source stringlengths 32 199 | text stringlengths 26 3k |
|---|---|
https://en.wikipedia.org/wiki/Ashley%20Morris | Ashley Morris may refer to:
Ashley Morris (blogger) (1963–2008), New Orleans cultural and political blogger, professor of computer science
Ashley Austin Morris (born 1983), American actress and comedian
Ashley Morris (speedway rider) (born 1994), British speedway rider
Ashley Diana Morris (born 1988), Canadian model and actress
Ashley Morris, chief executive officer Capriotti's |
https://en.wikipedia.org/wiki/Ipke%20Wachsmuth | Ipke Wachsmuth was born 1950. He is a German computer scientist within the fields of artificial intelligence and cognitive science.
Wachsmuth is a professor for artificial intelligence at Bielefeld University and teaches computer science and artificial intelligence since 1989. From 2002 until 2009 he was the managing director of the Center for Interdisciplinary Research (Zentrum für interdisziplinäre Forschung, ZiF) in Bielefeld. His research mainly focuses on human-machine interaction and virtual reality.
Wachsmuth is known for connecting classical symbolic technologies of knowledge representation with elements of dynamic gestures and facial expressions. This is especially exemplified by the development of the embodied agent Max. Since the 1990s Wachsmuth has also been a driving force behind the Interdisciplinary College, an annual spring school in the fields of neurobiology, neural computation, cognitive science, artificial intelligence, robotics and philosophy.
References
External links
Homepage of Ipke Wachsmuth
Homepage of Artificial Intelligence Working Group of Bielefeld University
Academic staff of Bielefeld University
German computer scientists
1950 births
Living people |
https://en.wikipedia.org/wiki/The%20Western%20Front%20%28TV%20series%29 | The Western Front is an Australian rules football television series that has been broadcast on Network Ten in Western Australia in 2002 and ended on 8 October 2011.
The show focuses on the two Western Australian teams in the Australian Football League, and , as well as the West Australian Football League. The show has been hosted by Tim Gossage and Lachy Reid from its debut until 2010, but for the 2011 season, Reid will host it with a guest host each week.
The show is notable for encouraging people to form a "big 'W'" hand sign in the background of television broadcasts on any show on any network. The sign is created by holding your hands up in front of you with the thumbs touching and only the index fingers extended, to form a "W" shape. Each week the show highlights signs seen at football matches, behind outside broadcasts or posed photos of people forming the W at notable locations around the world. They also encourage celebrities to form the "W" sign, and have filmed Kevin Rudd, John Howard, Jennifer Hawkins and Kobe Bryant.
The show is broadcast on Saturday afternoons, normally between the two midday and night games that Network Ten has the rights to broadcast, and prior to Before the Game, the nationally broadcast football comedy show. It is one of the few regularly broadcast shows apart from news programs to be filmed in Western Australia.
References
External links
Network 10 original programming
Australian rules football television series
2002 Australian television series debuts
2011 Australian television series endings
Television shows set in Perth, Western Australia |
https://en.wikipedia.org/wiki/CineGrid | CineGrid is a non-profit organization based in California that began in 2004 in order to distribute 1 Gbit/s to 1 Pbps (Petabit per second) digital networks, utilize grid computing to manage digital media applications, and increase the demand for digital media exchange among remote participants in science, education, research, art and entertainment. With its headquarters at the California Institute for Telecommunications and Information Technology, renamed in 2013 as Qualcomm Institute (Qi) in San Diego, CineGrid is composed of 61 separate organizations and corporations. CineGrid has facilitated grants for its members through the National Science Foundation and provides access to Ethernet VLAN and TCP/IP connectivity.
In December 2013, CineGrid held an event for the first transmission of four surgeries in very high definition (4K), in real time and simultaneously, directly from Brazil to the United States.
Founding members
CineGrid is composed of innovators from scientific, artistic, and technological backgrounds. Its founding members include:
Cisco Systems
Keio University/Research Institute for Digital Media Content
Lucasfilm Ltd.
NTT Network Innovation Laboratories
Pacific Interface Inc.
Toronto Metropolitan University/Rogers Communications Centre
San Francisco State University/INGI
Sony Electronics Inc.
University of Amsterdam
University of California, San Diego/Calit2
University of Illinois Urbana-Champaign/NCSA
Electronic Visualization Laboratory
USC School of Cinematic Arts
University of Washington Research Channel
Annual conference
Every year, CineGrid holds a conference for its member at the University of California, San Diego. At the annual meeting, members are able to present their current research and technological developments. Workshops and demonstrations are held to introduce and give members first-hand experience with new networking tools and multi-media advancements. The CineGrid International Workshop Programs include several demonstrations from the CRCA Visiting Artist Lab, CRCA Spatialized Audio Lab, AESOP Wall, Hi-Per Wall, SAGE, StarCAVE, LAVID, Laboratory of Cinematic Arts (LabCine) and the Virtulab.
References
External links
CineGrid Website
EVL Website
Calit2 Website
CineGrid Brasil Website
Organizations based in California
Grid computing projects
Information technology organizations based in North America |
https://en.wikipedia.org/wiki/Adaptive%20compression | Adaptive compression is a type of data compression which changes compression algorithms based on the type of data being compressed.
References
Data compression |
https://en.wikipedia.org/wiki/AntWeb | AntWeb is the leading online database on ants: storing specimens images and records, and natural history information, and documenting over 490,000 specimens across over 35,000 taxa of ants in its open source and community driven repository . It was set up by Brian L. Fisher in 2002, and cost US$30,000 dollars to build.
References
External links
Website
Entomological databases
Myrmecology |
https://en.wikipedia.org/wiki/The%20Media%20Equation | The Media Equation is a general communication theory that claims people tend to assign human characteristics to computers and other media, and treat them as if they were real social actors. The effects of this phenomenon on people experiencing these media are often profound, leading them to behave and to respond to these experiences in unexpected ways, most of which they are completely unaware of.
Originally based on the research of Clifford Nass and Byron Reeves at Stanford University, the theory explains that people tend to respond to media as they would either to another person (by being polite, cooperative, attributing personality characteristics such as aggressiveness, humor, expertise, and gender) – or to places and phenomena in the physical world – depending on the cues they receive from the media. Numerous studies that have evolved from the research in psychology, social science and other fields indicate that this type of reaction is automatic, unavoidable, and happens more often than people realize. Reeves and Nass (1996) argue that, “Individuals’ interactions with computers, television, and new media are fundamentally social and natural, just like interactions in real life,” (p. 5).
The Media Equation Test (1996)
Reeves and Nass established two rules before the test- when a computer asks a user about itself, the user will give more positive responses than when a different computer asks the same question. They expected people to be less variable with their responses when they took a test and then answered a questionnaire on the same computer. They wanted to see that computers, although not human, can implement social responses. The independent variable was the computer (there are two in the test), and the dependent variable was the evaluation responses, and the control was a pen-and-paper questionnaire.
Reeves and Nass designed an experiment with 22 participants and told them they would be working with a computer to learn about random facts of American pop culture. At the end of the session they would ask the participants to evaluate the computer that they used. They would have to tell Reeves and Nass how they felt about that computer and how well it performed. 20 facts were presented in each session, and participants would answer if they knew “a great deal, somewhat, or very little” about the statement. After the session, participants were tested on the material and told which questions they had answered correctly or incorrectly. Computer #1, then made a statement of its own performance by always stating that it “did a good job”.
Participants were then divided into 2 groups to evaluate the computer's performance and participants were asked to describe this performance from the choice of about 20 adjectives. Half of the participants were assigned to evaluate on computer #1, the computer that praised its own work. The other half were sent to another computer across the room to evaluate computer#1's performance.
The conclusion resulte |
https://en.wikipedia.org/wiki/6%20News | 6 News may refer to:
News channels
6 News Lawrence, in Lawrence, Kansas
News departments
These television stations use the name "6 News" for their news programming:
KFDM, in Beaumont, Texas
KRIS-TV, in Corpus Christi, Texas
WATE-TV, in Knoxville, Tennessee
WLNS-TV, in Lansing, Michigan
WRTV, in Indianapolis, Indiana |
https://en.wikipedia.org/wiki/Nick%20Jennings | Nick Jennings may refer to:
Nick Jennings (computer scientist) (born 1966), British computer scientist
Nick Jennings (artist), American animation director |
https://en.wikipedia.org/wiki/Matt%27s%20Script%20Archive | Matt's Script Archive is a collection of CGI scripts written in the Perl programming language. Started in 1995 by Matt Wright (at the time a high school student in Fort Collins, Colorado), the archive contains about a dozen free scripts, designed to be easily added to a site and configured. One of the scripts, FormMail, is claimed to be the most popular CGI script on the World Wide Web, with over 2 million downloads since 1997.
As the scripts grew in popularity they were criticized for being insecure. The FormMail.pl script, in particular, was exploited by spammers to send junk email. SecurityFocus put attacks based on FormMail.pl third in their list of the Top Attacks for the 1st Quarter of 2002. As Perl 5 became more mature, norms in the community changed to encourage use of modules such as CGI.pm and code safety features such as strictures and taint checking; the scripts in Matt's Script Archive, however, did not follow these changes, and as a result (and also because Matt Wright wrote much of the code when he was an inexperienced programmer) tend to be buggy. Experienced Perl programmers usually recommend against the use of these scripts, and the London Perl Mongers started an effort called "nms" to write drop-in replacements for them. Matt Wright himself has recommended using the nms scripts, saying:I would highly recommend downloading the nms versions if you wish to learn CGI programming. The code you find at Matt's Script Archive is not representative of how even I would code these days.
Most of the scripts at Matt's Script Archive ceased to be updated after 1996, with the exception of security flaws or bugs.
See also
History of the World Wide Web
References
External links
Matt's Script Archive
nms project on sourceforge
History of the Internet
Perl software |
https://en.wikipedia.org/wiki/Wiring%20%28software%29 | Wiring is an open-source electronics prototyping platform composed of a programming language, an integrated development environment (IDE), and a single-board microcontroller. It was developed starting in 2003 by Hernando Barragán.
Barragán started the project at the Interaction Design Institute Ivrea. The project is currently developed at the School of Architecture and Design at the Universidad de Los Andes in Bogotá, Colombia.
Wiring builds on Processing, an open project initiated by Casey Reas and Benjamin Fry, both formerly of the Aesthetics and Computation Group at the MIT Media Lab.
Project experts, intermediate developers, and beginners from around the world share ideas, knowledge and their collective experience as a project community. Wiring makes it easy to create software for controlling devices attached to the electronics board to create various interactive devices. The concept of developing is to write a few lines of code, connect a few electronic components to the Wiring hardware and observe, for example, that a motion sensor controls a light when a person approaches it, write a few more lines, add another sensor, and see how this light changes when the illumination level in a room decreases. This process is called sketching with hardware; explore ideas quickly, select the more interesting ones, refine and produce prototypes in an iterative process.
Software
The Wiring IDE is a cross-platform application written in Java which is derived from the IDE made for the Processing programming language. It is designed to introduce programming and sketching with electronics to artists and designers. It includes a code editor with features such as syntax highlighting, brace matching, and automatic indentation capable of compiling and uploading programs to the board with a single click.
The Wiring IDE includes a C/C++ library called "Wiring", which makes common input/output operations much easier. Wiring programs are written in C++. A minimal program requires only two functions:
: a function run once at the start of a program which can be used to define initial environment settings.
: a function called repeatedly until the board is powered off or reset.
A typical first program for a developer using a microcontroller is to blink a light-emitting diode (LED) on and off. In the Wiring environment, the user might write a program like this:
int ledPin = WLED; // a name for the on-board LED
void setup () {
pinMode(ledPin, OUTPUT); // configure the pin for digital output
}
void loop () {
digitalWrite(ledPin, HIGH); // turn on the LED
delay (1000); // wait one second (1000 milliseconds)
digitalWrite(ledPin, LOW); // turn off the LED
delay (1000); // wait one second
}
When the user clicks the "Upload to Wiring hardware" button in the IDE, a copy of the code is written to a temporary file including a standard header file at the file beginning, and a simple main function app |
https://en.wikipedia.org/wiki/Ion%20Stoica | Ion Stoica is a Romanian–American computer scientist specializing in distributed systems, cloud computing and computer networking. He is a professor of computer science at the University of California, Berkeley and co-director of AMPLab. He co-founded Conviva and Databricks with other original developers of Apache Spark.
As of April 2022, Forbes ranked him and Matei Zaharia as the 3rd-richest people in Romania with a net worth of $1.6 billion.
Education
Stoica was born in Romania, where he grew up and attended Polytechnic University of Bucharest, receiving a MS in Electrical Engineering and Computer Science in 1989. He moved to the USA in 1994 to start a PhD at Old Dominion University with computer-science professor Hussein Abdel-Wahab. In 1996, he transferred to Carnegie Mellon University (CMU), where in 2000 he received a PhD in Electrical & Computer Engineering supervised by Hui Zhang.
Subjects included Chord (peer-to-peer), Core-Stateless Fair Queueing (CSFQ), and Internet Indirection Infrastructure (i3).
Career and research
Stoica has been a Berkeley professor since 2000. His research interests include cloud computing, networking, distributed systems and big data. He has authored or co-authored more than 100 peer reviewed papers in various areas of computer science.
Stoica was a co-founder and Chief Technology Officer (CTO) of Conviva in 2006, a company that came out of the End System Multicast project at CMU.
In 2013 he co-founded Databricks, serving as its chief executive until being replaced by Ali Ghodsi in January 2016, when he became executive chairman.
Awards
Stoica under the supervision of his doctoral advisor Hui Zhang (Chinese: 张晖) won the Association for Computing Machinery Ph.D. dissertation Award in 2001 for his thesis Stateless Core: A Scalable Approach for Quality of Service in the Internet (2000). Stoica is the recipient of a SIGCOMM Test of Time Award (2011), the 2007 CoNEXT Rising Star Award, a Sloan Foundation Fellowship (2003) and a PECASE Award (2002). Stoica is also an ACM Fellow. In 2019, Stoica received the SIGOPS Mark Weiser Award.
Philanthropy
In June of 2021, Berkeley announced that Stoica had donated $25 million toward the university's computing and data science initiatives, making him and colleague Scott Shenker two of Berkeley's largest benefactors.
References
Living people
American computer scientists
Romanian emigrants to the United States
American people of Romanian descent
Romanian computer scientists
Politehnica University of Bucharest alumni
Carnegie Mellon University College of Engineering alumni
UC Berkeley College of Engineering faculty
Fellows of the Association for Computing Machinery
Year of birth missing (living people)
Publications
List of publications, Berkeley website |
https://en.wikipedia.org/wiki/Garage%20Club | Garage Club is a French computer-animated cel-shaded television series aired on Nickelodeon (France) since September 2009 and on France 4 since September 2011.
Concept
An abandoned locale serves as the center stage for the adventures and soul-searching of a teen rock band. However, the neighbours, who have been driven around the bend by their music, devise all sorts of incredible schemes to keep them from rehearsing.
The series develops two aspects at the same time:
a "sitcom" aspect, featuring the band members’ trials and tribulations as teenagers, as well as their arguments over music in general and their rehearsals in particular;
a "cartoon" aspect, featuring the various ploys the neighbors concoct to prevent the band from playing.
Each episode systematically ends with the failure of the neighbours’ plan and the launch of a new rehearsal, with the band members totally unaware of what they managed to avoid.
Season 1
Love story
Never Spike without Nick
"We're splitting !"
Shock wave
Big in Japan
A very trendy concert
Rage against the fur
Zoomusicology
Killer face
Valentine's troubles
No logo
Edward Scissorvoice
Anatomical Mushrooms
Zombie rock
Mighty Edward
Dumb and drummer
Megalo rock
Bioband
Love at first sight
Game over
LOL
Drum sticks
Momo's tomtom
Fan fun fool
Apocalypsound
Punk food
External links
Garage Club on France 4
Garage Club on Nickelodeon (France)
2000s French animated television series
2010s French animated television series
2009 French television series debuts
2010 French television series endings
French children's animated comedy television series
France Télévisions children's television series
France Télévisions television comedy |
https://en.wikipedia.org/wiki/MelsecNet | MelsecNet is a protocol developed and supported by Mitsubishi Electric for data delivery. MelsecNet supports 239 networks.
MelsecNet protocol has two variants. MELSECNET/H and its predecessor MELSECNET/10 use high speed and redundant functionality to give deterministic delivery of large data volumes. Both variants can use either coaxial bus type or optical loop type for transmission. Coaxial bus type uses the token bus method with an overall distance of but optical loop type uses the Token Ring method and can support a distance up to . MELSECNET/H can support a maximum of 19,200 bytes/frame and a maximum communication speed of 25 Mbit/s. MELSECNET/10 supports 960 bytes/frame and a baud rate of 10 Mbit/s. Mitsubishi provides a manual for both the variants Melsecnet/H and MelsecNet/10.
Features
Easy personal computer, HMI and PLC connection
High-speed data communications with large data volumes
Reliable and robust data transfers
Redundancy functions
10/25 megabaud data transfer rates
Maximum network distance 30 km, up to 255 segments
Simple configuration, remote programming
Floating master
References
External links
Mitsubishi Europe
Industrial computing
Serial buses
Industrial automation
Mitsubishi Electric products, services and standards |
https://en.wikipedia.org/wiki/Optomux | Optomux is a serial (RS-422/RS485) network protocol originally developed by Opto 22 in 1982 which is used for industrial automation applications. Optomux is an ASCII protocol consisting of command messages and response messages containing data from an Optomux unit & contain a message checksum to ensure secure communications. The serial data link is very reliable, over distances up to 4,000 feet and is suitable for extreme safety applications. An Optomux system is typically made up of three main elements:
There must be a host device to poll the Optomux brain boards.
There are the brain boards themselves, anywhere from one to 255 of them.
Each Optomux brain board attaches to an I/O mounting rack, carrying the individual I/O modules.
Limitation
The primary performance limitation of the Optomux system is the slow serial data link. The maximum data rate supported by the Optomux brain boards is 38.4 kbit/s (also dependent on the length of the communication lines). In theory, at maximum speed, the Optomux system should be capable of polling roughly 3,400 digital positions per second, or roughly 600 analog positions per second. This is assuming that all the positions are on the same brain board, which is not possible with Optomux. A more realistic speed figure would be about half of the previous numbers. For faster serial data communication, Opto 22's Mistic protocol and hardware may be used at speeds to 115.2 kbit/s. Or, a B3000 brain using the Optomux protocol can communicate at similar high speeds.
