source
stringlengths
32
199
text
stringlengths
26
3k
https://en.wikipedia.org/wiki/RPH
RPH may refer to: Registered Pharmacist (RPh), in the US Radio Print Handicapped Network, or RPH Australia Royal Perth Hospital, in Australia Royal Preston Hospital, in England
https://en.wikipedia.org/wiki/Students%20Circle%20Network
Students Circle Network was a global social networking service for university and secondary school students that provided over 10,400 academic courses of various levels from over 200 OpenCourseWare members worldwide, as well as study groups in various academic disciplines with online chat, and social-network games. The platform was an OpenCourseWare consortium member. The platform was free to students studying business, computing, engineering, sciences and humanities. It had members from over 120 countries and 200 universities as well as many secondary schools. Membership was open to students, researchers, and teachers. It was self-funded. Users were able to create a "something akin to a Facebook profile for [their] academic interests". History The network was started as a personal project of Gospel "Gossy" Ukanwoke, in Kyrenia, Northern Cyprus, in June 2010, as a collaboration tool for students at Girne American University, where he was studying. Gossy Ukanwoke was referred to as the Mark Zuckerberg of Nigeria and as "Africa's top technology entrepreneur". In December 2010, the platform was launched worldwide and reached 1 million visits. By January 2011, it reached 2 million visits and was averaging over 50,000 visits daily. In April 2012, Gossy Ukanwoke resigned from active management of the platform to focus on the creation of Beni American University, with a goal of creating affordable education in Africa. In 2012, Students Circle Network was a finalist at the Future Africa Awards in the Innovation in Education Category. Students Circle Network won the People's Choice Award from Study.com. Partnerships In addition to the OpenCourseWare member universities, Students Circle Network partnered with non-OpenCourseWare member universities, including: InfiniteGraph Girne American University, Northern Cyprus Encipher Group References Defunct education companies Defunct social networking services Defunct companies of Cyprus Internet properties established in 2010 Education companies established in 2010 Kyrenia
https://en.wikipedia.org/wiki/Into%20Tomorrow
Into Tomorrow with Dave Graveline is a weekly, three-hour-long American talk radio show hosted by Dave Graveline on the "Advanced Radio Network". Brief History "Into Tomorrow" officially launched in January 1996 at the "Consumer Electronics Show" in Las Vegas. The show has continued to grow over the years and is currently heard on over 160 AM and FM stations across the United States, on the Armed Forces Network and online in streams and podcasts. Over the years Graveline extended the show to include other "new media" outlets and today he produces weekly video updates that can be watched on YouTube[5] and other video sites. Format Studio Shows A typical "Into Tomorrow" show is made up of three self-contained hours, each of which features questions from listeners, technology-related news, commentary and discussion and consumer electronics related guest interviews. Remote Broadcasts The "Into Tomorrow" team travels to technology trade shows all over the world to report on the latest consumer electronics products being introduced. These travels result in either full shows recorded from the trade shows featuring more interviews and no listener questions, or in hybrid shows in which part of the team records a show from the studio answering questions and commenting on technology news stories while part of the team reports on the latest from the show floor. On-Air Personalities Dave Graveline, Host Chris Graveline, Co-Host Formerly: Rob Almanza, Co-Host Mark Lautenschlager, Co-Host References External links Into Tomorrow With Dave Graveline "Into Tomorrow TV" American radio programs
https://en.wikipedia.org/wiki/TMPad
TMPad (the TransMembrane Protein Helix-Packing Database) is a repository of helix-helix interactions in membrane proteins See also Alpha helix membrane protein References External links http://bio-cluster.iis.sinica.edu.tw/TMPad Biological databases Helices Membrane proteins Protein structural motifs
https://en.wikipedia.org/wiki/Elizabeth%20J.%20Feinler
Elizabeth Jocelyn "Jake" Feinler (born March 2, 1931) is an American information scientist. From 1972 until 1989 she was director of the Network Information Systems Center at the Stanford Research Institute (SRI International). Her group operated the Network Information Center (NIC) for the ARPANET as it evolved into the Defense Data Network (DDN) and the Internet. Early life and education Feinler was born on March 2, 1931, in Wheeling, West Virginia, where she also grew up. In 1954, she received an undergraduate degree from West Liberty State College, the first from her family to attend college. Career Early career Feinler was working toward a Ph.D. in biochemistry from Purdue University when she decided to earn some money by working for a year or two before starting on her thesis. Working at the Chemical Abstracts Service in Columbus, Ohio, she served as an assistant editor on a huge project to index the world's chemical compounds. There she became intrigued with the challenges of creating such large data compilations and never returned to biochemistry. Instead, in 1960, she relocated to California and joined the Information Research Department at the Stanford Research Institute (now SRI International) where she worked to develop the Handbook of Psychopharmacology and the Chemical Process Economics Handbook. ARPANET and NIC Feinler was leading the Literature Research section of SRI's library when, in 1972, Doug Engelbart recruited her to join his Augmentation Research Center (ARC), which was sponsored by the Information Processing Techniques Office of the US Defense Advanced Research Project Agency (DARPA). Her first task was to write a Resource Handbook for the first demonstration of the ARPANET at the International Computer Communication Conference. By 1974 she was the principal investigator to help plan and run the new Network Information Center (NIC) for the ARPANET. The NIC provided reference service to users (initially over the phone and by physical mail), maintained and published a directory of people (the "white pages"), a resource handbook (the "yellow pages", a list of services) and the protocol handbook. After the Network Operations Center at Bolt, Beranek and Newman brought new hosts onto the network, the NIC registered names, provided access control for terminals, audit trail and billing information, and distributed Request for Comments (RFCs). Feinler, working with Steve Crocker, Jon Postel, Joyce Reynolds and other members of the Network Working Group (NWG), developed RFCs into the official set of technical notes for the ARPANET and later the Internet. The NIC provided the first links to on-line documents using the NLS Journal system developed at ARC. Engelbart continued leading-edge research in the ARC, while the NIC provided a service to all network users. This led to establishing the NIC as a separate project with Feinler as manager. The NWG and Feinler's team defined a simple text file format for host names in 1974, an
https://en.wikipedia.org/wiki/Astarte%20undata
Astarte undata, or the waved astarte, is a species of bivalve mollusc in the family Astartidae. It can be found along the Atlantic coast of North America, ranging from Labrador to Maryland. References Astartidae Bivalves described in 1841
https://en.wikipedia.org/wiki/D19E
The D19E, also known as Đổi mới, is a series of diesel locomotives currently used on the Vietnamese railway network. History The series is one of the most recently acquired by state railway company Vietnam Railways; 40 were in service as of 2005, 80 in 2012. The series, of the diesel electric type China Railways CKD7F, was constructed by Chinese manufacturer CSR Ziyang Locomotive Co., Ltd. No. 901 to 920 (built 2001–2002) and 921 to 940 (built 2004) have a more angular body. No. 941 to 960 (built 2007–2008) were built with a rounded front; in No. 961 to 980 (built 2011–2012) the windows and headlights were modified and the front air intake omitted. From No. 941 the final assembly took place at the Gia Lâm works of Vietnam Railways. Accidents and incidents On March 12, 2005, locomotive No.909 was involved in an accident Lang Co while pulling the train E1 (A.K.A SE1). 8 of the 13 coaches derailed, claiming the lives of 12 people and injuring hundreds. The result was because the train was over-speeding. On 10 March 2015 locomotive No.968 was written off in an accident near Dien Sanh when it pulled SE5 train was in collision with a lorry on a level crossing. On May 24, 2018, locomotive No. 927 towing the SE19 carrying 400 passengers had an accident in Thanh Hoa because of a collision with a truck, causing two deaths: driver Nguyen The Hung (born 1976) and Nguyen Xuan De (born 1985) The accident investigated was caused by two guards who forgot to close the barriers. On January 27, 2022, locomotive No. 946 hauling the SE4 was involved in an accident where the train smashed into a lorry carrying wood at Km 46+270 which made a driver injured. On January 28, 2023, locomotive No. 908 pulling the train SE5 was damaged in an accident in Cho Tia, Hanoi, when the express collided with a truck that was stuck on level crossing. Galleries References External links CKD7F diesel locomotive, CSR Ziyang, 2009-07-31 Diesel-electric locomotives of Vietnam CSR Ziyang Locomotive Co., Ltd. locomotives Metre gauge diesel locomotives Railway locomotives introduced in 2003
https://en.wikipedia.org/wiki/Voices%20Within%3A%20The%20Lives%20of%20Truddi%20Chase
Voices Within: The Lives of Truddi Chase is an ABC-Network miniseries based on When Rabbit Howls, the autobiography of Truddi Chase, a woman who was diagnosed with dissociative identity disorder who allegedly had 92 separate personalities. The four-hour miniseries, which was directed by Lamont Johnson stars Emmy winner Shelley Long as Truddi Chase. Tom Conti co-stars as her doctor. The miniseries aired on May 20 and 21, 1990 and Chase worked closely with screenwriter E. Jack Neuman to assure her autobiography was adapted accurately. Voices Within also exists as a 1-hour 46 minute version. Plot Truddi Chase phones her therapist to tell him she intends to travel to upstate New York to kill her stepfather. During her plane ride to New York, she flashes back to her traumatic childhood, which was filled with childhood sexual abuse suffered at the hands of her stepfather. To cope with the trauma, she develops dissociative identity disorder, manifesting approximately 90 split personalities over the course of her life, whom she refers to collectively as "The Troops". As a young woman, Truddi marries a man named Norman, but their marriage is rocky as a result of Truddi's psychological issues. Her condition worsens when they have a daughter, Paige, resulting in the breakdown of her marriage. Truddi seeks assistance, eventually meeting Dr. Stanley Phillips, who seeks to integrate Truddi's numerous personalities. Eventually Truddi decides to confront her stepfather in person. Cast Shelley Long as Truddi Chase Tom Conti as Dr. Stanley Phillips Tiffany Ballenger as Truddi Chase at 8 Jon Beshara as Police Val Bettin as Playwright Kelly Brookman as Page De Roin at 8 Irina Cashen as Truddi Chase at 6 Carl Ciarfalio as Colin Marian Collier as Operator Frank Converse as Peter Morgan Robert Costanzo as Fred Zarr Manuel DePina as Barkeep Brendan Dillon as Shannon Dale Dunham as Manager Susan Eisenberg as Stewardess David Fox-Brenton as Dr. Modarelli Alan Fudge as Albert Johnson Nancy Gormley as Airport John Hancock as Soloman Christine Healy as Sharon Barnes Miriam Johnson as Page De Roin at 15 Jessie Jones as Scrub Nurse Guido Koock Melinda Kordich as Teacher Bennett Liss as Angry Ernie Lively as Paul Joe Minjares as Mr. DiCola Melinda Peterson as Nurse Daphne Steven M. Porter as Hayes Jamie Rose as Truddi's Mother John Rubinstein as Norman De Roin Benjamin L. Scott as Harry Barnes (as Ben Scott) Nicholas Scott as Danny Wesley A. Starr as Wedding Minister Marsha Van Winkle as Doris Alisha Waite as Annie Lisa Watson as Page De Roin at 12 Stephanie Watson as Page De Roin at 10 Bruce Westphal as Funeral Minister J.D. Yarbrough as Client References External links Films shot in Minnesota 1990 drama films 1990 films Films set in Minnesota Films shot in California ABC Movie of the Week Films based on biographies Films about psychiatry Films based on non-fiction books Films about child sexual abuse Films scored by Charles Fox
https://en.wikipedia.org/wiki/Transient%20receptor%20potential%20channel-interacting%20protein%20database
Transient receptor potential channel-interacting protein database (TRIP) is a database of protein–protein interactions for the mammalian TRP channels. See also Protein-protein interactions TRP channels References External links http://www.trpchannel.org Biological databases Ion channels Membrane biology Proteomics
https://en.wikipedia.org/wiki/Voltage-gated%20potassium%20channel%20database
VKCDB (Voltage-gated potassium Channel DataBase) is a database of functional data about the voltage-gated potassium channels. See also Voltage-gated potassium channel References External links http://vkcdb.biology.ualberta.ca Biological databases Electrophysiology Ion channels
https://en.wikipedia.org/wiki/Pure%20Storage
Pure Storage, Inc. is an American publicly traded technology company headquartered in Santa Clara, California, United States. It develops all-flash data storage hardware and software products. Pure Storage was founded in 2009 and developed its products in stealth mode until 2011. Afterwards, the company grew in revenues by about 50% per quarter and raised more than $470 million in venture capital funding, before going public in 2015. Initially, Pure Storage developed the software for storage controllers and used generic flash storage hardware. Pure Storage finished developing its own proprietary flash storage hardware in 2015. Corporate history Pure Storage was founded in 2009 under the code name Os76 Inc. by John Colgrove and John Hayes. Initially, the company was setup within the offices of Sutter Hill Ventures, a venture capital firm, and funded with $5 million in early investments. Pure Storage raised another $20 million in venture capital in a series B funding round. The company came out of stealth mode as Pure Storage in August 2011. Simultaneously, Pure Storage announced it had raised $30 million in a third round of venture capital funding. Another $40 million was raised in August 2012, in order to fund Pure Storage's expansion into European markets. In May 2013, the venture capital arm of the American Central Intelligence Agency (CIA), In-Q-Tel, made an investment in Pure Storage for an un-disclosed amount. That August, Pure Storage raised another $150 million in funding. By this time, the company had raised a total of $245 million in venture capital investments. The following year, in 2014, Pure Storage raised $225 million in a series F funding round, valuating the company at $3 billion. Annual revenues for Pure Storage grew by almost 50% per quarter, from 2012 to 2014. It had $6 million in revenues in fiscal 2013, $43 million in fiscal 2014, and $174 million in fiscal 2015. Pure Storage sold 100 devices its first year of commercial production in 2012 and 1,000 devices in 2014. By late 2014, Pure Storage had 750 employees. Although it was growing, the company was not profitable. It lost $180 million in 2014. In 2013, EMC sued Pure Storage and 44 of its employees who were former EMC employees, alleging theft of EMC's intellectual property. EMC also claimed that Pure Storage infringed some of their patents. Pure Storage counter-sued, alleging that EMC illegally obtained a Pure Storage appliance for reverse engineering purposes. In 2016, a jury initially awarded $14 million to EMC. A judge reversed the award and ordered a new trial to determine whether the EMC patent at issue was valid. Pure Storage and EMC subsequently settled the case for $30 million. Pure Storage filed a notification of its intent to go public with the Securities Exchange Commission in August 2015. That October, 25 million shares were sold for a total of $425 million. The company hosted its first annual user conference in 2016. The following year, the Board of Direc
https://en.wikipedia.org/wiki/Redakai%3A%20Conquer%20the%20Kairu
Redakai: Conquer the Kairu, also known simply as Redakai, is an animated series that premiered on YTV in Canada on July 9, 2011, on Cartoon Network in the United States on July 16, 2011 and on Canal J and Gulli in France on October 22, 2011. The series was created by Vincent Chalvon Demersay and David Michel and was co-produced by Canada's Spin Master Entertainment and France's Marathon Media in association with Canal J and Gulli. Like Totally Spies! and Martin Mystery, which were also produced by Marathon, the show's animation style has been compared to that of anime. Premise The series revolves around Ky, a 15-year-old student of ancient martial arts, who embarks on an epic quest to find the Kairu, a primordial alien energy source. Aided by his friends Maya and Boomer, Ky travels the world searching for the Kairu while attempting to make sure that his extraterrestrial teenage alien adversaries don’t find it first. Studios Marathon Media Spin Master Entertainment Creators Vincent Chalvon Demersay David Michel Stephane Berry Olivier Jongerlynck Voices French Donald Reignoux Marie Nonnenmacher Bruno Meyere Martin Hylander Brucker Frederic Souterelle Marc Bretonnière Tony Marot Caroline Mozzone Stéphane Miquel Jessie Lambotte English Austin Di Iulio Jasmine Richards Dan Petronijevic Cory Doran Dwayne Hill Jamie Watson Lyon Smith Katie Griffin Jeff Margolis Teagan Moss Athena Karkanis Jason Barr Wil Wheaton Episodes Characters Team Stax Ky Stax Maya Boomer Allies Master Boaddai Connor Stax Mookee Villains Lokar Team Radikor Zane Zair Techris Team Imperiaz Princess Diara Koz Teeny Team Battacor Zylus Rynoh Bash References External links 2011 French television series debuts 2013 French television series endings 2010s French animated television series 2011 Canadian television series debuts 2013 Canadian television series endings 2010s Canadian animated television series 2010s Canadian science fiction television series Canadian children's animated action television series Canadian children's animated adventure television series Canadian children's animated science fantasy television series French children's animated action television series French children's animated adventure television series French children's animated science fantasy television series Anime-influenced Western animated television series YTV (Canadian TV channel) original programming Teen animated television series Television series by Banijay
https://en.wikipedia.org/wiki/Mark%20Baldwin
Mark Baldwin may refer to: Mark Baldwin (game designer) (born 1952), American computer game designer Mark Baldwin (choreographer), New Zealand choreographer Mark Baldwin (baseball) (1863–1929), American right-handed pitcher in Major League Baseball See also
https://en.wikipedia.org/wiki/Acts%2029%20Network
Acts 29 is a global family of church planting churches that adheres to Calvinist theology. It derives its name from the Book of Acts in the New Testament, which has 28 chapters, making Acts 29 the "next chapter" in the history of the church. A number of other Christian organizations also use the phrase "Acts 29" in their respective names. History Acts 29 was founded in 1998 by Mark Driscoll and David Nicholas. Beginning September 17, 2007, with the Raleigh Boot Camp, Acts 29 began using Great Commission Ministries as its mission agency for fundraising and leadership training. Matt Chandler was appointed as the president of Acts 29 Network in 2012. Chandler announced plans to keep the network's objectives intact while reorganizing to address the global scope of the organization. The offices and leadership of Acts 29 moved from Mars Hill Church in Seattle to The Village Church in Texas in March 2012. The offices of Acts 29 are now in Mission Viejo, CA In August 2014, Acts 29 removed Mark Driscoll and Mars Hill Church from its membership. According to the Acts 29 Board, this was due to "the nature of the accusations against Mark, most of which have been confirmed by him." Subsequent years saw the network restructure, with a focus on diversification, financial accountability and devolved leadership, transforming "from an American-based network to a diverse global family of church-planting churches". Board members As of May 28, 2020, Acts 29's board consisted of these members: Matt Chandler | Board Member and President | Lead Pastor at The Village Church in Dallas, TX Dwayne Bond | Board Member | Lead Pastor at Wellspring Church in Charlotte, NC Gareth Paul | Board Member Ryan Kwon | Board Member | Lead Pastor at Resonate Church in Fremont, CA Vic Keller | Board Member Sergio Queiroz | Board Member | Lead Pastor at Primeira Igreja Batista do Bessamar in Brasil Character Acts 29 is a global family of church planting churches that originated in North America and now has representation in Europe, Australia and New Zealand, Latin and South America, Africa, and Asia. Acts 29 has been described as part of the emerging church. However, Darrin Patrick, Former Vice President of Acts 29 has pointed out "bad things" in the emerging church such as "the fascination with deconstructing almost everything while building almost nothing," and "ugly things" such as "conversing about God's Word [the Bible] to the neglect of obeying it, deviating from historical orthodoxy and the lack of clarity regarding issues of theology and sexuality." Four Values of Acts 29 In 2012, Matt Chandler became the President of Acts 29 and outlined four values for the future of Acts 29. As he states, "these aren't complex and seem to me to be no-brainers, even though it might take years before some of them are a reality. I will be and am currently putting my efforts and influence to work in these directions." Planting Churches that Plant Churches Pursuing Holiness and H
