source stringlengths 32 199 | text stringlengths 26 3k |
|---|---|
https://en.wikipedia.org/wiki/Aaron%20Williams%20%28composer%29 | Aaron Williams (1731–1776) was a Welsh teacher, composer, and compiler of West Gallery music, active in Britain during the 18th century.
Life
Williams was probably born in Caldicot, Monmouthshire, the son of William Morgan. He served as clerk of the Presbyterian Scots Church, London Wall.
Publications
Williams's publications include:
The Universal Psalmodist, 1763 (2nd ed., 1764; 3rd ed., 1765; 4th ed., 1770)
[Daniel Bayley], The Royal Melody Complete, 3d ed., Boston, 1767 (an unauthorized compilation of music from William Tans'ur's Royal Melody Complete and Williams's Universal Psalmodist; subsequent editions, entitled The American Harmony, or Universal Psalmodist, were issued by Bayley in Newburyport, Massachusetts in 1769, 1771, 1773 and 1774).
Royal Harmony; or, The Beauties of Church Music, ca. 1765
Psalmody in Miniature, 1769 (2nd ed., in 3 books, 1778; supplements added in 1778 and 1780; 3rd ed., in 5 books, 1783)
The New Universal Psalmodist, 1770 (6th ed., 1775)
An Ode or Anthem for the New Year, 1770
Two New Anthems for Christmas-Day, 1770
Comfort ye, my people: A new Christmas anthem, 1775
British Psalmody, London, ca. 1785
These publications included several fuguing tunes. Six of his anthems were included in Thomas Williams's Harmonia Coelestis (1780).
Influence on early American sacred music
Harmonic idiom
The unorthodox harmonic idiom of the Yankee tunesmiths (the "First New England School" of choral composers) shows the influence of English composers such as Williams and William Tans'ur:
For the most part the Yankee composer's source of information about harmonic practices derived from the music and writings on music of such comparatively unskilled English composers as William Tans'ur (1796–1783) and Aaron Williams (1731–1776), who were themselves somewhat outside the mainstream of European sacred music. Many of the traits that may be thought unique to American psalmodists in fact characterize the compositions of their British cousins too.
In particular, "it is clear that [William Billings] had studied the works of English psalmodists such as William Tansur and Aaron Williams."
St. Thomas
Williams's tune "St. Thomas" was originally the second quarter of his longer "Holborn," published in his Universal Psalmodist (1763) and attributed to him based on the statement there, "never before printed." It was first published in its shortened form in Thomas Knibb's The Psalm-Singer's Help (c. 1769), included by Williams in his 1770 New Universal Psalmodist, and printed again in Isaac Smith's A Collection of Psalm Tunes (c. 1780).
In the United States, "St. Thomas" was published in several shape note tunebooks, including the following:
William Little and William Smith, The Easy Instructor (1801), p. 101
David Clayton and James Carrell, The Virginia Harmony (1831), p. 79 (attributed to "Handel")
The Methodist Harmonist (1833), no. 119, p. 93
Allen D. Carden, The Missouri Harmony (1834), p. 33
W. L. Chappell, The Western L |
https://en.wikipedia.org/wiki/List%20of%20number-one%20Billboard%20Latin%20Pop%20Albums%20from%20the%202000s | Latin Pop Albums, published in Billboard magazine, is a record chart that features Latin music sales information in regard to Latin pop music. The data is compiled by Nielsen SoundScan from a sample that includes music stores, music departments at electronics and department stores, Internet sales (both physical and digital) and verifiable sales from concert venues in the United States.
Number-one albums
Key
– Best-selling Latin pop album of the year
References
General
For information about each week of this chart, follow this link; select a date to view the top albums for that particular week
Specific
Pop 2000s
United States Latin Pop Albums
2000
2000s in Latin music |
https://en.wikipedia.org/wiki/V%C3%A4sterg%C3%B6tland%20Runic%20Inscription%2090 | Västergötland Runic Inscription 90 or Vg 90 is the Rundata listing for a Viking Age memorial runestone located in Torestorp, which is about three kilometers northwest of Gudhem, Västra Götaland County, Sweden, and in the historic province of Västergötland.
Description
The inscription on Vg 90 consists of runes carved in the younger futhark in a text band that forms an arch that then curves back in the interior for one word. A small cross is in the upper part of the interior. The stone, which is made of limestone and is 2.1 meters in height, is classified as being carved in runestone style RAK, which is considered to be the oldest style. This is the classification where the ends of the text bands are straight and do not have any attached serpent or beast heads. The runestone, which is located on a natural hill, was noted in a letter written by King Magnus III in 1287. This is believed to be the first modern notice of the existence of runestones in Sweden. The unnamed runemaster who carved Vg 90 is also believed to have carved inscription Vg 85 in Stora Dala.
The runic text states that the stone was raised by a man named Bróðir as a memorial for a son whose name cannot be clearly determined. The deceased son is described as being harða goðan dræng or "a very good valiant man," using the term drengr. A drengr in Denmark was a term mainly associated with members of a warrior group. It has been suggested that drengr along with thegn was first used as a title associated with men from Denmark and Sweden in service to Danish kings, but, from its context in inscriptions, over time became more generalized and was used by groups such as merchants or the crew of a ship. Other runestones describing the deceased using the words harþa goþan dræng in some order include DR 1 in Haddeby, DR 68 in Århus, DR 77 in Hjermind, DR 127 in Hobro, DR 268 in Östra Vemmenhög, DR 276 in Örsjö, DR 288 and DR 289 in Bjäresjö, Sm 48 in Torp, Vg 61 in Härlingstorp, Vg 112 in Ås, Vg 114 in Börjesgården, the now-lost Vg 126 in Larvs, Vg 130 in Skånum, Vg 153 and Vg 154 in Fölene, Vg 157 in Storegården, Vg 162 in Bengtsgården, Vg 179 in Lillegården, Vg 181 in Frugården, Vg 184 in Smula (using a plural form), the now-lost Ög 60 in Järmstastenen, Ög 104 in Gillberga, and possibly on U 610 in Granhammar. On Vg 90, the runes trik for "drengr" have been emphasized by their placement on the portion of the text band that bends back in the interior, although one scholar has suggested that this arrangement may have been caused by "faulty planning" on the part of the runemaster. If the name of the father is correctly read as Bróðir, the runemaster spelled the name as burþiʀ using a reverse-read "ur." A punctuation mark consisting of a × was used as a word divider between each word of the runic text.
Inscription
Transliteration of the runes into Latin characters
burþiʀ × sati × stin × þonsi × iftiʀ × h(i)--o × sun × sin × harþa × kuþan × trik ×
Transcription into Old Norse
Broðiʀ satti s |
https://en.wikipedia.org/wiki/Service%20virtualization | In software engineering, service virtualization or service virtualisation is a method to emulate the behavior of specific components in heterogeneous component-based applications such as API-driven applications, cloud-based applications and service-oriented architectures.
It is used to provide software development and QA/testing teams access to dependent system components that are needed to exercise an application under test (AUT), but are unavailable or difficult-to-access for development and testing purposes. With the behavior of the dependent components "virtualized", testing and development can proceed without accessing the actual live components.
Service virtualization is recognized by vendors, industry analysts, and industry publications as being different than mocking. See here for a Comparison of API simulation tools.
Overview
Service virtualization emulates the behavior of software components to remove dependency constraints on development and testing teams. Such constraints occur in complex, interdependent environments when a component connected to the application under test is:
Not yet completed
Still evolving
Controlled by a third-party or partner
Available for testing only in limited capacity or at inconvenient times
Difficult to provision or configure in a test environment
Needed for simultaneous access by different teams with varied test data setup and other requirements
Restricted or costly to use for load and performance testing
Although the term "service virtualization" reflects the technique's initial focus on virtualizing web services, service virtualization extends across all aspects of composite applications: services, databases, mainframes, ESBs, and other components that communicate using common messaging protocols. Other similar tools are called API simulators, API mocking tools, over the wire test doubles.
Service virtualization emulates only the behavior of the specific dependent components that developers or testers need to exercise in order to complete their end-to-end transactions.
Rather than virtualizing entire systems, it virtualizes only specific slices of dependent behavior critical to the execution of development and testing tasks. This provides just enough application logic so that the developers or testers get what they need without having to wait for the actual service to be completed and readily available. For instance, instead of virtualizing an entire database (and performing all associated test data management as well as setting up the database for every test session), you monitor how the application interacts with the database, then you emulate the related database behavior (the SQL queries that are passed to the database, the corresponding result sets that are returned, and so forth).
Application
Service virtualization involves creating and deploying a "virtual asset" that simulates the behavior of a real component which is required to exercise the application under test, but is difficult |
https://en.wikipedia.org/wiki/Oscilla%20tricordata | Oscilla tricordata is a species of sea snail, a marine gastropod mollusk in the family Pyramidellidae, the pyrams and their allies.
Distribution
This marine species occurs off Japan and Korea
References
Higo, S., Callomon, P. & Goto, Y. (1999). Catalogue and bibliography of the marine shell-bearing Mollusca of Japan. Osaka. : Elle Scientific Publications. 749 pp.
Ronald G. Noseworthy, Na-Rae Lim, and Kwang-Sik Choi, A Catalogue of the Mollusks of Jeju Island, South Korea; Korean Journal of Malacology, Vol. 23(1): 65-104, June 30, 2007
External links
To World Register of Marine Species
Pyramidellidae
Gastropods described in 1938 |
https://en.wikipedia.org/wiki/One%20Lucky%20Elephant | One Lucky Elephant is an American documentary film directed by Lisa Leeman that premiered December 1, 2011 on OWN: Oprah Winfrey Network as part of the OWN Documentary Club. The film focuses on the extraordinary human-animal bond between Circus Flora founder, Ivor David Balding, and Flora an endangered African elephant, and their journey to find her a permanent home that leads them to The Elephant Sanctuary (Hohenwald). The film provides insightful research footage to further discussion of the human-animal bond as part of anthrozoology (human–animal studies), a new academic field that examines the relationships between non-human and human animals.
Synopsis
Where does an elephant go after a life in the circus? Sixteen years have passed since circus producer Ivor David Balding adopted Flora, the orphaned baby African elephant he lovingly raised as part of his family and made the star of his show. As Flora approaches adulthood, he realizes that she is not happy performing. Ultimately, David must face the difficult truth that the circus is no place for Flora. She needs to be with other elephants. The road to Flora’s retirement, however, is a difficult and emotional journey which tests their bond in unexpected ways. Ten years in the making, One Lucky Elephant explores the consequences of keeping wild animals in captivity, while never losing sight of the delicate love story at its heart.
Cast
Ivor David Balding as himself
Flora the African Elephant as herself
Laura Balding as herself
Carol Buckley as herself
Willie Theison as himself
Production
One Lucky Elephant was directed and co-written by Lisa Leeman and produced and co-written by Cristina Colissimo and produced by Jordana Glick-Franzheim. The film was shot over ten years on location in St. Louis, Missouri, Zoo Miami in Florida, Pittsburgh Zoo & PPG Aquarium in Pennsylvania and at The Elephant Sanctuary in Tennessee. According to the director, the introduction to the characters came from, "Miriam Cutler, a composer who specializes in docs and who co-produced and scored this film, has been the resident composer for Circus Flora since its early days. Miriam was fascinated watching Flora grow up in the circus, and when she heard that David Balding wanted to retire Flora -- his 18-year-old African elephant, the star of his circus and sort of his surrogate daughter – – and send her back to Africa, she thought it would make a terrific film, and started calling documentary directors she knew."
The filmmakers originally set out to tell the story of Flora's journey back to Africa, but when that plan took a detour that put the production of this film in financial jeopardy, the producers, "kept on filming for nearly 8 years. We had arranged for Flora to temporarily live with the small herd of African elephants at Zoo Miami, the zoo my father had founded. Flora's financial needs quickly began to outweigh that of the film, so we founded a non-profit, Ahali Elephants, and began fundraising for her future.. |
https://en.wikipedia.org/wiki/Trolleybuses%20in%20Ruse | The Ruse trolleybus system () is a part of the public transport network of the city and municipality of Ruse, the fifth most populous in Bulgaria. Opened in 1988, the system currently has seven lines and forms the backbone of the city's transport system. Its approximate length is 63 km and has been designed to work with 600V DC electricity, although not all infrastructure is actively in use. Over the years, various models of trolleybuses have been operated in Ruse.
History
Initial years
The first trolleybus in the city of Ruse departed in 1988, along the route starting from the Western Industrial Zone. Lines were operated solely using ZiU trolleybuses. Although it was a new trolleybus system built in difficult times of economic stagnation, which worsened after the fall of the communist regime in the country, the network managed to branch out. Trolleybuses offered reliable transport connections in the busiest transport directions, replacing many bus routes. Retired trolleybuses from the Swiss cities of Basel, Bern, and Winterthur were introduced to the network in the late 1990s.
Private holding
It was announced on November 1, 2008 that Ruse municipality had signed a concession agreement with the Bulgarian branch of the Israeli transport company Egged. Under the concession, management of the trolleybus network in the city became the responsibility of the private Egged Ruse transport holding. The entire stock of vehicles, consisting of Soviet built ZiU and former Swiss trolleybuses, was replaced in several stages between 2008 and 2013 with second-hand trolleybuses from various European countries. In 2015, around 70% of the overhead wire network was replaced under the integrated urban transport project. The repairs also involved repainting and replacing damaged trolleybus pillars. It was during this period that conductor service was discontinued for all trolleybus lines as a permanent cost-cutting measure. Passengers instead purchase subscription and prepaid cards or a single-use ticket directly from the driver. After nearly nine years of operating under a private holding and low overall profitability, the trolleybus transport entity was transferred back to the local municipality on August 31, 2017.
Municipal transport
Since the local municipality reacquisition of the transport holding, many of the aging vehicles in the transit fleet have been retired. However, investments in additional trolleybuses in used condition continued to be made in order to ensure the operation of the trolleybus system. Throughout the city, new switches equipped with automatic remote control functionality have been installed to replace outdated infrastructure and enhance trolleybus performance.
Services
Today, the Ruse trolleybus network has 7 lines:
Fleet
Current fleet
Trolleybus transport in Ruse is operated with used NAW Lauber 91T trolleybuses from Switzerland. They were delivered to the city in excellent technical condition in multiple tranches between 2019 and |
https://en.wikipedia.org/wiki/Computerized%20Criminal%20History | Computerized Criminal History
FBI CCH
On December 10, 1970, the Attorney General decided that the FBI would take over management responsibility for the CCH system, rather than LEAA, a joint LEAA/FBI entity, or a consortium of States. The FBI named the system the Computerized Criminal History (CCH) program and operated it as part of NCIC, using NCIC computers and communication lines.
The CCH program began operations on November 29, 1971, joining wanted persons and stolen property files maintained in the NCIC. On an interim basis, the CCH file was to contain the detailed criminal history of each offender whose record was entered by the States into the system. Eventually, under the single- State/multi-State plan adopted by the FBI, NCIC/CCH would maintain only summary data in the form of an index of single-State offenders, while the States would maintain detailed records. For multi-State offenders and Federal offenders, NCIC/CCH would maintain the detailed records."
CCH Alabama
"CCH (Computerized Criminal History System), an online database of criminal offender information available to qualified criminal justice agencies. CCH provides complete, statewide "rap sheets" on offenders, as well as a rapid flow of criminal offender information that aids criminal justice officials in making more realistic decisions with respect to bail, sentencing, probation, and parole. Alabama is an Interstate Identification Index (III) and Felon Identification in Firearms Sales (FIFS) participant."
CCH Colorado
"The Computerized Criminal History (CCH) database contains detailed information of arrest records based upon fingerprints provided by Colorado law enforcement agencies. Arrests which are not supported by fingerprints will not be included in this database. Additionally, warrant information, sealed records, and juvenile records are not available to the public. To locate information regarding registered sex offenders, you must contact your local law enforcement agency."
CCH Florida
The Falcon Project. "The Florida Department of Law Enforcement (FDLE), in its mission of promoting safety and protecting life, is a nationwide leader in information technology for preventing, investigating, solving, and prosecuting crimes. Its computerized criminal history records (CCH) represent the third largest state criminal history repository in the nation: over 4 million offenders, 15 million arrests. The CCH, along with an automated fingerprint repository (AFIS), has been an invaluable source of information for criminal justice agencies, government, and the public."
CCH Georgia
"GCIC maintains Georgia's computerized criminal history database that includes the fingerprint and criminal history records of more than 2,600,000 persons. Georgia traditionally ranks among the top states in the nation, along with California, New York and Florida in the number of criminal fingerprint records processed each year."
CCH Louisiana
"The Bureau of Criminal Identification and Information man |
https://en.wikipedia.org/wiki/Unicast%20flood | In computer networking, a unicast flood is when a switch receives a unicast frame and treats it as a broadcast frame, flooding the frame to all other ports on the switch.
Background
The term unicast refers to a one-to-one transmission from one point in the network to another point. Conventionally, unicast is considered more secure because the frame is delivered solely to the intended recipient and not to multiple hosts. This diagram illustrates the unicast transmission of a frame from one network host to another:
When a switch receives a unicast frame with a destination address not in the switch’s forwarding table, the frame is treated like a broadcast frame and sent to all hosts on a network:
Causes
The learning process of transparent bridging requires that the switch receive a frame from a device before unicast frames can be forwarded to it. Before any such transmission is received, unicast flooding is used to assure transmissions reach their intended destination. This is normally a short-lived condition as receipt typically produces a response that completes the learning process. The process occurs when a device is initially connected to a network, or is purged from the forwarding information base. An entry is purged when the device is moved from one port to another (causing the link status to change on the original port) or after a MAC table entry expires due to inactivity (5 minutes is the default on Cisco switches).
A switch that has no room left in its address cache will flood the frame out to all ports. This is a common problem on networks with many hosts. Less common is the artificial flooding of address tables—this is termed MAC flooding.
Another common cause are hosts with ARP timers longer than the address cache timeout on switches—the switch forgets which port connects to the host. The solution to prevent this is to have the switch configured with a MAC address timeout longer than the ARP timeout. For example, set the MAC timeout to 360 seconds and the ARP timeout to 300 seconds.
Devices other than switches may create unicast floods as well. A router which has a bridge interface but does not have the destination frame's address in the bridge cache will flood the frame out to all bridge members.
Misconfigured features of the networks may lead to unicast flooding as well. If there are two layer 2 paths from Host A to B and Host A uses path 1 to talk to Host B, but Host B uses path 2 to respond to Host A, then intermediate switches on path 1 will never learn the destination MAC address of Host B and intermediate switches on path 2 will never learn the destination MAC address of Host A.
A final cause of unicast floods are topology changes. When a link state changes on a network port which participates in rapid spanning tree, the address cache on that switch will be flushed causing all subsequent frames to be flooded out of all ports until the addresses are learned by the switch.
Remedies
Blocking unicast floods on a C |
https://en.wikipedia.org/wiki/Neighborhood%20Watch%20%28White%20Collar%29 | "Neighborhood Watch" is the 13th episode of the third season of the American comedy-drama television series White Collar, and the 43rd episode overall. It was first broadcast on USA Network in the United States on January 31, 2012. The episode was directed by Andrew McCarthy and written by Jeff F. King.
The episode has been noted to draw many themes from Alfred Hitchcock's Rear Window. When Elizabeth Burke (Tiffani Thiessen) overhears a neighbor (Joe Manganiello) discussing a future crime, she, Mozzie (Willie Garson), and Neal Caffrey (Matt Bomer) work together to prove his guilt.
According to the Nielsen ratings system, an estimated 3.042 million household viewers watched the original broadcast of the episode, with 1.0 million in the 18–49 demographic. "Neighborhood Watch" received mostly positive reviews, with many complimenting Thiessen's performance.
Plot
After Peter Burke (Tim DeKay) leaves a scanner at home, Elizabeth overhears plans for a robbery. Peter visits the scene of the alleged crime, but finds nothing to suggest that the robbery exists. Neal and Peter attribute Elizabeth’s actions to paranoia stemming from her recent kidnapping by Matthew Keller. However, Mozzie believes that the robbery was real, and begins helping Elizabeth monitor Peter’s scanner. Mozzie and Elizabeth soon hear the same voices from the original transmission, and discover that they are the voices of the Burke’s new neighbors, Ben (Manganiello) and Rebecca Ryan (Lola Glaudini). Elizabeth immediately visits their house, coercing an invitation for dinner that night. While at dinner, Elizabeth excuses herself from the table in order to search the house. She discovers nothing, but soon finds herself locked in a bedroom. Neal, speaking to her through a window, walks her through picking the lock. However, she is soon found by an annoyed Peter.
Peter finally agrees to investigate the Ryans, quickly being informed by Diana Berrigan (Marsha Thomason) that Ben has an armed robbery conviction. As Peter phones Elizabeth to let her know that she was correct, Ben visits the Burke home and vaguely threatens Elizabeth. Clinton Jones (Sharif Atkins) follows Ben and discovers the identity of Ben’s partner: Connor Bailey (Will Chase). In order to get closer to the suspects, Neal visits Ben’s parole office under the alias Nick Halden. Using information gathered by Neal, Peter quickly realizes that the target of the heist is a luxury hotel. Peter and Neal hurry to the hotel, barely missing Ben and Connor. At the Burke home, Elizabeth and Mozzie follow Rebecca as she leaves the house. Realizing that Peter will not reach them in time, Elizabeth approaches the Ryans as an FBI agent. Her attempt fails just as Peter and the FBI arrive.
Production
It was first reported on June 30, 2011 that Joe Manganiello would appear in an episode of White Collar as an ex-con and the Burkes' new neighbor at some point during the second half of the season. A day after Manganiello |
https://en.wikipedia.org/wiki/Mike%20Cannon-Brookes | {{Infobox person/Wikidata
| fetchwikidata = ALL
| name = Mike Cannon-Brookes
| image = Mike Cannon-Brookes Australian businessman.jpg
| image_size = 220px
| caption = Cannon-Brookes in 2018
| birth_name = Michael Cannon-Brookes
| birth_date =
| birth_place = New Haven, Connecticut, U.S.
| death_date =
| death_place =
| nationality = Australian
| education = Cranbrook School
| alma mater = University of New South Wales
| occupation = Co-CEO of Atlassian
| title =
| term =
| predecessor =
| successor =
| known for = Co-founding Atlassian
| boards = Atlassian
| networth = {{ubl| 20.18 bn (Financial Review Rich List 2021)| 13.7 bn (Forbes list of Australia's 50 richest people 2021)}}
| spouse = Annie Todd
| parents =
| children =
| relations =
| website =
}}
Michael Cannon-Brookes (born November 1979) is an Australian billionaire business magnate who is the co-founder and co-CEO of software company Atlassian.