External links
Optomux protocol user Guide
Optomux Application FAQ
References
Industrial computing
Serial buses
Industrial automation |
https://en.wikipedia.org/wiki/G%C3%A1bor%20N.%20S%C3%A1rk%C3%B6zy | Gábor N. Sárközy, also known as Gabor Sarkozy, is a Hungarian-American mathematician, the son of noted mathematician András Sárközy. He is currently on faculty of the Computer Science Department at Worcester Polytechnic Institute, MA, United States and is also a senior research fellow at the Alfréd Rényi Institute of Mathematics of the Hungarian Academy of Sciences.
He obtained a Diploma in Mathematics from Eötvös Loránd University and a PhD in Computer Science from Rutgers, under the advisement of Endre Szemerédi.
Perhaps his best known result is the Blow-Up Lemma, in which, together with János Komlós and Endre Szemerédi he proved that the regular pairs in Szemerédi regularity lemma behave like complete bipartite graphs under the correct conditions. The lemma allowed for deeper exploration into the nature of embeddings of large sparse graphs into dense graphs. A hypergraph variant was developed later by Peter Keevash.
He is member of the editorial board of the European Journal of Combinatorics.
He also has an Erdős number of 1.
References
Combinatorialists
Theoretical computer scientists
20th-century Hungarian mathematicians
21st-century Hungarian mathematicians
Living people
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/SDS%20Protocol | Smart Distributed System (SDS) protocol was developed by Honeywell and is supported by Holjeron. SDS is an open event-driven protocol used over Controller area network based industrial networks. It is used for a highly reliable Smart device-level network. The SDS Application Layer Protocol is optimized for smart sensors and actuators, where configuration, diagnostic, and process information can be embedded cost-effectively in a very small footprint.
Key features
Supports communication rates up to 1 Mbit/s.
1500 ft maximum distance at 125 kbit/s (longer with Bridge).
Can support 64 maximum electrical loads (Nodes) per network without repeater & 126 with repeater.
Uses 12-24VDC, 2 power wires + 2 communication wires + shield
Multiple physical layer topologies
Can have 126 logical addresses (logical devices) - not related to physical location on the network
Each logical device can have 32 objects containing attributes, actions and events
Proven event driven architecture for maximum throughput (<1ms)
Event-Driven, Master-Slave, Multicast and Peer-to-peer Services
Network heartbeat to ensure device health every 2.5 seconds
Have Robust Network Management capabilities (Microsoft architecture)
External links
SDS Testing
Industrial computing
Serial buses
Industrial automation |
https://en.wikipedia.org/wiki/Amir%20Alexander%20Hasson | Amir Alexander Hasson is a social entrepreneur and the founder of United Villages, an organization specializing in the deployment and usage of wireless networks, including cell phone networks, to rural areas of India through local shop owners. These networks have been used to provide supply management and general e-commerce to areas previously isolated. He was honored with the MIT Technology Review's TR35 award in 2010.
In 1998 Hasson graduated with honors from the College of Social Studies at Wesleyan University and in 2002 received his master's degree from the Sloan School of Management at MIT. "During his studies at MIT, Amir co-conceived and patented DakNet, a novel low-cost wireless networking technology for rural connectivity."
References
External links
amirhasson.com — Hasson's website
Living people
MIT Sloan School of Management alumni
Wesleyan University alumni
Year of birth missing (living people)
Social entrepreneurs |
https://en.wikipedia.org/wiki/Service%20Request%20Transport%20Protocol | Service Request Transport Protocol (GE-SRTP) protocol is developed by GE Intelligent Platforms (earlier GE Fanuc) for transfer of data from programmable logic controllers. The protocol is used over Ethernet almost all GE automation equipment supports the GE-SRTP protocol when equipped with an Ethernet port. Any SRTP client will be capable of reading and writing system memory of any number of remote SRTP capable devices.
See also
Computer network
Computer science
External links
Industrial computing
Industrial Ethernet |
https://en.wikipedia.org/wiki/Effective%20%28database%29 | Effective is a database of predicted bacterial secreted proteins.
See also
Secreted proteins
References
External links
http://effectors.org
Biological databases
Protein classification
Bacteriology
Gene expression |
https://en.wikipedia.org/wiki/International%20cybercrime | There is no commonly agreed single definition of “cybercrime”. It refers to illegal internet-mediated activities that often take place in global electronic networks. Cybercrime is "international" or "transnational" – there are ‘no cyber-borders between countries'. International cybercrimes often challenge the effectiveness of domestic and international law, and law enforcement. Because existing laws in many countries are not tailored to deal with cybercrime, criminals increasingly conduct crimes on the Internet in order to take advantages of the less severe punishments or difficulties of being traced. No matter, in developing or developed countries, governments and industries have gradually realized the colossal threats of cybercrime on economic and political security and public interests. However, complexity in types and forms of cybercrime increases the difficulty to fight back. In this sense, fighting cybercrime calls for international cooperation. Various organizations and governments have already made joint efforts in establishing global standards of legislation and law enforcement both on a regional and on an international scale. China–United States cooperation is one of the most striking progress recently, because they are the top two source countries of cybercrime.
Information and communication technology (ICT) plays an important role in helping ensure interoperability and security based on global standards. General countermeasures have been adopted in cracking down cybercrime, such as legal measures in perfecting legislation and technical measures in tracking down crimes over the network, Internet content control, using public or private proxy and computer forensics, encryption and plausible deniability, etc. Due to the heterogeneity of law enforcement and technical countermeasures of different countries, this article will mainly focus on legislative and regulatory initiatives of international cooperation.
Typology
In terms of cybercrime, we may often associate it with various forms of Internet attacks, such as hacking, Trojans, malware (keyloggers), botnet, Denial-of-Service (DoS), spoofing, phishing, and vishing. Though cybercrime encompasses a broad range of illegal activities, it can be generally divided into five categories:
Intrusive Offenses
Illegal Access: “Hacking” is one of the major forms of offenses that refers to unlawful access to a computer system.
Data Espionage: Offenders can intercept communications between users (such as e-mails) by targeting communication infrastructure such as fixed lines or wireless, and any Internet service (e.g., e-mail servers, chat or VoIP communications).
Data Interference: Offenders can violate the integrity of data and interfere with them by deleting, suppressing, or altering data and restricting access to them.
Content-related offenses
Pornographic Material (Child-Pornography): Sexually related content was among the first content to be commercially distributed over the Internet.
Ra |
https://en.wikipedia.org/wiki/Widest%20path%20problem | In graph algorithms, the widest path problem is the problem of finding a path between two designated vertices in a weighted graph, maximizing the weight of the minimum-weight edge in the path. The widest path problem is also known as the maximum capacity path problem. It is possible to adapt most shortest path algorithms to compute widest paths, by modifying them to use the bottleneck distance instead of path length. However, in many cases even faster algorithms are possible.
For instance, in a graph that represents connections between routers in the Internet, where the weight of an edge represents the bandwidth of a connection between two routers, the widest path problem is the problem of finding an end-to-end path between two Internet nodes that has the maximum possible bandwidth. The smallest edge weight on this path is known as the capacity or bandwidth of the path. As well as its applications in network routing, the widest path problem is also an important component of the Schulze method for deciding the winner of a multiway election, and has been applied to digital compositing, metabolic pathway analysis, and the computation of maximum flows.
A closely related problem, the minimax path problem or bottleneck shortest path problem asks for the path that minimizes the maximum weight of any of its edges. It has applications that include transportation planning. Any algorithm for the widest path problem can be transformed into an algorithm for the minimax path problem, or vice versa, by reversing the sense of all the weight comparisons performed by the algorithm, or equivalently by replacing every edge weight by its negation.
Undirected graphs
In an undirected graph, a widest path may be found as the path between the two vertices in the maximum spanning tree of the graph, and a minimax path may be found as the path between the two vertices in the minimum spanning tree.
In any graph, directed or undirected, there is a straightforward algorithm for finding a widest path once the weight of its minimum-weight edge is known: simply delete all smaller edges and search for any path among the remaining edges using breadth-first search or depth-first search. Based on this test, there also exists a linear time algorithm for finding a widest path in an undirected graph, that does not use the maximum spanning tree. The main idea of the algorithm is to apply the linear-time path-finding algorithm to the median edge weight in the graph, and then either to delete all smaller edges or contract all larger edges according to whether a path does or does not exist, and recurse in the resulting smaller graph.
use undirected bottleneck shortest paths in order to form composite aerial photographs that combine multiple images of overlapping areas. In the subproblem to which the widest path problem applies, two images have already been transformed into a common coordinate system; the remaining task is to select a seam, a curve that passes through the region of o |
https://en.wikipedia.org/wiki/SynqNet | SynqNet is an industrial automation network launched in 2001 by Danaher Corporation for meeting the performance and safety requirements of machine control applications. Synqnet is built over Ethernet link and 100BASE-TX physical layer and provides a synchronous connection between various process automation devices including motion controllers, servo drives, stepper drives and I/O modules. As of September 2008, SynqNet networks are used for controlling over 400,000 axes of motion on various motion applications worldwide. SynqNet user group is formed in 2004 for enhancing the developments.
References
External links
SynqNet Info
SynqNet Technology
syncqnet user group
Industrial Ethernet |
https://en.wikipedia.org/wiki/Network%20Q%20RAC%20Rally%20Championship | Network Q RAC Rally Championship is a rally computer game that is part of the Rally Championship series and a sequel to Network Q RAC Rally (1993). The game was released for MS-DOS in 1996. It was developed by British studio Magnetic Fields and published by Europress. An expansion pack, The X-Miles, was released in 1997. It added 10 new tracks and an arcade mode. A sequel was also released in 1997, called International Rally Championship.
Reception
GameSpot concluded that "whether you're looking for unadulterated arcade action or a serious simulation, Rally Championship delivers the goods. Give it smoother road graphics, visual car damage, and enhanced multiplayer support, and Rally Championship will be set to challenge the very best the PC racing world has to offer". PC Zone praised the game and ultimately gave it a "Classic Award".
References
External links
Demo version at Internet Archive
1996 video games
DOS games
DOS-only games
Europress games
Magnetic Fields (video game developer) games
Multiplayer and single-player video games
Rally racing video games
Video games developed in the United Kingdom
Video games with expansion packs |
https://en.wikipedia.org/wiki/Alex%20Waibel | Alexander Waibel (born 2 May 1956 in Heidelberg, Germany) is a professor of Computer Science at Carnegie Mellon University and Karlsruhe Institute of Technology. Waibel's research interests focus on speech recognition and translation and human communication signals and systems. Waibel is known for the time delay neural network (TDNN), which he developed. It is the first convolutional neural network (CNN) trained by gradient descent, using the backpropagation algorithm. Alex Waibel introduced the TDNN 1987 at ATR in Japan.
BBC summed up Alex Waibel's motivation: "We don’t want to look things up in dictionaries – so I wanted to build a machine to translate speech."
Life
He graduated from Massachusetts Institute of Technology, with a BS in electrical engineering, and from Carnegie Mellon University, with an MS and PhD in computer science.
Dr Waibel is the director of interACT, the International Center for Advanced Communication Technologies. He was one of the founders of C-STAR, an international consortium for speech translation research, and served as its chairman from 1998 to 2000. Waibel directed the CHIL program (FP-6 Integrated Project on multimodality) in Europe and NSF-ITR project STR-DUST (the first domain independent speech translation project) in the U.S. He is project coordinator of the IP EU-BRIDGE, funded by the EC and started on 1 February 2012.
At C-STAR, his team developed the JANUS speech translation system, the first American and European Speech Translation system, and more recently the first real-time simultaneous speech translation system for lectures. His lab has also developed a number of multimodal systems including perceptual meeting rooms, meeting recognizers, meeting browsers and multimodal dialog systems for humanoid robots.
In the areas of speech, speech translation, and multimodal interfaces Dr. Waibel holds several patents and has founded and co-founded several successful commercial ventures. He is the founder and chairman of Mobile Technologies, LLC, maker of the Jibbigo mobile speech-to-speech translation app which uses speech recognition and machine translation.
In 2012, Waibel produced a video lecture demonstrating the world's first automatic simultaneous translation service at a university, stating that "the lecture translator automatically records, transcribes and translates the speech of a lecturer in real time, and students can follow the lecture in their own language on their PC or mobile phone."
In 2013 he joined Facebook, INC to start the Language Technology Group which would eventually become part of Facebook's broader Applied Machine Learning efforts. He is a director at Multimodal Technologies, Inc.
In 2017 Dr. Waibel was elected as member of the Academy of Sciences Leopoldina, the national academy of Germany.
In October 2018 Dr. Waibel closed out a successful legal case against Wikimedia Foundation citing German libel laws.
References
External links
Urteil im Fall Waibel, Wikimedia Foundati |
https://en.wikipedia.org/wiki/Claire%20Delfin | MelClaire Sy-Delfin, or better known as Claire Delfin, is a Filipino broadcast journalist from GMA Network, a popular TV network in the Philippines. Delfin serves as correspondent of GMA-7's 24 Oras (24 Hours) which provides local news in Tagalog. An alumna of Silliman University where she obtained her B.A. in Mass Communication (1999), Delfin is a recipient of a number of prestigious awards. In 2007 she received the Global Media Award for Excellence in Population Reporting from the Population Institute in Washington D.C. for her story on child sexuality. In 2009, Delfin won two prizes in the annual PopDev awards, and in 2010, she again received the SEAMEO-Australia Press Award from the Southeast Asian Ministers of Education Organization (SEAMEO) for a story she wrote entitled "Palengskwela: Bringing the school to the market."
Footnotes
External links
GMA News Online Official website
Living people
Filipino television journalists
Silliman University alumni
GMA Integrated News and Public Affairs people
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/Cadena%20S%C3%BAper | Cadena Super was a Colombian radio network, founded in the 1970s by Conservative politician Jaime Pava Navarro. Its flagship Bogotá station, Radio Super, which broadcast at 1040 kHz (formerly Radio Metropolitana), replaced pioneer station La Voz de la Víctor at 970 kHz in 1987. Before that, the flagship station was Villavicencio's La Voz del Llano.
Besides the main radio network, it owns La Superestación, a pop-rock station founded in 1982 and which became online-only in 2005, with its frequencies leased to rival network RCN Radio.
Since December 2012, all the Super's frequencies in AM (Bogotá, Medellín, Cali, Ibagué, Villavicencio -Voz del Llano-, Cúcuta and Neiva) were leased to RCN too. The 3 main frequencies are called Radio Red (Bogotá, Medellín and Cali), Radio Fiesta (Cúcuta), La Cariñosa (Voz del Llano in Villavicencio), and La FM (Ibagué and Neiva).
References
External links
Cadena Super
1971 establishments in Colombia
2013 disestablishments in Colombia
Radio stations in Colombia
Radio stations established in 1971
Radio stations disestablished in 2013
Defunct mass media in Colombia |
https://en.wikipedia.org/wiki/Symposium%20on%20Geometry%20Processing | Symposium on Geometry Processing (SGP) is an annual symposium hosted by the European Association For Computer Graphics (Eurographics). The goal of the symposium is to present and discuss new research ideas and results in geometry processing. The conference is geared toward the discussion of mathematical foundations and practical algorithms for the processing of complex geometric data sets, ranging from acquisition and editing all the way to animation, transmission and display. As such, it draws on many disciplines spanning pure and applied mathematics, computer science, and engineering. The proceedings of SGP appear as a special issue of the Computer Graphics Forum, the International Journal of the Eurographics Association. Since 2011, SGP has held a two-day "graduate school" preceding the conference, typically composed of workshop-style courses from subfield experts.
Venues
Best Paper Awards
Each year up to three papers are recognized with a Best Paper Award.
SGP Software Award
Each year, since 2011, SGP also awards a prize for the best freely available software related to or useful for geometry processing.
SGP Dataset Award
Each year, since 2016, SGP also awards a prize for the best freely available dataset related to or useful for geometry processing.
References
geometry processing course webpage, Alla Sheffer
EG digital library for SGP 2012
Computer graphics organizations |
https://en.wikipedia.org/wiki/List%20of%20active%20ships%20of%20the%20Colombian%20Navy | In addition to the usual tasks of a green water navy, the Colombian Navy () also performs coast guard duties, has shared responsibility for patrolling the extensive Colombian network of rivers, and includes the Marine Infantry (IM). Furthermore, its littoral/riverine component is relatively large when compared with the more traditional navies of other countries.
Due to this aggregation of duties, some vessels perform routinely and indistinctly as coast guard/combat patrol, particularly those mid-size, lightly armed vessels, and can occasionally be found classified as either Surface combat or Coast Guard or even Logistics/General transport across different sources, even in official documents from the ARC itself. Also, many of the lighter patrol/harbor patrol boats may be assigned or reassigned duties across the different branches with little or no notice depending on service needs.
As the ARC has embarked in a program of modernization since 2000, a better separation and categorization of the different vessels has ensued, with many vessels being re-numbered or reclassified, which makes for occasionally conflicting references. This article tries to use the latest denominations whenever possible, but there may still be overlaps.
Key
The tables below use the following key:
Oceanic combat
Littoral / Riverine service
Coast Guard
Training, Auxiliary and Logistics
Notes
References
Ships of the Colombian Navy
Naval ships of Colombia |
https://en.wikipedia.org/wiki/Universal%20Television%20%28Somalia%29 | Universal Television is a Somali television channel. With its studio in London, it is the first and largest Somali TV satellite network of its type.
See also
Media of Somalia
Somali National Television
Shabelle Media Network
Somali Broadcasting Corporation
Somaliland National TV
Horn Cable Television
External links
References
Television channels in Somalia
Television channels and stations established in 1993 |
https://en.wikipedia.org/wiki/Pseudomonas%20Genome%20Database | The Pseudomonas Genome Database is a database of genomic annotations for Pseudomonas genomes.
