source stringlengths 32 199 | text stringlengths 26 3k |
|---|---|
https://en.wikipedia.org/wiki/Polygon%20Cruncher | Polygon Cruncher is 3D computer graphics software for generating 3D-optimized meshes based on reduction and other optimization techniques. Polygon Cruncher is also available as an API through an SDK.
Overview
Polygon Cruncher was initially created in 1999 for Kalisto Entertainment. It was originally based on an algorithm proposed by Michael Garland. The algorithm uses iterative contractions of vertex pairs to simplify models and maintains surface error approximations using quadric matrices. The process reduces the number of triangular polygons with minimal loss of detail.
Polygon Cruncher simplifies meshes and retains most details even while reducing polygons by as much as 95%. Texture information, vertex colors, and specified normals are taken into account during optimization, as well as many others settings. For example, it is possible to define a symmetry axis in order to produce symmetrical low-resolution meshes.
Polygon Cruncher has the ability to generate a dynamic mesh (also called multi-resolution mesh) once the optimization has been computed. This feature allows selection of the most appropriate LOD for the mesh in real time and is demonstrated in the Polygon Cruncher OpenGL viewer integrated to the software.
The Polygon Cruncher API is exposed in a C++ library. A feature allows serialized optimization to produce pre-optimized 3D assets for contexts such as video games, CAD, or other real time visualization processes.
Supported Platforms
Polygon Cruncher software is running on Windows operating system. It is available as a plugin for:
Autodesk 3ds Max
Autodesk Maya
Newtek Lightwave
3DBrowser.
In the 3D Photo Browser, Polygon Cruncher is able to simplify various 3D formats such as Maya, Wavefront, Truespace, Sketchup, XSI, Collada, DXF, etc.
The Polygon Cruncher API is available for developers through a C++ SDK. This library is currently used by different companies such Autodesk® (3ds Max®), Act-3D (Lumion®), Anark® (Anark Core Platform®).
References
External links
Polygon Cruncher software website
Polygon Cruncher SDK website
3D graphics software
Video game engines
1999 software |
https://en.wikipedia.org/wiki/NSSC-1 | The NASA Standard Spacecraft Computer-1 (NSSC-1) is a computer developed as a standard component for the MultiMission Modular Spacecraft at the Goddard Space Flight Center (GSFC) in 1974. The basic spacecraft was built of standardized components and modules, for cost reduction. The computer had 18 bit wide core memory or plated wire memory; up to 64 k. 18 bits was chosen because it gave more accuracy (x4) for data over a 16 bit machine. Floating point arithmetic was not supported.
Usage
The NSSC-1 was used on the
Solar Maximum Mission
Hubble Space Telescope (for spacecraft control, not image data handling which initially used the DF-224)
Landsat-D,D' Missions, renamed Landsat 4 and Landsat 5
and other missions that were mostly limited to the solar system, eg Gamma Ray Observatory, and UARS.
The prior OBP hardware was developed by Westinghouse and GSFC. The machine used diode–transistor logic, the lowest power parts available at the time on the preferred parts list; initially fabricated from 1700 SSI (NOR gate) packages, the later AOP was implemented using 69 MSI (medium-scale integration) TTL chips from Harris.
The NSSC-1 was implemented by IBM using TRW versions of the Harris chips.
Programming and support
The NSSC-1 had an assembler/loader/simulator toolset hosted on Xerox XDS 930 (24- bit) mainframe. An associated simulator ran at 1/1000 of real time. The Xerox computer was interfaced to a breadboard OBP in a rack (which, of course, operated at room temperature ambient conditions). Later, the Software Development and Validation Facility (SDVF) added a flight dynamics simulator hosted on a PDP-11/70 minicomputer.
A purpose-built NSSC-1 Flight Executive was developed for use on the Solar Maximum Mission (SMM) and subsequent flights. It switched tasks at intervals of 25 ms and included a stored command processor that handled both absolute time and relative time commands. It had a status buffer that could be transferred back to a ground receiver station and thus required a lot of memory, typically more than half of that available, leaving the rest for applications and spare.
Historical context
Prior to NSSC-1
The Advanced Onboard Processor (AOP) was used on Landsat B & C, International Ultraviolet Explorer (IUE), and OSS-1. It used medium scale integration transistor-transistor logic (TTL).
Subsequent to NSSC-1
In the 1980s the RCA 1802 was used for many missions—like Galileo. This mission and other missions started the trend away from custom built NASA CPUs in spacecraft. The exploration of the inner and outer parts of the solar system would have to be done with existing (civilian and military-aerospace) CPUs.
Before the RAD family of 32 bit CPUs were used in space missions, the MIL-STD-1750A (a CPU that could run modern applications) saw substantial use.
Since the arrival of the IBM RAD6000 in the 2000s and the RAD750 in the 2010s, using the NSSC-1 has become unthinkable. Its computing power was not great, and most modern spa |
https://en.wikipedia.org/wiki/William%20J.%20Donahue | William J. "Bill" Donahue is a retired lieutenant general for the United States Air Force who transformed networks and communications during his long career. He retired in May 2000 as the director of communications and information at Air Force Headquarters and commander of the Air Force Communications and Information Center in Washington, D.C. During his 33-year Air Force career, Donahue served in a variety of communications, information, command and control positions at virtually every level in the Air Force. During his active-duty career, Donahue led the Internet and information technology transformation in the Air Force.
Donahue has an undergraduate degree in mathematics and a master's degree in logistics management from the Air Force Institute of Technology. He is also a graduate of the National War College, the executive development program of the University of California, Berkeley, and the national security program of Harvard's John F. Kennedy School of Government. Since retirement from the Air Force, Donahue has worked in the government information technology industry.
He is executive vice president, federal solutions for Sytel and is a member of several corporate and advisory boards for leading information technology companies. From 2000 to 2003 Donahue was vice president and general manager for CSC's aerospace business unit, where he had operational responsibility for the delivery of information technology solutions, support services, and space systems solutions to the Air Force. He currently is involved in promoting and advocating for diabetes research.
Air Force biography
Lt. Gen. Donahue was director, communications and information, Headquarters U.S. Air Force, and commander, Air Force Communications and Information Center, Washington, D.C. He was responsible for strategic plans, doctrine, policies, architecture and standards for communications and information systems in the Air Force. He was the functional manager for more than 75,000 communications and information professionals in the Air Force. He was responsible for three field operating agencies: the Air Force Communications Agency, the Air Force Pentagon Communications Agency and the Air Force Frequency Management Agency.
The general entered active duty in September 1966 and was commissioned in November 1966 through Officer Training School. He has commanded two communications groups and has served as the chief communications-computer officer for the Iceland Defense Force, two numbered air forces and two major commands.
Education
1966 Bachelor of Arts degree in mathematics, Bellarmine College, Kentucky
1972 Master of Science degree in logistics management, Air Force Institute of Technology
1973 Squadron Officer School, Maxwell Air Force Base, Alabama
1985 National War College, Fort Lesley J. McNair, Washington, D.C.
1990 University of California's Executive Development Course
Assignments
September 1966 – November 1966, student, Officer Training School, Lackland Air Force B |
https://en.wikipedia.org/wiki/Field%20of%20Glory%20%28disambiguation%29 | Field of Glory or Fields of Glory may refer to:
Gaming
Field of Glory, a series of computer games based on a 2008 miniature tabletop game
Fields of Glory, a 1993 computer game
Panzer Elite Action: Fields of Glory, a 2006 video game
Fields of Glory, a 1996 wargame by Richard Berg
Fields of Glory (Shatter), a strategy in Final Fantasy XIV: Heavensward
Literature
On the Field of Glory, 1906 Polish novel
Field of Glory, 1990 French novel by Jean Rouaud
Fields of Glory, 2014 British novel by Michael Jecks
Fields of Glory: The Diary of Walter Tull, 2004 British novel by Walter Tull
Places
"Field of Glory", site of the Battle of San Lorenzo in Argentina, 1803
Sri Ksetra Kingdom ('Field of Glory'), in Myanmar |
https://en.wikipedia.org/wiki/South%20African%20Environmental%20Observation%20Network | The South African Environmental Observation Network (SAEON) is a science network of people, organisations and, most importantly observation platforms, that perform Long-Term Ecological Research (LTER) in South Africa and its surrounding oceans. The SAEON is of global importance as an innovative approach in ecology to understand environmental change and to determine the impact of anthropogenic forces at multiple scales but it is a remarkably complex challenge to statistically discern between ubiquitous natural variability and exogenous forcing. The SAEON constitutes a national government response to the World Summit on Sustainable Development (Earth Summit 2002) and is a component of the GEO (Group on Earth Observations). The SAEON has become the leader in environmental science and observation in South Africa, but has been criticised for taking a long time to establish, a situation which was inevitable in view of SAEON's multiple stakeholder corps. It has also been raised that the cost of replicated experimental treatments across SAEON sites will be high.
Vision
SAEON is a comprehensive, sustained, coordinated and responsive South
African environmental observation network that delivers long-term reliable
data for scientific research and informs decision-making; for a knowledge
society and improved quality of life.
Development path
The SAEON's development was stimulated by the International Long-Term Ecological Research in 1996 and promoted further by South Africa's Foundation for Research Development. This initiative led to a study tour of the USLTER and a landmark national science meeting, held together with an ILTER meeting in 1999, during which a large number of stakeholders supported the notion of a South African LTER.
South African government departments met with the proponents of a South African LTER in 2001 and approved the establishment of the SAEON under the management of the National Research Foundation. The Department of Science and Technology (South Africa) funded the SAEON as of 2002. In 2004, the Department of Environmental Affairs and Tourism recognised the potential role of the SAEON in climate change research in the national Climate Change Response Strategy.
Nodes and governance
The SAEON performs environmental monitoring and research via strategically located nodes. The nodes also provide research support to collaborators. Nodes are geographically distributed across South Africa to provide good coverage of biomes or subsets thereof. At the start of 2011 the respective nodes were:
SAEON Ndlovu Node at Phalaborwa, hosted by the South African National Parks. The node focuses on the Savanna Biome.
SAEON Elwandle Node in Grahamstown, hosted by the South African Institute for Aquatic Biodiversity. The node focuses on coastal-inshore systems.
SAEON Egagasini Node in Cape Town, hosted by the Department of Environmental Affairs. The node focuses on marine-offshore systems.
SAEON Fynbos Node, in Cape Town, hosted by the So |
https://en.wikipedia.org/wiki/Computer%20representation%20of%20surfaces | In technical applications of 3D computer graphics (CAx) such as computer-aided design and computer-aided manufacturing, surfaces are one way of representing objects. The other ways are wireframe (lines and curves) and solids. Point clouds are also sometimes used as temporary ways to represent an object, with the goal of using the points to create one or more of the three permanent representations.
Open and closed surfaces
If one considers a local parametrization of a surface:
then the curves obtained by varying u while keeping v fixed are coordinate lines, sometimes called the u flow lines. The curves obtained by varying v while u is fixed are called the v flow lines. These are generalizations of the x and y Cartesian coordinate lines in the plane coordinate system and of the meridians and circles of latitude on a spherical coordinate system.
Open surfaces are not closed in either direction. This means moving in any direction along the surface will cause an observer to hit the edge of the surface. The top of a car hood is an example of a surface open in both directions.
Surfaces closed in one direction include a cylinder, cone, and hemisphere. Depending on the direction of travel, an observer on the surface may hit a boundary on such a surface or travel forever.
Surfaces closed in both directions include a sphere and a torus. Moving in any direction on such surfaces will cause the observer to travel forever without hitting an edge.
Places where two boundaries overlap (except at a point) are called a seam. For example, if one imagines a cylinder made from a sheet of paper rolled up and taped together at the edges, the boundaries where it is taped together are called the seam.
Flattening a surface
Some open surfaces and surfaces closed in one direction may be flattened into a plane without deformation of the surface. For example, a cylinder can be flattened into a rectangular area without distorting the surface distance between surface features (except for those distances across the split created by opening up the cylinder). A cone may also be so flattened. Such surfaces are linear in one direction and curved in the other (surfaces linear in both directions were flat to begin with). Sheet metal surfaces which have flat patterns can be manufactured by stamping a flat version, then bending them into the proper shape, such as with rollers. This is a relatively inexpensive process.
Other open surfaces and surfaces closed in one direction, and all surfaces closed in both directions, can't be flattened without deformation. A hemisphere or sphere, for example, can't. Such surfaces are curved in both directions. This is why maps of the Earth are distorted. The larger the area the map represents, the greater the distortion. Sheet metal surfaces which lack a flat pattern must be manufactured by stamping using 3D dies (sometimes requiring multiple dies with different draw depths and/or draw directions), which tend to be more expensive.
Re |
https://en.wikipedia.org/wiki/Fantsuam%20Foundation | Fantsuam Foundation is a Nigerian non-profit organisation working in the field of Information and Communication Technologies (ICT) that is working to develop a rugged computer suited for African conditions. Known as the Solo computer, this wooden-encased PC is being designed to cope with the "heat and dust" of Africa. The British Broadcasting Corporation featured this organisation's work on the Solo computer.
Wireless internet in northern Nigeria
It is the lone provider of wireless internet service in northern Nigeria. Founded in 1996 in Jos, Nigeria, Fantsuam Foundation is a non-profit organization working on gender and youth focused microfinance and ICT (or information and communication technology) services and development in rural communities of Nigeria.
BBC's interest
British telecasters from the BBC were surprised by the "digital renaissance" experienced by the affected area in Kafanchan. They claimed that the people of the area were "eager to join the information age, use computers and get on-line".
Solo computer's plans
Now Fantsuam Foundation is working on a revolutionary solar-powered alternative computer, tailormade for the "developing world".
John Dada of Fantsuam told the Association for Progressive Communications in an interview, "FF had been involved in importation of refurbished PCs for civil society organizations in Nigeria. We soon realized that these PCs were as vulnerable to heat, dust and unreliable power supply as the brand new ones. We found a UK-based design team that was working on a system that addressed these three 'rural tropical' issues."
Fantsuam plans to develop this into a small industry that can serve the local population.
"It is our way of bringing cutting edge technology to rural Nigeria, and promoting rural ICT entrepreneurship and associated downstream employment opportunities," says Dada.
Starting with micro-finance
He also noted that the BBC coverage significantly helped highlight their program. Drawing global attention, this film reported how the Fantsuam Foundation, started as a micro-finance project with only twenty-five clients, turned out to be a huge success and administration became a problem. They report great success in regards to classroom work and training with new users.
High temperatures, dust and PCs
The new computer is called Solo and they are developing it in partnership with a group of software designers based in Britain. The Foundation reports that high temperatures and dust are a large factor in causing a high number of crashes, especially when combined with unstable software. The Solo computer is designed to get around these troubles and Fantsuam is now field-testing the latest prototype, which is approximately the size of a single card from the motherboard of a normal PC.
The Solo has no moving parts to fail as the hard drive is replaced by a flash card and is specially engineered to work under 8.5 watts of power. It runs on the Linux computer operating system, w |
https://en.wikipedia.org/wiki/The%20Maze%20of%20Galious | The Maze of Galious is a 1987 platform-adventure video game developed and published by Konami for the MSX home computer. A reworked conversion was released for the Family Computer. Both versions were re-released digitally for Microsoft Windows. The second entry in the Knightmare trilogy, it follows the respective hero and former damsel in distress of the previous game, Popolon and Aphrodite, as they embark on a journey through Castle Greek to free their unborn child Pampas from the evil priest Galious. The player explores each map in search for items and power-ups to progress, while also fighting enemies and bosses.
The Maze of Galious was created by the MSX division at Konami under management of Shigeru Fukutake. The process of making original titles for the platform revolved around the person who came up with the characters. A team of seven members were responsible for its development, lasting somewhere between four and six months, with Ryouhei Shogaki being the project's lead designer. The game garnered generally favorable reception from critics and retrospective commentarists. It served as influence for La-Mulana (2006), while the game's exploration bits were utilized for Castlevania II: Simon's Quest. It was followed by Shalom: Knightmare III (1987). In the years since, fans have experimented with remaking and porting the title unofficially to other platforms.
Gameplay
The Maze of Galious is a platform-adventure game starring the warrior Popolon and his lover, the princess Aphrodite, as they embark on a journey through Castle Greek to free their unborn child Pampas from the evil priest Galious. Being able to control two characters means the player can switch between Popolon and Aphrodite, both of which have slightly different abilities: Popolon can push stones, open heavy doors and has a variable jumping height, while Aphrodite survives longer under water, can shoot more projectiles and has a fixed jumping height. The game's structure is similar to The Legend of Zelda; Castle Greek acts as the main overworld, where entrances to the ten "worlds" are hidden throughout.
The player explores each world map, collecting items, defeating enemies and bosses, and obtaining power-ups to progress further. Similar to metroidvania games, new areas can be accessed by acquiring new items. Each map also hosts three hidden items to aid Popolon and Aphrodite against a "Great Demon". In order to face a "Great Demon", the player must inspect a gravestone that reveals an incantation to invoke them at a boss room by typing their names. Some items are optional but others are mandatory such as the "Cross", which is needed to face against the final boss. Enemies can drop random items after their defeat, ranging from that can be spent in shops to upgrade the character's overall inventory, arrow stocks for projectile-based weapons, and keys to open locked doors.
There are several types of enemies, each with strengths and weaknesses; some monsters are immune to fr |
https://en.wikipedia.org/wiki/Morph%20target%20animation | Morph target animation, per-vertex animation, shape interpolation, shape keys, or blend shapes is a method of 3D computer animation used together with techniques such as skeletal animation. In a morph target animation, a "deformed" version of a mesh is stored as a series of vertex positions. In each key frame of an animation, the vertices are then interpolated between these stored positions.
Technique
The "morph target" is a deformed version of a shape. When applied to a human face, for example, the head is first modelled with a neutral expression and a "target deformation" is then created for each other expression. When the face is being animated, the animator can then smoothly morph (or "blend") between the base shape and one or several morph targets. Typical examples of morph targets used in facial animation is a smiling mouth, a closed eye, and a raised eyebrow, but the technique can also be used to morph between, for example, Dr Jekyll and Mr Hyde. Early 3D videogames, such as Quake and Crash Bandicoot use per-vertex animation for all character animations.
When used for facial animation, these morph target are often referred to as "key poses". The interpolations between key poses when an animation is being rendered, are typically small and simple transformations of movement, rotation, and scale performed by the 3D software.
Not all morph target animation has to be done by actually editing vertex positions. It is also possible to take vertex positions found in skeletal animation and then use those rendered as morph target animation.
An animation composed in one 3D application suite sometimes needs to be transferred to another, as for rendering. Because different 3D applications tend to implement bones and other special effects differently, the morph target technique is sometimes used to transfer animations between 3D applications to avoid export issues.
Benefits and drawbacks
There are advantages to using morph target animation over skeletal animation. The artist has more control over the movements because they can define the individual positions of the vertices within a keyframe, rather than being constrained by skeletons. This can be useful for animating cloth, skin, and facial expressions because it can be difficult to conform those things to the bones that are required for skeletal animation.
However, there are also disadvantages. Vertex animation is usually a lot more labour-intensive than skeletal animation because every vertex position must be manually manipulated and, for this reason, the number of pre-made target morphs is typically limited.
Also, in methods of rendering where vertices move from position to position during in-between frames, a distortion is created that does not happen when using skeletal animation. This is described by critics of the technique as looking "shaky". On the other hand, this distortion may be part of the desired "look".
For large models, vertex animation requires significant memory and storage a |
https://en.wikipedia.org/wiki/Randall%20Beer | Randall D. Beer is a professor of cognitive science, computer science, and informatics at Indiana University. He was previously at Case Western Reserve University. His primary research interest is in understanding how coordinated behavior arises from the neurodynamics of an animal's nervous system, its body and its environment. He works on the evolution and analysis of dynamical "nervous systems" for model agents, neuromechanical modeling of animals, biomorphic robotics, and dynamical systems approaches to behavior and cognition. More generally, he is interested in computational and theoretical biology, including models of metabolism, gene regulation and development. He also has a longstanding interest in the design and implementation of dynamic programming languages and their environments.
Books
Biological neural networks in invertebrate neuroethology and robotics / edited by Randall D. Beer, Roy E. Ritzmann, Thomas McKenna. Boston : Academic Press, c1993. xi, 417 p. : ill. ; 24 cm. (acid-free paper)
Beer, Randall D. Intelligence as adaptive behavior : an experiment in computational neuroethology / Randall D. Beer. Boston : Academic Press, c1990. xxiii, 213 p. : ill. ; 24 cm. (alk. paper)
External links
Beer's page at Indiana University
American cognitive scientists
Living people
American roboticists
Indiana University faculty
Case Western Reserve University faculty
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/Cisco%20IOS%20XR | IOS XR is a release train of Cisco Systems' widely deployed Internetwork Operating System (IOS), used on their high-end Network Convergence System (NCS) and carrier-grade routers such as the ASR 9000 series and Carrier Routing System series of routers.
Architecture
According to Cisco's product literature, IOS XR shares very little infrastructure with the other IOS trains, and is instead built upon a "preemptive, memory protected, multitasking, microkernel-based operating system". The microkernel was formerly provided by QNX; versions 6.0 onwards use the Wind River Linux distribution.
IOS XR aims to provide the following advantages over the earlier IOS trains:
Improved high availability (largely through support for hardware redundancy and fault containment methods such as protected memory spaces for individual processes and process restartability)
Better scalability for large hardware configurations (through a distributed software infrastructure and a two-stage forwarding architecture)
A package based software distribution model (allowing optional features such as multicast routing and MPLS to be installed and removed while the router is in service)
The ability to install package upgrades and patches (potentially while the router remains in service)
A web-based GUI for system management (making use of a generic, XML management interface)
History
IOS XR was announced along with the CRS-1 in May 2004. The first generally available version was 2.0.
Some significant releases include the following.
3.2 – first generally available version for the 12000 router series
3.9 – first generally available version for the ASR 9000 router series
5.0 – first generally available version for the NCS6000 series, which is based upon a Linux kernel instead of QNX, and was released in September 2013
6.1.1 - Introduces support for the 64-bit Linux-based IOS XR operating system on ASR 9000 series
Differences between IOS and IOS XR
An example BGP configuration for IOS and IOS XR is shown.
More examples can be found in the Cisco document Converting Cisco IOS Configurations to Cisco IOS XR Configurations.
IOSrouter bgp 109
no synchronization
bgp log-neighbor-changes
neighbor 203.0.113.1 remote-as 109
neighbor 203.0.113.1 update-source Loopback0
no auto-summary
IOS XRrouter bgp 109
neighbor 203.0.113.1
remote-as 109
update-source Loopback0
See also
Cisco IOS
Cisco IOS XE
Cisco NX-OS
References
External links
Cisco Content Hub
Cisco Feature Navigator
Cisco IOS XR Support Page
Cisco Aggregation Services Router 9000 Series Support Page
Cisco Carrier Routing System Support Page
Cisco multimedia documentation - covering IOS XR and its supported systems
Cisco Security Advisories
HEAnet's New Network and Working with IOS-XR
Cisco products |
https://en.wikipedia.org/wiki/DataMarket | DataMarket was a privately held Icelandic company that specialises in providing access to and visually displaying data from public and, to a lesser extent, private institutions and companies. DataMarket was established in Reykjavík, the capital of Iceland in 2008. The Guardian Technology blog labeled DataMarket as being "Impressive, and interesting".
One of DataMarkets contracts was to graphically visualize the 2011 budget for Reykjavík municipality. DataMarket has gotten wide media coverage in Iceland.
Initially DataMarket focused on the Icelandic market by incorporating data from various public institutions such as Statistics Iceland, the Central Bank of Iceland, the Icelandic Directorate of Labour, the Icelandic Marine Research Institute, National Energy Authority of Iceland, Registers Iceland, the Report of the Althingi Special Investigation Commission and the private Icelandic consultancy firm Capacent to name a few.
Shortly later it branched out and DataMarket now provides access to international data from Eurostat, United Nations Statistics Division, The World Bank and the Gapminder Foundation.
DataMarket won two awards at the annual 2011 Icelandic Web Awards, awarded by the non-profit Iceland web industry association, one for the most interesting web and one for the best service and information web.
In 2014, DataMarket was acquired by Qlik.
In 2020, DataMarket was retired by Qlik.
References
External links
www.datamarket.is
Information technology companies of Iceland
Internet properties established in 2008
Data visualization
2008 establishments in Iceland
Internet properties disestablished in 2020
2020 disestablishments in Pennsylvania
2014 mergers and acquisitions |
https://en.wikipedia.org/wiki/UGS%20Corp. | UGS was a computer software company headquartered in Plano, Texas, specializing in 3D & 2D Product Lifecycle Management (PLM) software. Its operations were amalgamated into the Siemens Digital Industries Software business unit of Siemens Industry Automation division, when Siemens completed the US$3.5 billion acquisition of UGS on May 7, 2007.
UGS' flagship products were NX, a CAD/CAM/CAE commercial software suite, and Teamcenter, an integrated set of PLM and collaboration (cPD) tools. The company's portfolio also contained NX I-deas, NX Nastran, Solid Edge, Imageware, Tecnomatix, Jack, SDK, Femap, D-Cubed, JT, PLM Vis, PLM XML, and Parasolid.
History
Inception as United Computing: 1963 to 1975
The first commercial product developed by UGS was called UNIAPT. Released in 1969 by a software company then called United Computing, UNIAPT was one of the world's first end-user CAM products. United Computing was founded in 1963 above a hair salon in Torrance, California, and went on to purchase the Automated Drafting and Machining (ADAM) software code from MGS in 1973. The code became a foundation for a product called UNI-GRAPHICS, later sold commercially as Unigraphics in 1975.
As a McDonnell Douglas company: 1976 to 1991
In 1976, United Computing was acquired by the Aerospace company McDonnell Douglas (now part of Boeing), who created new CAD/CAM divisions, naming one the Unigraphics Group. Finally, in 1980, Unigraphics was released, marking the group's first true 3D modeling hardware and software offering.
Already home to McDonnell Douglas, the Unigraphics Group grew in St. Louis, Missouri, which became the new headquarters.
EDS: 1991 to 2004
In 1991, the McDonnell Douglas Systems Integration groups, including Unigraphics, were acquired by EDS (then a part of General Motors Corp., later part of HP Enterprise Services and now DXC Technology). EDS branded the acquired business as EDS Unigraphics. Eventually, in 1997 EDS set up its Unigraphics division as a wholly owned subsidiary called Unigraphics Solutions. EDS took Unigraphics Solutions public while continuing to own majority controlling shares in Unigraphics. During this time, Unigraphics acquired a few companies itself including Engineering Animation, Inc., the former Ames, Iowa-based visualization company.
In 1999 the company acquired Applicon, a long term player in the EDA field.
In 2001, the company was renamed to UGS. EDS repurchased all outstanding stock and acquired SDRC - a former competitor of Unigraphics - and merged both into a single Line of Business (LOB) named EDS PLM Solutions.
UGS Corporation: 2004 to 2007
In 2004 EDS sold off its EDS PLM Solutions business to the private equity group of Bain Capital, Silver Lake Partners, and Warburg Pincus. The company resumed operating under the UGS name following the private equity sale.
