, sampling event or material sample data. Essentially it is a set of text (CSV) files with a simple descriptor (meta.xml) to inform others how your files are organized. The format is defined in the Darwin Core Text Guidelines. It is the preferred format for publishing data to the GBIF network. Darwin Core The Darwin Core standard has been used to mobilize the vast majority of specimen occurrence and observational records within the GBIF network. The Darwin Core standard was originally conceived to facilitate the discovery, retrieval, and integration of information about modern biological specimens, their spatio-temporal occurrence, and their supporting evidence housed in collections (physical or digital). The Darwin Core today is broader in scope. It aims to provide a stable, standard reference for sharing information on biological diversity. As a glossary of terms, the Darwin Core provides stable semantic definitions with the goal of being maximally reusable in a variety of contexts. This means that Darwin Core may still be used in the same way it has historically been used, but may also serve as the basis for building more complex exchange formats, while still ensuring interoperability through a common set of terms. Archive format The central idea of an archive is that its data files are logically arranged in a star-like manner, with one core data file surrounded by any number of ’extensions’. Each extension record (or ‘extension file row’) points to a record in the core file; in this way, zero to many extension records can exist for each single core record, a more space-efficient method for data transfer than the alternative of including all the data within a single table which could otherwise contain many empty cells. Details about recommended extensions can be found in their respective subsections and will be extensively documented in the GBIF registry, which will catalogue all available extensions. Sharing entire datasets instead of using pageable web services like DiGIR and TAPIR allows much simpler and more efficient data transfer. For example, retrieving 260,000 records via TAPIR takes about nine hours, issuing 1,300 http requests to transfer 500 MB of XML-formatted data. The exact same dataset, encoded as DwC-A and zipped, becomes a 3 MB file. Therefore, GBIF highly recommends compressing an archive using ZIP or GZIP when generating a DwC-A. An archive requires stable identifiers for core records, but not for extensions. For any kind of shared data it is therefore necessary to have some sort of local record identifiers. It's good practice to maintain – with the original data – identifiers that are stable over time and are not being reused after the record is deleted. If you can, please provide globally unique identifiers instead of local ones
https://en.wikipedia.org/wiki/Hoka%20Hoka%20Kazoku
is a Japanese anime television series which aired weekdays on the Fuji TV Network in Japan between October 1, 1976, and March 31, 1982, for a total of 1428 five-minute episodes. It was sponsored by the National Federation of Agricultural Co-operative Associations (now more commonly as JA Zen-Noh). Plot The series doesn't have a real plot, but is rather an educational series using both live action and animation to provide information about life in modern Japan. The series content has been compared to that of Bottle Fairy. The series was sponsored by the National Federation of Agricultural Co-operative Associations, as well as by the office of the Prime Minister of Japan. Characters The grandmother. The father of the family. The wife of Yutaka. Son of Yutaka and Sachiko. Daughter of Yutaka and Sachiko. References External links 1976 anime television series debuts 1982 Japanese television series endings Eiken (studio) Fuji TV original programming
https://en.wikipedia.org/wiki/Nine%20News%20Sydney
Nine News Sydney is the local news bulletin for the Nine Network station in Sydney, airing across New South Wales each night. Like all Nine News bulletins, the Sydney bulletin runs for one hour from 6pm every day. It covers the day's latest local, national and international news, as well as sport, weather and finance. History The Sydney bulletin was presented by Brian Henderson from 1964 until his retirement in November 2002, with then-Sunday presenter Jim Waley taking over in early 2003. In 2005, despite the fact that National Nine News Sydney continued to retain its long-standing ratings lead over Ten Eyewitness News Sydney and Seven News Sydney in the 2003-4 ratings seasons, Waley was replaced with then-weekend presenter Mark Ferguson. In 2004, National Nine News Sydney won 27 out of a possible 40 ratings weeks. Following this, the 6pm bulletin started to lose its long-time ratings lead to the rival Seven News Sydney. Mike Munro was the previous weekend news presenter, until he resigned from the Nine Network in July 2008. He presented his last bulletin on Sunday 26 October 2008. He was replaced by Michael Usher. In January 2009, Mark Ferguson was replaced as weeknight presenter by Peter Overton. Ferguson returned to his weekend news presenting position, which he previously held during Jim Waley's stint as weeknight presenter. In July 2009, it was revealed that weekend news presenter Mark Ferguson would move to Seven News from October. Ferguson, who had been with Nine for 17 years, was removed immediately from the Sydney weekend bulletin and was replaced by Georgie Gardner. Ferguson continued to present Nine Afternoon News bulletin on until his contract expired in September 2009. Mike Bailey presented weather forecasts on Fridays and Saturdays, until he was sacked in early 2009. Jaynie Seal, who had previously presented weather from Sunday to Thursday, returned to weekday weather presenting. In February 2010, Nine announced that Natalie Gruzlewski will be presenting the weather from Monday to Thursday and also filing lifestyle and entertainment reports for Nine News with Seal presenting weather on Friday to Sunday. Nine News Sydney is also broadcast to southern and central New South Wales & the ACT in addition to local Nine News bulletins. It is presented from the Nine Network's TCN-9 Studio 1. On 6 January 2014, all Nine national channels permanently extended their 6pm news service to one hour pushing A Current Affair into the 7pm timeslot. In November 2017, it was announced that Georgie Gardner had been appointed co-host of Today replacing Lisa Wilkinson. Deborah Knight has been announced as Gardner's successor presenting Nine News Sydney on Friday and Saturday nights. In January 2019, it was announced that Deborah Knight had been appointed co-host of Today replacing Karl Stefanovic. In January 2020, Georgie Gardner returned to front the weekend bulletin, replacing Deborah Knight who went on to hosting the radio drive show on 2GB
https://en.wikipedia.org/wiki/Vellum%20%28disambiguation%29
Vellum is skin prepared for writing or printing on, to produce single pages, scrolls, codices or books. Vellum may also refer to: Vellum, a piece of computer software released in 1989 (now re-branded as Graphite) Vellum: The Book of All Hours, a 2006 novel by Hal Duncan
https://en.wikipedia.org/wiki/Diaspora%20%28social%20network%29