References
External links
Pseudomonas aeruginosa
Biological databases
Pseudomonadales
Bacteria
Psychrophiles
Gram-negative bacteria |
https://en.wikipedia.org/wiki/Polymorphic%20simple%20sequence%20repeats%20database | PSSRdb (Polymorphic Simple Sequence Repeats database) is a database of polymorphic simple sequence repeats
See also
sequence repeats
References
External links
http://www.cdfd.org.in/PSSRdb/
Biological databases
Repetitive DNA sequences |
https://en.wikipedia.org/wiki/National%20Household%20Targeting%20System%20for%20Poverty%20Reduction | The National Household Targeting System for Poverty Reduction (NHTS-PR) is a data bank and an information management system that identifies who and where the poor are in the Republic of the Philippines. Data collection began in response to findings by the National Statistical Coordination Board that 30% of Filipino families have an income below that needed for "basic requirements". It is intended to inform government departments and policy-makers on the socio-economic status of nearly 400,000 households.
Outcomes
The use of the NHTSPR has led to 4.4 million poor households being enrolled in Pantawid Pamilyang Pilipino Program or the Philippine conditional cash transfer program, and the poor elderly receiving social pensions. It has also led to 4,000 health cards being distributed which provide state-run health insurance for poor families.
Current operations
The database has identified a total of 5.25 million households below the poverty threshold of their respective provinces. With such information, national government agencies, local government unit, and non-government organizations can direct resources to the ones who need them the most. With the use of the database, projects like electrification can be concentrated on areas with high incidence of poverty, uplifting the community economic sustainability and reducing poverty. The system can also correlate other poverty related problems like human trafficking in order to prevent them from even happening.
Driving mechanism
Since the NHTS-PR is technically an information management system, it is very reliant on technology. It uses Open Technologies as the primary software backbone and the latest multiple processor servers available at the time. A major challenge inherent to data sharing is porting since different agencies are using different proprietary software. To overcome such challenge, data porting software are developed in-house from existing Open Source systems.
References
Department of Social Welfare and Development (Philippines)
Poverty in the Philippines |
https://en.wikipedia.org/wiki/FBI%20Index | The FBI Indexes, or Index List, was a system used to track American citizens and other people by the Federal Bureau of Investigation (FBI) before the adoption of computerized databases. The Index List was originally made of paper index cards, first compiled by J. Edgar Hoover at the Bureau of Investigations before he was appointed director of the FBI. The Index List was used to track U.S. citizens and others believed by the FBI to be dangerous to national security, and was subdivided into various divisions which generally were rated based on different classes of danger the subject was thought to represent.
General Intelligence Division
In 1919, during the First Red Scare, William J. Flynn of the Bureau of Investigation appointed J. Edgar Hoover chief of the General Intelligence Division (GID). Hoover used his experience working as a library clerk at the Library of Congress to create an index tracking system which used extensive cross-referencing.
The GID took files from the Bureau of Investigations (later renamed the Federal Bureau of Investigation) and 'systematized' them via index cards. The cards covered 150,000 people. By 1939, Hoover had more than 10 million people 'Indexed' in the FBI's domestic file system.
Although the GID was terminated in 1924 after objections from people such as William J. Donovan who questioned its constitutionality, Hoover and the FBI continued to expand the Index system for use by the agency, by Hoover, and by Hoover's political associates well into the 1970s. Presently, the Index files covering an unknown number of Americans are still accessible by the FBI and its 29 field offices.
Titles of the evolving Index catalogs include: the Custodial Index, which included citizens or aliens with German, Italian and Communist sympathies, that could be held in internment camps during World War II; the Security Index, for influential people to be "arrested and held" in case of a national emergency; The Communist Index; The Agitator Index; Sexual Deviant Index; and The Administrative Index, which compiled several earlier indexes.
Even though a complete list of Index titles is currently unavailable, Hoover and the FBI used their Index system to catalog Native American and African American liberation activists during the 1960s and 1970s, as well as Vietnam War protesters and some other college students.
Custodial Detention Index
The Custodial Detention Index (CDI), or Custodial Detention List was formed in 1939–1941, as part of a program named variously the "Custodial Detention Program" or "Alien Enemy Control".
J. Edgar Hoover described it as having come from his resurrected General Intelligence Division in Washington. According to Hoover, it created large numbers of files on "individuals, groups, and organizations engaged in subversive activities", including espionage, and enabled the Bureau to immediately identify potential threats. Congressman Vito Marcantonio called it "terror by index cards". Senator George W. Nor |
https://en.wikipedia.org/wiki/RCN%20Radio | RCN Radio (Radio Cadena Nacional, "National Radio Network") is one of the main radio networks in Colombia. Founded in 1949 with the integration of Radio Pacífico (Cali), La Voz de Medellín' and Emisora Nueva Granada (Bogotá).
Carlos Ardila Lülle is its main shareholder since 1973.
Networks and radioformulas
RCN La Radio (formerly Cadena Básica RCN): the main network, broadcasting news, variety, and sports.
La FM: mix of news and music in FM. Founded in 1996.
Antena 2: sports. Founded in the early 1980s
La Mega: youth programming, Top 40. Founded in the early 1990s
Amor Estéreo (formerly La cadena del amor''): balada in Spanish
Radio Uno: at first, an AM station specialized in vallenato. In 2005, it moved to FM with a mix of tropical music, with rancheras, and baladas in Spanish.
Rumba Estéreo: tropical music (salsa, merengue, vallenato), in the 2000s switched to reggaeton.
Bolero Estéreo: specialized in boleros, online-only since the 2000s.
RCN La Radio frequencies
It also operates affiliate stations in Tame (Tame FM Stereo), Ocana, Mariquita (Ondas del Gualí), Puerto Lopez (Marandúa Stereo).
Partner radio stations
Radio Mitre Argentina
Radio Programas del Perú Peru
Radio Panamericana Bolivia
Univisión Radio United States
Cadena Radial Ecuatoriana Ecuador
Radio Cope Spain
Radio Caracas Radio Venezuela
International partner agencies
Associated Press
EFE
References
External links
Official site
Radio stations established in 1949
1949 establishments in Colombia
Radio stations in Colombia |
https://en.wikipedia.org/wiki/Plugola | Plugola is the illicit business practice of endorsing a product or service on radio or television for personal gain, without the consent of the network or stations. "Pluggers" have been known to accept bribes of money, alcohol, or free products and services. This contrasts greatly from commercial sponsorship because the benefits of the endorsement go to the individual talent or programmers, while the stations and networks receive no revenue.
History
In the 1950s, concern over illicit business practices in television and radio including; plugola, payola, and rigged game shows led to congressional and U.S. Federal Communications Commission (FCC) hearings. In 1959, Attorney General William Rogers reported to President Dwight Eisenhower that deceptive and false advertising and programming was becoming a trend in the United States, and needed to stop. In that same year, FCC Chairman John Doerfer presented his plan to expand public service programming on television networks. The plan called for some public service programming in prime time slots, which did not occur before this. The networks likely had the same agenda as Doerfer, to regain the respect of the viewers, and agreed to Doerfer's plan. By 1960, amendments were made to the Communications Act of 1934 to punish those who engaged in these illicit acts in the future.
See also
Radio promotion
Payola
References
Broadcasting
Advertising |
https://en.wikipedia.org/wiki/Ed%20Cummings | Ed Cummings may refer to:
Bernie S, computer hacker
Ed Cummings (American football) (born 1941), American football linebacker |
https://en.wikipedia.org/wiki/Toxin-antitoxin%20database | TADB is a database of Type 2 toxin-antitoxin loci in bacterial and archaeal genomes.
See also
Toxin-antitoxin system
References
External links
TADB
Biological databases
Plasmids
Non-coding RNA
Toxins
RNA-binding proteins |
https://en.wikipedia.org/wiki/Suran%20Goonatilake | Suran Goonatilake, OBE is an academic, entrepreneur and producer. He is a visiting professor at the Department of Computer Science at University College London (UCL).
Background
He did his undergraduate degree at the University of Sussex in Computing and Artificial Intelligence, followed by a PhD at University College London (UCL) in Machine Learning.
As a student at UCL, Goonatilake, co-founded with three fellow students, a Machine Learning company called Searchspace. In May 2005 Searchspace was acquired by Warburg Pincus.
He is the co-founder of several Deep Tech companies, many of which are the result of commercialising research from British Universities
Entrepreneurship
In 2005, he was made an officer of the Order of the British Empire (OBE) in the Queen's birthday honours list, for his services to Entrepreneurship.
Fashion
He founded the Centre for Fashion Enterprise in London a non-profit initiative that finances and nurtures high-growth fashion designers in London. This initiative pioneered a new model of building luxury fashion companies and drew upon practises from technology start-ups, film and music industries. Famous alumni include Erdem Moralıoğlu, Marios Schwab, Mary Katrantzou, Manish Arora, and JW Anderson.
Film and TV
In 2006, Goonatilake was an executive producer on the romantic comedy, Scenes of a Sexual Nature, directed by Ed Blum and starring Ewan McGregor and Tom Hardy. The film was distributed independently via The Really Honest Little Distribution Company and premiered as the closing film to the 2006 London Raindance Film Festival.
In 2007 he was the executive producer for Luxury Unveiled, a documentary TV series on the world's top fashion and luxury brands including Chanel, Tiffany, Dunhill and Cartier.
Publications
Goonatilake is a co-editor of two books,
Intelligent Systems for Finance and Business John Wiley & Sons 1995
co-edited with Philip Treleaven Intelligent Hybrid Systems John Wiley & Sons 1995
References
Sri Lankan chief executives
Alumni of the University of Sussex
Alumni of Royal College, Colombo
Living people
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/Full-parasites | Full-Parasites is a transcriptome database of apicomplexa parasites.
See also
apicomplexa
References
External links
http://fullmal.hgc.jp/
Biological databases
Apicomplexa
Gene expression |
https://en.wikipedia.org/wiki/Aaron%20Dollar | Aaron Dollar is a professor of Mechanical Engineering & Materials Science and Computer Science at Yale University, where he serves as the lead investigator of the GRAB Lab. His research focuses on analysis, design, and control of compliant mechanisms. In 2010, he was recognized as an innovator by being included in the MIT Technology Review's TR35 list.
Education
Ph.D., Harvard University Engineering Science
M.S., Harvard University
B.S., University of Massachusetts at Amherst, Mechanical Engineering
References
External links
TR35 profile
Aaron Dollar lab page at Yale
Living people
Yale University faculty
University of Massachusetts Amherst College of Engineering alumni
Harvard John A. Paulson School of Engineering and Applied Sciences alumni
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/Coleshill%20Auxiliary%20Research%20Team | Coleshill Auxiliary Research Team (CART) is a network of British historians.
It is named after Coleshill in Oxfordshire where Winston Churchill had arranged for groups of soldiers, called Auxiliary Units, to develop and be trained in guerrilla war tactics for use in the event of a Nazi invasion of England during World War II. CART is the largest group in the UK researching this force and have put together a national database listing the 3,500 men.
Conservative MP Justin Tomlinson has said of CART, "I fully support CART’s mission to honour their bravery. Their vital work should remain secret no longer."
References
External links
British Resistance Archive
British historians |
https://en.wikipedia.org/wiki/Geometric%20networks | A geometric network is an object commonly used in geographic information systems to model a series of interconnected features. A geometric network is similar to a graph in mathematics and computer science, and can be described and analyzed using theories and concepts similar to graph theory. Geometric networks are often used to model road networks and public utility networks (such as electric, gas, and water utilities). Geometric networks are called in recent years very often spatial networks.
Composition of a Geometric Network
A geometric network is composed of edges that are connected. Connectivity rules for the network specify which edges are connected and at what points they are connected, commonly referred to as junction or intersection points. These edges can have weights or flow direction assigned to them, which dictate certain properties of these edges that affect analysis results
. In the case of certain types of networks, source points (points where flow originates) and sink points (points where flow terminates) may also exist. In the case of utility networks, a source point may correlate with an electric substation or a water pumping station, and a sink point may correlate with a service connection at a residential household.
Functions
Networks define the interconnectedness of features. Through analyzing this connectivity, paths from one point to another on the network can be traced and calculated. Through optimization algorithms and utilizing network weights and flow, these paths can also be optimized to show specialized paths, such as the shortest path between two points on the network, as is commonly done in the calculation of driving directions. Networks can also be used to perform spatial analysis to determine points or edges that are encompassed in a certain area or within a certain distance of a specified point. This has applications in hydrology and urban planning, among other fields.
Applications
Routing: for calculating driving directions, paths from one point of interest to another, locating nearby points of interest
Urban Planning: for site suitability studies, and traffic and congestion studies.
Electric Utility Industry: for modeling an electrical grid in GIS, tracing from a generation source
Other Public Utilities: for modeling water distribution flow and natural gas distribution
See also
Graphs
Graph theory
Geographic Information Systems
References
Geographic information systems |
https://en.wikipedia.org/wiki/Network%20era | In television broadcasting, the network era, also known as the Silver Age of television, refers to the period in American television history from the end of the first Golden Age of Television in the late 1950s to the beginning of the multi-channel transition in the mid-1980s. During this era, the Big Three television networks—ABC, CBS, and NBC—dominated American television. This determination is established by institutional aspects that regularized television for the majority of the country, including color television, made standard by the late 1960s. As the arrival of new technologies emerged, it offered television viewers more choice and control. This eventually ended the network era and forced viewers to move into the multi-channel transition, leading to the post-network era and second Golden Age of Television.
Origins and technological limitations
Early television evolved from the network organization of radio in the early 1940s. Three of the four networks that rose to dominance, NBC, CBS, and ABC, were corporations that were based in the business center of New York City; the fourth was the Mutual Broadcasting System, a cooperative of radio stations that, though its member stations entered television individually, never had a counterpart television network. These three networks were first established by radio and played a significant role in post war American identity. During the Golden Age, when television was itself still a niche audience, experimental programs were more common; as the medium matured, there was no incentive for these corporations to take further financial risk in creating shows that catered to niche audiences. The first (and, for several decades, only) network built exclusively for television was the DuMont Television Network, which ceased regular programming in 1955 and even during its heyday was a distant fourth in viewership. (DuMont has a corporate descendant in the modern Fox network, the formation of which was a key moment in the end of the network era.)
Conventions that defined the network era such as the television set, antenna and 30-second advertisements were not established immediately. Film studios and independent television producers had only three possible places to sell their media, so they were forced to comply with the practices established by the networks. Early television, like early radio, had only one advertiser that usually sponsored a single program. Particularly after the quiz show scandals of the late 1950s had exposed the danger of such a business model, the networks eliminated that format and changed to multiple corporations purchasing commercials. In the 1950s the network era advertising style turned into a single sponsorship style (Situation in which a single corporation finances the costs that could have been earned if advertising were sold to sponsors. It also allows more cinematic television) with the corporations being more about selling a product rather than an image. With this change, t |
https://en.wikipedia.org/wiki/Personal%20Internet%20Security%202011 | Personal Internet Security 2011 is a scareware rogue anti-virus. It is a fake computer protection program that induces users to think that they have a number of viruses, when Personal Internet Security is in fact the virus itself. The program encourages users to pay a certain amount as a subscription to clean their computers and to "protect" their computers. The users will also notice that a different number of viruses are listed every time the virus pops up.
See also
MS Antivirus (malware)
References
Scareware |
https://en.wikipedia.org/wiki/Lift%20Off%20with%20Ayshea | Lift Off with Ayshea is a British TV show, produced by Granada Television for the ITV network, and starring Ayshea Brough, which ran for 122 editions spanning eight series, between November 1969 and December 1974.
Preceded by the show Discotheque which had been hosted by Dianne Greaves, the replacement was originally entitled Lift Off and was aired in the children's programming schedule, but was seen by many as ITV's junior answer to the BBC's Top of the Pops. Ayshea (formally Ayshea Brough) had appeared on the earlier Discotheque in March 1969 and was one of the first women of Asian heritage to present a British television series, initially co-hosting the show with Graham Bonney and later singer Wally Whyton. The series was produced by Muriel Young, who also produced Clapperboard, Shang-A-Lang and Get It Together for ITV Granada.
The premise of the show was to showcase music requested by viewers writing in to the series. The requests were interspersed with performances of either new releases or current hits. Generally, only two or three guest acts would appear each week; the majority of the songs were performed by Ayshea herself or would be played into the studio and a dance troupe would choreograph the track. The main dance ensemble were known as The Feet; identical twin sisters Teresa and Lesley Scoble, who were concurrently appearing in the ITV children's drama Timeslip throughout the 1970 run. For one series, a resident band known as The Pattern sang selected tracks each week. Series 5 featured Guy Lutman, Lynn Garner and Chris Marlow as the resident singers. Later series featured the puppets Ollie Beak and Fred Barker as co-hosts.
During the series' run, Ayshea contributed a column to the children's magazines Look-in and Disco 45. She also teamed up with Roy Wood to record his composition Farewell, which was released as a single and used as the show's theme tune. Wood's band Wizzard often appeared on the series and Brough appeared on Top of the Pops, backing Wizzard on several occasions. When performing with Wizzard, Wood often sported a white star with the initial 'A' in the centre of his forehead, while Brough wore the same make-up featuring an 'R'. This led to some media speculation that the two were involved in an unconfirmed relationship, with many reports claiming they were engaged. Although the track failed to chart, Ayshea performed the song on Top of the Pops on BBC1.
Of the 122 episodes made, only three are confirmed as having survived in the ITV archives. All other episodes were accidentally destroyed when they were sent to be digitized. In January 2019, it was announced that a fan's home recording of David Bowie's 1972 Lift Off appearance had been discovered. That episode marked the first-ever appearance of Bowie's "Ziggy Stardust" persona, and was broadcast one month before his memorable Top of the Pops performance as Ziggy.
