source
stringlengths 32
199
| text
stringlengths 26
3k
|
|---|---|
https://en.wikipedia.org/wiki/Subversive%20Proposal
|
The "Subversive Proposal" was an Internet posting by Stevan Harnad on June 27, 1994 (presented at the 1994 Network Services Conference in London) calling on all authors of "esoteric" research writings to archive their articles for free for everyone online (in anonymous FTP archives or websites). It initiated a series of online exchanges, many of which were collected and published as a book in 1995: Scholarly Journals at the Crossroads: A Subversive Proposal for Electronic Publishing. This led to the creation in 1997 of Cogprints, an open access archive for self-archived articles in the cognitive sciences and in 1998 to the creation of the American Scientist Open Access Forum (initially called the "September98 Forum" until the founding of the Budapest Open Access Initiative which first coined the term "open access"). The Subversive Proposal also led to the development of the GNU EPrints software used for creating OAI-compliant open access institutional repositories, and inspired CiteSeer, a tool to locate and index the resulting eprints.
The proposal was updated gradually across the years, as summarized in the American Scientist Open Access Forum on its 10th anniversary.
A retrospective was written by Richard Poynder.
A self-critique
was posted on its 15th anniversary in 2009. An online interview of Stevan Harnad was conducted by Richard Poynder on the occasion of the 20th anniversary of the subversive proposal.
References
Bosc, Hélène Les idées et la technique : une rétrospective de ces 15 dernières années
Further reading
Harnad, Stevan (1995):
(2001/2003/2004) For Whom the Gate Tolls? Published as:
(2003) Open Access to Peer-Reviewed Research Through Author/Institution Self-Archiving: Maximizing Research Impact by Maximizing Online Access. In: Law, Derek & Judith Andrews, Eds. Digital Libraries: Policy Planning and Practice. Ashgate Publishing 2003.
(2003) Journal of Postgraduate Medicine 49: 337–342.
(2004) Historical Social Research (HSR) 29:1
(2003) Ciélographie et ciélolexie: Anomalie post-gutenbergienne et comment la résoudre in: Origgi, G. & Arikha, N. (eds) Le texte à l'heure de l'Internet. Bibliothèque Centre Pompidou: Pp. 77–103.
Okerson, Ann Shumelda & O'Donnell, James J. (1995) (Eds.) Scholarly Journals at the Crossroads: A Subversive Proposal for Electronic Publishing. Washington, DC., Association of Research Libraries, June 1995.
Suber, Peter Timeline of the Open Access Movement (February 2009; archived copy from 2016)
External links
American Scientist Open Access Forum Official Site
Global Open Access Forum Official Site
History of the Internet
Open access (publishing)
Communication
Academic publishing
Research
Online archives
|
https://en.wikipedia.org/wiki/Plum%20TV
|
Plum TV was an American broadcast television network targeted mostly to affluent viewers in the country. The majority of the programming was locally produced largely in affluent vacation communities, marketed towards the mass affluent.
History
Plum TV was launched in 2004 by Tom Scott of Nantucket Nectars, film producer Cary Woods, Chris Glowacki, and general manager Brook Altman. Investors have included singer Jimmy Buffett, then-MTV head Tom Freston and Jason Flom.
On January 3, 2012, Plum TV, Inc. and a number of affiliated companies filed for chapter 11 bankruptcy protection in the Southern District of New York bankruptcy court. According to court filings, the companies projected losses of $8.4 million on revenues of $6.4 million and their liabilities exceeded their assets by over $10 million ($19 million in liabilities vs. $8.6 million in assets). They intended to sell their assets to PMG Media Group, LLC for $1 million in cash plus the assumption of certain obligations, subject to higher offers. In March 2012, Morgan Hertzan and Joseph Varet took over as co-presidents of Plum. Hertzan and Varet are former MTV executives and co-founders of LXTV.
In early October 2012, Plum TV received more funding, $4.4 million, from additional investors including Baroda Ventures and Double M Partners. Plum TV also added two Titan Broadcast Management stations, WMFP-TV in Boston and WTVE in Philadelphia, as affiliates in a move to go nationwide.
Affiliates and programming
Plum TV was carried by cable providers in Aspen, Nantucket, the Hamptons, Martha's Vineyard, Telluride, Sun Valley, Vail, and Miami Beach. In the Boston metro area, Plum TV was available over the air on Channel 62.1 (WMFP), and in Philadelphia it was being broadcast on Channel 51.2 (WTVE). On the West Coast, Plum TV for a short time was seen on channel 56.4 (KDOC-TV). Plum programming focused on home and real estate, décor, food and wine, style, travel destinations, health and wellness.
Awards and recognition
In November 2008, Plum TV was nominated for Six Emmy Awards by the National Academy of Television Arts and Sciences.
In June 2010, Plum TV received Emmy Award from Heartland Chapter of the National Academy of Television Arts & Sciences.
See also
Live Well Network, a similarly-themed television network, owned by Disney-ABC Television
References
Defunct television networks in the United States
Television channels and stations established in 2004
Television channels and stations disestablished in 2013
|
https://en.wikipedia.org/wiki/Eldorado%20Resort%20Casino
|
Eldorado Resort Casino is a hotel and casino located in Downtown Reno, Nevada. It anchors a network of connected hotel-casinos in the downtown Reno core that included Circus Circus Reno and Silver Legacy Reno and are owned and operated by Caesars Entertainment.
History
Plans for the Eldorado were announced in July 1972 by a group of six investors, including members of Reno's prominent Carano family. The hotel opened on May 24, 1973 with 278 guest rooms, two restaurants, and a casino with 200 slot machines, 9 table games, and a keno game. Also incorporated into the property were a ballroom accommodating up to 750 people, an underground parking garage, and executive suites.
In 1979, the success of the Eldorado Resort Casino prompted what would be the first of many expansions and improvements. Guestrooms were brought to a total of 411 with a further expansion completed in September 1985 adding 20,000 square feet of gaming area and four new restaurants. By 1989, the Eldorado had grown to 814 hotel rooms and boasted its own on-site bakery, pasta and gelato shop and butcher shop. In 1992, the Eldorado added a 10 story parking garage for added convenience to guests.
The completion of another transformation for the Eldorado happened in 1995. Coinciding with the construction of Silver Legacy Reno, a 50/50 joint venture between Eldorado Resorts and MGM Resorts International, the Eldorado added a crossover to the new downtown property connected by the first ever micro-brewery in a casino, The Brew Brothers. The Spa Tower was created, adding 10 floors of luxury accommodations; a 10,175 square foot convention center was opened as well as a 580-seat Broadway-style showroom. A coffee roasting company was added to the list of on-site services and the casino now totaled 78,987 square feet with more than 1,500 slot machines, 55 table games, a keno lounge, race and sportsbook and poker room.
In 2016, Eldorado Resorts announced that it expects to invest more than $50 million in enhancements. Eldorado’s master plan for the three connected properties, which span eight city blocks in downtown Reno, also includes renovation of more than 4,100 guest rooms. The properties’ upgrade announcement comes a week after the company’s agreement to acquire Isle of Capri Casinos.
Eldorado Showroom
The showroom seats 580 and has rotating productions.
The Brew Brothers
The casino houses an on-site microbrewery, The Brew Brothers, which also operates as a music venue and night club. A second Brew Brothers is planned for Scioto Downs Racino in Columbus, Ohio.
References
External links
1973 establishments in Nevada
Beer brewing companies based in Nevada
Casino hotels
Casinos completed in 1973
Casinos in Reno, Nevada
Drinking establishments in Nevada
Caesars Entertainment
Hotel buildings completed in 1973
Hotels in Reno, Nevada
Resorts in Nevada
|
https://en.wikipedia.org/wiki/Christmas%20Tree%20EXEC
|
Christmas Tree EXEC was the first widely disruptive computer worm, which paralyzed several international computer networks in December 1987. The virus ran on the IBM VM/CMS operating system.
Written by a student at the Clausthal University of Technology in the REXX scripting language, it drew a crude Christmas tree as text graphics, then sent itself to each entry in the target's email contacts file. In this way it spread onto the European Academic Research Network (EARN), BITNET, and IBM's worldwide VNET. On all of these systems it caused massive disruption.
The core mechanism of the ILOVEYOU worm of 2000 was essentially the same as Christmas Tree, although it ran on PCs rather than mainframes, was spread over a different network, and was scripted using VBScript rather than REXX.
The name was actually "CHRISTMA EXEC" because the IBM VM systems originally required file names to be formatted as 8+space+8 characters. Additionally, IBM required REXX script files to have a file type of "EXEC". The name is sometimes written as "CHRISTMAS EXEC" (adding a 9th character) to make the name more readable. The user was prompted to: "...just type CHRISTMAS..."—and this in fact launched the "worm". The worm would read the user's CMS NAMES file, which contained a list of users at remote nodes to transmit the worm to. The worm would then use the SENDFILE command to transmit the worm to those remote users, who would presumably run it, repeating the cycle.
Some versions of the worm had concealed code. The actual executable part of the worm was contained in several overly long lines (more than 80 characters) that were not visible unless the user scrolled the screen to the right. The IBM 3279 color terminal would display the christmas tree with some blinking colored characters (asterisks) to represent tree lights.
It displays this message when the program is run and then forwards itself to mailbox addresses contained in the user's address file.
*
*
***
*****
*******
*********
************* A
*******
*********** VERY
***************
******************* HAPPY
***********
*************** CHRISTMAS
*******************
*********************** AND MY
***************
******************* BEST WISHES
***********************
*************************** FOR THE NEXT
******
****** YEAR
******
See also
Trojan horse (computing)
Timeline of computer viruses and worms
ASCII art
References
Further reading
External links
Source code (archived)
Trojan horses
Email worms
Rexx
Hacking in the 1980s
1987 in computing
|
https://en.wikipedia.org/wiki/Raster%20passes
|
Raster passes are the most basic of all machining strategies for the finishing or semi-finishing of a part during computer-aided manufacturing (CAM). In raster passes machining the milling cutter moves along curves on the cutter location surface (CL surface) obtained by intersecting the CL surface with vertical, parallel planes. Many CAM systems implement this strategy by sampling cutter location points on these curves by calculating intersection points of the CL surface and as many vertical lines as needed to approximate the curve to the desired accuracy.
Computer-aided manufacturing
|
https://en.wikipedia.org/wiki/BEFLIX
|
BEFLIX is the name of the first embedded domain-specific language for computer animation, invented by Ken Knowlton at Bell Labs in 1963.
The name derives from a combination of Bell Flicks.
Ken Knowlton used BEFLIX to create animated films for educational and engineering purposes.
He also collaborated with the artist Stan Vanderbeek at Bell Labs to create a series of computer-animated films called Poemfields between 1966 and 1969.
BEFLIX was developed on the IBM 7090 mainframe computer using a Stromberg-Carlson SC4020 microfilm recorder for output. The programming environment targeted by BEFLIX consisted of a FORTRAN II implementation with FORTRAN II Assembly Program (FAP) macros. The first version of BEFLIX was implemented through the FAP macro facility. A later version targeting FORTRAN IV resembled a more traditional subroutine library and lost some of the unique flavor to the language.
Pixels are produced by writing characters to the screen of the microfilm recorder with a defocused electron beam. The SC4020 used a charactron tube to expose microfilm. In BEFLIX, the electron beam is defocused to draw pixels as blurred character shapes. Characters are selected to create a range of grayscale values for pixels. The microfilm recorder is not connected directly to the 7090, but communicates through magnetic tape. BEFLIX writes the magnetic tape output on the 7090 and the film recorder reads the tape to create the film output. BEFLIX also supports a preview mode where selected frames of the output are written to the line printer.
Programming Model
The memory of the 7090 is organized into rectangular surfaces of pixels.
The surfaces are designated by a two letter code that identifies a particular surface geometry. BEFLIX supports two resolutions for output frames: fine (252x184) and coarse (126x92). The 7090 has enough memory to support two fine resolution frames. The surface organization in BEFLIX allows for different geometric combinations of smaller surfaces within available memory. BEFLIX pixels store values 0-7, allowing them to be packed 12 to a 36-bit word of the 7090.
BEFLIX provides low-level operations and high-level operations. For low-level operations, BEFLIX provides 26 scanners named A through Z. A scanner has a value and a coordinate position on a surface. Low-level statements in BEFLIX apply operations to a scanner based on a set of conditions
being met. An example low-level operation is:
IFANY (B,R,10)(B,A,C)(A,E,7)T(A,T,B)(A,U,2)(A,W,3)LOC5
Which says that if any of the following conditions are true:
scanner B is to the right of x=10
scanner B is above scanner C
the surface value at scanner A is equal to 7
then the following operations are performed:
scanner A moves to the surface and position as scanner B
scanner A moves up 2 rows
scanner A writes the number 3 into the surface
and then control is passed to the statement with the label LOC5.
In this way, complicated patterns can be programmed into the behavio
|
https://en.wikipedia.org/wiki/Al-Alam%20News%20Network
|
Al-Alam () is an Arabic news channel broadcasting from Iran and owned by the state-owned media corporation Islamic Republic of Iran Broadcasting (IRIB).
The network's political coverage tends to be the most popular; however, other subjects, such as commentaries, analysis, business and sports also get a share of the audience. Programs are broadcast to over 300 million Arab people around the world, with large audiences in the Persian Gulf and Mediterranean regions. The satellite channel can be received on five continents.
Al-Alam has news bureaus in Tehran, Beirut and Baghdad. Unlike many other channels, it can be viewed in Iraq without the use of a satellite receiver, as it is able to use a terrestrial transmitter close to the Iran-Iraq border.
History
An English-language website, known as Alalam News, was launched on August 15, 2006.
According to the Columbia Journalism Review, the channel's mission is to "help Iran emerge as the region's top power" by exploting Arab anger toward U.S. foreign policy, emphasizing Arabs and Iranians common Islamic faith, and capitalizing on the rift between Arabs and their governments.
In February 2003 ahead of the 2003 U.S. invasion of Iraq, Al-Alam began terrestrially broadcasting from Iran into Iraq. The channel's studios were located in Tehran, but the channel used a relay station on a hill near the Iran-Iraq border to broadcast into Iraq. Al-Alam is presented in Arabic, but all the anchors and newscasters are Iranian. The channel's primary target audience was at first Iraq's Shiite majority.
Al-Alam launched an Arabic-language website in 2004 and an English-language website in 2006. The Arabic and English sites do not mirror the other's content.
Alalam News Network launched its Persian website in April 2007 in order to cover news exclusively in the Persian language.
Capturing of British nationals by the Iranian Navy
Al-Alam was the first network to air videos of Royal Navy personnel captured by the Islamic Revolutionary Guard Corps Navy in 2007. During the 2007 Iranian seizure of Royal Navy personnel al-Alam reported with regard to British soldiers’ confessions about the infringement of Iran's maritime sovereignty, Al-Alam news channel had an important portion in covering that incident. It was the forerunner in transmitting the soldiers’ confessions, and was the main and prime source for media coverage in this respect.
2011 Bahraini protests
During the Shiite anti-government protests in Bahrain, the Al-Alam signal was repeatedly jammed. Allegations all point to the fact that Al Mukhabarat Al A'amah, the Saudi Intelligence Agency, was traced back to for evidence of this crime. The jamming attacks were reportedly caused by installations capable of interfering with Al-Alam's frequencies on the Badr satellite from a Saudi transmitter. This act of sabotage and illegal interference with free media has yet to be addressed in an international case.
Geographical coverage
Al-Alam news channel covers all p
|
https://en.wikipedia.org/wiki/Seymour%20Ginsburg
|
Seymour Ginsburg (December 12, 1927 – December 5, 2004) was an American pioneer of automata theory, formal language theory, and
database theory, in particular; and computer science, in general. His work was influential in distinguishing theoretical Computer Science from the disciplines of Mathematics and Electrical Engineering.
During his career, Ginsburg published over 100 papers and three books on various topics in theoretical Computer Science.
Biography
Seymour Ginsburg received his B.S. from City College of New York in 1948, where along with fellow student Martin Davis he attended an honors mathematics class taught by Emil Post. He earned a Ph.D. in Mathematics from the University of Michigan in 1952, studying under Ben Dushnik.
Ginsburg's professional career began in 1951 when he accepted a position as assistant professor of mathematics at the University of Miami in Coral Gables, Florida. He turned his attention wholly towards computer science in 1955 when he moved to California to work for the Northrop Corporation. He followed this with positions at the National Cash Register Corporation, Hughes Aircraft, and System Development Corporation.
At SDC, Ginsburg first concentrated on the theory of abstract machines. He subsequently formed and led a research project dedicated to formal language theory and the foundations of Computer Science. Members of the research group included: Sheila Greibach, Michael A. Harrison, Gene Rose, Ed Spanier, and Joe Ullian. The work that came out of this group distinguished Computer Science theory from other fields, putting Ginsburg at the center of what became the theoretical Computer Science community.
It was during the SDC years that a young Jeff Ullman spent one summer working for Ginsburg, learning both formal language theory and a broad approach to research in computer science theory. Al Aho credited Ullman's summer with Ginsburg as being highly influential on Aho's career in Computer Science. In an interview, Aho recalled that there was little Computer Science at Princeton University while he was studying for his PhD. However, after Ullman returned from his summer with Ginsburg, Aho stated that Ullman "essentially taught Hopcroft, and me, formal language theory".
Ginsburg joined the faculty of University of Southern California in 1966 where he helped to establish the Computer Science department in 1968. He was awarded a Guggenheim Fellowship in 1974 and spent the year touring the world, lecturing on the areas of theoretical Computer Science which he had helped to create. Ginsburg was named the first Fletcher Jones Professor of Computer Science at USC in 1978, a chair he held until his retirement in 1999. He continued his work on formal language theory and automata through the 1970s.
At USC in the 1980s, Ginsburg created a research group dedicated to database theory. He organized the first PODS (Symposium on Principles of Database Systems) in Marina del Rey in 1982 and was a moving force at the c
|
https://en.wikipedia.org/wiki/Boilerplate%20code
|
In computer programming, boilerplate code, or simply boilerplate, are sections of code that are repeated in multiple places with little to no variation. When using languages that are considered verbose, the programmer must write a lot of boilerplate code to accomplish only minor functionality.
The need for boilerplate can be reduced through high-level mechanisms such as metaprogramming (which has the computer automatically write the needed boilerplate code or insert it at compile time), convention over configuration (which provides good default values, reducing the need to specify program details in every project) and model-driven engineering (which uses models and model-to-code generators, eliminating the need for manual boilerplate code).
Origin
The term arose from the newspaper business. Columns and other pieces that were distributed by print syndicates were sent to subscribing newspapers in the form of prepared printing plates. Because of their resemblance to the metal plates used in the making of boilers, they became known as "boiler plates", and their resulting text—"boilerplate text". As the stories that were distributed by boiler plates were usually "fillers" rather than "serious" news, the term became synonymous with unoriginal, repeated text.
A related term is bookkeeping code, referring to code that is not part of the business logic but is interleaved with it in order to keep data structures updated or handle secondary aspects of the program.
Preamble
One form of boilerplate consists of declarations which, while not part of the program logic or the language's essential syntax, are added to the start of a source file as a matter of custom. The following Perl example demonstrates boilerplate:
#!/usr/bin/perl
use warnings;
use strict;
The first line is a shebang, which identifies the file as a Perl script that can be executed directly on the command line on Unix/Linux systems. The other two are pragmas turning on warnings and strict mode, which are mandated by fashionable Perl programming style.
This next example is a C/C++ programming language boilerplate, #include guard.
#ifndef MYINTERFACE_H
#define MYINTERFACE_H
...
#endif
This checks, and sets up, a global flag to tell the compiler whether the file myinterface.h has already been included. As many interdepending files may be involved in the compilation of a module, this avoids processing the same header multiple times (which would lead to errors due to multiple definitions with the same name).
In Java and similar platforms
In Java programs, DTO classes are often provided with methods for getting and setting instance variables. The definitions of these methods can frequently be regarded as boilerplate. Although the code will vary from one class to another, it is sufficiently stereotypical in structure that it would be better generated automatically than written by hand. For example, in the following Java class representing a pet, almost all the code is boilerplate exce
|
https://en.wikipedia.org/wiki/Nokia%20Networks
|
Nokia Networks (formerly Nokia Solutions and Networks (NSN) and Nokia Siemens Networks (NSN)) is a multinational data networking and telecommunications equipment company headquartered in Espoo, Finland, and wholly owned subsidiary of Nokia Corporation. It started as a joint venture between Nokia of Finland and Siemens of Germany known as Nokia Siemens Networks. Nokia Networks has operations in around 120 countries. In 2013, Nokia acquired 100% of Nokia Networks, buying all of Siemens' shares. In April 2014, the NSN name was phased out as part of a rebranding process.
History
The company was created as the result of a joint venture between Siemens Communications (minus its Enterprise business unit) and Nokia's Network Business. The formation of the company was publicly announced on 19 June 2006. Nokia Siemens Networks was officially launched at the 3GSM World Congress in Barcelona in February 2007. Nokia Siemens Networks then began full operations on 1 April 2007 and has its headquarters in Espoo, Greater Helsinki, Finland.
In January 2008 Nokia Siemens Networks acquired Israeli company Atrica, a company that builds carrier-class Ethernet transport systems for metro networks. The official release did not disclose terms, however they are thought to be in the region of $100 million. In February 2008 Nokia Siemens Networks acquired Apertio, a Bristol, UK-based mobile network customer management tools provider, for €140 million. With this acquisition Nokia Siemens Networks gained customers in the subscriber management area including Orange, T-Mobile, O2, Vodafone, and Hutchison 3G.
In 2009, according to Siemens, Siemens only retained a non-controlling financial interest in NSN, with the day-to-day operations residing with Nokia.
On 19 July 2010, Nokia Siemens Networks announced it would acquire the wireless-network equipment of Motorola. The acquisition was completed on 29 April 2011 for $975 million in cash. As of the transaction approximately 6,900 employees transferred to Nokia Siemens Networks.
On 23 November 2011, Nokia Siemens Networks announced that it would refocus its business on mobile broadband equipment, the fastest-growing segment of the market. This refocus resulted in the restructuring of the company and the planned layoffs of 17,000 employees. The plan reduced the company's work force by 23% from its 2011 level of 74,000, and helped the company trim annual operating expenses by $1.35 billion by the end of 2013.
On 12 December 2011, ADTRAN, Inc. announced it would acquire Nokia Siemens Networks fixed line Broadband Access business. This caused around 400 jobs to move to ADTRAN as part of the deal.
After the restructuring process, Nokia Siemens Networks brought in a positive turn around to its businesses. The bottom line and operating margins rose to approximately 10%, which was a significant shift from the previous sub-zero margins, with positive cash flows for six continuous quarters.