Diaspora (stylized as diaspora*) is a nonprofit, user-owned, distributed social network. It consists of a group of independently owned nodes (called pods) which interoperate to form the network. The social network is not owned by any one person or entity, keeping it from being subject to corporate take-overs or advertising. According to its developer, "our distributed design means no big corporation will ever control Diaspora." The project was founded by Dan Grippi, Maxwell Salzberg, Raphael Sofaer and Ilya Zhitomirskiy, students at New York University's Courant Institute of Mathematical Sciences. The group received crowdfunding in excess of $200,000 via Kickstarter. A consumer alpha version was released on 23 November 2010. Diaspora software is licensed under the terms of GNU-AGPL-3.0. Its development is managed by the Diaspora Foundation, which is part of the Free Software Support Network (FSSN). The FSSN is in turn run by Eben Moglen and the Software Freedom Law Center. The FSSN acts as an umbrella organization to Diaspora development and manages Diaspora's branding, finances and legal assets. History Inception The Diaspora project was founded in 2010 by four students at New York University's Courant Institute of Mathematical Sciences, Ilya Zhitomirskiy, Dan Grippi, Max Salzberg, and Raphael Sofaer. The word diaspora is Greek in origin and refers to a scattered or dispersed population. The founders started the project after being motivated by a February 2010 speech of the Columbia University law professor Eben Moglen. In his speech, delivered to the Internet Society's New York Chapter, "Freedom in the Cloud", Moglen described centralized social networks as "spying for free." In an interview for The New York Times, Salzberg said "When you give up that data, you're giving it up forever ... The value they give us is negligible in the scale of what they are doing, and what we are giving up is all of our privacy." Sofaer said, "We don't need to hand our messages to a hub. What Facebook gives you as a user isn't all that hard to do. All the little games, the little walls, the little chat, aren't really rare things. The technology already exists". The group decided to address this problem by creating a distributed social network. To obtain the necessary funds the project was launched on April 24, 2010 on Kickstarter, a crowd funding website. The first 39 days were assigned to raise the US$10,000 that they estimated would be needed to get started. However, the initial funding goal was met in just 12 days and the project eventually raised more than US$200,000 from more than 6000 backers (making it the second most successful Kickstarter project of its time). Grippi said, "We were shocked. For some strange reason, everyone just agreed with this whole privacy thing." Among the donors was Facebook CEO Mark Zuckerberg who contributed an undisclosed amount, saying "I donated. I think it is a cool idea." "Diaspora is trying to destroy the idea that o
https://en.wikipedia.org/wiki/Lego%3A%20The%20Adventures%20of%20Clutch%20Powers
Lego: The Adventures of Clutch Powers (also known as The Adventures of Clutch Powers) is a 2010 computer-animated adventure comedy film. The film is based on the concept of the Lego toy series. The film stars Ryan McPartlin, Yvonne Strahovski, Roger Rose, Jeff Glen Bennett, Paul Michael Glaser, Gregg Berger, Christopher Emerson and Alex Desert. The film received positive reviews for the action and humor, although the consumerism was criticized. Plot The film opens with the titular Clutch Powers tunnelling underground in search of a crystal, but in the process wakes up the "Crystal King" who then chases Clutch to an underground base where he then finds a stuck baby rock monster. After freeing and comforting it, the Crystal King (which happens to be the baby rock monster's parent) catches him with the baby in his arms. Clutch gives it to him and the Crystal King gives him a crystal as a reward for finding his baby. Clutch then returns to his base in Lego City and gives the crystal to his boss, Kjeld Playwell, who assigns him some new teammates: Brick Masterson, a firefighter, Peg Mooring, a biologist, and Bernie von Beam, an engineer. Playwell informs them of an incident on the Space Police prison planet. Clutch and his team arrive on the planet and investigate the situation, despite their lack of cooperation and Clutch's intent of working alone. After seeing that someone is stuck in one of the prisoners' cells, they are attacked by an unseen wizard, who then disappear with the other two criminals. Clutch and his friends free the Watch Commander, who comforts them by stating that he removed the spark plugs of all ships to ensure that the criminals will never escape from the planet. Unfortunately, the criminals take the team's ship and destroy the other ships. Again, the team shows their lack of cooperation when they attempt to create a ship, and Clutch decides to build the ship for the team alone after declaring that a team arguing with each other while being ordered to do their tasks is the sole reason why he always works alone. During a video call on the trip back, Clutch claims responsibility for the team's failure: he was distracted by the symbol on the Watch Commander's prison pod which referred to Omega, one of the two criminals led in the prison escape by the evil wizard. Playwell informs the team that the evil wizard is Mallock the Malign, infamous for terrorizing a medieval planet named Ashlar. The planet's ruler, the late King Revet, sacrificed his own life to ensure his kingdom's safety and Mallock's previous imprisonment. He left his son Prince Varen with his powerful golden sword to rule, despite Prince Varen's incapability of preparing in battle. Playwell then orders Clutch and the team to travel there to capture Mallock. The team manages to get to Ashlar, but their ship accidentally knocks down Lego-Henge (a spoof of Stonehenge). They get take refuge in a seemingly abandoned medieval mine with extra parts, but not after witnessi
https://en.wikipedia.org/wiki/Qualitative%20reasoning
Qualitative Reasoning (QR) is an area of research within Artificial Intelligence (AI) that automates reasoning about continuous aspects of the physical world, such as space, time, and quantity, for the purpose of problem solving and planning using qualitative rather than quantitative information. Precise numerical values or quantities are avoided, and qualitative values are used instead (e.g., high, low, zero, rising, falling, etc.). Purpose Qualitative reasoning creates non-numerical descriptions of physical systems and their behavior, preserving important behavioral properties and qualitative distinctions. The goal of qualitative reasoning research is to develop representation and reasoning methods that enable computer programs to reason about the behavior of physical systems, without precise quantitative information. An example is observing pouring rain and the steadily rising water level of a river, which is sufficient information to take action against possible flooding without knowing the exact water level, the rate of change, or the time the river might flood. Principles The principles used are motivated by human cognition. The principles of qualitative reasoning include: Discrete values Represent continuous quantities using discrete entities for reasoning Example: Instead of using a numerical value for rate of change, consider whether it is increasing, decreasing or constant Relevant values Choose qualitative values based on relevance to a task Example: If the temperature is changing, the boiling point may be important, but if the temperature is constant, the boiling point may be