Lift Off was replaced by a similar format series Shang-A-Lang, hosted by The Bay City Rollers, whic |
https://en.wikipedia.org/wiki/List%20of%20research%20groups%20at%20the%20University%20of%20Massachusetts%20Amherst | The following is a list of research labs and centers located at the University of Massachusetts Amherst:
Antennas and Propagation Laboratory (Electrical and Computer Engineering)
Apiary Laboratory (Entomology, Microbiology)
Architecture and Real Time Laboratory (Electrical and Computer Systems Engineering)
Autonomous Learning Laboratory (Computer Science)
Center for Advanced Sensor and Communication Antennas (CASCA) (Electrical and Computer Engineering)
Center for Applied Mathematics and Mathematical Computation (Mathematics)
Center for Economic Development
Center for Education Policy
Center for Energy Efficiency and Renewable Energy (Mechanical and Industrial Engineering)
Center for Geometry, Analysis, Numerics, and Graphics (Mathematics)
Center for Intelligent Information Retrieval (Computer Science)
Center for Public Policy and Administration
Center for e-design
Complex Systems Modeling and Control Laboratory (Electrical and Computer Systems Engineering)
Emerging Electronics Laboratory (Electrical and Computer Systems Engineering)
Engineering Research Center for Collaborative Adaptive Sensing of the Atmosphere (Electrical and Computer Systems Engineering)
Feedback Control Systems Lab (Electrical and Computer Systems Engineering)
Information Systems Laboratory (Electrical and Computer Systems Engineering)
Knowledge Discovery Laboratory (Computer Science)
Labor Relations and Research Center
Laboratory For Perceptual Robotics (Computer Science)
Laboratory for Millimeter Wavelength Devices and Applications (Electrical and Computer Systems Engineering)
Massachusetts Center for Renewable Energy Science and Technology
Microwave Remote Sensing Laboratory (MIRSL)(Electrical and Computer Systems Engineering)
Multimedia Networks Laboratory (Electrical and Computer Systems Engineering)
Multimedia Networks and Internet Laboratory (Electrical and Computer Systems Engineering)
Nanoscale Computing Fabrics Lab (Electrical and Computer Systems Engineering)
National Center for Digital Governance
Network Systems Laboratory (Electrical and Computer Systems Engineering)
Political Economy Research Institute
Reconfigurable Computing Laboratory (Electrical and Computer Systems Engineering)
Scientific Reasoning Research Institute
Soil Mechanics Laboratories (located at Marston Hall and ELAB-II)
Terahertz Laboratory (Electrical and Computer Systems Engineering)
The Environmental Institute
VLSI CAD Laboratory (Electrical and Computer Systems Engineering)
VLSI Circuits and Systems Laboratory (Electrical and Computer Systems Engineering)
Virtual Center for Supernetworks
Wind Energy Center (formerly the Renewable Energy Research Laboratory) (Mechanical and Industrial Engineering)
Wireless Systems Laboratory (Electrical and Computer Systems Engineering)
Yield and Reliability of VLSI Circuits (Electrical and Computer Systems Engineering)
University of Massachusetts Amherst
Massachusetts Amherst g |
https://en.wikipedia.org/wiki/Dating%20in%20the%20Dark%20%28American%20TV%20series%29 | Dating in the Dark premièred on the ABC television network on 20 July 2009. The show's format is based on a Dutch dating show called (meaning "Dating in the Dark").
Format
Dating
Three men and three women are sequestered in separate wings of the house, unable to have any conversation or contact with the opposite sex unless in the dark room. Initially, all six contestants have a group date in which they all sit at a table in the dark room exchanging names and getting to know one another's voices and personality types. After this date, each contestant can invite another contestant for a one-on-one date; these dates are also held in the dark room.
Throughout the show, the host, Rossi Morreale, provides the men and women with additional insights by providing personality profiles showing which contestants are their best matches and also allowing them to view items the others have brought to the house, such as items of clothing or luggage. Other episodes include sketch artists drawing contestants' impressions of each other.
After the one-on-one dates, each contestant can choose to invite another that they wish to see. The contestants enter the dark room for the final time and are revealed to each other one at a time. During the reveal process the couple must remain silent.
The Reveal Process
While being shown in the light, a contestant cannot see the other contestant's reaction. Each contestant is standing at opposite ends of the dark room with a very large two-way mirror between them. A color camera films from the dark side of the mirror while the other is illuminated on the other side. A separate infrared camera films the person on the dark side's reaction; the two images are combined in post-production. This is done, in part, by using video editing software to fade the infrared image of the person being revealed to black before they are illuminated, then seamlessly showing the color image of the person being revealed as it is faded in and out. During the reveal process the couple must remain silent.
The Balcony
The show culminates with each contestant choosing whether to meet another on the balcony of the house. The contestant will go to the balcony and wait for his or her prospective partner to join him or her. Joining the other on the balcony signifies that the contestants both want to pursue a relationship; exiting the house through the front door signifies that they do not want to pursue a relationship. Cameras are set up to show both the meeting balcony and the front door.
Episodes
Season 1 (2009)
Episode 1 (20 July 2009)
Episode 2 (27 July 2009)
Episode 3 (3 August 2009)
Chris was chosen by all three girls for the final date and the reveal.
Chris was chosen by all three girls to meet on the balcony, however, none of them did meet him.
The other guys are Philip(27) and Billy Ray(33).
Episode 4 (10 August 2009)
Episode 5 (17 August 2009)
Episode 6 (24 August 2009)
Season 2 (2010)
Episode 1 (9 August 2010)
Joey (31) didn't get |
https://en.wikipedia.org/wiki/Get%20It%20Together%20%28British%20TV%20series%29 | Get It Together is a British children's television series, produced by Granada Television for the UK ITV network between 6 April 1977 and 22 December 1981. The series followed an almost identical format to the earlier Lift Off with Ayshea, also created by series producer Muriel Young.
The series was presented by former 'straight man' to Basil Brush, Roy North, initially with Linda Fletcher and then later with Megg Nicol who had made her debut presenting with David Jensen in Yorkshire TV's Pop Quest. Whereas Lift Off had been originally designed to showcase viewer's pop music requests by guest artists, Get It Together relied more on the presenters and resident band and singers. Mike Moran was the show's musical director, leading the studio band on camera, with singers including Victy Silva and Kim Goody.
According to the BFI database, the first show was televised on 6 April 1977 and the last on 22 December 1981. It is possible that the first transmission was in fact earlier. One of the first guests on the series were that year's British representatives in the Eurovision Song Contest Lynsey de Paul & Mike Moran, but that episode is not listed in the BFI credits.
According to BFI, Series 1 ran from 6 April – 6 July 1977, consisting of 13 episodes. The show then returned later that year for a Christmas special on 27 December, entitled Get It Together with The Bay City Rollers.
Series 2 ran from 10 January – 21 March 1978, featuring 12 shows.
Series 3 ran from 19 September – 19 December 1978, followed by a Christmas Special on 26 December, for a total of 15 shows.
Series 4 ran from 10 April – 15 May 1979, for just 6 episodes.
Series 5 ran from 27 November 1979 – 6 March 1980, including the Get It Together Christmas Bonanza on 26 December 1979, for a run of 13 shows.
Series 6 ran from 23 September – 23 December 1980, featuring 14 shows, with Megg Nicol replacing Linda Fletcher as co-presenter to North.
The final series 7, ran from 1 September – 22 December 1981, featuring 17 shows.
Guests that featured throughout the series run included: the Bay City Rollers, Squeeze, U2, Sally Oldfield, Chas & Dave, Showaddywaddy, Berni Flint, The Glitter Band, Billy Ocean, Shakin' Stevens, T.Rex, Sad Café, Mink DeVille, Steve Gibbons Band, Eddie and the Hot Rods, Strawbs, The Real Thing, Lynsey de Paul & Rocky Sharpe and the Replays, Slade and The Vapors.
References
External links
1977 British television series debuts
1981 British television series endings
1977 in British music
1970s British children's television series
1970s British music television series
1980s British children's television series
1980s British music television series
British children's musical television series
British music chart television shows
British television shows featuring puppetry
English-language television shows
ITV children's television shows
Pop music television series
Television series by ITV Studios
Television shows produced by Granada Television |
https://en.wikipedia.org/wiki/Pennsylvania%20State%20Hospitals | The Pennsylvania State Hospital System is a network of psychiatric hospitals operated by the Commonwealth of Pennsylvania. At its peak in the late 1940s the system operated more than twenty hospitals and served over 43,000 patients. fewer than nine sites remain in use, and many of those serve far fewer patients than they once did. Many facilities or portions of facilities no longer in use for psychiatric treatment have been repurposed to other uses, while some have been demolished.
The first facility in the Pennsylvania State Hospital system, Harrisburg State Hospital, opened in 1845 and from its inception was tasked with providing care for mentally ill persons throughout the Commonwealth of Pennsylvania. Many facilities within the system were state-operated from the start, while some initially operated as county poor farms, county hospitals, or other institutions.
As the number of institutionalized mentally ill dwindled many state hospitals have been, in whole or in part, converted to other uses. Many have remained state-operated facilities, such as office building repurposed as correctional centers. A few former state hospitals have been demolished.
NOT ON CHART*
Western Center was also a state facility for the mentally disabled and was located in Canonsburg, Washington County, Pennsylvania. It consisted of multiple buildings. It closed in the late 1980s or early 1990s. Southpoint (a commercial development) now sets on the site that was once Western Center.
Plans
Most state hospitals consisted of a number of individual buildings spread across an often rural "campus." Most can be characterized as falling into one of several "plans" or designs.
Kirkbride plan
Kirkbride Plan refers to a system of mental asylum design advocated by Philadelphia psychiatrist Thomas Story Kirkbride in the mid-19th century. Kirkbride developed his requirements based on a philosophy of Moral Treatment. The typical floor plan, with long rambling wings arranged "en echelon" (staggered, so each connected building still received sunlight and fresh air), was meant to promote privacy and comfort for patients. The building form itself was meant to have a curative effect. These asylums tended to become large, imposing, Victorian-era institutional buildings within extensive surrounding grounds which often included farmland. By 1900 the notion of "building-as-cure" was largely discredited, and in the following decades these facilities became too expensive to maintain.
Cottage plan
By the middle of the nineteenth century, some doctors complained that large monolithic asylums had not lived up to their expectations. But psychiatrists did not immediately abandon their belief in the therapeutic environment; instead, they argued for a different therapeutic environment. Clinging to a belief that architecture influenced human conduct, they proposed smaller cottage-like structures to replace the Kirkbride-plan hospitals. These cottages were to be arranged in a village, an |
https://en.wikipedia.org/wiki/ParameciumDB | ParameciumDB is a database for the genome and biology of the ciliate Paramecium tetraurelia.
See also
Paramecium
References
External links
Homepage
Biological databases
Oligohymenophorea |
https://en.wikipedia.org/wiki/APT | APT is an initialism. It may refer to:
Computing and software
APT (programming language) (Automatically Programmed Tool), a high-level computer programming language
APT (software), Debian's high-level package management system, also used by other Linux-based operating systems
Almost Plain Text, or Doxia, a wiki-like syntax used mainly by Apache Maven
Annotation processing tool, a utility for executing annotation processors in the Java programming language
Advanced persistent threat, a set of stealthy and continuous computer hacking processes
Applied Predictive Technologies, a statistical business analysis software company
Advanced Programming Techniques Ltd., creators of the Command CICS software product
Entertainment and media companies
Alabama Public Television, a network of PBS member stations in Alabama, U.S.A.
American Players Theatre, a classical theater located in Spring Green, Wisconsin
American Public Television, a television program provider in the United States
APT Entertainment, a film production company in the Philippines
Finance
Automated Payment Transaction tax, a proposal to replace all taxes with a single tax on each and every transaction in the economy
Artist Pension Trust, an investment program designed for artists
Arbitrage pricing theory, a general theory of asset pricing
Science and medicine
Ammonium paratungstate, a tungsten-based chemical compound
Atom-probe tomography, an atomic-resolution microscopy technique
Attached proton test, a technique used in carbon-13 nuclear magnetic resonance spectroscopy
Automatic picture transmission, a weather satellite system
Anterior pelvic tilt
Acyl-protein thioesterase, an enzyme family that cleaves cysteine thioesters
Transportation
Advanced Passenger Train, a tilting passenger train designed and built during the late 1970s by British Rail
Association for Public Transportation, a Boston-based nonprofit organization
Australian Pacific Touring, an Australian tour operator
Other
American Perimeter Trail, a proposed trail system in the continental United States
Animation photo transfer process (APT process), a process used in animation
Applied Probability Trust, a UK-based non-profit-making foundation for study and research in the mathematical sciences
APT assault rifle
ASEAN Plus Three, the Association of Southeast Asian Nations plus China, South Korea, and Japan
Asia-Pacific Telecommunity, an intergovernmental organisation concerning communications technology
The Asia Pacific Triennial, a major art exhibition at the Gallery of Modern Art, Brisbane, Australia
Asian Poker Tour, a major poker tour focusing on the Asia-Pacific region
Association for Preservation Technology International
Association for Psychological Therapies, a provider of accreditation and training for mental health professionals
See also
Apartment, sometimes abbreviated APT
Apt (disambiguation) |
https://en.wikipedia.org/wiki/Anthony%20Finkelstein | Sir Anthony Charles Wiener Finkelstein (born 28 July 1959) is a British engineer and computer scientist. He is the President of City, University of London. He was Chief Scientific Adviser for National Security to HM Government until 2021.
Education and early life
Anthony Finkelstein was born on 28 July 1959. He was educated at University College School, the University of Bradford (BEng), the London School of Economics (MSc) and the Royal College of Art (PhD, 1985).
Career and research
Finkelstein's scientific work is in the broad area of software development tools and processes. He has also worked on applications of systems modelling in the life sciences.
He was appointed President of City, University of London in June 2021. He is a member of Council of UK Research and Innovation (UKRI) and Chair of the Police Science Council established by the National Police Chiefs' Council (NPCC).
He was Chief Scientific Adviser for National Security to HM Government from 2015 until 2021. This is a senior role, associated with the Government Office for Science (GOScience) and working across the UK's national security community. During his tenure in post Finkelstein retained a chair in Software Systems Engineering at University College London (UCL) and a Fellowship at the Alan Turing Institute of which he was a Founder Trustee.
Prior to his government role, Finkelstein was the Head of UCL Computer Science and then Dean of the UCL Faculty of Engineering Sciences. He served on the editorial boards of ACM Transactions on Software Engineering and Methodology and IEEE Transactions on Software Engineering. He was appointed in 2013 as a Member of Council of the UK Engineering and Physical Sciences Research Council (EPSRC) by the then Minister for Universities and Science, David Willetts. He was appointed as the UK government's Chief Scientific Adviser for National Security in December 2015.
Finkelstein is a visiting professor at Imperial College London, at the University of South Australia and formerly at the National Institute of Informatics, Tokyo, Japan. He was until 2022 a member of the Scientific Advisory Board of the Singapore National Research Foundation and previously served on the Board of the NHS Royal National Orthopaedic Hospital (RNOH).
Honours and awards
Finkelstein is an elected Fellow of the Royal Academy of Engineering (FREng). He is also an elected Member of Academia Europaea and a Fellow of the City and Guilds of London Institute. He is a Distinguished Fellow of the Royal United Services Institute (RUSI). He is a Fellow of the Institution of Engineering and Technology (IET) and the British Computer Society (BCS).
In 2009 he received the Oliver Lodge Medal of the IET for achievement in Information Technology. In 2013 he received the Outstanding Service Award from the International Federation for Information Processing (IFIP).
Finkelstein was appointed Commander of the Order of the British Empire (CBE) in the 2016 Birthday Honours for se |
https://en.wikipedia.org/wiki/Content%20centric%20networking | In contrast to IP-based, host-oriented, Internet architecture, Content-Centric Networking (CCN) emphasizes content by making it directly addressable and routable. Endpoints communicate based on named data instead of IP addresses. CCN is characterized by the basic exchange of content request messages (called "Interests") and content return messages (called "Content Objects"). It is considered an information-centric networking (ICN) architecture.
The goals of CCN are to provide a more secure, flexible, and scalable network, thereby addressing the Internet's modern-day requirements for protected content distribution on a massive scale to a diverse set of end devices. CCN embodies a security model that explicitly secures individual pieces of content rather than securing the connection or "pipe." It provides additional flexibility using data names instead of host names (IP addresses). Additionally, named and secured content resides in distributed caches automatically populated on demand or selectively pre-populated. When requested by name, CCN delivers named content to the user from the nearest cache, traversing fewer network hops, eliminating redundant requests, and consuming fewer resources overall. CCN began as a research project at the Palo Alto Research Center (PARC) in 2007. The first software release (CCNx 0.1) was made available in 2009. CCN is the ancestor of related approaches, including named data networking. CCN technology and its open-source code base were acquired by Cisco in February 2017.
History
The principles behind information-centric networks were first described in the original 17 rules of Ted Nelson's Project Xanadu in 1979. In 2002, Brent Baccala submitted an Internet-Draft differentiating between connection-oriented and data-oriented networking and suggested that the Internet web architecture was rapidly becoming more data-oriented. In 2006, the DONA project at UC Berkeley and ICSI proposed an information-centric network architecture, which improved TRIAD by incorporating security (authenticity) and persistence as first-class primitives in the architecture. On August 30, 2006, PARC Research Fellow Van Jacobson gave a talk titled "A new way to look at Networking" at Google. The CCN project was officially launched at PARC in 2007. In 2009, PARC announced the CCNx project (Content-Centric Network), publishing the interoperability specifications and an open-source implementation on the Project CCNx website on September 21, 2009. The original CCN design was described in a paper published at the International Conference on Emerging Networking EXperiments and Technologies (CoNEXT) in December 2009.
Annual CCNx Community meetings were held in 2011, 2012, 2013 and 2015.
The protocol specification for CCNx 1.0 has been made available for comment and discussion. Work on CCNx happens openly in the ICNRG IRTF research group.
Specification
The CCNx specification was published in some IETF drafts. The specifications included:
draf |
https://en.wikipedia.org/wiki/WinSystems | WinSystems is an employee owned embedded systems manufacturer specializing in ruggedized, highly reliable industrial computer systems. The company was founded by Jerry Winfield in 1982 and is headquartered in Grand Prairie, Texas.
History
Founded in 1982 (as WinTech), WinSystems manufactures and distributes embedded computers for use in industrial applications. Products include embedded x86-compatible single-board computers, COM Modules, COM carrier boards, touch panel PCs, analog boards, digital input/output (I/O) boards, industrial CompactFlash and many other items that are useful in industrial embedded systems. On September 19, 2007 - Jerry Winfield, President of WINSYSTEMS, announced that the company instituted an Employee Stock Ownership Plan (ESOP) and joined a growing list of companies whose employees are stockholders.( Employee ownership ) This corporate structure offers stability and longevity for the WINSYSTEMS Corporation insuring long-term availability of products for its customers. This is very important for industrial OEMs using embedded PC technology to support their ongoing and future applications.
Products
The majority of WinSystems manufacturing is done in Grand Prairie Texas.
PC/104
The PC/104 standard defines a compact / modular form-factor bus for embedding ISA Bus system functions within embedded microcomputer applications. The modules' small size (3.6" x 3.8") and low power requirements make them ideally suited to embedded control applications.
