source
stringlengths
32
199
text
stringlengths
26
3k
https://en.wikipedia.org/wiki/Cleaning%20%28disambiguation%29
Cleaning is the process of removing unwanted substances, such as dirt, infectious agents, and other impurities, from an object or environment. Cleaning may also refer to: Digital technology Data cleansing or data cleaning, the process of detecting and correcting (or removing) corrupt or inaccurate records from a record set, table, or database Data scrubbing, an error correction technique applied to main memory or storage Infrared cleaning, a technique used by some film scanners and flatbed scanners to reduce or remove the effect of dust and scratches upon the finished scan Sanitization (classified information), the removal of sensitive information from a document or other message Other uses Cleaning (forestry), the practice of selecting desirable trees in a young stand and removing trees that threaten their development Silviculture cleaning, the release of select saplings from competition by overtopping trees of a comparable age Organizing, as in professional organizing See also Clean (disambiguation) Cleanliness Cleansing (disambiguation)
https://en.wikipedia.org/wiki/Ministry%20of%20Health%20%28Czech%20Republic%29
The Ministry of Health of the Czech Republic () is a government ministry of the Czech Republic. See also Healthcare in the Czech Republic Timeline of ministers on Wikidata References External links Czech Republic Health Health in the Czech Republic Czechia, Health
https://en.wikipedia.org/wiki/Rodger%27s%20method
Rodger's method is a statistical procedure for examining research data post hoc following an 'omnibus' analysis (e.g., after an analysis of variance – anova). The various components of this methodology were fully worked out by R. S. Rodger in the 1960s and 70s, and seven of his articles about it were published in the British Journal of Mathematical and Statistical Psychology between 1967 and 1978. Statistical procedures for finding differences between groups, along with interactions between the groups that were included in an experiment or study, can be classified along two dimensions: 1) were the statistical contrasts that will be evaluated decided upon prior to collecting the data (planned) or while trying to figure out what those data are trying to reveal (post hoc), and 2) does the procedure use a decision-based (i.e., per contrast) error rate or does it instead use an experiment-wise error rate. Rodger's method, and some others, are classified according to these dimensions in the table below. Statistical power In early 1990s, one set of researchers made this statement about their decision to use Rodger's method: “We chose Rodger’s method because it is the most powerful post hoc method available for detecting true differences among groups. This was an especially important consideration in the present experiments in which interesting conclusions could rest on null results” (Williams, Frame, & LoLordo, 1992, p. 43). The most definitive evidence for the statistical power advantage that Rodger's method possesses (as compared with eight other multiple comparison procedures) is provided in a 2013 article by Rodger and Roberts. Type 1 error rate Statistical power is an important consideration when choosing what statistical procedure to use, but it isn't the only important one. All statistical procedures permit researchers to make statistical errors and they are not all equal in their ability to control the rate of occurrence of several important types of statistical error. As Table 1 shows, statisticians can't agree on how error rate ought to be defined, but particular attention has been traditionally paid to what are called 'type 1 errors' and whether or not a statistical procedure is susceptible to type 1 error rate inflation. On this matter, the facts about Rodger's method are straightforward and unequivocal. Rodger's method permits an absolutely unlimited amount of post hoc data snooping and this is accompanied by a guarantee that the long run expectation of type 1 errors will never exceed the commonly used rates of either 5 or 1 percent. Whenever a researcher falsely rejects a true null contrast (whether it is a planned or post hoc one) the probability of that being a type 1 error is 100%. It is the average number of such errors over the long run that Rodger's method guarantees cannot exceed Eα = 0.05 or 0.01. This statement is a logical tautology, a necessary truth, that follows from the manner in which Rodger's method was origin
https://en.wikipedia.org/wiki/Colin%20Robbins%20%28software%20engineer%29
Colin Robbins (born 1964) is a network protocol and software engineer credited for research work in distributed directory systems and a co-inventor of LDAP. Educated at Alleyn's School, he holds a BSc, Computer Science & Electronic Engineering, with first class honours, from University College London. Robbins developed the Quipu directory part of the ISO Development Environment (ISODE) while a research assistant at UCL working for Peter Kirstein, he became custodian of ISODE from Marshall Rose in 1991. Quipu was used to prototype DIXIE and DASED, which merged to invent LDAP of which Robbins wrote the String Representation of Standard Attribute Syntaxes element defined in RFCs 1448 and 1778 published by the IETF. Robbins wrote part 3 of Steve Kille's book Implementing X.400 and X.500: the PP and QUIPU Systems. Robbins was the Technical Architect and Vice-Chairman of the Europe-wide Nameflow Paradise directory, the world’s largest distributed deployment of X.500. He also led the Electronic Messaging Association's (EMA) world directory challenge for which he received the EMA's distinguished service award (1997), and led the European Electronic Messaging Association (EEMA) Security Challenge for which Robbins was awarded EEMA personality of the year (1998). Robbins is chartered by the Institute of Directors, serving of the Boards of Nexor and the Information Assurance Advisory Council (IAAC), as a sponsor member. He was co-chair of the Information Assurance Collaboration Group (IACG) 2012-2014. He is Water Polo coach and vice-chair at Nottingham Leander Swimming Club. References External links Blog English computer scientists Living people People in information technology People associated with computer security Alumni of University College London People educated at Alleyn's School 1964 births
https://en.wikipedia.org/wiki/Nexor
Nexor Limited is a privately held company based in Nottingham, providing products and services to safeguard government, defence and critical national infrastructure computer systems. It was originally known as X-Tel Services Limited. History Nexor Limited was founded in 1989 as X-Tel Services Limited out of the University of Nottingham and UCL, following research into X.400 and X.500 systems for the ISODE project. In 1992 Stephen Kingan joined the business as CEO. In 1993 X-Tel Services Limited was renamed Nexor Limited. In 1996 3i invested in the business to launch Nexor Inc. In 2004 Kingan and Nigel Fasey acquired the business. In 2008 Colin Robbins was appointed to the board as CTO. In 2012 Kingan acquired 100% ownership of Nexor. In October 2013, the company moved its headquarters from Nottingham Science Park to the NG2 Business Park. Nexor customers include NATO, European Defence Agency, UK MoD, US DOD, Canadian DND, Foreign and Commonwealth Office and Met Office. Nexor designed and deployed the first public Internet search engine ALIWEB and the associated robots exclusion standard. Nexor is a contributor to the Internet Engineering Task Force, having worked on Internet RFCs 1086, 1165, 1488, 1606 and 1778. Nexor developed a Microsoft Exchange Client for Unix. Nexor was the first organisation to be awarded the Intellect Best Practice Certificate. Nexor has run regular demonstrations at the Coalition Warrior Interoperability Demonstration. Nexor was the first organisation to achieve TickItPlus a quality-management certification program for software development. Nexor has strategic partnerships with Boldon James and QinetiQ. Nexor's Data Diode product is supplied via an OEM relationship with Fox-IT. Nexor is a supplier of the UK Government G-Cloud Cloudstore, and an Official cyber security supplier to the UK Government. Nexor won 2013 DSEi innovation challenge. Nexor is a contributor to Cyber Champions a community initiative to promote best practices in digital literacy and online safety awareness to schools, youth organisations and interest groups across the UK. Nexor sponsors the Cyber Security Challenge designed to promote careers in cyber security. Nexor was in the first batch of companies to achieve the UK’s Cyber Essential standard and a contributor and industry launch partner to the PAS754 software development standard led by the Trustworthy Software Initiative. In 2015 Nexor launched a consulting arm - Qonex Products and services Nexor is primarily focused on Secure Information Exchange for defence, governments and critical infrastructure. Products and services include: Data Diodes to enforce one way data flows Data Guards and High Assurance Guards to authorise and filter email and data communications Cross Domain Solutions and Information Exchange Gateways to enable secure information exchange between secure networks CyberShield Secure to ensure secure development and deployment of Nexor's technology Military Message Ha
https://en.wikipedia.org/wiki/Iranian%20Cyber%20Police
The Iranian Cyber Police (, Pelis-e Fezai-ye Tulid-e vâ Tebadâl-e Atlâ'at-e Iran, lit. The Police for the Sphere of the Production and Exchange of Information, also known as FATA ) is a unit of the Islamic Republic of Iran Police, founded in January 2011. In December 2012, the head of Tehran's cyber police unit was dismissed in relation to the death of Iranian blogger Sattar Beheshti, who was being held in the cyber police's custody. Inauguration In 2009, Iran's Police Chief Brigadier General Esmail Ahmadi-Moqaddam announced plans to set up a cyber police division to counter "internet crimes". On January 23, 2011, Iran's Cyber Police (FATA) unit was launched with Brigadier General Kamal Hadianfar as the head of the new force. At the inaugural ceremony, Police Chief Esmail Ahmadi-Moqaddam said the unit was now operational in Tehran and that by the end of the Iranian year, police stations throughout the country would have their own cyber units. According to Agence France-Presse, Ahmadi-Moqaddam said "the cyber police would take on anti-revolutionary and dissident groups who used Internet-based social networks in 2009 to trigger protests against the re-election of President Mahmoud Ahmadinejad." Activities In January 2012, the cyber police issued new guidelines for Internet cafés, requiring users to provide personal information that would be kept by café owners for six months, as well as a record of the websites they visited. The rules also require café owners to install closed-circuit television cameras and maintain the recordings for six months. The cyber police stated the measures are being implemented because "citizens are concerned about theft of information." According to Golnaz Esfandiari of Radio Free Europe/Radio Liberty, however, the new rules "will also create a logbook that authorities can use to track down activists or whomever is deemed a threat to national security." The same month, the cyber police also arrested four administrators of a Facebook group that had launched an online beauty competition. The cyber police chief announced the group had been "destroyed" for spreading corruption and immorality. In June 2012, Iranian media reported that the cyber police would be launching a crack down on virtual private networks (VPNs), which is used by many Iranians to circumvent the government's Internet censorship. Social medias purge On the internet websites they monitor for Iranians and businesses that are running illegally including gymclubs , body sculpting plastic surgery and modeling they also call and indict users. Death of Sattar Beheshti On October 30, 2012, the cyber police arrested 35-year-old Sattar Beheshti for "actions against national security on social networks and Facebook." Beheshti had criticized the Iranian government in his blog. Beheshti was found dead in his prison cell on November 3, and was believed to have been tortured to death by the cyber police authorities. The death of Beheshti sparked international c
https://en.wikipedia.org/wiki/History%20of%20encyclopedias
Encyclopedias have progressed from the beginning of history in written form, through medieval and modern times in print, and most recently, displayed on computer and distributed via computer networks. Western encyclopedias Ancient times Encyclopedias have existed for around 2,000 years, although even older glossaries such as the Babylonian Urra=hubullu and the ancient Chinese Erya are also sometimes described as "encyclopedias". Marcus Terentius Varro Marcus Terentius Varro (; 116 BC – 27 BC) was an ancient Roman scholar and writer. His Nine Books of Disciplines became a model for later encyclopedists, especially Pliny the Elder. The most noteworthy portion of the Nine Books of Disciplines is its use of the liberal arts as organizing principles. Varro decided to focus on identifying nine of these arts: grammar, rhetoric, logic, arithmetic, geometry, astronomy, musical theory, medicine, and architecture. Using Varro's list, subsequent writers defined the seven classical "liberal arts of the medieval schools". Pliny the Elder The earliest encyclopedic work to have survived to modern times is the Naturalis Historia of Pliny the Elder, a Roman statesman living in the 1st century AD. He compiled a work of 37 chapters covering natural history, architecture, medicine, geography, geology, and all aspects of the world around him. He stated in the preface that he had compiled 20,000 facts from 2000 works by over 200 authors, and added many others from his own experience. The work was published around AD 77–79, although he probably never finished proofing the work before his death in the eruption of Vesuvius in AD 79. My subject is a barren one – the world of nature, or in other words life; and that subject in its least elevated department, and employing either rustic terms or foreign, many barbarian words that actually have to be introduced with an apology. Moreover, the path is not a beaten highway of authorship, nor one in which the mind is eager to range: there is not one of us who has made the same venture, nor yet one Greek who has tackled single-handed all departments of the subject. He also elaborates on the difficulties of writing such a work: It is a difficult task to give novelty to what is old, authority to what is new, brilliance to the common-place, light to the obscure, attraction to the stale, credibility to the doubtful, but nature to all things and all her properties to nature. This work became very popular in Antiquity, and survived, with many copies being made and distributed in the western world. It was one of the first classical manuscripts to be printed in 1470, and has remained popular ever since as a source of information on the Roman world, and especially Roman art, Roman technology and Roman engineering. It is also a recognised source for medicine, art, mineralogy, zoology, botany, geology and many other topics not discussed by other classical authors. Among many interesting entries are those for the elephant and the
https://en.wikipedia.org/wiki/NDR-Klein-Computer