On 7 August 2013, Nokia completed the acqu
|
https://en.wikipedia.org/wiki/Terminal%20Power%20Company
|
Terminal Power Company was a British alternative music band.
History
Formed in 1989 in Birmingham, England, by Paul Aspel and John Roome, designed specifically to be a "cyberpunk band", the band cited many diverse visual influences on their music. Amongst these were William Gibson, John Shirley - Authors, Blade Runner, Aliens, Spaghetti Westerns and Film Noir. Essentially the band was formed to create virtual sound tracks for these types of films and books. Their first demo tapes were received well and in early 1990 TPC signed to Situation Two and soon released their first single "Wired" (SIT 80).
Following the release of "Wired" they signed a three-album contract with Beggars Banquet Records. The band spent two weeks during November 1990 recording their first album Run Silent, Run Deep, which was released in early 1991 and was well received by the press. The album was soon followed by the single "The Hunger, The Heat", and later that year the second single from the album, "Salvation". The version released was a remix of the album version and featured a drummer and additional extra guitar performed by Mark Gemini Thwaite, most recently known for being a member of The Mission.
During the period directly after the recording of Run Silent, Run Deep, Aspel and Roome decided to expand the line up of the band to a four-piece. Up to this point, they had played as a three-piece with Mark McKenzie on bass and were using a backing tape for drums and keyboards. They felt that the adding of a full-time drummer and bass player would fill out the sound and make the group have a proper "band" feel on stage.
Through the band's tour manager, John Adkins, Aspel and Roome were introduced to Dave Askey, former bassist with Goth rockers "Dawn after Dark". Askey was quickly introduced to the band's material and after a short period of rehearsal and gigging the band entered the studio to record their second album, Red Skin Eclipse.
The album was recorded during November 1992 at the Rich Bitch recording studio in Selly Oak, Birmingham, UK, taking four weeks to record and mix and was co-produced by Godflesh guitarist and songwriter Justin Broadrick.
Prior to the release of their second album, the band brought in Stourbridge-based drummer Lee Haggerty.
The band expected the album to be released in March 1993, however, the record label decided to delay release until the following October.
During the summer of 1993 the band decided to remix some of the tracks from the new album with ON-U sound producer Adrian Sherwood at the Roundhouse recording studio. The sessions were also added to with contributions from Tackhead guitarist, Skip McDonald.
From the results of this session the track listing on Red Skin Eclipse was altered to include the remixed version of "Juggernaut". This track was later to be released as the band's fourth single.
The band continued touring, headlining and supporting other acts but were dropped by their record label during March 1994. They th
|
https://en.wikipedia.org/wiki/The%20Judges%20%28demogroup%29
|
The Judges was a Dutch Commodore 64 group from Roosendaal known for being one of the earliest dedicated demogroups. The Judges released several demos for the Commodore 64 home computer between the years 1986 - 1988. Groups such as The Judges are regarded as early pioneers of what came to be known as the demoscene.
In some respects they mirrored The Lords, a "rivaling" ZX Spectrum group also from Roosendaal, to the extent that concepts, artwork and even titles were identical between the two groups.
A technical milestone often attributed to The Judges, particularly the programmer Bart "White" Meeuwissen, is the invention of the FLD (Flexible Line Distance) technique, which was used in the Think Twice series of demos. As the name implies, FLD made it possible to have a variable distance every eight pixels between the individual text or graphics lines generated by the VIC-II video chip.
The group's musician Jeroen "Red" Kimmel went on to compose and sell video game music commercially for different platforms such as the C64, Amiga and MSX computers.
Members
Jeroen "Red" Kimmel
Bart "White" Meeuwissen
Hans "Der Hansie" van Gink
Corne "Coko" Koen
Releases
Think Twice series (parts 1–5, released in 1987 and 1988)
Crazy Sample 1 & 2
Hubbard Track series (parts 1–3)
Rhaa Lovely 1 & 2
Touch Me
Jugglin' Judge
Rascal
Mikie's Music
It's a Kind of Magic
Phantom of the Asteroid Music
References
External links
Information page at CSDB
Some demos
Interview with White at C64.COM
Interview with Der Hansie at C64.COM
The Judges at pouet.net
Demogroups
Commodore 64
|
https://en.wikipedia.org/wiki/WCLJ-TV
|
WCLJ-TV (channel 42) is a television station licensed to Bloomington, Indiana, United States, serving the Indianapolis area as an affiliate of the digital multicast network Bounce TV. It is owned by Inyo Broadcast Holdings alongside Ion Television affiliate WIPX-TV (channel 63, also licensed to Bloomington). WCLJ-TV and WIPX-TV share offices on Production Drive (near I-74/I-465) in southwestern Indianapolis; through a channel sharing agreement, the two stations transmit using WIPX-TV's spectrum from an antenna on SR 252 in Trafalgar, Indiana.
History
The station was built by the Trinity Broadcasting Network (TBN) and first signed on the air on August 27, 1987.
TBN entered into an agreement with Ion Media Networks on November 14, 2017, which gave Ion the option to acquire the licenses of WCLJ-TV and three other TBN stations that had sold their spectrum in the Federal Communications Commission (FCC)'s spectrum auction. Ion exercised the option on May 24, 2018. The sale was completed on September 25, 2018, creating a duopoly with existing Ion Television station WIPX-TV. Ion immediately moved Ion Life (later Ion Plus) to the station in order to provide the network with full-market coverage equivalent to that of WIPX-DT1.
On February 27, 2021, the date Ion Plus ceased broadcasting, WCLJ switched to Bounce TV, sharing the affiliation with WNDY-DT2.
Technical information
On June 1, 2015, JUCE and Smile of a Child were consolidated into a single network on the third subchannel to accommodate the addition of a new network, TBN Salsa, on the fifth subchannel where Smile of a Child used to reside. As a result of the change, children's programming that previously aired on Smile of a Child was carried on 42.3 from 7 a.m. to 7 p.m. On April 1, 2018, the channel switched off its non-shared signal, leaving it to air only on its new frequency shared with WIPX-TV.
Analog-to-digital conversion
WCLJ-TV shut down its analog signal, over UHF channel 42, on February 17, 2009, earlier than the June 12, 2009, official date on which full-power television stations in the United States transitioned from analog to digital broadcasts under federal mandate. The station's digital signal relocated from its pre-transition UHF channel 56, which was among the high band UHF channels (52-69) that were removed from broadcasting use as a result of the transition, to its analog-era frequency, UHF channel 42.
References
External links
Bounce TV affiliates
Mass media in Indianapolis
Television channels and stations established in 1987
1987 establishments in Indiana
CLJ-TV
|
https://en.wikipedia.org/wiki/WMUN-LP
|
WMUN-LP was a low-power television station licensed to Muncie, Indiana. It was a repeater that broadcast programming from the Trinity Broadcasting Network, via satellite.
On August 12, 1980, the station signed on as W32AC, and was one of the first low-power TBN repeaters. The station later changed their callsign to WMUN-LP in 1995. WMUN-LP is owned by Full Gospel Business Men's Fellowship, International, who also owned another TBN affiliate, W57AO in Robinson, Illinois. That station went off the air on December 1, 2005.
The station ceased operations sometime during the week of July 18, 2010, according to an article in The Star Press. The station's license was cancelled by the Federal Communications Commission on October 25, 2011, and its call sign deleted from the FCC's database, due to the station having been silent for more than twelve months since October 1, 2010.
External links
Local TV station WMUN ending operations
Trinity Broadcasting Network affiliates
Muncie, Indiana
Television stations in Indiana
Television channels and stations established in 1980
Defunct television stations in the United States
Television channels and stations disestablished in 2010
1980 establishments in Indiana
2010 disestablishments in Indiana
MUN-LP
|
https://en.wikipedia.org/wiki/Jovem%20Pan
|
Jovem Pan is the main Brazilian radio station based in São Paulo, Brazil. It is also the largest network of radio stations of the southern hemisphere, of Latin America, and one of the biggest radio stations in the world. The network has several bureaus, 109 affiliated stations all over Brazil. Jovem Pan broadcasts through satellite digital quality sound reaching more than 25 million listeners, and throughout the world by the Internet.
History
1940s
Paulo Machado de Carvalho left the station in 1942, going to Rádio Record. The general direction was then assumed by Antonio Augusto Amaral de Carvalho (Tuta), current director president of REDE JOVEM PAN SAT, that at that time was only 21 years old. In that same year, Panamericana left São Bento Street and went to the 275 Riachuelo Street.
1950s
Years later, in 1953, Tuta left the broadcasting station to dedicate himself to TV Record, channel 7 of São Paulo, who were beginning transmissions. In 1954, Panamericana moved again to 713 Avenida Miruna, in the neighborhood of the Airport, where the Group of United Broadcasting stations resided.
1960s
In 1964, still linked to TV Record, Antonio Augusto Amaral de Carvalho assumed the direction of the broadcasting station again. The name Jovem Pan appeared in 1965, given by Paulo Machado de Carvalho. The great transformation of Panamericana began in 1966, under the direction of Tuta. Already with the name of Jovem Pan, to radio it began several programs with idols of the Brazilian popular music that, at that time, they made great success in TV Record. The journalistic programs were created in 1970, 71 and 72, period in that they appeared the Team Seven and Thirty, the Newspaper National Integration and, finally, the Newspaper of the Morning, that is a reference in the journalism of radio in every country until today.
1970s
In 1973, Antonio Augusto Amaral de Carvalho left TV Record to dedicate himself exclusively to Rádio Jovem Pan. In that same year, he acquired the actions of the siblings' broadcasting station Paulo Machado of Carvalho Filho and Alfredo de Carvalho, becoming its only proprietor. In 1976, Jovem Pan left the avenue Miruna and is now situated at 807 Avenida Paulista. In the same year, Jovem Pan FM was inaugurated, located in the same place.
2020s
It was described in 2021 as Brazil's largest conservative radio station.
In 27 October 2021, the Joven Pan Group launched a pay-tv news channel.
Jovem Pan News has been described as practicing partisan reporting in favor of the Republican Party, the Jair Bolsonaro administration, and conservative causes.
Jovem Pan FM stations
Alagoas
Jovem Pan FM - Maceió - 102,7 MHz
Amazonas
Jovem Pan FM - Manaus - 104,1 MHz
Bahia
Jovem Pan FM - Salvador - 91,3 MHz
Jovem Pan FM - Barreiras - 89,5 MHz
Jovem Pan FM - Eunápolis - 90,3 MHz
Jovem Pan FM - Feira de Santana - 100,9 MHz
Ceará
Jovem Pan FM - Fortaleza - 94,7 MHz
Jovem Pan FM - Jijoca de Jericoacoara - 91,7 MHz
Distrito Federal
Jovem Pan FM - Bra
|
https://en.wikipedia.org/wiki/Gautama%20Siddha
|
Gautama Siddha, (fl. 8th century) astronomer, astrologer and compiler of Indian descent, known for leading the compilation of the Treatise on Astrology of the Kaiyuan Era during the Tang dynasty. He was born in Chang'an, and his family was originally from India, according to a tomb stele uncovered in 1977 in Xi'an. The Gautama family had probably settled in China over many generations, and might have been present in China prior even to the foundation of the Tang dynasty. He was most notable for his translation of Navagraha calendar into Chinese. He also introduced Indian numerals with zero (〇) in 718 in China as a replacement of counting rods.
References
Footnotes
8th-century births
8th-century deaths
Chinese astrologers
Chinese people of Indian descent
8th-century Chinese astronomers
Indian astrologers
Writers from Xi'an
Tang dynasty writers
Scientists from Shaanxi
8th-century astrologers
Medieval Indian astrologers
8th-century Indian astronomers
8th-century Indian writers
8th-century Chinese translators
|
https://en.wikipedia.org/wiki/Boogie%20Wings
|
Boogie Wings (known in Japan as ) is a horizontally scrolling shooter released in arcades by Data East in 1992. The game was never ported to home systems.
Gameplay
The game is set around the time of World War I, where the player maneuvers biplanes, automobiles, animals, and various other unidentifiable objects to battle an army of mech-wielding scientists. One of the game's bosses is a giant robot Santa Claus.
The player uses the 8-way joystick to control the biplane's movements, and the 2 buttons to shoot or hook enemies. The biggest characteristic of the player's biplane is the hook attached to its rear section. The hook is also controlled by the joystick, and enemies or objects that come in contact with the hook are dragged along by the plane. Dragged objects cause damage to anything they collide with, and the player can release the objects on the hook by pressing the hook button again. Dragged objects are destroyed when the player releases them from the hook, or if they collide enough times to break apart.
The ship's power gauge increases when the player taps the shot button rapidly, and filling up the gauge causes the plane to shoot a bolt of lightning that covers a large area of the screen. However, the plane overheats if the player taps the shot button too many times, so this attack must be used sparingly.
The game's graphics are highly detailed, and many of the backgrounds are likened to European towns and cities or World's fair-like scenes. Many of the game's background objects can also be destroyed or dragged around with the hook.
Vehicles
Though the player's main vehicle is the biplane, they can still continue on foot if their plane is shot down. The player can attack with a handgun while on foot, and can also ride various vehicles found along the way to make the progress easier. The vehicles include various animals such as giraffes, elephants, and horses, pogo sticks, bicycles, motorcycles, jeeps, and several types of robots that can hop and shoot missiles. Though the biplane is by far the most effective unit in terms of game completion, the presence of the ground units adds another layer of amusement to the game.
Development
Rohga: Armor Force was developed and released in Japan by Data East a year prior to Boogie Wings, and the vehicles in Boogie Wings were derived from the gameplay in Rohga: Armor Force, where the player could continue on foot even after their robot was destroyed.
References
External links
Boogie Wings at Arcade History
1992 video games
Arcade video games
Arcade-only video games
Christmas video games
Data East video games
Horizontally scrolling shooters
Video games developed in Japan
Data East arcade games
Multiplayer and single-player video games
|
https://en.wikipedia.org/wiki/Pivoting
|
Pivoting may refer to:
The act of finding a pivot element
A type of computer security exploit
Pivoting (TV series), a 2022 Fox comedy series
See also
Pivot (disambiguation)
|
https://en.wikipedia.org/wiki/Brownout
|
Brownout may refer to:
Brownout (electricity), drop in voltage in an electrical power supply, so named because it typically causes lights to dim
Brownout (software engineering), a technique inspired by brownout in electricity, to make applications more tolerant to capacity shortages
Brownout (aeronautics), reduced flight visibility due to airborne particles, especially from helicopter downwash
Brownout (album), studio album by American band Head Set
Brownout (band), a band from Austin, Texas
See also
Blackout (disambiguation)
Whiteout (disambiguation)
Eddie Leonski (1917–1942), American soldier and serial killer, responsible for the strangling murders of three women in Melbourne, Australia, also known as "The Brownout Strangler"
|
https://en.wikipedia.org/wiki/Rail%20transport%20in%20Russia
|
Rail transport in Russia runs on one of the biggest railway networks in the world. Russian railways are the third longest by length and third by volume of freight hauled, after the railways of the United States and China. In overall density of operations (freight ton-kilometers + passenger-kilometers)/length of track, Russia is second only to China. Rail transport in Russia has been described as one of the economic wonders of the 19th, 20th, and 21st centuries.
JSC Russian Railways has a near-monopoly on long-distance train travel in Russia, with a 98.6% market share in 2017. Independent long-distance carriers include Grand Service Express TC, Tverskoy Express, TransClassService, Sakhalin Passenger Company, Kuzbass Suburb, and Yakutian Railway.
Characteristics
Russia is larger than both the United States and China in terms of total land area, therefore its rail density (rail tracking/country area) is lower compared to those two countries. Since Russia's population density is also much lower than that of China and the United States, the Russian railways carry freight and passengers over very long distances, often through vast, nearly empty spaces. Coal and coke make up almost one-third of the freight traffic and have average hauls of around 1,500 kilometers, while ferrous metals make up another 10 percent of freight traffic and travel an average of over 1,900 kilometers. Railroads are often key to getting supplies shipped to remote parts of the country as many people do not have access to other reliable means of shipping.
Like most railways, rail transport in Russia carries both freight and passengers. It is one of the most freight-dominant railways in the world, behind only Canada, the United States, and Estonia in the ratio of freight ton-kilometers to passenger-kilometers. However, per head of population intercity passenger travel is far greater than the United States (which has the lowest long-distance passenger train usages in the developed world).
Structure
Russia's railways are divided into seventeen regional railways, from the October Railway serving the St. Petersburg region to the Far Eastern Railway serving Vladivostok, with the free-standing Kaliningrad and Sakhalin Railways on either end. The regional railways were closely coordinated by the Ministry of the Means of Communication until 2003, and the Joint Stock Company Russian Railways since then – including the pooling and redistribution of revenues. This has been crucial to two long-standing policies of cross-subsidization: to passenger operations from freight revenues, and to coal shipments from other freight.
History
The Russian railways were a collection of mostly privately owned and operated companies during most of the 19th century, though many had been constructed with heavy government involvement and financing. The tsarist government began mobilizing and nationalizing the rail system as World War I approached, and the new communist government finished the nationalizat
|
https://en.wikipedia.org/wiki/Act-Fancer%3A%20Cybernetick%20Hyper%20Weapon
|
is a 1989 horizontally scrolling shoot 'em up arcade game developed and published by Data East. This game is third of Data East's 'Evolution Trilogy': first being Darwin 4078, second being SRD: Super Real Darwin. Unlike two predecessors, this game is a scrolling-platform run-n'-gun type game instead of vertical shooter.
Gameplay
It features a cyborg battling against alien creatures, while collecting power-ups and defeating bosses to advance levels.
Reception
In Japan, Game Machine listed Act-Fancer: Cybernetick Hyper Weapon on their June 15, 1989 issue as being the sixth most-successful table arcade unit of the month.
References
External links
Act-Fancer: Cybernetick Hyper Weapon at Data East Games
Act-Fancer: Cybernetick Hyper Weapon at arcade-history
1989 video games
Arcade video games
Arcade-only video games
Data East video games
Run and gun games
Shoot 'em ups
Video games about cyborgs
Video games developed in Japan
Data East arcade games
|
https://en.wikipedia.org/wiki/Listings%20magazine
|
A listings magazine is a magazine which is largely dedicated to information about the upcoming week's events such as broadcast programming, music, clubs, theatre and film information.
The BBC's Radio Times was the world's first listings magazine when it was founded in 1923 to compete with daily newspapers, which had hitherto fulfilled the role. In 1932, New York's Cue was the first city-specific listings magazine.
With the expansion of broadcast media many others have followed, expanding the format to include columns about media production and personalities, such as TV Hebdo (Québec) in Canada, TV Guide in the US and hundreds of others worldwide. Broadcast guides are normally published either with a Saturday or Sunday newspaper or are published weekly or fortnightly. It has become a highly competitive area of publishing.
Other listings magazines have started from a primary base in cultural events, such as Time Out magazine in the UK. Most major cities worldwide have one or many more such publications.
During the politically charged 1970s and 1980s, many of these magazines, in the UK at least, played a progressive role as part of the alternative press and had a reputation for leftward leaning investigative and campaigning journalism. They were some of the first consumer magazines to carry lists of "agitprop" events. City Limits was probably the most outspoken of all UK-based listings magazines but almost all followed Time Out’s lead of including space for lesbian and gay events and clubs. In certain areas of the UK which were previously dominated by the old guard of regional newspapers, which were traditionally more conservative in outlook, this was the first time that gay issues were put on a par with others - this was particularly true of Bristol's Venue, Southampton's Due South Magazine, and to a lesser extent Manchester's City Life where the local press (Manchester Evening News) had been at times at least, a little more tolerant.
In Italy the most important listing magazine has always been TV Sorrisi e Canzoni, with a weekly circulation of over 2 million in the late 80s.
References
Magazine genres
|
https://en.wikipedia.org/wiki/Splice%20%28system%20call%29
|
is a Linux-specific system call that moves data between a file descriptor and a pipe without a round trip to user space. The related system call moves or copies data between a pipe and user space. Ideally, splice and vmsplice work by remapping pages and do not actually copy any data, which may improve I/O performance. As linear addresses do not necessarily correspond to contiguous physical addresses, this may not be possible in all cases and on all hardware combinations.
Workings
With , one can move data from one file descriptor to another without incurring any copies from user space into kernel space, which is usually required to enforce system security and also to keep a simple interface for processes to read and write to files. works by using the pipe buffer. A pipe buffer is an in-kernel memory buffer that is opaque to the user space process. A user process can splice the contents of a source file into this pipe buffer, then splice the pipe buffer into the destination file, all without moving any data through userspace.
Linus Torvalds described in a 2006 email, which was included in a KernelTrap article.
Origins
The Linux splice implementation borrows some ideas from an original proposal by Larry McVoy in 1998. The splice system calls first appeared in Linux kernel version 2.6.17 and were written by Jens Axboe.
Prototype
ssize_t splice(int fd_in, loff_t *off_in, int fd_out, loff_t *off_out, size_t len, unsigned int flags);
Some constants that are of interest are:
/* Splice flags (not laid down in stone yet). */
#ifndef SPLICE_F_MOVE
#define SPLICE_F_MOVE 0x01
#endif
#ifndef SPLICE_F_NONBLOCK
#define SPLICE_F_NONBLOCK 0x02
#endif
#ifndef SPLICE_F_MORE
#define SPLICE_F_MORE 0x04
#endif
#ifndef SPLICE_F_GIFT
#define SPLICE_F_GIFT 0x08
#endif
Example
This is an example of splice in action:
/* Transfer from disk to a log. */
int log_blocks (struct log_handle * handle, int fd, loff_t offset, size_t size)
{
int filedes [2];
int ret;
size_t to_write = size;
ret = pipe (filedes);
if (ret < 0)
goto out;
/* splice the file into the pipe (data in kernel memory). */
while (to_write > 0) {
ret = splice (fd, &offset, filedes [1], NULL, to_write,
SPLICE_F_MORE | SPLICE_F_MOVE);
if (ret < 0)
goto pipe;
else
to_write -= ret;
}
to_write = size;
/* splice the data in the pipe (in kernel memory) into the file. */
while (to_write > 0) {
ret = splice (filedes [0], NULL, handle->fd,
&(handle->fd_offset), to_write,
SPLICE_F_MORE | SPLICE_F_MOVE);
if (ret < 0)
goto pipe;
else
to_write -= ret;
}
pipe:
close (filedes [0]);
close (filedes [1]);
out:
if (ret < 0)
return -errno;
return 0;
}
Complementary system calls
is one of three system calls that complete the architecture. can map an applic
|
https://en.wikipedia.org/wiki/Bally%20Sports%20Detroit
|
Bally Sports Detroit (BSD) is an American regional sports network owned by Diamond Sports Group that operates as a Bally Sports affiliate. It provides coverage of local sports teams in the state of Michigan, primarily focusing on those in Metro Detroit. The network airs exclusive broadcasts of games involving the Detroit Tigers, Detroit Pistons, and Detroit Red Wings; repeats of Detroit Lions preseason games; and some state college and high school sports.