https://en.wikipedia.org/wiki/Language%20for%20Systems%20Development
The Language for Systems Development (LSD) was a programming language developed in 1971 at Brown University for the IBM System/360. The language was also referred to as LSyD due to the negative connotations of the acronym "LSD" at the time. LSD was derived from PL/I. References External links IBM System/360 mainframe line Systems programming languages
https://en.wikipedia.org/wiki/Sol%C3%A9a
Soléa is a public transport operator in the French city of Mulhouse. Under contract to the Mulhouse Alsace Agglomération, it operates the city's bus network and three of the lines of the city's tram network. It also jointly operates, with the French national rail operator SNCF, the city's fourth tram line, a tram-train service. Soléa is a mixed private and public sector company. Its principal shareholders are the transport group Transdev (67.8%), the Paris transport operator RATP (20%), the Mulhouse Alsace Agglomération (10%) and the Colmar transport operator TRACE (1%). Soléa carries more than 107,800 passengers per day, and serves a community of 245 367 inhabitants, in an area of . It has 544 employees. Trams The Mulhouse tram system commenced service in 2006 and was last extended in December 2010. It now comprises three purely tram lines, plus one hybrid tram-train line: Line 1 from Gare Centrale to Châtaignier Line 2 from Nouveau Bassin to Coteaux Line 3 from Gare Central to Lutterbach Tram-train line from Gare Centrale to Thann via Lutterbach The system is operated by 27 Alstom Citadis 302 trams, which operate routes 1 to 3, and 12 Siemens Avanto tram-trains, which operate the route to Thann. On the latter route, Soléa manages the route as far as Lutterbach and provides 25% of the drivers, whilst the remainder of the route and the remaining drivers are provided by the SNCF. Buses Soléa operates 21 daytime bus routes, plus a shuttle service between Gare Central and Mulhouse hospital. It also operates 13 routes on evenings, Sundays and holidays, and 13 school bus routes. It does this with a fleet of 131 buses, of which 43 are articulated buses. Lines: (1), (2), (3) represents the tram lines. The «C» stands for Chrono, Chrono lines are 4 bus lines with a frequency of 1 bus every 5-7 minutes. C4 Wittenheim — Sainte-Barbe ⥋ Mulhouse — Châtaignier Opened September 2, 2019/ closed/ — Length 6,4 km (3.9 miles) Duration 15 min Nb. Of stops 16 Stations: Cities and places served: Wittenheim (Church Sainte-Barbe, City center, La Halle au Coton), Kingersheim (city hall) and Mulhouse served stations: Châtaignier (1). Others: Stops not accessible for wheelchair users: Kellermann Schedule: The line is in service Monday through Friday at 4:35am to 11:45pm, on Saturday until 0:25pm and on Saturdays 7:10am to 11:45pm environ. History: The bus line «C4» was once the line 4 of the old network which was put into service in September 2013 as part of the Mulhouse high-level bus service. C5 Illzach — Jonquilles ⥋ via Cité Administrative, Dornach and Gare centrale Opened September 2nd 2019 / Closed / — length 15,4 km(9,5miles) on C5A - 15 km(9.3miles) on C5B Duration 41 min Nb. Of stops 42 Stations : Cities and places served : Illzach (High-schools Ettore-Bugatti) and Mulhouse (Cité Drouot, Nouveau Bassin, La Filature, Cité Wagner, Siège social et dépôt Soléa, Cimetière central, Parc des expositions, Cité de l'automobile, Cité Administrativ
https://en.wikipedia.org/wiki/Scott%20T.%20Acton
Scott T. Acton is a professor in the Charles L. Brown Electrical and Computer Engineering Department and in the Biomedical Engineering Department of the University of Virginia School of Engineering and Applied Science, Charlottesville campus. Acton was born in California. He is the director of the Virginia Image and Video Analysis (VIVA) group there. He works in the fields of video tracking and anisotropic diffusion. His B.S. degree (1988) is from Virginia Tech, his M.S.(1990) and Ph.D. (1993) degrees from the University of Texas at Austin, where his advisor was Alan Bovik. He is a Fellow of the IEEE., and served as Editor-in-Chief of the IEEE Transactions on Image Processing from 2014 to 2017. Acton has been at the University of Virginia since 2000. Before that time, he worked in the academic world for Oklahoma State University and in the engineering world for AT&T, Motorola and the Mitre Corporation. Publications He has published over 60 peer-reviewed journal articles, and 90 peer-reviewed conference presentations. Books S.T. Acton and N. Ray, Biomedical Image Analysis: Tracking, Morgan and Claypool Publishers, 2006. S.T. Acton and N. Ray, Biomedical Image Analysis: Segmentation, Morgan and Claypool Publishers, 2009. References External links University of Virginia faculty
https://en.wikipedia.org/wiki/T-Kernel
T-Kernel is an open source real-time operating system (RTOS) designed for 32-bit microcontrollers. It is standardized by the T-Engine Forum, which distributes it under a T-License agreement. There is also a corresponding Micro T-Kernel (μT-Kernel) implementation designed for embedded systems with 16-bit or 8-bit microcontrollers. History In 1984 professor Ken Sakamura started The Real-time Operating system Nucleus (TRON project) at the University of Tokyo, with the goal of designing an open real-time operating system (RTOS) kernel. The TRON framework defines a complete architecture for the different computing units. Industrial TRON (ITRON) is the most popular TRON architecture. ITRON specification promotion was done by the various companies which sell the commercial implementations. T-Kernel is the name of the specification and at the same time a single implementation based on the authorized source code available from the T-Engine Forum for free under T-License. T-Engine is arguably the most advanced ubiquitous computing platform in the world. In 1989, Matsushita Electric Industrial Co., Ltd., now known as Panasonic Corporation, introduced a TRON PC. This personal computer had an Intel 80286 chip of 8 MHz and only 2 MB of memory, but it could display moving video. Also, it had a dual-booting system that could run both the TRON OS and DOS. Although the Japanese government once announced it would use the TRON PC in Japanese schools, the plan was dropped, partly due to economic issues with the United States. But ITRON survived, and today is used in many devices, household appliances, automobile electronics, robots, some satellites, and in factory automation systems in China. Embedded system developers claim that ITRON is the number one OS for embedded chips in both Japan and the United States. Overview To make it easy to distribute middleware, T-Kernel has separate specification for subsystem and device driver which will be suitable for different types of middleware APIs. A real-time OS appropriate for individual application can be created by combining the middleware called T-Kernel Extension with the T-Kernel. T-Monitor initializes computer hardware and handles the interrupt set up at the start. T-Monitor lessens hardware-dependency of T-Kernel, and improves the application portability. T-Kernel consists of the following three components from the viewpoint of function. T-Kernel/OS (operating system) This offers the basic functions as real-time Operating System. T-Kernel/SM (system manager) This offers the functions including system memory management function and address space management function in order to manage middleware such as device drivers and subsystems. T-Kernel/DS (debugger support) This offers the functions for debuggers to be used in development tools. Development environment eBinder from eSol Corporation is one commonly used integrated development environment (IDE) for software cross-development targeting T-Kernel. The curren
https://en.wikipedia.org/wiki/AvePoint
AvePoint is the largest independent software vendor of SaaS solutions to migrate, manage and protect data in Microsoft 365. AvePoint was founded in 2001 and is headquartered in Jersey City, New Jersey. The company also has offices and a strong footprint in the United States, Canada, Australia, South Africa, United Kingdom, France, Germany, Netherlands, Switzerland, Japan, Singapore, and China. History Early years: 20012014 AvePoint was founded by Xunkai (Kai) Gong and Tianyi (TJ) Jiang after they coded the first AvePoint software in a public library in Somerset, New Jersey, in 2001. Jiang described that his experience in the north tower of the World Trade Center (1973–2001) during the September 11 attacks as a key catalyst driving him to become a software entrepreneur. One of the company's key milestones was during a 2003 TechEd Microsoft conference session where SharePoint 2003 was unveiled for the first time. After receiving numerous audience questions about the company's inability to migrate their content to the new software, Jiang stood up and announced that DocAve was able to migrate to the new (at the time) platform. The company was listed in the 2013 Deloitte Fast 500 of the fastest-growing companies in the world, and in Inc. magazine's 2014 "Inc. 500|5000" list of the fastest-growing companies in America. In 2013, AvePoint's DocAve 6 product was named "Best of TechEd" and the company was named a finalist in three categories in the Microsoft Partner of the Year Awards: Collaboration and Content Partner of the Year, Office/SharePoint App Developer Partner of the Year, and Public Sector Partner of the Year – Public Safety/National Security. In the 2014 Microsoft Partner of the Year Awards, AvePoint was named the winner of the Public Sector Partner of the Year Public Safety/National Security category and was a finalist in the Office and SharePoint App Developer Partner of the Year category. The company was backed by investors Goldman Sachs and Summit Partners, which acquired minority stakes in AvePoint in 2014 and 2007, respectively. SaaS conversion and channel expansion: 20142020 Starting in 2014, AvePoint made a major change to its technology and business models, converting its perpetual license model to a Software as a service model. After being initially challenged by the ongoing costs of the SaaS model and need to adjust partnerships and engagement models, AvePoint's cloud platform would expand across 14 global data centers, with quarterly releases, 24/7 support and ISO/IEC 27001 accreditation. Today AvePoint is one of the largest solution providers in the Microsoft 365 ecosystem, supporting more than 7 million cloud users, including a quarter of the Fortune 500. In 2019, AvePoint expanded its support of Managed Service Providers and their small to medium sized customers via the channel with agreements with global distribution partners such as Ingram Micro, Synex Systems Corporation, Tech Data and others. The company aims to
https://en.wikipedia.org/wiki/Niels%20Provos
Niels Provos is a German-American researcher in security engineering, malware, and cryptography. He received a PhD in computer science from the University of Michigan. From 2003 to 2018, he worked at Google as a Distinguished Engineer on security for Google. In 2018, he left Google to join Stripe as its new head of security.In 2022, Provos left Stripe and joined Lacework as head of Security Efficacy. For many years, Provos contributed to the OpenBSD operating system, where he developed the bcrypt adaptive cryptographic hash function. He is the author of numerous software packages, including the libevent event driven programming system, the Systrace access control system, the honeyd honeypot system, the StegDetect steganography detector, the Bcrypt password encryption technique, and many others. Provos has been an outspoken critic of the effect of the DMCA and similar laws on security researchers, arguing that they threaten to make criminals of people conducting legitimate security research. Provos has also served as the Program Chair of the Usenix Security Symposium, on the program committees of the Network and Distributed System Security Symposium, ACM SIGCOMM, and numerous other conferences, and served on the board of directors of Usenix from 2006 to 2010. Blending his professional interests and creative pursuits, Provos has also started producing security-themed Electronic Dance Music (EDM) tracks under his artist name Activ8te. He embarked on this musical endeavor with the aim of garnering more interest in the field of security. Provos's hobbies also include swordsmithing, and he has forged swords in both Japanese and Viking styles. It started with his father collecting sabres. Niels routinely posts videos of his blacksmithing activities online. By his words "At work, we try to fight the bad guys and make the world safer for our users. And swords are maybe an expression in a similar way. You create weapons to defend yourself against the hordes of barbarians." Education Ph.D., Computer Science & Engineering, August 2003, the University of Michigan (Dissertation: "Statistical Steganalysis") Diplom in Mathematics, August 1998, Universität Hamburg, Hamburg, Germany. (Masters in Mathematics). (Thesis: "Cryptography, especially the RSA algorithm on elliptic curves and Z/nZ") Vordiplom in Mathematics, March 1995, Universität Hamburg, Hamburg, Germany. Vordiplom in Physics, March 1995, Universität Hamburg, Hamburg, Germany. Selected publications All Your iFrames Point to Us Niels Provos, Panayiotis Mavrommatis, Moheeb Rajab and Fabian Monrose, 17th USENIX Security Symposium, August 2008. The Ghost in the Browser: Analysis of Web-based Malware Niels Provos, Dean McNamee, Panayiotis Mavrommatis, Ke Wang, and Nagendra Modadugu, USENIX Workshop on Hot Topics in Understanding Botnets, April 2007. Detecting Steganographic Content on the Internet Niels Provos and Peter Honeyman, ISOC NDSS'02, San Diego, CA, February 2002 Improving Host Security
https://en.wikipedia.org/wiki/GiveCamp
A GiveCamp is a weekend long event where developers, database administrators, designers and other technologists volunteer their time to create web sites, small applications or training courses for local charities who otherwise would not be able to afford them. GiveCamp was originally created in 2007 in the USA by Chris Koenig, Developer Evangelist for Microsoft. There are now events held regularly throughout the US and other countries are also starting to join in. References Organizations established in 2007
https://en.wikipedia.org/wiki/A%20Mother%27s%20Prayer
A Mother's Prayer is a 1995 film made for the USA Network starring Linda Hamilton, in a Golden Globe-nominated performance, as a woman who learns she has contracted the AIDS virus and must make plans for the care of her only son. The film, which counts Kate Nelligan, S. Epatha Merkerson and Bruce Dern in its supporting cast, premiered on August 2, 1995. It was eventually expanded, given a PG-13 rating and released on VHS via MCA/Universal Home Entertainment in 1996. Cast Linda Hamilton ... Rosemary Holmstrom Kate Nelligan ... Sheila Walker Noah Fleiss ... T.J. Holmstrom Bruce Dern ... John Walker RuPaul ... Deacon "Dede" S. Epatha Merkerson ... Ruby Alex Kapp Horner ... Martha Corey Parker ... Spence Walker Jenny O'Hara ... Val Gail Strickland ... Ruth McNally Sagal ... Dr. Kahn Aaron Lustig ... Dr. Shapiro Julie Garfield ... JoAnne Wasserman Awards and recognition CableACE Awards—Won Linda Hamilton Actress in a Movie or Miniseries 1995 Golden Globe Awards, The Hollywood Foreign Press—Nominated Linda Hamilton Best Performance by an Actress in a Mini-Series or Motion Picture Made for TV 1996 Humanitas Prize Lee Rose 1996 Young Artist Awards—Nominated Noah Fleiss Best Performance by a Young Actor - TV Special 1996 References External links 1995 films American docudrama films 1995 drama films HIV/AIDS in American films HIV/AIDS in television American drama television films Films directed by Larry Elikann 1990s American films
https://en.wikipedia.org/wiki/Thelma%20Estrin
Thelma Estrin (née Austern; February 21, 1924 – February 15, 2014) was an American computer scientist and engineer who did pioneering work in the fields of expert systems and biomedical engineering. Estrin was one of the first to apply computer technology to healthcare and medical research. In 1954, Estrin helped to design the Weizmann Automatic Computer, or WEIZAC, the first computer in Israel and the Middle East, a moment marked as an IEEE Milestone in Electrical and Computer Engineering. She was professor emerita in the Department of Computer Science, University of California at Los Angeles (UCLA). Early life and education Estrin was born Thelma Austern in New York City in 1924 and attended public schools there. Demonstrating an early aptitude for mathematics, she began her higher education at City College of New York (CCNY) in 1941. In the same year she met her soon-to-be husband, Gerald Estrin, while at CCNY, marrying him when she was only 17. In 1942, Estrin took a three-month engineering assistant course at Stevens Institute of Technology in 1942, when Gerald entered the Army during World War II. Soon after she worked for two years at Radio Receptor Company building electronic devices where she developed an interest in engineering. In 1946, Estrin and her husband moved to Madison, Wisconsin, to pursue undergraduate degrees in electrical engineering at the University of Wisconsin-Madison (UW). In 1948, Estrin received a Bachelor of Science, her first of three degrees in electrical engineering from UW. Subsequently, she received her Master of Science and Doctor of Philosophy in 1949 and 1951, respectively. Princeton and biomedical engineering research 1951–1953 They moved to Princeton, New Jersey, in the early 1950s, where Gerald joined the Institute for Advanced Study at Princeton and became associated with the group that formed around John von Neumann. Thelma obtained a research position in the Electroencephalograph Department of the Neurological Institute of New York at Columbia Presbyterian Hospital in New York City, where she developed an interest in biomedical engineering. Move to UCLA – 1953 Gerald obtained a teaching position at UCLA in 1953 and they moved to Los Angeles. When Thelma's husband began working at UCLA, she was not able to work there too because of nepotism, so she started working at a junior college, Los Angeles Valley College in San Fernando Valley, CA, where she taught drafting. Shortly afterwards she and Gerald went to Israel, where they helped to build the first computer there, the Weizmann Automatic Computer, or WEIZAC, in 1954. After their return, Thelma became associated with the Brain Research Institute at UCLA in 1960, and organized the Institute's Data Processing Laboratory in 1961; she served as director of the Data Processing Laboratory from 1970 to 1980. During her tenure she designed and developed one of the first analog-to-digital conversion systems that could convert analog signals from electroence
https://en.wikipedia.org/wiki/Cryo-Save