irrelevant Ambiguous values or results Instead of providing one answer, provide a range of answers Example: Instead of computing a numeric level or quantity of water, provide two answers: low or zero Modeling a process Represent the states Represent the transitions between states For quantities, determine landmarks and use inequality reasoning Example:If the temperature of water is below the boiling point, then the water level is constant or slowly decreasing;if the temperature of water is above the boiling point, then the water level is rapidly decreasing;if water has a temperature that changes from below the boiling point to above the boiling point, then the water level will change to rapidly decreasing;if water is above the boiling point for a specified length of time, the water level will be low or zero Uses The techniques which have been developed for qualitative reasoning permit the simulation of quantitative systems which are subject to multiple constraints in the form of inequalities as well as equalities. It can permit the simulation of certain important systems, such as ecosystems, which might otherwise be too complex to model. Qualitative reasoning provides a method for modeling with quantitative inequalities in addition to qualities. Successful application areas include process control, system verification, explanation, autonomo
https://en.wikipedia.org/wiki/Coyote%20Falls
Coyote Falls is a 2010 3D computer-animated Looney Tunes short film featuring the characters Wile E. Coyote and the Road Runner. Directed by Matthew O'Callaghan and written by Tom Sheppard, it is the first Wile E. Coyote and Road Runner short to be made into CGI as well as the first theatrically released 3-D animated short since 1953's Lumber Jack-Rabbit. Coyote Falls was first shown in theaters before Warner Bros.' feature-length film Cats & Dogs: The Revenge of Kitty Galore. In 2014, Warner Bros. Animation published this short on YouTube. Plot From a high bridge, Wile E. Coyote is pouring out his usual Bird Seed lure for the Road Runner below, and intends to use an Acme Bungee Cord he ordered to catch him. On his first two tries, he misses grabbing Road Runner and on his way down a third time (with cutlery in hand), he collides with a gasoline truck and holds on to the tanker for dear life, but only succeeds in taking the gasoline tanker with him, which explodes upon impact. On his next attempt, the Coyote continuously gets hit by oncoming trucks and eventually gets wound up in the bungee cord on the bridge. He is then freed by a passing tow truck, but crashes through the wall above the tunnel and is then hit by another truck. Road Runner then comes up to taunt him, and the Coyote sees yet another truck coming from behind. Wile E. uses the truck to chase after Road Runner, forgetting about the stretching bungee cord and when he lets go to try and grab him, the Coyote is shot back by the bungee cord recoiling and hits yet another truck in the tunnel. The camera changes shots to the back of the truck with "That's all Folks!" written on it and Wile E. recoils one more time, hitting the screen and sliding off, as the Road Runner speeds off through the tunnel. Awards The film was nominated in the 38th Annie Awards and was shortlisted for an Academy Award. Release Coyote Falls was released theatrically with Cats & Dogs: The Revenge of Kitty Galore, and included on the DVD and Blu-ray releases of the film. The short was included on the Looney Tunes Super Stars' Road Runner and Wile E. Coyote: Supergenius Hijinks DVD. It was also included as a bonus on the DVD release of Looney Tunes: Rabbits Run. References External links Coyote Falls on YouTube 2010 3D films 2010 short films 2010 computer-animated films 2010s American animated films 2010s animated short films American comedy short films Looney Tunes shorts Wile E. Coyote and the Road Runner films Reel FX Creative Studios short films Short films directed by Matthew O'Callaghan Films scored by Christopher Lennertz Warner Bros. Animation animated short films 3D animated short films 2010s Warner Bros. animated short films American animated short films
https://en.wikipedia.org/wiki/WeRelate
WeRelate.org is an American wiki genealogy website that provides genealogy tools and data. WeRelate is a non-profit and is funded by tax-deductible donations and is managed by unpaid volunteers. WeRelate had over 2 million person pages by March 2011 and claimed to be the "world's largest genealogy wiki". WeRelate is supported by the Foundation for On-Line Genealogy and the Allen County Public Library in Fort Wayne, Indiana. The site runs on the MediaWiki software. Background The site and software were developed in 2005 by the Foundation for On-Line Genealogy, led by president Dallan Quass, and subsequently launched in the spring of 2006 with the help of Solveig Quass. WeRelate is partnered with the Allen County Public Library, Genealogy Department Indiana, which houses one of the world's largest physical collections of genealogical materials. WeRelate has been listed in the top 101 websites for genealogy by Family Tree Magazine from 2008 through 2013, and listed among the "best family tree and sharing websites" 2023 listing also from this publisher. In 2007, WeRelate and the University of South Florida's Africana Heritage Project launched a research project on slave genealogy, supported by South Carolina's Magnolia Plantation Foundation, including the resulting data in the global genealogy collection. Organization WeRelate encourages users to upload GEDCOMs, each person listed in the file being allocated a new person page on the wiki. The system produces a comparison screen for likely candidates, allowing users to determine if subjects are the same person; duplicate pages for common ancestors can be merged at upload. Information about living people is not accepted; it is automatically replaced by the software with the word "Living". Registered users are able to document their research, which can then be edited by anyone else. WeRelate has over 926,000 Source pages which contain reference and access information along with relevant links. Source pages also provide space for review and research tips. Users may link Person and Family pages to any relevant source pages. Users may also create MySource pages for references relevant to only their research, such as family bibles, birth, death, and marriage certificates. Scans of documentation may be attached to any relevant page. Place information is essential to genealogical research. WeRelate has over 900,000 referenced place pages. Where applicable, Place pages are linked to Family History Library Catalog, and Wikipedia. Where geographic coordinates are available, a Google map is provided. Many pages also include timelines, population history, contained places, history, research tips and images. Compared to other projects that let people publish and share similar data, WeRelate focuses on sourcing files with links to primary genealogy records, and rather than letting users maintain separate personal family trees, aims to align data from different sources into a unified global record. Collab
https://en.wikipedia.org/wiki/31%20Nights%20of%20Halloween