Since 2018, he has been involved in the Australia-Asia Power Link, a huge electricity infrastructure project to be developed in the Northern Territory by Sun Cable in a collaboration with Twiggy Forrest.
Early life and education
Cannon-Brookes was born in November 1979, the son of a global banking executive, also named Mike, and his wife, Helen.
He attended Cranbrook School in Sydney, and graduated from the University of New South Wales with a degree in information systems on a UNSW Co-op Scholarship.
Career
With Scott Farquhar, Cannon-Brookes is the co-founder and co-CEO of Atlassian, a collaboration software company. The pair started the company in 2002, shortly after graduating from university, funding it with credit cards. They claim to have founded Atlassian with the aim of earning the then-typical graduate starting salary of 48,000 at the big corporations without having to work for someone else.
In March 2022, it was reported that Cannon-Brookes and billionaire Andrew Forrest had invested in the Sun Cable project,to build a solar and battery farm in size at Powell Creek, Northern Territory, and a power-cable to link it to Singapore (via Indonesia) leaving Australia at Murrumujuk beach.
In January 2023, Sun Cable went into administration owing to disagreements between Cannon-Brookes and Forrest. In May 2023, Cannon-Brookes' company Grok Ventures outbid Forrest and others to buy the liquidated company.
Other activities
Cannon-Brookes is an adjunct professor at the University of New South Wales' School of Computer Science and Engineering.
In December 2020, Cannon-Brookes bought a minority stake in NBA team Utah Jazz, along with Qualtrics co-founder Ryan Smith.
Cannon-Brookes is a major investor in Australian publicly listed energy company AGL.
In September 2020, it was revealed that Cannon-Brookes was listed on a Chinese Government "Overseas Key Individuals Database" of prominent international individu |
https://en.wikipedia.org/wiki/FTOS | FTOS or Force10 Operating System is the firmware family used on Force10 Ethernet switches. It has a similar functionality as Cisco's NX-OS or Juniper's Junos. FTOS 10 is running on Debian.
As part of a re-branding strategy of Dell FTOS will be renamed to Dell Networking Operating System (DNOS) 9.x or above, while the legacy PowerConnect switches will use DNOS 6.x: see the separate article on DNOS.
Hardware Abstraction Layer
Three of the four product families from Dell Force10 are using the Broadcom Trident+ ASIC's, but the company doesn't use the API's from Broadcom: the developers at Force10 have written their own Hardware Abstraction Layer so that FTOS can run on different hardware platforms with minimal impact for the firmware. Currently three of the four F10 switch families are based on the Broadcom Trident+ (while the fourth—the E-series—run on self-developed ASIC's); and if the product developers want or need to use different hardware for new products they only need to develop a HAL for that new hardware and the same firmware can run on it. This keeps the company flexible and not dependent on a specific hardware-vendor and can use both 3rd party or self designed ASIC's and chipsets.
The human interface in FTOS, that is the way network-administrators can configure and monitor their switches, is based on NetBSD, an implementation which often used in embedded networking-systems. NetBSD is a very stable, open source, OS running on many different hardware platforms. By choosing for a proven technology with extended TCP functionality built into the core of the OS it reduces time during development of new products or extending the FTOS with new features.
Modular setup
FTOS is also modular where different parts of the OS run independently from each other within one switch: if one process would fail the impact on other processes on the switch are limited. This modular setup is also taken to the hardware level in some product-lines where a routing-module has three separate CPU's: one for management, one for L2 and one for L3 processing. This same approach is also used in the newer firmware-families from Cisco like the NX-OS for the Nexus product-line or the IOS XR for the high-end routers (the Carrier Routing Systems) from Cisco. (and unlike the original IOS: processes under IOS aren't isolated from each other). This approach is regarded not only a way to make the firmware more resilient but also increases the security of the switches
Capabilities
All FTOS based switches offer a wide range of layer2 and layer3 protocols. All features are available on all switches: some switch models (in the S-series) offer an additional license for layer3 or routing: this additional license is NOT required to use that protocol, but only required to get support from the Dell Force10 support department on using these features. All interfaces on FTOS running switches are configured as a layer3 interface and by default shutdown. To use such an interface as an etherne |
https://en.wikipedia.org/wiki/Transdev%20Sachsen-Anhalt | Transdev Sachsen-Anhalt (formerly: Veolia Verkehr Sachsen-Anhalt) is a regional railway company, a subsidiary of Transdev Germany. It provided passenger services on the North Harz network from 2005 to 2018 under the name HEX (HarzElbeExpress).
History
Connex Sachsen-Anhalt GmbH was founded on 1 July 2004 with its headquarters in Halberstadt, after the responsibility for the public transport services of the North Harz Network (Nordharz-Netz) was transferred to Connex Regiobahn in the preceding March by the state of Saxony-Anhalt. On 11 December 2005 the Harz-Elbe Express began operations and in 2006 was followed by the takeover of the Klesener bus service, which then continued to be operated under the name SalzlandBus. In February 2009 the bus service was sold.
Also in 2006, following in the footsteps of its parent company, the firm was renamed from Connex Sachsen-Anhalt GmbH to Veolia Verkehr Sachsen-Anhalt GmbH. On 1 April 2008 the KBS 525 line from Leipzig to Geithain was added to the network, and was taken over by Connex Sachsen following a competition. In December 2008, leadership of the operation went to the newly founded Mitteldeutsche Regiobahn, a brand of Veolia Verkehr Regio Ost.
With the December 2018 timetable change, Abellio Rail Mitteldeutschland replaced Transdev Sachsen-Anhalt as the operator of services on the North Harz network.
Incidents
On 29 January 2011 there was a train collision with ten dead on the Magdeburg–Thale railway, when a goods train and a HEX local passenger train collided near Oschersleben-Hordorf.
Network
The Harz-Elbe Express ran on the following routes:
This network represented 11 percent of the entire railway network in the state of Saxony-Anhalt.
Names
Since 11 December 2005 a total of eleven units have been christened with names of regional note. They are named after:
Halberstadt, the cathedral town
the legendary Thale
the old castle of Langenstein
the flower town of Blankenburg (Harz)
THW Halberstadt
the Wernigerode Brocken Express
the Saale valley
the 2010 State Garden Show at Aschersleben (Landesgartenschau Aschersleben 2010)
Halle Zoo
Georg Friedrich Händel (badly damaged in the train accident at Hordorf and subsequently scrapped)
the Bode Gorge (Bodetal). The legendary Harz.
References
External links
Harz-Berlin Express direct
Railway companies of Germany
Rail transport in Saxony-Anhalt
Transport in Saxony-Anhalt
Transport in the Harz
Veolia
Halberstadt
Transdev
Companies based in Halberstadt |
https://en.wikipedia.org/wiki/Death%20Domain%20database | The Death Domain database is a secondary database of protein-protein interactions (PPI) of the death domain superfamily. Members of this superfamily are key players in apoptosis, inflammation, necrosis, and immune cell signaling pathways. Negative death domain superfamily-mediated signaling events result in various human diseases which include, cancers, neurodegenerative diseases, and immunological disorders. Creating death domain databases are of particular interest to researchers in the biomedical field as it enables a further understanding of the molecular mechanisms involved in death domain interactions while also providing easy access to tools such as an interaction map that illustrates the protein-protein interaction network and information. There is currently only one database that exclusively looks at death domains but there are other databases and resources that have information on this superfamily. According to PubMed, this database has been cited by seven peer-reviewed articles to date because of its extensive and specific information on the death domains and their PPI summaries.
The Death Domain superfamily
The evolutionarily conserved Death Domain superfamily is defined by a death fold motif which is formed by several protein-interaction domains. The domains consist of six-seven tightly coiled alpha-helices arranged in a "Greek-key fold". This superfamily is considered one of the largest and most studied protein-protein interaction (PPI) network.
There are four types of death domain subfamilies: death effector domain (DED), caspase recruitment domain (CARD), pyrin domain (PYD), and death domain (DD). These subfamily domains are grouped together because of similarity in their sequence and structure. However, while similar, each domain has its own defining structural feature: a RxDL-motif in the DEDs, an interrupted, first helix in the CARDs, a smaller (or sometimes ambiguous) third helix in PYDs, and a more exposed, flexible third helix in the DDs. Members of this subfamily only form homotypic bonds with the same type of subfamily domain. For example, DED will only bind with DED, CARD-CARD, PYD-PYD and DD-DD. These homotypic interactions are with only two members of the same domain (or on rare occasions with more) and there has been no evidence to suggest that these domains have heterotypic interactions with one another.
Death Domain subfamilies
Death effector domain (DED)
DED domains are highly conserved in the Chordata phylum and can also be found in smaller percentages in the Echinodermata phylum and viruses. DED-containing proteins are associated with apoptosis regulation with caspase protein interaction and have been notably documented in mammals. DED domains have been known to interact with other domains and include: nuclear localization sequences (in DEDD), transmembrane domains (in Bap31 and Bar), nucleotide-binding domains (in Dap3), SAM domains (in Bar), coiled-coil domains (in Hip and Hippi), and E2-binding RING doma |
https://en.wikipedia.org/wiki/IEEE%20802.11ad | IEEE 802.11ad is an amendment to the IEEE 802.11 wireless networking standard, developed to provide a Multiple Gigabit Wireless System (MGWS) standard at 60 GHz frequency, and is a networking standard for WiGig networks. Because it uses the V band of millimeter wave (mmW) frequency, the range of IEEE 802.11ad communication would be rather limited (just a few meters and difficult to pass through obstacles/walls) compared to other conventional Wi-Fi systems. However, the high frequency allows it to use more bandwidth which in turn enables the transmission of data at high data rates up to multiple gigabits per second, enabling usage scenarios like transmission of uncompressed UHD video over the wireless network.
The WiGig standard is not too well known, although it was announced in 2009 and added to the IEEE 802.11 family in December 2012.
After revision, the 60 GHz band covers the frequency of 57 to 71 GHz. The frequency band is subdivided into 6 (previously 4) different channels in IEEE 802.11ad, each of them occupy 2160 MHz of space and provide 1760 MHz of bandwidth.
Some of these frequencies might not be available for the use of IEEE 802.11ad networks around the world (reserved for other purposes or requires licenses). Below is a list of available unlicensed spectrums for IEEE 802.11ad in different parts of the world:
See also
Wireless Gigabit Alliance
IEEE 802.11ay
References
External links
IEEE 802.11ad Tutorial
IEEE 802.11ad White Paper
IEEE Std 802.11ad access entry page
ad
Wireless networking |
https://en.wikipedia.org/wiki/Maximum-value%20composite%20procedure | A maximum-value composite procedure (or MVC) is a procedure used in satellite imaging, which is applied to vegetation studies. It requires that a series of multi-temporal geo-referenced satellite data be processed into NDVI images. On a pixel-by-pixel basis, each NDVI value is examined, and only the highest value is retained for each pixel location. After all pixels have been evaluated, the result is known as an MVC image.
An alternative method is the maximum value interpolated procedure (MVI), which not only retains the NDVI maximum values within a period, but also retains temporal data. This allows the detection of a representative NDVI value for each time period, using simple linear interpolation. A profile simulation shows that MVI has a significant error reduction compared with the MVC method.
References
Satellite meteorology
Remote sensing |
https://en.wikipedia.org/wiki/Assyrian%20population%20by%20country | This is a list of Assyrian populations by country according to official and estimated numbers. Due to a lack of official data in many countries, estimates may vary.
See also
Assyrian–Chaldean–Syriac diaspora
References |
https://en.wikipedia.org/wiki/Puss%20in%20Boots%3A%20The%20Three%20Diablos | Puss in Boots: The Three Diablos is a 2012 American computer-animated short adventure
comedy film. It was directed by Raman Hui and features Antonio Banderas as the voice of the title character. The short was released on February 24, 2012, attached as a bonus feature to the Puss in Boots DVD and Blu-ray (3D) release. The short tells a story of Puss in Boots on a mission to recover a princess' stolen ruby from the notorious French thief the Whisperer. Reluctantly accompanied by three cute little kittens called the Three Diablos, Puss must tame them before they endanger the mission.
Plot
Some time after the Golden Goose incident, Puss in Boots is riding his horse through the desert contemplating the crossroads he found himself at -outlaw or hero?- when he is captured by Italian knights. He is then taken to Princess Alessandra Belagomba, whose "Heart of Fire" Ruby, the crown jewel of her kingdom, is missing. At first, Puss believes he is being wrongfully charged for the theft, but it later turns out that the Princess only wants to hire him based on his reputation, revealing that a French thief called "The Whisperer" was the one who committed the crime and that the Princess' knights have captured his three henchmen. The henchmen turn out to be three kittens, whom the princess refers to as "Diablos". Though Puss cannot believe that such innocent creatures could be thieves, the princess and her guards are terrified of them. The Diablos agree to help Puss on the premise that they will be free if they return the ruby.
When Puss takes the Diablos to the desert, they quickly turn on him (revealing their backstabbing nature) and bury him alive. Puss later escapes and recaptures the Diablos using his wide eyes against theirs. That night, he talks about sending them back to jail for double-crossing him, but he learns that they have no family and are orphans like him. He then sympathetically tells them how he also knows it's tough growing up not knowing whom to trust and being betrayed, making an example of how Humpty led him down the wrong path, just as the Whisperer has done to them. Puss then decides to point the Diablos in the right direction and trains them how to fight and plays with them, becoming friends. He also gives them names: Perla (because she is one of a kind), another Gonzalo (for his scrappy temper) and the other Sir Timoteo Montenegro the Third (a title is all he needs).
The next day, the Diablos, turning over a new leaf, show Puss to the Whisperer's secret hideout, and are immediately confronted by the Whisperer himself, who, by his name, has a low voice volume and uses his hat as a megaphone to speak clearly. It is also revealed that the Whisperer himself has used the heart as a decoration for his own belt. After learning that the Diablos brought Puss to him to recover the heart, the Whisperer is about to punish them for their betrayal, but Puss fights him and lets the Diablos escape. They, however, return to help Puss with what they le |
https://en.wikipedia.org/wiki/MovieWeb | MovieWeb is an entertainment news website and video brand.
Overview
MovieWeb reports on entertainment news through its website. The site also maintains a searchable database of films.
History
MovieWeb first launched in 1995; by 1997 it was reported to be in operation supported by a 4-person team publishing movie information that, while not 'slick', had a 'certain charm'. In 2012, MovieWeb produced a video which was an '80s-themed parody mashup of The Walking Dead series accompanied by music from Growing Pains that went viral.
Previously, MovieWeb was owned by WatchR Media, Inc., a privately held Las Vegas company. In 2021, it was estimated the MovieWeb website had 8 million unique visits for the month of July. MovieWeb has been owned and operated by online publisher Valnet Inc. since September 2021 upon completion of the acquisition from WatchR.
Partnerships
In August 2000, MovieWeb announced a collaboration with video rental chain Video Update and video retail software provider Unique Business Systems Inc.
MovieWeb acts as a distribution partner of Hulu. MovieWeb also produces video content for IMDb.com.
References
External links
American film websites
Internet properties established in 1995 |
https://en.wikipedia.org/wiki/Alice%20Bungisngis%20and%20Her%20Wonder%20Walis | Alice Bungisngis and Her Wonder (International title: Giggly Alice / ) is a 2012 Philippine television drama fantasy comedy series broadcast by GMA Network. Directed by Mark Reyes, it stars Bea Binene in the title role. It premiered on February 6, 2012 on the network's Telebabad line up replacing Daldalita. The series concluded on June 8, 2012 with a total of 88 episodes. It was replaced by My Daddy Dearest in its timeslot.
The series is streaming online on YouTube.
Cast and characters
Lead cast
Bea Binene as Alice Asuncion-Fernandez / Daisy Reyes
Supporting cast
Jake Vargas as Ace Fernandez
Derrick Monasterio as Spade Fernandez
Lexi Fernandez as Queenie Delos Santos
Jean Garcia as Esmeralda Reyes
Janno Gibbs as Hilario Asuncion
Sheena Halili as Sinag
Buboy Garovillo as Filipe "Ipeng" Lucsin
Benjie Paras as Timoteo / Tim
Sef Cadayona as Tomas / Tom
Irma Adlawan as Margarita "Maggie" Fernandez / Gareng Lucsin
Alicia Alonzo as Andeng / old Matilda
Marc Justine Alvarez as Wally
Isabel Nesreen Frial as Gelay
Lance Angelo Lucido as Ivan
Guest cast
Marita Zobel as Alicia
Roy Alvarez as Zaldy Fernandez
Ana Roces as Matilda Asuncion
Ama Quiambao as Anita
Lovely Rivero as Panying
Vangie Labalan as Belinda Kasimsiman
Ellen Adarna as Carla
Jana Trites as Doray
Edgar Sandalo as Greg
Rita Iringan as Wendy
Nicole Dulalia as Lev
Sabrina Man as Carol
Ratings
According to AGB Nielsen Philippines' Mega Manila household television ratings, the pilot episode of Alice Bungisngis and Her Wonder earned a 16.3% rating. While the final episode scored a 14.1% rating.
References
External links
2012 Philippine television series debuts
2012 Philippine television series endings
Filipino-language television shows
GMA Network drama series
Philippine fantasy television series
Television shows set in the Philippines |
https://en.wikipedia.org/wiki/Li-Fi | Li-Fi (also written as LiFi) is a wireless communication technology which utilizes light to transmit data and position between devices. The term was first introduced by Harald Haas during a 2011 TEDGlobal talk in Edinburgh.
Li-Fi is a light communication system that is capable of transmitting data at high speeds over the visible light, ultraviolet, and infrared spectrums. In its present state, only LED lamps can be used for the transmission of data in visible light.
In terms of its end user, the technology is similar to Wi-Fi — the key technical difference being that Wi-Fi uses radio frequency to induce an electric tension in an antenna to transmit data, whereas Li-Fi uses the modulation of light intensity to transmit data. Li-Fi is able to function in areas otherwise susceptible to electromagnetic interference (e.g. aircraft cabins, hospitals, or the military).
Technology details
Li-Fi is a derivative of optical wireless communications (OWC) technology, which uses light from light-emitting diodes (LEDs) as a medium to deliver network, mobile, high-speed communication in a similar manner to Wi-Fi. The Li-Fi market was projected to have a compound annual growth rate of 82% from 2013 to 2018 and to be worth over $6 billion per year by 2018. However, the market has not developed as such and Li-Fi remains with a niche market.
Visible light communications (VLC) works by switching the current to the LEDs off and on at a very high speed, beyond the human eye's ability to notice. Technologies that allow roaming between various Li-Fi cells, also known as handover, may allow to seamlessly transition between Li-Fi. The light waves cannot penetrate walls which translates to a much shorter range, and a lower hacking potential, relative to Wi-Fi. Direct line of sight is not always necessary for Li-Fi to transmit a signal and light reflected off walls can achieve 70 Mbit/s.
Li-Fi can potentially be useful in electromagnetic sensitive areas without causing electromagnetic interference. Both Wi-Fi and Li-Fi transmit data over the electromagnetic spectrum, but whereas Wi-Fi utilizes radio waves, Li-Fi uses visible, ultraviolet, and infrared light. Researchers have reached data rates of over 224 Gbit/s, which was much faster than typical fast broadband in 2013. Li-Fi is expected to be ten times cheaper than Wi-Fi. The first commercially available Li-Fi system was presented at the 2014 Mobile World Congress in Barcelona.
Disadvantages
Although Li-Fi LEDs would have to be kept on to transmit data, they could be dimmed to below human visibility while still emitting enough light to carry data. This is also a major bottleneck of the technology when based on the visible spectrum, as it is restricted to the illumination purpose and not ideally adjusted to a mobile communication purpose, given that other sources of light, for example the sun, will interfere with the signal.
Since Li-Fi's short wave range is unable to penetrate walls, transmitters would need to |
https://en.wikipedia.org/wiki/Mer%20%28software%20distribution%29 | Mer was a free and open-source software distribution, targeted at hardware vendors to serve as a middleware for Linux kernel-based mobile-oriented operating systems. It is a fork of MeeGo.
Goals
Some goals of the project are:
Openly developed with transparency built into the fabric of the project
Provide a mobile device oriented architecture
Primary customers are mobile device vendors, not end-users.
Have structure, processes and tools to make life easy for device manufacturers
Support innovation in the mobile OS space
Inclusive of projects and technologies (e.g. MeeGo, Tizen, Qt, Enlightenment Foundation Libraries (EFL), HTML5)
Governed as a meritocracy
Run as a non profit through donations
Software architecture
Mer is not an operating system; it is aimed to be one component of an operating system based on the Linux kernel. Mer is a part of the operating system above the Linux kernel and below the graphical user interface (GUI).
Mer just provides the equivalent of the MeeGo core. The former MeeGo user interfaces and hardware adaptation are to be done by various other projects and by hardware manufacturers, which will be able to build their products on top of the Mer core.
Components
There is support for systemd, Wayland, Hybris, and other current FOSS software.
Zephyr is an attempt at creating a stack for use by other projects to be exploring lightweight, high-performance, next-generation UIs based on Mer, Qt5, QML Compositor and Wayland.
Weston 1.3, which was released on 11 October 2013, supports libhybris, making it possible to use Android device drivers with Wayland.
Supported hardware
Mer can be compiled for a number of instruction sets such as x86, ARM or MIPS.
There are Mer-based builds available for various devices, including Raspberry Pi, Beagleboard, Nokia N900, Nokia N950, Nokia N9 and for various Intel Atom-based tablets. These also include hardware adaptation packages and various UXes running on top of Mer, provided by different projects. They can be flashed on the device and might work in dual-boot mode with the original firmware.
Mer uses Open Build Service: OBS in mer but with one repository per architecture:
Products based on Mer
KDE Plasma Active
Mer was used as a reference platform for KDE's Plasma Active.