The cord blood bank Cryo-Save AG shut their doors at the end of June 2019. By 17 September, they filed for liquidation. The brand name CryoSave and the client database now belong to CSG-BIO. The clients’ umbilical cords were moved in the 2nd quarter of 2019, to the Polish cord blood bank PBKM, the head of the FamiCord network. FamiCord does not own the cords, they are operating under a third party storage contract. History By late August 2019, the FOPH had removed Cryo-Save AG from the list of authorized stem cell banks. Swissmedic revoked Cryo-Save's authorization to use umbilical cord tissues and initiated criminal proceedings for alleged violations of the law on therapeutic agents and transplants. Commercial activity The Company started to store umbilical cord blood and cord tissue (Wharton's jelly) stem cells. Cryo-Save performs collection, analysis, processing and cryogenic preservation of three sources of human adult stem cells: Hematopoietic stem cells obtained from the umbilical cord blood ("Cryocord") Mesenchymal stem cells obtained from the umbilical cord tissue ("Cryocord+") Mesenchymal stem cells obtained from adipose tissue International Competitors The leading umbilical cord blood banks in the U.S. include Americord, Cord Blood Registry, and Viacord. Laboratories Cryo-Save currently has processing and storage facilities in the UAE and South Africa. Accreditations The following accreditation: South Africa and the UAE: AABB References Blood banks Medical and health organisations based in the Netherlands Stem cells
https://en.wikipedia.org/wiki/Kadua%20cordata
Kadua cordata (formerly Hedyotis schlechtendahliana) is a species of flowering plant in the coffee family known by the common name kopa. It is endemic to Hawaii. There are at least two varieties of the species. One, variety remyi, is a federally listed endangered species in the United States. It is known only from the island of Lanai. , one individual, a seedling, is known to exist in the wild. The U.S. Fish and Wildlife Service had reported, in its previous review in 2014, the existence of two individuals. Some specimens of the plant are kept at the National Tropical Botanic Garden on Kauai. References External links USDA Plants Profile cordata Endemic flora of Hawaii Biota of Lanai Taxa named by Adelbert von Chamisso Flora without expected TNC conservation status
https://en.wikipedia.org/wiki/Telecom%20of%20Kosovo
Telecom of Kosovo (), trading as Vala, is a business unit of Post and Telecom of Kosovo. Telecom of Kosovo is a licensed public operator and the first choice provider of fixed network services and internet in the territory of Kosovo. At the end of 2010 Telecom of Kosovo began to provide triple-play services for its customers. With the new IPTV platform, Telecom of Kosovo together with Tring Digital started the Cable TV & IPTV service branded TiK TV. Voice, Internet and media services in combination are provided with lower rates for about 30%. See also Posta e Kosovës Post and Telecommunication of Kosovo Telephone numbers in Kosovo References Kosovo Telecom Telecommunications in Kosovo
https://en.wikipedia.org/wiki/George%20Box%20Medal
The George Box Medal is an insignia of an award named after the statistician George Box. It is awarded annually by the European Network for Business and Industrial Statistics (ENBIS) in recognition of outstanding work in the development and the application of statistical methods in European business and industry. Past Recipients Source: ENBIS 2003 George Box 2004 Søren Bisgaard 2005 Sir David Cox 2006 Gerry Hahn 2007 Poul Thyregod 2008 Doug Montgomery 2009 Tony Greenfield 2010 David Stewardson 2011 Henry Philip Wynn 2012 Bill Woodall 2013 David Steinberg 2014 John F. MacGregor 2015 Geoffrey Vining 2016 David J. Hand 2017 C. F. Jeff Wu 2018 Ron S. Kenett 2019 Ronald J.M.M. Does 2020 William Q. Meeker 2021 Christine Anderson-Cook 2022 Jianjun Shi See also List of mathematics awards References External links . ENBIS website. Mathematics awards Statistical awards
https://en.wikipedia.org/wiki/Death%20of%20Christopher%20Alder
Christopher Alder was a trainee computer programmer and former British Army paratrooper who had served in the Falklands War and was commended for his service with the Army in Northern Ireland. He died in police custody at Queen's Gardens Police Station, Kingston upon Hull, in April 1998. The case became a cause célèbre for civil rights campaigners in the United Kingdom. He had earlier been the victim of an assault outside a nightclub and was taken to Hull Royal Infirmary where, possibly as a result of his head injury, staff said his behaviour was "extremely troublesome." He was escorted from the hospital by two police officers who arrested him to prevent a breach of the peace. On arrival at the police station Alder was "partially dragged and partially carried," handcuffed and unconscious, from a police van and placed on the floor of the custody suite. A conversation took place, during which custody sergeant, PS Dunn, initially told the escorting constables to take Alder to hospital. They pointed out that they had just come from hospital and that the hospital had discharged Alder. The officers speculated that Alder was faking illness, a view which PS Dunn accepted. Alder's handcuffs were removed before all the officers went behind the front counter of the custody suit. At this point, the officers were off camera, but the custody CCTV system continued to capture the audio of their conversation. The officers laughed and joked with one another, and there was a discussion about what Alder should be charged with. During one conversation, an officer can be heard making multiple rhythmic noises, which some subsequent examiners alleged were monkey noises, a form of racist abuse against black people. However, this interpretation has been disputed. Twelve minutes later one of the officers present noticed that Alder was not making any breathing noises and although resuscitation was attempted, he was pronounced dead at the scene. A post mortem indicated that the head injury alone would not have killed him. The incident was captured on the police station's closed-circuit television (CCTV) cameras. A coroner's jury in 2000 returned a verdict that Alder was unlawfully killed. In 2002, five police officers went on trial charged with Alder's manslaughter and misconduct in public office, but were acquitted on the orders of the judge. In 2006, an Independent Police Complaints Commission report concluded that four of the officers present in the custody suite when Alder died were guilty of the "most serious neglect of duty" and "unwitting racism". In November 2011 the government formally apologised to Alder's family in the European Court of Human Rights, admitting that it had breached its obligations with regard to "preserving life and ensuring no one is subjected to inhuman or degrading treatment". They also admitted that they had failed to carry out an effective and independent inquiry into the case. Christopher Alder Christopher Ibikunle Alder (25 June 1960 – 1
https://en.wikipedia.org/wiki/Geospatial%20%28disambiguation%29
Geospatial is an adjective, which pertains to data and information identified with a specific geographical location. Geospatial may also refer to: Geospatial analysis Geospatial imagery Geospatial intelligence Geospatial technology See also Geospace
https://en.wikipedia.org/wiki/Focused%20information%20criterion
In statistics, the focused information criterion (FIC) is a method for selecting the most appropriate model among a set of competitors for a given data set. Unlike most other model selection strategies, like the Akaike information criterion (AIC), the Bayesian information criterion (BIC) and the deviance information criterion (DIC), the FIC does not attempt to assess the overall fit of candidate models but focuses attention directly on the parameter of primary interest with the statistical analysis, say , for which competing models lead to different estimates, say for model . The FIC method consists in first developing an exact or approximate expression for the precision or quality of each estimator, say for , and then use data to estimate these precision measures, say . In the end the model with best estimated precision is selected. The FIC methodology was developed by Gerda Claeskens and Nils Lid Hjort, first in two 2003 discussion articles in Journal of the American Statistical Association and later on in other papers and in their 2008 book. The concrete formulae and implementation for FIC depend firstly on the particular parameter of interest, the choice of which does not depend on mathematics but on the scientific and statistical context. Thus the FIC apparatus may be selecting one model as most appropriate for estimating a quantile of a distribution but preferring another model as best for estimating the mean value. Secondly, the FIC formulae depend on the specifics of the models used for the observed data and also on how precision is to be measured. The clearest case is where precision is taken to be mean squared error, say in terms of squared bias and variance for the estimator associated with model . FIC formulae are then available in a variety of situations, both for handling parametric, semiparametric and nonparametric situations, involving separate estimation of squared bias and variance, leading to estimated precision . In the end the FIC selects the model with smallest estimated mean squared error. Associated with the use of the FIC for selecting a good model is the FIC plot, designed to give a clear and informative picture of all estimates, across all candidate models, and their merit. It displays estimates on the axis along with FIC scores on the axis; thus estimates found to the left in the plot are associated with the better models and those found in the middle and to the right stem from models less or not adequate for the purpose of estimating the focus parameter in question. Generally speaking, complex models (with many parameters relative to sample size) tend to lead to estimators with small bias but high variance; more parsimonious models (with fewer parameters) typically yield estimators with larger bias but smaller variance. The FIC method balances the two desired data of having small bias and small variance in an optimal fashion. The main difficulty lies with the bias , as it involves the distance from the expecte
https://en.wikipedia.org/wiki/Kathleen%20Carley
Kathleen M. Carley is an American computational social scientist specializing in dynamic network analysis. She is a professor in the School of Computer Science in the Carnegie Mellon Institute for Software Research at Carnegie Mellon University and also holds appointments in the Tepper School of Business, the Heinz College, the Department of Engineering and Public Policy, and the Department of Social and Decision Sciences. Background Kathleen Carley was born in Pueblo, Colorado in 1956. At High School her interest in social modeling was inspired by Isaac Asimov's Foundation series. Artificial intelligence was not a career path at that time and she was dissuaded from studying Mathematics because of gender stereotyping. Instead she studied for an S.B. in economics and an S.B. in political science from the Massachusetts Institute of Technology in 1978. She received her Ph.D. in sociology from Harvard University in 1984. Her Ph.D. advisor was Harrison White and her thesis was entitled Consensus Construction. Career On leaving Harvard in 1984, Carley secured a position as Assistant Professor of Sociology and Information Systems at Carnegie Mellon University where she remains based. In 1990 she became Associate Professor of Sociology and Organizations, in 1998 Professor of Sociology, Organizations and IT, and in 2002 attained her current role as Professor of Computation, Organization and Society. Since 1998 she has also held appointments in other CMU schools and departments; the Department of Social and Decision Sciences, Heinz College, Tepper School of Business and Department of Engineering and Public Policy. Research Carley's research combines cognitive science, sociology and computer science to address complex social and organizational problems. Methodologically she applies network science, machine learning, natural language processing, and agent based modeling to high-dimensional, large, and dynamic data. Her most notable research contribution was the establishment of dynamic network analysis (DNA) and the establishment of social cybersecurity. She has also contributed to research on computational social and organization theory, adaptation and evolution, text mining, and the impact of telecommunication technologies and policy on communication, information diffusion, disease contagion and response within and among groups particularly in disaster or crisis situations, and dynamic network methods. She is the director of the Center for Computational Analysis of Social and Organizational Systems, a university-wide interdisciplinary center that brings together network science, computer science, and organizational studies and is the director of the center for Informed Democracy and Social-cybersecurity (IDeaS) at CMU. Carley is the founding co-editor and co-editor-in-chief of the journal Computational and Mathematical Organization Theory. She has co-edited several books in the computational organizations and dynamic network area. See also Dynamic
https://en.wikipedia.org/wiki/Implied%20Spaces
Implied Spaces is a 2008 space opera novel by American author Walter Jon Williams. It explores themes of transhumanism, artificial intelligence and ontology. Setting Implied Spaces takes place approximately 1,500 to 2,000 years in the future. Humanity has entered a period of technological singularity fueled by a series of massive supercomputers orbiting the Sun (Dyson Sphere). These computers act as giant solar collectors and computational machine for running human society. While humanity numbers in the hundreds of billions, only perhaps a few million live in the solar system. Some have gone on slower than light journeys to establish colonies around other stars, such as Alpha Centauri, Tau Ceti, and Epsilon Eridani, a colony lost after a stellar event known as "The Big Belch". Most humans live in artificially created pocket universes. These universes are connected to our own via wormholes maintained on the dark side of the eleven supercomputers orbiting the Sun. These artificial universes can be designed to cater to individual populaces and some have different physical laws than our universe. These pocket universes include the technologically advanced world of Topaz, the medieval fantasy themed world of Midgarth, the hunter gatherer world Olduvia, and the aquatic paradise of Hawaiki, among many others. Various advancements in biotechnology have effectively rendered mankind immortal. Humans no longer age normally, and even death has been overcome by means of resurrection facilities which will download a backed up copy of a personality and memories into a reformed body. Genetic manipulation has allowed people to obtain designer bodies with different, even nonhuman, features. The sole dark spot seems to be the long dormant fear of an episode from the distant past: the Control Alt Delete War. In this first truly worldwide war, a revolutionary political faction known as the Seraphim used a bio-engineered virus to attack humanity. Rather than killing its victims, this virus rewrote their brains so that they were loyal to the Seraphim. As other groups discovered this new weapon they re-engineered it for their own purposes, including one version of the virus which created "zombies", people with an uncontrollable violent rage toward others. While this technology was ultimately suppressed and all but the oldest humans seem to have put it behind them, it remains as a black spot on an otherwise perfect society. Plot The plot begins with a man named Aristide, adventuring in the world of Midgarth. Midgarth was created as a medieval fantasy world and has physical laws which prevent artificial electrical charges or chemical reactions which occur fast enough to create a gun. Through genetic engineering it has been populated with various fantasy races such as orcs and trolls. Aristide is the current nom de guerre of Pablo Monagas Perez, one of the most important figures in human society. Over a thousand years ago Perez had been part of the team which created
https://en.wikipedia.org/wiki/Braunstein%E2%80%93Ghosh%E2%80%93Severini%20entropy
In network theory, the Braunstein–Ghosh–Severini entropy (BGS entropy) of a network is the von Neumann entropy of a density matrix given by a normalized Laplacian matrix of the network. This definition of entropy does not have a clear thermodynamical interpretation. The BGS entropy has been used in the context of quantum gravity. Notes and references Quantum mechanical entropy
https://en.wikipedia.org/wiki/Amplidata
Amplidata is a privately-held cloud storage technology provider based in Lochristi, Belgium. In November 2010, Amplidata opened its U.S. headquarters in Redwood City, California. The research and development department has locations in Belgium and Egypt, while the sales and support departments are represented in a number of countries in Europe and North America. Amplidata has developed a Distributed Storage System (DSS) technology designed to solve the scalability and reliability problems traditional storage systems face, by taking advantage of the introduction of large capacity SATA drives and solid state disk. By storing data across a selection of disks that are widely distributed across storage nodes, racks and sites, the DSS architecture spreads the risk of hardware failure to ensure that a failure of a component such as a disk, storage node or even a full rack has no impact on data availability and a minimal impact on data redundancy. The entire system is permanently monitored and data integrity is constantly checked. As a result, bit errors on disks are proactively healed before they become an issue to the user. Amplidata's AmpliStor distributes and stores data redundantly across a large number of disks. The algorithm that AmpliStor uses first puts the data into an object and then stores the data across multiple disks in the AmpliStor system. By storing the data as an object, Amplidata can reconstruct the original data from any of the disks on which the data within the object resides. Amplidata was acquired in March 2015 by HGST, a Western Digital subsidiary. History Amplidata was founded in 2008 by Wim De Wispelaere (CEO) and Wouter Van Eetvelde (COO). The company was initially funded by Kristof De Spiegeleer. The two founders started the company to address some of the inherent weaknesses of high capacity disk systems, such as performance, bit error rates, mean time between failures and RAID rebuild times which have not improved sufficiently to keep up with the explosion of digital storage needs. The company’s headquarters are in Lochristi, near Gent in Belgium. De Spiegeleer founded Racktivity, Datacenter Technologies, Hostbasket and Dedigate and has been quoted as a proponent for European adoption of cloud computing. De Spiegeleer is also the CEO of Incubaid, which focuses on developing technology ventures via cloud computing and green data centers. Active member companies of Incubaid include: Amplidata, Ractivity, A-Server, Dacentec. Incubaid owns the automation framework used as the foundation for all the technologies that member companies create. Amplidata employs about 50 data storage experts. Some employees of Amplidata were employed by DataCenter Technologies, which was acquired by Symantec in 2005 and Q-layer, which became part of Sun Microsystems in 2009. In May 2010, Amplidata finalized the first round of venture capital funding worth 2.5 million euros, secured by Big Bang Ventures. Big Bang Ventures is known for special
https://en.wikipedia.org/wiki/List%20of%20Scaredy%20Squirrel%20episodes
Scaredy Squirrel is a Canadian animated comedy television series based very loosely on the book series of the same name by Mélanie Watt for YTV and Cartoon Network. The series follows the wisecracking adventures of an orange squirrel named Scaredy and his best friend Dave, a anthropomorphic blue and white skunk. It was produced by Nelvana, in association with YTV, with additional production facilities provided by Studio 306, Pipeline Studios Inc. and Super Sonics Productions Inc., with Dolby Digital doing the sound, with Writers Guild of Canada and ACTRA writing the show's renewal plates, with the series' funding provided by The Canada Media Fund and The Canadian Film or Video Production Tax Credit. The series premiered on YTV in Canada on April 1, 2011, and on Cartoon Network in the United States on August 9, 2011. It ended on YTV in Canada on August 17, 2013, and in the United States on September 17, 2014. Series overview Episodes Season 1 (2011) </onlyinclude> Season 2 (2012–13) Season 3 (2013) References Scaredy Squirrel
https://en.wikipedia.org/wiki/Star%20Box%20%28talk%20show%29
Star Box is a 2011 Philippine television talk show broadcast by GMA Network. Hosted by Ali Sotto, Papa Jack, MM Magno and MJ Magno, it premiered on April 4, 2011. The show concluded on May 13, 2011 with a total of 28 episodes. It was replaced by Kapuso Movie Festival in its timeslot. Ratings According to AGB Nielsen Philippines' Mega Manila household television ratings, the pilot episode of Star Box earned a 7.7% rating. References 2011 Philippine television series debuts 2011 Philippine television series endings Filipino-language television shows GMA Network original programming Philippine television talk shows Television series by TAPE Inc.