31 Nights of Halloween (formerly 13 Days of Halloween and 13 Nights of Halloween) is an American seasonal programming block on Freeform. It originally began airing in 1998, after the Family Channel became Fox Family, and was continued through the channel's change into ABC Family, and later, Freeform. The 13 Days of Halloween block was created mainly due to the success of the channel's 25 Days of Christmas, which had started two years earlier. The special block lasted from October 19 until Halloween night, covering the thirteen days before the holiday. Starting in 2018, the program aired throughout the whole month of October. History From 1998 to 2004, the block consisted mainly of made-for-TV movies aimed at an older audience, such as Casper: A Spirited Beginning, The Haunting of Seacliff Inn, Lost Souls, The Spiral Staircase, When Good Ghouls Go Bad, Deadly Invasion: The Killer Bee Nightmare, Tower of Terror, The Hollow, and Grave Secrets: The Legacy of Hilltop Drive, and Halloween themed specials such as Scariest Places on Earth and Ghost Stories. Then starting in 2006, the lineup shifted more towards feature films aimed at a younger audience such as Hocus Pocus, The Haunted Mansion, The Addams Family and its sequel, Monsters, Inc., and the Harry Potter film series. Hocus Pocus emerged as the block's sleeper hit, and by the end of the 2010s it had become the most prominently featured film in the block, earning an all-day marathon on Halloween itself. The programming block was not aired in 2003 as ABC Family's new executives decided not to air the block for reasons that remain unclear, but it returned in 2004. Over the following years, the block focused more on family-oriented feature films and away from specific Halloween-based programs. In 2011, ABC Family switched the focus of the programming block to its original purpose (primarily Halloween/Horror related films), while still remaining appropriate for children and families. Films that air during the lineup are usually edited for time constraints and for profane content, such as language or sexuality, to appeal towards all audiences. With the launch of Freeform in 2016, the block remained largely the same, continuing to show Halloween-based family films. On May 15, 2018, Freeform announced that the block will be renamed to 31 Nights of Halloween, meaning the lineup will start on the very first day of October rather than October 19. In 2023, Freeform was permanently removed from Spectrum cable systems as part of the resolution of a carriage dispute between Spectrum and parent company The Walt Disney Company. As part of an initiative to keep Freeform's content available through Disney's streaming platforms, Disney made most of the 31 Nights of Halloween library available through Disney+ under the "Hallowstream" banner. Programming Current Halloween specials Boo to You Too! Winnie the Pooh Halloween Is Grinch Night It's the Great Pumpkin, Charlie Brown Monsters vs. Aliens: Mutant Pumpk
https://en.wikipedia.org/wiki/IBM%20SMS
IBM SMS may stand for several IBM products, systems, or technologies: Hardware Standard Modular System Operating systems Data Facility Storage Management Subsystem (MVS) System Managed Storage in DFSMS for MVS
https://en.wikipedia.org/wiki/DexNet
Dex-net is a robotic manipulator. It uses a Grasp Quality Convolutional Neural Network to learn how to grasp unusually shaped objects. History Dex-net was developed by University of California, Berkeley professor Ken Goldberg and graduate student Jeff Mahler. Design Dex-net includes a high-resolution 3-D sensor and two arms, each controlled by a different neural network. One arm is equipped with a conventional robot gripper and another with a suction system. The robot’s software scans an object and then asks both neural networks to decide, on the fly, whether to grab or suck a particular object. It runs on an off-the-shelf industrial machine made by Swiss robotics company ABB. The software learns by attempting to pick up objects in a virtual environment. Dex-Net can generalize from an object it has seen before to a new one. The robot can "nudge" such virtual objects to examine it if it is unsure how to grasp it. The trial data set was 6.7 million point clouds, grasps and analytic grasp metrics generated from thousands of 3D models. Grasps are defined as a gripper's planar position, angle and depth relative to an RGB-D sensor. Mean picks per hour A metric called mean picks per hour (MPPH) is calculated by multiplying the average time per pick and the average probability of success for a specific set of objects. The new metric allows labs working on picking robots to compare their results. Humans are capable of between 400 and 600 MPPH. In a contest organized by Amazon recently, the best robots were capable of between 70 and 95. Dex-net has achieved 200 to 300. References Artificial neural networks Robotics
https://en.wikipedia.org/wiki/WTSM
WTSM is a radio station on 97.9 FM licensed to Woodville, Florida, United States, serving Tallahassee. It is owned by Radio Training Network, Inc., and broadcasts a Contemporary Christian format branded as "The Joy FM". History WJZT began broadcasting on September 7, 2003, a year after the station was granted a construction permit by the Federal Communications Commission. It originally aired a smooth jazz format and was owned by Kathy and Ernie Petrone. In 2006, WJZT Communications, LLC, a division of Horizon Broadcasting, acquired the station for $2.3 million. After a brief stint as oldies "Cruisin' 97.9", WJZT flipped to sports on December 1, 2010, as "Tallahassee's Sports Monster", using ESPN Radio programming. Horizon Broadcasting reached a deal to sell WTSM and WHLG in Port St. Lucie to Radio Training Network, which owns The Joy FM regional network of Christian radio stations, for $1.3 million in May 2021. The sale was consummated on August 31, 2021. On September 1, 2021, WTSM changed their format from sports to contemporary Christian, branded as "The Joy FM". Previous logo References External links TSM Radio stations established in 2003 2003 establishments in Florida Contemporary Christian radio stations in the United States
https://en.wikipedia.org/wiki/Undamma%20Bottu%20Pedata
Undamma Bottu Pedata () is a 1968 Indian Telugu-language supernatural drama film directed by K. Viswanath and produced by Adurthi Subba Rao who also wrote the screenplay. It is a Telugu adaptation of Datta Dharmadhikari's 1967 Marathi film Thamb Laxmi Kunku Lavte. Premise The film revolves around the efforts taken by Lakshmi (Jamuna) to maintain prosperity in her husband's (Krishna) house. Undamma Bottu Pedata was released on 28 September 1968, received widely positive reviews and became successful. Cast Adapted from The Hindu: Krishna as Krishna Jamuna as Lakshmi V. Nagayya as Dasaratharamaiah Dhulipala as Haridasu Nagabhushanam as Srinivasulu Chalam as Anjaneyulu Sakshi Ranga Rao as the postmaster Arja Janardhana Rao as Venkateswarlu Sowcar Janaki as Tulasamma Anjali Devi as the goddess Lakshmi Suryakantham as Papayamma Suryakala as Seshu Meenakumari as Sumathi Production Adurthi Subba Rao bought the Telugu remake rights of the Marathi film Thamb Laxmi Kunku Lavte (1967). While writing the screenplay of the remake, titled Undamma Bottu Pedata, he retained the essence of the original's story with its climax, but made many other changes such as introducing new characters, mainly to suit the interests of Telugu-speaking audiences. Subba Rao also intended to direct the film and produce it under his banner Babu Movies, but the success of his Hindi directorial venture Milan (1967) led to him receiving more directorial offers from Hindi film producers; after accepting to direct Man Ka Meet (1969) for Sunil Dutt's Ajanta Arts, he entrusted his protégé K. Viswanath with directing Undamma Bottu Pedata. The dialogues were written by N. R. Nandi, cinematography was handled by K. S. Ramakrishna and editing by Kotagiri Gopala Rao. Soundtrack The soundtrack was composed by K. V. Mahadevan, with lyrics written by Devulapalli Krishnasastri. Release and reception Undamma Bottu Pedata was released on 28 September 1968, successfully completing 62-day run in Vijayawada. References External links 1960s Telugu-language films 1968 drama films 1968 films Films directed by K. Viswanath Paranormal films Supernatural fiction Indian romantic drama films Indian family films Films shot in Andhra Pradesh Films set in Andhra Pradesh Films set in Konaseema Films scored by K. V. Mahadevan Indian black-and-white films Indian drama films Telugu remakes of Marathi films Supernatural films
