source stringlengths 32 199 | text stringlengths 26 3k |
|---|---|
https://en.wikipedia.org/wiki/Fuse%20Washington | Fuse Washington is a progressive advocacy organization in Washington state. It is a member of the ProgressNow network. Fuse, a 501(c)(4) organization, along with its sister organization the Fuse Innovation Fund, a 501(c)(3) organization, claims to be the state's largest progressive organization because of its email list of more than 100,000 people.
History and mission
Fuse was launched in 2007 by executive director Aaron Ostrom. Since then, the organization has grown to a staff of 14 with a ten-member board of directors.
Like other ProgressNow organizations, Fuse uses e-mail campaigns and grassroots organizing to inform its subscribers about local politics and lobby elected officials. Fuse focuses primarily on campaigns involving climate change, racial justice, tax reform, political accountability, and workers rights.
Voters guide
Washington
Fuse started their Progressive Voters Guide in 2008 as an online elections guide to races and initiatives in Washington state. The guide includes the endorsements and voting recommendations of many progressive organizations. Fuse's current partners include Washington Conservation Voters, Planned Parenthood Alliance Advocates, the Washington State Labor Council, The Stranger, UFCW Local 3000, and Unite Here.
National expansion
Fuse worked with Progress Virginia to expand their guide to Virginia for the 2019 elections. ProgressNow Colorado used Fuse's site to create a guide in 2020, along with California, Michigan, Pennsylvania, Virginia, and Wisconsin. In 2022, Fuse added an eighth state, Arizona, to their voters guide website.
Electoral edvocacy
2022 elections
Fuse Washington and its affiliated federal Super PAC, Together for Progress, and state PAC, Fuse Votes, combined spent more than $1.5 million in the 2022 election. More than half of that spending was focused on the race in Washington's 3rd Congressional District and another 30% was focused on Washington's 8th Congressional District. Fuse ran ads in which they described Republicans Joe Kent and Matt Larkin as extreme and opposed to abortion. Fuse's work in the 3rd district received more attention after Democrat Marie Gluesenkamp Perez won her election by less than 1 percent. This was considered a significant upset in a district that had "relative absence of spending from national Democrats."
2018 elections
Fuse attended a fundraiser for Cathy McMorris Rodgers and recorded comments by Republican Representative Devin Nunes that received widespread attention after being aired on The Rachel Maddow Show. In his remarks, Nunes said that Republican leaders in the U.S. House had delayed impeaching then Deputy Attorney General Rod Rosenstein because it would have delayed the Senate's confirmation of Judge Brett Kavanaugh to the U.S. Supreme Court. Nunes also said that a Republican majority in Congress was necessary to protect President Donald Trump from investigations.
2012 elections
1st Congressional District
Less than a week before Election Day, Fus |
https://en.wikipedia.org/wiki/The%20Varnett%20Public%20School | The Varnett Public School is a state charter school network headquartered in the Varnett School Southwest Campus in Houston, Texas. The system has four campuses with more than 1,600 students. The school was founded as a private school in 1984 and became a public charter school in 1998.
In 2015 Ericka Mellon of the Houston Chronicle wrote that the school system "was a standout among schools serving mostly poor, minority children." That year the founders of the school were indicted by federal prosecutors, accused of embezzling $2.6 million of school funds. They pleaded guilty, and sentenced to prison in 2018.
History
The Varnett School opened in 1984. Dr. Marian Annette Cluff and her husband, Alsie Cluff Jr., started the school, then a private school, so they could give their son, then in preschool, a better education. Annette Cluff served as the owner of the school system.
In the 1990s, after voters rejected a Houston Independent School District $390 million bond package, superintendent Rod Paige contracted with Varnett, River Oaks Academy, and Wonderland School to house 250 students who could not be placed in HISD schools. The schools were paid $3,565 per student. This was 10% lower than the district's own per pupil cost. In 1998 Varnett received its open enrollment charter from the state, and it converted into a public state charter school.
In 2004 The Varnett School appointed Ronique Bastine-Robinson, a municipal judge of Stafford, Texas, to its board of directors.
In 2007 Harold Dutton, a member of the Texas House of Representatives, sponsored a resolution that honored Annette Cluff for winning the service award Audrey Lawson Impact Award.
In 2009 Varnett had three campuses with over 1,400 students in grades pre-Kindergarten through 5. In 2010 Varnett the three campuses had 1,700 students. During that year 300 or 400 children were on a waiting list. In 2010 the East Campus won the National Blue Ribbon Award.
At one time Annette Cluff won the Pinnacle Award, an award from the Houston Citizens Chamber of Commerce which honors African American entrepreneurs.
In 2012 1,730 students attended Varnett schools. That year a spokesperson of the Texas Education Agency (TEA) stated that the agency was investigating issues at the Varnett School system and in the Rhodes charter school system. Since March 2012, during a review of issues not specified, the TEA withheld the accreditation of the Varnett school system. In August 2013 the TEA released a report stating that the school system conducted business out of the view of the public, had conflicts of interest, and spent millions of dollars in manners it considered questionable. The school responded through an attorney, Rusty Hardin, stating that it did no wrongdoing.
In August 2014 the Cluff family resigned from positions related to the operations of the school. On Thursday July 16, 2015 federal prosecutors announced a 19-count indictment against Marian Annette Cluff and Alsie Cluff Jr. It accused |
https://en.wikipedia.org/wiki/Fowlkes%E2%80%93Mallows%20index | The Fowlkes–Mallows index is an external evaluation method that is used to determine the similarity between two clusterings (clusters obtained after a clustering algorithm), and also a metric to measure confusion matrices. This measure of similarity could be either between two hierarchical clusterings or a clustering and a benchmark classification. A higher value for the Fowlkes–Mallows index indicates a greater similarity between the clusters and the benchmark classifications. It was invented by Bell Labs statisticians Edward Fowlkes and Collin Mallows in 1983.
Preliminaries
The Fowlkes–Mallows index, when results of two clustering algorithms are used to evaluate the results, is defined as
where is the number of true positives, is the number of false positives, and is the number of false negatives. is the true positive rate, also called sensitivity or recall, and is the positive predictive rate, also known as precision.
The minimum possible value of the Fowlkes–Mallows index is 0, which corresponds to the worst binary classification possible, where all the elements have been misclassified. And the maximum possible value of the Fowlkes–Mallows index is 1, which corresponds to the best binary classification possible, where all the elements have been perfectly classified.
Definition
Consider two hierarchical clusterings of objects labeled and . The trees and can be cut to produce clusters for each tree (by either selecting clusters at a particular height of the tree or setting different strength of the hierarchical clustering). For each value of , the following table can then be created
where is of objects common between the th cluster of and th cluster of . The Fowlkes–Mallows index for the specific value of is then defined as
where
can then be calculated for every value of and the similarity between the two clusterings can be shown by plotting versus . For each we have .
Fowlkes–Mallows index can also be defined based on the number of points that are common or uncommon in the two hierarchical clusterings. If we define
as the number of pairs of points that are present in the same cluster in both and .
as the number of pairs of points that are present in the same cluster in but not in .
as the number of pairs of points that are present in the same cluster in but not in .
as the number of pairs of points that are in different clusters in both and .
It can be shown that the four counts have the following property
and that the Fowlkes–Mallows index for two clusterings can be defined as
where is the number of true positives, is the number of false positives, and is the number of false negatives.
is the true positive rate, also called sensitivity or recall, and is the positive predictive rate, also known as precision.
The Fowlkes–Mallows index is the geometric mean of precision and recall.
Discussion
Since the index is directly proportional to the number of true positives, a higher index means greater sim |
https://en.wikipedia.org/wiki/Mona%20Louise%20Parsons | Mona Louise Parsons (February 17, 1901 – November 28, 1976) was a Canadian actress, nurse, and member of an informal Dutch resistance network in the Netherlands from 1940 to 1941 during the Nazi occupation. She became the only Canadian female civilian to be imprisoned by the Nazis and one of the first and few women to be tried by a Nazi military tribunal in the Netherlands.
She received commendations for her bravery in helping Allied airmen evade capture from both Air Chief Marshal Lord Arthur Tedder of the Royal Air Force on behalf of the British people and from General Dwight Eisenhower, who expressed the gratitude of the American people.
Early years
Parsons was born in Middleton, Nova Scotia. Upon graduating from the Acadia Ladies' Seminary in Wolfville, Nova Scotia with a certificate in elocution, Parsons attended the Currie School of Expression in Boston. She returned to Wolfville to attend Acadia University for a time, where she acted in several productions. After leaving Acadia, Parsons briefly taught elocution at Conway Central College in Conway, Arkansas. She studied acting and moved to New York City in 1929, where she became a Ziegfeld chorus girl in the Ziegfeld Follies revues. She later became a nurse after attending the Jersey School of Medicine from which she graduated cum laude in 1935. She was employed in the Park Avenue offices of an expatriate Nova Scotia otolaryngologist. In February 1937, Parsons' brother introduced her to millionaire Dutch businessman Willem Leonhardt. The couple married in Laren, Netherlands on September 1, 1937.
Second World War
Upon the invasion of the Netherlands by the Germans in May 1940, Parsons joined a network of resistance composed of people from diverse walks of life: farmers, teachers, businesspeople. Like the famous Corrie ten Boom, Parsons sheltered downed Allied airmen in her home, "Ingleside", near Laren. At the beginning of the German occupation, Parsons dismissed her servants so that their quarters on the top floor of Ingleside could be used to accommodate Allied airmen. A hiding place, behind the closet in the master bedroom, was available as a temporary emergency shelter for the airmen if her home was searched by the Nazis. Once the pilots left Parsons' home, they were transported to Leiden, where fishing boats took them to rendezvous with British submarines for their return to England. The number of Allied pilots she saved is unknown. The last airmen to hide at Ingleside remained for an unprecedented six days in September 1941. The network had been infiltrated, and contacts were unable to move the airmen as previously planned. Flight Engineer William 'Jock' Moir and Navigator Richard Pape were finally moved to Leiden, where they were caught by the Gestapo.
Based on information available at the Dutch Institute for War Documentation, Mona Parsons' biographer Andria Hill learned that she was arrested by the Gestapo at her home on September 29, 1941. She was taken first to Amstelveense P |
https://en.wikipedia.org/wiki/The%20Electronic%20Font%20Foundry | The Electronic Font Foundry (EFF) was a business engaged in the design and sale of computer fonts. It was established in 1984 by Polish physicist Dr Edward Detyna, and produced fonts in PostScript, TrueType and formats. It produced fonts in more than 60 languages.
EFF produced high quality RISC OS versions of many popular fonts and typefaces, as well as a large collection of exclusive designs.
EFF fonts were the first (besides those produced by ) to contain kerning data. Dr Detyna was instumental in the inclusion of several advanced typographical features into later versions of . He designed the MetaFont, used internally by Acorn, EFF and other font foundries to generate fonts for less common Latin and Cyrillic character sets.
The company's public domain CD-ROM, released in 1997, includes conversions of public domain fonts to the format. It also includes a cataloguing tool.
References
External links
1997 Public Domain RISC OS CD image
Commercial type foundries
Software companies of the United Kingdom
Companies based in Ascot, Berkshire
Software companies established in 1984
1984 establishments in England
RISC OS |
https://en.wikipedia.org/wiki/The%20Right%20Hand%20%28TV%20series%29 | The Right Hand is a Canadian reality TV series that aired on The Movie Network and Movie Central. It follows Brandon MacIntosh, a film school graduate (Sheridan College) from Ayr, Ontario, hired as production assistant for Porno Dan, the owner of Immoral Productions, an upstart adult entertainment company, operating out of Southern California and attending awards shows in Las Vegas. The second season follows Porno Dan working without Brandon, having quit in the second episode just because Brandon's friend Tyler Shazma was included by Dan in a porn production, yet Brandon claimed the friend didn't appear comfortable even though the friend didn't complain and actually seemed intrigued in his role. Dan even claims that Brandon's departure was "long over due" because "Brandon's words said he wanted to be here, but his actions didn't". Brandon appears in the opening title cards in the rest of the season's episodes. Dan's replacement assistant is Chris, although unknown where Chris came from.
Appearances of notable adult entertainment performers
First season
Brandy Aniston
Aiden Ashley
Sindee Jennings
Shawna Lenee
Molly Rae
Victoria White
Second season
Molly Bennett
Martina "Tarra White" Mrakviova
Rikki Sixx
Britney Amber
Nikki Hunter
Ashli Orion
Siri
References
External links
The Right Hand at telebisyon.net
2011 Canadian television series debuts
2010s Canadian reality television series
2012 Canadian television series endings |
https://en.wikipedia.org/wiki/Prep%20%26%20Landing%3A%20Naughty%20vs.%20Nice | Prep & Landing: Naughty vs. Nice is a 2011 computer-animated 3-D television special, produced by Walt Disney Animation Studios, and directed by Kevin Deters and Stevie Wermers-Skelton. It aired on December 5, 2011, on the ABC TV channel. The special is the second and final half-hour Christmas special, and the fourth and final short film in the Prep & Landing series, after Prep & Landing, Tiny's BIG Adventure, and Operation: Secret Santa.
Plot
The beginning of the special introduces the Coal Elf Brigade, a special unit of Christmas elves responsible for delivering lumps of coal to naughty children. While seeming cruel to some, the brigade adds small, encouraging notes in an attempt to steer the children back to the nice list.
With Christmas Day approaching, Wayne and Lanny race to recover classified North Pole technology that has fallen into the hands of a hacker identified only as "jinglesmell1337". Desperate to prevent Christmas from descending into chaos, Wayne seeks out his brother Noel, an expert in naughty children and member of the Coal Elf Brigade. Reluctant to take Noel along with him, Wayne relents, and Noel joins the Prep & Landing team on the mission. During the trip, Noel and Wayne reminisce about their childhood, when they worked together far better than they do now. As the trio arrives at the hacker's house, Wayne sets off a booby trap, imperiling the entire team; Noel manages to defend himself, Wayne takes a particular beating from the trap's various mechanisms, and Lanny makes it into the hacker's room, only to be captured.
The hacker then reveals herself to be Grace Goodwin, whose sole mission is to get herself off the naughty list, believing that she had been set up by her toddler brother, Gabriel, who had destroyed her favorite toy and ruined her chances to ask Santa for a new one by his crying. After Lanny suggests using the "magic word" to get the password for the device that will get her off the list, she does just that: using the word "please" as the password, since genuinely naughty kids never say "please". At first, she appears successful in changing her status from naughty to nice, but the device malfunctions, threatening to place the entire planet on the naughty list unless she and the team can pull off a risky operation to fix the problem.
Meanwhile, Wayne is particularly bitter at being "shown up" by his younger brother, prompting a fight in the street in front of Grace's house. Noel throws what he had intended to give Wayne as a Christmas present at him. The gift—a toy sled that Wayne had wanted as a kid but was never able to get—prompts Wayne to reconcile with Noel and carry out the mission. Grace, watching the whole argument as it unfolds, learns a powerful lesson and a newfound appreciation for her younger brother.
Wayne then receives a call from Magee who tells him that the device is causing bigger problems by transferring every child to the naughty list. Wayne tells them that the antenna on Conduct Calcula |
https://en.wikipedia.org/wiki/Paradata%20%28learning%20resource%20analytics%29 | As a general definition, paradata are usage data about learning resources that include not just quantitative metrics (e.g., how many times a piece of content was accessed), but also pedagogic context, as inferred through the actions of educators and learners. Paradata may be operationalized as a specific type of metadata, however the construct differs from traditional descriptive metadata that classify the properties of the learning resource itself, and instead involves the capture—and open resharing—of in situ information about online users’ actions related to the resource. Learning resource paradata is generated through user processes of searching for content, identifying interest for subsequent use, correlating resources to specific learning goals or standards, and integrating content into educational practices. Paradata may include individual or aggregate user interactions such as viewing, downloading, sharing to other users, favoriting, and embedding reusable content into derivative works, as well as contextualizing activities such as aligning content to educational standards, adding tags, and incorporating resources into curriculum. Context about users is also of interest as paradata, including grade level or subject taught, experience level, or geographic location—as is information about the curricular relevance, audience, methodologies, and instructional settings of use as a resource is adopted by practitioners. Paradata are generally anonymized and/or aggregated at the community level to protect the privacy of individual users as data are shared between learning communities. Paradata may be expressed in realtime data streaming as user actions occur, or as periodic reporting of user activities over a range of time.
Related concepts include Contextualized Attention Metadata, activity streams, tagging and other social metadata, and user annotations.
History
In 2010, the term paradata was adopted by the National Science Digital Library (NSDL) to reference data about user interactions with digital learning objects within the NSDL’s STEM Exchange initiative. The construct has since been adopted by other organizations engaged in digital library and digital learning resource projects including the Learning Registry initiative spearheaded by the Office of Educational Technology at the U.S. Department of Education and the Advanced Distributed Learning Initiative at the Department of Defense.
Technical Frameworks for Sharing Learning Resource Paradata
In February 2011, NSDL released an open source XML paradata framework versioned as NSDL comm_para1.0, the structure of which parallels similar schemas for metadata so that it can interoperate with Dublin Core based schemas including nsdl-dc.
In October, 2011 the Learning Registry development team released its Paradata Specification V1.0 [ that details the schemata of JSON objects for representing learning resource paradata. In 2016 the US Dept of Ed and others published a spec for various compan |
https://en.wikipedia.org/wiki/Gephi | Gephi ( ) is an open-source network analysis and visualization software package written in Java on the NetBeans platform.
History
Initially developed by students of the University of Technology of Compiègne (UTC) in France, Gephi has been selected for the Google Summer of Code in 2009, 2010, 2011, 2012, and 2013.
Its last version, 0.10.1 has been launched in 2023. Previous versions are 0.6.0 (2008), 0.7.0 (2010), 0.8.0 (2011), 0.8.1 (2012), 0.8.2 (2013), 0.9.0 (2015), 0.9.1 (2016) and 0.9.2 (2017).
The Gephi Consortium, created in 2010, is a French non-profit corporation which supports development of future releases of Gephi. Members include SciencesPo, Linkfluence, WebAtlas, and Quid. Gephi is also supported by a large community of users, structured on a discussion group and a forum and producing numerous blogposts, papers and tutorials.
In November 2022, a lightweight web version of Gephi, Gephi lite, was announced.
Applications
Gephi has been used in a number of research projects in academia, journalism and elsewhere, for instance in visualizing the global connectivity of New York Times content and examining Twitter network traffic during social unrest along with more traditional network analysis topics. Gephi is widely used within the digital humanities (in history, literature, political sciences, etc.), a community where many of its developers are involved.
Gephi inspired the LinkedIn InMaps and was used for the network visualizations for Truthy.
See also
Graph (discrete mathematics)
Graph drawing
Graph theory
Graph (data structure)
Social network analysis software
File formats
Dot language
GraphML
Graph Modelling Language
Related software
Cytoscape
Graph-tool
Graphviz
Tulip (software)
yEd
AllegroGraph
NetworkX
NodeXL
Pajek
NetMiner
References
External links
Gephi releases
Gephi wiki
2000 software
Network theory
Free application software
Graph drawing software
Free data visualization software |
https://en.wikipedia.org/wiki/Romonet | Romonet is a UK-based, privately held company, headquartered in London, UK, that provides cloud-based solutions and services to data centers and associated technology. Romonet solves energy, water, capacity and financial challenges in data centers. They claim Romonet makes the first software that accurately predicts total cost of ownership (TCO) and properly model energy flow. They began by creating a term called 'data center predictive modeling' (DCPM) that "rather than collecting real-time data, they predict data center configuration and architecture." Romonet Inc was launched in 2011 with the goal of bringing the product to the US market.
History
Romonet was founded in 2006 by Zahl Limbuwala and Liam Newcombe—initially to make software to analyze how much data centers cost to operate. Newcombe said, of IT cost, "The business is effectively prevented from managing operating costs or understanding the contribution to profitability." In 2009, they collaborated to release an open source engine with the British Computer Society’s Data Centre Specialist Group. Though the simulator was at an early stage, it was able to predict cost and power usage.
On 24 June 2011, Romonet opened two new offices in the United States, their headquarters in San Francisco and an office in the Empire State Building in New York.
2009 Partnered with British Computer Society and released a beta of a Cost and Energy simulator.
2009 June Romonet & C-Net to partner to provide training on the EU Code of Conduct for Data Centres.
2009 November Romonet board appoints Rick Skett, former Intel executive and 30-year veteran, as chairman of the board.
2010 November Romonet launches Romonet Software Suite – the first ever software to predict energy use and cost over the entire lifecycle of a data center.
2010 November Computer Weekly featured a review of Romonet Software Suite.
2011 February Arup uses the Romonet Software Suite to provide visibility into their data center.
2011 February Romonet announced Syska Hennessy Group and Skanska USA as official channel partners.
2011 May Zahl Limbuwala gives keynote speech at Google Data Center Efficiency event in Zurich.
2011 June Launch of Romonet Inc. in the United States.
2011 June Skanska partners with Romonet to design efficient Data Centers.
2011 October Romonet board appointed Michael J Fister, former Intel senior exec and CEO of Cadence, as director and member of the board.
2011 November Launches V2.0 of its DCPM software, Romonet Software Suite, which incorporates significant extra enhancements including ability to model using Typical Meteorological Year (TMY) data.
2012 July Romonet partners with Red Engineering Design.
2012 September Romonet partners with CS&I who specialize in critical systems typically associated with data center, hospital, and financial trading facilities.
2012 November Romonet launches Romonet Portal - a SaaS type product that is 'designed specifically to address the business an |
https://en.wikipedia.org/wiki/Piggy%20Piggy | "Piggy Piggy" is the sixth episode of the first season of the television series American Horror Story, which premiered on the network FX on November 9, 2011. The episode was written by supervising producer Jessica Sharzer and directed by Michael Uppendahl. This episode is rated TV-MA (LV).
Piggy Piggy was nominated for Primetime Emmy Awards for Outstanding Sound Editing for a Miniseries, Movie, or a Special, and for Outstanding Sound Mixing for a Miniseries or a Movie.
In this episode, Ben (Dylan McDermott) sees a patient who fears an urban legend about a man who slaughters those who say a special mantra into a mirror. Eric Stonestreet guest stars as Derek, Ben's patient.