https://en.wikipedia.org/wiki/Commodore%20USA
Commodore USA, LLC was a computer company based in Pompano Beach, Florida, with additional facilities in Fort Lauderdale, Florida. Commodore USA, LLC was founded in April 2010. The company's goal was to sell a new line of PCs using the classic Commodore and Amiga name brands of personal computers, having licensed the Commodore brand from Commodore Licensing BV on August 25, 2010 and the Amiga brand from Amiga, Inc. on August 31, 2010. After the 2012 demise of Commodore USA, the claimed Commodore brand license turned out to be invalid, as a court ruled in 2013 that neither Asiarim Corporation nor its subsidiary Commodore Licensing BV ever were in a position to grant such a license. The court found that the Commodore trademarks were held by C=Holdings BV, and held Asiarim liable for trademark infringement. The Amiga brand license too was disputed by Hyperion Entertainment, on the basis of a 2009 settlement agreement between Hyperion and Amiga. The last news release from the website is dated March 21, 2012. In January 2013, it was revealed that founder and driving force Barry S. Altman died of cancer on December 8, 2012. The last post on Commodore USA's forum came from Leo Nigro (Chief Technical Officer) on the 9th of December concerning the Amiga line. Products Phoenix The Commodore Phoenix was a keyboard computer resembling an updated style of the Commodore 64. It was originally designed and manufactured by Cybernet as a space-saving workstation. Commodore 64x The flagship product for Commodore USA, named the Commodore 64x, was contained in a partially redesigned and updated Commodore 64 form factor. The machine looked like the original Commodore 64, except with a slightly updated keyboard and power supply. The base model has an Intel Atom processor and an NVIDIA Ion 2 graphics card. The top version released on August 13, 2011 was called the "C64x Extreme" and featured an Intel Core i7 CPU with 8 GB RAM and 3 TB hard drive using the Intel Sandy Bridge chipset. There was also a barebones version of the C64x shell without a motherboard, power supply, or optical drive or hard drive, that was meant to encourage hobbyist enthusiasts to install their preferred Mini-ATX motherboard. VIC The revamped Vic product line is a group of keyboard computers with original Commodore function keys. The Vic Slim had a keyboard that was the same size as most extended keyboards, but used a relatively slow Intel Atom CPU. The Vic Pro was a keyboard computer that also contained a built-in touchpad, memory card reader, and two fans. Amiga A product line of Amiga branded x86 computers based upon the Intel i7 chipset featuring emulation of the classic Amiga systems built-in. The only available Amiga sold so far is the Amiga Mini which was a barebone computer. The Amiga Mio was offered as a refresh of the Amiga Mini, but was discontinued on November 4, 2013. Commodore OS As of November 11, 2011, Commodore USA has released a beta version of Commodore OS, a Linux
https://en.wikipedia.org/wiki/Body%20of%20Evidence%20%281988%20film%29
Body of Evidence is a psychological thriller film directed by Roy Campanella II and starring Margot Kidder and Barry Bostwick. It premiered on CBS Network in January 1988. It was filmed in Alberta, Canada Premise An unsuspecting nurse (Margot Kidder) fears her forensic pathologist second-husband (Barry Bostwick) may be the psychotic serial strangler behind a recent rash of grisly murders. A local police detective (Tony LoBianco) does his best to unravel clues that may prevent future slayings. Plot There is a serial killer loose in the area. He is killing young girls by garrotting them with a wire noose. The motive is unknown and therein lies the danger because it is then almost impossible to find out who is behind the crimes. The pathologist involved in most of the murder investigations, discovers a number of clues. He knows that the murderer is Afro-American, left-handed and sterile. He deducted all this from his examinations of the bodies. His wife, Carol (Margot Kidder), a nurse, organizes a neighborhood watch protection group because of the shocking slayings. As the police detective delves deeper and deeper into the murders, he keeps coming up against a brick wall. Every advantage he gets is lost because as the list of victims grows, the composite sketch changes with each new witness, as if the killer had the gift of always keeping one step ahead of the detective's investigation. As the intensity of the killing increases, the need to catch the killer becomes more and more important. This is because Carol - who is working closely with the police - finds reasons to fear for her own safety. All the victims resemble her, and the clues appear to point to her second husband, the forensic police pathologist involved in the investigation whose increasingly bizarre behaviour seems to implicate him even further. Cast Margot Kidder ... Carol Dwyer Barry Bostwick ... Alex Dwyer Caroline Kava ... Jean Jennifer Barbour ... Jessie David Hayward ... Jack Tony Lo Bianco ... Evan Campbell Debbie Carr ... Lisa Peter Bibby ... Intern Garwin Sanford ... Doctor Georgie Collins ... Lady in Hospital Don S. Davis ... Gun Salesman Blu Mankuma ... Sawyer Don MacKay ... J.P. Bill Croft ... Construction Man #1 Karen Tilly ... Stephanie References External links 1988 television films 1988 films 1980s psychological thriller films Films shot in Alberta American serial killer films CBS network films 1980s American films
https://en.wikipedia.org/wiki/Doran%20Expressway
Doran Expressway is the northern section of eastern part of Tehran ring road expressway network connecting Basij Expressway to Yasini Expressway. Expressways in Tehran
https://en.wikipedia.org/wiki/Retrenchment%20%28disambiguation%29
Retrenchment is a political theory. Retrenchment may refer also to: Retrenchment (labour), a term for "layoff" in Australia, Singapore, South Africa, and other countries Retrenchment (computing) Retrenchment (military), a technical term in military fortification
https://en.wikipedia.org/wiki/Ab%C3%AEme
In geography, an abîme is a vertical shaft in karst terrain that may be very deep and usually opens into a network of subterranean passages. The term is borrowed from French, where it means abyss or chasm. Definition Formation Abîmes are a structure which form late in the life of a limestone cave. They can be 1–10 metres in diameter and up to 50 metres in height vertically. The walls have grooves that serve as a contrast to the smooth nature of the rest of the cave. They are known to lie under heads of stream valleys, sinkholes, or along non-carbonated rocks. Water will occasionally fall down the shaft, creating subterranean waterfalls. Only a small portion of the abîme connects to the rest of the cavern. They can extend to the present water table, while the rest of the cavern lies above it. Other names Abîme are also known as pit caves in the United States and pot caves in England. They can also be called domepits, due to the way that looking up from below a dome can be seen and looking down from above a pit is seen. Blue holes are sinkholes that have filled with water and can occur on land or at sea. In Central America, they are called cenotes. Recreation Rappelling (or pit caving) This is the act of using ropes, harnesses and ladders to descend an abîme. This is the most popular activity besides the actual exploration of caves. It is also the most dangerous activity to do in a cave. The biggest danger comes from using poor ropes and ladders for rappelling down shafts. Many amateurs make this mistake and it leads to the most cave deaths. Base cave jumping (Cave of Swallows, Mexico) An extreme sport and requiring a person to stand at the entrance of an abîme and jump into the opening while pulling a parachute before hitting the cave floor. This is highly dangerous and should only be undertaken by those with experience. The Cave of Swallows is the most popular due to its freefall drop, which is the longest in the Western hemisphere. Popular examples Cave of Swallows, Mexico Hellhole (cave), West Virginia El Capitan Pit, Prince of Wales Island, Alaska Vrtiglavica Cave, Slovenia Pozzo del Merro, Italy (Deepest blue hole, 392m) References Literature "Cave of Swallows." Wikipedia. Wikimedia Foundation, n.d. Web. 04 Dec. 2015. Jennings, J. N., and J. N. Jennings. Karst Geomorphology. Oxford, UK: B. Blackwell, 1985. Print. Lübke, Anton. The World of Caves. New York: Coward-McCann, n.d. Print. Moore, George William, and G. Nicholas Sullivan. Speleology: Caves and the Cave Environment. St. Louis: Cave, 1997. Print. "Pit Cave." Wikipedia. Wikimedia Foundation, n.d. Web. 04 Dec. 2015. Karst formations Dinaric Alps Dinaric karst formations
https://en.wikipedia.org/wiki/Trolleybuses%20in%20Hastings
The Hastings trolleybus system once served the town of Hastings, East Sussex, England. Opened on , it gradually replaced the Hastings tramway network, with the first route to be converted that from the Fishmarket to Hollington, East Sussex and the last, the circular route. Tram replacement cost £1,383 per mile, but increased average speed from 7.5 to over 10 mph and cut costs from 13d to 10d per mile. By the standards of the various now-defunct trolleybus systems in the United Kingdom, the Hastings system was a moderately sized one, with a total of 10 routes, and a maximum fleet of 58 trolleybuses. However, by May 1929 Hastings had 21 miles of trolleybus routes, then the longest in the world. It was closed relatively early, on . Maidstone & District Motor Services bought the Tramway Co. in November 1935, but didn't merge it until 1957. The livery changed from brown to green after the takeover, but the 'Hastings Tramways' logo remained until 1957. The power source also changed in 1936, when the tramway power station at Ore was replaced by municipal power. Four of the former Hastings trolleybuses are now preserved. One is at the Trolleybus Museum at Sandtoft, Lincolnshire, and another at East Anglia Transport Museum, Carlton Colville, Suffolk. The remaining two, one of which was fitted with a diesel engine in 1959–60, are owned by the Hastings Trolleybus Restoration Group, Bexhill-on-Sea, East Sussex. The earliest is 1929 open top No.3, which was stored in 1938, but restored in 1952 to run summer open top services. See also Transport in Hastings List of trolleybus systems in the United Kingdom Notes References Bibliography External links Hastings Trolleybus Restoration Group SCT'61 website - photos and descriptions of Hastings and District trolleybuses Historical Hastings Wiki - Trolleybuses National Trolleybus Archive British Trolleybus Society, based in Reading National Trolleybus Association, based in London Transport in Hastings Hastings Hastings History of East Sussex 1928 establishments in England 1959 disestablishments in England
https://en.wikipedia.org/wiki/Trolleybuses%20in%20Darlington
The Darlington trolleybus system once served the town of Darlington, County Durham, England. Opened on , it replaced the Darlington Corporation Light Railways tramway network. By the standards of the various now-defunct trolleybus systems in the United Kingdom, the Darlington system was a moderately sized one, with a total of 5 routes, and a maximum fleet of 66 trolleybuses. It was closed relatively early, on . None of the former Darlington trolleybuses are recorded as having been preserved. See also Transport in Darlington List of trolleybus systems in the United Kingdom References Notes Further reading External links National Trolleybus Archive British Trolleybus Society, based in Reading National Trolleybus Association, based in London Transport in Darlington Darlington Darlington
https://en.wikipedia.org/wiki/Jean-Pierre%20Eckmann
Jean-Pierre Eckmann (born 27 January 1944) is a Swiss mathematical physicist in the department of theoretical physics at the University of Geneva and a pioneer of chaos theory and social network analysis. Eckmann is the son of mathematician Beno Eckmann. He completed his PhD in 1970 under the supervision of Marcel Guenin at the University of Geneva. He has been a member of the Academia Europaea since 2001. In 2012, he became a fellow of the American Mathematical Society. He is also a member of the Göttingen Academy of Sciences and Humanities. With Pierre Collet and Oscar Lanford, Eckmann was the first to find a rigorous mathematical argument for the universality of period-doubling bifurcations in dynamical systems, with scaling ratio given by the Feigenbaum constants. In a highly cited 1985 review paper with David Ruelle, he bridged the contributions of mathematicians and physicists to dynamical systems theory and ergodic theory, put the varied work on dimension-like notions in these fields on a firm mathematical footing, and formulated the Eckmann–Ruelle conjecture on the dimension of hyperbolic ergodic measures, "one of the main problems in the interface of dimension theory and dynamical systems". A proof of the conjecture was finally published 14 years later, in 1999. Eckmann has done additional mathematical work in very diverse fields such as statistical mechanics, partial differential equations, and graph theory. His PhD students have included Viviane Baladi, Pierre Collet, and Martin Hairer. References External links Website of Jean-Pierre Eckmann 1944 births Living people Mathematical physicists University of Geneva alumni Academic staff of the University of Geneva Fellows of the American Mathematical Society
https://en.wikipedia.org/wiki/RA%20plot
The ratio average (RA) plot is an integer-based version of an MA plot for visualizing two-condition count data. Its distinctive arrow-like shape derives from the way it includes condition-unique (0,n) or (n,0) points into the plot via an epsilon factor. Definition An RA plot, like its cousin, the MA plot, is a re-scaled and (45-degree) rotated version of a simple two-dimensional scatter plot of a versus b where a and b are equal-length vectors of positive measurements. This rescaling and rotation allows for better visibility and emphasis of important outliers points that vary between the two measurement conditions. Essentially it is a plot of the log ratio [R] vs the average log [A] of each pairing of the elements of a and b. Unlike an MA plot, however, because the RA plot takes non-negative integer counts as input, it must employ work-arounds to include mathematically invisible points (such as points where one or both element(s) of the pair is zero). If we modify our original a (or b) vector via: where then R and A can be defined as: R, like M, is plotted on the y-axis and represents a log (fold change) ratio between a and b. A is plotted on the x-axis and represents the average abundance for a coordinate pair. The RA plot provides a quick overview of the distribution and size of a dataset consisting of non-zero counts. Etymology The acronym prefix "R.A." is sometimes pronounced as the one syllable word "ray" because of the plot's strong resemblance to a geometric ray. This characteristic arrow-like shape derives from two key features: on the right at the vector origin, a long asymptotic tail, and on the left (forming the arrow head) two (often dense) patches of condition-unique points. Work-arounds for point visibility and inclusion Condition unique points Because a large portion of the pairs of a and b contain zeros in one or both conditions, they are impossible to plot as-is on a log scale. Other MA plotting functions artificially include these condition-unique points in the plot by spreading them vertically as a "smear" on the left or horizontally as a "rug" at the very top and bottom of the plot. In an RA plot, by contrast, the uniques are included via addition a small epsilon factor (between .1 and .5) which places them in a more statistically appropriate location in the plot. Overplotting Another problem with plotting this (or any) type of count data is overplotting which is solved in the RA plot by jittering the points out away from each other but no so far as to merge with other coordinates. The result of this feature is a patchwork-like appearance to the plot that fades away as the A increases. Packages The caroline CRAN R package contains the only known implementation of an RA plot. However, the meta-transcriptomics "manta" R package provides a wrapper around this RA plot implementation and is used for assessing fold change in transcription of genes (the points) while simultaneously visualizing each ge
https://en.wikipedia.org/wiki/Binary%20recompiler
A binary recompiler is a compiler that takes executable binary files as input, analyzes their structure, applies transformations and optimizations, and outputs new optimized executable binaries. The foundation to the concepts of binary recompilation were laid out by Gary Kildall with the development of the optimizing assembly code translator XLT86 in 1981. See also Binary optimizer (binary-to-binary) Binary translator (binary-to-binary) Decompiler (binary-to-source) Disassembler (binary-to-source) Dynamic recompiler (binary-to-binary) Transcompiler (source-to-source) Honeywell Liberator (running IBM 1401 programs on Honeywell H200) References Further reading (36 pages) Compiler construction Computer libraries
https://en.wikipedia.org/wiki/HP%20Business%20Service%20Automation
HP Business Service Automation was a collection of software products for data center automation from the HP Software Division of Hewlett-Packard Company. The products could help Information Technology departments create a common, enterprise-wide view of each business service; enable the automation of change and compliance across all devices that make up a business service; connect IT processes and coordinate teams via common workflows; and integrate with monitoring and ticketing tools to form a complete, integrated business service management solution. HP now provides many of these capabilities as part of HP Business Service Management software and solutions. Need for automation IT no longer competes against past practices and cost structures. IT now competes against the costs structures of cloud computing and software as a service (SaaS) providers and hosts. To remain competitive, and to determine what to retain and what to outsource, IT needs to make all of its systems and applications perform better and more efficiently. IT also needs to automate the applications and systems to keep complexity and costs in line. Visibility, automation and management are essential, regardless of the underlying infrastructure. They also allow IT to function as the best broker of services, regardless of where the servers may reside. The efficiencies of having this type of integration, automation and management have led to the rise of Converged Infrastructure environments. This type of data center environment allows enterprises to get their applications up and running faster, with easier manageability and less maintenance, and enables IT to more rapidly adjust IT resources (such as servers, storage and networking) to meet fluctuating and unpredictable business demand. Products HP Business Service Automation consisted of several software products that encompassed both data center automation and client automation with runtime visibility and control over the data center. HP Server Automation software automates the server lifecycle for physical and virtual servers and automates the deployment of applications. HP Application Deployment Manager (ADM) software automated the release process to bridge the gap among development, quality assurance and operations teams. HP Network Automation Software delivers network change and configuration management through real-time visibility, automation and control for network compliance, security and cost savings. HP Operations Orchestration software is an IT process automation platform that provides a single view for automating IT processes in hybrid IT infrastructures, including cloud computing environments. HP Storage Essentials software, standards-based storage resource management software, provides visibility into applications, drilling down from host to storage infrastructure. HP Database and Middleware Automation software, from the acquisition of Stratavia automates the provisioning, patching, compliance and configura
https://en.wikipedia.org/wiki/X-fast%20trie