In 2005, UGS purchased Tecnomatix Technologies Ltd.
Acquisition by Siemens: 2007
On January 24, 2007, the German electronics giant Siemens AG announce |
https://en.wikipedia.org/wiki/Silicon%20Dreams | Silicon Dreams is a trilogy of interactive fiction games developed by Level 9 Computing during the 1980s. The first game was Snowball, released during 1983, followed a year later by Return to Eden, and then by The Worm in Paradise during 1985. The next year they were vended together as the first, second and last of the Silicon Dreams.
As with most Level 9 games, the trilogy used an interpreted language termed A-code and was usable in all major types of home computer of the time, on either diskette or cassette. Level 9 self-published each game separately, but the compilation was published by Telecomsoft, which sold it in the United States with the tradename Firebird and in Europe with the tradename Rainbird.
The trilogy is set in a not too-distant future when humans have started colonising space. For the first two instalments the player has the role of Kim Kimberley, an undercover agent, whose goal in Snowball is to save the colonist's spacecraft from crashing into a star, and in Return to Eden to stop the defence system at the destination planet of Eden from destroying the craft. In The Worm in Paradise, the player, with the role of an unnamed citizen of Eden, must travel around the city of Enoch, learn its secrets, earn money and save the planet.
Gameplay
The games use a text parser for entering commands at the "What now?" prompt. The parser can interpret more than a thousand words to control movement or actions. It looks at the command, picking out two or three words it knows, ignoring the order, and tries to guess what is meant. For movement, the usual commands for moving 'NORTH', 'SOUTH', 'EAST' and 'WEST' are available (and their abbreviated forms of 'N', 'S', 'E' and 'W') as well as 'UP' and 'DOWN' ('U' and 'D' respectively) and a number of other directions and 'modes' of movement (like 'JUMP'). For actions, it understands how to pick up objects, opening doors, lighting lamps, as well as dropping objects and wielding them. Additionally, there are commands to invoke 'SAVE' and 'RESTORE' of game positions to cassette tape or floppy disk (for some systems also to RAM), ask for 'HELP', turn off pictures and turn them on again with 'WORDS' and 'PICTURES' respectively, an 'OOPS' command to undo previous commands.
Silicon Dreams can be played as three separate games, but to obtain a maximum score the games must be completed in order, carrying the score from one adventure to the next. Points are not scored for collecting treasures, but rather for doing specific tasks helping to satisfy the goal of the individual game. For Snowball the goal is to get to the main control room and prevent the starship Snowball 9 from crashing into a star. For Return to Eden the goal is to get into the city of Enoch and stop the robots from destroying Snowball 9. And for Worm in Paradise the goal is to find as much information about the city as possible, obtain money, and then become a member of the governing party of Eden, saving the planet in the process.
|
https://en.wikipedia.org/wiki/KeePass | KeePass Password Safe is a free and open-source password manager primarily for Windows. It officially supports macOS and Linux operating systems through the use of Mono. Additionally, there are several unofficial ports for Windows Phone, Android, iOS, and BlackBerry devices, which normally work with the same copied or shared (remote) password database. KeePass stores usernames, passwords, and other fields, including free-form notes and file attachments, in an encrypted file. This file can be protected by any combination of a master password, a key file, and the current Windows account details. By default, the KeePass database is stored on a local file system (as opposed to cloud storage).
KeePass comes in two different variants: KeePass 1.x and KeePass 2.x. Although the 1.x variant is the former variant it is supported indefinitely: Dominik Reichl: "2.x isn't the successor of 1.x, and 1.x isn't dead". KeePass 2.x has a different software basis in C# instead of the former C++. Mainly communication features are extended in KeePass 2.x: authentication with the Windows user account, remote and shared database editing as well as many plugins allowing communication and authentication with different web browsers, databases and more.
KeePass 1.x and 2.x support a number of plugins, although 2.x allows more plugins. It has a password generator and synchronization function, supports two-factor authentication, and has a Secure Desktop mode. It can use a two-channel auto-type obfuscation feature to offer additional protection against keyloggers. KeePass can import from over 30 other most commonly used password managers.
A 2017 Consumer Reports article described KeePass as one of the four most widely used password managers (alongside 1Password, Dashlane and LastPass), being "popular among tech enthusiasts" and offering the same level of security as non-free competitors.
A 2019 Independent Security Evaluators study described KeePass as well as other widely used password managers as being unable to control Windows 10's tendency to leave passwords in cleartext in RAM after they are displayed using Windows controlled GUI. In addition, several GitHub projects (KeeFarce, KeeThief, Lazanga) specifically attack a running KeePass to steal all data when the host is compromised. KeePass cannot prevent password theft and, as Dominik Reichl, the administrator of KeePass, states, "neither KeePass nor any other password manager can magically run securely in a spyware-infected, insecure environment."
Overview
Import and export
The password list is saved by default as a .kdbx file, but it can be exported to .txt, HTML, XML and CSV. The XML output can be used in other applications and re-imported into KeePass using a plugin. The CSV output is compatible with many other password safes like the commercial closed-source Password Keeper and the closed-source Password Agent. Also, the CSVs can be imported by spreadsheet applications like Microsoft Excel or OpenOffice/LibreOf |
https://en.wikipedia.org/wiki/Education%20Data%20Exchange%20Network | The Education Data Exchange Network (EDEN) is an automated system designed to support data transfer among state and local education agencies and the United States Department of Education (ED).
EDEN began as a State Data Network pilot test among Oregon, Nebraska and ED in 1998. At the time all reports on federal grant programs were written and stored in paper file cabinets in ED program offices, although many of those reports contained similar, and often inconsistent, information. States, particularly the Council of Chief State School Officers and their data managers, called on ED to automate and streamline the process. Based on the success of the pilot test, the [Office of Management and Budget] (OMB) required ED to institute a Performance-Based Data Management Initiative (PBDMI) in 2000. PBDMI was designed to gather statistics from each state such as school populations within subgroups (race, gender, etc.), graduation rates, school spending, and federal program performance. This initiative resulted in EDEN. It was designed to:
Improve the accuracy, timeliness, and utility of information collected to inform educational management, budget and policy decisions.
Increase the focus on outcomes and accountability.
Reduce the education reporting burden by streamlining the data collection process and eliminating redundancy across ED programs.
Create a partnership between ED and state and local education agencies to improve data quality and management through common data standards and collaborative systems planning.
By 2004, all states participated in EDEN. In 2005 ED began to require that all elementary and secondary level federal reports, including those to the National Center for Education Statistics (NCES) be submitted through EDEN.
The ED Office of the Inspector General and the General Accounting Office published reports critical of the program's management.[1] In March 2005, the Secretary of Education, Margaret Spellings abolished the office administering EDEN and removed all managers from managerial positions.[2]
PBDMI and EDEN data gathering is complicated by the fact that no data sent to federal agencies may contain private data about an individual student that would violate the FERPA guidelines. So a state agency cannot just send a list of students and their test scores. A reporting agency can only send summary subgroup data for subgroup populations above a small number such as five.
EDEN data sets consist of three types:
Statewide data often called State Education Agencies (SEA)
District or regional data Local Education Agencies (LEA)
School-specific data
There are XML representations of EDEN files as well as XML schemas to validate these files available from the ed.gov file specifications site (www2.ed.gov/about/inits/ed/edfacts/eden/non-xml/c163-8-0.doc). EDEN program data is now (2014) aggregated in the EDFACTS system for all program offices, senior management, and federal reporting. EDEN data collection is now operated out of the N |
https://en.wikipedia.org/wiki/FKT | FKT may refer to:
Falkland Islands Time
Fastest known time, to complete a route
FKT algorithm, in graph theory
FK Tønsberg, a Norwegian football club |
https://en.wikipedia.org/wiki/List%20of%20programmes%20broadcast%20by%20CITV | The following is a list of programming, past and present, which have been carried by CITV, the former children's television strand of ITV in the United Kingdom, both in the form of the programming block carried from 3 January 1983 to 2006, and on the separate CITV digital channel from 11 March 2006 to 1 September 2023. More details about both the past programming block and current channel are contained within the CITV article.
Programming featured on current block
Featured on the block on ITV2
Dodo (2023–present) (weekends only)
Scooby-Doo! Mystery Incorporated (2023–present)
Craig of the Creek (2023–present)
Teen Titans Go! (2023–present)
DC Super Hero Girls (2023–present)
Looney Tunes Cartoons (2023–present)
Be Cool, Scooby-Doo! (2023–present)
What's New, Scooby-Doo? (2023–present)
Scooby-Doo and Guess Who? (2023–present)
The Epic Tales of Captain Underpants (2023–present) (weekdays only)
Jurassic World Camp Cretaceous (2023–present) (weekdays only)
Films featured on current block
Aloha, Scooby-Doo! (16 October 2023)
Chill Out, Scooby-Doo! (17 October 2023)
Big Top Scooby-Doo! (18 October 2023)
Lego Scooby-Doo! Blowout Beach Bash (19 October 2023)
Scooby-Doo! Abracadabra Doo (20 October 2023)
Scooby-Doo! Pirates Ahoy! (21 October 2023)
Scooby-Doo! in Where's My Mummy? (22 October 2023)
Scooby-Doo! WrestleMania Mystery (23 October 2023)
Scooby-Doo! and WWE: Curse of the Speed Demon (24 October 2023)
Scooby-Doo! Frankencreepy (25 October 2023)
Scooby-Doo! Stage Fright (26 October 2023)
Scooby-Doo! Mask of the Blue Falcon (27 October 2023)
Final channel programming
All current programming has migrated over to ITVX Kids on ITVX streaming service.
Since 2 September 2023, CITV programming block features shows from ITVX Kids.
Original
Animated
Mr. Bean: The Animated Series
The Rubbish World of Dave Spud
Thunderbirds Are Go
Lloyd of the Flies
Live-action
Spy School
Dare Master
HOW
Don't Unleash the Beast
Project Z
Makeaway Takeaway
Mini Movies
Ted's Top 10
Acquired
Animated
50/50 Heroes
Be Cool, Scooby-Doo
Buck and Buddy
Craig of the Creek
Dorg Van Dango
DC Super Hero Girls
Dodo
Looney Tunes Cartoons
Mighty Mike
Mr. Magoo
Nexo Knights
Inspector Gadget (2015)
The Epic Tales of Captain Underpants
Jurassic World: Camp Cretaceous
Scooby-Doo! Mystery Incorporated
Scooby-Doo and Guess Who?
Shaggy & Scooby-Doo Get a Clue!
Smarty Pants
Tata & Kuma
Teen Titans Go!
Live-action
Detention Adventure
Overlord and the Underwoods
Signed Stories
Signed Stories was created by ITV SignPost – ITV’s centre of excellence for multi-platform British Sign Language services – as a resource for deaf children and their families, and for teachers of deaf children. The £1.5million initiative was delivered with some of the world’s leading publishers, as part of the company’s corporate and social responsibility plan to give deaf children access to the best children’s books in their native sign l |
https://en.wikipedia.org/wiki/Green%20Sky%20Adventures%20Micro%20Mong | The Green Sky Adventures Micro Mong is an ultralight biplane based on the Mong MS1 Sport.
Development
Ed Fisher, an avid compiler of Mong Sport history, in 1981 met with designer Ralph Mong. After the completion of the Fisher Skylite, Fisher suggested building an ultralight version of the Mong Sport. A custom built ultralight prototype was built for Fisher, called the Travelight. A second model was constructed, built for pilots up to 6' 2" (188 cm), which became known as the Micro Mong.
Design
The fuselage is welded 4130 steel tubing. The front wing spars are aluminum tubing, with aluminum ribs and aircraft fabric covering. If equipped with a Rotax 277 engine, the aircraft meets American FAR 103 Ultralight Vehicle standards, by weighing less than . The wing area of the ultralight version is larger than the heavier Mong Sport it replicates, in order to keep the stall speed low.
Operational history
A Micro Mong floatplane recorded the fastest seaplane takeoff of 2.5 seconds at the Experimental Aircraft Association airshow in 2008.
Variants
Micro Mong 2XF Powered by a HKS 700E 2 cylinder 4-stroke air-cooled engine.
Raceair Lil Bitts Developed at the same time by Fisher using a deeper Micro Mong fuselage to resemble a Pitts Special.
Specifications (Micro Mong)
See also
References
Homebuilt aircraft
Biplanes
Green Sky Adventures aircraft |
https://en.wikipedia.org/wiki/Digital%20multimedia%20broadcasting | Digital multimedia broadcasting (DMB) is a digital radio transmission technology developed in South Korea as part of the national IT project for sending multimedia such as TV, radio and datacasting to mobile devices such as mobile phones, laptops and GPS navigation systems. This technology, sometimes known as mobile TV, should not be confused with Digital Audio Broadcasting (DAB) which was developed as a research project for the European Union.
DMB was developed in South Korea as the next generation digital technology to replace FM radio, but the technological foundations were laid by Prof. Dr. Gert Siegle and Dr. Hamed Amor at Bosch in Germany. The world's first official mobile TV service started in South Korea in May 2005, although trials were available much earlier. It can operate via satellite (S-DMB) or terrestrial (T-DMB) transmission. DMB has also some similarities with its former competing mobile TV standard, DVB-H.
S-DMB
T-DMB
T-DMB is made for terrestrial transmissions on band III (VHF) and L (UHF) frequencies. DMB is unavailable in the United States because those frequencies are allocated for television broadcasting (VHF channels 7 to 13) and military applications. USA is adopting ATSC-M/H for free broadcasts to mobiles, and for a time, Qualcomm's proprietary MediaFLO system. In Japan, 1seg is the standard, using ISDB.
T-DMB uses MPEG-4 Part 10 (H.264) for the video and MPEG-4 Part 3 BSAC or HE-AAC v2 for the audio. The audio and video is encapsulated in an MPEG transport stream (MPEG-TS). The stream is forward error corrected by Reed Solomon encoding and the parity word is 16 bytes long. There is convolutional interleaving made on this stream, then the stream is broadcast in data stream mode on DAB. In order to diminish the channel effects such as fading and shadowing, the DMB modem uses OFDM-DQPSK modulation. A single-chip T-DMB receiver is also provided by an MPEG transport stream demultiplexer. DMB has several applicable devices such as mobile phone, portable TV, PDA and telematics devices for automobiles.
T-DMB is an [ETSI] standard (TS 102 427 and TS 102 428). As of December 14, 2007, ITU formally approved T-DMB as the global standard, along with three other standards, like DVB-H, 1seg, and MediaFLO.
Smart DMB
Smart DMB started in January 2013 in South Korea. Smart DMB has a VOD service and quality has been improved from 240p to 480p. Smart DMB is built in many Korean smartphones starting with the Galaxy Grand in January 2013.
HD DMB
HD DMB started in August 2016 in South Korea. HD DMB has been improved from 240p to 720p. It uses HEVC.5 codec. There are currently 6 HD DMB stations in Seoul. Smartphones integrated Qualcomm Snapdragon 801 or higher received firmware upgrade to support HD DMB.
Countries using DMB
Currently, DMB is being put into use in a number of countries, although mainly used in South Korea. Also see list of Countries using DAB/DMB.
South Korea
In 2005, South Korea became the world's first cou |
https://en.wikipedia.org/wiki/BUG%20%28magazine%29 | BUG is a Croatian monthly computer and information technology magazine, established in 1992 by a Croatian programmer and journalist Robert Gabelić. Published by the BUG publishing company, it is currently one of the most popular computer magazines in the country. It focuses primarily on PC hardware and software technology. The magazine also includes sections for video games, news, columnist writing (John C. Dvorak was a regular contributor), a helpdesk, and self-assembly.
Other magazines published by the same company are Mreža for professionals and Enter for beginners.
Specifications
The magazine is named after the computing term bug. It has approximately 170 pages of content (with a DVD+R DL disc); it is sold in the SE European region of Croatia, Bosnia and Herzegovina, Montenegro, North Macedonia, and Slovenia. The current editor-in-chief is Miroslav Rosandić.
Software-related content usually centers around material for Windows users with occasional attention given to Macintosh and Linux. The magazine also takes part in hardware test rating (e.g., cameras, laptops, computer parts, and storage devices), internet phenomena articles, and some other material. Each year, the magazine publishes a list of the 25 top websites in Croatia.
Issue 200
The pages experienced a redesign in 2009, with the publication of the 200th issue of the magazine. The redesign was done after the associated website was revamped. In November 2010, the website launched a mobile version.
References
External links
Enter Subsidiary website
Games Master site
1992 establishments in Croatia
Computer magazines published in Croatia
Croatian-language magazines
Magazines established in 1992
Mass media in Zagreb
Monthly magazines |
https://en.wikipedia.org/wiki/Linux%20Intrusion%20Detection%20System | In computer security, the Linux Intrusion Detection System (LIDS) was a patch to the Linux kernel and associated administrative tools that enhanced the kernel's security by implementing mandatory access control (MAC). When LIDS was in effect all system network administration operations, chosen file access, any capability use, raw device, memory, and I/O access could be made impossible, even for root. One could define which programs can access specific files. It used and extended the system capabilities bounding set to control the whole system and added some network and filesystem security features to the kernel to enhance the security. One could finely tune the security protections online, hide sensitive processes, receive security alerts through the network, and more. LIDS supported Linux kernel 2.6, 2.4. LIDS was released under the terms of the GNU General Public License (GPL).
Current Status
As of 2013, the Project appears to be dead. The last updates on the homepage and in the associated forum were from 2010, and as of 2018 the website is no longer running.
Awards
Top 75 security tools in 2003
Top 50 Security tools in 2000
Best of Linux for October 9, 2000
See also
AppArmor
Security-Enhanced Linux (SELinux)
References
External links
LIDS homepage (archive)
Linux security software |
https://en.wikipedia.org/wiki/Numeric%20keypad | A numeric keypad, number pad, numpad, or ten key,
is the palm-sized, usually-17-key section of a standard computer keyboard, usually on the far right. It provides calculator-style efficiency for entering numbers. The idea of a 10-key number pad cluster was originally introduced by Tadao Kashio, the developer of Casio electronic calculators.
The numpad's keys are digits to , (addition), (subtraction), (multiplication) and (division) symbols, (decimal point), , and keys. Laptop keyboards often do not have a numpad, but may provide numpad input by holding a modifier key (typically labelled ) and operating keys on the standard keyboard. Particularly large laptops (typically those with a 15.6 inch screen or larger) may have space for a real numpad, and many companies sell separate numpads which connect to the host laptop by a USB connection (many of these also add an additional spacebar off to the side of the zero where the thumb is located, as well as an additional key typical of modern adding machines and cash registers. Some specialist numpads may also include an additional key).
Sometimes it is necessary to distinguish between a key on the numpad and an equivalent key elsewhere on the keyboard. For example, depending on the software in use, pressing the numpad's key may produce different results than pressing the alphanumeric key. In such cases, the numpad-specific key may be indicated as e.g. ,
, , or likewise to remove ambiguity.
Numeric keypads usually operate in two modes. When Num Lock is off, keys , , , and act like arrow/navigation keys up, right, down, and left; and , , , and act like , , , and , respectively. When is on, digit keys produce the corresponding digit. On Apple Macintosh computers, which lack a key, the numeric keypad always produces only numbers; the key is replaced by the .
The arrangement of digits on numeric keypads with the -- keys two rows above the -- keys is derived from calculators and cash registers. It is notably different from the layout of telephone Touch-Tone keypads which have the -- keys on top and -- keys on the third row.
Numeric keypads are useful for entering long sequences of numbers quickly, for example in spreadsheets, financial/accounting programs, and calculators. Input in this style is similar to a calculator or adding machine.
A numpad is also useful on Windows PCs for typing alt codes for special symbols, for example the degree symbol, °, with . Technically, the previous example's method using a leading (ANSI alt code) only works when used with the numpad's own keys, so it could be written less ambiguously (if necessary) using one of the notations mentioned above, e.g. . When entering a hex Unicode value, only the leading '+' needs to be the key, so this notation can be used sparingly, e.g. yields ě.
To maintain their compact size, Mac laptops and most PC notebooks do not include a Numeric Keypad. To compensate it, most PCs include integrated into a function key (typic |
https://en.wikipedia.org/wiki/Michele%20Mosca | Michele Mosca is co-founder and deputy director of the Institute for Quantum Computing at the University of Waterloo, researcher and founding member of the Perimeter Institute for Theoretical Physics, and professor of mathematics in the department of Combinatorics & Optimization at the University of Waterloo. He has held a Tier 2 Canada Research Chair in Quantum Computation since January 2002, and has been a scholar for the Canadian Institute for Advanced Research since September 2003. Mosca's principal research interests concern the design of quantum algorithms, but he is also known for his early work on NMR quantum computation together with Jonathan A. Jones.
Graduate and post-graduate education
Mosca received a B.Math degree from the University of Waterloo in 1995. In 1996 he received a Commonwealth Scholarship to attend Wolfson College, Oxford University, where he received his M.Sc. degree in mathematics and foundations of computer science. On another scholarship (and while holding a fellowship), Mosca received his D.Phil degree on the topic of quantum computer algorithms, also at the University of Oxford.
Awards and honors
2010 Canada's Top 40 under 40 from The Globe and Mail.
Fellow of the Canadian Institute for Advanced Research program in Quantum Information since 2010. Scholar since 2003.
2010 Waterloo Region 40 under 40: "Honouring those making a difference in our region".
Invited Speaker, AAAS Science and Technology Workshop "Plug into Canada", organized by the Canadian Embassy, January 2005 (with National Science Advisor, the NSERC President, and 2 other Canadian researchers).
One of fifteen PAGSE Symposium "Leaders of Tomorrow", Ottawa, Canada, 2004. The Partnership Group for Science and Engineering was formed in June 1995 at the invitation of the Academy of Science of the Royal Society of Canada to represent the Canadian science and engineering community to the Government of Canada.
Invited article in inno'va-tion and inno'v@-tion2: Essays by Leading Canadian Researchers, a Canada Foundation for Innovation project "Showcasing some of the country's most cutting-edge researchers".
Visiting Fellow at King's College, University of Cambridge, October 2005.
Canada Research Chair, 2002–present.
Premier's Research Excellence Award, Ontario, 2000-2005.
Fellow of the Institute for Combinatorics and its Applications, 2000–present.
Robin Gandy Junior Research Fellowship, Wolfson College, Oxford, 1998-1999.
Communications and Electronic-Security Group Scholar, 1996-1999.
Awarded Distinction for M.Sc., Oxford, 1996.
UK Commonwealth Scholar, 1995-1996.
Valedictorian and Alumni Gold Medal winner, Faculty of Mathematics, University of Waterloo, 1995.
Bronze Medal (3rd in Canada), Descartes Mathematics Competition, 1990.
Select publications
An Introduction to Quantum Computing. (2007). Phillip Kaye, Raymond Laflamme, and Michele Mosca. New York City: Oxford University Press.
Algorithmica: Special Issue on Quantum Computati |
https://en.wikipedia.org/wiki/MVDDS | MVDDS (Multichannel Video and Data Distribution Service) is a type of television and Internet delivery technology licensed for use in the United States by the Federal Communications Commission (FCC). This was subsequently tested by The MITRE Corporation for the FCC. A report was filed in the 98-206 Docket before the FCC.
This terrestrial based wireless transmission method reuses Direct Broadcast Satellite (DBS) frequencies for distribution of multichannel video and data over large distances.
The spectrum is in the 12.2–12.7 GHz range, offering fast downloads but requiring other frequencies for uploads. It is seen as a potential competitor to cable for delivery of triple play or triple-threat services (voice, data, video).
History
The MVDDS service was created as a result of a "Spectrum Grab" by the now defunct Northpoint Technology LLC. While Northpoint was fighting with the DBS companies, MDS America Inc provided the FCC with engineering information to assist the FCC in formulating the first US MVDDS rules. MDS America was granted permission to conduct experimental testing of their service in Clewiston Florida. This testing was completed by LCC International under the direction of Dr. Bahman Badipour (now President and CEO of Analytical Consulting Services Inc.) in July 2001 and submitted to the FCC in October of that year.
FCC MVDDS auctions
MVDDS spectrum was auctioned by the FCC in two separate auctions. The first was FCC auction 53 (1/14/2004 - 1/27/2004) and this auction with 14 qualified bidders lasted 49 rounds over 9 bidding days. 10 bidders won 192 licenses with Gross Bids of $136,936,200 Each allocated license is exclusive in one geographic area.
The second was FCC auction 63 (12/7/2005 - 12/7/2005) and this auction with 3 qualified bidders lasted 3 rounds over 1 bidding day. 32 bidders won the remaining 22 licenses with Gross Bids of $204,000
MVDDS spectrum (214 licenses) is held by 11 companies, but the largest chunks are owned by three, South.com (an affiliate of Dish Network) with 37 areas, DTV Norwich (an affiliate of Cablevision) with 46 areas, and MDS Operations (an affiliate of MDS America) with 80 areas.
In 2012 Dish Network acquired Cablevision's areas making Dish Network the largest owner of MVDDS spectrum in the US.
US Based MVDDS systems
The system listed below operates using MVDDS to cover an entire Metro area.
Cibola Wireless Albuquerque, New Mexico
This system was built by MDS America, a US-based MVDDS company.
International MVDDS-like systems
Although MVDDS is a US only service, the systems listed below operate on similar frequencies to MVDDS but with differing power levels.
There are presently other countries using MVDDS for television signal delivery, these also being built by MDS America, for example:
United Arab Emirates
Ireland
See also
MMDS
MVDS
Digital television in Europe
Ku-band
Notes
Network access |
https://en.wikipedia.org/wiki/Benjamin%20Heckendorn | Benjamin J. Heckendorn (born October 19, 1975) is an American console modder and Computer engineer. He is better known as Ben Heck on the Internet. Heckendorn is also an independent filmmaker and he was the star of element14's The Ben Heck Show, a popular online series, until leaving the show in late 2018.
He has two podcasts, one which he runs with the help of a friend, Jason Jones, and the other on Warpath.TV with George Force, Mike Zucker, and Anthony Carboni.
Most of Heckendorn's mods are done by taking apart old video game consoles such as the Atari 2600 and Nintendo Entertainment System. He then reconfigures internal printed circuit board (PCB) into a smaller form factor. The newly configured circuit board is enclosed within a custom case (done by a CNC machine) and any peripherals are assembled by Heckendorn.
His creations have been featured in such publications as Wired, Popular Science, and Maxim, and on television shows such as The Screen Savers, Attack of the Show!, and X-Play. His mods are also commonly presented on popular blogs such as Engadget.
History
He had an interest in electronic and video games as a child, as a young man in film-making and in later life while working as a graphic artist he made a GeoCities site covering his project to make a portable Atari 2600, this led to an appearance in 2004 on The Screen Savers (following the temporary injury of the normal maker Yoshi) and then to a book deal and requests for custom electronics creations to YouTube videos in 2010. In 2015 he restored the only known surviving Sony/Nintendo Play Station prototype console, the Super NES CD-ROM.