Plot
Flashing back to 1994, Tate shoots and kills several students in a school shooting, including the five teenagers seen in the previous episode. A SWAT team later storms the Langdon household, looking to arrest Tate. Constance begs them not to hurt him. They burst into his room where they find him there. Tate mocks them by putting a finger gun to his head, imitating shooting himself. Tate pulls out a gun and is shot dead by the SWAT team. All this occurs in the Murder House (then owned by Constance).
After Violet finds out that Tate killed the teenagers, Constance introduces her to a medium, Billie Dean Howard. Billie and Constance explain that Tate is unaware that he is dead; Constance has been sending him to Ben, hoping it will help him pass on and they need Violet’s help.
Ben sees a new patient, named Derek, who is terrified by urban legends, including "Piggy Man". The story goes that a man was a hog butcher. He retrieved a severed pig's head and went on a killing spree at the 1893 Chicago World's Fair then later died by getting devoured by his own pigs. It is said he will slaughter anyone who repeats a specific chant in the mirror. Ben also begins noticing that Vivien has developed an attraction to the security officer Luke.
Constance and Moira convince Vivien to eat offal to help with the pregnancy. Vivien contacts the ultrasound technician who fainted during the ultrasound, who claims that she saw that the baby is the Devil.
Taking Ben's advice to face his fear, Derek repeats the chant in his bathroom mirror, but is shot and killed by an armed burglar hiding in his shower. Violet tries to confront Tate in the basement, but is mobbed by the other ghosts. Overwhelmed with guilt, she attempts suicide by taking a handful of sleeping pills given to her by Leah, but Tate attempts to save her by forcing her to vomit the pills.
Later, Tate break down in tears, confesses that he loves her and cannot understand why she has turned cold towards him. He plans to leave her alone if that's what she wants, but she comforts him. Constance speaks to Adelaide through Billie Dean and learns that she is glad she wasn't revived as a ghost because she now fears to be near Tate, after learning what he did.
Production
The episode was written by supervising producer Jessica Sharzer, and |
https://en.wikipedia.org/wiki/BioMart | BioMart is a community-driven project to provide a single point of access to distributed research data. The BioMart project contributes open source software and data services to the international scientific community. Although the BioMart software is primarily used by the biomedical research community, it is designed in such a way that any type of data can be incorporated into the BioMart framework. The BioMart project originated at the European Bioinformatics Institute as a data management solution for the Human Genome Project. Since then, BioMart has grown to become a multi-institute collaboration involving various database projects on five continents.
Software
BioMart is a freely available, open-source, federated database system that provides unified access to disparate, geographically distributed data sources. BioMart allows databases hosted on different servers to be presented seamlessly to users, facilitating collaborative projects. BioMart contains several levels of query optimization to efficiently manage large data sets, and offers a diverse selection of graphical user interfaces and application programming interfaces to allow queries to be performed in whatever manner is most convenient for the user. BioMart's capabilities are extended by integration with several widely used software packages such as Bioconductor, Galaxy, Cytoscape, and Taverna.
Data sources and community
There are around 40 BioMart data sources including the Atlas of UTR Regulatory Activity (AURA), the COSMIC cancer database, Ensembl Genomes, HapMap, InterPro, Mouse Genome Informatics (MGI), Rfam and UniProt. Access is provided by institutions including the European Bioinformatics Institute (EBI) and the Wellcome Trust Sanger Institute in the UK, Cold Spring Harbor Laboratory and the National Center for Biotechnology Information (NCBI) in the United States and French National Centre for Scientific Research (CNRS). The BioMart Central Portal was established to provide a convenient single point of access to this growing pool of data sources.
References
External links
DATABASE Issue dedicated to BioMart
NATURE METHODS "Quantitative data: learning to share" featuring BioMart
BioMart Project home page
BioMart Users mailing list
Bioinformatics software
Biological databases
Data warehousing products
Free software projects
Science and technology in Cambridgeshire
South Cambridgeshire District |
https://en.wikipedia.org/wiki/V%C3%A4stmanland%20Runic%20Inscription%2022 | Västmanland Runic Inscription 22 or Vs 22 is the Rundata designation for a Viking Age memorial runestone that was originally located at Ulvsta, but has been moved to Svana, which is about seven kilometers north of Skultuna, Västmanland County, Sweden, and which was in the historic province of Västmanland.
Description
The inscription on Vs 22 consists of runic text in the younger futhark on a serpent that encloses a central cross, with the head of the serpent below the cross. The inscription, which is 0.95 meters in height and on a granite stone, is classified as probably being carved in runestone style Pr3, which is also known as Urnes style. The uncertainty in the classification is due to the damaged ends of the runic text bands, which are used in the runestone classification system developed by Anne-Sophie Gräslund in the 1990s. In style Pr3, the ends of the runic bands have attached serpent heads depicted as seen in profile. Based on stylistic grounds, Vs 22 is attributed to a runemaster with the normalized name of Litle, who signed the inscriptions on inscription Vs 20 in Prästgården (Romfartuna synod), Vs 27 in Grällsta, and possibly the now-lost Vs 28 in Grällsta. Other inscriptions attributed to Litle based on stylistic analysis include Vs 17 in Råby and Vs 32 in Prästgården (Västerfärnebo synod). This stone was first noted during the runestone surveys in Sweden during the 1600s, and was moved to its current location at Svana near a stream by a man named von Friesen.
The runic text states that the stone was raised by a brother in memory of a man named Rúnfastr, who died on a voyage. From the word order, it is unclear if the voyage was for a man named Runi, or if Runa is a name starting a new sentence. At one time, it was suggested that Runa referred to an island in Estonia, but later scholars have dismissed this suggestion for lack of convincing evidence. That Runa is a personal name is supported by similar examples found on inscriptions such as the now-lost U 790 in Mälby, U 957 in Vedyxa, Sö 383 in Linga, and possibly U 1003 in Frötuna. The runemaster used a punctuation mark to separate each word of the text, and used a bind rune or ligature to combine the s-rune and i-rune in the word sinn. Vs 22 is the only inscription in Västmanland in which a bind rune was used.
The text indicates that Rúnfastr was among a band of drængia or "valiant men." A drengr in Denmark was a term mainly associated with members of a warrior group. It has been suggested that drengr along with thegn was first used as a title associated with men from Denmark and Sweden in service to Danish kings, but, from its context in inscriptions, over time became more generalized and was used by groups such as merchants or the crew of a ship. In the limited context of the damaged text on Vs 22, the brother of Rúnfastr may also have been part of the band on the voyage as a brother-in-arms. Other inscriptions involving a drengr and sponsorship by a brother who may have been |
https://en.wikipedia.org/wiki/ID-WSF | In computer networking, Identity Web Services Framework is a protocol stack that profiles WS-Security, WS-Addressing, SAML and
adds new protocol specifications of its own, such as the Discovery Service, for open market per user service
discovery, and the People Service for delegation and social networking.
Development
The ID-WSF stack was developed by the Liberty Alliance. The first release, ID-WSF 1.0 (and subsequent 1.1 and 1.2) were
released in 2003. ID-WSF1 was interoperability tested among
several vendor implementations, which received certification from the Liberty Alliance.
However, the first version of ID-WSF was not widely adopted. Perhaps the only significant adoption was by France Telecom
and the French government's Mon Service Public. Some adoption happened in Japan as well. Liberty Alliance proceeded
to create an improved version, the ID-WSF 2.0 in 2006, which included harmonization with certain WS-* technologies,
such as WS-Addressing and WS-Security. These changes were vigorously, and successfully, lobbied by Conor Cahill
of AOL (at the time). ID-WSF 2.0 interoperability certification was participated by several major league vendors, as well
as by startups and open source projects.
Since then, ID-WSF 2.0 has become the only widely accepted interoperable profile of WS-* technologies. Its strength
is essentially in narrow focus where tight enough profile for interoperability was specified. ID-WSF 2.0 interoperability
certification by Liberty Alliance was accomplished by several vendors, including some open source.
ID-WSF 2.0 has been adopted as standards base by the Finnish e-government project and by the European Commission FP7 project TAS3.
List of Implementations of ID-WSF
Sun Microsystems
Trustgenix
NEC
NTT
Symlabs SFIS
ZXID.org - the reference implementation of TAS3 - Trusted Architecture for Securely Shareable Services, with Privacy
Lasso, C library, bindings in Python, Java, Perl and PHP, GNU GPL Licence, developed by Entr'ouvert
References
Computer access control
XML-based standards |
https://en.wikipedia.org/wiki/Coordinate%20descent | Coordinate descent is an optimization algorithm that successively minimizes along coordinate directions to find the minimum of a function. At each iteration, the algorithm determines a coordinate or coordinate block via a coordinate selection rule, then exactly or inexactly minimizes over the corresponding coordinate hyperplane while fixing all other coordinates or coordinate blocks. A line search along the coordinate direction can be performed at the current iterate to determine the appropriate step size. Coordinate descent is applicable in both differentiable and derivative-free contexts.
Description
Coordinate descent is based on the idea that the minimization of a multivariable function can be achieved by minimizing it along one direction at a time, i.e., solving univariate (or at least much simpler) optimization problems in a loop. In the simplest case of cyclic coordinate descent, one cyclically iterates through the directions, one at a time, minimizing the objective function with respect to each coordinate direction at a time. That is, starting with initial variable values
,
round defines from by iteratively solving the single variable optimization problems
for each variable of , for from 1 to .
Thus, one begins with an initial guess for a local minimum of , and gets a sequence
iteratively.
By doing line search in each iteration, one automatically has
It can be shown that this sequence has similar convergence properties as steepest descent. No improvement after one cycle of line search along coordinate directions implies a stationary point is reached.
This process is illustrated below.
Differentiable case
In the case of a continuously differentiable function , a coordinate descent algorithm can be sketched as:
Choose an initial parameter vector .
Until convergence is reached, or for some fixed number of iterations:
Choose an index from to .
Choose a step size .
Update to .
The step size can be chosen in various ways, e.g., by solving for the exact minimizer of (i.e., with all variables but fixed), or by traditional line search criteria.
Limitations
Coordinate descent has two problems. One of them is having a non-smooth multivariable function. The following picture shows that coordinate descent iteration may get stuck at a non-stationary point if the level curves of a function are not smooth. Suppose that the algorithm is at the point ; then there are two axis-aligned directions it can consider for taking a step, indicated by the red arrows. However, every step along these two directions will increase the objective function's value (assuming a minimization problem), so the algorithm will not take any step, even though both steps together would bring the algorithm closer to the optimum. While this example shows that coordinate descent is not necessarily convergent to the optimum, it is possible to show formal convergence under reasonable conditions.
The other problem is difficulty in parallelism. Since the n |
https://en.wikipedia.org/wiki/MotorStorm%3A%20RC | MotorStorm: RC is a 2012 racing video game by Evolution Studios and published by Sony Computer Entertainment for the PlayStation 3 and PlayStation Vita computer entertainment systems. The fifth and most recent game in the MotorStorm series.
The game features 8 styles of vehicles, 4 returning areas from previous MotorStorm games, and has 16 tracks built out of them. The Pro-Am Expansion and the Carnival Expansion DLC, both released in 2012, add new tracks and vehicles to the game. The game features split screen multiplayer, cross-saving and a single purchase for both versions of the game.
Reception
MotorStorm: RC received "generally favorable" reviews, according to review aggregator Metacritic.
Eurogamer gave the game an 8 out of 10, praising its use of instantaneous restarts, minimal loading times, fast pacing, and a dubstep soundtrack in order to create an engaging gameplay loop. GamesRadar similarly commended the fast-paced gameplay, cross-platform support, and pop-up challenge notices while lamenting the lack of online multiplayer, substantial car customization, and power-ups. IGN called the title "refreshingly simple" while lauding its sharp handling model, live leaderboards, and amount of content. Pocket Gamer said that MotorStorm: RC was "...an extremely forward-thinking game in terms of simplicity of play, online connectivity, and pricing. Push Square stated that the title was "utterly essential" and said that it served as "...a successful test bed for one of the PlayStation Vita's most promising features", while saying that the social functions "...[brought] longevity to the package despite its meager price point." VideoGamer.com praised the addictive gameplay and deep handling model but found the game to be visually a bit rough on the Vita.
References
External links
2012 video games
MotorStorm
Pack-in video games
PlayStation 3 games
PlayStation Network games
PlayStation Vita games
Radio-controlled car racing video games
Sony Interactive Entertainment games
Video games developed in the United Kingdom
Video games using Havok
Multiplayer and single-player video games
Evolution Studios games |
https://en.wikipedia.org/wiki/Pat%20Villani | Pasquale "Pat" J. Villani (18 April 1954 – 27 August 2011) was an American computer programmer, author, and advocate of free software, best known for his creation of DOS-C, a DOS emulator written in the C language and subsequently adapted as the kernel of the FreeDOS operating system and a number of other projects including DOSEMU for Linux. He used to sign his edits with siglum "patv".
FreeDOS involvement
Villani had already been working on a DOS-like operating system for use in embedded systems for some while before the advent of FreeDOS.
His efforts started when he developed an MS-DOS 3.1-compatible interface emulator to write device drivers in the C high-level language instead of in assembly language, as was the usual approach at that time. This interface emulator grew into a minimal operating system named XDOS around 1988.
He added an IPL to set up a boot environment before loading the actual operating system and developed an MS-DOS-compatible frontend API to applications. In contrast to MS-DOS, which is not designed to be reentrant, the system calls of his operating system were, which is often a requirement for multitasking and real-time applications in embedded systems. This system was named NSS-DOS and also offered commercially.
When one potential contractor sought to use the OS in a system equipped with Motorola 680x0 processors instead of Intel x86 processors, for which the system was designed originally and which utilize different instruction sets and memory models, Villani was able to redesign his system to become portable across a range of different compilers and target environments. This move to a completely different target platform, while losing binary compatibility with existing applications, would have required a complete rewrite from scratch had his system not been written in a high-level language such as C, which allowed him to reuse large parts. His new DOS/NT used a microkernel architecture with logical separation of file system, memory and task manager.
Villani joined the FreeDOS project in 1994 after reading Jim Hall's announcement of a "PD-DOS" on comp.os.msdos.misc.apps. In response to Hall's announcement, Villani devised a derivative of DOS/NT named DOS-C with a monolithic kernel and an architecture more similar to the non-multitasking MS-DOS, and in 1995 he made it available for dual-use under a GPL open-source license to become the kernel component of the new "Free-DOS" operating system, as "PD-DOS" was called at this time.
In 1996, Villani wrote the book FreeDOS Kernel, which describes the design of the DOS-C / FreeDOS kernel and the original FreeDOS COMMAND.COM command line interpreter. The name of the operating system was subsequently officially changed to FreeDOS to reflect the spelling used in the book.
Internally, the FreeDOS kernel was still significantly different from MS-DOS, which, while no problem for embedded applications specifically written for FreeDOS, caused various compatibility issues in con |
https://en.wikipedia.org/wiki/Cotton%20candy%20%28disambiguation%29 | Cotton candy is a form of spun sugar.
Cotton candy or Candy floss may also refer to:
Cotton Candy (film), a 1978 television movie directed by Ron Howard
Cotton Candy (single-board computer) by FXI Technologies
Cotton Candy grapes, a sweet hybrid variety of table grape
Cotton Candy Nebula, a protoplanetary nebula'
Candyfloss (novel), a novel by Jacqueline Wilson
Candy Floss (wrestler), Croatian-English professional wrestler
Music
"Cotton Candy", song by horrorcore group Insane Clown Posse
Cotton Candy (album), an album by Al Hirt
Cotton Candy (band), resident band at the Cinnamon Club in the 1960s
Cotton Candy (instrumental), a 1964 instrumental by Al Hirt
Cotton Candy (Yungblud song) |
https://en.wikipedia.org/wiki/Kevin%20Reynolds%20%28priest%29 | Kevin Reynolds is an Irish Catholic priest who was falsely alleged in a news feature on RTÉ (the national television network of Ireland) to have raped and impregnated a Kenyan teenager. A scandal ensued when the allegations were discovered to be untrue, which generated intensive media coverage and political debate in Ireland, resulting in a government inquiry into the broadcaster.
The allegations were made in a report by the journalist Aoife Kavanagh titled "Mission to Prey", which aired in May 2011 on the Prime Time programme. Kavanagh alleged that during his time as a missionary in Kenya, Reynolds had raped and impregnated a minor named Veneraanda, fathering a child called Sheila. Kavanagh also alleged that Reynolds had secretly provided financial support to Sheila over a number of years. Both Veneranda and Sheila were interviewed on the programme to corroborate the allegations. taken place in the Diocese of Kakamega in Kenya.
Prior to the broadcasting of the show, Reynolds volunteered to have DNA testing undertaken to prove his innocence but this offer was refused by RTÉ. Later, two separate and independent DNA tests established that Reynolds was not the father of the child. With this it emerged that the allegations were entirely baseless. However, as a result of the broadcast, Reynolds was removed from his home and his parish ministry.
When it became public knowledge that Reynolds had been falsely accused, RTÉ broadcast an apology to him. Prime Time Investigates, the series on which the allegations were broadcast, was immediately suspended. The Director-General of RTÉ, Noel Curran, admitted the broadcasting of "Mission to Prey" was "one of the gravest editorial mistakes ever made" at RTÉ. RTÉ staff, including Mike Murphy, John Bowman, and Sean O'Rourke, publicly criticised the libel. The head of the Irish Missionary Union said that Aoife Kavanagh's continuing presence on Morning Ireland after being found guilty of defaming Reynolds was "unfair and unjust" and a demonstration of "double standards" in the media.
In November 2011, Reynolds agreed to an out-of-court libel settlement with RTÉ. The amount of the settlement was not disclosed. His solicitor also requested that the Irish justice minister, Alan Shatter, "clarify that he accepts that Fr Reynolds was guilty of no wrongdoing", in response to Shatter's previous public support of "Mission to Prey" when it was broadcast in May 2011.
See also
False allegation of child sexual abuse
References
2011 in case law
2011 in the Republic of Ireland
20th-century Irish Roman Catholic priests
Defamation
Irish expatriates in Kenya
Irish Roman Catholic missionaries
21st-century Irish Roman Catholic priests
Living people
Media case law
Christian clergy from County Galway
People from County Longford
Republic of Ireland case law
Roman Catholic missionaries in Kenya
RTÉ controversies
Year of birth missing (living people)
Journalistic scandals
Fake news
Anti-Catholicism in Ireland |
https://en.wikipedia.org/wiki/Anaphoric%20macro | An anaphoric macro is a type of programming macro that deliberately captures some form supplied to the macro which may be referred to by an anaphor (an expression referring to another). Anaphoric macros first appeared in Paul Graham's On Lisp and their name is a reference to linguistic anaphora—the use of words as a substitute for preceding words.
Examples
The loop macro in ANSI Common Lisp is anaphoric in binding, where the it expression refers to the result of the test expression in a clause.
Here is an example that sums the value of non-nil elements, where it refers to the values of elements that do not equal nil:
(loop for element in '(nil 1 nil 2 nil nil 3 4 6)
when element sum it)
;; ⇒ 16
Here it is bound to the output of (and (> number 3) number) when true, collecting numbers larger than 3:
(loop for number from 1 to 6
when (and (> number 3) number)
collect it) ; IT refers to (and (> number 3) number).
;; ⇒ (4 5 6)
Defining anaphoric macros
One example is an anaphoric version of the if-then-else construct, which introduces an anaphor it, bound to the result of the test clause:
(defmacro aif (test-form then-form &optional else-form)
`(let ((it ,test-form))
(if it ,then-form ,else-form)))
(aif (+ 2 7)
(format nil "~A does not equal NIL." it)
(format nil "~A does equal NIL." it))
;; ⇒ "9 does not equal NIL."
Another example is an anaphoric version of the λ-function, which binds the function itself to the anaphor self, allowing it to recur:
(defmacro alambda (parms &body body)
`(labels ((self ,parms ,@body))
#'self))
;; Factorial function defined recursively where `self' refers to the alambda function
(alambda (n)
(if (= n 0)
1
(* n (self (1- n)))))
See also
Anonymous recursion
Hygienic macros
Macro (computer science)
Method chaining
this (computer programming)
References
External links
Chapter 14. Anaphoric Macros from On Lisp by Paul Graham
Anaphora — an anaphoric macro collection
Lisp (programming language)
Programming constructs
Source code
Articles with example Lisp (programming language) code |
https://en.wikipedia.org/wiki/Verifiable%20computing | Verifiable computing (or verified computation or verified computing) enables a computer to offload the computation of some function, to other perhaps untrusted clients, while maintaining verifiable results. The other clients evaluate the function and return the result with a proof that the computation of the function was carried out correctly. The introduction of this notion came as a result of the increasingly common phenomenon of "outsourcing" computation to untrusted users in projects such as SETI@home and also to the growing desire of weak clients to outsource computational tasks to a more powerful computation service like in cloud computing. The concept dates back to work by Babai et al., and has been studied under various terms, including "checking computations" (Babai et al.), "delegating computations", "certified computation", and verifiable computing. The term verifiable computing itself was formalized by Rosario Gennaro, Craig Gentry, and Bryan Parno, and echoes Micali's "certified computation".
Motivation and overview
The growing desire to outsource computational tasks from a relatively weak computational device (client) to a more powerful computation services (worker), and the problem of dishonest workers who modify their client's software to return plausible results without performing the actual work motivated the formalization of the notion of Verifiable Computation.
Verifiable computing is not only concerned with getting the result of the outsourced function on the client's input and the proof of its correctness, but also with the client being able to verify the proof with significantly less computational effort than computing the function from scratch.
Considerable attention has been devoted in verifying the computation of functions performed by untrusted workers including the use of secure coprocessors, Trusted Platform Modules (TPMs), interactive proofs, probabilistically checkable proofs, efficient arguments, and Micali's CS proofs. These verifications are either interactive which require the client to interact with the worker to verify the correctness proof, or are non-interactive protocols which can be proven in the random oracle model.
Verification by replication
The largest verified computation (SETI@home) uses verification by replication.
The SETI@home verification process involves one client machine and many worker machines.
The client machine sends identical workunits to multiple computers (at least 2).
When not enough results are returned in a reasonable amount of time—due to machines accidentally turned off, communication breakdowns, etc.—or the results do not agree—due to computation errors, cheating by submitting false data without actually doing the work, etc.—then the client machine sends more identical workunits to other worker machines.