In computer science, an x-fast trie is a data structure for storing integers from a bounded domain. It supports exact and predecessor or successor queries in time O(log log M), using O(n log M) space, where n is the number of stored values and M is the maximum value in the domain. The structure was proposed by Dan Willard in 1982, along with the more complicated y-fast trie, as a way to improve the space usage of van Emde Boas trees, while retaining the O(log log M) query time. Structure An x-fast trie is a bitwise trie: a binary tree where each subtree stores values whose binary representations start with a common prefix. Each internal node is labeled with the common prefix of the values in its subtree and typically, the left child adds a 0 to the end of the prefix, while the right child adds a 1. The binary representation of an integer between 0 and M − 1 uses ⌈log2 M⌉ bits, so the height of the trie is O(log M). All values in the x-fast trie are stored at the leaves. Internal nodes are stored only if they have leaves in their subtree. If an internal node would have no left child, it stores a pointer to the smallest leaf in its right subtree instead, called a descendant pointer. Likewise, if it would have no right child, it stores a pointer to the largest leaf in its left subtree. Each leaf stores a pointer to its predecessor and successor, thereby forming a doubly linked list. Finally, there is a hash table for each level that contains all the nodes on that level. Together, these hash tables form the level-search structure (LSS). To guarantee the worst-case query times, these hash tables should use dynamic perfect hashing or cuckoo hashing. The total space usage is O(n log M), since each element has a root-to-leaf path of length O(log M). Operations Like van Emde Boas trees, x-fast tries support the operations of an ordered associative array. This includes the usual associative array operations, along with two more order operations, Successor and Predecessor: Find(k): find the value associated with the given key Successor(k): find the key/value pair with the smallest key larger than or equal to the given key Predecessor(k): find the key/value pair with the largest key less than or equal to the given key Insert(k, v): insert the given key/value pair Delete(k): remove the key/value pair with the given key Find Finding the value associated with a key k that is in the data structure can be done in constant time by looking up k in LSS[0], which is a hash table on all the leaves. Successor and Predecessor To find the successor or predecessor of a key k, we first find Ak, the lowest ancestor of k. This is the node in the trie that has the longest common prefix with k. To find Ak, we perform a binary search on the levels. We start at level h/2, where h is the height of the trie. On each level, we query the corresponding hash table in the level-search structure with the prefix of k of the right length. If a node with that prefix does not exis
https://en.wikipedia.org/wiki/PLUN.ASIA
PLUN.ASIA, formerly PLU-N.COM, was a bilingual social networking service that catered to the Vietnamese gay community worldwide. A digital brand of DWM Inc., it provided tools to help users find and connect with friends. Its slogan was "He's Here", reflecting the site's mission to help singles find their dream boys. In November 2010, it declared its business model, a gay dating and social networking site, the only one of its kind in Vietnam and Asia. It is believed to compete with Fridae and gaydar in the Vietnam market. PLUN was founded by Kelvin To in 2010. After spending nine years seeking funding for the project, he decided to start the website himself. PLUN is the main supporter and sponsor of some of the largest local Asian LGBT events, such as Angel Style and Bitch Party, and regional events such as Black Party; White Party; Pride Manila in Manila, Philippines; and gCircuit Songkran 2013 in Bangkok, Thailand. The name PLUN stands for PLU Nation. PLU (People Like Us) is a common term used in Hong Kong, Singapore and Malaysia to refer to the LGBT community. Kelvin To, a Vietnamese, chose to have PLU in the site's name because he spent most of his early years in Singapore. Features PLUN's users have described it as "gay.com meets Facebook meets Foursquare". It quickly became popular among Vietnamese users when Facebook—their new favorite channel after Yahoo! 360 was closed in 2008—became more difficult to access due to government restrictions (see Censorship of Facebook). In January 2011, CEO Kelvin To announced a new version world be released by year end, followed by a mobile app. Management change and rebranding In July 2011, To made a share buyback offer to other partners and became DWM's controlling shareholder. In December 2011, DWM rebranded the website PLUN.ASIA, and few months later, a new team was hired to create the next version of PLUN. In early December 2012, a month before version 2.0 was to be released, PLUN released a video, "Even We're Apart" (Yêu Trong Xa Cách), which immediately became a phenomenon in the local LGBT community and on official media channels. It was featured on VNExpress' Ione, Zing's YouTube Channel, Kenh14, and HimMag. References LGBT rights in Vietnam Defunct social networking services
https://en.wikipedia.org/wiki/The%20Game%20Channel
The Game Channel (abbreviated TGC, stylized on small letters as tgc from January 2014 – February 2015) was a Filipino cable and satellite television network owned and produced by Solar Entertainment Corporation who also created the networks My Movie Channel, NBA Premium TV, Jack TV, Solar Sports, BTV. It was available over Destiny Cable channel 89 and Cablelink channel 225. This network is more focused on family game shows and reality game shows. History Initial broadcast and BEAM Channel 31 affiliate The Game Channel launched on April 8, 2011 on Destiny Cable. It conducted its initial test broadcast from April 8, 2011 until September 29. Recently, it had launched its initial broadcast on BEAM Channel 31 on August 15, 2011. It had its official broadcast together with its former affiliated free TV network BEAM Channel 31 on September 30, 2011. On October 1, 2011, The Game Channel (together with its latter free-to-air broadcasting partner – BEAM TV Channel 31) was formally launched on SkyCable via channel 84 (in compliance with the NTC's rules of must-carry basis) and it was available through its digital platform. The Game Channel & CHASE On December 24, The Game Channel limited its broadcast on daytime sharing with a new channel CHASE (later Jack City and now CT) which takes over the evening block. Chase goes 24 In the middle of February 2012, while CHASE started its broadcast, there is an investigator note appeared on every show of Chase (which is located on the lower-left side on the TV screens). Noted that CHASE goes 24. After that event, on February 15, 2012, The Game Channel bid farewell to the Free-TV Viewers. Chase took all over its permanent blocktime broadcast. This network was broadcast on Destiny Cable (channel 89) on the same day. Replaced by My Movie Channel After almost 3 years of broadcasting, The Game Channel announced that they would no longer be broadcasting on television effective February 28, 2015 and gave thanks to its viewers before they signed off for the last time. It was replaced by My Movie Channel, which can be seen on Destiny Cable (Digital) Channel 219 (Analog) Channel 89 and Cablelink (Digital) Channel 225, starting on March 1, 2015. However, it did not last long, as Solar Entertainment announced that My Movie Channel would also cease to exist just four months later, on July 1, 2015. Programming Final aired programs Game Shows Jeopardy! (season 29) Wheel of Fortune (season 30) The Got Talent (season 31) Reality Shows America's Got Talent (season 8) Fat March (season 1) The Bachelorette (season 9) The Bachelor (season 10) The Biggest Loser (season 10) The Kitchen Millionaire Top Chef (season 10) Total Blackout (season 2) Philippines Got Talent (aired on ABS-CBN) Other America's Next Great Restaurant Game Changers (season 1) Ice Cold Cash (season 1) The League (season 3) Super Shangers (season 1) Previously aired programs (with BEAM Channel 31) RPN News Watch (aired also on BEAM channel 31 and on RPN 9)¹
https://en.wikipedia.org/wiki/Trolleybuses%20in%20Brighton
The Brighton trolleybus system formerly served the town of Brighton, East Sussex, England. Opened on , it gradually replaced the Brighton Corporation Tramways network. By the standards of the various now defunct trolleybus systems in the United Kingdom, the Brighton system was a moderately sized one, with a total of nine routes. It was also unusual, in that it had two operators. The main operator of the system was Brighton Corporation Transport, which owned the wires, and at its peak had a fleet of 52 trolleybuses. The other operator, Brighton, Hove & District Omnibus Co. Ltd., introduced a fleet of eight trolleybuses to the system on with three more following later, and ran them on four of the system's routes. The whole system was closed relatively early, on . Two of the former Brighton trolleybuses are now preserved. One is at the Science Museum annexe at Swindon, and the other is at the East Anglia Transport Museum, Carlton Colville, Suffolk. The latter vehicle, no 52, is preserved in the livery of Maidstone Corporation, which acquired it and used it on the Maidstone trolleybus system, following the closure of the Brighton system. See also Transport in Brighton and Hove List of trolleybus systems in the United Kingdom References Notes Further reading External links SCT'61 website – photos and descriptions of Brighton Corporation trolleybuses and early motorbuses. Brighton Hove & District Transport trolleybus historical site National Trolleybus Archive British Trolleybus Society, based in Reading. National Trolleybus Association, based in London. Brighton History of Brighton and Hove Brighton Brighton
https://en.wikipedia.org/wiki/Fearfeasa%20%C3%93%20Maol%20Chonaire
Fearfeasa Ó Maol Chonaire, sometimes Fearfeasa O'Mulconry and other variations, (fl. 1630s) was an Irish chronicler who is primarily known as the co-compiler and scribe of the Annals of the Four Masters. Family background Ó Maol Chonaire was a member of the Ó Maolconaire brehon family of north County Roscommon in Connacht. A member of the Sliocht Pháidín, his genealogy was Fearfeasa mac Lochlainn mac Séan Ruadh (died 1589) mac Lochlainn mac Paidín Ó Maolconaire (died 1506). He was thus closely related to Muirgheas mac Pháidín Ó Maolconaire (died 1543) and his descendants, Fláithrí Ó Maol Chonaire (died 1629) and Muiris mac Torna Ó Maolconaire (died 1645). It has been suggested by Eoin Mac Cárthaigh that Fearfeasa's lands were in the townland of Creta, parish of Kiltrustan, beside that of his father, Lochlainn, who lived in Lisheen townland. Páidín Ruadh Ó Maol Chonaire, who retained two-thirds of his lands in Ballymulconry in the 1650s, may have been Fearfeasa's brother. Peter (fl. 1701), son of Fearfasa, was poet to the O'Róduighe, and lived in County Leitrim. The Four Masters He was one of the authors of the Annals of the Kingdom of Ireland and, with the three other chief writers, was included by John Colgan in the designation Annales Quatuor Magistrorum (Preface to Acta Sanctorum Hiberniæ, p. 7), which has become the popular name of the book. As a young man, he participated in the compilation of the Annals of the Four Masters, working with Mícheál Ó Cléirigh, Cú Choigcríche Ó Cléirigh, Peregrine Ó Duibhgeannain and other assistants. He is identified by Bernadette Cunningham as the scribe of hand E in the autograph of the Annals of the Four Masters. He participated in the compilation of the years up to 1333 with Ó Duibhgeannáin, the Ó Cléirigh's writing the rest of the book to 1616. Opposition to Tuileagna Ó Maol Chonaire Fearfeasa strenuously opposed Tuileagna Ó Maol Chonaire, whose criticisms of the work of the Four Masters prevented its publication in the 1640s. Poet Fearfeasa was the author of many poems, one of which was Mochean do[d] chuairt a Chalbhaigh, addressed to An Calbhah Ruadh Ó Domhnaill. Family tree:An Sliocht Pháidín Paidín mac Lochlainn meic Maelsechlainn Ó Maolconaire, d. 1506 (a quo Sliocht Pháidín) | |_ | | | | Lochlainn Muirgheas mac Pháidín Ó Maolconaire, d. 1543. | | | |_ Séan Ruadh, d. 1589. | | | | | | Eóluis Fíthil and Onóra___ Lochlainn | | | | | | | |
https://en.wikipedia.org/wiki/HeeksCAD
HeeksCAD is a free software computer-aided design program written in C++. It uses Open CASCADE Technology internally for the modelling and wxWidgets as its widget toolkit. HeeksCAD supports cuboids, spheres, cylinders and cones as basic 3D solids. Further geometric objects may be created by sweeping or connecting 2D shapes. HeeksCAD makes extensive use of local coordinate systems. For example, these are used to define the drawing plane and the direction of an extrusion. The program can be extended with additional plugins. Plugins are available for Python scripting, milling and freeform surface modelling. See also Comparison of CAD editors for AEC References Further reading B. Collette, D. Falck, No Secrets: Open-source CAM Application Bares All, Digital Machinist Vol. 5 No. 3 Fall 2010 External links Free computer-aided design software Free software programmed in C++ Computer-aided design software for Linux Software using the BSD license Software that uses wxWidgets
https://en.wikipedia.org/wiki/Thumbay%20Hospital
Thumbay Hospital is a network of academic hospitals based in the UAE. They are Academic Health Centers of the Gulf Medical University (GMU) Academic Health System. Thumbay Hospitals are located in Dubai, Ajman, Sharjah and Fujairah, in addition to Hyderabad-India. The hospital chain is owned by Thumbay Group. Background The first Thumbay Hospital, affiliated to GMU, was inaugurated in Ajman on 17 October 2002 by Sheikh Humaid Bin Rashid Al Nuaimi, as the first teaching hospital in the private sector in UAE. Today, Thumbay Hospital is considered as one of the largest private healthcare provider in the region, catering to patients from over 175 nationalities and having staff from over 20 nationalities, speaking over 50 languages. The hospital network has extended its services through its hospitals in Dubai, Sharjah and Fujairah in the UAE as well as in Hyderabad - India. Thumbay University Hospital located at Thumbay Medicity, Al Jurf, Ajman is the biggest academic hospital in the region with 350-bed capacity. Thumbay Dental Hospital located at Thumbay Medicity, Al Jurf, Ajman is a 60-chair dental hospital. Thumbay Physical Therapy & Rehabilitation Hospital located at Thumbay Medicity, Al Jurf, Ajman, is a state-of-the-art hospital for physical therapy and rehabilitation. Thumbay Hospital - Ajman is the first private teaching hospital in Ajman with a capacity of 250 beds. It has the following departments: Accident & Emergency, Anesthesiology, Cardiology, Clinical Nutrition, Dental Centre, Dermatology, ENT, Family Medicine, General Surgery, Insurance, Internal Medicine, Laboratory Services, Nephrology, Neurology, Neurosurgery, Obstetrics & Gynaecology, Ophthalmology, Orthopedic, Patient Affairs, Pediatric Surgery, Pediatrics & Neonatology, Physical Therapy, Plastic Surgery, Psychiatry, Pulmonology, Radiology, Urology. Thumbay Hospital – Dubai has a capacity of 150 beds. Its departments are: Accident & Emergency, Anesthesiology , Cardiology , Dental Centre, Dermatology, ENT, General Surgery, Insurance, Internal Medicine, Laboratory Services, Nephrology, Neurology, Obstetrics & Gynecology, Ophthalmology, Orthopedic, Patient Affairs, Pediatric Surgery, Pediatrics & Neonatology, Physical Therapy, Psychiatry, Pulmonology, Radiology, Urology. Thumbay Hospital – Fujairah is a 60-bed facility. Departments: Anesthesiology, Cardiology, Dental, Dermatology, Emergency, ENT, General Surgery, Internal Medicine, Obstetrics & Gynecology, Ophthalmology, Orthopedics, Pediatrics, Radiology. Thumbay Medical & Dental Specialty Center – Sharjah also supports clinical teaching activities of the Dental College of Gulf Medical University. The following departments are available: Dental Centre, Emergency, General Surgery, Internal Medicine, Obstetrics & Gynecology, Ophthalmology, Orthopedic, Pediatrics. Thumbay Hospital Day Care - Rolla, Sharjah is a multispecialty hospital which offers treatments and procedures as day-cases. Thumbay Hospital Day Care - Univer
https://en.wikipedia.org/wiki/National%20road%201%20%28Poland%29
National road 1 (, abbreviated as DK1) is a route in the Polish national road network, connecting northern and southern regions of Poland. It runs from Gdańsk on the Baltic Sea coast, through the center of the country, at its southern end at the Upper Silesian Industrial Area forking into two branches to the border with the Czech Republic at Gorzyczki and with Slovakia at Zwardoń. The route traverses the Pomeranian, Kuyavian-Pomeranian, Łódź and Silesian voivodeships. Most of the national road 1 is a part of the European route E75. The entire route from Gdańsk to the Czech border has been gradually upgraded to motorway standards, forming the A1 motorway known as the Amber Highway. Key segments were opened between 2005 and 2016, and a final section was finished in 2023. Segments of the old route were reassigned as the national road 91. The branch of the route from Pyrzowice near Katowice to Zwardoń is being upgraded to an expressway, marked S1. The reconstruction is scheduled to completed by 2024. According to the Regulation of Minister of Infrastructure from February 9, 2023, the stretch of road between motorway junction Częstochowa Północ and junction with national road 91 is again signed as national road 1. However, this spur is not considered the main course of the route. Major cities and towns along the route Gdańsk (national road 7) Toruń (national road 15, 80) Włocławek (national road 62) Krośniewice (national road 92) Zgierz (national road 71) Łódź (national road 14, 72) Piotrków Trybunalski (national road 8, 12, 91) Radomsko (national road 42) Częstochowa (national road 43, 46, 91) Siewierz (national road 78) Dąbrowa Górnicza (national road 94) Sosnowiec Mysłowice (national road 4) Tychy (national road 44, 86) Bielsko-Biała (national road 52) Zwardoń, border with Slovakia Notes After opening the A1 motorway in 2020, the old route was deprived of signage of national road 1. The matter of signage was later a subject of dispute between Częstochowa city council and General Directorate for National Roads and Highways. References External links 01
https://en.wikipedia.org/wiki/The%20Echo%20Nest
The Echo Nest is a music intelligence and data platform for developers and media companies. Owned by Spotify since 2014, the company is based in Somerville, MA. The Echo Nest began as a research spin-off from the MIT Media Lab to understand the audio and textual content of recorded music. Its creators intended it to perform music identification, recommendation, playlist creation, audio fingerprinting, and analysis for consumers and developers. History The Echo Nest was founded in 2005 from the dissertation work of Tristan Jehan and Brian Whitman at the MIT Media Lab. In October 2010, The Echo Nest received a $7 million venture financing from Matrix Partners and Commonwealth Capital Ventures. In March 2014, The Echo Nest was acquired by Spotify for 49.7 million euro, consisting of cash and Spotify's equity. Products The Echo Nest's product line was based on their automatically derived database of data about 30 million songs aggregated from web crawling, data mining, and digital signal processing techniques. The company also made its data available to developers via an API used by over 7,000 developers to build independent music applications. The API was shut down on 31 May 2016, and developers were encouraged to use the Spotify API instead. The Echo Nest released data on 1 million songs for research purposes. The company was a co-organizer of Music Hack Day. In June 2011, the company released Echoprint, an open source and open data acoustic fingerprinting library. Clients The data powered music solutions for customers such as MTV, Island Def Jam, BBC, MOG, Warner Music Group, eMusic, Spotify, Rdio, Clear Channel, VEVO, Nokia, SiriusXM and Thumbplay. Spotify The Echo Nest was acquired on 6 March 2014, by music streaming service Spotify. The music intelligence agency functions to help Spotify curate personalized music recommendations that are driven by algorithms. The Echo Nest is the driving force behind the playlists professionally curated on Spotify. To generate individualized Discover Weekly playlists as well as recommend suggestions in the 'Discover' section of Spotify's home page, individualized for every subscriber, the Echo Nest collects data on a user's listening habits and uses it to predict what music they will enjoy the most. The Echo Nest has created Taste Profiles based on the listening patterns they notice about a user. Taste Profiles are an amalgamation of taste clusters of genres and subgenres. Taste Profiles and clusters are not publicly available for individual users to access but have been released to journalists and researchers. One Echo Nest employee has created a categorical perception spectrum of genres and subgenres based on "an algorithmically-generated, readability-adjusted scatter-plot of the musical genre-space, based on data tracked and analyzed for 4,341 genre-shaped distinctions by Spotify" called Every Noise at Once. The Echo Nest has created an internal tool for Spotify and Echo Nest employees call
