source stringlengths 32 199 | text stringlengths 26 3k |
|---|---|
https://en.wikipedia.org/wiki/Dream%20FM%20Network | Dream FM Network was a radio network in the Philippines. It was founded in September 2004 as a radio arm of ABC Development Corporation (now TV5 Network, Inc.), and later on Interactive Broadcast Media.
Dream FM Network shut down its national network in June 2011, with its Manila flagship station currently operated by Ultrasonic Broadcasting System as Energy FM. It currently operates DYKP as Boracay Beach Radio.
History
In September 2004, 11 months after Cojuangco took over the management of ABC, 106.7 was reformatted as Dream FM. The station aired in a smooth jazz format added up with R&B, Soul, Bossa Nova and House. The station branding was named after Dream Satellite TV, also owned by Cojuangco.
After PLDT's media subsidiary MediaQuest Holdings, Inc. acquired TV5 and its affiliate ABC television stations from the consortium led by the Cojuangco group and Malaysia-based broadcaster Media Prima Berhad in March 2010, Dream FM and its regional stations were spun off to become Dream FM Network, led by former ABC stockholder Anton Lagdameo. The ownership of the stations were transferred to Interactive Broadcast Media, after Cojuangco acquired a non-controlling share of the company.
Dream FM Manila signed off at June 30, 2011, with the song, "Till We Meet Again" by Eric Benét. Its provincial stations were shut down a month before. In August 2011, it resumed its broadcast online through Hayag, but ceased its broadcast a few months later. In September 2011, Dream FM Boracay was rechristened as Boracay Beach Radio. On its website, it is described as a "part of the Dream FM Network".
Energy FM Manila transferred to 106.7 on July 1, 2011. The station is referred to as "Energy FM on Dream". This is a temporary partnership between Cojuangco and Ultrasonic Broadcasting System, which took part-ownership of the station.
Stations
Current
Former
References
External links
Dream FM Online
97.3 Boracay Beach Radio
TV5 Network
TV5 (Philippine TV network)
Radio stations in the Philippines
Defunct radio stations in the Philippines
Radio stations established in 2004
Radio stations disestablished in 2011 |
https://en.wikipedia.org/wiki/Vianu | Vianu () is a Romanian surname:
Ion Vianu
Victor Vianu, computer scientist
Tudor Vianu (1898–1964), literary critic, art critic, poet, philosopher
Tudor Vianu National College of Computer Science
Romanian-language surnames |
https://en.wikipedia.org/wiki/Enrique%20Alba | Enrique Alba is a professor of computer science at the University of Málaga, Spain.
Overview
Alba achieved his Ph.D. degree on designing and analyzing parallel and distributed genetic algorithms. His current research interests involve the design and application of evolutionary algorithms, ant colony optimization, particle swarm optimization, and other bio-inspired systems to real problems including telecommunications, software engineering, combinatorial optimization, and bioinformatics among others. The main focus of all his work is on parallel metaheuristics and multiobjective optimization for complex problems.
Work
Prof. Alba leads the NEO (Networking and Emerging Optimization) group at the University of Málaga, Spain.
His ongoing research includes the fields of ad hoc metropolitan network optimization, optimal design of GSM networks, logistics, vehicle routing, natural language tagging, software engineering, DNA fragment assembly, gene microarrays, cutting/packing, software testing and validation, and in general combinatorial problems lying in the base of real-world problems. New fields like multiobjective techniques with high scalability, grid/P2P/Internet platforms, dynamic optimization of problems whose definition change in time, and heterogeneous algorithms are dealt with as part both of basic and applied research. He has been involved in many projects and Ph.D. theses dealing with the construction and utilization of vehicular ad hoc networks, as well as has started a whole line of research in Bio-inspired techniques, and metaheuristics for smart cities.
As for techniques, Alba and his group are dealing mainly with metaheuristics, either bio-inspired or not, and also hybridization with other (possibly exact) methods. Specifically, genetic algorithms, particle swarm, ant colonies, simulated annealing, branch and bound, differential evolution, variable neighbourhood search, and related solvers are used.
Prof. Alba has published seven books on metaheuristics and bio-inspired techniques, more than 130 papers indexed in ISI impact journals, and more than 300 conference papers. He has coordinated several Spanish national research projects like TRACER, OPLINK, M*, DIRICOM, roadME, moveON, 6city, ECO-IOT,. His work has achieved internationalization via his participation in bilateral projects with INRIA like PERFOM, MOID, Robust&Green, and European CELTIC projects like CARLINK, FP7 COADVISE, fiQare, and TAILOR. He holds active collaborations by joining publications and exchanges with more than 20 international universities and labs, and his research in Málaga is also innovating with industrial transferences to several companies including TARTEC S.A., OPTIMI, Arelance, NOVASOFT, ETRA I+D, Moviquity, VTT, Synergiums, EMERGYA, SECMOTIC, ACTECO, EUROSOTERRADOS, TORCAL, JUMA and others.
Alba works in the program committee of leading conferences in several fields, including ACM GECCO, IEEE CEC, PPSN, EvoStar, IPDPS, as well as organizing internat |
https://en.wikipedia.org/wiki/Northern%20Gas%20Networks | Northern Gas Networks Limited is the British company responsible for distributing gas to homes and businesses across Yorkshire, the North East and northern Cumbria, England. Northern Gas Networks Limited is one of eight gas distribution networks in the United Kingdom.
The consortium which owns Northern Gas Networks Limited was successful in acquiring the North of England Distribution Network (DN) from National Grid and took over the control of the assets on 1 June 2005. Currently, the company supplies gas to approximately 2.6 million customers through a network of of gas pipeline in Yorkshire, North East England and parts of Cumbria.
The company performed the best in terms of total cost efficiency benchmarked by Ofgem, which regulates the company's contracts and charges.
It was reported in December 2011 that the energy regulator Ofgem was set to fine Northern Gas Networks £900,000 for breaching licence conditions over gas escapes during the 2010/11 winter.
See also
North Eastern Gas Board (the former state-owned utility in the southern half of the NGN region)
Northern Gas Board (the former state-owned utility in the northern half of the NGN region)
References
External links
Oil and gas companies of the United Kingdom
Companies based in Thorpe Park Leeds |
https://en.wikipedia.org/wiki/Trams%20in%20Finland | Trams in Finland date from a horse-drawn Turku tramway network, which opened in 1890. Electric tramway traction started in Finland in 1900 with the introduction of electric trams in Helsinki, and the last horse-drawn trams were withdrawn from operation in 1917. Although there were three Finnish tramway networks between 1912 and World War II, by 1972 the number of networks had dwindled to just one, that of Helsinki, which remained Finland's only tramway network for almost 50 years. However, in August 2021, a light rail line was opened to the public in Tampere. There have also been proposals to set up tram or light rail networks in some other cities. As of 2021, the most concrete such plans are in Turku.
History
Helsinki
In Helsinki, horse trams operated between 1890 and 1901. Since 1900, electric trams have operated there.
For part of its existence, the Helsinki tramway network has been supplemented by a trolleybus line: in 1949–1974, and on a trial basis in 1979–1985.
Between 1913 and 1917 there was a short-lived horse-drawn tramway in Lauttasaari, an island that was a part of the Helsinki Rural Municipality and since 1920 the municipality of Huopalahti, which was later merged into Helsinki.
The Kulosaari, and Haaga municipalities also had a tramway that belonged to the Helsinki tram network.
Turku
In Turku, there were horse-drawn trams from 1890 to 1892, and electric trams from 1908 to 1972. The tram network was abandoned in 1972, when the last remaining tram line was replaced by buses.
The arguments against the Turku tramway were associated with the 1960s view that trams were an outdated mode of transport, while buses were seen as modern technology. The decision to close the Turku tramway network can also be seen in part as inspired by events in Stockholm, which had closed most of its tramway network a little earlier.
The municipalities of Kaarina and Maaria in the Turku region had a tramway that belonged to the Turku tram network.
Viipuri
Trams began running in Viipuri, then a part of the Grand Duchy of Finland, in 1912. They were electrically operated from the start.
Following the cession of the city to the Soviet Union during World War II, the tramway network remained in service until 1957.
Other tramways
Some narrow gauge Finnish railways with mostly or only freight traffic have been called "tramways".
These railways include industrial lines, such as the "freight tram" in Tampere (from Finlayson to Santalahti woodyard a few kilometres away), which closed in 1957, the railway in Mustio (a freight line from the railway station to the mill), which closed in 1964 and the Kyröskoski industrial railway in Hämeenkyrö (Finland's last narrow gauge industrial railway), which closed in 1989. The harbour railway in Lohja, which was Finland's first electric railway, running from the state railway station to the port, carried both passenger and freight services but closed in 1930.
Today
Helsinki
In Helsinki, there are ten tram line |
https://en.wikipedia.org/wiki/Comparison%20of%20MySQL%20database%20engines | This is a comparison between notable database engines for the MySQL database management system (DBMS). A database engine (or "storage engine") is the underlying software component that a DBMS uses to create, read, update and delete (CRUD) data from a database.
External links
MySQL Documentation on MyISAM Storage Engine
MyISAM's open files limit and table-cache problem explained
The article about problems which will occur in using MyISAM
MySQL
MySQL |
https://en.wikipedia.org/wiki/Pilot%20%28American%20Horror%20Story%29 | "Pilot" is the first episode and the series premiere of the television series American Horror Story, which premiered on the network FX on October 5, 2011. The episode was co-written by series creators Ryan Murphy and Brad Falchuk and directed by Murphy. Falchuk and Murphy had previously collaborated on the Fox musical comedy-drama Glee.
In this episode, the Harmon family – Ben (Dylan McDermott), Vivien (Connie Britton) and Violet (Taissa Farmiga) – move from Boston to Los Angeles after Vivien gives birth to a stillborn baby and Ben has an affair with one of his students. The family moves to a restored mansion, unaware that the home is haunted. While Vivien tries to deal with intrusive neighbor Constance (Jessica Lange), Violet connects with troubled teenager Tate (Evan Peters).
In the United States, the series premiere achieved a viewership of 3.18 million. The episode garnered a 1.6 rating in the 18–49 demographic, translating to 2.0 million viewers according to Nielsen Media Research. This made the episode the network's best series premiere ever. Critical reviews of the pilot episode were mostly positive, with Metacritic awarding it 62 out of 100 points. Pilot was nominated for a Primetime Emmy Award for Outstanding Art Direction for a Miniseries or Movie in 2012.
This episode makes use of the musical score to Vertigo composed by Bernard Herrmann. This episode is rated TV-MA (LSV).
Plot
In 1978, Twins Bryan and Troy arrive and enter an old mansion, despite a young Adelaide warning them they would die. The boys threaten her and proceed into the house anyway. They vandalize the house a bit with baseball bats before entering the basement where they are killed.
In 2011, Vivien and Ben Harmon move to Los Angeles from Boston, after Vivien has a miscarriage and walks in on Ben having sex with one of his students. Their teenage daughter Violet is unhappy about the move. They come across the mansion and the real estate agent Marcy mentions the previous owners, a gay couple, died from an apparent murder-suicide. The family decides to buy the house and move in. In the attic, they discover a latex bondage suit, which presumably belonged to the previous owners.
Vivien meets next door neighbor Constance and her daughter Adelaide who has Down syndrome. Vivien also re-hires the elderly maid Moira O'Hara who appears to be a young, seductive maid to Ben. The same night, Ben argues with Vivien, trying to apologize for his infidelity. Afterwards the two have sex.
On her first day of school, Violet is harassed by Leah and her friends, who later fight Violet. Ben begins therapy sessions with a possibly psychotic boy named Tate, who begins a relationship with Violet. To help Violet with her bullying problem, he suggests scaring Leah in the house. Ben finds Moira masturbating and he does the same thing. Ben then sees a burnt and disfigured man watching him from outside. When he goes to confront him, he is nowhere to be found.
Meanwhile, Violet tricks Leah into |
https://en.wikipedia.org/wiki/List%20of%20Pakistan%20Music%20Stars%20episodes | Pakistan Music Stars, a music reality show which is a production of ARY Digital Network is currently on-air on ARY Digital on every Sunday at 9:00PM (Pakistan Standard Time). A total number of 19 episode are announced of this show. The 1st episode of this was the launch of this show while episodes 17th & 18th are semi-finals. The 19th and last episode is the grand finale of the show.
Pakistan Music Stars |
https://en.wikipedia.org/wiki/Microsoft%20Partner%20Network | Microsoft Partner Network or MPN, formerly known as the Microsoft Partner Program or MSPP, is Microsoft Inc.'s partner network which is designed to make resources available to a wide variety of technology companies so they can build a business around Microsoft technologies.
The program consists of 100,000s of partners, vendors and service providers that build or sell solutions based on Microsoft products. It is difficult to ascertain the exact count, Microsoft blogs and channel magazines in 2017 and 2021 listed 100,000 partners in the US and 30,000 in the UK, but the worldwide number is probably in the millions.
These partners include systems integrators, original equipment manufacturers, independent software vendors, value-added resellers, telecommunications companies, Internet hosting services, marketing agencies, and resellers.
As of 2009, this business ecosystem generated $8.70 in revenue for partner companies for every $1 that Microsoft makes.
History
Microsoft Certified Solution Provider program was launched in 1992.
March 2000 – Ian Rogoff was named vice president of Microsoft's Worldwide Partner Group.
Microsoft Certified Partner program was launched in 2000.
In 2001, Microsoft decided to invest $500 million in partner-related activities.
November 2001 – Rosa Garcia replaces Ian Rogoff as head of Microsoft's Worldwide Partner Group.
2002 – Allison L. Watson replaced Rosa Garcia as the head of Microsoft's Worldwide Partner Group.
In 2003, Microsoft invested heavily in the partner program. Microsoft signed up 5,000 new ISVs to the Microsoft's ISV Empower Program. Microsoft upped its number of technical specialists on staff to assist partners, from 700 to 2,400 in one year. Microsoft revamped its employee compensation incentive plans, tying 60 percent of bonuses in most cases to partner and customer satisfaction. Microsoft also centralized its channel programs into the Microsoft Partner Program. This included consolidating OEMs, ISVs, VARs, integrators and consultants under one program.
2004 – Microsoft invested $1.7 billion in the partner program.
July 2010 – John Roskill replaced Allison Watson as the head of Microsoft's Worldwide Partner Group. At that time, Microsoft investment in partners had grown to $5.2 billion. This includes $3.8 billion in channel incentives, $1 billion in partner marketing, $100 million in business investment fund, and $200 million in direct partner benefits through the Microsoft Partner Network.
Late 2010 – The Microsoft Partner Network officially launched and superseded the old Microsoft Partner Program.
2013 – In response to slow sales of the new Windows 8 line, Microsoft slashed Solutions Incentive Program payments.
Coming August 2019 – On-premises product support will no longer be available for Action Pack and competencies.
Current structure
Companies can apply to be a Microsoft Certified Partner. Partner resources include the Microsoft Pinpoint online directory, and the annual |
https://en.wikipedia.org/wiki/Inverse%20probability%20weighting | Inverse probability weighting is a statistical technique for calculating statistics standardized to a pseudo-population different from that in which the data was collected. Study designs with a disparate sampling population and population of target inference (target population) are common in application. There may be prohibitive factors barring researchers from directly sampling from the target population such as cost, time, or ethical concerns. A solution to this problem is to use an alternate design strategy, e.g. stratified sampling. Weighting, when correctly applied, can potentially improve the efficiency and reduce the bias of unweighted estimators.
One very early weighted estimator is the Horvitz–Thompson estimator of the mean. When the sampling probability is known, from which the sampling population is drawn from the target population, then the inverse of this probability is used to weight the observations. This approach has been generalized to many aspects of statistics under various frameworks. In particular, there are weighted likelihoods, weighted estimating equations, and weighted probability densities from which a majority of statistics are derived. These applications codified the theory of other statistics and estimators such as marginal structural models, the standardized mortality ratio, and the EM algorithm for coarsened or aggregate data.
Inverse probability weighting is also used to account for missing data when subjects with missing data cannot be included in the primary analysis.
With an estimate of the sampling probability, or the probability that the factor would be measured in another measurement, inverse probability weighting can be used to inflate the weight for subjects who are under-represented due to a large degree of missing data.
Inverse Probability Weighted Estimator (IPWE)
The inverse probability weighting estimator can be used to demonstrate causality when the researcher cannot conduct a controlled experiment but has observed data to model. Because it is assumed that the treatment is not randomly assigned, the goal is to estimate the counterfactual or potential outcome if all subjects in population were assigned either treatment.
Suppose observed data are drawn i.i.d (independent and identically distributed) from unknown distribution P, where
covariates
are the two possible treatments.
response
We do not assume treatment is randomly assigned.
The goal is to estimate the potential outcome, , that would be observed if the subject were assigned treatment . Then compare the mean outcome if all patients in the population were assigned either treatment: . We want to estimate using observed data .
Estimator Formula
Constructing the IPWE
where
construct or using any propensity model (often a logistic regression model)
With the mean of each treatment group computed, a statistical t-test or ANOVA test can be used to judge difference between group means and determine statistical significance of t |
https://en.wikipedia.org/wiki/FX%20%28Australian%20TV%20channel%29 | FX was an Australian subscription television channel which focused on male-skewed television shows. The channel is owned and operated by Fox Networks Group and launched on 26 February 2012 on both Foxtel and Austar platforms.
On 12 June 2012 it was reported that a two-hour timeshift channel (FX + 2) would launch on 3 July 2012, but this was retracted for it to be later reported that it would launch on 6 September 2012.
On 28 February 2018, FX ceased broadcasting on Foxtel, with all of its programming moved to Fox Showcase.
History
On 9 October 2011 Fox International Channels released details that FX would relaunch in Australia early 2012 with "long-awaited" programs such as The Walking Dead, Transporter: The Series, and Hell on Wheels. The channel launched on 26 February on Foxtel and Austar.
SoHo, formerly known as FX until 2003, was owned by Foxtel, while this incarnation of FX was owned and ran by Fox International Channels (and later Fox Networks Group; the company which operate National Geographic, Nat Geo Wild, and Nat Geo People in Australia).
Promotion
On Wednesday 2 February 2012, FX announced on their Facebook page that to kick off the channels re-launch there would be promotional zombie invasions in Australia's two largest capital cities, Sydney and Melbourne on Wednesday 8 February 2012 in the city centres.
Programming
Final Programming
Acquired Programming
Anger Management (Lionsgate Television)
The Blacklist (Sony Pictures Television, Universal Television)
Borgia (Atlantique Productions)
Burn Notice (20th Television)
Copper (Cineflix Studios)
Criminal Minds (CBS Studios, ABC Signature)
Fargo (FXP, MGM Television)
Fear the Walking Dead (AMC Studios)
The Following (Warner Bros Television)
Franklin & Bash (Sony Pictures Television)
From Dusk till Dawn: The Series (Miramax, Entertainment One Television)
Homeland (Fox 21, Showtime Networks)
Hell on Wheels (AMC Studios, Entertainment One Television)
Kingdom (Balasco Productions)
The Last Ship (Studio T)
Las Vegas (Universal Television)
Legends (Fox 21)
Person of Interest (Warner Bros Television)
Sons of Anarchy (FXP)
The Walking Dead (AMC Studios)
Past Programming
Original Programming
The Ultimate Fighter: The Smashes
The Ultimate Fighter Nations: Canada vs. Australia
Acquired Programming
10 Items or Less (Sony Pictures Television)
Alias (ABC Signature)
American Horror Story (FXP)
Arrested Development (20th Television)
Bedlam (Sky Original Productions)
The Booth at the End (Vuguru)
Breaking Bad (Sony Pictures Television)
The Bridge (FXP)
Call Me Fitz (Entertainment One Television)
Chase (Warner Bros Television)
Ch:os:en (FXP)
Da Vinci's Demons (Phantom Four Films)
Dark Angel (20th Television)
Dark Blue (Warner Bros Television)
The District (Universal Television, CBS Studios)
Endgame (Shaw Media)
E-Ring (Warner Bros Television)
Fear Itself (Fear Itself Productions)
The Fixer (Kudos)
Hell on Wheels (AMC Studios)
House of Lies (Showtime Networks)
Human Target (Warner Bros Televisi |
https://en.wikipedia.org/wiki/Maretia | Maretia is a genus of heart urchins belonging to the family Spatangidae.
Species
Maretia carinata Bolau, 1873
Maretia cordata Mortensen, 1948
Maretia estenozi Sánchez Roig, 1926
Maretia planulata (Lamarck, 1816)
Description
These sea urchins are irregular, as the mouth is located at the front of the underside of the animal, while the anus is located in rear end position.
Fossil record
Fossils of Maretia are found in marine strata from the Eocene until the Quaternary (age range: from 40.4 to 0.012 million years ago.). Fossils are known from some localities in United Kingdom, United States, Germany, Cuba, Indonesia, New Zealand, and Eritrea and Greece.
References
Rowe, F.W.E & Gates, J. (1995). Echinodermata. In ‘Zoological Catalogue of Australia’. 33 (Ed A. Wells.) pp xiii + 510 (CSIRO Australia, Melbourne.)
External links
Reef Guide
Flickr
Underwater Photographs by P. Rossi
Spatangoida
maretia
Taxa named by John Edward Gray |
https://en.wikipedia.org/wiki/Kuch%20Pyar%20Ka%20Pagalpan | Kuch Pyar Ka Pagalpan ( ; English – Once Was a Some Madness of Love) is a Pakistani television serial, written by Samira Fazal, directed by Haissam Hussain, broadcast on the ARY Digital network in Pakistan.
It ran from 1 February 2016, every Monday to Saturday on the Indian TV Channel Zindagi under the title Kuch Pyaar Ka Paagalpan Bhi Tha.
Plot
Mujtaba, a local guy from Iqbal Town, Lahore, moves to the UK, where he lives with his uncle, hoping for a better quality of life and fulfilment of his dreams. The reality proves to be bitter.
Mujtaba has liked his uncle's daughter, Danize, since childhood. When he arrives in the UK, he realises she is an arrogant snob. Danize and Shamraiz got along well since childhood, and both treat Mujtaba as a stupid churl.
They plan a conspiracy against Mujtaba, due to which his uncle throws him out of his house. Then, a girl named Kiran, who has almost no understanding of anyone within her family, arrives in his life.
Cast
Main cast
Fawad Khan as Mujtaba
Sanam Baloch as Kiran
Ayesha Khan as Danize Taimoor
Mikaal Zulfiqar as Shamraiz
Other cast members
Tashiqa Shah
Azra Mohyeddin as Mujtaba's mother
Mujtaba Khan
Hashim Butt as Mujtaba's father
Farah Tufail
Laila Zuberi
Sana Humayun
Khalid Butt
Ayesha Khan as Ubaida
Naeem Tahir as Taimoor
Tahira Bhatti
Soundtrack
The Official Sound Track of the drama serial has been composed by Waqar Ali and the lyrics were written by Sabir Zafar. The title song Kuch Pyar Ka Pagalpan Bhi Tha has been sung by Rahat Fateh Ali Khan
References
External links
Kuch Pyar Ka Pagalpan on MX Player
Kuch Pyar Ka Pagalpan on Eros Now
2011 Pakistani television series debuts
ARY Digital original programming
Pakistani drama television series
Urdu-language telenovelas
2012 Pakistani television series endings |
https://en.wikipedia.org/wiki/Replicant%20%28operating%20system%29 | Replicant is a free operating system (OS) based on the Android mobile platform that intends to replace all proprietary Android components with free-software counterparts. It is available for several smartphones and tablet computers. It is written in the same programming languages as Android (from which it is forked indirectly). The modifications are mostly in the C language; the changes are mostly to the lower-level parts of the OS, such as the Linux kernel and drivers that use it.
The name Replicant is drawn from the fictional replicant androids in the Blade Runner movie. Replicant is sponsored and supported by the Free Software Foundation and partially by NLnet.
History
The Replicant project started in mid-2010 with an effort to consolidate various initiatives attempting to produce a fully free-as-in-freedom Android derivative for the HTC Dream device. The original team consisted of Bradley M. Kuhn, Aaron Williamson, Graziano Sorbaioli and Denis ‘GNUtoo’ Carikli. The project quickly led to the writing of replacement code for the non-free parts that were required to make HTC Dream functional. The first component to be replaced permitted audio to work without a proprietary library. Replicant originally provided its own FOSS application repository, which was later replaced by F-Droid. In June 2022, Replicant announced they had removed F-Droid.