The NDR Klein Computer, abbreviated NKC, was a do-it-yourself computer project from the early 1980s developed by (RDK) and Joachim Arendt. In 1984, the computer was featured in the educational television series NDR-Klein-Computer for NDR-Schulfernsehen (NDR School Television). It was also broadcast on the computer television show on the Bavarian TV network Bayerisches Fernsehen (BFS). History The NDR Klein Computer was created by Rolf-Dieter Klein, a computer enthusiast who regularly contributed articles to the German computer magazine mc. His plan was not only to give a basic introduction to the way a computer operates, but also to introduce a modular system through which laymen could learn to complete basic programming exercises, as well as acquire the skills to operate a high-end home computer. Under the direction of Joachim Arendt, they developed a television series that was picked up by Norddeutscher Rundfunk (NDR) for its NDR-Schulfernsehen (NDR School Television) channel. The series, titled NDR-Klein-Computer, consisted of twenty-six episodes of fifteen minutes each. Klein hosted the show and wrote articles in mc to supplement the series. He published a book on the same subject, titled: Microcomputer Selbstgebaut und Programmiert (DIY Microcomputer Building and Programming), through Franzis Verlag, which also released the TV series on VHS. The computer's hardware was provided by Graf Elektronik System in Kempten, and sold at an electronics store in Detmold. The company Fischertechnik also produced a robot kit, which was one of the most comprehensive 32-bit programming language applications at the time. Features The NKC was built with several different hardware configurations, from a simple 8-bit single-board computer based on a Zilog Z80A processor to a 32-bit system equipped with a Motorola 68020 CPU. The software could be loaded with EPROMs or involve an operating system such as CP/M which could handle executable programs in various programming languages. A helper card with an Intel 8088 processor allowed the NKC to run MS-DOS. Systems could be customized to handle many different peripherals including PS/2 keyboard, 3½-inch floppy disks, IDE-hard drives and modern storage. Users have developed new cards which replaced the former specialized components. For instance, a system could contain a new graphics card (with VGA connector), one serial port, a sound card, and a mouse connector. Another system configuration that supports booting via the IDE-interface has been developed for the 68xxx family. Gallery Books See also BBC computer WDR computer Thomson EF9366 References External links thtec.org - NKC-Seite mit neuen Schaltplänen und Ideen (NKC-site with new schematics and ideas) computermuseum-mannheim.de/comp_nkc.htm - Fotos und Infos zum NDR Klein Computer (Photos and information on the NDR small computer) retrobu.de - Geschichte zur Serie und zum NKC (History of the series and the NKC) NDR-NKC site by Andreas Rohm
https://en.wikipedia.org/wiki/Viktor%20Mayer-Sch%C3%B6nberger
Viktor Mayer-Schönberger (born 1966) is Professor of Internet Governance and Regulation at the Oxford Internet Institute, University of Oxford. He conducts research into the network economy. Earlier he spent ten years on the faculty of Harvard's John F. Kennedy School of Government. He is the co-author of Big Data: A Revolution That Will Transform How We Live, Work, and Think (HMH, 2013) and author of Delete: The Virtue of Forgetting in the Digital Age (Princeton, 2009), which won the 2010 Marshall McLuhan Award for Outstanding Book and the 2010 Don K. Price Award for Best Book in Science and Technology Politics, and has written over a hundred articles and book chapters. He is a member of Germany's Digital Council, advising Angela Merkel and her cabinet. Biography Mayer-Schönberger was born in 1966 in Zell am See, Austria, where his mother owned a local cinema. After leaving secondary school in his hometown, he studied law for seven terms at the University of Salzburg. During this time, he competed successfully in the International Physics Olympiad and the Austrian Young Programmers Contest. In 1986, he founded Ikarus Software and developed Virus Utilities, one of the best-selling software products in Austria. He subsequently earned law degrees at the University of Salzburg (Mag.iur., '88, Dr. iur. '91) and at Harvard Law School (LL.M. '89). In 1992 he received a M.Sc. (Econ) from the London School of Economics, and in 2001 the venia docendi on (among others) information law at the University of Graz. He also worked in his father's accounting business. In 1998 he joined the faculty of Harvard Kennedy School, where he worked and taught for ten years. After three years at Lee Kuan Yew School of Public Policy, National University of Singapore, Mayer-Schönberger currently holds the Chair of Internet Governance and Regulation at the Oxford Internet Institute. He has been advising businesses, governments and international organisations. Work Mayer-Schönberger's research focuses on the role of information in the networked economy. Among other things, he has been studying data privacy, governance in virtual worlds, law and entrepreneurship, e-government, and (more recently) big data. He has been advocating a right to be forgotten in the form of expiration dates on personal information. Awards 1991 - Top-5 Software Entrepreneur in Austria 2000 - Person of the Year for the State of Salzburg 2010 - Marshall McLuhan Award for Outstanding Book in the field of media ecology 2010 - Don K. Price Award 2013 - Financial Times and Goldman Sachs Business Book of the Year Award, shortlisted for Big Data 2018 - getAbstract Business Book of the Year Award, shortlisted for Reinventing Capitalism in the Age of Big Data 2018 - Best Business Books 2018: Innovation for Reinventing Capitalism in the Age of Big Data Recent publications Das Recht am Info-Highway, LexisNexis, 1997, Information und Recht, Vom Datenschutz bis zum Urheberrecht, Springer, 2000, Date
https://en.wikipedia.org/wiki/Tau%20Ceti%20e
Tau Ceti e, also called 52 Ceti e, is an exoplanet orbiting Tau Ceti that was detected by statistical analyses of the data of the star's variations in radial velocity that were obtained using HIRES, AAPS and HARPS. Its possible properties were refined in 2017: it orbits at a distance of (between the orbits of Venus and Mercury in the Solar System) with an orbital period of 168 days and has a minimum mass of 3.93 Earth masses. If Tau Ceti e possesses an Earth-like atmosphere, the surface temperature would be around . Based upon the incident flux upon the planet, a study by Güdel et al. (2014) speculated that the planet may lie inside the inner-boundary of the habitable zone and closer to a Venus-like world. References Tau Ceti Exoplanets discovered in 2012 Exoplanets in the habitable zone
https://en.wikipedia.org/wiki/Cyber%20Terror%20Response%20Center
Cyber Terror Response Center (abbr. CTRC, also from 2007 known as NETAN, from net+an, an meaning safety in Korean language) is a cybercrime section of the Korean National Police Agency in South Korea. The Center was established in 2000, from the Computer Crime Investigation Squad (itself established in 1997). It is headquartered in the KNPA main building. Services As of July 2008, the Center had over 900 employees; majority of them police officers specializing in the cybercrime investigations. The Center investigates cybercrimes, incidents of cyber terrorism, and provides digital forensics services to the Korean police. As of 2012, the Center website stated that each year, about 80,000 incidents of cybercrimes are reported in South Korea; and cites a 2006 breakdown into fraud (41%), intrusion and malware (23%), online defamation (10%), illegal web content (8%), copyright violations (3%) and other crimes (15%). Examples of the Center's actions include a campaign to reduce online slander and cyber bullying in 2008 (launched in the aftermath of the suicide of an actress Choi Jin-sil), a raid on Korean Google offices to investigate privacy issues concerning Google's Street View service in 2010, cracking down on online discussions about bomb making in 2011, and busting an illegal online gambling operation in 2012. International connections The Center hosts an international conference, the Annual Symposium on Cyber Terror (or International Symposium on Cybercrime Response), inaugurated together with the Center in 2000. The Center has numerous international connections, from Interpol to hotlines and memorandums of understandings with a number of foreign cybercrime investigations agencies. See also Internet censorship in South Korea References External links homepage a short clip about CTRC on YouTube 2000 establishments in South Korea National law enforcement agencies of South Korea Computer security organizations
https://en.wikipedia.org/wiki/Eloise%20Salutes%20the%20Stars
Eloise Salutes the Stars is a talk show hosted by Eloise McElhone (1921-1974) which aired on an 8-station network including the DuMont flagship station WABD. The series started on WABD in November 1949. The series aired Tuesdays at 7:30pm ET in 1950 and early 1951. Other stations in the network such as WXEL-TV in Cleveland showed the series on Thursdays at 7:30pm ET, and other stations, such as WPIX-TV chose to air the show at 5:15pm ET. The show was sponsored by Doeskin Tissues, and produced by Lester Lewis (1913-1988). After the original 13 episodes were produced, the show was renewed for another 13 episodes in January 1951. McElhone was also host of the DuMont series Quick on the Draw, a panelist on the ABC game show Think Fast, and a panelist on the NBC/ABC series Leave It to the Girls. Episode status Two episodes are held in the J. Fred MacDonald collection at the Library of Congress. Bibliography David Weinstein, The Forgotten Network: DuMont and the Birth of American Television (Philadelphia: Temple University Press, 2004) Alex McNeil, Total Television, Fourth edition (New York: Penguin Books, 1980) Tim Brooks and Earle Marsh, The Complete Directory to Prime Time Network TV Shows, Third edition (New York: Ballantine Books, 1964) References See also List of programs broadcast by the DuMont Television Network List of surviving DuMont Television Network broadcasts Highway to the Stars Look Upon a Star DuMont Television Network original programming 1950 American television series debuts 1951 American television series endings Black-and-white American television shows
https://en.wikipedia.org/wiki/ThriftyComputer
ThriftyComputer is a Miami, Florida based internet business that sells discounted new and refurbished cell phones and other electronics. Founded by Elchonon Hellinger in 2004 when he was 19, he was later joined by his younger brother Yosef Hellinger. The company encountered financial troubles in 2009 and was forced to rebuild from the ground up. In addition, founder Hellinger suffers from a debilitating chronic illness that has created significant challenges. Founder background Since infancy, Elchonon Hellinger has suffered from Neurofibromatosis Type 2, which causes the continuous growth of benign tumors. By the age of 18, he was clinically deaf, and tumors on his hands made everyday work painful. To date, he has had over 20 surgeries, including an auditory brainstem implant at the age of 21 to regain his hearing. Business difficulties and subsequent recovery From the company's beginning, selling out of box phones on eBay, by 2009 the company had formed an LLC, expanded its inventory to include other wireless and computer supplies, and was reporting $900,000 a year in sales. However, due to inexperience and internal mismanagement, the company had gone into over $100,000 in debt and lost all of its payment processing privileges from PayPal, Google Checkout and credit card processing companies. Hellinger brought his younger brother Yosef in to help him turn things around. They sold whatever inventory they had left on eBay in order to pay off their creditors and slowly re-establish terms. Two years later, in 2011, the company reported between $40–70,000/month in sales from their website. References Companies based in Miami
https://en.wikipedia.org/wiki/T%C3%BCrksat%201A
Türksat 1A was a Turkish communications satellite as part of a project to form an instant network with two geosynchronous satellites that is supervised by the companies Türksat A.Ş. in Turkey and Aérospatiale of France. Turkey's first spacecraft in its space program, Türksat 1A was launched by Arianespace atop an Ariane-44LP H10+ launch vehicle, along with the French satellite Eutelsat 2F5, in a dual-payload launch on January 24, 1994, at 21:37:00 UTC from ELA-2 at the Guiana Space Centre in Kourou, French Guiana. It failed to reach the orbit as it was lost by falling into ocean due to malfunction of the launch vehicle's last stage 12 minutes and 12 seconds after lift-off. After successful launching of Türksat 1B the same year, Türksat 1A's mission was replaced by Türksat 1C, which was placed into orbit in 1996. See also Turksat (satellite) References Spacecraft launched in 1994 Communications satellites of Turkey Satellite launch failures Turksat 1A
https://en.wikipedia.org/wiki/T%C3%BCrksat%201B
Turksat 1B was a Turkish communications satellite as part of a project to form an instant network with two geosynchronous satellites that is supervised by the companies Türksat A.Ş. in Turkey and Aérospatiale of France. Türksat 1B was launched by Arianespace atop an Ariane-44LP H10+ launch vehicle, along with Brazilian satellite Brasilsat B1, in a dual-payload launch on August 10, 1994, at 23:05 UTC from ELA-2 at the Guiana Space Centre in Kourou, French Guiana. The satellite was successfully placed into geostationary transfer orbit and positioned at 42°E. It is based on the Aerospatiale Spacebus 2000 series having an on-orbit mass of about one ton. The communications payload consists of 16 Ku band transponders with six wideband channels of 72 MHz and ten narrowband of 36 MHz. In addition to Turkey, the satellite covered a geographical range from Europe to Central Asia before completing its mission in 2006. See also Turksat (satellite) References Communications satellites of Turkey Spacecraft launched in 1994 Communications satellites in geostationary orbit Derelict satellites orbiting Earth Turksat 1B
https://en.wikipedia.org/wiki/PythonAnywhere
PythonAnywhere is an online integrated development environment (IDE) and web hosting service (Platform as a service) based on the Python programming language. Founded by Giles Thomas and Robert Smithson in 2012, it provides in-browser access to server-based Python and Bash command-line interfaces, along with a code editor with syntax highlighting. Program files can be transferred to and from the service using the user's browser. Web applications hosted by the service can be written using any WSGI-based application framework. PythonAnywhere was created by Resolver Systems, who also produced Resolver One, a Python-based Spreadsheet program. On 16 October 2012 the product was acquired by a new company, PythonAnywhere LLP, who took on the existing development team. In June, 2022, PythonAnywhere was acquired by Anaconda, Inc. The development team uses PythonAnywhere to develop PythonAnywhere, and say that its collaboration features help because they use the extreme programming methodology. Features CPython, PyPy and IPython support, including Python versions 2.7, 3.3, 3.4, 3.5, 3.6, 3.7, 3.8, and 3.9. In-browser interactive consoles with code running on hosted servers, shareable between multiple users. WSGI-based web hosting, e.g. Django, Flask, web2py Support for coding from iPad and other mobile devices. Syntax-highlighting in-browser editor. Many popular Python modules pre-installed. Cron-like scheduled tasks to run scripts at a given time of day. Always-on tasks to run scripts and restart them automatically when they fail. Uses PythonAnywhere is described as "the simplest way to deploy web2py applications" in the official book on the web framework, is suggested when learning numpy, is deployment platform of choice in Django Girls tutorial, and is recommended as a way of hosting machine learning-based web applications. See also Comparison of Python integrated development environments List of Python software References External links PythonAnywhere Homepage PythonAnywhere Wiki Python (programming language) Technology companies based in London
https://en.wikipedia.org/wiki/Global%20microbial%20identifier