Once a minimum quorum (often 2) of the results agree, then the client assumes those results (and other identical results for that workunit) are correct.
The client grants |
https://en.wikipedia.org/wiki/Thomas%20Parke%20%28merchant%29 | Thomas Parke (1729/30 – 1819) was a Liverpool slave trader, merchant, banker and privateer. He was part of the complex network of business interests and finance behind the African and Atlantic slave trade of the later 18th century.
Early life
He originally from Swaledale, Yorkshire, the son of Thomas and Hannah Parke of Low Row; his father was a hosier and lead miner. He went into business as a linen merchant, initially with his brother John. His brother-in-law Christopher Wilson I of Kendal was another hosier, and Thomas Parke's merchant ventures included exporting Wilson's goods to North America.
Slave trade
Parke invested in the Atlantic slave trade through many ventures; he withdrew from it in 1792. Another business partner was Wilson's son, Christopher Wilson II, of the Low Wood Gunpowder Company, gunpowder being part of the West Africa trade.
Parke was a member of the Company of Merchants trading to Africa, of Liverpool. He was in business with Arthur Heywood. Parke & Heywood were involved in two slaving ventures in 1783/4, and in all in 50 journeys in the "triangular trade". The firm was significant as a major player in the local insurance trade, and its business had many dealings in common with the partnership of Thomas Staniforth and Joseph Brooks (junior). Heywood & Parke became one of the ten largest Liverpool firms (period 1783 to 1793) responsible for the trade of West African slaves to the West Indies. Their ventures employed the slaver Captain Joseph Fayrer.
Among Parke's clients for slaves were Rainford, Blundell & Rainford of Kingston, Jamaica. The percentage of Liverpool's slave trade in 1790 attributable to Thomas Parke and Co., of five partners, has been given as 1.1%. Parke reduced his investment in the direct trade, and concentrated more on the production of cotton goods for it, a business in which one of his sons was involved.
Parke was a director of the Liverpool fire insurance office established in 1777. He was a partner in Heywood's Bank.
Personal life
Parke married Anne, daughter of William Preston.
Their sons included:
Thomas John, the eldest. He married Bridget Colquitt, the daughter of John Colquitt IV. He was a partner in William Gregson, Sons, Parke & Morland. With Thomas Staniforth, Richard Watt and Joseph Jackson, he founded Old Swan Charity School (1792).
John and Preston Fryer, who were bankrupts. John was in the textile ("African check") business, but failed, and took a position as consul to Iceland.
James Parke, 1st Baron Wensleydale.
Their daughter Alice married Sitwell Sitwell. Another daughter Anne married John Croome Smythe.
Parke lived in Water Street; later he moved to Duke Street, and resided at Highfield House, West Derby, Liverpool, previously owned by Charlotte Murray, Duchess of Atholl, which he bought about 1781.
Notes
References
Sources
1729 births
1819 deaths
English merchants
English bankers
English slave traders |
https://en.wikipedia.org/wiki/Kyrgyzstan%20Time | Kyrgyzstan Time (KGT)is the time zone of Kyrgyzstan. It is +6:00 hrs ahead of Universal Coordinated Time (UTC+06:00). Kyrgyzstan does not observe daylight saving time.
IANA time zone database
Data for Kyrgyzstan directly from zone.tab of the IANA time zone database. Columns marked with * are the columns from zone.tab itself.
History
Historic time zones for Kyrgyzstan (both as an independent country and as part of the Soviet Union)
References
Society of Kyrgyzstan
Time zones
Time in Asia |
https://en.wikipedia.org/wiki/S%C3%B6dermanland%20Runic%20Inscription%20235 | Södermanland Runic Inscription 235 or Sö 235 is the Rundata listing for a Viking Age memorial runestone fragment that is located in Västerby, which is six kilometers southwest of Väländan, Stockholm County, Sweden, and in the historic province of Södermanland.
Description
This inscription, which is missing its upper section, consists of runic text in the younger futhark carved on a serpent that once encircled two animals. The animals, which because of the missing section cannot be clearly identified, appear to have hoofs and may be deer, elk, or horses. Several Scandinavian runestones include depictions of horses, including DR 96 in Ålum, N 61 in Alstad, Sö 101 in Ramsundsberget, Sö 226 in Norra Stutby, Sö 327 in Göksten, Sö 239 in Häringe, U 375 in Vidbo, U 488 in Harg, U 599 in Hanunda, U 691 in Söderby, U 855 in Böksta, U 901 in Håmö, U 935 at the Uppsala Cathedral, and U 1003 in Frötuna. The inscription, which is 1 meter in height, is classified as being carved in runestone style Pr3, which is also known as Urnes style. This runestone style is characterized by slim and stylized animals that are interwoven into tight patterns, with the animal heads typically seen in profile with slender almond-shaped eyes and upwardly curled appendages on the noses and the necks. Based on stylistic analysis, Sö 235 has been attributed to a runemaster with the normalized name of Halvdan, who was active in the mid-11th century in Södermanland and signed the inscription Sö 270 in Tyresta. Over fifteen other runestones have been attributed to him, including Sö 237 in Fors, Sö 239 in Häringe, Sö 244 in Tuna, Sö 245 in Tungelsta, the now-lost Sö 247 in Ålsta, Sö 252 in Säby, Sö 256 in Älby, Sö 262 in Blista, Sö 269 in Söderby Malm, Sö 272 in Upp-Norrby, Sö 274 in Södersluss, Sö 290 in Farsta, Sö 292 in Bröta, Sö 297 in Uppinge, Sö 298 in Uringe Malm, and Sö 301 in Ågesta Bro.
The remaining runic text on this fragment, which appears to follow the memorial formula typical on runestones of this period, was recorded on a drawing published in 1855. Since then, additional portions of the stone have been lost. The reconstructed text from the damaged stone states that the sponsor of the runestone was a man named Guðbjôrn and at least one other brother who raised the stone in memory of their father Védjarfr. Similar to his other inscriptions, Halvdan used a word divider punctuation mark between each word of the surviving text. One word of the text, * þin * or þenna, is carved inside the serpent near the hind legs of one of the animals.
Inscription
Transliteration of the runes into Latin characters
: kuþbiurn : auk : o...[n : litu : ... sta]in :* þin * at : uitirf : faþur : sin *
Transcription into Old Norse
Guðbiorn ok ... letu [ræisa] stæin þenna at Vidiarf, faður sinn.
Translation in English
Guðbjôrn and ... had this stone raised in memory of Védjarfr, their father.
References
External links
Photograph of Sö 235 in 2005.
Runestones in Södermanland
11th-century in |
https://en.wikipedia.org/wiki/Substitute%20It%20Now%21%20list | The Substitute It Now! List is a database developed by the International Chemical Secretariat (ChemSec) of chemicals the uses of which are likely to become legally restricted under EU REACH regulation. The list is being used by public interest groups as a campaign tool to advocate for increasing the pace of implementation of REACH and by commercial interests to identify substances for control in chemicals management programmes.
History and development
The SIN List is composed of chemicals evaluated by the environmental NGO ChemSec as meeting EU criteria for being Substances of Very High Concern (SVHCs) under Article 57 of REACH, being either carcinogenic, mutagenic or reprotoxic (CMR), persistent, bioaccumulative and toxic (PBT), very persistent and very bioaccumulative (vPvB), or posing an equivalent environmental or health threat.,
The first SIN List, known as version 1.0, was published in 2008 and identified 267 chemicals as meeting the Article 57 criteria for being SVHCs. ChemSec's assessment was independently validated by the Technical University of Denmark.
In 2009 a further 89 substances were added to the SIN List (Version 1.1), before in 2011 another 22 chemicals were added (Version 2.0) for fulfilling the REACH 57(f) criterion of equivalent concern as endocrine disrupting chemicals (EDCs). The 2011 EDC additions were made in consultation with TEDX, the US endocrine-disruption research NGO founded by Professor Theo Colborn, and coincided with EU plans over 2011–2012 to develop accepted criteria for identifying endocrine disrupting chemicals.
In October 2014, the list was updated, this time with 28 new chemicals. With this update, the SIN List was also divided into 31 groups, and a tool for sustainable substitution based on the SIN List – SINimilarity – was presented.
SIN List Advisory Committee
The development of the SIN List is guided by a nine-member NGO advisory committee:
The Center for International Environmental Law
The European Consumers’ Organisation
CHEM Trust
Clean Production Action (CPA)
Greenpeace European Unit
European Environmental Bureau
ClientEarth
Friends of the Earth Europe
European Trade Union Institute
Women in Europe for a Common Future
The Health and Environment Alliance
Impact
EU Legislation
The disparity between the length of the SIN List in comparison to the 15 chemicals nominated by the EU as SVHCs in October 2008 was used to pressure the European regulatory authorities and Member States to accelerate the nomination process. In 2011 Members of the European Parliament's Environment Committee cited the SIN List in criticising the European Commission for continuing slow progress on EDCs and evaluation of safety of chemicals in mixtures.
EU regulators have been cautiously welcoming of the SIN List. Margot Wallström, Vice-President of the European Commission, stated that she welcomed initiatives such as the SIN List “[which] draw the attention of the public and industry to the most hazardous ch |
https://en.wikipedia.org/wiki/List%20of%20biobanks | A biobank is a physical place which stores biological specimens. In some cases, participant data is also collected and stored. Access policies details may vary across biobanks but generally involve obtaining ethics approval from institutional review boards (IRB) and scientific review or peer review approval from the institutions under which the biobanks operate as well as Ethics approval from the institutions where the research projects will be undertaken. The samples and data are safeguarded so that researchers can use them in experiments deemed adequate. This article contains a list of biobanks.
Classification
Biobanks can be classified in several ways. Some examples of how they can be classified is by their controlling entity (government, commercial enterprise, or private research institution), by their geographical location, or by what sorts of samples they collect.
Biobanks may be classified by purpose or design. Disease-oriented biobanks usually have a hospital affiliation through which they collect samples representing a variety of diseases, perhaps to look for biomarkers affiliated with disease. Population-based biobanks need no particular hospital affiliation because they sample from large numbers of all kinds of people, perhaps to look for biomarkers for disease susceptibility in a general population.
References
External links
List of biobanks
Biobank organizations
biobanks, List of |
https://en.wikipedia.org/wiki/Uppland%20Runic%20Inscription%201158 | Uppland Runic Inscription 1158 or U 1158 is the Rundata catalogue listing for a Viking Age memorial runestone that is located at Stora Salfors, which is one kilometre east of Fjärdhundra, Uppsala County, Sweden, and is in the historic province of Uppland. The stone is a memorial to a man named Freygeirr, and may have been the same Freygeirr who was a Viking chieftain active on the Baltic coast in the 1050s.
Description
The inscription on U 1158, which is on a granite stone that is 1.86 meters in height, consists of runic text in the younger futhark that is carved on three intertwined serpents. The top section of the runestone is missing. The inscription is classified as being carved in runestone style Pr3 or Pr4, both of which are also known as Urnes style. This runestone style is characterized by slim and stylized animals that are interwoven into tight patterns. The animal heads are typically seen in profile with slender almond-shaped eyes and upwardly curled appendages on the noses and the necks. The stone was noted in 1865 as being originally located in a circle of stones north of a crossroads, but was moved in 1884 to its current location at a farm at the request of a school teacher. The inscription is signed by a runemaster with the normalized name of Livsten. Livsten signed several other inscriptions, including U 766 and U 767 in Norrby, U 796 in Sparrsätra, U 1152 in Brunnby, U 1161 in Altuna, U 1164 in Stora Runhällen, and Vs 29 in Sala Landsförsamling.
The runic text, which is incomplete due to the missing top section of the stone, states that the runestone was raised by some brothers, three of whom were named Guðsteinn, Eistr, and Áki, in memory of their father Freygeirr. According to scholar Omeljan Pritsak, this is the same Freygeirr who led a leidang expedition on the Baltic coast. Five other runestones refer to this Freygeirr, including Gs 13 in Söderby, DR 216 in Tirsted, U 518 in Västa Ledinge, U 611 in Tibble, and U 698 in Veckholms. It has been noted that one of Freygeir's son was named Eistr meaning "man from Estonia" or "Estonian," which Pritsak connects to Freygeir's activities on the other side of the Baltic Sea.
Inscription
Transliteration of the runes into Latin characters
: kuisþen : yg : estr : yg : uin... : yk : aki : litu : risa : stn : fryke : faþur se : lfsten : iuk : runi : þsa :
Transcription into Old Norse
Guðstæinn(?) ok Æistr ok ... ok Aki letu ræisa stæin [æftiʀ] Frøygæiʀ, faður sinn. Lifstæinn hiogg runaʀ þessa.
Translation in English
Guðsteinn(?) and Eistr and ... and Áki had the stone raised in memory of Freygeirr, their father. Lífsteinn cut these runes.
References
Uppland Runic Inscription 1158 |
https://en.wikipedia.org/wiki/Gary%20Smith%20%28Ciena%20CEO%29 | Gary B. Smith is a British-American executive, currently serving as the Chief Executive Officer of Ciena, an American telecommunications networking multinational.
Early life and education
Smith was born in Birmingham, United Kingdom, and received an MBA from the Ashridge Management College, now part of Hult International Business School.
Career
From 1995-1997, Smith served as vice president for sales and marketing at Intelsat, a global provider of fixed satellite services. He also previously served as vice president of sales and marketing for Cray Communications, Inc.
Ciena
Smith joined Ciena in 1997 and has served as president and CEO since May 2001. Prior to serving as CEO, Smith served as Ciena's chief operating officer; and prior to that, senior vice president of worldwide sales. Smith joined Ciena in November 1997 as vice president of international sales. He has served on Ciena's board of directors since October 2000.
During his tenure as CEO, Smith has led the acquisition of seven companies. Most recent is the acquisition of the Optical Networking and Carrier Ethernet assets of bankrupt Nortel's Metro Ethernet Networks (MEN) for $774 million. This acquisition, which closed on March 19, 2010, doubled Ciena's size from around 2,100 to 4,000 employees and significantly increased total revenues. In November 2011, Smith was interviewed by Light Reading about Ciena's acquisition history.
Since the first full year of Smith's tenure as CEO, Ciena's revenues have gone from $361 million in fiscal year ended 2002 to $2.1 billion in fiscal 2013.
Additional affiliations and memberships
In January 2011, the White House named Smith to its National Security Telecommunications Advisory Committee (NSTAC). NSTAC's mission is to provide the president collaborative advice and expertise regarding telecommunications national security and emergency preparedness issues.
Smith is also a commissioner of the Global Information Infrastructure Commission, a confederation of communications technology business executives engaged in telecommunications policy. In addition, he is a Broadband Ambassador to the Internet Innovation Alliance, a coalition of business and nonprofit leaders devoted to making broadband universally accessible.
Smith is a member of the Wall Street Journal CEO Council.
Smith serves on the Wake Forest University Advisory Council for Innovation, Creativity and Entrepreneurship.
In addition to Ciena's board of directors, Smith also serves on several other corporate boards. On December 7, 2011, Avaya, a global provider of business communications and collaboration systems and services, appointed Smith to its board of directors. Smith also serves as a director of CommVault Systems, a provider of data and information management software applications and related services with a market capitalization of $2 billion. Smith has served as a director of CommVault since May 2004 and as lead director since May 2006.
Awards and recognitions
In Novemb |
https://en.wikipedia.org/wiki/LOLI%20Database | The LOLI Database, an abbreviation of List Of LIsts, is an international chemical regulatory database developed and maintained by ChemADVISOR, Inc.
The LOLI database is one of the primary sources of information for the creation of safety data sheets and other hazard communication documents. The database "lets users check individual or groups of chemical substances against any or all of the regulations noted within the database" in order to identify the regulations that apply to those substances. The LOLI database can be accessed using either LOLI Desktop, LOLI in the Cloud or LOLI-On-Line. ChemADVISOR Navigator provides regulatory context.
The database was first created in 1986. Since then, the database has grown to include over 5800 separate lists from 128 countries.
See also
Chemical database
References
External links
UL Materials & Supply Chain – LOLI Database
Occupational safety and health
Chemical databases |
https://en.wikipedia.org/wiki/Felipe%20Andreoli%20%28journalist%29 | Luiz Felipe Guimarães Andreoli (São Paulo, February 5, 1980) is a Brazilian journalist and humorist. Currently is part of the program Custe o Que Custar, on the Rede Bandeirantes network, also presenting Band's new sports show, Deu Olé.
References
External links
1980 births
Living people
Brazilian people of Italian descent
Brazilian male comedians |
https://en.wikipedia.org/wiki/CODA%20Content%20Delivery%20Architecture | CODA Content Delivery Architecture, from Cambridge Visual Networks (Camvine), is both a digital signage product and a platform. The product is a media player with a ‘drag and drop’ web-based content management system. As a platform, CODA is a customisable system for partners to tailor solutions for different applications.
Content sources supported include images, video in various formats, Flash, PowerPoint, PDFs, web pages, calendars and web cams. It also connects to real-time information such as RSS news, weather and traffic information, as well as social media and business applications.
CODA is used by businesses, schools, retail stores and media networks to create their own playlists and run their own communication channels.
References
Media players |
https://en.wikipedia.org/wiki/Mupen64Plus | Mupen64Plus, formerly named Mupen64-64bit and Mupen64-amd64, is a free and open-source, cross-platform Nintendo 64 emulator, written in the programming languages C and C++. It allows users to play Nintendo 64 games on a computer by reading ROM images, either dumped from the read-only memory of a Nintendo 64 cartridge or created directly on the computer as homebrew.
History
Mupen64, the forerunner to Mupen64Plus, was released December 10, 2001 by Hacktarux. Mupen64 was designed to be cross-platform, the first release running on both Linux and Windows operating systems. As the emulator progressed, support was added for FreeBSD, AROS, and OS X, but these ports were not maintained as much or as well as the Linux and Windows versions.
On August 26, 2005, Mupen64 version 0.5 was released. It was the last version of Mupen64 by Hacktarux, although several branches of the project were made, one of which was Mupen64Plus. In October 2007, Mupen64 was forked by Richard Goedeken (richard42). His work went through several releases before settling on the name Mupen64Plus.
Mupen64Plus originally aimed to provide a 64-bit recompiler and to fix bugs present in Mupen64 0.5. Over time, the emulator expanded, maintained and improved extant video plug-ins, and provided extra features beyond the project's original scope.
In late 2009, the Mupen64Plus project undertook a major re-design of the emulator's architecture. Like many N64 emulators (including Sixtyforce, 1964, and Project64), Mupen64Plus uses four modular plug-ins (dynamic libraries) which adhere to a specification written by Project64 developer Zilmar. This specification was originally written in the late 1990s, when all of the Nintendo 64 emulators ran only under Windows. The plug-in architecture used graphical user interface (GUI) specific code inside of each plug-in, which presents difficulties for programmers wishing to support many different operating systems. For this reason, the Mupen64Plus team presented a design proposal to modify the plugin application programming interface (API) to place all of the user interface code in one software module and make other improvements to streamline the operation of a cross-platform N64 emulator. This decision was then controversial, but the proposed changes were implemented, and the software has continued to evolve. December 14, 2009 saw the first beta release of Mupen64Plus with the revised API, version 1.99.1. Several other beta versions have been released since then. Mupen64Plus 2.0 is currently being developed. Its source can be downloaded from the project's git repository.
Reception
Brandon Widdler of Digital Trends considers the emulator one of the best for the Nintendo 64 along with Project64, citing its cheat functions, dynamic recompilers for 32-bit and 64-bit machines, and speed adjustment feature.
Branches
Actively developed RetroArch/Libretro port.
In June 2012, a fork for the BlackBerry Playbook was announced named Mupen64Plus-PB.
In early 201 |
https://en.wikipedia.org/wiki/Maureen%20Larrazabal | Maureen Larrazabal (born September 23, 1979) is a Filipino actress, singer and commercial model who is one of the popular and regular mainstays of the TV sitcom Bubble Gang of GMA Network. Before venturing into movie and television, Larrazabal was with the Big Deal band who often performs abroad. She was with the band for 10 years.
Personal life
Larrazabal is the daughter of Nestor Vera Cruz and Ana Marie Larrazabal. Mau, as she is fondly called, has two siblings: EJ Leonardo and Raine (Lorraine Ana). She got an AB Communication Arts in Interior Design from St. Paul University Quezon City.
During the COVID-19 pandemic, Larrazabal experienced the symptoms of COVID-19 in the last week of July 2020. She underwent self-quarantine for three weeks and her symptoms subsided. However, she tested positive on a swab test on August 25. On September 19, she announced that she tested negative for the virus.
Career
Before venturing into movies, Larrazabal made TV commercial appearances for Condura Refrigerators, Skin Reborn and Gilbeys Gin.
Beautiful Larrazabal started her film career via sexy-flicked movies such as Ekis (1999), Unfaithful Wife 2 (1999), Bulaklak ng Maynila (1999), Sugo ng Tondo (2000) and Blood Surf (2000). Showing her versatility, Larrazabal decided to shy away from doing sexy movies instead shifted to more wholesome projects. She began accepting TV projects. Her first break was playing the weather girl, Carrie in GMA 7's comedy sitcom, Mikee Forever. This was followed by more comedy sitcoms such as Iskul Bukolp and Gags Must Be Crazy of Viva TV, Home Along Da Riles of ABS-CBN, and finally , Bubble Gang.
Like some other actresses, both foreign and local, Larrazabal openly admitted that she had breast augmentation.
As a result, Larrazabal has graced the covers of some of the Philippines' most popular men's magazines such as FHM Philippines and Maxim Philippines. In 2010, she was voted as FHM Top 25 Sexiest Women of the Decade in Philippines.
Filmography
Film
Television
References
Living people
Filipino film actresses
Filipino television actresses
Filipino women comedians
Actresses from Manila
Actresses from Cebu
Singers from Cebu City
Filipino people of Basque descent
Filipino people of Spanish descent
1979 births
21st-century Filipino singers
GMA Network personalities
Actors from Cebu City
Filipino sketch comedians |
https://en.wikipedia.org/wiki/Sayf%20ibn%20Umar | Sayf ibn Umar al-Usayyidi al-Tamimi () was an 8th-century Islamic historian and compiler of reports who lived in Kufa. He wrote the ('The Great book of Conquests and Apostasy Wars'), which was the later historian al-Tabari's (839–923) main source for the Ridda wars and the early Islamic conquests. It also contains important information on the structure of early Muslim armies and government. According to al-Dhahabi, Sayf died during the reign of Harun al-Rashid (786–809).