Vivaldi Tablet and Improv-computer
In January 2012 a Plasma Active-tablet device, initially known as 'Spark tablet' and soon renamed 'Vivaldi Tablet', was announced. Based on the Allwinner A20 SoC, it would have a 7" multitouch display, run the Plasma Active user interface on top of Mer, and have a target price of about €200. The project encountered some problems when its hardware partner in China completely changed the internal components and was reluctant to release the kernel source for the new hardware. As of early July 2012, the Vivaldi had been set back, but a solution was "in the pipes", according to Plasma developer Aaron Seigo. As a kind of side project Improv-computer was targeted for deve |
https://en.wikipedia.org/wiki/1-bit | 1 bit is the smallest possible information size.
1-bit may refer to:
1-bit computing, systems that process 1 bit per work cycle
1-bit DAC, the oversampling digital-to-analog converter technology
Binary image or 1-bit images, images made out of two colours |
https://en.wikipedia.org/wiki/List%20of%20programs%20broadcast%20by%20TV%202%20Bliss | List of programs broadcast by TV 2 Bliss.
0–9
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Lists of television series by network |
https://en.wikipedia.org/wiki/ADOX%20Polo | The ADOX Polo was a consumer-class, viewfinder camera with a completely manual operating system. It was manufactured between 1960 and 1963. Dr C. Schleussner Fotowerke GmbH was installed during WW2 in the stolen Wirgin camera factory of Wiesbaden, Germany. The three Wirgin brothers who were the founders and owners of the Wirgin company, were forced to leave Germany when the Nazis seized their factory before the Holocaust and installed ADOX. After the war, the Wirgin brothers returned to Germany, reclaimed their factory and continued business producing the Edixa and subsequent models.
Description
ADOX produced high-resolution fine-grained film material. The camera featured an Adoxar 45mm f/3,5 lens that would have been respectable on cameras in a much higher price range.
The top, bottom and the lens base cover were made from pressed steel of about ½mm thickness. The rest of the chassis and most of the internal parts were made from mould-injected plastic. Metal was only used for parts where wear and tear make it unavoidable, such as the film pressure plate and the film transport cogwheels.
The viewfinder had neither lines for parallax compensation, nor for outlining the edge of the negative. With the camera held to take a picture in landscape format, the center mounting and poor enlargement of the viewfinder required the user to press the nose rather hard against the camera back. There was no rangefinder.
The camera had no light meter. It offered three shutter speeds and aperture values had to be set by a separate light meter, by guesswork or by following the coarse exposure guide on the film package.
An accessory shoe was on the top of the housing but without a 'hot-shoe' contact. The rewind knob held a film speed reminder, covering ASA 8-800/DIN 10-30, but no folding rewind handle. The frame counter needed to be reset manually. It counted down from the number of exposures in the roll to zero.
References
External links
Mr. Stienstra's personal collection
Helmut's Photo coffer: private collection
Rangefinder cameras
Cameras by type |
https://en.wikipedia.org/wiki/HIstome | HIstome is a database that provides information about human histone proteins, their sites of modifications, variants and modifying enzymes, and diseases linked to histone modifications.
Update
HISTome2 is an updated version of the HIstome database released in 2020.
See also
Histone
References
External links
http://www.iiserpune.ac.in/~coee/histome/
Biological databases
Epigenetics |
https://en.wikipedia.org/wiki/Geek.com | Geek.com is a technology news weblog about hardware, mobile computing, technology, movies, TV, video games, comic books, and all manner of geek culture subjects. It was founded in 1996 and was run independently until 2007 when it was sold to Name Media, after which it was sold to Geeknet, and then to its current owner, Ziff Davis.
History
Geek.com was founded in 1996 by Joel Evans and Rob Hughes. Joel's brother, Sam Evans, was soon added as the site's chief editor. The site was founded as the Ugeek newsletter but soon become a larger online portal with multiple different sections, including JobGeek, GameGeek, PDAGeek, and ChipGeek. Among the site's many early successes was Ugeek.com's popular Processor Archive.
In March 2007 Geek.com was sold to NameMedia, a company that specializes in domain name reselling and parking. NameMedia had recently acquired Philip Greenspun's photo.net and was building out its Enthusiast Media Network, where Geek.com would be the lead technology site. After the acquisition Rob Hughes and Sam Evans left the site, though co-founder Joel Evans stayed on in his role as Chief Geek. Soon afterwards the site's mobile analyst Matthew "palmsolo" Miller left the site and started writing at ZDnet's Mobile Gadgeteer blog.
In mid-2007 Geek.com underwent a major redesign, moving away from the platform that it had used since 2001, and did away with the subportals, like PDAgeek.
In August 2007 NameMedia acquired XYZcomputing.com a computer hardware website and hired its founder, Sal Cangeloso, to be the site's Senior Editor.
In May 2010 NameMedia sold Geek.com to Geeknet for $1 million. Cangeloso, who had been promoted to Editor-in-Chief when Joel Evans left at the close of 2009 stayed on board in the same position.
The troubled Geeknet sold Geek.com to Ziff Davis at the beginning of January 2011 for an undisclosed amount. Once again Cangeloso stayed on, as did longstanding News Editor, Matthew Humphries.
In 2016, Geek.com was significantly retooled under a new staff, consisting of Editor-in-Chief Chris Radtke, Managing Editor Sheilah Villari, and Senior Editor Jordan Minor. Along with a visual redesign, the site expanded its focus to broader geek culture topics like technology, gaming, movies, TV, and comic books. A new team of freelancers was brought on board to carry out this vision, including YouTube film critic Bob "MovieBob" Chipman.
At the end of 2016, the site hosted a five-hour Facebook "Gifted and Talented Show" made up of sketches and holiday gift suggestions. One notable article, an explanation on the lies surrounding the cartoon Street Sharks, went viral on sites like Vox, The A.V. Club, and Gawker.
References
External links
Official Website
Computing websites
American technology news websites
Internet properties established in 1996 |
https://en.wikipedia.org/wiki/Fourth%20generation | Fourth generation may refer to:
4G, the fourth generation of cellular wireless standards
Fourth-generation programming language
Fourth-generation jet fighter
Fourth generation warfare, conflict characterized by a blurring of the lines between war and politics, soldier and civilian
Generation IV reactor, a set of theoretical nuclear reactor designs
History of video game consoles (fourth generation) (1987–1999)
Yonsei (Japanese diaspora), great-grandchildren of Japanese-born emigrants
A group of Pokémon, see List of generation IV Pokémon
See also
Generation (disambiguation) |
https://en.wikipedia.org/wiki/The%20Prodigies%20%28film%29 | The Prodigies is a 2011 French-British computer-animated science fiction, action, horror and psychological thriller film based on La Nuit des enfants rois, a novel written by French writer Bernard Lenteric.
Released theatrically on 8 June 2011, the film received generally negative reviews from critics with most critics and audiences making comparisons between The Prodigies and two other films Village of the Damned and Law Abiding Citizen and was a box office bomb, grossing only $1 million against a budget of $31 million.
Plot
Ten-year-old Jimbo Farrar is a gifted child who suffers abuse at the hands of his parents. One day, in a fit of anger, Jimbo unintentionally uses his supernatural abilities, resulting in his mother's death and his father's suicide. Jimbo is then sent to a mental hospital, where he is later taken under the wing of billionaire Charles Killian, who helps him control his powers.
Twenty years later, Jimbo becomes a renowned researcher at the Killian Foundation for Gifted Children. He creates an online game called "The Game" to identify other individuals with supernatural abilities. However, when five unrelated teenagers hack his computer and discover his plans, Jimbo shuts down the game. To his surprise, he receives a mysterious message asking, "Where Are You?" Determined to find the teenagers, he sets out on a quest.
Meanwhile, Charles Killian dies, and the foundation falls into the hands of Melanie, his lesbian daughter, and Jenkins, her second-in-command. They plan to end Jimbo's game and focus on a TV show instead. To save the game and locate more gifted individuals, Jimbo proposes the idea of a televised competition called American Genius. Five hand-picked teenagers, Gil, Liza, Lee, Harry, and Sammy, are chosen as participants due to their extraordinary abilities.
However, tragedy strikes when Liza is assaulted and raped by thugs while the teenagers are gathered in Central Park. Jimbo arrives too late to prevent the attack, but the pain Liza experiences is telepathically extended to the others, and they use their abilities to defeat the assailants. Liza falls into a coma, and Jimbo discovers that Melanie plans to cover up the crime to protect the TV show.
Enraged, Jimbo confronts Melanie and loses control of his powers, leading to his dismissal from the Killian Foundation. Determined to protect the remaining teenagers, he locks himself in his office. In the meantime, the teenagers infiltrate the foundation's archives and find video recordings of Jimbo discussing his isolation and plans to bring gifted individuals together for revenge.
Inspired by Jimbo's words, Gil, Sammy, Lee, and Harry decide to avenge themselves and kill Liza's attackers, as well as the officer who covered up the crime and his wife. Jimbo is alarmed by their actions, and when he tries to reason with them, they turn against him. They order him to kill Jenkins, but Jimbo refuses, leading to a brutal attack that culminates in Jenkins' death and Jimbo |
https://en.wikipedia.org/wiki/List%20of%20The%20Real%20Housewives%20of%20Beverly%20Hills%20episodes | The Real Housewives of Beverly Hills is an American reality television series that premiered on Bravo on October 14, 2010. Developed as the sixth installment in the network's The Real Housewives franchise.
The series' thirteenth season chronicles seven women in Beverly Hills; Kyle Richards, Erika Jayne, Dorit Kemsley, Garcelle Beauvais, Crystal Kung Minkoff, Sutton Stracke and Annemarie Wiley —as they balance their personal and professional lives, along with their social circle.
Former cast members featured over the previous ten seasons are; Taylor Armstrong (1-3), Camille Grammer (1-2), Adrienne Maloof (1-3), Kim Richards (1-5), Lisa Vanderpump (1-9), Brandi Glanville (3-5), Yolanda Hadid (3-6), Carlton Gebbia (4), Joyce Giraud (4), Eileen Davidson (5-7), Lisa Rinna (5-12), Kathryn Edwards (6), Teddi Mellencamp Arroyave (8-10), Denise Richards (9-10), and Diana Jenkins (12)
, a total of 269 original episodes of The Real Housewives of Beverly Hills have aired.
Series overview
Episodes
Season 1 (2010–11)
Taylor Armstrong, Camille Grammer, Adrienne Maloof, Kim Richards, Kyle Richards and Lisa Vanderpump are introduced as series regulars.
Season 2 (2011–12)
Brandi Glanville and Dana Wilkey served in recurring capacities.
Season 3 (2012–13)
Grammer departed as a series regular, whilst serving in a recurring capacity. Glanville and Yolanda Hadid joined the cast. Faye Resnick and Marisa Zanuck also served in recurring capacities.
Season 4 (2013–14)
Armstrong and Maloof departed as series regulars. Carlton Gebbia and Joyce Giraud joined the cast.
Season 5 (2014–15)
Gebbia and Giraud departed as series regulars. Eileen Davidson and Lisa Rinna joined the cast.
Season 6 (2015–16)
Kim Richards and Glanville departed as series regulars. Kathryn Edwards and Erika Jayne (then Girardi) joined the cast.
Season 7 (2016–17)
Hadid and Edwards departed as series regulars. Dorit Kemsley joined the cast. Eden Sassoon served in a recurring capacity.
Season 8 (2017–18)
Davidson departed as a series regular. Teddi Mellencamp Arroyave joined the cast. Grammer served in a recurring capacity.
Season 9 (2019)
Denise Richards joined the cast. Grammer served in a recurring capacity.
Season 10 (2020)
Vanderpump departed as a series regular. Garcelle Beauvais joined the cast. Sutton Stracke served in a recurring capacity.
Season 11 (2021)
Mellencamp Arroyave and Denise Richards departed as series regulars. Stracke and Crystal Kung Minkoff joined the cast. Kathy Hilton served in a recurring capacity.
Season 12 (2022)
Diana Jenkins joined the cast. Hilton and Sheree Zampino served in recurring capacities.
Season 13 (2023–24)
Rinna and Jenkins departed as series regulars. Annemarie Wiley joined the cast.
References
External links
List of The Real Housewives of Beverly Hills episodes at TV Guide
Real Housewives of Beverly Hills
Episodes |
https://en.wikipedia.org/wiki/Triple%20Town | Triple Town is a freemium strategy puzzle video game with city-building elements. It is available for social networks and mobile devices and was developed by Seattle-based Spry Fox.
The casual game was originally released for the Amazon Kindle e-reader in 2010, and was ported to the Facebook and Google+ social networks in October 2011. It was published in January 2012 for iOS and some Android devices. It was released for Windows and Macintosh through Steam on December 6, 2012.
Gameplay
The premise of the turn-based, single-player game is that the player must build a new settlement. The game takes place on a 6×6 grid of fields on which some tiles are randomly placed.
Players are given random tiles, most often grass tiles, that they must place on the grid. When three or more identical tiles adjoin, they merge into one more advanced tile at the position of the last tile placed: three grass tiles become a bush, three bushes a tree, three trees a hut, three huts a house, and so forth. Merging four or more tiles earns coins or a tile which is held in the inventory located in the sidebar. There are three special tiles: bears, crystals, and imperial bots. Bears move to a neighboring square each turn, blocking building sites until they are trapped. Ninjas act the same, except they can move to any empty square on the board. When they are trapped or an imperial bot is used on them, they turn into a gravestone. Three gravestones make a church, three churches a cathedral, and so forth. Crystals can be used as a wild card to make any match. Imperial bots remove individual tiles, or, if used on bears, turn them into gravestones. The player may keep one tile in reserve in the storehouse, usually located in the top left corner of the screen, and use it when needed.
The objective of the game is to upgrade one's settlement's tiles to as high a rank as possible, earning an accordingly high score. The game ends if all fields of the grid are filled.
In 2012 the Capital City feature was added to the Web-based version of the game, which acts as a home base. In the Capital City the player can select which settlement they want to go to, and also build up the Capital City itself. When Capital City tiles are earned, they are placed in the inventory.
In-game money
In Triple Town on the Web, there are two types of in-game money: coins and diamonds. Each can be purchased using real money, although coins can also be earned during gameplay. When a user first plays Triple Town, they are given several thousand coins and a small number of diamonds. In the mobile version of the game, there are only coins, not diamonds.
Reception
Triple Town received positive reviews. Reviewers praised the game's innovative extensions of the match-three mechanic as well as its strategic depth, unusual for a casual game, which requires players to plan several moves ahead in order to be successful. Criticism focused on the game's limited content and its implementation of the freemium business |
https://en.wikipedia.org/wiki/The%20American%20Girls%20Premiere | The American Girls Premiere is an educational computer game developed and published by The Learning Company for American Girl. The game allows players to create theatrical productions featuring characters from American Girl's Historical collection, along with scenes and other elements unique to each of the girls' respective time periods.
It is the first installment of the American Girl series, and so far the only one to date to be released on Mac OS; subsequent personal computer titles in the series were released for Windows. The American Girls Premiere was later followed by The American Girls: Dress Designer, a paper doll-based software toy released by Mattel Interactive in 1999.
Gameplay
Built upon the earlier MECC game Opening Night, The American Girls Premiere allows the creation and direction of unique stage plays starring the Historical Characters, from Felicity Merriman, representing the American Revolution, to Molly McIntire, daughter of an army doctor during World War II, alongside supporting characters from each of the girls' story arcs.
After selecting a character, players are presented with a stage to which plays are created or presented, utilizing a drag-and-drop interface to add actors, props, lighting and other elements to the scene. Digitized sprites taken from live actors and props from American Girl's historical collection are used throughout the game, à la-Mortal Kombat. Each of the characters have their own set of outfits based on the historical era their stories take place in, e.g. long gowns and petticoats for Felicity or argyle sweaters and blouses for Molly, along with scenarios from their respective time period. Players can also add dialogue in their productions, either through a voice recording, or using the built-in text-to-speech feature. The game develops skills in storytelling and writing, and is open-ended in nature, allowing the player to create theatrical productions as desired, though the limited selection of characters, props and settings may present creative constraints to some players.
In addition to the main game, bonus content such as a tutorial application and a sampler called the Director's Guide is included for players to get acquainted with the game's mechanics and user interface, along with a behind-the-scenes look on production as well as historical facts and commentary on American history and culture, and backstories for each of the characters.
Development
The game marked the debut of Pleasant Company – the creator of the American Girl franchise – into the digital software space. Linda Ehrmann, vice president of Internet business strategy consulting firm Grey Interactive, said that the video game had a due potential as it was entering a relatively untapped market, commenting that in the interactive media space, "girls are for the most part totally ignored".
The game could be bought from major software retailers or ordered directly from The Learning Company or American Girl.
Release
A "Special |
https://en.wikipedia.org/wiki/Ice%20Age%3A%20A%20Mammoth%20Christmas | Ice Age: A Mammoth Christmas is a 2011 computer-animated television special and part of the Ice Age franchise, produced by Blue Sky Studios and directed by Karen Disher. It premiered on November 24, 2011 on Fox in the United States and in the United Kingdom at Christmas on Channel 4 and E4 and it was released 2 days later to DVD and Blu-ray. This Christmas special takes place between Dawn of the Dinosaurs and Continental Drift.
Despite being produced by Blue Sky Studios, the film's animation was actually done by some animators at Blue Sky and mainly by the Los Angeles/Dallas based special effects and animation company, Reel FX Creative Studios.
Plot
Eight years after the events of the third film and before the fourth film, Christmas is coming and Scrat eyes a beaver assembling a cache of foods, among them an acorn. Scrat sneaks in and takes the acorn, along with others he finds in the area set up as decorations. He ties a large stockpile of them on a piece of bark and tries to leave with them, but they break out and roll away, leaving him with nothing.
Meanwhile, Manny brings the Christmas Rock out of storage, to Ellie's delight: the rock is intended as a surprise for Peaches, who comes sliding down a snow slope in a snowball fight with Crash and Eddie. Manny reveals that the Christmas Rock is the same one from his childhood, a family heirloom, and important as it lets Santa Claus find them to deliver presents. Diego and Sid step in to see the Christmas Rock, with Sid deriding it. Manny refuses to let Sid near the rock and Sid, to find his own means of decorations, decides to find a different decoration and chooses a tree. Crash and Eddie help him to decorate the tree with insects, small animals, and fish bones. To top the tree, Sid puts a star-shaped piece of ice on top, which is accidentally flung off like a boomerang and hits the Christmas Rock, shattering it. Furious, Manny declares that Sid is now on the "Naughty List" for ruining the Christmas rock, but dismisses the idea of Santa to Ellie, Peaches overhears this, and the young mammoth is shocked that Manny does not believe in Santa, and Sid, in tears that he destroyed the rock and is on the Naughty List, slides downhill as his tears freeze solid.
Scrat finds an acorn half frozen in a pond and steps onto the slippery surface to pull it out. After pulling it out successfully, Scrat begins to ice skate with the acorn, going through a log, where he misplaces the acorn and instead mistakenly holds onto a spider, which attacks him. Meanwhile, Sid, feet still frozen, sulks about being on the Naughty List until Peaches calls on him to snap out of it. She intends to head to the North Pole with Sid so as to convince Santa Claus to take Sid off the Naughty List, along with Crash and Eddie, who, despite their misdeeds, still want Christmas.
The four set off to the North Pole by following the Northern Lights, and move on until they reach a whiteout, which separates them for a moment until they fi |
https://en.wikipedia.org/wiki/Architects%27%20Data | Architects' Data (), also simply known as the Neufert, is a reference book for spatial requirements in building design and site planning. First published in 1936 by Ernst Neufert, its 39 German editions and translations into 17 languages have sold over 500,000 copies. The first English version was published in 1970 and was translated from the original German by Rudolf Herz.
History
Teaching at Weimar's Bauhochschule from 1926 after graduating from the Bauhaus, Ernst Neufert began to collect data about building, in a way of rationalization. It was first published in 1936, as a handbook for students and architects. Since then, more than half a million books have been printed, in 39 German editions and 17 other languages. The first English edition was published in 1970. In the US, it competes with the most common Architectural Graphic Standards and is little known compared to Germany. Until 1986, Ernst Neufert was its editor, after which his son Peter took over the publishing with his company AG Neufert Mittmann Graf Partner, until his death in 1995.
Contents
The book is conceived to help the initial design of buildings by providing extensive information about spatial requirements. Dealing mostly with ergonomics and with functional building layouts, thousands of drawings illustrate the text, organised according to building typologies. Weighting now slightly less than two kilograms, it has been continuously updated.
Influence
The Argentine artist Guillermo Kuitca worked on the rationalization of architecture within his piece "Neufert Suite" in 1998.
References
Further reading
Neufert Ernst and Peter, Architects' data, 3rd English Edition, Blackwell Sciences
External links
Neufert Foundation: About the book
Architecture books
1936 non-fiction books |
https://en.wikipedia.org/wiki/MCACEA | MCACEA (Multiple Coordinated Agents Coevolution Evolutionary Algorithm) is a general framework that uses a single evolutionary algorithm (EA) per agent sharing their optimal solutions to coordinate the evolutions of the EAs populations using cooperation objectives. This framework can be used to optimize some characteristics of multiple cooperating agents in mathematical optimization problems. More specifically, due to its nature in which both individual and cooperation objectives are optimize, MCACEA is used in multi-objective optimization problems.
Description and implementation
MCACEA, uses multiple EAs (one per each agent) that evolve their own populations to find the best solution for its associated problem according to their individual and cooperation constraints and objective indexes. Each EA is an optimization problem that runs in parallel and that exchanges some information with the others during its evaluation step. This information is needed to let each EA to measure the coordination objectives of the solutions encoded in its own population, taking into account the possible optimal solutions of the remaining populations of the other EAs. With this purpose, each single EA receives information related to the best solutions of the remaining ones before evaluating the cooperative objectives of each possible solution of its own population.
As the cooperation objective values depend on the best solutions of the other populations and the optimality of a solution depends both on the individual and cooperation objectives, it is not really possible to select and send the best solution of
each planner to the others. However, MCACEA divides the evaluation step inside each EA in three parts: In the first part, the
EAs identify the best solution considering only its individual objective values and send it to the others EAs; in the second part, the cooperation objective values of all solutions are calculated taking into account the received information; and in the third part, the EAs calculate the fitness of the solutions considering all the individual and cooperation objective values.