https://en.wikipedia.org/wiki/Hamburger%20Dinner%20Theater
"Hamburger Dinner Theater" is the fifth episode of the first season of the animated television series Bob's Burgers. "Hamburger Dinner Theater" originally aired on the Fox Network in the United States on February 20, 2011. The episode was written by Dan Fybel & Rich Rinaldi and directed by Wes Archer. According to Nielsen ratings, it was viewed by 4.87 million viewers in its original airing. The episode featured guest performances by Toby Huss, Larry Murphy, Andy Kindler, Jerry Minor, Sam Seder, Holly Schlesinger and Wendy Molyneux. Plot As the episode begins, Linda is getting ready to go out for the evening. She tells Bob she is going to a strip club with her friends, but Bob does not believe her and eventually gets her to admit she is really going to a dinner theater. Bob hates dinner theater, especially since every time Linda goes to one she spends the next week communicating only in song, which Bob finds annoying. The next morning, favorite customer Mort (Andy Kindler), also a fan of dinner theater, tells Linda since she works at a restaurant she could set up a dinner theater of her own. Linda is excited, but Bob objects, finally relenting as long as there are only three performances. Linda concocts a mass murder-mystery-musical-love story set in a morgue and titles it "Dreamatorium". She casts the kids, Mort and herself in the play, but Bob refuses to take part beyond making the food. Tina is cast as a tree due to a history of stage fright. The kids make the set and Mort creates the props. On the night of the play, Mort's death is accompanied by gory, overly realistic fake blood and organs, and the audience is appalled, some even calling the police, who briefly investigate the show. Linda decides to do another performance, much to Bob's dismay. Tina wants to say a line to conquer her stage fright, but during the performance she freezes, and Louise says her line. At the climax, Linda reveals that she committed the murders, although in the prologue she said her character was not the killer; she says it is a twist ending, but the audience angrily disagrees. Suddenly a robber (Toby Huss) appears with a gun and demands all the money in the cash register. Realizing that they are putting on a show, the robber sings beautifully to Linda, who improvises lyrics in return. Bob protests that the robber is not part of the show, but no one believes him. Even the police drive by, see the robbery, and drive on, assuming it is staged for the play. The robber leaves with the money as everybody praises his performance. Bob reports the crime the next day to Officers Julia and Cliffany (Jerry Minor & Sam Seder) while Mort reads positive reviews to Linda. A blond man walks in the restaurant, asking about the robbery. Once the police are gone, he reveals himself to be the robber and offers to appear in the show again for the third and final performance. Linda is all for it, but Bob calls 911, so the robber produces the gun, robs them again, and flees, only to
https://en.wikipedia.org/wiki/Radiation%20monitoring%20in%20Japan
Radiation levels in Japan are continuously monitored in a number of locations, and a large number stream their data to the internet. Some of these locations are mandated by law for nuclear power plants and other nuclear facilities. Some of them serve as part of a national monitoring network for use in a nuclear emergency. Others are independent monitoring stations maintained by individuals. Interest in the levels of radiation all over the nation increased dramatically during the Fukushima I nuclear accidents. At that time, a number of people began streaming from monitoring stations, and some international organizations conducted special monitoring operations to assess the state of radiation levels near the power plant and throughout Japan. Monitoring at Nuclear Power Plants Regulations per the Japanese Nuclear Safety Commission prescribe some standards that a monitoring system at a power producing nuclear plant must adhere to. For the purposes of regulation, monitoring systems are divided into two categories. Category 1: Design of the monitoring system has to fit S-class seismic criteria and have diversity and independence in the channels that constitute the system. Category 2: These detectors are connected to the plant emergency power system. Additionally, a condition for both categories is that it have the ability to monitor continuously and record its results. During normal operation, plants have to monitor gas and liquid radioactive effluent releases. The only type that requires continuous monitoring is radioactive noble gasses, although some require monitoring only for every discharge. Other types of radiation must be monitored weekly or monthly according to the regulations. Operating power plant sites stream readings from environmental radiation detectors located around or on periphery of the site, detectors measuring radiation levels leaving the plant stack (gaseous effluents), and detectors monitoring the radiation of the discharged waste heat water. Official monitoring websites of nuclear power plants in Japan are listed below. Monitoring Organizations and Individuals Radiation monitoring in Japan is performed and publicly streamed by a number of governmental agencies and non-governmental organizations and individuals. SPEEDI Network The Nuclear Safety Division of the Ministry of Education, Culture, Sports, Science and Technology streams information from a national network of detectors, called the System for Prediction of Environment Emergency Dose Information (SPEEDI). It has been called a "computer-based decision support system" by researchers, and its function is for real-time dose assessment in radiological emergencies. In 1993 it had been developed for domestic local range accidents and was in the process to scale up to a national scale emergency response program linked to local governments. A worldwide version (WSPEEDI) was under development. Use in Fukushima Daiichi nuclear disaster The government recommendatio
https://en.wikipedia.org/wiki/Red%20zone%20%28computing%29
In computing, the red zone is a fixed-size area in a function's stack frame below (for a push-down stack) the current stack pointer that is reserved and safe to use. It is most commonly used in leaf functions (functions that don't call other functions) for allocating additional stack memory, without moving the stack pointer, which saves an instruction. Whether a red zone is present depends on the calling convention. x86-64 systems that use the System V AMD64 ABI (including Linux and macOS) use a 128-byte red zone that begins directly under the current value of the stack pointer. The OpenRISC toolchain assumes a 128-byte red zone. Microsoft Windows does not have the concept of a red zone on x86. In fact, the ABI explicitly states that the memory beyond the stack pointer is volatile and may be overwritten by debuggers or interrupt handlers. However, Microsoft Windows has a red zone of 16 bytes on IA-64, 8 bytes on AArch32, and 16 bytes on AArch64. The red zone is safe from modification by interrupt/exception/signal handlers. Notes and references Compilers
https://en.wikipedia.org/wiki/Mobilewalla
MobileWalla is a Singapore-based web-based search portal for applications targeted at mobile devices. It was founded on 7 March 2011 by Dr. Anindya Datta, a professor with the School of Computing, National University of Singapore. The portal is the first ever deep search and discovery engine for finding apps and uses around 114 variables for its rating system. During 2016 US elections, the firm targeted evangelicals with cell's phone location in real time of 6 months preceding the election. End of May 2020, the firm targeted George Floyd protesters located in New York, Los Angeles, Minneapolis and Atlanta and published a report 2 weeks after showing demographics data: ethnicity, gender and age distribution. Datta proffered that the report was prepared to satisfy the curiosity of its employees, and not on behest of any law enforcement or public agency. This however prompted various legislators to seek further clarifications with the company on the data itself. References Domain-specific search engines
https://en.wikipedia.org/wiki/Tony%20Hirst%20%28blogger%29
Tony Hirst is an academic in the Department of Computing and Communications at the Open University, but better known for the OUseful Blog on practical applications of open data. Notable achievements In February 2009, Hirst and colleague Joss Winn, established WriteToReply, to re-publish the UK Government's Digital Britain Interim Report in a way that allowed readers to comment on each paragraph. This was among a number of experiments to promote greater online public participation in government consultations. In March 2009, Hirst created a technique for extracting and presenting subtitles generated from Twitter status updates in SubRip (*.srt) format Hirst won the 2011 "Open Up" contest for his ideas about the use of UCAS data. The Open Up contest was run by TSO (formerly "The Stationery Office", a publishing company that supplies the UK Government) and came with a £50,000 development fund to enable the idea. Hirst was chosen by a judging panel headed up by TSO director of digital products Robin Brattel, and included artificial intelligence expert Sir Nigel Richard Shadbolt and Open University director of communications Lucian J Hudson. Hirst was described as "brilliant" by The Guardian data blog for his work analysing the use of Twitter by journalists. Media work Hirst has been an academic adviser and expert contributor to the BBC World Service programme Click, formerly Digital Planet. He was co-founder of the Open University Robotics Outreach Group, which led to the Blue Peter/RoboFesta Competition in 2001. This competition - which required children to "Design a Really Useful Robot" - had 32,000 entries. References Living people Academics of the Open University Year of birth missing (living people)
https://en.wikipedia.org/wiki/Central%20and%20Eastern%20European%20Software%20Engineering%20Conference%20in%20Russia
The Central and Eastern European Software Engineering Conference in Russia (CEE-SECR) is a software engineering event for IT and software specialists from Central and Eastern Europe. It was established in 2005. The conference program is composed of research presentations, panel discussions, keynote lectures, experience reports, and training workshops. Working languages are dual English and Russian. Conference Program Committee includes highly recognized international and domestic software engineering experts from both industry and academia. The list of speakers from previous CEE-SECRs includes: Thomas Erl, Bjarne Stroustrup, Erich Gamma, Richard Soley, Igor Agamirzian, Grady Booch, Lars Bak, Alexander L. Wolf, Yuri Gurevich, Victor Ivannikov, Stephen Mellor, Larry Constantine, Ivar Jacobson, Rick Kazman, and Michael Cusumano. CEE-SECR is targeted to software professionals such as software architects, project managers, process engineers, software engineering process group directors, business analysts, team leaders, IT managers, CIOs/CTOs, QA managers, and senior developers. External links Official website 2005 establishments in Russia Recurring events established in 2005 Software engineering conferences
https://en.wikipedia.org/wiki/BBC%20Schools
BBC Schools, also known as BBC for Schools and Colleges or BBC Education, is the educational programming strand set up by the BBC in 1957, broadcasting a range of educational programmes for children aged 5–16. From launch until June 1983, programming was based on BBC1 during the daytime, apart from coverage of major news events which saw the programmes shifted to BBC2. In September 1983, programming was transferred permanently to BBC2 freeing BBC1 to develop its own daytime schedule. The strand, named Daytime on Two, remained on BBC Two until March 2010, later supplemented by the 'Class TV' strand on CBBC. Origins The BBC began broadcasting schools programmes on television on 24 September 1957, airing in the afternoon. Morning transmissions began on 19 September 1960. Until 1972, schools programming along with adult education programmes were usually the only daytime programmes shown on both BBC and ITV, as the government regulated and restricted the number of broadcasting hours for each channel. From the mid 1960s onwards a typical weekday on the BBC and ITV was limited to just 7 hours of normal programming during the day. Schools programmes were exempt from those restrictions, so the BBC and to a lesser degree ITV used the programming for schools to fill their daytime schedules. The restrictions were eased during 1971 and on 19 January 1972 the restrictions on broadcasting hours were lifted fully. ITV decided to move their schools programming to a new 2.5 hour block, airing from 9.30am-12 midday each weekday, followed by their normal full daytime schedules after midday. Presentation The Pie Chart From September 1960 until October 1973, the presentation was a black and white card with a pie chart split into five segments with a BBC logo in the bottom right corner. The pie chart segments disappeared with the seconds and was operated via a mechanical model. They were introduced, from 1969, by a special version of the BBC1 mirror globe, but without the 'Colour' legend, as the majority of schools programmes were still in black and white while the rest of BBC1's programmes were in colour. The Diamond In October 1973, the presentation was changed to a blue diamond on a black background with the BBC1 legend. It was commissioned to mark the start of schools programmes in colour, and consisted of the three diamonds of increasing size inside one another, first forming out of the background before pulsating and splitting into smaller diamonds, before eventually decreasing altogether. The colour scheme was changed in April 1975 following BBC1's rebrand of image to orange on a navy blue background with, unusually, an orange legend. This was accompanied by an orange version of the BBC1 network clock. A still version of the diamond was occasionally used on the channel, with a double lined version of the BBC1 logo. This was accompanied by a similar version for BBC2 with double lined BBC2 logo, for occasions when schools programmes were transferred to th
https://en.wikipedia.org/wiki/Multi-Operator%20Radio%20Access%20Network
The use of Multi-Operator Radio Access Networks (MORANs), also known as Radio Access Network sharing, is a way for multiple mobile telephone network operators to share radio access network infrastructure. References See also Multi-Operator Core Network Moran includes sharing of the same hardware such as BTS by multiple users, this leads to increased use of the same bandwidth and also improves efficiency by rendering an increased amount network coverage for both the telecom operators. Mobile telecommunications
https://en.wikipedia.org/wiki/Bitemporal%20modeling
Bitemporal modeling is a specific case of temporal database information modeling technique designed to handle historical data along two different timelines. This makes it possible to rewind the information to "as it actually was" in combination with "as it was recorded" at some point in time. In order to be able to do so, information cannot be discarded even if it is erroneous. Within, for example, financial reporting it is often desirable to be able to recreate an old report both as it actually looked at the time of creation and as it should have looked given corrections made to the data after its creation. Implementations of bitemporal modeling can be done using relational databases and graph databases. As such, bitemporal modeling is considered different from dimensional modeling and complementary to database normalization. The SQL:2011 standard provides language constructs for working with bitemporal data. However, many of current solutions are still vendor-specific. Philosophy Bitemporal modeling uses bitemporal structures as the basic components. This results in the databases which have a consistent type of temporality for all data. Benefits of bitemporal modeling By focusing on completeness and accuracy of data, bitemporal modeling facilitates the creation of complete audit trails of data. All data becomes immutable. Specifically this allows for queries which provide: The most accurate data possible as we know it now Data as we knew it at any point in time When and why the most accurate data we had changed Implementations in notable products MarkLogic introduced bitemporal data support in version 8.0. Time stamps for Valid and System time are stored in JSON or XML documents. XTDB (formerly Crux) is an open source database that indexes documents using an EAV data model and provides point-in-time bitemporal SQL & Datalog queries. TerminusDB is an open source document-oriented graph database that uses delta encoding and provides bitemporal functionality See also Temporal database References Data warehousing Data modeling Data modeling diagrams Database normalization
https://en.wikipedia.org/wiki/GlycomeDB
GlycomeDB is a database of carbohydrates including structural and taxonomic data. See also Glycomics References External links http://www.glycome-db.org Biological databases Omics Glycomics Carbohydrate chemistry Carbohydrates Sugar
https://en.wikipedia.org/wiki/Computer%20crime%20countermeasures
Cyber crime, or computer crime, refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Netcrime refers, more precisely, to criminal exploitation of the Internet. Issues surrounding this type of crime have become high-profile, particularly those surrounding hacking, copyright infringement, identity theft, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise. On the global level, both governments and non-state actors continue to grow in importance, with the ability to engage in such activities as espionage, and other cross-border attacks sometimes referred to as cyber warfare. The international legal system is attempting to hold actors accountable for their actions, with the International Criminal Court among the few addressing this threat. A cyber countermeasure is defined as an action, process, technology, device, or system that serves to prevent or mitigate the effects of a cyber attack against a victim, computer, server, network or associated device. Recently there has been an increase in the number of international cyber attacks. In 2013 there was a 91% increase in targeted attack campaigns and a 62% increase in security breaches. A number of countermeasures exist that can be effectively implemented in order to combat cyber-crime and increase security. Types of threats Malicious code Malicious code is a broad category that encompasses a number of threats to cyber-security. In essence it is any “hardware, software, or firmware that is intentionally included or inserted in a system for a harmful purpose.” Commonly referred to as malware it includes computer viruses, worms, Trojan horses, keyloggers, BOTs, Rootkits, and any software security exploits. Malicious code also includes spyware, which are deceptive programs, installed without authorization, “that monitor a consumer’s activities without their consent.” Spyware can be used to send users unwanted popup ads, to usurp the control of a user’s Internet browser, or to monitor a user’s online habits. However, spyware is usually installed along with something that the user actually wishes to install. The user consents to the installation, but does not consent to the monitoring tactics of the spyware. The consent for spyware is normally found in the end-user license agreement. akua AB Network attacks A network attack is considered to be any action taken to disrupt, deny, degrade, or destroy information residing on a computer and computer networks. An attack can take four forms: fabrication, interception, interruption, and modification. A fabrication is the “creation of some deception in order to deceive some unsuspecting user”; an interception is the “process of intruding into some transmission and redirecting it for some unauthorized use”; an interruption is the “break in a communication channel, which i
https://en.wikipedia.org/wiki/Red%20Lightning
Red Lightning may refer to: Red Lightning (band), a Los Angeles rock band Red Lightning (video game), a 1989 computer wargame Red lightning, another name for a sprite in meteorology VF-194 (Red Lightning), a United States Navy aviation unit Red Lightning, a novel by author John Varley.