Life
Little is known about Sayf, except that he lived in Kufa and belonged to the tribe of Banu Tamim.
Reliability
The reliability of his hadiths has long been contested.
Since he was the sole transmitter of many of his historical narrations, especially pertaining to the conquest of Iraq, some historians have accused him of fabrication or exaggeration, most notably Julius Wellhausen. His narrations are said to be influenced by the tribal traditions of Banu Tamim. However, he also collected accounts that highlight other tribes.
Recent scholarship suggests that Sayf is more reliable than previously thought. W. F. Tucker and Ella Landau-Tasseron note that although Sayf may have been an unscrupulous hadith collector, this should not detract from his general reliability as a transmitter of historical information (akhbārī). Tucker adds that accusations of bias could equally be leveled at other akhbārīs contemporary to Sayf, including the Shi'a historian Abu Mikhnaf. Fuat Sezgin, Albrecht Noth, and Martin Hinds have also challenged Wellhausen's views and placed Sayf on an equal footing with other traditionalists.
Notes
Further reading
Banu Tamim
Year of death unknown
Year of birth unknown
8th-century historians from the Abbasid Caliphate
8th-century Arabic-language writers |
https://en.wikipedia.org/wiki/Davina%20Reichman | Davina Reichman is an Australian business consultant who launched fashion shows and iPad accessories.
Education
Reichman graduated in 2003 from the University of Sydney with a Bachelor of Computer Science and in 2006 earned an MBA at the University of Technology, Sydney.
Career
In 2009, claiming consumers should get more for their money, she attended a fashion show in Sydney with an outfit made from a roll of bubble wrap. In 2010, founder and Managing Director Reichman organized an annual fashion show, Being Born Again Couture, to create one-off bespoke couture garments.
The same year, she founded and became the managing director of iClothing, described as "the world's first iPad compatible clothes". The iDress and the iTee have a padded pouch designed to store the iPad.
In 2012, Reichman founded and is the CEO of NYC Fashion Runway, a series of fashion shows for independent and celebrity fashion designers to showcase their collections in NYC and Sydney, offering publicity, buyers and press including CNN, NY Daily News, Fashion TV, The Examiner, Fashion Avenue News.
The company has produced shows in venues including the Empire State Building, Copacabana, the Gansevoort Park Avenue Hotel and the Dream Hotel.
Reichman was featured on the cover of Focus of New York Magazine and the feature article for their Jan/Feb 2014 issue.
Reichman is featured on the "Entrepreneurs to Watch" list of Raine Magazine.
References
External links
NYC Fashion Runway website
Being Born Again Couture Fashion Show website
iClothing website
Living people
University of Sydney alumni
University of Technology Sydney alumni
Australian businesspeople in fashion
Year of birth missing (living people)
Australian women company founders
Australian company founders |
https://en.wikipedia.org/wiki/DYAM-TV | DYAM-TV is a commercial television station owned by GMA Network Inc. Its transmitter is located at Barangay Milibili, Roxas, Capiz.
GMA TV-5 Roxas currently airing program
One Western Visayas (Monday to Friday) - GMA Iloilo flagship afternoon newscast
GMA Regional TV Early Edition - (Monday to Friday) GMA Iloilo flagship morning newscast
See also
DYXX-TV
List of GMA Network stations
GMA Network stations
Television stations in Roxas, Capiz
Television channels and stations established in 1994
1994 establishments in the Philippines |
https://en.wikipedia.org/wiki/Qore%20%28programming%20language%29 | Qore is an interpreted, high-level, general-purpose, garbage collected dynamic programming language, featuring support for code embedding and sandboxing with optional strong typing and a focus on fundamental support for multithreading and SMP scalability.
Qore is unique because it is an interpreted scripting language with fundamental support for multithreading (meaning more than one part of the same code can run at the same time), and additionally because it features automatic memory management (meaning programmers do not have to allocate and free memory explicitly) while also supporting the RAII idiom with destructors for scope-based resource management and exception-safe programming. This is due to Qore's unique prompt collection implementation for garbage collection.
Qore Scripts
Qore scripts typically have the following extensions:
.q: for Qore scripts
.qm: for Qore user modules
.qtest: for Qore test scripts
Executable Qore scripts on Unix-like operating systems will typically start with a hashbang to specify the filename of the interpreter as follows:
#!/usr/bin/env qore
Syntax
Qore syntax is similar to and inspired from the following programming languages:
Perl: without %new-style, Qore's syntax is highly similar to Perl; the foreach statement, splice, push, pop, chomp operators, Perl5-compatible regular expressions, and more
Java: with %new-style, Qore code looks more similar to Java; the synchronized keyword, the instanceof operator, object and class implementation
C++: multiple inheritance, exception handling, static methods, abstract methods
D: the on_exit, on_success, and on_error statements provide exception-aware functionality similar to D's scope(exit), scope(failure), allowing exception-aware cleanup code to be placed next to the code requiring cleanup
Haskell: the map, foldl, foldr, and select operators with lazy evaluation of functional and list operators and statements
Data Types
Basic types include: boolean, string, integer, float, date, binary, list, hash (associative arrays), and object, as well as code code for code used as a data type.
Complex types are also supported such as hash<string, bool>, list<string>, reference<list<string>> as well as type-safe hashes.
Multithreading
Despite being an interpreted language, Qore was designed to support multithreading as a fundamental design principle. All elements of Qore are thread-safe, and the language in general has been designed with SMP scalability in mind. Because all elements of the language were designed to support multithreading, Qore programs and scripts do not have to limit themselves to a subset of Qore's functionality, which is also why there is no Global interpreter lock in Qore.
Threading functionality in Qore is provided by the operating system's POSIX threads library.
Garbage Collection
Qore features a unique garbage collection approach called prompt collection that allows destructors to be run immediately when objects go out of scope, even |
https://en.wikipedia.org/wiki/Microsoft%20Product%20Activation | Microsoft Product Activation is a DRM technology used by Microsoft Corporation in several of its computer software programs, most notably its Windows operating system and its Office productivity suite. The procedure enforces compliance with the program's end-user license agreement by transmitting information about both the product key used to install the program and the user's computer hardware to Microsoft, inhibiting or completely preventing the use of the program until the validity of its license is confirmed.
The procedure has been met with significant criticism by many consumers, technical analysts and computer experts, who argue that it is poorly designed, highly inconvenient and ultimately does nothing to prevent software piracy. The process has been successfully circumvented on multiple occasions.
This technology is also used in Microsoft Office products during activation. To activate volume-licensed versions of Office, including Project and Visio, one must have a Key Management Service (KMS) host computer. One can configure a Windows Server computer to be a KMS host computer by installing the Volume Activation Services role and then running the Volume Activation Tools wizard.
Process
Before activation
When installing a retail copy of Windows or Office, the user is asked to input a unique product key supplied on a certificate of authenticity included with the program, which is later verified during activation. Immediate activation is not required following installation, but the program must be activated within a specific period of time in order to continue to function properly. Throughout this grace period, the user will be periodically reminded to activate the program, with warnings becoming more frequent over time.
Certain versions of Windows and Office are available under a volume license, where a single product key is used for multiple installations. Programs purchased under this license must still be activated, with the exception of Windows XP and all versions of Office released prior to Office 2010. Businesses using this licensing system have the option of using Microsoft's activation servers or creating and managing their own.
If Windows is pre-installed on a computer by an original equipment manufacturer (OEM), the operating system is automatically activated without the need for interaction from the user. In this case, the copy of Windows installed does not use the product key listed on the certificate of authenticity, but rather a master product key issued to OEMs called a System Locked Pre-installation (SLP) key. On each boot, Windows confirms the presence of specific information stored in the BIOS by the manufacturer, ensuring the activation only remains valid on that computer, even if the product key is used on another machine.
After grace period
If activation is not performed within the grace period or fails because of an illegal or invalid product key, the following restrictions will be imposed on the user:
In Windo |
https://en.wikipedia.org/wiki/Charming | Charming may refer to:
Fiction
Charming (film), a computer-animated musical comedy film
Charming (Sons of Anarchy), a fictional town where the television series Sons of Anarchy is set
Prince Charming (disambiguation), a stock fairy tale character
The Charmings, an American fantasy sitcom (1987-1988)
"Charming", a song from the musical Natasha, Pierre & the Great Comet of 1812
Other uses
Charming (constituency), a constituency in Yau Tsim Mong District, Hong Kong
Buddleja davidii 'Charming', an American cultivar
See also
Charm (disambiguation)
Charmed (disambiguation)
Charmer (disambiguation) |
https://en.wikipedia.org/wiki/Gephyrocharax | Gephyrocharax is a genus of characins found in South America, Trinidad in the Caribbean, and Panama.
Species
There are currently 11 recognized species in this genus:
Gephyrocharax atracaudata (Meek & Hildebrand, 1912)
Gephyrocharax caucanus C. H. Eigenmann, 1912
Gephyrocharax chocoensis C. H. Eigenmann, 1912
Gephyrocharax intermedius Meek & Hildebrand, 1916
Gephyrocharax major G. S. Myers, 1929
Gephyrocharax martae Dahl, 1943
Gephyrocharax melanocheir C. H. Eigenmann, 1912
Gephyrocharax sinuensis Dahl, 1964
Gephyrocharax torresi Vanegas-Ríos, Azpelicueta, Mirande & García Gonzáles, 2013
Gephyrocharax valencia C. H. Eigenmann, 1920
Gephyrocharax venezuelae L. P. Schultz, 1944
References
Stevardiini |
https://en.wikipedia.org/wiki/Digital%20content | Digital content is any content that exists in the form of digital data. Digital content is stored on digital media or analog storage in specific formats. Forms of digital content include information that is digitally broadcast, streamed, or contained in computer files. Viewed narrowly, digital content includes popular media types, while a broader approach considers any type of digital information (e. g. digitally updated weather forecasts, GPS maps, and so on) as digital content.
Digital content has increased as more households have accessed the Internet. Expanded access has made it easier for people to receive news and watch TV online, challenging the popularity of traditional platforms. Increased access to the Internet has also led to the mass publication of digital content through individuals in form of eBooks, blog posts, and even Facebook posts.
History
At the beginning of the Digital Revolution, computers facilitated the discovery, retrieval, and creation of new information in every field of human knowledge. As information became increasingly more accessible, the Digital Revolution also facilitated the creation of digital content. Despite an evolution to digital technology, which occurred somewhere between the late 1970s, distribution of digital content did not begin until the late 1990s with the rise in popularity of the Internet.
In the past, digital content was primarily distributed through computers and the Internet. Methods of distribution are rapidly changing as the Digital Revolution brings new channels, such as mobile apps and eBooks. These new technologies will create challenges for content creators, as they determine the best channel to bring content to their consumers.
Despite the benefits, new technologies have created new intellectual property issues. Users can easily share, modify, and redistribute content outside of the creator's control. While new technologies have made digital content available to large audiences, managing copyright and limiting content movement will continue to be an issue that digital content creators face in the future.
Types of digital content
Examples include:
Video – Types of video content include home videos, music videos, TV shows, and movies. Many of these can be viewed on websites such as YouTube, Hulu, CBS All Access, Disney+, HBO Max, and so on, in which people and companies alike can post content. However, many movies and television shows are not available for free legally, but rather can be purchased from sites such as iTunes and Amazon.
Audio – Music is the most common form of audio. Spotify has emerged as a popular way for people to listen to music either over the Internet or from their computer desktop. Digital content in the form of music is also available through Pandora and last.fm, both of which allow listeners to listen to music online for no charge.
Images – Photo and image sharing is another example of digital content. Popular sites used for this type of digital content inc |
https://en.wikipedia.org/wiki/Third-generation%20programming%20language | A third-generation programming language (3GL) is a high-level computer programming language that tends to be more machine-independent and programmer-friendly than the machine code of the first-generation and assembly languages of the second-generation, while having a less specific focus to the fourth and fifth generations. Examples of common and historical third-generation programming languages are ALGOL, BASIC, C, COBOL, Fortran, Java, and Pascal.
Characteristics
3GLs are much more machine-independent and more programmer-friendly. This includes features like improved support for aggregate data types, and expressing concepts in a way that favors the programmer, not the computer. A third generation language improves over a second-generation language by having the computer take care of non-essential details. 3GLs are more abstract than previous generations of languages, and thus can be considered higher-level languages than their first- and second-generation counterparts. First introduced in the late 1950s, Fortran, ALGOL, and COBOL are examples of early 3GLs.
Most popular general-purpose languages today, such as C, C++, C#, Java, BASIC and Pascal, are also third-generation languages, although each of these languages can be further subdivided into other categories based on other contemporary traits. Most 3GLs support structured programming. Many support object-oriented programming. Traits like these are more often used to describe a language rather than just being a 3GL.
A programming language such as C, FORTRAN, or Pascal enables a programmer to write programs that are more or less independent from a particular type of computer. Such languages are considered high-level because they are closer to human languages and further from machine languages, and hence require compilation or interpretation. In contrast, machine languages are considered as low-level because they are designed for and executed by physical hardware without further translation required.
The main advantage of high-level languages over low-level languages is that they are easier to read, write, and maintain. Ultimately, programs written in a high-level language must be translated into machine language by a compiler or directly into behaviour by an interpreter.
These programs could run on different machines (they are portable) so they were machine-independent. As new, more abstract languages have been developed, however, the concept of high- and low-level languages have become rather relative. Many of the early "high-level" languages are now considered relatively low-level in comparison to languages such as Python, Ruby, and Common Lisp, which have some features of fourth-generation programming languages and were called very high-level programming languages in the 1990s.
See also
Programming language generations
Domain-specific programming language
References
Programming language classification |
https://en.wikipedia.org/wiki/U-Bahn%20Line%20D%20%28Frankfurt%20U-Bahn%29 | U-Bahn Line D is a partially completed north‒south route of the Frankfurt U-Bahn underground rail network, planned since the 1960s. three sections had been constructed and were in use for U-Bahn services, plus a long section operated with trams. As the route is not continuous there are no through services, but instead underground services U1, U4, U8, U9 and tram lines 12, 15, 21 all partially serve some of the stops on the route then transfer to other routes. The planned Ginnheim Curve () extension would run via the University's to fill the missing gap.
The most northerly section serving two stations on the new Reidberg settlement opened in 2010 and operates with U8 and U9 underground services.
The core northern section between and had been constructed between 1968‒1978 as a branch of the U-Bahn Line A serving and operates with U1 and U8 services.
The middle section between the main railway station at Frankfurt (Main) Hauptbahnhof and opened in 2001 as an extension of U-Bahn Line B (U4 service).
South of the River Main between the University Hospital and Schwanheim the planned route remains operated by low-floor tram services but is mostly upgraded to light rail design running in its own reservation.
Sections
The route was originally planned in four parts. The numbering sequence may have reflected the sequence in which the sections were originally planned to be built. Following the development of , the construction priorities shifted.
D 0: Ginnheim – Heddernheim
In use, used by services U1 and U9.
The northern part from the was already part of the very first line in 1968, when the other branches of the Line A were still being used with converted tram vehicles and under tram line numbers. The extension to Ginnheim originated in the 1970s. The line is rotated more than 90 degrees from the Line A, which is only explained by the intention to integrate the section later in the Line D.
D I: Hauptbahnhof – Bockenheimer Warte
In use, served by U4 services.
The section from Frankfurt (Main) Hauptbahnhof, via to was opened in 2001. The line is operated line by U4 services as an extension of the U-Bahn Line B route.
D II: Bockenheimer Warte – Ginnheim
Planned. construction of the Ginnheim Curve route was planned to occur in the 2020s on a route via the University's new Campus Westend.
Several routes to fill in the missing gap have been proposed.
A previous plan to link the two existing sections had been planned to start in 2006 using a route completely in tunnel. One station would have been constructed at Franz-Rücker-Allee and the existing Ginnheim U-Bahn station relocated to below the Ginnheimer Landstraße. Just before construction would have started, the measure was halted owing to changes in political majorities resulting from formation of a new coalition after the local elections of 2005.
D III: Hauptbahnhof – Niederrad
Incomplete and likely to remain operating as a tram line. It was originally planned to run southwards f |
https://en.wikipedia.org/wiki/PL/SQL | PL/SQL (Procedural Language for SQL) is Oracle Corporation's procedural extension for SQL and the Oracle relational database. PL/SQL is available in Oracle Database (since version 6 - stored PL/SQL procedures/functions/packages/triggers since version 7), Times Ten in-memory database (since version 11.2.1), and IBM Db2 (since version 9.7). Oracle Corporation usually extends PL/SQL functionality with each successive release of the Oracle Database.
PL/SQL includes procedural language elements such as conditions and loops, and can handle exceptions (run-time errors). It allows declaration of constants and variables, procedures, functions, packages, types and variables of those types, and triggers. Arrays are supported involving the use of PL/SQL collections. Implementations from version 8 of Oracle Database onwards have included features associated with object-orientation. One can create PL/SQL units such as procedures, functions, packages, types, and triggers, which are stored in the database for reuse by applications that use any of the Oracle Database programmatic interfaces.
Historically, the first public version of PL/SQL definition was in 1995, and the Oracle's inception year ~1992. It implements the ISO SQL/PSM standard.
PL/SQL program unit
The main feature of SQL (non-procedural) is also its drawback: control statements (decision-making or iterative control) cannot be used if only SQL is to be used. PL/SQL provides the functionality of other procedural programming languages, such as decision making, iteration etc. A PL/SQL program unit is one of the following: PL/SQL anonymous block, procedure, function, package specification, package body, trigger, type specification, type body, library. Program units are the PL/SQL source code that is developed, compiled, and ultimately executed on the database.
PL/SQL anonymous block
The basic unit of a PL/SQL source program is the block, which groups together related declarations and statements. A PL/SQL block is defined by the keywords DECLARE, BEGIN, EXCEPTION, and END. These keywords divide the block into a declarative part, an executable part, and an exception-handling part. The declaration section is optional and may be used to define and initialize constants and variables. If a variable is not initialized then it defaults to NULL value. The optional exception-handling part is used to handle run time errors. Only the executable part is required. A block can have a label.
For example:
<<label>> -- this is optional
DECLARE
-- this section is optional
number1 NUMBER(2);
number2 number1%TYPE := 17; -- value default
text1 VARCHAR2(12) := ' Hello world ';
text2 DATE := SYSDATE; -- current date and time
BEGIN
-- this section is mandatory, must contain at least one executable statement
SELECT street_number
INTO number1
FROM address
WHERE name = 'INU';
EXCEPTION
-- this section is optional
WHEN OTHERS THEN
DBMS_OUTPUT. |
https://en.wikipedia.org/wiki/Roland%20M%C3%B6sl | Roland Mösl (born July 9, 1958 in Innsbruck) is a former Austrian computer programmer.
Life
Roland Mösl worked out the concept of the Gemini house in 1991 and wrote the book "Aufstieg zum Solarzeitalter" (Advance to solar age) about this project. He was awarded with the Gusi Peace Prize November 24, 2011 in Manila.
Political positions
His political main target since 2004 is a revenue neutral tax.
He applied December 7, 2013 in the NEOS pre election for the European parliament May 2014. He was end of February 2014 removed from the list.
He registered December 31. 2014 the WWW movement WorldWide Wealth as a political party at the Austrian administration. German name "WWW Bewegung WeltWeiter Wohlstand". This movement is strongly opposed to ideologies and promotes to find the best way for a best possible survival of mankind by a new science promoted as "Ethics - the science of survival".
The philosophical background of this new movement is Infinitism - a civilization can create an unlimited ability to survive.
An organization to promote Infinitism was registered March 2015 at the Austrian administration.
He started summer 2016 a parliamentarian citizen initiative in Austria "Unleash investment avalanche - trigger economic boom".
References
External links
Eurosolar Austria prize 2008 for Roland Mösl
Austrian computer programmers
1958 births
Living people |
https://en.wikipedia.org/wiki/A%20Very%20Gaga%20Thanksgiving | A Very Gaga Thanksgiving is a Thanksgiving television special that originally aired on November 24, 2011, in the United States on the ABC network. Conceived and directed by Lady Gaga, it discusses her personal life and the inspiration behind her music. A 30-second preview of the special premiered on November 20, 2011 on Lady Gaga's YouTube channel. Principal photography took place at the Convent of the Sacred Heart in New York City.
The program features guest appearances by Katie Couric, Art Smith, and Tony Bennett. Gaga performed stripped down, acoustic versions of five songs from her second studio album, Born This Way, along with two Christmas songs and a duet with Bennett. The special received critical acclaim and gave ABC its best ratings in four years for its respective time slot on Thanksgiving Day. At the 2012 Dorian Awards, the special was nominated in the category of Best TV Musical Program of the Year but did not win the award. A live EP of performances from the special, titled A Very Gaga Holiday, was made available for purchase from the iTunes Store. The EP debuted on the Billboard 200 albums chart in the United States at number 52.
Synopsis
Katie Couric interviews Lady Gaga about her life and the inspiration behind her music at the Convent of the Sacred Heart in Manhattan, the school she attended as a child. Gaga also performs nine songs to a small audience of friends and family, including "Born This Way", "Marry the Night", "You and I", "Hair" and "The Edge of Glory", as well as covers of Irving Berlin's holiday classic "White Christmas" and Nat King Cole's "Orange Colored Sky". She also sings a duet with Tony Bennett of "The Lady Is a Tramp", originally from the 1937 musical comedy Babes in Arms, featuring the work of Gaga's trumpeter, Brian Newman. Gaga sings "Bad Romance" onstage during a different scene. American chef Art Smith makes a turkey dinner and waffles with Gaga. In another scene, a small group of children gather around her as she blows glitter on them.
Production
A Very Gaga Thanksgiving was conceived and directed by Gaga; it was produced by Steven Johnson, Rudy Bendar, and David Saltz. Principal photography took place at the Convent of the Sacred Heart in New York City. Gaga told Women's Wear Daily: "My dad will be so excited. I actually directed it. It's the first of two things I directed. I directed this as well as the video for 'Marry The Night,' my new single... So we'll be watching that and eating turkey and doing what all New Yorkers do, which is getting ready for every window to be filled with Christmas cheer the next day."