Although each population can only offer a unique optimal solution, each EA maintains a pareto set of optimal solutions and selects the unique optimal solution at the end, when the last population has already been obtained. Therefore, to be able to determine a unique optimal solution according with the individual objectives in each generation (and so, using it with the MCACEA framework), a step in charge of selecting the final optimal solution must also be included in the evaluation step of each EA.
Evaluation phase in MCACEA
The complete evaluation phase of the individual cooperating EAs is divided in six steps. When searching for the solution of a single EA, only the first two steps of this new evaluation process are used. MCACEA extends this process from these two only steps to the next six:
1. Evaluating the individual objectives of each solution.
2. Calcula |
https://en.wikipedia.org/wiki/Bilbao%20Crystallographic%20Server | Bilbao Crystallographic Server is an open access website offering online crystallographic database and programs aimed at analyzing, calculating and visualizing problems of structural and mathematical crystallography, solid state physics and structural chemistry. Initiated in 1997 by the Materials Laboratory of the Department of Condensed Matter Physics at the University of the Basque Country, Bilbao, Spain, the Bilbao Crystallographic Server is developed and maintained by academics.
Information on contents and an overview of tools hosted
Focusing on crystallographic data and applications of the group theory in solid state physics, the server is built on a core of databases and contains different shells.
Space Groups Retrieval Tools
The set of databases includes data from International Tables of Crystallography, Vol. A: Space-Group Symmetry, and the data of maximal subgroups of space groups as listed in International Tables of Crystallography, Vol. A1: Symmetry relations between space groups. A k-vector database with Brillouin zone figures and classification tables of the k-vectors for space groups is also available via the KVEC tool.
Magnetic Space Groups
In 2011, the Magnetic Space Groups data compiled from H.T. Stokes & B.J. Campbell's and D. Litvin's's works general positions/symmetry operations and Wyckoff positions for different settings, along with systematic absence rules have also been incorporated into the server and a new shell has been dedicated to the related tools (MGENPOS, MWYCKPOS, MAGNEXT).
Group-Subgroup Relations of Space Groups
This shell contains applications which are essential for problems involving group-subgroup relations between space groups. Given the space group types of G and H and their index, the program SUBGROUPGRAPH provides graphs of maximal subgroups for a group-subgroup pair G > H, all the different subgroups H and their distribution into conjugacy classes. The Wyckoff position splitting rules for a group-subgroup pair are calculated by the program WYCKSPLIT.
Representation Theory Applications
The fourth shell includes programs on representation theory of space and point groups. REPRES constructs little group and full group irreducible representations for a given space group and a k-vector; CORREL deals with the correlations between the irreducible representations of group-subgroup related space groups. The program POINT lists character tables of crystallographic point groups, Kronecker multiplication tables of their irreducible representations and further useful symmetry information.
Solid State Theory Applications
This shell is related to solid state physics and structural chemistry. The program PSEUDO performs an evaluation of the pseudosymmetry of a given structure with respect to supergroups of its space group. AMPLIMODES performs the symmetry-mode analysis of any distorted structure of displacive type. The analysis consists in decomposing the symmetry-breaking distortion present in the distorted str |
https://en.wikipedia.org/wiki/MIPModDB | MIPModDB is a database of comparative protein structure models of MIP (Major intrinsic proteins) family of proteins.
See also
Major intrinsic proteins
References
External links
http://bioinfo.iitk.ac.in/MIPModDB.
Biological databases
Protein domains
Protein families
Transmembrane proteins |
https://en.wikipedia.org/wiki/Damien%20McCaul%20%28presenter%29 | Damien McCaul is an Irish radio presenter and television personality.
Career
McCaul used to present The Den, RTÉ's nationwide programming for children, where he worked alongside Dustin the Turkey for many years before quitting in May 2003.
McCaul later joined Classic Hits 4FM on their weekend show All Request Weekend. During this time he purchased a home in Glasnevin.
Counselor
McCaul is a licensed Counsellor & Psychotherapist at FSN (Finglas Support and Suicide Prevention Network).
References
1970s births
Living people
Alumni of Dublin Institute of Technology
Dublin's Q102 presenters
Dublin's 98FM presenters
RTÉ 2fm presenters
The Den (TV programme) presenters
Broadcasters from Dublin (city) |
https://en.wikipedia.org/wiki/Panasonic%20Toughpad | Panasonic Toughpad is a series of tablet computers developed and designed by Panasonic as a subset of its series of Toughbook rugged computers. The first Toughpad was unveiled on November 7, 2011 in the United States.
Toughpad tablets feature a fully rugged design certified to meet IP65 and MIL-STD-810G specifications for drops (up to 4 feet), shock, vibration, altitude, humidity and extreme temperatures. Built to most of the same specifications as the Toughbook line, they are designed for professional use and are used in a wide variety of industries, including construction, defense, public safety, emergency services, government, healthcare, law enforcement, manufacturing, oil & gas and telecom/utilities. They offer features not commonly found on consumer-oriented tablets and are ruggedized to withstand vibration, drops, spills, extreme temperature, and rough handling. Toughpad tablets are designed for lower failure rates than standard business devices, translating to less downtime, fewer repair expenses and a lower total cost of ownership.
Current models
Availability of models varies by country.
Toughpad FZ-G1
The Toughpad FZ-G1 is a fully rugged 10-inch Windows tablet featuring a 6th generation Intel Core i5 vPro processor, Microsoft Windows 10 Pro or Windows 7 downgrade, a user-removable battery providing up to 18 hours of continuous use and optional bridge battery. It weighs 2.4 lbs. for the standard configuration. and comes equipped with options for an integrated UHF radio-frequency identification (RFID) reader or contactless smart card reader, and optional certification for use in hazardous locations. An optional Opal-compliant, self-encrypting drive is also available.
Toughpad FZ-B2
The Toughpad FZ-B2 is a rugged 7-inch tablet running the Android 4.4 operating system and is powered by a Quad-core Intel Celeron Processor. It has a fully rugged, MIL-STD-810G sealed IP65 dust and water-resistant design. Features include a quick-charging, user-replaceable battery with an optional bridge battery and high-capacity battery; a 5-point capacitive multi-touch screen that works with gloves, as well as with a fine tip stylus pen.
Toughpad FZ-M1
The Toughpad FZ-M1 rugged 7-inch tablet PC features a thin, lightweight, rugged and fanless design. It offers two choices of Intel processors and features the Windows operating system and enterprise-grade security features such as Trusted Platform Module (TPM). It also has a sunlight-readable, glove-enabled touchscreen and full-shift battery life with a built-in bridge battery.
Toughpad FZ-R1
The Toughpad FZ-R1 is the industry's first 7-inch all-in-one mobile point-of-sale tablet running Windows 8.1 for retail environments. Powered by an Intel Celeron processor, the tablet offers a fast-charging, user-replaceable full-shift battery with optional bridge battery and high-capacity battery, ten-point capacitive multi-touch screen, integrated EMV reader with PIN pad, encrypted magnetic stripe reader, option |
https://en.wikipedia.org/wiki/Gerhard%20Klimeck | Gerhard Klimeck is a German-American scientist and author in the field of nanotechnology. He is a professor of Electrical and Computer Engineering at Purdue University School of Electrical and Computer Engineering.
As the director of nanoHUB, he conducts the technical developments and strategies of nanoHUB, which annually serves million users worldwide with online simulations, tutorials, and seminars.
Education
Klimeck received his Ph.D. in 1994 from Purdue University where he studied electron transport through quantum dots, resonant tunneling diodes and 2-D electron gases. His German electrical engineering degree (Dipl.-Ing.) in 1990 from Ruhr University Bochum was concerned with the study of laser noise propagation.
Career
Klimeck's research interest is in the modeling of nanoelectronic devices, parallel cluster computing, genetic algorithms, and parallel image processing. He has been driving the development of the Nanoelectronic Modeling Tool NEMO since 1994. Klimeck was the Technical Group Supervisor of the High Performance Computing Group and a Principal Scientist at the NASA Jet Propulsion Laboratory. Previously, he was a member of technical staff at the Central Research Lab of Texas Instruments where he served as manager and principal architect of the Nanoelectronic Modeling (NEMO 1-D) program. At NASA Jet Propulsion Laboratory and Purdue University, Klimeck developed the Nanoelectronic Modeling Tool (NEMO 3-D) for multi-million atom simulations.
Patents
U.S. 6490193: Forming and storing data in a memory cell
U.S. 6667490: Method and system for generating a memory cell
U.S. Patent 2012/0043,607: Tunneling Field-Effect Transistor with Low Leakage Current
U.S. patent No. 9,858,365: “Physical modeling of electronic devices/systems”, Ganesh Hegde, Yaohua Tan, Tillmann Kubis, Michael Povolotskyi, Gerhard Klimeck (2017)
U.S. patent 10680088, “Tunnel Effect Transistor Having Anisotropic Effective Mass Channel”, Hesameddin Ilatikhameneh, Tarek Ameen, Bozidar Novakovic, Rajib Rahman, Gerhard Klimeck, 2020/6/9
U.S. patent US11093667B2, “Method and system for realistic and efficient simulation of light emitting diodes having multi-quantum-wells”, Gerhard Klimeck, Tillmann Kubis, Junzhe Geng. (2022)
Books
Computational Electronics: Semiclassical and Quantum Device Modeling and Simulation (with Dragica Vasileska and S. M. Goodnick, 2010) CRC Press,
Honors and awards
Klimeck won 9 NASA Tech Briefs from 2004 to 2007
2008, Purdue Engineering Team Award "For his role in the creation of nanoHUB and its impact on the cyberinfrastructure for the national nanotechnology initiative leading a cultural change in research and education." shared with Mark S. Lundstrom and Michael McLennan
2011, Elected Fellow Institute of Physics “For the development, application, and dissemination of atomistic quantum simulation tools for nanoelectronic devices.”
2011, Gordon Bell Prize Competition Finalist
2011, Elected Fellow of the American Physical Society, citation: |
https://en.wikipedia.org/wiki/Critical%20code%20studies | Critical code studies (CCS) is an emerging academic subfield, related to software studies, digital humanities, cultural studies, computer science, human–computer interface, and the do-it-yourself maker culture. Its primary focus is on the cultural significance of computer code, without excluding or focusing solely upon the code's functional purpose. According to Mark C. Marino, it
As introduced by Marino, critical code studies was initially a method by which scholars "can read and explicate code the way we might explicate a work of literature", but the concept also draws upon Espen Aarseth's conception of a cybertext as a "mechanical device for the production and consumption of verbal signs", arguing that in order to understand a digital artifact we must also understand the constraints and capabilities of the authoring tools used by the creator of the artifact, as well as the memory storage and interface required for the user to experience the digital artifact.
Evidence that critical code studies has gained momentum since 2006 include an article by Matthew Kirschenbaum in The Chronicle of Higher Education, CCS sessions at the Modern Language Association in 2011 that were "packed" with attendees, several academic conferences devoted wholly to critical code studies, and a book devoted to the explication of a single line of computer code, titled 10 PRINT CHR$(205.5+RND(1)); : GOTO 10.
See also
Critical legal studies
Critical theory
Hermeneutics
References
Footnotes
Bibliography
Further reading
Computer science
Cultural studies
Technology in society |
https://en.wikipedia.org/wiki/Erie%20St.%20Clair%20LHIN | The Erie St. Clair LHIN is one of fourteen Local Health Integration Networks (LHINs) in the Canadian province of Ontario.
The Erie St. Clair Local Health Integration Network is a community-based, non-profit organization funded by the Government of Ontario through the Ministry of Health and Long-Term Care.
Services
Erie St Clair LHIN plans, funds and coordinates the following operational public health care services to a population of approximately 643,000 people:
Hospitals - Public General Hospital:
Sydenham District Hospital (Wallaceburg, ON)
Charlotte Eleanor Englehart Hospital (Petrolia, ON)
Sarnia General Hospital (Sarnia, ON)
Public General Hospital (Chatham, ON)
Leamington District Memorial Hospital (Leamington, ON)
Hôtel-Dieu Grace Healthcare (Windsor, ON)
Windsor Regional Hospital (Windsor, ON)
Long-Term Care Homes
Community Care Access Centre (CCAC)
Community Support Service Agencies
Mental Health and Addiction Agencies
Community Health Centres (CHCs)
Geographic area
Erie St. Clair LHIN services the following regions:
Chatham-Kent
Sarnia/Lambton
Windsor/Essex
Budget
The Erie St. Clair LHIN has an annual budget of over $1.45 billion.
External links
Eries St. Clair LHIN - official web site
References
Health regions of Ontario |
https://en.wikipedia.org/wiki/Box%20counting | Box counting is a method of gathering data for analyzing complex patterns by breaking a dataset, object, image, etc. into smaller and smaller pieces, typically "box"-shaped, and analyzing the pieces at each smaller scale. The essence of the process has been compared to zooming in or out using optical or computer based methods to examine how observations of detail change with scale. In box counting, however, rather than changing the magnification or resolution of a lens, the investigator changes the size of the element used to inspect the object or pattern (see Figure 1). Computer based box counting algorithms have been applied to patterns in 1-, 2-, and 3-dimensional spaces. The technique is usually implemented in software for use on patterns extracted from digital media, although the fundamental method can be used to investigate some patterns physically. The technique arose out of and is used in fractal analysis. It also has application in related fields such as lacunarity and multifractal analysis.
The method
Theoretically, the intent of box counting is to quantify fractal scaling, but from a practical perspective this would require that the scaling be known ahead of time. This can be seen in Figure 1 where choosing boxes of the right relative sizes readily shows how the pattern repeats itself at smaller scales. In fractal analysis, however, the scaling factor is not always known ahead of time, so box counting algorithms attempt to find an optimized way of cutting a pattern up that will reveal the scaling factor. The fundamental method for doing this starts with a set of measuring elements—boxes—consisting of an arbitrary number, called here for convenience, of sizes or calibres, which we will call the set of s. Then these -sized boxes are applied to the pattern and counted. To do this, for each in , a measuring element that is typically a 2-dimensional square or 3-dimensional box with side length corresponding to is used to scan a pattern or data set (e.g., an image or object) according to a predetermined scanning plan to cover the relevant part of the data set, recording, i.e.,counting, for each step in the scan relevant features captured within the measuring element.
The data
The relevant features gathered during box counting depend on the subject being investigated and the type of analysis being done. Two well-studied subjects of box counting, for instance, are binary (meaning having only two colours, usually black and white) and gray-scale digital images (i.e., jpegs, tiffs, etc.). Box counting is generally done on patterns extracted from such still images in which case the raw information recorded is typically based on features of pixels such as a predetermined colour value or range of colours or intensities. When box counting is done to determine a fractal dimension known as the box counting dimension, the information recorded is usually either yes or no as to whether or not the box contained any pixels of the predetermined colour |
https://en.wikipedia.org/wiki/Film1%20Sundance | Film1 Sundance (also called Film1 Sundance Channel) was a Dutch premium television channel. It was the Dutch version of the American cable television network SundanceTV devoted to airing independent feature films, world cinema, documentaries, short films, television series, and original programs, such as news about the latest developments from each year's Sundance Film Festival.
The channel launched on 1 March 2012 and replaced the television channel Film1 Festival. All films were shown uncut and without commercial interruptions.
History
Launched in the United States in February 1996 to show independent films on television, Sundance Channel was a joint venture of Showtime Networks (part of CBS Corporation), Universal Studios (part of NBCUniversal), and Robert Redford who also acted as the creative director of the network. The channel initially launched on five cable systems in New York City; Los Angeles; Alexandria, Virginia; Chamblee, Georgia; and Pensacola, Florida
On 7 May 2008, Rainbow Media (a subsidiary of Cablevision) announced that it had purchased Sundance Channel for $496 million. Rainbow Media also owns the cable channels AMC, IFC, WE tv, and News 12, and owned the defunct Voom HD Networks. The acquisition of Sundance Channel by Rainbow Media was completed in June 2008.
On 31 January 2012, Film1 (a then-subsidiary of Liberty Global) announced that it would launch Sundance Channel in the Netherlands. It replaced Film1 Festival.
Film1 closed Film1 Sundance on 31 August 2017. The premium television service wants to focus more on its video-on-demand services.
See also
SundanceTV
Sundance Channel (Canada)
Film1
References
External links
Defunct television channels in the Netherlands
Television channels and stations established in 2012
Television channels and stations disestablished in 2017 |
https://en.wikipedia.org/wiki/Typing%20environment | In type theory a typing environment (or typing context) represents the association between variable names and data types.
More formally an environment is a set or ordered list of pairs , usually written as , where is a variable and its type.
The judgement
is read as " has type in context ".
For each function body type checks:
Typing Rules Example:
In statically typed programming languages these environments are used and maintained by typing rules to type check a given program or expression.
See also
Type system
References
Data types
Program analysis
Type theory |
https://en.wikipedia.org/wiki/Velocity%20Moments | In the field of computer vision, velocity moments are weighted averages of the intensities of pixels in a sequence of images, similar to image moments but in addition to describing an object's shape also describe its motion through the sequence of images. Velocity moments can be used to aid automated identification of a shape in an image when information about the motion is significant in its description. There are currently two established versions of velocity moments: Cartesian and Zernike.
Cartesian velocity moments
Cartesian moments for single images
A Cartesian moment of a single image is calculated by
where and are the dimensions of the image, is the intensity of the pixel at the point in the image, and is the basis function.
Cartesian velocity moments for sequences of images
Cartesian velocity moments are based on these Cartesian moments. A Cartesian velocity moment is defined by
where and are again the dimensions of the image, is the number of images in the sequence, and is the intensity of the pixel at the point in image .
is taken from Central moments, added so the equation is translation invariant, defined as
where is the coordinate of the centre of mass for image , and similarly for .
introduces velocity into the equation as
where is the coordinate of the centre of mass for the previous image, , and again similarly for .
After the Cartesian velocity moment is calculated, it can be normalised by
where is the average area of the object, in pixels, and is the number of images. Now the value is not affected by the number of images in the sequence or the size of the object.
As Cartesian moments are non-orthogonal, so are Cartesian velocity moments, so different moments can be closely correlated. These velocity moments do however provide translation and scale invariance (unless the scale changes within the sequence of images).
Zernike velocity moments
Zernike moments for single images
A Zernike moment of a single image is calculated by
where denotes the complex conjugate, is an integer between and , and is an integer such that is even and . For calculating Zernike moments, the image, or section of the image which is of interest is mapped to the unit disc, then is the intensity of the pixel at the point on the disc and is a restriction on values of and . The coordinates are then mapped to polar coordinates, and and are the polar coordinates of the point on the unit disc map.
is derived from Zernike polynomials and is defined by
Zernike velocity moments for sequences of images
Zernike velocity moments are based on these Zernike moments. A Zernike velocity moment is defined by
where is again the number of images in the sequence, and is the intensity of the pixel at the point on the unit disc mapped from image .
introduces velocity into the equation in the same way as in the Cartesian velocity moments and is from the Zernike moments equation above.
Like the Cartesian velocity moments |
https://en.wikipedia.org/wiki/NucleaRDB | The NucleaRDB is a database of nuclear receptors. It contains data about the sequences, ligand binding constants and mutations of those proteins.
See also
Nuclear receptor
References
External links
https://web.archive.org/web/20120409204749/http://www.receptors.org/nucleardb/.
Biological databases
Intracellular receptors
Protein families
Transcription factors |
https://en.wikipedia.org/wiki/Waterloo%20Wellington%20LHIN | The Waterloo Wellington LHIN is one of fourteen Local Health Integration Networks (LHINs) in the Canadian province of Ontario.
The Waterloo Wellington Local Health Integration Network is a community-based, non-profit organization funded by the Government of Ontario through the Ministry of Health and Long-Term Care.
Services
Waterloo Wellington LHIN plans, funds and coordinates the following operational public health care services to a population of approximately 685,400 people:
Hospitals
Cambridge Memorial Hospital (Cambridge, ON)
Groves Memorial Hospital (Fergus, ON)
Guelph General Hospital (Guelph, ON)
St Joseph's Health Care Guelph (Guelph, ON)
St. Mary's General Hospital (Kitchener, ON)
Grand River Hospital (Kitchener, ON)
Louise Marshall Hospital (Mount Forest, ON)
Palmerston and District Hospital (Palmerston, ON)
Long-Term Care Homes
Community Care Access Centre (CCAC)
Community Support Service Agencies
Mental Health and Addiction Agencies
Community Health Centres (CHCs)
Geographic area
Waterloo Wellington LHIN services a region that includes all of Wellington County, the Regional Municipality of Waterloo, and the City of Guelph. It also includes part of Grey County, which is split with South West LHIN and North Simcoe Muskoka LHIN.
Budget
The Waterloo Wellington LHIN has an annual budget of approximately $875 million.
External links
Waterloo Wellington LHIN - official web site
References
Health regions of Ontario |
https://en.wikipedia.org/wiki/Yeast%20deletion%20project | The yeast deletion project, formally the Saccharomyces Genome Deletion Project, is a project to create data for a near-complete collection of gene-deletion mutants of the yeast Saccharomyces cerevisiae. Each strain carries a precise deletion of one of the genes in the genome. This allows researchers to determine what each gene does by comparing the mutated yeast to the behavior of normal yeast. Gene deletion, or gene knockout, is one of the main ways in which the function of genes are discovered. Many of the deletion mutations are sold by the biotech firm Invitrogen.
See also
Synthetic genetic array
References
External links
http://www-deletion.stanford.edu/YDPM/YDPM_index.html
http://www-sequence.stanford.edu/group/yeast_deletion_project/project_desc.html
http://www-sequence.stanford.edu/group/yeast_deletion_project/references.html
Genome projects
Yeasts |
https://en.wikipedia.org/wiki/Moonlight%20Madness%20%28video%20game%29 | Moonlight Madness is a platform game for the ZX Spectrum home computer, published in 1986 by Bubble Bus Software. The player controls a boy scout attempting to unlock a safe within a mansion to obtain pills for the mansion's owner, a mad scientist, who has collapsed. This requires the player to traverse the mansion's rooms while avoiding hazards such as dangerous house servants and fatal falls.
The game was developed by John F. Cain, who had previously created Booty, a popular budget game. Moonlight Madness was criticized for its price on release, £7.95 in the UK, as well its technical issues. The game's graphics, gameplay and sound were negatively rated by critics, though some reviewers were more positive over these different aspects of the game.