The genomic epidemiological database for global identification of microorganisms or global microbial identifier is a platform for storing whole genome sequencing data of microorganisms, for the identification of relevant genes and for the comparison of genomes to detect and track-and-trace infectious disease outbreaks and emerging pathogens. The database holds two types of information: 1) genomic information of microorganisms, linked to, 2) metadata of those microorganism such as epidemiological details. The database includes all genera of microorganisms: bacteria, viruses, parasites and fungi. Technology For genotyping of microorganisms for medical diagnosis, or other purposes, scientists may use a wide variety of DNA profiling techniques, such as polymerase chain reaction, pulsed-field gel electrophoresis or multilocus sequence typing. A complication of this broad variety of techniques is the difficulty to standardize between techniques, laboratories and microorganisms, which may be overcome using the complete DNA code of the genome generated by whole genome sequencing. For straightforward diagnostic identification, the whole genome sequencing information of a microbiological sample is fed into a global genomic database and compared using BLAST procedures to the genomes already present in the database. In addition, whole genome sequencing data may be used to back calculate to the different pre-whole genome sequencing genotyping methods, so previous collected valuable information is not lost. For the global microbial identifier the genomic information is coupled to a wide spectrum of metadata about the specific microbial clone and includes important clinical and epidemiological information such as the global finding places, treatment options and antimicrobial resistance, making it a general microbiological identification tool. This makes personalized treatment of microbial disease possible as well as real-time tracing systems for global surveillance of infectious diseases for food safety and serving human health. The initiative The initiative for building the database arose in 2011 and when several preconditions were met: 1) whole genome sequencing has become mature and serious alternative for other genotyping techniques, 2) the price of whole genome sequencing has started falling dramatically and in some cases below the price of traditional identifications, 3) vast amounts of IT resources and a fast Internet have become available, and 4) there is the idea that via a cross sectoral and One Health approach infectious diseases may be better controlled. Starting the second millennium, many microbiological laboratories, as well as national health institutes, started genome sequencing projects for sequencing the infectious agents collections they had in their biobanks. Thereby generating private databases and sending model genomes to global nucleotide databases such as GenBank of the National Center for Biotechnology Information or the nucleot
https://en.wikipedia.org/wiki/Code%20cleanup
Code cleanup refers to the act of writing code so that it cleans up leftover data structures and other unwanted materials from memory and the filesystem. It is sometimes treated as a synonym of refactoring code, which involves making the source code itself easier to understand, maintain, and modify. Examples C++ In C++, code cleanup involves deallocating previously allocated dynamic memory. This is usually done with the C++ delete and delete[] operations. int x = 15; int* mySequence = new int[x]; for (int i = 0; i < x; i++) { mySequence[i] = 0; } mySequence[0] = -127; delete[] mySequence; Python In Python 3, explicit deletion of variables requires the del keyword. x = 15 my_sequence = [0 for useless_variable in range(x)] my_sequence[0] = -127 del my_sequence JavaScript In JavaScript, objects are garbage collected if they are unreachable from the global object. One way to make an object unreachable is to overwrite the variables or properties that reference it. let x = {}; // The variable x is declared and set to an object x = null; // x is overwritten and the object becomes unreachable Java In Java, variables cannot be truly deleted. The most that can be done is to set the variable to null, which works with any Java object, including arrays. int x = 15; int[] my_sequence = new int[x]; for (int i = 0; i < x; i++) { my_sequence[i] = 0; } my_sequence[0] = -127; my_sequence = null; Other meanings Code cleanup can also refer to the removal of all computer programming from source code, or the act of removing temporary files after a program has finished executing. For instance, in a web browser such as Chrome browser or Maxthon, code must be written in order to clean up files such as cookies and storage. The deletion of temporary files is similar to the deletion of unneeded lists and arrays of data. However, a file is treated as a permanent way to store a resizable list of bytes, and can also be removed from existence. Loop cleanup Another technical term sometimes called "code cleanup" is loop cleanup. /* 'The i++ part is the cleanup for the for loop.' */ for i = 0; i < 100; i++ print i end import type list = [10, 20, 30, 40, 50] /* 'Even in a for each loop, code cleanup with an incremented variable is still needed.' */ i = 0 for each element of list list[i] ^= 2 // 'Squares the element.' print string(element) + " is now... " + string(list[i]) i++ end References Other Resources HTML Code Cleanup Formatting and Cleaning Up Code Resharper Code Cleanup Code Formatter Source code
https://en.wikipedia.org/wiki/Zane%20Holtz
Zane-Ray Brodie Holtz (born January 18, 1987) is a Canadian actor and model. He is best known for playing Richie Gecko on the El Rey Network television series From Dusk till Dawn: The Series (2014–2016) and K.O. Kelly on The CW series Riverdale and Katy Keene (2020). Career In 2013, he played Nick in Jodi Arias: Dirty Little Secret, a television movie about the murder of Travis Alexander. In 2019, Holtz was added o the CW's Katy Keene, playing the role of Ko Kelly. Personal life Holtz is married to Chelsea Thea Pagnini and they have four children. Filmography Film Television Music Videos Web References External links 1987 births Living people Canadian male film actors Canadian male television actors Canadian expatriates in the United States Male actors from Vancouver Canadian male models
https://en.wikipedia.org/wiki/Mark%20Stone%20%28journalist%29
Mark Stone (born 29 January 1979) is a British journalist who is currently US correspondent for Sky News. He was previously the network's Europe Correspondent (2015–19), Asia Correspondent (2012–15) and Middle East correspondent. Early life Stone was educated in the United Kingdom, first at Hawtreys School in Wiltshire, then at Cheltenham College, followed by the University of East Anglia. Life and career Stone joined the London Bureau of ABC News, the news division of the American Broadcasting Company, in 2002, as a producer. Between 2003 and 2004, he spent nearly a year living in Baghdad, Iraq where he reported on the capture of Saddam Hussein and the growing insurgency in Iraq. He was part of a team which won an Emmy for their coverage. Stone joined Sky News in 2005 working first as a producer before switching to reporting in 2007. In 2012 he became the network's Asia Correspondent, based in Beijing, China. In 2015 he moved to Brussels, Belgium as the network's Europe Correspondent. He was one of the first British journalists to ‘embed’ with the British Army in Afghanistan's Helmand Province in July 2006. In 2011, he spent 6 weeks reporting extensively from Libya on the uprising against Muammar Gaddafi, the NATO intervention and the subsequent death of Gaddafi. In August 2011, Stone played a widely reported and important role in Sky News coverage of the London riots. In one of the first examples of the use of mobile devices for newsgathering, Stone used just an iPhone, rather than relying upon the usual accompaniment of a professional television crew, to record and broadcast scenes of arson and his own confrontation with looters, which both led Sky News bulletins and were covered widely by broadcasters around the world. Online, within 24 hours, his videos had been viewed by nearly a million people. He was nominated by the Royal Television Society for his innovative coverage of the riots. In March 2013, Stone and his cameraman were detained in Beijing's Tiananmen Square . They had been filming a report about the 1989 protests and were then detained after being accused of not having the right accreditation. They broadcast live from a police van as it drove them away for questioning. They were released after several hours of interrogation. In July 2013, Stone travelled to North Korea as part of a select group of journalists granted access to the reclusive country. Using newly available broadcast technology from Aviwest, he and his Sky News team produced the first ever live international broadcasts from events at locations around the capital Pyongyang. He provided extensive coverage of Europe's migration crisis between 2015 and 2017. He reported extensively on Britain's exit from the European Union - Brexit - from Sky News's Europe Bureau in Brussels. In May 2019 Sky announced that Stone would become the network's Middle East Correspondent. In November 2020, during the United States presidential election, Stone attended the Four Season
https://en.wikipedia.org/wiki/Comparison%20of%20software%20and%20protocols%20for%20distributed%20social%20networking
Distributed social network projects generally develop software, protocols, or both. Projects Dead or stalled projects Other federated communication or storage solutions See also Comparison of instant messaging protocols References Social networks Distributed computing architecture Peer-to-peer Distributed social networking
https://en.wikipedia.org/wiki/List%20of%20Billboard%20Hot%20100%20number%20ones%20of%202013
The Billboard Hot 100 is a chart that ranks the best-performing singles of the United States. Its data, published by Billboard magazine and compiled by Nielsen SoundScan, is based collectively on each single's weekly physical and digital sales, as well as airplay and streaming. In 2013, a total of 11 singles claimed the top spot in 52 issues of the magazine. One of which, "Locked Out of Heaven" by singer Bruno Mars started its peak position in late 2012. Throughout 2013, eight acts achieved their first US number-one single, either as a lead artist or a featured guest: Macklemore & Ryan Lewis, Wanz, Baauer, Ray Dalton, Robin Thicke, Miley Cyrus and Lorde. Nate Ruess, already having hit number one with Fun, earns his first number one song as a solo act. Five collaboration singles topped the chart. Macklemore & Ryan Lewis' debut single "Thrift Shop" featuring Wanz became the best-performing single of 2013, peaking atop the chart for six weeks, also topping the Billboard Year-End Hot 100. The duo's second hit "Can't Hold Us" also reached the chart's top spot, making the duo the first act to score number-one singles on the Hot 100 with their first two charting songs since Lady Gaga with her hits "Just Dance" and "Poker Face" in 2009. Baauer scored his first number-one hit with "Harlem Shake". Originally, it was released commercially in June 2012, yet it did not sell significantly until February due to viral videos on YouTube and later created a meme with the same name. Macklemore & Ryan Lewis were the only act to have more than one number one song, with two. "When I Was Your Man" was Bruno Mars' fifth single to top the chart. With the achievement, Mars became the fastest male artist to gain five number-one singles since Elvis Presley. It was also the second hit only featuring piano and vocals to peak atop the Hot 100 chart since Adele's "Someone like You" (2011). Singer Lorde's song "Royals" made her the youngest solo artist to achieve a number-one single in the US since Tiffany's "I Think We're Alone Now" (1988). "The Monster" by Eminem featuring Rihanna became the former's fifth number-one single in the country, tying him with P. Diddy and Ludacris as the rappers with the most number-one songs on the chart. Meanwhile, it also made Rihanna the artist with the third-most US number-one singles (13), alongside Michael Jackson. "Blurred Lines" by Robin Thicke featuring T.I. and Pharrell was the longest-running single of the year at the top spot, peaking at number one for twelve consecutive weeks. With the combined chart run throughout June, July and August, "Blurred Lines" became Billboards Song of the Summer 2013. Lorde's "Royals" became the second longest-running number-one single, claiming the top spot for a total of nine weeks. "Locked Out of Heaven" by Bruno Mars and "Thrift Shop" by Macklemore & Ryan Lewis featuring Wanz both spent six weeks atop the Hot 100. Chart history Number-one artists See also 2013 in American music List of Billboard
https://en.wikipedia.org/wiki/Philippe%20Aigrain
Philippe Aigrain (15 July 1949 – 11 July 2021) was a French computer scientist, activist and researcher. He was one of the directors of the Software Freedom Law Center in New York City and a cofounder of the French non-profit La Quadrature du Net. In 2003, he founded and directed Sopinspace, a solution provider for participatory democracy and public debate using the Internet. Theory about sharing and open access Works Sharing, Culture and the Economy in the Internet Age, 2012, Amsterdam University Press Internet & création: comment reconnaître les échanges hors-marché sur internet en finançant et rémunérant la création ? (2008) Cause commune: l'information entre bien commun et propriété (2005) References External links Entry at the P2PFoundation page Philippe Aigrain: Striking a Blow for Digital Freedom 1949 births 2021 deaths French computer scientists Paris Diderot University alumni
https://en.wikipedia.org/wiki/Mary%20Aiken
Mary Aiken may refer to: Mary Aiken Littauer (1912–2005), horse expert Mary Aiken (psychologist), Irish cyber psychologist, and inspiration for the CSI: Cyber character Avery Ryan Mary Aiken, fictional character in Andy Warhol's Bad See also Loretta Mary Aiken (1894–1975), American standup comedian
https://en.wikipedia.org/wiki/Anna%20Nagar%20railway%20station
Anna Nagar railway station is one of the two, now defunct, railway stations of the extended southern arm of the Chennai Central–Arakkonam section of the Chennai Suburban Railway Network, the other being Padi railway station. It served the neighbourhood of Anna Nagar, a suburb of Chennai. The station is located on Thirumangalam road, a road that connects Anna Nagar West with Villivakkam, near New Avadi Road, away from the commercial centre of the neighbourhood. The station is being maintained by the Integral Coach Factory (ICF), the premier production unit of the Indian railways. History In 2003, a 3.09 km-long railway line, initially used by the Integral Coach Factory (ICF) at Perambur for moving newly built coaches from shell to furnishing division of the factory, was strengthened at a cost of 72.9 million for operating passenger services. Two new stations, namely, Padi and Anna Nagar, were built and 13 existing bridges were renovated and the work was completed in five months. The railway station and the EMU services were inaugurated by the then Union Minister of State for Railways, A. K. Moorthy. Between 2003 and 2007, five suburban trains were being run from Anna Nagar to Chennai Beach via . In 2007, the service was discontinued due to construction of a rotary at the Padi junction replacing the level-crossing. Though the rotary was completed in 2009, services were not restored. However, in 2011, the railways planned to resume services in this section as a feeder service with six-car EMUs. The tracks and land on which the station is built were originally owned by the ICF. When the Southern Railway intended to operate trains to Padi and Anna Nagar stations, the ICF handed over the land to the Southern Railway. When the train services were withdrawn in 2007, the ICF reclaimed the land from the zonal railway. The tracks and the stations are now used by the ICF for moving spare parts to the manufacturing unit and back. The lines will be used to test semi-high speed coaches running up to 160 km per hour. Patronage The service, however, had a low patronage. The average daily counter collection at the station was about 450, with just about 50 passengers. The monthly revenue never exceeded 15,000. However, unlike the rest of the Chennai Suburban Railway network, there is only one line in this section. In addition, the traffic congestion resulting due to closure of a gate near the Padi railway station limits the operation to five pairs of EMU services between Chennai Beach and Anna Nagar. In a response to a public interest litigation filed in June 2013, the Railways announced that "the decision to discontinue operations at Anna Nagar station was made due to financial considerations. The per-day expense for operating train services between Villivakkam and Anna Nagar costs about 30,000, while the income was only a few hundreds." See also Chennai Suburban Railway Railway stations in Chennai References Railway stations in India opened in 20
https://en.wikipedia.org/wiki/Scoreboard%20%28TV%20series%29
Scoreboard, also known as Russ Hodges's Scoreboard, was a sports series aired on the DuMont Television Network on Fridays at 6:30pm ET from 14 April 1948 to 22 April 1949. The 15-minute show was hosted by famous sports announcer Russ Hodges. Episode status As with many DuMont series, no episodes are known to exist in any film or television archive. See also List of programs broadcast by the DuMont Television Network List of surviving DuMont Television Network broadcasts 1948-49 United States network television schedule References Bibliography David Weinstein, The Forgotten Network: DuMont and the Birth of American Television (Philadelphia: Temple University Press, 2004) Alex McNeil, Total Television, Fourth edition (New York: Penguin Books, 1980) Tim Brooks and Earle Marsh, The Complete Directory to Prime Time Network TV Shows, Third edition (New York: Ballantine Books, 1964) External links Scoreboard at IMDB DuMont historical website 1948 American television series debuts 1949 American television series endings Black-and-white American television shows Lost television shows DuMont sports programming