PC/104-Plus
The PC/104-Plus defines additional PCI functionality that is usually paired with a PC/104 connector to give an embedded system complete ISA and PCI expansion. Like PC/104 modules', PC/104-PLUS modules are small (3.6" x 3.8") and have low power requirements.
STD Bus
STD Bus is IEEE-961 standard. The STD Bus has a number of advantages over other bus architectures used in industrial applications such as PC/104 and Multibus. Its simple interface, smaller card size (4.5" x 6.5"); solid, nearly square peripheral cards, and strong card mounts, tolerate shock and vibrations making the STD Bus ideal for rugged industrial environments.
COM Modules
COM technology has been around in various forms for decades and consists of a mezzanine approach with CPU, memory and basic I/O interfaces on a module that mounts to a single carrier board or a stack of boards to complete the I/O and system requirements. The approach allows the most complicated part of the design to be separated from the unique I/O requirements of different carrier board solutions. PC/104 is often considered one of the original COM module approaches. Not only does PC/104 provide an ecosystem of CPU and I/O vendors, many OEMs used the standardized bus and mounting to design unique carrier cards using off-the-shelf CPU modules available from multiple vendors. WINSYSTEMS currently offers industrial COM Express Type 10 Mini modules and supporting carrier cards, both of which are designed and manufactured in its Gr |
https://en.wikipedia.org/wiki/Gendai | may refer to:
Gendai, a modern aesthetic movement in haiku
Gendai budō, Japanese martial arts established after the 1860s
GameSalad (company), formerly Gendai Games, an American computer software company
Shūkan Gendai, a Japanese magazine
See also
Museum of Contemporary Art, Tokyo |
https://en.wikipedia.org/wiki/Fusarium%20graminearum%20genome%20database | Fusarium graminearum Genome Database (FGDB) is genomic database on Fusarium graminearum, a plant pathogen which causes the wheat headblight disease.
See also
Gibberella zeae
References
External links
http://mips.gsf.de/genre/proj/fusarium/ .
Gibberella
Fungal plant pathogens and diseases
Biological databases |
https://en.wikipedia.org/wiki/Instagram | Instagram is an American photo and video sharing social networking service owned by Meta Platforms. It allows users to upload media that can be edited with filters, be organized by hashtags, and be associated with a location via geographical tagging. Posts can be shared publicly or with preapproved followers. Users can browse other users' content by tags and locations, view trending content, like photos, and follow other users to add their content to a personal feed.
Instagram was originally distinguished by allowing content to be framed only in a square (1:1) aspect ratio of 640 pixels to match the display width of the iPhone at the time. In 2015, this restriction was eased with an increase to 1080 pixels. It also added messaging features, the ability to include multiple images or videos in a single post, and a Stories feature—similar to its main competitor Snapchat—which allowed users to post their content to a sequential feed, with each post accessible to others for 24 hours. As of January 2019, Stories is used by 500 million people daily.
Originally launched for iOS in October 2010 by Kevin Systrom and Mike Krieger, Instagram rapidly gained popularity, with one million registered users in two months, 10 million in a year, and 1 billion by June 2018. In April 2012, Facebook Inc. acquired the service for approximately US$1 billion in cash and stock. The Android version was released in April 2012, followed by a feature-limited desktop interface in November 2012, a Fire OS app in June 2014, and an app for Windows 10 in October 2016. , over 40 billion photos had been uploaded. Although often admired for its success and influence, Instagram has also been criticized for negatively affecting teens' mental health, its policy and interface changes, its alleged censorship, and illegal and inappropriate content uploaded by users.
History
Instagram began development in San Francisco as Burbn, a mobile check-in app created by Kevin Systrom and Mike Krieger. On March 5, 2010, Systrom closed a $500,000 () seed funding round with Baseline Ventures and Andreessen Horowitz while working on Burbn. Realizing that it was too similar to Foursquare, they refocused their app on photo-sharing, which had become a popular feature among its users. They renamed it Instagram, a portmanteau of instant camera and telegram.
2010–2011: Beginnings and major funding
Josh Riedel joined the company in October as Community Manager, Shayne Sweeney joined in November as an engineer, and Jessica Zollman joined as a Community Evangelist in August 2011.
The first Instagram post was a photo of South Beach Harbor at Pier 38, posted by Mike Krieger at 5:26p.m. on July16, 2010. Systrom shared his first post, a picture of a dog and his girlfriend's foot, a few hours later at 9:24p.m. It has been wrongly attributed as the first Instagram photo due to the earlier letter of the alphabet in its URL. On October6, 2010, the Instagram iOS app was officially released through the App Store. I |
https://en.wikipedia.org/wiki/Network%20convergence | Network convergence refers to the provision of telephone, video and data communication services within a single network. In other words, one company provides services for all forms of communication. Network convergence is primarily driven by development of technology and demand. Users are able to access a wider range of services, choose among more service providers. On the other hand, convergence allows service providers to adopt new business models, offer innovative services, and enter new markets.
Introduction
One dictionary definition of "convergence" provides a starting point for the analysis: "the act of converging and esp. moving toward union or uniformity." The new regulatory framework that was shaped by the 1996 act eliminated the entry barrier for companies to expand their business into new markets. Local exchange carriers are allowed to start a business in the long-distance market and even video and broadband market. On the other hand, because cable TV and video services are regulated as "information services", cable companies are allowed entering the telecommunication market without applying for a license and exempted from heavy regulation. Two-way communication has been limited to voice and text by the limited availability of bandwidth; broadcast media have been restricted by their one-way character and by the availability of spectrum. Nowadays technology development, fierce competition, and deregulation have transformed several distinct communications service markets into a converged market. In the telecommunications world, convergence has come to mean a moving towards the use of one medium as opposed to manipulation of all forms of information including voice, data, and video across all types of network instead of carrying information separately within distinct networks. In the convergent network, different forms of information can be re-engineered to provide better, more flexible service to the user. For example, telephone networks can transmit data and video and cable networks are able to provide voice services. The reason media convergence occurs is due to both corporation and consumer developments. AT&T and Verizon are among the many service providers that are required to separate their IP and Transport networks into two different ones. They are made up and managed by different parts of each company, which causes an increase in its overall management and overuse of resources.
Types
Convergence is about services and about new ways of doing business and interacting with society. The basic type of network convergence is the combination and connection across platforms and networks, which allows several types of networks to connect within certain common standards and protocols. The second type is the convergence of telecommunication service, which allows firms to use a single network to provide several communication services that traditionally required separate networks, which often is called the triple play or quadruple play i |
https://en.wikipedia.org/wiki/Coccinelle%20%28software%29 | Coccinelle (French for ladybug) is an open-source utility for matching and transforming the source code of programs written in the C programming language.
Utility
Coccinelle was initially used to aid the evolution of the Linux kernel, providing support for changes to library application programming interfaces (APIs) such as renaming a function, adding a function argument whose value is somehow context-dependent, and reorganizing a data structure.
It can also be used to find defective programming patterns in code (i.e., pieces of code that are erroneous with high probability such as possible NULL pointer dereference) without transforming them. Then coccinelles role is close to that of static analysis tools. Examples of such use are provided by the applications of the herodotos tool, which keeps track of warnings generated by coccinelle.
Support for Coccinelle is provided by IRILL. Funding for the development has been provided by the Agence Nationale de la Recherche (France), the Danish Research Council for Technology and Production Sciences, and INRIA.
The source code of Coccinelle is licensed under the terms of version 2 of the GNU General Public License (GPL).
Semantic Patch Language
The source code to be matched or replaced is specified using a "semantic patch" syntax based on the patch syntax. The Semantic Patch Language (SmPL') pattern resembles a unified diff with C-like declarations.
Example
@@
expression lock, flags;
expression urb;
@@
spin_lock_irqsave(lock, flags);
<...
- usb_submit_urb(urb)
+ usb_submit_urb(urb, GFP_ATOMIC)
...>
spin_unlock_irqrestore(lock, flags);
@@
expression urb;
@@
- usb_submit_urb(urb)
+ usb_submit_urb(urb, GFP_KERNEL)
References
External links
Official latest stable download
Articles describing the use of Coccinelle
Coccinellery: Semantic Patch Gallery
Code refactoring
Static program analysis tools
Software using the GPL license |
https://en.wikipedia.org/wiki/Wheatley%20%28Portal%29 | Wheatley is a fictional artificial intelligence from the Portal franchise, first introduced in the 2011 video game Portal 2. He is voiced by British comedian and writer Stephen Merchant, and created in part by Portal 2s designer Erik Wolpaw.
In the Portal narrative, Wheatley is one of several spherical "personality cores" developed to restrain GLaDOS, the main artificial intelligence that operates the Aperture Science facility, from becoming rampant, though Wheatley is later revealed to have been built to act as an "intelligence dampener" towards GLaDOS to hampering her capability for thought. Initially serving as a comedic foil to the player-character Chell during the first half of Portal 2, Wheatley becomes the main antagonist of the second half as he takes GLaDOS's place and wreaks havoc on the facility before Chell and GLaDOS cooperate to stop him. In addition to Portal 2, Wheatley has appeared in Team Fortress 2 and Lego Dimensions.
Since his appearance in Portal 2, Wheatley has received overwhelmingly positive reception from critics. Merchant has been praised for his portrayal by critics who cited his fast-talking dialogue. Wheatley has also been described as a contrast to GLaDOS's "slower-speaking and more deliberate" personality.
Concept and creation
Wheatley was first revealed in an alternate reality game released by Valve, the developer of the Portal series, in a screenshot of Portal 2 before its release, showing the player-character Chell holding him. Wheatley came from combining several ideas from multiple "personality cores" that the player would meet throughout the game. The idea was removed as it supposedly made the game feel too cluttered and the player never got to really learn about the multiple robots, so several were combined into the character of Wheatley. Wheatley was designed with the purpose of making a character who "you’d be seeing a lot". Erik Wolpaw added that Wheatley served as an "offset" of GLaDOS; while her voice is "slower-speaking and more deliberate", Wheatley is a "frantic person", which Erik says is performed well by Merchant due to being able to relay information quickly in his speech.
Merchant was chosen for the role both because the designers were fans of British comedy and because of Merchant's role in the television series Extras and his podcasts. Merchant was sent a package of Portal 2 material along with a request that he provide the voice of Wheatley. Merchant agreed to the role. Wheatley's characterisation was always designed with a British voice in mind. While they were writing Wheatley's dialogue, they had Merchant "in their heads" as a result of watching Extras, though at the time they did not consider pursuing him for the role because they did not think that they would be able to cast him. They were instead considering Richard Ayoade, up until they went to Merchant's agents.
Wheatley was also designed with the intention of writing a video game character who spoke informally which Wolpaw stat |
https://en.wikipedia.org/wiki/Simulation%20Optimization%20Library%3A%20Throughput%20Maximization | The problem of Throughput Maximization is a family of iterative stochastic optimization algorithms that attempt to find the maximum expected throughput in an n-stage Flow line. According to Pichitlamken et al. (2006), there are two solutions to the discrete service-rate moderate-sized problem. With an expected throughput (defined as the limiting throughput over a long time horizon, as opposed to the approximation induced through the need for a warm-up period and ratio-estimate as described under Measurement of time. Each simulation replication should consist of warming up the system with 2000 released jobs starting from an empty system, then recording the time T required to release the next 50 jobs, and estimating the throughput on this replication as 50=T jobs per unit time. Time is then measured in the number of simulation replications performed.
Problem statement
Consider an n-stage flow line with finite buffer storage in front of Stations 2, 3,..., n, denoted by b2, b3,..., bn, and an infinite number of jobs in front of Station 1. There is a single server at each station, and the service time at Station i is exponentially distributed with service rate ri, i = 1,..., n. If the buffer of Station i is full, then Station i-1 is blocked (production blocking), so that a finished job cannot be released from Station i-1, i = 2,..., n. The total buffer
space and the service rates are limited. The goal is to find a buffer allocation and service rates
such that the throughput (average output of the flow line per unit time) is maximized. One can optionally take the service rates as integers or as continuous variables. In either case the problem is still considered as integer-ordered because the buffer allocations are integers.
The constraints are:
b2+...+bn≤ B
r1+r2+...+rn≤R
Recommended parameter settings
A moderate-sized problem is n = 3;B = 20;R = 20. A larger problem is n = 12;B = 80;R = 80.
Starting solution(s)
Take b2=...=bn as large as possible without violating the constraint.
Allocate any residual buffer spaces to the largest-numbered stations (one per buffer). Similarly, choose uniform service rates. If multiple initial solutions are desired then sample the buffer spacings and service rates as follows.
For continuous service rates, sample uniformly from the simplex {r≥0:r1+r2+...+rn≤R}.This can be done by generating n-1 independent uniform random variables U1,...,Un-1on [0,R], ordering them so that U(1)≤...≤U(n-1), setting U(0)=0 and U(n)=R, and finally setting rk=U(k)-U(k-1), k = 1,...,n. A similar procedure can be used for assigning the buffer spaces, which can be allowed to take the value 0.
Measurement of time
Each simulation replication should consist of warming up the system with 2000 released jobs starting from an empty system, then recording the time T required to release the next 50 jobs, and estimating the throughput on this replication as 50=T jobs per unit time.
Time is then measured in the number of simulation replications |
https://en.wikipedia.org/wiki/VoATM | Voice over Asynchronous Transfer Mode (VoATM) is a data protocol used to transport packetized voice signals over an Asynchronous Transfer Mode (ATM) network. In ATM, the voice traffic is encapsulated using AAL1/AAL2 ATM packets. VoATM over DSL is a similar service, which is used to carry packetized voice signals over a DSL connection.
Protocols
ATM Adaptation Layer 1 (AAL1)
ATM Adaptation Layer 2 (AAL2)
Deployment
VoATM is a multi-service, high speed, scalable technology but rarely found because of its expensive services.
Prioritization
Prioritization is implemented through QoS parameters.
Fragmentation
Fragmentation is built into ATM with its small, fixed-sized, 53-byte cells.
Variable delay
Dynamic Bandwidth Circuit Emulation Service (DBCES) does not send a constant bit stream of cells but transmit only at an active voice call, reducing delays and variations.
Echo cancellation
VoATM transports data, voice, and video at very high speed. The same method for echo cancellation is employed.
See also
Professional wide band audio over ATM. Audio Engineering Society AES47
References
Broadband
Videotelephony
Audio network protocols
Asynchronous Transfer Mode |
https://en.wikipedia.org/wiki/Partition%20refinement | In the design of algorithms, partition refinement is a technique for representing a partition of a set as a data structure that allows the partition to be refined by splitting its sets into a larger number of smaller sets. In that sense it is dual to the union-find data structure, which also maintains a partition into disjoint sets but in which the operations merge pairs of sets. In some applications of partition refinement, such as lexicographic breadth-first search, the data structure maintains as well an ordering on the sets in the partition.
Partition refinement forms a key component of several efficient algorithms on graphs and finite automata, including DFA minimization, the Coffman–Graham algorithm for parallel scheduling, and lexicographic breadth-first search of graphs.
Data structure
A partition refinement algorithm maintains a family of disjoint sets . At the start of the algorithm, this family contains a single set of all the elements in the data structure. At each step of the algorithm, a set is presented to the algorithm, and each set in the family that contains members of is split into two sets, the intersection and the difference .
Such an algorithm may be implemented efficiently by maintaining data structures representing the following information:
The ordered sequence of the sets in the family, in a form such as a doubly linked list that allows new sets to be inserted into the middle of the sequence
Associated with each set , a collection of its elements of , in a form such as a doubly linked list or array data structure that allows for rapid deletion of individual elements from the collection. Alternatively, this component of the data structure may be represented by storing all of the elements of all of the sets in a single array, sorted by the identity of the set they belong to, and by representing the collection of elements in any set by its starting and ending positions in this array.
Associated with each element, the set it belongs to.
To perform a refinement operation, the algorithm loops through the elements of the given set . For each such element , it finds the set that contains , and checks whether a second set for has already been started. If not, it creates the second set and adds to a list of the sets that are split by the operation.
Then, regardless of whether a new set was formed, the algorithm removes from and adds it to . In the representation in which all elements are stored in a single array, moving from one set to another may be performed by swapping with the final element of and then decrementing the end index of and the start index of the new set. Finally, after all elements of have been processed in this way, the algorithm loops through , separating each current set from the second set that has been split from it, and reports both of these sets as being newly formed by the refinement operation.
The time to perform a single refinement operations in this way is , independent of the num |
https://en.wikipedia.org/wiki/Katz%20centrality | In graph theory, the Katz centrality or alpha centrality of a node is a measure of centrality in a network. It was introduced by Leo Katz in 1953 and is used to measure the relative degree of influence of an actor (or node) within a social network. Unlike typical centrality measures which consider only the shortest path (the geodesic) between a pair of actors, Katz centrality measures influence by taking into account the total number of walks between a pair of actors.
It is similar to Google's PageRank and to the eigenvector centrality.
Measurement
Katz centrality computes the relative influence of a node within a network by measuring the number of the immediate neighbors (first degree nodes) and also all other nodes in the network that connect to the node under consideration through these immediate neighbors. Connections made with distant neighbors are, however, penalized by an attenuation factor . Each path or connection between a pair of nodes is assigned a weight determined by and the distance between nodes as .
For example, in the figure on the right, assume that John's centrality is being measured and that . The weight assigned to each link that connects John with his immediate neighbors Jane and Bob will be . Since Jose connects to John indirectly through Bob, the weight assigned to this connection (composed of two links) will be . Similarly, the weight assigned to the connection between Agneta and John through Aziz and Jane will be and the weight assigned to the connection between Agneta and John through Diego, Jose and Bob will be .
Mathematical formulation
Let A be the adjacency matrix of a network under consideration. Elements of A are variables that take a value 1 if a node i is connected to node j and 0 otherwise. The powers of A indicate the presence (or absence) of links between two nodes through intermediaries. For instance, in matrix , if element , it indicates that node 2 and node 12 are connected through some walk of length 3. If denotes Katz centrality of a node i, then, given a value , mathematically:
Note that the above definition uses the fact that the element at location of reflects the total number of degree connections between nodes and . The value of the attenuation factor has to be chosen such that it is smaller than the reciprocal of the absolute value of the largest eigenvalue of A. In this case the following expression can be used to calculate Katz centrality:
Here is the identity matrix, is a vector of size n (n is the number of nodes) consisting of ones. denotes the transposed matrix of A and denotes matrix inversion of the term .