Gameplay
Players must guide a boy scout through a 23-room mansion in order to obtain 16 keys and a 4 digit combination before running out of lives. The keys unlock the ACME safe containing the pills needed to save the mansion owner's life. It is necessary to jump onto platforms and evade enemies in order to progress. At the start of the game the player has four lives; a life is lost should the boy scout fall too far or come into contact with one of the mansion's servants or traps. Rooms contain doors that can be entered to move around the mansion, as well as push buttons and hazards. Pressing buttons can result in lifts being activated, platforms appearing or an enemy appearing. One of the mansion's rooms is a corridor of eight doors with a large pair of eyes above them; this room acts as a maze. A tune is played continuously during play, but can be toggled on or off by pressing the 'M' key on the keyboard.
Plot
The player character, a boy scout, has approached a mansion looking for work during Bob a Job week. The door is answered by an old man wearing horn-rimmed glasses—the owner of the mansion. The man, a mad scientist, expresses surprise that the boy has managed to get past the guards and booby traps in the mansion's grounds. As the boy scout explains the reason for his visit, the scientist collapses, asking for his pills. At this point the game begins. The player must gather the 16 keys needed to unlock the ACME safe and retrieve the scientist's pills before he passes away. During play the boy scout must negotiate the mansion's rooms, avoiding hazards and the mansion's staff, who have been told to protect the inventions within the mansion, using lethal force if necessary. The staff are unaware of the boy scout's purpose and will attack him should they come into contact.
Development and release
The game was created by John F. Cain, who had previously developed the successful budget game Booty for Firebird Software. By this point Cain had also developed several titles for Rabbit Software, such as Potty Painter. Moonlight Madness was published by Bubble Bus in the United Kingdom and Spain in 1986; the original price was £7.95 in the United Kingdom. Moonlight Madness was re-released on budget softw |
https://en.wikipedia.org/wiki/TEst%20Mobile%20System | Test Mobile System (TEMS) is a technology used by telecom operators to measure, analyze and optimize their mobile networks. It is considered as the basic tool to perform wireless network drive testing, benchmarking, monitoring and analysis. Originally part of Field Measurement Systems and Network Planning Software divisions of Virginia, US-based LCC International Inc., it was acquired by Ericsson in 1999. The TEMS Products business was divested from Ericsson to Ascom on June 2, 2009. The TEMS Products business has been then divested to Infovista, effective October 3, 2016.
References
External links
Telecommunications equipment |
https://en.wikipedia.org/wiki/Film1%20Drama | Film1 Drama is a Dutch premium television channel owned by SPI International. Every night the programming is dedicated to a theme, such as a director or a genre. Film1 launched together with its sister service Sport1 on 1 February 2006 and replaced the Canal+ Netherlands television channels. Film1 offers multiple channels with Dutch and international film and television series productions. Initially Film1 Drama started as Film1 Series on 17 January 2012 when it replaced the 1 hour timeshift channel Film1 Premiere +1, focusing on television series. It changed into Film1 Spotlight on 6 September 2013. On 1 September 2016 Film1 Spotlight got renamed by Film1 Drama.
The channel is available on most digital cable and IPTV providers, and Satellite provider CanalDigitaal. DVB-T provider Digitenne doesn't provide Film1 Drama.
See also
Film1
Television in the Netherlands
Digital television in the Netherlands
External links
film1.nl
alleenopeen.tv
References
Television channels in the Netherlands
SPI International
Television channels and stations established in 2012 |
https://en.wikipedia.org/wiki/No%20Gravity%20%28video%20game%29 | NoGravity is a space flight simulation and space shooter developed by realtech VR, a Montreal based, French Canadian independent computer games company. The game was ported to many platforms over the years as it was open sourced in 2005. drew comparisons with the Wing Commander series.
Gameplay
is a 3D space shooter which allows players to control a spaceship from the first-person or third-person perspective. The object is to accomplish missions, with diverse objectives ranging from destroying enemy ships or bases, escorting allied ships, raiding ground bases, clearing minefields, etc.
History
originates from a late 1990s realtech VR BeOS game called , which was later renamed to .
Open source
On February 16, 2005 realtech VR open sourced with the creation of a SourceForge repository. The source code and assets of the classic are released under the terms of the GNU GPL-2.0-or-later, making the game freeware and free and open source software. The game was made available for Windows XP, AmigaOS, Linux, macOS, and BeOS.
The game was ported by the community to the PSP.
In 2014 a port of the classic version on the OpenPandora handheld followed.
Extended mobile versions
In 2009 an extended official PSP port, named No Gravity: The Plague of Mind to differentiate from the "classic" older version, was released. In 2011 an iOS port followed, in 2013 releases for Windows mobile and OUYA.
Reception
The game was offered by multiple websites as freeware download and reviewed several times over the years.
The classic No Gravity was downloaded alone via SourceForge between 2005 and May 2017 over 270,000 times.
Metacritic rated the PSP version with 65% from eight reviews.
References
External links
realtech VR official web site
No Gravity official web site
nogravity official source code repository on sourceforge.net
Science fiction video games
Space combat simulators
Commercial video games with freely available source code
Open-source video games
Freeware games
Indie games
Single-player video games |
https://en.wikipedia.org/wiki/CommView | CommView is an application for network monitoring, packet analysis, and decoding. There are two editions of CommView: the standard edition for Ethernet networks and the wireless edition for 802.11 networks named CommView for WiFi. The application runs on Microsoft Windows. It is developed by TamoSoft, a privately held New Zealand company founded in 1998.
Functionality
CommView puts the network adapter into promiscuous mode and captures network traffic. It also supports capturing packets from dial-up and virtual adapters (e.g. ADSL or 3G modems), as well as capturing loopback traffic. Captured traffic is then analyzed and the application displays network statistics and individual packets. Packets are decoded using a protocol decoder. CommView for WiFi puts Wi-Fi adapters into monitor mode, providing the functionality and user experience similar to that of CommView, with the addition of WLAN-specific features, such as displaying and decoding of management and control frames, indication of signal and noise level, and per-node and per-channel statistics.
Features
Protocols distribution, bandwidth utilization, and network nodes charts and tables.
Detailed IP connections statistics: IP addresses, ports, sessions, etc.
VoIP analysis: H.323 and SIP (TMC'S Internet Telephony Magazine product of the year award)
WEP and WPA2-PSK decryption (wireless edition only)
Multi-channel capturing using several USB adapters (wireless edition only)
Packet injection using a packet generator
User-defined packet filters and alarms
TCP and UDP stream reconstruction
Packet-to-application mapping
Reporting
Capture log file import and export
References
External links
Official CommView Product Page
Official CommView for WiFi Product Page
Network analyzers
Wireless networking |
https://en.wikipedia.org/wiki/FeiTeng | FeiTeng (飞腾, fēiténg) is the name of several computer central processing units designed and produced in China for supercomputing applications. The microprocessors have been developed by Tianjin Phytium Technology. The processors have also been described as the YinHeFeiTeng (银河飞騰, YHFT) family. This CPU family has been developed by a team directed by NUDT's Professor Xing Zuocheng.
Initial designs
The first generation was binary compatible with the Intel Itanium 2. The second generation, the FT64, was a system on a chip with CPU and 64-bit stream processor. FT64 chips were used in YinHe (银河) supercomputers as accelerators.
FeiTeng-1000
The FeiTeng-1000 is the third generation CPU in the family. It is manufactured with 65 nm technology and contains 350 million gates. Its clock frequency is 0.8–1 GHz. It is compatible with the SPARCv9 instruction set architecture.
Each chip contains 8 cores and is capable of executing 64 threads. There are 3 HyperTransport channels for coherent links, 4 DDR3 memory controllers and a 8x PCIe 2.0 link.
The Tianhe-1A supercomputer uses 2,048 FeiTeng 1000 processors. Tianhe-1A has a theoretical peak performance of 4.701 petaflops, also employing 7,168 Nvidia Tesla M2050 GPUs and 14,336 Intel Xeon X5670 CPUs in addition to FT1000 processors. The FeiTeng-1000 is an eight-core processor based on the SPARC system and is used to operate service nodes on the Tianhe-1.
A 2012 report for the European High Performance Computing service stated that FeiTeng used the work of the OpenSPARC project.
Galaxy FT-1500
The Tianhe-2 supercomputer uses 4096 Galaxy FT-1500 processors with 16 cores, OpenSPARC architecture based and 65 W TDP. They are made with 40 nm technology, processor cores work at 1.8 GHz. Peak performance of FT-1500 is 115–144 GFLOPS; every core may execute up to 8 interleaving threads and supports 256-bit wide SIMD vector operations including Fused Mul-Add (FMA). Cache of this SoC works at 2 GHz frequency, there are 16 KB L1i, 16 KB L1d, 512 KB L2 per core, and shared 4 MB L3 cache. L3 cache has 4 segments (1 segment per block of 4 CPU cores), each of 1 MB with 32-way associative. Cache uses directory-based cache coherency protocol. FT-1500 also has:
Links to connect several processors into NUMA machine
4 integrated DDR3 memory controllers
2 PCI-express controllers
10 Gbit Ethernet ports
FT-1500A
FT-1500A is an ARM64 SoC designed by Phytium, which includes 16 cores of ARMv8 processor, a 32-lane PCIe host, 2 GMAC on-chip ethernet controller and a GICv3 interrupt controller with ITS support.
Future processors
In 2020, Feiteng announced availability of the S2500 processor and a roadmap for the following years.
See also
High Productivity Computing Systems
Message passing in computer clusters
References
External links
Home page
wikichip.org / feiteng
Microprocessors made in China
SPARC microprocessors
Supercomputing in China |
https://en.wikipedia.org/wiki/Bruno%20Banani%20%28luger%29 | Bruno Banani (born Fuahea Semi; 4 December 1987) is a Tongan luger who adopted his current name as part of a marketing ploy.
Biography
A 21-year-old computer science student, he was selected by his country to attempt to qualify for the luge events at the 2010 Winter Olympics, as the first ever Tongan to participate in the Winter Olympic Games. Along with Taniela Tufunga, a young recruit in the Tonga Defence Service who would serve as his potential replacement and training partner, he travelled to Germany for training. He ultimately failed to qualify for the Games. He did, however, qualify to take part in the FIL World Luge Championships 2011 (which took place in January), where he finished 36th (last but one), eliminated after the first run with a time of 56.698.
In the meantime, he had been sponsored by a marketing firm, Makai, which presented him to the public under the name "Bruno Banani" – the name of a German underwear firm. He entered into an "endorsement deal" with the latter, "promoting [its] new line dubbed Coconut Power", which the company said "was inspired by him, attributing his sporting prowess to the quality of the coconuts he consumes". To enhance his appeal, he was presented as the son of a coconut farmer, although his father in reality was a cassava farmer. Makai reportedly obtained a passport for Semi under this new name, and he was universally referred to in the media, as well as by the International Luge Federation and the Chinese Olympic Committee, as "Banani". German media were reportedly "fascinated" by this Tongan luger bearing such a coincidental name; ZDF reportedly "suggested that the touching, exotic story of the luger from the South Sea bore similarities to that of the Jamaican bobsled team" at the 1988 Winter Olympics. Before this transformation, some media had referred to Semi by his true name, including the Samoa Observer and Radio Australia, based on an article in Matangi Tonga. In December 2011, the Vancouver Sun referred to him as Banani, adding that when he had first arrived in Germany he had been "going by his given name Fuahea Semi":
That same month, in December 2011, Semi (under the name Banani) won a bronze medal at the American-Pacific Championships in Calgary.<ref>"Tongan luger wins bronze in Canada", Matangi Tonga", 19 December 2011</ref> He also qualified for the FIL World Luge Championships 2012, by finishing eighteenth in the qualifiers."Tongan qualifies for first time", Eurosport, 17 December 2011 The World Championships took place in February; Semi (under the name Banani) finished 34th out of 37, with a time of 56.326 in his single run. Simultaneously, he was continuing to train with the German luge team, including three time Olympic gold medallist Georg Hackl and Olympic silver medallist David Möller, with an aim to qualify for the 2014 Winter Olympics."Outside Edge: Liar, liar, pants on fire in the snow", The Independent, 5 February 2012
The Vancouver Sun article on his name change had appare |
https://en.wikipedia.org/wiki/List%20of%20county%20roads%20in%20Bradford%20County%2C%20Florida | The following is a list of county roads in Bradford County, Florida. All county roads are maintained by the county in which they reside.
County roads in Bradford County
References
FDOT GIS data, accessed January 2014
County |
https://en.wikipedia.org/wiki/ProGlycProt | ProGlycProt is a database of experimentally verified glycosites and glycoproteins of the prokaryotes.
References
External links
http://www.proglycprot.org/
Biological databases
Glycoproteins
Carbohydrate chemistry |
https://en.wikipedia.org/wiki/Free%20Radio%20%28network%29 | Free Radio is a regional group of Independent Local Radio stations in the West Midlands, owned and operated by Bauer as part of the Hits Radio network.
Overview
Free Radio launched on Monday 26 March 2012 as a result of the rebranding of four FM stations – BRMB, Beacon, Mercia and Wyvern.
On Tuesday 4 September 2012, a secondary AM station broadcasting 1980s chart music, Free Radio 80s, was launched.
The four FM stations are now subsumed into the Hits Radio network whilst the AM transmitters, which latterly carried Absolute Classic Rock, ceased broadcasting in April and June 2020.
History
Free Radio
BRMB began broadcasting to Birmingham and the surrounding areas on 19 February 1974 – the fourth ILR station to launch in the UK and the first station of its kind outside London. Beacon Radio (later Beacon) has served Wolverhampton and the Black Country since 12 April 1976 with its licence area expanded to cover Shropshire in 1987. Mercia Sound (later Mercia) was launched in Coventry and Warwickshire on 23 May 1980, followed by Radio Wyvern (later Wyvern) in Herefordshire and Worcestershire on 4 October 1982.
These stations were initially run independently of each other, although by the late 1980s, BRMB and Mercia were under the ownership of Midlands Radio plc, alongside AM station Xtra AM, which broadcast on both stations' former AM frequencies. The group was bought for £18 million by Capital Radio plc in 1993, who sold Mercia to the GWR Group but retained BRMB. GWR went on to buy Beacon from its holding company BCCL in 1995 and Wyvern FM two years later. The four licences came under the same ownership in 2005 when GWR and Capital merged to form GCap Media.
GCap was taken over in 2007 by Global but the Office of Fair Trading ruled in August 2008 that Global would need to sell off BRMB, Beacon, Mercia, Wyvern and Heart's East Midlands station due to concerns over competition interests. The stations were bought in May 2009 by a consortium led by former Chrysalis Radio chief executive Phil Riley, trading as Orion Media. Heart East Midlands continued to operate under a franchise agreement with Global until January 2011, when the station was rebranded as Gem 106 and replaced most networked output with local programming from Nottingham.
On 9 January 2012, Orion announced that it would rebrand its four West Midlands local stations as Free Radio from March 2012 onwards. The former on-air station brands were phased out on Wednesday 21 March 2012 in preparation for the rebrand, which took place on Monday 26 March 2012 at 7pm.
On 6 May 2016, the network's owners, Orion, announced they had been bought by Bauer for an undisclosed fee, reportedly between £40 and £50 million. As of August 2016, Free Radio is aligned with the Hits Radio network, with the four local stations beginning to carry networked programming from Bauer’s Manchester studios in February 2017.
In May 2019, following OFCOM's decision to relax local content obligations from commercial ra |
https://en.wikipedia.org/wiki/World%20Cyber%20Games%202003 | The World Cyber Games 2003 was held in Seoul, South Korea from the October 12th to the 18th. Approximately 600,000 competitors participated and 562 players advanced to the Grand Final. Total prize money was $2,000,000. It was the third iteration of the World Cyber Games.
Official games
PC Games
Age of Mythology
FIFA Soccer 2003
HALF-LIFE: Counter-Strike
StarCraft: Brood War
Unreal Tournament 2003
WarCraft III: Reign of Chaos
Console Games
Halo
Results
External links
WCG 2003 Overview
World Cyber Games events
2003 in esports
2003 in South Korean sport
Esports in South Korea |
https://en.wikipedia.org/wiki/Event%20Horizon%20Telescope | The Event Horizon Telescope (EHT) is a large telescope array consisting of a global network of radio telescopes. The EHT project combines data from several very-long-baseline interferometry (VLBI) stations around Earth, which form a combined array with an angular resolution sufficient to observe objects the size of a supermassive black hole's event horizon. The project's observational targets include the two black holes with the largest angular diameter as observed from Earth: the black hole at the center of the supergiant elliptical galaxy Messier 87 (M87*, pronounced "M87-Star"), and Sagittarius A* (Sgr A*, pronounced "Sagittarius A-Star") at the center of the Milky Way.
The Event Horizon Telescope project is an international collaboration that was launched in 2009 after a long period of theoretical and technical developments. On the theory side, work on the photon orbit and first simulations of what a black hole would look like progressed to predictions of VLBI imaging for the Galactic Center black hole, Sgr A*. Technical advances in radio observing moved from the first detection of Sgr A*, through VLBI at progressively shorter wavelengths, ultimately leading to detection of horizon scale structure in both Sgr A* and M87. The collaboration now comprises over 300 members, and 60 institutions, working in over 20 countries and regions.
The first image of a black hole, at the center of galaxy Messier 87, was published by the EHT Collaboration on April 10, 2019, in a series of six scientific publications. The array made this observation at a wavelength of 1.3 mm and with a theoretical diffraction-limited resolution of . In March 2021, the Collaboration presented, for the first time, a polarized-based image of the black hole which may help better reveal the forces giving rise to quasars. Future plans involve improving the array's resolution by adding new telescopes and by taking shorter-wavelength observations. On 12 May 2022, astronomers unveiled the first image of the supermassive black hole at the center of the Milky Way, Sagittarius A*.
Telescope array
The EHT is composed of many radio observatories or radio-telescope facilities around the world, working together to produce a high-sensitivity, high-angular-resolution telescope. Through the technique of very-long-baseline interferometry (VLBI), many independent radio antennas separated by hundreds or thousands of kilometres can act as a phased array, a virtual telescope which can be pointed electronically, with an effective aperture which is the diameter of the entire planet, substantially improving its angular resolution. The effort includes development and deployment of submillimeter dual polarization receivers, highly stable frequency standards to enable very-long-baseline interferometry at 230–450 GHz, higher-bandwidth VLBI backends and recorders, as well as commissioning of new submillimeter VLBI sites.
Each year since its first data capture in 2006, the EHT array has moved to add more |
https://en.wikipedia.org/wiki/Central%20West%20LHIN | The Central West LHIN is one of fourteen Local Health Integration Networks (LHINs) in the Canadian province of Ontario.
The Central West Local Health Integration Network is a community-based, non-profit organization funded by the Government of Ontario through the Ministry of Health and Long-Term Care.
Services
Central West LHIN plans, funds and coordinates the following operational public health care services to a population of approximately 800,000 people:
Hospitals
Etobicoke General Hospital (Etobicoke, ON)
Brampton Civic Hospital (Brampton, ON)
Peel Memorial Hospital (Brampton, ON)
Orangeville Hospital (Orangeville, ON)
Shelburne District Hospital (Shelburne, ON)
Long-Term Care Homes
Community Care Access Centre (CCAC)
Community Support Service Agencies
Mental Health and Addiction Agencies
Community Health Centres (CHCs)
Geographic area
Central West LHIN services a region that includes all of Dufferin County and the northern section of the Regional Municipality of Peel. This includes Rexdale, ON, Malton, ON, Brampton, ON, Orangeville, ON, Woodbridge, ON and Caledon, ON.
Budget
The Central West LHIN has an annual budget of approximately $734 million.
References
External links
Health regions of Ontario |
https://en.wikipedia.org/wiki/Virtual%20biobank | A virtual biobank is a virtual repository which provides data extracted from and characterizing samples stored at classical biobanks. Virtual biobanks are large databases and can provide high-resolution images of samples as well as other characteristic data. These virtual biobanks can be accessed via specialized software or web portals. Samples are stored in a decentralized manner.
The use of virtual biobanks provides access, in the form of pre-collected data, without requiring access to the physical sample. This allows the sample's data to be more readily shared without fear of contaminating/destroying/transporting the sample.
Virtual biobanks are often used in bioinformatics.
List of virtual biobanks
UK Prostate Cancer Sample Collection Database - The first virtual biobank dedicated to prostate cancer research was launched on November 7, 2010 by the National Cancer Research Institute and contains information on over 10,000 biological samples taken from men in the UK.
References
Biobanks |
https://en.wikipedia.org/wiki/PDXLAN | PDXLAN is the largest computer LAN Party event in the American Northwest. The main event occurs twice per year, at the Clark County Event Center in Ridgefield, Washington.
Event summary
The twice annual events run 4 days, typically across a weekend. Attendees' ages range greatly from young children to, in some cases, senior citizens.
History
Listed here are past PDXLAN events.
References
Further reading
http://www.pcr-online.biz/news/read/nvidia-previews-unreleased-gpu-technology
http://www.hometoys.com/news_detail.php?section=view&id=14787759
http://www.tgdaily.com/games/36082-bandwidth-and-brawndo-power-pdxlan-party
http://www.bit-tech.net/news/modding/2005/08/17/pdxlan_5_case_mods/1
http://www.businesswire.com/news/home/20060206005460/en/F5-Gamers-Online-PDXLAN-Gaming-Conference-F5s
http://www.tgdaily.com/games-and-entertainment-features/36205-%E2%80%9Ca-lan-party-by-gamers-for-gamers%E2%80%9D-%E2%80%93-pdxlan-11
http://www.hometoys.com/news_detail.php?id=12467686
LAN parties |
https://en.wikipedia.org/wiki/Now%20You%20See%20It%20%28Australian%20game%20show%29 | Now You See It was an Australian children's game show that aired on the Seven Network from 1985–1993. It is based on the US show of the same title and was originally hosted by Mike Meade from 1985 and 1990 and "co-hosted" by a robot named "Melvin", who was a Tomy Omnibot toy, and pitted individual children against each other. The show's narrator, and original operator and voice of Melvin, from 1985 to 1988, was Brisbane-based New Zealand-born radio announcer and voice-over artist, Phil Darkins. Melvin's uncle Morton (another, much more primitive-looking Omnibot) had his own segment on the show entitled "Morton's Mouldy Movies", in which Morton would comically narrate stories in a grandfatherly voice accompanied by black-and-white footage from silent film shorts. The original grandfatherly voice of Morton was performed by Phil Darkins (1985-1988) and included quick-fire 'live conversations' between Mike Meade, the narrator (Darkins), Melvin (Darkins) and Morton (Darkins), which required quite some vocal dexterity.