https://en.wikipedia.org/wiki/WYSIWIS
In computer science, and more specifically in groupware engineering, the acronym WYSIWIS stands for "What You See Is What I See" and refers to a paradigm in the design of multiuser interfaces where multiple users, interacting with a multiuser software system, share the same visual perception of the work area (e.g., of the document they are collaboratively editing). While some pioneering groupware systems (e.g., window sharing systems) where characterized by strict WYSIWIS, the WYSIWIS model is most often relaxed in several respects. Notes Groupware
https://en.wikipedia.org/wiki/Sixx
Sixx is a German free-to-air television channel specialised for women. It was launched on 7 May 2010 at 8:15pm. Programming German Abenteuer Ferne Alles außer Sex Anna und die Liebe Besser Essen – leben leicht gemacht Bis in die Spitzen, German version of Cutting It (2010) Das Model und der Freak Eine wie keine Frank – der Weddingplaner Germany's Next Topmodel Hand aufs Herz Jugendcoach Oliver Lück Koffer zu und weg – Die Auswander-Doku Look of Love Schlüsselreiz sixx in concert Windeln und Wellness – Familienurlaub all inclusive Zacherl: Einfach kochen! Foreign 90210 Accidentally on Purpose (Aus Versehen glücklich) (2012-2013) Alias (Alias - Die Agentin) American Horror Story (2013-2014, 2016-2017) Brothers & Sisters Buffy the Vampire Slayer (Buffy – Im Bann der Dämonen) (2013-2017) Cagney & Lacey (2012) Charmed (Charmed – Zauberhafte Hexen) Cougar Town Damages (Damages – Im Netz der Macht) Desperate Housewives Devious Maids (Devious Maids - Schmutzige Geheimnisse) (2015–present) Diagnosis: Murder (Diagnose: Mord) (2012-2014) Drop Dead Diva Ed (Ed – Der Bowling-Anwalt) Eli Stone ER (Emergency Room – Die Notaufnahme) Emily Owens, M.D. (Emily Owens) (2013, 2017–present) Extant (2015-2016) Falcon Crest (2015) Friends Ghost Whisperer (Ghost Whisperer – Stimmen aus dem Jenseits) Gossip Girl Greek Grey’s Anatomy Hart of Dixie (2013-2014, 2016–present) HawthoRNe Homicide Hunter (Homicide Hunter - Dem Mörder auf der Spur) (2016–present) Hope & Faith (2010) JAG (JAG – Im Auftrag der Ehre) Joan of Arcadia (Die himmlische Joan) Joey (2011) Kyle XY Less than Perfect (Office Girl) Life Is Wild Life Unexpected (2011-2013, 2017–present) Lipstick Jungle Mad Love Make It or Break It Melrose Place Medical Investigation Medium (Medium – Nichts bleibt verborgen) Miami Medical Missing (Missing – Verzweifelt gesucht) Moonlight (2011-2012, 2014-2015) Mr. Sunshine (2013) Necessary Roughness (Dr. Dani Santino – Spiel des Lebens) Nip/Tuck (Nip/Tuck – Schönheit hat ihren Preis) October Road One Born Every Minute (US) (One Born Every Minute - Die Babystation) (2014) One Tree Hill (2012-present)Pan Am (2013)Party of FivePolyamory: Married & Dating (Polyamorie - Liebe zu dritt) (2015-2016)Private PracticePrivilegedPushing DaisiesRescue MeS1ngle (2011-2011, 2013)Samantha Who?Scream Queens (2017)Second Time AroundSex and the CitySue Thomas: F.B.I.Surviving Evil (Surviving Evil - Im Angesicht des Bösen) (2015-2018)Summerland (Summerland Beach)That's Life (2010-2011, 2014, 2016)The 100 (2016)The Ellen Show (2011)The GameThe Good WifeThe Guardian (The Guardian - Retter mit Herz) (2014)The L Word (The L Word – Wenn Frauen Frauen lieben)The Magicians (2016-present)The O.C. (O.C., California)The Originals (2014-present)The Royals (2016-present)The Secret Life of the American TeenagerThe Tudors (2011, 2014-2016)Three Rivers Medical CenterUgly BettyVampire DiariesWhat About BrianWeeds (Weeds - Kleine Deals unter Nachbarn) (2013)Will & GraceWitches of East End (2014-2016)You're t
https://en.wikipedia.org/wiki/Gezel
Gezel is a hardware description language, allowing the implementation of a Finite State Machine + Datapath (FSMD) model. The tools included in Gezel allows for simulation, cosimulation as well as compiling into VHDL code. It is possible to extend Gezel through library-blocks written in C++. A Hello World Program dp helloWorld(){ always { $display("Hello World"); } } system S { helloWorld; } References Hardware description languages
https://en.wikipedia.org/wiki/John%20Tracy%20Atkyns
John Tracy Atkyns (died 1773) was an English barrister-at-law and compiler of the Atkyns' Reports. Biography Atkyns was the third son of John Tracy, of Stanway, Gloucestershire, and great-grandson of the third Viscount Tracy, of Toddington. His mother was a daughter of Sir Robert Atkyns, lord chief baron, and it was probably on account of the legal eminence of his grandfather that he adopted the name of Atkyns. He entered Lincoln's Inn in 1724, and was called to the bar in 1732. He had matriculated at New College, Oxford in 1724. In 1755 he was appointed cursitor baron of the exchequer. He had taken notes of the cases in the court of Chancery from Hilary term 1736 to Michaelmas term 1754, and he published condensed reports of them in three volumes (1765, 1667, 1668); a second edition appeared 1781/2, and a third, edited by Francis Williams Sanders, in 1794 (see Atkyns' Reports). In 1768 he made a codicil to his will under the name of Tracy. By his wife, whose name was Katherine Lindsay, he left no children. He died 25 July 1773. Lord Chief-Justice Wilmot describes him in his diary as "a cheerful, good-humoured, honest man, a good husband, master, and friend". References Sources Attribution 1773 deaths 18th-century English people People from Stanway, Gloucestershire English barristers Year of birth unknown
https://en.wikipedia.org/wiki/Castaway%20%28TV%20series%29
Castaway is an Australian children's television series that premiered in Australia on the Seven Network on 12 February 2011. The series is a sequel to the 2008 series Trapped. It was delayed from its initial premiere date in 2010 and as a result first aired on Swedish television, premiering on 1 November 2010 and ending on 6 December 2010. Reviews Youth Television News reviewed the series positively, with the comment "a higher quality of acting, cameras, filming locations and writing, overshadows the previous series in a good way". Cast Benjamin Jay as Ryan Cavaner Maia Mitchell as Natasha Hamilton Anthony Spanos as Josh Jacobs Mikayla Southgate as Jarrah Haddon Joshua Hibble as Zuke Haddon Natasha Phillips as Lily Taylor Matilda Terbio as Emma Taylor Brad Albert as Gabe Schwartz Tara Bilston as Saskia Sarah Mills as Dionne Lincoln Hall as Eli Fox Mukundan Jr as Dr. Hamilton Peter Gwynne as Sergeant Holt Community Group - Luisa Mitchell, Chelsea Albert, Logan Deily Episodes See also Trapped (Australian TV series) List of Australian television series References External links Australian children's television series Seven Network original programming 2010 Australian television series debuts