https://en.wikipedia.org/wiki/Off%20the%20Bar
Off the Bar is a British television comedy/sports talk on the Loaded TV network. The show Off the bar is a British football talk show, set in a British style pub, on Loaded TV (Sky channel 200). It is hosted by Matt Lorenzo, with Tony Gale, Alan Bentley and Ann Marie Davies and other celebrity guests. Airs on a Friday nights at 9pm. Sources Sky TV World News Eerie Investigations Liverpool Echo Features Exec British comedy television shows Loaded TV original programming
https://en.wikipedia.org/wiki/DHS%20Cyber%20Security%20Division
The Cyber Security Division (CSD) is a division of the Science and Technology Directorate (S&T Directorate) of the United States Department of Homeland Security (DHS). Within the Homeland Security Advanced Research Projects Agency, CSD develops technologies to enhance the security and resilience of the United States' critical information infrastructure from acts of terrorism. S&T supports DHS component operational and critical infrastructure protections, including the finance, energy, and public utility sectors, as well as the first responder community. CSD Mission Mission statement as defined by S&T Directorate: The Cyber Security Division's mission is to enhance the security and resilience of the nation's critical infrastructure and the Internet by "developing and delivering new technologies, tool and techniques; conducting and supporting technology transition; and leading and coordinating research and development." The Science and Technology Directorate oversees the work done by the CSD, and clearly defines the CSD's work as a means towards developing the future of cyber security. Mission statement as defined by DHS: Enhancing security and resilience of critical infrastructure. By "developing and delivering new technologies, tools and techniques in order for the U.S. to defend, mitigate and secure current and future systems, networks, and infrastructure from cyber-attacks." While conducting and supporting "technology transitions, leading and coordinating research and development (R&D) among the R&D community" (department customers, government agencies, private sector, and international partners). The Department of Homeland Security later defines its own division as more of a way to help defend and protect systems. Mission statement as defined by Congressional Research Service: The Cyber Security Division's mission is within the spectrum of "prevention, protection, mitigation, response, and recovery." DHS seeks to assess cyber risks and promote security and resilience of information communication technology (ICT) systems. When an incident occurs, DHS has "capabilities and authorities to provide direct assistance to the victim (both federal and non-federal)." While the Congressional Research Services combines the two and states that the CSD will in the case of an incident have the means towards assisting both public and private sectors. DHS Cybersecurity Program Under the Science and Technology Directorate the Department of Homeland Security created its own Cyber Security Division. The division seeks to assist both private and public sectors. The CSD has programs across some current hard problems in information security research. These research programs include and are not limited to "Combating Insider Threats," "Combating Malware and Botnets," and "Identity Management." The CSD's goal is to not only save money and time while meeting DHS critical missions, but to "support S&T with transitioning technologies to operational use." Research
https://en.wikipedia.org/wiki/Carole%20Black
Carole Federle Black, born , is the former President and Chief Executive Officer of Lifetime Entertainment Services, a multimedia brand for women, including Lifetime Network, Lifetime Movie Network, Lifetime Real Women Network, Lifetime Online and Lifetime Home Entertainment, serving from March 1999 to March 2005. Prior to that, Ms. Black served as the President and General Manager of NBC4, Los Angeles, a commercial television station, from 1994 to 1999, and in various marketing-related positions at The Walt Disney Company, a media and entertainment company, from 1986 to 1993. Ms. Black has served as a director of Time Warner Cable Inc. since July 2006. Ms. Black was born in Cincinnati, Ohio, where she attended and graduated from Withrow High School in 1961. She was Withrow's first female student body president and a walk-on comedian in The Withrow Minstrels. She is a 1965 graduate of the Ohio State University. Ms. Black married an Ohio State graduate student in the dental school, Dr. William Black, and for a time lived in Dayton, Ohio. She subsequently held a number of positions in Chicago, in advertising and marketing. References 1945 births Living people Ohio State University alumni Businesspeople from Cincinnati American women chief executives 21st-century American women
https://en.wikipedia.org/wiki/Padi%20railway%20station
Padi railway station is one of the two, now defunct, railway stations of the extended southern arm of the Chennai Central–Arakkonam section of the Chennai Suburban Railway Network, the other one being Anna Nagar railway station. It served the neighbourhoods of Padi, Villivakkam, Korattur and Anna Nagar. The station is located at the junction of 100-feet Inner Ring Road—MTH Road, known as the Padi Junction. The station is being maintained by the Integral Coach Factory (ICF), the premier production unit of the Indian railways. History In 2003, a 3.09 km-long railway line, initially used by the Integral Coach Factory (ICF) at Perambur for moving newly built coaches from shell to furnishing division of the factory, was strengthened at a cost of 72.9 million for operating passenger services. Two new stations, namely, Padi and Anna Nagar, were built and 13 existing bridges were renovated and the work was completed in five months. The railway station and the EMU services were inaugurated by the then Union Minister of State for Railways, A. K. Moorthy. Between 2003 and 2007, five suburban trains were being run from Anna Nagar to Chennai Beach via . In 2007, the service was discontinued due to construction of a rotary at the Padi junction replacing the level-crossing. Though the rotary was completed in 2009, services were not restored. However, in 2011, the railways planned to resume services in this section as a feeder service with six-car EMUs. The tracks and land on which the station is built were originally owned by the ICF. When the Southern Railway intended to operate trains to Padi and Anna Nagar stations, the ICF handed over the land to the Southern Railway. When the train services were withdrawn in 2007, the ICF reclaimed the land from the zonal railway. The tracks and the stations are now used by the ICF for moving spare parts to the manufacturing unit and back. Patronage The service during its operational years, however, had a low patronage. However, unlike the rest of the Chennai Suburban Railway network, there is only one line in this section. In addition, the traffic congestion resulting due to closure of a gate near the Padi railway station limited the operation to five pairs of EMU services between Chennai Beach and Anna Nagar. Upgradations Additional lines Three separate tracks, each 500 meters long and accommodating 20 coaches, are being built on the northern side of the station. These lines will be used to park new coaches built by the ICF until they are transported to their destinations. A 2-km long high-speed rail line between the station and the ICF will also be laid at the station for conducting trials. The lines will be used to test semi-high speed coaches running up to 160 km per hour. Conversion to social hub In 2018, the ICF began to convert the defunct station into a social meeting point by building a 500-meter walkers’ path at a cost of 1.5 million and providing seating arrangements, lightings, security and other amen
https://en.wikipedia.org/wiki/TMG%20%28language%29
In computing TMG (TransMoGrifier) is a recursive descent compiler-compiler developed by Robert M. McClure and presented in 1965. TMG ran on systems including OS/360 and early Unix. It was used to build EPL, an early version of PL/I. Douglas McIlroy ported TMG to an early version of Unix. According to Ken Thompson, McIlroy wrote TMG in TMG on a piece of paper and "decided to give his piece of paper his piece of paper," hand-compiling assembly language that he entered and assembled on Thompson's Unix system running on PDP-7. Thompson used TMG in 1970 as a tool to offer Fortran, but due to memory limitations of PDP-7 ended up creating the B programming language which was much influenced by BCPL. The recursive descent algorithm of TMG was studied formally by Alexander Birman and Jeffrey Ullman. The formal description of the algorithms was named TMG recognition scheme (or simply TS). See also Top-down parsing language Yacc References External links Compiling tools Parser generators Low-level programming languages
https://en.wikipedia.org/wiki/The%20Judds%20%28TV%20series%29
The Judds was an American reality television-documentary series on OWN: The Oprah Winfrey Network, featuring country music singer Naomi Judd and her daughter, singer-guitarist Wynonna Judd, who performed and recorded music together as The Judds, their success peaking in the 1980s and 1990s. The special docuseries, which debuted on April 10, 2011, chronicled the Judds as they traveled the country making music, performing for fans but also dealing with topics including negativity, gratitude, familial history and repressed emotions; a therapist was a featured member of the series. Premise The docuseries followed the daily life and interactions of mother-daughter Grammy winners Wynonna and Naomi Judd while they rehearsed and perfected their music, all in-preparation for their first tour in ten years. The series also shed light on the duo’s personal lives as they worked with a counselor to strengthen their bond; the Judds discussed a range of issues from everyday treatment of one another and humility to kindness and grace, while also recognizing areas where each could improve. Episodes References 2011 American television series debuts 2011 American television series endings Oprah Winfrey Network original programming English-language television shows
https://en.wikipedia.org/wiki/Temple%20University%20Hospital
Temple University Hospital (TUH) in Philadelphia, Pennsylvania is an academic medical center in the United States which is a part of the healthcare network Temple Health. It is the chief clinical training site for the Temple University School of Medicine. The hospital currently has a 722-bed capacity that offers comprehensive inpatient and outpatient services to the surrounding community, and highly specialized tertiary services in the Delaware Valley. In 2015, Temple University Hospital had more than 84,000 emergency department and 200,000 outpatient visits. In August 2011, Becker's Hospital Review listed Temple University Hospital as number 10 on the 100 Top Grossing Hospitals in America with $5.9 billion in gross revenue. History It was originally the Samaritan Hospital which was founded by Russell Conwell and his congregation, Baptist Temple, on January 18, 1892 through the purchase of a three-story house at the intersection of Broad and Ontario St. The original hospital had twenty beds and only two full-time staff members. The hospital expanded with the addition of the Greathart Hospital as a maternity hospital and further facilities in the next decade after its founding. Samaritan Hospital was renamed to Temple University Hospital in 1929. William Parkinson, who was appointed as the director of the hospital and Dean of School of Medicine in February 1929, oversaw its renovation and expansion to a 500-bed capacity by 1940. Development progressed in 1950s with the leadership of William Parkinson as three new buildings were added to accommodate the increasing number of individuals served by the hospital. A new ancillary and outpatient building were added along with Parkinson Pavilion, which added 600 inpatient beds. Further development came in December 1982 when a replacement hospital was approved on Broad and Ontario to replace the main hospital building with a 504-bed facility. The new nine-story hospital opened in 1986 with an expanded emergency department, while the Parkinson Pavilion was renovated to an outpatient facility. Temple University Health System Until 1994, Temple University and Temple University Hospital were one entity. Peter J. Liacouras, the president of Temple University at that time, and the board of trustees separated hospital-related activities with the creation of Temple University Health System (TUHS) as a private non-profit entity. Specialties Temple University Hospital has a number of specialties including Abdominal Organ Transplant Program, Bariatric Surgery Program, Bone Marrow transplant Program, Burn Center, Cancer Center, Digestive Disease Center, Heart and Vascular Institute, Lung Center, Neurosciences Center and Orthopaedics & Sports Medicine. See also Fox Chase Cancer Center Temple University Temple University School of Medicine References 1892 establishments in Pennsylvania Hospitals established in 1892 Hospitals in Philadelphia Nicetown-Tioga, Philadelphia Temple University Teaching hospitals in Pe
https://en.wikipedia.org/wiki/Directed%20acyclic%20word%20graph
Directed acyclic word graph (DAWG) may refer to two related, but distinct, automata constructions in computer science: Deterministic acyclic finite state automaton, a data structure that represents a finite set of strings Suffix automaton, a finite automaton that functions as a suffix index
https://en.wikipedia.org/wiki/Steve%20Andriole
Stephen J. Andriole (born October 22, 1949) is an American information technology professional and professor at Villanova University who has designed and developed a variety of interactive computer-based systems for industry and government, from positions in academia (Professor, chairman, R&D Center Director), government (Director of Cybernetics Technology at DARPA) and industry (CIO, CTO, SVP, Director and CEO). He is well known for the design and development of a global crisis warning system—the Early Warning & Monitoring System—whose output appeared in President Ronald Reagan's Daily Briefing Book. His research portfolio while at DARPA included early funding of the MIT Architecture Machine Group now known as the MIT Media Lab, research in artificial intelligence at Yale University and Carnegie-Mellon University, computer simulation, computer-aided decision analysis and computer-based crisis management. At DARPA, he funded one of the first research programs in counter-terrorism crisis management. Andriole is also well known for the design and development of the United States' first totally online Masters program in information systems (MSIS), with the support of Alfred P. Sloan Foundation while at Drexel University. He was also the principal architect of the investment strategy of Safeguard Scientifics, Inc. (NYSE: SFE) that led to multiple Initial Public Offerings (IPOs) of Internet companies with a total market capitalization of over $100B. He is also known through the publication of over 35 books and 500 articles in artificial intelligence and machine learning, information systems engineering, defense command and control, interactive systems design and development, human-computer interaction, venture investing, technology due to diligence, social media, emerging technology and information technology. He is a Fellow of the Cutter Consortium, was a charter member of the U.S. government's Senior Executive Service (SES), received the Defense Meritorious Civilian Service Award for his work at DARPA, and was awarded an Honorary Doctorate from La Salle University in 2000. He currently holds the Thomas G. Labrecque Chair of Business Technology at Villanova University's School of Business where he teaches AI & machine learning, strategic technology, innovation, business consulting, entrepreneurialism and technology management. Government Andriole was the Director of the Cybernetics Technology Office (CTO) at DARPA where he managed a program of research and development that led to a number of scientific and technological advances in the broad-based information, decision and computing sciences. While at DARPA, he funded the development of spatial data management and multimedia systems, decision support systems, computer-aided simulation and training systems, and intelligent technology-based command & control systems. He funded MIT's Architecture Machine Group, which evolved into the MIT Media Lab. The CTO program also contributed to applicati