From 1991, the show was hosted by Sofie Formica, and ran as a week-long competition between two primary schools. The winning students in each episode would win individual prizes, and the overall winning school would win a larger prize, typically valued at around $2,000.
In 1998, Becker Entertainment, along with Fremantle Ltd. (then known as FremantleMedia), revived the show. Broadcast on the Nine Network, it was hosted by Scott MacRae and produced by Tony Ryan, with Bill Davidson as Executive Producer. In 2000, the show was replaced with another game show, titled Download, which was also hosted by MacRae.
Format
Free games
The host reads a clue, and the single-word answer is revealed one letter at a time, sometimes using one or more letters from the end of the previous answer. Letters are gradually revealed until someone buzzes in and gives the correct answer and score, or until only one letter is left in the word. This continues until that line is filled, and then a new line begins. The first player to guess five words correctly (seven in the 1998 revival) wins the round and a prize package, with the loser being eliminated.
Two line games are played, with the winners of each line game playing each other in the Big Board round.
Big Board
Words are hidden horizontally amongst other random letters in a large grid. The host reads a question, with the answer being one of the words hidden within the grid. The first player to buzz in guesses the horizontal line number in which the answer appears. If correct, he/she then gives the vertical position number where the answer begins, and then the word itself. The number of points a player receives for each correct answer is based on the sum of the word’s line number and position number, making the words hidden in the lower-right portion of the board the most valuable. In the 1998 revival, points are doubled for the final 60 seconds of the game. The player with the most points when time runs o |
https://en.wikipedia.org/wiki/Fifi%20and%20Jules | Fifi and Jules was an Australian drive radio show with Fifi Box and Jules Lund and anchor Byron Cooke. It was broadcast across the Today Network from 4–6 pm weekdays.
History
The show commenced in February 2011 after Hamish Blake and Andy Lee announced in August 2010, that they would be cutting down to a weekly show in 2011. Fifi Box and Jules Lund were announced as hosts of drive from Monday to Thursday.
In February 2013, Hamish & Andy moved to 4 pm Mondays, with Fifi and Jules presenting Tuesday to Friday.
In July 2013, Hamish & Andy moved to 3–4 pm each afternoon followed by drive with Fifi and Jules at 4–6 pm from Monday to Friday.
In November 2013, Fifi Box announced that she would be moving to host breakfast on Fox FM.
Sophie Monk replaced Fifi Box whilst she was on maternity leave.
In December 2013, it was announced that Fifi and Jules would be replaced by Dan and Maz in Drive as Box moves to Melbourne to host breakfast with Dave Thornton, and Lund joins Sophie Monk, Merrick Watts and Mel B on 2DayFM breakfast in Sydney.
Team
Fifi and Jules team was made up of:
Fifi Box
Jules Lund
Byron Cooke
Sam Cavanagh - Producer
Kerri Jones - Producer
Leon Sjogren - Producer
Grumpy Dave (Dave Cameron) - Content Director
Josh Janssen aka Web Guy Josh- Digital Content Producer
Chris Marsh - Audio Producer
Danny O'Gready - Assistant Audio Producer
References
Fifi and Jules |
https://en.wikipedia.org/wiki/Space%20Bucks | Space Bucks was a space trading simulation developed by Impressions Games and published by Sierra On-Line. The game focuses on the creation of a trade empire against several computer controlled opponents. Victory is achieved through a combination of infrastructure investments, the stock market, piracy, sabotage, and of course trade goods.
Plot
In the year 2375, Humans share the galaxy with four other races, the Colikars, Tesarians, Secanii, and the Krec N'had. Your fledgling trading company, consisting of a single port and a single ship, must, by the year 2500, expand by any means necessary to become the dominant trade empire in the galaxy. Three computer opponents will be pursuing the same goal.
Gameplay
There are numerous mechanics for the player to utilize in order to achieve victory.
Ships
Ships do the heavy lifting in the game. Without ships, the goods produced at planets can't be transported and the highest level goods can't be manufactured due to a lack of the appropriate resources. At the start of the game only a few ship types are available. As the game progresses new, more advanced ship types become available.
Ships have several stats which determine its suitability for use. Range, Speed, Capacity, Efficiency, Drive, and Maintenance cost.
Planets
Planets generate all of the trade goods in the galaxy. These goods range from food, to passengers, to luxury goods. The higher in development a planet is, the more and the greater the variety of goods that are produced. Once the highest levels of development can be reached the most expensive, and thus profitable, goods can be manufactured.
To gain access to a planet, a bid must be made on a planet which does not already have a deal with another trade company. The player must open negotiations with such a planet and if their demands are agreed to, they will ally themselves with the players trade company. The demands include a monthly rent paid by the player, the delivery of a specified good at regular intervals, and an agreement to build a specified piece of infrastructure on the planet within a certain timeframe. The demand for monthly rent is made for every planet, with the other two demands being optional and dependent on the developmental level of the planet.
Planets have morale which can be modified by in-game factors. Investing in planetary infrastructure can often help improve the morale of a planet and ensure docking rights are not lost. Should a planet be lost to an unhappy local populace, the player must begin negotiations for docking rights again. The higher the developmental level of the planet, the more infrastructure will be needed to keep the planet happy.
Trade Goods
Trade goods include fuel, food, passengers, and exotic goods such as wine and weapons. Each race produces different high-end goods than it consumes.
Stock Market
Each trading company has stock which can be sold on the market for an infusion of cash. Buying out the competition, by accumulating a majority of t |
https://en.wikipedia.org/wiki/Netrunner%20%28operating%20system%29 | Netrunner is a Debian-based Linux Distribution for desktop computers, laptops, netbooks and ARM-based devices. It is made in two versions, the standard Desktop version for everyday use, and the Core version, where the users can build up their own system or run it on lower-spec hardware.
Overview
Netrunner is only available as a 64-bit desktop operating system that uses the Calamares graphical installer. Since its August 20, 2019 release, Netrunner is based on Debian Stable. Its desktop environment is based on Plasma Desktop by KDE.
Netrunner Core is a desktop version with just a few essential applications. The Core version also features Pinebook and Odroid C1 ARM images.
Default software
A default installation of Netrunner contains the following software:
KDE Plasma Desktop
Mozilla Firefox (including Plasma integration)
Mozilla Thunderbird (including Plasma integration)
VLC media player
LibreOffice
GIMP
Krita
Gwenview
Kdenlive
Inkscape
Samba Mounter (NAS setup)
Steam
VirtualBox
Release history
The following is the release history for Netrunner Core and Desktop:
The following is the release history for previously Kubuntu based Netrunner versions (discontinued):
The following is the release history for the Netrunner Rolling, which has been discontinued in favor of Manjaro collaboration efforts:
References
External links
2010 software
KDE |
https://en.wikipedia.org/wiki/Mbed | Mbed is a development platform and real-time operating system (RTOS) designed for internet-connected devices that utilize 32-bit ARM Cortex-M microcontrollers. These internet-enabled devices are often categorized under the Internet of Things (IoT) umbrella. The Mbed project is a collaborative effort led by Arm Holdings, in partnership with various technology companies and contributors.
Features and Capabilities
Mbed provides a comprehensive environment for developing IoT applications, offering features such as:
Device Management: Capabilities for remotely managing connected devices.
Security: Built-in layers of security protocols to ensure data integrity and safeguard against unauthorized access.
Modular Libraries: A suite of modular software libraries to aid rapid development and deployment.
Ecosystem Compatibility: Designed to be compatible with various sensors, actuators, and cloud services, providing a versatile platform for IoT solutions.
Development Environment
The platform offers a robust development environment that includes:
Mbed OS: The core real-time operating system that offers standardized APIs and supports C/C++ programming languages.
Mbed Studio: An IDE (Integrated Development Environment) that provides debugging tools, code editors, and other resources to facilitate development.
Mbed CLI: Command-line tools for advanced users who prefer a text-based interface.
Collaborative Development
The Mbed project is a collaborative initiative involving Arm Holdings and a wide range of technology partners, including semiconductor manufacturers, cloud service providers, and IoT solution vendors. This collaborative model allows for a rich ecosystem of compatible hardware and software components.
Applications
Mbed is widely used in a variety of IoT applications ranging from smart home automation to industrial IoT systems. Its flexibility and security features make it suitable for diverse deployments, including healthcare, agriculture, and transportation sectors.
Software development
Applications
The primary way of developing Mbed applications is with the Arm Online Ide "Keil Studio Cloud" which is an online ide that uses cloud services to build and compile mbed applications.
Applications can be developed also with other development environments such as Keil µVision, IAR Embedded Workbench, and Eclipse with GCC ARM Embedded tools.
Mbed OS
Mbed OS provides the Mbed C/C++ software platform and tools for creating microcontroller firmware that runs on IoT devices. It consists of the core libraries that provide the microcontroller peripheral drivers, networking, RTOS and runtime environment, build tools and test and debug scripts. These connections can be secured by compatible SSL/TLS libraries such as Mbed TLS or wolfSSL, which supports mbed-rtos.
A components database provides driver libraries for components and services that can be connected to the microcontrollers to build a final product.
Mbed OS, the RTOS, is based on Kei |
https://en.wikipedia.org/wiki/Iamus%20%28computer%29 | Iamus is a computer cluster (a half-cabinet encased in a custom shell) located at Universidad de Málaga. Powered by Melomics' technology, the composing module of Iamus takes 8 minutes to create a full composition in different musical formats, although the native representation can be obtained by the whole system in less than a second (on average). Iamus only composes full pieces of contemporary classical music.
Iamus' Opus one, created on October 15, 2010 is the first fragment of professional contemporary classical music ever composed by a computer in its own style (rather than attempting to emulate the style of existing composers as was previously done by David Cope). Iamus's first full composition, Hello World!, premiered exactly one year after the creation of Opus one, on October 15, 2011. Four of Iamus's works premiered on July 2, 2012, and were broadcast live from the School of Computer Science at Universidad de Málaga as part of the events included in the Alan Turing year. The compositions performed at this event were later recorded by the London Symphony Orchestra, creating the album Iamus, which New Scientist reported as the "first complete album to be composed solely by a computer and recorded by human musicians."
Commenting on the authenticity of the music, Stephen Smoliar, critic of classical music at The San Francisco Examiner, commented "What is primary is the act of making the music itself engaged by the performers and how the listener responds to what those performers do... what is most interesting about the documents generated by Iamus is their capacity to challenge the creative talents of performing musicians".
References
External links
Melomics home page
Melomics page at University of Malaga (Spain)
Iamus' Nasciturus, performed by Gustavo Diaz-Jerez and Sviatoslav Belonogov
London Symphony Orchestra records Transitos II for Iamus self-titled album
30 Minute Concert of Iamus' work, in four parts
BBC 'Click' coverage on Iamus' Composing Style
Time Magazine "Finally, a computer which writes classical music without human help"
Melomics Records Youtube Channel
Cluster computing
Music technology
One-of-a-kind computers
Spanish Supercomputing Network |
https://en.wikipedia.org/wiki/Hello%20World%21%20%28composition%29 | "Hello World!" is a piece of contemporary classical music for clarinet-violin-piano trio composed by Iamus Computer in September 2011. It is arguably the first full-scale work entirely composed by a computer without any human intervention and automatically written in a fully-fledged score using conventional musical notation. Iamus generates music scores in PDF and the MusicXML format that can be imported in professional editors such as Sibelius and Finale.
Title
The title makes reference to the computer program Hello World, which is traditionally used to teach the most essential aspects in a programming language.
Dedication
The composition is dedicated to the memory of Raymond Scott, an electronic music pioneer and inventor of the Electronium.
Premiere
"Hello World!" was given its premiere performance on October 15, 2011, by Trio Energio at the Keroxen music festival in Santa Cruz de Tenerife, Spain. The performers were Cristo Barrios (clarinet), Cecilia Bercovich (violin), and Gustavo Díaz-Jerez (piano).
Reception
As supported by neuroscientific studies, critiques of "Hello World!" (and similarly created works) could potentially be affected by anti-computer prejudice, derived from the fact of knowing in advance (or not) the non-human nature of the author. The music critic Tom Service of The Guardian acknowledged as much in his review of a 2012 performance, writing, "Now, maybe I'm falling victim to a perceptual bias against a faceless computer program but I just don't think Hello World! is especially impressive." He continued:
Despite describing the piece as "more successful than previous attempts to produce generic musical compositions from computers," he added, "The real paradox of Iamus is why it's being used to attempt to fool humanity in this way. If you've got a computer program of this sophistication, why bother trying to compose pieces that a human, and not a very good human at that – well, not a compositional genius anyway – could write? Why not use it to find new realms of sound, new kinds of musical ideas?"
Conversely, the musicologist Peter Russell was asked to review "Hello World!" for the BBC, based on a video of the live premiere, but he was not given any information about the composer. In his critique, Russell writes "on listening to this delightful piece of chamber music I could not bring myself to say that it would probably be more satisfying to read the score than listen to it. In fact after repeated hearings, I came to like it".
See also
Algorithmic composition
Computer music
Iamus computer
References
External links
Melomics Homepage
Audio of "Hello World!" in Melomics site
Video of "Hello World!" in YouTube
Full text of "Hello World!" critique from Peter Russell
Compositions by Iamus
2011 compositions
Chamber music compositions |
https://en.wikipedia.org/wiki/Comparison%20of%20Visual%20Basic%20and%20Visual%20Basic%20.NET | Visual Basic .NET was released by Microsoft in 2002 as a successor to the original Visual Basic computer programming language. It was implemented on the .NET Framework 1.0. The main new feature was managed code. Programmers familiar only with Visual Basic would probably have encountered difficulties working with the new version or adapting existing programs for it.
Obvious major differences
The new platform bore little resemblance to its predecessor. While programmers expected to be able to recompile their Visual Basic source to a .NET target, the reality of the situation was that Visual Basic .NET was a vastly different paradigm.
Obvious syntax differences aside, Visual Basic .NET provides much the same functionality as C# (since they both compile down to MSIL, with the most obvious difference being the case insensitivity of Visual Basic .NET, maintaining the original case-insensitivity of Visual Basic), which is more of a problem for C# programmers trying to inter-operate with Visual Basic .NET developers than anything else.
The basic syntax remains very similar: conditions, loops, procedures, sub-routines are declared and written in the same manner (see Visual Basic). Mobility from prior Visual Basic iterations to Visual Basic .NET really are parts of existing code: programmers with experience in both worlds are required to effectively target the new platform with older logic. The Visual Basic .NET developer will have to learn the use of the basic .NET types rather than what they have been used to in Visual Basic.
A programmer who has only worked with Visual Basic may encounter a steep learning curve to migrate to Visual Basic .NET. A programmer who is versed in another language or who has had exposure to the .NET runtime should be able to cope. It would be better to think of Visual Basic .NET as a new language inspired by the classic Visual Basic rather than as a continuation of Visual Basic 6.0, with the added difficulty for migrating programmers that VB.NET interfaces with the .NET Framework whereas VB6 was based on the Component Object Model (COM).
More detailed comparison
There are some immediate changes that developers should take note of:
More C-like syntax
Visual Basic .NET allows for the +=, -=, *=, /=, \=, ^=, and &= compound operators so that longer lines like:
variable = variable + 1
can now be written as:
variable += 1
However, increment and decrement operators are not supported.
Short-circuited logic
In prior iterations of Visual Basic, all statements in a condition would have been evaluated even if the outcome of the condition could be determined before evaluating a condition. For example:
If foo() And bar() Then
' code here is executed if foo() and bar() both return True, however, if foo() returns False, bar() is still evaluated
End If
This was not only inefficient, but could lead to unexpected results for any person used to another language. In Visual Basic .NET, the new AndAlso and OrElse operators have been |
https://en.wikipedia.org/wiki/ProRepeat | ProRepeat is a database of protein repeats.
See also
Tandem repeat
References
External links
http://prorepeat.bioinformatics.nl/
Biological databases
Protein structure |
https://en.wikipedia.org/wiki/Mississauga%20Halton%20LHIN | The Mississauga Halton LHIN is a Local Health Integration Network (LHIN) in the Canadian province of Ontario. It is a community-based, non-profit organization funded by the Government of Ontario through the Ministry of Health and Long-Term Care.
Services
Mississauga Halton LHIN plans, funds and coordinates the following operational public health care services to a population of approximately 1.2 million people:
Hospitals
Credit Valley Hospital (Mississauga, ON)
Mississauga Hospital (Mississauga, ON)
Queensway Health Centre (Etobicoke, ON)
Milton District Hospital (Milton, ON)
Oakville-Trafalgar Memorial Hospital (Oakville, ON)
Georgetown and District Memorial Hospital (Georgetown, ON)
Long-Term Care Homes
Community Care Access Centre (CCAC)
Community Support Service Agencies
Mental Health and Addiction Agencies
Community Health Centres (CHCs)
Geographic area
Mississauga Halton LHIN services a region that includes a south-west portion of the City of Toronto, the south part of the Regional Municipality of Peel, and the Regional Municipality of Halton except for the City of Burlington, which is part of the Hamilton Niagara Haldimand Brant LHIN. The LHIN includes the municipalities of South Etobicoke, ON, Mississauga, ON, Halton Hills, ON, Oakville, ON, and Milton, ON.
Budget
The Mississauga Halton LHIN has an annual budget of approximately $1.1 billion.
References
External links
Mississauga Halton LHIN - official web site
Health regions of Ontario |
https://en.wikipedia.org/wiki/Pulling%20Strings%20%28White%20Collar%29 | "Pulling Strings" is the 14th episode of the third season of the American comedy-drama television series White Collar, and the 44th episode overall. It was first broadcast on USA Network in the United States on February 7, 2012. The episode was directed by Anton Cropper and written by Channing Powell.
In the episode, Peter Burke (Tim DeKay) assigns Neal Caffrey (Matt Bomer) to work with his former girlfriend, Sara Ellis (Hilarie Burton), to track down a missing Stradivarius violin. Meanwhile, Peter must deal with the arrival of Elizabeth's (Tiffani Thiessen) parents (Tom Skerritt and Debra Monk), who are in New York for their daughter's birthday.
According to the Nielsen ratings system, an estimated 2.469 million household viewers watched the original broadcast of the episode, with 0.8 million in the 18–49 demographic. "Pulling Strings" received mostly mixed to positive reviews from critics, with many praising individual elements of the episode.
Plot
After taking vacation from work to be with his wife–and her parents–on her birthday, Peter turns Neal over to Sara in order to retrieve a missing Stradivarius that she believes was stolen by her former fiancé and current boss, Bryan McKenzie (Bailey Chase). Before beginning work on the case, Neal is approached by Agent Kramer (Beau Bridges), who is in New York to look into Neal's upcoming commutation hearing. Searching McKenzie's apartment, Neal discovers a hidden security tape. Meanwhile, Sara convinces him to attend the symphony with her. With help from June (Diahann Carroll), Neal and Diana Berrigan (Marsha Thomason) are able to go to the symphony as well. While they quickly discover that the second-chair violinist is the woman on the security video, McKenzie realizes that Neal is not exactly who he claims to be. While searching backstage, Neal and Diana find a body; they quickly recognize him as the symphony's instrument expert. Upon questioning the violinist from the security tape, Diana discovers that she had damaged the violin and had given it to the instrument expert for repairs. Sara approaches McKenzie with the information she has, pretending to want to join him. Diana and Neal soon arrive to arrest McKenzie, and Sara tells Neal to “call [her] sometime.”
Meanwhile, Peter suffers through the arrival of his in-laws. Everything goes wrong at Elizabeth's birthday: her parents give her a much-despised doll from her childhood, Peter's gift to Elizabeth does not turn out the way he had planned, and Elizabeth's father continues to disapprove of Peter. Peter eventually calls upon Mozzie (Willie Garson) for assistance, and together they right all of the wrongs.
Agent Kramer returns to the FBI to speak with Diana, who has recently announced her engagement to Christie. Kramer intimidates Diana, learning that she, Peter, and Jones (Sharif Atkins) have been covering up Neal's recent crimes.
Production
On June 20, 2011, it was announced that Beau Bridges had been cast as Peter's ment |
https://en.wikipedia.org/wiki/NumberFire | numberFire is a privately held company that offers statistical analysis of data around sporting events and sports fans, targeting fantasy sports players, digital media, writers, teams, and leagues. The site boasts over 700,000 subscribers and partnerships with ESPN, NFL, Sports Illustrated, USA Today, and SB Nation.
History
The company was founded in 2010 by Nik Bonaddio, who launched the initial version of the product following a successful appearance on Who Wants To Be A Millionaire; the winnings from that show were used to found the company. Later that year, Bonaddio successfully pitched the company at the DisruptNYC conference held by TechCrunch in New York City, gaining an initial PR buzz and investor interest.
The team quickly expanded in February 2011 with the hiring of Keith Goldner as chief analyst. Goldner has worked in the sports analytics industry with the Oklahoma City Thunder, Philadelphia 76ers, and ESPN among others.
In late 2011, the company announced venture capital financing from RRE Ventures, New York University, and several other investors.
numberFire was acquired by FanDuel in August 2015. Terms of the deal were not disclosed.
Methodology
Unlike traditional media analysis, the company aims to use statistical modeling and data mining to help consumers and businesses make smarter decisions in the fantasy sports, handicapping, and digital media markets. This is done through the generation of specific, proprietary formulas that analyze statistics in an unconventional, scientific manner. The company has received notable press coverage for correctly picking the winner of Super Bowl XLV and successfully outpredicting ESPN, Yahoo!, and CBS in the fantasy markets.
References
External links
numberFire
Internet properties established in 2010
American companies established in 2010
Companies based in New York City
Fantasy sports websites
2010 establishments in New York City
2015 mergers and acquisitions
Daily fantasy sports |
https://en.wikipedia.org/wiki/Korala%20Associates%20Limited | KAL is a company specialising in ATM software for bank ATMs, self-service kiosks, and bank branch networks. All KAL products are multivendor, Windows-compliant and conform to the industry XFS standard. KAL is the world's number two supplier of true multivendor ATM software. KAL supplies its software to major global banks including China Construction Bank, Citibank and UniCredit.