https://en.wikipedia.org/wiki/HR.com
HR.com is a social network for human resources (HR) professionals. The majority of the content on the network is user-generated, and it is designed for professionals to share best practices and research techniques. Background HR.com Limited is a privately held company based out of Jacksons Point, Canada. HR.com was established in 1999 by Debbie McGrath, who previously set up CEO Group Inc., which was later sold to the Washington Post. It was originally set up as an online magazine for HR professionals, but was subsequently turned into a social network. HR.com has conducted industry surveys with results featured in trade publications such as CNY Business Journal, Training & Development, Canadian Manager, and Atlanta Business Chronicle. References Professional networks Canadian social networking websites Human resource management associations 1999 establishments in Canada
https://en.wikipedia.org/wiki/University%20of%20Colorado%20Boulder%20Computer%20Science%20Department
The Computer Science Department at the University of Colorado Boulder is an academic department in the College of Engineering and Applied Science focusing on the teaching and research of Computer Science. The department was founded in 1970 and was later inducted into the College of Engineering and Applied Science in 1980. The department offers both undergraduate and graduate degree programs as well as a minor in Computer Science. Academic programs Undergraduate The department offers a Bachelor of Science in computer science as well as a minor. The four year undergraduate degree program typically culminates in a year-long senior projects course in which industry groups submit projects for groups of students to work on. The department also offers a working and studying area known as the Computer Science Educational Labs (CSEL). It is a common gathering place for students enrolled in at least one computer science course at the university, providing computing resources in the form of Ubuntu workstations. A student-led group called the Computer Science Undergraduate Advisory Committee (CSUAC) works with students and faculty to improve the undergraduate program and provides resources such as career fairs and other community events. Graduate The graduate program offers either a MS or ME or a Ph.D. The program places a high priority on research and the placement of its students in future careers. The department is supported by $4 million annually in the form of research grants primarily from federal agencies such as the National Science Foundation. Graduate students research in many areas, including human-computer interaction, neural networks, numerical and parallel computation, databases, networks, software engineering, systems, and theoretical computer science. Research Currently, the department has 34 research faculty and 18 administrative staff. Some of the more prevalent realms of research include computer architecture, mobile computing, computer security, computational biology, robotics, algorithm design, artificial intelligence, web engineering, programming languages, computer-supported cooperative work, machine learning, lifelong learning and design, speech and language processing, and scientific computing. Achievements and awards The department has received four successive five-year awards from the NSF and Comparative Effectiveness Research to support both research and infrastructure. The department also received the largest ever gift to a public university in the form of $250 million to fund research to improve the lives of people diagnosed with cognitive disabilities. The department is a member of the ARPA National Consortium in High Performance Computing. Apple co-founder Steve Wozniak donated money to create the "Woz Lab" within the Computer Science Education Lab. Wozniak studied at the university in the late 1960s. Notable faculty and alumni Alan Kay Andrzej Ehrenfeucht David Haussler Eugene Myers Steve Wozniak, honorary Doctor of Eng
https://en.wikipedia.org/wiki/National%20Board%20of%20Review%20Awards%202010
82nd NBR Awards Best Film: The Social Network The 82nd National Board of Review Awards honored the best in film for 2010. Top 10 Films Films listed alphabetically except top, which is ranked as Best Film of the Year: The Social Network Another Year The Fighter Hereafter Inception The King's Speech Shutter Island The Town Toy Story 3 True Grit Winter's Bone Top Foreign Films I Am Love Incendies Life, Above All Soul Kitchen White Material Top Documentaries A Film Unfinished Inside Job Joan Rivers: A Piece of Work Restrepo The Tillman Story Top Independent Films Animal Kingdom Buried Fish Tank The Ghost Writer Greenberg Let Me In Monsters Please Give Somewhere Youth in Revolt Winners Best Film: The Social Network Best Director: David Fincher, The Social Network Best Actor: Jesse Eisenberg, The Social Network Best Actress: Lesley Manville, Another Year Best Supporting Actor: Christian Bale, The Fighter Best Supporting Actress: Jacki Weaver, Animal Kingdom Best Foreign Film: Of Gods and Men Best Documentary: Waiting For “Superman” Best Animated Feature: Toy Story 3 Best Ensemble Cast: The Town Breakthrough Performance: Jennifer Lawrence, Winter's Bone Spotlight Award for Best Directorial Debut: Sebastian Junger and Tim Hetherington, Restrepo Best Original Screenplay: Chris Sparling, Buried Best Adapted Screenplay: Aaron Sorkin, The Social Network Special Filmmaking Achievement Award: Sofia Coppola, for writing, directing, and producing Somewhere William K. Everson Film History Award: Leonard Maltin NBR Freedom of Expression: Fair Game Conviction Howl External links 2010 2010 film awards 2010 in American cinema
https://en.wikipedia.org/wiki/Shlomo%20Moran
Shlomo Moran (; born 1947) is an Israeli computer scientist, the Bernard Elkin Chair in Computer Science at the Technion – Israel Institute of Technology in Haifa, Israel. Moran received his Ph.D. in 1979 from the Technion, under the supervision of Azaria Paz; his dissertation was entitled "NP Optimization Problems and their Approximation". Several PhD students of Moran joined the academia as well, including Shlomi Dolev, Ilan Gronau, Shay Kutten, and Gadi Taubenfeld. In 1993 he shared the Gödel Prize with László Babai, Shafi Goldwasser, Silvio Micali, and Charles Rackoff for their work on Arthur–Merlin protocols and interactive proof systems. References External links Home page at the Technion Living people 1947 births Theoretical computer scientists Israeli computer scientists Technion – Israel Institute of Technology alumni Academic staff of Technion – Israel Institute of Technology Gödel Prize laureates
https://en.wikipedia.org/wiki/Premio%20Lo%20Nuestro%202011