An extension of this framework allows for the walks to be computed in a dynamical setting. By taking a time dependent series of network adjacency snapshots of the transient edges, the dependency for walks to contribute towards a cumulative effect is presented. The arrow of time is preserved so that the contribution of activity is asymmetric in the direction of info |
https://en.wikipedia.org/wiki/Kunming%E2%80%93Singapore%20railway | The Kunming–Singapore railway is a network of railways that connects China, Singapore and all the countries of mainland Southeast Asia. The concept originated with the British and French colonial empires, which sought to link the railways they had built in southwest China, Indochina and Malaya, but international conflicts in the 20th century kept regional railways fragmented. The idea was formally revived in October 2006 when 18 Asian and Eurasian countries signed the Trans-Asian railway Network Agreement, which incorporated the Kunming–Singapore railway into the Trans-Asian railway network.
The network consists of three main routes from Kunming, China to Bangkok, Thailand: the Eastern route via Vietnam and Cambodia; the Central route via Laos, and the Western route via Myanmar. The southern half of the network from Bangkok to Singapore has been operational since 1918. The Central route opened on 3 December 2021, with the opening of the Yuxi–Mohan railway and Boten–Vientiane railway linking with the other operational segments of the route, which formally connected Kunming and Singapore directly by rail. There have been plans for high-speed railway constructions, though only one line (between Bangkok and Nakhon Ratchasima) has since entered the construction phase.
The railway network is expected to increase regional economic integration and increase China's economic ties with Southeast Asia.
History
Colonial railways
The British and French Empires first proposed building a railway from Kunming to Singapore in 1900 as Russia was completing the Trans-Siberian railway. From 1904 to 1910, the French built the Yunnan–Vietnam railway, to connect Kunming with Hanoi and Haiphong in French Tonkin, now northern Vietnam.
In 1918, the southern line of the Thailand railway system was connected with British Malaya's west coast line, completing a metre gauge rail link from Bangkok to Singapore. In the late-1930s, the British began to build the Yunnan–Burma railway but abandoned the effort in 1941 with the outbreak of World War II.
In 1936, Vietnam's main railway, from Hanoi to Saigon was completed. This French-built system was (and still is) metre-gauge.
In 1942, the railways of Thailand and Cambodia were connected linking Bangkok and Phnom Penh, but this trans-border connection has long since fallen into disuse. The Japanese Empire built the infamous Thailand–Burma railway using prisoners of war to connect Bangkok and Yangon, but the entire line never entered commercial operation and is now partially submerged by the reservoir behind the Vajiralongkorn Dam.
A continuous metre-gauge rail line from Kunming to Singapore via Hanoi, Saigon, Phnom Penh, Bangkok, and Kuala Lumpur was not realized as the French never built the "missing link" between Phnom Penh and Saigon, choosing to build a highway instead.
21st century revival
In 2000, ASEAN proposed completing the Kunming to Singapore railway, via Hanoi, Ho Chi Minh City (formerly Saigon), Phnom Pen |
https://en.wikipedia.org/wiki/James%20Cunningham%20%28comedian%29 | James Cunningham (born 1973 or 1974) is a Canadian stand-up comedian and TV host.
He is the host of Food Network Canada's and Cooking Channel US's Eat St., a TV show about North American street food that debuted in 2011. He initially auditioned for another show before being offered the job of hosting Eat St. Other television appearances include "Last Comic Standing" and "Just for Laughs." He has also worked as a TV warm up act.
He wrote and hosts "Funny Money", a stage show designed to teach students about finance. He does over 300 stand-up performances a year, mostly "Funny Money".
Cunningham was born in Toronto, where his father was an accountant. He studied drama and minored in finance at the University of Toronto.
References
External links
https://web.archive.org/web/20110504153023/http://eatst.foodnetwork.ca/
https://web.archive.org/web/20130116121837/http://www.cookingchanneltv.com/eat-street/index.html
1970s births
Living people
21st-century Canadian comedians
Canadian male comedians
Canadian people of Irish descent
Canadian people of Italian descent
Canadian people of Polish descent
Comedians from Toronto
University of Toronto alumni
Year of birth uncertain
Canadian stand-up comedians
Canadian television hosts |
https://en.wikipedia.org/wiki/Phone%20surveillance | Phone surveillance is the act of performing surveillance on phone conversations, location tracking, and data monitoring of a phone. Before the era of mobile phones, these used to refer to the tapping of phone lines via a method called wiretapping. Wiretapping has now been replaced by software that monitors the cell phones of users.
While mobile phone surveillance has been carried out by large organizations for a long time (e,g, to find clues of illegal activities), more and more of such surveillance is now carried out by individuals for personal reasons. For example, a parent may become a "text spy" to monitor a child's texting activity. This brings in the moral, ethical and legal question of who owns people's privacy
Prevalence
According to a 2007 American Management Association report, computer monitoring takes form ranges from keyboard(45%), files(43%), blogosphere(12%) to social networking sites(10%). No newer data is available on the number of phone surveillance carried out currently.
Phone surveillance software
Phone surveillance is now more commonly carried out on cell phones. This has become increasingly easy with the availability of cell phone monitoring software. These types of software are easily purchased over the internet and can be quickly installed on phones. There have been questions as to whether this software is illegal; software makers may show a disclaimer that they do not endorse any illegal activities.
Stopping phone surveillance
The law has yet to set a clear boundary on who can or who cannot do phone surveillance. A 2005 federal court ruling denies the FBI from tracking cellphone locations of people who have not committed any crimes.
U.S. intelligence
An arm of the U.S. military, the United States Defense Intelligence Agency (DIA), has been tracking the location of Americans by searching through databases that it purchases from mobile phone companies. The phone companies routinely collect and store their customers' cellular telephone location data when the customers use certain software applications. Additional government agencies that use such tactics to track people and arrest them include the U.S. Immigration and Customs Enforcement and United States Customs and Border Protection.
See also
Cellphone surveillance
Mass surveillance
Telephone tapping
References
Security
National security
Mass surveillance |
https://en.wikipedia.org/wiki/Stars%20virus | The Stars virus is a computer virus which infects computers running Microsoft Windows. It was named and discovered by Iranian authorities in April 2011. Iran claimed it was used as a tool to commit espionage. Western researchers came to believe it is probably the same thing as the Duqu virus, part of the Stuxnet attack on Iran.
History
The Stars virus was studied in a laboratory in Iran – that means major vendors of antivirus software did not have access to samples and therefore they could not assess any potential relation to Duqu or Stuxnet. Foreign computer experts say they have seen no evidence of the virus, and some even doubt its actual existence. Iran is claiming Stars to be harmful for computer systems. It is said to inflict minor damage in the initial stage and might be mistaken for executable files of governmental organizations.
This is the second attack claimed by Iran after the Stuxnet computer worm discovered in July 2010, which targeted industrial software and equipment.
Researchers came to believe that the Stars virus found by Iranian computer specialists was the Duqu virus. The Duqu virus keylogger was embedded in a JPEG file. Since most of the file was taken by the keylogger only a portion of the image remained. It turned out to be an image taken by the Hubble telescope showing a cluster of stars, the aftermath of two galaxies colliding. Symantec, Kaspersky and CrySyS researchers came to believe Duqu and Stars were the same virus.
See also
Flame (malware)
Cyber electronic warfare
Cyber security standards
Cyber warfare
List of cyber attack threat trends
Proactive Cyber Defence
References
2011 in computing
2011 in Iran
Computer viruses
Cyberwarfare
Industrial computing
Nuclear program of Iran
Rootkits
Cyberwarfare in Iran |
https://en.wikipedia.org/wiki/Carolyn%20Strauss | Carolyn Strauss (born July 13, 1963) is an American television executive and producer. She was the president of the Home Box Office network's entertainment division until 2008 and was responsible for commissioning series like The Sopranos, The Wire, Six Feet Under, Curb Your Enthusiasm and Sex and the City. Upon leaving the position she became a television developer and producer and was given a production deal with HBO. She has collaborated with the network on the series Treme, Game of Thrones and Luck.
Personal life
Being of Jewish descent, in August 2015 she signed - as one of 98 members of the Los Angeles Jewish community - an open letter supporting the proposed nuclear agreement between Iran and six world powers led by the United States "as being in the best interest of the United States and Israel."
Filmography
Treme (2010–2013) – Executive Producer
Game of Thrones – (2011–2019) Executive Producer
Luck (2011–2012) – Executive Producer
The Specials (2014) – Executive Producer
Chernobyl (2019) – Executive Producer
Deadwood: The Movie (2019) – Executive Producer
The Baby (2022) – Executive Producer
The Last of Us (2023) – Executive Producer
Accolades
References
External links
Television producers from New York (state)
American women television producers
American television executives
Women television executives
20th-century American Jews
Living people
People from Scarsdale, New York
Scarsdale High School alumni
1963 births
Harvard College alumni
21st-century American Jews
20th-century American women
21st-century American women
Jewish American television producers
LGBT television producers
LGBT people from New York (state)
20th-century American LGBT people |
https://en.wikipedia.org/wiki/Virginia%20Centurione%20Bracelli%20School | Virginia Centurione Bracelli School (abbrv. VCBS) is a private, Roman Catholic school located in Poctoy, Odiongan, Romblon. It is part of the worldwide network of Figlie di Nostra Signora al Monte Calvario (Daughters of Our Lady on Mount Calvary). The school is a combined preparatory, elementary and high school institution.
Administration
The school is headed by the directress who can sometimes be the person of local superior of the congregation in the area and, thus, only nun can be the directress. The school principal follows the directress in precedence. The principal, however, can be a man or a woman. The school is, partly, run by the congregation of the Daughters of Our Lady on Mount Calvary.
Curriculum change
In 2011, the Department of Education started to implement the new K-12 educational system, which also included a new curriculum for all schools nationwide. The K-12 program has a so-called "phased implementation", which started in S.Y 2011-2012.
Student media
The school periodically runs its own publication called The Bracellian Eye.
Buildings
The school is composed of 4 main buildings on a quadrangle and a guardhouse.
References
External links
Daughters of Our Lady on Mount Calvary, Official Website
Schools in Romblon
Catholic elementary schools in the Philippines
Catholic secondary schools in the Philippines |
https://en.wikipedia.org/wiki/MITRA | MITRA can refer to:
MITRA Youth Buddhist Network, a network of Buddhist youth organisations in Australia
Movement against Intimidation, Threat and Revenge against Activists (MITRA), a network of NGOs and activists based in Mumbai
See also
Mitra (disambiguation) |
https://en.wikipedia.org/wiki/Braunschweiger%20Verkehrs-AG | The Braunschweiger Verkehrs-AG is responsible for public transport in Braunschweig, Germany.
It uses a track gauge of for its Braunschweig tramway network, a gauge that remains in use on only one other tram system worldwide, Rio de Janeiro's Santa Teresa Tramway.
Public transport operators of Germany
Companies based in Braunschweig
Transport in Braunschweig
1100 mm gauge railways in Germany |
https://en.wikipedia.org/wiki/Complexity%20%28journal%29 | Complexity is a peer-reviewed open-access scientific journal covering the field of complex adaptive systems. The journal's scope includes Chaos theory, genetic algorithms, cellular automata, neural networks, evolutionary game theory, and econophysics. It was established in 1995 and is published by John Wiley & Sons, since 2017 in collaboration with Hindawi Publishing Corporation.
Abstracting and indexing
The journal is abstracted and indexed in:
The journal was also initially indexed in some mathematical databases:
According to the Journal Citation Reports, the journal has a 2020 impact factor of 2.833.
See also
List of systems science journals
References
External links
Academic journals established in 1995
English-language journals
Systems journals
Wiley (publisher) academic journals
Hindawi Publishing Corporation academic journals |
https://en.wikipedia.org/wiki/Privacy%20concerns%20with%20social%20networking%20services | Since the arrival of early social networking sites in the early 2000s, online social networking platforms have expanded exponentially, with the biggest names in social media in the mid-2010s being Facebook, Instagram, Twitter and Snapchat. The massive influx of personal information that has become available online and stored in the cloud has put user privacy at the forefront of discussion regarding the database's ability to safely store such personal information. The extent to which users and social media platform administrators can access user profiles has become a new topic of ethical consideration, and the legality, awareness, and boundaries of subsequent privacy violations are critical concerns in advance of the technological age.
A social network is a social structure made up of a set of social actors (such as individuals or organizations), sets of dyadic ties, and other social interactions between actors. Privacy concerns with social networking services is a subset of data privacy, involving the right of mandating personal privacy concerning storing, re-purposing, provision to third parties, and displaying of information pertaining to oneself via the Internet. Social network security and privacy issues result from the large amounts of information these sites process each day. Features that invite users to participate in—messages, invitations, photos, open platform applications and other applications are often the venues for others to gain access to a user's private information. In addition, the technologies needed to deal with user's information may intrude their privacy.
The advent of the Web 2.0 has caused social profiling and is a growing concern for internet privacy. Web 2.0 is the system that facilitates participatory information sharing and collaboration on the Internet, in social networking media websites like Facebook and MySpace. These social networking sites have seen a boom in their popularity beginning in the late 2000s. Through these websites many people are giving their personal information out on the internet. These social networks keep track of all interactions used on their sites and save them for later use. Issues include cyberstalking, location disclosure, social profiling, third party personal information disclosure, and government use of social network websites in investigations without the safeguard of a search warrant.
History
Before social networking sites exploded over the past decade, there were earlier forms of social networking that dated back to 1997 such as Six Degrees and Friendster. While these two social media platforms were introduced, additional forms of social networking included: online multiplayer games, blog and forum sites, newsgroups, mailings lists and dating services. They created a backbone for the new modern sites. Since the start of these sites, privacy has become a concern for the public. In 1996, a young woman in New York City was on a first date with an online acquaintance and later sued f |
https://en.wikipedia.org/wiki/XAP%20Home%20Automation%20protocol | xAP is an open protocol used for home automation and supports integration of telemetry and control devices primarily within the home. Common communications networks include RS-232, RS-485, Ethernet and wireless. xAP protocol always uses broadcast for sending the messages. All the receivers listens to the message and introspects the message header to verify whether the message is of its interest. xAP protocol has the following key advantages.
It makes use of existing infrastructure wherever possible (for example it can co-exist with various physical layers like RS-232 or wireless LAN)
It can even intercommunicate between multiple networks like RS-232 or wireless by just deploying a physical bridge.
xAP does not require any central controller. All nodes can act as sender or receiver.
xAP system provides distributed and fault tolerant architecture which allows continuous operation of systems even in the event of component failures.
See also
xPL Protocol - A substantially similar home automation protocol
External links
xAP Protocol Definition
xAP Forum
Industrial computing
Industrial automation
Home automation |
https://en.wikipedia.org/wiki/Toshiba%20Thrive | The Toshiba Thrive (AT100 in the UK and Singapore) was a 10.1" tablet computer running Android 3.2.1. PC World praised its full-sized and versatile SD card slot, HDMI port, and USB ports with host functionality and the ability to handle large external drives (up to 2 TB) as well as standard peripherals like USB Keyboards, printers and cameras. The review concluded that there were minor disadvantages including a bulky form and poor sound quality. CNET's review said "Its grooved back, full HDMI and USB support, full SD card slot, and replaceable battery justify its very bulky design."
Features
The Toshiba Thrive has a capacitive touch screen, 10.1 inches diagonally measured, with 1280x800 resolution. It comes with one gigabyte of RAM, and 8, 16 or 32 gigabytes of flash NAND memory. Its CPU is the Nvidia Tegra 2 dual-core mobile processor, capable of common tablet tasks like Android games and other apps, e-books, music, and 720p video. There is a 5-megapixel camera on the back, a 2-megapixel camera on the front, and stereo speakers on the bottom. Users can easily remove the Thrive's back cover and replace the battery (which is not the case with many tablets). Though thicker relative to other tablets, the Thrive has rare full-sized USB and HDMI ports, and an SD card slot. There is a mini USB port for communications with a PC, and a port on the bottom edge for Toshiba's proprietary dock. The USB port is popular for external storage (such as flash drives and self-powered hard drives), mice, and keyboards.
The Thrive was first available online in the US on July 10, 2011. In early 2012, Toshiba quietly (without any press releases) introduced Thrive tablets (16 or 32 gigabytes of storage) with support for AT&T 4G HSPA+ mobile broadband. This capability added $80 to the standard prices.
A Thrive with a 7-inch screen was demonstrated in September 2011 and released in December 2011. It weighs 13.3 ounces and has a smaller form factor, 7.44"x5.04"x0.48". However, the battery is not removable, and unlike the bigger Thrive's connections, it has Micro HDMI and mini USB ports, and Micro-SD slot. It features the same front facing 2-megapixel camera.
Upgrades
There were official announcements about the availability of an upgrade to Android 4.0.4 Ice Cream Sandwich in early 2012, and in June 2012, it became available for certain Thrive models in the US, Canada and Australia. There have been numerous complaints about the stability of the stock release at the Thrive Forum, however. For other countries, the latest official version of Android available from Toshiba for this device is still Android 3.2.1 Honeycomb.
The Thrive is rarely found new from U.S. retail outlets, although refurbished and used units are popular. Toshiba's Excite series of tablets was the successor to the Thrive series, launched on March 6, 2012, with 7.7-inch, 10.1-inch and 13-inch versions. Upgrades to Android 4.0.4 were available in August 2012. The Excite has also been discontinued by To |
https://en.wikipedia.org/wiki/Fundamental%20Concepts%20in%20Programming%20Languages | Fundamental Concepts in Programming Languages were an influential set of lecture notes written by Christopher Strachey for the International Summer School in Computer Programming at Copenhagen in August, 1967. It introduced much programming language terminology still in use today, including "R-value" and "L-value", "ad hoc polymorphism", "parametric polymorphism", and "referential transparency".
The lecture notes were reprinted in 2000 in a special issue of Higher-Order and Symbolic Computation in memory of Strachey.
Bibliography
Also:
See also
CPL (programming language)
References
External links
Higher-Order and Symbolic Computation Volume 13, Issue 1/2 (April 2000) Special Issue in memory of Christopher Strachey
Fundamental Concepts In Programming Languages at the Portland Pattern Repository
Fundamental Concepts In Programming Languages at the College of Information Sciences and Technology at Pennsylvania State University
ACM Digital Library
Great Works in Programming Languages. Collected by Benjamin C. Pierce.