https://en.wikipedia.org/wiki/E-CellID
Enhanced Cell ID, E-CellID, or E-CID is a positioning feature introduced in rel9 E-UTRA (LTE radio). The UE reports to the network (ESMLC) the serving cell ID, the timing advance (difference between its transmit and receive time) and the IDs, estimated timing and power of the detected neighbor cells. The enodeB may report extra information to the ESMLC like the angle of arrival. The ESMLC estimates the UE position based on this information and its knowledge of the cells positions. Cell ID based methods were already possible before rel9. Enhanced cell ID aggregates together some already available measurements, some of them with increased accuracy requirements to improve the positioning accuracy capabilities. Technology Similarly to an OTDOA procedure, a E-CID procedure is initiated through the LPP protocol by the ESMLC, with a ECID-RequestLocationInformation request message. The UE performs and collects the necessary measurements, and reports them back using the ECID-ProvideLocationInformation. This message contains a list with the following details, depending on the UE capability, for each cell it detected: The Cell ID of the cell. RSRP (reference signals received power) measurement: A measurement of the received power level. RSRQ (reference signals received quality) measurement: A measurement of the received quality (SNR). Rx-Tx time difference (only for the serving cell): An estimation of the time difference between its reception and transmission time at the UE antenna, that is the time difference between the start of a DL subframe and the transmission of the corresponding UL subframe. From these the ESMLC estimates the UE position. The RSRP, RSRQ and Rx-Tx time difference measurements are defined in the 36.214 specification, and their accuracy requirements are specified in the 36.133 specification. References External links Ericsson-Positioning with LTE Performance of 3GPP Rel-9 LTE positioning methods 3GPP standards
https://en.wikipedia.org/wiki/Social%20Networks%20%28journal%29
Social Networks is a quarterly peer-reviewed academic journal covering research on social network theory. The editors-in-chief are Thomas Valente (University of Southern California) and Ulrik Brandes (ETH Zurich). It was established in 1979 and is currently published by Elsevier. Abstracting and indexing Social Networks is abstracted and indexed in: Anthropological Index Anthropological Literature Current Contents/Social & Behavioral Sciences Scopus Social Sciences Citation Index Sociological Abstracts According to the Journal Citation Reports, its 2011 impact factor was 2.931, ranking it 6th out of 137 journals in the category "Sociology". In 2020, the impact factor was 2.376. References External links Academic journals established in 1979 Sociology journals Social networks Elsevier academic journals English-language journals Quarterly journals
https://en.wikipedia.org/wiki/Sevda%20Dalg%C4%B1%C3%A7
Sevda Dalgıç is a Turkish film and stage actress, primarily known for her onscreen representation of Ozge in the hit FOX Network TV show Arka Sıradakiler. Sevda Dalgıç made her screen debut with the Turkish teenage high school drama called Arka Sıradakiler (literal translation “those who sit at the rear desks”.) Her reported weight is 53 kg (116.6 lbs.), shoe size 40, height 174 cm (5’ 9”), and eye color is hazel. She was born in Istanbul on 23 February 1984. Although she had dropped out of high school at an early age to support her family, she got enrolled in acting classes at Sadri Alisik Kultur Merkezi Oyunculuk Bolumu (Sadri Alisik Cultural Center Drama Department) later on her life. She studied drama and performing arts for two years at the same school. She is still pursuing an education in advanced acting. Her primary hobbies include, but not limited to, horseback riding, skating, dancing, and playing basketball. She played at her highschool basketball team before dropping out due to financial and family problems. In the 160th episode of Arka Sıradakiler, her character has died. After her departure from the TV show, she acted in the stage drama of a father-son relation and the complications they encountered due to the son being openly gay. The name of the drama is called “Eyvah ogluma bir haller oldu” (literal translation, “Oh something has happened to my son”.) The play generally received positive reviews from critics. Sevda Dalgıç is currently engaged to be married to his longtime boyfriend. Her early career includes jobs as a model, hairdresser, and cashier. She lives with her mother and 9 year old German Shepherd dog called Hera in Istanbul. References External links Actresses from Istanbul Turkish television actresses 1984 births Living people
https://en.wikipedia.org/wiki/List%20of%20Pinstripe%20Bowl%20broadcasters
The following is a list of the television networks and announcers who have broadcast college football's Pinstripe Bowl throughout the years. Television Radio References Broadcasters Pinstripe Bowl Pinstripe Bowl Pinstripe Bowl
https://en.wikipedia.org/wiki/1818%20United%20States%20House%20of%20Representatives%20election%20in%20Louisiana
Louisiana elected its member July 6–8, 1818. Louisiana held an election for the 16th Congress at the same time that it held a special election to finish the 15th Congress. Data were only available for the special election, but the general election would presumably have had very similar results, and so the results for the special election are duplicated here. See also 1818 Louisiana's at-large congressional district special election 1818 and 1819 United States House of Representatives elections List of United States representatives from Louisiana Notes References 1818 Louisiana United States House of Representatives
https://en.wikipedia.org/wiki/Project%20Houdini
Project Houdini is a computer program used by the 2008 U.S. presidential campaign of Barack Obama. Although it originally had missteps, it has been credited with helping increase Democratic Party turnout over the 2004 election. It has been compared to ORCA, which failed under similar circumstances for the Mitt Romney's 2012 presidential campaign. See also Cambridge Analytica Catalist Contingency table Data dredging The Groundwork Project Narwhal Psychographic Predictive Analytics References Barack Obama 2008 United States presidential campaigns Political campaign techniques Mobile software Software projects 2008 software Analytics
https://en.wikipedia.org/wiki/Credant%20Technologies
Credant Technologies was a company formerly located in Addison, Texas that offered products and services for data security. The company was founded in 2001 by Bob Heard, Chris Burchett and Andrew Kahl. The company claims that their products protect two million end-points in several industries, such as universities, health-care, aeronautical, financial and government/defense. Products The company offers a range of products to protect data from "leaking". Several different versions of the main technology can be used on different locations in the network: via a "policy proxy" on the border between the LAN and the internet or in the DMZ, or a central "enterprise server" within the network. Also editions for Exchange servers and domain controllers are available. Other products are self-encrypting drivers that will encrypt all data on that drive without any additional requirements on the client or from the user, BitLocker management systems, Policy Reporting tools. Acquisition by Dell On 18 December 2012, Dell announced that it has reached agreement with Credant that it would acquire the company. Prior to the acquisition Dell was already a technology partner of Credant. Dell has bought 16 companies over the past 4 years, several of them directly or indirectly in the field of data-security. A major step in the field of security services was made by Dell at the start of 2011 when they acquired SecureWorks and in 2012 with the acquisition of SonicWall, best known for their firewalls and Intrusion Detection and Prevention appliances. But also other companies Dell bought over the past years offer products and services for security, including Perot Systems and Quest Software. With the acquisition of Credant Dell gambles on a continuation of the strong growth in security services. References 2001 establishments in Texas 2012 disestablishments in Texas American companies established in 2001 American companies disestablished in 2012 Dell acquisitions Computer companies established in 2001 Computer companies disestablished in 2012 Computer security companies Defunct computer companies of the United States
https://en.wikipedia.org/wiki/Fred%20%26%20Farid%20Group
FF Agency FF is an independent international boutique network (Advertising firm) with offices Los Angeles, New York, Shanghai and Paris founded by Fred Raillard and Farid Mokart in 2007. It employs around 300 people. Fred & Farid also provides investments via Fred & Farid Digital Investment Fund (FFDIF) Raillard and Mokart had worked as partners beginning in 2000. In 2007 they launched their own independent company. History Frederic Raillard and Farid Mokart were both raised in the Paris suburbs, Raillard from a Breton and a Parisian family, Mokart from an Algerian and Kabyle family. After studying respectively design and political science (Sciences Po), Raillard and Mokart started as strategic planner and account manager at Euro RSCG BTC in Paris. They decided to team up and moved to the creative side, working consecutively for 6 major agencies in Paris as creative directors. Their first project was for start-up Aucland.com, a French online auction site. In 2000, Fred & Farid created the musical video for British Pop Star Robbie Williams "Rock DJ". FF (formerly Fred & Farid) is an independent creative agency of 100+ people. They produced campaigns for brands like Air France, Audemars Piguet, Audi, Coca-Cola, Diesel, Giorgio Armani, Google, Guerlain, HP, Lacoste, Louis XIII, Martini, Orangina, Porsche, Saint Laurent, Schweppes, Societe Generale, Tmall, Vivo, Wrangler. References External links Advertising agencies of France
https://en.wikipedia.org/wiki/List%20of%20number-one%20digital%20songs%20of%202013%20%28U.S.%29
The highest-selling digital singles in the United States are ranked in the Hot Digital Songs chart, published by Billboard magazine. The data are compiled by Nielsen SoundScan based on each single's weekly digital sales, which combines sales of different versions of a single for a summarized figure. Chart history See also 2013 in music List of Billboard Hot 100 number-one singles of 2013 References External links Current Digital Songs chart Billboard Chart Archives – Digital Songs (2013) United States Digital Songs 2012 Number-one digital songs
https://en.wikipedia.org/wiki/Boeing%20Calc
Boeing Calc was a spreadsheet package written by Boeing Computer Services, an independent subsidiary of aviation manufacturer Boeing. It had originally been developed as an in-house accounting tool, but was launched as a commercial product in April 1985 for IBM 4300 mainframes running IBM MVS and IBM PC microcomputers running DOS. The original launch price was $399 per copy for the PC version and $8,899 for a combined PC/mainframe bundle. Boeing Calc could read and later write standard Lotus 1-2-3 files. It supported a maximum spreadsheet size of 16,000 columns by 16,000 rows, and was notable for introducing the concept of 3D spreadsheets. Each spreadsheet could have up to 16,000 pages, with cells prefixed by the page number; the upper-left cell of the third page was referred to as 3A1, for example. This concept was a precursor of the tabbed sheets included in Quattro Pro and later spreadsheets. Version 3.0 was launched in August 1987 and introduced multi-user support on PC-based local area networks, with a price of $795 for a LAN licence. Version 4.0 followed in November of that year, with the price for a single-user licence reduced to $395. Unlike competitors such as Lotus 1-2-3 and Quattro it did not support graphics, although Boeing sold a companion program - Boeing Graph - that could produce 3D charts. Contemporary reviews of version 3.0 praised Boeing Calc's flexibility and ability to work with files of up to 32mb in size, but criticised its steep system requirements, slow speed, and reliance on disk-based virtual memory. Running on a high-end 6 MHz IBM PC AT with an Intel 8087 maths coprocessor, Infoworld's standard spreadsheet took 42.9 seconds to recalculate, versus 7.9 for the same sheet running in Lotus 1-2-3. Towards the end of 1987 Boeing announced its intention to leave the microcomputer software industry. Boeing Computer Services was sold off as an independent entity, Garrison Software Corp, to West German software distributors m+s Elektronik. However the deal fell through and BCS reverted to Boeing's control, where it was eventually merged with Boeing Information Services. Boeing Calc ceased development in 1988, with the final copies being sold off to employees at a discount price of $50. References Accounting software
https://en.wikipedia.org/wiki/A3C
A3C may refer to: Air Copter A3C, a French autogyro Airman Third Class, a rank in the United States Air Force Australian Cyber Collaboration Centre, a government-funded organisation in Adelaide, South Australia
https://en.wikipedia.org/wiki/Andrzej%20Piotr%20Ruszczy%C5%84ski
Andrzej Piotr Ruszczyński (born July 29, 1951) is a Polish-American applied mathematician, noted for his contributions to mathematical optimization, in particular, stochastic programming and risk-averse optimization. Schooling and positions Ruszczyński was born and educated in Poland. In 1969 he won the XX Polish Mathematical Olympiad. After graduating in 1974 with a master's degree from the Department of Electronics, Warsaw University of Technology, he joined the Institute of Automatic Control at this school. In 1977 he received his PhD degree for a dissertation on control of large-scale systems, and in 1983 Habilitation, for a dissertation on nonlinear stochastic programming. In 1992 the President of Poland, Lech Wałęsa, awarded Ruszczyński the state title of Professor. In 1984-86 Ruszczyński was a visiting scholar at the Institute for Operations Research, University of Zurich. In 1986-87 he was the vice-director of the Institute of Automatic Control, and in 1987-1990 he was the Vice-Dean of the Department of Electronics, Warsaw University of Technology. In 1992 Ruszczyński was a visiting professor at the Department of Operations Research, Princeton University, in 1992-96 he led the project Optimization under Uncertainty at the International Institute for Applied Systems Analysis, in 1996-97 he was a visiting professor at the Department of Industrial Engineering, University of Wisconsin-Madison, and since 1997 he has been with Rutgers University, where he holds a position of the Board of Governors Professor at the Rutgers Business School. Main achievements Ruszczyński developed decomposition methods for stochastic programming problems, the theory of stochastic dominance constraints (jointly with Darinka Dentcheva), contributed to the theory of coherent, conditional, and dynamic risk measures (jointly with Alexander Shapiro), and created the theory of Markov risk measures. He authored five books and more than 100 research papers. He was elected to the 2017 class of Fellows of the Institute for Operations Research and the Management Sciences. In 2018 Ruszczyński (jointly with A. Shapiro) received the Dantzig Prize of the Society for Industrial and Applied Mathematics and the Mathematical Optimization Society. Selected books Most influential papers Ruszczyński, A., A regularized decomposition method for minimizing a sum of polyhedral functions, Mathematical Programming 35 (1986) 309–333. Mulvey, J. M.; and Ruszczyński, A., A new scenario decomposition method for large-scale stochastic optimization, Operations Research 43(1995) 477–490. Ogryczak, W.; and Ruszczyński, A., Dual stochastic dominance and related mean—risk models, SIAM Journal on Optimization 13 (2002) 60–78. Dentcheva, D.; and Ruszczyński, A., Optimization with stochastic dominance constraints, SIAM Journal on Optimization 14 (2003) 548–566. Ruszczyński, A.; and Shapiro, A., Optimization of convex risk functions, Mathematics of Operations Research 31 (2006) 433–452.