The Radio Interface Layer software that handles communication with the modem was replaced by free code, thus making the telephony part usable. A library handling GPS was then adapted from free code that was originally written for another phone and permitted HTC Dream to have GPS working with Replicant.
Early versions of Replicant were based on Android Open Source Project code, while versions 2.2 (April 2011) and later used CyanogenMod as their base in order to make supporting more devices easier. In a blog post on February 1, 2017, the Replicant project said that the future versions of Replicant will be based on LineageOS, as the CyanogenMod project was discontinued.
As development continued, many members of the original Replicant team retired from the project, making Denis "GNUtoo" Carikli the only remaining member from the original team still actively working on the project. In April 2011, Paul Kocialkowski decided to get involved with the project and gradually became the main Replicant developer, after successfully porting it to the Nexus S and Galaxy S devices.
In 2014, however, Replicant was criticized for lagging behind. "While CyanogenMod is up to 4.4.4, Replicant is still stuck on Android 4.2. CM runs on just about everything, but Replicant is only supported by a handful of devices ranging from two to four years old. Plus, while Replicant aims to replace the proprietary drivers, it doesn't actually have a complete stack of drivers for any device." When the smartphone operating systems efforts of others, like Mozilla, failed to gain traction, Replicant continued.
Replicant is sponsored and su |
https://en.wikipedia.org/wiki/Orphaned%20Starfish%20Foundation | The Orphaned Starfish Foundation (OSF) is a 501(c)3 non-profit organization focused on developing vocational centers for orphans, victims of abuse and at-risk youth. Through the creation of computer centers and a focus on the development of computer literacy, OSF creates increased employment opportunities for the children they serve. It runs fifty computer centers in twenty-five countries, serving over 10,000 children worldwide.
History
OSF was founded by Andy Stein, a philanthropist with a background in international banking. While working as the joint head of corporate finance in the Philippines for Chase Bank, Stein became 'financially and emotionally' connected to working with orphans and orphanages. He insisted any clients who wanted to pitch business must also arrange a visit to an orphanage. In Chile, Stein spoke with a nun, who informed him of the challenges that face orphans after leaving the orphanage, including homelessness, drug addiction and prostitution. This inspired him to file the necessary paperwork to create a charity, and raise funds for a state-of-the-art computer center for the orphanage in Santiago.
The foundation is named for Loren Eiseley's famous parable about a young man throwing starfish into the ocean. When the man is told he cannot possibly make a difference saving one starfish at a time he replies, "It makes a difference [ . . . ] for that one." Stein identifies this as the mission of OSF--though the foundation will never save all the orphans, it "starts with just one starfish."
Programs and Initiatives
OSF funds the construction, maintenance and staffing of vocational training facilities. These include over 50 computer centers, for which they have provided furnishings, computers and computer equipment as well as funding for teachers, English language programs, job placement, and scholarships. Stein identifies the development of life skills as essential to the foundations work, and programs include training on how to manage a budget, obtain independent housing, and maintain a healthy lifestyle. Once a center is established, OSF commits to their operation "for life".
A staple of Stein's personal visits to the orphanage are his magic shows. He is known by the orphans as 'Tio Mago', uncle magician, and he considers magic a tool in his outreach: "It's a way to make the children feel like they have the ability to do anything in the world."
Funding
OSF is a registered 501c3 charity, and its budget is generated in large part from the general public. The Annual Gala in New York City raises 80 percent of their annual operating income as well as the entirety of their scholarship fund.
References
501(c)(3) organizations
Organizations established in 2001
2001 establishments in New York City |
https://en.wikipedia.org/wiki/Playing%20cards%20in%20Unicode | Unicode is a computing industry standard for the handling of fonts and symbols. Within it is a set of images depicting playing cards, and another depicting the French card suits.
Card suits
The Miscellaneous Symbols block contains the following, at U+2660–2667:
Playing cards deck
Unicode has code points for the 52 cards of the standard French deck plus the Knight (Ace, 2-10, Jack, Knight, Queen, and King for each suit), two for black and white (or red) jokers and a back of a card, in block Playing Cards (U+1F0A0–1F0FF). Also, a specific red joker and twenty-two generic trump cards are added.
Tarot
Four Knights of the Tarot deck are in block Playing Cards (U+1F0A0–1F0FF). A specific red joker and twenty-two generic trump cards were added to the Playing Cards block in Unicode 7.0 with the reference description being not the Italian-suited Tarot de Marseille or its derivatives (which are often used in cartomancy) but the French Tarot Nouveau used to play Jeu de tarot.
Playing Cards block chart
Emoji
The Playing Cards block contains one emoji:
.
The emoji presentation sequences refine and colorize the text presentation of the playing card suits. ♠︎♥︎♦︎♣︎ becomes ♠️♥️♦️♣️. This was done by appending the U+FE0F code point to the textual code points shown far above. For example, the black heart suit ♥ becomes the red heart emoji by ♥️. Conversely, the black heart suit can be coerced by appending U+FE0E with ♥︎. These hold for each suit.
There is an emoji for Japanese hanafuda (flower playing cards): . The emoji can stand for any hanafuda card but it is usually depicted as the Moon card specifically.
References
Playing cards
Unicode blocks with characters for games |
https://en.wikipedia.org/wiki/Cloud%20database | A cloud database is a database that typically runs on a cloud computing platform and access to the database is provided as-a-service. There are two common deployment models: users can run databases on the cloud independently, using a virtual machine image, or they can purchase access to a database service, maintained by a cloud database provider. Of the databases available on the cloud, some are SQL-based and some use a NoSQL data model.
Database services take care of scalability and high availability of the database. Database services make the underlying software-stack transparent to the user.
Deployment models
There are two primary methods to run a database on a cloud platform:
Virtual machine image Cloud platforms allow users to purchase virtual-machine instances for a limited time, and one can run a database on such virtual machines. Users can either upload their own machine image with a database installed on it, or use ready-made machine images that already include an optimized installation of a database.
Database-as-a-service (DBaaS) With a database as a service model, users pay fees to a cloud provider for services and computing resources, reducing the amount of money and effort needed to develop and manage databases. Users are given tools to create and manage database instances, and control users. Some cloud providers also offer tools to manage database structures and data. Many cloud providers offer both relational (Amazon RDS, SQL Server) and NoSQL (MongoDB, Amazon DynamoDB) databases. This is a type of software as a service (SaaS).
Architecture and common characteristics
Most database services offer web-based consoles, which the end user can use to provision and configure database instances.
Database services consist of a database-manager component, which controls the underlying database instances using a service API. The service API is exposed to the end user, and permits users to perform maintenance and scaling operations on their database instances.
Underlying software-stack stack typically includes the operating system, the database and third-party software used to manage the database. The service provider is responsible for installing, patching and updating the underlying software stack and ensuring the overall health and performance of the database.
Scalability features differ between vendorssome offer auto-scaling, others enable the user to scale up using an API, but do not scale automatically.
There is typically a commitment for a certain level of high availability (e.g. 99.9% or 99.99%). This is achieved by replicating data and failing instances over to other database instances.
Data model
The design and development of typical systems utilize data management and relational databases as their key building blocks. Advanced queries expressed in SQL work well with the strict relationships that are imposed on information by relational databases. However, relational database technology was not initially designed or |
https://en.wikipedia.org/wiki/List%20of%20programs%20broadcast%20by%20Sony%20Channel%20%28Latin%20America%29 | This is a list of shows that have aired on the Latin American versions of Sony Channel. Shows currently aired on the network are in bold.
0-9
10 Items or Less
3rd Rock from the Sun (repeats currently seen on Comedy Central)
30 Rock (repeats currently seen on TBS)
7th Heaven
8 Simple Rules
90210
A
According to Jim
Águas do Brasil (seen only in Brazil)
The Agency
Agent Carter
Agents of S.H.I.E.L.D.
Agora Sim! (seen only in Brazil)
Alias
Alice
American Dreams
American Idol
American Inventor
America's Got Talent
America's Next Top Model
As If
The Associates
B
Baby Daddy
Balls of Steel
Baywatch
Beautiful People
Becker
The Best Years
Bette
Beverly Hills, 90210
Big Day
Black-ish
The Blacklist (seasons 1 and 2 seen on Canal Sony region-wide, currently seen on Canal Sony in Spanish-speaking countries and on AXN in Brazil)
Bloopers
Blow Out
Bob Patterson
Body of Proof
The Boondocks
Brazil's Next Top Model
Breaking Bad (repeats currently seen on AMC)
Breakout Brasil (seen only in Brazil)
Bunheads
C
Los Caballeros las Prefieren Brutas
Call Me Fitz
Caroline in The City
Carpoolers
Campeões pelo Brasil (seen only in Brazil)
Castle (currently seen on AXN)
Celebrity Apprentice
Celebrity Poker Showdown
Charlie's Angels
Charmed (repeats currently seen on Syfy)
Cheers
Chefs na Rua (seen only in Brazil)
Cidades do Brasil (seen only in Brazil)
The Client List
Coach
Code Black
Comer Bem Que Mal Tem (seen only in Brazil)
Commander in Chief
Community (also seen on Comedy Central)
Cosby Mysteries
The Cosby Show
Cougar Town
Coupling (U.S.)
Courting Alex
Covert Affairs
Crumbs
CSI: Crime Scene Investigation (repeats currently seen on AXN and TNT Series)
CSI: Miami (repeats currently seen on AXN and TNT Series)
CSI: NY (repeats currently seen on AXN)
Cuídate de la Cámara (seen only in Mexico)
Cupid
Cursed/The Weber Show
Curtindo o Rio (seen only in Brazil)
Cybill
D
Da Ali G Show
DAG
The Daily Show with Jon Stewart: Global Edition
Dawson's Creek
Days of Our Lives
Dead Like Me
Deadbeat
The Defenders
Desperate Housewives
Devious Maids (currently seen on Lifetime)
Dilbert
The District
Do Over
The Drew Carey Show
Drop Dead Diva (currently seen on Lifetime)
E
Early Edition
Ed
Eli Stone
Entubados (seen only in Brazil)
The Ellen Show
Emily's Reasons Why Not
Everybody Hates Chris
Everybody Loves Raymond
ER (repeats currently seen on TNT Series)
EstiloDF (seen only in Mexico)
Extreme Makeover
F
Falcon Beach
Family Law
Family Ties
Felicity
The Fosters
Franklin & Bash
Frasier
Friday Night Lights
Friends (only seasons 1 to 7. It then moved to Warner Channel)
G
The Game
Gary Unmarried
GCB
The Geena Davis Show
Ghost Whisperer
Grandfathered
Grey's Anatomy (also aired on Star Channel)
Grosse Pointe
Grounded for Life
Grown Ups
H
Happy Endings
Happy Family
Hidden Hills
Home Improvement
Hope & Faith
How I Met Your Mother (currently seen on Star Channel)
How to Get Away with Murder
I
The Incredible Hulk
In Justice
Iron Chef
The IT Crowd (currently seen on I.Sat)
It’s All Relative
J
|
https://en.wikipedia.org/wiki/Lumi | Lumi may refer to:
Computing
Lumi (software), chemical analysis software
Lumi masking, a technique used by video compression software
LUMI, a supercomputer located in Finland
Music
Lumi (album), a 1987 album by Edward Vesala
Lumi (band), a Lebanese krautrock band
Lumi, a fictional singer for the virtual band Genki Rockets
LUMi, a synthetic voice for the Vocaloid software
People
Given name
Lumi Cavazos (born 1968), Mexican actress
Surname
Harri Lumi (born 1933), Estonian former Communist politician
Ott Lumi (born 1978), Estonian politician
Risto Lumi (born 1971), Estonian military Lieutenant Colonel
Places
Aitape-Lumi District, Papua New Guinea
Al-Lumi, a village in central Yemen
Lumi, Albania, a village in NE Albania
Lumi, Yemen, a village in central Yemen
Lumi River (East Africa), a river in Tanzania and Kenya
Lumi River (Zambia), a river in Zambia
Other uses
Lumi (company), a packaging supply chain company and inventor of Inkodye
Lumi (currency), the current legal tender of Accompong state and for Eco-6, the 6th Economic Region of the Africa Union
Salmo lumi, a type of fish
See also
Lumia (disambiguation)
Lumi River (disambiguation)
Estonian-language surnames |
https://en.wikipedia.org/wiki/Tree%20of%20primitive%20Pythagorean%20triples | In mathematics, a tree of primitive Pythagorean triples is a data tree in which each node branches to three subsequent nodes with the infinite set of all nodes giving all (and only) primitive Pythagorean triples without duplication.
A Pythagorean triple is a set of three positive integers a, b, and c having the property that they can be respectively the two legs and the hypotenuse of a right triangle, thus satisfying the equation ; the triple is said to be primitive if and only if the greatest common divisor of a, b, and c is one. Primitive Pythagorean triple a, b, and c are also pairwise coprime. The set of all primitive Pythagorean triples has the structure of a rooted tree, specifically a ternary tree, in a natural way. This was first discovered by B. Berggren in 1934.
F. J. M. Barning showed that when any of the three matrices
is multiplied on the right by a column vector whose components form a Pythagorean triple, then the result is another column vector whose components are a different Pythagorean triple. If the initial triple is primitive, then so is the one that results. Thus each primitive Pythagorean triple has three "children". All primitive Pythagorean triples are descended in this way from the triple (3, 4, 5), and no primitive triple appears more than once. The result may be graphically represented as an infinite ternary tree with (3, 4, 5) at the root node (see classic tree at right). This tree also appeared in papers of A. Hall in 1970 and A. R. Kanga in 1990. In 2008 V. E. Firstov showed generally that only three such trichotomy trees exist and give explicitly a tree similar to Berggren's but starting with initial node (4, 3, 5).
Proofs
Presence of exclusively primitive Pythagorean triples
It can be shown inductively that the tree contains primitive Pythagorean triples and nothing else by showing that starting from a primitive Pythagorean triple, such as is present at the initial node with (3, 4, 5), each generated triple is both Pythagorean and primitive.
Preservation of the Pythagorean property
If any of the above matrices, say A, is applied to a triple (a, b, c)T having the Pythagorean property a2 + b2 = c2 to obtain a new triple (d, e, f)T = A(a, b, c)T, this new triple is also Pythagorean. This can be seen by writing out each of d, e, and f as the sum of three terms in a, b, and c, squaring each of them, and substituting c2 = a2 + b2 to obtain f2 = d2 + e2. This holds for B and C as well as for A.
Preservation of primitivity
The matrices A, B, and C are all unimodular—that is, they have only integer entries and their determinants are ±1. Thus their inverses are also unimodular and in particular have only integer entries. So if any one of them, for example A, is applied to a primitive Pythagorean triple (a, b, c)T to obtain another triple (d, e, f)T, we have (d, e, f)T = A(a, b, c)T and hence (a, b, c)T = A−1(d, e, f)T. If any prime factor were shared by any two of (and hence all three of) d, e, and f then by thi |
https://en.wikipedia.org/wiki/Compose.io | Compose was a private, Database-as-a-Service (DBaaS) platform for securely hosting and managing shared and dedicated MongoDB instances. Compose was used by a majority of the cloud hosting service Heroku's MongoDB users, being the only remote Mongo host for over a year.
History
Compose was an alumnus of the Y Combinator business incubator, Summer 2011 class.
In July 2011, Compose announced it received its first round of angel investment of $417,000 from Y Combinator, Lerer And SV Angel. Shortly thereafter, MongoHQ acquired the competing Mongo host and automated provisioning software of MongoMachines.
Compose currently integrates with 4 PaaS providers, with more slated in the future.
They were named #4 in the top "10 Enterprise Cloud App Services of 2011" by Read Write Web.
In August 2014, Compose renamed their company from MongoHQ.
In July 2015, Compose was acquired by IBM
See also
Cloud database
NoSQL
PAAS
Big data
Document database
References
External links
NoSQL
Cloud computing providers
IBM acquisitions |
https://en.wikipedia.org/wiki/Microcomputer%20Club%20Nederland | The Microcomputer Club Nederland (MCN) was a Dutch computer club which was founded by Vendex in the mid-1980s. The club was centered on the computer departments of the Vroom & Dreesmann department store and the Dixons electronics stores, which sold home computers such as the Commodore 64, ZX Spectrum and MSX computers. Later they also sold IBM PC compatibles under the brand name Vendex. MCN also issued a same-named magazine and sold accessories such as diskettes under their name.
The director of MCN was Maurice de Hond.
See also
Hobby Computer Club
Philips Computers
References
Computer clubs in the Netherlands |
https://en.wikipedia.org/wiki/Saint%20Dracula%203D | Saint Dracula 3D is a 2012 film directed by Rupesh Paul. Produced by BizTV Network – the producers of Dam 999, Saint Dracula 3D became the second stereoscopic 3D film to be made on the story of Count Dracula, as Dario Argento had already directed Dracula 3D earlier that year. The film was released in English and Malayalam
Filming
The film was shot in Liverpool, Manchester and Wales in the UK. Director Rupesh Paul along with Sohan Roy, the director of the film Dam 999 completed the movie with a cast and crew from the UK.
The entire movie was shot on camera 'RED' by Frenchman Francois Coppey, the Director of Photography, while the stereography was done by Julian Crivelli. The movie was released in 2012.
As of March 2013, the film was available as a part of the Freestyle Life Film Exhibition.
Cast
Mitch Powell – as Dracula
Patricia Duarte – as Clara
Daniel Shayler – as Benjamin
Suzanne Roche – as Sr. Agnes
Bill Hutchens – as Fr. Nicholson
Carl Wharton – as The Vicar
Michael Christopher – as The Bishop
Anna Burkholder – as Hay
Lawrence Larkin – as FBI Agent Carlo
Nicola Jeanne – as The Mother Superior
Crew
Written & Directed By – Rupesh Paul
Project Designer – Sohan Roy
Producer – BizTV Network
Co-Producer – Prabhiraj.N
Cinematographer – Francois Coppey
Still Photography – John Guy
Editor- Ajay Devloka
Line Producer – John Guy
Stereographer – Julian Crivelli
Colorist – Sapan Narula
Music – Sreevalsan J Menon
Sound Design – Renjith Viswanathan
Costume Designer – Nichola Parle
Digital Image Technician – Wezley Joao Ferreira
Animal Consultancy – Jakk Tennant
Oscar eligibility
In 2012, the movie was one of 282 feature films eligible for an Oscar Award for Best Picture at the 85th Oscars. Two of the songs as well as the background score of the film were also eligible for the Best Song and Best Original Soundtrack award categories. Saint Dracula 3D was one of two feature films from India to be included in the category, the second one being Akashathinte Niram by Dr Biju.
See also
Vampire film
References
External links
2012 films
Films scored by Sreevalsan J. Menon
Dracula films
Films directed by Rupesh Paul
2010s Malayalam-language films
Films shot in England
Films shot in Wales
2010s English-language films |
https://en.wikipedia.org/wiki/EZchip%20Semiconductor | EZchip Semiconductor was a publicly traded fabless semiconductor company, headquartered in Yokneam, Israel, that developed and marketed Ethernet network processors. It was acquired by Mellanox Technologies in 2016.
History
EZchip was co-founded in 1999 by Eli Fruchter, a Technion graduate in the field of electrical engineering and veteran of the Israel Defense Forces' 8200 intelligence unit, and Alex Tal who served as Ezchip's first CTO and V.P R&D. Until 2008, EZchip operated as a subsidiary of LANOptics, then a developer of Ethernet switching chips and security software. After LANOptics completed its full acquisition of EZchip in January 2008, it changed its name to EZchip and its ticker symbol from LNOP to EZCH. Over the twelve-month period leading up to February 2012, shares of EZchip rose 40% on the Nasdaq index as demand for its processors grew and speculation increased that the company would get bought out.
In July 2014, EZchip acquired Tilera, a company that develops high-performance multi-core processors, intelligent network interface cards and white-box appliances for data-center networking equipment, $130 million in cash.
In January 2016, a shareholder vote passed that approved the merger of Mellanox Technologies and EZchip. The acquisition was completed on 23 February 2016.
See also
Silicon Wadi
TA BlueTech Index
List of Israeli companies quoted on the Nasdaq
Economy of Israel
References
Further reading
Fabless semiconductor companies
Companies formerly listed on the Nasdaq
Companies listed on the Tel Aviv Stock Exchange
Electronics companies established in 1999
Semiconductor companies of Israel
Israeli companies established in 1999
Mergers and acquisitions of Israeli companies
2016 mergers and acquisitions |
https://en.wikipedia.org/wiki/Trolleybuses%20in%20C%C3%B3rdoba | The Córdoba trolleybus system () is part of the public transport network in Córdoba, the capital city of Córdoba Province, Argentina.
Opened in 1989, the system presently comprises three lines, with a total length of approximately .
History
As part of an ambitious municipal public transport improvement program, the city of Córdoba decided in the late 1980s to incorporate trolleybuses into Córdoba's urban transport system.
The Soviet firm "VVO Technoexport" was responsible for the turnkey installation of the trolleybus system, which initially used ZiU-9 trolleybuses, model 682b, manufactured in Russia by ZiU (Zavod imeni Uritskogo, now Trolza).
In 1990, Russian-made ZiU-10 articulated trolleybuses of model 683c were added to the fleet. They incorporated thyristor technology, which ensured more effective control. By 1992, Córdoba had 32 conventional and 12 articulated ZiU-brand trolleybuses. The latter vehicles had a capacity of 46 seats and 166 passengers with a total length of 17.5 m.
In 2000, 16 Chinese-built Norinco Shenfeng trolleybuses entered service on the system. These did not last long and were all withdrawn by 2013.
In 2010 a prototype articulated trolleybus by Belkommunmash entered service. The latest fleet renewal occurred in 2015 when 7 Trolza trolleybuses were delivered. These include 5 low-entry vehicles of the type Optima and 2 low-floor vehicles of the type Megapolis.
Companies that have operated the Córdoba trolleybus system have been successively:
Expreso Emir S.A.: from 1989 to 1993;
Transportes Eléctricos Cañadenses: from 1993 to 1996;
Municipalidad de Córdoba: from 1996 to 1997;
Trolecor S.A.: from 1998 to July 2004;
Transporte Automotor Municipal Sociedad del Estado (TAMSE): since July 2004.
Lines
These are Córdoba's present trolleybus lines:
Line A
From Barrio Mariano Fragueiro
To Plaza las Américas
Line B
From Barrio Alto Alberdi
To Barrio Pueyrredón
Line C
From Barrio Ameghino
To Barrio San Vicente
Gallery
See also
Córdoba Metro
List of trolleybus systems
References
External links
Córdoba, Argentina
Cordoba
Cordoba
1989 establishments in Argentina |
https://en.wikipedia.org/wiki/Ture%20Sj%C3%B6lander | Ture Sjölander (born 1937) is an early pioneer of computer animation. Beginning in 1964, his electronic images were being broadcast by Sveriges Television AB (SVT), the Swedish public broadcaster.
Productions from the SVT period include TIME (1965/66 Ture Sjolander and Bror Wikstrom), Monument (1968 with Lars Weck) and Space in the Brain (1969 Ture Sjolander, Bror Wikstrom, Sven Hoglund and Lasse Svanberg).
References
External links
Monument on YouTube
The artist's website
Biographical essay
Swedish animators
Swedish animated film directors
Swedish animated film producers
1937 births
Living people
Swedish photographers
People from Sundsvall |
https://en.wikipedia.org/wiki/SourceAmerica | SourceAmerica (formerly NISH) is a U.S. nonprofit agency, located in Vienna, Virginia, that creates employment opportunities for people with disabilities through its national network of affiliated nonprofit agencies.
History
SourceAmerica is one of two U.S. central nonprofits designated in the Javits–Wagner–O'Day Act to support nonprofit agencies participating in the AbilityOne Program. Both central nonprofits work to provide employment opportunities for people who are blind or have other significant disabilities by providing them opportunities to produce goods and services under federal contracts.
SourceAmerica was incorporated on June 26, 1974, as National Industries for the Severely Handicapped (NISH). The organization changed its name to SourceAmerica on July 1, 2013.
Its largest customer is the U.S. Department of Defense, and affiliated nonprofits manufacture military uniforms, gear for Special Forces, chemical protective suits, military recruit bags, and other items. Its agencies also sew American flags that the Veterans Administration sends to military families when a veteran passes.