1967 in computing
1967 documents
Computer science literature |
https://en.wikipedia.org/wiki/Track%20gauge%20in%20Italy | Historically, Italy had two unusual dominant track gauges which were legally defined depending on the terrain encountered. The gauge of was used for the national Italian rail network and was very similar to the standard gauge commonly used elsewhere in the world.
Since the 1930s, the gauge has been adopted as the standard and gradually replaced the track gauge. Thus, in Italy, only a few older tram systems, such as the Milanese tramway network, remain equipped with .
The other popular gauge, a narrow gauge, was defined at and is very similar to the metre gauge – – commonly used in many other parts of Europe and thus came to be known as "the Italian metre gauge".
Historical legal definitions of 1879
Italian law has defined its track gauges in terms of the distance between the centres of each rail, rather than the inside edges of the rails, giving some unusual measurements. According to the law of 28 July 1879, the only legal gauges in Italy were , , measured between the rail centres, which correspond to and between the rail inside edges.
The narrower gauge has 1,000 mm between the centres of the rails, which explains the name Italian metre gauge, but it is 950 mm in gauge when measured from the inside of the rails,as gauges are normally measured in other countries.
A disadvantage of measuring from the centre of the rail is that the width of the rail varies and affects the gauge. It is easier and more reliable to measure from the inner edges of the rails.
gauge railways
The following systems survive today:
Orvieto Funicular
Milan tram network
Turin tram network
Rome tram network
Naples tram network
Outside Italy, the Madrid Metro also uses this gauge.
or standard gauge railways
The Italian standard gauge railway system has a total length of of which active lines are . The network is recently growing with the construction of the new high-speed rail network.
Italian narrow gauge railways
In Italy, track gauges of , , , , and are or were present.
The aforementioned "Italian metre gauge" was also used in the former Italian colonies of Eritrea (Eritrean Railway), Libya (Italian Libya Railways), and Somalia (Mogadishu-Villabruzzi Railway).
See also
Narrow gauge railways in Italy
List of track gauges
References
Italian railway-related lists
Italy, rail gauges
Italy |
https://en.wikipedia.org/wiki/Sony%20Tablet | is a discontinued series of Android based tablet computers, produced from 2011 to 2012 by Sony Corporation. Two models were released: Sony Tablet S and Sony Tablet P.
It was succeeded by the Sony Xperia Tablet S which is part of the mobile unit under the Xperia brand name.
History and development
Sony's Vaio division had released tablet-like products before, such as the Sony Vaio U series in 2004. Its first tablet computer however was the Airboard, which was released in Japan in 2000 and the brainchild of Satoru Maeda.
On April 26, 2011, Sony announced that it would be developing two Android tablets, codenamed S1 and S2. The S1 (which became the Tablet S) was said to be "optimized for rich media entertainment" while the S2 (later Tablet P) would be "ideal for mobile communication and entertainment".
On 15 June 2011, Sony released the first in a series of five videos titled "Two Will", promoting and featuring the Tablets in an elaborately designed Rube Goldberg Machine. The episodes are entitled:
Prologue
The First Impression
Going smoothly
Filled with fun
Together anywhere
Tablet S and P
The models originally ran Google's operating system Android 3.1 Honeycomb. The first models were informally announced on 26 April 2011, using the code names, by Sony in the Sony IT Mobile Meeting. They featured touchscreens, two cameras (a rear-facing 5 MP, a front-facing 0.3 MP), infrared sensor, Wi-Fi. Also, they support PlayStation Suite, DLNA, and are 3G/4G compatible. The retail price in the U.S at the time of release was US$499–599. In Europe, prices were at €499. To increase the number of apps available and provide marketing support for both tablets, Sony and Adobe Systems will hold a $200,000 competition targeting app developers. The series was formally launched in Berlin and Tokyo on 31 August 2011.
The Sony Tablet S (former code name Sony S1) has one touchscreen display in a slate layout, and a unique wrap design inspired by the way some persons fold magazines while reading them. In landscape orientation, the unit along the top is about three times thicker than along the bottom, forming a mild slant. It was released on 11 September 2011, as the first available member of the Sony Tablet series. The suggested retail prices are $499 for the 16 GB model and $599 for the 32 GB model. In early reviews in late 2011, the units compared favorably to similar high-end tablets.
See also
Comparison of tablet computers
Sony Xperia
iPad
References
External links
Android (operating system) devices
Products introduced in 2011
Sony hardware
Sony products
Tablet computers |
https://en.wikipedia.org/wiki/Layalina%20Productions | Layalina Productions is a 501(c)(3) non-profit public diplomacy initiative based in Washington, D.C., that develops, produces and distributes television programming throughout the Middle East and North Africa. Inaugurated in March 2002, Layalina aims to dispel negative stereotypes of the other and help increase mutual understanding between the U.S. and Arab-speaking countries. The organization's following has been bipartisan, with leading foreign policy veterans and media experts from both Republican and Democratic backgrounds making up the organization's Board of Directors and Board of Counselors, including Henry A. Kissinger, Zbigniew Brzezinski, Sam Nunn, and former President George H. W. Bush.
History and organization
Former ambassador Richard M. Fairbanks founded the non-profit in 2002 as a means of improving the United States' public diplomacy presence in the Middle East. At its inception, Layalina was envisioned as a broadcaster in its own right, transmitting programs to homes throughout the region. Upon consulting with colleagues, however, Fairbanks decided to take a more subtle tack first suggested by former Ambassador to Morocco Marc Ginsberg. Under this strategy, Layalina would seek to produce programs funded by private donors, then sell the rights to broadcasters already operating in the region. In this way, Layalina could avoid the mistrust associated with an overtly pro-American, U.S. Government-run broadcaster like Voice of America or Alhurra, yet still producing programming which could remain both popular and impactful. Convinced, Fairbanks adopted this course of action and shortly thereafter asked Ginsberg to join the organization as its President.
The standing lineup of Layalina's organizational leadership is as follows:
Chairman of the Board of Directors: Shannon Fairbanks
Vice Chairman of the Board of Directors: Richard H. Solomon
Honorary Chairman of the Board of Counselors: George H. W. Bush
President: Leon Shahabian
Productions
Layalina has developed and produced a wide range of programs for the Middle Eastern market, from reality television to news analysis to documentaries.
Yemeniettes
Generation Entrepreneur
On the Road in America, Seasons 1 - 3
Life After Death
American Caravan
Back from the Brink
Al-Sa'at (The Hour)
Ben & Izzy
Sister Cities
Araeh (Opinions)
Yemeniettes
Yemeniettes was produced as a feature-length documentary for screening in the US and as two-episodes for broadcast in Yemen. It won Best Documentary, Best Vision of the Future and Best Innovation & Entrepreneurship awards at the Silicon Valley Film Festival in December 2013. It was also official selection to the Thin Line Film Festival, Cleveland International Film Festival, Millennium Film Festival and the Al Jazeera International Documentary Film Festival.
On the Road in America
Layalina's most successful, publicized series has been On the Road in America, a half-hour reality show following the journey of six young Arabs across t |
https://en.wikipedia.org/wiki/Post-network%20era | The post-network era, also known as the post-broadcast era, is a concept that was popularized by Amanda D. Lotz. It denotes the period that followed an earlier network era, U.S.-American television's first institutional phase that started in the 1950s and ran through to the mid-1980s, and television's later multi-channel transition. It describes a period that saw the deterioration of the dominance of the Big Three television networks: ABC, CBS and NBC in the United States, and follows the creation of a wide variety of cable television channels that catered specifically to niche groups. The post-network era saw the development of networks that deliver a wider diversity of programming choice, less constraints on a consumers choice of medium, decentralization of the location of viewing, and freedom of choice over time of viewing. It is concurrent with the Second Golden Age of Television.
For Amanda D. Lotz, the post-network era has been defined by five C's: "choice, control, convenience, customization, and community". These five concepts, which have defined the post-network era, all relate to the ways in which viewers have greater access to a wider array of content which can be consumed on their own terms. The concept comes from the field of Television studies, and has been used by various academics to discuss numerous different topics. The concept has been endorsed by media scholar Henry Jenkins, co-director of the Media Industries Project Michael Curtin, and American Studies, and Film and Media professor Jason Mittell.
Major Developments
Vast modifications were made to the way in which the television industry was operated following the earlier Network era and a period of Multi-channel transition. The major factor governing the transition to a post-network paradigm was a computational and generational shift in the audience. These emergent developments in the post-network era have led television audiences to split attention between many different channels, devices, and forms of media as Television programs are no longer confined to the Television set.
Timeshifting Technologies
The development of technologies with timeshifting abilities such as the VCR and DVR rendered broadcast times irrelevant, and also shifted discussion away from simple differentiation between cable and free-to-air television. Although much of this technological change coincided with the Multi-channel transition, its effect can be felt well into the post-network era, creating the groundwork for future technological developments including Hulu and Netflix On-Demand.
Digitization of Content
The increasing digitization of content has presented viewers with an increasing level of access to high quality televisual content on DVD and online. This has fostered the development of new portable methods of delivering media that help to bring television to spaces outside of the home. Consequently, multiple new revenue streams have emerged as television networks are able to sell shows thr |
https://en.wikipedia.org/wiki/Real%20Estate%20Channel | Real Estate Channel is a Canadian English language cable television channel. It is owned by Pacific Real Estate Media Ltd.
Programming
Real Estate Channel broadcasts residential and commercial real estate listings in various markets across the country where it is available via a television provider. The listings feature pictures of the properties along with background music and voice-overs. Each listing range in length, although, are less than 1 minute. In addition to broadcasting on television, Real Estate Channel broadcasts and syndicates listings on the Internet.
History
Real Estate Channel was first launched on Novus Cable Ch 68 on December 1, 2006, to showcase properties for sale in British Columbia to the Downtown television audience.
On May 15, 2008 - Real Estate Channel was launched on MTS TV Ch 31 in Manitoba. On April 30, 2009 - The channel was launched on SaskTel 995 in Saskatchewan.
Real Estate Channel acquired its fourth and largest carrier signing with Rogers Cable Communications Inc. to broadcast its channel to Ontario. Rogers Cable Ch 260. The channel was launched on May 19, 2011.
Licensing
Real Estate Channel is classified as a teleshopping service by the Canadian Radio-television and Telecommunications Commission (CRTC) and, thus, is exempted from requiring a CRTC-issued licence to operate and most other CRTC requirements that pay TV and specialty channels are subject to.
References
External links
Real Estate Channel
Shopping networks in Canada
Analog cable television networks in Canada
Television channels and stations established in 2006 |
https://en.wikipedia.org/wiki/Spectral%20network | In mathematics and supersymmetric gauge theory, spectral networks are "networks of trajectories on Riemann surfaces obeying certain local rules. Spectral networks arise naturally in four-dimensional N = 2 theories coupled to surface defects, particularly the theories of class S."
References
Riemann surfaces |
https://en.wikipedia.org/wiki/The%20Product%20Space | The Product Space is a network that formalizes the idea of relatedness between products traded in the global economy. The network first appeared in the July 2007 issue of Science in the article "The Product Space Conditions the Development of Nations," written by Cesar A. Hidalgo, Bailey Klinger, Ricardo Hausmann, and Albert-László Barabási. The Product Space network has considerable implications for economic policy, as its structure helps elucidate why some countries undergo steady economic growth while others become stagnant and are unable to develop. The concept has been further developed and extended by The Observatory of Economic Complexity, through visualizations such as the Product Exports Treemaps and new indexes such as the Economic Complexity Index (ECI), which have been condensed into the Atlas of Economic Complexity. From the new analytic tools developed, Hausmann, Hidalgo and their team have been able to elaborate predictions of future economic growth.
Background
Conventional economic development theory has been unable to decipher the role of various product types in a country's economic performance. Traditional ideals suggest that industrialization causes a “spillover” effect to new products, fostering subsequent growth. This idea, however, had not been incorporated in any formal economic models. The two prevailing approaches explaining a country's economy focus on either the country's relative proportion of capital and other productive factors or on differences in technological capabilities and what underlies them. These theories fail to capture inherent commonalities among products, which undoubtedly contribute to a country's pattern of growth. The Product Space presents a novel approach to this problem, formalizing the intuitive idea that a country which exports bananas is more likely to next export mangoes than it is to export jet engines, for example.
The forest analogy
The idea of the Product Space can be conceptualized in the following manner: consider a product to be a tree, and the collection of all products to be a forest. A country consists of a set of firms—in this analogy, monkeys—which exploit products, or here, live in the trees. For the monkeys, the process of growth means moving from a poorer part of the forest, where the trees bear little fruit, to a better part of the forest. To do this, the monkeys must jump distances; that is, redeploy (physical, human, and institutional) capital to make new products. Traditional economic theory disregards the structure of the forest, assuming that there is always a tree within reach. However, if the forest is not homogeneous, there will be areas of dense tree growth in which the monkeys must exert little effort to reach new trees, and sparse regions in which jumping to a new tree is very difficult. In fact, if some areas are very deserted, monkeys may be unable to move through the forest at all. Therefore, the structure of the forest and a monkey's location within it dictates |
https://en.wikipedia.org/wiki/Co-stardom%20network | In social network analysis, the co-stardom network represents the collaboration graph of film actors i.e. movie stars. The co-stardom network can be represented by an undirected graph of nodes and links. Nodes correspond to the movie star actors and two nodes are linked if they co-starred (performed) in the same movie. The links are un-directed, and can be weighted or not depending on the goals of study. If the number of times two actors appeared in a movie is needed, links are assigned weights. The co-stardom network can also be represented by a bipartite graph where nodes are of two types: actors and movies. And edges connect different types of nodes (i.e. actors to movies) if they have a relationship (actors in a movie). Initially the network was found to have a small-world property. Afterwards, it was discovered that it exhibits a scale-free (power-law) behavior.
The parlor game of Six Degrees of Kevin Bacon involves finding paths in this network from specified actors to Kevin Bacon.
Network representation
In order to represent any network, it is necessary to characterize the properties of the corresponding graph of nodes and links. Studies on the collaboration network of movie actors have been described in literature such as the work done by (Watts and Strogatz, 1998), and Barabási and Albert in (1999) and (2000). The general characteristics are described below.
According to Watts and Strogatz (1998), the movie/actor network indicated the following characteristics showing a small-world property of the underlying network:
Size: 225 226
Average degree: 61
Average path length: 3.65
Clustering coefficient: 0.79
Compared to a random graph of the same size and average degree, the average path length is close in value. However, the clustering coefficient is much higher for the movie actor network.
The network characteristics and scaling exponents given by Barabási and Albert (1999), indicates the scale-free behavior:
Size: 212 250
Average degree: 28.78
Cutoff for power-law scaling: 900
Clustering coefficient: 0.79
Therefore, the underlying network has the scale-free degree distribution p(k) ~ k−γactor, with an exponent γactor = 2.3 ± 0.1 (Barabási and Albert, 1999), (Albert and Barabási, 2000).
According to (Newman, Strogatz, and Watts, 2001), the movie actor network can be described by a bipartite graph. Nodes in this graph are of two types: movies and actors. And the edges only connect nodes of different types. So edges link the co-stars to the movie they appear in. Therefore, the collaboration graph of film actors can be constructed using a transformation matrix of the bipartite graph interaction matrix.
Data collection
The Internet Movie Database IMDB represents one of the largest internet sources for movies/actors data. And it is where most of the datasets are collected to study the collaboration network of co-star actors. IMDB facilitates the ability to collect data for very specific and variable types of network. For examp |
https://en.wikipedia.org/wiki/2011%20PlayStation%20Network%20outage | The 2011 PlayStation Network outage (sometimes referred to as the PSN Hack) was the result of an "external intrusion" on Sony's PlayStation Network and Qriocity services, in which personal details from approximately 77 million accounts were compromised and prevented users of PlayStation 3 and PlayStation Portable consoles from accessing the service. The attack occurred between April 17 and April 19, 2011, forcing Sony to deactivate the PlayStation Network servers on April 20. On May 4, Sony confirmed that personally identifiable information from each of the 77 million accounts had been exposed. The outage lasted 23 days.
At the time of the outage, with a count of 77 million registered PlayStation Network accounts, it was not only one of the largest data security breaches, but also the longest PS Network outage in history. It surpassed the 2007 TJX hack which affected 45 million customers. Government officials in various countries voiced concern over the theft and Sony's one-week delay before warning its users.
Sony stated on April 26 that it was attempting to get online services running "within a week." On May 14, Sony released PlayStation 3 firmware version 3.61 as a security patch. The firmware required users to change their account's password upon signing in. At the time the firmware was released, the network was still offline. Regional restoration was announced by Kazuo Hirai in a video from Sony. A map of regional restoration and the network within the United States was shared as the service was coming back online.
Prelude
In March 2010, Sony released a firmware update for the PlayStation 3, which disabled functionality to use 3rd Party Operating Systems, such as Linux, on the System. This caused outrage in the System's modding community, as the 3rd Party Operating Systems were used frequently in modification.
On January 2, 2011, George Hotz successfully jailbroke the PlayStation 3 firmware. A day later, he started distributing the jailbreak through his website.
On January 11, 2011, Sony filed a lawsuit against Hotz for distributing software to jailbreak their systems on his website.
On April 2, 2011, a group of hackers claiming to be Anonymous declared "Operation Sony". By April 11th, Sony had dropped the lawsuit with Hotz. Two days later the group released a video in text to speech, calling for "A day of Sony Protest".
Timeline of the outage
On April 20, 2011, Sony acknowledged on the official PlayStation Blog that it was "aware certain functions of the PlayStation Network" were down. Upon attempting to sign in via the PlayStation 3, users received a message indicating that the network was "undergoing maintenance". The following day, Sony asked its customers for patience while the cause of outage was investigated and stated that it may take "a full day or two" to get the service fully functional again.
The company later announced an "external intrusion" had affected the PlayStation Network and Qriocity services. This intrusion occ |
https://en.wikipedia.org/wiki/PEXQ | PEXQ stands for a series of algorithms for the objective measuring of the perceived quality of communication channels and a software suite to use them.