Systems
Atari
Heckendorn has created a line of portable Atari systems, almost always using some form of Atari 2600 board cut up into a smaller PCB. The only exception is the Atari Jaguar "64-Bit" Portable and the Atari 800 laptop. He has also turned two Atari 800 computers into laptops.
Xbox 360
An Xbox 360 was modded so as to have a form factor similar to that of a portable laptop computer. Ben had been very used to modest popularity on the internet until the Xbox 360 laptop was revealed, bringing him to further prominence.
A one-handed Xbox 360 controller was built for a serviceman injured in Iraq.
He has revised the Xbox Laptop five times, his fifth revision being a modified Xbox Slim.
He made an Xbox 360 controller out of a Standard Xbox Controller.
He has made another one-handed Access Controller with modular ministicks and buttons. Originally designed for PC, PS2 and PS3, it will now work with Xbox 360 through an adapter.
Xbox One
Heckendorn has modified an Xbox One console into a portable.
Nintendo
Heckendorn has created five (3 NESp's) Nintendo portables:
PC
The MGDp: a fully functional PC built into an antique MGD beer case(18 pack).
Sega
Heckendorn has made a Sega Genesis portable called the Sega Exodus. It started life as a Radica Genesis collection DTV unit. When a cartridge slot was added, it gained the ability to play |
https://en.wikipedia.org/wiki/All-Star%20K%21 | All-Star K!, formerly K! The 1 Million Peso Videoke Challenge, is a Philippine television karaoke game show broadcast by GMA Network. Originally hosted by Arnell Ignacio, it premiered on January 13, 2002. The show concluded on October 18, 2009 with a total of 512 episodes. Jaya and Allan K. served as the final hosts.
Hosts
Arnell Ignacio
Jaya
Allan K.
Ratings
According to AGB Nielsen Philippines' Mega Manila household television ratings, the final episode of All Star K! scored a 15.16% rating.
Accolades
References
External links
2002 Philippine television series debuts
2009 Philippine television series endings
Filipino-language television shows
GMA Network original programming
Karaoke television series
Musical game shows
Philippine game shows |
https://en.wikipedia.org/wiki/Bruce%20Bastian | Bruce Wayne Bastian (born March 23, 1948) is an American computer programmer and businessperson. He co-founded the WordPerfect Software Company (originally known as Satellite Software International) with Alan Ashton in 1978.
Early life and education
Bastian was born on March 23, 1948, in Twin Falls, Idaho. He attended college at Brigham Young University (BYU) in Provo, Utah, where he initially majored in music. While serving as the director of the BYU Cougar Marching Band, Bastian developed a software program to help choreograph marching band performances with the help of instructor Alan Ashton. After leaving his position with the marching band, Bastian earned a master's degree in computer science.
Career
Bastian briefly worked for Ashton and another partner, developing word processing software. Bastian later worked for the Eyring Research Institute (ERI), where he briefly worked on a language translation program. Soon after Bastian became employed at ERI, the company signed a contract with Orem City, Utah, to create a word processor for the city's new DEC PDP-11/34 mini computer. Since Bastian was the only employee at ERI who had a development experience with word processing, the company contracted with Bastian and Ashton to develop the software, which later became WordPerfect.
In 2010, President Barack Obama appointed Bastian to the Presidential Advisory Committee of the Arts in honor of Bastian's long-term commitment to the arts.
References
External links
B.W. Bastian Foundation
Philanthropist and WordPerfect Co-Founder Bruce Bastian, Interview on Mormon Stories
1948 births
Living people
20th-century Mormon missionaries
American computer scientists
American Mormon missionaries in Italy
Brigham Young University alumni
Engineers from Idaho
Former Latter Day Saints
American LGBT businesspeople
LGBT Latter Day Saints
LGBT people from Idaho
People from Twin Falls, Idaho |
https://en.wikipedia.org/wiki/HEALPix | HEALPix (sometimes written as Healpix), an acronym for Hierarchical Equal Area isoLatitude Pixelisation of a 2-sphere, is an algorithm for pixelisation of the 2-sphere based on subdivision of a distorted rhombic dodecahedron, and the associated class of map projections. The pixelisation algorithm was devised in 1997 by Krzysztof M. Górski at the Theoretical Astrophysics Center in Copenhagen, Denmark, and first published as a preprint in 1998.
Projection and pixelisation
The HEALPix projection is a general class of spherical projections, sharing several key properties, which map the 2-sphere to the Euclidean plane. Any of these can be followed by partitioning (pixelising) the resulting region of the 2-plane. In particular, when one of these projections (the H=4, K=3 HEALPix projection) is followed by a pixelisation of the 2-plane, the result is generally known as the HEALPix pixelisation, which is widely used in physical cosmology for maps of the cosmic microwave background. This pixelisation can be thought of as mapping the sphere to twelve square facets (diamonds) on the plane followed by the binary division of these facets into pixels, though it can be derived without using the projection. The associated software package HEALPix implements the algorithm. The HEALPix projection (as a general class of spherical projections) is represented by the keyword HPX in the FITS standard for writing astronomical data files. It was approved as part of the official FITS World Coordinate System (WCS) by the International Astronomical Union FITS Working Group on April 26, 2006.
The spherical projection combines a cylindrical equal area projection, the Lambert cylindrical equal-area projection, for the equatorial regions of the sphere and a pseudocylindrical equal area projection, an interrupted Collignon projection, for the polar regions.
At a given level in the hierarchy the pixels are of equal area (which is done by bisecting the square in the case of the H=4, K=3 projection) and their centers lie on a discrete number of circles of latitude, with equal spacing on each circle. The scheme has a number of mathematical properties which make it efficient for certain computations, e.g. spherical harmonic transforms. In the case of the H=4, K=3 projection, the pixels are squares in the plane (which can be inversely projected back to quadrilaterals with non-geodesic sides on the 2-sphere) and every vertex joins four pixels, with the exception of eight vertices which each join only three pixels.
The latitude of transition between equatorial-orthogonal and polar-convergent longitude lines has been selected to allow the folding of the projection into a perfect cube — "cubing the sphere"; indeed in this way the Arctic Circle becomes a square.
Usage and alternatives
The pixelisation related to the H=4, K=3 projection has become widely used in cosmology for storing and manipulating maps of the cosmic microwave background.
Gaia mission uses HEALPix as the basis for |
https://en.wikipedia.org/wiki/Voice%20stress%20analysis | Voice stress analysis (VSA) and computer voice stress analysis (CVSA) are collectively a pseudoscientific technology that aims to infer deception from stress measured in the voice. The CVSA records the human voice using a microphone, and the technology is based on the tenet that the non-verbal, low-frequency content of the voice conveys information about the physiological and psychological state of the speaker. Typically utilized in investigative settings, the technology aims to differentiate between stressed and non-stressed outputs in response to stimuli (e.g., questions posed), with high stress seen as an indication of deception.
Scientific findings
The use of voice stress analysis (VSA) for the detection of deception is controversial. Discussions about the application of VSA have focused on whether this technology can indeed reliably detect stress, and, if so, whether deception can be inferred from this stress. Critics have argued that—even if stress could reliably be measured from the voice—this would be highly similar to measuring stress with the polygraph, for example, and that all critiques centered on polygraph testing apply to VSA as well. A 2002 review of the state of the art conducted for the United States Department of Justice found several technical challenges to the technology, including the same problem of determining deception. When reviewing the literature on the effectiveness of VSA in 2003, the National Research Council concluded, "Overall, this research and the few controlled tests conducted over the past decade offer little or no scientific basis for the use of the computer voice stress analyzer or similar voice measurement instruments". A 2013 paper published in Proceedings of Meetings on Acoustics reviewed the "scientific implausibility" of its principles and "ungrounded claims of the aggressive propaganda from sellers of voice stress analysis gadgets".
Notable cases
Confession made following a voice stress examination was allowed to be used as evidence in a Wisconsin case in 2014.
In the case of the 1998 murder of 12-year-old Stephanie Crowe, confessions were made while three suspects were undergoing VSA, which were later found to be false by a judge. In 2005 the manufacturer of the VSA equipment later settled a lawsuit that alleged that it was liable for the harm the three suspects suffered.
In a similar 2000 case in Washington state, Donovan Allen falsely confessed to killing his mother after failing a VSA test. He was acquitted 15 years later based on exonerating DNA evidence.
George Zimmerman was given a VSA after he fatally shot Florida teenager Trayvon Martin in Sanford, Florida in 2012.
See also
Emotional prosody
Statement analysis
References
Voice technology
Lie detection
Pseudoscience |
https://en.wikipedia.org/wiki/Gilbert%E2%80%93Johnson%E2%80%93Keerthi%20distance%20algorithm | The Gilbert–Johnson–Keerthi distance algorithm is a method of determining the minimum distance between two convex sets, first published by Elmer G. Gilbert, Daniel W. Johnson, and S. Sathiya Keerthi in 1988. Unlike many other distance algorithms, it does not require that the geometry data be stored in any specific format, but instead relies solely on a support function to iteratively generate closer simplices to the correct answer using the configuration space obstacle (CSO) of two convex shapes, more commonly known as the Minkowski difference.
"Enhanced GJK" algorithms use edge information to speed up the algorithm by following edges when looking for the next simplex. This improves performance substantially for polytopes with large numbers of vertices.
GJK makes use of Johnson's distance sub algorithm, which computes in the general case the point of a tetrahedron closest to the origin, but is known to suffer from numerical robustness problems. In 2017 Montanari, Petrinic, and Barbieri proposed a new sub algorithm based on signed volumes which avoid the multiplication of potentially small quantities and achieved a speedup of 15% to 30%.
GJK algorithms are often used incrementally in simulation systems and video games. In this mode, the final simplex from a previous solution is used as the initial guess in the next iteration, or "frame". If the positions in the new frame are close to those in the old frame, the algorithm will converge in one or two iterations. This yields collision detection systems which operate in near-constant time.
The algorithm's stability, speed, and small storage footprint make it popular for realtime collision detection, especially in physics engines for video games.
Overview
GJK relies on two functions:
, which returns the point on which has the highest dot product with .
, which takes a simplex and returns the simplex on closest to the origin, and a direction toward the origin normal to the new simplex. If itself contains the origin, accepts and the two shapes are determined to intersect.
The simplices handled by may each be any simplex sub-space of . For example in 3D, they may be a point, a line segment, a triangle, or a tetrahedron; each defined by 1, 2, 3, or 4 points respectively.
Pseudocode
function GJK_intersection(shape p, shape q, vector initial_axis):
vector A = Support(p, initial_axis) − Support(q, −initial_axis)
simplex s = {A}
vector D = −A
loop:
A = Support(p, D) − Support(q, −D)
if dot(A, D) < 0:
reject
s = s ∪ {A}
s, D, contains_origin := NearestSimplex(s)
if contains_origin:
accept
Illustration
See also
Minkowski Portal Refinement
Hyperplane separation theorem
External links
"A fast procedure for computing the distance between complex objects in three-dimensional space", Gilbert, Johnson and Keerthi - the initial publication
"Computing the Distance between Objects", Oxford professor |
https://en.wikipedia.org/wiki/TV2%20%28Malaysian%20TV%20network%29 | RTM TV2 (stylised as tv2) is a Malaysian free-to-air television channel owned and operated by the Radio Televisyen Malaysia, a broadcasting department of the Malaysian Government. Launched on 17 November 1969, TV2 is the second and second oldest TV station in Malaysia. The channel features mostly English, Mandarin and Tamil news and talk shows, the latter two languages were mainly produced for the dominant minority Chinese and Indian communities, whilst the English news functions for the nation's multiracial population whose dominant lingua franca or first language is the latter. It also offers some in-house, local and international entertainment programs, including reality shows, films and dramas as well as sports programming.
History
The idea of a second television channel in Malaysia emerged as early as 1964. The previous year, Singapore gained two television channels (on channels 5 and 8). The plan for the second channel out of Kuala Lumpur was outlined as part of the arrival of equipment from the United Kingdom, which was set to arrive in April-May 1964. The second channel was scheduled to begin its services in June 1964.
The then-Information Minister, Senu bin Abdul Rahman announced that Television Malaysia was going to start a second channel with the initial target date for its launch estimated to be on 8 February 1969. The plan was to coincide with the move of the television facilities to Bukit Puteri (Angkasapuri). The new channel would air programmes sponsored by commercial organisations.
An attempt at starting an experimental broadcast was held in December 1968. The aim was not to disrupt the programming of the existing channel, which was temporarily blocked to air a Quran reading competition. The trial run of the "second channel" ran from December 9 to 14, and was limited to a six-day relay of the programming usually seen on the existing service.
The channel broadcast on the following frequencies:
8 (Kuala Lumpur, Penang)
9 (Ipoh, Malacca)
10 (Johor Bahru)
2 (Taiping)
6 (Kluang)
The initial launch date scheduled for 8 February 1969 was ultimately scrapped, being delayed to the end of the year - initially, April was the new planned target.
Recruitment for the new channel started in July in order to accelerate the process for its launch. The launch date was announced in September: 17 November, commencing its broadcasts from Angkasapuri. The existing channel would be renamed Siaran Nasional while TV2 would be "somewhat commercialised", according to TV Malaysia director Ow Keng Law.
TV2, then Rangkaian Kedua (Second Network) began operations on 17 November 1969, when Televisyen Malaysia (currently known as TV1) bifurcated into two channels and merge with Radio Malaysia to become the present-day broadcasting department. Then, TV1 was known as Rangkaian Pertama (First Network). The channel opened at 9pm, starting with a speech by Tunku Abdul Rahman followed at 9:15pm by a special programme introducing viewers to the new television |
https://en.wikipedia.org/wiki/WSNS-TV | WSNS-TV (channel 44) is a television station in Chicago, Illinois, United States, serving as the local outlet for the Spanish-language network Telemundo. It is owned and operated by NBCUniversal's Telemundo Station Group alongside NBC outlet WMAQ-TV (channel 5); it is also sister to regional sports network NBC Sports Chicago. WSNS-TV and WMAQ-TV share studios at the NBC Tower on North Columbus Drive in the city's Streeterville neighborhood; both stations are broadcast from the same transmitter atop the Willis Tower in the Chicago Loop.
WSNS-TV began broadcasting in 1970. Originally specializing in the automated display of news headlines, it evolved into Chicago's third full-fledged independent station, carrying movies, local sports, and other specialty programming. This continued until 1980, when WSNS became the Chicago-area station for ON TV, an over-the-air subscription television (STV) service owned by Oak Industries, which took a minority ownership stake in the station. While ON TV was successful in Chicago and the subscription system became the second-largest in the country by total subscribers, the rise of cable television precipitated the end of the business in 1985, with WSNS-TV as the last ON TV station standing.
On July 1, 1985, the station became Chicago's first full-time Spanish-language outlet, affiliated with the Spanish International Network (Univision after 1987) and airing local news and other programming. Indiscretions from the station's STV era led to a license challenge in which the Federal Communications Commission (FCC) ruled at one point that a challenger should be awarded the channel over Video 44, the station's ownership consortium. A groundswell of support helped the station to survive and led to an $18 million settlement that kept it in business. WSNS-TV switched to Telemundo in 1989 and was the network's largest affiliate until being purchased outright in 1996. As part of NBC's purchase of Telemundo in 2002, WSNS and WMAQ became a combined operation.
The independent years (1970–1980)
Construction and instant news
On September 27, 1962, Essaness Theatres, a chain of Chicago motion picture houses, filed under the name Essaness Television Associates for a construction permit to build a new UHF television station on channel 44 in Chicago. The station would transmit from the Woods Theatre in the Loop and air programming aimed at minority groups, particularly Chicago's Black community. The Federal Communications Commission (FCC) approved the application on May 15, 1963, the second such request it had granted that month in the Chicago area after approving channel 32.
It would be the better part of a decade before channel 44 was in service. In 1965, Essaness proposed constructing instead at the Civic Opera Building on Wacker Drive. That year, it also signed for antenna space on the John Hancock Center, being the only unbuilt television station confirmed for the new skyscraper's antenna masts. In 1967, the Harriscope Broa |
https://en.wikipedia.org/wiki/Enercities | Enercities is an educational computer-game created by the Dutch game developer Paladin Studios. The project has a €1.4M budget, and is funded by the European Commission. The game runs on Facebook and on the game website.
Game description
In this game, the player is faced with the challenge of developing an eco-friendly city. Players place buildings on a grid to grow their city. They need to balance energy sources, cash flow, and the city's Economy, Wellbeing and Environment.
References
2011 video games
Browser games
Facebook games
City-building games
Environmental education video games
Video games developed in the Netherlands |
https://en.wikipedia.org/wiki/C-RAN | C-RAN (Cloud-RAN), also referred to as Centralized-RAN, is an architecture for cellular networks. C-RAN is a centralized, cloud computing-based architecture for radio access networks that supports 2G, 3G, 4G and future wireless communication standards. Its name comes from the four 'C's in the main characteristics of C-RAN system, "Clean, Centralized processing, Collaborative radio, and a real-time Cloud Radio Access Network".
Background
Traditional cellular, or Radio Access Networks (RAN), consist of many stand-alone base stations (BTS). Each BTS covers a small area, whereas a group BTS provides coverage over a continuous area. Each BTS processes and transmits its own signal to and from the mobile terminal, and forwards the data payload to and from the mobile terminal and out to the core network via the backhaul. Each BTS has its own cooling, back haul transportation, backup battery, monitoring system, and so on. Because of limited spectral resources, network operators 'reuse' the frequency among different base stations, which can cause interference between neighboring cells.
There are several limitations in the traditional cellular architecture. First, each BTS is costly to build and operate. Moore's law helps reduce the size and power of an electrical system, but the supporting facilities of the BTS are not improved quite as well. Second, when more BTS are added to a system to improve its capacity, interference among BTS is more severe as BTS are closer to each other and more of them are using the same frequency. Third, because users are mobile, the traffic of each BTS fluctuates (called 'tide effect'), and as a result, the average utilization rate of individual BTS is pretty low. However, these processing resources cannot be shared with other BTS. Therefore, all BTS are designed to handle the maximum traffic, not average traffic, resulting in a waste of processing resources and power at idle times.
Evolution of base station architecture
All-in-one macro base station
In the 1G and 2G cellular networks, base stations had an all-in-one architecture. Analog, digital, and power functions were housed in a single cabinet as large as a refrigerator. Usually the base station cabinet was placed in a dedicated room along with all necessary supporting facilitates such as power, backup battery, air conditioning, environment surveillance, and backhaul transmission equipment. The RF signal is generated by the base station RF unit and propagates through pairs of RF cables up to the antennas on the top of a base station tower or other mounting points. This all-in-one architecture was mostly found in macro cell deployments.
Distributed base station
For 3G, a distributed base station architecture was introduced by Ericsson, Nokia, Huawei, and other leading telecom equipment vendors. In this architecture the radio function unit, also known as the remote radio head (RRH), is separated from the digital function unit, or baseband unit (BBU) by fiber. Digital |
https://en.wikipedia.org/wiki/FightAIDS%40Home | FightAIDS@Home ("Fight AIDS at home") is a volunteer computing project operated by the Olson Laboratory at The Scripps Research Institute. It runs on internet-connected home computers, and since July 2013 also runs on Android smartphones and tablets. It aims to use biomedical software simulation techniques to search for ways to cure or prevent the spread of HIV/AIDS.
Methods
Olson's target is HIV protease, a key molecular machine of the virus that when blocked stops it from maturing. These blockers, known as "protease inhibitors", are thus a way of avoiding the onset of AIDS and prolonging life. The Olson Laboratory is using computational methods to identify new candidate drugs that have the right shape and chemical characteristics to block HIV protease. This general approach is called structure-based drug design, and according to the National Institutes of Health's National Institute of General Medical Sciences, it has already had a dramatic effect on the lives of people living with AIDS.
FightAIDS@Home makes use of the AutoDock VINA software, which tests how well a particular molecule binds to the HIV-1 protease.
In October 2015 FightAIDS@Home Phase 2 was launched, using the computationally intensive Binding Energy Distribution Analysis Method (BEDAM) to "more thoroughly evaluate the top candidates from the vast number of results generated in Phase 1".
History
It was originally implemented using a distributed computing software infrastructure provided by Entropia. However, since May 2003 FightAIDS@Home has not been associated with Entropia, and on November 21, 2005, the project moved to World Community Grid and the Entropia software was abandoned.
Scripps Research Institute published its first peer-reviewed scientific paper about the results of FightAIDS@Home on April 21, 2007. This paper explains that the results up to that point will primarily be used to improve the efficiency of future FightAIDS@Home calculations.
On February 3, 2010, the project announced it found two compounds that make a completely new class of AIDS-fighting drugs possible: "two compounds that act on novel binding sites for an enzyme used by the human immunodeficiency virus (HIV), the virus that causes AIDS. The discovery lays the foundation for the development of a new class of anti-HIV drugs to enhance existing therapies, treat drug-resistant strains of the disease, and slow the evolution of drug resistance in the virus."
System requirements
The minimum system requirements to run FightAIDS@home are:
With distributed computing every computer added accelerates the project, while the program has little impact on the performance of the machine where it is installed, as the calculation process can be set to run at minimum priority in the background.
Publications
See also
List of volunteer computing projects
References
External links
World Community Grid - Research - FightAIDS@Home
FightAIDS@Home
World Community Grid Targets AIDS in Giant Research Effort
HIV- |
https://en.wikipedia.org/wiki/XFP%20transceiver | The XFP (10 gigabit small form-factor pluggable) is a standard for transceivers for high-speed computer network and telecommunication links that use optical fiber. It was defined by an industry group in 2002, along with its interface to other electrical components, which is called XFI.
XFP is a slightly larger form factor than the popular small form-factor pluggable transceiver, SFP and SFP+.
Description
XFP modules are hot swappable and support multiple physical layer variants. They typically operate at near-infrared wavelengths (colors) of 850 nm, 1310 nm or 1550 nm. XFP modules use an LC fiber connector type to achieve higher density.
Principal applications include 10 Gigabit Ethernet, 10 Gbit/s Fibre Channel, synchronous optical networking (SONET) at OC-192 rates, synchronous optical networking STM-64, 10 Gbit/s Optical Transport Network (OTN) OTU-2, and parallel optics links. They can operate over a single wavelength or use dense wavelength-division multiplexing techniques. They include digital diagnostics that provide management that were added to the SFF-8472 standard.
The XFP specification was developed by the XFP Multi Source Agreement Group. It is an informal agreement of an industry group, not officially endorsed by any standards body. The first preliminary specification was published on March 27, 2002. The first public release was on July 19, 2002. It was adopted on March 3, 2003, and updated with minor updates through August 31, 2005.
The chair of the XFP group was Robert Snively of Brocade Communications Systems, and technical editor was Ali Ghiasi of Broadcom. The organization's web site was maintained until 2009.
XFI
The XFI electrical interface specification is a 10 gigabit per second chip-to-chip electrical interface specification defined as part of the XFP multi-source agreement. It was also developed by the XFP MSA group. XFI is sometimes pronounced as "X" "F" "I" and other times as "ziffie".
XFI provides a single lane running at 10.3125 Gbit/s when using a 64B/66B encoding scheme. A serializer/deserializer is often used to convert between XFI and a wider interface such as XAUI that has four lanes running at 3.125 Gbit/s using 8B/10B encoding.
Mechanical dimensions
The physical dimensions of the XFP transceiver are slightly larger than the original small form-factor pluggable transceiver (SFP). One of the reasons for the increase in size is to allow for on-board heat sinks for more cooling.
Types
XFP are available with a variety of transmitter and receiver types, allowing users to select the appropriate transceiver for each link to provide the required optical reach over the available optical fiber type (e.g. multi-mode fiber or single-mode fiber). XFP modules are commonly available in several different categories:
SR - 850 nm, for a maximum of 300 m
LR - 1310 nm, for distances up to 10 km
ER - 1550 nm, for distances up to 40 km
ZR - 1550 nm, for distances up to 80 km
The XFP packaging was smaller than t |
https://en.wikipedia.org/wiki/Frenetic%20%28programming%20language%29 | Frenetic is a domain-specific language for programming software-defined networking (SDN). This domain-specific programming language allows network operators, rather than manually configuring each connected network device, to program the network as a whole. Frenetic is designed to solve major OpenFlow/NOX programming problems. In particular, Frenetic introduces a set of purely functional abstractions that enable modular program development, defines high-level, programmer-centric packet-processing operators, and eliminates many of the difficulties of the two-tier programming model by introducing a see-every-packet programming paradigm. Hence Frenetic is a functional reactive programming language operating at a packet level of abstraction.
References
Further reading
Nate Foster, Rob Harrison, Michael J. Freedman, Jennifer Rexford, and David Walker (December 6, 2010). Frenetic: A High-Level Language for OpenFlow Networks, Technical report. Cornell University. Retrieved February 22, 2011.
External links
Functional programming
Computer networking
Functional languages |
https://en.wikipedia.org/wiki/Link%20layer | In computer networking, the link layer is the lowest layer in the Internet protocol suite, the networking architecture of the Internet. The link layer is the group of methods and communications protocols confined to the link that a host is physically connected to. The link is the physical and logical network component used to interconnect hosts or nodes in the network and a link protocol is a suite of methods and standards that operate only between adjacent network nodes of a network segment.
Despite the different semantics of layering between the Internet protocol suite and OSI model, the link layer is sometimes described as a combination of the OSI's data link layer (layer 2) and physical layer (layer 1).
The link layer is described in and . RFC 1122 considers local area network protocols such as Ethernet and other IEEE 802 networks (e.g. Wi-Fi), and framing protocols such as Point-to-Point Protocol (PPP) to belong to the link layer.
Definition in standards and textbooks
Local area networking standards such as Ethernet and IEEE 802.3 specifications use terminology from the seven-layer OSI model rather than the TCP/IP model. The TCP/IP model, in general, does not consider physical specifications, rather it assumes a working network infrastructure that can deliver media-level frames on the link. Therefore, RFC 1122 and RFC 1123, the definition of the TCP/IP model, do not discuss hardware issues and physical data transmission and set no standards for those aspects. Some textbook authors have supported the interpretation that physical data transmission aspects are part of the link layer. Others assumed that physical data transmission standards are not considered communication protocols, and are not part of the TCP/IP model. These authors assume a hardware layer or physical layer below the link layer, and several of them adopt the OSI term data link layer instead of link layer in a modified description of layering. In the predecessor to the TCP/IP model, the ARPAnet Reference Model (RFC 908, 1982), aspects of the link layer are referred to by several poorly defined terms, such as network-access layer, network-access protocol, as well as network layer, while the next higher layer is called internetwork layer. In some modern textbooks, network-interface layer, host-to-network layer and network-access layer occur as synonyms either to the link layer or the data link layer, often including the physical layer.
Link layer protocols
The link layer in the TCP/IP model is a descriptive realm of networking protocols that operate only on the local network segment (link) that a host is connected to. Such protocol packets are not routed to other networks. The link layer includes the protocols that define communication between local (on-link) network nodes which fulfill the purpose of maintaining link states between the local nodes, such as the local network topology, and that usually use protocols that are based on the framing of packets specific to the li |
https://en.wikipedia.org/wiki/Gold%28III%29%20chloride%20%28data%20page%29 | This page provides supplementary chemical data on gold(III) chloride
Thermodynamic properties
Spectral data
Structure and properties data
Material Safety Data Sheet
The handling of this chemical may incur notable safety precautions. It is highly recommend that you seek the Material Safety Datasheet (MSDS) for this chemical from a reliable source such as SIRI, and follow its directions.