Gaga received dresses designed by Giorgio Armani, Stéphane Rolland, Azzedine Alaïa, and Martin Grant. A promotional photo of Gaga was released that shows her "going full ice princess", which Erin Strecker of Entertainment Weekly presumed would be her primary apparel. In a press statement early in November 2011, Couric commented that the special's story will amaze viewers and show a dif |
https://en.wikipedia.org/wiki/Dave%20Cliff%20%28computer%20scientist%29 | David T. Cliff (born 1966) is a Professor in the Department of Computer Science at the University of Bristol and was formerly the Director of the UK Large-scale Complex IT Systems (LSCITS) Initiative. Cliff is the inventor of the seminal "ZIP" trading algorithm, one of the first of the current generation of autonomous adaptive algorithmic trading systems, which was demonstrated to outperform human traders in research published in 2001 by IBM. He is also the inventor on multiple international patents
from the early 2000s concerning his invention hpDJ, the world's first fully automated disk-jockey (DJ) system for electronic dance music, the precursor to present-day DJ automation tools such as Traktor.
Education
Cliff was educated Segsbury School, a state school in Wantage. Cliff has a Bachelor of Science degree in Computer Science from the University of Leeds, with Master of Science and PhD degrees in Cognitive Science from the University of Sussex.
Career and research
Cliff spent the first seven years of his career working as an academic, initially at the University of Sussex UK and then as an associate professor in the MIT Computer Science and Artificial Intelligence Laboratory, Cambridge USA. Cliff's early research was in computational neuroscience/neuroethology studying visual control of gaze and flight in airborne insects; in using artificial evolution to automate the design of autonomous mobile robots; and in studying the coadaptive dynamics of competitive co-evolutionary arms-races (e.g. between species of predator and prey).
In 1996, while working as a consultant for Hewlett Packard Labs, Cliff invented the "ZIP" trading algorithm. In 1998 he resigned his post at MIT to take up a job as a senior research scientist at the HP Labs European Research Centre in Bristol, UK, where he founded and led HP's Complex Adaptive Systems research group.
In 1999, Cliff (who described himself in a 2001 press interview as "a very bad amateur DJ")
invented hpDJ, the world's first fully automated DJ system for electronic dance music (EDM), which automatically generated a serial play-order for a set of EDM tracks, and then did automated beat-detection, time-stretching/compression, and phase-alignment to create "seamless" continuous beat-matched mixes from one track into another. In this sense, hpDJ was the precursor to present-day DJ beat-matching mix automation tools such as those found in Traktor. The hpDJ project was the subject of
multiple international patents invented or co-invented by Cliff over 2001–2005, and included patents for a wrist-mounted device which monitored the wearer's biosignals such as heart-rate and perspiration, and included movement and location sensors: the intention was that these devices would be worn by members of the hpDJ's audience to provide feedback to hpDJ on how the audience was responding to the music being played.
In early 2005, Cliff moved to Deutsche Bank's Foreign Exchange trading floor in London, where he worked a |
https://en.wikipedia.org/wiki/List%20of%20DOS%20system%20files | MS-DOS / PC DOS and some related disk operating systems use the files mentioned here.
System Files:
IO.SYS (or IBMBIO.COM): This contains the system initialization code and builtin device drivers;
MSDOS.SYS (or IBMDOS.COM): This contains the DOS kernel.
Command-line interpreter (Shell):
COMMAND.COM: This is the command interpreter.
User configuration files:
AUTOEXEC.BAT: This is run by the default shell (usually COMMAND.COM) to execute commands at startup.
CONFIG.SYS: This contains statements to configure DOS and load device drivers.
Standard DOS utility programs:
APPEND: Set a search path for data files.
ASSIGN: Redirect requests for disk operations on one drive to a different drive.
ATTRIB: Set or display file attributes.
BACKUP / RESTORE: simple backup and restore utilities.
CHKDSK: Check disk for file system integrity.
COMP: File compare utility.
DEBUG: Simple command line debugger.
DELTREE: Delete a directory tree.
DISKCOMP: Compare floppy disks.
DISKCOPY: Copy floppy disks.
DOSKEY: Command line editor.
EDIT / EDLIN: Very basic text editor(s); EDLIN is in earlier versions.
FC: File compare utility.
FDISK: Partitions fixed disks.
FIND: Find text in files.
FORMAT: Formats disks.
JOIN: Joins a drive letter to a subdirectory.
LABEL: Set or remove a disk volume label.
MEM: Display memory usage.
MODE: Set modes for system devices.
MORE: Display output one screen at a time.
MOVE: Move files from one directory to another.
PRINT: Print spooler.
REPLACE: Replace files.
SHARE: File sharing and locking support.
SORT: Sorts input.
SUBST: Substitutes a drive letter for a subdirectory.
SYS: Transfers the system files to another drive to make it bootable.
TREE: Display a directory tree.
XCOPY: Extended file copy.
Standard DOS device drivers:
ANSI.SYS: ANSI console driver.
EMM386.EXE: Expanded memory manager.
HIMEM.SYS: Extended memory manager.
RAMDRIVE.SYS / VDISK.SYS: RAM disk; VDISK.SYS is in older versions of PC DOS.
References
DOS files |
https://en.wikipedia.org/wiki/Noshir%20Contractor | Noshir S. Contractor is an Indian-American network scientist who is the Jane S. & William J. White Professor of Behavioral Sciences in the McCormick School of Engineering & Applied Science, the School of Communication and the Kellogg School of Management and the director of the Science of Networks in Communities (SONIC) Research Group at Northwestern University. He is also the former President of the International Communication Association (ICA) and a Trustee of the Web Science Trust.
Education
Contractor completed his Doctor of Philosophy degree in communication at the University of Southern California in 1987. Prior to this he received a Master of Arts in Communication also from USC in 1986 and a Bachelor of Technology in Electrical Engineering from the Indian Institute of Technology Madras (Chennai) in 1983.
Career
Research
He has published more than 250 research papers in the area of social communication networks. He is known for the Multi-Theoretical Multi-Level (MTML) Framework with Peter Monge described in detail in Theories of Communication Networks. He was the host of the podcast "Untangling the Web". Professor Contractor has been at the forefront of three emerging interdisciplines: network science, computational social science and web science. He is investigating how social and knowledge networks form – and perform – in contexts including business, scientific communities, healthcare and space travel. His research has been funded continuously for 25 years by the U.S. National Science Foundation with additional funding from the U.S. National Institutes of Health, NASA, DARPA, Army Research Laboratory and the Bill & Melinda Gates Foundation.
Recognition
In 2014, Professor Contractor was awarded the prestigious National Communication Association (NCA) Distinguished Scholar Award, honoring "a lifetime of scholarly achievement in the study of human communication."
In 2015, Professor Contractor was honored with the title of International Communication Association (ICA) Fellow, in recognition of "distinguished scholarly contributions to the broad field of communication."
In 2018, he was awarded a Distinguished Alumnus Award of the Indian Institute of Technology Madras.
In 2019, he was elected as a Fellow of the American Association for the Advancement of Science (AAAS) and an ACM Fellow "for contributions to advances in computational social science, network science and web science". In 2022, he was named Fellow of the Network Science Society. In 2023, he was elected as a Fellow of the Academy of Management.
References
Living people
21st-century American psychologists
1959 births
Indian emigrants to the United States
American people of Indian descent
American people of Parsi descent
University of Southern California alumni
Fellows of the Association for Computing Machinery
Network scientists
20th-century American psychologists |
https://en.wikipedia.org/wiki/Anthony%20Goldbloom | Anthony John Goldbloom (born 21 June 1983) is the founder and CEO of Kaggle, a data science competition platform which has used predictive modelling competitions to solve data problems for companies, such as NASA, Wikipedia, Ford and Deloitte. Kaggle has operated across a range of fields, including mapping dark matter and HIV/AIDS research. Kaggle has received considerable media attention following news that it had received $11.25 million in Series A funding from a round led by Khosla Ventures and Index Ventures.
Goldbloom has been cited by Forbes Magazine as one of the 30 Under 30 in Technology, profiled by Fast Company as part of its 'Who's Next?' series and by the Sydney Morning Herald. Goldbloom has been quoted in the New York Times, the Wall Street Journal, the Independent and has appeared on the Science Show Catalyst. In 2021, he joined AIX Ventures as an Investment Partner. AIX Ventures is a venture capital fund that invests in artificial intelligence startups.
Background
Goldbloom was born in Melbourne, Australia, and holds a first-class honours degree in Economics and Econometrics from the University of Melbourne. During high school, Goldbloom represented Australia in sailing, competing in the 2001 World Championships in Sydney in the 29er class. Goldbloom began his career working in the economic modeling unit of Australia's Department of Treasury and later spent time in the Research department at the Reserve Bank of Australia. He conceived of the idea behind Kaggle while working as an intern at The Economist in London, when he was asked to write an article on the emerging area of "big data".
Personal life
Goldbloom lives with his wife in San Francisco, California, where Kaggle is headquartered.
References
External links
1983 births
Living people
Australian businesspeople
University of Melbourne alumni
Businesspeople from Melbourne
Australian Jews |
https://en.wikipedia.org/wiki/LingCloud | LingCloud is a suite of open-source cloud computing system software developed by Institute of Computing Technology, Chinese Academy of Sciences. It is licensed under Apache License 2.0. LingCloud provides a resource single leasing point system for consolidated leasing physical and virtual machines, and supports various heterogeneous application modes including high performance computing, large scale data processing, massive data storage, etc. on shared infrastructure. LingCloud can help an organization to build private cloud to manage the computing infrastructure.
LingCloud is based on Xen virtualization platform and uses OpenNebula to manage the virtual infrastructure.
Components
The main components of LingCloud release include:
Molva – The core of LingCloud. It is an elastic computing infrastructure management software providing a heterogeneous resource management and leasing framework, and a single controlling point of both of the infrastructure and applications.
Portal – System management interface via web. Current modules include:
Infrastructure management: physical and virtual machines management by partitions and clusters.
Application encapsulation: virtual appliance creation and management.
System monitor: clusters run-time information monitor.
Release history
The open-source version of LingCloud was released in May 2011.
See also
OpenNebula
CNGrid
References
External links
LingCloud on Google Code
Cloud infrastructure
Free software programmed in Java (programming language)
Free software for cloud computing |
https://en.wikipedia.org/wiki/Non-local%20means | Non-local means is an algorithm in image processing for image denoising. Unlike "local mean" filters, which take the mean value of a group of pixels surrounding a target pixel to smooth the image, non-local means filtering takes a mean of all pixels in the image, weighted by how similar these pixels are to the target pixel. This results in much greater post-filtering clarity, and less loss of detail in the image compared with local mean algorithms.
If compared with other well-known denoising techniques, non-local means adds "method noise" (i.e. error in the denoising process) which looks more like white noise, which is desirable because it is typically less disturbing in the denoised product. Recently non-local means has been extended to other image processing applications such as deinterlacing, view interpolation, and depth maps regularization.
Definition
Suppose is the area of an image, and and are two points within the image. Then, the algorithm is:
where is the filtered value of the image at point , is the unfiltered value of the image at point , is the weighting function, and the integral is evaluated .
is a normalizing factor, given by
Common weighting functions
The purpose of the weighting function, , is to determine how closely related the image at the point is to the image at the point . It can take many forms.
Gaussian
The Gaussian weighting function sets up a normal distribution with a mean, and a variable standard deviation:
where is the filtering parameter (i.e., standard deviation) and is the local mean value of the image point values surrounding .
Discrete algorithm
For an image, , with discrete pixels, a discrete algorithm is required.
where, once again, is the unfiltered value of the image at point . is given by:
Then, for a Gaussian weighting function,
where is given by:
where and is a square region of pixels surrounding and is the number of pixels in the region .
Efficient implementation
The computational complexity of the non-local means algorithm is quadratic in the number of pixels in the image, making it particularly expensive to apply directly. Several techniques were proposed to speed up execution. One simple variant consists of restricting the computation of the mean for each pixel to a search window centred on the pixel itself, instead of the whole image. Another approximation uses summed-area tables and fast Fourier transform to calculate the similarity window between two pixels, speeding up the algorithm by a factor of 50 while preserving comparable quality of the result.
See also
Anisotropic diffusion
Digital image processing
Noise reduction
Nonlocal operator
Signal processing
Total variation denoising
Bounded variation
Total variation
References
External links
Recent trends in denoising tutorial
Non-local image denoising, with code and online demonstration
Patents citing 2005 IEEE paper where NLM was claimed as a new technique
Image processing
Image noise reduction techn |
https://en.wikipedia.org/wiki/John%20Stringer | John Stringer or Johnny Stringer may refer to:
John Bentley Stringer (1928–1979), British computer pioneer
John Stringer (composer), British composer, oboist, conductor and academic
Johnny Stringer (born 1950), American politician
Johnny Stringer (RAF officer) (born 1969), British senior air force officer |
https://en.wikipedia.org/wiki/EuroBioBank | EuroBioBank is an organization which manages a network of biobanks in Europe. It provides human DNA, cell, and tissue samples to the scientific community for research on rare diseases.
Founding
Before the founding of EuroBioBank, researchers typically stored biobank specimens in their own laboratories and used them only for their own work. EuroBioBank allows researchers in many places to all share specimens.
Members
The following are member biobanks:
EURORDIS
Généthon
Myobank – AFM, Myology Institute France ( Paris )
3 C-R (Conseil et expertise pour les biobanques) France (Castelginest)
MTCC (Muscle Tissue Culture Collection), University of Munich
DNA biobank of the Department of Molecular Genetics and Diagnostics, National Institute of Environmental Health (NIEH) Hungary
Bank of the National Laboratory for the Genetics of Israeli Populations (NLGIP), Tel-Aviv University
Bank for the Diagnosis and Research of Movement Disorders (MDB), Carlo Besta Neurological Institute
Bank of the Muscle Cell Biology Laboratory, Carlo Besta Neurological Institute
DNA cell lines and nerve-muscle-cardiac tissues bank, UOS Malattie Neuromuscolari, University of Milan
Bank for the Diagnosis and Research on Neuromuscular Disorders (NHMGB), Cardiomyology and Medical Genetics, Second University of Naples
Neuromuscular Tissue Bank (NMTB), Department of Neurosciences, University of Padua
Bank of the Molecular Genetics Laboratory, University of Malta
Neuromuscular Tissue Bank of the University of Ljubljana
Bank of the Research Institute for Rare Diseases -Carlos III Health Institute (Spain)
MRC Centre for Neuromuscular Diseases BioBank, London
MRC Centre for Neuromuscular Diseases BioBank, Newcastle
Quebec Myotonic Dystrophy Biocatalog
Genomic and Genetics Disorders Biobank (GGNB) at the Casa Sollievo della Sofferenza Hospital.
References
External links
International research institutes
Biobank organizations |
https://en.wikipedia.org/wiki/Barbara%20Slade | Barbara Slade is a writer, creator and producer of children’s programming. Based in London, England, she travels extensively, heading up shows for the international market.
Career
Barbara (both a British and U.S. citizen) began her screenwriting career in London when her first show “Brown Bear’s Wedding” starring Helena Bonham Carter, Joss Ackland and Hugh Laurie aired on ITV, Christmas Day. It sold to most major territories, and was nominated for five Emmy awards including ‘Best Writer’. Barbara returned to America, where she continued her career, writing and developing series for Nickelodeon, Disney, ABC, Fox and many other networks worldwide. She has written features for Working Title and Disney and has received numerous awards including a ‘Humanitas’ for one of her episodes of ‘Rugrats’. Among many others, Barbara developed and served as Head Writer for “Angelina Ballerina” and “Rotten Ralph”.
Barbara has worked as a head writer/producer for the Disney Channel U.K. and was brought on board to develop and head up the writing team on NRK’s prime time award-winning comedy series “Side by Side” now in its 8th season and "Best For" now on season three on TV2.
Barbara was Creator/Executive Producer on several original TV series including “Dead Gorgeous” (CBBC/ABC/Nickelodeon) “Hi Opie” (TVO/Netflix) and is now in development on three original tv dramas “Heaven is a Perfect Tomato”, "Song for Britannia" and "A Drop of DNA".
Barbara's specialty is writing, developing and heading up high concept television shows for the international market. She works with production companies and channels around the world and also leads intensive screenwriting and development workshops. The most popular is “The Beauty of a One Pager”, an intensive 2-3 day T.V. development workshop available for channels, production companies and media organizations.
Television credits
Hi Opie! - creator/executive producer
Dead Gorgeous - creator/associate producer
Alexander and Pete - creator/executive producer
Inbox - writer/producer
Angelina Ballerina - series development/head writer
My Teen Genie - series development/head writer
Comin' Atcha - series development/head writer
Eloise - series development/head writer
Freefonix - series development/head writer
Rotten Ralph - series development/head writer
The Legends of Treasure Island - series development/head writer
Side by Side - series development/lead on writing team
Magnus - series development
Alle Sammen Sammen - series development
Rugrats (multiple episodes) - writer
Legend of Prince Valiant (multiple episodes) - writer
Little Shop (multiple episodes) - writer
Tales from the Cryptkeeper (multiple episodes) - writer
Sonic the Hedgehog (multiple episodes) - writer
Bill and Ted's Excellent Adventures (1 episode) - writer
Filmography
Winnie the Pooh: Stories from the Hundred-Acre Wood - writer
Winnie the Pooh: Seasons of Giving- writer
Angelina Ballerina: Angelina Sets Sail -writer
Brown Bear's Wedding- writer
White Bea |
https://en.wikipedia.org/wiki/Sameba | Sameba may refer to:
Holy Trinity Cathedral of Tbilisi
Sameba, Georgia, a village on Madatapa Lake |
https://en.wikipedia.org/wiki/LRE%20Map | The LRE Map (Language Resources and Evaluation) is a freely accessible large database on resources dedicated to Natural language processing. The original feature of LRE Map is that the records are collected during the submission of different major Natural language processing conferences. The records are then cleaned and gathered into a global database called "LRE Map".
The LRE Map is intended to be an instrument for collecting information about language resources and to become, at the same time, a community for users, a place to share and discover resources, discuss opinions, provide feedback, discover new trends, etc. It is an instrument for discovering, searching and documenting language resources, here intended in a broad sense, as both data and tools.
The large amount of information contained in the Map can be analyzed in many different ways. For instance, the LRE Map can provide information about the most frequent type of resource, the most represented language, the applications for which resources are used or are being developed, the proportion of new resources vs. already existing ones, or the way in which resources are distributed to the community.
Context
Several institutions worldwide maintain catalogues of language resources
(ELRA, LDC, NICT Universal Catalogue, ACL Data and Code Repository, OLAC, LT World, etc.) However, it has been estimated that only 10% of existing resources are known, either through distribution catalogues or via direct publicity by providers (web sites and the like). The rest remains hidden, the only occasions where it briefly emerges being when a resource is presented in the context of a research paper or report at some conference. Even in this case, nevertheless, it might be that a resource remains in the background simply because the focus of the research is not on the resource per se.
History
The LRE Map originated under the name "LREC Map" during the preparation of LREC 2010 conference. More specifically, the idea was discussed within the FlaReNet project, and in collaboration with ELRA and the Institute of Computational Linguistics of CNR in Pisa, the Map was put in place at LREC 2010. The LREC organizers asked the authors to provide some basic information about all the resources (in a broad sense, i.e. including tools, standards and evaluation packages), either used or created, described in their papers. All these descriptors were then gathered in a global matrix called the LREC Map.
The same methodology and requirements from the authors has been then applied and extended to other conferences, namely COLING-2010, EMNLP-2010, RANLP-2011, LREC 2012, LREC 2014 and LREC 2016.
After this generalization to other conferences, the LREC Map has been renamed as the LRE Map.
Size and content
The size of the database increases over time. The data collected amount to 4776 entries.
Each resource is described according to the following attributes:
Resource type, e.g. lexicon, annotation tool, tagger/parser.
R |
https://en.wikipedia.org/wiki/KKTF-LD | KKTF-LD (channel 30) is a low-power television station licensed to Chico, California, United States, affiliated with the Spanish-language UniMás network. It is owned by Sinclair Broadcast Group alongside Redding-licensed ABC affiliate KRCR-TV (channel 7) and four other low-power stations: Chico-licensed Antenna TV affiliate KXVU-LD (channel 17); MyNetworkTV affiliates Redding-licensed KRVU-LD (channel 21) and Chico-licensed KZVU-LD (channel 22), and Chico-licensed Univision affiliate KUCO-LD (channel 27). Sinclair also operates Paradise-licensed Fox affiliate KCVU (channel 20) through a local marketing agreement (LMA) with owner Cunningham Broadcasting. However, Sinclair effectively owns KCVU as the majority of Cunningham's stock is owned by the family of deceased group founder Julian Smith. The stations share studios on Auditorium Drive east of downtown Redding and maintain a news bureau and sales office at the former Sainte Television Group facilities on Main Street in downtown Chico (for FCC and other legal purposes, the Chico/Paradise-licensed stations still use the Chico address and Redding-licensed stations use the Redding address). KKTF-LD's transmitter is located along Cohasset Road northeast of Chico.
Subchannels
The station's digital signal is multiplexed:
References
External links
UniMás website
UniMás network affiliates
Antenna TV affiliates
KTF-LD
Television channels and stations established in 2003
KTF-LD
Low-power television stations in California
Sinclair Broadcast Group |
https://en.wikipedia.org/wiki/WVSG%20%28AM%29 | WVSG (820 kHz, "St. Gabriel Radio") is a non-commercial AM radio station in Columbus, Ohio. It airs local Catholic talk programming in addition to the EWTN Global Catholic Radio Network. WVSG's schedule is simulcast on WSGR, 88.3 FM in New Boston, Ohio.
WVSG broadcasts with 6,500 watts non-directional in the daytime, offering secondary coverage to almost half of Ohio, as far west as Dayton and the outer suburbs of Cincinnati and as far north as the outer suburbs of Toledo. Because 820 AM is a clear channel frequency, at night a six-tower array is used in a directional pattern to protect the signal of Class A WBAP Fort Worth. WVSG's transmitter is off Red Rock Boulevard in Columbus.
History
Ohio State University
The station, the oldest radio station in Columbus, was originally owned by Ohio State University. It was one of many radio stations signed on by universities in the early days of radio.
On March 23, 1920, the university was granted an experimental license with the call sign 8XI. Its debut broadcast was on April 20, 1920. It featured a speech by university president William Oxley Thompson.