In particular the algorithms are
Perceptual Evaluation of Audio Quality (PEAQ) for audio quality of e.g. lossy audio codecs,
Perceptual Evaluation of Video Quality (PEVQ) for video algorithms,
Perceptual Evaluation of Speech Quality (PESQ) for speech transmissions and
Perceptual Evaluation of Data-Download Quality (PEDQ) for data transfers. |
https://en.wikipedia.org/wiki/Baseband%20processor | A baseband processor (also known as baseband radio processor, BP, or BBP) is a device (a chip or part of a chip) in a network interface controller that manages all the radio functions (all functions that require an antenna); however, this term is generally not used in reference to Wi-Fi and Bluetooth radios. A baseband processor typically uses its own RAM and firmware. Baseband processors are typically fabricated using CMOS (complementary metal–oxide–semiconductor) or RF CMOS technology, and are widely used in radio-frequency (RF) and wireless communications.
Overview
Baseband processors typically run a real-time operating system (RTOS) as their firmware, such as ENEA's OSE, Nucleus RTOS (iPhone 3G/3GS/iPad), ThreadX (iPhone 4), and VRTX. There are more than a few significant manufacturers of baseband processors, including Broadcom, Icera, Intel Mobile Communications (former Infineon wireless division), MediaTek, Qualcomm, Spreadtrum, and ST-Ericsson.
The rationale of separating the baseband processor from the main processor (known as the AP or application processor) is threefold:
Radio performance
Radio control functions (signal modulation, encoding, radio frequency shifting, etc.) are highly timing-dependent, and require a real-time operating system.
Radio reliability
Separating the BP into a different component ensures proper radio operation while allowing application and OS changes.
Legal
Some authorities (e.g. the U.S. Federal Communications Commission (FCC)) require that the entire software stack running on a device which communicates with the mobile telephony network must be certified. Separating the BP into a different component allows reusing a stack without having to recertify the full AP.
Security concerns
Since the software which runs on baseband processors is usually proprietary, it is impossible to perform an independent code audit. By reverse engineering some of the baseband chips, researchers have found security vulnerabilities that could be used to access and modify data on the phone remotely. In March 2014, makers of the free Android derivative Replicant announced they had found a backdoor in the baseband software of Samsung Galaxy phones that allows remote access to the user data stored on the phone.
See also
OsmocomBB a free software for baseband processors
References
Further reading
Baseband Processor entry at openezx.org, archived from the original on May 5, 2013
Babin, Steve. Developing software for Symbian OS: A beginner's guide to creating Symbian OS v9 smartphone applications in C++. Symbian Press, 2007, p. 80.
Antennas (radio)
Embedded microprocessors
Radio electronics |
https://en.wikipedia.org/wiki/Diagonal%20View | Diagonal View is a Multi Channel Network founded in March 2008 by Matt Heiman and Steve Carey, together with ITN. Unlike many other MCNs who are primary aggregators of content, Diagonal View own and produce the majority of their own videos. A platform agnostic company, their content can be viewed on YouTube, Facebook, Vessel, AOL amongst others. With separate teams working on different platforms, they are thought to be the largest digital content producer outside of the US.
Key channels include All Time 10s, All Time Conspiracies, Football Daily, All Time Movies, Draw My Life and 101 Facts. Talent from both the online and offline worlds to appear on these channels include KSI, Jose Mourinho and Megan Fox.
The company also builds audience for content owners and producers such as the FA, Sony Music, and the Financial Times, and has produced branded content for Net-a-Porter, Samsung, Nintendo and many others.
Diagonal View's content is translated into over ten languages.
Diagonal View was acquired by Sky in March 2017, who now have overall control of the company.
See also
Multi Channel Network
Cost Per Mille
Cost Per Impression
YouTube
List of YouTube personalities
References
External links
Entertainment companies established in 2008
Multi-channel networks
Sky Group |
https://en.wikipedia.org/wiki/HP%20ePrint | HP ePrint is a term used by Hewlett-Packard to describe a variety of printing technologies developed for mobile computing devices, such as smartphones, tablet computers, and laptops.
Many HP ePrint technologies use cloud resources to provide mobile printing capabilities for specific HP ePrint-enabled printers and MFPs and for other printers using applications that provide network printing. The HP ePrint portfolio includes the following:
HP ePrint via Email
HP ePrint via Email is a feature of most HP printers and MFPs that enables printing documents attached to email messages sent to the device. The HP ePrint-capable printer or MFP must be registered to an HP ePrint cloud service called HP ePrint Center, which assigns a unique email address to the printer or MFP. The assigned email address is customizable but by default is arbitrarily set to promote security since only those who know the email address can use it to print.
HP ePrint via Email does not require a print driver installed on the client. The HP ePrint public cloud renders the printing data from each separate attachment into a suitable print data stream, such as PCL3, PCL 5, or PostScript, and, subsequently, sends it to the HP ePrint enabled printer. For this to work, the attachments for printing must be in a native plain format, such as any of the following:
MS Word document
MS PowerPoint presentation
MS Outlook document
Image file (JPEG, BMP, GIF, PNG, TIFF)
Adobe Acrobat file (PDFs)
Text file and Rich Text Format (RTF)
HTML file
Any email-capable client, including a smartphone, a tablet computer, a laptop, or any other email client, can submit print jobs to HP ePrint via email.
Registered users can also log into HP ePrint Center to manage and view their print jobs, their printers, and their settings. For example, HP ePrint Center provides options to create lists of users approved to print, and it includes spam filters to prevent unwanted print requests. Users can also change the email address of the HP ePrint-enabled printer or MFP by requesting a new one (each HP ePrint email address must be unique and thus, must be approved).
Figure 1 shows how data flows from the email client to the HP ePrint public cloud server (HP ePrint Center) for rendering into an acceptable print stream format and then forwarded to the HP ePrint enabled printer or MFP.
HP ePrint Public Print Locations
HP ePrint Public Print Locations is a mobile printing service that prints from the cloud using one of the HP ePrint mobile device apps. HP ePrint Public Print Locations is meant for people who use printers while traveling. It also enables a business or a public facility to charge for printing. For example, a businessperson preparing for a presentation can print handouts at a destination hotel for a fee rather than carrying them as they travel, or a traveler can print a boarding pass at a hotel to save waiting in line at the airport.
The HP ePrint apps are free and include versions for Apple iPhones and And |
https://en.wikipedia.org/wiki/7Z%20%28disambiguation%29 | 7z is a data compression and archival file format.
7z, 7Z, or 7-Z may also refer to:
7-Zip, an open source file archive software for 7z and other formats
Clerget 7Z, a seven-cylinder rotary aircraft engine
The IATA code for former airline Halcyonair
The IATA code for current airline Ameristar Jet Charter
See also
Z7 (disambiguation) |
https://en.wikipedia.org/wiki/Yeast%20Promoter%20Atlas | The Yeast Promoter Atlas (YPA) is a repository of promoter features in Saccharomyces cerevisiae.
References
External links
http://ypa.ee.ncku.edu.tw/ (outdated)
Biological databases
Gene expression
Saccharomycetes |
https://en.wikipedia.org/wiki/RLU | RLU may refer to:
Rectified linear unit, a neuron activation function used in neural networks, usually referred to as an ReLU
Relative light unit, a unit for measuring cleanliness by measuring the levels of Adenosine Triphosphate
Remote line unit, a type of switch in the GTD-5 EAX switching system
RLU-1 Breezy, an American homebuilt aircraft design
Rusline, a Russian airline whose ICAO airline code is RLU |
https://en.wikipedia.org/wiki/Reallocation%20%28media%29 | Reallocation is a term in the media industry used to describe the practice of relocating an unsuccessful series that was originally developed for a broadcast network onto a cable network in hopes of gaining the attention and interest of a niche audience as well as growing a larger audience.
Reasons for reallocation are not always due to cancellation. Reallocation is also used to regain expenses lost due to production fees on under performing content. In some cases reallocation is used in order to promote an unsuccessful series.
Although not a common practice,
References
Lotz, Amanda D. (2007) "The Television Will Be Revolutionized". New York, NY: New York University Press. p. 126-128
Mass media |
https://en.wikipedia.org/wiki/Ajit%20Gupta |
Ajit Gupta was a Silicon-Valley based entrepreneur and the founder of Aryaka, AAyuja, JantaKhoj, and Speedera Networks. He holds 21 technology patents for Internet content delivery and global traffic management. Ajit Gupta graduated from Indian Institute of Technology Roorkee in Electrical Engineering Batch of 1984.
Ajit Gupta died on October 7, 2016. He was survived by his wife (also an IIT-Roorkee graduate) and two children.
Career
Gupta was a founder of Aryaka, a cloud-based WAN Optimization and application acceleration company. Founded in 2009, and headquartered in Milpitas, CA with offices in Bangalore, India, Aryaka employs more than one hundred and fifty people worldwide. Gupta and his team have raised $59.5 million USD in four rounds of funding from InterWest Partners, Presidio Ventures, a Sumitomo Corporation Company, Trinity Ventures, Mohr Davidow Ventures, and Nexus Venture Partners.
Gupta's first successful venture was a company he co-founded in 1999 - Speedera Networks. Speedera was acquired in 2005 by Akamai Technologies (NASDAQ: AKAM).
After Speedera, Gupta founded AAyuja, a technology sales acceleration company, serving as its CEO. He was Chairman of the company. Gupta was also the Chairman and Founder at JantaKhoj, an India-based premium background verification service provider, which had also built the first and the largest people search engine on Indians.
Gupta was a notable alumni of the Boys' High School & College (Allahabad, Uttar Pradesh), (BHS), an independent school in Allahabad, India.
Honors
Gupta won The Big Idea Award (for the most disruptive business model in the past 12–18 months) at The Innovator Awards 2013. Gupta was recognized by the Golden Bridge Awards for leadership and innovation in October 2012 for launching Aryaka's WAN Optimization as-a-Service offering. Gartner, Inc. recognized his company Aryaka as a ‘Cool Vendor’ for ‘Enterprise Communications and Network Services’ in April 2011.
The company was also named a GigaOM Structure 50 Company in May 2011 and CRN recognized Aryaka as a "Hot Emerging Vendor" in June 2011. Gupta has spoken at conferences around the world, including GigaOM Structure 2011, Cloud Connect,Red Herring, Kagan Digital Media Summits, Datacenter Ventures events, and Streaming Media. A notable alumni of IIT-Roorkee, he is a founding board member of the IIT-Roorkee Heritage Fund.
Philanthropy
In 2003, Gupta established a philanthropy program for Speedera called "Giving Back", which provided free Internet infrastructure services to non-profit organizations including Unicef.org, Goodwill Industries International, Autism.org, and the St. Jude Children's Research Hospital. Under Gupta's leadership, Speedera assisted UNICEF during the 2004 Indian Ocean earthquake and tsunami by providing pro-bono services to enable UNICEF websites to accept contributions and to help victims and families communicate with each other.
References
External links
Net Neutrality and CDNs – No level p |
https://en.wikipedia.org/wiki/City%20Hindus%20Network | City Hindus Network (CHN) is a not-for-profit organisation created to promote networking, spirituality, education and charity amongst Hindu professionals. It was founded in 2005 by Dhruv Patel OBE, who was succeeded by entrepreneur Pratik Dattani. Its current Chair is Alpesh Patel OBE, who was appointed in December 2019. CHN is focused on building closer relationships between Hindu professionals working in the City of London.
History
CHN's first major event was held by the then Mayor of London, Ken Livingstone, for the British Hindu community, at City Hall in London.
Since then, the CHN has organised networking events, talks on Hindu philosophy and spirituality, a mentoring scheme, charity and volunteering events for Hindu professionals, and taken part in community and government liaison on behalf of the Hindu community. Many of its events have been in conjunction with the accountancy and consulting firms and investment banks in London, alongside other Hindu community partners, such as Diwali in London, built relationships with the Metropolitan City Police and charities such as Odanadi, Women in Need, Joshua Playing Project and London Community Transport.
CHN has also works closely with other faith networks including City Sikhs to organise the largest hustings events in London. Recent collaboration events have included a quarterly DEI series in 2023 focusing on Women in Business and Technology.
Awards and nominations
The founder of CHN, Dhruv Patel received an OBE in the 2018 Birthday Honours as a result of his community work through CHN and elsewhere.
The chairman of CHN, Alpesh Patel received an OBE in the 2020 Birthday Honours as a result of his services to the economy and international trade.
References
External links
City Hindus Network website
Hindu organisations based in the United Kingdom
Non-profit organisations based in the United Kingdom
Organizations established in 2005
2005 establishments in the United Kingdom |
https://en.wikipedia.org/wiki/ESP-r | ESP-r is a research-oriented open-source building performance simulation software. ESP-r can model heat flow in thermal zones, fluid flow using networks or CFD, electrical power flow, moisture flow, contaminant flow, hygrothermal and fluid flow in HVAC systems, as well as visual and acoustic performance aspects within a modeled energy system/building.
It was initially developed in 1974, as Joe Clarke's PhD research at the University of Strathclyde, and has been since extended by researchers from several countries. ESP-r was made available in 2002 in the public domain subject to the GNU Public License.
ESP-r is designed to work on Unix, but it can run on Windows using Windows Subsystem for Linux (or in any other operational system using a virtual machine). The current ESP-r archivist is Professor Joseph Clarke, of the University of Strathclyde.
ESP-r`s holistic nature, flexibility, and range of features enable a well-informed user to optimize the energy and environmental performance of a building and/or associated energy systems. The user experience provided by ESP-r, however, cannot be compared to the one provided by commercial software. ESP-r learning curve is steep, but there is a growing amount of training material available online.
ESP-r has been extensively validated. Among other projects, ESP-r was part of BESTEST, an IEA initiative that created a benchmark for quality assessment of energy simulation software. This benchmark was later incorporated on ASHRAE Standard 140 - Method of Test for Evaluating Building Performance Simulation Software.
References
Free software
Computational science
Energy models
Mathematical modeling
Mathematical optimization
Simulation |
https://en.wikipedia.org/wiki/P-CAD | P-CAD was the brand name of Personal CAD Systems, Inc., a California based manufacturer of electronic design automation software. It manufactured a CAD software available for personal computers. The company was divested into ACCEL Technologies which was purchased by Altium in 2000. The last release of the software was in 2006 before it was retired in favor of the Altium Designer product.
History
Personal CAD Systems was founded in 1982 by Richard Nedbal and Roy Prasad. Both were former executives of American Microsystems, Inc. (AMI), a custom semiconductor company based in Santa Clara, California. Also, part of the founding team were Gregory Houston, VP Marketing, a former Calma executive, and Chi-Song Horng, Director of software engineering (later promoted as a Vice President), a former AMI software engineering manager.
P-CAD was a play on personal computers, which were just becoming popular, following the launch of the IBM PC. The vision of the company was to disrupt the existing hegemony of $250,000 CAD systems based on mainframe computers and custom workstations, and make electronic CAD available to the masses at a cost under $10,000. The company originally raised US$500,000 from CrossPoint Venture Partners, and US$3,000,000 in a second round from New Enterprise Associates and Robertson, Coleman and Stephens.
P-CAD went on to become the company with the biggest installed base of users of Electronic Design Automation (EDA), with over 10,000 users by 1988. At that time, P-CAD was the most prolific EDA company as measured by its user base, easily surpassing established CAD companies such as Autotrol, Calma, Intergraph, Daisy, Mentor, Cadnetix, CAE Systems, ECAD, SDA Systems, etc. At that time, Cadence was just being formed with the merger of ECAD and SGA, and Synopsys was being founded as a new start up.
P-CAD's flagship products included schematic capture, logic simulation and PCB layout. Its single biggest customer was Texas Instruments. In 1989, P-CAD was acquired by Cadam, which was a subsidiary of Lockheed, but was in the process of being sold to IBM. At the time of acquisition, P-CAD had an installed base of over 100,000 end users, a record at that time. A few years later, the P-CAD group was divested by selling to ACCEL Technologies, an EDA software corporation from San Diego, California, which was acquired by Protel International Pty Ltd (now Altium) in 2000. The P-CAD product included schematic capture, component library management, PCB layout and routing, parametric constraint solver and auto-routing capability.
The last version of P-CAD was P-CAD 2006 with Service Pack 2, released in 2006. This was the last release made by Altium, who retired the product in favor of Altium Designer.
See also
P-CAD Interface for SPECCTRA
References
External links
P-CAD Legacy Program
Electronic design automation software |
https://en.wikipedia.org/wiki/List%20update%20problem | The List Update or the List Access problem is a simple model used in the study of competitive analysis of online algorithms. Given a set of items in a list where the cost of accessing an item is proportional to its distance from the head of the list, e.g. a Linked List, and a request sequence of accesses, the problem is to come up with a strategy of reordering the list so that the total cost of accesses is minimized. The reordering can be done at any time but incurs a cost. The standard model includes two reordering actions:
A free transposition of the item being accessed anywhere ahead of its current position;
A paid transposition of a unit cost for exchanging any two adjacent items in the list. Performance of algorithms depend on the construction of request sequences by adversaries under various Adversary models
An online algorithm for this problem has to reorder the elements and serve requests based only on the knowledge of previously requested items and hence its strategy may not have the optimum cost as compared to an offline algorithm that gets to see the entire request sequence and devise a complete strategy before serving the first request.
Along with its original uses, this problem has been suggested to have a strong similarity to problems of improving global context and compressibility following a Burrows–Wheeler transform. Following this transform, files tend to have large regions with locally high frequencies, and compression efficiency is greatly improved by techniques that tend to move frequently-occurring characters toward zero, or the front of the "list". Due to this, methods and variants of Move-to-Front and frequency counts often follow the BWT algorithm to improve compressibility.
Adversary models
An adversary is an entity that gets to choose the request sequence for an algorithm ALG. Depending on whether can be changed based on the strategy of ALG, adversaries are given various powers, and the performance of ALG is measured against these adversaries.
An oblivious adversary has to construct the entire request sequence before running ALG, and pays the optimal offline price, which is compared against
An adaptive online adversary gets to make the next request based on the previous results of the online algorithm, but pays for the request optimally and online.
An adaptive offline adversary gets to make the next request based on the previous results of the online algorithm, but pays the optimal offline cost.
Offline algorithms
Competitive analysis for many list update problems were carried out without any specific knowledge of the exact nature of the optimum offline algorithm (OPT). There exist algorithm runs in O(n2l(l-1)!) time and O(l!) space where n is the length of the request sequence and l is the length of the list. The best known optimal offline algorithm dependent on request sequence length runs in O(l^2(l−1)!n) time published by Dr Srikrishnan Divakaran in 2014.
Paid transpositions are in general necess |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.