Bally Sports Detroit is available on cable television throughout Michigan, as well as in northeastern Indiana, northwest Ohio and some portions of northeastern Wisconsin and nationwide on satellite via DirecTV. Bally Sports Detroit is available for streaming through DirecTV Stream and FuboTV. The network's production facilities and offices are based in Southfield, Michigan, with master control operations based at the Sinclair Broadcast Group Media Operations Center in Atlanta, Georgia. The network also maintains dedicated remote sets in the concourses of Comerica Park and Little Caesars Arena.
History
Beginnings
Bally Sports Detroit traces its origins to 1996, when News Corporation purchased 50% of the Prime Network, a group of regional sports networks owned by Liberty Media, and immediately rebranded them under the "Fox Sports Net" banner. At the time of the purchase, Post-Newsweek Stations (owners of Detroit NBC affiliate WDIV-TV, channel 4) owned the Detroit-based Pro-Am Sports System (PASS Sports), which served the local affiliate of the Prime Network. News Corporation announced plans to launch a Fox Sports Net affiliate in Michigan, and made a surprise bid for, and won, the local cable television rights to NBA games involving the Detroit Pistons.
When PASS Sports' respective National Hockey League and Major League Baseball broadcast rights to the Detroit Red Wings and Detroit Tigers franchises came up for renewal, Fox Sports Net made a bid for the contracts and won them both. Fox Sports decided to push the launch date of the new channel forward in time for the beginning of the 1997–98 NHL season and 1998 MLB season; Fox Sports Detroit began broadcasting on September 17, 1997. Post-Newsweek, meanwhile, concluded that its coverage area was not large enough to support two RSNs and sold the remainder of its Tigers and Pistons contracts, and the contract of sportscaster John Keating, to Fox Sports Detroit. Post-Newsweek shut down PASS Sports on October 31, 1997, leaving Fox Sports Detroit as the sole regional sports network in Michigan.
Studios
From its launch until January 16, 2008, Fox Sports Detroit broadcast its studio shows out of FSN Northwest's facilities in Bellevue, Washington. On October 1, 2009, the network unveiled a new all-digital high definition-capable studio in its Southfield headquarters dubbed the "Call Sam Studio", named after its sponsor, the Sam Bernstein Law Firm. It serves as the production base of the pre-game/post-game shows Tigers Live, Pistons Live and Red Wings
|
https://en.wikipedia.org/wiki/NeXT%20MegaPixel%20Display
|
The NeXT MegaPixel Display is a range of CRT-based computer monitors manufactured and sold by NeXT for the NeXTcube and NeXTstation workstations, designed by Hartmut Esslinger/Frog Design Inc.
Description
The original MegaPixel Display released in 1990 was a monochrome 17" monitor displaying four brightness levels (black, dark gray, light gray, and white) in a fixed resolution of 1120 × 832 at 92 DPI (just shy of a true megapixel at 931,840 total pixels) at 68 Hz.
It integrated a mono microphone, mono speaker, stereo RCA sockets, a 3.5 mm headphone socket and a socket for the keyboard (which in turn provided a socket for the mouse). A unique feature was that the monitor was connected to the computer by a single 6 foot cable which provided power, video signals and the aforementioned signals.
A severe problem with this setup was that the monitor could not be switched off completely while the computer was powered on. The screen could be switched black but the cathode heater always remained on. This led to extreme screen dimming after some years of use, especially when the computer was not turned off overnight as in a server setup or in a busy software lab.
This problem was later rectified with the now ultra rare 4000A model rated at 10,000 hours (~14 months).
The display has a stand that allows it to be tilted. The stand also features two rollers that can be used to move the monitor back and forth despite its heavy weight. The stand also provides a place for the keyboard when not in use, freeing up the (real) desktop in front.
When the NeXTstation Color and the NeXTdimension board were released, NeXT sold rebranded color monitors (e.g. Sony Trinitron) with 13W3 connectors as MegaPixel Color Display in either 17" or 21". Remaining connections (formerly built into the MegaPixel Display) were provided via a DB-19 Y-cable to a separate box, the NeXT Sound Box.
The cost for the 17" MegaPixel Color Display was , with the MegaPixel Display costing .
Specifications
From the NeXT User's Reference:
Monitor
17-inch monochrome
Flat screen
1120 × 832 × 2 resolution (92 dpi)
Four colors (black and white and two levels of gray)
Refresh rate of 68 Hz noninterlaced
Integrated tilt and roll
Interfaces
Keyboard jack
8-bit, 8012.8 Hz analog to digital input via microphone miniphone jack (mono)
16-bit, 44.1 kHz stereo digital-to-analog converter
output via:
Headphone miniphone jack (stereo)
Gold plated RCA line-out jacks (stereo)
Integrated speaker (mono)
Keyboard and Mouse
85 keys including:
cursor keys, numeric pad
Monitor brightness, sound volume
Power on/off
Two button opto mechanical Mouse
Dimensions
16 in (w) × 17.3 (h) × 14 (d)
408 mm (w) × 440 (h) × 354 (d)
50 lb (23 kg)
References
External links
NeXTComputers.org
US Patent D312,629 monitor design
US Patent D312,630 monitor and stand design
US Patent D317,760 stand design
US Patent D317,291 cable design
Computer monitors
NeXT
|
https://en.wikipedia.org/wiki/Pseudo-top-level%20domain
|
A pseudo-top-level domain is a label or name for a computer network that is not participating in the world-wide official Domain Name System and may not even participate in the Internet, but may use a similar domain name hierarchy. Historically the best known large networks in this group were .bitnet, .csnet, .oz, and .uucp, for which many Internet mail forwarders provided connectivity. In addition, newer networks like .exit, .i2p, may be included. (Newest draft of the proposal expired on July 28, 2015 without becoming a standard.) Some domains such as .onion later become officially recognised.
Although these networks or domain names have no official status, some are generally regarded as having been unofficially grandfathered, and are unlikely ever to be allocated as top-level domains.
Pseudo-top-level domains are also sometimes used for fictitious domain names in video games and other media in order to prevent practical jokers and curious people from either bothering websites and organizations by reaching the domains they see in works of fiction, or registering the domain name in an attempt of cybersquatting.
See also
Alternative DNS root
.local
.arpa
References
|
https://en.wikipedia.org/wiki/Last%20man%20standing%20%28video%20games%29
|
Last man standing (LMS) or last team standing (LTS) is a multiplayer deathmatch gameplay mode featured in some first-person shooter computer and video games, and is also the essence of battle royale games. The aim of a player in a last man standing match is to neutralize their opponents and remain the sole survivor; the basic rules followed are generally the same of the death-match game type, with an important difference: respawn is limited or not allowed at all. Each player is assigned a specific number of lives per match (or just one when there is no respawn); once these lives have been expended, the player will no longer be able to return to the current match and remain as an invisible spectator until there is a winner and the LMS round is over. Within several games players are called to buy or pick up items, while other titles will have the players spawned with full weapons and ammo and there are no powerups available on the map.
Several different variations of the last man standing mode exist, with the most common being team LMS. The rules are the same of the standard LMS and the winning team is the one able to eliminate all the members of the opposing teams and keep at least one of its components alive.
The first last-man-standing video game with a shrinking play zone was the 1983 action game Bomberman.
See also
Battle royale game
References
Esports terminology
|
https://en.wikipedia.org/wiki/Tonnetz
|
In musical tuning and harmony, the (German for 'tone network') is a conceptual lattice diagram representing tonal space first described by Leonhard Euler in 1739. Various visual representations of the Tonnetz can be used to show traditional harmonic relationships in European classical music.
History through 1900
The Tonnetz originally appeared in Leonhard Euler's 1739 . Euler's Tonnetz, pictured at left, shows the triadic relationships of the perfect fifth and the major third: at the top of the image is the note F, and to the left underneath is C (a perfect fifth above F), and to the right is A (a major third above F). The Tonnetz was rediscovered in 1858 by Ernst Naumann, and was disseminated in an 1866 treatise of Arthur von Oettingen. Oettingen and the influential musicologist Hugo Riemann (not to be confused with the mathematician Bernhard Riemann) explored the capacity of the space to chart harmonic motion between chords and modulation between keys. Similar understandings of the Tonnetz appeared in the work of many late-19th century German music theorists.
Oettingen and Riemann both conceived of the relationships in the chart being defined through just intonation, which uses pure intervals. One can extend out one of the horizontal rows of the Tonnetz indefinitely, to form a never-ending sequence of perfect fifths: F-C-G-D-A-E-B-F♯-C♯-G♯-D♯-A♯-E♯-B♯-F𝄪-C𝄪-G𝄪- (etc.) Starting with F, after 12 perfect fifths, one reaches E♯. Perfect fifths in just intonation are slightly larger than the compromised fifths used in equal temperament tuning systems more common in the present. This means that when one stacks 12 fifths starting from F, the E♯ we arrive at will not be seven octaves above the F we started with. Oettingen and Riemann's Tonnetz thus extended on infinitely in every direction without actually repeating any pitches. In the twentieth century, composer-theorists such as Ben Johnston and James Tenney continued to developed theories and applications involving just-intoned Tonnetze.
The appeal of the Tonnetz to 19th-century German theorists was that it allows spatial representations of tonal distance and tonal relationships. For example, looking at the dark blue A minor triad in the graphic at the beginning of the article, its parallel major triad (A-C♯-E) is the triangle right below, sharing the vertices A and E. The relative major of A minor, C major (C-E-G) is the upper-right adjacent triangle, sharing the C and the E vertices. The dominant triad of A minor, E major (E-G♯-B) is diagonally across the E vertex, and shares no other vertices. One important point is that every shared vertex between a pair of triangles is a shared pitch between chords - the more shared vertices, the more shared pitches the chord will have. This provides a visualization of the principle of parsimonious voice-leading, in which motions between chords are considered smoother when fewer pitches change. This principle is especially important in analyzing the music
|
https://en.wikipedia.org/wiki/Supra%20Corporation
|
Supra Corporation was best known as a manufacturer of modems for personal computers, but also produced a range of hardware for the Amiga and Atari ST, including hard drives, SCSI controllers, memory boards, and processor accelerators.
They were purchased by Diamond Multimedia in 1995.
Early history
The company was founded by John Wiley and Alan Ackerman as Microbits Peripheral Products (MPP), a provider of interface products for the Atari 8-bit family. The two of them were friends in high school when they developed various computer hardware for the school computers, and were best known for a 300 baud modem and a printer interface. The company was successful for some time, but a number of factors led to its bankruptcy around 1986, and its reformation as Supra, initially selling hard drives for the Atari ST. Originally from Albany, Oregon, they later moved to Vancouver, Washington.
SupraFAXModem 14400
In 1991 the company arranged a deal with Rockwell International to use their new V.32bis 14,400 bit/s modem chips with an exclusivity arrangement. Their SupraFAXModem 14400 was sold at prices points about half that of the slower 9600 V.32 models of the same era, and its introduction led to a rapid downward spiral in modem pricing.
Notable Dates
1986 - Supra introduces a 10 MB hard drive for the Atari ST.
1987 - Supra introduces the Supra Modem 2400 at $179.
1991 - Supra introduces the SupraFAXModem 14400 at $399 and the SupraFAXModem V.32 at $299.
1994 - Supra purchases PSI Integration
1994 - Supra ships First 28.8 Modem
1994 - Supra ships First Voice Modem
1995 - Supra purchased by Diamond Multimedia
1999 - S3 Graphics purchases Diamond Multimedia
Products
Supra Modems
Supra Voice Modems
Software
FAXCilitate
Supra VoiceMail
References
External links
List of Supra products for the Amiga
Defunct computer hardware companies
Companies based in Albany, Oregon
Defunct computer companies of the United States
|
https://en.wikipedia.org/wiki/KEUV-LD
|
KEUV-LD (channel 35) is a low-power television station in Eureka, California, United States, affiliated with the Spanish-language Univision network. It is owned by Sinclair Broadcast Group alongside low-power dual CW+/MyNetworkTV affiliate KECA-LD (channel 29) and Arcata-licensed ABC affiliate KAEF-TV (channel 23). Sinclair also operates Eureka-licensed Fox affiliate KBVU (channel 28) under a local marketing agreement (LMA) with Cunningham Broadcasting; however, Sinclair effectively owns KBVU as the majority of Cunningham's stock is owned by the family of deceased group founder Julian Smith. The four stations share studios on Sixth Street in downtown Eureka; KEUV-LD's transmitter is located along Barry Road southeast of Eureka.
Although identifying as a separate station in its own right, KEUV-LD is considered a semi-satellite of KUCO-LD (channel 27) in Chico. It simulcasts all Univision network programming as provided by its parent but airs separate local commercials and station identifications. Master control operations are based at the facilities of sister station and ABC affiliate KRCR-TV (channel 7) on Auditorium Drive in Redding.
History
KEUV was founded in 1994 by Sainte Partners II, L.P. It is the first and only Spanish-language television station in Eureka.
On April 21, 2017, Sinclair Broadcast Group purchased KBVU as part of a four-station deal. The sale was completed September 1.
In spring 2020, KEUV-LP turned off its analog signal and flash cut to digital on channel 31. The station was licensed for digital operation on April 5, 2021, changing its call sign to KEUV-LD.
Technical information
Subchannel
Translator
References
EUV-LD
Television channels and stations established in 1994
1994 establishments in California
Univision network affiliates
EUV-LD
Sinclair Broadcast Group
Low-power television stations in California
|
https://en.wikipedia.org/wiki/Prosopography%20of%20Anglo-Saxon%20England
|
The Prosopography of Anglo-Saxon England (PASE) is a database and associated website that aims to construct a prosopography of individuals within Anglo-Saxon England. The PASE online database presents details (which it calls factoids) of the lives of every recorded individual who lived in, or was closely connected with, Anglo-Saxon England from 597 to 1087, with specific citations to (and often quotations from) each primary source describing each factoid.
PASE was funded by the British Arts and Humanities Research Council from 2000 to 2008 as a major research project based at King's College London in the Department of History and the Centre for Computing in the Humanities (now the Department of Digital Humanities), and at the Department of Anglo-Saxon, Norse and Celtic, University of Cambridge.
The first phase of the project (PASE1) was launched at the British Academy on 27 May 2005 and is freely available on the Internet at www.pase.ac.uk. This covers individuals named in written sources up to 1066, and contains 11,758 individuals. Each person is assigned a number, to aid the ready identification of individuals in future scholarship- e.g. King Alfred the Great is denoted as Alfred 8. Each named individual is accompanied by the various spellings of their name as it appears in the written sources, along with factoids on their career and personal relationships where this can be determined.
A second phase (PASE2), released on 10 August 2010, added information drawn chiefly from Domesday Book to the database. This includes 19,807 named individuals. The landholdings of these individuals are mapped, along with a table illustrating their named landholdings. In cases where enough information is possible, a small prose biography is provided.
A number of publications have resulted from the creation of the PASE database - these are listed on the site.
The PASE database is dedicated to professor Nicholas Brooks and Ann Williams.
Directors
Dame Janet 'Jinty' Nelson
Simon Keynes
Harold Short
Stephen Baxter
See also
Anglo-Saxons
Prosopography of the Byzantine World
References
External links
Department of Anglo-Saxon Norse and Celtic, University of Cambridge
Department of Digital Humanities, KCL
Historiography of England
Databases in England
Anglo-Saxon studies scholars
King's College London
Organisations associated with the University of Cambridge
Research projects
Online databases
Prosopography
|
https://en.wikipedia.org/wiki/Network%20Computing%20System
|
The Network Computing System (NCS) was an implementation of the Network Computing Architecture (NCA). It was created at Apollo Computer in the 1980s. It comprised a set of tools for implementing distributed software applications, or distributed computing.
The design and implementation of DCE/RPC, the remote procedure call mechanism in the Distributed Computing Environment, is based on NCA/NCS. It also was the first implementation of Universally unique identifiers.
References
Bibliography
Lyons, Tom (1991). Network Computing System Tutorial. Hewlett-Packard Company, New Jersey: Prentice Hall.
P. Leach et al. (2005). RFC 4122 — A Universally Unique IDentifier (UUID) URN Namespace. Internet Engineering Task Force.
Internet Protocol based network software
|
https://en.wikipedia.org/wiki/ICONIX
|
ICONIX is a software development methodology which predates both the Rational Unified Process (RUP), Extreme Programming (XP) and Agile software development. Like RUP, the ICONIX process is UML Use Case driven but more lightweight than RUP. ICONIX provides more requirement and design documentation than XP, and aims to avoid analysis paralysis. The ICONIX Process uses only four UML based diagrams in a four-step process that turns use case text into working code.
A principal distinction of ICONIX is its use of robustness analysis, a method for bridging the gap between analysis and design. Robustness analysis reduces the ambiguity in use case descriptions, by ensuring that they are written in the context of an accompanying domain model. This process makes the use cases much easier to design, test and estimate.
The ICONIX Process is described in the book Use Case Driven Object Modeling with UML: Theory and Practice.
Essentially, the ICONIX Process describes the core "logical" analysis and design modeling process. However, the process can be used without much tailoring on projects that follow different project management.
Overview of the ICONIX Process
The ICONIX process is split up into four milestones. At each stage the work for the previous milestone is reviewed and updated.
Milestone 1: Requirements review
Before beginning the ICONIX process there needs to have been some requirements analysis done. From this analysis use cases can be identified, a domain model produced and some prototype GUIs made.
Milestone 2: Preliminary Design Review
Once use cases have been identified, text can be written describing how the user and system will interact. A robustness analysis is performed to find potential errors in the use case text, and the domain model is updated accordingly. The use case text is important for identifying how the users will interact with the intended system. They also provide the developer with something to show the Customer and verify that the results of the requirements analysis were correct
.
Milestone 3: Detailed Design Review
During this stage of the ICONIX process the domain model and use case text from milestone 2 are used to design the system being built. A class diagram is produced from the domain model and the use case text is used to make sequence diagrams.
Milestone 4: Deployment
Unit tests are written to verify the system will match up to the use case text, and sequence diagrams. Finally code is written using the class and sequence diagrams as a guide.
References
1. Rosenberg, D. & Stephens, M. (2007). Use Case Driven Object Modeling with UML: Theory and Practice. Apress. ()
2. Rosenberg, D., Stephens, M. & Collins-Cope, M. (2005). Agile Development with ICONIX Process. Apress. ()
Related Concepts
Dynamic Systems Development Method (DSDM)
Extreme Programming
Rational Unified Process
Robustness diagram
URDAD, the Use Case Driven Analysis and Design methodology is a methodology for technology neutral
|
https://en.wikipedia.org/wiki/Desafio%20de%20Estrellas
|
Desafío de Estrellas is a Mexican musical show produced and distributed by TV Azteca, the second most important network in the country. The format of the Desafío is similar to American Idol with contestants eliminated every week and a grand finale with the top contestants competing to win the first place prize. TV Azteca has, until 2006, produced two versions of the program, one in 2003 and the other in 2006. The 2003 version consisted only of former contestants of La Academia, another TV Azteca-produced show which had already garnished two seasons and, in the process, taken away rating from Televisa, the prime network of the country. The 2006 version, on the other hand, consisted of both former contestants of La Academia (all four seasons), as well as other artists produced by TV Azteca in the middle and late '90s, later in 2009 a third season took place with former contestants of the six seasons of la academia.
All the Desafíos de Estrellas
Desafío de Estrellas 2003
Participants - 32
Winner - Yahir
Runner-Up - Nadia
Third Place - Myriam
Fourth Place - Erika
Fifth Place - Estrella
The 2003 version of the Desafío de Estrellas was announced right after the end of the second generation of La Academia. The 32 contestants which made up both generations would go on head-to-head to see what generation would get the best place. This expected competition was non-existent, as the participants of the 2nd generation were eliminated swiftly. Of the top 10 singers chosen by the public, only 1 had come out of the second generation, Erika, who would go on to become the fourth place of the competition. With a total of 15 concerts and above good ratings, TV Azteca confirmed its strong hold on the Mexican public.
Contestants
Concerts
Concert 1- The first concert saw the elimination of 10 artists, 7 of which were from the second generation (Elisa, Gisela, Karla, Mauricio, Fabricio, Víctor and Marvin), while only 3 were from the first (Wendolee, Alejandro and Jose Antonio).
Concert 2- The second concert saw no eliminations, however, this concert was marked by the clear dominance of the first generation singers who received well better critics from the judges than the second generation singers. The best interpretation of the night was "El Me Mintio" by Myriam and Erika (winners of the first and second generations, accordingly) who would go on to become finalists and lead successful solo careers.
Concert 3- The third concert was characterized by the elimination of most of what was left of the second generation, as six of the remaining eleven artists were eliminated (Andrea, Ana Lucía, Alejandra, Adrián, Azeneth and Enrique). 11 singers of the first generation still remained.
Concert 4- María Inés (1st Generation) who had sung "7 de Septiembre", by Mecano, and received fairly good critics was eliminated.
Concert 5- Víctor, winner of the 2nd place in the first generation, and one of the favorites in the competition decided to quit, as medical reasons disabled hi
|
https://en.wikipedia.org/wiki/Jay%20S.%20Walker
|
Jay Scott Walker (born November 5, 1955) is an American entrepreneur and chairman of Walker Digital, a privately held research and development lab focused on using digital networks to create new business systems. Walker is also curator of TEDMED since 2011, and a founder of Priceline.com (now known as Booking Holdings) and Synapse Group, Inc. In 2000, Forbes estimated his net worth at $1.6 billion. By October 2000, his estimated worth was down to $333 million. As of 2013, he is not on the Forbes list of the world's billionaires.
A 1999 Forbes profile of Walker noted his reliance on patents as a business model. When developing patents, Walker uses a methodology that streamlines the process of identifying problems and developing their solutions. By pulling apart and eliminating "false problems", the methodology identifies solutions, which - according to Walker - have sustainable components that can lead to a long-term sustainable business. Walker owns 12 business method patents and 240 others pending.
Early life
Walker attended Cornell University where he majored in Industrial and Labor Relations and was a member of the Quill and Dagger society and the Sigma Phi Society. He graduated with a bachelor's degree in 1978.
While at Cornell, Walker was president of the Ivy League Monopoly Association, and co-authored the book 1000 Ways to Win Monopoly Games, with future Cornell president Jeffrey S. Lehman. This drew the ire of Parker Brothers, who threatened legal action and denied Walker admission to its sanctioned Monopoly tournaments. This in turn led Walker to join forces with Ralph Anspach, the inventor of Anti-Monopoly, who was also engaged in a legal battle with Parker Brothers.