In the fall of 1921 8XI's experimental license was deleted, and the university was issued a Technical and Training School station license with the call sign 8YO.
Effective December 1, 1921, the Department of Commerce, which regulated radio at this time, adopted regulations requiring that stations making broadcasts intended for the general public obtain a "Limited Commercial" license. On June 3, 1922, the university was issued its first broadcasting station license, with the call sign WEAO. The call letters were randomly assigned from a sequential roster of available call signs. In 1933, the call letters were changed to WOSU, representing Ohio State University's initials.
In 1949, an FM station was added, WOSU-FM at 89.7 MHz. At first, the FM station largely simulcast the AM's programming. Because 820 AM was a daytimer, required to go off the air at night, WOSU-FM was able to continue the AM's programs into the evening. In 1956, a TV station was added, WOSU-TV Channel 34.
WOSU
For much of the 1960s and '70s, WOSU's programming was mostly locally originated, featuring diverse music programs from classical and jazz, and later included the seasonal Metropolitan Opera radio broadcasts on Saturday afternoons, hosted by long-time announcer Milton Cross and later by Peter Allen after Cross' death. The station participated with the gradual evolution of National Public Radio (NPR). It also broadcast live remotes from the Ohio State Fair.
By the year 2000, WOSU primarily aired NPR news and talk programming, supplemented by programs from American Public Media and Public Radio International. It was also home to the Ohio State ice hockey and women's basketball broadcasts. On weekend evenings the station featured 12 hours of bluegrass music on a program called The Bluegrass Ramble, hosted by a group of three rotating announcers. In addition to its spo |
https://en.wikipedia.org/wiki/Air-rail%20alliance | There are four main types of airline-railway business alliance or codeshare agreements: dedicated services, entire network access, Night&Fly, and re-protection agreements. The currently active air-rail alliances are listed in the tables below.
Dedicated services
Dedicated services are less common than Rail&Fly alliances, due to the level of service provided. Often checked through luggage to is provided between the air and rail journeys, dedicated carriages or entire trains are provided to airline passengers, and service is to the same level expected on board an aircraft, including meals and refreshments.
Entire network access
More commonly referred to as Rail & Fly due to the popularity of the Deutsche Bahn service, entire network access is the increasingly common form of air-rail alliance. This allows passengers to book a discounted (sometimes free) train ticket in addition to their full-price air ticket. Checked through luggage and dedicated train compartments for airline passengers are not normally available, though sometimes first class train travel is provided. Travel is usually available to the entire rail network.
♯ Indicates airlines offer Rail&Fly ticketing on company website
Airline-Rail re-protection agreements
Also known as "Good for Trains", this is an emergency backup service for airline cancellations, providing train tickets in lieu of flights to get passengers to their destination. Such an example was during the Eyjafjallajökull eruption in 2010, where extra trains were provided to support the airlines’ stranded passengers in Europe. These 'good for train' agreements are in place with the following airlines:
See also
List of IATA-indexed railway stations
Codeshare agreement
Airport rail link
References
External links
List of Rail&Fly partners from Frankfurt Airport
Public transport by mode
Airline alliances
Airport rail links |
https://en.wikipedia.org/wiki/Medgrid | Medgrid project, created at the end of 2010 in Paris, is a large industrial project planned in North Africa, which aims to promote and develop a Euro-Mediterranean electricity network that would provide North Africa & Europe with inexpensive renewable electricity, mostly from solar. The goal is to install 20 gigawatts (GW) of generating capacity, with 5 GW being devoted for exports to Europe.
The Medgrid project was envisioned by a consortium of twenty plus utilities, grid operators, equipment makers, financing institutions and investors, mostly European.
On 24 Nov 2011, a MoU was signed between Medgrid and Desertec Industry Initiative (Dii) to study, design and promote an interconnected electrical grid with the 400 billion euro ($536 billion) renewable energy 'Desertec' project in North Africa. The medgrid together with Desertec would serve as the backbone of the 'European Supergrid' and the benefits of investing in HVDC technology are being assessed to reach the final goal – the 'SuperSmart Grid (SSG)'.
History
Background
As per the statement made by Dr Gerhard Knies, German physicist and founder of the Trans-Mediterranean Renewable Energy Cooperation (TREC) network of researchers - "The world’s deserts collect more energy from the sun in six hours than mankind consumes in an entire year". It illustrates the idea behind the ambitious project - Medgrid which will exploit solar energy from desert areas.
The Sahara desert was chosen as an ideal location for solar farms as they enjoy strong direct sunlight for much of the year (3,000 to 4,000 hours of sunlight per year). In addition, the deserts are sparsely populated, making it possible to set up large solar farms. Lastly, sand deserts can provide silicon, a raw material that is essential in the production of solar panels.
Inception of Medgrid consortium (July 2010 - present)
Complementing a similar Saharan desert based renewable energy project - DESERTEC, the industrial project Transgreen was launched in Paris in July 2010 as a French initiative within the framework of the Union for the Mediterranean (UfM). A consortium of twenty-plus, mostly European, utilities, grid operators, equipment makers, financing institutions and investors envisioned the company named Medgrid in December 2010. The aim was to promote and develop a Euro-Mediterranean electricity network that would provide North Africa & Europe with inexpensive renewable electricity, mostly from solar. The goal is to install 20 GW of generating capacity, with 5 GW being devoted for exports to Europe. France and Morocco will launch the first experiment to transport solar power from the south to the north of the Mediterranean.
Since the Euro-Mediterranean projects, Medgrid and Desertec are both attempting to generate solar energy from deserts and complement each other, a MoU was signed on 24 Nov 2011 between Medgrid and Desertec Industry Initiative (Dii) to study, design and promote an interconnected electrical grid with the 400 bill |
https://en.wikipedia.org/wiki/2010%20NCAA%20Division%20I%20FCS%20football%20rankings | The 2010 NCAA Division I FCS football rankings are from the Sports Network media poll and the coaches poll. This is for the 2010 season.
Legend
The Sports Network poll
The Coaches poll
Notes
References
Rankings
NCAA Division I FCS football rankings |
https://en.wikipedia.org/wiki/2009%20NCAA%20Division%20I%20FCS%20football%20rankings | The 2009 NCAA Division I FCS football rankings are from the Sports Network media poll and the coaches poll. This is for the 2009 season.
Legend
The Sports Network poll
The Coaches poll
Notes
References
Rankings
NCAA Division I FCS football rankings |
https://en.wikipedia.org/wiki/2008%20NCAA%20Division%20I%20FCS%20football%20rankings | The 2008 NCAA Division I FCS football rankings are from the Sports Network media poll and the coaches poll. This is for the 2008 season.
Legend
The Sports Network poll
The Coaches poll
Notes
References
Rankings
NCAA Division I FCS football rankings |
https://en.wikipedia.org/wiki/2006%20NCAA%20Division%20I%20FCS%20football%20rankings | The 2006 NCAA Division I FCS football rankings are from the Sports Network Division media poll.
Legend
The Sports Network poll
Notes
References
Rankings
NCAA Division I FCS football rankings |
https://en.wikipedia.org/wiki/2005%20NCAA%20Division%20I-AA%20football%20rankings | The 2005 NCAA Division I-AA football rankings are from the Sports Network media poll and the coaches poll.
Legend
The Sports Network poll
Notes
References
Rankings
NCAA Division I FCS football rankings |
https://en.wikipedia.org/wiki/Stability%20%28learning%20theory%29 | Stability, also known as algorithmic stability, is a notion in computational learning theory of how a machine learning algorithm output is changed with small perturbations to its inputs. A stable learning algorithm is one for which the prediction does not change much when the training data is modified slightly. For instance, consider a machine learning algorithm that is being trained to recognize handwritten letters of the alphabet, using 1000 examples of handwritten letters and their labels ("A" to "Z") as a training set. One way to modify this training set is to leave out an example, so that only 999 examples of handwritten letters and their labels are available. A stable learning algorithm would produce a similar classifier with both the 1000-element and 999-element training sets.
Stability can be studied for many types of learning problems, from language learning to inverse problems in physics and engineering, as it is a property of the learning process rather than the type of information being learned. The study of stability gained importance in computational learning theory in the 2000s when it was shown to have a connection with generalization. It was shown that for large classes of learning algorithms, notably empirical risk minimization algorithms, certain types of stability ensure good generalization.
History
A central goal in designing a machine learning system is to guarantee that the learning algorithm will generalize, or perform accurately on new examples after being trained on a finite number of them. In the 1990s, milestones were reached in obtaining generalization bounds for supervised learning algorithms. The technique historically used to prove generalization was to show that an algorithm was consistent, using the uniform convergence properties of empirical quantities to their means. This technique was used to obtain generalization bounds for the large class of empirical risk minimization (ERM) algorithms. An ERM algorithm is one that selects a solution from a hypothesis space in such a way to minimize the empirical error on a training set .
A general result, proved by Vladimir Vapnik for an ERM binary classification algorithms, is that for any target function and input distribution, any hypothesis space with VC-dimension , and training examples, the algorithm is consistent and will produce a training error that is at most (plus logarithmic factors) from the true error. The result was later extended to almost-ERM algorithms with function classes that do not have unique minimizers.
Vapnik's work, using what became known as VC theory, established a relationship between generalization of a learning algorithm and properties of the hypothesis space of functions being learned. However, these results could not be applied to algorithms with hypothesis spaces of unbounded VC-dimension. Put another way, these results could not be applied when the information being learned had a complexity that was too large to measure. Some |
https://en.wikipedia.org/wiki/CNCI | CNCI usually refers to either:
The Chittaranjan National Cancer Institute
The Comprehensive National Cybersecurity Initiative |
https://en.wikipedia.org/wiki/Koronis | Koronis (Greek "curved") may refer to:
Koronis family, a family of asteroids
158 Koronis, an asteroid
Koronis Pharmaceuticals
Koronis Rift, a 1985 computer game
Lake Koronis, a lake in Paynesville, Minnesota, U.S.
Operation Koronis
Coronis (diacritic) (Ancient Greek: koronis), a mark over vowel letters in Ancient Greek
Coronis (textual symbol) (Ancient Greek: koronis), a symbol in Ancient Greek papyri
See also
Coronis (disambiguation)
Coronus (disambiguation)
Korinos, a town and a former municipality in Pieria regional unit, Greece
Koronos, a village on the Greek island of Naxos
Kronos (disambiguation) |
https://en.wikipedia.org/wiki/Music%20Kit | The Music Kit was a software package for the NeXT Computer system. First developed by David A. Jaffe and Julius O. Smith, it supported the Motorola 56001 DSP that was included on the NeXT Computer's motherboard. It was also the first architecture to unify the Music-N and MIDI paradigms,. Thus it combined the generality of the former with the interactivity and performance capabilities of the latter. The Music Kit was integrated with the Sound Kit.
First demonstrated in 1988 at Davies Symphony Hall, the 1.0 release shipped in 1989 with the NeXT computer and included an Objective-C library for creating music and sound applications, a score language that included expression evaluation, MIDI, sound and DSP drivers, several command-line utilities and a simple score-playing application called ScorePlayer. The Music Kit was integrated into a variety of music applications, including Finale and Creation Station. It was also used in video games and even document processors.
The 2.0 release of the NeXT computer included additional bundled applications, including Ensemble, a fractal-based improvisation tool developed by Michael Mcnabb. Others involved in the NeXT Music Kit project included Douglas Fulton (documentation and demos), Doug Keislar (third-party support), Greg Kellogg (drivers), Lee Boynton (drivers, Sound Kit) and Dana Massie (development.) In addition, consultants brought in early on included Andy Moorer (DSP software architecture), Roger Dannenberg (data structures) and John Strawn (DSP software).
In 1992 (NeXT 3.0 release), the Music Kit was un-bundled from the NeXT software and was released as a copyrighted open source package to the Stanford Center for Computer Research in Music and Acoustics (CCRMA), where Julius O. Smith was a professor. Stanford University hired David A. Jaffe as a consultant to continue to develop the Music Kit. Among the additions at that time were support for the Airel QuintProcessor, a five-DSP board for the NeXTcube, support for audio directly via the DSP56001 serial port (which was brought out to the back of the NeXT cube), and support for NextSTEP and the use of DSP processing using the Turtle Beach DSP56001 card. A set of eight Motorola evaluation boards were combined into a chassis for the prototype "Frankenstein" platform, used by the Sondius program of the Stanford Office of Technology Licensing to develop physical models of musical instruments. In addition, Jaffe was hired by a third party to add MIDI time code support to the Music Kit. (The Sondius group was later spun off into an independent company, Staccato Systems, Inc., with funding from Yamaha and Stanford University. Staccato Systems, Inc. was acquired by Analog Devices in 2000.)
The Music Kit was described in numerous articles in NeXTWorld and other periodicals, and in books such as The Complete Guide to the Nextstep user environment
More recent ports of the Music Kit were done by Leigh Smith and Stephen Brandon.
References
External links
NeXT |
https://en.wikipedia.org/wiki/Theo%20Carver | Theo Carver is a fictional character from Days of Our Lives, an American soap opera on the NBC network. Created under head writer Dena Higley, Theo was born onscreen in 2003. The character was portrayed by two sets of twins and three child actors, Chase and Tyler Johnson (2003–2004), Kavi Faquir (2006–2007), Amyrh Harris (2007), Terrell Ransom Jr. from (2008-2015), Kyler Pettis (2015–2018), Cameron Johnson (2020–present). Along with several other child characters, Theo was rapidly aged in November 2015 and Pettis stepped into the role. Pettis announced his departure from the series in 2017 and he vacated the role in 2018. After a two-year absence, Theo was recast when Johnson took over the role in 2020.
Theo is the only child of Salem's mayor Abe Carver (James Reynolds) and Doctor Lexie Carver (Renée Jones). At the time of his birth, Lexie had been having an affair with her stepson Brandon Walker (Matt Cedeño) and his paternity is in question. DNA testing ultimately confirms Abe as Theo's father and he is named after Abe's late brother Theo and Brandon. In 2008, the three-year-old Theo is diagnosed with Autism when the network partners with Autism Speaks. As a teenager, Theo struggles to accept Abe's first attempt at romance after Lexie's 2012 passing with Valerie Grant (Vanessa Williams) and he is romantically linked to his childhood best friend Ciara Brady (Vivian Jovanni) and later her niece Claire (Olivia Rose Keegan). In 2017, the unarmed Theo is shot by rookie police officer JJ Deveraux (Casey Moss) which leaves him paralyzed and leads to him being written out of the series when he relocates to South Africa for treatment.
Theo's autism diagnosis proved to be the character's most significant storyline as well as his close friendship with Ciara Brady. Ransom was beloved by fans and critics and also earned two Young Artist Award nominations for his portrayal of Theo. Pettis also became quite popular with viewers and critics for his portrayal of the autistic character. While the writing for Theo's shooting was polarizing, Pettis won the Daytime Emmy Award for Outstanding Younger Actor in a Drama Series for his portrayal of Theo in 2019.
Storylines
2003–2018
In the summer of 2002, Abe announces his plans to divorce his wife Lexie for her attempt at kidnapping a child and trying to pass it off as their own. On the rebound, Lexie sleeps with Brandon Walker (Matt Cedeño). Lexie later reveals she is pregnant and a paternity test proves Abe is the baby's father. Abe and Lexie reunite and as she gives birth to her baby on May 29, 2003, Brandon is revealed to be Abe's long lost son. Brandon's new wife and Lexie's rival Sami Brady (Alison Sweeney) later reveals that she tampered with the baby's original paternity test to make sure Abe believes he is the child's father. Fortunately, a paternity test confirms Abe as the boy's father. On June 2, Lexie and Abe officially name their son Theodore Brandon, after Brandon and Abe's late brother. In September |
https://en.wikipedia.org/wiki/Ciara%20Brady | Ciara Brady is a fictional character from Days of Our Lives, an American soap opera on the NBC network. Created by Hogan Sheffer and Meg Kelly, the role is portrayed by Victoria Konefal since 2017.
She is a member of three of the most prominent Salem families, Brady, Kiriakis, and Horton, and the only daughter of the supercouple Bo Brady and Hope Williams.
Casting
Child actors Dakota and Danica Hobbs originated the role from 2007 to 2008. The role was then taken over by Lauren Boles from 2008 to 2015. In 2015, Days of Our Lives sent out a casting call using the code name Danielle, describing the character as a 16–17-year-old girl who has experienced a lot of pain in her life. In October 2015, it was declared that Vivian Jovanni had won the role, which had been previously played by child actress Lauren Boles. Jovanni debuted on October 30, 2015. In December 2016, Jovanni left the show. In July 2017, it was revealed that Ciara would be recast and return in December 2017 alongside Brandon Beemer's Shawn-Douglas Brady and Martha Madison's Belle Black. In August 2017, actress Victoria Konefal was cast as the new Ciara, making her debut on December 1, 2017. In July 2020, Konefal announced her departure as a full-time cast member, but left open the possibility of returning for guest appearances.
Storylines
2007–2014
Ciara Brady is born to Hope Brady (Kristian Alfonso), who believes that Patrick Lockhart is the father thanks to some fake DNA results that show he is. Bo Brady (Peter Reckell) and Hope rekindle their romance, pushing Patrick into kidnapping Hope. Ciara is born in a warehouse, where she is delivered by Bo. Patrick reveals the truth about the baby's paternity before being arrested.
Ciara lives with her parents for the first couple of years of her life, before living with Hope, Doug (Bill Hayes), and Julie (Susan Seaforth Hayes) after her mother and father briefly break up. After her father's disappearance, Ciara bullies Chase Jennings, but when her mother and Chase's father, Aiden (Daniel Cosgrove), start dating, they become best friends.
2015–present
In October 2015, a SORASed Ciara arrives home in Salem with her step-brother Chase for the wedding of her mom Hope and Aiden. At the Bicentennial party during the fireworks, she kissed Theo Carver (Kyler Pettis). After the wedding, she admitted to her step-grandmother/Aunt Julie about being happy for her mother, but missing her dad Bo so much and how his jacket reminded her of him. After learning of her mom being admitted to the hospital, she rushes there, shocked to see Bo at the hospital, they have a family reunion, where her dad fills her in on his abduction, Aiden's mental breakdown, and attempt of killing Hope and how he saved her. Ciara was happy having her dad back home. Sadly, a few days later, she got the worst news ever though her brother Shawn-Douglas Brady (Jason Cook) about their dad passing away from an inoperable brain tumor, which came as a shock to her. Thankfully, her fa |
https://en.wikipedia.org/wiki/Reef%20Doctors | Reef Doctors is an Australian television drama series that premiered on Network Ten on 9 June 2013.
Premise
The show revolves around Dr. Sam Stewart, the leader of a team of doctors serving the remote Hope Island Clinic. They look after residents of a small island community and neighbouring islands on the Great Barrier Reef, as well as holidaymakers and thrillseekers who visit the area. Sam is a single mother with an unusual interest in venom, hoping to extract the hidden secrets that may have the power to cure fatal diseases.
Pre-production
Reef Doctors is the first non-children's show Jonathan M Shiff has produced. As well as starring in the series, Lisa McCune is a co-producer. Filming commenced on 28 November 2011 in Queensland, around the Great Barrier Reef, and finished in April 2012. The series was due to be broadcast from September 2012, but was pushed back to June 2013.
Ratings and reception
The series received mixed reviews upon its long-overdue premiere.
The first episode finally aired on 9 June 2013 at 6:30pm, attracting low ratings of just 357,000 for Network Ten. These low figures caused Ten to move the show into a different time-slot, on Fridays at 9:30pm, but even that proved to be too much to ask, because it then failed to attract reasonable viewing figures in its changed time-slot. As a result, the show was subsequently moved to Ten's digital channel Eleven from 29 June 2013.
Cast
Lisa McCune as Dr. Sam Stewart
Richard Brancatisano as Dr. Rick D'Alessandro
Rohan Nichol as Toby McGrath
Susan Hoecke as Freya Klein
Andrew Ryan as Gus Cochrane
Tasneem Roc as Olivia Shaw
Rod Mullinar as Sonny Farrell
Justin Holborow as Jack Stewart
Chloe Bayliss as Nell Saunders
Kristof Piechocki as Malcolm Reid
Matt Day as Prof. Andrew Walsh
Alexandra Davies as Gillian
Paul Bishop
Episodes
Home media
References
External links
Reef Doctors at the Australian Television Information Archive
Network 10 original programming
10 Peach original programming
2010s Australian drama television series
2013 Australian television series debuts
2013 Australian television series endings
Television shows set in Queensland
English-language television shows |
https://en.wikipedia.org/wiki/Udaya%20Film%20Awards | The Udaya Film Awards is the most prominent award ceremony for Kannada films presented annually by Udaya TV, a Kannada-language division of the Sun Network, from the south-Indian state of Karnataka. The awards ceremony has been instituted to honour both artistic and technical excellence in the Kannada language film industry. Held since 1998, the ceremony was discontinued for over 6 years and made its comeback in 2006. The sponsors have been made by Knockout and Sun Feast before and currently by Vivel Active.
Best Actor
The Udaya Film Award for Best Male Actor has been awarded since 1998.
Best Actress
The Udaya Film Award for Best Female Actor has been awarded since 1998.
Best Director
The Udaya Film Award for Best Director has been awarded since 1998.
Best Film
The Udaya Film Award for Best Film has been awarded since 1998.
Best Supporting Actor
The Udaya Film Award for Best Supporting Male Actor has been awarded since 2006.
Best Supporting Actress
The Udaya Film Award for Best Supporting Female Actor has been awarded since 1997.
Best Music Director
The Udaya Film Award for Best Music Director has been awarded since 2006.
Best Male Playback Singer
The Udaya Film Award for Best Male Playback Singer has been awarded since 2006.
Best Female Playback Singer
The Udaya Film Award for Best Female Playback Singer has been awarded since 2006.
Best Cinematographer
References
External links
Indian film awards
Kannada cinema
Lifetime achievement awards
1997 establishments in Karnataka
Karnataka awards |
https://en.wikipedia.org/wiki/TinKode | Răzvan Manole Cernăianu (born 7 February 1992), nicknamed "TinKode", is a Romanian computer security consultant and hacker, known for gaining unauthorized access to computer systems of many different organizations, and posting proof of his exploits online. He commonly hacks high-profile websites that have SQL injection vulnerabilities, although unknown methods were used in his most recent attacks. Other aliases included sysgh0st.