SourceAmerica and its network of nonprofit agencies also contract with commercial entities to provide products and services. In addition to companies such as Starbucks, Inter-American Development Bank, PetSafe and Grainger, small entrepreneurial ventures such as Blush & Whimsy and Luna Innovations Incorporated have found business solutions with nonprofit agencies in the network.
Services and programs
SourceAmerica consists of a network of hundreds of organizations that create employment opportunities and choices for people with disabilities. Through that network, SourceAmerica provides employment opportunities to more than 100,000 people with disabilities.
Headquartered in Vienna, Virginia, SourceAmerica provides its nonprofit agency network with business development, contract management, legislative and regulatory assistance, communications and public relations materials, information technology support, engineering and technical assistance, and extensive professional training needed for successful nonprofit management.
The agency hosts an annual Grassroots Advocacy Conference to empower people with disabilities to speak up for themselves on Capitol Hill. Since 1998, it has invited members of its network to Washington each June to meet with lawmakers about disability employment issues.
Every year, the SourceAmerica Design Challenge teams high school and college students with people with disabilities to invent engineering solutions. Students meet with a nonprofit agency or business that employs people with disabilities to create processes, devices or programs that improve the workplace.
SourceAmerica Pathway to Careers is a customized employment program designed to pair applicants with employers. Pathway's staff uses the participant's profile to match applicants with employers in the community.
At both the Special Olympics 2018 USA Games and the Spec |
https://en.wikipedia.org/wiki/Young%20Thor | Young Thor is an American-Canadian action-adventure video game developed by Frima Studios and published by Sony Computer Entertainment. Like Zombie Tycoon, it is produced with the participation of Telefilm Canada. It was first released in 2010 as a downloadable PlayStation Network title for the PlayStation Portable and PlayStation 3. Young Thor is about the childhood of the eponymous Norse god, Thor, as he embarks on a quest to save the world tree, Yggdrasil. The game was met with mixed or average reviews from critics upon release.
Gameplay
The game is a side-scroller beat 'em up and is broken up into four levels. Players control the Norse god Thor and unleash his lightning magic and powerful hammer, Mjölnir, to blast any foes in his way. As the game progresses, Thor gains XP which increases his character stats; however, the stats are not customizable, leading Joystiq to comment, "leveling seems to exist for the sole purpose of encouraging replays. Somebody out there will want to achieve a level 100 character, right?" Each level introduces new types of enemies and new complicated platform layouts. Treasures are hidden in certain levels which, if found, grant Thor powers such as extra health and magic regeneration, or the ability to double jump. Levels must be repeated multiple times both to find the treasures and to gain enough experience to defeat tougher enemies in later levels. To explain the Norse mythology present in the game, as the game progresses players unlock dictionary entries which can be accessed through the extras section of the game's menu.
Plot
The game follows the Norse god Thor as he travels through Midgard and Asgard on a quest to restore balance to the world. The three Norns charged with keeping the world tree Yggdrasil – Urd, Skuld, and Verdandi – are being held captive by Hel and her two accomplices Níðhöggr and Ratatoskr. Yggdrasil will die if the Norns do not return, and with its death Hel will gain great power. Thor thus embarks on a quest to find eight godly artifacts that will help him defeat the captors and rescue the Norns.
Development
Young Thor is the second PlayStation Portable mini developed by Frima Studio, the first being Zombie Tycoon released on October 29, 2009. The game was shown at the Sony Computer Entertainment Europe booth at E3 2010, a video game trade fair held in Los Angeles, California in June 2010. Young Thor was released in the PlayStation Store on July 20, 2010. In November 2010, Sony created a "Western Game Buyer Selection" on the PlayStation Network in Japan to offer Western-developed digitally distributed games to the Japanese market. Young Thor was translated and localized for Japanese players, and was among the first three games to be released in this section of the PlayStation Network.
Reception
Young Thor received above-average reviews according to the review aggregation website Metacritic. Joystiqs Andrew Yoon enjoyed the scaling levels but thought the game was too short: "I anticipa |
https://en.wikipedia.org/wiki/List%20of%20number-one%20Billboard%20Latin%20Albums%20from%20the%202010s | The Billboard Top Latin Albums chart, published by Billboard magazine, is a record chart that ranks the performance of Latin music albums in the United States. The data is compiled by Nielsen SoundScan from a sample that includes music stores, music departments at electronics and department stores, Internet sales (both physical and digital) and verifiable sales from concert venues in the United States. On the week ending January 31, 2017, Billboard updated the methodology to compile the Top Latin Albums chart into a multi-metric methodology to include track equivalent album units and streaming equivalent album units.
The first number-one album of the decade was Dos Mundos: Evolución by Mexican singer Alejandro Fernández. The following number-one album was The Last by Aventura, which spent six non-consecutive weeks at the top of the chart in 2010 and ended the year as the best-selling Latin album in the United States. Euphoria, a bilingual album released by Spanish singer-songwriter Enrique Iglesias, peaked at number ten in the Billboard 200 chart and spent eleven weeks at the top of the Latin Albums chart. Iglesias earned the Latin Artist of the Year award at the 2011 Billboard Latin Music Awards, a category that combines both sales and airplay, while the aforementioned album won for Latin Album and Latin Pop Album of the Year. Also in 2010, Poquita Ropa by Guatemalan performer Ricardo Arjona debuted atop the chart and also peaked at number one in Mexico. That same year, Mexican singer-songwriter Marco Antonio Solís reached the top of the chart for the tenth time with his studio album En Total Plenitud, the most for any performer. The album received four nominations for the 12th Latin Grammy Awards.
Ricky Martin gained his sixth number-one album on the chart, Música + Alma + Sexo, in February 2011. The album also reached a peak of number three on the Billboard 200. In 2011, Mexican singer Gerardo Ortíz peaked for the first time at number one in the chart with the live album Morir y Existir: En Vivo, two weeks after surviving an ambush attempt in Mexico that left his cousin and business manager dead. Ortíz reached number one for the second time with the album Entre Dios y el Diablo, also in 2011. One notable feat that year was accomplished by Latin pop star Prince Royce, whose self-titled debut album reached the top of the chart 58 weeks after its release. Likewise in 2011, Mexican rock band Maná debuted atop the chart with their eight studio album Drama y Luz, while its lead single "Lluvia al Corazón" also debuted at number one on the Billboard Hot Latin Songs chart.
Number one albums
Key
– Best-selling Latin album of the year
References
General
For information about every week of this chart, follow this link; in the chart date section select a date and the top ten positions for the week selected will appear on screen, including the number-one album, which is shown in the table above.
Specific
United States Latin Albums
2010 Latin
2010s |
https://en.wikipedia.org/wiki/1950%E2%80%9351%20United%20States%20network%20television%20schedule%20%28daytime%29 | Following are the programs on the 1950–1951 United States network television weekday schedule, listing daytime Monday–Friday schedules on four networks for each calendar season from September 1950 to August 1951. All times are Eastern and Pacific. This page is missing info on the DuMont Television Network, which started daytime transmission before any other United States television network.
Talk shows are highlighted in yellow, local programming is white, reruns of prime-time programming are orange, game shows are pink, soap operas are chartreuse, news programs are gold and all others are light blue. New series are highlighted in bold.
Note: The DuMont Television Network still missing in the schedules. All Monday–Friday Shows for all networks beginning in September 1950.
Fall 1950
Winter 1950-1951
Spring 1951
Summer 1951
By network
ABC
Returning Series
Mr. Magic and J.J.
New Series
The Half-Pint Party
Hold'er Newt
Lois and Looie
The Mary Hartline Show
Ozmoe
Paddy the Pelican
Space Patrol
TV Tots Time
Not Returning From 1949 to 1950
CBS
Returning Series
Action in the Afternoon
As the World Turns
The Big Payoff
The Bill Cullen Show
The Bob Crosby Show
Break the Bank
CBS Evening News
CBS News
The Chuck Wagon
The Edge of Night
The Egg and I
Face the Nation
Freedom Rings
The Guiding Light
Homemaker's Exchange
It's Fun to Know
Love of Life
The Mel Torme Show
Morning News
Search for Tomorrow
Two Sleepy People
The U.N. in Action
Vanity Fair
New Series
All Around the Town
The Betty Crocker Show
Bride and Groom
Fashion Magic
The First Hundred Years
The Garry Moore Show
Hold'er Newt
The Johnny Johnston Show
The Life with Snarky Parker
Look Your Best
Lucky Pup
Meet Your Cover Girl
Paddy the Pelican
Robert Q's Matinee
The Steve Allen Show
Strike It Rich
Winner Take All
The World Is Yours
Not Returning From 1949 to 1950
Classifield Column
The Ted Steele Show
U.N. General Assembly Sessions
NBC
Returning Series
The Bill Cullen Show
Breakfast Party
Howdy Doody
Meet the Press
NBC News Update
New Series
America Speaks
The Bert Parks Show
Cowboy Playhouse
Hawkins Falls, Population 6200
The Kate Smith Hour
Miss Susan
The NBC Comics
Panhandle Pete and Jennifer
The Ransom Sherman Show
Remember this Date
The Straw Hat Matinee
Vacation Wonderland
Not Returning From 1949 to 1950
Henson Baldwin's War News Digest
Judy Splinters
Dumont
Returning series
Okay, Mother
TV Shopper
See also
1950-51 United States network television schedule (prime-time)
Sources
https://web.archive.org/web/20071015122215/http://curtalliaume.com/abc_day.html
https://web.archive.org/web/20071015122235/http://curtalliaume.com/cbs_day.html
https://web.archive.org/web/20071012211242/http://curtalliaume.com/nbc_day.html
United States weekday network television schedules
1950 in American television
1951 in American television |
https://en.wikipedia.org/wiki/MIDnet | Grants were submitted to the National Science Foundation in the Spring of 1986, and in the Summer of 1986 NSF approved funding. In September 1987, MIDnet was the first NSFNET regional backbone network to become fully operational. The NSFNET regional backbone networks were the precursors to the Internet. MIDnet initially connected Iowa State University, Kansas State University, Oklahoma State University–Stillwater, the University of Kansas, the University of Missouri, the University of Nebraska-Lincoln, the University of Oklahoma, and Washington University in St. Louis with 56 kbit/s DDS leased telephone lines in a ring topology. The MIDnet ring was originally connected via a 56 kbit/s DDS leased telephone line from the Nebraska node to the NSFNET backbone. It was the first of the NSF-funded regional networks to become fully operational.
MIDnet transitioned from a university-based organization to non-profit status in 1992. Two years later, Global Internet, a Palo Alto, California start-up, acquired MIDnet and its name was changed to Global Internet Network Services. The original board of directors of MIDnet were reorganized as the MIDnet Research and Higher Education Advisory Council. Global Internet sold the Network Services division to Verio, Inc. in 1997 and later sold the consulting and implementation division to Exodus Communications.
MIDnet, Inc. is now a private foundation with a focus on data research and development of information for the research and education networking community.
References
External links
https://www.mid.net/phrack.txt
History of the Internet
Wide area networks |
https://en.wikipedia.org/wiki/The%20D%27oh-cial%20Network | "The D'oh-cial Network" is the eleventh episode of the twenty-third season of the American animated television series The Simpsons. It originally aired on the Fox network in the United States on January 15, 2012. In the episode, Lisa is sad that she has no real friends. She discovers that it is easier to make friends on the Internet and therefore creates a social networking website called SpringFace. It becomes incredibly popular in Springfield and Lisa gets many online friends. However, they still ignore her in real life, and the website starts to cause trouble in the town when people use it while driving and cause accidents. Lisa is put on trial and the court orders her to close down SpringFace.
The episode is a satire of the social networking website Facebook and parodies the film The Social Network, which tells the story of how Facebook was founded. The Winklevoss twins, who sued Facebook founder Mark Zuckerberg for stealing their idea, are featured in the episode. Actor Armie Hammer portrayed the twins in both The Social Network and "The D'oh-cial Network". This episode also features a guest appearance by talk show host David Letterman as himself, appearing in the Simpsons opening sequence. Since airing, "The D'oh-cial Network" has received generally mixed response from television reviewers, with criticism directed at its satire. Around 11.48 million Americans tuned in to watch the episode during its original broadcast.
Plot
The episode starts in a courtroom where Lisa is on trial. The Blue-Haired Lawyer is accusing her of bringing devastation upon Springfield because of her selfish desire to be accepted by others. Lisa starts telling everyone in the courtroom about her side of the story. A few months ago, she and her family went to the new mall in town. There, she encountered her schoolmates Sherri and Terri and asked them if she could spend some time with them at the mall. The two twins said no to Lisa, which made her realize that she has no real friends. Later, Lisa went on Homer's computer and discovered that it is easier to make friends online than in real life, and thus she started a social networking website called SpringFace to get friends. The site became instantly popular among all the citizens of Springfield and Lisa made over a thousand friends in a short period of time. However, Lisa soon noticed that these friends only talked to her on SpringFace and not in real life. She also discovered that the website grew too big to control, with people becoming so addicted to it that they even used it while driving their cars. This caused chaos in the town after numerous car crashes and deaths.
In the present time, the court orders Lisa to shut down SpringFace, and Lisa agrees to do this. The people of Springfield throw away their smartphones and computers soon after the website is closed. When Lisa looks outside her window, she sees Sherri and Terri and a bunch of their friends playing Marco Polo, and they invite Lisa to join them. Pat |
https://en.wikipedia.org/wiki/World%20Nuclear%20University | The World Nuclear University (WNU) is a network which was created in 2003 on the 50th anniversary of U.S. President Dwight D. Eisenhower's ‘Atoms for Peace’ initiative, and is recognized as a "Partnership for Sustainable Development" by the UN Commission on Sustainable Development (CSD).
The WNU is a not-for-profit organisation which runs a series of programmes throughout the world.
The majority of WNU programmes are designed for professionals already working within the nuclear industry, and the programmes aim to further the cause of the peaceful applications of nuclear technologies. Many are focussed on building leadership skills, and providing a broad perspective on the key topics in peaceful nuclear applications.
WNU programmes
The major programmes offered by the World Nuclear University are:
Summer Institute
Run every year in July and August, this is the biggest event on the WNU calendar. The Summer Institute is an intensive six-week leadership development programme tailored specially to leaders in the industry. The programme is composed of lectures, invited leader presentations, small working group activities and a technical tour which combines to give participants a grounding in all aspects of the nuclear industry, with additional presentations focused on specific aspects of leadership. At the end of the programme, the Fellows work on their final projects, called Networks for Nuclear Innovation.
School of uranium production
The WNU School of Uranium production in collaboration with Diamo, from the Czech Republic. The programmes focus on all aspects of uranium production, from surveying and exploration, to extraction and ore processing, environmental and health protection and the decommissioning and rehabilitation of mining areas.
Short course
WNU also runs a number of short courses, held in collaboration with universities and research centres around the world. The courses are focused on "The World Nuclear Industry Today” and they are open to all interested participants. They are focused on improving knowledge of today's nuclear industry, and exploring where nuclear might go in future.
Nuclear Olympiad
The Nuclear Olympiad was held for the first time in 2011 in South Korea as a contest for university students around the world to research and develop a plan for gaining public acceptance of nuclear technology in their country. In 2015, 2016 and 2019 the Nuclear Olympiad engaged under-graduate and graduate students from around the world on the topic of nuclear applications for global development.
School on Radiation Technologies
The WNU School on Radiation Technologies is a two-week programme designed for promising young professionals working in radiation-related industries, research institutes and universities. Like the Summer Institute, this programme features lectures, group activities and technical visits.
Nuclear English
The WNU Nuclear English-language courses aims to prepare learners for the English-speaking |
https://en.wikipedia.org/wiki/Rochard | Rochard is a science fiction platform game available for the PlayStation 3 through the PlayStation Network, for Microsoft Windows, Linux and Mac OS X through the Steam online distribution platform, and for Linux as part of the Humble Indie Bundle 6. Developed by Recoil Games, the game revolves around the manipulation of gravity and the use of a gravity device used to easily move heavy objects around.
The game was launched on the PlayStation Network on September 27, 2011, in USA and on September 28, 2011, in Europe. The game was launched for Windows on November 15, 2011. The game was made unavailable to purchase from Steam on February 17, 2021.
Gameplay
Rochard is a two-dimensional side-scrolling platformer taking place in three-dimensional scenes. The player character, John Rochard, works his way through a series of environments, each containing a mix of puzzle and combat encounters. To overcome these challenges, the player has access to several tools and mechanics that relate to gravity, weight and matter properties.
Players can change the gravity between “normal” earthlike gravity and low gravity. Controlling the gravity is the key feature of the game and allows John to, for example, jump higher in low gravity, alter trajectories of thrown objects, or swing on certain objects using the Gravity Beam. Some levels have sections where the gravity is inverted. In some other levels, players can invert the gravity themselves.
The player is equipped with the "G-Lifter", a modular mining tool hosting various subsystems like a remote gravity controller, a flashlight, and a communication device. When the gravity beam mode is selected it allows John to grab and shoot or drop certain objects like crates, explosives containers etc. With the gravity beam John can also manipulate and move certain objects, like big mining lasers, cargo containers etc. After an upgrade the G-Beam is powerful enough to lift John in low G allowing him to dangle and swing from certain objects. All objects which can be manipulated with the gravity beam are highlighted with a white swipe effect on the surface. The player gets to upgrade the gravity beam several times to gain new abilities to it. In addition to the G-Swing the player can use the G-Beam as a weapon against flying droids, automated turrets and even human enemies (respectively).
Force fields block certain objects. There are four types of force fields: Bio force field (red, blocks human characters); Matter force field (blue, blocks inanimate objects); Energy force field (orange, blocks weapon fire and explosions); Omni force field (white, blocks everything).
Fuses are used to control power on certain electrically powered items. The controlled item is attached to a fuse socket with a thick visible cable. The player can control the power on the item by attaching or detaching the fuse to/from the socket. The fuses cannot be physically damaged but they can be disabled temporarily by shooting at them or using explosives |
https://en.wikipedia.org/wiki/File%20integrity%20monitoring | File integrity monitoring (FIM) is an internal control or process that performs the act of validating the integrity of operating system and application software files using a verification method between the current file state and a known, good baseline. This comparison method often involves calculating a known cryptographic checksum of the file's original baseline and comparing with the calculated checksum of the current state of the file. Other file attributes can also be used to monitor integrity.
Generally, the act of performing file integrity monitoring is automated using internal controls such as an application or process. Such monitoring can be performed randomly, at a defined polling interval, or in real-time.
Security objectives
Changes to configurations, files and file attributes across the IT infrastructure are common, but hidden within a large volume of daily changes can be the few that impact file or configuration integrity. These changes can also reduce security posture and in some cases may be leading indicators of a breach in progress. Values monitored for unexpected changes to files or configuration items include:
Credentials
Privileges and security settings
Content
Core attributes and size
Hash values
Configuration values
Compliance objectives
Multiple compliance objectives indicate file integrity monitoring as a requirement. Several examples of compliance objectives with the requirement for file integrity monitoring include:
PCI DSS - Payment Card Industry Data Security Standard (Requirement 11.5)
SOX - Sarbanes-Oxley Act (Section 404)
NERC CIP - NERC CIP Standard (CIP-010-2)
FISMA - Federal Information Security Management Act (NIST SP800-53 Rev3)
HIPAA - Health Insurance Portability and Accountability Act of 1996 (NIST Publication 800-66)
SANS Critical Security Controls (Control 3)
See also
Procedures and algorithms:
Checksum
File verification
Applications, some examples (where FIM is used) include:
Advanced Intrusion Detection Environment
Another File Integrity ChecKer
BeyondTrust
CimTrak
CloudPassage
Evolven
Kaspersky Lab Hybrid Cloud Security, Embedded Security, Security for Linux, Security for Windows Server
LimaCharlie
Lockpath Blacklight
LogRhythm
McAfee Change Control
Netwrix-NNT Change Tracker
OSSEC
Qualys
Samhain
Splunk
System File Checker (provided with Windows)
Tanium Integrity Monitor
Trend Micro Deep Security
Logsign USO Platform
Tripwire products
Trustwave
References
Change management
Computer forensics |
https://en.wikipedia.org/wiki/Trolleybuses%20in%20Rosario | The Rosario trolleybus system () is part of the public transport network in Rosario, the largest city in the province of Santa Fe, Argentina.
Opened in 1959, the trolleybus system presently comprises two routes, designated as lines K and Q. The latter opened in 2017, using new vehicles, but did not require any new overhead wires.
History
Early years
The Rosario system opened on 24 May 1959. It replaced the old Rosario electric tramway network, which had been in existence since 1910. Initially, the system was operated by 10 German-made MAN trolleybuses. They worked the first line G, which linked the Plaza Sarmiento with the intersection of Avenida San Martín and Saavedra, where there was a mini terminal for connections to the south. Over time, the line was extended to the intersection between Salta and Paraguay, then to Calle San Nicolás, and, two years later, to the Mariano Moreno bus station.
In late 1959, 40 trolleybuses were acquired from the Italian Fiat - Alfa Romeo - CGE consortium. On 15 April 1960, line H was opened, with a route running from the Plaza Sarmiento to the city's northern boundary, with Granadero Baigorria. Between August and December 1961, brand new Fiat trolleybuses arrived in Rosario, allowing network expansion with the creation of new lines. To reinforce the line H service, line J was opened in September 1961, and linked Plaza Sarmiento with Plaza Alberdi.
On 3 December 1961, line K began operating, from the corner of Necochea and Avenida Pellegrini to the corner of Mendoza and Nicaragua. Its fleet was composed entirely of Fiat units.
As with line H, line K experienced strong demand, which led to the opening of line L on 8 January 1962. Line L connected Pellegrini and Necochea with Bv. Avellaneda and Mendoza. At the request of residents, it was extended in 1964 to the corner of Paraná and 9 de Julio, in front of the Rosario Oeste railway station of the Ferrocarril General Manuel Belgrano.
In 1967, to optimize fleet utilization, lines G and J were merged, and line M opened to connect San Martín and Muñoz with the Santa Fe–Cafferata bus terminal. Following these changes, lines M, H and K were operating with 45 trolleybuses in total.
Decline
On 16 September 1969, during the protest movement known as the Rosariazo, eight Fiat vehicles were destroyed, and three MAN and 14 other vehicles were damaged to varying degrees. Following these events, services on line H were suspended, because the 32 surviving units could only cover the requirements of lines K and M.
In 1970, 12 Mercedes-Benz "0 km" trolleybuses (manufactured in 1953 for the city of Bahía Blanca, but not used there) entered the Rosario fleet, plus 11 vehicles that had been withdrawn from service in Mendoza. The arrival of these 23 units enabled the reintroduction of services on line H in 1971.
In 1979, during the military dictatorship (1976–1983), the trolleybus system was privatised. The new operator was Empresa Martín Fierro SRL (the Martin Fierro |
https://en.wikipedia.org/wiki/Sysinfo | Sysinfo is a shareware program written completely in Assembler for the Motorola 68k equipped Amiga computers to benchmark system performance. Sysinfo shows which version of system software is present in ROM, which hardware is present, and which operating mode the hardware uses.
Sample output
SYSINFO V3.22 An Amiga System Information Program Written in Assembler
Nic Wilson Brisbane Australia. nic AT nicwilson dot com
SYSTEM SOFTWARE INSTALLED LIBRARIES INTERNAL HARDWARE MODES
kickstart (512K) $00F80000 V37.350 Clock CLOCK NOT FOUND
utility CHIP RAM $00000554 V37.3 DMA/Gfx ECS AGNUS - 2Meg
graphics CHIP RAM $00002A68 V37.41 Mode NTSC:Hires
keymap CHIP RAM $00006D68 V37.2 Display ECS DENISE
layers CHIP RAM $000081D8 V37.9 CPU/MHz 68000 7.16
intuition CHIP RAM $00009984 V37.331 FPU NONE
dos CHIP RAM $00011498 V37.45 MMU N/A
VBR N/A
SPEED COMPARISONS Comment What can I say!