Business career
Synapse
In 1992 Walker and Michael Loeb co-founded New Sub Services, today known as Synapse Group, a company that used the credit card network to process magazine subscriptions. By 1998 Synapse had sold 30 million magazine subscriptions, with sales approaching $300 million. For his work, Walker won the Direct Marketing Association’s "Direct Marketer of the Year" award in 1999. In 2004, and again in 2005, Synapse was named one of the 25 "Best Places to Work in America" among medium-sized companies by the Great Place to Work Institute. Synapse employs more than 250 people.
In 2001 Time Warner purchased a controlling stake in Synapse for a sum in excess of $500 million, completing the transaction in 2006.
Priceline
Walker Digital launched Priceline.com in 1998, partially self-funding the startup company. Loeb also assisted with the early funding of Priceline. Priceline sold an estimated 40,000 tickets in its first quarter of operation. In 1999, Priceline went public. Walker left Priceline in late 2000. The two patents that protected Priceline.com was said to be worth $18.5 billion at the time.
Partnership with IGT
In 2006 Walker Digital entered into a strategic partnership with International Game Technology (IGT), the world’s largest manufacturer of
|
https://en.wikipedia.org/wiki/Casper%27s%20Haunted%20Christmas
|
Casper's Haunted Christmas is a 2000 computer-animated Christmas supernatural black comedy film produced by Harvey Comics and Mainframe Entertainment, based on the character Casper the Friendly Ghost, and was released by Universal Studios Home Video on October 31, 2000 (Halloween). Unlike either its theatrical or two direct-to-video predecessors, which combined live-action and CGI, the film was fully made in computer animation. It stars Brendon Ryan Barrett (who previously starred in Casper: A Spirited Beginning as a different character) as the voice of the title character. Randy Travis provided original music.
Plot
After a scaring spree at a drive-in theater, the Ghostly Trio's are confronted by Casper who is then confronted by Officer Snivel who informs him that his scare quota is down. The Trio take Snivel's whistle and blow it which summons Kibosh, the perfidious King of Ghosts, who decrees that Casper must scare someone before Christmas Day, according to ghost law which requires him to purposely scare at least one person a year, or he will be banished to the Dark, together with his uncles, for their failed responsibility for him, for all eternity. To make sure Casper scares someone, he confiscates the Trio's haunting licenses and flings them to the Christmas-influenced town Kriss, Massachusetts, on account of the Trio's hatred of the holiday, where they meet the Jollimore Family. When Casper's good behavior starts to act up, which includes befriending the daughter of the family, Holly, the Ghostly Trio call in Casper's lookalike cousin Spooky, who brings along his girlfriend Poil, to do the job disguised as Casper in the hope of fooling Kibosh.
With Casper and Spooky unlikely to scare someone after a series of failed attempts the Trio decide to plot a scaring spree stealing every Christmas present in Kriss, in a reference to How the Grinch Stole Christmas, and taking them to the Jollimores' house where they plan to lure the townspeople then set off scary booby traps to go out with a bang before being banished to the Dark. Casper along with Spooky and Poil scare the Trio using a fake Kibosh made from the Jollimores' giant Santa. Casper then summons the real Kibosh using Snivel's whistle to inform him he scared the Trio, fulfilling his ghostly obligation, but Snivel informs Kibosh of the booby traps, violating the no scaring order on the Trio. To prevent Kibosh from banishing them to the Dark, the Trio claim they intend to spring the traps on themselves to entertain Kibosh. After the act, Kibosh accepts the Trio's claim and returns their haunting licenses before leaving with Snivel. The film ends with the remaining ghosts celebrating Christmas with the Jollimore family.
Cast
Crew
Ian Boothby - Co-writer
Roger Fredericks - Co-writer
Kris Zimmerman - Voice Director
Byron Vaughns - Producer
Owen Hurley - Director
Marketing
In the United States Baskin Robbins, whose logo is featured on an ice cream store in the film, made a tie-in promot
|
https://en.wikipedia.org/wiki/Write%20barrier
|
In operating systems, write barrier is a mechanism for enforcing a particular ordering in a sequence of writes to a storage system in a computer system. For example, a write barrier in a file system is a mechanism (program logic) that ensures that in-memory file system state is written out to persistent storage in the correct order.
In Garbage collection
A write barrier in a garbage collector is a fragment of code emitted by the compiler immediately before every store operation to ensure that (e.g.) generational invariants are maintained.
In Computer storage
A write barrier in a memory system, also known as a memory barrier, is a hardware-specific compiler intrinsic that ensures that all preceding memory operations "happen before" all subsequent ones.
See also
Native Command Queuing
References
External links
Barriers and journaling filesystems (LWN.net, May 21, 2008)
Compilers
Memory management
|
https://en.wikipedia.org/wiki/CMAA
|
CMAA may refer to:
Computer Graphics
Conservative Morphological Anti-Aliasing, an AA technique that is almost as fast as FXAA (Fast Approximate Anti-Aliasing) but with much less blurring.
Organizations
California Museum of Ancient Art
Cambodian Mine Action and Victim Assistance Authority
Church Music Association of America, the association of Catholic musicians
Club Managers' Association Australia, an Australian trade union
Club Managers Association of America, professional association for managers of membership clubs
Comics Magazine Association of America, a United States organization to regulate the content of comic books
Construction Management Association of America
Country Music Association of Australia
Crane Manufacturer's Association of America, a trade organization of leading electric overhead traveling crane manufacturers in the United States
Music
Country Music Awards of Australia
|
https://en.wikipedia.org/wiki/Signal%20Transfer%20Point
|
A Signal Transfer Point (STP) is a node in an SS7 network that routes signaling messages based on their destination point code in the SS7 network. It works as a router that relays SS7 messages between signaling end-points (SEPs) and other signaling transfer points (STPs). Typical SEPs include service switching points (SSPs) and service control points (SCPs). The STP is connected to adjacent SEPs and STPs via signaling links. Based on the address fields of the SS7 messages, the STP routes the messages to the appropriate outgoing signaling link. Edge STPs can also route based upon message body content using deep packet inspection techniques, and can provide address translations and screen content to limit the transfer of messages with dubious content or sent from unreliable sources. To meet stringent reliability requirements, STPs are typically provisioned in mated pairs.
These 'routers' are connected just by signaling links; they do not have users attached (where a user could be a mobile station (MS), a PSTN user in case of a public terrestrial network, or a piece of terminal equipment at the end of an ISDN B channel). SEPs send signaling messages to other SEPs, but the messages are normally routed via the SEP's adjacent STPs. An STP's main function is to identify the best path for two SEPs to communicate. A typical application would be for two SEPs to agree on the use of a shared data path (e.g., using ISUP to initiate a voice call between a user on one SEP and a user on the second SEP). In this way, STPs route signaling messages (for starting, maintaining or finishing any kind of calls originated by the SEPs' attached users) while avoiding disabled intermediary STPs.
A signaling message typically never goes directly from a given SEP to the destination SEP: the message would normally have to pass through the initiating SEP's adjacent STP so that it can be routed to the destination SEP. In some applications, however, SEPs might be directly connected with signaling links; this would typically be done to enhance robustness or performance between two critical SEPs. Such mesh network configurations are also common in Europe, where STPs have not found widespread deployment.
In some cases, signaling messages can be originated by the STP to learn about the state of the signaling network. Some examples include:
an STP may send route set test messages to probe the availability of a particular SEP;
it may send low-level MTP messages to an adjacent signaling point to check the Bit Error Rate (BER) on a particular signaling link; or
it may let other adjacent signaling points know that it is going out of service; in this way, the adjacent signaling points will try to avoid this OOS STP.
A given piece of equipment can implement both SEP and STP functionality. This is commonly done in some SSPs. This is also seen in Signaling Gateways that also have Application Server (AS) functionality as defined by the IETF.
Some UMTS number portability solutions are i
|
https://en.wikipedia.org/wiki/David%20Cubberley
|
David Cubberley is a Canadian politician, active in municipal, regional and provincial issues since 1990. He is an advocate of cycling trail networks for commuters and recreation, protection of farmland, sustainable transportation, and advocacy for chronic Lyme disease.
Career
David Cubberley's political career began in 1990 as a Saanich councillor. He was elected to Saanich Council four times between 1990 and 2002 and chaired the Saanich finance committee for the last five years. While on council Cubberley chaired the Bicycle Advisory Committee and task forces on Lochside Drive, West Saanich Road Streetscape and Monster Houses. He was also the originator of Saanich's Centennial Trails project, created to mark Saanich's 100th birthday in 2006.
In 2002 Cubberley was elected to the Capital Regional District board, where he chaired the Environment Committee for two years. He also served as CRD Water Commissioner and on the Regional Planning Committee.
In 2005 Cubberley was elected as the MLA for the riding of Saanich South, representing the BC NDP, and defeated Susan Brice of the BC Liberals. He served as the Opposition Critic for Health and later as Critic for Education. As Deputy Chair of the Standing Committee on Health, he helped produce a report on prevention of childhood obesity and physical inactivity. Cubberley retired from provincial politics in 2009.
In 2011, David Cubberley ran for Mayor of Saanich against incumbent Frank Leonard. Local news dubbed Cubberley the strongest challenger for the mayor's chair Leonard faced in 15 years. The election was held Saturday, November 19, 2011, with Leonard garnering 53.48% of the vote and Cubberley 45.69%. Only one in four eligible Saanich voters cast their ballots, a slight increase from 2008 turnout of 20.6%.
External links
Official Website (archived copy)
David Cubberley at Blogger
Biography (38th Parliament of the Legislative Assembly of British Columbia)
References
Living people
British Columbia New Democratic Party MLAs
British Columbia municipal councillors
1947 births
21st-century Canadian politicians
|
https://en.wikipedia.org/wiki/Index%20Translationum
|
The Index Translationum is UNESCO's database of book translations. Books have been translated for thousands of years, with no central record of the fact. The League of Nations established a record of translations in 1932. In 1946, the United Nations superseded the League and UNESCO was assigned the Index. In 1979, the records were computerised.
Since the Index counts translations of individual books, authors with many books with few translations can rank higher than authors with a few books with more translations. So, for example, while the Bible is the single most translated book in the world, it does not rank in the top ten of the index. The Index counts the Walt Disney Company, employing many writers, as a single writer. Authors with similar names are sometimes included as one entry, for example, the ranking for "Hergé" applies not only to the author of The Adventures of Tintin (Hergé), but also to B.R. Hergehahn, Elisabeth Herget, and Douglas Hergert. Hence, the top authors, as the Index presents them, are from a database query whose results require interpretation.
According to the Index, Agatha Christie remains the most-translated individual author.
Statistics
Source: UNESCO
Top 10 Author
Top 10 Country
Top 10 Target Language
Top 10 Original language
See also
UNESCO Collection of Representative Works, UNESCO's program for funding the translation of works
List of literary works by number of translations
References
External links
Index Translationum
Index Translationum: Statistics - Search forms
Online databases
Indexes
Translation databases
|
https://en.wikipedia.org/wiki/Tunica%20vasculosa%20lentis
|
The tunica vasculosa lentis is an extensive capillary network, spreading over the posterior and lateral surfaces of the lens of the eye. It disappears shortly after birth.
See also
Persistent tunica vasculosa lentis
References
Human eye anatomy
|
https://en.wikipedia.org/wiki/Andrei%20Toom
|
Andrei Leonovich Toom (in Russian: Андрей Леонович Тоом), also known as André Toom, (1942 Tashkent, Soviet Union - 2022 New York, USA) was a mathematician known for the Toom–Cook algorithm and Toom's rule. Toom was a retired professor of the statistics department at Federal University of Pernambuco in Brazil. Toom died of prolonged illness in New York.
Toom was a student of Ilya Piatetski-Shapiro.
References
Andrei Toom's personal website
Andrei Toom's Curriculum Vitae (English)
Andrei Toom's Curriculum Vitae (Portuguese)
1942 births
2022 deaths
20th-century Russian mathematicians
21st-century Russian mathematicians
Cellular automatists
Probability theorists
Soviet mathematicians
Scientists from Tashkent
|
https://en.wikipedia.org/wiki/Economics%20of%20security
|
The economics of information security addresses the economic aspects of privacy and computer security. Economics of information security includes models of the strictly rational “homo economicus” as well as behavioral economics. Economics of security addresses individual and organizational decisions and behaviors with respect to security and privacy as market decisions.
Economics of security addresses a core question: why do agents choose technical risks when there exists technical solutions to mitigate security and privacy risks? Economics addresses not only this question, but also inform design decisions in security engineering.
Emergence of economics of security
National security is the canonical public good. The economic status of information security came to the intellectual fore around 2000. As is the case with innovations it arose simultaneously in multiple venues.
In 2000, Ross Anderson wrote, Why Information Security is Hard. Anderson explained that a significant difficulty in optimal development of security technology is that incentives must be aligned with the technology to enable rational adoption. Thus, economic insights should be integrated into technical design. A security technology should enable the party at risk to invest to limit that risk. Otherwise, the designers are simply counting on altruism for adoption and diffusion. Many consider this publication the birth of economics of security.
Also in 2000 at Harvard, Camp at the School of Government and Wolfram in the Department of Economics argued that security is not a public good but rather each extant vulnerabilities has an associated negative externality value. Vulnerabilities were defined in this work as tradable goods. Six years later, iDEFENSE, ZDI and Mozilla have extant markets for vulnerabilities.
In 2000, the scientists at the Computer Emergency Response Team at Carnegie Mellon University proposed an early mechanism for risk assessment. The Hierarchical Holographic Model provided the first multi-faceted evaluation tool to guide security investments using the science of risk. Since that time, CERT has developed a suite of systematic mechanism for organizations to use in risk evaluations, depending on the size and expertise of the organization: OCTAVE. The study of computer security as an investment in risk avoidance has become standard practice.
In 2001, in an unrelated development, Lawrence A. Gordon and Martin P. Loeb published Using Information Security as a Response to Competitor Analysis System. A working paper of the published article was written in 2000. These professors, from Maryland's Smith School of Business, present a game-theoretic framework that demonstrates how information security can prevent rival firms from gaining sensitive information. In this context, the article considers the economic (i.e., cost-benefit) aspects of information security.
The authors came together to develop and expand a series of flagship events under the name Workshop o
|
https://en.wikipedia.org/wiki/Q31
|
Q31 may refer to:
Q31 (New York City bus)
, a Naïade-class submarine
IBM AN/FSQ-31 SAC Data Processing System
London Underground Q31 Stock
Luqman (sūrah), of the Quran
Sequoia Field, an airport serving Visalia, California, United States
|
https://en.wikipedia.org/wiki/IBM%20AN/FSQ-31%20SAC%20Data%20Processing%20System
|
The IBM AN/FSQ-31 SAC Data Processing System (FSQ-31, Q-31, colloq.) was a USAF command, control, and coordination system for the Cold War Strategic Air Command (SAC). IBM's Federal Systems Division was the prime contractor for the AN/FSQ-31s, which were part of the TBD 465L SAC Automated Command and Control System (SACCS), a "Big L" system of systems (cf. 416L SAGE & 474L BMEWS( which had numerous sites throughout the Continental United States: "all SAC command posts and missile LCC's" (e.g., The Notch), a communication network, etc.; and the several FSQ-31 sites including:
Offutt AFB's "Headquarters SAC Command Center" (DPC 1 & DPC 2 units)
March AFB's 15AF Combat Operations Center ((DPC 3),
Barksdale AFB by March 1983.
The FSQ-31 provided data to a site's Data Display Central (DDC) "a wall display" (e.g., Iconorama), and the FSQ-31 replaced the TBD at Offutt in 1960. On February 20, 1987, "SAC declared initial operational capability for the SAC Digital Network [which] upgraded the SAC Automated Command and Control system "
Description
The FSQ-31 included:
IBM 4020 Military Computer with Programming and Numerical System and "Arithmetic Unit including storage access", liquid-cooled Ferrite Core storage (65,536 words), High-Speed Input/Output to the Drum Memory system, and the Low-Speed Input/Output section to interface with several different devices:
Electronic Data Transmission Communications Central (EDTCC) at 4 "zone-of-interior headquarters bases" for EDT with "outlying" Remote Communications Centrals (e.g., routing "to RCC's, computer (DPC's), or the display devices.")
Tape Controllers 1 and 2, connected to 16 IBM 729-V Tape Drives
Disk File Controller, which was a modified Tape Controller, connected to the
Bryant PH 2000 Disk File, which had 24 disks that were 39 inches in diameter, 125 read/write heads that were hydraulically actuated, and had a total capacity of 26 MB
IBM 1401, which controlled data transfers from unit-record equipment:
IBM 1402 Card Reader/Punch
IBM 1403 Line Printer
2 IBM 729-V Tape Drives
2 IBM Selectric Typewriters, (I/O Typewriters) one of which was used for operational messages and the other for diagnostic messages and maintenance activities.
Advanced Display Console
Drum memory system with controller and two vertical drum memory devices. Each drum read and wrote 50 bits at a time in parallel so transferring data could be done quickly. The drums were organized as 17 fields with 8192 words per field for a total capacity of 139264 words. The motors that rotated the drums required 208 VAC at 45 Hz so a motor generator unit was required to change the frequency from 60 Hz. This added to the noise level in the computer room.
Rockwell-Collins modem
Water chilling system for maintaining the liquid coolant temperature in the IBM 4020
SACCS systems outside of the AN/FSQ-31 included the Subnet Communications Processor and the SACCS Software Test (SST) Facility at the Offutt command center (the backup SC
|
https://en.wikipedia.org/wiki/AN/FSQ-32
|
The AN/FSQ-32 SAGE Solid State Computer (AN/FSQ-7A before December 1958, colloq. "Q-32") was a planned military computer central for deployment to Super Combat Centers in nuclear bunkers and to some above-ground military installations. In 1958, Air Defense Command planned to acquire 13 Q-32 centrals for several Air Divisions/Sectors.
Background
In 1956, ARDC sponsored "development of a transistorized, or solid-state, computer" by IBM and when announced in June 1958, the planned "SAGE Solid State Computer...was estimated to have a computing capability of seven times" the AN/FSQ-7. ADC's November 1958 plan to field—by April 1964—the 13 solid state AN/FSQ-7A was for each to network "a maximum of 20 long-range radar inputs [40 LRI telephone lines] and a maximum dimension of just over 1000 miles in both north-south and east-west directions." "Low rate Teletype data" could be accepted on 32 telephone lines (e.g., from "Alert Network Number 1"). On 17 November 1958, CINCNORAD "decided to request the solid state computer and hardened facilities", and the remaining vacuum-tube AN/FSQ-8 centrals for combat centers were cancelled (one was retrofitted to function as an AN/FSQ-7).
" AN/FSQ-32 computer would be"* used:
1. for "a combat center" (as with the vacuum-tube AN/FSQ-8),
2. to accept "radar and weapons connections" for weapons direction as with the AN/FSQ-7--e.g., for backup CIM-10 Bomarc guidance or manned interceptor GCI if above-ground Direction Center(s) could not function, and
3. for "air traffic control functions".
"Air Defense and Air Traffic Control Integration" was planned for airways modernization after the USAF, CAA, and AMB agreed on August 22, 1958, to "collocate air route traffic control centers and air defense facilities" (e.g., jointly use some Air Route Surveillance Radars at SAGE radar stations). The May 22, 1959, agreement between the USAF, DoD, and FAA designated emplacement of ATC facilities "in the hardened structure of the nine U. S. SCC's", and SAGE Air Defense Sectors and FAA regions were to have coincident boundaries in a June 19, 1959, air defense plan used to create a new SAGE Implementation Schedule on July 1, 1959.
On December 21, 1959, the Office of Defense Research and Engineering informed NORAD a stop order had been placed on AN/FSQ-32 production and in January 1960, the Office of the Secretary of Defense recommended the SCC program be cancelled. The AN/FSQ-32, as part of the SCC Program, was cancelled by March 18, 1960, and the SAGE Air Traffic Integration (SATIN) was similarly cancelled by the DoD. Back-Up Interceptor Control eventually with smaller solid-state computers at above-ground SAGE radar stations was instead implemented for survivability.
Planned deployment was for Ottawa, St Louis, San Antonio, Raleigh, Syracuse, Chicago, Spokane, Minot, Portland, Phoenix, Miami (above-ground), Albuquerque (above-ground), and Shreveport (above-ground). (During 1959 SAGE/FAA "boundary alignments", the total w
|
https://en.wikipedia.org/wiki/Uganda%20Broadcasting%20Corporation
|
Uganda Broadcasting Corporation (UBC) is the public broadcaster network of Uganda. It was founded as a result of the "Uganda Broadcasting Corporation Act, 2004", which merged the operations of Uganda Television (UTV) and Radio Uganda. It started broadcasting on November 16, 2005.
The Uganda Broadcasting Corporation Act stated that the UBC should be funded by the levying of a television licence fee. Collection of a licence fee set at USh (around €8.40 or US$10.80) started in 2005. However, collection was subsequently halted by President Yoweri Museveni. There has since been pressure to reinstate the licence fee to maintain UBC's independence. UBC operates the UBC TV channel and five radio stations.
Until May 2011, Edward Musinguzi was the managing director. He was fired along with all of the governing board for "massive corruption" involving unpaid salaries, the sale of land owned by the corporation, and advertisements sold during the 2010 World Cup.
Location
The broadcast studios and main offices of UBC are located at 17–19 Nile Avenue, Nakasero Hill, in Kampala, Uganda's capital and largest city. The geographic coordinates of Uganda Broadcasting Corporation headquarters are: 0°18'59.0"N, 32°35'21.0"E (Latitude:0.316389; Longitude:32.589167).
Re-organization
When he assumed office in 2016, Frank Tumwebaze, the Information and ICT Minister, established an ad-hoc committee to look into the affairs of the broadcaster. The ad-hoc committee found that UBC was in debt and had too many employees, whom it paid poorly and utilized them sub-optimally, among other infractions.
A team was set up to address the short-comings. The pay-roll was reduced from 525 to 349 people. To weed out the 176 who need to be let go, all 525 members of staff were instructed to re-apply, if interested. Those who opt for retirement or early retirement would be provided with appropriate retirement packages.
The changes, which are expected to take effect starting July 2018, are projected to reduce the wage bill from USh 4.5 billion (approximately US$1.25 million) annually to USh 3.5 billion (approximately US$955,000).
In October 2018, the company hired Maurice Mugisha, formerly "Head of News Production" at NTV Uganda, to serve as its new Deputy Managing Director.