References
Chemical data pages
Chemical data pages cleanup |
https://en.wikipedia.org/wiki/Heroes%20of%20Might%20and%20Magic%20III%3A%20The%20Shadow%20of%20Death | Heroes of Might and Magic III: The Shadow of Death is the second of two expansion packs for the turn-based strategy game Heroes of Might and Magic III. It was developed by New World Computing for Microsoft Windows and released by The 3DO Company in 2000. Shadow of Death is a standalone expansion pack that includes the original game.
Changes
The Shadow of Death includes seven new campaigns with adjustable difficulty settings. The expansion also includes twelve new artifacts, minor balance tweaks and eight new terrain types designed to enhance hero attributes such as morale, luck and magic expertise. Each faction remains fundamentally unaltered. Additionally, the expansion introduces a fifth artifact equipment slot for all heroes, and ten new types of teleporters for use on the Adventure Map. A major addition is the inclusion of "combination artifacts", that is, artifacts pieced together from sets of other related artifacts. The combination artifacts bestow extremely powerful abilities, and feature prominently in the campaigns. The expansion pack also significantly improves the map editor, including new portraits for four of the new campaign heroes - Sandro, Finneas Vilmar, Yog and Gem - and other customization options.
Content from Armageddon's Blade
The Shadow of Death can be installed alongside the first Heroes of Might and Magic III expansion pack, Armageddon's Blade. New features included in the Armageddon's Blade expansion (such as the Conflux town) are present in The Shadow of Death, but are designed to remain hidden and inaccessible unless certain files installed by Armageddon's Blade are detected in the game's directory. The game, however, checks only for the presence of these files: it does not verify the file contents. Because of this, several gamers discovered that it was possible to create empty files with the correct file names to unlock the Armageddon's Blade enhancements in The Shadow of Death without having to install the earlier expansion pack.
Story
The Shadow of Death campaigns serve as a prequel to both Might and Magic VI: The Mandate of Heaven and Heroes III: The Restoration of Erathia. The storyline revolves around Sandro the Necromancer, who has recently arrived on the continent of Antagarich following the events of Heroes of Might and Magic II. Sandro begins a ten-year plot to reassemble two ancient and powerful necromantic artifacts. He uses illusionary magic to take the form of a living human, which he uses to disguise himself.
Sandro first convinces the sorceress Gem and barbarian Crag Hack to find the pieces of the two artifacts for him, promising rewards in return. Unaware of Sandro's true nature, they agree to aid him in wresting the pieces away from other necromancers. However, once secured by the unwitting heroes, the pieces are spirited away by Sandro without fulfilling his end of the bargain. He reassembles the pieces into two whole artifacts, the Cloak of the Undead King and the Armor of the Damned.
With |
https://en.wikipedia.org/wiki/MAC/65 | MAC/65 is a 6502 assembler written by Stephen D. Lawrow for the Atari 8-bit family of home computers. MAC/65 was first released on disk by Optimized Systems Software in 1982, with the program requiring 16 KB RAM. A bank switched "SuperCartridge" from OSS followed in January 1984 for US$99, occupying only 8 KB.
MAC/65 is structured similarly to the Atari Assembler Editor cartridge, combining a line editor, assembler, and debugger into a single package. Its reputation was based on being much faster than either the Assembler Editor or the standalone Atari Macro Assembler. Brian Moriarty of Infocom wrote, "No assembler [at the time] on the C64 even comes CLOSE to MAC/65. Take it from someone who looked for one." It was used to write numerous commercial games and applications, and the majority of assembly language listings in ANALOG Computing were written with MAC/65.
According to Lawrow, MAC/65 was used to compile not only itself, but BASIC XL and BASIC XE.
Overview
Like Atari BASIC, source code in MAC/65 uses line numbers and is tokenized as it is entered. The entry scanner converts the line number to a 16-bit integer, converts the assembly mnemonic to an 8-bit code, and then replaces any constants or variable references with their value or address. As part of this process, any syntax errors are immediately found and reported, and as multi-character keywords and names are replaced by a single byte, the code is much smaller in memory.
The main advantage to this approach, however, is that "compiling" the program is a simplified task of copying out the tokens at the correct starting address, as the tokens are the ultimate instruction opcodes. This makes the entire compiling process dramatically faster than a system that has to parse the code from its original text format. Source files can be saved and loaded in either tokenized format or as text files.
Unlike the Atari Assembler Editor, MAC/65 provides macro processing and conditional assembly.
The cartridge version added 65C02 opcode support as well as a condensed version of Dunion's Debugging Tool (DDT) by Jim Dunion, the full version of which was originally sold through the Atari Program Exchange. DDT replaced the BUG/65 debugger which shipped with the disk version of MAC/65.
MAC/65 ToolKit
The ToolKit was a floppy diskette filled with source code and examples for use with the MAC/65 assembler. The ToolKit required an Atari 8-bit with 48K of memory, a disk drive and the MAC/65 cartridge.
The following is example code for Hello World! using the MAC/65 ToolKit:
0100 .OPT NO LIST
0110 ;
0120 ; HELLO.M65
0130 ; ---------
0140 ;
0150 ; THE HELLO WORLD TEST USING
0160 ; THE MAC/65 TOOLKIT
0170 ;
0180 RUNAD = $02E0 ; RUN ADDRESS
0190 EOL = $9B ; END-OF-LINE
0200 *= $4000
0210 ;
0220 MSG .BYTE "HELLO WORLD!",EOL
0230 ;
0240 .INCLUDE #D:KERNEL.M65
0250 ;
0260 START
0270 PRINT 0,MSG ; CHANNEL 0
0280 RTS ; RETURN TO DOS
0290 ;
0300 *= RUNAD
0310 .WORD STAR |
https://en.wikipedia.org/wiki/PBS%20YOU | PBS YOU (stylized as pbs you; the latter word is an acronym for "Your Own University") was founded in the late 1990s as a 24/7 channel/network featuring formal and informal educational programs and college-related fare, largely to take advantage of available rights and satellite transponder space and eager customers for carriage among the satellite-dish and some cable television companies.
How-to programs and public affairs programs and news predominated. An American Public Television, WGBH and WNET partnership now offers two similar alternative national services, Create, which was introduced in January, 2006, and World, beginning national service August 2007.
PBS YOU formerly included PBS Adult Learning Service (ALS) telecourses for college credit and foreign language instruction. PBS ALS has been decommissioned as of September 2005; the Annenberg/CPB Channel remains in place as a source of networked feeds of credit courses.
Demise
PBS YOU had long been vulnerable to budget concerns at PBS.
In late 2001, YOU was in danger of being shut down altogether. A deal with New River Media, producers of Think Tank and with the producers of the Standard Deviants educational series for teens helped to provide a reprieve for the channel, which largely reverted to its initial mix of programming in 2002 after having carried a preponderance of programming from those two sources.
In the wake of the closure of the original incarnation of the PBS Kids Channel on September 26, 2005 (in favor of the new commercial partnership service PBS Kids Sprout), YOU's future was once again in doubt and eventually followed suit on January 9, 2006. The Create network was created to partially fill the void left by the closure of YOU.
Prior to its cancellation, PBS YOU was carried by 67 PBS member stations (via ATSC subchannels), DirecTV, Dish Network and select digital cable providers.
See also
Create (television network)
External links
Archived official website at the Wayback Machine
Public Broadcasting Service
Defunct television networks in the United States
Television channels and stations established in 1998
Television channels and stations disestablished in 2006
Educational and instructional television channels
English-language television stations in the United States |
https://en.wikipedia.org/wiki/Tanzania%20Railways%20Limited | The Tanzania Railways Corporation (TRC) is a state-owned enterprise that runs one of Tanzania's two main railway networks. the Headquarters are located in Mchafukoge, Ilala District, Dar es Salaaam Region.
When the East African Railways and Harbours Corporation was dissolved in 1977 and its assets divided between Kenya, Tanzania and Uganda, TRC was formed to take over its operations in Tanzania. In 1997 the inland shipping division became a separate company.
MGR
In November 2021, TRC received the three modern locomotives (H10 series) worth Sh22 billion to strengthen their Metre-gauge railway (MGR) line, ordered from Malaysia.
Rail network
TRC's gauge is and the length about . Two east–west lines linking the coast and the hinterland were built under colonial rule as German East Africa: the Central Line runs from Dar es Salaam to Kigoma, and the Tanga Line from Tanga to Arusha. A north-south connection, from Korogwe to Ruvu, links the two lines. The main line runs to Lake Victoria where a connection operates via Lake Victoria train ferries with the Uganda Railway. From the Tanga line a line to Kenya is disused.
There is a break-of-gauge at Dar es Salaam to the Tanzania-Zambia Railway Authority (TAZARA) line to Zambia. A second link is at Kidatu, where the TAZARA line meets the Kidatu branch.
Former Marine Division
TRC inherited ferry and cargo ship services on Lake Tanganyika and Lake Nyasa and some ships on Lake Victoria.
TRC introduced on Lake Victoria in about 1979, on Lake Tanganyika in 1982 and passenger and cargo ship on Lake Victoria in 1988.
On 21 May 1996 Bukoba sank in of water about off Mwanza. She had many more passengers aboard than she was certified to carry and at least 800 people were killed. After the disaster criminal charges were brought against nine TRC officials including Bukoba'''s master and the manager of the Marine Division.
In 1997 the Marine Division became a separate company, Marine Services Company Limited.
Rail accidents
On 24 June 2002 the Igandu train disaster killed 281 people, the second highest number of deaths in a train disaster in Africa (the highest being the Awash rail disaster).
Privatisation, re-nationalization and recent plans
In 2007 RITES Ltd of India won a contract from the Parastatal Sector Reform Commission (PSRC) to operate passenger and freight trains on a concession basis for 25 years. The concession agreement was signed on 3 September 2007, to begin on 1 October 2007. The railway will be run as Tanzania Railway Ltd, with the government owning a 49% stake.
There were moves to abandon the contract "due in part, to the fact that the Indian investor failed to pay over USD 6 million in concession fees to the Tanzania government in 2008" but RITES officials countered noting that the contract "misled Rites officials by indicating that the Railway Assets Holding Company (Rahco) was in possession of 92 working locomotives when, in actuality, only 55 existed"''. In 2010, the governmen |
https://en.wikipedia.org/wiki/Buenos%20Aires%20Great%20Southern%20Railway | The Buenos Aires Great Southern Railway (BAGS) () was one of the Big Four broad gauge, , British-owned companies that built and operated railway networks in Argentina. The company was founded by Edward Lumb in 1862 and the first general manager was Edward Banfield after whom the Buenos Aires suburban station of Banfield was named, when it opened in 1873. After president Juan Perón nationalised the Argentine railway network in 1948 it became part of the state-owned company Ferrocarril General Roca.
History
Preliminary studies
The market of Plaza Constitución in Buenos Aires was served by carts coming from the South of the province that crossed the Riachuelo through the "Puente de Gálvez". As this transport was too costly, the products could not be carried on very long distances. In 1860, 7,416 carts with wool and leather had arrived to Constitución (each vehicle had a capacity of 25 100 kg packages).
The state of passenger transport was similar. The carriages made three trips per month to Lobos, Cañuelas, 25 de Mayo, Saladillo and Dolores, two trips per month to Tandil and Lobería and just one to Bahía Blanca. The carriages were accompanied by "cuarteadores" that helped them to cross rivers and streams. There also were intermediate stops such as "La Botica", a pulpería in Lomas de Zamora of Greater Buenos Aires.
This form of transport had several disadvantages. The roads were not in good condition and the rivers obligated to passengers to stray dozens of kilometers from the path. The carriages covered an average of 80 km per day.
Because of this, Plaza Constitución was the first option to build a terminus station of a great railway that connected the city of Buenos Aires with the south of the province.
First steps of the railway
In August 1861, Edward Lumb, a British entrepreneur, requested the concession of a railway line that would run from Constitución to the city of Chascomús, 120 km from Buenos Aires. Lumb offered $ 1,000,000 as guarantee to the Government of Buenos Aires. Lumb's initiative was debated in the Chamber of Deputies, where it was concluded that the railroad was necessary for the development of the Argentinian nation. Juan B. Alberdi stated "The railroad will join the Argentine Republic better than all the congresses... without the 'iron road' that connects their extremes, the country will be always divisible and divided against all the Legislative decrees".
Finally, on May 27, 1862, the Buenos Aires Legislature promulgated the Law that authorized President of Argentina, Bartolomé Mitre, to enter into a contract with Edward Lumb. The Government demanded an interest rate of 7% on the costs of construction over 40 years. On the other hand, the company was exempt from paying contributions, taxes and custom fees. The railway company had also to carry the post for free. The Government could expropriate the railway and its assets if the company did not offer an additional 20% of the construction costs as compensation. The rail |
https://en.wikipedia.org/wiki/Malaysian%20Expressway%20System | The Malaysian Expressway System () is a network of national controlled-access expressways in Malaysia that forms the primary backbone network of Malaysian national highways. The network begins with the Tanjung Malim–Slim River tolled road (Federal Route 1) which was opened to traffic on 16 March 1966, later North–South Expressway (NSE), and is being substantially developed. Malaysian expressways are built by private companies under the supervision of the government highway authority, Malaysian Highway Authority (abbreviated as MHA; also referred to as Lembaga Lebuhraya Malaysia (LLM) in Malay).
Overview
The expressway network of Malaysia is considered as one of the best controlled-access expressway network in Asia after Japan and South Korea. There are 30 expressways in the country and the total length is . and another is under construction. The closed toll expressway system is similar to the Japanese Expressway System and Chinese Expressway System. All Malaysian toll expressways are controlled-access highway and managed in the Build-Operate-Transfer (BOT) system.
There are expressways in West Malaysia and East Malaysia, however, the former are better-connected. The North–South Expressway passes through all the major cities and conurbations in West Malaysia, such as Penang, Ipoh, the Klang Valley and Johor Bahru. The Pan Borneo Highway connects the Malaysian states of Sabah and Sarawak with Brunei.
Asian Highway Network
A few major expressways in Malaysia are part of the larger Asian Highway Network. The Asian Highway Network is an international project between Asian nations to develop their highway systems, which will form main routes in the network. Seven Asian Highway routes pass through Malaysia:
AH2 Asian Highway Route 2 – along the:
North–South Expressway Northern Route E1 (Bukit Kayu Hitam-Bukit Lanjan) ,
New Klang Valley Expressway E1 (Bukit Lanjan-Shah Alam) ,
North South Expressway Southern Route E2 (Nilai Utara-Pasir Gudang),
North-South Expressway Central Link (ELITE) E6 and;
Johor Bahru Eastern Dispersal Link Expressway (JB EDL) E14.
AH18 Asian Highway Route 18 – along the Federal Route 3
AH140 Asian Highway Route 140 – along the Federal Route 4 and Butterworth–Kulim Expressway E15
AH141 Asian Highway Route 141 – consists of New Klang Valley Expressway E1 (Bukit Lanjan–Jalan Duta), Duta–Ulu Klang Expressway E33 (Jalan Duta–Sentul Pasar and Sentul Pasar–Greenwood), Kuala Lumpur Middle Ring Road 2 28 (Greenwood–Gombak North Interchange), Kuala Lumpur–Karak Expressway E8, East Coast Expressway E8 and Gebeng Bypass 101
AH142 Asian Highway Route 142 – along the MEC Highway FT222, Tun Razak Highway FT12 and Federal Route 1 (Segamat–Yong Peng South Interchange)
AH143 Asian Highway Route 143 – along the Second Link Expressway E3
AH150 Asian Highway Route 150 – along the Pan Borneo Highway.
AH2 border crossing dispute
The status of the route alignment of the Asian Highway 2 crossing the Malaysia–Singapore border is in |
https://en.wikipedia.org/wiki/IEEE%20802.11s | IEEE 802.11s is a wireless local area network (WLAN) standard and an IEEE 802.11 amendment for mesh networking, defining how wireless devices can interconnect to create a wireless LAN mesh network, which may be used for relatively fixed (not mobile) topologies and wireless ad hoc networks. The IEEE 802.11s task group drew upon volunteers from university and industry to provide specifications and possible design solutions for wireless mesh networking. As a standard, the document was iterated and revised many times prior to finalization.
802.11 are a set of IEEE standards that govern wireless networking transmission protocols. They are commonly used today to provide wireless connectivity in the home, office and some commercial establishments.
The IEEE 802.11s standard was issued in 2011 and was superseded in 2012 when it became part of the IEEE 802.11 standard that was issued in 2012.
Description
802.11s extends the IEEE 802.11 MAC standard by defining an architecture and protocol that supports both broadcast/multicast and unicast delivery using "radio-aware metrics over self-configuring multi-hop topologies."
Closely related standards
802.11s inherently depends on one of 802.11a, 802.11b, 802.11g, 802.11n, 802.11ac, or 802.11ax to carry the actual traffic. One or more routing protocols suitable to the actual network physical topology are required. 802.11s requires the Hybrid Wireless Mesh Protocol, or HWMP to be supported as a default. However, other mesh, ad hoc (Associativity-Based Routing, Zone Routing Protocol, and location based routing) or dynamically link-state routed (OLSR, B.A.T.M.A.N., OSPF) may be supported or even static routing (WDS). See the more detailed description below comparing these routing protocols.
A mesh often consists of many small nodes. When mobile users or heavy loads are concerned, there will often be a handoff from one base station to another, and not only from 802.11 but from other (GSM, Bluetooth, PCS and other cordless phone) networks. Accordingly, IEEE 802.21, which specifies this handoff between nodes both obeying 802.11s and otherwise, may be required. This is especially likely if a longer-range lower-bandwidth service is deployed to minimize mesh dead zones, e.g. GSM routing based on OpenBTS.
Mesh networking often involves network access by previously unknown parties, especially when a transient visitor population is being served. Thus the accompanying IEEE 802.11u standard will be required by most mesh networks to authenticate these users without pre-registration or any prior offline communication. Pre-standard captive portal approaches are also common. See the more detailed description below of mesh security.
Timeline
802.11s started as a Study Group of IEEE 802.11 in September 2003. It became a Task Group in July 2004. A call for proposals was issued in May 2005, which resulted in the submission of 15 proposals submitted to a vote in July 2005. After a series of eliminations and mergers, th |
https://en.wikipedia.org/wiki/Minix-vmd | Minix-vmd is a computer operating system which was created from MINIX 2.0, a Unix-like microkernel, and added some features such as virtual memory and X Window System support. It is free and open source software.
Minix-vmd runs on IA-32 and compatible microprocessor architectures. It was written by many of the same authors who develop MINIX, at the Vrije Universiteit (VU) in Amsterdam. The acronym reputedly stands for VU Minix Distribution.
According to its authors, Minix-vmd was created to meet specific needs they had, rather than to be a general purpose use OS like Linux. It also does not share the educational goals of MINIX.
Nevertheless, the OS may have been of interest to others for various purposes, due to its small resource use compared with other operating systems, and other factors. However, MINIX 3 incorporated Minix-vmd's functions.
See also
MINIX
MINIX file system
References
External links
Minix-vmd
Discontinued operating systems
Microkernels
MINIX
Unix variants |
https://en.wikipedia.org/wiki/Aluminium%20chloride%20%28data%20page%29 | Supplementary data for aluminium chloride.
External MSDS
Baker
Fisher
EM Science
Akzo Nobel (hexahydrate)
Science Stuff (hexahydrate)
External SDS
Thermodynamic properties
Spectral data
Structure and properties data
References
NIST website
Chemical data pages
Chemical data pages cleanup |
https://en.wikipedia.org/wiki/Asymmetric%20multiprocessing | An asymmetric multiprocessing (AMP or ASMP) system is a multiprocessor computer system where not all of the multiple interconnected central processing units (CPUs) are treated equally. For example, a system might allow (either at the hardware or operating system level) only one CPU to execute operating system code or might allow only one CPU to perform I/O operations. Other AMP systems might allow any CPU to execute operating system code and perform I/O operations, so that they were symmetric with regard to processor roles, but attached some or all peripherals to particular CPUs, so that they were asymmetric with respect to the peripheral attachment.
Asymmetric multiprocessing was the only method for handling multiple CPUs before symmetric multiprocessing (SMP) was available. It has also been used to provide less expensive options on systems where SMP was available.
Background and history
For the room-size computers of the 1960s and 1970s, a cost-effective way to increase compute power was to add a second CPU. Since these computers were already close to the fastest available (near the peak of the price:performance ratio), two standard-speed CPUs were much less expensive than a CPU that ran twice as fast. Also, adding a second CPU was less expensive than a second complete computer, which would need its own peripherals, thus requiring much more floor space and an increased operations staff.
Notable early AMP offerings by computer manufacturers were the Burroughs B5000, the DECsystem-1055, and the IBM System/360 model 65MP. There were also dual-CPU machines built at universities.
The problem with adding a second CPU to a computer system was that the operating system had been developed for single-CPU systems, and extending it to handle multiple CPUs efficiently and reliably took a long time. To fill this gap, operating systems intended for single CPUs were initially extended to provide minimal support for a second CPU. In this minimal support, the operating system ran on the “boot” processor, with the other only allowed to run user programs. In the case of the Burroughs B5000, the second processor's hardware was not capable of running "control state" code.
Other systems allowed the operating system to run on all processors, but either attached all the peripherals to one processor or attached particular peripherals to particular processors.
Burroughs B5000 and B5500
An option on the Burroughs B5000 was “Processor B”. This second processor, unlike “Processor A” had no connection to the peripherals, though the two processors shared main memory, and Processor B could not run in Control State. The operating system ran only on Processor A. When there was a user job to be executed, it might be run on Processor B, but when that job tried to access the operating system the processor halted and signaled Processor A. The requested operating system service was then run on Processor A.
On the B5500, either Processor A or Processor B could be design |
https://en.wikipedia.org/wiki/OpenWrt | OpenWrt (from open wireless router) is an open-source project for embedded operating systems based on Linux, primarily used on embedded devices to route network traffic. The main components are Linux, util-linux, musl, and BusyBox. All components have been optimized to be small enough to fit into the limited storage and memory available in home routers.
OpenWrt is configured using a command-line interface (ash shell) or a web interface (LuCI). There are about 8000 optional software packages available for installation via the opkg package management system.
OpenWrt can run on various types of devices, including CPE routers, residential gateways, smartphones, pocket computers (e.g. Ben NanoNote). It is also possible to run OpenWrt on personal computers and laptops.
History
The OpenWrt project was started in 2004 after Linksys had built the firmware for their WRT54G series of wireless routers with code licensed under the GNU General Public License. Under the terms of that license, Linksys was required to make the source code of its modified version available under the same license, which enabled independent developers to create derivative versions. Support was originally limited to the WRT54G series, but has since been expanded to include many other routers and devices from many different manufacturers.
Using this code as a base and later as a reference, developers created a Linux distribution that offers many features not previously found in consumer-level routers. Early on some features required proprietary software. For example, prior to OpenWrt 8.09 (based on Linux 2.6.25 and the b43 kernel module) WLAN for many Broadcom-based routers could only be had via the proprietary wl.o module (and which required Linux 2.4.x).
OpenWrt releases were historically named after cocktails, such as White Russian, Kamikaze, Backfire, Attitude Adjustment, Barrier Breaker and Chaos Calmer, and their recipes were included in the message of the day (motd) displayed after logging in using the command-line interface.
In May 2016, OpenWrt was forked by a group of core OpenWrt contributors due to disagreements on internal process. The fork was dubbed Linux Embedded Development Environment (LEDE). The schism was reconciled a year later. Following the remerger, announced in January 2018, the OpenWrt branding is preserved, with many of the LEDE processes and rules used. The LEDE project name was used for v17.01, with development versions of 18.01 branded OpenWrt, dropping the original cocktail based naming scheme.
<noinclude>
Releases
LEDE
The Linux Embedded Development Environment (LEDE) project was a fork of the OpenWrt project and shared many of the same goals. It was created in May 2016 by a group of core OpenWrt contributors due to disagreements on OpenWrt internal processes. The schism was nominally reconciled a year later in May 2017 pending approval of the LEDE developers. The remerger preserves the OpenWrt branding, but uses many of the LEDE processes and |
https://en.wikipedia.org/wiki/KEVC-CD | KEVC-CD (channel 5) is a low-power, Class A television station licensed to Indio, California, United States, serving the Palm Springs Area as an affiliate of the Spanish-language UniMás network. It is owned by Entravision Communications alongside Univision affiliate KVER-CD (channel 41, also licensed to Indio), Palm Springs–licensed NBC affiliate KMIR-TV (channel 36) and MyNetworkTV affiliate KPSE-LD (channel 50). KEVC and KVER share studios on Corporate Way in Palm Desert; KMIR and KPSE maintain separate facilities on Parkview Drive, also in Palm Desert. KEVC's transmitter is located atop Edom Hill in Cathedral City.
Subchannels
The station's digital signal is multiplexed:
References
External links
Entravision Communications
EVC-CD
Indio, California
EVC
EVC-CD
UniMás network affiliates
TBD (TV network) affiliates
Comet (TV network) affiliates
Charge! (TV network) affiliates
Television channels and stations established in 1999
1999 establishments in California |
https://en.wikipedia.org/wiki/ZENworks | ZENworks, a suite of software products developed and maintained by Micro Focus International for computer systems management, aims to manage the entire life cycle of servers, of desktop PCs (Windows, Linux or Mac), of laptops, and of handheld devices such as Android and iOS mobile phones and tablets. Novell planned to include Full Disk Encryption (FDE) functionality within ZENworks.
ZENworks supports multiple server platforms and multiple directory services.
History
The name, "ZENworks", first appeared as "Z.E.N.works" in 1998 with ZENworks 1.0
and with ZENworks Starter Pack - a limited version of ZENworks 1.0 that came bundled with NetWare 5.0 (1998). Novell added server-management functionality, and the product grew into a suite consisting of:
"ZENworks for Desktops" (ZfD)
"ZENworks for Servers" (ZfS)
"ZENworks for Handhelds" (ZfH)
Novell has continued to add components to the suite, which it sells under the consolidated name "ZENworks Suite".
The initial ZENworks products had a tight integration with Novell Directory Service (NDS). With the release of ZENworks Configuration Management 10 (2007) the product architecture completely changed, the product became directory agnostic and ZENworks Suite products were integrated into a single management framework.
ZENworks Releases:
Elements of the ZENworks Suite
In the latest version of ZENworks known as ZENworks 2017 the ZENworks Suite consists of seven individual products:
Additionally, Novell offers an ITIL version of "Novell Service Desk". This version is ITIL-certified by PinkVERIFY and supports ten ITIL v3 processes, e.g. Change, Incident, Problem and Service Level Management.
In terms of implementation, the ZENworks Agent (also known as the "ZENworks Management Daemon" or "zmd") installs, updates and removes software. The ZENworks Configuration Management (ZCM) addresses patching, endpoint security, asset management and provisioning.