https://en.wikipedia.org/wiki/Hypolepis%20punctata
Hypolepis punctata, synonym Polypodium punctatum, is a species of fern in the family Polypodiaceae. It is native to China and East Asia. References Arctos Database entries Dennstaedtiaceae Plants described in 1784 Flora of China Flora of Eastern Asia
https://en.wikipedia.org/wiki/StealthNet
StealthNet is an anonymous P2P file sharing software based on the original RShare client, and has been enhanced. It was first named 'RShare CE' (RShare Community Edition). It use the same network and protocols as RShare. In 2011 a fork named DarkNode was released, but one year later the website is cleared with the source code. History Development was stopped in March 2011, with version 0.8.7.9, with no official explanation on the web site. In 2012, the developers had an incident with the software Apache Subversion, a part of the source code of StealthNet was lost : versions 0.8.7.5 (February 2010) to 0.8.7.9 (October 2010). However the source code is still available as files. In 2017 it was forked into version 0.8.8.0. Features Some of the features of StealhNet: Mix network (use for the pseudo anonymous process) Easy to use (same principles as eMule) Multi-source download : 'Swarming' (Segmented file transfer) Resumption of interrupted downloads Can filter the file types searched (allowing to search only among the videos/archives/musics/... files) SNCollection: this type of file contain a list of files shared into StealthNet. Like the "eMule collection" file and Torrents files Point-to-Point traffic encryption with AES standard process (Advanced Encryption Standard, 256 bits) EndPoint to EndPoint traffic encryption with RSA standard (1024 bits) Strong file hashes based on SHA-512 algorithm Anti-flooding measures Text mode client available for OS with Mono support like Linux, OSX and others Drawbacks Has no support for UPnP (Universal Plug and Play), the user must open a port number (ie: 6097) into his router. Anonymity is unproven. The source code contains no documentation at all. The encryption level (AES 256 bits and RSA 1024 bits in the v0.8.7.9) that was strong in the 2000s is now medium since the 2010s. See also Anonymous P2P I2P References External links Official web site StealthNet upgrade (2017) Anonymous file sharing networks Free file sharing software File sharing software for Linux Windows file sharing software Free software programmed in C Sharp
https://en.wikipedia.org/wiki/Socket%20FM1
Socket FM1 is a CPU socket for desktop computers used by AMD early A-series APUs ("Llano") processors and Llano-derived Athlon II processors. It was released in July 2011. Its direct successors are Socket FM2 (September 2012) and Socket FM2+ (January 2014), while Socket AM1 (January 2014) is targeting low-power SoCs. Chipsets For available chipsets consult Fusion controller hubs (FCH). Available APUs APU's using Socket FM1 are AMD's Lynx platform. Please consult List of AMD accelerated processing units for concrete product denominations. Feature overview for AMD APUs See also Family 12h microarchitecture Comparison of AMD chipsets#Fusion controller hubs (FCH) List of FM1 Processors References http://www.tomshardware.com/news/amd-llano-socket-fm1-sample,12549.html https://www.amd.com/us/products/desktop/processors/a-series/Pages/a-series-model-number-comparison.aspx AMD sockets
https://en.wikipedia.org/wiki/WhereScape
WhereScape is a privately held international data warehouse automation and big data software company. WhereScape was acquired in 2019 by Idera Software. History The company was formerly named Profit Management Systems, but officially renamed to WhereScape in 2001 when expanding business operations into the USA. WhereScape was founded as a data warehouse consulting company in Auckland, New Zealand in 2002 by co-founders Michael Whitehead (President) and Wayne Richmond. WhereScape operates out of regional headquarters in Houston, Texas, USA; Reading, United Kingdom; and Singapore. As of 2015, it had over 720 customers in more than 15 countries and revenue of around $20 million (NZD). Sales channels vary by country but can be either direct sales or through local partners. WhereScape also has partnerships with third-party companies that embed WhereScape software in their solutions. WhereScape was acquired in 2019 by Idera Software. In 2020 the company was selected as a finalist for the Specialist Vendor of the Year award 2020. WhereScape Products WhereScape currently offers three main products: WhereScape RED, WhereScape 3D, and Data Vault Express As of November 2017, version numbers between the two have been aligned and the current stable version is 8.0.1.0. References External links Business intelligence companies Software companies established in 1997 Software companies of New Zealand Data warehousing products Extract, transform, load tools
https://en.wikipedia.org/wiki/Variable%20splitting
In applied mathematics and computer science, variable splitting is a decomposition method that relaxes a set of constraints. Details When the variable x appears in two sets of constraints, it is possible to substitute the new variables x1 in the first constraints and x2 in the second, and then join the two variables with a new "linking" constraint, which requires that x1=x2. This new linking constraint can be relaxed with a Lagrange multiplier; in many applications, a Lagrange multiplier can be interpreted as the price of equality between x1 and x2 in the new constraint. For many problems, when the equality of the split variables is relaxed, then the system is decomposed, and each subsystem can be solved independently, at substantial reduction of computing time and memory storage. A solution to the relaxed problem (with variable splitting) provides an approximate solution to the original problem: further, the approximate solution to the relaxed problem provides a "warm start", a good initialization of an iterative method for solving the original problem (having only the x variable). This was first introduced by Kurt O. Jörnsten, Mikael Näsberg, Per A. Smeds in 1985. At the same time, M. Guignard and S. Kim introduced the same idea under the name Lagrangean Decomposition (their papers appeared in 1987). The original references are (1) Variable Splitting: A New Lagrangean Relaxation Approach to Some Mathematical Programming Models Authors Kurt O. Jörnsten, Mikael Näsberg, Per A. Smeds Volumes 84-85 of LiTH MAT R.: Matematiska Institutionen Publisher - University of Linköping, Department of Mathematics, 1985 Length - 52 pages; and (2) Lagrangean Decomposition: A Model Yielding Stronger Bounds, Authors Monique Guignard and Siwhan Kim, Mathematical Programming, 39(2), 1987, pp. 215-228. References Bibliography Decomposition methods
https://en.wikipedia.org/wiki/Korea%20Digital%20Media%20High%20School
Korea Digital Media High School is a private co-educational high school located in Ansan, Gyeonggi-do. It is one of the South Korean schools specializing in computer science. Because of the length of its name, it is usually called by the nickname "Dimigo" shortened from Digital Media High School (Korean pronunciation: Hanguk Digiteol Mideo Godeunghakgyo). The school advertises its ratings from officially certified examinations or international Olympiads. It has the highest academic achievement among South Korean high schools. The school maintaining top 2~4% average score among Korea high schools on CSAT, it was 4.1% at 2015. Several members of the national team at the International Olympiad in Informatics graduated from Dimigo. Departments e-Business (e-비즈니스과) Digital Content (디지털콘텐츠과) Web Programming (웹프로그래밍과) Defence against Hacking (해킹방어과) See also 한국디지털미디어고등학교 References External links Official website High schools in South Korea Private and independent school organizations Educational institutions established in 2002 2002 establishments in South Korea
https://en.wikipedia.org/wiki/List%20of%20countries%20by%20future%20gross%20government%20debt
This is a list of countries by estimated future gross central government debt based on data released in October 2020 by the International Monetary Fund, with figures in percentage of national GDP. Projected debt estimates See also List of countries by public debt Sources International Monetary Fund, World Economic Outlook Database of October 2020, for countries: , for the European Union: Lists of countries by economic indicator Government debt by country
https://en.wikipedia.org/wiki/Cleantech%20Finland
Cleantech Finland is a Finnish national project, backed by the Government of Finland and created as part of Finland's National Action plan to develop the country's environmental business. The network aims to bring together expertise from Finland's clean technology industry and research and to support clean technology companies internationally. Cleantech Finland is owned by the Confederation of Finnish Industries (Finnish: Elinkeinoelämän keskusliitto or EK). Cleantech Finland's concept is based on the Finland's "national action plan for environmental business", which has been developed by representatives of the Finnish Government, such as the Finnish Ministry of Trade and Industry (now the Ministry of Employment and the Economy), the Ministry of Environment, other research and innovation agencies, environmental organisations and universities in 2006. The ownership of Cleantech Finland was moved from SITRA to the Confederation of Finnish Industries in December 2008. Cleantech Finland's digital expert service Solved spun-off as an independent company in September 2013. Strategy The Strategic Cleantech Programme of the Government of Prime Minister Jyrki Katainen was launched in 2012. The strategic goal of the programme is for Finland to be known as a global superpower of cleantech in 2020. The numerical goals for the strategic cleantech programme by 2020 as defined in the strategy of May 2014 are: ▪ to raise cleantech companies' turnover to EUR 50 billion, of which exports account for over 75% ▪ to double the cleantech home market to about EUR 20 billion ▪ to raise the number of cleantech companies from 2000 to about 3000 ▪ to create at least 40,000 jobs in clean technology in Finland. Management Cleantech Finland is managed by Finpro (an association providing internationalization services for Finnish small and middle-sized enterprises), and through Finpro's global network, Cleantech Finland has offices in 40 countries. Cleantech Finland seeks to provide a contact and cooperation platform for clean technology companies and organizations operating in following clean technology branches: Water Efficient use of water Purification Waste water treatment Energy CHP Energy efficiency Biomass & bioenergy Renewable energy Smart grid Waste Industrial waste management Logistics Recycling Waste-to-energy Built-environment Air quality Energy management systems Low-energy housing Smart mobility Urban planning Purpose The purpose of Cleantech Finland is to provide a global network of clean technology expertise. In Finland alone, the highly diversified cleantech sector comprises approximately 2,000 enterprises. Cleantech Finland serves as an umbrella corporation and coordinator in internationalization efforts, such as conferences and seminars. Additionally, it aims to build contacts between environmental technology companies and national – as well as international – stakeholders. In order to support its member organizations in fin
https://en.wikipedia.org/wiki/SuperSweet
SuperSweet is a database of tasting and sweet molecules. See also sugar substitute Aroma compounds References External links http://bioinformatics.charite.de/sweet/. Biological databases Flavors Sugar substitutes
https://en.wikipedia.org/wiki/Non-B%20database
Non-B DB is a database integrating annotations and analysis of non-B DNA-forming sequence motifs. The database provides alternative DNA structure predictions including Z-DNA motifs, quadruplex-forming motifs, inverted repeats, mirror repeats and direct repeats and their associated subsets of cruciforms, triplex and slipped structures, respectively. See also B-DNA non-B DNA References External links http://nonb.abcc.ncifcrf.gov. Biological databases DNA Biophysics Molecular geometry Helices
https://en.wikipedia.org/wiki/ALERT%20FM
ALERT FM is an emergency notification system that delivers messages from state, local, and/or private sector officials to citizens, schools, businesses, and first responders using the Radio Data System (data sub-carrier) of local FM radio stations. Messages are transported from a secure web-based portal to the data sub-carrier via GSSNet, a satellite data delivery system. These alerts and messages are then received on ALERT FM receivers (mobile, wall mounted, or USB) or on cell phones equipped with active FM chips and properly installed software. ALERT FM receivers can be programmed to receive local NOAA weather warnings. Company Global Security Systems, LLC (GSS), of Lafayette, Louisiana, is the manufacturer, producer, and systems integrator of ALERT FM and GSSNet (satellite data delivery system). GSS has offices in Jackson, Mississippi, Lafayette, Louisiana, Sarasota, and Ft. Lauderdale, Florida. The Network ALERT FM messages are currently being broadcast via Satellite on the digital data sub-carriers of over 1100 radio stations in 14 states (Alabama, Arkansas, Arizona, California, Florida, Louisiana, Michigan, Mississippi, Missouri, New Jersey, New York, South Carolina, Tennessee, Texas, Virginia) and British Virgin Islands. Customers In 2005, the Mississippi Office of Homeland Security awarded GSS the first in the nation a statewide contract to deploy the first nationwide phase of ALERT FM. This included installing broadcast equipment in 35 local FM radio stations and receivers in all 82 county emergency operations centers. This made the State of Mississippi the first state in America to use ALERT FM. Since that time, ALERT FM has been expanded across the State of Mississippi and the United States. The Mississippi Emergency Management Agency was able to expand the Mississippi state-wide system to include a total of 85 radio stations in Mississippi. Several Mississippi counties and other local governments had purchased and began using the system on a local level. ALERT FM was implemented into all of the western Tennessee counties including the Memphis-Shelby County UASI; across counties in Alabama including the Black Belt region and Mobile; in multi-counties surrounding a nuclear power plant in Missouri; across coastal counties surrounding Corpus Christi, Texas; in three central South Carolina counties; into a border county in Michigan; into a Mississippi and Arizona tribal nation; and several community colleges across the country including colleges in Mississippi, Florida, and New Jersey. Integrated Public Alert and Warning System (IPAWS) In 2010, ALERT FM successfully participated in a pilot project for Federal Emergency Management Agency to validate Radio Data System emergency notification for inclusion in the Integrated Public Alert and Warning System program. The study was conducted by Northrop Grumman and included RDS technology from ALERT FM, Alertus Technologies and Metis Secure. The one-year study concluded that RDS is a v
https://en.wikipedia.org/wiki/ModBase
ModBase is a database of annotated comparative protein structure models, containing models for more than 3.8 million unique protein sequences. Models are created by the comparative modeling pipeline ModPipe which relies on the MODELLER program. ModBase is developed in the laboratory of Andrej Sali at UCSF. ModBase models are also accessible through the Protein Model Portal. See also Homology modeling References External links http://salilab.org/modbase Biological databases Protein methods Protein structure
https://en.wikipedia.org/wiki/Publicis%20Healthcare%20Communications%20Group
Publicis Healthcare Communications Group (PHCG) is a healthcare communications network which cosists of around 12 agency brands in more than 60 offices located in 10 countries. Its agencies include brands Saatchi & Saatchi Wellness, Digitas Health LifeBrands, Discovery, Publicis Life Brands, Publicis Health Media, Publicis Touchpoint Solutions, and in-sync Strategy, as well as regional brands. In 2011, 2012, 2013 and 2014, Advertising Age ranked PHCG as the largest U.S. healthcare communications network by revenue. A division of Publicis Groupe S.A., PHCG agencies offer clients advertising, medical education, sales and marketing, digital, market access, and medical and scientific affairs. They have around 5,500 employees. Overview PHCG was established in 2003 as the first healthcare-specific network in communications. Global clients include Pfizer, Sanofi, AstraZeneca, Merck, Procter & Gamble, Boehringer Ingelheim and Roche. In October 2011, it was announced that Publicis Groupe agencies Digitas Health and Razorfish Health would become part of the PHCG network. Digitas Health and Razorfish Health will operate as stand-alone brands, run by co-Presidents Michael du Toit and Alexandra von Plato. In January 2013, PHCG announced the creation of Publicis Health Media. Matt McNally was named President of PHM and will lead the business unit for PHCG. In October 2013, Publicis Groupe announced that Heartbeat Ideas and Heartbeat West will join the PHCG network as a Saatchi & Saatchi Health entity. The current New York based Saatchi & Saatchi group - comprising Saatchi & Saatchi Wellness and Saatchi & Saatchi Health Communications - will merge, and be known as Saatchi & Saatchi Wellness. Heartbeat and its sister agency will now operate under "Heartbeat Ideas, a member of Saatchi & Saatchi Wellness," and "Heartbeat West, a member of Saatchi & Saatchi Wellness." PHCG Global Leadership Alexandra von Plato, President and CEO Kathy Delaney, Global Chief Creative Officer, PHCG, Saatchi & Saatchi Wellness, Razorfish Healthware, and Discovery USA Alexandra von Plato, Group President, North America, PHCG, Digitas Health LifeBrands, Publicis Life Brands, and Heartbeat Ideas Michelle Keefe, President, Publicis Touchpoint Solutions Rick Keefer, Global Chief Business Development Officer, PHCG Ashley Kuchel, Group President, EU/APAC, PHCG Nathalie Le Bos, Chief Financial Officer, PHCG Andrea Palmer, President, Publicis Health Media Marjan Panah, Chief Human Resource Officer, PHCG Janet Winkler, President, PHCG References Communications consultants Publicis Groupe
https://en.wikipedia.org/wiki/Summit%20Bank
Summit Bank () is a Pakistani commercial bank, which is a subsidiary of Suroor Investment and is in Karachi, Pakistan., a Mauritius investment company. It has a network of 193 branches across the country. History In 2007, Arif Habib Securities Limited acquired Pakistan Operations of Rupali Bank Limited, under the Scheme of Amalgamation by the State Bank of Pakistan. In 2010, Suroor Investments Ltd. acquired a 59.41% stake in Arif Habib Bank Ltd. Suroor Investments is an investment firm based in Mauritius. Later in 2010, Arif Habib Bank Ltd. was rebranded under the name of Summit Bank Ltd. Suroor Investments Ltd. acquired the majority shares of Atlas Bank Ltd. and MyBank Ltd. and these banks were later on came under the umbrella of Summit Bank Ltd., increasing the network of the bank to over 193 branches in the country. Majority Shareholding Dubai-based businessman, Nasser Abdullah Hussain Lootah, has shown intention to acquire majority shareholding (at least 51 percent) of Summit Bank Limited while ensuring that the bank complies with the minimum capital requirements and capital adequacy ratio prescribed by the State Bank of Pakistan. References External links https://summitbank.com.pk/ Banks of Pakistan Companies based in Karachi Banks established in 2006 Pakistani companies established in 2006 Companies listed on the Pakistan Stock Exchange Pakistani subsidiaries of foreign companies Mergers and acquisitions of Pakistani companies
https://en.wikipedia.org/wiki/HWB
HWB may refer to: Hwb, a Welsh education website HWB color model, a representation of points in an RGB color model Hardware write block device, a type of computer hard disk controller Hawaii Winter Baseball, a defunct professional baseball league Health and wellbeing board, various statutory bodies in England Heavy Water Board, of India's Department of Atomic Energy Helmert–Wolf blocking, a statistical algorithm Hochwohlgeboren, an honorific in Europe Homeopaths Without Borders, a pseudoscientific nonprofit organization Hybrid wing body, a type of fixed-wing aircraft
https://en.wikipedia.org/wiki/Ceylon%20%28programming%20language%29
Ceylon is an object-oriented, strongly statically typed programming language with an emphasis on immutability, created by Red Hat. Ceylon programs run on the Java virtual machine (JVM), and could be compiled to JavaScript. The language design focuses on source code readability, predictability, toolability, modularity, and metaprogrammability. Important features of Ceylon include: A type system enforcing null safety and list element existence at compile time Regular syntax and semantics, avoiding special cases and primitively-defined constructs in favor of syntactic sugar Support for generic programming and metaprogramming, with reified generics Modularity built into the language, based on JBoss modules, interoperable with OSGi and Maven powerful tools, including an Eclipse-based IDE The name "Ceylon" is an oblique reference to Java, in that Java and Sri Lanka, formerly known as Ceylon, are islands known for growth and export of coffee and tea. In August 2017, Ceylon was donated to the Eclipse Foundation. At that time Ceylon's development got arrested. Neither its version, nor its source code has changed beyond August 2017. In April 2023, Eclipse Foundation declared the termination of the transition. Language features Ceylon is heavily influenced by Java's syntax, but adds many new features. Type system One of the most novel aspects of Ceylon compared to Java is its type system. Ceylon foregoes Java's primitive types and boxing in favor of a type system composed entirely of first-class objects. While this may cause boxing overhead in some situations, it makes the type system more uniform. Ceylon allows for union and intersection types, in a similar fashion to TypeScript, Whiley and Flow. Union types, written A|B, allow a variable to have more than one type. The following example shows a Ceylon function which may take either an integer or a string: shared void integerOrString(Integer|String input) { if (is Integer input) { print("Got the integer ``input``"); } else { print("Got the string '``input``'"); } } Intersection types, written A&B, are the theoretical foundation of flow-sensitive typing: shared void integerOrString(Integer|String input) { Integer added = input + 6; // illegal; the + operator is not defined on Integer|String if (is Integer input) { Integer added = input + 6; // legal; input is now known to be an Integer print("Got the integer ``input``"); } else { print("Got the string '``input``'"); } } The condition is Integer input narrows the type of input to <Integer|String> & Integer, which distributes to Integer&Integer | String&Integer, which, as String and Integer are disjoint types, is equivalent to Integer&Integer | Nothing (Nothing is the empty bottom type), which simplifies to just Integer. Null safety Union and intersection types are used to provide null safety. The top type of the Ceylon type hierarchy is the class Anything, which has two
https://en.wikipedia.org/wiki/Nokia%20E6