Dhrystones 519 You X Horiz KHz 15.72
A600 68000 7MHz 0.98 X EClock Hz 715909
B2000 68000 7MHz 0.74 X Ramsey rev N/A ICache N/A
A1200 EC020 14MHz 0.42 XX Gary rev N/A DCache N/A
A2500 68020 14MHz 0.25 XXX Card Slot YES IBurst N/A
A3000 68030 25MHz 0.11 XXXXX Vert Hz 60 DBurst N/A
A4000 68040 25MHz 0.02 XXXXXXXXXXXXXXX Supply Hz 60 CBack N/A
CPU Mips 0.54
FPU MFlops N/A QUIT MEMORY BOARDS ICACHE IBURST CBACK
Chip Speed vs A600 1.00 DRIVES SPEED PRINT DCACHE DBURST ALL
SYSINFO V4.0 An Amiga System Information Program Written in Assembler
Contact address SysInfo@d0.se web page http://sysinfo.d0.se
SYSTEM SOFTWARE INSTALLED LIBRARIES INTERNAL HARDWARE MODES
kickstart (512K) $00F80000 V37.175 Clock CLOCK FOUND
utility CHIP RAM $000007CC V37.3 DMA/Gfx STD AGNUS - 512K
graphics CHIP RAM $00004258 V37.35 Mode PAL
keymap CHIP RAM $00008548 V37.2 Display STD DENISE
layers CHIP RAM $000099B8 V37.7 CPU/MHz 68000 7.09
intuition CHIP RAM $00009E5C V37.318 FPU NONE
dos CHIP RAM $00012470 V37.44 MMU N/A
VBR N/A
SPEED COMPARISONS Comment What can I say!
Dhrystones 539 You X Horiz KHz 15.60
A600 68000 7MHz 1.00 X EClock Hz 709379
B2000 68000 7MHz 0.77 X Ramsey rev N/A ICache N/A
A1200 EC020 14MHz 0.44 XX Gary rev N/A DCache N/A
A2500 68020 14MHz 0.26 XXX Card Slot NO IBurst N/A
A3000 68030 25MHz 0.11 XXXXX Vert Hz 50 DBurst N/A
A4000 68040 25MHz 0.02 XXXXXXXXXXXXXXX Supply Hz 50 CBack N/A
Mips 0.56 MFlops N/A QUIT MEMORY BOARDS ICACHE IBURST CBACK
Chip Speed vs A600 1.03 DRIVES SPEED PRINT DCACHE DBURST ALL
Version history
1990-08-04 v1.4
1990-12-17 v1.94
1991-01-12 v1.98
199 |
https://en.wikipedia.org/wiki/Michele%20Parrinello | Michele Parrinello (born 7 September 1945) is an Italian physicist particularly known for his work in molecular dynamics (the computer simulation of physical movements of atoms and molecules). Parrinello and Roberto Car were awarded the Dirac Medal of the International Centre for Theoretical Physics (ICTP) and the Sidney Fernbach Award in 2009 for their continuing development of the Car–Parrinello method, first proposed in their seminal 1985 paper, "Unified Approach for Molecular Dynamics and Density-Functional Theory". They have continued to receive awards for this breakthrough, most recently the Dreyfus Prize in the Chemical Sciences and the 2020 Benjamin Franklin Medal in Chemistry.
Parrinello also co-authored highly cited publications on "polymorphic transitions in single crystals" and "canonical sampling through velocity rescaling."
Life and career
Michele Parrinello was born in Messina (Sicily) and received his Laurea in physics from the University of Bologna in 1968. After working at the International School for Advanced Studies in Trieste, the IBM research laboratory in Zurich, and the Max Planck Institute for Solid State Research in Stuttgart, he was appointed Professor of Computational Science at the Swiss Federal Institute of Technology Zurich in 2001, a position he also holds at the Università della Svizzera italiana in Lugano. In 2004 he was elected to Great Britain's Royal Society. In 2011 he was awarded the Marcel Benoist Prize. In 2020 he received the Benjamin Franklin Medal (Franklin Institute) in Chemistry. As of 2023, he has received over 130,000 scientific citations and has an h-index of 159, which is one of the highest among all scientists.
Selected notable contributions
Car–Parrinello molecular dynamics (the original paper on this is now the 5th most highly cited paper in Physical Review Letters)
Parrinello–Rahman algorithm
Flying ice cube
Metadynamics
References
Further reading
Andreoni, W.; Marx, D.; Sprik, M. (2005). "Editorial: a tribute to Michele Parrinello: from physics via chemistry to biology", ChemPhysChem, Volume 6, Issue 9 (Special Issue: Parrinello Festschrift)
Car, R. and Parrinello, M. (1985). "Unified Approach for Molecular Dynamics and Density-Functional Theory" Physical Review Letters, Vol. 55, Issue 22
Kühne, T. D.; Krack, M.; Mohamed, F. R. and Parrinello, M. (2007). "Efficient and Accurate Car-Parrinello-like Approach to Born-Oppenheimer Molecular Dynamics" Physical Review Letters, Vol. 98, 066401
External links
Parrinello Research Group at ETH Zürich.
1945 births
Living people
20th-century Italian physicists
Italian expatriates in Switzerland
Scientists from Messina
Fellows of the American Academy of Arts and Sciences
Foreign Members of the Royal Society
Foreign associates of the National Academy of Sciences
Academic staff of the University of Lugano
Schrödinger Medal recipients
Computational chemists
Computational physicists
21st-century Italian physicists
Academic staff of ETH Zurich
Fello |
https://en.wikipedia.org/wiki/Doel%20%28computer%29 | Doel () was a laptop assembled in Bangladesh as part of a circa 2011 national education program. It is assembled by Telephone Shilpa Sangstha. It was the first laptop made in Bangladesh. The first laptop produced was launched for in 2011. The OS used is Android or Microsoft Windows (e.g. XP Home, Vista Starter or Home Basic).
Logo Of Doel
The computer's name comes from the national bird of Bangladesh, the doel or Oriental magpie robin, a widely used symbol in Bangladesh.
In 2011, the eventual plan was to distribute Doel and other computers to every K-12 student in Bangladesh, along with free software (such as Edubuntu or Sugar) for education and open educational resources. Bangladesh had digitized an entire suite of textbooks in the Bengali language for free distribution.
In the event, the project faced technical and fund problems, and by 2016, was in limbo.
References
External links
Doel laptop plant
Walton Laptop plant
Linux-based devices
Personal computers
Computer-related introductions in 2011
Electronics industry in Bangladesh
Government of Bangladesh
Bangladeshi brands |
https://en.wikipedia.org/wiki/Halifax%20International%20Security%20Forum | Halifax International Security Forum (also Halifax Forum or HFX) is an independent, nonpartisan, nonprofit organization headquartered in Washington, D.C. It is a forum and network for international government and military officials, academic experts, authors and entrepreneurs. Halifax Forum addresses global security issues.
The forum is best known for its annual security summit at The Westin Nova Scotian in Halifax, Nova Scotia, Canada. The meeting brings together more than 300 delegates from over 70 countries and has been referred to by Canadian media as "The Davos of international security". This summit is the only event of its kind in North America. The 14th Halifax Forum was held from 19 to 21 November 2022.
History
The Halifax International Security Forum was founded in 2009 as a program within the German Marshall Fund of the United States, with financial support from the Canadian government. Its annual meeting is held in Halifax in mid-November, usually the weekend before US Thanksgiving. In 2011 the forum became an independent organization and was joined by Foreign Affairs as media partner.
Organization
Halifax Forum is an independent, nonprofit organization based in Washington, DC. The nonpartisan forum has an American-Canadian board of directors as its highest governance body. The President of the forum is Peter Van Praagh. HISF cooperates with institutional partners. The forum's founding partners are the Department of National Defence (DND) and the Atlantic Canada Opportunities Agency (ACOA). In 2011, after the forum's independence, the Canadian government continued its funding, and Foreign Affairs joined the forum as media partner.
In August 2012, HISF launched the Halifax Canada Club (HCC), a public–private partnership created in cooperation with the Canadian government and Calgary-based MEG Energy. HCC serves as a permanent body to engage the private sector in support of the forum.
Annual forum
Key themes
2021 forum
The 2021 Halifax Forum will be held from 19 to 21 of November 2021.
It will feature the following on-the-record plenary panels:
After the Fall--
The Next 9/11: From Kabul or From California (or some lab we haven't heard of yet)?
W.W.J.M.D? (What Would John McCain Want Us To Do?)
#StandTogetherOnChina
Post-Pandemic: Heed Expectations, Heal Globalization
Fires and Landslides and Droughts: Oh My!
China's Quantum Leap Backward
--Keep the Faith
2020 forum
The 2020 Halifax International Security Forum was held from 20 to 22 November 2020.
2019 forum
The 2019 Halifax International Security Forum was held from 22 to 24 November 2019.
2018 forum
The 2018 Halifax International Security Forum was held from 16 to 18 November 2018.
2017 forum
The 2017 Halifax International Security Forum was attended by delegates from more than 80 countries. The forum celebrated 150 years of Canadian Confederation and the 100th anniversary of the Halifax Explosion. Along with Dalhousie University and Saint Mary's University, the foru |
https://en.wikipedia.org/wiki/List%20of%20formal%20systems | This is a list of formal systems, also known as logical calculi.
Mathematical
Domain relational calculus, a calculus for the relational data model
Functional calculus, a way to apply various types of functions to operators
Join calculus, a theoretical model for distributed programming
Lambda calculus, a formulation of the theory of reflexive functions that has deep connections to computational theory
Matrix calculus, a specialized notation for multivariable calculus over spaces of matrices
Modal μ-calculus, a common temporal logic used by formal verification methods such as model checking
Pi-calculus, a formulation of the theory of concurrent, communicating processes that was invented by Robin Milner
Predicate calculus, specifies the rules of inference governing the logic of predicates
Propositional calculus, specifies the rules of inference governing the logic of propositions
Refinement calculus, a way of refining models of programs into efficient programs
Rho calculus, introduced as a general means to uniformly integrate rewriting and lambda calculus
Tuple calculus, a calculus for the relational data model, inspired the SQL language
Umbral calculus, the combinatorics of certain operations on polynomials
Vector calculus (also called vector analysis), comprising specialized notations for multivariable analysis of vectors in an inner-product space
Other formal systems
Music is a formal system too. Please have editors illuminate on this.
See also
Formal systems |
https://en.wikipedia.org/wiki/Jirajara%20language | Jirajara is an extinct language of western Venezuela. Other than being part of the Jirajaran family, its classification is uncertain due to a lack of data. See Jirajaran languages for details.
References
Languages of Venezuela
Extinct languages of South America
Jirajaran languages |
https://en.wikipedia.org/wiki/ASNET-AM | The Academic Scientific Research Computer Network of Armenia (ASNET-AM) is the national research and education network (NREN) of Armenia. ASNET-AM was created in 1994. The structure and policy of ASNET-AM operation was developed and realized by the Institute for Informatics and Automation Problems ([ IIAP ]) of the National Academy of Sciences of Armenia.
Activity
Main trends of ASNET-AM activity include:
Scientific Research
Database development and processing in various fields of science, technology, art
Participation and support of scientific, educational, technical, cultural and other programs and projects
IT Training and Education
Starting from 1997 biennial International Conference on Computer Science and Information Technologies (CSIT) is organized with the support of ASNET-AM.
Network Services
ASNET-AM services include:
Permanent (wired & wireless) multiprotocol connectivity
IPv4 & IPv6 (dual-stack) routing
Managed and guarantied bandwidth (QoS)
Network access via Proxy server
Access to ArmCluster & ArmGrid
Domain Name Service (DNS)
E-Mail services (SMTP, POP, IMAP), Webmail, Mailing Lists
Internet accessible Information and Database Systems
Secure Data Transmission (VPN, VTUN, EoIP, IP-IP, VLAN, IPVLAN)
Tele-education and Tele-conferencing, Virtual Desktop
Dial-in
Mail Informer service & WebSMS service
Network monitoring (Nfsen, Nagios, Cacti, Weathermap, Ntop, Dude)
Web Hosting (HTTP, HTTPS)
Server/Router installation and maintenance
Archive Backup
Antivirus, Antispam, Antispyware support
User Support & Consulting
IT Training & Education
Media streaming (Video/Audion Webcast)
Mobile broadband 3G access
Eduroam.am service
Networking
ASNET-AM develops and provides advanced network services to the Academic, Research and Education communities of Armenia. The network interconnects about 60 scientific, research, educational, cultural and other organisations in 5 cities of Armenia, such as Yerevan, Ashtarak, Byurakan, Abovian, Gyumri, integrating them with the Pan-European Research and Education Network, GEANT.
ASNET-AM network in Yerevan consists of dark fiber infrastructure with current link bandwidth from 100 Mbit/s to 10 Gbit/s.
Clustering/GRID
ASNET-AM supported the creation of first and most powerful supercomputer center in the field of science and education in Armenia - ArmCluster established in 2004. Currently ASNET-AM serves as the foundation for advanced computing applications in Armenia and provides its infrastructure for ArmGrid [] backbone network. ASNET-AM participates in the HP-SEE, High-Performance Computing Infrastructure for South East Europe's Research Communities EU project that will link existing and upcoming HPC facilities in South East Europe in a common infrastructure, and it will provide operational solutions for it.
International activities
ASNET-AM participates actively in international projects.
ASNET-AM participates in Terena Compendium.
References
Internet in Armenia
Nation |
https://en.wikipedia.org/wiki/Resilience%20Alliance | The Resilience Alliance is an interdisciplinary network of scientists and practitioners that analyze the integrated dynamic of people and nature from a social-ecological system perspective. It was established in 1999 and is supported by an international network of member institutions that includes universities, government, and non-government agencies. The Resilience Alliance publishes the journal Ecology and Society.
In 2007, the Resilience Alliance Young Scholars (RAYS) was established under Resilience Alliance. This network was established with a purpose of developing the next generation of resilience scientists from around the world.
References
External links
International research institutes |
https://en.wikipedia.org/wiki/Send%20In%20the%20Dogs%20Australia | Send In the Dogs Australia is an Australian documentary television series about the work of police dogs. first aired on Nine Network on 13 February 2011. The second season aired from 12 October 2011 to the present.
References
Nine Network original programming
2011 Australian television series debuts
English-language television shows |
https://en.wikipedia.org/wiki/Between%20the%20Lines%20%28game%20show%29 | Between the Lines is a game show which was broadcast on Nine Network in Australia. It was a sports-themed comedy show featuring two teams of three players going head-to-head in a quiz. The show was premiered on 12 May 2011 and was hosted by Eddie McGuire with team captains Mick Molloy and Ryan Fitzgerald.
References
Nine Network original programming
2011 Australian television series debuts
2011 Australian television series endings
2010s Australian game shows
English-language television shows |
https://en.wikipedia.org/wiki/Golden-i | The Golden-i platform consists of multiple mobile wireless wearable headset computers operated by voice commands and head movements. It was developed at Kopin Corporation by a team led by Jeffrey Jacobsen, chief Golden-i architect and senior ddvisor to the CEO. Utilizing a speech controlled user interface and head-tracking functionality, Golden-i enables the user to carry out common computer functions whilst keeping their hands free.
Specifications
Golden-i headsets feature a 15-inch virtual laptop-size qHD microdisplay manufactured by Kopin Corporation which can be adjusted to be used below the left or right eye, 9-axis head-tracking technology with a digital compass and GPS, speech recognition software with two noise-cancelling microphones (supporting 38 languages), Bluetooth, Wi-Fi and USB connectivity, 3D graphics accelerators. The 18650 Li-ion battery will last 8+ hours. The latest Golden-i Gen 3.8 headset computer also has built-in 14MP camera.
Headsets
Gen 3.8
Verizon Wireless announced the Golden-i Wireless Headset (3.8 or Gen 3.8) at CES 2013 on January 8, 2013. Designed by Kopin Corporation to function over Verizon’s 4G LTE network, the Gen 3.8 headset is the lightest Golden-i headset to date, weighing 4.5 ounces in its lightest configuration. The boom structure and metallization within the device is a magnesium copper titanium alloy with Lexan polycarbonate shell – designed to operate under various different temperatures. Golden-i 3.8 can be worn with a hard hat or helmet and has a basic adjustment in the back that compensates for the width and length of people’s heads for comfort. Kopin and Verizon are in the process of building thousands of Gen 3.8 headsets to bring to market and are targeting light industrial industries.
HC1
Launched at the Association of the United States Army (AUSA) Annual Meeting & Exposition by Motorola Solutions, the HC1 was built to withstand harsh conditions and rough handling - helping to improve productivity and accuracy in environments where carrying a laptop is not feasible, safe, or convenient. Designed to be mounted onto a hard hat or other safety equipment, the HC1 allows field technicians hands-free access to schematics and other important data while servicing systems in remote locations.
Gen 3.5
In 2011, Kopin Corporation announced the FCC certification and availability of Golden-i Gen 3.5 headset computers. Designed as a developer unit for software application developers and select Motorola enterprise and public safety customers, the Gen 3.5 was sold with Development Kits for $2,500 (plus tax and shipping). Each Development Kit included one Golden-i Gen 3.5 headset, a Windows 7 application software emulation environment; Microsoft WinCE 6 application software porting platform; Nuance Vocon3200 Golden-i speech recognition platform available in more than 20 languages; online professional application development and support provided by Adeneo, a Microsoft Gold Developer Partner; access to the gl |
https://en.wikipedia.org/wiki/Royal%20Radar%20Establishment%20Automatic%20Computer | The Royal Radar Establishment Automatic Computer (RREAC) was an early solid-state computer in 1962. It was made with transistors; many of Britain's previous experimental computers used the thermionic valve, also known as a vacuum tube.
History
Background
Britain had built the world's first electronic computer, the Colossus computer, during the war at Bletchley Park in late 1943 and early 1944, and the world's first stored-program computer, the Manchester Baby, on 21 June 1948. The Germans had built the electro-mechanical Z3 in 1941 in Berlin, which used relays. The world's first digital computing device was the Atanasoff–Berry computer in 1942. ENIAC was built in 1946 at the Moore School of Electrical Engineering at the University of Pennsylvania. ENIAC and Colossus both claim to be the world's first electronic computer. Electronic Delay Storage Automatic Calculator (EDSAC) ran its first programs on 6 May 1949 at the University of Cambridge Mathematical Laboratory about a month after the Manchester Mark 1 was put to research work at the University of Manchester. In May 1952 Geoffrey Dummer thought up the idea of the integrated circuit at the TRE, the former name of the RRE.
By April 1962 there were 323 computers installed in Britain, which had cost around £23 million (£ million in today's figures). At the time, the American government alone had over 900 computers, with over 10,000 in the whole country. However most of these performed simple tasks that a pocket calculator would later manage.
Computer research in the UK took place at various sites including the National Physical Laboratory in Teddington, and the RRE in Worcestershire. Manchester University led the way again in 1962 with its Atlas Computer, then said to be the most powerful computer in the world, being one of the world's first supercomputers. Three were built: the first for Manchester University, and one each for BP and for the Atlas Computer Laboratory in Oxfordshire. A major British computer manufacturer at the time was International Computers and Tabulators (ICT), later part of Britain's International Computers Limited (ICL). The RRE College of Electronics, like the RRE itself, was run by the Ministry of Aviation in the 1960s.
In September 1963 the government, via the Department of Industrial and Scientific Research, funded £1 million of research into electronics and computers, with half going to the RRE and NPL.
Later in its existence, the RRE provided Britain's first connection to the Internet, when opened by the Queen in 1976 at UCL in London; it went via RRE to Norway and on to the USA. Later in 1984, the Internet's engineering task force first met at RRE's successor - the Royal Signals and Radar Establishment
The RREAC
Work in transistor technology at RRE took place in the Physics Department under Dr R.A. Smith. The RREAC was first announced in 1962. It was earlier known as the RRE All-Transistor Computer. It was built from 1960. George G. Macfarlane was one of the |
https://en.wikipedia.org/wiki/Commentz-Walter%20algorithm | In computer science, the Commentz-Walter algorithm is a string searching algorithm invented by Beate Commentz-Walter. Like the Aho–Corasick string matching algorithm, it can search for multiple patterns at once. It combines ideas from Aho–Corasick with the fast matching of the Boyer–Moore string-search algorithm. For a text of length n and maximum pattern length of m, its worst-case running time is O(mn), though the average case is often much better.
GNU grep once implemented a string matching algorithm very similar to Commentz-Walter.
History
The paper on the algorithm was first published by Beate Commentz-Walter in 1979 through the Saarland University and typed by "R. Scherner". The paper detailed two differing algorithms he claimed combined the idea of the Aho-Corasick and Boyer-Moore algorithms, which he called algorithms B and B1. The paper mostly focuses on algorithm B, however.
How the Algorithm Works
The Commentz-Walter algorithm combines two known algorithms in order to attempt to better address the multi-pattern matching problem. These two algorithms are the Boyer-Moore, which addresses single pattern matching using filtering, and the Aho-Corasick. To do this, the algorithm implements a suffix automaton to search through patterns within an input string, while also using reverse patterns, unlike in the Aho-Corasick.
Commentz-Walter has two phases it must go through, these being a pre-computing phase and a matching phase. For the first phase, the Commentz-Walter algorithm uses a reversed pattern to build a pattern tree, this is considered the pre-computing phase. The second phase, known as the matching phase, takes into account the other two algorithms. Using the Boyer-Moore’s technique of shifting and the Aho-Corasick's technique of finite automata, the Commentz-Walter algorithm can begin matching.
The Commentz-Walter algorithm will scan backwards throughout an input string, checking for a mismatch. If and when the algorithm does find a mismatch, the algorithm will already know some of the characters that are matches, and then use this information as an index. Using the index, the algorithm checks the pre-computed table to find a distance that it must shift, after this, the algorithm once more begins another matching attempt.
Time Complexity
Comparing the Aho-Corasick to the Commentz-Walter Algorithm yields results with the idea of time complexity. Aho-Corasick is considered linear O(m+n+k) where k is the number of matches. Commentz-Walter may be considered quadratic O(mn). The reason for this lies in the fact that Commentz-Walter was developed by adding the shifts within the Boyer–Moore string-search algorithm to the Aho-Corasick, thus moving its complexity from linear to quadratic.
According to a study done in “The Journal of National Science Foundation of Sri Lanka 46” Commentz-Walter seems to be generally faster than the Aho–Corasick string matching algorithm. This, according to the journal, only exists when using long pa |
https://en.wikipedia.org/wiki/Guachi%20language | Guachí (Wachí) is an extinct, apparently Guaicuruan language of Argentina. It is usually classified as one of the Guaicuruan languages, but the data is insufficient to demonstrate that.
Documentation
Guachi is known only from 145 words collected by Francis de Castelnau from March to early April of 1845 in the Miranda area of Argentina.
Classification
Viegas Barros (2004) proposes that Guachi, as well as Payaguá, may be a Macro-Guaicurúan language. However, Campbell (2012) classifies Guachi as a language isolate.
Vocabulary
Guachi words and affixes listed in Viegas Barros (2004):
{| class="wikitable sortable"
! no. !! Spanish gloss(original) !! English gloss(translated) !! Guachi
|-
| 1 || agua || water || euak
|-
| 2 || lago || lake || tawicha
|-
| 3 || estrella || star || aati
|-
| 4 || posiblemente día || day ? || aanau-, naau-
|-
| 5 || diente || tooth || iava
|-
| 6 || labios || lips || iapé
|-
| 7 || ojo || eye || iataya
|-
| 8 || ceja || eyebrow || iticha
|-
| 9 || cabeza || head || iotapa
|-
| 10 || hombro || shoulder || -eu (< iolai-eu)
|-
| 11 || cabello || hair || ioatriz
|-
| 12 || mentón || chin || irak
|-
| 13 || comer || eat || iik
|-
| 14 || dormir || sleep || amma
|-
| 15 || golpear, batir || hit, beat || sapak
|-
| 16 || sentarse || sit down || ineche
|-
| 17 || posiblemente indígena || indigenous ? || -euleuc
|-
| 18 || hijo || son || inna
|-
| 19 || dos || two || eu-echo
|-
| 20 || no || no || an
|-
| 21 || gallina || hen || wokaake
|-
| 22 || pipa || pipe || ouchete
|-
| 23 || posiblemente otra vez || again ? || -way
|-
| 24 || posiblemente negación léxica || negation ? || ag-
|-
| 25 || posiblemente posesivo de 1ª. p. sing. || 1.SG possessive ? || i-
|-
| 26 || posiblemente plural nominal || nominal plural ? || -i
|-
| 27 || posiblemente femenino || feminine ? || -jen
|-
| 28 || lluvia || rain || fou-é
|-
| 29 || calor || hot || o-outé
|-
| 30 || pierna || leg || iacté
|-
| 31 || matar || kill || outei
|-
| 32 || hambre || hungry || yawookta
|-
| 33 || anciano || old man || seera
|-
| 34 || demasiado || excessively || euaité
|-
| 35 || pez || fish || aney
|-
| 36 || lagartija || lizard || kaliske
|-
| 37 || papagayo || parrot || calicheechee
|-
| 38 || tucán || toucan || iacat
|-
| 39 || armadillo || armadillo || tatae sia
|-
| 40 || sable || saber || nasakanate
|-
| 41 || luna || moon || o-alete
|-
| 42 || tierra || earth || leek
|-
| 43 || nariz || nose || ia-note
|-
| 44 || pierna || leg || iacalep
|-
| 45 || muslo || thigh || iakamnan
|-
| 46 || posiblemente uno || one ? || -kailau
|-
| 47 || tres || three || eu-echo-kailau
|-
| 48 || hablar || talk || ieuech
|-
| 49 || cansarse || become tired || ya-weul
|-
| 50 || cocinar || cook || ayai
|-
| 51 || sufijo derivativo de significado posible ‘parecido a’ || suffix < ‘alike’ ? || -tok
|-
| 52 || caballo || horse || ometok
|-
| 53 || papagayo (Arara) || parrot (Arara) || caga
|-
| 54 || casa || house || poecha
|-
| 55 || canoa || canoe || nook
|-
| 56 || fusil || rifle |
https://en.wikipedia.org/wiki/Payagua%20language | Payaguá (Payawá) is an extinct language of Paraguay, Argentina, and Bolivia, spoken by the Payaguá Indians. It is usually classified as one of the Guaicuruan languages, but the data is insufficient to demonstrate that.