Premio Lo Nuestro 2011 was held on Thursday February 17, 2011 at The American Airlines Arena and was broadcast live on the Univision Network. The nominees were announced on December 2, 2010 during a live televised show "Gala de Nominados", hosted by Lourdes Stephen from Sal y Pimienta and Poncho de Anda from ¡Despierta América! on Univision Network. Hosts Angélica Vale Jaime Camil Performers Presenters Ninel Conde Roselyn Sánchez Javier Poza Bárbara Bermudo Jose Luis Terrazas Sr Jose Luis Terrazas Jr Guy Ecker Vanessa Villela Goyo Carlos Baute Ednita Nazario Gerardo Ortíz Adamari López Belinda J-King & Maximan Olga Tañón Juan Luis Guerra Andrea Legarreta Zion & Lennox Diana Reyes Luis Enrique Héctor "El Torito" Acosta Debi Nova Rodrigo Lombardi Lili Estefan Ilia Calderón Valentino Lanús Don Francisco Blanca Soto Julian Gil Carolina la O Larry Hernandez Special awards Lifetime Achievement Award (Premio Lo Nuestro a la Excelencia) Maná Special Career Achievement Award (Trayectoria Artista del año) Lucero World Icon Award (Premio Ícono Mundial) Ricky Martin Nominees and winners Pop Rock Tropical Regional Mexican Urban Video References External links official Site Premio Lo Nuestro Official list of winners En El Brasero release of Premio Lo Nuestro 2011 Nominees announcement Lo Nuestro Awards by year 2011 music awards 2011 in Latin music 2010s in Miami
https://en.wikipedia.org/wiki/All%20American%20Direct
All American Direct was an American brand-name consumer-electronics retailer and a distant-network satellite television service provider based in Indianapolis, Indiana. Prior to 2014, the company had an agreement with satellite TV company DISH Network to market and sell DISH Network products, as well as to provide DISH Network customers in remote locations with access to broadcast network programming from distant markets. Notably, All American Direct was not a DISH Network subsidiary. Subscribers to the company's My Distant Network Package had to pay subscription fees separately and in addition to their monthly DISH Network subscription fees. History All American Direct was founded in 1983 as nationwide C-Band satellite service provider and retailer National Programming Service, LLC. According to a company Web site, NPS continues to provide C-Band products and services and claims to be the largest C-Band programming provider in the U.S. NPS first began offering C-Band programming in 1987 and first switched from selling large 7–12 foot-diameter C-Band dish antennae to providing small-dish services and equipment as DISH Network affiliate All American Dish in 2003. In 2006, All American Dish launched AllAmericanDirect.com, which "offer[s] a wide variety of consumer electronic products, such as High Definition televisions, Sirius Satellite Radio, Verizon Wireless, High-Speed Internet, and other related products." EchoStar Agreement In late 2006 NPS entered into a multi-year contract with DISH Network parent company EchoStar Corporation that saw EchoStar provide NPS with domestic satellite capacity on EchoStar VII at 119° West longitude and on EchoStar X at 110° West longitude. The partnership came after a Florida court ordered EchoStar to cease providing distant-network programming in October 2006 after a 10-year legal battle over whether the satellite TV provider had violated the Copyright Act; in December 2006 DISH Network ceased all transmission of distant-network programming. Initially, many satellite-TV industry commentators predicted that DISH Network would lose as much as $50 million per year in revenue as a result of the Florida decision; they also assumed that many DISH Network customers would abandon the satellite TV provider for competitor DirecTV. However, following its deal with EchoStar, AllAmericanDirect.com began offering distant network channels in connection with EchoStar, allowing DISH Network to defy these forecasts. From December 2006 until February 2014, AllAmericanDirect.com offered ABC, NBC, CBS, and FOX as part of its Distant Network Package subscription service. Distant Network Package channels through All American Direct were accessible to DISH Network subscribers on channel ranges 241 to 248 for standard-definition broadcast networks. On January 30, 2013, Dish began carrying the channels in the 907 to 914 range. This was due to them moving the channels to accommodate Dish's new direction of grouping channels by
https://en.wikipedia.org/wiki/Device%20driver%20synthesis%20and%20verification
Device drivers are programs which allow software or higher-level computer programs to interact with a hardware device. These software components act as a link between the devices and the operating systems, communicating with each of these systems and executing commands. They provide an abstraction layer for the software above and also mediate the communication between the operating system kernel and the devices below. Usually the operating systems comes with a support for the common device drivers and usually the hardware vendors provide the device driver for their hardware devices for most platforms. The aggressive scaling of the hardware devices and the complex software components has made the device driver development process cumbersome and complex. When the size and functionality of the drivers started increasing the device drivers became a key factor in defining the reliability of the system. This has created an incentive towards automatic synthesis and verification of device drivers. This article sheds some light into some approaches in synthesis and verification of device drivers. Motivation for automatic driver synthesis and verification Device drivers are the principal failing component in most systems. The Berkeley Open Infrastructure for Network Computing (BOINC) project found that OS crashes are predominantly caused by poorly written device driver code. In Windows XP, drivers account for 85% of the reported failures. In the Linux kernel 2.4.1 device driver code accounts for about 70% of the code size. The driver fault can crash the whole system as it is running in the kernel mode. These findings resulted in various methodologies and techniques for verification of device drivers. An alternative was to develop techniques which can synthesize device drivers robustly. Less human interaction in the development process and proper specification of the device and operating systems can lead to more reliable drivers. The other motivation for driver synthesis, is the large number of flavors of operating systems and device combinations. Each of these has its own set of input/output control and specifications which makes support of hardware devices on each of the operating systems difficult. So the ability to use a device with an operating system requires the availability of corresponding device driver combination. Hardware vendors usually supply the drivers for Windows, Linux and Mac OS but due to the high development or porting costs and technical support difficulties they are unable to provide drivers on all platforms. An automated synthesis technique can help the vendors in providing drivers to support any devices on any operating system. Verification of Device Drivers There are two challenges that limit testing the device drivers. It is very hard to determine the exact operation or time when there is a fault in the interaction between driver and the kernel. The system could go into some inconsistent state and the crash is reported afte
https://en.wikipedia.org/wiki/Sporza
Sporza is a multimedia brand of Belgian public-service radio and television network VRT specifically for coverage of sporting events. These broadcasts are organized by the Flemish government and mainly financed with tax money. Current rights Belgium International Logos External links Sports divisions of TV channels Dutch-language radio stations in Belgium Radio stations established in 2004 2004 establishments in Belgium
https://en.wikipedia.org/wiki/Pordata