https://en.wikipedia.org/wiki/Oracle%20Database%20Appliance
The Oracle Database Appliance (ODA) is a database server appliance made by Oracle Corporation. It was introduced in September 2011 as the mid-market offering in Oracle's family of full-stack, integrated systems the company calls engineered systems. The ODA is a single rack-mounted device providing a highly-available two-node clustered database server. History Oracle introduced its first engineered database system, Oracle Exadata, in 2008. In 2011, the company announced the Oracle Database Appliance as a smaller, less powerful alternative to Oracle Exadata at a lower price point. According to industry analysts, Oracle expected the Oracle Database Appliance to fill the gap in its product line beneath Oracle Exadata, targeting mid-market customers. The platform proved very popular with database administrators, with enough support to launch a book about the systems. Features The Oracle Database Appliance supports more than database systems. Starting in release 2.5 (ODA V1) and 2.5.5 (ODA V2 X3-2), the Oracle Database Appliance can be deployed using Oracle VM, which allows an administrator to install the application tier along with the database. The Oracle Database Appliance also offers a pay-as-you-grow model for Oracle licenses. This allows a customer to only license the CPU count they need and not the entire capacity of the appliance. When virtualized, this is supported for both the database and the application tier. When the Oracle Database Appliance is connected to a ZS3 storage array, the DBA can leverage Hybrid Columnar Compression for data stored on the array to enable tiered storage and compression ratios exceeding 200%. Hardware The first generation of the Oracle Database Appliance (ODA V1) is a two-node cluster in a single rack-mounted chassis. Inside the chassis are two servers, configured in a cluster with shared storage. Each server includes two six-core processors (for a total of 12 cores per server), 96 GB RAM, six 1 Gigabit NICs, and two 10 Gigabit NICs. The NICs are configured in an active/passive HA (bonding) configuration. Inside, the appliance holds four 73 GB SSDs and twenty 600 GB hard disks for shared storage. Storage is configured during deployment for either double or triple mirroring (giving an overall capacity of 6 TB or 4 TB, respectively). The appliance also contains redundant power supplies and cooling fans. Later generations of the appliance moved to a more flexible platform, utilizing Oracle X3-2 and X4-2 x86 servers and one or two SAS storage trays. Each compute node of the latest X4-based configuration includes four 10GBaseT network ports, two 12-core Intel Xeon E5-2697 v2 processors, 256 GB RAM, and optional 10 Gigabit fiber connectivity. The system can also support up to two storage trays, each with twenty 900 GB hard drives and four 200 GB SSDs for a maximum capacity of 36 TB of hard disk space and another 1.6 TB of SSD space. Single- and double-mirroring of disks is supported, for up to 18 TB of local data
https://en.wikipedia.org/wiki/Mirror%20%28programming%29
In computer programming, a mirror is a reflection mechanism that is completely decoupled from the object whose structure is being introspected. This is as opposed to traditional reflection, for example in Java, where one introspects an object using methods from the object itself (e.g. getClass()). Mirrors adhere to the qualities of encapsulation, stratification and ontological correspondence. Benefits Decoupling the reflection mechanism from the objects themselves allows for a few benefits: The object's interface is not polluted, so there is no danger of breaking reflection by overriding a reflective method. There can be different mirror systems. The mirror system can be removed entirely (potentially allowing for optimizations). A mirror system can operate on remote code, since it is not coupled with a particular machine. Languages that use mirrors Dart, via its reflect function. Inko, via its std::mirror module. Rubinius (Ruby implementation), via its Rubinius::Mirror.reflect method. Scala Swift, via its reflect function. References Programming paradigms
https://en.wikipedia.org/wiki/Philip%20Thomas%20Porter
Philip Thomas Porter (March 18, 1930 - March 30, 2011) was an electrical engineer and one of the guiding pioneers of the invention and development of early cellular telephone networks. Education Porter was born in rural Clinton, Kentucky, USA. He received a BA in physics (1952), MA in physics (1953), and a PhD (1955?) from Vanderbilt University, graduating magna cum laude and Phi Beta Kappa. Career Porter was an engineer at Bell Laboratories during the years of transition from radio telephones to modern cellular mobile communications. Porter was the Bell Labs engineer who proposed that cell towers be at the corners of the hexagon cells rather than the centers and have directional antennas that would transmit/receive in 3 directions into 3 adjacent hexagon cells. In Porter's design, the cell sites can flexibly assign channels to handheld phones based on signal strength, allowing the same frequency to be re-used in various locations without interference. This allowed a larger number of phones to be supported over a geographical area. His work in preorigination dialing (entering the number, then hitting the Send key), improved efficiency of placing cell phone calls. During the 1960s and 1970s, Porter was a key partner in the international negotiation of bandwidths and international standards involving systems, signaling, and controlling implications of cellular service. These activities led to cellular service becoming commercial viable. He was the recipient of several awards for his work, notably from the IEEE (engineering society). As of January 1, 1990, Porter was elected an IEEE Fellow "for contributions to the planning, definition, and design of mobile cellular radio communications and services." After spending much of his adult life in New Jersey near the Bell Laboratories headquarters where he worked, Porter retired to WellSpring in Greensboro, North Carolina in 2000. He and his wife Louise (Jett) Porter had a daughter Sara Shelby Taylor, a son Philip C. Porter, and three grandchildren. Publications Li Fung Chang and Philip T. Porter, "Data Services in a TDMA Digital Portable Radio System", Global Telecommunications Conf., GLOBECOM '90, 1990. Li Fung Chang and Philip T. Porter, "Performance comparison of antenna diversity and slow frequency hopping for the TDMA portable radio channel", IEEE Transactions on Vehicular Technology, pages 222-229, vol 38, issue 4, 1989. Philip T. Porter, "Relationships for Three-dimensional Modeling of Co-channel Reuse", IEEE Vehicular Technology Conference, Pages 6–11, vol 35, 1985. Verne H. MacDonald, Philip T. Porter, W. Rae Young, "Cellular high capacity mobile radiotelephone system with fleet-calling arrangement for dispatch service", , filed April 28, 1980, issued August 16, 1983. Z. C. Fluhr and Philip T. Porter, "AMPS: Control Architecture", Bell System Technical Journal, vol. 58, 1, pages 1–14, January 1979, Advanced Mobile Phone System. Richard H. Frenkiel, Joel S. Engle, and Philip T. Por
https://en.wikipedia.org/wiki/Proposed%20Melbourne%20tram%20extensions
Numerous proposals have been made for improvements to the Melbourne tram network, the largest such network in the world. Nearly all of these have been for track extensions of existing lines to connect with nearby railway station or to service new areas and suburbs. Extensions currently in planning Caulfield to Chadstone, Monash and Rowville route In April 2018, the State Government of Victoria announced a new extension of the tram network from Caulfield. The 18 km (11.1 mi) extension would run from Caulfield station to Chadstone, Monash University, Waverley Park and Rowville. The state government allocated $3 million to plan the route, which would be constructed in two stages, with the first running from Caulfield to Monash. This proposal is a light rail alternative to the long-proposed Rowville railway line project. In the 2018-2019 Federal Budget, the Australian Government committed $475 million to a heavy rail line from Caulfield to Monash University that would run on the same corridor as the light rail proposal. In 2019, nearby local councils expressed concern that the project had been shelved. In 2021, Monash University began lobbying the state and federal governments for an alternative rapid bus plan, using experimental "trackless tram" technology. In November 2021 the Minister for Transport Infrastructure told state parliament that the government was examining a rapid bus alternative and was working with the federal government to develop a business case. Trams routes to Fishermans Bend State and local governments have also proposed the extension of Route 48 from its current terminus at Victoria Harbour in Docklands across the Yarra River and into the Fishermans Bend precinct, a future major urban renewal area. It would require the construction of a new tram-only bridge and generally follow the path of Fennell and Plummer Streets. The tram extension is proposed as an interim solution to connect Fishermans Bend residents to the CBD via mass transit until the metropolitan railway network can be extended with new underground stations. The proposed bridge has faced some opposition from local groups and residents, whom fear it will destroy a local park and prevent tall boats from mooring at a nearby marina and travelling upstream. The bridge has been costed by the State Government at over $200 million. The State Government released a Framework for Fishermans Bend in October 2018 that proposed two new tram routes through the area: one running through the new suburbs of Sandridge and Wirraway along Plummer Street, and the other running through Lorimer and the Employment Precinct along Turner Street. The Framework gives a 'medium term' delivery timeframe of 2020–2025, while Infrastructure Australia also identified the project as a 'medium term' priority. The 2019-2020 state budget allocated $4.5 million to plan the tram routes to Fishermans Bend and develop a preliminary business case for the project. As of 2022, no further state governme
https://en.wikipedia.org/wiki/Saket%20Modi
Saket Modi (born July 31, 1990) is an entrepreneur, co-founder and CEO of Safe Security, a cybersecurity and digital business risk quantification company, based out of Palo Alto, California. Early life Modi is born and raised in Kolkata, India. His father is a businessman. He attended school at Lakshmipat Singhania Academy. In school, Modi was often found in the computer laboratory and it is there that he realised he could access the chemistry question paper stored in a password protected file. By using a simple ‘brute force’ tool, which was available for free on the Internet, he was able to unlock the paper. He later confessed to his teacher but this small incident helped Modi realize that he could use his skills for social good. In 2012, he received his undergraduate engineering degree from the LNM Institute of Information Technology, Jaipur with a major in computer science. As an undergraduate student, Saket conducted several hands-on workshops on ethical hacking at Indian Institutes of Technology (IIT) campuses across India. Career In 2012, while in his fourth year of college, Saket Modi, Vidit Baxi and Rahul Tyagi started Lucideus (now known as Safe Security) at the incubation center in IIT Bombay, using capital from their personal savings and family. In 2013, Lucideus opened its first office in New Delhi. The company was known for doing a security assessment of the BHIM, an Aadhaar-based mobile payment platform designed by the National Payments Corporation of India. In 2017, Lucideus secured its initial round of funding with $2 million from Sri Shivananda (CTO, PayPal), Rajan Anandan (Managing Director, Sequoia Capital), Victor Menezes (ex-Senior Vice-chairman, Citibank), Vikas Agnihotri (Operating Partner, Softbank Group), Mickey Doshi (CEO, Credit Suisse, India), among others. In 2018, Cisco's former Chairman and CEO John T. Chambers led an investment round of $5 million through JC2 Ventures to invest in Lucideus. Chambers asked Modi to describe his business in 15 seconds and was hooked by the reply. In 2019, Lucideus expanded its operations to the USA and other markets in the APAC region, and shifted their headquarters to Palo Alto, California. Public appearances Modi has appeared as a guest on television programs including CNBC, Fortune (magazine), Forbes, and Bloomberg. Also, he has spoken on various subject of information security and entrepreneurship at international forums like Mobile World Congress, CeBIT, Confederation of Indian Industry, ISACA, TiE, TED (conference), etc. Awards and honours References Living people Indian businesspeople 1990 births Indian technology company founders Indian chief executives 21st-century Indian businesspeople Businesspeople from Kolkata Indian expatriates in the United States Businesspeople from California
https://en.wikipedia.org/wiki/Mandore%20Express
The 12461 / 12462 Mandore Express is a Superfast express train on India's broad-gauge network, connecting (code: JU) and (code: DLI), a distance of approximately 619 km. The train runs on Indian Railways broad-gauge line. The train gets a WDP-4 EMD locomotive and has a top speed of 110 km/h. The train has sleeper class, ac 3 tier, ac 2 tier and ac first class of accommodation. Total Travel time is 10 hrs and 58 min and distance is 308 km on an avg speed of 58 km/h. Max permissible speed: 110 km/h between RE – Rewari railway station and AWR Schedule Rake sharing The train shares its rake with 12915 / 12916 Ashram Express. Route & Halts The train runs from Old Delhi via , , , , , , , , , , , , to Jodhpur. Traction It is hauled by a Bhagat Ki Kothi-based WDP-4 / WDP-4B / WDP-4D locomotive on its entire journey. See also Indian Railways References Transport in Delhi Named passenger trains of India Rail transport in Rajasthan Transport in Jodhpur Express trains in India Rail transport in Haryana
https://en.wikipedia.org/wiki/Operator%20Training%20Simulator
An Operator Training Simulator (OTS) is a computer-based training system that uses a dynamic simulation model of an industrial process, usually integrated with an emulator of the process plant's Distributed Control System (DCS). Elements An OTS uses a dynamic simulation of the process in order to generate the appropriated data to feed an emulation of the plant's control system. The elements of a typical OTS are the following: Dynamic simulation software Process model Instructor interface Control system integration software DCS emulator Replica of the operator station Applications Common applications of OTS systems are the following: New control room operator training (e.g., start-up, shutdown, and emergency procedures) Existing control room operator refresher training (e.g., start-up, shutdown, and emergency procedures) Platform for advanced process control (APC) and optimization Validating DCS control and logic checkout Validating and improving plant operating procedures “What if?” analysis (scenario analysis) Engineering tool for developing and testing new control strategies See also Dispatcher training simulator, a computer system for training operators of electrical power grids E-learning Virtual learning environments Simulation software
https://en.wikipedia.org/wiki/Great%20Victorian%20Bike%20Ride
The Great Victorian Bike Ride, commonly known as The Great Vic, is a non-competitive fully supported eight- or nine-day annual bicycle touring event organised by Bicycle Network. The ride takes different routes around the countryside of the state of Victoria, Australia each year. The total ride distance is usually in the range of , averaging about a day excluding the rest day. The ride first ran in 1984, attracting 2,100 riders in what was initially supposed to be a one-off event, but due to its unexpected popularity and success it subsequently became an annual event. The Great Vic typically draws several thousand participants each year, with a record of 8,100 riders in 2004, which makes it one of the world's largest supported bicycle rides. Event structure The Great Victorian Bike Ride is organised as a single annual event usually of eight to nine days duration, taking place during late November and early December, at the start of the Australian summer. Total ride distance is usually between . The average daily ride, not including the rest day, is about , although this can range from less than to more than . Participants The ride is supported and non-competitive, catering to riders of all ages and abilities, from young children to octogenarians, keen racers, fitness enthusiasts, riders with disabilities, and everyone in between. It is not, however, to be considered a "once-a-year" activity for the participants unless they are quite fit and or have had much endurance training. The route can often include long steep mountain roads, and is not recommended for cyclists with less than a moderate level of fitness. The oldest riders to participate were two 87-year-old men who did the ride in 2010. While most riders are from Victoria, cyclists from around Australia and the world also come to take part. The ride is also completed on all manner of bicycles. Most riders use regular road bikes, mountain bikes, hybrid bikes, and touring bikes of varying standard, quality, and age. Some less typical bikes are also used, including recumbent bikes and tricycles, tandem bikes, folding bicycles, children in bicycle trailers and on trailer bikes, and even occasional unicycles, scooter style footbikes, and custom made bicycles. Approximately one-third of the riders each year participate as part of school groups from about fifty different schools. Students are predominantly from the middle years of secondary school, and are accompanied on the ride by supervising teachers and parents. A number of riders who have later turned professional have taken part in the Great Vic as students, including former top female rider Anna Millward, and 2011 Tour de France winner Cadel Evans. Ride options The ride is structured as a nine-day event, typically starting on the last Saturday in November and finishing on the first Sunday in December, and including one rest day somewhere around the middle of the ride. Due to its length the Bicycle Network has for many years marketed