History
The company was established in 1989 by Dr. Aravinda Korala; hence Korala Associates Limited. KAL is headquartered in Edinburgh, Scotland. KAL also has office locations elsewhere in the UK, plus in the US, Europe, India, China, Japan, Malaysia and Australia. In 2011 KAL won the Queen's Award for Enterprise in the International Trade category.
Products
KAL's major product is self-service software for ATMs and kiosks. In 2012, KAL introduced the RTM (Retail Teller Machine). The RTM dispenses vouchers instead of cash meaning banks can operate in previously inaccessible areas while still offering the complete feature set of an ATM. KAL was the first ATM software company to deliver its products certified for Microsoft Windows 8 – just one week after the new operating system was officially launched by Microsoft in November 2012.
Industry standards and organisations
KAL is a participatory member of the ATM and self-service industry and belongs to the following industry associations and standards:
Product suite conformed to the WOSA 1.11 industry standard in 1995 (later renamed to XFS in 2000)
The Payment Card Industry Security Standards Council
Membership of ATM Industry Association (ATMIA)
References
External links
Official KAL site
Official RTM site
Technology companies of the United Kingdom |
https://en.wikipedia.org/wiki/Puberty%20Blues%20%28TV%20series%29 | Puberty Blues is an Australian coming-of-age comedy-drama television series broadcast on Network Ten. It is based on the 1979 book by Kathy Lette and Gabrielle Carey, which was also the inspiration for the 1981 film Puberty Blues. Set during the late 1970s, the series revolves around the family and friends of Debbie and Sue, two inseparable teenage friends who are coming of age in Sydney's Sutherland Shire. The first series of eight episodes began airing from 15 August 2012. A second series was later confirmed and premiered on 5 March 2014.
Production
In January 2012, it was announced an eight-part adaptation of the coming-of-age novel Puberty Blues would be made in New South Wales. The series, based on Kathy Lette and Gabrielle Carey's 1970s book, focuses on a group of teenagers from Cronulla "as they explore sex and the gender politics of the day."
Filming on the series began in April 2012, with locations mainly around the Sutherland Shire on Wanda Beach. The shoot lasted for twelve weeks and wrapped on 1 July 2012. Puberty Blues began airing from 15 August 2012.
On 16 September 2012, Debbie Schipp from The Daily Telegraph reported Southern Star producers John Edwards and Imogen Banks were planning a second series of Puberty Blues. Edwards stated "Yes, we are discussing it now. There's a strong chance, and Imogen and I have been in the plotting room and are well into development ourselves. So for those demanding more, we have high hopes we'll deliver." Edwards and Banks revealed the storyline would probably pick up from where series one ended or maybe a year later.
On 23 October 2012, the official Puberty Blues Facebook page confirmed that there would be a second series of the show premiering in 2013 on the Australian television network; Channel Ten. Filming for the second series began in May 2013, and began broadcasting in March 2014.
On 8 May 2014, Ten's production division went bankrupt. Co-producer John Edwards told TV Tonight that a third season of Puberty Blues is likely but may not come immediately.
Cast and characters
Main Cast
Supporting Cast
Episodes
Promotion and reception
Network Ten released the first episode exclusively to Facebook users who liked the official Puberty Blues page prior to the premiere. Graeme Blundell from The Australian praised the first episodes and stated "And, like the book, the series is racy, confronting, often quite brutal, heartbreaking and coruscatingly entertaining. It sparkles even as it disturbingly illuminates a culture of adolescence that seems not so much dated as distressingly contemporary."
Craig Mathieson of The Sydney Morning Herald wrote "Puberty Blues is good. Really good. What's perhaps been most interesting about the series, set as it is about 35 years back, is just how dark it is. No, this is not Mad Men, far from it, but the folks behind Puberty Blues have cultivated a surprisingly opaque picture of late-1970s Australia." Mathieson's colleague, Melinda Houston, gave the series a m |
https://en.wikipedia.org/wiki/Surrogate%20data%20testing | Surrogate data testing (or the method of surrogate data) is a statistical proof by contradiction technique similar to permutation tests and parametric bootstrapping. It is used to detect non-linearity in a time series. The technique involves specifying a null hypothesis describing a linear process and then generating several surrogate data sets according to using Monte Carlo methods. A discriminating statistic is then calculated for the original time series and all the surrogate set. If the value of the statistic is significantly different for the original series than for the surrogate set, the null hypothesis is rejected and non-linearity assumed.
The particular surrogate data testing method to be used is directly related to the null hypothesis. Usually this is similar to the following:
The data is a realization of a stationary linear system, whose output has been possibly measured by a monotonically increasing possibly nonlinear (but static) function. Here linear means that each value is linearly dependent on past values or on present and past values of some independent identically distributed (i.i.d.) process, usually also Gaussian. This is equivalent to saying that the process is ARMA type. In case of fluxes (continuous mappings), linearity of system means that it can be expressed by a linear differential equation. In this hypothesis, the static measurement function is one which depends only on the present value of its argument, not on past ones.
Methods
Many algorithms to generate surrogate data have been proposed. They are usually classified in two groups:
Typical realizations: data series are generated as outputs of a well-fitted model to the original data.
Constrained realizations: data series are created directly from original data, generally by some suitable transformation of it.
The last surrogate data methods do not depend on a particular model, nor on any parameters, thus they are non-parametric methods. These surrogate data methods are usually based on preserving the linear structure of the original series (for instance, by preserving the autocorrelation function, or equivalently the periodogram, an estimate of the sample spectrum).
Among constrained realizations methods, the most widely used (and thus could be called the classical methods) are:
Algorithm 0, or RS (for Random Shuffle): New data are created simply by random permutations of the original series. This concept is also used in permutation tests. The permutations guarantee the same amplitude distribution as the original series, but destroy any temporal correlation that may have been in the original data. This method is associated to the null hypothesis of the data being uncorrelated i.i.d noise (possibly Gaussian and measured by a static nonlinear function).
Algorithm 1, or RP (for Random Phases; also known as FT, for Fourier Transform): In order to preserve the linear correlation (the periodogram) of the series, surrogate data are created by the inverse Fourie |
https://en.wikipedia.org/wiki/HuffPost%20Live | HuffPost Live was an Internet-based video streaming network run by HuffPost, a news website in the United States. The network produced original programming as well as live conversations among users via platforms such as Skype and Google+. Live content was previously streamed for eight hours each weekday, from 10 a.m. to 6 p.m. EST. Instead of the usual TV news format of individual shows, the network was divided into shorter segments covering an individual story or topic from the parent website as well as other segments pertaining to a specific part of the site itself, such as politics, money, front page, and the like.
It launched on August 13, 2012. On January 8, 2016, Arianna Huffington announced that HuffPost Live would be scaled back to reorganize The Huffington Posts video strategy toward more shareable online content. Ever since this reorganization, HuffPost Live's programming has consisted of rerun content from previous truly live shows combined with a varying number of new live celebrity interviews per day before the cessation of new live content on March 28, 2016.
History
The Huffington Post co-founder Arianna Huffington announced plans in February 2012 to launch a "breakthrough project" in a blog post to mark a year since the news website was acquired by AOL. The project, then called "HuffPost Streaming Network", was described by Huffington as a "more relaxed, more free-flowing, and much more spontaneous and interactive" platform to disseminate content, unlike television. The project was later renamed "HuffPost Live". Huffington Post founding editor Roy Sekoff and Gabriel Lewis, head of AOL Studios, co-created and developed the project. The third member of the senior management team is Mitch Semel, Executive Editor of HuffPost Live. Sekoff described it as "CNN meets YouTube". He said the project intends to take advantage of the Huffington Posts "engaged" community which produced 54 million comments on the site in 2011.
The company held a demonstration to showcase the interactive components of the network on February 2, 2012 at a press conference in Manhattan. During the press conference, Huffington noted that the network will launch with 100-strong staff.
The site launched on August 13, 2012 with Verizon and Cadillac listed as founding partners.
In December 2014, HuffPost Live and Kosiner Venture Capital made an application to the Canadian Radio-Television and Telecommunications Commission to bring the service to conventional television in Canada.
Beginning on January 11, 2016 the live portion of HuffPost Live was significantly scaled back as a part of a reorganization effort announced on January 8, 2016. HuffPost Live's programming is now made up of mostly old content being re-aired. The live component continues to exist, though the emphasis on news and politics has been removed, instead being replaced with a few celebrity interviews per day at scheduled times.
On March 25, 2016 HuffPost Live aired its final segment, an interview |
https://en.wikipedia.org/wiki/BitterDB | The BitterDB is a database of compounds that were reported to taste bitter to humans. The aim of the BitterDB database is to gather information about bitter-tasting natural and synthetic compounds, and their cognate bitter taste receptors (T2Rs or TAS2Rs).
Summary
The BitterDB includes over 670 compounds that were reported to taste bitter to humans. The compounds can be searched by name, chemical structure, similarity to other bitter compounds, association with a particular human bitter taste receptor, and by other properties as well. The database also contains information on mutations in bitter taste receptors that were shown to influence receptor activation by bitter compounds.
Database overview
Bitter compounds
BitterDB currently contains more than 670 compounds that were cited in the literature as bitter. For each compound, the database offers information regarding its molecular properties, references for the compound’s bitterness, including additional information about the bitterness category of the compound (e.g. a ‘bitter-sweet’ or ‘slightly bitter’ annotation), different compound identifiers (SMILES, CAS registry number, IUPAC systematic name), an indication whether the compound is derived from a natural source or is synthetic, a link to the compound’s PubChem entry and different file formats for downloading (sdf, image, smiles).
Over 200 bitter compounds have been experimentally linked to their corresponding human bitter taste receptors. For those compounds, BitterDB provides additional information, including links to the publications indicating these ligand–receptor interactions, the effective concentration for receptor activation and/or the EC50 value and links to the associated bitter taste receptors entries in the BitterDB.
Querying and browsing
Bitter compounds can be queried and browsed in different ways. For example, the 'advanced search' option allows the user to retrieve compounds that fit different criteria, such as a combination of specific physical properties or a combination of associated human bitter taste receptors. In addition to the querying options, the user can browse through a sortable table with all the BitterDB compounds.
Bitter taste receptors
BitterDB contains data about the 25 known human bitter taste receptors. Several properties are displayed for each receptor. The bitter taste receptors can be searched using different criteria: name, known ligands and UniProt accession number. Using a table that presents all the bitter taste receptors and some information about them, the user can browse and sort by various options, such as the number of bitter ligands associated with the receptor.
Local BLAST service and global alignment
BitterDB offers two additional features: a local BLAST service to determine the local similarity between a query sequence and the different human bitter taste receptors, and a global alignment of the 25 human bitter taste receptors. The alignment was generated using ClustalW2, and displ |
https://en.wikipedia.org/wiki/ISC2 | The International Information System Security Certification Consortium, or ISC2, is a non-profit organization which specializes in training and certifications for cybersecurity professionals. It has been described as the "world's largest IT security organization". The most widely known certification offered by ISC2 is the Certified Information Systems Security Professional (CISSP) certification.
History
In the mid-1980s a need arose for a standardized and vendor-neutral certification program that provided structure and demonstrated competence in the field of IT security, and several professional societies recognized that certification programs attesting to the qualifications of information security personnel were desperately needed.
In June 1988, a conference was hosted by the National Institutes of Standards and Technology (NIST) and the Federal Information Systems Security Educators Association (FISSEA) at Idaho State University in Pocatello, Idaho to address the need for standardized curriculum for the burgeoning profession. Organizations in attendance included:
Canadian Information Processing Society (CIPS)
Computer Security Institute (CSI)
Data Processing Management Association Special Interest Group for Certified Professionals (DPMA SIG-CP)
Data Processing Management Association Special Interest Group for Computer Security (DPMA SIG-CS)
Idaho State University (ISU)
Information Systems Security Association (ISSA)
International Federation for Information Processing (IFIP)
During the conference, the question was raised why virtually every group represented, save NIST and ISU, was creating a professional certification. The conference participants agreed to form a consortium that would attempt to bring together the competing agendas of the various organizations. In November 1988, the Special Interest Group for Computer Security (SIG-CS), a member of the Data Processing Management Association (DPMA), brought together several organizations interested in this. The ISC2 was formed in mid-1989 as a non-profit organization with this goal in mind [8].
By 1990, the first working committee to establish something called the Common Body of Knowledge (CBK) had been formed. The work done by that committee resulted in the first version of CBK being finalized by 1992, with the CISSP credential launched by 1994, followed by the SSCP credential in 2001, the CAP credential in 2005, and the CSSLP credential in 2008, the CCFP and HCISPP in 2013 and the CCSP in 2015.[9]
In 2001, ISC2 established its Europe, Middle East and Africa regional office in London. In 2002, ISC2 opened its Asia-Pacific regional office in Hong Kong. In 2015, ISC2 introduced its North America regional office in Washington, D.C.
Since 2011, ISC2 organizes the annual ISC2 Security Congress conference. The 2019 conference will be the first international iteration of the event and will be held in Orlando, Florida.
In 2022, ISC2 pledged to expand and diversify the cybersecurity wor |
https://en.wikipedia.org/wiki/Rare%20Diseases%20Clinical%20Research%20Network%20Contact%20Registry | The Rare Diseases Clinical Research Network (RDCRN) Contact Registry is a patient contact registry started in 2004 and sponsored by the National Institutes of Health (NIH). The RDCRN Contact Registry collects and stores the contact information of people who want to participate in RDCRN-sponsored research or learn more about RDCRN research. It connects patients with researchers in order to advance rare disease research.
The Rare Diseases Clinical Research Network (RDCRN) is a U.S.-based research network funded by the NIH. It fosters research to better understand, diagnose, and treat rare diseases. Its 20 consortia—teams of scientists, physicians, and patients—each study a group of related rare diseases. Established by Congress under the Rare Diseases Act of 2002, the RDCRN is an initiative of the Office of Rare Diseases Research at the NIH's National Center for Advancing Translational Sciences. Future research may produce helpful information for those with rare diseases.
Individuals who are 18 years of age and older and have a rare disease, are a caregiver for someone with a rare disease, or an unaffected individual can join the RDCRN registry. The contact registry collects basic data (i.e. contact information, diagnosis, medical history) to be stored in a secure, computerized database hosted by the RDCRN's Data Management and Coordinating Center based at Cincinnati Children's Hospital Medical Center.
Function
The registry collects and maintains the contact information of people who want to:
Receive information about RDCRN's rare diseases research
Learn about opportunities to participate in RDCRN research.
It allows patients and others to connect with research teams and patient advocacy groups focused on particular diseases. data about individuals who are interested in receiving information about rare disease research and opportunities for research participation. The registry supports the dissemination of information relevant to the RDCRN community. It also offers RDCRN investigators and patient advocacy groups access to data that will help them assess the feasibility of conducting a proposed study.
Funding
The RDCRN Contact Registry is operated by the Rare Diseases Clinical Research Network which is funded by the National Institutes of Health and led by the National Center for Advancing Translational Sciences through its Office of Rare Diseases Research. It is governed by the RDCRN Contact Registry Oversight Committee. The contact registry is hosted and maintained by the RDCRN's Data Management and Coordinating Center at Cincinnati Children's Hospital Medical Center.
References
External links
Rare Diseases Clinical Research Network (RDCRN)
RDCRN Contact Registry
National Institutes of Health
Rare diseases |
https://en.wikipedia.org/wiki/V%C3%A4sterg%C3%B6tland%20Runic%20Inscription%208 | Västergötland Runic Inscription 8 or Vg 8 is the Rundata listing for a Viking Age memorial runestone located at the church at Hjälstad, which is about one kilometer west of Moholm, Västra Götaland County, Sweden, and in the historic province of Västergötland.
Description
The inscription on Vg 8 consists of runes carved in the younger futhark on a serpent that runs up one edge of the runestone, across its face, and then down the other edge. On the face of the stone is a large cross, and a second cross is located above the end of the serpent's tail. The inscription is classified as being carved in runestone style Fp. This is the classification for inscriptions with runic bands that have attached serpent or beast heads depicted as seen from above. The stone was discovered in the north wall of the church in 1890. Before the historic nature of runestones was understood, they were often reused as materials in the construction of buildings, churches, and bridges. The stone was removed from the church wall in 1937 and raised in the churchyard.
The runic text states that the stone was raised by a man possibly named Geitingr in memory of his brother Geirmundr. Geirmundr is described as being þegn goðan or "a good thegn," a phrase that is also used on runestone DR 143 from Gunderup and, in its plural form, on Sö 34 from Tjuvstigen. A thegn was a class of retainer, and about fifty memorial runestones in Denmark and Sweden mention that the deceased was a thegn. The runic text ends with a short prayer, which is on the serpent's tail below the smaller cross.
Inscription
Transliteration of the runes into Latin characters
kitikr × risti × stin × þena × eftiʀ × kimut × bruþur × sin × þen × kuþaa × kuþ albi ×
Transcription into Old Norse
Gæitingʀ(?) ræisti stæin þenna æftiʀ Gæiʀmund, broður sinn, þegn goðan. Guð hialpi.
Translation in English
Geitingr(?) raised this stone in memory of Geirmundr, his brother, a good thegn. May God help.
References
Vastergotland Runic Inscription 008 |
https://en.wikipedia.org/wiki/The%20Tramp%20and%20the%20Crap%20Game | The Tramp and the Crap Game is a silent film from the year 1900. It's unknown if a copy survives, but it could be lost. It is unwatchable on computers.
References
External links
1900 films
American silent short films
American black-and-white films
1900s American films |
https://en.wikipedia.org/wiki/Hiram%20na%20Puso | (International title: A Change of Heart / ) is a 2012 Philippine television drama series broadcast by GMA Network. Directed by Andoy Ranay and Roderick Lindayag, it stars Kris Bernal. It premiered on March 5, 2012 on the network's Afternoon Prime line up replacing Kokak. The series concluded on July 6, 2012 with a total of 88 episodes. It was replaced by Hindi Ka na Mag-iisa in its timeslot.
Cast and characters
Lead cast
Kris Bernal as Lira Banaag
Supporting cast
Mark Herras as Prince
Gina Alajar as Zeny Banaag
Gardo Versoza as Leo Saavedra
Ayen Munji-Laurel as Roxanne Saavedra
Bela Padilla as Vanessa Saavedra / Kara Banaag
Polo Ravales as Dennis
Krystal Reyes as Angeline Saavedra
Candy Pangilinan as Becky
Wynwyn Marquez as Jillian
Ana Marin as Chona
Marc Acueza as Choy
Guest cast
Ehra Madrigal as young Becky
Stef Prescott as young Zeny
Renz Valerio as young Prince
Angie Ferro as a patient
Ratings
According to AGB Nielsen Philippines' Mega Manila household television ratings, the pilot episode of earned a 6.6% rating. While the final episode scored a 20.7% rating.
Accolades
References
External links
2012 Philippine television series debuts
2012 Philippine television series endings
Filipino-language television shows
GMA Network drama series
Television shows set in the Philippines |
https://en.wikipedia.org/wiki/International%20Society%20for%20Nanoscale%20Science%2C%20Computation%2C%20and%20Engineering |
The International Society for Nanoscale Science, Computation, and Engineering (ISNSCE, pronounced like "essence") is a scientific society specializing in nanotechnology and DNA computing. It was started in 2004 by Nadrian Seeman, founder of the field of DNA nanotechnology. According to the society, its purpose is "to promote the study of the control of the arrangement of the atoms in matter, examine the principles that lead to such control, to develop tools and methods to increase such control, and to investigate the use of these principles for molecular computation, and for engineering on the finest possible scales."
ISNSCE sponsors two academic conferences each year: the first is Foundations of Nanoscience (FNANO), and the second is the International Conference on DNA Computing and Molecular Computation (DNA Computing). The FNANO conference has been held in Snowbird, Utah each year in April since 2004, and focuses on molecular self-assembly of nanoscale materials and devices. DNA Computing focuses on biomolecular computing and DNA nanotechnology, and has been held annually since 1995. The proceedings of DNA Computing are published as part of the Lecture Notes in Computer Science book series.
Awards
ISNSCE sponsors two awards annually. The ISNSCE Nanoscience Prize recognizes research in any area of nanoscience, and has been presented at FNANO each year since 2007. The Tulip Award in DNA Computing is specific to the fields of biomolecular computing and molecular programming, and has been presented at the DNA Computing conference since 2000. ISNSCE also sponsors two student awards for papers presented at the DNA Computing conference each year.
The Tulip Award was first given at the sixth DNA Computing conference, in Leiden, the Netherlands, whose botanical garden is known as the birthplace of the tulip culture in the Netherlands.
In April 2015, ISNCSE established the Robert Dirks Molecular Programming Prize to recognize early-career scientists for molecular programming research. The award was established in memory of Dirks, who was one of the six fatalities of the February 2015 Valhalla train crash.
ISNSCE Nanoscience Prize
The following are recipients of the ISNSCE Nanoscience Prize:
Tulip Award in DNA Computing
The following are recipients of the Tulip Award in DNA Computing:
See also
Kavli Prize in Nanoscience
Foresight Institute Feynman Prize in Nanotechnology
IEEE Pioneer Award in Nanotechnology
References
External links
International Society for Nanoscale Science, Computation, and Engineering
Foundations of Nanoscience conference
International Conference on DNA Computing and Molecular Programming
International scientific organizations
Nanotechnology institutions |
https://en.wikipedia.org/wiki/Circuit%20satisfiability%20problem | In theoretical computer science, the circuit satisfiability problem (also known as CIRCUIT-SAT, CircuitSAT, CSAT, etc.) is the decision problem of determining whether a given Boolean circuit has an assignment of its inputs that makes the output true. In other words, it asks whether the inputs to a given Boolean circuit can be consistently set to 1 or 0 such that the circuit outputs 1. If that is the case, the circuit is called satisfiable. Otherwise, the circuit is called unsatisfiable. In the figure to the right, the left circuit can be satisfied by setting both inputs to be 1, but the right circuit is unsatisfiable.
CircuitSAT is closely related to Boolean satisfiability problem (SAT), and likewise, has been proven to be NP-complete. It is a prototypical NP-complete problem; the Cook–Levin theorem is sometimes proved on CircuitSAT instead of on the SAT, and then CircuitSAT can be reduced to the other satisfiability problems to prove their NP-completeness. The satisfiability of a circuit containing arbitrary binary gates can be decided in time .