Pordata is the Contemporary Portugal Database equipped with official and certified statistics about Portugal and Europe. The information is divided in several themes like population, education, health, between others. This database is available for everybody, free of charge, and complete with exempt and accurate information. All of its information is provided by official entities, such as the Portuguese National Institute of Statistics and Eurostat. The number of sources being used so far goes up to a total of 60. All of the available data is presented in a yearly fashion, and whenever possible dating back to 1960. Pordata was organized by the Francisco Manuel dos Santos Foundation, created in 2009 by Alexandre Soares dos Santos and his family. FFMS, is presided by Prof. António Barreto and set its main objective in promoting study, knowledge, information and public debate. When released to the public on February 23, 2010 under the direction of Prof. Maria João Valente Rosa, Pordata included only contents about Portugal, nationally. On November 3, the Foundation, launches an extension of its database to the new Pordata Europe. It now includes not only data about Portugal, but also about the European Union, Schengen Area, United States and Japan. About Pordata Created by the Francisco Manuel dos Santos Foundation (FFMS) on February 23, 2010, Contemporary Portugal Database Pordata is a public service, free of charge of unlimited use. Pordata allows the user a fast access to the numbers of the Portuguese reality, spread out across different themes as diverse as population, justice, education, health, environment, among several others. All presented in a chronologic evolution starting, whenever possible in 1960. About 40 official sources in Pordata Portugal, and more than 20 in Pordata Europe are responsible for the rigorous and exempt treatment of the published numbers. With more than 70.000 series available, Pordata allows the analysis of different themes in the same search enviorement. Here, the user is able to use a vast set of both visualization tools (such as graphs and tables) and editing ones (%, variations, etc.). Directed by Professor Maria João Valente Rosa, the project Pordata is the result of a sequence of studies coordinated and put to motion by António Barreto in the Social Sciences Institute of Lisbon University dating back to the late 90s. FFMS believes that side by side with the rapid development of information and communication technologies, the general interest in statistics as suffered a significant growth in the last few years, putting it in a vital position inside the process of analyzing and knowing nowadays societies. According to Maria João Valente Rosa, Pordata “is trying to answer the needs of credible information, so many times disperse and with complex access, to a public as wider as possible”. Furthermore: “This is a project destined to everybody, a real public service, thought out to a vast number of users tha
https://en.wikipedia.org/wiki/Classified%20United%20States%20website
A variety of networks operating in special security domains handle classified information in the United States or sensitive but unclassified information, while other specialized networks are reserved specifically for unclassified use by the same agencies. Some sites accessed from these networks have been referred to as "classified websites" in official communications, such as the American embassy "Amman's Classified Web Site at http://www.state.sgov.gov/pinea/amman/" and "Mexico City's Classified Web Site at http://www.state.sgov.gov/p/wha/mexicocity" Some of these trace back to the Defense Data Network which split from the Internet in 1983. Networks NIPRNet NIPRNet is a low-security network reserved for unclassified information, such as regular Internet websites and firewalled but unclassified military websites. OpenNet According to the U.S. Department of State Foreign Affairs Manual, "OpenNet is a physical and logical Internet Protocol (IP)-based global network that links the Department of State's Local Area Networks (LANs) domestically and abroad. The physical aspect of the network uses DTS circuits for posts abroad, FTS-2001-provided circuits, leased lines, and dial-up public switch networks. This includes interconnected hubs, routers, bridges, switches, and cables. The logical aspect of the network uses Integrated Enterprise Management System (NMS) and TCP/IP software, and other operational network applications. OpenNet is a Sensitive But Unclassified (SBU) network, which supports e-mail and data applications." OpenNet+ OpenNet+ is described for State Department use as using standard .state.gov domain names, which must be requested through a State Department intranet site at http://intranet.state.gov/ds3081 . Web site development cannot be done on machines directly connected to this network. The "www" prefix is not to be used on OpenNet+, as it is reserved for use on the Internet. DNI-U (OSIS) OSIS was the name of an "unclassified network serving the intelligence community with open-source intelligence". Originally used to refer both to the network and to the content it provided, it has since been decoupled, with the content named "Intelink-U", while the network continues as DNI-U. The network is maintained by the DNI-CIO Intelligence Community Enterprise Services office (ICES). ClassNet ClassNet domain names for the State Department take the form ".state.sgov.gov". Web pages for ClassNet may be developed on a "classified workstation". "Any workstation used for development purposes may not serve as the operational repository of images, files, or other information associated with a Web site." ClassNet is used for telecommunications, and its use is promoted by the Business Center Division. Two versions of the State Messaging and Archival Retrieval Toolset (SMART) database were created, one with a maximum rating of Sensitive but Unclassified (SBU) for OpenNet+, and one with a top rating of Secret for ClassNet. SIPRNet (D
https://en.wikipedia.org/wiki/Hip%20neu%20Sgip%3F
Hip neu Sgip? (English: Hip or Skip?) is an S4C room makeover Welsh television programme for children. It is shown on the Welsh-language children's television programming opt-out, Stwnsh. History Commissioned by Siwan Jobbins in 2004 from an idea by Fflic production staff, Hip neu Sgip? was a vehicle for Alex Jones and a series of young designers. Initially concentrating on bedrooms, Hip neu Sgip? expanded into large-scale projects in late 2008 by overhauling the Children's Ward play room at Ysbyty Glan Clwyd. Hip neu Sgip?: Yn erbyn y cloc In 2011, Hip neu Sgip? was re-branded as Hip neu Sgip?: Yn erbyn y cloc (English: Hip neu Sgip?: Against the clock). It aired as eight 1 hour-long programmes. Alun Williams became the presenter and the team, including designer Leah Hughes and handymen, Iwan Llechid Owen, Gwyn Eiddior Parry and Ioan Thomas took on community-based challenges all over Wales. They used a number of suppliers from all over the UK ranging from major suppliers such as Litecraft to smaller ones like L&S Prints. Broadcast dates 05/01/11: Ffostrasol Football Club, Ffostrasol 12/01/11: Ysgol y Strade, Llanelli 19/01/11: CeLL, Blaenau Ffestiniog 26/01/11: Ysgol Uwchradd Aberteifi, Cardigan (Cardigan High School) 02/02/11: Bontnewydd Community Hall, Caernarfon 09/02/11: Ysgol Dyffryn Teifi, Llandysul 16/02/11: The Urdd Centre, Aberdare 23/02/11: The Tabernacle Chapel Vestry, Llanrwst Presenters Alex Jones (2004–2011) Alun Williams (2011) References S4C original programming