Classification
Viegas Barros (2004) proposes that Payagua may be a Macro-Guaicurúan language. However, Campbell (2012) classifies Payagua as a language isolate.
An automated computational analysis (ASJP 4) by Müller et al. (2013) found lexical similarities between Payagua and the Chonan languages. However, since the analysis was automatically generated, the grouping could be either due to mutual lexical borrowing, genetic inheritance, or chance resemblances.
Sources
Boggiani, G. (1900). Lingüística sudamericana: Datos para el estudio de los idiomas Payagua y Machicui. Trabajos de la 4a sección del Congreso Científico Latinoamericano, 203-282. Buenos Aires: Compañía Sud-Americana de Billetes de Banco.
Schmidt, M. (1949). Los Payaguá. Revista do Museu Paulista N.S., 3:129-317.
Notes
References
Languages of Argentina
Guaicuruan languages
Extinct languages of South America
Languages extinct in the 1900s
Language isolates of South America
Chaco linguistic area |
https://en.wikipedia.org/wiki/Via%20cava | The Vie Cave (in English excavated roads), also known in Italian as Cavoni, is a road network in southern Europe, found in Spain, Italy, Turkey and as far east as Jordan. In Italy they partly link an Etruscan necropolis and several settlements in the area between Sovana, Sorano and Pitigliano. They consist mainly of trenches of variable width and length, excavated as nearly vertical cliffs in different types of bedrock, sometimes over sixty feet high, possibly serving as a defense system against invaders, wild animals or forces of nature. Although often dated as being carved by pre-Roman civilisations in the first or second millennium BC, the builders and purpose of the road system are largely unclear, and there are indications that they are much older than assumed.
In Italy they are sometimes narrow, sometimes wider cuttings often running deeply through hills and bedrock, and are thought to have changed little since Etruscan times. Their construction is said to have resulted from the wearing through soft tuff but also harder bedrock by iron-rimmed wheels, creating deep ruts that required the road to be frequently recut to a smooth surface. Their dating is mainly deduced from the settlements they pass between, and objects from tombs beside them. This dating is deemed uncertain by those pointing out the extent of petrifaction of the so-called cart ruts.
In Roman times segments of the Vie Cave became part of a road system that was connected to the main trunk of the Via Clodia, an ancient road linking Rome and Manciano, through the city of Tuscania, which branched off from the Cassia road in Lazio territory. Wider segments are even included in the modern road system.
Vie Cave of Sovana
Around Sovana, the Vie Cave wind around and towards the archaeological area of that town, then reconnecting with those from Sorano and Pitigliano.
Vie Cave in Sorano
Around Sorano the Vie Cave begin coming out of the Porta dei Merli, and descending into the valley of the river Lente.
The Via Cava (singular for Vie Cave) of San Rocco was on the opposite side of the Sorano county, along the ruins of the church of San Rocco, religious building of the romanesque art that retains parts of the original wall of the via. Behind the ruins of the church there is a vast Etruscan necropolis with tombs hewn into the tuff.
Near Poggio San Rocco and Poggio Croce there are also numerous Etruscan tombs and a columbarium, which are as rock-cut cells arranged in several rows one above the other. From Middle Ages on these ancient tombs became a shelter for pigeons.
Vie Cave of Pitigliano
Around Pitigliano there are several Vie Cave, including the one directed towards the archaeological area of Sovana.
Notes
References
Izzet, Vedia, The Archaeology of Etruscan Society, 2007, Cambridge University Press, , 9781107320918, google books
Video, Ancient roads, 2019, YouTube
Etruscans
Ruins in Italy
Archaeological sites in Tuscany
Etruscan architecture
Sorano
Sovana
Pitigliano |
https://en.wikipedia.org/wiki/Virus%20Pathogen%20Database%20and%20Analysis%20Resource | The Virus Pathogen Database and Analysis Resource (ViPR) is an integrative and comprehensive publicly available database and analysis resource to search, analyze, visualize, save and share data for viral pathogens in the U.S. National Institute of Allergy and Infectious Diseases (NIAID) Category A-C Priority Pathogen lists for biodefense research, and other viral pathogens causing emerging/reemerging infectious diseases. ViPR is one of the five Bioinformatics Resource Centers (BRC) funded by NIAID, a component of the National Institutes of Health (NIH), which is an agency of the United States Department of Health and Human Services.
Virus families covered in ViPR
The ViPR database includes genomes from these viral families: Arenaviridae, Bunyaviridae, Caliciviridae, Coronaviridae, Filoviridae, Flaviviridae, Hepeviridae, Herpesviridae, Paramyxoviridae, Picornaviridae, Poxviridae, Reoviridae, Rhabdoviridae, and Togaviridae.
Data types in ViPR
Genomes
Genome annotations
Genes & proteins
Predicted protein domains and motifs
Immune epitopes
Sequence Features
Orthologous protein clusters
3D protein structure
Clinical metadata
Host factor data
Analysis and visualization tools in ViPR
BLAST: provides a variety of custom ViPR databases to identify the most related sequence(s)
Short Peptide Search: allows users to find any peptide sequence using exact, fuzzy, or pattern matching
Sequence Variation Analysis ([Single-nucleotide polymorphism] SNP): calculates sequence variation existing in the specified sequences
Metadata-driven Comparative Analysis Tool for Sequences (Meta-CATS): an automated comparative statistical analysis to identify positions throughout a multiple sequence alignment that significantly differ between groups of sequences possessing specific phenotypic characteristic
Multiple Sequence Alignment: aligns small genomes, gene/protein sequences or large viral genome sequences using one of several algorithm best-suited for the specific job submission
Sequence Alignment Visualization: uses JalView for sequence alignment visualization
Phylogenetic Tree Generation: calculates a tree using one of several available algorithms and evolutionary models
Phylogenetic Tree Visualization: allows the color-coded display of strain metadata on a tree using the Archaeopteryx viewer
GBrowse: provides genome browsing capability for large DNA viral genomes (Herpesviridae and Poxviridae) with integration of ViPR Sequence Features for Vaccinia virus
Sequence Feature Variant Type (SFVT) analysis: provides a centralized repository of functional regions and automatically calculates all observed sequence variation within each defined region
3D Protein Structure Visualization: integrates PDB protein structure files with ViPR Sequence Features when applicable and provides an interactive 3D protein structure viewer using Jmol
Genome Annotator (GATU): allows users to annotate new genome sequences provided by the user
Genotype Determination and |
https://en.wikipedia.org/wiki/Voc%C3%AA%20Decide | Você Decide (You Decide / It's Your Call) was an interactive television program broadcast on the Brazilian TV network Rede Globo from 1992 to 2000. During each episode special cases were presented, and viewers would decide the ending through phone votes.
Broadcast history
Você Decide is the second longest-running series of Rede Globo, with nine seasons and 323 episodes.
On March 11, 1999, the episode Mulher 2000 had its finale shown only in the North and Northeast regions (along with portions of the Southeast and the Center-West regions) due to a blackout in Brazil and Paraguay in 1999 that greatly affected much of the country at the time of the show.
In its final years, the program aired on Thursday nights shortly after Linha Direta. The last episode aired on August 17, 2000. The following week, the program was replaced with the miniseries Aquarela do Brasil (Watercolors of Brazil). Brazilian soap opera stars participated in the episodes, with some appearing in up to eight episodes.
In Portugal, RTP 1 ran some episodes in the early 1990s, but the run proved unsuccessful.
Reprise
Some episodes were rerun from July 2 to July 20, 2001 as part of Vale a Pena Ver de Novo, presented by Susana Werner, in an attempt to raise the audience's schedule, which was down since the reprise of the novel Tropicaliente the previous year; however, the reruns' audience numbers were lower than any soap opera had recorded before - some episodes came in third, behind SBT and TV Record. In addition, Globo was under pressure from the Brazilian Public Ministry for airing episodes with age rating of 14 during the afternoon, where age-classified material was not permitted at that time.
The rejection to the reprise of Você Decide was so great that it motivated the creation of an anonymous site, which contained a text positioning itself against a global decision and a poll in which the permanence of the novels is not Vale a Pena Ver de Novo it conquers by wide margin. With the total failure of Você Decide, as soon as the second week of reprise of the episodes, the network decided to re-present for a second time A Gata Comeu, which resulted in a quick recovery of ratings for the afternoon schedule.
Rede Globo alleged that the replay of Você Decide was scheduled only during the vacation period, which is not in keeping with what was released at the time of the restructuring of the program, when the project was to make Vale a Pena Ver de Novo a range of preferences for all entertainment programs, not just telenovelas; Mulher was the most popular choice to replace Você Decide.
Personnel
Show directors included Paulo José, Roberto Talma, Herval Rossano, Fábio Sabag, André Schultz, Mario Márcio Bandarra and Roberto Farias.
Several actors and presenters appeared such as Antônio Fagundes, Walmor Chagas, Lima Duarte, Carolina Ferraz, Raul Cortez, Renata Ceribelli, Tony Ramos, Celso Freitas, Luciano Szafir and Susana Werner. They all stayed for more an extended period.
Hos |
https://en.wikipedia.org/wiki/List%20of%20Necessary%20Roughness%20characters | This is a list of characters in the USA Network original drama TV series, Necessary Roughness. The principal cast of the series has remained mostly the same throughout the series. However, various recurring characters have appeared over the course of the show's run.
Main characters
Dr. Danielle "Dani" Santino
Dr. Danielle "Dani" Santino (née Romano) (Callie Thorne) is the protagonist. Dr. Dani Santino is a tough divorcée who, to make ends meet, becomes the therapist for a professional football team and quickly becomes sought after by other athletes, musicians, politicians and those living in the spotlight. Dani has a relationship with the team's athletic trainer, Matt Donnally, but tries to keep it secret from both the team and her children. Throughout the series one of her main patients is Terrence King. He falls into trouble because of his antics, no matter how much Dr. Dani advises him against them. She tries to help him deal with getting shot in the second season, but T.K. goes into a downward spiral and she advises the team to do an intervention for T.K.; he ends going into rehab. Dr. Santino falls in and out of her relationship with Matt, because he wants to have children and she doesn't want to have anymore. Dr. Dani kisses Nico Careles after Marshall Pittman dies in a plane crash. After the new Hawks' ownership brings in a new GM/head coach, Dani has a personality clash with the new head coach and is fired as the team's psychologist. Then she gets a mysterious call to take a limo, which takes her to the V3 office. Connor McClane asked for her help with a client, and was impressed with Dani's work. So, she gets wooed over by McClane and gets an offer with V3 that she can't refuse provided on the condition that she closes her private practice.
Dominic Eugene "Nico" Careles
Nico Careles (Scott Cohen) is a former Navy SEAL from Pittsburgh, employed as the team's head of security and "fixer", he works closely with Dani. In season one and early season two, Nico tries to keep Marshall Pittman's daughter (Danielle Panabaker) out of trouble with boys and drugs. He tells her that he can't do it anymore. Pittman uses Nico to spy on the team to bug the team and Dr. Dani, but instead Nico bugs Pittman and learns that Pittman has serious problems, forcing Pittman to seek treatment in the midst of his divorce from his wife. Nico breaks into T.K.'s home, discovering that T.K. has a serious addiction to pain medication, swiping all of T.K.'s medication, including a "flush" (which pushes medications out of the system, hiding his drug use in a drug test). Eventually it is leaked that Terrence had a drug problem. Nico does what he can to find the source of the leak. Nico later learns that a friend (Mike Pniewski) of his has double crossed him and bugged the team for Marshall Pittman. After Pittman's plane crashed he tries to search for evidence that suggested Pittman was alive, telling Dr. Santino that Pittman saved his life once, after Nico was |
https://en.wikipedia.org/wiki/D800 | D800 may refer to:
British Rail Class 43 (Warship Class), a locomotive
Dell Latitude D800, a laptop computer
Nikon D800, a full-frame digital single-lens reflex camera
Samsung D800, slider phone |
https://en.wikipedia.org/wiki/Influenza%20Research%20Database | The Influenza Research Database (IRD) is an integrative and comprehensive publicly available database and analysis resource to search, analyze, visualize, save and share data for influenza virus research. IRD is one of the five Bioinformatics Resource Centers (BRC) funded by the National Institute of Allergy and Infectious Diseases (NIAID), a component of the National Institutes of Health (NIH), which is an agency of the United States Department of Health and Human Services.
Data types in IRD
Segment, protein, and strain data
Animal surveillance data
Human clinical data
Experimentally determined and predicted immune epitopes
Sequence Features
Predicted protein domains and motifs
Gene Ontology annotations
Computed sequence conservation score
Clade classification for highly-pathogenic avian influenza H5N1 HA sequences
3D protein structures
PCR primer data curated from literature
Experiment data from laboratory experiments and clinical trials
Phenotypic characteristic data curated from literature
Serology data
Host factor data
Analysis and visualization tools in IRD
BLAST: provides custom IRD databases to identify the most related sequence(s)
Short Peptide Search: allows users to find peptide sequences in target proteins
Identify Point Mutations: identifies influenza proteins having particular amino acids at user-specified positions
Multiple sequence alignment: allows users to align segment/protein sequences using MUSCLE
Sequence Alignment Visualization: uses JalView for sequence alignment visualization
Phylogenetic tree construction: calculates a tree using various algorithms and evolutionary models
Phylogenetic Tree Visualization: allows the color-coded display of strain metadata on a tree generated with one of several available algorithms and/or evolutionary models and viewed with Archaeopteryx
3D Protein Structure Visualization: integrates PDB protein structure files with sequence conservation score and IRD Sequence Features and provides an interactive 3D protein structure viewer using Jmol
Sequence Feature Variant Type (SFVT) analysis: provides a centralized repository of functional regions and automatically calculates all observed sequence variation within each defined region
Metadata-driven Comparative Analysis Tool for Sequences (Meta-CATS): an automated comparative statistical analysis to identify positions that significantly differ between user-defined sequence groups
Sequence Variation Analysis (SNP): pre-computed sequence variation analysis in all IRD sequences; also allows users to calculate the extent of sequence variation in user-specified sequences
PCR Primers/Probes: provides a repository of commonly used primers for influenza virus identification, and calculates the polymorphisms of all related IRD sequences at the primer positions
PCR Primer Design: allows PCR primer design for IRD and user-provided sequences
Sequence annotation: determines the user-provided nucleotide sequence's influenza type, |
https://en.wikipedia.org/wiki/2012%20Horizon%20League%20men%27s%20basketball%20tournament | The 2012 Horizon League Men’s Basketball Tournament began on February 28 and ended on March 6. The Horizon League Network broadcast the first and second rounds. The semifinals were televised by ESPNU, with the championship game on ESPN. The Detroit Titans won the tournament and an automatic bid to the 2012 NCAA tournament.
Each first-round game was played on the home court of the higher-seeded team. The second round and semifinals were held at the Athletics-Recreation Center in Valparaiso, Indiana, home to the #1 overall seed Valparaiso. Since Valparaiso advanced to the championship game, the Crusaders also hosted the final.
Seeds
All Horizon League schools play in the tournament. Teams are seeded by 2011–12 Horizon League season record, with a tiebreaker system to seed teams with identical conference records. The top 2 teams receive a bye to the semifinals.
Schedule
Bracket
First round games at campus sites of lower-numbered seeds
Second round and semifinals hosted by Valparaiso
Championship game hosted by highest remaining seed
Honors
Tournament MVP
Ray McCallum, Jr. of Detroit was named the tournament MVP.
Horizon League All-Tournament Team
References
Tournament
Horizon League men's basketball tournament
Horizon League men's basketball tournament
Horizon League men's basketball tournament
Horizon League men's basketball tournament |
https://en.wikipedia.org/wiki/Shadow%20table | Shadow tables are objects in computer science used to improve the way machines, networks and programs handle information. More specifically, a shadow table is an object that is read and written by a processor and contains data similar to (in the same format as) its primary table, which is the table it's "shadowing". Shadow tables usually contain data that is relevant to the operation and maintenance of its primary table, but not within the subset of data required for the primary table to exist. Shadow tables are related to the data type "trails" in data storage systems. Trails are very similar to shadow tables but instead of storing identically formatted information that is different (like shadow tables), they store a history of modifications and functions operated on a table.
History
Shadow tables, as an abstract concept, have been used since the beginning of modern computing. However, widespread usage of the specific phrase "shadow table" began when relational database management systems (RDBMS) became widely used in the 1970s.
The initial usage of relational DBMs for commercial purposes lead to the term "shadow tables" becoming widespread. A relational DBM uses related data fields (columns) to correlate information between tables. For example, two tables, transaction_user and transaction_amount, would both contain the column "key", and keys between tables would match, making it easy to find both the user and the amount of a specific transaction if the key is known. This relational technology allowed people to correlate information stored in a primary table and its shadow.
Applications
Since shadow tables are such an abstract concept, their applications remain in the realm of computer science. Although their usage may not be specifically declared as "shadow table(s)", the concept remains the same. Shadow tables are usually used in order to improve the performance, capacity, and ability of an existing computer/network system. In most applications, shadow tables are usually a carbon copy of their primary tables' structure, but with unique data.
Theoretical application
Since shadow tables are a specific type of object in computer science, the applications vary greatly, because their application depends on what data is stored in the shadow table and how that data is used. The following is a list of general, abstract applications for shadow tables that span all real-world applications.
Storage - The storage of a data entry in a shadow table that would have normally been deleted or modified.
Encapsulation - The placement of data within a shadow table in order to separate a set of data from another.
Modularity - The placement of data within a shadow table to make modification and handling of the data easier.
Engineering Applications
When shadow tables are used to solve current problems in today's computer/network systems, usually a combination of more than one of the aforementioned theoretical/abstract applications of shadow tables are us |
https://en.wikipedia.org/wiki/Constrained%20clustering | In computer science, constrained clustering is a class of semi-supervised learning algorithms. Typically, constrained clustering incorporates either a set of must-link constraints, cannot-link constraints, or both, with a data clustering algorithm. A cluster in which the members conform to all must-link and cannot-link constraints is called a chunklet.
Types of constraints
Both a must-link and a cannot-link constraint define a relationship between two data instances. Together, the sets of these constraints act as a guide for which a constrained clustering algorithm will attempt to find chunklets (clusters in the dataset which satisfy the specified constraints).
A must-link constraint is used to specify that the two instances in the must-link relation should be associated with the same cluster.
A cannot-link constraint is used to specify that the two instances in the cannot-link relation should not be associated with the same cluster.
Some constrained clustering algorithms will abort if no such clustering exists which satisfies the specified constraints. Others will try to minimize the amount of constraint violation should it be impossible to find a clustering which satisfies the constraints. Constraints could also be used to guide the selection of a clustering model among several possible solutions.
Examples
Examples of constrained clustering algorithms include:
COP K-means
PCKmeans (Pairwise Constrained K-means)
CMWK-Means (Constrained Minkowski Weighted K-Means)
References
Cluster analysis algorithms
Cluster analysis |
https://en.wikipedia.org/wiki/Luancheng%20Subdistrict | Luancheng Subdistrict (t , s , p Luánchéng, postal Lanchou) is a subdistrict in Luanzhou, Hebei Province, China.
It was connected to the China Railway Company's network in 1892 and was involved in the First Zhili–Fengtian War during China's Warlord era.
See also
List of township-level divisions of Hebei
Township-level divisions of Hebei
Tangshan |
https://en.wikipedia.org/wiki/DS0A | DS0A is the interface most commonly used for SS7 networks in the US. It is a 56/64kbit/s channel typically located in a DS1 or larger facility. The DS0A electrical interface usually only exists inside a central office environment, and only exists for the sole purpose of connecting into a channel bank to be multiplexed onto a higher facility.
Sources
Cisco SS7 Fundamentals (archived website, saved 13th of March 2013)
Russell, Travis. "Signaling System # 7", Mcgraw-Hill Telecommunications.
Signaling System 7 |
https://en.wikipedia.org/wiki/Adult%20Swim%20%28Australian%20TV%20programming%20block%29 | Adult Swim in Australia was an adult-oriented free-to-air television block that was last aired from Saturday and Sunday nights on 9Go!. It was originally a separate network that shared channel space with Cartoon Network, starting in 2002 until 31 December 2007.
History
Adult Swim was first broadcast on Cartoon Network Australia in December 2005 before it was taken down on 31 December 2007. The block is no longer shown on Cartoon Network, however comedy shows are now airing on The Comedy Channel on 11 March 2008. The block returned with Robot Chicken and Harvey Birdman, Attorney at Law, in March 2008, with Aqua Teen Hunger Force joining the programming on 1 July. The Boondocks also airs on the same channel although it is not under the Adult Swim banner and instead airs separately. Moral Orel has premiered on Australian television. Titan Maximum also premiered on 6 January 2010. Frisky Dingo joined the Comedy Channel's "Animania" line-up as of 21 July 2010. Tim and Eric Awesome Show Great Job premiered on 26 January 2011 along with Childrens Hospital which unlike the American broadcast, aired completely uncensored with profanity intact.
Most of the anime series have not returned to television; however, an anime block on the Australian Sci-Fi Channel, Animax, aired shows previously aired on both Adult Swim USA and Australia. The block featured Ghost in the Shell: Stand Alone Complex, Bleach, Air Gear, Inuyasha, Cowboy Bebop, and Blood+. The block ceased operations in 2016.
The new incarnation also premiered a lot of other Adult Swim shows including Moral Orel, Titan Maximum, Robot Chicken: Star Wars, Frisky Dingo, Tim and Eric Awesome Show Great Job and Childrens Hospital (airing uncensored with profanity intact), along with the latest additions but aired at a different time, Metalocalypse and The Venture Bros, the latter making it the third show with Aqua Teen Hunger Force and Harvey Birdman to have been aired on both the old and the new block.
Some series that aired on Adult Swim have been released to Region 4 DVD by Madman Entertainment, including shows that have never been shown on Australian television before, such as Metalocalypse, Minoriteam, 12 oz. Mouse, Xavier Renegade Angel. The Aqua Teen Hunger Force Colon Movie Film for Theaters has also been quietly released to DVD.
Some Adult Swim shows have also aired on SBS 2, and in October 2013 full episodes and short clips were made available on their website. Shortly after, they started to sell their DVDs on the website.
In October 2013, Turner Broadcasting in partnership with MCM Media and Movideo launched a video on demand service Adult Swim Australia. The initial offering includes a library of 1500 Adult Swim videos including full episodes and short clips.
In June 2016, Nine Network and Turner Broadcasting System signed a 2-year deal to broadcast Adult Swim programs on 9Go! every Saturday and Sunday night. Starting September 1, 2016, Rick and Morty aired on Thursday nights. Adult Swim |
https://en.wikipedia.org/wiki/Harvard%20Radio%20Meteor%20Project | The Harvard Radio Meteor Project is a scientific investigative station based within Harvard University.