References
External links
Uganda Broadcasting Corporation
2010 Report covering the history of the Corporation
Publicly funded broadcasters
Government-owned companies of Uganda
Mass media companies of Uganda
1953 establishments in Uganda
1963 establishments in Uganda
Television channels and stations established in 2005
State media
Organisations based in Kampala
Companies based in Kampala
|
https://en.wikipedia.org/wiki/Object%20model
|
In computing, object model has two related but distinct meanings:
The properties of objects in general in a specific computer programming language, technology, notation or methodology that uses them. Examples are the object models of Java, the Component Object Model (COM), or Object-Modeling Technique (OMT). Such object models are usually defined using concepts such as class, generic function, message, inheritance, polymorphism, and encapsulation. There is an extensive literature on formalized object models as a subset of the formal semantics of programming languages.
A collection of objects or classes through which a program can examine and manipulate some specific parts of its world. In other words, the object-oriented interface to some service or system. Such an interface is said to be the object model of the represented service or system. For example, the Document Object Model (DOM) is a collection of objects that represent a page in a web browser, used by script programs to examine and dynamically change the page. There is a Microsoft Excel object model for controlling Microsoft Excel from another program, and the ASCOM Telescope Driver is an object model for controlling an astronomical telescope.
An object model consists of the following important features:
Object reference Objects can be accessed via object references. To invoke a method in an object, the object reference and method name are given, together with any arguments.
Interfaces An interface provides a definition of the signature of a set of methods without specifying their implementation. An object will provide a particular interface if its class contains code that implement the method of that interface. An interface also defines types that can be used to declare the type of variables or parameters and return values of methods.
Actions An action in object-oriented programming (OOP) is initiated by an object invoking a method in another object. An invocation can include additional information needed to carry out the method. The receiver executes the appropriate method and then returns control to the invoking object, sometimes supplying a result.
Exceptions Programs can encounter various errors and unexpected conditions of varying seriousness. During the execution of the method many different problems may be discovered. Exceptions provide a clean way to deal with error conditions without complicating the code. A block of code may be defined to throw an exception whenever particular unexpected conditions or errors arise. This means that control passes to another block of code that catches the exception.
See also
Object-oriented programming
Object-oriented analysis and design
Object database
Object Management Group
Domain-driven design
Eigenclass model
Literature
External links
Document Object Model (DOM) The official W3C definition of the DOM.
"The Java Object Model"
The Ruby Object Model: Data Structure in Detail
Object Membership: The core structure of o
|
https://en.wikipedia.org/wiki/WSJN-CD
|
WSJN-CD (channel 20) is a Class A CTNi-operated television station licensed to San Juan, Puerto Rico. The station is owned by Wanda Rolon and operated by Christian Television Network, along with satellite station WQSJ-CD (channel 20) in Quebradillas, Puerto Rico. WSJN-CD shares transmitter facilities with WELU (channel 34) at the Monte Renovados La Peña in Bayamon. The station has its studios and offices located at Barrio Piñas in Toa Alta.
History
WSJN-CD began operations in 1990, and it was owned by Ministerio Codech en Avance, Inc. Prior to this, WSJN-CD and WQSJ-CD were affiliated with Telecadena SBN between 1999 and 2013. In 2013, the stations switched affiliations to the CTNi Television Network.
Digital television
WSJN-CD's digital signal is multiplexed:
WQSJ-CD's digital signal is multiplexed:
References
External links
Tabernaculo de Alabanza y Adoracion La Senda Antigua
www.sbnnetwork.org
www.ctni.org
SJN-CD
SJN-CD
Mass media in San Juan, Puerto Rico
Christian Television Network affiliates
1990 establishments in Puerto Rico
Television channels and stations established in 1990
|
https://en.wikipedia.org/wiki/Conditional%20operator
|
The conditional operator is supported in many programming languages. This term usually refers to ?: as in C, C++, C#, and JavaScript. However, in Java, this term can also refer to && and ||.
&& and ||
In some programming languages, e.g. Java, the term conditional operator refers to short circuit boolean operators && and ||. The second expression is evaluated only when the first expression is not sufficient to determine the value of the whole expression.
Difference from bitwise operator
& and | are bitwise operators that occur in many programming languages. The major difference is that bitwise operations operate on the individual bits of a binary numeral, whereas conditional operators operate on logical operations. Additionally, expressions before and after a bitwise operator are always evaluated.
if (expression1 || expression2 || expression3)If expression 1 is true, expressions 2 and 3 are NOT checked.
if (expression1 | expression2 | expression3)This checks expressions 2 and 3, even if expression 1 is true.
Short circuit operators can reduce run times by avoiding unnecessary calculations. They can also avoid Null Exceptions when expression 1 checks whether an object is valid.
Usage in Java
class ConditionalDemo1 {
public static void main(String[] args) {
int value1 = 1;
int value2 = 2;
if ((value1 == 1) && (value2 == 2))
System.out.println("value1 is 1 AND value2 is 2");
if ((value1 == 1) || (value2 == 1))
System.out.println("value1 is 1 OR value2 is 1");
}
}
"?:"
In most programming languages, ?: is called the conditional operator. It is a type of ternary operator. However, ternary operator in most situations refers specifically to ?: because it is the only operator that takes three operands.
Regular usage of "?:"
?: is used in conditional expressions. Programmers can rewrite an if-then-else expression in a more concise way by using the conditional operator.
Syntax
condition ? expression 1 : expression 2condition: An expression which is evaluated as a boolean value.
expression 1, expression 2: Expressions with values of any type.
If the condition is evaluated to true, the expression 1 will be evaluated. If the condition is evaluated to false, the expression 2 will be evaluated.
It should be read as: "If condition is true, assign the value of expression 1 to result. Otherwise, assign the value of expression 2 to result."
Association property
The conditional operator is right-associative, meaning that operations are grouped from right to left. For example, an expression of the form a ? b : c ? d : e is evaluated as a ? b : (c ? d : e).
Examples by languages
Java
class ConditionalDemo2 {
public static void main(String[] args) {
int value1 = 1;
int value2 = 2;
int result;
boolean someCondition = true;
result = someCondition ? value1 : value2;
System.out.println(result);
}
}In this example, because someCond
|
https://en.wikipedia.org/wiki/List%20of%20species%20on%20Caroline%20Island
|
Species recorded on Caroline Island, one of the Line Islands in the south-central Pacific Ocean:
Flora
Trees
Calophyllum
Cocos nucifera
Cordia subcordata
Hibiscus tiliaceus
Morinda citrifolia
Pandanus tectorius
Pisonia grandis
Thespesia populnea
Shrubs
Heliotropium foertherianum
Scaevola taccada
Suriana maritima
Ximenia americana
Herbs
Achyranthes canscens
Boerhavia repens
Heliotropium anomalum
Ipomoea macrantha
Ipomoea violacea
Laportea ruderalis
Lepidium bidentatum
Lepturus repens
Lygodium microphyllum
Phyllanthus amarus
Phymatosorus scolopendria
Portulaca lutea
Psilotum nudum
Sida fallax
Tacca leontopetaloides
Tribulus cistoides
Fauna
Nesting seabirds
Black noddy (Anous minutus)
Blue-grey noddy (Procelsterna cerulea) (Kepler)
Brown booby (Sula leucogaster)
Brown noddy (Anous stolidus)
Great frigatebird (Fregata minor)
Lesser frigatebird (Fregata ariel)
Masked booby (Sula dactylatra)
Red-footed booby (Sula sula)
Red-tailed tropicbird (Phaethon rubricauda) (Kepler)
Sooty tern (Onychoprion fuscata)
White tern (Gygis alba)
Other birds
Bristle-thighed curlew (Numenius tahitiensis)
Lesser golden-plover (Pluvialis dominica) (Kepler)
Long-tailed cuckoo (Eudynamis taitensis)
Pacific golden plover (Pluvialis fulva)
Reef heron (Egretta sacra) (Kepler)
Ruddy turnstone (Arenaria interpres) (Kepler)
Sanderling (Crocethia alba) (Kepler)
Short-eared owl (Asio flammeus ponapensis)
Wandering tattler (Tringa incana)
Lizards
Azure-tailed skink (Emoia cyanura) (Kepler)
Emoia impar (Kepler)
Moth skink (Lipinia noctua) (Kepler)
Mourning gecko (Lepidodactylus lugubris) (Kepler)
Polynesian gecko (Gehyra oceanica) (Kepler)
Snake-eyed skink (Cryptoblepharus poecilopleurus) (Kepler)
Mammals
Pacific bottlenose dolphin (Tursiops gilli) (Kepler)
Polynesian rat (Rattus exulans) (Kepler)
Turtles
Green sea turtle (Chelonia mydas)
Crabs
Coconut crab (Birgus largo)
Red spotted crab (Carpilius maculatus) (Kepler)
Scarlet crab (Cornobita perlatus) (Kepler)
Polychaetes
Calcareous tubeworm (Serpula tetratropia)
Notes
References
Species
Flora of Micronesia
Flora of the south-central Pacific
Lists of biota of Kiribati
Lists of plants
Lists of animals by location
Oceanian realm flora
Oceanian realm fauna
Caroline Island
|
https://en.wikipedia.org/wiki/HBV%20hydrology%20model
|
The HBV hydrology model, or Hydrologiska Byråns Vattenbalansavdelning model, is a computer simulation used to analyze river discharge and water pollution. Developed originally for use in Scandinavia, this hydrological transport model has also been applied in a large number of catchments on most continents.
Discharge modelling
This is the major application of HBV, and has gone through much refinement. It comprises the following routines:
Snow routine
Soil moisture routine
Response function
Routing routine
The HBV model is a lumped (or semi-distributed) bucket-type (or also called 'conceptual') catchment model that has relatively few model parameters and minimal forcing input requirements, usually the daily temperature and the daily precipitation.
First the snow is calculated after defining a threshold melting temperature (TT usually 0 °C) and a parameter CMELT that reflects the equivalent melted snow for the difference of temperature. The result is divided into a liquid part that is the surface runoff and a second part that infiltrates.
Second the soil moisture is calculated after defining an initial value and the field capacity (FC).
Third calculation of the actual Evapotranspiration (ETPa), first by using an external model (ex: Penman) for finding the potential ETP and then fitting the result to the temperatures and the permanent wilting point(PWP) of the catchment in question. A parameter C which reflects the increase in the ETP with the differences in temperatures ( Actual Temperature and Monthly mean Temperature).
The model considers the catchment as two reservoirs (S1 and S2) connected by a percolation flow, the inflow to the first reservoir is calculated as the surface runoff, which is what remains from the initial precipitations after calculating the infiltration and the evapotranspiration.
The outflow from the first reservoir is divided into two separate flows (Q1 and Q2) where Q1 represents the fast flow which is triggered after a certain threshold L to be defined by the user and Q2 the intermediate flow. A constant K1 is used to find the outflows as a function of the storage in S1.
To consider the percolation rate a constant Kd is used as along as the storage is S1.
The outflow from the second reservoir is considered to be the groundwater flow (Q3) function of a constant K2 and the storage in S2.
The total flow generated from a certain rain event is the sum of the 3 flows.
The result of the model are later compared to the actual measured flow values and Nasch parameter is used to calibrate the model by changing the different parameters. The model has in total 9 parameters : TT, Cmelt, FC, C, PWP, L, K1, K2, Kd. For a good calibration of the model it is better to use Monte-Carlo simulation or the GLUE-Method to properly define the parameters and the uncertainty in the model.
The model is fairly reliable but as usual the need of good input data is essential for good results. The sensitivity of the HBV model to parameter uncertaint
|
https://en.wikipedia.org/wiki/Luis%20von%20Ahn
|
Luis von Ahn (; born 19 August 1978) is a Guatemalan entrepreneur and a consulting professor in the Computer Science Department at Carnegie Mellon University in Pittsburgh, Pennsylvania. He is known as one of the pioneers of crowdsourcing. He is the founder of the company reCAPTCHA, which was sold to Google in 2009, and the co-founder and CEO of Duolingo.
Education and early life
Luis von Ahn was born in and grew up in Guatemala City. Von Ahn grew up in a wealthy household with both of his parents working as physicians. He is a Guatemalan of German-Jewish descent. His mother was one of the first women in Guatemala to complete medical school, and had von Ahn at age 42 despite being single. He attended the American School of Guatemala, a private English-language school in Guatemala City, an experience he cites as a great privilege. When von Ahn was eight years old, his mother bought him a Commodore 64 computer, beginning his fascination with technology and computer science. When he applied to colleges in the United States, Von Ahn had to spend more than $1,200 to fly to neighboring El Salvador to take the TOEFL. This experience left him with a negative impression of an "extractive" testing industry, ripe for disruption.
At age 18, von Ahn began studying at Duke University, where he received a Bachelor of Science (BS) in Mathematics, summa cum laude, in 2000. He later earned his PhD in Computer Science at Carnegie Mellon University in 2005.
In 2006, Von Ahn became a faculty member at Carnegie Mellon University's School of Computer Science.
Career and research
Von Ahn's early research was in the field of cryptography. With Nicholas J. Hopper and John Langford, he was the first to provide rigorous definitions of steganography and to prove that private-key steganography is possible.
In 2000, he did early pioneering work with Manuel Blum on CAPTCHAs, computer-generated tests that humans are routinely able to pass but that computers have not yet mastered. These devices are used by web sites to prevent automated programs, or bots, from perpetrating large-scale abuse, such as automatically registering for large numbers of accounts or purchasing huge numbers of tickets for resale by scalpers. CAPTCHAs brought von Ahn his first widespread fame among the general public due to their coverage in the New York Times and USA Today and on the Discovery Channel, NOVA scienceNOW, and other mainstream outlets.
Von Ahn's PhD thesis, completed in 2005, was the first publication to use the term "human computation" that he had coined, referring to methods that combine human brainpower with computers to solve problems that neither could solve alone. Von Ahn's PhD thesis is also the first work on Games With A Purpose, or GWAPs, which are games played by humans that produce useful computation as a side effect. The most famous example is the ESP Game, an online game in which two randomly paired people are simultaneously shown the same picture, with no way to communicat
|
https://en.wikipedia.org/wiki/HBM
|
HBM may refer to:
Science and technology
HBM (gene), a human gene
High Bandwidth Memory, a computer memory standard
Health belief model
Hierarchical Bayes model
Human-body model (HBM) in the realm of electrostatic discharge (ESD).
Other uses
Havelock-Belmont-Methuen, a township in Peterborough County, Ontario, Canada
His or Her Britannic Majesty
Hitman: Blood Money, a video game
Hudbay, a Canadian mining company
Hummingbird Medal, a state decoration of Trinidad and Tobago
, the predecessor of the French HLM housing program
|
https://en.wikipedia.org/wiki/Fleet%20Command
|
Fleet Command, previously labelled as Jane's Fleet Command, is a real-time tactics naval warfare simulation computer game released in May 1999. It was developed by Sonalysts Inc. and published by Electronic Arts (EA). The game licensed parts of Jane's Information Group's military information database, which was used as an in-game "Jane's Library", reference material that the player could refer to while in-game. Jane's also licensed to EA the "Jane's" name and the "Jane's Combat Simulations" logo, and the game was marketed under the "Jane's" name, much like the previous "Jane's Fighters Anthology", also published by Electronic Arts.
Gameplay
In terms of gameplay, as a real-time tactics game it is a realistic military simulator and only involves resource management of weapons and the fuel of airborne aircraft. The scenario defines the units that a player has at the beginning of the scenario, and the player can never have more than what they started with until the scenario ends. Like other real-time tactics games, losses cannot be replaced, which emphasises the value of units and the judicious use of them (though some scenarios make it impossible to save a particular unit). The military realism is emphasised further by such means as using some authentic NTDS symbology on the 2D tactical planning map. Much of the game and mission events are presented in the form of full-motion video sequences.
Gameplay can be chosen from one of three different options. First is a series of preset missions that contain certain objectives. These missions contain specific goals that must be accomplished in order to be graded successfully. They vary in difficulty from one star to four with four stars being the most difficult. A second game play theme is to play one of four provided scenarios. These are generally "wars" verses "battles" that require the player to win each successive challenge before continuing. The last type of game play is using a feature called "mission editing", where a player can input their own configurations and force strength and objectives. Preset mission objectives and goals can be input into the editor and displayed to the player at various intervals throughout game play. Input objectives can be configured in such a way that they must be completed in predetermined orders for the overall mission to be successful. The programming skills necessary are quite basic and are a credit to the ingenuity of the software designers.
The "mission editor" feature is simple to use and relatively uncommon in other game play software. The feature enables players to interface directly with the software and provide a relatively limitless amount of possible combat scenarios.
Setting
The game is set in the late 1990s. The game focused exclusively on contemporary units. Units that were in service when the game was released were featured, and units that were out of service or not yet in service were not featured. The game reflects that some of the world's militar
|
https://en.wikipedia.org/wiki/Valenciennes%20tramway
|
The Valenciennes tramway () is a tram system serving Valenciennes and part of its surrounding areas, in the Nord department of France. Since 2014 the network has consisted of two lines with a total of of track and 48 stations.
The modern tram network, reintroducing this transport mode after its abandonment in 1966, was launched on 3 July 2006 with a first section from Université to Dutemple. An extension from Dutemple to Denain Espace Villars was opened on 31 August 2007. The second line between Vieux-Condé Le Boulon and Université was put into service on 24 February 2014.
The Valenciennes tramway is integrated into the wider local multimodal public transport network and its commercial brand "Transvilles". It is owned by the Syndicat intercommunal de mobilité et d'organisation urbaine du Valenciennois (SIMOUV), the Transvilles network's organising authority. Since 1 January 2015, the RATP Group, through its subsidiary Compagnie des Transports du Valenciennois et du Hainaut (CTVH), has been in charge of operation and maintenance.
Background
The former Valenciennes tram network was opened in 1881, and at the peak of its development during the early 20th century, it reached the Belgian border. The region suffered from a steep decline in several of the local industries, these being mining, steel production and textiles; it was amid this climate that the original tram network was closed in July 1966.
Despite the tram network's closure, the road infrastructure of the region was not heavily developed to take over its role. Officially, buses had been adopted as the replacement for the region's former tram system. However, there was a chronic lack of a coherent road network for such services to be operated upon, the development of which having been reportedly hindered by the region's post-industrial infrastructure, and road congestion had risen to concerning levels over the years. As such, there was some level of demand for a suitable regional commuter system be deployed. During the late 1980s onwards, there was a wider revival of interest in the topic of tramways and their potential deployment, the planning authorities in Valenciennes soon became keen to embrace this notion themselves.
Opting for a revival of the tramway was not a clear-cut option; a study performed in 1991 concluded that Valenciennes could benefit from the adoption of a structuring Public Transport system, and that trams were likely to be the most suitable option. Jules Chevalier, the President of SITURV, was also personally convinced of the usefulness of a modern tramway. A project, known as Transvilles, involved a major reorganization of the public transport network across the urban area of Valenciennes, centred around the adoption of a modern tram network and a redeployment of bus lines.
It would take nearly a full decade between the official proposal for the modern tramway being released and its adoption as an active policy; this delay has been attributed to the various bur
|
https://en.wikipedia.org/wiki/Office%20automation
|
Office automation refers to the varied computer machinery and software used to digitally create, collect, store, manipulate, and relay office information needed for accomplishing basic tasks. Raw data storage, electronic transfer, and the management of electronic business information comprise the basic activities of an office automation system. Office automation helps in optimizing or automating existing office procedures.
The backbone of office automation is a local area network, which allows users to transfer data, mail and voice across the network. All office functions, including dictation, typing, filing, copying, fax, telex, microfilm and records management, telephone and telephone switchboard operations, fall into this category. Office automation was a popular term in the 1970s and 1980s as the desktop computer exploded onto the scene. Advantages of office automation include that it can get many tasks accomplished faster, it eliminates the need for a large staff, less storage is required to store data, and multiple people can update data simultaneously in the event of changes in schedule.
Outline
Businesses can easily purchase and stock their wares with the aid of technology. Many of the manual tasks that used to be done by hand can now be done through hand held devices and UPC and SKU coding. In the retail setting, automation also increases choice. Customers can easily process their payments through automated credit card machines and no longer have to wait in line for an employee to process and manually type in the credit card numbers.
Office payrolls have been automated, which means no one has to manually cut checks, and those checks that are cut can be printed through computer programs. Direct deposit can be automatically set up and this further reduces the manual process, and most employees who participate in direct deposit often find their paychecks come earlier than if they'd have to wait for their checks to be written and then cleared by the bank.
Other ways automation has reduced employee manpower on tasks is automated voice direction. Through the use of prompts, automated phone menus and directed calls, the need for employees to be dedicated to answer the phones has been reduced, and in some cases, eliminated.
See also
Apache OpenOffice
References
Further reading
The Electronic Sweatshop: How Computers Are Transforming the Office of the Future into the Factory of the Past, [by] Barbara Garson. New York: Penguin Books, 1989, cop. 1988. pbk.
Wilkie Office Automation What is OA?, June 2006, Accessed 21 June 2006
Productivity software
Automation software
|
https://en.wikipedia.org/wiki/Slam%20Tilt
|
Slam Tilt is a pinball simulation video game developed by Swedish studio Liquid Dezign HDB and published by 21st Century Entertainment in 1996 for AGA compatible Amiga computers and in 1997 for Microsoft Windows as Slamtilt Pinball. The game is the last in a series of Amiga pinball titles released by the publisher, including Pinball Fantasies and Pinball Dreams.
Gameplay
The Amiga release of Slam Tilt featured four themed tables: 'Mean Machines', 'The Pirate', 'Ace of Space' and 'Night of the Demon'. Each table features an animated LCD panel at the top of the screen upon which scores and animations are displayed. The game also offers additional challenges through 'video modes' in which the player must use the LCD panel and table to complete further objectives.
Reception
The Amiga version of Slam Tilt was received positively by reviewers. Tina Hackett for Amiga Computing praised the game as an "excellent title" at the same technical and graphical quality of previous pinball titles from the publisher. Richard Jones for Amiga Format stated Slam Tilt was "the biggest, best and most imaginative pinball game on the Amiga". Tim Norris for Amiga Power similarly provided high praise for the game, whilst noting its similarities to other titles from the publisher, stating "they've already made the best pinball games available for the Amiga and you might find that this is just another one of them." Amiga Power ultimately ranked the game as the 13th best Amiga game of all time.
The PC port of Slam Tilt received lukewarm reviews. Gareth Jones of PC PowerPlay stated "overall, (the game) is quite good, the ball dynamics are well done and realistic, and the tables are well laid out", but the game's presentation suffered from a "partial close up of half the table", making it "difficult to aim at ramps or chutes you can’t see".
Legacy
A 3D version of Slam Tilt titled SlamTilt Resurrection was released in 1999 for Windows. The revision was developed by Ganymede Technologies and published in Europe by 21st Century Entertainment. In the United States, the game was republished as a budget title by Cardoza Entertainment under the title Avery Cardoza's Slam Tilt Pinball.