Personal life
TinKode is Romanian and claims to have been born in 1992 in the southern part of the country. He states that his hacking skills are the result of extreme curiosity and ambition. The targets are well known websites and powerful brands with widespread influence, either for the online community or a particular marketplace. His attacks often involve the numeral seven. Tinkode was a fan of social networks, owning both a Twitter account, a Facebook account, as well as many blogs.
Alleged hacking
The Royal Navy's website was temporarily unavailable after TinKode claimed to have hacked it. He has also breached the security of servers at NASA, posting screenshots from an FTP server within NASA's Earth Observation System at Goddard Space Flight Center. He claims to have gained access to computers belonging to the European Space Agency.
Other info
He also claims to have found vulnerabilities in organizations including Sun Microsystems, MySQL, Kaspersky Portugal, the US Army, YouTube, Google, Other websites. TinKode has never been publicly criticized by the security experts, mainly because he didn't disclose full information regarding breached websites. He actually informed the webmasters before posting his results online, giving them time to fix the vulnerability. TinKode also received a Google Security Reward.
Arrest
On Tuesday, 31 January 2012, TinKode was placed under arrest by the Romanian authority DIICOT (Anti organised crime and terrorism institution), under the charge that he temporarily blocked the information systems of the US Army, Pentagon and NASA in association with Casi. TinKode was officially released on 27 April 2012.
Petition and support
Following his arrest, a petition was generated to raise support for Tinkode on Wednesday, 8 February 2012. The petition was aimed at DIICOT and the FBI to give Tinkode a reasonable and fair sentence claiming that the hacker wasn't malicious and was hacking out of curiosity. Further he was released after 3 months.
References
1992 births
People associated with computer security
Living people
Romanian computer scientists |
https://en.wikipedia.org/wiki/Coverack%20to%20Porthoustock | Coverack to Porthoustock is a coastal Site of Special Scientific Interest (SSSI) in Cornwall, England, UK, noted for both its biological and geological characteristics. The site contains four Red Data Book plant species.
Geography
The site, notified in 1951, is situated on the south Cornish coast, within St Keverne civil parish on the Lizard Peninsula. It starts at the village of Coverack in the south, following the shores of the English Channel to the hamlet of Porthoustock in the north.
The South West Coast Path runs through the SSSI, part of the coastline around Lowland Point is owned by the National Trust and contains two Geological Conservation Review sites.
Wildlife and ecology
The coastline contains four Red Data Book plant species, Cornish heath (Erica vagans), dwarf rush (Juncus capitatus) and twin-headed clover (Trifolium bocconei) along with the nationally scarce autumn squill (Scilla autumnalis).
History
On a raised beach between Pedn-myin (penn, head and meyn stone) and Lowland Point are the 2nd-century, Romano-British Trebarveth saltworks (). Gabbro is the predominant rock here and weathers to a rough clay. Sea water was boiled in two rectangular, stone ovens within an oval building, The residue salt was packed into pots made from the gabbro clay, and course, red pottery sherds (briquetage) can be found in the nearby cliff. Some of the sherds still have potters' fingermarks on them. The ovens measure 150 cm by 40 cm and if packed with vessels 15 cm high, the oven would hold 50 lt of sea water. With the water containing 3% salt by weight, each operation would produce 1½ kg of salt. The saltworks are within a field system and some of the remaining walls stand up to 1 m high.
References
Sources
Sites of Special Scientific Interest in Cornwall
Sites of Special Scientific Interest notified in 1951
St Keverne |
https://en.wikipedia.org/wiki/Simmtronics | Simmtronics Infotech Pvt. Ltd is a multinational technology company, headquartered in India, operating in the segments of computer hardware manufacturing and development. It sells and supports computer related products such as Laptop Ram, Desktop Ram, Pen drive, and Micro SD cards.
Simmtronics also processes, tests and resells hard disk drives under its label, originally manufactured by other suppliers (eg. Western Digital, Seagate). The company was founded in Delhi, India
Simmtronics has sales and subsidiary offices in Algeria, France, Mauritius, Macedonia, Nepal, Singapore, Sri Lanka, Thailand, United Kingdom, United States, Vietnam and U.A.E.
History
In December 2010, VIA Technologies tied-up with Simmtronics as Exclusive Manufacturing and Distribution Partner for 'VIA pc-1' Mainboards in India, covering 15 other countries in SAARC, Middle East and Africa.
Products
The company's products include:
Desktop Ram
Laptop Ram
Pen Drive/Flash Drive
Micro SD Card
References
External links
Computer companies of India
Computer hardware companies
Computer memory companies
Electronics companies of India
Mobile phone manufacturers
Manufacturing companies based in Delhi
Computer companies established in 1992
Electronics companies established in 1992
Software companies established in 1992
Indian brands |
https://en.wikipedia.org/wiki/James%20Cavallaro | James (Jim) Cavallaro is a professor of law and the co-founder and executive director of the University Network for Human Rights. He teaches human rights at Wesleyan University, where he is a director of the Minor in Human Rights Advocacy, as well as the Wesleyan ACTS for Human Rights program. In addition to Wesleyan, Cavallaro frequently teaches at Yale Law School, and the University of California at Los Angeles (UCLA). He also teaches at Columbia Law School and the University of California Berkeley. Prior to launching the University Network, Cavallaro founded the International Human Rights and Conflict Resolution Clinic at the Mills Legal Clinic at Stanford Law School, United States. In 2018, Cavallaro and colleagues founded the University Network for Human Rights, an organization that engages undergraduates and graduate students and their universities in human rights work in the United States and around the world. Cavallaro served as a commissioner (2014-2017) and President (2016-2017) of the Inter-American Commission on Human Rights. Cavallaro received his BA from Harvard University and his JD from University of California at Berkeley School of Law, where he served on the California Law Review and graduated with Order of the Coif honors. He also holds a doctorate in human rights and development from Pablo de Olavide University, Seville, Spain.
Career in practice
Early in his career, Cavallaro spent several years working with Central American refugees on the U.S.-Mexican border and with human rights groups in Chile challenging abuses by the Pinochet government. In 1994, he opened a joint office for Human Rights Watch and the Center for Justice and International Law (CEJIL) in Rio de Janeiro and served as Director of the office, overseeing research, reporting and litigation against Brazil before the Inter-American system's human rights bodies. In 1999, he founded the Global Justice Center, which is now a leading Brazilian human rights nongovernmental organization. Cavallaro authored or co-authored a number of reports on rights in Latin America, including: "Frontier Injustice: Human Rights Abuses Along the U.S. Border with Mexico Persist Amid Climate of Impunity", (Human Rights Watch Short Report, 1993); Police Brutality in Urban Brazil (New York, Human Rights Watch 1997); Extrajudicial, Summary or Arbitrary Executions: An Approximation of the Situation in Brazil (Editora Gajop 2001); Behind Bars in Brazil (Human Rights Watch, 1998).
Academia and teaching
Cavallaro joined Harvard Law School in 2002. In 2004, he was appointed clinical director of the Human Rights Program, and then went on to serve as the executive director of the program from 2007 to 2011. In 2011, Cavallaro joined the faculty of Stanford Law School and was appointed Director of the International Human Rights and Conflict Resolution Clinic at the Mills Legal clinic.
Publications and research interests
Cavallaro is the author of scores of books, reports, and articles on hum |
https://en.wikipedia.org/wiki/Cache%20stampede | A cache stampede is a type of cascading failure that can occur when massively parallel computing systems with caching mechanisms come under a very high load. This behaviour is sometimes also called dog-piling.
To understand how cache stampedes occur, consider a web server that uses memcached to cache rendered pages for some period of time, to ease system load. Under particularly high load to a single URL, the system remains responsive as long as the resource remains cached, with requests being handled by accessing the cached copy. This minimizes the expensive rendering operation.
Under low load, cache misses result in a single recalculation of the rendering operation. The system will continue as before, with the average load being kept very low because of the high cache hit rate.
However, under very heavy load, when the cached version of that page expires, there may be sufficient concurrency in the server farm that multiple threads of execution will all attempt to render the content of that page simultaneously. Systematically, none of the concurrent servers know that the others are doing the same rendering at the same time. If sufficiently high load is present, this may by itself be enough to bring about congestion collapse of the system via exhausting shared resources. Congestion collapse results in preventing the page from ever being completely re-rendered and re-cached, as every attempt to do so times out. Thus, cache stampede reduces the cache hit rate to zero and keeps the system continuously in congestion collapse as it attempts to regenerate the resource for as long as the load remains very heavy.
To give a concrete example, assume the page in consideration takes 3 seconds to render and we have a traffic of 10 requests per second. Then, when the cached page expires, we have 30 processes simultaneously recomputing the rendering of the page and updating the cache with the rendered page.
Typical cache usage
Below is a typical cache usage pattern for an item that needs to be updated every units of time:
function fetch(key, ttl) {
value ← cache_read(key)
if (!value) {
value ← recompute_value()
cache_write(key, value, ttl)
}
return value
}
If the function takes a long time and the key is accessed frequently, many processes will simultaneously call upon expiration of the cache value.
In typical web applications, the function may query a database, access other services, or perform some complicated operation (which is why this particular computation is being cached in the first place). When the request rate is high, the database (or any other shared resource) will suffer from an overload of requests/queries, which may in turn cause a system collapse.
Cache stampede mitigation
Several approaches have been proposed to mitigate cache stampedes (also known as dogpile prevention). They can be roughly grouped in 3 main categories.
Locking
To prevent multiple simultaneous recomputations of the same |
https://en.wikipedia.org/wiki/Institute%20for%20the%20Study%20and%20Integration%20of%20Graphical%20Heritage%20Techniques | The Institute for the Study and Integration of Graphical Heritage Techniques (INSIGHT) is an American computer laboratory for archaeological visualization based in Berkeley, California. INSIGHT's principal work consists of archaeological documentation projects for academics, universities and non-governmental organizations. INSIGHT's work has been included in documentary films, including Sunken Treasures of the Nile, Queens of the Nile and Ramses II, the Great Journey.
INSIGHT began in 1998 as the Egyptian Cultural Heritage Operation (ECHO), with the support of the Center for Design Visualization at the University of California at Berkeley.
References
External links
Archaeological organizations |
https://en.wikipedia.org/wiki/Cocktales%20%28TV%20series%29 | Cocktales is a television show by The Comedy Network. This 10-episode, half-hour series gives an inside look at what some men really talk about behind closed doors. Each week, a rotating panel of males recount what they believe to be their craziest sexual encounters, hilarious pranks and wildest memories.
From high school teachers and computer programmers to city workers and comedians, a varied blend of young men sign on to spill their Cocktales.
References
2010s Canadian comedy television series
CTV Comedy Channel original programming |
https://en.wikipedia.org/wiki/Railway%20electrification%20in%20Norway | The Norwegian railway network consists of of electrified railway lines, constituting 62% of the Norwegian National Rail Administration's of line. In 2008, electric traction accounted for 90% of the passenger kilometers, 93% of the tonne kilometers and 74% of the energy consumption of all trains running in Norway, with the rest being accounted for by diesel traction.
History
Early schemes
Technology for electric railways was demonstrated in Germany in 1879; the first revenue line took electric traction into use in 1881. The first electric industrial railway in Norway opened in 1892 at Skotfos Bruk near Skien. Two years later, parts of the Oslo Tramway were electrified. The first alternating current (AC) line became operational in 1892, while the first line to use a single-phase, single overhead wire power supply opened in Germany in 1903. In 1912, all German railway agreed to use the standard, which was later adopted first by Sweden and then by NSB. Several of the private lines that preceded NBS's electrification chose different standards. Sydvaranger chose to install the only mainline direct current (DC) and third rail system.
Mainline systems
The first three mainline systems to be electrified were private ore-hauling lines. The Thamshavn Line opened in 1909, and remained in revenue use until 1973, after which it was converted to a heritage railway. It is the world's oldest remaining alternating-current railway and the only narrow gauge railway in the country to have been electrified. It was followed by Norsk Transport's Rjukan and Tinnos Lines two years later, and Sydvaranger's Kirkenes–Bjørnevatn Line in 1922. The Norwegian State Railways' (NSB) first electrification was parts of the Drammen Line in 1922 and the ore-hauling Ofoten Line in 1923, which connects to the Ore Line in Sweden. The use of El 1 locomotives on the Drammen Line proved a large cost-saver over steam locomotives, and NSB started electrifying other lines around Oslo; from 1927 to 1930, the remainder of the Drammen Line, and the continuation along the Randsfjord and Sørland Lines to Kongsvinger were converted, along with the first section of the Trunk Line. In 1935, the Hardanger Line became the first section of new NSB track to be electrified. From 1936 to 1940, NSB electrified the Østfold Line as well as more of the Sørland Line and the Bratsberg Line, connecting all electric lines west of Oslo.
The 1940s onwards
During the 1940s, NSB electrified the Sørland Line, although the final section from Egersund to Stavanger was not converted until 1956. In 1957, the Kirkenes–Bjørnevatn Line became the only line to remove the electrification and replace the electric locomotives with diesel power. The 1950s saw the electrification of several of regional and commuter lines around Oslo, including the Kongsvinger Line, the Trunk Line and the Dovre Line from Lillestrøm to Hamar, the Vestfold Line and the Eastern Østfold Line. This was largely due to NSB's program to remove all stea |
https://en.wikipedia.org/wiki/C%20command | C command may refer to:
C syntax, keywords in the C programming language
C standard library, a set of subroutines available to programs in the C programming language
c-command, the "uncle" relationship in a parse tree |
https://en.wikipedia.org/wiki/Cleveland%20Central%20railway%20station | Cleveland Central railway station was a railway station on Queensland Rail suburban network in Brisbane, the state capital of Queensland, Australia. It was located between Raby Bay and Cleveland stations on the Cleveland railway line.
History
The station opened in 1890 with the opening of the railway beyond Manly. It was originally named Cleveland. When the line was extended towards Cleveland point in 1897, the new terminus was named Cleveland and the former terminus was named West Cleveland. It was renamed Cleveland Central in 1914.
Almost all the farm produce from the Redlands was loaded onto rollingstock at Cleveland Central station. On the days which other produce were loaded, such as tomatoes, three separate trains were required. The farmers brought their produce to the loading site in fruit wagons drawn by two horses and spring carts with one horse. More successful farmers transported produce using a Model T Ford one tone truck.
The station closed in 1960 with the closure of the railway beyond Lota. The site of the station is now part of Linear Park on the eastern side of Ross Creek.
Following the closure of the station, the station master's house was moved to Middle Street in front of the Cleveland RSL. On 12 July 2017, the building was moved to a new location on Shore Street North to make way for a redevelopment of the Cleveland RSL.
References
Disused railway stations in Queensland
Railway stations closed in 1960
Railway stations in Australia opened in 1890
Railway stations in Redland City
Railway stations in Australia closed in the 1960s |
https://en.wikipedia.org/wiki/Cleveland%20railway%20station%20%281897%E2%80%931960%29 | Cleveland railway station was a former railway station on Queensland Rail suburban network in Brisbane, the state capital of Queensland, Australia. It was the second terminus of the Cleveland railway line and the second of three stations to be known as "Cleveland".
It opened in 1897 with the opening of the extension beyond the original Cleveland station.
The station closed in 1960 with the closure of the railway beyond Lota. The site of the station is now part of Linear Park.
When the railway was reopened in 1987, the former Raby Bay station became the new terminus and the third Cleveland railway station.
References
Disused railway stations in Queensland |
https://en.wikipedia.org/wiki/Artificial%20Intelligence%20Center | The Artificial Intelligence Center is a laboratory in the Information and Computing Sciences Division of SRI International. It was founded in 1966 by Charles Rosen and studies artificial intelligence.
One of their early projects was Shakey the Robot, the first general-purpose mobile robot. More recently, the center funded early development of CALO and Siri. The center has also provided the military with various technology.
See also
Augmentation Research Center
References
External links
SRI International
Artificial intelligence laboratories |
https://en.wikipedia.org/wiki/Ultra%2060 | The Ultra 60 is a fairly large and heavy computer workstation in a tower enclosure from Sun Microsystems. The Ultra 60 was launched in November 1997 and shipped with Solaris 7. It was available in several specifications.
Sun Ultra 60 workstation # 1 CPU Model 1300 and # 2 CPU Model 2300, with Sun Creator3D graphics – began shipping February 1998. The last order date was August 4, 1999.
Sun Ultra 60 workstation # 1 CPU Model 1300 and # 2 CPU Model 2300, with Sun Elite3D graphics – began shipping March 1998.
Sun Ultra 60 workstation # 1 CPU Models 1360 and # 2 CPU 2360, with Sun Creator and Sun Elite3D graphics – began shipping April 1998.
Sun Ultra 60 workstation # 1 CPU Models 1450 and # 2 CPU 2450 – began shipping in May 1999.
Sun Ultra 60 workstation models began shipping with 18-GB SCSI SCA, 10000-rpm internal drives in November 1999.
The Ultra 60 is similar to the higher-cost Sun Ultra 80, but is somewhat smaller and supports fewer CPUs and less memory. The Ultra 60 may be rack-mounted using an optional kit (X9627A or 560–2548) although they were generally not rack-mounted, since the Ultra 60 was designed for use as a workstation rather than a server. Details can be found in the Sun Ultra 80 Rack Mount Installation Guide. The Enterprise 220R is an Ultra 60 motherboard in a specialized rackmount case with custom power supplies and other parts.
The Ultra 60 is no longer sold new and was replaced by the Ultra 45. The last order date for the Ultra 60 was July 2002 and the last model to be shipped was in 2003, so it is now considered by Sun to be end of life.
Operating system
Although it shipped with Solaris 7, the Ultra 60 will run later versions of Solaris up to 10, as well as Linux and FreeBSD. The Ultra 60 cannot run Microsoft Windows directly, although an internal PCI card (SunPCi II pro and similar) from Sun could be fitted to allow the use of Windows.
Hardware specifications and notes
CPU
The Ultra 60 came equipped with 1 or 2 CPUs. The CPUs run at 300, 360, or 450 MHz and have 16-KB data and 16-KB instruction cache on chip with a 2MB or 4MB external secondary cache (secondary cache size depends on CPU model).
Memory
The Ultra 60 uses 144-pin 5V 60ns DIMM memory modules of either 32, 64, or 128 MB which should be installed in sets of four identical DIMMs. There are 16 DIMM sockets, so it is possible to fit up to 2 GB with sixteen 128 MB modules. The memory bus is 576-bits wide; 512 bits are used for data and 64 bits for error correction. The specifications give the maximum throughput of 1.78 GB/s. Performance is improved if 2-way interleaving is used (giving 512 MB or 2 GB).
Internal storage
The Ultra 60 takes one or two 1" high SCA SCSI disk drives internally. It was sold with 18.2 GB or 36.4 GB disks, but can in practice use any SCA disk. The internal disks must be mounted in a carrier or spud-bracket (Sun part number 540-3024). The SCSI IDs of the internal disks are 0 and 3. These are set by the SCA backplane and can not b |
https://en.wikipedia.org/wiki/Odostomia%20cuspidata | Odostomia cuspidata is a species of sea snail, a marine gastropod mollusc in the family Pyramidellidae, the pyrams and their allies.
References
External links
To World Register of Marine Species
cuspidata
Gastropods described in 1873 |
https://en.wikipedia.org/wiki/Ben%2010%3A%20Omniverse | Ben 10: Omniverse is an American animated television series and the fourth installment of the Ben 10 franchise (and the final series in the original continuity), which aired on Cartoon Network from September 22, 2012, to November 14, 2014, in the United States, across eight 10-episode serialised "story arcs" instead of a season-based episode release structure. Man of Action Studios, consisting of Duncan Rouleau, Joe Casey, Joe Kelly, and Steven T. Seagle, created the franchise.
The series was announced at Cartoon Network's Upfront in 2011. Concept art, described as a homage to the original Ben 10 series, designed by Derrick J. Wyatt (Transformers: Animated and Scooby-Doo! Mystery Incorporated) was first unveiled at the 2012 UK Toy Fair.
The series premiered on September 22, 2012, with a "sneak peek episode" that aired on August 1, 2012. A "sneak peek" of the series aired after "Ben 10 Week" (March 19, 2012March 24, 2012). The show was followed by a reboot of the franchise in 2016.
Plot
The series follows the adventures of sixteen-year-old Ben Tennyson, wielder of the Omnitrix, an extremely powerful watch-style device that allows Ben to change into a multitude of various aliens; each with their own special abilities and skills. The storylines alternate between that of eleven-year-old Ben (one year after the original series) and sixteen-year-old Ben (a few months after Ben 10: Ultimate Alien). After Gwen leaves for college and Kevin leaves to be closer to her, Ben gets a new partner, a rookie by-the-book alien plumber named Rook Blonko (surname first). On a mission to explore a secret underground alien city named Undertown, Ben explores the quirkier side of things in the alien underground and discovers that enemies from his past are looking for a rematch.
In "T.G.I.S.", it is revealed that the Ben 10 universe shares the same universe with The Secret Saturdays.
Episodes
Voice cast
Principal voice actors
Yuri Lowenthal – Ben Tennyson (16-years-old), Feedback, XLR8, Albedo (Human form), AmpFibian, Kickin Hawk, The Worst, Walkatrout, Molestache, Pesky Dust (1st Time), Hervé, Upgrade, Lt. Steel, Sumo Slammer, N-8, Alien Kid
Bumper Robinson – Rook Blonko, Bloxx, Terraspin, Jury Rigg, Corvo, Ball Weevil, Doc Saturday, Punchinello, Crujo, Alan Albright, Parallelogram Vreedle
Paul Eiding – Max Tennyson, Liam, Eye Guy, Blukic, Zed, Hoodlum, Ultimate Spidermonkey
Dee Bradley Baker – Lodestar, Spidermonkey, Water Hazard, NRG, Clockwork, Nanomech, Swampfire, Big Chill, Crashhopper, Astrodactyl, Psyphon, Echo Echo, Wildvine, Caitliff, Hulex Colonel, Thirteen, Ultimate Echo Echo, the Worst, Wildmutt, Stinkfly, Acid Breath, Kraab, Slix Vigma
Eric Bauza – Diamondhead, Eatle, Grey Matter, Upchuck, Chromastone, Driba, Dr. Psychobos, Fistrick, Megawhatt, Articguana, Way Big, Albedo (Galvan form), Bellicus (of Alien X), Pax, Solid Plugg, Ripjaws, Lackno, Mechaneer, Trombipulor, Computrons, Rook Da, Thunderpig, Commander Raff, Cast Iron, Poltroon, Ultimate A |
https://en.wikipedia.org/wiki/Procera%20Networks | Procera Networks is a networking equipment company based in Fremont, California, United States, that designs and sells Network Intelligence solutions based on deep packet inspection (DPI) technology. Procera sells solutions to telecom operators, governments, enterprises, and network equipment vendors in the areas of Analytics, Traffic Management, Policy and Charging Control, and Service Provider Compliance.