The Harvard station is investigating data specifically upon the height, the deceleration (speeds ) and the distribution of ionized material within the trail of meteors. The method involves a system of radar producing stations using data that has originated from the reflected pulse returning from the ion columns of meteors.
The antenna used at the Harvard station (main site) is described as a double-trough type antenna.
References
Harvard University
Astrophysics research institutes |
https://en.wikipedia.org/wiki/Gojko%20Adzic | Gojko Adžić is a software delivery consultant and author of several books on Serverless computing, Impact Mapping, Specification by example, Behavior Driven Development, Test Driven Development and Agile Testing. Adžić is a prolific speaker at software development and testing conferences.
He is one of the 2019 AWS Serverless Heroes, the winner of the 2016 European Software Testing Outstanding Achievement Award, and the 2011 Most Influential Agile Testing Professional Award. Adžić's blog won the UK Agile Award for the best online publication in 2010. His book, "Specification by Example", won the 2012 Jolt Award for the best book and was listed as the second most influential agile book for 2012 based on Amazon and Goodreads reviews.
Adžić was born in Belgrade, Serbia. He studied Computer Science at the Faculty of Mathematics at University of Belgrade, Serbia and attended the Matematicka Gimnazija specialist high school in Belgrade, Serbia. His professional writing career started in 1997 with computer programming articles published in Serbian computer magazines including :sr:PC Press and :sr:Mikro-PC World. From 1999 to 2003 he was an associate editor at Mikro-PC World responsible for Linux, and from 2003 to 2005 he served as editor-in-chief. In 2005, he moved from Serbia to the UK to start Neuri Limited and currently works as a partner at Neuri Consulting. In 2013, he co-founded MindMup, an online mind mapping application.
References
Software testing people
Living people
University of Belgrade Faculty of Mathematics alumni
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/Kepler-19c | Kepler-19c is an extra-solar planet orbiting the star Kepler-19 approximately 717 light years from Earth.
Discovery
The planet was discovered as a result of examinations of data from the previously discovered exoplanet, Kepler-19b. Timing variations in the orbital period of the first planet necessitated gravitational forces to be acting upon the planet, resulting from an additional body in the vicinity, acting to cause a variation of transition of five minutes per orbit. The lead author of the paper announcing the discovery was Sarah Ballard.
See also
List of extrasolar planet firsts
References
External links
Ames research 12:21
Exoplanets discovered in 2011
19c |
https://en.wikipedia.org/wiki/Assignment%20of%20copyright%20in%20software%20under%20Indian%20Copyright%20Act | Ownership and assignment of copyright for computer software in India was addressed by the Delhi High Court in a judgment on Pine Labs Private Limited vs Gemalto Terminals India Private Limited and others (FAO 635 of 2009 and FAO 636 of 2009).
Justice A.K. Sikri and Justice Suresh Kait upheld Pine Labs' contention that the assignment of copyright in software developed by it for Gemalto came to an end after 5 years and thereafter, the copyright reverted to Pine Labs.
Facts
Gemalto had engaged Pine Labs for the development of software for various programs including the one for the IOCL Fleet Card Program. A master service agreement (MSA) was signed in June 2004. Clause 7 of the MSA provided that Pine Labs " assigns" all copyright to Gemalto. Pursuant to the MSA, Pine Labs authored a computer program known as the Version 1.03 for the IOCL Fleet Card Program and a complete version of the same was provided to Gemalto in August 2004. Thereafter, certain other functionalities were added to the program and subsequent versions were also provided from time to time. In 2009, Pine Labs filed a suit in the Delhi high Court claiming that copyright had reverted to it as the assignment had expired by virtue of section 19(5) and 19(6) of the Indian Copyright Act.
Section 19(5) and 19(6) provide that:
19(5) If the period of assignment is not stated, it shall be deemed to be five years from the date of assignment.
19 (6) If the territorial extent of assignment of the rights is not specified, it shall be presumed to extend within India.
Injunction
Ex parte injunction was granted by the Single judge but was later vacated after hearing arguments. Pine Labs filed an appeal before the Division Bench. Division Bench initially granted interim stay and vide judgment dated 3 August 2011 ruled in favour of Pine Labs.
Judgment
The bench observed that:
The Bench relied upon section 19(5) and 19(6) of the Copyright Act and came to the conclusion that:
Gemalto contended that the MSA was only an agreement to assign and not an assignment and it was the equitable owner of the copyright. As such,section 19(5) and 19(6) of the Copyright Act had no application and Pine Labs was liable to execute documents assigning the copyright to Gemalto. This contention was overruled by the Bench which concluded that section 19(5) and 19(6) of the Copyright Act applied whether the MSA was an agreement to assign or an assignment.
Importance
This judgment is of significant importance in outsourcing contract/ commissioning works, not only for computer software but for all aspects where an author is contracted to write any literary work. Provisions of section 19(5) and 19(6) of the Copyright Act, which were inserted only in 1995 through an amendment, are unique to India and are often overlooked at the stage of drafting of contracts for assignment of copyright. This judgment clearly lays down that if the parties fail to provide for the period in the document by which assignment of copyright is |
https://en.wikipedia.org/wiki/List%20of%20fauna%20of%20Oregon | This is a list of species of fauna (animals) that have been observed in the U.S. State of Oregon.
Amphibians
Caudata
Oregon slender salamander
Reptiles
Serpentes
California mountain kingsnake - Native to Oregon
Common garter snake - Native to Oregon.
Common kingsnake Native to Oregon
Gopher snake - Native to Oregon
Ground snake - Owyhee River
Night snake - Native to Oregon
Northwestern garter snake - Native to Oregon
Pacific rattlesnake- Native to Oregon
Racer - Native to Oregon
Ringneck snake - Native to Oregon
Rubber boa - Native to Oregon
Sharptail snake - Native to Oregon
Striped whipsnake - Native to Oregon
Western rattlesnake - Found in Eastern Oregon
Western terrestrial garter snake - Native to Oregon
Testudines
Snapping turtle - Introduced into Oregon.
Western painted turtle - Native to Oregon.
Annelids
Haplotaxida
Oregon giant earthworm
Birds
List of birds of Oregon
Crustaceans
Notostraca
Branchinecta lynchi - Also in California.
Lepidurus packardi - Mostly Californian, but found in Jackson County, Oregon as well.
Fish
Cypriniformes
Warner sucker - Also in California, Arizona, and Nevada.
Shortnose sucker - Also in California.
Lost River sucker - Also in California.
Modoc sucker - Also in California.
Acipenseriformes
Green sturgeon - Rogue River in Oregon.
White sturgeon - Umpqua River in Oregon.
Lamniformes
Common thresher - Oregon coast.
Great white shark - Oregon coast.
Basking shark - Oregon coast.
Rajiformes
Broad skate - Oregon coast.
Fine-spined skate - Oregon coast.
Pacific white skate - Oregon coast.
Roughtail skate - Oregon coast.
Deepsea skate - Oregon coast.
Sandpaper skate - Oregon coast.
Perciformes
Calico surfperch - Oregon coast.
Carcharhiniformes
Brown catshark - Oregon coast.
Scorpaeniformes
Mosshead sculpin - Oregon coast.
Pit sculpin - Goose lake, Drews creek, and Thomas Creeks.
Prickly sculpin - River drainages
Petromyzontidae
Pacific lamprey - Native to Oregon
Lampetra ayresii - Native to Oregon
Western brook lamprey - Native to Oregon
Insects
Odonata
Canada darner - Native to Oregon and common across America.
Paddle-tailed darner - Native to Oregon and common across America.
Shadow darner - Native to Oregon and common across America.
Common green darner - Native to Oregon and common across America.
Sooty dancer - Native to Oregon.
Paiute dancer - Native to Oregon.
River jewelwing - Native to Oregon and common across America.
Taiga bluet - Native to Oregon and common across America.
Orthoptera
Jerusalem cricket - Found in Central and Eastern Oregon in the desert regions.
Hymenoptera
Franklin's bumble bee - Found in Southern Oregon.
Mammals
Rodentia
Baird's shrew - Endemic to northwest Oregon.
Camas pocket gopher - occurs only in the Willamette Valley, endemic to northwest Oregon in the Northwestern United States.
Fog shrew - Also can be found in northern California.
Gray-tailed vole - Endemic to Oregon.
Pacific shrew - Endemic to western Oregon.
White-tailed antelope squirrel |
https://en.wikipedia.org/wiki/Home%20Invasion%20%28American%20Horror%20Story%29 | "Home Invasion" is the second episode of the first season of the television series American Horror Story, which premiered on the network FX on October 12, 2011. The episode was co-written by series co-creators Ryan Murphy and Brad Falchuk and directed by Alfonso Gomez-Rejon.
In the episode, Ben Harmon (Dylan McDermott) goes to Boston to talk with the student he had an affair with in the first episode (Kate Mara). While he is away, his wife, Vivien (Connie Britton), and daughter, Violet (Taissa Farmiga) deal with three home invaders intent on reenacting a murder that happened in the house in 1968. Kate Mara guest stars as Hayden McClaine, the student Ben was having an affair with.
The episode makes use of the musical score to Psycho composed by Bernard Herrmann. This episode is rated TV-MA (LV).
Plot
A flashback to 1968 shows the house being used as a dormitory for nursing students. While alone in the house late at night, nursing students Maria and Gladys are studying when a man rings the doorbell and asks for help. Noticing the man is bleeding from the head, Maria lets him in and begins to heal his wounds. When she realizes there is no actual cut on his head and that the man is faking his injury, the man attacks them both. First, knocking Maria unconscious with an ashtray before pushing a fleeing Gladys to the floor, taunting her with an insult about her weight then drowning her in an upstairs bathtub. Maria wakes up and sees the man who forces her to strip off her clothes and wear a nurse's uniform. She is then hog-tied and stabbed repeatedly in the back.
Back in the present, Ben meets with Tate, who reveals his sexual fantasies about Violet. Ben sees a new patient, named Bianca, who is fascinated by the history of the murders in the house. He receives a call from his ex-mistress and former student of his, Hayden, who tells him that she's pregnant and she needs his support while having an abortion.
Constance senses that Vivien is pregnant, and Vivien confesses that she fears there is something wrong with the baby. Constance assures her that her baby is fine, and confesses that three of her four children were born with some sort of birth defect.
In order to see Hayden, Ben lies to Vivien, saying that he must go to Boston to see a patient who tried to commit suicide. Violet reveals to Vivien that she knows about the pregnancy.
That night, a trio of serial killer enthusiasts, Bianca (seen earlier by Ben), Fiona, and Dallas break into the house and capture Vivien and Violet. The trio explain their plan to re-enact the murders of Maria and Gladys to the duo. Fiona presents the ashtray used to hit Maria. Bianca questions who will be who before Fiona chooses Vivien as Maria and Violet as Gladys. Taking out nurses uniforms, there is a conflict between the group when Vivien and Violet refuse to be part of their reenactment. After Fiona tosses a uniform to Violet, she hits her in the face and attempts to escape before running into Tate, who tells |
https://en.wikipedia.org/wiki/Ricken%20Patel | Ricken Patel (born January 8, 1977) is a Canadian–British activist. He was from 2005 to 2021 the Founding CEO of Avaaz, an online activist network.
Patel was voted "Ultimate Gamechanger in Politics" by the Huffington Post, and listed in the world's top 100 thinkers by Foreign Policy magazine. He was also named a Young Global Leader by the World Economic Forum, referred to as "the global leader of online protest" by The Guardian and listed as one of People Magazine's most eligible bachelors.
Life
Patel was born in Edmonton, Alberta, to a Kenyan-born Indian father of Gujarati origin and an English mother with Jewish heritage.
Patel studied Philosophy, Politics and Economics (PPE) at Balliol College, Oxford, where he helped organize against the 1998 introduction of tuition fees. He graduated first in his university class, and held leadership roles in student government and student activism. He has a Master's in Public Policy from Harvard's John F. Kennedy School of Government, where (mirroring his activism at Oxford) he helped lead the campus's highly publicized living wage campaign.
Work
After leaving Harvard, Patel lived in Sierra Leone, Liberia, Sudan and Afghanistan, consulting for organizations including the International Crisis Group.
Prior to founding Avaaz in 2007, Patel was the founding executive director of Res Publica, a global public entrepreneurship group that worked to end genocide in Darfur and build progressive globalism in US politics, among other projects. The stated goal of Res Publica was to promote “good governance, civic virtue and deliberative democracy”. While in the US, Patel was an online member of the group MoveOn.org, from which he learned the tools of online campaigning.
In 2007, Patel founded the online campaigning organization Avaaz – with the stated goal to “close the gap between the world we have and the world most people everywhere want”. Avaaz campaigns online and off on a number of human rights, social justice, environmental, media freedom and peace and security issues. Avaaz's membership has spread to every country in the world and has more than 44 million members. Patel refers to Avaaz as a community and technology platform which "has merely given voice to a global hunger for greater democracy".
Patel left Avaaz for unspecified reasons in 2021. According to Avaaz's 990 for that year, Patel collected an initial $189,296 in severance pay, followed by an additional payment of $59,997 some months later.
Since his departure, Patel has launched a personal blog and a book project called "the journey". In his blog, Patel writes about topics ranging the "big cahuna" mystery of human existence, to the dangers of 'woketivism' and cancel culture.
In a 2023 piece, Patel condemned the cultural movement against systemic-racism and police brutality that occurred in the aftermath of the murders of George Floyd, Briana Taylor, and Ahmaud Arbery as one of “woke terror,” that embolden rightwing and leftwing “authoritarians |
https://en.wikipedia.org/wiki/Amber%20Smalltalk | Amber Smalltalk, formerly named Jtalk, is an implementation of the programming language Smalltalk-80, that runs on the JavaScript runtime of a web browser. It is designed to enable client-side development using Smalltalk. The programming environment in Amber is named Helios.
Key features
Amber includes an integrated development environment (IDE) with a class browser, Workspace, transcript, object inspector, and debugger. Amber is written in itself (is self-hosting), including the compiler, and compiles into JavaScript, mapping one-to-one with the JavaScript equivalent. This one-to-one mapping with JavaScript differentiates Amber from other Smalltalk variants such as Pharo, Seaside, and Squeak. Developing Amber project requires Node.js to run the tooling; the deployed project only needs browser to run. Amber doesn't run slowly on a bytecode virtual machine due to its convenient mapping to JavaScript, which makes compiled code run fast.
History
Amber was originally created by Nicolas Petton in 2011. Amber was influenced by an earlier Smalltalk in browser project, named Clamato, created by Avi Bryant. Amber and Clamato both use parsing expression grammar (PEG) libraries to parse Smalltalk source code. Amber uses the JavaScript based PEG.js library written by David Majda. Clamato uses PetitParser, a Smalltalk-based library written by Lukas Renggli. Clamato and Amber were both influenced by earlier work by Dan Ingalls in developing the Lively Kernel implementation of Morphic to run in web browsers via JavaScript.
Starting with version 0.12.0, Amber modules compile to asynchronous module definition (AMD). Starting with version 0.12.6, the development helper command-line interface (CLI) tool is extracted to dedicated module, which can be installed from npm as @ambers/cli; and setting up the project and its JavaScript ecosystem (npm, grunt) is greatly simplified using this CLI tool by issuing amber init and answering a few questions. Since August 2018, project scaffolding of "amber init" is simplified, not using bower any more and only based on npm and whole project resides under npm organization @ambers. This makes setting Amber Smalltalk easier for people with little JavaScript experience.
Installing
Up-to-date instructions should be at https://lolg.it/amber/amber.
To install Amber, Git must be installed first, if it is not already. The following commands will install Amber: # for macOS and Linux, needs the following two commands:
npm config set prefix=~/npm
export PATH="$PATH:$HOME/npm/bin" # add to .bash_profile or .bashrc
npm install -g grunt-cli grunt-init @ambers/cliTo create a new project, write:# Create the empty project dir
mkdir example-project
cd example-project
# Create and initialize a new Amber project
amber init"amber init" step will lead to some questions about the project. For most of them, a default answer can be set. The next step is to start the server:
amber serve
After that, typing http://localhost:4000 in the browser will |
https://en.wikipedia.org/wiki/Video%20coding%20format | A video coding format (or sometimes video compression format) is a content representation format for storage or transmission of digital video content (such as in a data file or bitstream). It typically uses a standardized video compression algorithm, most commonly based on discrete cosine transform (DCT) coding and motion compensation. A specific software, firmware, or hardware implementation capable of compression or decompression to/from a specific video coding format is called a video codec.
Some video coding formats are documented by a detailed technical specification document known as a video coding specification. Some such specifications are written and approved by standardization organizations as technical standards, and are thus known as a video coding standard. The term 'standard' is also sometimes used for de facto standards as well as formal standards.
Video content encoded using a particular video coding format is normally bundled with an audio stream (encoded using an audio coding format) inside a multimedia container format such as AVI, MP4, FLV, RealMedia, or Matroska. As such, the user normally does not have a H.264 file, but instead has a .mp4 video file, which is an MP4 container containing H.264-encoded video, normally alongside AAC-encoded audio. Multimedia container formats can contain any one of a number of different video coding formats; for example the MP4 container format can contain video in either the MPEG-2 Part 2 or the H.264 video coding format, among others. Another example is the initial specification for the file type WebM, which specified the container format (Matroska), but also exactly which video (VP8) and audio (Vorbis) compression format is used inside the Matroska container, even though the Matroska container format itself is capable of containing other video coding formats (VP9 video and Opus audio support was later added to the WebM specification).
Distinction between format and codec
A format is the layout plan for data produced or consumed by a codec.
Although video coding formats such as H.264 are sometimes referred to as codecs, there is a clear conceptual difference between a specification and its implementations. Video coding formats are described in specifications, and software, firmware, or hardware to encode/decode data in a given video coding format from/to uncompressed video are implementations of those specifications. As an analogy, the video coding format H.264 (specification) is to the codec OpenH264 (specific implementation) what the C Programming Language (specification) is to the compiler GCC (specific implementation). Note that for each specification (e.g. H.264), there can be many codecs implementing that specification (e.g. x264, OpenH264, H.264/MPEG-4 AVC products and implementations).
This distinction is not consistently reflected terminologically in the literature. The H.264 specification calls H.261, H.262, H.263, and H.264 video coding standards and does not contain the word |
https://en.wikipedia.org/wiki/Daldalita | Daldalita is a Philippine television musical drama fantasy series broadcast by GMA Network. Directed by Don Michael Perez, it stars Jillian Ward in the title role. It premiered on October 17, 2011 on the network's Telebabad line up replacing Futbolilits. The series concluded on February 3, 2012 with a total of 80 episodes. It was replaced by Alice Bungisngis and Her Wonder Walis in its timeslot.
The series is streaming online on YouTube.
Cast and characters
Lead cast
Jillian Ward as Daldalita / Lolita Matias
Supporting cast
Ogie Alcasid as Mateo Matia
Manilyn Reynes as Katrina de Leon
Rufa Mae Quinto as Cherry
Julie Anne San Jose as Marga de Leon
Elmo Magalona as Gino Delgado
Isabel Oli as May
Marc Abaya as Sam
Recurring cast
Luigi Revilla as Dado
Timmy Cruz as Lupe
Spanky Manikan as Manny Manuel
Arnold Reyes as Arthur
Jinky Oda as Tisay
Joey Paras as Chi-Chi
Eunice Lagusad as Tessa
Voice cast
Candy Pangilinan as Daisy
Pekto as Kirat
Wally Bayola as Bobby
Guest cast
Donna Cruz as Carmela de Leon-Matias
Isabel Granada as Demi
Chuckie Dreyfus as Ashton
Baby O'Brien as Lola Barbara
MM Magno as Johann
Milkcah Wynne Nacion as Becky / fake Lolita "Beki" de Leon-Matias
Sasha Baldoza
Sean Samonte as Dwayne
Angel Satsumi
Raymart Santiago as Tarzan
Production
Actress Gelli de Belen was initially hired for the role of Katrina de Leon. De Belen later left the series to work for TV5. Manilyn Reynes served as her replacement.
Ratings
According to AGB Nielsen Philippines' Mega Manila household television ratings, the pilot episode of Daldalita earned a 19.3% rating. While the final episode scored a 17% rating.
References
External links
2011 Philippine television series debuts
2012 Philippine television series endings
Filipino-language television shows
GMA Network drama series
Philippine fantasy television series
Philippine musical television series
Television shows set in the Philippines |
https://en.wikipedia.org/wiki/Kung%20Aagawin%20Mo%20ang%20Langit | (International title: Losing Heaven / ) is a Philippine television drama romance series broadcast by GMA Network. Directed by Jay Altajeros, it stars Carla Abellana, Michelle Madrigal and Mike Tan. It premiered on September 19, 2011 on the network's Dramarama sa Hapon line up replacing Sisid. The series concluded on February 3, 2012 with a total of 100 episodes. It was replaced by Broken Vow in its timeslot.
Cast and characters
Lead cast
Carla Abellana as Ellery Martinez-Alejandro
Michelle Madrigal as Bridgitte Q. Samonte
Mike Tan as Jonas Alejandro
Supporting cast
Ricky Davao as Delfin Martinez
Shamaine Centenera-Buencamino as Marissa Martinez
Ces Quesada as Leila Quintana-Samonte
Kevin Santos as Lester Feliciano
Paolo Ballesteros as Aloha
Jan Marini as Sonia Tercero
Will Devaughn as Waldy Buenafe
Steph Henares as Janice Baluarte
Rochelle Barrameda as Cecile Samonte
Frank Garcia as Donald Salvacion
RJ Salvador as Aaron Samonte
Elijah Alejo as Samantha Alejandro
Rich Asuncion as Nadia
Frank Magalona as Atty. Enrico Fernandez
Guest cast
Dianne Hernandez as Jenna Quirante
Candace Kucsulain as Monique Hilario
Crispin Pineda as Dante Morales
Ross Fernando as young Jonas
Christopher de Leon as Jonas' dad
Andrea Torres as Justin
Ratings
According to AGB Nielsen Philippines' Mega Manila household television ratings, the pilot episode of earned a 13.9% rating. While the final episode scored a 25.2% rating.
References
External links
2011 Philippine television series debuts
2012 Philippine television series endings
Filipino-language television shows
GMA Network drama series
Philippine romance television series
Television shows set in the Philippines |
https://en.wikipedia.org/wiki/International%20Conference%20on%20Pattern%20Recognition%20in%20Bioinformatics | Pattern Recognition in Bioinformatics (PRIB) was an international computer science conference covering pattern recognition algorithms in bioinformatics and computational biology. It was also the major event of Technical Committee 20 of the International Association for Pattern Recognition (IAPR), and has been held annually from 2006 to 2014 around the world. The articles appearing in the PRIB conference proceedings were published in Lecture Notes in Bioinformatics by Springer Science+Business Media.
The PRIB conference had its last edition in Cancun, Mexico in 2016.
Locations
PRIB 2016, Cancun, Mexico, last edition
PRIB 2014, Stockholm, Sweden
PRIB 2013, Nice, France
PRIB 2012, Tokyo, Japan
PRIB 2011, Delft, Netherlands
PRIB 2010, Nijmegen, Netherlands
PRIB 2009, Sheffield, England, United Kingdom
PRIB 2008, Melbourne, Australia
PRIB 2007, Singapore
PRIB 2006, Hong Kong, China, first edition
See also
International Association for Pattern Recognition (IAPR)
pattern recognition
bioinformatics
computational biology
International Conference on Computational Intelligence Methods for Bioinformatics and Biostatistics (CIBB)
References
External links
Books of the PRIB proceedings published on Springer Lecture Notes in Bioinformatics from 2006 to 2014
PRIB 2016 official website
Computer science conferences |
https://en.wikipedia.org/wiki/Mac%20OS%20Ukrainian%20encoding | Mac OS Ukrainian is a character encoding used on Apple Macintosh computers prior to Mac OS 9 to represent texts in Cyrillic script which include the letters ‹Ґ› and ‹ґ›, including the Ukrainian alphabet.
It is a variant of the original Mac OS Cyrillic encoding. Code points 162 (0xA2) representing the character ‹¢› and 182 (0xB6) representing the character ‹∂› were redefined to represent ‹Ґ› and ‹ґ›, respectively.
Since Mac OS 9, ‹Ґ› and ‹ґ› have been included in the Macintosh Cyrillic encoding.