SlamTilt Resurrection only includes the 'Night of the Demon' and 'The Pirate' tables in the original game. These tables are fully redesigned, except for the scoring and layout, with 3D high-resolution graphics at screen resolutions for up to 1600x1200 with 32-bit colors and overhauled ball physics.
References
External links
Slam Tilt on Amiga Reviews
1996 video games
Amiga games
Amiga 1200 games
Windows games
Pinball video games
Video games developed in Sweden
|
https://en.wikipedia.org/wiki/Time%20to%20first%20fix
|
Time to first fix (TTFF) is a measure of the time required for a GPS navigation device to acquire satellite signals and navigation data, and calculate a position solution (called a fix).
Scenarios
The TTFF is commonly broken down into three more specific scenarios, as defined in the GPS equipment guide:
Cold factory
The receiver is missing or has inaccurate estimates of its position, velocity, the time, or the visibility of any of the GPS satellites. As such, the receiver must systematically search for all possible satellites. After acquiring a satellite signal, the receiver can begin to obtain approximate information on all the other satellites, called the almanac. This almanac is transmitted repeatedly over 12.5 minutes. Almanac data can be received from any of the GPS satellites and is considered valid for up to 180 days.
Warm normal
The receiver has estimates of the current time within 20 seconds, the current position within 100 kilometers, its velocity within 25 m/s, and it has valid almanac data. It must acquire each satellite signal and obtain that satellite's detailed orbital information, called ephemeris data. Each satellite broadcasts its ephemeris data every 30 seconds, considered valid for up to 4 hours.
Hot standby
The receiver has valid time, position, almanac, and ephemeris data, enabling a rapid acquisition of satellite signals. The time required of a receiver in this state to calculate a position fix may also be termed time to subsequent fix (TTSF).
Many receivers can use as many as twelve channels simultaneously, allowing quicker fixes (especially in a cold case for the almanac download). Many cell phones reduce the time to first fix by using assisted GPS (A-GPS): they acquire almanac and ephemeris data over a fast network connection from the cell-phone operator rather than over the slow radio connection from the satellites.
The TTFFs for a cold start is typically between 2 and 4 minutes, a warm start is 45 seconds (or shorter), and a hot start is 22 seconds (or only a few seconds). In older hardware where satellite search is slower, a cold start may take more than the full 12.5 minutes.
See also
Global Positioning System (GPS)
GPS signals
High-sensitivity GPS
Satellite navigation solution
References
External links
US Coast Guard, Navigation Center's NAVSTAR GPS User Equipment Introduction.
Global Positioning System
Satellite navigation
|
https://en.wikipedia.org/wiki/Apache%203
|
Apache 3 is a 3D scrolling shoot 'em up arcade video game released by Tatsumi (and Data East in North America) in 1988. Players control a yellow AH-64 Apache helicopter with weapons and shoot everything in the air and on the ground.
External links
Apache 3 at Arcade History
Contemporary reviews at Solvalou.com
Apache 3 at Imdb
The Arcade Flyer Archive (TAFA): Apache 3 Flyer #47
The Arcade Flyer Archive (TAFA): Apache 3 Flyer #3176
The Arcade Flyer Archive (TAFA): Apache 3 Flyer #6405
The Arcade Flyer Archive (TAFA): Apache 3 Flyer #4225
The Arcade Flyer Archive (TAFA): Apache 3 Flyer #4231
1988 video games
Arcade video games
Arcade-only video games
Helicopter video games
Shoot 'em ups
Tatsumi (company) games
Video games developed in Japan
|
https://en.wikipedia.org/wiki/Warren%20%28burrow%29
|
A warren is a network of wild rodent or lagomorph, typically rabbit burrows. Domestic warrens are artificial, enclosed establishment of animal husbandry dedicated to the raising of rabbits for meat and fur. The term evolved from the medieval Anglo-Norman concept of free warren, which had been, essentially, the equivalent of a hunting license for a given woodland.
Architecture of the domestic warren
The cunicularia of the monasteries may have more closely resembled hutches or pens, than the open enclosures with specialized structures which the domestic warren eventually became. Such an enclosure or close was called a cony-garth, or sometimes conegar, coneygree or "bury" (from "burrow").
Moat and pale
To keep the rabbits from escaping, domestic warrens were usually provided with a fairly substantive moat, or ditch filled with water. Rabbits generally do not swim and avoid water. A pale, or fence, was provided to exclude predators.
Pillow mounds
The most characteristic structure of the "cony-garth" ("rabbit-yard") is the pillow mound. These were "pillow-like", oblong mounds with flat tops, frequently described as being "cigar-shaped", and sometimes arranged like the letter ⟨E⟩ or into more extensive, interconnected rows. Often these were provided with pre-built, stone-lined tunnels. The preferred orientation was on a gentle slope, with the arms extending downhill, to facilitate drainage. The soil needed to be soft, to accommodate further burrowing.
This type of architecture and animal husbandry has become obsolete, but numerous pillow mounds are still to be found in Britain, some of them maintained by English Heritage, with the greatest density being found on Dartmoor.
Further evolution of the term
Ultimately, the term "warren" was generalized to include wild burrows. According to the 1911 Encyclopædia Britannica: The word thus became used of a piece of ground preserved for these beasts of warren. It is now applied loosely to any piece of ground, whether preserved or not, where rabbits breed.
The use is further extended to any system of burrows, e.g., "prairie dog warren". By 1649, the term was applied to inferior, crowded human accommodations and meant "cluster of densely populated living spaces" (OED). Contemporarily, the leading use seems to be in the stock phrase "warren of cubicles" in the workplace.
References
Livestock
Agricultural buildings
Buildings and structures used to confine animals
Animals and humans
Shelters built or used by animals
Leporidae
|
https://en.wikipedia.org/wiki/NexusDB
|
NexusDB is a relational commercial database engine for the Delphi, C++ Builder and .NET programming languages created by NexusDB Pty Ltd. It was developed as a successor to the TurboPower FlashFiler system for Delphi (still available for free download ). The database engine supports the SQL:2003 standard alongside Core SQL functionality as well as direct cursor based data access.
NexusDB also provides database connectors for easy access from various development and application environments:
ADO.NET Provider for Visual Studio; supports Windows, Android, iOS, MacOSX targets
ODBC/CLI Driver for Windows
PHP Connector for Windows
The website has a Client/Server trial edition and an online manual. A free version (without source code) for embedded/single user can be downloaded via the GetIt tool in Rad Studio XE8 or newer. An SQL-based third-party database development tool, Database Workbench, has been developed by Upscene Productions. Third-party support exists for Fast Report and ReportBuilder reporting tools.
References
External links
NexusDB Homepage
Product Information
FlashFiler
Database Workbench
Database engines
Proprietary database management systems
Pascal (programming language) software
|
https://en.wikipedia.org/wiki/Psychological%20Abstracts
|
Psychological Abstracts was an abstract and index periodical and the print counterpart of the PsycINFO database. It was published by the American Psychological Association and was produced for 80 years, ceasing publication at the end of 2006. It was produced monthly and contained summaries (abstracts, bibliographic information, and indexing) of English-language journal articles, technical reports, book chapters, and books in the field of psychology.
In its latter years it contained much less content than PsycINFO, although it did contain some records for technical reports that are not in PsycINFO. It was organized by subject area according to the PsycINFO Classification Codes.
References
Bibliographic databases and indexes
Works about psychology
American Psychological Association publications
2006 disestablishments in the United States
|
https://en.wikipedia.org/wiki/List%20of%20Justice%20League%20Unlimited%20episodes
|
Justice League Unlimited is an American superhero animated television series that was produced by Warner Bros. Animation and aired on Cartoon Network. Featuring a wide array of superheroes from the DC Comics universe, and specifically based on the Justice League superhero team, it is a direct sequel to the previous Justice League animated series. Justice League Unlimited debuted on July 31, 2004, on Toonami and ended on May 13, 2006. It was also the final series set in the long-running DC animated universe, which started with Batman: The Animated Series in 1992. Unlike its predecessor's two/three-part episode format, Justice League Unlimited consists entirely of single episodes, except for the first season finale.
Series overview
Episodes
Season 1 (2004–2005)
Season 2 (2005)
Season 3 (2005–2006)
References
Justice League Unlimited
Justice League Unlimited
Justice League Unlimited
|
https://en.wikipedia.org/wiki/PowerBook%20100
|
The PowerBook 100 is a portable subnotebook personal computer designed and manufactured by Sony for Apple Computer and introduced on October 21, 1991, at the COMDEX computer expo in Las Vegas, Nevada. Priced at US$2,500 with external floppy drive, the PowerBook 100 was the low-end model of the first three simultaneously released PowerBooks. Its CPU and overall speed closely resembled those of its predecessor, the Macintosh Portable. It had a Motorola 68000 processor at 16 MHz, 2-8 megabytes (MB) of RAM, a monochrome backlit liquid-crystal display (LCD) with 640 × 400 pixel resolution, and the System 7.0.1 operating system. It did not have a built-in floppy disk drive and was noted for its unique compact design that placed a trackball pointing device in front of the keyboard for ease of use.
Apple's then-chief executive officer (CEO) John Sculley started the PowerBook project in 1990, allocating $1 million for marketing. Despite the small marketing budget, the new PowerBook line was a success, generating over $1 billion in revenue for Apple in its first year. Sony designed and manufactured the PowerBook 100 in collaboration with the Apple Industrial Design Group, Apple's internal design team. It was discontinued on September 3, 1992, and superseded by the PowerBook 145 and PowerBook Duo series. Since then, it has been praised several times for its design; PC World named the PowerBook 100 the tenth-greatest PC of all time in 2006, and US magazine Mobile PC chose the PowerBook 100 as the greatest gadget of all time in 2005.
History
From 1990, John Sculley, then CEO of Apple, oversaw product development personally to ensure that Apple released new computers to market more quickly. His new strategy was to increase market share by lowering prices and releasing more "hit" products. This strategy contributed to the commercial success of the low-end Macintosh Classic and Macintosh LC, desktop computers released by Apple in 1990. Sculley wanted to replicate the success of these products with Apple's new PowerBook line.
Sculley began the project in 1990 and wanted the PowerBook to be released within one year. The project had three managers: John Medica, who managed engineering for the new laptop; Randy Battat, who was the vice president for product marketing; and Neil Selvin, who headed the marketing effort. In 1991, the two leaders in the laptop computer industry were Toshiba and Compaq, both of which had introduced models weighing less than . Medica, Battat, and Selvin deliberately designed the PowerBook to weigh less than its competitors.
Sculley allocated a $1 million marketing budget to the PowerBook product line, in contrast to the $25 million used to market the Macintosh Classic. Medica, Battat, and Selvin used most of the money to produce and air a television commercial that viewers would remember. Advertising agency Chiat/Day filmed retired Los Angeles Lakers basketball star Kareem Abdul-Jabbar sitting uncomfortably in a small airline coach se
|
https://en.wikipedia.org/wiki/Wireless%20application%20service%20provider
|
A wireless application service provider (WASP) is the generic name for a firm that provides remote services, typically to handheld devices, such as cellphones or PDAs, that connect to wireless data networks. WASPs are a specific category of application service providers (ASPs), though the latter term may more often be associated with standard web services. They can also be used for wireless bridging between different types of network topologies.
Wireless networking
|
https://en.wikipedia.org/wiki/WVUP-CD
|
WVUP-CD (channel 45) is a low-power, Class A television station in Tallahassee, Florida, United States, owned and operated by the Christian Television Network (CTN). The station's studios are located on Capital Circle Northeast in Tallahassee, and its transmitter is located on Thomasville Road in northern Leon County, Florida, near the Georgia state line. WVUP-CD offers 24-hour religious programming, much of which is produced either locally or at the CTN home base in Clearwater, Florida.
The station went on the air in 1984 as W17AB and was one of the most successful low-power TV stations anywhere in the United States in the 1980s. However, the advent of a new full-power independent station led to its conversion to home shopping programs and then to local Christian programming. In the late 1990s and early 2000s, the station briefly returned to a general entertainment format as a UPN affiliate. However, its owner, Southern Nights Entertainment Corporation, was insufficiently capitalized. As a result, the station was sold at public sale in 2001 to The Note Capital Corporation. CTN then purchased it and returned it to the air with its Christian programming in 2003.
History
W17AB in the 1980s
Octagon Corporation, the owner of WMBB-TV in Panama City, applied in 1980 to build a translator on channel 40 in Tallahassee to rebroadcast WMBB-TV to Panama City. At the time, the station was an NBC affiliate, which Tallahassee lacked. When channel 40—an underlying allocation for a full-service station in the city—received applications, Octagon then filed to build channel 40 outright as a full-power simulcaster of WMBB-TV. Those plans hit a snag, however, when an affiliation switch in Panama City turned WMBB-TV into an ABC affiliate, which Tallahassee already had. At the suggestion of the Federal Communications Commission (FCC), Octagon reapplied to operate a low-power station capable of originating its own programming. Group W Cable, which served Tallahassee, then made a lucrative suggestion of its own: if channel 17 went on the air as an independent, it would gain carriage on the cable system.
W17AB began broadcasting on May 11, 1984. However, it was not immediately seen in cable homes because the company feared adding the low-power station would require it to pay additional copyright fees. Octagon won a ruling in federal district court, and a copyright judge ruled that the addition of local low-power TV stations did not require such payments, paving the way for W17AB to be added to the Group W lineup in February 1985. The addition of cable coverage caused viewership to jump from 7,000 to 16,000 households; Arbitron began listing its programming in ratings surveys, a practice previously only afforded to full-power stations, and in its May and July 1985 ratings books, W17AB was the most-watched low-power station in the country.
In 1986, Phipps Television, owner of Tallahassee-area CBS affiliate WCTV, acquired W17AB and kept its format as a minority and lo
|
https://en.wikipedia.org/wiki/Fatal%20Desire
|
Fatal Desire is a made-for-TV film produced by Lifetime Television. It premiered April 3, 2006 on the network and starred Eric Roberts as Joe, an ex-policeman turned casino pit boss in Atlantic City, and Anne Heche as Tanya Sullivan, a bored housewife with very manipulative ways.
The film was based on, or "inspired by," the true crime book Fatal Error by journalists Mark Morris and Paul Janczewski. The book in turn was based on the real life case against Sharee Miller. The film featured two original songs by New Orleans-based singer/songwriter Kristin Diable and marked the cable television premiere of her work.
Tagline
A dark, sexually charged true crime thriller about a perfect match that becomes a perfect nightmare.
Plot
Joe is a newly divorced, single dad in his forties living in Atlantic City, New Jersey. Though he makes a decent living working as a casino pit boss, and loves the time he is getting to spend with his son, he still longs to start a new relationship. So Joe decides to explore the world of online dating, and while in a chatroom meets a Pittsburgh woman in her twenties who calls herself "sexykitten."
After a few months of exchanging messages, they meet in person. After she arrives at his casino to surprise him, Joe learns that her real name is Tanya Sullivan and he is instantly attracted to her. She also reveals that she is married and has a young daughter. However, both Joe and Tanya don't care.
Through several months the relationship grows from hot, passionate sex, into what Joe believes is love. During those months, they continue meeting and Tanya sends Joe pornographic videos of herself. The relationship seems to be going great, until one day Tanya drops a bombshell. She's pregnant with what she believes is Joe's baby. After she tells Joe of her pregnancy, Joe tries to convince Tanya to leave her husband to come and live with him. But Tanya refuses the offer, saying her husband is very dangerous and would never let that happen. Meanwhile, Joe starts to receive threatening emails supposedly sent by Tanya's husband mocking him and saying he knows all about the affair.
Joe asks Tanya to take pictures of the physical abuse that her husband allegedly causes. It's not long before another bombshell is dropped. Tanya tells him that because of her infidelity, her husband and his buddies have beaten her and raped her by the pool behind the house, in the process making her lose the baby, or so Joe thinks.
At this point Joe can't take it anymore. With the blessing of Tanya, who provides directions, he plots and sets out to kill Tanya's husband at his auto repair shop where he succeeds in shooting him to death late one night. During the weeks following the murder, the relationship between Joe and Tanya disintegrates. She refuses to answer his emails and in fact deletes the file on her computer that contains his messages.
So Joe decides to investigate. He travels to Pittsburgh again. There he figures out that everything that Tany
|
https://en.wikipedia.org/wiki/HTC%20Typhoon
|
The HTC Typhoon is a smartphone that runs the Microsoft Windows Mobile operating system. The phone is manufactured by Taiwanese HTC Corporation (HTC). At the time when the Typhoon was made, HTC was not in the business of selling devices to end-users. Instead, the company had many partners who would rebrand and distribute its devices.
It is based on the ARM Texas Instruments OMAP 730 processor running at 200 MHz. It has 32 MB internal RAM and 64 MB of flash ROM, and is expandable via a miniSD slot. It has a TFT display with 65,536 colours at a resolution of 176x220.
It runs Microsoft Windows Mobile 2003 SE as its operating system, however it is also capable of running Windows Mobile 5.0 after a version was leaked onto the internet. It supports Java applications. Additionally, hacked, or "cooked" versions of Windows Mobile 6, 6.1 and 6.5 have been circulating on the internet.
Versions
"Typhoon" is the HTC codename for this device, and the device has been rebranded by several distributors and cell phone carriers, under the following names:
Audiovox SMT5600
Dopod 565
i-mate SP3
Krome Intellekt iQ700
Orange SPV C500
Qtek 8010
Vitelcom/Movistar TSM520
O2 Xphone IIm
External links
Review of the C500
Windows Mobile Standard devices
Typhoon
References
|
https://en.wikipedia.org/wiki/Radio%20Caracas
|
Radio Caracas may refer to:
Radio Caracas Radio, a Venezuelan radio network
Radio Caracas Televisión Internacional, a Venezuelan cable television network
|
https://en.wikipedia.org/wiki/Software%20security%20assurance
|
Software security assurance is a process that helps design and implement software that protects the data and resources contained in and controlled by that software. Software is itself a resource and thus must be afforded appropriate security.
What is software security assurance?
Software Security Assurance (SSA) is the process of ensuring that software is designed to operate at a level of security that is consistent with the potential harm that could result from the loss, inaccuracy, alteration, unavailability, or misuse of the data and resources that it uses, controls, and protects.
The software security assurance process begins by identifying and categorizing the information that is to be contained in, or used by, the software. The information should be categorized according to its sensitivity. For example, in the lowest category, the impact of a security violation is minimal (i.e. the impact on the software owner's mission, functions, or reputation is negligible). For a top category, however, the impact may pose a threat to human life; may have an irreparable impact on software owner's missions, functions, image, or reputation; or may result in the loss of significant assets or resources.
Once the information is categorized, security requirements can be developed. The security requirements should address access control, including network access and physical access; data management and data access; environmental controls (power, air conditioning, etc.) and off-line storage; human resource security; and audit trails and usage records.
What causes software security problems?
All security vulnerabilities in software are the result of security bugs, or defects, within the software. In most cases, these defects are created by two primary causes: (1) non-conformance, or a failure to satisfy requirements; and (2) an error or omission in the software requirements.
Non-conformance, or a failure to satisfy requirements
A non-conformance may be simple–the most common is a coding error or defect–or more complex (i.e., a subtle timing error or input validation error). The important point about non-conformance is that verification and validation techniques are designed to detect them and security assurance techniques are designed to prevent them. Improvements in these methods, through a software security assurance program, can improve the security of software.
Errors or omissions in software requirements
The most serious security problems with software-based systems are those that develop when the software requirements are incorrect, inappropriate, or incomplete for the system situation. Unfortunately, errors or omissions in requirements are more difficult to identify. For example, the software may perform exactly as required under normal use, but the requirements may not correctly deal with some system state. When the system enters this problem state, unexpected and undesirable behavior may result. This type of problem cannot be handled within the s
|
https://en.wikipedia.org/wiki/Earth%20Charter%20Initiative
|
The Earth Charter Initiative is the collective name for the global network of people, organizations, and institutions who participate in promoting the Earth Charter, and in implementing its principles in practice. The Initiative is a broad-based, voluntary, civil society effort, but participants include leading international institutions, national government agencies, university associations, NGOs, cities, faith groups, and many well-known leaders in sustainable development.
Mission and goals
The stated mission of the Earth Charter Initiative is to promote the transition to sustainable ways of living and a global society founded on a shared ethical framework that includes respect and care for the community of life, ecological integrity, universal human rights, respect for diversity, economic justice, democracy, and a culture of peace.
Goals
To raise awareness worldwide of the Earth Charter and to promote understanding of its inclusive ethical vision.
To seek recognition and endorsement of the Earth Charter by individuals, organizations, and the United Nations.
To promote the use of the Earth Charter as an ethical guide and the implementation of its principles by civil society, business, and government.
To encourage and support the educational use of the Earth Charter in schools, universities, religious communities, local communities, and many other settings.
To promote recognition and use of the Earth Charter as a soft law document.
Strategic objectives
To promote development of a global network of Earth Charter supporters and activists with the collaboration of advisors, affiliates, partner organizations, and task forces.
To create and disseminate high quality communications and educational materials to different target groups that will reach millions of people.
To translate key Earth Charter materials in all major languages of the world.
To set up Earth Charter websites in all countries in partnership with key individuals and organizations.
To promote the Earth Charter vision in key local, national and international events and engage individuals and organizations in applying it in their areas of activity.
To position the Earth Charter in relation to important international initiatives and processes so that its ethical framework can be used as a guide in efforts to address urgent challenges such as climate change, biodiversity loss, the Millennium Development Goals, food security, and conflict resolution.
To undertake training programmes to facilitate the uptake and application of the Earth Charter in different sectors.
To develop the guidance and instruments to help organizations, businesses, and local communities use the Earth Charter to assess progress toward sustainable development.
Organization
A formal network of affiliates, partners, and youth groups helps to promote the Earth Charter around the world. Many of these representatives are based in prominent national-level organizations and institutions.
The Initiative is
|
https://en.wikipedia.org/wiki/Quick%20View
|
Quick View is a file viewer in Windows 95, Windows 98 and Windows NT 4.0 operating systems. The viewer can be used to view practically any file.
The software has been ported by third parties to support XP, Vista and 7.
On 1995-04-03, InfoSoft International, Inc., announced the acquisition of Systems Compatibility Corporation, and the renaming of InfoSoft International, Inc. to Inso Corporation. Inso Corporation later developed Quick View Plus products.
Quick View Plus
Quick View Plus is a commercial variant based on Inso Corporation (later IntraNet Solutions, Inc., Stellent Inc., Oracle)'s Outside In technology.
The Windows 3.1 version of the product was originally named Outside In for Windows 3.1 before it was renamed to Quick View Plus for Windows 3.1. The Outside In name was reused as the viewer engine for Quick View Plus products.