The Nokia E6-00 is a smartphone running the Symbian^3 operating system. It supersedes the Nokia E72 as the new Symbian business mobility solution from Nokia following its announcement on 12 April 2011 (same day as Nokia X7-00). It shipped with the new "Symbian Anna" version of Symbian^3, and originally retailed for 340 euros before taxes. The smartphone is notable for its backlit 4-rows QWERTY keyboard and touch screen input methods, for its long battery life (Talktime : 7.5 to 14.8 h and Standby : 28 to 31 days), the out-of-the-box access to Microsoft Exchange ActiveSync, Microsoft Communicator Mobile and Microsoft SharePoint and the high pixel density of its VGA display (326ppi). Like its predecessors (Nokia E71/E72), the Nokia E6-00 integrates a stainless steel and glass design. The back removable cover, the raised panel for the back camera, dual LED flash and loud speaker and the contour of the front are made of stainless steel. The front of the phone (except for the QWERTY keyboard, short cut buttons and Navikey) is covered with Corning Gorilla Glass. Its casing has three color options (black, silver and white). The E6 would also be the last Symbian-based device with a QWERTY keyboard, as the later QWERTY devices would be Series 40 from the Asha line. The Nokia Asha 302 from 2012 bears strong design similarities to the E6. In October 2012, Vertu released the Constellation Quest Blue, based on the E6. History and availability The predecessor of the E6-00 in the Eseries, consisting of business-oriented smartphones, was the Nokia E72 which shipped in November 2009. As with the E71, the E72 received mostly praises from the press. It is worth noting that Nokia released the E7, a landscape QWERTY slider smartphone in the Eseries based on Symbian^3, that shipped in February 2011. The first hints that the Nokia E6-00 was being developed came, in early January 2011, from a Nokia XML and pictures from a Picasa album with pictures taken with the device. Various information could be retrieved from the XML such as the 8 MP camera, VGA display and QWERTY keyboard. The device was not officially announced at the Mobile World Congress held in Barcelona (14–17 February 2011). Various pictures and videos of the Nokia E6-00 leaked during the months of February and March. It was officially announced at a special event, named Discover Symbian, on 12 April 2011 along with the Nokia X7 and the latest update of Symbian software. It was expected to be released in Q2 2011 in Europe at a price of €340 (before taxes and subsidies) and in Q3 2011 in North America. In May 2011, the Nokia E6 became available at the Nokia Deutschland online shop for preorder at the price of €429. Hardware Processors The Nokia E6-00 is powered by the same processor found in other contemporary Symbian devices such as the Nokia N8 , E7 and C7 , Nokia e series which is an ARM11 clocked at 680 MHz with a Broadcom BCM2727 GPU which supports OpenVG1.1 and OpenGL ES 2.0 support. Scr
https://en.wikipedia.org/wiki/Battle%20Rush%3A%20Build%20Up%20Robot%20Tournament
is a Japan-exclusive video game for the Nintendo Family Computer. The game was one of six that required Bandai's System in order to operate. Gameplay Players build their own combat robots to use in a fighting tournament. These robots are built in factories that assign the robot a name in addition to installing its head, body, shoulder, and feet. The player has a pre-game lobby to get ready for the robot combat action. All matches have rounds of 60 seconds (unlike the 99-second round of most modern fighting video games). Both robots have a separate gauge for energy and damage. Standard punches and kicks can be thrown in addition to special moves (which look like ammunition). Reception On release, Famicom Tsūshin scored the game a 16 out of 40. References 1993 video games Bandai games Japan-exclusive video games Nintendo Entertainment System games Nintendo Entertainment System-only games Video games about robots Tose (company) games Video games developed in Japan
https://en.wikipedia.org/wiki/Lila%20Art%20High%20School
Lila Art High School (previously known as Lila Computer High School) () is a high school in South Korea. Originally founded in 1952 by Kwon Eungpal as a vocational boys' school, it changed its name to "Lila Industrial High School" in 1992, "Lila Computer High School" in 2000, and finally "Lila Art High School" in 2009. The school seeks to maximize the students' individuality and creativity and nurture the foundation of lifelong happiness. This is broken up into three pillars: diligence, love and creation. This private school is located in Jung-gu, Seoul and house 385 students (163 male, 222 female) and 48 faculty (26 male, 22 female). Departments Department of Computer Media Digital Sound Content Division Department of Health Science Department of Visual and Music Contents Theater & Acting (Applied Music) Sports Management Notable alumni Bae Jin-young Jin Jun-tak Kwak Jung-wook Moon Dae-sung Park Ji-yeon Park Sun-young (aka "Luna") Woo Hye-rim References External links Official website Educational institutions established in 1952 High schools in Seoul Art schools in South Korea 1952 establishments in South Korea
https://en.wikipedia.org/wiki/R%C3%A9seau%20des%20D%C3%A9fenseurs%20des%20Droits%20Humains%20en%20Afrique%20Centrale
The Réseau des Défenseurs des Droits Humains en Afrique Centrale (REDHAC) (In English, "Central Africa Human Rights Defenders Network") is a nongovernmental organization that focuses on the rights and protection of human rights defenders in Central Africa. Members Central Africa has 10 countries, of which REDHAC covers eight namely the Democratic Republic of Congo, Cameroon, Chad, Gabon, Central African Republic, the Republic of Congo, Equatorial Guinea and Sao Tome and Principe. Burundi and Rwanda have joined the Network of East and Horn of Africa. Maximilienne Ngo Mbe has led the Réseau de Défenseurs des Droits Humains de l’Afrique Centrale) (REDHAC) since 2010. Aims Overall aim: Ensure the recognition of the status and protection of human rights defenders. Specific aims: Helping to strengthen the capacities of human rights defenders for their safety and protection in their work. Conducting an effective advocacy on behalf of defenders. Investigate and analyze the situation of defenders. Find necessary resources for the activities of REDHAC. Structure The Network consists of the General Assembly, the Board of Administration, the eight focal points in the different countries, which drive the network and the Permanent Secretariat, whose seat is in Douala, Cameroon. Activities Many initiatives have been taken to conduct effective advocacy for the Human Rights Defenders. REDHAC sends press releases every time a Human Rights Defender is in danger in Central Africa. The Network supports the defenders with financial and legal means. The members of REDHAC have on several occasions taken part in meetings and seminars abroad and in Central Africa as well as in TV shows and radio interviews, where they speak and answer questions related to human rights and Human Rights Defenders in Cameroon and Central Africa. References External links REDHAC (official Homepage) Other regional Human Rights Defenders Networks East & Horn of Africa Human Rights Defenders Project (official Homepage) The Southern Africa Human Rights Defenders Trust (official Homepage) West African Human Rights Defenders Network (official Homepage) Human rights organizations based in Cameroon Human rights in Africa
https://en.wikipedia.org/wiki/Lesedi%20FM
Lesedi FM is a South African PBS radio network owned by the South African Broadcasting Corporation (SABC). Coverage areas and frequencies The station was launched in 1960 and is currently available in seven provinces with a spill-over to the other two on 87.7 – 106.6 FM frequencies. Lesedi FM broadcasts from Bloemfontein to the Sesotho-speaking and understanding communities. It is the biggest Sesotho radio station in South Africa. It is the 4th largest radio station in South Africa with an audience of 3.46 million with the highest audience share of 62% in the Free State and 10% in Gauteng. Target audience Lesedi FM is an urban/metro radio station with the highest SEM 5-8, with a primary target audience of 25-49 with 52%, secondary  15-24 with 20% and loyal 50+ at 28%. Female 54% vs. Male 46% Listenership figures References External links Lesedi FM Website SAARF Website Sentech Website Radio stations in Bloemfontein Sotho language
https://en.wikipedia.org/wiki/HXD
HXD may refer to: HxD, a computer program Delingha Airport, in Qinghai, China Douglas HXD, a flying boat Hilton Head Airport, in South Carolina, United States
https://en.wikipedia.org/wiki/Computer%20vision%20dazzle
Computer vision dazzle also known as CV dazzle, dazzle makeup, or anti-surveillance makeup, is a type of camouflage used to hamper facial recognition software, inspired by dazzle camouflage used by vehicles such as ships and planes. Methods CV dazzle combines stylized makeup, asymmetric hair, and sometimes infrared lights built in to glasses or clothing to break up detectable facial patterns recognized by computer vision algorithms in much the same way that warships contrasted color and used sloping lines and curves to distort the structure of a vessel. It has been shown to be somewhat successful at defeating face detection software in common use, including that employed by Facebook. CV dazzle attempts to block detection by facial recognition technologies such as DeepFace "by creating an 'anti-face'". It uses occlusion, covering certain facial features; transformation, altering the shape or colour of parts of the face; and a combination of the two. Prominent artists employing this technique include Adam Harvey and Jillian Mayer. Use in protests Computer vision dazzle makeup has been used by protesters in several different protest movements. Its use as a protesting aid has often been found ineffective. It may be effective to thwart computer technology but; draws human attention, is easy for human monitors to spot on security cameras, and makes it hard for protesters to blend in within a crowd. Advances in facial recognition technology make dazzle makeup increasingly ineffective. See also Adversarial machine learning References Camouflage Computer vision
https://en.wikipedia.org/wiki/HTC%20Incredible%20S
The HTC Incredible S (S710E) (s710d), also known as the Incredible 2, is a smartphone designed and manufactured by Taiwan's HTC Corporation originally running the Android 2.2 operating system (since upgraded to 2.3.4 Gingerbread and followed by 4.0.4 Ice Cream Sandwich except for US Droid Incredible 2). Officially announced by HTC on February 15, 2011 at MWC 2011 in Barcelona, Spain, alongside the HTC Desire S and the HTC Wildfire S, the HTC Incredible S was launched exclusively in the UK to Carphone Warehouse and Best Buy on February 26, 2011 marketed by Sarah Harding of Girls Aloud. The Incredible S is the successor to the Droid Incredible. History Development During development, the device was codenamed Vivo and little was known about it before release. It is available as a CDMA variant on the US network Verizon as of May 2011 under the name Droid Incredible 2, and it is a world phone able to access both GSM and CDMA networks. Hardware The HTC Incredible S is the latest of a long line of smartphones based around the 1 GHz Snapdragon chipset made by Qualcomm. In terms of hardware, it is very similar to the Desire HD with a few notable differences: Smaller screen: 4.0" compared to 4.3" Larger Battery: 1,450 mAh compared to 1230mAh Screen technology: An S-LCD screen compared to the original Desire's AMOLED display. However, the Desire's screen was replaced with an S-LCD on later versions. Addition of a 1.3 MP fixed-focus front-facing camera for video calling In a move seen as a new trend for HTC, the antenna for the phone is built into the back cover of the case (this is also true of the HTC Sensation). A unique feature of the Incredible S is the auto-rotating nature of the capacitive buttons below the screen. Despite HTC recent design trend, the back is made of a rubberised plastic instead an aluminium body, presumably to help improve signal reception. The front is mainly covered by a sheet of Gorilla Glass, with a thin aluminium surround. In addition to the specification already mentioned, the Incredible S houses dual microphones for noise cancellation. Regional variations The version that has been made available in Canada for reviewers has been seen to have chrome accents around the screen, speaker grill, camera lens, LED flash bulbs and loudspeaker which the European and Asian version do not have. A red version is in production and has been spotted in Hong Kong and Singapore. As of November 24, 2011, the HTC Droid Incredible 2 has been available in a limited edition red color, instead of the usual black. Software HTC announced that the Incredible S will be upgradable to the Android 4.0 ICS, though the software update still has not been released for its U.S. counterpart, the Droid Incredible 2, more than two years later. The device was shipped with the second version of HTC's Sense, which includes satellite navigation software developed by TomTom using maps from Route66 (30 day free trial included) and a digital booksto
https://en.wikipedia.org/wiki/Tombstone%20%28data%20store%29
A tombstone is a deleted record in a replica of a distributed data store. The tombstone is necessary, as distributed data stores use eventual consistency, where only a subset of nodes where the data is stored must respond before an operation is considered to be successful. Motivation If information is deleted in an eventually-consistent distributed data store, the "eventual" part of the eventual consistency causes the information to ooze through the node structure, where some nodes may be unavailable at time of deletion. But a feature of eventual consistency causes a problem in case of deletion, as a node that was unavailable at that time will try to "update" the other nodes that no longer have the deleted entry, assuming that they have missed an insert of information. Therefore, instead of deleting the information, the distributed data store creates a (usually temporary) tombstone record, which is not returned in response to requests. Removal of tombstones In order not to fill the data store with useless information, there is a policy to remove tombstones completely. For this, the system checks the age of the tombstone and removes it after a prescribed time has elapsed. In Apache Cassandra, this elapsed time is set with the GCGraceSeconds parameter and the process is named Compaction. Compaction consumes system resources and also slows down computation capacity. Consequences Because of the delayed removal, the deleted information will appear as empty, after the content of some columns of a number of records has been deleted. After a compaction, the unused columns will be removed from these records. References External links Distributed deletes in Apache Cassandra Distributed data stores
https://en.wikipedia.org/wiki/Sans%20fil
Sans fil may refer to: Clermont Sans Fil, a nonprofit association Île Sans Fil, a non-profit community wireless network Quartier Sans fil (Guinea) See also Wireless
https://en.wikipedia.org/wiki/DAFS%20%28disambiguation%29
DAFS may refer to: Damage Analysis and Fundamental Studies, a program of the United States Department of Energy that studies radiation damage Direct Access File System, a network file system that uses remote direct memory access to perform efficient network access to data in remote files Direct Aerial Fire Support, a term describing helicopter combat support Diffraction Anomalous Fine Structure, an X-ray technique for determining atomic structure Document Attribute Format Specification, an interchange format representing document structure See also DAF (disambiguation)
https://en.wikipedia.org/wiki/Direct%20Access%20File%20System
Direct Access File System (DAFS) is a network file system that is based on NFSv4 and the Virtual Interface (VI) data transfer mechanism. DAFS uses remote direct memory access (RDMA) to perform efficient network access to data in remote files. This lowers latency by reducing the number of steps needed to process and transfer remote data. File locking is cached on the client side, eliminating the need to access the file server for subsequent data access. The DAFS was initially developed by Network Appliance Inc. An 85-member industry association named the DAFS Collaborative was assembled to complete the specification. With the draft release of v1.0, it was then passed to the Internet Engineering Task Force (IETF). Version 1.0 of the DAFS application programming interface was completed in 2001. The same year, a working version of DAFS was demonstrated using the Oracle database. DAFS beta version 1.0 is available from SourceForge under the BSD license. It was last updated in 2004. References Distributed file systems Network file systems
https://en.wikipedia.org/wiki/Android%20Debug%20Bridge
The Android Debug Bridge (commonly abbreviated as adb) is a programming tool used for the debugging of Android-based devices. The daemon on the Android device connects with the server on the host PC over USB or TCP, which connects to the client that is used by the end-user over TCP. Made available as open-source software under the Apache License by Google since 2007, features include a shell and the possibility to make backups. The adb software is compatible with Windows, Linux and macOS. It has been misused by botnets and other malware, for which mitigations were developed such as RSA authentication and device whitelisting. Features Features of adb include copying files from the host computer, installing apps, viewing logcat output, getting a Unix shell, and rebooting into Qualcomm EDL mode. For example, Android applications can be saved by the command backup to a file. It also includes support for the Java Debug Wire Protocol. Some graphical interfaces have been made available. The graphical Android Device Monitor in Android Studio can be used for retrieving information from an Android device. Android's method to install APK files on a device has been used as a way to sideload unofficial apps onto Windows Subsystem for Android and Chrome OS's Android virtual machine. Development history The Android Software Development Kit (SDK) was first released in 2007. Since 2017, Google made it possible to download adb separately from the Android SDK. In 2015, Microsoft released an Android emulator that can connect to the adb client. In 2016 for Android Studio 2.0 a 5x performance improvement was made for installing apps and pushing files through adb. For easier usage of Android Things, a wrapper was made in 2017 around manual adb commands. For Android 11 in 2020, Google added adb incremental installations. In 2020, Wi-Fi adb was integrated into Android Studio for macOS. In 2021 for Android 12, the adb backup command was limited so that backing up user data from apps is opt-in using a per-app manifesto configuration after being deprecated in Android 10 along with adb restore. Fuchsia will be backwards-compatible with adb. It will be replaced with fx and ffx. Setup Host computer For Windows, the Android SDK contains the adb.exe binary that can be extracted and installed. How-To Geek recommends adding the folder containing the binaries to the PATH environment variable. On Ubuntu, adb can be installed with the android-tools-adb package. For Debian, it has been recommended to also install the android-sdk-platform-tools-common package next to the adb package, which installs the udev rules which makes it possible to run the tool without root permissions. For macOS and other Linux distributions, the platform tools can be downloaded and the PATH variable can be modified in bashrc. Android device In Android 4.2.2 or later (API level 17), a dialog is shown with an RSA fingerprint that the user needs to accept. This protects against computers exploiting
https://en.wikipedia.org/wiki/Database%20of%20protein%20conformational%20diversity
The Database of protein conformational diversity (PCDB) is a database of diversity of protein tertiary structures within protein domains as determined by X-ray crystallography. Proteins are inherently flexible and this database collects information on this subject for use in molecular research. It uses the CATH database as a source of structures for each protein and reports the range of differences in the structures based on their superposition and reports a maximum RMSD. The interface for the database allows researchers to find proteins with a range of conformational flexibility allowing them to find highly flexible proteins for example. The database is run and maintained by a group of researchers based at the Universidad Nacional de Quilmes in Argentina. See also Crystallography Protein structure References External links Biological databases Protein structure Crystallographic databases
https://en.wikipedia.org/wiki/Alpha%20Plus%20Group
Alpha Plus Group is an English private education company which runs a network of pre-preparatory, preparatory and secondary independent schools, colleges and nurseries. It is the second largest private education business in the UK. The group was acquired by Sovereign Capital in 2002 and sold to DV4 Limited, advised by investment group Delancey in December 2007. The chairman of governors is Sir John Ritblat, British Land's former chairman and major Conservative Party donor. The group has been loss making since 2016 and suffered losses of £26.4 million during the 2019/20 financial year and obtained a £2.5 million bridging loan from the parent company on 17 December 2020 that was repaid on 8 January 2021. Alpha Plus has 4,187 pupils and students in 2020 down from 4,289 in 2016. History The Group's origins date from the foundation in 1931 of DLD College ‘to provide tuition for the entrance examinations to Oxford and Cambridge universities and to the British Civil Service'. The College has moved campus five times and now occupies a building near Westminster Bridge, where it educates a diverse range of home and international students. Abbey College Manchester was established as a tutorial college in 1990 and now offers GCSE, Foundation and A level courses to local and international students. Abbey College Cambridge was founded in 1994. St Anthony's School for Boys is the oldest school owned by Alpha Plus. Founded in Eastbourne in 1893, it moved to Hampstead in 1952 and was acquired by the Group in 2009. Its sister school, St Anthony's School for Girls opened in September 2016. Wetherby School was founded in 1951, close to the site of the new Wetherby Kensington, and moved to its current premises in 1971. Wetherby Prep School opened in September 2004 and moved to its current premises (Bryanston Square) in September 2009. In June 2018, the Group signed an agreement to lease additional premises at 47 Bryanston Square. The Prep School expanded into the new premises in September 2019. Wetherby Senior School opened in Marylebone in 2015 and continues the traditions established at Wetherby School and Wetherby Preparatory School. The Falcons School for Boys, then known as Falkner House Boys, was founded in 1956 and at that time located in Notting Hill. In September 1989 the school transferred to its pre-prep site in Burnaby Gardens, Chiswick. The preparatory site opened in Richmond in September 2008. The Falcons School for Girls, located in Putney was acquired in 2001. The Alpha Plus Group accounted for an impairment in the value of two of the Falcons schools by £2.15m in 2019 due to fee reductions and lower than expected pupil numbers. Alpha Plus initiated an expansion of its capacity in 2015. It opened four new schools (Wetherby Senior School, St. Anthony's School for Girls, Wetherby-Pembridge New York and Wetherby Kensington School) and posted financial losses as a consequence of the expansion.With the opening of Wetherby-Pembridge in New York and
https://en.wikipedia.org/wiki/Free%20Libyana
Free Libyana or Libyana Al Hura is a mobile telephone network in Eastern Libya. It was created during the Libyan Civil War by disconnecting part of the Libyana mobile phone network from its central control in Tripoli and placing it under new control as an independent network. References External links Libyana Al Hura information and status site at lytawasil.com Telecommunications in Libya First Libyan Civil War