Proof of NP-Completeness
Given a circuit and a satisfying set of inputs, one can compute the output of each gate in constant time. Hence, the output of the circuit is verifiable in polynomial time. Thus Circuit SAT belongs to complexity class NP. To show NP-hardness, it is possible to construct a reduction from 3SAT to Circuit SAT.
Suppose the original 3SAT formula has variables , and operators (AND, OR, NOT) . Design a circuit such that it has an input corresponding to every variable and a gate corresponding to every operator. Connect the gates according to the 3SAT formula. For instance, if the 3SAT formula is the circuit will have 3 inputs, one AND, one OR, and one NOT gate. The input corresponding to will be inverted before sending to an AND gate with and the output of the AND gate will be sent to an OR gate with
Notice that the 3SAT formula is equivalent to the circuit designed above, hence their output is same for same input. Hence, If the 3SAT formula has a satisfying assignment, then the corresponding circuit will output 1, and vice versa. So, this is a valid reduction, and Circuit SAT is NP-hard.
This completes the proof that Circuit SAT is NP-Complete.
Restricted Variants and Related Problems
Planar Circuit SAT
Assume that we are given a planar Boolean circuit (i.e. a Boolean circuit whose underlying graph is planar) containing only NAND gates with exactly two inputs. Planar Circuit SAT is the decision problem of determining whether this circuit has an assignment of its inputs that makes the output true. This problem is NP-complete. Moreover, if the restrictions are changed so that any gate in the circuit is a NOR gate, the resulting problem remains NP-complete.
Circuit UNSAT
Circuit UNSAT is the decision problem of determining whether a given Boolean circuit outputs false for all possible assignments of its inputs. This is the complement of the Circuit SAT problem, and is therefore |
https://en.wikipedia.org/wiki/Three%20degrees%20of%20influence | Three Degrees of Influence is a theory in the realm of social networks, proposed by Nicholas A. Christakis and James H. Fowler in 2007. It has since been explored by scientists in numerous disciplines using diverse statistical, psychological, sociological, and biological approaches.
Christakis and Fowler explored the influence of social connections on behavior. They described how social influence does not end with the people to whom a person is directly connected. People influence their friends, who in turn influence their friends, and so on; hence, a person's beliefs and actions can influence people they have never met, to whom they are only indirectly tied. Christakis and Fowler posited that diverse phenomena "ripple through our network, having an impact on our friends (one degree), our friends’ friends (two degrees), and even our friends’ friends’ friends (three degrees). Our influence gradually dissipates and ceases to have a noticeable effect on people beyond the social frontier that lies at three degrees of separation." They posited a number of reasons for this decay, and they offered informational, psychological, and biological rationales.
This argument is basically that peer effects need not stop at one degree of separation. However, across a broad set of empirical settings, using both observational and experimental methods, they observed that the effect seems, in many cases, to no longer be meaningful at a social horizon of three degrees.
Using both observational and experimental methods, Christakis and Fowler examined phenomena from various domains, such as obesity, happiness, cooperation, voting, and various public health beliefs and behaviors. Investigations by other groups have subsequently explored many other phenomena in this way (including crime, social learning, etc.).
Rationale
Influence dissipates after three degrees (to and from friends’ friends’ friends) for three reasons, Christakis and Fowler propose:
Intrinsic decay—corruption of information, or a kind of "social friction" (like the game telephone).
Network instability—social ties become unstable (and are not constant across time) at a horizon of more than three degrees of separation.
Evolutionary purpose—we evolved in small groups where everyone was connected by three degrees or fewer (an idea receiving subsequent support ).
Scientific literature
Initial studies using observational data by Christakis and Fowler suggested that a variety of attributes (like obesity, smoking, and happiness), rather than being individualistic, are casually correlated by contagion mechanisms that transmit such phenomena over long distances within social networks. Certain subsequent analyses have explored limitations to these analyses (subject to different statistical assumptions); or have expressed concern that the statistical methods employed in these analyses cannot fully control for other environmental factors; or have noted that the statistical estimates arising from some approache |
https://en.wikipedia.org/wiki/Strelka%20%28chess%20engine%29 | Strelka (rus. Стрелка) is a computer chess engine for Windows, developed by Yuri Osipov. In total five versions of the program have been developed. The current version, 5.5, runs only on a single processor core. Strelka was one of the strongest programs in the world, according to several blitz rating lists and the strongest in Russia at the time.
Playing strength
As of version 5.0, Strelka includes 32-bit and 64-bit uniprocessor versions. In rating CCRL 40/40 from 17.08.2013 chess program Strelka 5.5 64-bit has 3115 Bayeselo. In blitz-rating CCRL 4/40 from 24.08.2013 chess program Strelka 5.1 64-bit has 3137 Bayeselo. In blitz-rating CEGT 4/40 from 28.08.2013 chess program Strelka 5.0 x64 1CPU has 3003 Elo.
Rybka controversy
In May 2007, a new chess engine called Strelka (Russian for "arrow") appeared on the scene, claimed to be written by Yuri Osipov (born in 1962). Soon, there were allegations that Strelka was a clone of Rybka 1.0 beta, in the sense that it was a reverse-engineered and slightly modified version of Rybka. Several players found Strelka to yield identical analysis to Rybka in a variety of different situations, even having the same bugs and weaknesses in some cases. Osipov, however, stated repeatedly on discussion boards that Strelka was based on Fruit, not Rybka, and that any similarities was either because Rybka also was based on Fruit, or because he had tuned the evaluation function to be as close to Rybka as possible.
With the release of Strelka 2.0 beta, source code was included. Rajlich stated that the source made it "obvious" that Strelka 2.0 beta was indeed a Rybka 1.0 beta clone, although not without some improvements in certain areas. On the basis of this, he claimed the source as his own and intended to re-release it under his own name, although he later decided not to do so. He also made allegations that "Yuri Osipov" was a pen name.
According to Victor Zakharov (Convekta company) in his review for Arena chess website: "I consider that Yuri Osipov (Ivanovich) is his real name. He didn't hide it. However I can't state this with 100% assurance."
And he also has some contact with Yuri Osipov for development of mobile platforms chess program.
However, Fruit author Fabien Letouzey has clearly expressed in the open letter mentioned above that Strelka 2.0 beta is a Fruit derivate with some minor changes.
References
External links
Chess engine Strelka (English translation)
Strelka by Yuri Osipov, Russia
By Jury Osipov (English Translated).
Chess engines |
https://en.wikipedia.org/wiki/Audra%20the%20Rapper | Audra The Rapper is an American rapper, songwriter, and television personality. She is a cast member on the third season of Oxygen Network's hit series 'Sisterhood of Hiphop' executive produced by T.I. Audra started writing music at the age of six years old and recording herself at age thirteen in her mother's closet. She released her first mixtape, Sweet and Sour Vol. I at age 16 and sold it at local malls and car washes. Audra has released 5 studio projects including her most recent, 'Anti Love Songs' which she released under her own label alongside Sony Music's RED Distribution.
Early years
Audra was born in Washington, DC and raised in Richmond, Virginia by her single-mother and grandmother. Audra has said music was a great inspiration to her, especially when it comes to Jazz and RnB. Listening to her grandmother spin Anita Baker, Louis Armstrong and Ella Fitzgerald made singing an early priority for her. Audra was raised in the church and joined the choir at age 5 and was leading solos by age 6. Audra says she was 6 years old when she got her first CD, Brandy Norwood's (aka Brandy) self-titled debut album and it fixed her attention on having a music career. Audra has stated that her major musical influences are Lauryn Hill, The Diplomats, Kanye West, and Floetry.
Music
In the summer of 2009, Audra The Rapper and Rick Ross crossed paths when by chance they were both at iPower 92.1 radio station in Audra's hometown of Richmond, VA. The two met a second time in October 2010 at a university homecoming concert in Richmond where Audra opened for Ross and her performance lead Ross to endorse, mentor, and co-sign her.
Audra The Rapper on numerous occasions has said how Lauryn Hill is her all time inspiration, so much so that Audra's 2010 mixtape, Miseducation of Audra was a tribute to Lauryn.
Unlike a lot of rappers, whose rap style have easily been categorized as Trap, Hardcore or Conscious, Audra The Rapper has partnered her lyrics with a variety of sounds, reflecting various styles and has described her style is "Ratchet Soul".
Discography
Songs
2011 "Love Song Remix" ft Mickey Factz and Raheem DeVaughn
2013 "Hit and Run" ft Abir
2015 "China.Bus"
2016 "Done.Did"
2016 "Sometimes"
2016 "Bxtchlxss"
Mixtapes
2007 Sweet and Sour
2010 Miseducation of Audra
2011 No Such Thing Does Exist
EPs
2015 Retrospectrum
Albums
2016 Anti Love Songs
Videos
2014 "Nutter Butters"
2015 No.Body
2016 Sometimes
Honors and awards
References
External links
Year of birth missing (living people)
American women rappers
African-American women rappers
American hip hop singers
African-American women singer-songwriters
Living people
Old Dominion University alumni
Musicians from Richmond, Virginia
Musicians from Virginia Beach, Virginia
Rappers from Washington, D.C.
Singer-songwriters from Virginia
21st-century American rappers
21st-century American women musicians
Date of birth missing (living people)
21st-century African-Ame |
https://en.wikipedia.org/wiki/Andy%20Johnson-Laird | Andy Johnson-Laird (born February 1945) is an English-American computer scientist. He was the president of digital forensics firm Johnson-Laird Inc. in Portland, Oregon, where he lived with his wife, Kay Kitagawa.
Early life
Johnson-Laird was born in Sheffield in England in February 1945. He was educated at Culford School and then attended the Regent Street Polytechnic, now known as The University of Westminster. Johnson-Laird also has lived in Ferney-Voltaire (France), Toronto (Canada), and San Jose, (Northern California).
Johnson-Laird's computer career started in 1963 at National Cash Register Company's London offices where he worked as a computer operator and taught himself to program the NCR 315 mainframe computer during the night shift. He was then invited to teach as a lecturer in NCR's Computer Education department, teaching NCR customers how to program. Subsequently, he wrote system software for the NCR-Elliott 4100 mainframe computer. Johnson-Laird also worked as a systems programmer for Control Data Corporation in Ferney-Voltaire in support of supercomputer installations at CERN. and various universities in Europe. He transferred to Control Data Corporation's Toronto Development Facility in 1977.
In the late 1970s, Johnson-Laird applied his knowledge of mainframe computers to the emerging hobbyist personal computer market. He purchased and hand-built a SOL-20 personal computer from Processor Technology, and a Cromemco Z-2 as test platforms.
Immigration
Johnson-Laird's 1979 immigration to the United States resulted in litigation over "a legal issue of first impression" concerning "the proper interpretation of section 101(a)(15)(L) of the Immigration and Nationality Act, 8 U.S.C. s 1101(a)(15)(L), which allows 'a firm or corporation or other legal entity' to petition for the granting of 'non-immigrant' status to employees which it wishes to transfer to corporate posts in this country". Johnson-Laird was successful in his challenge to the agency's interpretation of this rule to not permit a petition for an "L" visa by a sole proprietorship. Johnson-Laird was represented by Portland immigration attorney, Gerald H. Robinson Esq. United States District Court Judge James Redden ruled that "Congress intended that the legal status of the petitioning business not be a dispositive consideration in immigration proceedings".
On arriving in the US in 1979, Johnson-Laird wrote the software drivers to permit the CP/M Operating System to run on an Onyx computer—this was the first commercial CP/M microcomputer with a hard disk and a data cartridge tape drive.
Johnson-Laird is one of the early pioneers in the field of digital forensics. His specialty, developed in 1987, is forensic software analysis of computer and Internet-based evidence for copyright, patent, and trade-secret litigation. He is also an expert on software reverse engineering, software development, and developing software in a clean-room environment.
Johnson-Laird developed techniq |
https://en.wikipedia.org/wiki/Isaac%20L.%20Auerbach | Isaac L. Auerbach (October 9, 1921 – December 24, 1992) was an early advocate and pioneer of computing technologies, holder of 15 patents, founding president of the International Federation for Information Processing (1960–1965), a member of the National Academy of Sciences, an executive at the Burroughs Corporation and a developer of first computers at Sperry Univac.
International Federation for Information Processing established Isaac L. Auerbach Award in his name.
Auerbach was elected as a Distinguished Fellow of the British Computer Society in 1975 for his pioneering work in computing technologies. He graduated from Drexel University (BS) and Harvard University (MS).
References
1921 births
1992 deaths
American electrical engineers
American computer scientists
Members of the United States National Academy of Sciences
Members of the United States National Academy of Engineering
International Federation for Information Processing
Place of birth missing
Burroughs Corporation people
Fellows of the British Computer Society
Drexel University alumni
Harvard University alumni |
https://en.wikipedia.org/wiki/Spooky%20Valentine | Spooky Valentine is a 2012 Philippine television drama romance horror anthology broadcast by GMA Network. It premiered on February 4, 2012 replacing Spooky Nights. The show concluded on February 25, 2012 with a total of 4 episodes.
Episodes
"Maestra"
"Masahista"
"Manibela"
"Manikurista"
Ratings
According to AGB Nielsen Philippines' Mega Manila household television ratings, the pilot episode of Spooky Valentine earned a 20.5% rating. While the final episode scored a 19.9% rating.
References
2012 Philippine television series debuts
2012 Philippine television series endings
Filipino-language television shows
GMA Network original programming
Philippine anthology television series
Television shows set in the Philippines |
https://en.wikipedia.org/wiki/Shadow%20of%20the%20Cloak | Shadow of the Cloak was a spy drama live television series broadcast on the now-defunct DuMont Television Network. Helmut Dantine played secret agent Peter House. John Gay wrote some of the 36 episodes.
The first episode aired June 6, 1951, and the last episode March 20, 1952. The 30-minute show aired Wednesdays at 9:30 p.m. ET through November 1951 and then Thursdays at 9 p.m. ET from December until March 20, 1952. From January 1952 until the end of the run, Shadow of the Cloak alternated with Gruen Playhouse.
Preservation status
One episode, "The Last Performance" (aired January 10, 1952), written by Rod Serling, is known to have survived.
See also
List of programs broadcast by the DuMont Television Network
List of surviving DuMont Television Network broadcasts
1951–52 United States network television schedule
Citations
General bibliography
Brooks, Tim, and Earle Marsh, The Complete Directory to Prime Time Network TV Shows, Third edition (New York: Ballantine Books, 1964)
McNeil, Alex. Total Television, Fourth edition (New York: Penguin Books, 1980)
Weinstein, David. The Forgotten Network: DuMont and the Birth of American Television (Philadelphia: Temple University Press, 2004)
External links
List of episodes at CTVA
DuMont Television Network Historical Web Site
1951 American television series debuts
1952 American television series endings
1950s American drama television series
American live television series
Black-and-white American television shows
DuMont Television Network original programming
English-language television shows
Espionage television series
Lost television shows |
https://en.wikipedia.org/wiki/Star-mesh%20transform | The star-mesh transform, or star-polygon transform, is a mathematical circuit analysis technique to transform a resistive network into an equivalent network with one less node. The equivalence follows from the Schur complement identity applied to the Kirchhoff matrix of the network.
The equivalent impedance betweens nodes A and B is given by:
where is the impedance between node A and the central node being removed.
The transform replaces N resistors with resistors. For , the result is an increase in the number of resistors, so the transform has no general inverse without additional constraints.
It is possible, though not necessarily efficient, to transform an arbitrarily complex two-terminal resistive network into a single equivalent resistor by repeatedly applying the star-mesh transform to eliminate each non-terminal node.
Special cases
When N is:
For a single dangling resistor, the transform eliminates the resistor.
For two resistors, the "star" is simply the two resistors in series, and the transform yields a single equivalent resistor.
The special case of three resistors is better known as the Y-Δ transform. Since the result also has three resistors, this transform has an inverse Δ-Y transform.
See also
Topology of electrical circuits
Network analysis (electrical circuits)
References
E.B. Curtis, D. Ingerman, J.A. Morrow. Circular planar graphs and resistor networks. Linear Algebra and its Applications. Volume 283, Issues 1–3, 1 November 1998, pp. 115–150| doi = https://doi.org/10.1016/S0024-3795(98)10087-3.
Electrical circuits
Circuit theorems
Transforms |
https://en.wikipedia.org/wiki/Buses%20in%20Barcelona | Buses are a common form of public transport in Barcelona, with an extensive local and interurban bus network. There is also a network of night buses called Nitbus (es) and a transitway system called RetBus is currently being developed, which is intended to complement the current local bus network. All bus routes serving Barcelona metropolitan area are organized by Autoritat del Transport Metropolità (ATM). In Barcelona there are over 230 bus lines are used. A network such as e.g. exists for the metro, is quite confusing and not practical. It is therefore difficult to say which bus will take one from a place to another. The bus plans are available at the tourist information office on request.Local services are operated in most part by Transports Metropolitans de Barcelona (TMB), although other bus services are operated by several private companies under common names.
History
Operation
Local buses
The local bus network is very extended and reaches all neighbourhoods in Barcelona including some municipalities attached to the city and the airport. Local buses are operated in most part by Transports Metropolitans de Barcelona (TMB) although there are some lines which are operated by private sector companies under contract to TMB. There are over 100 urban lines serving the city and most of them pass through two or more districts, covering relatively long distances within Barcelona. Because of this, some lines called Bus del Barri (meaning The Neighbourhood's Bus in Catalan) were created. These lines are operated by small buses and cover short-haul routes enabling access to various parts of the neighbourhood as the shopping area, health care services, education centers and other facilities.
New Bus Network
In 2011, TMB announced plans for an improved bus network, initially dubbed "RetBus". This was introduced in 6 phases between 2012 and 2018 which established 28 high performance lines: 17 vertical (sea-mountain), 8 horizontal (Llobregat-Besòs) and 3 diagonal.
Interurban buses
The interurban bus service links Barcelona with the other towns in the metropolitan area. See the timetables of the various buses by searching the AMB (Àrea Metropolitana de Barcelona) website.
Nitbus
During the night, the company NitBus provides a night-time bus service in Barcelona and the first metropolitan ring with 17 lines. All of them, except the N0, go through Plaça de Catalunya, where you can change to other lines.
Aerobús
Tour buses
Long distance buses
Other
Numbering and pricing
See also
Transport in Barcelona
Autoritat del Transport Metropolità
Transports Metropolitans de Barcelona
Urban planning of Barcelona
References
External links
Transports Metropolitans de Barcelona
TMB iBus
Local bus network map
Autobuses BCN. Unofficial website about the history of bus lines within Barcelona and Catalonia.
Mobilitat. Àrea Metropolitana de Barcelona
Buses and Public Transportation in Barcelona
Transport in Barcelona
Bus transport in Spain |
https://en.wikipedia.org/wiki/Die%20Achse%20des%20Guten | Die Achse des Guten (German for The Axis of the Good) is a political right blog run by the publicists Henryk M. Broder and that identifies itself as a "publicist network".
According to its own data, the blog had over 670,000 visitors in January 2010, according to a report of die tageszeitung, the blog had 50,000 visitors a month in 2005. The blog self-identifies as "liberal and pro-West“, among its topics are Islam, the spread of Islam, climate change denial and political correctness.
References
External links
German political websites
Blogs critical of Islam
Islamophobic publications
German-language mass media |
https://en.wikipedia.org/wiki/Supercomputer%20architecture | Approaches to supercomputer architecture have taken dramatic turns since the earliest systems were introduced in the 1960s. Early supercomputer architectures pioneered by Seymour Cray relied on compact innovative designs and local parallelism to achieve superior computational peak performance. However, in time the demand for increased computational power ushered in the age of massively parallel systems.
While the supercomputers of the 1970s used only a few processors, in the 1990s, machines with thousands of processors began to appear and by the end of the 20th century, massively parallel supercomputers with tens of thousands of commercial off-the-shelf processors were the norm. Supercomputers of the 21st century can use over 100,000 processors (some being graphic units) connected by fast connections.
Throughout the decades, the management of heat density has remained a key issue for most centralized supercomputers. The large amount of heat generated by a system may also have other effects, such as reducing the lifetime of other system components. There have been diverse approaches to heat management, from pumping Fluorinert through the system, to a hybrid liquid-air cooling system or air cooling with normal air conditioning temperatures.
Systems with a massive number of processors generally take one of two paths: in one approach, e.g., in grid computing the processing power of a large number of computers in distributed, diverse administrative domains, is opportunistically used whenever a computer is available. In another approach, a large number of processors are used in close proximity to each other, e.g., in a computer cluster. In such a centralized massively parallel system the speed and flexibility of the interconnect becomes very important, and modern supercomputers have used various approaches ranging from enhanced Infiniband systems to three-dimensional torus interconnects.
Context and overview
Since the late 1960s the growth in the power and proliferation of supercomputers has been dramatic, and the underlying architectural directions of these systems have taken significant turns. While the early supercomputers relied on a small number of closely connected processors that accessed shared memory, the supercomputers of the 21st century use over 100,000 processors connected by fast networks.
Throughout the decades, the management of heat density has remained a key issue for most centralized supercomputers. Seymour Cray's "get the heat out" motto was central to his design philosophy and has continued to be a key issue in supercomputer architectures, e.g., in large-scale experiments such as Blue Waters. The large amount of heat generated by a system may also have other effects, such as reducing the lifetime of other system components.
There have been diverse approaches to heat management, e.g., the Cray 2 pumped Fluorinert through the system, while System X used a hybrid liquid-air cooling system and the Blue Gene/P is air-cooled with |
https://en.wikipedia.org/wiki/Elicitation | Elicitation may refer to:
Collecting intelligence information from people as part of human intelligence (intelligence gathering)
Elicitation technique or elicitation procedure, any of various data collection techniques in social sciences or other fields to gather knowledge or information from people
Expert elicitation, the synthesis of opinions of experts on a subject where there is uncertainty due to insufficient data
Multiple EM for Motif Elicitation, a tool for discovering motifs in a group of related DNA or protein sequences
Preference elicitation, the problem of developing a decision support system capable of generating recommendations to a user, thus assisting him in decision making
Requirements elicitation, the practice of obtaining the requirements of a system from users, customers and other stakeholders
Zaltman metaphor elicitation technique, a patented market research tool
See also
Elicitor |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.