The distributor was later changed to Avantstar, Inc., founded by Stellent's close associates in 2001.
Quick View Plus for UNIX
It is a version of Inso Corporation QVP supporting Sun Solaris for SPARC, HP-UX, IBM AIX.
Quick View Plus for Windows CE
It is a product for Windows CE, including Pocket PC 2002.
Version history
Quick View Plus for Windows 3.1
Quick View Plus for Windows 95
It was released on 1995-09-30.
Microsoft Word file viewer Plug-in for Netscape Navigator 2.0 was released on 1996-02-07.
4.0
It was released on 1996-11-11.
New file formats include: WordPerfect 7, Quattro Pro 7, Freelance 96 for Windows 95, Novell PerfectWorks 2.0, Corel Presentations, LZH archive.
It supports integration with:
Microsoft Internet Explorer 3.0
Netscape Navigator 2.0 and higher
Microsoft Exchange
Lotus Notes 4.0
New operating system support include Windows 95, Windows NT 4.0.
Microsoft Office 97 module was released on 1997-06-04, which allows viewing and printing Microsoft Office 97 documents (Word 97, Excel 97).
4.5
It was released on 1997-08-13.
New file formats include: Microsoft Word 97 and Excel 97, Lotus 1-2-3 97, Freelance 97, Portable Network Graphics
New file formats for Netscape Navigator plug-in include Adobe Acrobat, Apple QuickTime, AVI Player, Corel CMX, Shockwave Director, Softsource DWG.
New application integrations include Microsoft Outlook 97, Eudora for Windows 95 and NT 4.0, and Internet Explorer 3.0 for Windows 3.1.
5.0
It was released in 1998.
New and improved integration includes support for Outlook 98, Outlook Express, Internet Explorer, Microsoft Exchange, Netscape Navigator, Netscape Communicator 5, Eudora 4, America Online, Lotus Notes, Lotus cc:Mail 8.1, Norton Navigator, and Spry Mosaic. Support for additional file formats include Microsoft PowerPoint 97 files, Lotus Word Pro 96 and 97, and RTF 1.5.
5.1
File format support was increased to over 200.
5.11
File format support was increased to over 225.
6.0
Quick View Plus Enterprise Edition was released on 2000-06-07.
New features include:
QuickCompress: QuickView Plus can now compress any combination of files and folder
|
https://en.wikipedia.org/wiki/Removable%20User%20Identity%20Module
|
Removable User Identity Module (R-UIM, usually pronounced as "R-yuim") is a card developed for cdmaOne/CDMA2000 ("CDMA") handsets that extends the GSM SIM card to CDMA phones and networks. To work in CDMA networks, the R-UIM contains an early version of the CSIM application. The card also contains SIM (GSM) application, so it can work on both networks. It is physically compatible with GSM SIMs and can fit into existing GSM phones as it is an extension of the GSM 11.11 standard.
This interface brings one of the main advantages of GSM to CDMA network phones. By having a removable identity card, CDMA users can change phones while keeping their phone numbers by simply swapping the cards. This simplifies many situations such as phone upgrades, phone replacements due to damage, or using the same phone on a different provider's CDMA network.
The R-UIM card has been superseded by CSIM on UICC. This technique allows all three applications (SIM, CSIM, and USIM) to coexist on a single smartcard, allowing the card to be used in virtually any phone worldwide that supports smart cards.
The CSIM application, a port of R-UIM functionality to the UICC, is defined in standard.
This form of card is widely used in China under the CDMA service of China Telecom (The CDMA service of China Telecom was acquired from China Unicom in 2008). However, it is also used elsewhere such as India, Indonesia, Japan, Taiwan, Thailand, and the US.
See also
CDMA subscriber identity module (CSIM)
Subscriber identity module (SIM)
Universal subscriber identity module (USIM)
W-SIM
MEID
References
External links
Qualcomm
TIA Standardizes Removable User Identity Modules
Why do CDMA Subscribers Need the R-UIM? – PDF whitepaper
Dual-mode R-UIM
Mobile telecommunications standards
3rd Generation Partnership Project 2 standards
|
https://en.wikipedia.org/wiki/Java%20Analysis%20Studio
|
Java Analysis Studio (JAS) is an object oriented data analysis package developed for the analysis of particle physics data. The latest major version is JAS3.
JAS3 is a fully AIDA-compliant data analysis system. It is popular for data analysis in areas of particle physics which are familiar with the Java programming language.
The Studio uses many other libraries from the FreeHEP project.
External links
Java Analysis Studio 3 website
AIDA: Abstract Interfaces for Data Analysis — open interfaces and formats for particle physics data processing
Data analysis software
Experimental particle physics
Free software programmed in Java (programming language)
Free statistical software
Numerical software
Physics software
|
https://en.wikipedia.org/wiki/Ang%20Bagong%20Kampeon
|
Ang Bagong Kampeon () was a nationally televised amateur singing contest that aired on Radio Philippines Network (Solar TV) in the Philippines. It aired from 1982 to October 1988. It was hosted by Bert Marcelo and Pilita Corrales. The television show has launched the careers of several successful singers, notably, Regine Velasquez and Donna Cruz.
The show also had a contestant named Josephine Roberto (aka "Banig"), who later defeated Christina Aguilera on the way to become Female Vocalist Champion in the 1989 edition of Star Search in the United States.
Later in 1989, Ang Bagong Kampeon was again aired on RPN 9 which was hosted by Pepe Pimentel and Amy Perez. Among the notable contestant was Teofanes Barbi Daclan who sang songs of Matt Monro and made up to the grand finals.
Awards and recognitions
Best Talent Show Winner — PMPC Star Awards for Television (1987–1988)
References
Philippine reality television series
1985 Philippine television series debuts
1988 Philippine television series endings
Radio Philippines Network original programming
1980s Philippine television series
|
https://en.wikipedia.org/wiki/Charm%2B%2B
|
Charm++ is a parallel object-oriented programming paradigm based on C++ and developed in the Parallel Programming Laboratory at the University of Illinois at Urbana–Champaign. Charm++ is designed with the goal of enhancing programmer productivity by providing a high-level abstraction of a parallel program while at the same time delivering good performance on a wide variety of underlying hardware platforms. Programs written in Charm++ are decomposed into a number of cooperating message-driven objects called chares. When a programmer invokes a method on an object, the Charm++ runtime system sends a message to the invoked object, which may reside on the local processor or on a remote processor in a parallel computation. This message triggers the execution of code within the chare to handle the message asynchronously.
Chares may be organized into indexed collections called chare arrays and messages may be sent to individual chares within a chare array or to the entire chare array simultaneously.
The chares in a program are mapped to physical processors by an adaptive runtime system. The mapping of chares to processors is transparent to the programmer, and this transparency permits the runtime system to dynamically change the assignment of chares to processors during program execution to support capabilities such as measurement-based load balancing, fault tolerance, automatic checkpointing, and the ability to shrink and expand the set of processors used by a parallel program.
Applications implemented using Charm++ include NAMD (molecular dynamics) and OpenAtom (quantum chemistry), ChaNGa and SpECTRE (astronomy), EpiSimdemics (epidemiology), Cello/Enzo-E (adaptive mesh refinement), and ROSS (parallel discrete event simulation). All of these applications have scaled up to a hundred thousand cores or more on petascale systems.
Adaptive MPI (AMPI) is an implementation of the Message Passing Interface standard on top of the Charm++ runtime system and provides the capabilities of Charm++ in a more traditional MPI programming model. AMPI encapsulates each MPI process within a user-level migratable thread that is bound within a Charm++ object. By embedding each thread in a chare, AMPI programs can automatically take advantage of the features of the Charm++ runtime system with little or no changes to the MPI program.
Charm4py allows writing Charm++ applications in Python, supporting migratable Python objects and asynchronous remote method invocation.
Example
Here is some Charm++ code for demonstration purposes:
Header file ()
class Hello : public CBase_Hello {
public:
Hello(); // C++ constructor
void sayHi(int from); // Remotely invocable "entry method"
};
Charm++ Interface file ()
module hello {
array [1D] Hello {
entry Hello();
entry void sayHi(int);
};
};
Source file ()
# include "hello.decl.h"
# include "hello.h"
extern CProxy_Main mainProxy;
extern int numElements;
Hello::Hello() {
// No member variables to initialize in
|
https://en.wikipedia.org/wiki/Expasy
|
Expasy is an online bioinformatics resource operated by the SIB Swiss Institute of Bioinformatics. It is an extensible and integrative portal which provides access to over 160 databases and software tools and supports a range of life science and clinical research areas, from genomics, proteomics and structural biology, to evolution and phylogeny, systems biology and medical chemistry. The individual resources (databases, web-based and downloadable software tools) are hosted in a decentralized way by different groups of the SIB Swiss Institute of Bioinformatics and partner institutions.
Search engine
Queries of Expasy allow:
parallel searches SIB databases through a single search
aggregated search results from the complete set of >160 resources accessible from the portal.
Expasy provides up-to-date information from the most recent release of each resources.
The terms used in Expasy are based on the EDAM comprehensive ontology.
History
Expasy was created in August 1993. Originally, it was called ExPASy (Expert Protein Analysis System) and acted as a proteomics server to analyze protein sequences and structures and two-dimensional gel electrophoresis (2-D Page electrophoresis). Among others, ExPASy hosted the protein sequence knowledge base, UniProtKB/Swiss-Prot, and its computer annotated supplement, UniProtKB/TrEMBL, before these moved to the UniProt website.
ExPASy was the first website of the life sciences and among the first 150 websites in the world. , ExPASy had been consulted 1 billion times since its installation on 1 August 1993.
In June 2011, it became the SIB ExPASy Bioinformatics Resources Portal: a diverse catalogue of bioinformatics resources developed by SIB Groups. The current version of Expasy was released in October 2020.
Notes and references
External links
Official website
Bioinformatics
Science and technology in Switzerland
|
https://en.wikipedia.org/wiki/James%20D.%20Hollan
|
James D. Hollan is professor of cognitive science and adjunct professor of computer science at the University of California, San Diego. In collaboration with Professor Edwin Hutchins, he directs the Distributed Cognition and Human–Computer Interaction Laboratory at UCSD, and co-directs the Design Lab. Hollan has also spent time working at Xerox PARC and at Bellcore. He was elected to the CHI Academy in 2003 and received the ACM SIGCHI Lifetime Research Award in 2015.
His research explores the cognitive consequences of computationally based media. The goal is to understand the cognitive and computational characteristics of dynamic interactive representations as the basis for effective system design. His current work focuses on cognitive ethnography, computer-mediated communication, distributed cognition, human–computer interaction, information visualization, multiscale software, and tools for analysis of video data.
His current research is funded by the National Science Foundation (NSF), Intel, Nissan, and the University of California's Digital Media Innovation program. Recently completed research has been funded by Darpa, Intel, NSF, and Sony.
After completing a PhD in cognitive psychology at the University of Florida and a postdoctoral fellowship in artificial intelligence at Stanford University, Hollan was on the research faculty at the University of California, San Diego for a decade. Along with Edwin Hutchins and Donald Norman, he led the Intelligent Systems Group in the Institute for Cognitive Science at UCSD and the Future Technologies Group at NPRDC. Hollan left UCSD to become Director of the MCC Human Interface Laboratory and subsequently established the Computer Graphics and Interactive Media Research Group at Bellcore. In 1993, he moved to the University of New Mexico as Chair of the Computer Science Department. In 1997, Hollan returned to UCSD as Professor of Cognitive Science.
References
External links
Year of birth missing (living people)
Living people
University of California, San Diego faculty
University of Florida alumni
University of New Mexico faculty
Stanford University alumni
|
https://en.wikipedia.org/wiki/Kleinberg
|
Kleinberg may refer to:
Jon Kleinberg, an American computer scientist, brother of Robert
Robert Kleinberg, an American computer scientist, brother of Jon
Kleinburg, Ontario, a small unincorporated village located in Ontario, Canada
|
https://en.wikipedia.org/wiki/Nairi%20%28computer%29
|
The first Nairi (, ) computer was developed and launched into production in 1964, at the Yerevan Research Institute of Mathematical Machines (Yerevan, Armenia), and were chiefly designed by Hrachya Ye. Hovsepyan. In 1965, a modified version called Nairi-M, and in 1967 versions called Nairi-S and Nairi-2, were developed. Nairi-3 and Nairi-3-1, which used integrated hybrid chips, were developed in 1970. These computers were used for a wide class of tasks in a variety of areas, including Mechanical Engineering and the Economics.
In 1971, the developers of the Nairi computer were awarded the State Prize of the USSR.
Nairi-1
The development of the machine began in 1962, completed in 1964. The chief designer is Hrachya Yesaevich Hovsepyan, the leading design engineer is Mikhail Artavazdovich Khachatryan.
The architectural solution used in this machine has been patented in England, Japan, France and Italy.
Specification
The processor is 36-bit.
The clock frequency is 50 kHz.
ROM (in the original documentation - DZU (long-term memory) of a cassette type, the volume of the cassette is 2048 words of 36 bits each; was used to store firmware (2048 72-bit cells) and firmware (12288 36-bit cells). Part of the ROM it was delivered "empty", with the ability for users to flash their most frequently used programs, thus getting rid of entering programs from the remote control or punched tape.
The amount of RAM is 1024 words (8 cassettes of 128 cells), plus 5 registers.
Operations speed on addition on fixed-point numbers - 2-3 thousand ops / s, multiplication - 100 ops / s, operations on floating point numbers - 100 ops / s.
Since 1964, the machine has been produced at two factories in Armenia, as well as at the Kazan computer plant (from 1964 to 1970, about 500 machines were produced in total). In the spring of 1965, the computer was presented at a fair in Leipzig (Germany).
There were a number machine's modifications:
"Nairi-M" (1965) - the photoreader FS-1501 and the tape puncher PL-80 were introduced into the periphery.
"Nairi-K" with increased RAM up to 4096 words.
"Nairi-S" (1967), an electrified typewriter Consul-254 was used as a terminal.
Nairi-2
Created in 1966, in fact, it is a modification of the Nairi-1 machine. The amount of RAM, made on ferrite rings, has been increased to 2048 36-bit words, more efficient input-output devices were used, which were included in the Nairi-K package. A modification "Nairi-2E" was also produced, specialized for the automation of experiments. It contained in its kit a magnetic tape drive NML-67 and an interface unit with measuring equipment.
Nairi-3
Nairi-3 was the first soviet third generation computer.
Of all the models of the Nairi computer systems, the micro-program control principles of the Nairi-1 were improved and expanded on the most in the Nairi-3 models. Through the advances in computer technology since the initial production year of 1964, it became possible for upwards of 128 thousand micro-
|
https://en.wikipedia.org/wiki/New%20Zealand%20DB%20class%20locomotive
|
The New Zealand DB class and DBR class locomotive is a type of diesel-electric locomotive built for service on New Zealand's rail network. They were built by General Motors Diesel (GMD) of Canada as a narrow-gauge version of the EMD G8 model, with seventeen locomotives constructed. Ten of these were later rebuilt into the DBR class.
Introduction
The DB class was introduced to the rail network in 1965-1966 as a result of a requirement for a modern locomotive that could operate on the North Island lines that the DA class was excluded from due to their weight and axle load. They were ordered at the same time as the final DA order was placed. While these were mainly branch lines, it also applied to the East Coast Main Trunk line, particularly the section beyond Paeroa through the Karangahake and Athenree gorges until the opening of the Kaimai Tunnel in 1978.
The class was virtually indistinguishable externally from the DA class, being of the same basic design and dimensions, and wearing the same livery. They were some 13 tonnes lighter with a V8 prime as opposed to a V12, though they shared the same A1A-A1A wheel configuration and traction motors for commonality with the DA fleet. The locomotives were supplied with cast-steel bogies manufactured by Dofasco, but these were swapped to Phase I DA class locomotives, which were delivered with fabricated bogies, once the DB class entered service.
Numbering
The class was initially numbered DB 1000 to DB 1016, this being in common with NZR practice of the time to number locomotive classes with reference to the power output.
Upon the introduction of the computerised Traffic Monitoring System (TMS) in 1979 the class was renumbered and the designation capitalised. The class received new four-digit numbers beginning with 1, in which the last number is a check digit for the whole number. Under the new system DB 1001 retained its number, becoming DB 1001, with DB 1000 becoming DB1018. The rest of class was renumbered in sequence, with DB 1016 becoming DB1180.
The units being rebuilt to DBR received a new TMS number in the 12XX range when they entered the rebuilding cycle.
Rebuild to DBR
In the late 1970s the decision was undertaken to rebuild the DB class along similar lines to that being undertaken for the DA class into the DC class. The rebuilt DB units were designated as DBR (R = rebuild). The work was undertaken by Clyde Engineering in Australia and involved the lowering of the short hood to improve visibility for the driver, new cabs and the installation of a new EMD 8-645 engine. Ten units were rebuilt between 1980 and 1982.
In service
The DB class was employed primarily freight duties, though they did also see occasional service hauling passenger trains. As lines and bridges were upgraded, and in the case of the ECMT the Kaimai Tunnel opening, the weight advantage the locomotives had over other classes used in the North Island became less of a factor and the locomotives were operated as part of
|
https://en.wikipedia.org/wiki/WAN%20optimization
|
WAN optimization is a collection of techniques for improving data transfer across wide area networks (WANs). In 2008, the WAN optimization market was estimated to be $1 billion, and was to grow to $4.4 billion by 2014 according to Gartner, a technology research firm. In 2015 Gartner estimated the WAN optimization market to be a $1.1 billion market.
The most common measures of TCP data-transfer efficiencies (i.e., optimization) are throughput, bandwidth requirements, latency, protocol optimization, and congestion, as manifested in dropped packets. In addition, the WAN itself can be classified with regards to the distance between endpoints and the amounts of data transferred. Two common business WAN topologies are Branch to Headquarters and Data Center to Data Center (DC2DC). In general, "Branch" WAN links are closer, use less bandwidth, support more simultaneous connections, support smaller connections and more short-lived connections, and handle a greater variety of protocols. They are used for business applications such as email, content management systems, database application, and Web delivery. In comparison, "DC2DC" WAN links tend to require more bandwidth, are more distant, and involve fewer connections, but those connections are bigger (100 Mbit/s to 1 Gbit/s flows) and of longer duration. Traffic on a "DC2DC" WAN may include replication, back up, data migration, virtualization, and other Business Continuity/Disaster Recovery (BC/DR) flows.
WAN optimization has been the subject of extensive academic research almost since the advent of the WAN. In the early 2000s, research in both the private and public sectors turned to improving the end-to-end throughput of TCP, and the target of the first proprietary WAN optimization solutions was the Branch WAN. In recent years, however, the rapid growth of digital data, and the concomitant needs to store and protect it, has presented a need for DC2DC WAN optimization. For example, such optimizations can be performed to increase overall network capacity utilization, meet inter-datacenter transfer deadlines, or minimize average completion times of data transfers. As another example, private inter-datacenter WANs can benefit optimizations for fast and efficient geo-replication of data and content, such as newly computed machine learning models or multimedia content.
Component techniques of Branch WAN Optimization include deduplication, wide area file services (WAFS), SMB proxy, HTTPS Proxy, media multicasting, web caching, and bandwidth management. Requirements for DC2DC WAN Optimization also center around deduplication and TCP acceleration, however these must occur in the context of multi-gigabit data transfer rates.
WAN optimization techniques
Deduplication
Eliminates the transfer of redundant data across the WAN by sending references instead of the actual data. By working at the byte level, benefits are achieved across IP applications.
Data compression
Relies on data patterns that can be represe
|
https://en.wikipedia.org/wiki/GeeXboX
|
GeeXboX (stylized as GEExBox) is a free Linux distribution providing a media center software suite for personal computers. GeeXboX 2.0 and later uses XBMC for media playback and is implemented as Live USB and Live CD options. As such, the system does not need to be permanently installed to a hard drive, as most modern operating systems would. Instead, the computer can be booted with the GeeXboX CD when media playback is desired. It is based on the Debian distribution of Linux.
This is a reasonable approach for those who do not need media playback services while performing other tasks with the same computer, for users who wish to repurpose older computers as media centers, and for those seeking a free alternative to Windows XP Media Center Edition.
An unofficial port of GeeXboX 1.x also runs on the Wii.
History
See also
List of free television software
XBMC Media Center, the cross-platform open source media player software that GeeXboX 2.0 and later uses as a front end GUI.
References
External links
ARM operating systems
Embedded Linux distributions
Free media players
Linux distributions used in appliances
Linux-based devices
Linux distributions
|
https://en.wikipedia.org/wiki/Music%20programmes%20on%20the%20BBC%20Asian%20Network
|
The BBC Asian Network, a BBC National Radio station has a number of specifically music programmes (almost all programmes on the station except for Asian Network Reports on the BBC Asian Network have music on them but some shows specialise in music) in various styles of music aimed at the British South Asian Community in the UK.
Current Music Programmes on the BBC Asian Network
Murtz's Request Show every Saturday from 1300-1500 Your Bollywood, Bhangra, Hip Hop and RnB requests with Murtz.
The Official Asian Download Chart with Suzi Mann - Suzi Mann counts down the Top 40 from the world's only sales-based Asian music chart.
Mic Check - Asian MCs and the urban sounds of Asian Britain with Kan D Man & DJ Limelight. Every Saturday night from 2100–0000.
Panjabi Hit Squad The biggest Hip Hop, 'Bollyhood' and Bhangra anthems with Dee and Rav every Saturday from 1800–2100.
Retro Selection - Timeless classics from the 1960s, 70s, 80s and 90s. Every Saturday from 1300–1600.
Saima Ajram - Pakistani music, entertainment and news. Every Sunday from 1600–1800.
Dipps Bhamrah - Bhangra music, Punjabi entertainment and news. Every Sunday from 1800–2000.
Nadia Ali - Bengali music, entertainment and news. Every Sunday from 2000–2200.
Alpa Pandya - Gujarati music, entertainment and news. Every Sunday from 2200–0000.
Former Music Programmes on the BBC Asian Network
Sound Selection consisting of Music presented by Kanwal Qazi in the English language.
The Mix Bhangra & Fusion presented by DJ Sanj followed by DJ Stin and then later presented by Dipps Bhamrah.
T20 The top 20 bhangra album chart presented by Mike Allbut.
BBC Asian Network Chart which is the BBC Asian Network Top 20 with Ravi Sagoo.
Breakdown, Bhangra with Dipps Bhamrah. Previously presented by Ameet Chana- better known as an actor and Markie Mark who is now the Head of Music at the BBC Asian Network.
Retro Selection that from 17 June 2006 was renamed having previously been called Old Gold presented by Kanwal Qazi and Zeb Qureshi, South Asian Golden Oldies, primarily a Hindi-Urdu programme.