See also
Systems Management
Patch Management
Mobile Device Management
Full Disk Encryption
Antimalware
References
Further reading
External links
Novell ZENworks Product page
ZENworks
Remote administration software
System administration |
https://en.wikipedia.org/wiki/Jdbgmgr.exe%20virus%20hoax | The jdbgmgr.exe virus hoax involved an e-mail spam in 2002 that advised computer users to delete a file named jdbgmgr.exe because it was a computer virus. jdbgmgr.exe, which had a little teddy bear like icon (The Microsoft Bear), was actually a valid Microsoft Windows file, the Debugger Registrar for Java (also known as Java Debug Manager, hence jdbgmgr).
The email has taken many forms, including saying its purpose was to warn Hotmail users of a virus spreading via MSN Messenger, or to alert about a possible virus in the orkut web community. The message (to right) went on to say that it was not detected by McAfee or Norton AntiVirus, which was obviously true. A further variant related the file with the "Bugbear" virus, which was a genuine virus, prevalent at the time.
The effect of deleting the file was restricted to Java developers who used Microsoft Visual J++ v1.1. It had little to no effect on most users because it was simply a developer tool.
Microsoft Bear
The icon for jdbgmgr.exe, Microsoft Bear, was the mascot for the Microsoft Windows 3.1 development team, alongside 16-bit Bunny and 32-bit Bunny, which represented the transition to 32-bit computing with the release of Windows 95.
The unusual icon was similar to that of some viruses at the time, such as Parrot, making the virus hoax more believable.
Microsoft Bear was featured in several easter eggs within Windows 3.1, including a hidden credits screen where the email addresses of the developers could be found. In 2002, Microsoft stopped including these easter eggs in their software as part of the Trustworthy Computing Initiative, due to the risk of exploits and security flaws that could be introduced by these features which most users were unaware of.
See also
List of hoaxes
References
External links
Symantec's description
Virus hoaxes
2002 hoaxes
Windows administration
Windows components |
https://en.wikipedia.org/wiki/Verizon%20Fios | Verizon Fios is a bundled Internet access, telephone, and television service provided by Verizon Communications that operates over a fiber optical network within the United States.
History
Early development (1995–1996)
The early stages of Fios began when Bell Atlantic (now Verizon Communications) was testing its video service "Stargazer" in 1995. This was the first commercial video on demand (VOD) service, which was tested for 1,000 homes in northern Virginia. During this time there were talks of developing a fiber optic-based service. In 1996, VP of Programming Bob Townsend told the Baltimore Sun that Stargazer would be "folded into [Bell Atlantic's] deployment of fiber to the curb."
Launch and expansion (2005–2010)
In September 2005, Verizon Communications began offering a fiber optic digital television service, which became available for 9,000 customers in Keller, Texas. Called Fios TV, the service aimed to replace copper wires with optical fibers.
By 2006 Fios was offered in areas of seven US states.
Stable footprint (2010–present)
Verizon announced in March 2010 that it was winding down its Fios expansion, concentrating on completing its network in areas that already had Fios franchises but were not deploying to new areas, which included the cities of Baltimore and Boston, which had not yet secured municipal franchise agreements. Some viewed the halt in expansion as a violation of Verizon's agreements with some municipalities and states, since Verizon has collected revenue to deploy infrastructure upgrades that never occurred. In New Jersey, Verizon collected an additional $15 billion in fees from customers and tax subsidies in exchange for promising fiber optic broadband for the whole state. The New Jersey state government altered the deal in 2014 to allow Verizon to substitute wireless Internet access to fulfill its promise instead. Critics pointed out that wireless Internet was slower and less reliable.
Television
Fios TV is one of three services offered by Verizon Fios. Verizon offers Fios packages with high-definition and standard-definition TV, as well as video on demand.
Fios TV uses QAM technology to deliver signals to a customer's property using its fiber optic cables. At the home, the optical network terminal turns the signal into a radio frequency signal that can be used on a home's existing coaxial cables, feeding the signal to a set-top box (STB).
Internet access
Fios Internet was the first service offered under Verizon's Fios brand, and is one of three of the product line's current offerings. The broadband Internet service initially launched in Keller, Texas, in 2004, a year before Fios TV was available.
Telephone
In addition to its TV and Internet services, the company also has a voice over IP service via its fiber-optic network, Fios Digital Voice. The service initially launched in Virginia and Maryland in September 2008 and eventually fully replaced an earlier service, VoiceWing, which Verizon offered from 2004 to |
https://en.wikipedia.org/wiki/Liga%20F | The Primera División de la Liga de Fútbol Femenino, currently known as Liga F (finetwork Liga F for sponsorship reasons), is the highest level of league competition for women's football in Spain. It is the women's equivalent of the men's La Liga, and it is organized by the Liga Profesional Femenina de Fútbol (LPFF). As one of the top six national leagues ranked by Union of European Football Associations (UEFA) coefficient, it is considered one of the most important women's leagues in Europe. Starting with the 2021–22 edition, as determined by the UEFA women's coefficient, the top three teams will qualify for the UEFA Women's Champions League.
The league was founded in 1988, and has operated every year since, although it has undergone several changes in format and names including; Primera Iberdrola (formerly Liga Femenina Iberdrola for sponsorship reasons), Superliga Femenina, División de Honor, and Liga Nacional. A total of 12 different clubs have been champions; Barcelona have won the most championships, with eight.
History
Liga Nacional
The league was founded in 1988 as Liga Nacional, formed by Olímpico Fortuna, Puente Castro, Parque Alcobendas, Santa María Atlético, Vallès Occidental, RCD Español, FC Barcelona, CE Sabadell and Peña Barcelonista Barcilona.
División de Honor
Starting in the 1996–97 season the league was divided into 4 groups. The group winners played a semi-final and final to decide the champion.
Superliga
For the 2001–02 season the league was renamed the Superliga and the competition system was changed from the group format to a double round-robin, with each team playing the other teams twice, once away and once at home. The league in this period consisted of 14 teams. The 2008–09 season kept the double round-robin format as the league increased from 14 to 16 teams.
In the 2009–10 season the Superliga increased from 16 to 24 teams, causing criticism by teams and players who feared a decline in the quality of competition. The Superliga was divided into 3 groups of 7 to 8 teams each, with geographically nearby teams placed into each group to minimize travel. In the first stage of the season, each team played each other team in its group twice. In the second stage, the best two of each group as well as the two best third-place finishers went into group A and the other teams were divided into groups B and C based on a predefined key. Again a double round-robin was played within each group. All Group A teams and the three best finishers of Group B and C qualified for the Copa de la Reina, and the two best teams in Group A played each other in a two-legged final for the season's championship. Rayo Vallecano won the 2009–10 and 2010-11 finals, both times against RCD Espanyol. In the 2009–10 season, two teams had to withdraw from the league for financial reasons.
Primera División
Starting in the 2011–12 season, the league was renamed to Primera División and the group-based system was eliminated; 18 teams played double round-rob |
https://en.wikipedia.org/wiki/Dartmouth%20ALGOL%2030 | Dartmouth ALGOL 30 was a 1960s-era implementation, first of the ALGOL 58 programming language and then of ALGOL 60. It is named after the computer on which it ran: a Librascope General Precision (LGP-30) desk-size computer acquired by Dartmouth College in 1959.
Since the limited size of the LGP-30 (4K 31-bit words) precluded a full implementation of ALGOL 60, certain features (arrays called by value, own arrays, strings, variable array bounds, and recursion) were omitted; but the implementation did include parameters called by name, using thunks and integer labels.
ALGOL 30 was implemented by four undergraduate students. Stephen J. Garland wrote the compiler, discovering as a sophomore that compound statements and blocks could be included in the Samelson and Bauer translation algorithm. This simple fact was not published until some years later by David Gries. Robert F. Hargraves, Jorge Llacer, and Anthony W. Knapp developed the run-time system, which included an interpreter for floating-point arithmetic (not supported by the limited instruction set of the LGP-30).
ALGOL 30 was a two-pass system. The first pass loaded the compiler and processed source code typed by the user; it generated intermediate code, similar to relocatable binary, and punched it onto paper tape. The second pass loaded both the run-time system and the intermediate code. Compilations could be "batched," but the delay between entering the source code tape and executing the compiled program were too great to allow widespread student use.
To enable wider use, Garland and Knapp developed a "load-and-go" system known as SCALP, a Self Contained ALgol Processor, for a smaller subset of ALGOL 60 (which did not allow boolean variables or operators, blocks, procedures, own or dynamic arrays, conditional expressions, and step-until for statements). SCALP devoted a third of the LGP's memory to the compiler, a third to the run-time system (which included a floating-point interpreter and numeric functions), and a third for compiled user code. Students prepared source code off-line and punched it on paper tape with a Friden flexowriter. Compilation occurred almost as quickly as the tape could be read in. This enabled student jobs to be completed in three minutes. Hundreds of students used SCALP before BASIC became available on the Dartmouth Time Sharing System in 1965.
ALGOL 30 was the basis for an implementation in 1965 of ALGOL 60 on the Dartmouth Time Sharing System. Several years later, Sidney Marshall produced an implementation of ALGOL 68.
References
External links
The Papers of Stephen J. Garland at Dartmouth College Library
Abstract of (and links to) technical memoranda concerning ALGOL 30 and SCALP 1962–1964
Dartmouth College history
ALGOL 60 dialect
Procedural programming languages |
https://en.wikipedia.org/wiki/Canadian%20Police%20Information%20Centre | The Canadian Police Information Centre (CPIC; , CIPC) is the central police database where Canada's law enforcement agencies can access information on a number of matters. It is Canada's only national law enforcement networking computer system ensuring officers all across the country can access the same information. There are approximately 3 million files generated each year and is the responsibility of the originating agency to ensure the data integrity of each file.
CPIC was approved for use by the Treasury Board of Canada and became operational in 1972. It is maintained by the Royal Canadian Mounted Police (RCMP) with the central registry located at the RCMP Headquarters in Ottawa, Ontario, Canada. It is one part of an umbrella program covering several services called the "National Police Services (NPS)". Other functions within NPS include the Canadian Anti-Fraud Centre, Canadian Police College (CPC), Criminal Intelligence Service Canada (CISC), the National Forensic Laboratory Services (NFLS), the National DNA Data Bank (NDDB), the Canadian Criminal Real Time Identification Services (CCRTIS), the Canadian Firearms Program (CFP), Violent Crime Linkage Analysis System and National Sex Offender Registry, and the National Cybercrime Coordination Unit (NC3).
CPIC is interfaced with the United States National Crime Information Center and National Law Enforcement Telecommunications System but not all information are shared. For example, Wandering Persons Registry information is not shared across the border.
In order for a government agency to access CPIC, they must agree to abide by the rules set out in the CPIC Reference Manual and be approved by the CPIC Advisory Committee, composed of 26 senior police officers from municipal and provincial police forces, the Ontario Police Commission and the RCMP. Non-policing agencies must also enter a memorandum of understanding with the RCMP and may be audited from time to time for compliance.
CPIC is broken down into four data banks: Investigative, Identification, Intelligence and Ancillary which contain information on:
Vehicles/marine
Stolen or abandoned vehicles/boats
Persons
Wanted persons
People who are accused of crime(s)
People on probation or parolees
Special Interest Police (SIP)
Judicial orders
Access to the Offender Management System of Correctional Service of Canada
Missing persons
Stolen property
Dental characteristics
Canadian Firearms Registry of the Canadian Firearms Program
Wandering Persons Registry
Alzheimer's disease patients who register with the Alzheimer Society of Canada in case they go missing
CPIC criminal surveillance
Criminal intelligence gathered across the country
Criminal Record Synopsis
Condensed information about a person's criminal record
Local, municipal and provincial police services in Canada, as well as federal law enforcement agencies such as the Canada Border Services Agency and Military Police maintain their own local records in addition to CPI |
https://en.wikipedia.org/wiki/Orange%20Egypt | Orange Egypt (), formerly known as Mobinil (), is the oldest mobile network operator in Egypt, founded on March 4, 1998. Orange provides voice and data exchange services, as well as 4G, 3G, ADSL and broadband internet.
Network and coverage
Orange Egypt has:
99,299 sites;
36 switches;
4503 mobile BTSs.
Orange was the first mobile carrier in Egypt to extend its network services to underground stations, having installed 17 Micro BTSs covering stations in Cairo in addition to the Al Azhar Tunnel.
Orange has international roaming agreements with 348 operators in 135 countries, being the first in Egypt to establish roaming agreements with the US and Canada, as well as non-GSM operators in South American countries including Argentina, Brazil and Peru.
Orange Egypt offers roaming with satellite operators such as Al-Thuraya.
Orange claims that its coverage extends to more than 99% of the Egyptian population.
Orange is continually ranked as the fastest network in Egypt by Speedtest and the National Telecom Regulatory Authority. According to the latter, Orange Egypt provides an average speed of 32 Mbit/s.
Market share
As of October–December, 2017, Orange has about 33.5 million
active subscribers from almost 101.27 million mobile subscribers in Egypt.
Recent changes
On September 21, 2011, Yves Gauthier was appointed chief executive officer (CEO) of Mobinil, a change that took effect on November 15 of the same year. This followed the resignation of Hassan Kabbani.
On February 13, 2012, Orange S.A. announced its intent to buy Sawiris' biggest share in Mobinil for about US$2 billion, which could be the end of the long-standing dispute between the company's major shareholders.
On May 27, 2012, Orange S.A. acquired 94 percent of Mobinil, buying most of the shares it did not already own from its local venture partner, Orascom Telecom Media and Technology (OTMT). Orange executed its purchase of 93.9 million shares of the 100 million outstanding at a pre-agreed price of E£202.50 each, for a total transaction value of E£19 billion (US$3.15 billion). OTMT agreed to keep a 5 percent stake in Mobinil.
In February 2015, an agreement was reached between Orange S.A. and OTMT, where OTMT, then holder of 5% of Mobinil's shares, sold all of its shares and voting rights in the company to Orange S.A., thus raising Orange's ownership in Mobinil to 98.92%.
On March 8, 2016, Mobinil was officially rebranded to Orange.
On October 14, 2016, Orange acquired the fourth-generation (4G) internet services licence after signing a $484-million agreement with the national telecom regulator.
By late 2016, Orange started offering 4G internet services.
On May 1, 2018, Yasser Shaker was appointment as the CEO of Orange Egypt.
On June 26, 2018, Orange announced that they would be providing new 4G+ internet services to their users.
On March 27, 2019, Home VDSL launches at speeds of up to 100 Mb, and launch something innovative by subscribing through Jumia.
Disputes
In |
https://en.wikipedia.org/wiki/Smoky%20Hills%20PBS | Smoky Hills PBS (formerly Smoky Hills Public Television) is a regional network of Public Broadcasting Service (PBS) member television stations serving central and western portions of the U.S. state of Kansas. It is operated by the Smoky Hills Public Television Corporation, a non-profit organization which holds the licenses for all of the stations licensed in the network. The broadcast signals of the four stations cover most of the western half of the state outside Wichita.
The network produces public affairs programming and holds the broadcast rights to several Kansas high school athletic championship events sanctioned by the Kansas State High School Activities Association. The network's offices and network operations center are located in Bunker Hill (just east of Russell), in a historic native stone building.
History
The Smoky Hills Public Television Corporation was founded in 1978, with the intent to start a non-commercial educational television station in western Kansas. This region is part of the Wichita–Hutchinson Plus market, an unusually large market that covers over 70 counties stretching from the Flint Hills to the Colorado border–almost three-fourths of the state. It is the largest designated market area (DMA) by number of counties in the United States. Previously, much of the area received PBS programming on cable via either Wichita member station KPTS (channel 8) or Denver member station KRMA-TV (channel 6).
Flagship station KOOD (channel 16) in Hays was the first station in the network to sign on the air on November 10, 1982. This was followed by the debut of full-power satellites KSWK (channel 8) in Lakin (also serving Garden City) on March 15, 1989 and KDCK (channel 21) in Dodge City on March 3, 1998. KWKS (channel 19) in Colby was the last satellite to sign on, debuting as a digital-only station, in June 2007.
Most viewers watch Smoky Hills PBS's programming through cable, which is all but essential for acceptable television in most of this vast area due to its hilly terrain. In 2005, satellite providers DirecTV and Dish Network began carrying the network in the Wichita market, boosting its potential viewership to over 1.5 million people in Kansas and Nebraska.
Programming
Locally produced programs broadcast by Smoky Hills PBS include the medical advice program Doctors On Call, the public affairs program The Kansas Legislature, the high school sports highlight program Scoreboard Show and the music program Down Home Country: Live in Branson. The network also holds broadcast rights to the Miss Southwest Kansas Pageant as well as several Kansas high school athletic championship events sanctioned by the Kansas State High School Activities Association (including the Eight-Man Division 1 and 2 Football Championship games, Class 3-2-1A state wrestling tournament and the Class 1A girls' and boys' basketball tournament championship games). Smoky Hills PBS also broadcasts the Signature Auction, an annual fundraiser held each March; as |
https://en.wikipedia.org/wiki/GLtron | GLtron is a 3D snake game based on the light cycle portion of the film Tron. The game is free and open-source software and has been ported to many mobile and non-mobile operating systems such as Windows, MacOS, Symbian and Android over the years.
Development
After being originally a private university project by Andreas Umbach in June 1998, the game's open-source development started when the source code was put to SourceForge around 1999 under the GPL-2.0-or-later software license. The game's soundtrack features the track Revenge of the Cats, which was composed and performed by Finnish musician Peter Hajba, who is also known by his demoscene nickname Skaven. Ports to new platforms are primarily developed by the game's community.
Gameplay
The aim of the game is to be the last player riding. Cycles can be boosted with a limited turbo. There are various gameplay styles, including switching the gameplay from "booster" to "wall accel." to "both". "Booster" has an extra button for boosting, in addition to the standard left, right, glance left, glance right buttons, while "Wall ride" increases a player's light cycle's speed automatically depending on how close they are to an opponent's wall. "Both" incorporates both options for increasing the player's light cycle's speed.
There are several arena sizes that can be selected, from "tiny" (which is best for two players on normal speed or people practicing their reflexes with 3 "mcp himself" difficulty-level bots on "crazy" speed) to "vast".
The game is played using the keyboard to control the vehicle and the mouse to control the camera position, players can out ride competitors across the geometric grid.
Reception
In 2006, GLTron was recommended by The Mac Observer for its graphics and sound, considered good for a free software game, and support for different screen resolutions and input devices. Other reviews were positive too, for instance The Linux Game Tome gave 4/5 stars.
The game was ported to multiple systems like Linux, Windows, MacOS as also mobile systems that have support for OpenGL ES like Symbian, Android, and as also the OpenPandora handheld.
Gltron was downloaded between 2000 and 2016 1,500,000 times from SourceForge alone, while it is also packaged with many Linux distributions like Debian.
See also
References
External links
1999 video games
Classic Mac OS games
MacOS games
Windows games
Linux games
Symbian games
Open-source video games
Snake video games
Tron video games
Android (operating system) games
Free and open-source Android software
Video games developed in Switzerland
Video games scored by Peter Hajba |
https://en.wikipedia.org/wiki/KEYT-TV | KEYT-TV (channel 3) is a television station licensed to Santa Barbara, California, United States, serving the Central Coast of California as an affiliate of ABC, CBS, and MyNetworkTV. It is owned by the News-Press & Gazette Company (NPG) alongside San Luis Obispo-licensed low-power, Class A Fox affiliate KKFX-CD (channel 24); NPG also provides certain services Santa Maria-licensed Telemundo affiliate KCOY-TV (channel 12) through a shared services agreement (SSA) with VistaWest Media, LLC. KEYT-TV's studios are located on Miramonte Drive on TV Hill, overlooking downtown Santa Barbara; KCOY-TV and KKFX-CD share separate facilities at West McCoy Lane and Skyway Drive in Santa Maria north of Santa Maria Public Airport. KEYT-TV's transmitter is located atop Broadcast Peak, between Santa Barbara and Santa Ynez in the Santa Ynez Mountains.
History
Early years
KEYT-TV first signed on the air on May 31, 1953, after obtaining a construction permit from the Federal Communications Commission (FCC) on November 13, 1952. It was owned by the Santa Barbara Broadcasting & Television Corporation. Harry Butcher, who owned KIST (1340 AM), was a 14% owner of the new TV station.
During the 1950s, the station ran programming from all four TV networks: ABC, CBS, NBC and the DuMont Television Network. Dumont discontinued operations in 1956. The original owners sold the station to Key Television in 1957. KEYT-TV lost its NBC affiliation in 1964 when KCOY-TV in nearby Santa Maria signed on. KEYT then shared CBS with KCOY until 1969, when the inclusion of San Luis Obispo County into the Santa Barbara—Santa Maria media market resulted in KEYT becoming exclusively affiliated with ABC. KCOY became the CBS affiliate, and KSBY in San Luis Obispo became the region's NBC affiliate. KEYT was purchased by Shamrock Broadcasting in 1984.
Later developments
In September 1998, KEYT-TV owner Smith Broadcasting purchased radio station KTMS (1250 AM) for $1.6 million and launched an all-news format with new call letters KEYT to match those of its new TV sister. "KEYT 1250" featured news reports from the Associated Press and simulcasts of KEYT-TV newscasts. (The previous news/talk format and call letters of KTMS moved to 990 AM upon the sale to Smith.) The radio operation was a financial drain on Smith Broadcasting from the beginning, losing $1 million over five years, and the station was sold to Lazer Broadcasting in October 2003.
Between March and September 2007, as the station transitioned to a high definition signal, KEYT-HD was initially unavailable to cable subscribers in the Central Coast due to a carriage dispute with the local cable companies. KEYT eventually reached an agreement with Cox Communications in Santa Barbara, Comcast in Santa Maria, and Charter Cable in San Luis Obispo to carry its HDTV signal. In 2012, Time Warner Cable in Ventura County began carrying the HDTV signal.
On September 7, 2012, News-Press & Gazette Company announced that it had entered into an agreem |
https://en.wikipedia.org/wiki/Networked%20control%20system | A networked control system (NCS) is a control system wherein the control loops are closed through a communication network. The defining feature of an NCS is that control and feedback signals are exchanged among the system's components in the form of information packages through a network.
Overview
The functionality of a typical NCS is established by the use of four basic elements:
Sensors, to acquire information,
Controllers, to provide decision and commands,
Actuators, to perform the control commands and
Communication network, to enable exchange of information.
The most important feature of an NCS is that it connects cyberspace to physical space enabling the execution of several tasks from long distance. In addition, NCSs eliminate unnecessary wiring reducing the complexity and the overall cost in designing and implementing the control systems. They can also be easily modified or upgraded by adding sensors, actuators, and controllers to them with relatively low cost and no major change in their structure. Furthermore, featuring efficient sharing of data between their controllers, NCSs are able to easily fuse global information to make intelligent decisions over large physical spaces.
Their potential applications are numerous and cover a wide range of industries, such as space and terrestrial exploration, access in hazardous environments, factory automation, remote diagnostics and troubleshooting, experimental facilities, domestic robots, aircraft, automobiles, manufacturing plant monitoring, nursing homes and tele-operations. While the potential applications of NCSs are numerous, the proven applications are few, and the real opportunity in the area of NCSs is in developing real-world applications that realize the area's potential.
Types of communication networks
Fieldbuses, e.g. CAN, LON etc.
IP/Ethernet
Wireless networks, e.g. Bluetooth, Zigbee, and Z-Wave. The term wireless networked control system (WNCS) is often used in this connection.
Problems and solutions
Advent and development of the Internet combined with the advantages provided by NCS attracted the interest of researchers around the globe. Along with the advantages, several challenges also emerged giving rise to many important research topics. New control strategies, kinematics of the actuators in the systems, reliability and security of communications, bandwidth allocation, development of data communication protocols, corresponding fault detection and fault tolerant control strategies, real-time information collection and efficient processing of sensors data are some of the relative topics studied in depth.
The insertion of the communication network in the feedback control loop makes the analysis and design of an NCS complex, since it imposes additional time delays in control loops or possibility of packages loss. Depending on the application, time-delays could impose severe degradat |
https://en.wikipedia.org/wiki/Panamericana%20Televisi%C3%B3n | Panamericana Televisión (sometimes shortened to Panamericana and formerly known as PANTEL) is a Peruvian television network, which was founded on July 21, 1957 and had later begun its official broadcast on October 16, 1959.
History
Early years
The family of Genaro Delgado Brandt had owned radio stations in Peru since 1937. In 1953, Delgado Brandt founded Empresa Radiodifusora Panamericana S.A. ("Panamerican Radio Broadcasting Company"), whose primary station was Radio Panamericana.
Three of Delgado Brandt's kids—Genaro, Héctor and Manuel—became part of the family business. In 1956, Genaro Delgado Parker began to study the possibility of starting a television station to cover Lima, traveling to the United States, Mexico and Cuba to see the latest in television technology, and to bring it to his home country, Delgado Parker enlisted the help of Don Isaac Lindley, owner of the Inca Kola bottling plant and financial backer for the new station, and Cuban television magnate Goar Mestre, who offered him technical expertise as well as a relationship with CBS in the United States. In 1957, they established a television station called Panamericana Televisión, S.A., and a production company called Producciones Panamericana S.A.
The station had first begun its test broadcast on July 21, 1959, and then, later than two years, it began its official broadcasts on October 16, 1959, when OBXY-TV channel 13 took to the air for the first time. The launch program was hosted by Spanish actress Carmen Sevilla, while the new TV station drew on Radio Panamericana's brand by using the same ID music.
In 1963, Genaro and Héctor Delgado Parker, in association with Johnny E. Lindley, founded Radio Programas del Perú, a radio network, of which Manuel (the youngest of the three sons) was named manager. RPP would grow to be the largest radio station operator in the country.
In 1965, Panamericana Televisión moved from channel 13 to channel 5, taking on the callsign OAY-4A and improving signal reach and reception. Soon after, Panamericana had assembled a repeater network, with five affiliate stations and 60 retransmitters to serve the rest of Peru.
The early years also saw Panamericana define itself as the market leader; news programs such as El Panamericano, hosted by Humberto Martínez Morosini and Ernesto García Calderón among others, became highly rated, while telenovelas such as Simplemente María and Natacha found success in the Latin American market. In 1966, the variety show Trampolín a la Fama, hosted by converted radio personality Augusto Ferrando would be launched, staying on the air for thirty years and becoming one of the most popular programs in the country.
1970s and 1980s
The 1970s began with military dictatorship. On November 9, 1971, the state took over all television stations; the next day, Peru's President Juan Velasco Alvarado decreed the expropriation of 51% of all television stations and 25% of all radio stations. Genaro Delgado Parker did not accept t |
https://en.wikipedia.org/wiki/Very%20large%20database | A very large database, (originally written very large data base) or VLDB, is a database that contains a very large amount of data, so much that it can require specialized architectural, management, processing and maintenance methodologies.
Definition
The vague adjectives of very and large allow for a broad and subjective interpretation, but attempts at defining a metric and threshold have been made. Early metrics were the size of the database in a canonical form via database normalization or the time for a full database operation like a backup. Technology improvements have continually changed what is considered very large.