https://en.wikipedia.org/wiki/Fantom%20%28disambiguation%29
Fantom is a Swedish velomobile. Fantom may also refer to: FANTOM, an international research consortium Fantom (company), an Irish company producing digital stickers Fantom (programming language), an object oriented programming language Fantom (software), a digital trading card software platform Fantom, a 2016 album by electro-pop group Mœnia Fantom-6/7/8, a series of music workstations and synthesizers by Roland See also Fantome (disambiguation) Phantom (disambiguation)
https://en.wikipedia.org/wiki/The%20Crezz
The Crezz is a British television drama produced by Thames Television and shown on the ITV network in 1976. Created by Clive Exton, The Crezz was set in a fictitious West London crescent, Carlisle Crescent. The series was 12 one-hour programmes each focused on a different household. The series was broadcast on ITV at 9pm to start with but midway through it was put back to 10.35pm because the series didn't achieve the viewing figures that were hoped for. Regular Cast Joss Ackland as Charles Bronte Elspet Gray as Jackie Bronte Briony McRoberts as Esther Bronte Joan Hickson as Emily Bronte Isla Blair as Emma Antrobus Anthony Nicholls as Cyril Antrobus Peter Bowles as Ken Green Carole Nimmons as Sue Green Hugh Burden as Dr. Bernard Balfour-Harvey Janet Key as Brenda Pitman Nicholas Ball as Colin Pitman Jiggy Bhore as Consuela Roland Curram as Terry Paul Greenhalgh as Denny Aimée Delamain as Lady Clarke Gerald James as Major Rice Eileen O'Brien as Bridget Macarthy Alan Devlin as Joe Macarthy Elizabeth Begley as Mrs. Macarthy Gillian Raine as Angela Hart Anton Phillips as Clarence Henderson Frank Mills as George Smith Hilda Braid as Molly Smith Linda Robson as Jane Smith Lee Walker as Bing Smith Ronald Fraser as Gavin Maddox Tariq Yunus as Hafez Aziz Bob Hoskins as Detective Sergeant Marble References Notes Bibliography External links 1976 British television series debuts 1976 British television series endings 1970s British drama television series English-language television shows ITV television dramas Television series by Fremantle (company) Television series created by Clive Exton Television shows produced by Thames Television Television shows set in London
https://en.wikipedia.org/wiki/A.%20J.%20After%20Hours
A. J. After Hours is a television program aired on the E! cable network in 2001. The talk show, hosted by gossip columnist A. J. Benza, was described as a show that "mixes interviews with comedy sketches and man-on-the-street segments, and which explores the New York's hip club scene." The program received mixed reviews, with Entertainment Weekly calling the show "retro sexist...contempo goofy...hairier than The Man Show," and Andrew Wallenstein, writing for Media Life, said the show "is about as compelling a talk show as The Magic Hour," referring to Magic Johnson's failed attempt at a talk show. The show was cancelled after only a few episodes. References External links 2000s American late-night television series American television talk shows E! original programming
https://en.wikipedia.org/wiki/Carpathian%20Biosphere%20Reserve
Carpathian Biosphere Reserve () is a biosphere reserve that was established as a nature reserve in 1968 and became part of the World Network of Biosphere Reserves of UNESCO in 1992. Since 2007 bigger portion of the reserve along with some territories of the Uzh River National Park was listed with the UNESCO World Heritage Sites as part of the Ancient and Primeval Beech Forests of the Carpathians and Other Regions of Europe. Located in the eastern parts of the Zakarpattia Oblast, it consists of six separate preservation massifs and two botanic zakazniks (Chorna Hora and Yulivska Hora) with a total area of . The greatest part of the reserve is covered by virgin forests. Administratively, the biosphere reserve is located in four districts of Zakarpattia Oblast, Ukraine. It is adjacent to the Carpathian National Nature Park. Territory division The territory of Carpathian Biosphere Reserve is divided into several functional zones: core (A) and buffer zones (B), zone of the regulated protected regime (D) and anthropogenic landscapes (C). They differ one from another by the nature use regimes. Such division helps to achieve the most appropriate balance between nature protection needs and the requirements of local people. Composition The biosphere reserve consists of six separate preservation massifs as well as two botanical reserves (zakazniks). Chornohora preservation massif Svydovets preservation massif Marmorosh preservation massif Kuziy preservation massif Uholka and Shyroka Luzhanka preservation massif Preservation massif "Dolyna Nartsysiv" (Narcissus Valley) Botanical zakaznyk "Chorna Hora" (Black Mountain) Botanical zakaznyk "Yulivska Hora" (Julius Mountain) Chornohora preservation massif is located on the southern macroslope of the Chornohora, the highest mountain belt in the Eastern Beskids and the Ukrainian Carpathians. Its total area is . Svydovets preservation massif has an area of and is located at an elevation of 600–1883 m.a.s.l in the highest region of the Svydovets mountains. Marmorosh preservation massif is located on the northern macroslope of the Rakhiv Mountains and covers a territory of at an elevation of 750–1940 m.a.s.l. Kuziy preservation massif is located on the southern branches of the Svydovets mountain range at an elevation of 350–1409 m.a.s.l. with total area of 4925 ha. Its territory is completely located in the forest area. Uholka and Shyroka Luzhanka preservation massif is located on the southern slopes of the Krasna and the Menchil mountains grasslands at an elevation of 400 – 1280 m.a.s.l. The total area of the protected territory is 15580 ha. Preservation massif "Narcissus Valley" is located at an elevation of 180–200 m.a.s.l. in the western part of Khustsko-Solotvynska Valley and lies in a flatland of the Khustets river flood plain. The “Chorna hora" botanical zakaznik occupies a territory of 823 ha in the Volcanic Carpathians, on the Chornahora mountain, which is a part of the Hutynskiy range.
https://en.wikipedia.org/wiki/List%20of%20Billboard%20200%20number-one%20albums%20of%202013
The highest-selling albums and EPs in the United States are ranked in the Billboard 200, which is published by Billboard magazine. The data are compiled by Nielsen Soundscan based on each album's weekly physical and digital sales. In 2013, a total of 44 albums claimed the top position of the chart. One of which, singer-songwriter Taylor Swift's album Red started its peak in late 2012. Justin Timberlake's album The 20/20 Experience was the longest-running album of the year, staying atop the chart for three consecutive weeks. Other albums with extended chart runs include Red by Taylor Swift, Babel by Mumford & Sons, Random Access Memories by Daft Punk, Magna Carta Holy Grail by Jay-Z, Crash My Party by Luke Bryan and The Marshall Mathers LP 2 by Eminem; each spent two weeks on the top position. Throughout 2013, only two acts achieved multiple number-one albums on the chart: Justin Timberlake with The 20/20 Experience and The 20/20 Experience – 2 of 2, and Luke Bryan with Spring Break...Here to Party and Crash My Party. The 20/20 Experience sold 968,000 copies in its first week following its release, becoming the highest-selling album during the debut week. Eminem's The Marshall Mathers LP 2 sold 792,000 copies in its first week, making it the second album with the highest sales during the opening week. Meanwhile, Beyoncé notched her fifth number-one album with her eponymous album; it was also the largest debut sales week for a female artist in 2013, and outselling Knowles' previous albums' debut figures. Knowles is the only female artist in Billboard 200 history to have her first five albums reach number one. The 20/20 Experience was the biggest-selling album of 2013, with 2,373,000 copies sold in the US. Chart history See also 2013 in music List of Billboard Hot 100 number-one singles of 2013 List of Billboard number-one country albums of 2013 References External links Current Billboard 200 chart Billboard Chart Archives – Billboard 200 (2013) 2013 United States Albums
https://en.wikipedia.org/wiki/Mercury%20Systems
Mercury Systems is a technology company serving the aerospace and defense industry. It designs, develops and manufactures open architecture computer hardware and software products, including secure embedded processing modules and subsystems, avionics mission computers and displays, rugged secure computer servers, and trusted microelectronics components, modules and subsystems. Mercury sells its products to defense prime contractors, the US government and original equipment manufacturer (OEM) commercial aerospace companies. Mercury is based in Andover, Massachusetts, with more than 2300 employees and annual revenues of approximately US$988 million for its fiscal year ended June 30, 2022. History Founded on July 14, 1981 as Mercury Computer Systems by Jay Bertelli. Went public on the Nasdaq stock exchange on January 30, 1998, listed under the symbol MRCY. In July 2005, Mercury Computer Systems acquired Echotek Corporation for approximately US$49 million. In January 2011, Mercury Computer Systems acquired LNX Corporation. In December, 2011, Mercury Computer Systems acquired KOR Electronics for US$70 million, In August 2012, Mercury Computer Systems acquired Micronetics for US$74.9 million. In November 2012, the company changed its name from Mercury Computer Systems to Mercury Systems. In December 2015, Mercury Systems acquired Lewis Innovative Technologies, Inc. (LIT). In November 2016, Mercury Systems acquired Creative Electronic Systems for US$38 million. In April 2017, Mercury Systems acquired Delta Microwave, LLC (“Delta”) for US$40.5 million, enabling the Company to expand into the satellite communications (SatCom), datalinks and space launch markets. In July 2017, Mercury Systems acquired Richland Technologies, LLC (RTL), increasing the Company's market penetration in commercial aerospace, defense platform management, C4I, and mission computing. In January 2019, Mercury Systems acquired GECO Avionics, LLC for US$36.5 million. In December 2020, Mercury Systems acquired Physical Optics Corporation (POC) for $310 million. In May 2021, Mercury Systems acquired Pentek for $65.0 million. In November, 2021 Mercury Systems acquired Avalex Technologies Corporation and Atlanta Micro, Inc. In August, 2023 Mercury Systems appointed William L. Ballhaus as the president and CEO. Facilities Manufacturing centers Mercury manufactures in New England, New York Metro-area, Southern California and a trusted DMEA facility in the Southwest, which has Missile Defense Agency approval and AS9100 certification. Four Mercury sites have been awarded the James S. Cogswell Award for Outstanding Industrial Security Achievement Award by the Defense Counterintelligence and Security Agency (DCSA). References External links Manufacturing companies based in Massachusetts Companies based in Essex County, Massachusetts Andover, Massachusetts Signal processing Signals intelligence Radio frequency propagation Middleware Cell BE architecture Aerospace companies o
https://en.wikipedia.org/wiki/ZeroAccess%20botnet
ZeroAccess is a Trojan horse computer malware that affects Microsoft Windows operating systems. It is used to download other malware on an infected machine from a botnet while remaining hidden using rootkit techniques. History and propagation The ZeroAccess botnet was discovered at least around May 2011. The ZeroAccess rootkit responsible for the botnet's spread is estimated to have been present on at least 9 million systems. Estimates botnet size vary across sources; antivirus vendor Sophos estimated the botnet size at around 1 million active and infected machines in the third quarter of 2012, and security firm Kindsight estimated 2.2 million infected and active systems. The bot itself is spread through the ZeroAccess rootkit through a variety of attack vectors. One attack vector is a form of social engineering, where a user is persuaded to execute malicious code either by disguising it as a legitimate file, or including it hidden as an additional payload in an executable that announces itself as, for example, bypassing copyright protection (a keygen). A second attack vector utilizes an advertising network in order to have the user click on an advertisement that redirects them to a site hosting the malicious software itself. Finally, a third infection vector used is an affiliate scheme where third-party persons are paid for installing the rootkit on a system. In December 2013 a coalition led by Microsoft moved to destroy the command and control network for the botnet. The attack was ineffective though because not all C&C were seized, and its peer-to-peer command and control component was unaffected - meaning the botnet could still be updated at will. Operation Once a system has been infected with the ZeroAccess rootkit it will start one of the two main botnet operations: bitcoin mining or click fraud. Machines involved in bitcoin mining generate bitcoins for their controller, the estimated worth of which was 2.7 million US dollars per year in September 2012. The machines used for click fraud simulate clicks on website advertisements paid for on a pay per click basis. The estimated profit for this activity may be as high as 100,000 US dollars per day, costing advertisers $900,000 a day in fraudulent clicks. Typically, ZeroAccess infects the Master Boot Record (MBR) of the infected machine. It may alternatively infect a random driver in C:\Windows\System32\Drivers giving it total control over the operating system. It also disables the Windows Security Center, Firewall, and Windows Defender from the operating system. ZeroAccess also hooks itself into the TCP/IP stack to help with the click fraud. The software also looks for the Tidserv malware and removes it if it finds it. See also Botnet Malware Command and control (malware) Zombie (computer science) Internet crime Internet security Click fraud Clickbot.A References External links Analysis of the ZeroAccess botnet, created by Sophos. ZeroAccess Botnet, Kindsight Security Labs. New
https://en.wikipedia.org/wiki/Cheers%20%28season%204%29
The fourth season of Cheers, an American television sitcom, originally aired on NBC in the United States between September 26, 1985, and May 15, 1986, as part of the network's Thursday lineup. This season marks Woody Harrelson's television debut as Woody Boyd after Nicholas Colasanto, who portrayed Coach Ernie Pantusso, died during the previous season. The show was created by director James Burrows and writers Glen and Les Charles, under production team Charles Burrows Charles Productions, in association with Paramount Television. Background During the previous season, 1984–85, after two years of struggling with low ratings, rapid schedule changes, and failed series, NBC's Thursday night lineup (years before the Must See TV promotional slogan was developed) consisted of, in time slot order starting at 8:00 p.m. Eastern / 7:00 p.m. Central: The Cosby Show, Family Ties, Cheers, Night Court, and Hill Street Blues, and became a ratings success for the network. The 1985–86 Thursday schedule was similar to the previous season's and was still a success. Cast and characters Ted Danson as Sam Malone — bartender, owner, retired Red Sox relief pitcher Shelley Long as Diane Chambers — snobby waitress, the moral compass of the bar staff and patrons Rhea Perlman as Carla Tortelli — bitter waitress, divorced mother of six. Gives birth to Ludlow, named after his father Dr. Bennett Ludlow, Frasier's mentor. John Ratzenberger as Cliff Clavin — postal carrier and virginal, loquacious bar know-it-all Woody Harrelson as Woody Boyd — dim small town Indiana bar-tender, hired by Sam to fill-in for the coach's absence following the latter's death. George Wendt as Norm Peterson — a semi-unemployed accountant, a childless husband Kelsey Grammer as Frasier Crane (recurring) — jilted psychiatrist Recurring and credited in the end credits, though appears in most episodes. In remastered prints of the episode "Cliffie's Big Score", seen on DVD and later syndication, Grammer's name appears in the opening credits, although he does not appear in the episode and is not officially credited in the opening until Season 5. During the previous season, Sam went to Italy to stop Frasier and Diane's wedding. This season, he fails to do so, and returns to Boston. Several months later, Frasier comes to the bar to announce that Diane jilted him at the altar, made love to other men, and is now in a convent, located one hour away from Boston. Sam retrieves Diane from the convent and rehires her as a bar waitress. After having lost everything, including his career, Frasier frequently visits the Boston bar, Cheers, for drinks and then slowly degenerates into alcoholism. He recovers, then begins another psychiatric job, distancing himself from Sam and Diane's relationship. Sam then begins a relationship with the city councillor Janet Eldrige (Kate Mulgrew). Tired of being part the triangle with Sam and Diane, Janet breaks up with Sam. In the season's finale, during a telephone call,