History
Procera was incorporated in 2002 in California. The company was initially created to deliver intelligent Ethernet network switches. The company changed its product line when it merged with Netintact, a company based in Varberg, Sweden, that offered bandwidth management products to Scandinavian network operators under the PacketLogic brand. The merger was announced in May and closed in June 2006. Procera shifted the company product strategy to the Netintact product lines.
From 2006 to 2008, Procera sold inexpensive (less than 2 Gbit/s) traffic management products to small operators and enterprises, to operators like Com Hem in Sweden. In September 2007, Procera Networks became listed on the American Stock Exchange with stock symbol PKT.
Beginning in 2008, Procera began focusing on larger carriers and mobile operators. Several customers reported they use Procera's technology, such as Yoigo and Genband, which resells Procera products as its P-Series products.
Procera was named one of the fastest growing network companies by Deloitte for 2010 and 2011 as part of its Deloitte Fast 500 study. On June 24, 2011, Procera Networks joined the Russell 3000 Index. In December 2011, Procera moved to the NASDAQ stock exchange using the symbol PKT.
In 2013, Procera bought Vineyard Networks, a Canadian DPI company for Can$28 million. The Vineyard product is sold on the market as Network Application Visibility Library (NAVL) to network equipment vendors.
In 2015, Procera was acquired by Francisco Partners, a private equity firm based in San Francisco Procera now operates as a private company and is no longer listed on NASDAQ. In 2017, Francisco Partners acquired Sandvine and merged it with Procera.
Technology
Procera offers Network Intelligence solutions based on their version of deep packet inspection (DPI) called the Datastream Recognition Definition Language (DRDL). DRDL uses properties of applications for identification purposes, and this allows operators to manage subscriber traffic based on the application, similar to many DPI products. Procera offers over 100 use cases in Analytics, Traffic Management, Policy Enforcement, and Service Provider Compliance.
Controversy
In October 2016 it was alleged that Procera had sold its DPI software to the government of Turkey via the telecoms company Turk Telecom in order to reveal the usernames and passwords of people visiting unencrypted websites. According to Forbes, there was significant internal opposition from technologists working for Procera to the sale. Current and former employees are sa |
https://en.wikipedia.org/wiki/Karauridae | The Karauridae are a family of stem-group salamanders (Caudata) that are known from the Middle Jurassic to Late Jurassic in Central Asia (Kazakhstan and Kyrgyzstan) and Western Europe (United Kingdom). The family includes three members: Karaurus from the Middle-Late Jurassic Karabastau Formation of Kazakhstan, Kokartus from the Middle Jurassic Balabansai Formation of Kyrgyzstan, and Marmorerpeton from the Middle Jurassic Forest Marble Formation of England and Kilmaluag Formation of Scotland. The members are some of the oldest known salamanders. The family is united by several morphological characters, including sculptured skull roof bones. Like some modern salamanders, karaurids were neotenic. Members of the family likely fed via suction feeding on small fish and invertebrates. The Early Cretaceous Siberian Kulgeriherpeton has been suggested to be a karaurid by some authors.
References
External links
Tetrapod Zoology article on Karaurids and other early Caudatans
Prehistoric amphibian families
Bathonian first appearances
Late Jurassic extinctions
Fossil taxa described in 1978 |
https://en.wikipedia.org/wiki/Open%20House%20%28American%20Horror%20Story%29 | "Open House" is the seventh episode of the first season of the television series American Horror Story, which premiered on the network FX on November 16, 2011. The episode was written by co-creator and executive producer Brad Falchuk and was directed by Tim Hunter. This episode is rated TV-MA (LSV).
In this episode, Violet (Taissa Farmiga) is confronted by a revelation, while Vivien (Connie Britton) learns she is pregnant with twins.
In 2012, this episode was nominated for a Primetime Emmy Award for Outstanding Art Direction for a Miniseries or Movie.
Plot
A flashback shows that in 1994, Constance learns that Beau, her deformed son who lives chained in the house's attic, may be taken away, due to her neglectful parenting. In love with Constance, Larry euthanizes Beau, in order to prevent it.
Violet takes solace in Tate, who reveals that he is aware of the ghosts, and says they will not harm her if she just tells them to leave her alone. He shows her some old photographs he found of the Montgomerys. Vivien learns that she is pregnant with twins.
Resolved to be up front with prospective buyers about the house's past, she learns of the Montgomerys and learns that Charles revived their son into a monster, causing his wife Nora to go insane and kill Charles and herself. A sleazy developer becomes interested in the house, and reveals his plan to tear down the gazebo and build a swimming pool, leading young Moira to seduce him in hopes that he will buy the property and her remains will be discovered.
Ben confronts Larry at his home, and learns that Larry's wife immolated herself and their daughters in the house after he confesses he was leaving them for Constance, and wants the house so he can be with Constance. Ben mocks him by saying the developer will buy the house and tear it down to build condominiums. Constance learns of this and attempts to appeal to the developer, but he cruelly rebuffs her. She informs Moira that he lied to her about the gazebo and intends to build condos instead, which would seal Moira on the grounds forever. They put aside their enmity, and with Larry's help, lead the developer into the basement and suffocate him with a rubber bag. They quickly take him off the grounds before he dies.
Violet shares the photos of the Montgomerys with Vivien, who is shocked to find that she recognizes Nora as one of the interested buyers for the house ("Murder House").
Production
Series co-creator Ryan Murphy has admitted his obsession with the character of Marcy, the realtor, played by Christine Estabrook, who was more prominent in "Open House". He stated, "I love her! I love her! Every episode we're like 'We're killing Marcy this episode. This is the episode.' And then we get to writing her and she's too hilarious to kill. I think she's been a great source of levity and I think she's a terrible person. She's a racist and a homophobe and the worst realtor in the world. She's that incompetent bumbler. I like to imitate her in the writer |
https://en.wikipedia.org/wiki/Rubber%20Man | "Rubber Man" is the eighth episode of the first season of the television series American Horror Story, which premiered on the network FX on November 23, 2011. The episode was written by co-creator and executive producer Ryan Murphy and was directed by Miguel Arteta. This episode is rated TV-MA (LSV).
In this episode, the identity of the Rubber Man and the father of Vivien (Connie Britton)'s twins are revealed while she is driven insane by some of the house's occupants. Kate Mara and Zachary Quinto guest star as Hayden McClaine and Chad Warwick, respectively. Jessica Lange is absent in this episode.
The episode was released to mixed reviews, and holds a 58% approval rating on Rotten Tomatoes.
Plot
Flashbacks reveal Tate to be the Rubber Man, who fathered Vivien's twins, attempting to provide a distraught Nora with a baby. The outfit is revealed to be a bondage suit Chad bought in hopes of reigniting his and Patrick's failing relationship. Tate donned the suit and killed Patrick and Chad after they decided not to have a child, hoping that a new family would move in and have a child, which Nora could then have instead. Moira gave Tate the couple's gun, which Tate used to make it look like a murder-suicide.
Hayden conspires with Nora to drive Vivien insane so that they can have her twins after she is committed. After many poltergeists, Vivien becomes unnerved and Moira, who opposes Hayden, tells her about "The Yellow Wallpaper" and that the house is haunted, urging her to leave while she still can. Vivien and Violet leave, but are confronted by the ghosts of the house intruders ("Home Invasion") outside, fleeing back into the house. Ben believes that Vivien is mentally unstable, since the police found no evidence of the intruders' presence, and prohibits her from leaving under threat of legal action, believing she is trying to take Violet and the twins away from him. Though she also saw the ghosts, Violet, afraid to leave Tate, lies and says she didn't see anything. Betrayed, Vivien later steals Marcy's handgun for protection. Hayden convinces Tate, as the Rubber Man, to attack Vivien. During the attack, Vivien accidentally shoots Ben, who heard the commotion. He medicates her until the police arrive, convinced she is a danger to herself and others. Luke arrives, having received the panic alert, and he and Ben argue. However, Vivien's reaction to another poltergeist results in the police taking her away to be committed. Vivien is heartbroken, but consoled that she can finally leave the house. Violet feels guilty because she lied, though Tate tells her that he'll always be there for her.
Production
Evan Peters didn't find out until shooting began for "Rubber Man" that he was intended to be Rubber Man, and that he was both "shocked and grateful." About his character's interaction with Nora Montgomery (Lily Rabe), he added, "He sees that Nora's soul is disturbed and is very sad. He has this sort of sweet spot for people like that. It resonates with |
https://en.wikipedia.org/wiki/Spooky%20Little%20Girl | "Spooky Little Girl" is the ninth episode of the first season of the television series American Horror Story, which premiered on the network FX on November 30, 2011. The episode was written by Jennifer Salt and was directed by John Scott. This episode is rated TV-MA (LSV).
In this episode, a famous murder victim visits the house while Constance (Jessica Lange) learns of Tate's (Evan Peters) bad behavior. Kate Mara guest stars as Hayden McClaine. Taissa Farmiga is absent in this episode.
Plot
A flashback to 1947 shows a dentist, who lives and works out of the house, putting Elizabeth Short (Black Dahlia) under anesthesia and raping her, but accidentally kills her. Dr. Montgomery dismembers her and her remains are later found in a field.
A detective and Hayden's sister arrive at the house, believing Hayden has been murdered, but Hayden convinces them she's alive. Ben is told by a doctor that he is the father of only one of Vivien's twins. Ben walks in on young Moira and Elizabeth trying to seduce him and has enough; he fires Moira and throws Elizabeth out.
Believing that Vivien cheated on him, Ben visits her in the ward. Thinking she is asleep, he berates her over the supposed hypocrisy and says he will never help her leave. Ben later tells Hayden he never loved her. Heartbroken, she lies that Luke slept with Vivien.
Constance tries to make up with her younger boyfriend Travis and proposes to him, believing they can raise Tate's child together as a family. When he refuses, she mocks his dreams of becoming famous and he has sex with Hayden, who murders him. Travis' body is dismembered by Dr. Montgomery and taken away by Larry. His body is displayed in the same manner as Elizabeth's.
Constance, desiring the child, visits Vivien in the ward, expressing her support for her. Vivien confides in her that she was raped by the Rubber Man, but will pretend it was a hallucination in order to be discharged from the ward. Ben confronts Luke, the security officer Vivien employed, but learns that he is infertile and therefore could not be the father. As Moira leaves, Ben finds the Rubber Man mask and demands to know the truth, now realizing that Vivien is not crazy and was indeed raped. Moira congratulates him for finally starting to see the truth, appearing to him for the first time in her "true" elderly form.
Billie Dean Howard states to Constance that a child that is conceived between a ghost and a human is the Antichrist and will usher in the Apocalypse.
Production
The episode was written by co-executive producer Jennifer Salt, and directed by John Scott.
About using the Black Dahlia storyline, series co-creator Ryan Murphy said he's always been interested in unsolved L.A. crimes. "The thing that fascinated me about the case is that there were more than 60 people who claimed credit for that murder," he said. "I've always been obsessed about that idea, that our culture [wants to know] what fame is about. Once I started researching the Black Dahlia fo |
https://en.wikipedia.org/wiki/Maximite | Maximite Microcomputer is a Microchip PIC32 microcontroller-based microcomputer. Originally designed as a hobby kit, the Maximite was introduced in a three-part article in Silicon Chip magazine in autumn of 2011 by Australian designer Geoff Graham.
The project consists of two main components — a main circuit board and the MMBasic Interpreter, styled after GW-BASIC.
Versions
Maximite version 2.7 is still an open source project. Several hobbyists have produced their own custom versions, often using commercially available prototyping circuit boards.
Clones
Several Maximite clones were designed and released in the months following its introduction.
Some, such as the Maximite SM1, and Geoff Graham's latest version, the Mini-Maximite, are hardware- and software-compatible with the original design, but use a different form factor.
Others, like the DuinoMite, from the Bulgarian company Olimex, have altered the hardware by adding Arduino headers. This makes it easier to use hardware designed for Arduino boards, but modified firmware is needed to use this functionality. Some of these changes have been incorporated in the official version as it gets updated.
Australian Distributor Dontronics and United States programmer Ken Segler have been active in adapting the software to run on the different versions of the hardware.
Geoff Graham has also released an altered version of MMBasic for the UBW32 development Board.
Maximite clones made by US producer CircuitGizmos remain compatible with the original Maximite design and include a very small CGMMSTICK1 that can be used with solderless breadboards, and a Colour Maximite compatible CGCOLORMAX1.
MMBasic
MMBasic 3.x has support for user defined subroutines and modern Line-numberless structure. This MMBasic 3.x has been released in several versions including support for the Olimex Duinomite, UBW32 and CGMMStick variants.
While the versions of MMBasic prior to 3.x were available as free and open-source software distributed under the GNU General Public License, for the 3.x versions the license was changed to a proprietary one, with the source code available free of charge for personal use.
ICeemite
On 11 May 2013, an IC-style version named DTX2-4105C (later given the name "ICeemite"), entirely designed for inclusion into embedded systems was announced by the Australian company Dimitech. This new revision of the original Maximite brings a real-time clock and a microSD card connector on board and fits into a PLCC-68 socket. As of the day of announcement it was the world's smallest full Maximite system.
ICeemite offers custom built firmware with additional extras used in embedded systems such as multitasking and power management, but does not support colour graphics.
Colour Maximite
A new version of the Maximite was featured in the September 2012 Issue of Silicon Chip Magazine.
New features in the Colour Maximite are.
100pin Version PIC32
Colour VGA with eight colours (black, red, green, blue, cya |
https://en.wikipedia.org/wiki/List%20of%20Mobile%20Suit%20Gundam%20AGE%20episodes | This is a list of episodes from the anime series Mobile Suit Gundam AGE. The series premiered on October 9, 2011 on the terrestrial MBS and TBS networks, occupying the networks' noted Sunday 5:00 p.m. schedule.
The story of this installment of the Gundam meta-series is divided into four arcs. Each of the first three arcs focus on one among three different protagonists who are members of the same family (a father, his son and his grandson), each one piloting his own version of the eponymous mecha during an interplanetary conflict that spans a whole century. The first arc is set between episodes 1 and 15, with by Galileo Galilei as its opening song and by Minami Kuribayashi as its ending song. The second arc is set between episodes 16 and 28, with "sharp#" by Negoto as its opening song, and "My World" by SPYAIR as its ending song. The third arc is set between episodes 29 and 39 with "Real" by ViViD as its opening song, and "WHITE Justice" by Faylan as its ending song. A fourth and final arc focusing on all three protagonists at once is set between episodes 40 and 49 with "AURORA" by Aoi Eir as its opening song, and "Forget-me-not ~Wasurenagusa~" by FLOWER as its ending song.
Arc 1: Flit
Arc 2: Asemu
Arc 3: Kio
Arc 4: Three Generations
References
General
http://www.gundam-age.net/
Specific
Mobile Suit Gundam AGE
AGE |
https://en.wikipedia.org/wiki/Decisive%20Battles%20of%20WWII%3A%20Battles%20in%20Normandy | Decisive Battles of WWII: Battles in Normandy is a 2004 computer wargame developed by Strategic Studies Group and published by Matrix Games. It is the third game in the Decisive Battles of WWII series, following The Ardennes Offensive (1997) and Korsun Pocket (2003). A fourth game in the series, Battles in Italy, was released in 2005.
Gameplay
Set in World War II, Battles in Normandy is a turn-based computer wargame that simulates the conflicts between Germany and Allied forces that surrounded Operation Overlord.
Development
The game features a new game engine different from that of earlier Decisive Battles games.
Reception
Bob Proctor reviewed the game for Computer Gaming World, and stated that "it adheres tightly to the point of view of a Corps commander. It gives you data on weather, terrain, unit strength and condition but fails to provide any idea of combat odds or why a particular combat result occurred. You get a feel for this only after many games."
GameSpots Tracy Baker wrote, "Take one of the best operational-level World War II wargame engines ever devised, improve it, and cross it with one of the most compelling campaigns in military history, and you get Battles in Normandy". In Computer Gaming World, Di Luo argued that it "may be the best operational-level computer war game on the market today."
The editors of Computer Gaming World named Battles in Normandy the 2004 "War Game of the Year". They wrote, "This operational-level look at the Normandy campaign is probably the best war game on the market and is a must-have for any war gamer's collection." The game was the winner of the Best 20th Century+ PC Game Charles Roberts Award in 2004. Its release date was 15 September 2004.
Reviews
Casus Belli #43 (Feb 1988)
References
2004 video games
Strategic Studies Group games
Turn-based strategy video games
Computer wargames
Video games developed in Australia
Windows games
Windows-only games
World War II video games
Matrix Games games
Single-player video games |
https://en.wikipedia.org/wiki/Simulation%20%26%20Gaming | Simulation and Gaming: An Interdisciplinary Journal of Theory, Practice and Research, is a bimonthly peer-reviewed scientific journal that covers the field of computer simulation and gaming, including virtual reality, serious games and educational games. The editors-in-chief are Toshiko Kikkawa and Marlies P. Schijven. It was established in 1970 and is published by SAGE Publications.
Abstracting and indexing
The journal is abstracted and indexed in:
Academic Search
EBSCO databases
ERIC
Inspec
PsycINFO
Scopus
References
External links
SAGE Publishing academic journals
English-language journals
Computer science journals
Bimonthly journals
Academic journals established in 1970 |
https://en.wikipedia.org/wiki/Linspire | Linspire (formerly Lindows) is a commercial operating system based on Debian and Ubuntu and currently owned by PC/OpenSystems LLC. It had been owned by Linspire. Inc. from 2001 to 2008, and then by Xandros from 2008 to 2017.
On July 1, 2008, Linspire stockholders elected to change the company's name to Digital Cornerstone, and all assets were acquired by Xandros.
On August 8, 2008, Andreas Typaldos, CEO of Xandros, announced that Linspire would be discontinued in favor of Xandros; Freespire would change its base code from Ubuntu to Debian; and the Linspire brand would cease to exist.
On January 1, 2018, it was announced that PC/OpenSystems LLC had purchased Linspire and Freespire from Xandros, and that Linspire 7 was available for $79.99, while Freespire 3 was available for free.
History
Based in San Diego, California, Lindows, Inc. was incorporated in July 2001 by Michael Robertson and began selling products in January 2002. Robertson's goal was to develop a Linux-based operating system capable of running major Microsoft Windows applications. It based its Windows compatibility on the Wine API. The company later abandoned this approach in favor of attempting to make Linux applications easy to download, install and use. To this end a program named "CNR" was developed: based on Debian's Advanced Packaging Tool, it provides an easy-to-use graphical user interface and a slightly modified package system for an annual fee. The first public release of Lindows was version 1.0, released in late 2001.
In 2002, Microsoft sued Lindows, Inc. claiming the name Lindows constituted an infringement of their Windows trademark. Microsoft's claims were rejected by the court, which asserted that Microsoft had used the term windows to describe graphical user interfaces before the Windows product was ever released, and that the windowing technique had already been implemented by Xerox and Apple Computer many years before. Microsoft sought a retrial and after this was postponed in February 2004, offered to settle the case. As part of the licensing settlement, Microsoft paid an estimated $20 million, and Lindows, Inc. transferred the Lindows trademark to Microsoft and changed its name to Linspire, Inc.
On June 15, 2005, Michael Robertson stepped down as CEO of Linspire, Inc. He continues as chairman and was replaced as CEO by Kevin Carmony.
Linspire became a member of the Interop Vendor Alliance which was founded in 2006.
On February 8, 2007, Linspire, Inc. and Canonical Ltd, the lead sponsor and developer of the Ubuntu operating system, announced plans for a new technology partnership, with Linspire aiming to "begin basing ... [their] desktop Linux offerings on Ubuntu."
On June 13, 2007, Linspire and Microsoft announced an interoperability collaboration agreement with a focus on document format compatibility, instant messaging, digital media, web search, and patent covenants for Linspire customers. This agreement was criticised, most notably by the Groklaw web |
https://en.wikipedia.org/wiki/Triton%20Quick%20Disk%20Drive | The Triton Quick Disk Drive is a product that allows 2.8-inch floppy disks to be read on the Commodore 64, ZX Spectrum, MSX, Mattel Aquarius and Dragon 64 home computers. The product was released for sale in the mid-1980s.
The disk drive can be used with Hitachi Maxell 2.8-inch double sided floppy disks, with a capacity of 144 kilobytes non-formatted and 100 kilobytes formatted. Each side has 20 sectors of 2.5 kB written in a spiral pattern instead of the more usual circular tracks. A maximum of 20 files can be saved on each side of the floppy disks.
The data transfer rate is up to 100 kilobits per second. The disk drive measures 250 x 225 x 65 mm, weighing in at 3.2 kilograms.
Triton and Commodore 64
For use on the Commodore 64, the controller/interface box contains an EPROM with an additional operating system, C-64 T-DOS, that when connected to the computer through the memory expansion port can be called by typing "SYS 32768". This activated various new commands;
@Dn
@Format
@Dir
@Save
@ASave
@Write
@Load
@Run
@Aload
@Kill
@Quit
@ACopy
@CassCopy
If something goes wrong, 14 different error messages will give indications about what may have happened.
Triton and Spectrum
For use on the Spectrum computer, the controller/interface box contains an EPROM with an additional operating system, Spectrum T-DOS, adding various new commands to the computer:
Format *n
Cat *n
Save *n;b;'file name'
Save *n;m;'file name; startadd; endadd
Load *n; 'file name'
Erase *n; 'file name'
Copy *n1 to n2; 'file name'
Copy
These commands can be used in BASIC programs, as long as the controller is connected.
If something goes wrong, 11 different error messages will give indications about what may have happened.
References
External links
Triton Quick Disk for C64 on Commodore64.se
Triton Quick Disc on World of Spectrum
Floppy disk drives
Commodore 64 peripheral manufacturers |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.