One definition has suggested that a database has become a VLDB when it is "too large to be maintained within the window of opportunity… the time when the database is quiet".
Sizes of a VLDB database
There is no absolute amount of data that can be cited. For example, one cannot say that any database with more than 1 TB of data is considered a VLDB. This absolute amount of data has varied over time as computer processing, storage and backup methods have become better able to handle larger amounts of data. That said, VLDB issues may start to appear when 1 TB is approached, and are more than likely to have appeared as 30 TB or so is exceeded.
VLDB challenges
Key areas where a VLDB may present challenges include configuration, storage, performance, maintenance, administration, availability and server resources.
Configuration
Careful configuration of databases that lie in the VLDB realm is necessary to alleviate or reduce issues raised by VLDB databases.
Administration
The complexities of managing a VLDB can increase exponentially for the database administrator as database size increases.
Availability and maintenance
When dealing with VLDB operations relating to maintenance and recovery such as database reorganizations and file copies which were quite practical on a non-VLDB take very significant amounts of time and resources for a VLDB database. In particular it typically infeasible to meet a typical recovery time objective (RTO), the maximum expected time a database is expected to be unavailable due to interruption, by methods which involve copying files from disk or other storage archives. To overcome these issues techniques such as clustering, cloned/replicated/standby databases, file-snapshots, storage snapshots or a backup manager may help achieve the RTO and availability, although individual methods may have limitations, caveats, license, and infrastructure requirements while some may risk data loss and not meet the recovery point objective (RPO). For many systems only geographically remote solutions may be acceptable.
Backup and recovery
Best practice is for backup and recovery to be architectured in terms of the overall availability and business continuity solution.
Performance
Given the same infrastructure there may typically be a decrease in performance, that is increase in response time as database size incr |
https://en.wikipedia.org/wiki/KARZ-TV | KARZ-TV (channel 42) is a television station in Little Rock, Arkansas, United States, affiliated with MyNetworkTV. It is owned by Nexstar Media Group alongside NBC affiliate KARK-TV (channel 4); Nexstar also provides certain services to Fox affiliate KLRT-TV (channel 16) and Pine Bluff–licensed CW affiliate KASN (channel 38) under a local marketing agreement (LMA) with Mission Broadcasting. The stations share studios at the Victory Building on West Capitol Avenue and South Victory Street (near the Arkansas State Capitol) in downtown Little Rock, while KARZ-TV's transmitter is located at the Shinall Mountain antenna farm, near the city's Chenal Valley neighborhood.
History
Early history
Leininger-Geddes Broadcasting (owned by Mobile, Alabama–based business consultant Dale Leininger and Darrell Geddes, then-pastor of Little Rock's Solid Rock Assembly of God) filed the initial application for the UHF channel 42 license with the Federal Communications Commission (FCC) on June 7, 1985. The group—which received approval for the construction permit in a proceeding by FCC administrative law judge Joseph Stirmer on November 4, 1986, later issued by the FCC on July 7, 1987—was granted the license over three other groups: Magnolia Communications (owned by Pine Bluff–based businessman U. S. McPherson); Capitol Communications Corp. (led by Little Rock-based corporate communications director Steve Stephens, minority owner of then-independent station KLRT-TV [channel 16]); and Maumelle TV Inc. (Magnolia and Maumelle TV's respective cases contesting Leininger-Geddes' application, both concerning management integration and issues with antenna height and possible adjacent channel interference with KJTM-TV [channel 38, now CW affiliate KASN], were dismissed with prejudice by Stirmer on June 26 and 30, 1986.) The construction permit remained dormant for nine years until Paxson Communications (now Ion Media) purchased a 49% share of the license—forming the joint venture Channel 42 of Little Rock, LLC—on June 21, 1996; Paxson entered into a local marketing agreement on August 21, 1996, deal was approved on September 17.
Channel 42 first signed on the air on December 1, 1997 as KVUT. Under Paxson, the station originally operated as an affiliate of the company's Infomall TV Network (InTV) infomercial service, supplemented by overnight religious programming from The Worship Network and the contemporary Christian Praise TV. Channel 42 changed its call letters to KYPX on March 16, 1998. Six months later, on August 31, KYPX became a charter affiliate of Paxson's fledgling family-oriented network Pax TV (eventually reformatted as general entertainment service i: Independent Television in July 2005, and renamed Ion Television in September 2007). The station originally maintained studio facilities located on South Shackleford Road (near I-430 and West 36th Street) in southwestern Little Rock. On April 2, 1999, Paxson purchased the 51% interest in KYPX held by Leininger-Gedd |
https://en.wikipedia.org/wiki/VMScluster | A VMScluster, originally known as a VAXcluster, is a computer cluster involving a group of computers running the OpenVMS operating system. Whereas tightly coupled multiprocessor systems run a single copy of the operating system, a VMScluster is loosely coupled: each machine runs its own copy of OpenVMS, but the disk storage, lock manager, and security domain are all cluster-wide, providing a single system image abstraction. Machines can join or leave a VMScluster without affecting the rest of the cluster. For enhanced availability, VMSclusters support the use of dual-ported disks connected to two machines or storage controllers simultaneously.
Initial release
Digital Equipment Corporation (DEC) first announced VAXclusters in May 1983. At this stage, clustering required specialised communications hardware, as well as some major changes to low-level subsystems in VMS. The software and hardware were designed jointly. VAXcluster support was first added in VAX/VMS V4.0, which was released in 1984. This version only supported clustering over DEC's proprietary Computer Interconnect (CI).
At the center of each cluster was a star coupler, to which every node (computer) and data storage device in the cluster was connected by one or two pairs of CI cables. Each pair of cables had a transmission rate of 70 megabits per second, a high speed for that era. Using two pairs gave an aggregate transmission rate of 140 megabits per second, with redundancy in case one cable failed; the star couplers also had redundant wiring for better availability.
Each CI cable connected to its computer via a CI Port, which could send and receive packets without any CPU involvement. To send a packet, a CPU had only to create a small data structure in memory and append it to a "send" queue; similarly, the CI Port would append each incoming message to a "receive" queue. Tests showed that a VAX-11/780 could send and receive 3000 messages per second, even though it was nominally a 1-MIPS machine. The closely related Mass Storage Control Protocol (MSCP) allowed similarly high performance from the mass storage subsystem. In addition, MSCP packets were very easily transported over the CI allowing remote access to storage devices.
VAXclustering was the first clustering system to achieve commercial success, and was a major selling point for VAX systems.
Later developments
In 1986, DEC added VAXclustering support to their MicroVAX minicomputers, running over Ethernet instead of special-purpose hardware. While not giving the high-availability advantages of the CI hardware, these Local Area VAXclusters (LAVc) provided an attractive expansion path for buyers of low-end minicomputers. LAVc also allowed diskless satellite nodes to bootstrap over the network using the system disk of a bootnode.
Later versions of OpenVMS (V5.0 and later) supported "mixed interconnect" VAXclusters (using both CI and Ethernet), and VAXclustering over DSSI (Digital Systems and Storage Interconnect), SCSI and FD |
https://en.wikipedia.org/wiki/Combat%20Mission | Combat Mission is the name of a series of computer wargames simulating tactical battles. The series has progressed through two distinct game engines. The original game engine, referred to as 'CMx1' by the developer, Battlefront.com, powered a trio of games set in the Second World War. Combat Mission: Shock Force was released in July 2007 as the debut of the 'CMx2' game engine. The Combat Mission games are a mixture of turn-based gameplay and simultaneous real-time execution. The game environment is fully three-dimensional, with a "Wego" style of play wherein each player enters their orders into the computer simultaneously during pauses in the action, and then are powerless to intervene during the action phase. More familiar turn-based games use an "I-go/You-go" system of play.
History
Charles Moylan worked on several of Avalon Hill's computer projects, including Flight Commander 2, Achtung Spitfire, and Over the Reich. In 1997 he was unofficially working on a computer adaptation of the famous Advanced Squad Leader board game. Moylan came to realize, however, that the game would be difficult or impossible to adapt successfully to a computerized version. Atomic Games had also attempted to produce a "Computer Squad Leader" game, but abandoned the tie-in to ASL and eventually marketed the game (successfully) as Close Combat.
In the beginning of 1998 Avalon Hill was in turmoil and unstable to work for, and Moylan decided to go his own way, as Big Time Software, shortly before Avalon Hill was purchased by Hasbro. The move from Avalon Hill also meant severing ties to ASL; the unfinished project had no references to Advanced Squad Leader or Avalon Hill. Moylan briefly offered the Alpha build (tentatively called Squad Leader) to publishers before teaming up with Steve Grammont, forming what eventually became Battlefront.com and re-christening the new game Combat Mission.
Battlefront produced the first game in the Combat Mission series, Combat Mission: Beyond Overlord, in 2000. The game was successful and spawned two additional titles, as well as a second generation game engine with plans for many new titles and modules bearing the Combat Mission name. Big Time Software eventually became known as Battlefront.com, with additional members being hired, including Martin van Balkom, Dan Olding, and Fernando Julio Carrera Buil and Matt Faller, who handle the company website, graphics and sound design, and organizing beta testing of new products. Combat Mission remains the flagship series of the Battlefront.com line. In July 2010, a second programmer was hired by BFC to assist with the production of Combat Mission games.
Game series
Three titles using the original game engine were released by battlefront.com:
Combat Mission: Beyond Overlord 2000
Combat Mission II: Barbarossa to Berlin 2002
Combat Mission 3: Afrika Korps 2004
These three games are commonly said to belong to the 'CMx1' engine. An operational layer was also planned for Barbarossa to Berlin |
https://en.wikipedia.org/wiki/Rail%20transport%20in%20Namibia | Rail service in Namibia is provided by TransNamib. The Namibian rail network consists of 2,687 route-km of tracks (2017).
Namibia has a history of more than 100 years of railway service. During the colonialisation by the German Empire between 1894 and 1915, a number of railways were built, of which some are still in service today.
History
Early development
The building of German South West Africa railways began with a small mining rail line at Cape Cross in 1895. The first major railway project was started in 1897 when the German Colonial Authority built the "Staatsbahn" (state railway) from Swakopmund to Windhoek. By 1902 the line was completed. Parallel to this government initiative the Otavi Mining and Railway Company (O.M.E.G.) was established which built a line from Swakopmund to Tsumeb via Otavi between 1903 and 1906, and a branch from Otavi to Grootfontein in 1907/08.
In 1914 the following railway lines existed:
The Cape Cross line, 2 feet 6 inch gauge; 13 miles long, built by George Gale, General Foreman in the Harbour Department at Durban using 18 lbs per yard rails
The German State Railways, 3 feet 6 inch gauge; 870 miles long
The German State Railways, 2 feet gauge; 120 miles long
The Otavi Railway, 2 feet gauge; 418 miles long
The Walvis Bay Railway, 2 feet 6 inches gauge; about 11 miles long
Several other 2 feet gauge branch lines to mines at Khan, Kalkfelt and Outjo<ref>A.J. Beaton: [https://hdl.handle.net/10520/AJA10212019_15119 Notes on railway construction during the 1914-15 campaign in German South-West Africa.] Civil Engineering (Siviele Ingenieurswese), Vol 1916, No 1.</ref>
The German colonial railway was taken over by the Railways of South Africa after World War I, and linked into the network of South Africa. After the independence of Namibia, TransNamib took control of the national rail network that operates on .
African Rail Conference
Plans to integrate the railways of Africa to facilitate trade were discussed at the Africa Rail conference in Johannesburg, South Africa in August 2002. The move forms part of the New Partnership for Africa's Development (NEPAD), a programme aimed at economic renaissance.
The railways were built by former colonial powers, but were not built to advance African interests. Plans were put into place to link the three parallel east-west lines in Angola and to connect the Angolan network to that of Namibia and hence to South Africa.
The strategic positioning of Maputo rail and port infrastructure indicated that the network should be promoted as the primary corridor serving Zimbabwe, Zambia, Democratic Republic of Congo, Eswatini, and South Africa's Mpumalanga province.
South Africa's transport minister, Abdulah Omar, said Africa needed to integrate its railway systems to form an internationally-competitive network. Experts said this could involve leasing locomotives and wagons, becoming involved as concessionaires and consultants, and participating in joint ventures.
Current Railway |
https://en.wikipedia.org/wiki/McCann%20%28company%29 | McCann, formerly McCann Erickson, is an American global advertising agency network, with offices in 120 countries. McCann is part of McCann Worldgroup, along with several other agencies, including direct digital marketing agency MRM//McCann, experiential marketing agency Momentum Worldwide, healthcare marketing group McCann Health, and public-relations and strategic-communications agency Weber Shandwick.
McCann Worldgroup, along with agency networks MullenLowe and FCB, make up The Interpublic Group of Companies (IPG), one of the four large holding companies in the advertising industry.
Ad campaigns
In 1964, the "Put a Tiger in Your Tank" campaign was developed by McCann Erickson for Esso. Sales soared and the advertising became the talk of the land; Time magazine declared 1964 to be "The Year of the Tiger" along Madison Avenue.
McCann Erickson created Coca-Cola's "It's The Real Thing" slogan and ad campaign, including the 1971 "Hilltop" ad, which featured the "I'd Like to Buy the World a Coke" jingle. The song for the commercial was recorded by The New Seekers, and first aired as a radio ad before being made into a television commercial. The song was rerecorded for commercial release as "I'd Like to Teach the World to Sing (In Perfect Harmony)". The commercial was featured in the final episode of the TV series Mad Men. McCann Erickson also developed the "Army Strong" campaign for the United States Army. The company also developed the MasterCard commercial saying "There are some things money can't buy. For everything else, there's MasterCard", as well as the Rice-a-Roni jingle (based on a 1923 song, "Barney Google"). McCann Erickson also developed the Gold Blend couple advertisements for Nescafé, which aired from 1987 to 1993. McCann worked on Russia Today's 2008 rebranding and came up with their slogan, "Question More".
Other McCann campaigns have included “Quick, Henry the Flit!” from the 1928 ads created by Theodor (Dr. Seuss) Geisel; “You can be sure… if it’s Westinghouse” from 1954, which featured the actress and consumer advocate Betty Furness in the commercials; “Wouldn’t you really rather have a Buick,” from 1965; and “It’s Better in the Bahamas,” from 1976.
The agency also introduced the line, “If you’ve got the time, we’ve got the beer” for Miller High Life in 1971, and then “Everything you’ve always wanted in a beer. And less.” in the 1973 introduction of Miller Lite beer. During Super Bowl XIV in 1980, the agency ran a Coca-Cola commercial starring the Pittsburgh Steelers defensive tackle “Mean” Joe Greene that USA Today's Ad Meter poll of readers ranked in 2016 as the No. 1 Super Bowl commercial of all time.
In 1973, McCann New York launched the campaign for L’Oréal's hair coloring products featuring the line, “Because I’m Worth It.” It featured three female personalities beginning with Joanne Dusseau, Meredith Baxter Birney and Cybill Shepherd, explaining why they were willing to spend more for their hair.
In 2012, McCann Mel |
https://en.wikipedia.org/wiki/IEEE%20802.11k-2008 | IEEE 802.11k-2008 is an amendment to IEEE 802.11-2007 standard for radio resource measurement. It defines and exposes radio and network information to facilitate the management and maintenance of a mobile Wireless LAN. IEEE 802.11k was incorporated in IEEE Std 802.11-2012; see IEEE 802.11.
Radio Resource Measurement
IEEE 802.11k and 802.11r are industry standards that enable seamless Basic Service Set (BSS) transitions in the WLAN environment. The 802.11k standard provides information to discover the best available access point.
802.11k is intended to improve the way traffic is distributed within a network. In a wireless LAN, each device normally connects to the access point (AP) that provides the strongest signal. Depending on the number and geographic locations of the subscribers, this arrangement can sometimes lead to excessive demand on one AP and underutilization of others, resulting in degradation of overall network performance. In a network conforming to 802.11k, if the AP having the strongest signal is loaded to its full capacity, a wireless device is connected to one of the underutilized APs. Even though the signal may be weaker, the overall throughput is greater because more efficient use is made of the network resources.
Protocol operation
The following steps are performed before switching to a new access point.
Access point determines that client is moving away from it.
Informs client to prepare to switch to a new access point.
Client requests list of nearby access points
Access point gives site report
Client moves to best access point based on report
See also
IEEE 802.11v
References
External links
IEEE Task Group TGk
K
Radio resource management |
https://en.wikipedia.org/wiki/Principle%20of%20least%20privilege | In information security, computer science, and other fields, the principle of least privilege (PoLP), also known as the principle of minimal privilege (PoMP) or the principle of least authority (PoLA), requires that in a particular abstraction layer of a computing environment, every module (such as a process, a user, or a program, depending on the subject) must be able to access only the information and resources that are necessary for its legitimate purpose.
Details
The principle means giving any users account or processes only those privileges which are essentially vital to perform its intended functions. For example, a user account for the sole purpose of creating backups does not need to install software: hence, it has rights only to run backup and backup-related applications. Any other privileges, such as installing new software, are blocked. The principle applies also to a personal computer user who usually does work in a normal user account, and opens a privileged, password protected account only when the situation absolutely demands it.
When applied to users, the terms least user access or least-privileged user account (LUA) are also used, referring to the concept that all user accounts should run with as few privileges as possible, and also launch applications with as few privileges as possible.
The principle of (least privilege) is widely recognized as an important design consideration towards enhancing and giving a much needed 'Boost' to the protection of data and functionality from faults (fault tolerance) and malicious behavior.
Benefits of the principle include:
Intellectual Security. When code is limited in the scope of changes it can make to a system, it is easier to test its possible actions and interactions with other security targeted applications. In practice for example, applications running with restricted rights will not have access to perform operations that could crash a machine, or adversely affect other applications running on the same system.
Better system security. When code is limited in the system-wide actions it may perform, vulnerabilities in one application cannot be used to exploit the rest of the machine. For example, Microsoft states “Running in standard user mode gives customers increased protection against inadvertent system-level damage caused by "shatter attacks" and malware, such as root kits, spyware, and undetectable viruses”.
Ease of deployment. In general, the fewer privileges an application requires, the easier it is to deploy within a larger environment. This usually results from the first two benefits, applications that install device drivers or require elevated security privileges typically have additional steps involved in their deployment. For example, on Windows a solution with no device drivers can be run directly with no installation, while device drivers must be installed separately using the Windows installer service in order to grant the driver elevated privileges.
In practice, |
https://en.wikipedia.org/wiki/Apple%20Disk%20Image | Apple Disk Image is a disk image format commonly used by the macOS operating system. When opened, an Apple Disk Image is mounted as a volume within the Finder.
An Apple Disk Image can be structured according to one of several proprietary disk image formats, including the Universal Disk Image Format (UDIF) from Mac OS X and the New Disk Image Format (NDIF) from Mac OS 9. An Apple disk image file's name usually has ".dmg" as its extension. A disk image is a compressed copy of the contents of a disk or folder. Disk images have .dmg at the end of their names. To see the contents of a disk image, you must first open the disk image so it appears on the desktop or in a Finder window.
Features
Apple Disk Image files are published with a MIME type of application/x-apple-diskimage.
Different file systems can be contained inside these disk images, and there is also support for creating hybrid optical media images that contain multiple file systems. Some of the file systems supported include Hierarchical File System (HFS), HFS Plus (HFS+), File Allocation Table (FAT), ISO9660, and Universal Disk Format (UDF).
Apple Disk Images can be created using utilities bundled with Mac OS X, specifically Disk Copy in Mac OS X v10.2 and earlier and Disk Utility in Mac OS X v10.3 and later. These utilities can also use Apple disk image files as images for burning CDs and DVDs. Disk image files may also be managed via the command line interface using the utility.
In Mac OS X v10.2.3, Apple introduced Compressed Disk Images and Internet-Enabled Disk Images for use with the Apple utility Disk Copy, which was later integrated into Disk Utility in 10.3. The Disk Copy application had the ability to display a multilingual software license agreement before mounting a disk image. The image will not be mounted unless the user indicates agreement with the license.
An Apple Disk Image allows secure password protection as well as file compression, and hence serves both security and file distribution functions; such a disk image is most commonly used to distribute software over the Internet.
History
Apple originally created its disk image formats because the resource fork used by Mac applications could not easily be transferred over mixed networks such as those that make up the Internet. Even as the use of resource forks declined with Mac OS X, disk images remained the standard software distribution format. Disk images allow the distributor to control the Finder's presentation of the window, which is commonly used to instruct the user to copy the application to the correct folder.
A previous version of the format, intended only for floppy disk images, is usually referred to as "Disk Copy 4.2" format, after the version of the Disk Copy utility that was used to handle these images. A similar format that supported compression of floppy disk images is called DART.
New Disk Image Format (NDIF) was the previous default disk image format in Mac OS 9, and disk images with this fo |
https://en.wikipedia.org/wiki/Computex | COMPUTEX Taipei, or Taipei International Information Technology Show (), is a computer expo held annually in Taipei, Taiwan. Since the early 2000s, it is one of the largest computer and technology trade shows in the world.
The last COMPUTEX was held from 30 May to 2 June 2023 with sessions about such topics as high-performance computing, artificial intelligence, next-gen connectivity and sustainability.
COMPUTEX 2020 was cancelled after a delay from early June to 28 September due to public health safety concerns of the COVID-19 pandemic.
COMPUTEX is co-organized by government-funded Taiwan External Trade Development Council (TAITRA) and private sector Taipei Computer Association (TCA). The first expo, then called Taipei Computer Show, was held in 1981 and started out as a place where small and medium-sized businesses in Taiwan's nascent computer industry could display their products. Stan Shih, a former head of the TCA, proposed to change to the current name in the fourth expo. As Taiwan's information technology industry took off in the early 1990s and as the Foreign Trade Council Display Hall in Taipei Songshan Airport was put back into use in the eighth and ninth expo, COMPUTEX has since rapidly expanded and become an important showcase for the IT industry globally. On 28 November 2018 (the same day that Deutsche Messe AG announced that there would not be a 2019 CeBIT), it became the largest computer expo in the world, with participation from major manufacturers such as Intel, AMD, NVIDIA, and others, as well as Taiwanese brand names such as Acer and ASUS.
Venues
Beginning
The precedent of COMPUTEX in 1981, was held in the Songshan Airport Exhibition Hall. In 1986, the Taipei World Trade Center (TWTC) Exhibition Hall on Xinyi Road of Taipei City was used for COMPUTEX for the first time and continues to be the major location for the expo since then. Then following the rise in the demands for more stands and halls, the Taipei International Convention Center, the Taipei World Trade 2nd and 3rd Hall opens successively to meet the demand. After the opening of the International Convention Center opens, major companies such as Intel, Texas Instruments, etc. joined expo. Then companies such as ASUS, and Acer joined the expo after the opening of the TWTC 2nd Hall.
The Reopening of the Taipei Songshan Airport Exhibition Hall
In 1989, due to the shortcoming of the expo grounds, the Foreign Trade Council Exhibition Hall was put back into use. Yet there is still a shortage of space, and several major companies have to resort to using a single stand to display their products, bringing down the expo quality. The second year, 1990, the sponsors split up the display content into inland sales and foreign sales to solve the falling quality problem. The inland sales part was canceled in 1991, and transformed into the Taipei Computer Application Show in the August of the same year.
Opening of the New Exhibition Hall
After the show return to pure foreign |
https://en.wikipedia.org/wiki/Look-Aside%20Interface | The Look-Aside Interface is a computer interface that was specified by an interface interoperability agreement produced by the Network Processing Forum. It specifies the method to interface a Network Processing Element (of which an NPU is an example) to a Network Search Element (of which a CAM is an example). The interface is used by devices that off-load certain tasks from the network processor.
Numerous devices which implement the LA interface have been produced. Companies which have implemented these devices include Integrated Device Technology and Cypress Semiconductor.
External Reference
NPF LA-1 Interface Interoperability Agreement
Networking hardware
Networking standards |
https://en.wikipedia.org/wiki/IBM%20Naval%20Ordnance%20Research%20Calculator | The IBM Naval Ordnance Research Calculator (NORC) was a one-of-a-kind first-generation (vacuum tube) computer built by IBM for the United States Navy's Bureau of Ordnance. It went into service in December 1954 and was likely the most powerful computer at the time. The Naval Ordnance Research Calculator (NORC), was built at the Watson Scientific Computing Laboratory under the direction of Wallace Eckert.
The computer was presented to the US Navy on December 2, 1954. At the presentation ceremony, it calculated pi to 3,089 digits, which was a record at the time. The calculation took only 13 minutes. In 1955, NORC was moved to the Naval Proving Ground at Dahlgren, Virginia. It was their main computer until 1958, when more modern computers were acquired. It continued to be used until 1963. Its design influenced the IBM 701 and subsequent machines in the IBM 700 series of computers.
Technology
The machine originally used Williams–Kilburn tubes for memory which stored 2,000 words electrostatically, with an access time of 8 microseconds. Each word consisted of 16 decimal digits, using four bits to represent each digit, plus two modulo-4 error-checking bits. A word could store a 13-digit number with sign and 2-digit index, or one instruction. NORC used four sets of 66 electrostatic tubes in parallel for memory. Each of the tubes in a set of 66 stored one bit of each of 500 words, so each of the four sets of 66 tubes stored 2,000 words. An upgrade to the addressing circuitry for the Williams tubes allowed memory per tube to be expanded from 500 bits to 900 bits, expanding the total memory to 3,600 words without needing to add any more Williams tubes.
At some point the Williams tube memory was replaced with 20,000 words of magnetic-core memory, with an access time of 8 microseconds.
The speed of the NORC was 15,000 operations per second. An addition took 15 microseconds, a multiplication took 31 microseconds, and a division took 227 microseconds, not counting memory access time and checking. It had the capacity to do double precision arithmetic, which was used occasionally.
The main hardware consisted of 1,982 pluggable units, each of which typically had several vacuum tubes plus supporting electronics. There were 62 types of pluggable units, but half of the circuitry used only six of the types and 80% of the circuitry used only 18 of the types. With 1,300 vacuum tubes in the three systems of the computer, the NORC had a total of 9,800 vacuum tubes and 10,000 crystal diodes were used.
The NORC had eight magnetic tape units which were similar to the tape drives on the IBM 701 system. The reels were 8 inches in diameter and somewhat similar in appearance to a metal 16 mm film reel. Unlike the 701 series tape drives, there was no operator control panel on the face of the machine, instead there were buttons placed on the top front of the machines that were used to initiate tape loading, rewinding, unloading, etc. The drives could read or write 7 |
https://en.wikipedia.org/wiki/Water%20quality%20modelling | Water quality modeling involves water quality based data using mathematical simulation techniques. Water quality modeling helps people understand the eminence of water quality issues and models provide evidence for policy makers to make decisions in order to properly mitigate water. Water quality modeling also helps determine correlations to constituent sources and water quality along with identifying information gaps. Due to the increase in freshwater usage among people, water quality modeling is especially relevant both in a local level and global level. In order to understand and predict the changes over time in water scarcity, climate change, and the economic factor of water resources, water quality models would need sufficient data by including water bodies from both local and global levels.