Codepage layout
Each character is shown with its equivalent Unicode code point. Only the second half of the table (code points 128–255) is shown, the first half (code points 0–127) being the same as ASCII.
{| class="wikitable chset nounderlines" frame="box" style="text-align: center; border-collapse: collapse"
|-
|style="text-align: left; font-family: sans-serif" |
|width=22px | A2
|width=22px | B6
|width=22px | FF
|-
|style="text-align: left" | Macintosh Cyrillic before Mac OS 9.0also Microsoft code page 10007
|
|
|rowspan=2
|-
|style="text-align: left" | Macintosh Ukrainian before Mac OS 9.0also Microsoft code page 10017
|rowspan=2
|rowspan=2
|-
|style="text-align: left" | Macintosh Cyrillic since Mac OS 9.0
|
|}
References
Character sets
Ukrainian |
https://en.wikipedia.org/wiki/Pavegen | Pavegen Systems is a UK technology company that developed interactive floor tiles to convert footsteps into small amounts of electrical energy, data insights, and engagement points for global brands, businesses, and governments. The company was founded in 2009 by Laurence Kemball-Cook.
History
Pavegen Systems was founded in 2009 by Laurence Kemball-Cook. Cook, a graduate in Industrial Technology and Design from Loughborough University, took on a university placement with E.ON, and proposed using footfall as a potential power source.
The development of the first prototype of the Pavegen flooring tile was funded by a Royal Society of Arts International Design Directions prize. The tile that converts kinetic energy from footsteps into electricity, while collecting data about walking traffic patterns.
The first generation tile was made from recycled polymer, with the top surface made from recycled truck tires. Power is generated when a footfall compresses the slab by about . The exact technology is a secret, but PaveGen officials have said it involves electromagnetic induction by copper coils and magnets. Pavegen says each pedestrian generates enough to run an LED street lamp for 30 seconds. The technology was developed by Pavegen founder Laurence Kemball-Cook.
An improved tile was developed in 2016, which according to the company improved energy conversion by 'about 20 times'. The amount of energy generated has been criticised, with one calculation claiming that walking for 4 hours on PaveGen paving would generate 0.02% of the average European's energy needs. It has been suggested that the technology's strength rests in its ability to track volume and direction of traffic flow, thus providing useful metrics in a range of scenarios.
Among other installations, the slabs have been laid at London's West Ham Underground station for the 2012 Olympic Games. In April 2013, a demonstration installation with Schneider Electric harvested energy from the runners in the Paris Marathon.
PaveGen has also put these tiles on a public soccer field in Rio de Janeiro to allow play after sunset.
A study of a central building at Macquarie University in Sydney, Australia, suggested that if pavers covered the 3.1% of the floor that sees the most foot traffic, it would generate an estimated 1.1 megawatt-hour per year, about 0.5% of the building's energy needs.
In 2012, Pavegen raised £350,000 through London Business Angels, which helped the company create a tangible business. In 2015, the company raised £1.9m through the Crowdcube platform, allowing them to gain 1500 investors and valued the company at about £17m.
In 2015, Kemball-Cook acts as CEO of the company, For his invention, he was chosen as Businessman of the Year at the PEA Awards, and presented with a Shell LiveWIREGrand Ideas Award. He also was named as honorary Enterprise and Innovation Fellow by Loughborough University.
Distributors
Pavegen manufacture and export from the UK
Criticism
The Register |
https://en.wikipedia.org/wiki/Multimedia%20information%20retrieval | Multimedia information retrieval (MMIR or MIR) is a research discipline of computer science that aims at extracting semantic information from multimedia data sources. Data sources include directly perceivable media such as audio, image and video, indirectly perceivable sources such as text, semantic descriptions, biosignals as well as not perceivable sources such as bioinformation, stock prices, etc. The methodology of MMIR can be organized in three groups:
Methods for the summarization of media content (feature extraction). The result of feature extraction is a description.
Methods for the filtering of media descriptions (for example, elimination of redundancy)
Methods for the categorization of media descriptions into classes.
Feature extraction methods
Feature extraction is motivated by the sheer size of multimedia objects as well as their redundancy and, possibly, noisiness. Generally, two possible goals can be achieved by feature extraction:
Summarization of media content. Methods for summarization include in the audio domain, for example, mel-frequency cepstral coefficients, Zero Crossings Rate, Short-Time Energy. In the visual domain, color histograms such as the MPEG-7 Scalable Color Descriptor can be used for summarization.
Detection of patterns by auto-correlation and/or cross-correlation. Patterns are recurring media chunks that can either be detected by comparing chunks over the media dimensions (time, space, etc.) or comparing media chunks to templates (e.g. face templates, phrases). Typical methods include Linear Predictive Coding in the audio/biosignal domain,<ref>HG Kim, N Moreau, T Sikora. MPEG-7 Audio and Beyond", Wiley, 2005.</ref> texture description in the visual domain and n-grams in text information retrieval.
Merging and filtering methods
Multimedia Information Retrieval implies that multiple channels are employed for the understanding of media content. Each of this channels is described by media-specific feature transformations. The resulting descriptions have to be merged to one description per media object. Merging can be performed by simple concatenation if the descriptions are of fixed size. Variable-sized descriptions – as they frequently occur in motion description – have to be normalized to a fixed length first.
Frequently used methods for description filtering include factor analysis (e.g. by PCA), singular value decomposition (e.g. as latent semantic indexing in text retrieval) and the extraction and testing of statistical moments. Advanced concepts such as the Kalman filter are used for merging of descriptions.
Categorization methods
Generally, all forms of machine learning can be employed for the categorization of multimedia descriptions though some methods are more frequently used in one area than another. For example, hidden Markov models are state-of-the-art in speech recognition, while dynamic time warping – a semantically related method – is state-of-the-art in gene sequence alignment. Th |
https://en.wikipedia.org/wiki/Software%20construction | Software construction is a software engineering discipline. It is the detailed creation of working meaningful software through a combination of coding, verification, unit testing, integration testing, and debugging. It is linked to all the other software engineering disciplines, most strongly to software design and software testing.
Software construction fundamentals
Minimizing complexity
The need to reduce complexity is mainly driven by limited ability of most people to hold complex structures and information in their working memories. Reduced complexity is achieved through emphasizing the creation of code that is simple and readable rather than clever. Minimizing complexity is accomplished through making use of standards, and through numerous specific techniques in coding. It is also supported by the construction-focused quality techniques.
Anticipating change
Anticipating change helps software engineers build extensible software, which means they can enhance a software product without disrupting the underlying structure.
Research over 25 years showed that the cost of rework can be 10 to 100 times (5 to 10 times for smaller projects) more expensive than getting the requirements right the first time. Given that 25% of the requirements change during development on average project, the need to reduce the cost of rework elucidates the need for anticipating change.
Constructing for verification
Constructing for verification means building software in such a way that faults can be ferreted out readily by the software engineers writing the software, as well as during independent testing and operational activities. Specific techniques that support constructing for verification include following coding standards to support code reviews, unit testing, organizing code to support automated testing, and restricted use of complex or hard-to-understand language structures, among others.
Reuse
Systematic reuse can enable significant software productivity, quality, and cost improvements. Reuse has two closely related facets:
Construction for reuse: Create reusable software assets.
Construction with reuse: Reuse software assets in the construction of a new solution.
Standards in construction
Standards, whether external (created by international organizations) or internal (created at the corporate level), that directly affect construction issues include:
Communication methods: Such as standards for document formats and contents.
Programming languages
Coding standards
Platforms
Tools: Such as diagrammatic standards for notations like UML.
Managing construction
Construction model
Numerous models have been created to develop software, some of which emphasize construction more than others. Some models are more linear from the construction point of view, such as the Waterfall and staged-delivery life cycle models. These models treat construction as an activity which occurs only after significant prerequisite work has been completed—including |
https://en.wikipedia.org/wiki/Jenny%20Heathcote | Elizabeth Jane "Jenny" Heathcote was a professor of medicine at the University of Toronto and a gastroenterologist and scientist at University Health Network in Toronto specializing in liver disease. She retired in 2013.
After graduating from the Royal Free Hospital School of medicine in London in 1968, Heathcote trained with Dame Professor Sheila Sherlock on the transmission of Hepatitis B. She then trained at Stanford before moving from there to Toronto in 1979, where she developed an internationally recognized liver clinical research unit, housed at University Health Network. Her contributions to hepatology include seminal work on the natural history of autoimmune hepatitis, variant and overlap syndromes of autoimmune hepatitis, treatment of primary biliary cirrhosis and treatment of viral hepatitis. Her scientific contributions to liver disease have been recognized with numerous awards, most notably by the American Association for the Study of Liver Diseases who awarded her the Distinguished Achievement Award in 2005, and by the University Health Network who awarded her the UHN Global Impact Award in 2015.
Publications
References
External links
Biography, The International Liver Congress 2016
Academic staff of the University of Toronto Faculty of Medicine
Canadian gastroenterologists
Living people
Year of birth missing (living people)
Academic staff of the University of Toronto |
https://en.wikipedia.org/wiki/Samsung%20Focus%20S | The Samsung Focus S is a slate smartphone that runs Microsoft's Windows Phone 7.5 (code-named "Mango") operating system. It is the successor to the Samsung Focus, and was released on November 6, 2011, in the United States. Currently, the Focus S is available exclusively through AT&T.
Hardware and Display
The display is a 4.3-inch, WVGA (480 x 800 pixel) display. Unlike some former models, it uses a standard RGB layout instead of PenTile. The display has a high viewing angle. Below the display are three capacitive buttons for back, Start, and search, as seen on most Windows Phones. Above it is the earpiece, light sensors, and afront-facing camera. The sides of the phone are home to a dual-stage camera key, power/sleep/unlock key (right side), and volume rocker (left side).
The Samsung Focus S is powered by a 1.4 GHz Qualcomm processor.
Software
The device ships with Windows Phone 7.5 and can be upgraded to Windows Phone Tango (build 8773).
Languages
Unlike its Android counterpart, the Samsung Galaxy S II, the Focus S supports more languages out of the box.
Czech
Danish
German (Germany)
German (Austria)
German (Switzerland)
English (Australia)
English (Ireland)
English (New Zealand)
English (South Africa)
English (United Kingdom)
English (United States)
Spanish (Spain)
Spanish (United States)
French (France)
French (Switzerland)
Italian
Hungarian
Dutch (Belgium)
Dutch (Netherlands)
Norwegian Bokmål
Polish
Portuguese (Brazil)
Portuguese (Portugal)
Finnish
Swedish
Greek
Russian
Korean
Chinese (Simplified)
Chinese (Traditional)
Japanese
References
External links
Official Samsung Focus S homepage
Windows Phone devices
Samsung smartphones
Mobile phones introduced in 2011 |
https://en.wikipedia.org/wiki/Count%E2%80%93min%20sketch | In computing, the count–min sketch (CM sketch) is a probabilistic data structure that serves as a frequency table of events in a stream of data. It uses hash functions to map events to frequencies, but unlike a hash table uses only sub-linear space, at the expense of overcounting some events due to collisions. The count–min sketch was invented in 2003 by Graham Cormode and S. Muthu Muthukrishnan and described by them in a 2005 paper.
Count–min sketch is an alternative to count sketch and AMS sketch and can be considered an implementation of a counting Bloom filter (Fan et al., 1998) or multistage-filter. However, they are used differently and therefore sized differently: a count–min sketch typically has a sublinear number of cells, related to the desired approximation quality of the sketch, while a counting Bloom filter is more typically sized to match the number of elements in the set.
Data structure
The goal of the basic version of the count–min sketch is to consume a stream of events, one at a time, and count the frequency of the different types of events in the stream. At any time, the sketch can be queried for the frequency of a particular event type from a universe of event types , and will return an estimate of this frequency that is within a certain distance of the true frequency, with a certain probability.
The actual sketch data structure is a two-dimensional array of columns and rows. The parameters and are fixed when the sketch is created, and determine the time and space needs and the probability of error when the sketch is queried for a frequency or inner product. Associated with each of the rows is a separate hash function; the hash functions must be pairwise independent. The parameters and can be chosen by setting and , where the error in answering a query is within an additive factor of with probability (see below), and is Euler's number.
When a new event of type arrives we update as follows: for each row of the table, apply the corresponding hash function to obtain a column index . Then increment the value in row , column by one.
Several types of queries are possible on the stream.
The simplest is the point query, which asks for the count of an event type . The estimated count is given by the least value in the table for , namely , where is the table.
Obviously, for each , one has , where is the true frequency with which occurred in the stream.
Additionally, this estimate has the guarantee that with probability , where is the stream size, i.e. the total number of items seen by the sketch.
An inner product query asks for the inner product between the histograms represented by two count–min sketches, and .
Small modifications to the data structure can be used to sketch other different stream statistics.
Like the count sketch, the Count–min sketch is a linear sketch. That is, given two streams, constructing a sketch on each stream and summing the sketches yields the same result as concatenating th |
https://en.wikipedia.org/wiki/Michael%20Zimmer%20%28academic%29 | Michael Zimmer is a privacy and data ethics scholar. He currently is a professor in the Department of Computer Science at Marquette University and Director of the Center for Data, Ethics, and Society. Previously, he was on the faculty at the School of Information Studies at the University of Wisconsin–Milwaukee, and director of the Center for Information Policy Research. Zimmer is on the advisory board of the Future of Privacy Forum, and was on the executive committee of the Association of Internet Researchers from 2009-2016. He was the Microsoft Resident Fellow at the Information Society Project at Yale Law School from 2007-2008.
Zimmer has criticized the research ethics of a Harvard-sponsored research project that harvested the Facebook profiles of an entire cohort of undergraduate students. He has appeared on the National Public Radio shows Science Friday and Morning Edition. Zimmer appeared in the "Is My Cellphone Spying On Me?" commentary accompanying the DVD release of Eagle Eye
On October 25, 2013, Zimmer announced "The Zuckerberg Files", a digital archive of all the public utterances of Facebook's founder and CEO, Mark Zuckerberg. Zimmer published a critique of Zuckerberg in The Washington Post to commemorate Facebook's 10th anniversary. In 2021, Zimmer was named among experts advising Gizmodo regarding the release of The Facebook Papers
Selected publications
Internet Research Ethics for the Social Age: New Challenges, Cases, and Contexts, Peter Lang, 2017
References
External links
Personal homepage
Marquette University profile
“But the data is already public”: on the ethics of research in Facebook, Ethics and Information Technology, 2010
The Zuckerberg Files
Yale Information Society Project Fellows |
https://en.wikipedia.org/wiki/List%20of%20Peter%20Gunn%20episodes | Peter Gunn is an American private eye television series which aired on the NBC and later ABC television networks from 1958 to 1961. The show's creator (and also writer and director on occasion) was Blake Edwards. It was also directed by Boris Sagal, Robert Gist, Jack Arnold, Lamont Johnson, Robert Altman (one episode only), and several others. A total of 114 thirty-minute episodes were produced by Spartan Productions. Season one was filmed at Universal Studios, seasons two and three were filmed at Metro-Goldwyn-Mayer. Philip H. Lathrop and William W. Spencer were cinematographers on many episodes. Craig Stevens' wardrobe was tailored by Don Richards and Lola Albright's fashions by Emeson and by Jax.
Series overview
Peter Gunn ran for three seasons starting in late 1958. A total of 114 episodes were produced during the three-season run.
Episodes
Season 1 (1958–59)
Peter Gunn premiered on September 22, 1958, with the episode "The Kill". The first season ran from September 1958 through June 1959, and contained 38 episodes.
Season 2 (1959–60)
The second season premiered on September 21, 1959, with the episode "Protection". It ran from September 1959 through June 1960, and, like the first season, contained 38 episodes.
Season 3 (1960–61)
The third and final season premiered on October 3, 1960, with the episode "The Passenger". It ran from October 1960 through September 1961, and consisted of 38 episodes.
References
External links
Peter Gunn |
https://en.wikipedia.org/wiki/Dance%20Moms%20%28season%202%29 | The second season of Dance Moms, an American dance reality television created by Collins Avenue Productions, began airing on January 10, 2012 on Lifetime's television network. The season concluded on September 25, 2012. A total of 28 official episodes and 2 special episodes (Abby's Most OMG Moments, Abby's Dance-A-Thon) aired this season.
Overview
The second season continues after the release of Chloe's music video. The dancers of the Abby Lee Dance Company, and their mothers return for another season of dance competitions. In this season, new dance moms and dancers are introduced into both the Abby Lee Dance Company and Candy Apples Dance Center.
Cast
The second season featured thirteen star billing cast members with various other dancers and moms appearing throughout the season.
Dancers
Maddie Ziegler
Mackenzie Ziegler
Chloe Lukasiak
Nia Frazier
Paige Hyland
Brooke Hyland
Kendall Vertes
Moms
Melissa Gisoni
Christi Lukasiak
Holly Hatcher-Frazier
Kelly Hyland
Jill Vertes
Guest dancers
Payton Ackerman
Nicaya Wiley
Nick Dobbs
Auriel Welty
Katherine Narasimhan
Nina Linhart
Vivi-Anne Stein (Candy Apples Team)
Justice McCort (Candy Apples Team)
Taylor O'Lear (Candy Apples Team)
Erika Schrade (Candy Apples Team)
Sarah Parish (Candy Apples Team)
Kerisa McCullough (Candy Apples Team)
Guest moms
Cathy Nesbitt-Stein (Candy Apples team)
Leslie Ackerman
Kaya Wiley
Cast duration
Notes
Key: = featured in this episode
Key: = not featured in this episode
Key: = joins the Abby Lee Dance Company
Key: = leaves the Abby Lee Dance Company
Key: = returns to the Abby Lee Dance Company
Key: = leaves the Candy Apples
Episodes
References
General references
2012 American television seasons |
https://en.wikipedia.org/wiki/Intellectum | Intellectum is a biannual academic journal that was established in 2006 by the non-profit Intellectum scientific society. It is a member of the Eurozine network. The hard-copy publication is in Greek, while the online edition is bilingual, with many articles and interviews translated in English. The editor-in-chief is Victor Tsilonis.
Interviews include the former chief prosecutor of International Criminal Tribunal for the former Yugoslavia, Carla Del Ponte, political scientist Ernesto Laclau, philosopher David S. Oderberg, forensic anthropologist Sue Black, Scottish writer Paul Johnston, poet Haris Vlavianos, professor of communication studies Richard Katula, professor of international criminal law and human rights William Schabas, writer Panos Theodorides, and journalist Stelios Kouloglou.
References
External links
Intellectum presentation on the 8th International Book Fair of Thessaloniki in May 2011
2006 establishments in Greece
Biannual magazines
Cultural magazines
Magazines published in Greece
Greek-language magazines
Magazines established in 2006 |
https://en.wikipedia.org/wiki/Mikko%20Hypp%C3%B6nen | Mikko Hermanni Hyppönen (; born 13 October 1969) is a Finnish computer security expert, speaker and author. He is known for the Hyppönen Law about IoT security, which states that whenever an appliance is described as being "smart", it is vulnerable. He works as the Chief Research Officer at WithSecure (former F-Secure for Business) and as the Principal Research Advisor at F-Secure.
Career
Mikko Hyppönen has worked at F-Secure in Finland since 1991.
Hyppönen has assisted law enforcement in the United States, Europe and Asia since the 1990s on cybercrime cases and advises governments on cyber crime. His team took down the Sobig.F botnet.
In 2004, Hyppönen cooperated with Vanity Fair on a feature, The Code Warrior, which examined his role in defeating the Blaster and Sobig Computer worms.
Hyppönen has given keynotes and presentations at a number of conferences around the world, including Black Hat, DEF CON, DLD, RSA, and V2 Security. In addition to data security events, Hyppönen has delivered talks at general-interest events, such as TED, TEDx, DLD, SXSW, Slush and Google Zeitgeist. He's also spoken at various military events, including AFCEA events and the NATO CCD COE's ICCC. Hyppönen is a reserve officer in the Finnish Army.
Hyppönen is a member of the advisory board of IMPACT (International Multilateral Partnership Against Cyber Threats) since 2007 together with Yevgeny Kaspersky, Hamadoun Touré, Fred Piper and John Thompson.
Hyppönen is a columnist for BetaNews and Wired. He has also written on his research for CNN, The New York Times and Scientific American.
In 2011, he was ranked 61st in Foreign Policys Top 100 Global Thinkers report.
Hyppönen coined the term "Cybercrime Unicorns" to describe cybercrime organizations that are worth over a billion US dollars - a reference to Startup unicorns
Computer security history
Hyppönen made international news in 2011 when he tracked down and visited the authors of the first PC virus in history, Brain. Hyppönen produced a documentary of the event. The documentary was published on YouTube.
Hyppönen has also been documenting the rise of mobile phone malware since the first smartphone viruses were found.
The blog "News from the Lab", started by Hyppönen in 2004 was the first blog from any antivirus company.
Hyppönen has been credited by Twitter for improving Twitter's security.
Hyppönen has been the Curator for the Malware Museum at The Internet Archive since 2016.
He published his first book in October 2021, and its English translation, If It's Smart, It's Vulnerable, was published in June 2022.
See also
Antivirus software
CARO
EICAR
IMPACT
References
External links
"Fighting viruses, defending the net" (TEDGlobal 2011)
"Three types of online attack" (TEDxBrussels 2011)
"How the NSA betrayed the world's trust — time to act" (TEDxBrussels 2013)
Cybercrime Unicorns lecture at University College London, April 2022
Hyppönen and Nyman (2017), The Internet of (Vulnerable) Thin |
https://en.wikipedia.org/wiki/Mandawaca%20language | Mandahuaca (Mandawaka) is an Arawakan language of Venezuela and formerly of Brazil. The number of speakers is not known; the most recent data was published in 1975. It is one of several languages which goes by the generic name Baré.
Kaufman (1994) classified it in a Warekena group of Western Nawiki Upper Amazonian, Aikhenvald (1999) in Central (Orinoco) Upper Amazonian.
References
Languages of Venezuela
Arawakan languages |
https://en.wikipedia.org/wiki/FUJITSU%20Cloud%20IaaS%20Trusted%20Public%20S5 | FUJITSU Cloud IaaS Trusted Public S5 is a Fujitsu cloud computing platform that aims to deliver standardized enterprise-class public cloud services globally.
It offers Infrastructure-as-a-Service (IaaS) from Fujitsu's data centres to provide computing resources that can be employed on-demand and suited to customers' needs.
In Japan, the service was offered as the On-Demand Virtual System Service (OViSS) and was then launched globally as Fujitsu Global Cloud Platform/S5 (FGCP/S5). Since July 2013 the service has been called IaaS Trusted Public S5. Globally, the service is operated from Fujitsu data cecentresocated in Australia, Singapore, the United States, the United Kingdom and Germany.
Fujitsu has also launched a Windows Global Cloud Platform
in partnership with Microsoft. This is a Platform-as-a-Service (PaaS) offering that was known as FGCP/A5 in Japan but has since been renamed FUJITSU Cloud PaaS A5 for Windows Azure. It is operated from a Fujitsu data center in Japan. It offers a set of application development frameworks, such as Microsoft .NET, Java and PHP, and data storage capabilities consistent with the Windows Azure platform provided by Microsoft. The basic service consists of compute, storage, Microsoft SQL Azure, and Windows Azure AppFabric technologies such as Service Bus and Access Control Service, with options for interoperating services covering implementation and migration of applications, system building, systems operation, and support.
In 2015, Fujitsu launched its next generant-generation ice K5 which was deployed globally.
In October 2018, Fujitsu announced that it was discontinuing K5 in all regions except Japan. On October 16, 2018, the company stated that it will hire 10,000 employees and train them to use Microsoft Azure in order to "address what we see as an industry-wide shortage in cloud related skills, so that we can help clients address their execution gap in the provision of services which support operational efficiency, digital co-creation and multi-cloud management.”
History
Fujitsu launched its global cloud strategy in April 2010.
Provision of services from this platform was offered on a trial basis to 200 companies in Japan from the following month.
Fujitsu announced general availability of the IaaS service in Japan, under the name On-Demand Virtual System Service (OViSS), starting on 1 October 2010. As part of the service's global rollout, it was launched in Australia under the name Fujitsu Global Cloud Platform (FGCP) in February 2011.
This was followed by launches in March 2011 in Singapore and in May 2011 in the United Kingdom,
Germany
and the United States of America. In July 2012, Fujitsu added a center in western Japan to bring the total number to seven.