Sunday Soundtrack consisting of BBC Asian Network filmi top 40 chart with Murtz.
Friction presented by Bobby Friction with new British Asian Music - new weekday Programme every evening except Wednesdays.
Hype presented by DJ Kayper with hip hop, Desi Beats, Grime - every Wednesday evening.
The Jump Off presented by Mentor Kolektiv, "Urban Bhangra to Bollywood bangers".
Electro East, Music consisting of Leftfield, Drum and Bass and Asian Electronica hosted by Nerm.
Mic Check consisting of Asian MCs, Rap, Hip-Hop and "everything Urban".
Pathaan's Musical Rickshaw "Chill out in the early hours".
DJ Kayper - specialist music show. The biggest Hip Hop, Bhangra and R'n'B joints.
External links
BBC Asian Network Presenters\Shows Page
British music radio programmes
BBC Asian Network programmes
Asian mass media in the United Kingdom
|
https://en.wikipedia.org/wiki/Trion
|
Trion may refer to:
Trion, Georgia, a town in Chattooga County, Georgia, United States
Alpha Trion, the name of several fictional characters in the various Transformers universes
Trion (neural networks), a localized group of neurons in the cortex and a basic unit in the trion model
Trion (physics), a quasiparticle in a solid
Trion Worlds, a video game developer and publisher
Trion Supercars, an American car manufacturer
|
https://en.wikipedia.org/wiki/Battleground%202%3A%20Gettysburg
|
Battleground 2: Gettysburg is a 1995 turn-based computer wargame developed and published by TalonSoft. It the second game in the Battleground series.
Gameplay
It simulated combat at the 1863 Battle of Gettysburg, using both a video version of miniature wargaming and board gaming. Terrain hex maps are 3D or 2D with various scales and sizes.
The basic platform for the Battleground series involves individual infantry and cavalry regiments, artillery batteries, and commanders. All are rated for strength, firepower, weaponry, morale, and movement. As a unit takes fire, it may become fatigued, disordered, or routed to the rear. Players compete against the computer's artificial intelligence or against another player via modem. Players may try a variety of 25 individual scenarios, or refight the entire Battle of Gettysburg. A Fog of War option enhances playing against the computer, as it hides units that are not in direct view of the enemy.
The game features video clips of battle reenactments, as well as Civil War music by folk singer Bobby Horton.
Reception
In Computer Gaming Worlds May 1996 issue, columnist Terry Coleman noted that Gettysburg was "selling quite briskly", and had popularized the American Civil War subgenre in wargames. The magazine's August issue that year reported that Gettysburg had sold more than 60,000 copies.
The editors of PC Gamer US and Computer Gaming World nominated Gettysburg as their pick for 1995's best computer wargame. Computer Gaming World reviewers argued Gettysburg "is so much sheer fun that it could have captured top honors in many prior years. As the Battleground series continues to mature, it continues to blend the best elements of board games and miniatures with the strengths of computer wargames." A reviewer for PC PowerPlay provided a less positive review, noting "the whole front end of the game is disappointing" with limited game options and scenarios, although praising the battle detail as "exceptional".
References
External links
Games First review
GameFAQs
1995 video games
American Civil War video games
Computer wargames
Multiplayer and single-player video games
TalonSoft games
Turn-based strategy video games
Video game sequels
Video games developed in the United States
Video games set in Pennsylvania
War video games set in the United States
Windows games
|
https://en.wikipedia.org/wiki/Battleground%204%3A%20Shiloh
|
Battleground 4: Shiloh is a turn-based computer wargame developed by TalonSoft in 1996 and the fourth issue in the Battleground series.
Gameplay
It simulated combat at the 1862 Battle of Shiloh, using both a video version of miniature wargaming and board gaming. Terrain hex maps are 3D or 2D with various scales and sizes.
The basic platform for the Battleground series involves individual infantry and cavalry regiments, artillery batteries, and commanders. All are rated for strength, firepower, weaponry, morale, and movement. As a unit takes fire, it may become fatigued, disordered, or routed to the rear. Players compete against the computer's artificial intelligence or against another player via modem. Players may try a variety of 25 individual scenarios, or refight the entire Battle of Shiloh. A Fog of War option enhances playing against the computer, as it hides units that are not in direct view of the enemy. The game also includes scenarios related to the Battle of Wilson's Creek and the Battle of Prairie Grove.
The game features video clips of battle reenactments, as well as Civil War music by folk singer Bobby Horton.
Reception
Shiloh won Computer Gaming Worlds 1996 "Wargame of the Year" award. The editors wrote, "Sure, there's micromanaging. And yes, there's complexity, too. But the learning curve is justified, because this is simply the best 19th-century system ever designed for a wargame—realistic, challenging, and eminently replayable." The three Battleground games of 1996—Shiloh, Antietam and Waterloo—collectively won Computer Games Strategy Pluss wargame of the year award.
The Computer Game Developers Conference nominated Shiloh for its 1996 "Best Music or Soundtrack" Spotlight Award, which ultimately went to Quake.
The game received a score of 85% from boot.
References
External links
Games First review
1996 video games
American Civil War video games
Computer wargames
Multiplayer and single-player video games
TalonSoft games
Turn-based strategy video games
Video games developed in the United States
Video games set in the United States
Windows games
Windows-only games
|
https://en.wikipedia.org/wiki/Battleground%207%3A%20Bull%20Run
|
Battleground 7: Bull Run is a 1997 computer wargame developed and published by TalonSoft. It is the seventh entry in the Battleground series.
Gameplay
Bull Run is a computer wargame that simulates combat at the 1861 First Battle of Bull Run and the 1862 Second Battle of Bull Run. Its visuals draw from both miniature wargaming and board gaming. Terrain hex maps are 3D or 2D with various scales and sizes.
It follows the basic platform for the Battleground series, involving individual infantry and cavalry regiments, artillery batteries, and commanders. All are rated for strength, firepower, weaponry, morale, and movement. As a unit takes fire, it may become fatigued, disordered, or routed to the rear. Players compete against the computer's artificial intelligence or against another player via modem. Players may try a variety of individual scenarios, or refight the entire battle of First or Second Bull Run (known as Manassas in the South). Players can also fight the related skirmishes of Blackburn's Ford and Brawner's Farm (also known as Groveton). A Fog of War option enhances playing against the computer, as it hides units that are not in direct view of the enemy.
Development
Bull Run was distributed by Broderbund, as part of a new deal by TalonSoft. It was the first Battleground title to support online multiplayer.
The game features video clips of battle reenactments, as well as Civil War music by folk singer Bobby Horton.
Reception
References
External links
1997 video games
American Civil War video games
Computer wargames
Turn-based strategy video games
Video games developed in the United States
Windows games
Windows-only games
TalonSoft games
Multiplayer and single-player video games
|
https://en.wikipedia.org/wiki/Battleground%205%3A%20Antietam
|
Battleground 5: Antietam is a 1996 computer wargame developed by TalonSoft in 1996, the fifth issue in the popular Battleground series.
Gameplay
It simulated combat at the 1862 Battle of Antietam and the earlier Battle of South Mountain during the American Civil War's Maryland Campaign, using both a video version of miniature wargaming and board gaming. Terrain hex maps are 3D or 2D with various scales and sizes.
The basic platform for the Battleground series involves individual infantry and cavalry regiments, artillery batteries, and commanders. All are rated for strength, firepower, weaponry, morale, and movement. As a unit takes fire, it may become fatigued, disordered, or routed to the rear. Players compete against the computer's artificial intelligence or against another player via modem. Players may try a variety of individual scenarios, or refight the entire battle of Antietam. A Fog of War option enhances playing against the computer, as it hides units that are not in direct view of the enemy.
The game features video clips of battle reenactments, as well as Civil War music by folk singer Bobby Horton.
Reception
The three Battleground games of 1996—Shiloh, Antietam and Waterloo—collectively won Computer Games Strategy Pluss wargame of the year award for that year.
Waterloo and Antietam were runners-up for Computer Game Entertainments 1996 "Best War Game" prize, which ultimately went to Tigers on the Prowl 2. The magazine's editors called both games "top-notch", and summarized Antietam as "the best iteration yet of TalonSoft's successful Civil War game system."
Reviews
Computer Gaming World - Mar, 1997
Computer Games Magazine - 1996
GameSpot - May 06, 1997
References
External links
GameSpot review
GameFAQs
1996 video games
American Civil War video games
Computer wargames
Multiplayer and single-player video games
TalonSoft games
Turn-based strategy video games
Video games developed in the United States
Video games set in the United States
Windows games
Windows-only games
|
https://en.wikipedia.org/wiki/Backward%20Euler%20method
|
In numerical analysis and scientific computing, the backward Euler method (or implicit Euler method) is one of the most basic numerical methods for the solution of ordinary differential equations. It is similar to the (standard) Euler method, but differs in that it is an implicit method. The backward Euler method has error of order one in time.
Description
Consider the ordinary differential equation
with initial value Here the function and the initial data and are known; the function depends on the real variable and is unknown. A numerical method produces a sequence such that approximates , where is called the step size.
The backward Euler method computes the approximations using
This differs from the (forward) Euler method in that the forward method uses in place of .
The backward Euler method is an implicit method: the new approximation appears on both sides of the equation, and thus the method needs to solve an algebraic equation for the unknown . For non-stiff problems, this can be done with fixed-point iteration:
If this sequence converges (within a given tolerance), then the method takes its limit as the new approximation
.
Alternatively, one can use (some modification of) the Newton–Raphson method to solve the algebraic equation.
Derivation
Integrating the differential equation from to yields
Now approximate the integral on the right by the right-hand rectangle method (with one rectangle):
Finally, use that is supposed to approximate and the formula for the backward Euler method follows.
The same reasoning leads to the (standard) Euler method if the left-hand rectangle rule is used instead of the right-hand one.
Analysis
The local truncation error (defined as the error made in one step) of the backward Euler Method is , using the big O notation. The error at a specific time is . It means that this method has order one. In general, a method with LTE (local truncation error) is said to be of kth order.
The region of absolute stability for the backward Euler method is the complement in the complex plane of the disk with radius 1 centered at 1, depicted in the figure. This includes the whole left half of the complex plane, making it suitable for the solution of stiff equations. In fact, the backward Euler method is even L-stable.
The region for a discrete stable system by Backward Euler Method is a circle with radius 0.5 which is located at (0.5, 0) in the z-plane.
Extensions and modifications
The backward Euler method is a variant of the (forward) Euler method. Other variants are the semi-implicit Euler method and the exponential Euler method.
The backward Euler method can be seen as a Runge–Kutta method with one stage, described by the Butcher tableau:
The method can also be seen as a linear multistep method with one step. It is the first method of the family of Adams–Moulton methods, and also of the family of backward differentiation formulas.
See also
Crank–Nicolson method
Notes
Reference
|
https://en.wikipedia.org/wiki/Reification%20%28linguistics%29
|
Reification in natural language processing refers to where a natural language statement is transformed so actions and events in it become quantifiable variables. For example "John chased the duck furiously" can be transformed into something like
(Exists e)(chasing(e) & past_tense(e) & actor(e,John) & furiously(e) & patient(e,duck)).
Another example would be "Sally said John is mean", which could be expressed as something like
(Exists u,v)(saying(u) & past_tense(u) & actor(u,Sally) & that(u,v) & is(v) & actor(v,John) & mean(v)).
Such representations allow one to use the tools of classical first-order predicate calculus even for statements which, due to their use of tense, modality, adverbial constructions, propositional arguments (e.g. "Sally said that X"), etc., would have seemed intractable. This is an advantage because predicate calculus is better understood and simpler than the more complex alternatives (higher-order logics, modal logics, temporal logics, etc.), and there exist better automated tools (e.g. automated theorem provers and model checkers) for manipulating it.
Reified forms can be used for other purposes besides the application of first-order logic; one example is the automatic discovery of synonymous phrases.
The reified forms are sometimes called quasi-logical forms, and the existential variables are sometimes treated as Skolem constants.
Not all natural language constructs admit a uniform translation to first order logic. See donkey sentence for examples and a discussion.
See also
Drinker paradox
Nonfirstorderizability
Reification (computer science)
Reification (fallacy)
Reification (knowledge representation)
References
Computational linguistics
|
https://en.wikipedia.org/wiki/Wag%20Kukurap
|
(international title: Don't Blink) is a Philippine television reality horror show broadcast by GMA Network. Hosted by Dingdong Dantes, it premiered on August 28, 2004. The show concluded on April 29, 2006 with a total of 86 episodes.
The show is streaming online on YouTube.
Premise
The show is divided into two parts, each containing a true paranormal story from True Philippine Ghost Stories and Haunted Philippines. During the intermission, a photograph of ghostly figures is shown and later on the background revealed. Contests are sometimes held where participants must decide which of two pictures is real. At the end, footage of "real life ghosts" encountered by people is shown.
References
External links
2004 Philippine television series debuts
2006 Philippine television series endings
Filipino-language television shows
GMA Network original programming
Philippine reality television series
|
https://en.wikipedia.org/wiki/KUKC-LD
|
KUKC-LD (channel 20) is a low-power television station in Kansas City, Missouri, United States, affiliated with the Spanish-language network Univision. The station is owned by Media Vista Group, LLC. KUKC-LD's offices and master control facilities are located on West 31st Street in the Westside South section of Kansas City, Missouri, and its transmitter is located near 27th Street in the city's Western Blue Township section.
Until 2018 when KGKC-LD started carrying Telemundo, KUKC had the distinction of being the only standalone Spanish-language television station in the Kansas City market (KSMO-TV (channel 62) carried MundoMax on its second digital subchannel before that network's shutdown in late November 2016), but is the only Univision network affiliate in the state of Missouri.
History
The station first signed on the air in 1989 as K29CF; it originally operated as an affiliate of the home shopping network ValueVision. To allow full-power outlet KCWB (channel 29, now KCWE) to sign on the air, the station relocated to UHF channel 48 in 1996, and changed its callsign to K48FS. It remained a ValueVision affiliate, however it also carried children's programming during the afternoon hours (such as The Flintstones and Mighty Max).
In 2004, the station was purchased by Equity Media Holdings. Shortly after it was finalized, in January 2005, the station became the market's Univision affiliate; reflecting this, its callsign was changed to KUKC-LP (for "Univision Kansas City"). On December 8, 2008, Equity Media Holdings filed for Chapter 11 bankruptcy protection; it then began to sell off its television station properties. KUKC was sold to SP Television on June 2, 2009. The sale closed on August 17, 2009. SP Television reached a deal to sell KUKC to Media Vista Group on December 21, 2012.
On September 18, 2023, it was announced that KUKC-LD and sister station WUMN-LD in Minneapolis would be sold to Bridge News LLC, led by investor Manoj Bhargava, for $2.25 million; the sale does not include the stations' Univision affiliations.
Subchannel
References
External links
Equity Media Holdings
Univision network affiliates
Television stations in the Kansas City metropolitan area
Television channels and stations established in 1989
Spanish-language television stations in Missouri
Spanish-language television stations in Kansas
Low-power television stations in Missouri
|
https://en.wikipedia.org/wiki/KINC
|
KINC (channel 15) is a television station in Las Vegas, Nevada, United States, affiliated with the Spanish-language network Univision. It is owned by Entravision Communications alongside low-power UniMás affiliate KELV-LD (channel 27). The two stations share studios on Pilot Road in the unincorporated community of Paradise (with a Las Vegas mailing address); KINC's transmitter is located on Mount Arden near Henderson.
History
The Federal Communications Commission (FCC) granted an original construction permit on May 22, 1992, to Tierra Alta Broadcasting, Inc., to build the Las Vegas area's newest full-service television station. Originally, the station was approved for 5,000 kW to broadcast on UHF channel 15 and acquired the call sign KZIR in November 1993. In 1995, Tierra Alta Broadcasting made several changes to its construction permit: moving its transmitter to the KFBT (now KVCW) tower, reducing its power to 1,145 kW, and changing its call sign to KINC. The station made its debut in January 1996 and was licensed the following November. The station's analog facilities would not change again until the analog shutdown in June 2009.
Tierra Alta Broadcasting announced the sale of the station to Entravision Holdings, LLC in December 1996. The FCC approved the license transfer in April 1997 and Entravision took over the station a month later.
Programming
The majority of the programming aired on this station comes from the national Univision network. However, KINC does have a news department which produces the highest rated Spanish newscasts in the Las Vegas Valley. In 2006, KINC has aired both the Nevada Republican and Democratic Gubernatorial Primary debates translated into the Spanish language.
Newscasts
KINC currently produces two live newscasts each weekday at 6 and 10 p.m. covering the State of Nevada. The station's news department also creates 30-second newsbriefs which air both on KINC and KELV-LP as well as news-related station identifications that air solely on KINC at the top of each hour from 3–5 p.m. and 8–10 p.m.
Technical information
Subchannels
The station's digital signal is multiplexed:
Analog-to-digital conversion
When the FCC released its initial DTV allocations on April 21, 1997, it assigned UHF channel 16 to KINC-DT as its digital companion channel. Although many allocations were adjusted when the FCC issued its revised final DTV allocations table on February 17, 1998, KINC's remained unchanged. It was the only UHF station in Las Vegas to retain its original allocation. KINC was granted a permit to construct its digital facilities on November 24, 2000. Supplier difficulties delayed construction of the full-power facilities, requiring extensions of the construction permit, and on February 24, 2003, KINC was granted Special Temporary Authority (STA) to construct a low-power facility in order to comply with the FCC deadline for commencing digital broadcasting while the full-power facilities were still being built. The stati
|
https://en.wikipedia.org/wiki/KELV-LD
|
KELV-LD (channel 27) is a low-power television station in Las Vegas, Nevada, United States, affiliated with the Spanish-language network UniMás. The station is owned by Entravision Communications alongside Univision affiliate KINC (channel 15). The two stations share studios on Pilot Road in the unincorporated community of Paradise (with a Las Vegas mailing address); KELV-LD's transmitter is located atop Mount Arden near Henderson.
Subchannel
References
ELV-LD
UniMás network affiliates
Television channels and stations established in 1980
ELV-LD
ELV-LD
Entravision Communications stations
1980 establishments in Nevada
|
https://en.wikipedia.org/wiki/Quagga%20%28software%29
|
Quagga is a network routing software suite providing implementations of Open Shortest Path First (OSPF), Routing Information Protocol (RIP), Border Gateway Protocol (BGP) and IS-IS for Unix-like platforms, particularly Linux, Solaris, FreeBSD and NetBSD.
Quagga is distributed under the terms of the GNU General Public License v2 (GPL2).
In April 2017, FRRouting forked from Quagga aiming for a more open and faster development.
Name
The project takes its name from the quagga, an extinct sub-species of the African zebra. Quagga is a fork of the GNU Zebra project which was developed by Kunihiro Ishiguro and which was discontinued in 2005. The Quagga tree aims to build a more involved community for Quagga than the centralized development-model which GNU Zebra followed.
Components
The Quagga architecture consists of a core daemon (zebra) which is an abstraction layer to the underlying Unix kernel and presents the Zserv API over a Unix-domain socket or TCP socket to Quagga clients. The Zserv clients typically implement a routing protocol and communicate routing updates to the zebra daemon. Existing Zserv clients are:
ospfd, implementing Open Shortest Path First (OSPFv2)
isisd, implementing Intermediate System to Intermediate System (IS-IS)
ripd, implementing Routing Information Protocol (RIP) version 1 and 2;
ospf6d, implementing Open Shortest Path First (OSPFv3) for IPv6
ripngd, implementing Routing Information Protocol (RIPng) for IPv6
bgpd, implementing Border Gateway Protocol (BGPv4+), including address family support for IP multicast and IPv6
pimd, implementing Protocol Independent Multicast (PIM-SSM) for Source-specific multicast
Additionally, the Quagga architecture has a rich development library to facilitate the implementation of protocol and client software with consistent configuration and administrative behavior.
Google has contributed to improvements to the IS-IS protocol and added BGP multipath support.
See also
Bird Internet routing daemon
List of open source routing platforms
XORP
References
External links
Quagga Mailing Lists
Free routing software
|
https://en.wikipedia.org/wiki/IBM%20Home%20Page%20Reader
|
Home Page Reader (Hpr) was a computer program, a self-voicing web browser designed for people who are blind. It was developed by IBM from the work of Chieko Asakawa at IBM Japan.
The screen reader met World Wide Web Consortium (W3C) HTML 4.01 specifications, Web Content Accessibility Guidelines 1.0 and User Agent Accessibility Guidelines 1.0.
In 2006, it was announced on the Hpr mailing list that IBM does not have plans for any further updates of HPR and the software was subsequently withdrawn from sale by IBM in December 2006. IBM has given code to be used as a Firefox extension.
The program also had a peer-support mailing list.
Criticism
In summer 2002 a non-scientific study concluded that Hpr did not make any distinction between the built-in keyboard shortcuts for entering different modes and the access keys available on websites. The research claimed that Hprs would do better to use links mode to cycle through a list.
System requirements
Hardware
Hpr had the following hardware requirements:
166 MHz processor
32 MB RAM Windows 95/98; 64 MB RAM for Windows NT
14 MB hard disk space; 42 MB hard disk space for HPR and Netscape Communicator
SVGA (640 X 480, 256 colors) graphics
Windows compatible: modem (28.8 KBPS), sound card (16-bit), and CD ROM drive (quad-speed)
Integrated or separately attached numeric keypad
Software
Hpr had the following software requirements:
Microsoft Windows 95, 98 or NT 4.0
Internet service provider (ISP) connection
Netscape Navigator Version 3.01 or higher
For Home Page Mailer, Microsoft Personal Web Server, Version 4.02 required for Windows 95/98; Peer Web Services, Version 4.0 required for Windows NT
A mail program set up with preferences, or Microsoft Personal Web Server or Peer Web Services required for mailto: tags
References
Notes
References
External links
HomePage reader @ evolt.
HPR ftp directory, IBM
IBM Home Page Reader Keyboard Shortcuts, WebAIM
IBM Home Page Reader Tutorial, WebAIM
Discontinued web browsers
Home Page Reader
Windows web browsers
Internet Explorer shells
2002 software
Computer-related introductions in 2002
|
https://en.wikipedia.org/wiki/Lorcon
|
lorcon (acronym for Loss Of Radio CONnectivity) is an open source network tool. It is a library for injecting 802.11 (WLAN) frames, capable of injecting via multiple driver frameworks, without the need to change the application code. Lorcon is built by patching the third-party MadWifi-driver for cards based on the Qualcomm Atheros wireless chipset.
The project is maintained by Joshua Wright and Michael Kershaw ("dragorn").
References
External links
Official Home Page
Network analyzers
Unix security-related software
Unix network-related software
Computer security exploits
IEEE 802.11
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.