A typical water quality model consists of a collection of formulations representing physical mechanisms that determine position and momentum of pollutants in a water body. Models are available for individual components of the hydrological system such as surface runoff; there also exist basin wide models addressing hydrologic transport and for ocean and estuarine applications. Often finite difference methods are used to analyze these phenomena, and, almost always, large complex computer models are required.
Building A Model
Water quality models have different information, but generally have the same purpose, which is to provide evidentiary support of water issues. Models can be either deterministic or statistical depending on the scale with the base model, which is dependent on if the area is on a local, regional, or a global scale. Another aspect to consider for a model is what needs to be understood or predicted about that research area along with setting up any parameters to define the research. Another aspect of building a water quality model is knowing the audience and the exact purpose for presenting data like to enhance water quality management for water quality law makers for the best possible outcomes.
Formulations and associated Constants
Water quality is modeled by one or more of the following formulations
Advective Transport formulation
Dispersive Transport formulation
Surface Heat Budget formulation
Dissolved Oxygen Saturation formulation
Reaeration formulation
Carbonaceous Deoxygenation formulation
Nitrogenous Biochemical Oxygen Demand formulation
Sediment oxygen demand formulation (SOD)
Photosynthesis and Respiration formulation
pH and Alkalinity formulation
Nutrients formulation (fertilizers)
Algae formulation
Zooplankton formulation
Coliform bacteria formulation (e.g. Escherichia coli )
SPARROW Models
A SPARROW model is a SPAtially-Referenced Regression on Watershed attributes, which helps integrate water quality data with landscape information. More specifically the USGS used this model to display long-term changes within watersheds to further explain in-stream water measurement in relation to upstream sources, wa |
https://en.wikipedia.org/wiki/FORE%20Systems | FORE Systems was a computer network switching equipment company based in Pittsburgh, Pennsylvania. Founded in 1990 to supply Asynchronous Transfer Mode (ATM) cards for workstation computers, it soon branched out to become a major supplier in the ATM switch market and the extended those product lines to add Internet Protocol switching and other devices.
FORE was purchased by the British General Electric Company (GEC) in 1999, just before the dot-com bubble, which eventually drove GEC to reform the company as Marconi. Ericsson purchased most of Marconi in 2006.
History
Francois Bitz, Onat Menzilcioglu, Robert Sansom and Eric Cooper were researchers at Carnegie Mellon University who felt their 1989 project to supply a US Naval Research Laboratories Request for Development had commercial potential. They formed FORE, using the first letter of their first names, in 1990 in the Pittsburgh suburb of Warrendale, Pennsylvania. The company went public in May 1994.
FORE initially produced Asynchronous Transfer Mode (ATM) network interface cards for Sun Microsystems' SBus and DEC's TURBOchannel based computers in addition to ATM adapters for Silicon Graphics computers. FORE's first ATM switch – the ASX-100 – connected sixteen ATM ports each with a capacity of 155.52 Mbit/s. Later interface adapters for the follow-on ASX-200, ASX-1000, and ASX-4000 switches allowed connections up to 2.5 Gbit/s.
The company established a leading position in the market for ATM switching equipment. FORE created a memory-based ATM switch that captured a strong portion of the ATM market. Other technologies include Internet Protocol, Gigabit Ethernet and Firewall switching. FORE Systems also supported advanced dynamic routing protocols such as the ForeThought Private Network Network Interface (PNNI) and the ATM Forum's PNNI protocol.
FORE was acquired by London-based GEC (now Marconi Corporation plc) on 26 April 1999 to complement its Marconi Communications business and to increase its presence in North America, the world's largest telecoms market. This was near the peak of the dot-com bubble. The £2.8bn (US$4.5bn) ($ billion today) price tag for FORE and the £1.3n spent on Reltec a month earlier took a heavy toll on Marconi following the burst of the bubble in 2000/2001.
In July 2001 Marconi plc suffered a 54% drop in its share price following suspension of trading of its shares, a profits warning and redundancies. The company survived following a relaunch as Marconi Corporation plc in a debt-for-equity swap whereby the firm's creditors received 99.5% of the new company's shares.
In 2006, Ericsson purchased most of Marconi, including the part that used to be FORE Systems. In 2008, Ericsson closed the Warrendale plant and sold off the corporate HQ.
Acquisition history
1999Euristix Ltd., a telecommunications software company based in Dublin, Ireland for $81 million. Euristix delivered network management and Intelligent Networking software expertise.
1998Berkeley Networks In |
https://en.wikipedia.org/wiki/European%20route%20E94 | European route E 94 is part of the International E-road network, which is a series of main roads in Europe.
The E 94 starts in western Greece in Corinth, Greece and through Attiki Odos (A6) runs east through Megara and Eleusis and ends in the Greek capital of Athens at the Saronic Gulf in the east.
gallery
External links
UN Economic Commission for Europe: Overall Map of E-road Network (2007)
94
E094 |
https://en.wikipedia.org/wiki/KCOY-TV | KCOY-TV (channel 12) is a television station licensed to Santa Maria, California, United States, serving the Central Coast of California as an affiliate of the Spanish-language network Telemundo. It is owned by VistaWest Media, LLC, which maintains a shared services agreement (SSA) with the News-Press & Gazette Company (NPG), owner of Santa Barbara–licensed ABC/CBS affiliate KEYT-TV (channel 3) and Class A Fox affiliate KKFX-CD (channel 24). KCOY-TV and KKFX-CD share studios on West McCoy Lane in Santa Maria; KEYT-TV maintains separate facilities on TV Hill, overlooking downtown Santa Barbara. KCOY-TV's transmitter is located on Tepusquet Peak east of Santa Maria. KKFX-CD broadcasts the same subchannels in the San Luis Obispo area.
Channel 12 was added to Santa Maria as a result of the Federal Communications Commission deciding to deintermix Fresno by forcing that city's lone VHF station, KFRE-TV, to a UHF channel and removing channel 12 from Fresno. Four groups applied, and Central Coast Television—a consortium of local residents—was granted the construction permit to build the station in 1963. KCOY-TV began broadcasting as an NBC affiliate on March 16, 1964. In 1968, half of the company was purchased by Dale Moore of Missoula, Montana; the station switched affiliations to CBS the next year, and the local investors bought back Moore's stake in 1971. Under the ownership of Stauffer Communications from 1980 to 1995, KCOY-TV remained the second-rated local news outlet on the southern Central Coast in the 1980s and 1990s; the present Santa Maria studio building was completed in 1988. When Stauffer was purchased by Morris Communications in 1995, the combined firm immediately spun off its television holdings, mostly to Benedek Broadcasting; the station then changed hands three times in twelve years.
In 2013, the News-Press & Gazette Company assumed some of KCOY-TV's operations and acquired outright most of Cowles's Central Coast media holdings. The two stations' newsrooms were merged. The KCOY-TV license was sold to VistaWest Media, a company controlled by NPG's president and general manager. On January 1, 2021, NPG moved the CBS affiliation to a subchannel of KEYT-TV, still branded as "NewsChannel 12". KCOY-TV then broadcast Dabl, a diginet, until 2023, when the company acquired the Telemundo affiliation from KTAS and moved its main signal to KCOY-TV. The station offers regional newscasts shared with NPG's Telemundo affiliate in the Monterey–Salinas area, KMUV-LD.
History
Channel 12 comes to Santa Maria
In July 1960, the Federal Communications Commission (FCC) ordered television station KFRE-TV in Fresno to move from channel 12 to channel 30 as part of a years-long debate over deintermixture—the conversion of markets with both very high frequency (VHF) and ultra high frequency (UHF) stations to all-UHF. The FCC then sought to relocate channel 12 to a city on the southern Central Coast: it listed Lompoc, Santa Barbara, San Luis Obispo, and Santa M |
https://en.wikipedia.org/wiki/PuzzleCrack | PuzzleCrack was an annual tradition at the University of Illinois at Urbana-Champaign. It is a weeklong puzzlehunt competition that combines problem-solving with computer hacking.
History
The competition began in October 2002 under the name Puzzlehack. It took place during the annual UIUC ACM's reflections❘projections conference in 2002 and 2003, was sponsored by Microsoft, and was run by Microsoft employees and UIUC alumni Josh Michaels and Igor Kofman.
In October 2004, Don Schmidt and Dan Sledz took over as heads of Puzzlehack. The year's contest was simply known as "Puzzle 3".
In 2005, the contest returned under a new name, PuzzleCrack, and was run by past winner and UIUC alumnus Bert Johnson of Allbase, Inc. Google and ACM provided prizes. 2005's contest involved a record number of participants.
PuzzleCrack 2006 was run from October 16 to October 20, 2006, again by Bert Johnson of Allbase. Prizes were sponsored by Microsoft, and, once again, records were broken. More than 5,000 people viewed the puzzles and hundreds of teams participated.
PuzzleCrack 2007 took place from October 8 to October 12, 2007 and was run by "The Big Enchilada". Prizes were provided by Amazon.com and Microsoft, and both viewership and participation broke the previous year's records.
PuzzleCrack 2008 took place between October 20 to October 24, 2008, again by "The Big Enchilada". Prizes were provided by Amazon.com and Microsoft. This was the first year where the competition ended in a tie.
PuzzleCrack 2009 was initially delayed to the Spring of 2010 due to time constraints, but as of November 2011, no further PuzzleCrack events have been held.
Related
PuzzleCrunch is a similar, one-day puzzlehunt which has been run twice during the Spring. The competition was first run by Bert Johnson with Microsoft as a sponsor in 2006. It was last run by "The Big Enchilada" on April 26, 2008, with Amazon.com and Microsoft providing prizes.
Past winners
External links
Puzzlehack Home
PuzzleCrack Home
Puzzle hunts
University of Illinois Urbana-Champaign |
https://en.wikipedia.org/wiki/Before%20the%20Game | Before the Game was an Australian rules football comedy panel television show which aired on Network Ten on 1 March 2003 until 27 September 2013. The show was hosted by Andrew Maher with regular panelists Mick Molloy, Dave Hughes, Anthony Lehmann and Neroli Meadows. The format of the show was light-hearted discussion and analysis of Australian Football League (AFL) news and views and included appearances by current players.
History
After the Game (2003)
Before the Game first aired on 1 March 2003 as After the Game. Originally, it was a half-hour broadcast following the Saturday night AFL match, aired at either or (depending on whether the televised match was live or delayed). During the existence of After the Game, the show was rated M and contained occasional profanity. The show was a cult hit. One notable act was when the After the Game team shaved Fraser Gehrig's mullet off at the end of the 2003 Season.
Before the Game (2004–2013)
Following the show's success in its late time slot, it was moved to a time slot on 27 March 2004. When it moved to the primetime slot, to make it more 'family-friendly', it was given a PG rating.
The show originally aired in between the Saturday afternoon and Saturday night telecasts on Ten. Following the end of the 2011 season, the fate of Before the Game was unknown, as Ten had lost its AFL broadcast rights to the Seven Network. However, in 2012, Ten confirmed the show would return, with the entire panel from the previous year in its regular 6:30pm time slot, and that the format may be altered slightly. This was similar to the Nine Network's decision to keep The Footy Show after it lost AFL broadcast rights at the end of the 2006 season. On 21 June 2012, Before the Game moved from Saturdays at 6.30pm to Thursdays at 8.30pm in Victoria, South Australia and Western Australia, and it also aired on One at 10.30pm in New South Wales and Queensland.
In 2013, Before the Game returned to its original time slot of 6:30pm on Saturday. The game broke new ground on 24 August 2013, when it screened on One, the Ten Network's digital channel. The Ten Network was contractually bound to telecast the Bledisloe Cup rugby union test series live on its main channel, hence the change. Fox Sports presenter Neroli Meadows joined the panel in 2013, replacing Sam Lane, who left to join the Seven Network for its Saturday night AFL coverage.
The show was axed on 13 December 2013.
Presenters
Host
Andrew Maher (2005–2013)
Regular panelists
Mick Molloy (2007-2013)
Dave Hughes (2003-2013)
Anthony Lehmann (2004-2013)
Neroli Meadows (2013)
Ryan ‘Fitzy’ Fitzgerald, and Peter Helliar, playing Bryan Strauchan/‘Strauchanie’, make regular cameo appearances.
Former panelists
Anthony Hudson (2003–2004)
Bryan Strauchan
Peter Helliar (2003–2006)
Sam Lane (2003–2012)
Damian Callinan (2003)
Recurring segments
Tool of the Week
The "Tool of the Week" is an award given by Dave Hughes and sponsored by Home Hardware. The award was give |
https://en.wikipedia.org/wiki/Operations%20support%20system | Operations support systems (OSS), operational support systems in British usage, or Operation System (OpS) in NTT, are computer systems used by telecommunications service providers to manage their networks (e.g., telephone networks). They support management functions such as network inventory, service provisioning, network configuration and fault management.
Together with business support systems (BSS), they are used to support various end-to-end telecommunication services. BSS and OSS have their own data and service responsibilities. The two systems together are often abbreviated OSS/BSS, BSS/OSS or simply B/OSS.
The acronym OSS is also used in a singular form to refer to all the Operations Support Systems viewed as a whole system.
Different subdivisions of OSS have been proposed by the TM Forum, industrial research labs, or OSS vendors. In general, an OSS covers at least the following five functions:
Network management systems
Service delivery
Service fulfillment, including the network inventory, activation and provisioning
Service assurance
Customer care
History
Before about 1970, many OSS activities were performed by manual administrative processes. However, it became obvious that much of this activity could be replaced by computers. In the next 5 years or so, the telephone companies created a number of computer systems (or software applications) which automated much of this activity. This was one of the driving factors for the development of the Unix operating system and the C programming language. The Bell System purchased their own product line of PDP-11 computers from Digital Equipment Corporation for a variety of OSS applications. OSS systems used in the Bell System include AMATPS, CSOBS, EADAS, Remote Memory Administration System (RMAS), Switching Control Center System (SCCS), Service Evaluation System (SES), Trunks Integrated Record Keeping System (TIRKS), and many more. OSS systems from this era are described in the Bell System Technical Journal, Bell Labs Record, and Telcordia Technologies (now part of Ericsson) SR-2275.
Many OSS systems were initially not linked to each other and often required manual intervention. For example, consider the case where a customer wants to order a new telephone service. The ordering system would take the customer's details and details of their order, but would not be able to configure the telephone exchange directly—this would be done by a switch management system. Details of the new service would need to be transferred from the order handling system to the switch management system—and this would normally be done by a technician re-keying the details from one screen into another—a process often referred to as "swivel chair integration". This was clearly another source of inefficiency, so the focus for the next few years was on creating automated interfaces between the OSS applications—OSS integration. Cheap and simple OSS integration remains a major goal of most telecom companies.
Ar |
https://en.wikipedia.org/wiki/Cossacks%20II%3A%20Napoleonic%20Wars | Cossacks II: Napoleonic Wars is the fourth computer game in the Cossacks series of real-time strategy games, released in Spring 2005. This game focuses exclusively on the Napoleonic era, meaning it has a much shorter time span than others in this series, which spanned several centuries. Therefore, fewer technologies can be researched than in other Cossacks games, and there aren't as many different unit types for each country as before. On the other hand, Cossacks II allows a large number of units to be trained and it has many tactical options and an updated graphical engine.
Gameplay
The Cossacks series has always been noted for having a large number of units on screen simultaneously, and that all are controllable at the same time; this game is no exception. The limit of soldiers that can be used at the same time is 64,000, a large number compared to other real-time strategy video games. Only the Total War series can come close to this number, with ten thousand being the maximum number of soldiers usable at a time.
Game modes
In the game, there are two different modes, single-player, and multi-player. In single player, three different modes may be played: campaign (tutorial), Battle for Europe (turn-based, much like Risk), and Skirmish/Historical Battles. In multiplayer, players can play a game over the internet.
Singleplayer
In Battle for Europe mode, 6 nations are playable: France, Russia, Prussia, Austria, Egypt, and Great Britain. With one of these, players attempt to conquer Europe. The 2006 expansion, Cossacks 2: Battle for Europe, also includes Spain, the Duchy of Warsaw and the Confederation of the Rhine.
Players have a single army to command, which can be ordered across Europe on a turn-based scale. Battles are fought in real time. Over time, player experience improves, depending on the number of battles fought. As promotions are earned, more units become available, and better ones may be unlocked. At first, only infantry can be used, then light infantry, engineers, and cavalry are allowed, followed by artillery, and finally elite infantry and cavalry.
In Skirmish mode, a map is chosen, and a fight begins in a Real-Time environment, reminiscent of Age of Empires II. The human player begins by choosing a country with which to play, and then attempts to defeat the computer player's nation, by trying to capture all of the villages on the map, or by destroying all of the enemy's town centers. To capture a village, one, sometimes two, group(s) of thirty militiamen must be destroyed.
In order to capture it, a group of men must be moved near the center of the village. Each village can collect one of the four resources: coal, iron, gold, and food. Peasants, or serfs, can collect wood and stone, which are stored in storehouses. Two extra map packs, one with three extra maps for skirmish mode, and one for historical battles, have been released for free download at the Cossacks II official website.
In the historical battles mode, a variety o |
https://en.wikipedia.org/wiki/Homer%20Badman | "Homer Badman" is the ninth episode of the sixth season of the American animated television series The Simpsons. It originally aired on the Fox Network in the United States on November 27, 1994. In the episode, Homer is falsely accused of sexual harassment and must clear his name. Dennis Franz guest stars as himself portraying Homer in a TV movie.
The episode was written by Greg Daniels and directed by Jeffrey Lynch.
Plot
Homer and Marge hire Ashley Grant, a feminist graduate student, to babysit Bart, Lisa and Maggie while they attend a candy convention. Homer outfits Marge with an oversized trench coat, hoping to smuggle out as much candy as possible, including a rare gummy Venus de Milo. When caught stealing the gummy Venus, Homer makes a makeshift bomb with Pop Rocks and soda to blow up the convention center as he and Marge escape.
That night, Homer frantically searches for the lost gummy Venus until Marge reminds him to drive Ashley home. As she exits Homer's car, he sees the gummy Venus stuck to the seat of her pants. Mesmerized, Homer grabs the candy, and Ashley turns around to see him drooling at it. Mistaking this for a sexual advance, she runs off screaming.
The next morning, an angry mob of college students marches onto the Simpsons' lawn and claims that Homer sexually harassed Ashley. They refuse to believe Homer's explanation and stalk him. The tabloid news show Rock Bottom airs an interview with Homer that is selectively (and poorly) edited and presented out of context to make him look like a pervert. The resulting media circus monitors the Simpsons' home and movements around the clock. Homer's reputation is tarnished further after Dennis Franz portrays him as an unrepentant sexual predator in a made-for-television film.
Lisa and Marge suggest that Homer videotape his side of the story for a public-access cable TV channel, but since it airs during a graveyard timeslot, few viewers see it and it only succeeds in angering an old-time bicyclist. Groundskeeper Willie, who enjoys shooting and watching amateur videos, views Homer's tape. He shows the Simpsons his videotape of what really happened the night Homer drove Ashley home. After watching it, Ashley and the media apologize for labeling Homer a monster. Homer promises the television to “never fight again” and goes on to lambast Willie, whose videotaping exploits make him the target of the next media frenzy.
Production
Greg Daniels, the writer of the episode, originally pitched this episode as being more centered on Lisa's and Homer's opposing ideas on feminism. Eventually, the episode became more of a satire of tabloid media, such as Hard Copy. David Mirkin, the show runner at the time, felt very strongly about the "tabloidization of the media" and has said that the episode was as current in 2005 as it was at the time and things have since gotten worse. Several gags in the episode are based on what real life shows like Hard Copy would do, such as making people look to be guilty |
https://en.wikipedia.org/wiki/Get%20a%20Life%20%28American%20TV%20series%29 | Get a Life is a television sitcom that was broadcast in the United States on the Fox Network from September 23, 1990, to March 8, 1992. The show stars Chris Elliott as a 30-year-old paperboy named Chris Peterson. Peterson lived in an apartment above his parents' garage (Elliott's parents are played by Elinor Donahue and his real-life father, comedian Bob Elliott). The opening credits depict Chris Peterson delivering newspapers on his bike to the show's theme song, "Stand" by R.E.M.
The show was a creation of Elliott, Adam Resnick (like Elliott, a writer for Late Night with David Letterman), and writer/director David Mirkin (former executive producer/showrunner for Newhart and later for The Simpsons). Mirkin was executive producer/showrunner of the series and also directed most of the episodes. Notable writers of the series included Charlie Kaufman, screenwriter of Being John Malkovich; and Bob Odenkirk, co-creator of Mr. Show with Bob and David and Tenacious D.
The show was unconventional for a prime time sitcom, and many times the storylines of the episodes were surreal. For example, Elliott's character actually dies in twelve episodes. The causes of death included being crushed by a giant boulder, old age, tonsillitis, stab wounds, gunshot wounds, falling from an airplane, strangulation, getting run over by cars, choking on cereal, and simply exploding. For this reason, it was a struggle for Elliott and Mirkin to get the show on the air. Many of the executives at the Fox Network hated the show and thought it was too disturbing and found Elliott's character to be too unlikeable and insane.
After only two VHS/DVD volumes were released, Shout! Factory released the complete series on September 18, 2012 – the first time all of the show's episodes were made commercially available.
Synopsis
Chris Peterson is a carefree, childlike bachelor who refuses to live the life of an adult. At the age of 30, Chris still lives with his parents in St Paul, Minnesota and maintains a career delivering the St. Paul Pioneer Press, a job that he has held since his youth. He has no driver's license (instead, riding his bicycle wherever he goes) and is depicted as being immature, feckless, gullible, foolish, irresponsible, and extremely dimwitted. His low intelligence is exaggerated to absurd levels: in one episode he tries to leave his parents' house but is unable to operate the front door. In another he fell out of an airplane after opening the airlock, believing that the "EXIT" sign was a restroom.
Chris' parents (Fred and Gladys Peterson) are an elderly retired couple who are almost always seen in their pajamas and robes (even when they leave the house). They are often shown engaging in bizarre non-sequitur activities like polishing handguns, or trying to shoot a deer that ate flower bulbs in their garden. Gladys (Elinor Donahue) is a smiling, caring mother who doted over Chris, though she often makes sardonic, passive-aggressive comments about him and his lif |
https://en.wikipedia.org/wiki/Jarque%E2%80%93Bera%20test | In statistics, the Jarque–Bera test is a goodness-of-fit test of whether sample data have the skewness and kurtosis matching a normal distribution. The test is named after Carlos Jarque and Anil K. Bera.
The test statistic is always nonnegative. If it is far from zero, it signals the data do not have a normal distribution.
The test statistic JB is defined as
where n is the number of observations (or degrees of freedom in general); S is the sample skewness, K is the sample kurtosis :
where and are the estimates of third and fourth central moments, respectively, is the sample mean, and
is the estimate of the second central moment, the variance.
If the data comes from a normal distribution, the JB statistic asymptotically has a chi-squared distribution with two degrees of freedom, so the statistic can be used to test the hypothesis that the data are from a normal distribution. The null hypothesis is a joint hypothesis of the skewness being zero and the excess kurtosis being zero. Samples from a normal distribution have an expected skewness of 0 and an expected excess kurtosis of 0 (which is the same as a kurtosis of 3). As the definition of JB shows, any deviation from this increases the JB statistic.
For small samples the chi-squared approximation is overly sensitive, often rejecting the null hypothesis when it is true. Furthermore, the distribution of p-values departs from a uniform distribution and becomes a right-skewed unimodal distribution, especially for small p-values. This leads to a large Type I error rate. The table below shows some p-values approximated by a chi-squared distribution that differ from their true alpha levels for small samples.
{| class="wikitable"
|+Calculated p-values equivalents to true alpha levels at given sample sizes
! True α level !! 20 !! 30 !! 50 !! 70 !! 100
|-
! 0.1
| 0.307 || 0.252 || 0.201 || 0.183 || 0.1560
|-
! 0.05
| 0.1461 || 0.109 || 0.079 || 0.067 || 0.062
|-
! 0.025
| 0.051 || 0.0303 || 0.020 || 0.016 || 0.0168
|-
! 0.01
| 0.0064 || 0.0033 || 0.0015 || 0.0012 || 0.002
|}
(These values have been approximated using Monte Carlo simulation in Matlab)
In MATLAB's implementation, the chi-squared approximation for the JB statistic's distribution is only used for large sample sizes (> 2000). For smaller samples, it uses a table derived from Monte Carlo simulations in order to interpolate p-values.
History
The statistic was derived by Carlos M. Jarque and Anil K. Bera while working on their Ph.D. Thesis at the Australian National University.
Jarque–Bera test in regression analysis
According to Robert Hall, David Lilien, et al. (1995) when using this test along with multiple regression analysis the right estimate is:
where n is the number of observations and k is the number of regressors when examining residuals to an equation.
Implementations
ALGLIB includes an implementation of the Jarque–Bera test in C++, C#, Delphi, Visual Basic, etc.
gretl includes an implementation of the Jarque–Bera tes |
https://en.wikipedia.org/wiki/Mobile%20Slotted%20Aloha | Mobile Slotted Aloha (MS-Aloha) is a wireless network protocol proposed for applications such as vehicle networks.
Details
Considering the typical taxonomy of MAC protocols, MS-Aloha represents a hybrid solution. It is based on connection-oriented paradigm (hence may fall in the class of channel-based/TDMA protocols); however it is also very reactive to topology changes and does not include any reservations separate from data exchanges.
It is classified among the packet-based and collision-free MAC methods.
In general, a slotted protocol can be either connectionless or connection-oriented. However, only the latter case represents a true alternative to IEEE 802.11p, by introducing the determinism which carrier sense multiple access with collision avoidance (CSMA/CA) lacks. In vehicle networks the connection set-up phases of a telephone call (reservation request, confirmation, data exchange, tear-down) cannot be applied (it does not hold for broadcast communications, it is hampered by hidden stations, it is not manageable with heavy losses, mobility and varying channel conditions). For these reasons MS-Aloha is connection oriented and continuously refreshes each reservation simply by transmitting each period. MS-Aloha adopts a different approach and subtends the following hypotheses and rules which, basically, define all its main mechanisms.
MS-Aloha needs a periodic frame structure, including fixed-length time slots which represent the distinct resources to be allocated. This is why MS-Aloha is called "slotted".
Any physical layer (PLCP, PMD) can be used, in particular, the same as IEEE 802.11p. MS-Aloha and IEEE 802.11p can be used in different frequencies with the same radio front-end.
The frame involves absolute synchronization, which subtends a Coordinated Universal Time (UTC), thus any node perfectly knows what is the current position in the frame, independently of the frames received. This is to prevent misalignment and clock loops. In order to counteract propagation delays, a guard-time (Tg) is also added. Hence, in the receiver’s perception, each MS-Aloha frame floats within the boundaries of the ideal time-slot, and PLCP is required to properly recover the start of each MS-Aloha frame.
A node attempting to reserve a slot can simply pick a free one. The same happens if it is already transmitting and wants to continue transmissions in next frame. A transmission is an implicit reservation for next frame. As a result, reservations are confirmed at each transmission. This is to manage mobility by a continuous, frame-by-frame reservation.