In July 2013 Fujitsu announced the FUJITSU Cloud Initiative globally which also announced the new name as FUJITSU Cloud IaaS Trusted Public S5.
In October 2018, Fujitsu announced that it was discontinuing K5 in all regions except Japan.
Featur |
https://en.wikipedia.org/wiki/Rashumon | Rashumon was a multilingual graphical word processor developed for the Amiga computer by an Israel-based company called HarmonySoft (founded by Michael Haephrati in 1989) and was sold until after the demise of Commodore in 1994 (a lower-priced "student" version was released in 1995). Rashumon had particular support for Hebrew, Arabic and Russian as well as English, and it could send its text to speech synthesis in English.
Rashumon was the only word processor for the Amiga having the ability to create and edit multilingual documents. Rashumon printed using Type 1 PostScript fonts and it also supported Intellifont.
Name
Rashumon was named after a Japanese movie which had four different characters giving different versions of the same event. Amiga User International commented that this name seemed appropriate for a wordprocessor designed to support multiple languages.
Notable features
Discontinuous selections: the user can select multiple parts of the text – even if these parts are separated from each other – and perform clipboard manipulations on them (e.g. selecting the first paragraph and the last paragraph of a document at the same time, and copying both of them to the clipboard).
A Table generator, allowing the creation and editing of tables.
Multiple key map support, up to 5 simultaneously, allowing for the use of multiple languages simultaneously.
Search and replace including color, style and font filters. For example, end users could search for the word "Apple" only in green (ignoring this word in other colors) and replace each occurrence with the word "Banana" in yellow.
Multilingual string gadgets (the Amiga equivalent to text boxes) for creating and renaming files, drawers, etc.
Import and export multilingual ASCII files to and from PC and Macintosh.
Fast screen updating and scrolling.
Interchange File Format (IFF) graphics support (import and export).
Direct access to 255 characters of each font, similar to inserting "symbols" or "special characters" in modern wordprocessors.
References
External links
Rashumon versions at Aminet.net
Rashumon's web site
Amiga software
Word processors |
https://en.wikipedia.org/wiki/Cellular%20evolutionary%20algorithm | A cellular evolutionary algorithm (cEA) is a kind of evolutionary algorithm (EA) in which individuals cannot mate arbitrarily, but every one interacts with its closer neighbors on which a basic EA is applied (selection, variation, replacement).
The cellular model simulates natural evolution from the point of view of
the individual, which encodes a tentative (optimization, learning, search) problem solution. The essential idea of this model is to provide the EA population
with a special structure defined as a connected graph, in which each vertex is an individual who communicates with his
nearest neighbors. Particularly, individuals are conceptually set in a toroidal
mesh, and are only allowed to recombine with close individuals. This leads us
to a kind of locality known as isolation by distance. The set of potential mates
of an individual is called its neighborhood. It is known that, in this kind
of algorithm, similar individuals tend to cluster creating niches, and these groups
operate as if they were separate sub-populations (islands). Anyway, there is no
clear borderline between adjacent groups, and close niches could be easily
colonized by competitive niches and maybe merge solution contents during the process. Simultaneously,
farther niches can be affected more slowly.
Introduction
A cellular evolutionary algorithm (cEA) usually evolves a structured bidimensional
grid of individuals, although other topologies are also possible. In this grid, clusters of similar individuals are naturally created during evolution, promoting exploration in their boundaries, while exploitation is mainly performed by direct competition and merging inside them.
The grid is usually 2D toroidal structure, although
the number of dimensions can be easily extended (to 3D) or reduced (to 1D, e.g. a ring).
The neighborhood of a particular point of the grid (where an individual is
placed) is defined in terms of the Manhattan distance from it to others in the population. Each point of the grid has a neighborhood that overlaps the neighborhoods of nearby individuals. In the basic algorithm, all the neighborhoods have the same size and identical shapes. The two
most commonly used neighborhoods are L5, also called
Von Neumann or NEWS (North, East, West and South), and C9, also known as Moore neighborhood. Here, L stands for Linear while C stands for Compact.
In cEAs, the individuals can only interact with their neighbors in the reproductive
cycle where the variation operators are applied. This reproductive
cycle is executed inside the neighborhood of each individual and, generally,
consists in selecting two parents among its neighbors according to a certain
criterion, applying the variation operators to them (recombination and mutation
for example), and replacing the considered individual by the recently
created offspring following a given criterion, for instance, replace if the offspring
represents a better solution than the considered individual.
Synchronous versus as |
https://en.wikipedia.org/wiki/NewsLibrary | NewsLibrary is an online news database operated by Newsbank that houses a conglomeration of news from over "4,000 outlets in the United States", most of which are "traditional" sources of news coverage, such as "newspapers and television stations". A total of 65 different newspapers are included in the article database. The database itself allows a user to input a search term and then narrow the listed search by date, region and newspaper, with the earliest possible articles to find being from the early 1980s. The site charges a fee for viewing the content, which is done on a pay-per-article scale, with each article costing $1.95. The cost of viewing articles is charged to the user accounts on a monthly basis, though there is the option to purchase 100 articles directly for $77.
Originally developed by Knight Ridder, It is described as a successor to the web archive VU/TEXT that was owned by Knight Ridder and shut down in 1996. NewsLibrary was purchased by Newsbank in 2001.
NewsLibrary differs from other news databases in that the site allows the user to input a date, region, and newspaper, but nothing in the search bar; this brings up all of the articles published within the narrowed selection string, rather than searching for the use of a term or phrase within an article.
Further reading
References
External links
Official website
Online archives of the United States
Knight Ridder |
https://en.wikipedia.org/wiki/Prince%20of%20Poets | Prince of Poets is a reality television poetry competition on the Emirati television network Abu Dhabi TV. It was created in April 2007 by the Abu Dhabi Authority for Culture and Heritage, and airs live from the Al Raha Beach theatre every week. The winner is awarded one million dirhams and a symbolic cloak and ring. Reflecting the pre-eminence of poetry in the Arab world, the programme's ratings overtook those of football and of other reality television programmes, with a studio audience of thousands and a television audience of millions. Its title comes from the epithet of Arabic-language epic poet Ahmed Shawqi.
Thousands of aspiring poets from all over the Arab world submit their poems, and several dozen are chosen to compete. In the competition, contestants read their poems, and are also asked to improvise poems on various subjects. A jury of established poets and critics judges and offers feedback on the entries, while the studio audience and viewers at home can also vote for their preferred poets. Despite the show's title, the contestants can be male or female. Prince of Poets Xtra, the programme's interview segment, airs after each episode.
Prince of Poets is similar to another Emirati poetry competition, Million's Poet; the latter promotes Nabati (Bedouin) poetry, while the former promotes classical Arabic poetry and is an attempt to revive it in modern society. Like Million's Poet, it has been compared to American Idol.
Notable contestants
Egyptian poet Hisham al Gakh was an audience favorite in the competition's fourth season after presenting a controversial poem, "The Visa," which criticized Arab leaders. He later missed an episode in order to participate in political protests in his home country, then wrote a poem about the revolution called "Tahrir Square." Favored to win the competition after reaching the finals through an audience vote, he came in second after Yemeni poet Abdul Aziz al Zera'i. His final poem, "The Last Message," also dealt with the democratic revolution.
Palestinian poet Tamim al-Barghouti competed in the first season. Although he finished the competition in fifth place, he became very popular among Palestinians, with media outlets of rival political parties Fatah and Hamas both urging followers to vote for him by text message. He was also popular in the broader Arab world, with excerpts from his poem reportedly being made into ringtones.
Other winners have been Syrian Hassan Baiti (third season), Mauritanian Sidi Mohamed Ould Bamba (second season), and Emirati Abdul Kareem Maatouk (first season).
Other individuals
The programme's presenters have included Dhafer L'Abidine, in the first series, and Eyad Nassar, in the second series. Xtra is presented by Raja el Shehi.
Musicians and established poets who have performed on the programme include Iman Bakri, Amal Maher, Majid Al Muhandis, Naseer Shamma, and Walid Toufic.
References
External links
Emirati reality television series
Arabic-language television sho |
https://en.wikipedia.org/wiki/National%20Council%20for%20Voluntary%20Youth%20Services | The National Council for Voluntary Youth Services (NCVYS) was a membership network of over 200 voluntary and community organisations, as well as local and regional networks, that work with and for young people across England. The organisation closed in 2016. For 80 years, NCVYS acted as an independent voice of the voluntary and community youth sector, working to inform and influence public policy, supporting members to improve the quality of their work, and also raising the profile of the voluntary and community sector's work with young people.
History
NCVYS was founded on 24 March 1936 by representatives of 11 of England's largest youth organisations (known then as 'juvenile organisations'). They met under the auspices of the 'National Council of Social Services', now known as the National Council for Voluntary Organisations (NCVO), of which NCVYS has remained a member. The representatives agreed to form a 'Standing Conference of Juvenile Organisations' (SCJO) to promote mutual cooperation and coordination between their organisations. The first meeting of the new committee was held on 26 May 1936.
The 11 organisations which contributed to the foundation of SCJO/NCVYS were The National Association of Boys' Clubs; Boys' Brigade; YMCA; YWCA; The Girls' Guildry; Church Lads' Brigade (now known as the Church Lads' and Church Girls' Brigade); The Girls' Friendly Society (now known as GFS Platform); Boy Scouts Association; Girl Guides Association; The National Council of Girls' Clubs; and the Girls Life Brigade. All remain as members, though some have changed their name or merged with other organisations.
Captain Stanley Smith of the Boys' Brigade was elected as the first chairman.
From 1939, membership was open to so-called 'National Juvenile Organisations' which had a membership of at least 10,000, which were non-political in nature, and which worked towards assisting youths' mental, moral or physical training for citizenship. These requirements remained until 1972, when it was decided that a membership of 10,000 was no longer necessary. The constitution was also changed at this time so that members were now classified as 'Community and Voluntary Youth Services', which included local government initiatives, or 'National Voluntary Youth Organisations', which included charities and foundations.
The SCJO was renamed several times, but remained consistent in its aims and values. In 1939 it became the 'Standing Conference for National Juvenile Organisations' (SCNJO); then in 1943 it became the 'Standing Conference of National Voluntary Organisations' (SCNVJO). It acquired its current name, NCVYS, in 1972.
By 1947, the total number of young people involved with its member organisations was nearly 2 million.
1970s
A new name, The National Council for Voluntary Youth Services (NCVYS) was proposed and adopted on 15 September 1972. A further review of the constitution was also adopted, which defined a new statement of aims: ‘to endeavour to meet the nee |
https://en.wikipedia.org/wiki/Slide%20rule%20%28disambiguation%29 | A slide rule is a mechanical analog computer.
Slide Rule may also refer to:
Slide Rule (album), a 1992 album by Jerry Douglas
Slide Rule (horse), thoroughbred racehorse
Slide Rule: Autobiography of an Engineer, a partial autobiography of the British novelist Nevil Shute |
https://en.wikipedia.org/wiki/Wooxie | Wooxie is a social networking website that opened in September 2009. Wooxie is based in Chicago, Illinois, and is operated by Jeff Knize. The website allows users the chance to provide their standard updates with 155 character updates, slightly longer than most other microblogging websites. This is a form of microblogging that enables users to connect people with similar interests.
Users who access the website can change how their content is displayed as well. The website offers users the chance to Go Micro that will limit their character maximum to 155, while they can choose to Go Macro and post up to 1,440 characters in their update.
Unlike other social websites, Wooxie prevents users from creating spam based accounts so far as possible. This is done through the restrictions in place on categories. Unlike other social networking websites, Wooxie does limit users on the number of categories that they can post in. This reduces the number of spam accounts that is in place on this website.
In addition to the social media that it provides, Wooxie is a tool for online business promotion and provides several tools to assist in this purpose. The social media website doubles as an article directory, permitting users to add full articles as well as blog posts to their account. This website offers users the chance to promote their content to help boost their Google AdSense content and to shorten affiliate links, without losing money. This is done with an AdSense feature that is available for the articles that users have the ability to place on the website. Users can also choose to add 10 keywords that will link back to their website to help with search engine optimization.
Site Features
Privacy and Security
Message on Wooxie are available to the public, however the content can be protected. Additionally, anonymous users are prohibited accessing certain information about your profile without first logging in to review the content.
Photo Services
Wooxie provides its own photo service. Users have the ability to upload their photo content to their updates and this will attach to their account. They will then have the chance to mark each photo as a business photo or one that is personal. These photos can then be restricted to certain individuals, helping to secure private photo content.
References
External links
American social networking websites
Internet properties established in 2009 |
https://en.wikipedia.org/wiki/Casos%20e%20Acasos | Casos e Acasos is a series of Brazilian TV Globo Network, written by Daniel Adjafre and Marcius Melhem, the general direction of Carlos Milan core of Marcos Schechtman (until the 15th episode) and Jayme Monjardim (from the 16th episode). First aired as a special year-end on December 26, 2007, the program went live April 3, 2008 and no longer appears in the following year.
Cast
Episode pilot
Humberto Martins - Lauro
Antônio Calloni - Ernesto
Taís Araújo - Gabriela
Ricardo Tozzi - Freitas
Érika Evantini - Michele
Thiago Fragoso - Felipe
Danton Mello - Adriano
Marcelo Valle - homem que se separa da mulher
Fábio Araújo - Robson
Bethito Tavares - Júnior
Alexandre Nero - Marcos
Paula Pereira - mulher que se separa do marido
Clarice Derzié Luz - vendedora de alianças
Participação especial
Francisco Cuoco - Feldman
1º episódio ("O Encontro, o Assédio e o Convite")
Marcos Palmeira - Renato
Graziella Moretto - Suzana
Hugo Carvana - Álvaro
Dira Paes - Gisele
Ingrid Guimarães - Camila
Marcelo Várzea - Luiz Eduardo
Fulvio Stefanini - Dr. Teixeira
Danton Mello - Gustavo
Fábio Nassar - Sérgio
Aílton Graça - Denis
Isabel Guéron - Tatiana
Xuxa Lopes - Esposa de Teixeira
Thatiana Pagung - Gracinha
Clemente Viscaíno - Chefe de Suzana
Augusto Madeira - Guto
Cláudio Mendes - Cláudio
Daniel Warren - Pereira
2º episódio ("O colar, o cachorro e o DVD")
Maurício Mattar - Diego
Tania Khalill - Fabiana
Cristiana Oliveira - Simone
Fábio Araujo - Alexandre
Christiana Kalache - Helena
Francisco Cuoco - Dr. Edgar
Betty Gofman - Daniela
Clarice Derzié Luz - Carla
Ernesto Piccolo - Milton
3º episódio ("O flagra, a demissão e a adoção")
Beth Goulart - Sandra
Ernani Moraes - Leandro
Marcelo Novaes - Paulo
Guilhermina Guinle - Luiza
Paulo Vilhena - Wilson
Roberta Rodrigues - Emília
Carla Regina - Carol
Marcos Frota - Evandro
Marcelo Valle - Tomás
Henri Pagnoncelli - Orlando
Edwin Luisi - Dr. Aristides
Kacau Gomes - Márcia
Marcelo Capobianco - Zé
Wendell Bendelack - Ismael
Anja Bittencourt - Celí
Phil Miler - Ronaldo
4º episode ("O triângulo, a tia Raquel e o pedido")
Giovanna Antonelli - Jamile
Ricardo Tozzi - Rodrigo
Giselle Itié - Manuela
Luigi Baricelli - Edgar
Bia Seidl - Cristiana
José Rubens Chachá - Vitor
Luciana Braga - Denise
Cláudio Mendes - Haroldo
Malu Valle - Eliane
Fernanda de Freitas - Joana
Sérgio Marone - Pedro
Antônio Pitanga - Médico
Neuza Borges - Empregada de Denise
Janaína Barbosa - Empresária
Renan Ribeiro - Mateus
Luisa Perissé - Nina
João Vítor Silva - Lucas
5º episódio ("O ex, a promoção e o vizinho")
Henri Castelli - Marcelo
Gabriela Duarte - Carol
Eriberto Leão - Henrique
Bruno Garcia - Carlos
Mel Lisboa - Júlia
Fúlvio Stefanini - Dr. Fontenelle
Cláudia Provedel - Amanda
Tato Gabus Mendes - Saulo
João Miguel - Teles
Priscila Sztejnman - Mônica
6º episódio ("O desejo escondido, o cara reprimido e o livro roubado")
Cissa Guimarães - Beth
Kayky Brito - Tiago |
https://en.wikipedia.org/wiki/A%20Indomada | A Indomada (English: The Untamed) is a Brazilian telenovela produced and aired by a Brazilian free-to-air television network called Rede Globo. It ran from February 17 to October 11, 1997. It was written by Aguinaldo Silva and Ricardo Linares, with the collaboration of Maria Elisa Berredo, Mark Silver and Nadotti Nelson; directed by Marcos Paulo Roberto Naar and Luiz Henrique Reis; and general direction and core by Marcos Paulo.
Synopsis
Greenville is a fictional town on the northeastern coast of Brazil. It is built in the image of old England due to the influence of the British who, a long time before, had built the Great Western Railway. The Greenvillenses (Greenville citizens) strictly adhere to the British traditions.
Producers of sugar and molasses made this region a very wealthy place for decades; Among them is the Monguaba Factory, owned by the richest and most traditional family in Greenville, the Mendonça e Albuquerque.
Eulalia, the heiress of Monguaba, falls for the cane cutter Zé Leandro. Eulalia's older brother, Pedro Afonso, suspects Zé Leandro and forbids their relationship, going as far as threatening him. Eulalia helps Zé Leandro escape and he vows to return one day to bring her with him. Months later, Eulalia gives birth to a daughter, Lucia Helena (known only as Helena), whom she teaches to wait for her father.
Fifteen years later, a stranger named Teobaldo Faruk, arrives in town and is enamored with Eulalia; however, she is still waiting for Zé Leandro. Maria Altiva, Pedro Afonso's wife, humiliates Teobaldo, saying that a stranger without a penny is not worth approaching a Mendonça e Albuquerque. Teobaldo vows revenge and discovers that Pedro Afonso, a gambling addict, owes money to several people to whom he signed promissory notes.
One day, Zé Leandro returns, ready to flee with Eulalia and Helena and start a new life with them with the fortune he accrued from mining. After arranging the flight, he teaches Helena the value of land. However, the fleeing boat sinks and Zé Leandro drowns on the spot. Eulalia also dies, asking Helena to trust Theobaldo, who had become rich.
Altiva convinces Pedro Afonso that his sister hated him and betrayed him for fifteen years. Hurt, her husband refuses to hold Eulalia's wake in his home. Theobalds finds out and decides to take action: he buys all of Pedro Afonso's notes and becomes his sole creditor and therefore owner of all his possessions. Knowing that Pedro Afonso would be unable to pay the debt with money, he requires a different type of payment: the funeral will be at the mansion of the Mendonça e Albuquerque, and Helena will marry him in the future. In return, Pedro Afonso and his family can continue to live in the mansion and receive an allowance from Theobaldo to support themselves.
Pedro Afonso lets Helena decide, and the girl agrees to marry Theobaldo. They collaborate to send her to London to finish her studies, and only then should she return to marry the stranger. Theobald |
https://en.wikipedia.org/wiki/A%20Monster%20in%20Paris | A Monster in Paris () is a 2011 French 3D computer-animated musical comedy science fantasy adventure film directed by Bibo Bergeron, and based on a story he wrote. It was produced by Luc Besson, written by Bergeron and Stéphane Kazandjian, and distributed by EuropaCorp Distribution, and features the voices of Sean Lennon, Vanessa Paradis, Adam Goldberg, Danny Huston, Madeline Zima, Matthew Géczy, Jay Harrington, Catherine O'Hara, and Bob Balaban. Many plot elements are drawn from Gaston Leroux's novel The Phantom of the Opera. It was released on 12 October 2011. It was also produced by Bibo Films, France 3 Cinéma, Walking The Dog, uFilm, uFund, Canal+, France Télévisions, CinéCinéma, Le Tax Shelter du Gouvernement Fédéral de Belgique and Umedia. Its music was composed by Matthieu Chedid, Sean Lennon and Patrice Renson.
Plot
In 1910 Paris, in the midst of the Great Flood, shy projectionist Emile Petit travels with his friend Raoul to the Botanical Gardens to make a delivery. In the absence of the Professor who works there, the place is guarded by a proboscis monkey named Charles. Raoul experiments with two potions, one named "Atomize-a-Tune" (which gives operatic singing voices to whoever it's used on) and the other "Super Fertilizer" (which causes plants to temporarily grow to enormous sizes). An explosion occurs after the two chemicals mix, and Emile glimpses a monstrous creature which escapes the laboratory and appears to terrorise the citygoers.
Meanwhile, Lucille, a cabaret singer at the club L'Oiseau Rare and Raoul's childhood friend, is pushed by her aunt Carlotta to marry wealthy Police Commissioner Victor Maynott. After numerous sightings of the creature, Maynott fronts an investigation launched by his second-in-command, Pâté. One night, Lucille encounters the creature and is at first terrified, but discovers it is actually an enlarged flea - launched from Charles' fur - with a euphonious singing voice. Lucille dubs the creature "Francœur" and lets him live in her dressing room.
Maynott learns of Emile and Raoul's involvement in the laboratory explosion, but disregards it and awards them the Medal of Honor. They both get seats at Lucille's next show, where she and a disguised Francœur sing as a duet. After the show, Lucille accidentally reveals the identity of Francœur to Emile and Raoul, who attend a conference the next day where Maynott announces that he plans to find and kill the monster. After Francœur is nearly revealed when Albert - a waiter at the L'Oiseau Rare - tips the commissioner off to the flea's location, Lucille plans to have Francœur feign his death in a ceremony the following day.
The plan goes awry, and Maynott chases Francœur and his friends through the streets of Paris. The chase culminates in a battle at the Eiffel Tower; a gunshot from Maynott and Francœur's sudden disappearance lead everyone to believe that Francœur has been killed. Maynott is placed under arrest by Pâté on the basis that Francœur is inno |
https://en.wikipedia.org/wiki/Classification%20System%20for%20Serial%20Criminal%20Patterns | The Classification System for Serial Criminal Patterns (CSSCP) is an artificial intelligence computer system that assists law enforcement officials in identifying links between serial crimes. Working in conjunction with a neural network called a Kohonen network, CSSCP finds patterns in law enforcement databases by analyzing the characteristics of an offender, the criminal activities that have occurred, and the objects used in a crime. Once the links between crimes have been identified by CSSCP, law enforcement officials can then use the data that is produced to build leads or solve criminal cases. Through its capability to run autonomously, the CSSCP has proven that it can operate non-stop without any human interaction and can achieve results with much more accuracy and efficiency than a human.
Background
The Classification System for Serial Criminal Patterns was started by Professor Thomas Muscarello and Professor Kamal Dahbur at DePaul University in Chicago, Illinois in 1996 with the help of a Chicago Police Detective. Muscarello and Dahbur recognized the need for their hybrid system as a result of recognized deficiencies in police practices. These deficiencies were said to be a result of the police's difficulties in analyzing data and transforming it into information that could be useful in the investigation of crimes. In addition to assisting law enforcement officials interpret data, the CSSCP was also designed to help investigators determine which criminal data was critical to an investigation and which format it should be stored in.
Although a similar project was previously undertaken by Timothy O'Shea, Muscarello and Dahbur noticed that problems existed with this proposed system because it relied on limited pre-processing and complex algorithms that lead to computational problems.
The objective of Professor Muscarello and Professor Dahbur was to create an "automated methodology that can systematically identify groups of records as potential patterns for serial criminals, with a good degree of accuracy".
System Design
The CSSCP program was designed to work in three separate phases in conjunction with a Kohonen network.
The three phases of CSSCP include:
Pre-processing phase
Neural network phase
Heuristics system phase
Pre-Processing Phase
The Pre-Processing Phase of CSSCP is considered to be the most important phase of the system because it is the phase in which data is structured and put in a format that can be used by the neural network. This phase is where CSSCP will analyze the records it's provided, detect patterns among the data, and assign the data values according to the algorithm chosen. The pre-processing phase relies heavily on accurate and complete input data in order for the output data (results) to also be accurate and complete.
Within the pre-processing phase of CSSCP there are four major functions that take place in order to ensure that input data is processed correctly for the next phases. The four functions i |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.