All the nodes append a description about the state of all the slots, based on the information received either directly or indirectly. The description is contained in the trailer Frame Information (FI), which must include as many subfields as the number of slots in the frame, in order to announce the state of each slot. This is meant to discover hidden terminals. To achieve a higher compliance to IEEE |
https://en.wikipedia.org/wiki/List%20of%20original%20shows%20by%20TV%20Nova%20%28Czech%20Republic%29 | The following is a list of original programs of TV Nova network. Some of shows featuring already famous Czech actors (fe.: Ruská ruleta, Nováci), some of ones featuring now famous actors' and moderators' debuts (fe.: Kolotoč, Eso).
Series
Anatomie života (2021)
Bóra (TBA)
Chlap (2022)
Co ste hasiči (2021–current)
Dáma a Král (2017–2022)
Dobro došli (TBA)
Dokonalý svět (2010)
Doktoři z Počátků (2013–2016)
Draculův švagr (1996)
Drazí sousedé (2016)
Extraktoři (2023–current)
Gumy (Since 2022)
Guru (2022)
Gympl s (r)učením omezeným (2012–2013)
Hasiči (2011)
Iveta (2022–current)
Jedna rodina(2022–current)
Jitřní záře (2022)
Kameňák (2019–2021)
Král Šumavy: Fantom temného kraje (2022–current)
Kriminálka Anděl (2008–current)
Metoda Markovič: Hojer (TBA)
Metoda Markovič: Případ Straka (TBA)
Miluju tě navždy, táta (TBA)
Místo v životě (2006–2008)
Mužketýři (2021–2022)
Na vodě (2016)
Národní házená (2022)
Okresní přebor (2010)
O mě se neboj (2022)
Odznak Vysočina (2022–current)
On je žena! (2005)
Ordinace v růžové zahradě (2005–current)
Organised Crime Unit (2011–2016)
Pan profesor (2021–2022)
Pojišťovna štěstí (2004–2010)
Policie Modrava (2015–current)
Profesor T. (2018)
První krok (2012)
Případ Roubal (2021)
Případy mimořádné Marty (2022–current)
Redakce (2004–2006)
Sex O´Clock (2023–current)
Soukromé pasti (2008; 2011)
Specialisté (2017–current)
Světla pasáže (2007)
Šéfka (2022)
Taneční (TBA)
Táta v nesnázích (2023–current)
Ulice (2005–current)
Vědma (2023)
Vegani a Jelita (2021)
Za domem v lese (TBA)
Zlatá labuť (2023–current)
Ztracená rodina (2023–current)
Sitcoms
Comeback (2008–current)
Helena (2012–2018)
Hospoda (1996–1997)
Nováci (1995–1996)
PanMáma (2013)
Policajti z předměstí (1998)
Quiz shows
1 proti 100 (2004–2005)
Babeta
Báječný ženský (2004)
Bingo (1994–1997)
Chcete být milionářem? (2000–2005;2016-)
Jsi chytřejší než páťák? (2007)
Karambol
Kolotoč (1996-2003)
Nejslabší! Máte padáka! (2002–2004)
Neřeš, nepřepínej (2006)
Pálí vám to? (2003–2005)
Přísně tajné! (2008)
Riskuj na kolotoč (1999?)
Riskuj! (1994-2004)
Tenkrát s Lucií Vondráčkovou (2004)
Triga
Tyjátr (2001–?)
Úsměv, prosím! (2004)
Uzel
Vox populi (1994–?)
Zvoňte dvakrát! (2006)
Award shows
ANNO (1995–2010)
Česká Miss (2005–2010)
Fotbalista roku (1998–2005)
Miss Aerobic ČR (1996–2009)
Miss ČR (1996–2008)
Miss desetiletí (1997)
Miss tisíciletí (2000)
TýTý (2004–2008)
Zlatá hokejka (1998–2005)
News
Snídaně s Novou (1994–current)
Televizní noviny (1994–current)
Právě dnes (1994–2004)
Reality shows
4 svatby (2012)
Babicovy dobroty (2008-current)
Bailando (TV Nova show) (2007)
Big Brother (2005)
Česko hledá SuperStar (2004–2006)
Dům snů (2009)
Farma (2012)
MasterChef (2012)
Milionový pár (2005)
Robinsonův ostrov (2017-current)
Svatby paní Veroniky (2006)
Vem si mě! (2007)
Výměna manželek (2005-current)
XXL (1998–????)
Hobby-related shows
Babicovy dobroty (2008–current)
Gr |
https://en.wikipedia.org/wiki/Demetra%2B | JDemetra+ is a computer program for seasonal adjustments that was developed and published by Eurostat – European Commission. It supports TRAMO&SEATS and X-12-ARIMA methods of adjustment.
Development
Governance
The Demetra+ project is governed by the Eurostat.
Unlike other software development carried out under an open source license, the Demetra+ project was not initiated by a community or a single developer, but started as an extension to the active role played by Eurostat (and in particular SA Steering Group) in the promotion, development and maintenance of a statistical analysis software system. The SA Steering Group, which consists of Eurostat-ECB high level group of experts from NSIs and NCBs, had been promoting for several years the development of freely available Demetra for seasonal adjustment to be used within ESS.
The SA Steering Group is responsible also for facilitating collaboration between separate organizations interested in development of SA tools and has ultimate control over the whole project. Although the software itself will be made available under an open source license, participation in development is contingent upon the decision of Steering Group.
The development of the software has been outsourced to the Department of Statistics of the National Bank of Belgium (NBB). In addition, the User Testing Group has been set up, with main tasks to supervise the implementation of the guidelines and user requirements. The User Testing Group is also responsible for issuing recommendations for new requirements and making decisions on adoption or rejection of new requirements not in line with the project guidelines.
The Demetra+ community has been established on OSOR environment for reporting and exchange of experience between the members of the User Testing Group itself, as well as for communication with the development team in NBB.
Extensions
The Demetra+ allows developers to write implementation for:
time series providers and browsers,
repository for the definitions of SA processing,
storage (or further processing) of the results,
diagnostics on the SA estimations,
summary (reporting) of a complete SA processing,
data formatting (drag/drop and copy/paste).
Features
The technology (Object Oriented components) underlying the toolkit has proved to be for managing the complexity of seasonal adjustment algorithms and integrating the major well-known SA engines provided by the Bank of Spain and USCB. In addition, it could easily be embedded in many different environments allowing fast developments and extensions. In parallel with the adoption of the ESS guidelines on SA, the SASG has launched a task force on the SA tools users\' requirements (February - April 2008) in order to define the functional and non functional requirements for a new SA tool DEMETRA+. The role of this community is the common sharing and testing of the new tool DEMETRA+ developed by BNB.
Description of menu’s buttons and their functionality
In Workspa |
https://en.wikipedia.org/wiki/Mobile%203D%20Graphics%20API | The Mobile 3D Graphics API, commonly referred to as M3G, is a specification defining an API for writing Java programs that produce 3D computer graphics. It extends the capabilities of the Java ME, a version of the Java platform tailored for embedded devices such as mobile phones and PDAs. The object-oriented interface consists of 30 classes that can be used to draw complex animated three-dimensional scenes. M3G was developed under the Java Community Process as JSR 184. , the current version of M3G is 1.1, but version 2.0 is in development as JSR 297.
Immediate and retained modes
M3G provides two ways for developers to draw 3D graphics: immediate mode and retained mode. In immediate mode, graphics commands are issued directly into the graphics pipeline and the rendering engine executes them immediately. When using this method, the developer must write code that specifically tells the rendering engine what to draw for each animation frame. A camera, and set of lights are also associated with the scene, but is not necessarily part of it. In immediate mode it is possible to display single objects, as well as entire scenes (or worlds, with a camera, lights, and background as parts of the scene).
Retained mode always uses a scene graph that links all geometric objects in the 3D world in a tree structure, and also specifies the camera, lights, and background. Higher-level information about each object—such as its geometric structure, position, and appearance—is retained from frame to frame.
Other features
The M3G standard also specifies a file format for 3D model data, including animation data format. This allows developers to create content on PCs that can be loaded by M3G on mobile devices.
Further reading
Alessio Malizia: Mobile 3D Graphics, Springer, 2006,
Kari Pulli, Tomi Aarnio, Ville Miettinen, Kimmo Roimela, Jani Vaarala: Mobile 3D Graphics with OpenGL ES and M3G, Morgan Kaufmann, 2007,
Claus Höfele: Mobile 3D Graphics: Learning 3D Graphics with the Java Micro Edition, Thomson Course Technology PTR, 2007,
Carlos Morales, David Nelson: Mobile 3D Game Development: From Start to Market, Charles River Media, 2007,
External links
JSR 184 (Mobile 3D Graphics API for J2ME 1.0, 1.1)
JSR 184 1.1 Specification (Mobile 3D Graphics API Technical Specification, Version 1.1, June 22 2005)
JSR 297 (Mobile 3D Graphics API 2.0)
Getting Started With the Mobile 3D Graphics API for J2ME
3D graphics for Java mobile devices: Part 1 and Part 2
JSR 239 (Java Bindings for OpenGL Embedded Subset) – related Java ME graphics specification
JSR 184 compatible devices (Performance listing of most mobile 3D devices)
3D scenegraph APIs
Application programming interfaces
Computer file formats
Java device platform
Java specification requests |
https://en.wikipedia.org/wiki/Combined%20DNA%20Index%20System | The Combined DNA Index System (CODIS) is the United States national DNA database created and maintained by the Federal Bureau of Investigation. CODIS consists of three levels of information; Local DNA Index Systems (LDIS) where DNA profiles originate, State DNA Index Systems (SDIS) which allows for laboratories within states to share information, and the National DNA Index System (NDIS) which allows states to compare DNA information with one another.
The CODIS software contains multiple different databases depending on the type of information being searched against. Examples of these databases include, missing persons, convicted offenders, and forensic samples collected from crime scenes. Each state, and the federal system, has different laws for collection, upload, and analysis of information contained within their database. However, for privacy reasons, the CODIS database does not contain any personal identifying information, such as the name associated with the DNA profile. The uploading agency is notified of any hits to their samples and are tasked with the dissemination of personal information pursuant to their laws.
Establishment
The creation of a national DNA database within the U.S. was first mentioned by the Technical Working Group on DNA Analysis Methods (TWGDAM) in 1989. The FBI's strategic goal was to maximize the voluntary participation of states and avoid what happened several years early, when eight western states frustrated with the progress creating a national Automated Fingerprint Identification System (AFIS) network formed the Western Identification Network (WIN). The FBI's strategy to discourage states from creating systems that competed with CODIS was to develop DNA databasing software and provide it free of charge to state and local crime laboratories.This strategic decision--to provide software free of charge for the purpose of gaining market share--was innovative at that time and predated the browser wars. In 1990, the FBI began a pilot DNA databasing program with 14 state and local laboratories.
In 1994, Congress passed the DNA Identification Act which authorized the FBI to create a national DNA database of convicted offenders as well as separate databases for missing persons and forensic samples collected from crime scenes. (Some in the Bureau believed the Act was not required to establish a national DNA database because the FBI's Criminal Justice Information Services Division was already using similar authorities to provide data-sharing solutions to federal, state, local, and tribal law enforcement agencies.) The DNA Identification Act also required that laboratories participating in the CODIS program maintain accreditation from an independent nonprofit organization that is actively involved in the forensic fields and that scientists processing DNA samples for submission into CODIS maintain proficiency and are routinely tested to ensure the quality of the profiles being uploaded into the database. The national leve |
https://en.wikipedia.org/wiki/Portable%20data%20terminal | A portable data terminal, or shortly PDT, is an electronic device that is used to enter or retrieve data via wireless transmission (WLAN or WWAN). They have also been called enterprise digital assistants (EDA), data capture mobile devices, batch terminals or just portables.
They can also serve as barcode readers, and they are used in large stores, warehouses, hospitals, or in the field, to access a database from a remote location. Others have a touch screen, IrDA, Bluetooth, a memory card slot, or one or more data capture devices.
PDT's frequently run wireless device management software that allows them to interact with a database or software application hosted on a server or mainframe computer.
Boundaries among PDA, smartphone and EDA can be blurred when comparing the wide array of common features and functions. EDAs attempt to distinguish themselves with a pre-defined requirement for long term constant daily operation (Normally allowing a minimum of 8 hours). They seek a higher than normal impact rating / drop test rating and an ingress protection rating of no less than IP54, Most have at least one Data Collection function i.e. a Barcode or RFID Reader etc.
See also
Automated identification and data capture (AIDC)
Mobile computer
Mobile data terminal (MDT)
References
Computer terminals
Mobile computers |
https://en.wikipedia.org/wiki/Mikey%20Robins | Mikel Mason "Mikey" Robins (born 8 December 1961) is an Australian media personality, comedian and writer. He is best known for the satirical game show Good News Week, which ran on the ABC and Network Ten between 1996 and 2000, and returned again when the series was resurrected in February 2008.
Early life and education
Robins was born in Newcastle, New South Wales.
He attended Newcastle High School.
He attended the University of Newcastle, where he obtained a Bachelor of Arts degree with a double major in English and Drama.
Career
In his teens, he worked as a parcel pickup boy at Woolworths, Garden City, Kotara, and as a barman at the Mary Ellen Hotel, Merewether.
He was a member of The Castanet Club with Steve Abbott and Maynard.
Robins was a breakfast radio presenter for the Australian FM radio station Triple J for seven years, ending in 1999. His co-presenters included Helen Razer (1994 or earlier), Paul McDermott (1997), Jen Oldershaw and The Sandman (Steve Abbott) (1998). He formally co-hosted the breakfast program on Sydney radio station Triple M with Amanda Keller in 2001 and then Vega 95.3 alongside Tony Squires and Rebecca Wilson.
The recognition he gained through Triple J launched Robins's career in television comedy; he appeared on Live and Sweaty and was a regular on McFeast before joining McDermott on Good News Week in 1996. He remained with Good News Week throughout its initial run between 1996 and 2000, and when Network Ten renewed the series in 2008 he returned in his original role.
Robins's other television projects have included several documentaries on Australian pubs such as Mikey, Pubs and Beer Nuts, as well as appearances on the ABC series The Fat, and the Seven Network's breakfast program, Sunrise. He played the character of Reg Linchpin on the ABC's Mr Squiggle and Friends in 1989–1990. In 2005, he was a contestant on the TV show Australian's Brainiest Comedian. In the final round, he beat Bob Downe, winning the game by one point. He was presented with a trophy and won A$20,000, which he donated to the NSW Autism Association.
Robins is also a published author, having co-written two books, Three Beers and a Chinese Meal (with Helen Razer), a bestseller, and Big Man's World (with Tony Squires and Steve Abbott).
Personal life
In 1999, Robins married his long-time partner Laura Williams.
Robins is a supporter of the rugby league club South Sydney Rabbitohs.
Health issues
Robins's father, Bill, sold hair-care products and worked for a time as an announcer at weekend surf lifesaving carnivals, which Robins says was his "introduction to talking into a microphone". When he was eight, Robins's father was diagnosed with cancer and died two years later. Robins claims he reacted to his father's death by eating more and giving up sports, pointing to this as the beginning of his battle with obesity. His obesity was a frequent source of comedy in his performances, but also held serious health implications. In 2003, he was d |
https://en.wikipedia.org/wiki/James%20T.%20Aubrey | James Thomas Aubrey Jr. (December 14, 1918 – September 3, 1994) was an American television and film executive. As president of the CBS television network from 1959 to 1965, with his "smell for the blue-collar," he produced some of television's most enduring series on the air, including Gilligan's Island and The Beverly Hillbillies.
Under Aubrey's leadership, CBS dominated American television, leading the other networks NBC and ABC, by nine points and seeing its profits rise from $25 million in 1959 to $49 million in 1964. The New York Times Magazine in 1964 called Aubrey "a master of programming whose divinations led to successes that are breathtaking". Aubrey had replaced CBS Television president Louis G. Cowan, who was dismissed after the quiz-show scandals. Aubrey's tough decision-making earned him the nickname "Smiling Cobra" during his tenure.
Despite his success in television, Aubrey's abrasive personality and ego led to his firing from CBS, amid charges of misconduct. Aubrey offered no explanation following his dismissal, nor did CBS President Frank Stanton or Board Chairman William Paley. "The circumstances rivaled the best of CBS adventure or mystery shows," declared The New York Times in its front-page story on his firing, which came on "the sunniest Sunday in February" 1965.
After four years as an independent producer, Aubrey was hired by financier Kirk Kerkorian in 1969 to preside over Metro-Goldwyn-Mayer's (MGM) near-total shutdown, during which he cut the budget and alienated producers and directors, but brought profits to a company that had suffered huge losses. In 1973, Aubrey resigned from MGM, declaring his job was done, and then kept a low profile for the last two decades of his life.
Early life and career
Born in LaSalle, Illinois, James Thomas Steven Aubrey was the eldest of four sons of James Thomas Aubrey Sr., an advertising executive with the Chicago firm of Aubrey, Moore, and Wallace Inc., and his wife, the former Mildred Stever. He grew up in the affluent Chicago suburb of Lake Forest and attended Lake Forest Academy, Phillips Exeter Academy in Exeter, New Hampshire, and Princeton University. All four boys, James, Stever, David, and George, went to the same schools; his brother Stever became a successful advertiser at J. Walter Thompson before heading the F. William Free agency. While at Princeton, all four brothers were members of the Tiger Inn eating club. "My father insisted on accomplishment," Aubrey recalled in 1986.
At Princeton, Aubrey was on the football team, playing left end. The New York Times Magazine described Aubrey as "6-foot 2-inch with an incandescent smile", with "unrevealing polar blue eyes". Life magazine described him as "youthful, handsome, brainy, with an incandescent smile, a quiet, somewhat salty wit, and when he cared to turn it on, considerable charm. He was always fastidiously turned out, from his Jerry the Barber haircut to his CBS-eye cufflinks." One producer said, "Aubrey is one of th |
https://en.wikipedia.org/wiki/Avira | Avira Operations GmbH & Co. KG is a German multinational computer security software company mainly known for its Avira Free Security antivirus software. Although founded in 2006, the Avira antivirus application has been under active development since 1986 through its predecessor company H+BEDV Datentechnik GmbH. Since 2021, Avira has been owned by American software company NortonLifeLock (now Gen Digital), after being previously owned by investment firm Investcorp.
The company also has offices in the United States, China, Romania, and Japan.
Technology
Virus definition
Avira periodically "cleans out" its virus definition files, replacing specific signatures with generic ones for a general increase in performance and scanning speed. A 15MB database clean-out was made on 27 October 2008, causing problems to the users of the Free edition because of its large size and Avira's slow Free edition servers. Avira responded by reducing the size of the individual update files, delivering less data in each update. Nowadays there are 32 smaller definition files that are updated regularly in order to avoid peaks in the download of the updates.
Its file-by-file scanning feature has jokingly been titled "Luke Filewalker" by the developers, as a reference to the Star Wars media franchise character "Luke Skywalker".
Advance heuristic
Avira products contain heuristics that proactively uncover unknown malware, before a special virus signature to combat the damaging element has been created and before a virus guard update has been sent.
Heuristic virus detection involves extensive analysis and investigation of the affected codes for functions typical of malware. If the code being scanned exhibits these characteristic features it is reported as being suspicious, although not necessarily malware; the user decides whether to act on or ignore the warning.
ProActiv
The ProActiv component uses rule sets developed by the Avira Malware Research Center to identify suspicious behavior. The rule sets are supplied by Avira databases. ProActiv sends information on suspicious programs to the Avira databases for logging.
Firewall
Avira removed its own firewall technology in 2014, with protection supplied instead by Windows Firewall (Windows 7 and after), because Windows 8, and later the Microsoft Certification Program, forces developers to use interfaces introduced in Windows Vista.
Protection Cloud
Avira Protection Cloud (APC) was first introduced in version 2013. It uses information available via the Internet (cloud computing) to improve detection and affect system performance less. This technology was implemented in all paid 2013 products.
APC was initially only used during a manual quick system scan; later it was extended to real-time protection.
System Requirements
Operating system Windows 7, 8/8.1, 10, 11; processor speed 1.6 GHz; requires 256 MB of RAM; hard disk memory 2 GB.
Partners
Avira offers its antivirus engine in the form of a software development k |
https://en.wikipedia.org/wiki/Shou-wei%20hao-ma%20method | The shou-wei hao-ma (首尾號碼) method is a lookup method for Chinese Characters developed between 1961 and 1965. It can also be used as an Input Method Editor, for computer entry of Chinese characters and related symbols.
It represents the first two and last two strokes as numbers 0–9, building a four-digit index number that enables a quick lookup. It is based completely on the structure of the character and not on any phonetic interpretation.
This method was popularized in Taiwan, with the publication of the 'Shou-Wei Hao-ma Dictionary 首尾號碼詞典', authored by Chen Shun-Chi, 陳舜齊 and published in 1964. This lookup method is one of the fastest for foreigners to grasp.
The dictionary (which defined this method) also provides Bopomofo phonetic, character phonetic/homophone, CTC #, definitions, radical and strokes, synonym and antonym and character use in example phrases.
References
The (首尾號碼) dictionary is referenced at:
http://searchworks.stanford.edu/view/4213706
Han character input |
https://en.wikipedia.org/wiki/ZX%20Spectrum%20character%20set | The ZX Spectrum character set is the variant of ASCII used in the ZX Spectrum family computers. It is based on ASCII-1967 but the characters ^, ` and DEL are replaced with ↑, £ and ©. It also differs in its use of the C0 control codes other than the common BS and CR, and it makes use of the 128 high-bit characters beyond the ASCII range. The ZX Spectrum's main set of printable characters and system font are also used by the Jupiter Ace computer.
Printable characters
Standard US-ASCII, 0x20–0x7F, is included in the Spectrum character set except that code point 0x5E is an up-arrow (↑) instead of a caret (^), 0x60 is the pound sign (£) instead of the grave accent (`), and 0x7F is the copyright sign (©) instead of the control character DEL. Note that the use of 0x5E as ↑ was also the case in the older 1963 version of ASCII. The £ sign was not mapped to 0x23 as in the British variant of ASCII (ISO-646-GB), allowing both the pound sign and the number sign (#) simultaneously. The ↑ character is the exponentiation operator in Spectrum's BASIC, just like the ^ it replaces compared to ASCII-1967 is used for exponentiation in many other dialects of BASIC and other programming languages.
Beyond 0x7F, the Spectrum character set uses the high-bit range 0x80–0xFF for special purposes. 0x80–0x8F contain the same 2×2 block graphics characters that the ZX80 character set and the ZX81 character set have (at other locations), also available in the Block Elements Unicode block. However the ZX Spectrum's standard character set does not include the ZX80/81 50% dithered 1×2 block graphics characters. Code points 0x90–0xA4 contain the originally 21 User-Defined Graphics (UDG) characters, and 0xA5–0xFF contain BASIC keywords tokenized as single code points. In the 128 BASIC mode introduced later, this was changed to 19 UDG characters ending at 0xA2 followed by the two new tokens SPECTRUM and PLAY. Code points 0xC7–0xC9 are the two-character operators <=, >= and <>, similarly tokenized into single code points. These tokens allow a BASIC command like PRINT to be entered with the single keypress at the beginning of a line (i.e. in command mode), which generated 0xF6. That is displayed as the full keyword PRINT on screen but only a single byte token is stored so only that single byte need be parsed by the interpreter or saved to/loaded from external storage such as tape.
All non-UDG Spectrum characters can be mapped to Unicode. The three non ASCII-1967 characters ↑, £ and © are at U+2191, U+00A3 and U+00A9. The 2×2 block graphics characters are in the Block Elements block at U+2580–U+259F although font support for the latter is not universal.
The shape of the UDG characters is mapped to a RAM memory area and is initialized to copies of characters A-U, but can be redefined arbitrarily for example using the BASIC command POKE. Like all characters in the system font they use an 8×8 pixel grid stored in 8 bytes. Redefining them changes their appearance in subsequent PRINT |
https://en.wikipedia.org/wiki/CompTIA | The Computing Technology Industry Association, more commonly known as CompTIA, is an American non-profit trade association that issues professional certifications for the information technology (IT) industry. It is considered one of the IT industry's top trade associations.
Based in Downers Grove, Illinois, CompTIA issues vendor-neutral professional certifications in over 120 countries. The organization releases industry studies to track industry trends and changes. Over 2.2 million people have earned CompTIA certifications since the association was established.
History
CompTIA was created in 1982 as the Association of Better Computer Dealers (ABCD). ABCD later changed its name to the Computing Technology Industry Association.
In 2010, CompTIA moved its headquarters into a new office space in a facility in Downers Grove, Illinois.
The CompTIA portal moved to a hybrid version of the open-access model in April 2014 with exclusive content for dues-paying members. The move expanded the organization's reach to engage a broader, more diverse set of members, and within a year, CompTIA's membership grew from 2,050 members to more than 50,000 in 2015. By the close of 2016, the organization boasted more than 100,000 members worldwide.
Skillsboost, CompTIA's online resource for schools, was launched in June 2015. It contained resources for students, parents and teachers to promote the importance of computer skills. CompTIA held its first annual ChannelCon Vendor Summit in 2015. The Vendor Summit is exclusive to people attending ChannelCon, the industry's premier conference for collaboration, education and networking. It addresses issues within the IT industry.
In January 2017, CompTIA launched an IT professional association built on its acquisition of the Association of Information Technology Professionals.
Trustmarks
CompTIA offers trustmarks to businesses to certify their security capabilities and credentials.
The CompTIA Security Trustmark+ is based on the NIST Cybersecurity Framework and demonstrates compliance with key industry regulations such as PCI-DSS, SSAE-16, HIPAA, and others reliant on the NIST Framework. It is based on a third-party assessment of security policies, procedures and operations.
CompTIA offered additional trustmarks, a Managed Services Trustmark and Managed Print Trustmark, that were retired on Sept. 30, 2021.
Certifications
CompTIA administers its vendor-neutral certification exams through Pearson VUE testing centers. (Note: For A+ up through CASP+ one can renew or extend their certification by satisfying in these cases 20 to 75 CEUs a.k.a. "Continuing Education Units," over the three-year period.)
Basic certifications
IT Fundamentals+ (ITF+) certification covers foundational IT concepts, basic IT literacy, and terminology and concepts of the IT industry. It is considered the first step toward the A+ certification.
CompTIA also offers the Cloud Essentials certification as a pathway to its Cloud+ credential.
Professi |
https://en.wikipedia.org/wiki/Anticiparallelism | Anticiparallelism (Anticipatory Parallelism) is a term coined by Bob Metcalfe in 1998. It is a technique of using idle machine cycles to perform useful computing tasks in the background. Such tasks must be readily interrupted for intervals when the computer needs to return to its primary task. An example
of such a task is transmitting e-mail. Anticiparalleism is also known as speculative execution, continual computation or optimistic execution.
See also
Folding@home, a distributed computing project that uses idle processing resources of personal computers owned by volunteers who have installed the software on their systems
References
Further reading
Instruction processing |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.