https://en.wikipedia.org/wiki/Cartoon%20Medley
Cartoon Medley is a compilation album produced by Kid Rhino and Atlantic Records for Cartoon Network and released on July 6, 1999. First unveiled in early 1999, it serves as a collection of songs from the channel's programs and anthological series, including those from Hanna-Barbera and others like Cow and Chicken and The Powerpuff Girls. In addition to the material, the album also includes six downloadable games and features for the listener. Critically, Cartoon Medley was awarded three out of five stars by AllMusic while "The Powerpuff Girls (End Theme)" was singled out by Billboards Moira McCormick for being a "breakout" track. Background and release Serving as a collection of television theme songs and music from Cartoon Network's programming, Cartoon Medley is presented as a fake TV dinner meal. The CD's cover advertises containing "Flaky fried Cow and Chicken, Space Ghost-Zorak-Brak veggies, and [a] Yogi gelatin treat". The project was first unveiled in the fourth volume of Film Score Monthly in 1999, before being released on July 6, 1999, by Kid Rhino, the children's label of Rhino Entertainment, along with Atlantic Records as both a CD and a cassette tape. Bonus features on the CD-ROM include six downloadable games and children's activities, such as liner notes including the lyrics to the corresponding tracks and samples of video games featured on Cartoon Network's official website. While creating the compilation album, Cartoon Network's Vice President of Off-Channel Commerce, Jamie Porges, imagined having more material than just the title songs from television series. Long-time fan Craig McCracken, creator of The Powerpuff Girls and storyboard artist for Dexter's Laboratory, enlisted the help of Scottish band Bis in order to record material; together, they co-created the "End Theme" specifically for The Powerpuff Girls. As part of an advertisement campaign for Cartoon Medley, individuals were able to access Cartoon Network's official website and listed to snippets of album tracks "Boo Boo, Baba, Dee Dee", "The Powerpuff Girls", and "Josie & the Pussycats". Composition The soundtrack album features a total of 38 songs and has a duration of 35 minutes and 47 seconds. Voice actor Phil Baron served as the executive producer of the project while Don Kitabayashi was the compilation producer. Mastering and supervision of the production were handled by Bob Fisher and Ben Trask, respectively. Beginning and ending the album are short and long versions of Cartoon Network's "Powerhouse" theme song. The themes from Hanna-Barbera's series on Cartoon Medley were selected from Josie & the Pussycats, The Flintstones, The Jetsons, Dastardly and Muttley in Their Flying Machines. The Real Adventures of Jonny Quest, The Yogi Bear Show, The Huckleberry Hound Show, and The Quick Draw McGraw Show. Music from Johnny Bravo, Scooby-Doo, Where Are You!, Ed, Edd n Eddy, 2 Stupid Dogs, Underdog, Speed Racer, SWAT Kats: The Radical Squadron, Space Ghost Coast to Co
https://en.wikipedia.org/wiki/List%20of%20programs%20broadcast%20by%20the%20NTA%20Film%20Network
This is a list of programs broadcast by the NTA Film Network, an early American television network and syndication service which operated in North America from 1956 to around 1961, when the network's flagship station, WNTA-TV, was sold. All programs are listed below, whether they were NTA original series or programs only seen in second-run syndication. References NTA Film Network
https://en.wikipedia.org/wiki/Dennis%20L.%20Montgomery
Dennis Lee Montgomery (born July 9, 1953) is an American software designer and former medical technician who sold computer programs to federal officials that he claimed would decode secret Al-Qaeda messages hidden in Al Jazeera broadcasts and identify terrorists based on Predator drone videos. A 2010 Playboy investigation called Montgomery "The man who conned the Pentagon", saying he won millions in federal contracts for his supposed terrorist-exposing intelligence software. The software was later reported to have been an elaborate hoax and Montgomery's former lawyer called him a "con artist" and "habitual liar engaged in fraud". Career In 1998, Montgomery co-founded eTreppid Technologies with partner Warren Trepp to develop video compression and noise filtering software for the gaming and casino industries. Montgomery and Trepp evolved their offerings for military applications and in 2004 won a no-bid contract with the United States Department of Defense. Following a dispute over software ownership, Montgomery was separated from eTreppid in 2006 and formed a new venture with billionaire backers Edra and Tim Blixseth. Originally called OpSpring, the venture was later renamed Blxware, and Montgomery had the title of Chief Scientist. Blxware was dissolved in 2009 as part of the Blixseths' divorce and Edra Blixseth's bankruptcy. eTreppid Technologies, LLC Montgomery became a partner in 1998 to Warren G. Trepp, the former chief junk bond trader for Michael Milken at Drexel Burnham Lambert, and another investor, Wayne Prim, to develop and sell audio, video, and data compression software under the banner eTreppid Technologies. As Executive Vice President and Chief technology officer of eTreppid, Montgomery led the company's efforts to develop the company's software and promote it to government agencies associated with tracking terrorist activities. In 2004, eTreppid was awarded a $30 million no-bid contract with United States Special Operations Command and was ranked the 16th-largest defense contractor that year, according to Aerospace Daily. Blxware partnership After his separation from eTreppid, Montgomery joined with Edra and Tim Blixseth to bring his alleged terrorist tracking software to other U.S. and foreign government clients. With the Blixseths and former presidential candidate Jack Kemp he helped form OpSpring LLC, later renamed Blxware. Via Blxware, Montgomery pursued selling his terror tracking software to the U.S. and Israel governments, leveraging political connections of the Blixseth partnership. Blxware's owners Edra and Tim Blixseth divorced in 2008 and Blxware became part of Edra Blixseth's sole property. She filed for personal bankruptcy in 2009, which resulted in a Chapter 7 liquidation of her assets, including Blxware and its associated software and intellectual property. Terrorist software hoax National Public Radio reported, "For several months starting in the fall of 2003, Montgomery's analysis led directly to national code
https://en.wikipedia.org/wiki/Droylsden%20Academy
Droylsden Academy is a secondary school in Droylsden, Manchester. It opened in September 2009 on the site of the former Droylsden School, Mathematics and Computing College for Girls which it replaced. The former Littlemoss High School for Boys was also replaced by this school. The school buildings were completed in January 2012 and accommodates 1400 students. The School also housed a small number of sixth form students between the years of 2011 and 2013 under the name D6. This branch of the school was closed down in 2013 causing A-level students to relocate to other sixth form colleges, mainly to Clarendon Sixth Form College, formerly in Hyde. This school uses a slogan of PH2 (politeness hard-working and honesty.) The school has been reported to have brilliant teachers and good time schedules. History Former schools on this site, always known locally as Manor Road School, have included: Droylsden High School for Girls, a secondary modern school, 1951-2009 Droylsden School, Mathematics and Computing College for Girls, c2000-2009 References Academies in Tameside Secondary schools in Tameside Droylsden
https://en.wikipedia.org/wiki/FBI%20Cyber%20Division
The Cyber Division (CyD) is a Federal Bureau of Investigation division which heads the national effort to investigate and prosecute internet crimes, including "cyber based terrorism, espionage, computer intrusions, and major cyber fraud." This division of the FBI uses the information it gathers during investigation to inform the public of current trends in cyber crime. It focuses around three main priorities: computer intrusion, identity theft, and cyber fraud. It was created in 2002. In response to billions of dollars lost in cyber-crimes, that have had devastating impact on the United States' economic and national security, the FBI created a main "Cyber Division at FBI Headquarters to "address cyber crime in a coordinated and cohesive manner." Branching out from there, specially trained cyber squads have been placed in 56 field offices across the United States, staffed with "agents and analysts who protect against computer intrusions, theft of intellectual property and personal information, child pornography and exploitation, and online fraud." Due to internet threats around the world, the FBI has developed "cyber action teams" that travel globally to help in "computer intrusion cases" and gather information that helps to identify cyber crimes that are most dangerous to our national security. Keeping the focus not only on national security but also on threats to citizens of the United States, the FBI has long been focused on identity theft, which is a growing concern for American citizens. Since fiscal year 2008 through the middle of fiscal year 2013, the number of identity theft related crimes investigated by the Bureau across all programs have resulted in more than 1,600 convictions, $78.6 million in restitutions, $4.6 billion in recoveries, and $6.8 billion in fines. High priority is given to investigations that involve terrorist organizations or intelligence operations sponsored by foreign governments, which FBI calls "national security cyber intrusions". The Cyber Division has primary responsibility for the FBI's efforts to counter national security–related cyber intrusions. The Cyber Division priorities in rank order are: (a) cyber intrusions; (b) child sexual exploitation; (c) intellectual property rights; and (d) internet fraud. FBI Cyber Division works through the National Cyber Investigative Joint Task Force (NCIJTF) and cyber investigative squads located in each FBI field office. Since 2008, NCIJTF is the primary American agency responsible for coordinating cyber threats investigations, and liaisons with Central Intelligence Agency (CIA), Department of Defense (DOD), Department of Homeland Security (DHS), and National Security Agency (NSA). A large number of cases investigated by the Cyber Division come from the Internet Fraud Complaint Center (IFCC), which in 2002 received about 75,000 complaints. Some cases that the Cyber Division has investigated included: dismantling a ring of criminals using malware to redirect users
https://en.wikipedia.org/wiki/Stan%20TV
Stan TV () is a Kazakh news outlet. In December 2012, the Bostandyk District Court in Almaty reportedly ordered Stan TV to halt news programming for alleged violation of "Kazakhstan's laws on extremism and national security". References External links Kazakhstani news websites Mass media in Almaty Television stations in Kazakhstan
https://en.wikipedia.org/wiki/Network%20scheduler
A network scheduler, also called packet scheduler, queueing discipline (qdisc) or queueing algorithm, is an arbiter on a node in a packet switching communication network. It manages the sequence of network packets in the transmit and receive queues of the protocol stack and network interface controller. There are several network schedulers available for the different operating systems, that implement many of the existing network scheduling algorithms. The network scheduler logic decides which network packet to forward next. The network scheduler is associated with a queuing system, storing the network packets temporarily until they are transmitted. Systems may have a single or multiple queues in which case each may hold the packets of one flow, classification, or priority. In some cases it may not be possible to schedule all transmissions within the constraints of the system. In these cases the network scheduler is responsible for deciding which traffic to forward and what gets dropped. Terminology and responsibilities A network scheduler may have responsibility in implementation of specific network traffic control initiatives. Network traffic control is an umbrella term for all measures aimed at reducing network congestion, latency and packet loss. Specifically, active queue management (AQM) is the selective dropping of queued network packets to achieve the larger goal of preventing excessive network congestion. The scheduler must choose which packets to drop. Traffic shaping smooths the bandwidth requirements of traffic flows by delaying transmission packets when they are queued in bursts. The scheduler decides the timing for the transmitted packets. Quality of service (QoS) is the prioritization of traffic based on service class (Differentiated services) or reserved connection (Integrated services). Algorithms In the course of time, many network queueing disciplines have been developed. Each of these provides specific reordering or dropping of network packets inside various transmit or receive buffers. Queuing disciplines are commonly used as attempts to compensate for various networking conditions, like reducing the latency for certain classes of network packets, and are generally used as part of QoS measures. Classful queueing disciplines allow the creation of classes, which work like branches on a tree. Rules can then be set to filter packets into each class. Each class can itself have assigned other classful or classless queueing discipline. Classless queueing disciplines do not allow adding more queueing disciplines to it. Examples of algorithms suitable for managing network traffic include: Several of the above have been implemented as Linux kernel modules and are freely available. Bufferbloat Bufferbloat is a phenomenon in packet-switched networks in which excess buffering of packets causes high latency and packet delay variation. Bufferbloat can be addressed by a network scheduler that strategically discards packets to avoi
https://en.wikipedia.org/wiki/List%20of%20things%20named%20after%20John%20von%20Neumann
This is a list of things named after John von Neumann. John von Neumann (1903–1957), a mathematician, is the eponym of all of the things (and topics) listed below. Birkhoff–von Neumann algorithm Birkhoff–von Neumann theorem Birkhoff–von Neumann decomposition Dirac–von Neumann axioms Koopman–von Neumann classical mechanics Schatten–von Neumann norm Stone–von Neumann theorem Taylor–von Neumann–Sedov blast wave von Neumann algebra Abelian von Neumann algebra Enveloping von Neumann algebra Finite-dimensional von Neumann algebra von Neumann architecture von Neumann bicommutant theorem von Neumann bounded set Von Neumann bottleneck von Neumann cardinal assignment von Neumann cellular automaton von Neumann conjecture von Neumann constant Computer virus Murray–von Neumann coupling constant Jordan–von Neumann constant Density matrix Direct integral von Neumann's elephant von Neumann entropy von Neumann entanglement entropy von Neumann equation von Neumann extractor von Neumann-Wigner interpretation von Neumann–Wigner theorem von Neumann measurement scheme von Neumann mutual information von Neumann machines Von Neumann's mean ergodic theorem von Neumann neighborhood von Neumann ordinal von Neumann paradox von Neumann probe von Neumann programming languages von Neumann regular ring von Neumann spectral theorem von Neumann stability analysis von Neumann universal constructor von Neumann universe von Neumann–Bernays–Gödel set theory von Neumann–Morgenstern utility theorem von Neumann's inequality Monte Carlo method Quantum statistical mechanics Continuous geometry Game theory Minimax theorem Quantum logic Hilbert's fifth problem Commutation theorem Hyperfinite type II factor Stochastic computing Ultrastrong topology Self-replication von Neumann's theorem von Neumann's trace inequality Weyl–von Neumann theorem Wigner-Von Neumann bound state in the continuum Wold–von Neumann decomposition Zel'dovich–von Neumann–Döring detonation model von Neumann spike Other 22824 von Neumann IEEE John von Neumann Medal John von Neumann Award John von Neumann Center (JVNC) at Princeton University (1985-1990), part of the Consortium for Scientific Computing John von Neumann Computer Society John von Neumann Environmental Research Institute of the Pacific John von Neumann Lecture von Neumann (crater) John von Neumann (sculpture) John von Neumann Theory Prize John von Neumann University References Neumann, John von Neumann, John von John von Neumann
https://en.wikipedia.org/wiki/Forever%20%28Philippine%20TV%20series%29
Forever is a 2013 Philippine television drama romance fantasy series broadcast by GMA Network. Directed by Ricky Davao, it stars Heart Evangelista, Geoff Eigenmann and Gloria Romero. It premiered on January 21, 2013 on the network's Telebabad line up replacing Magdalena. The series concluded on April 19, 2013 with a total of 63 episodes. Cast and characters Lead cast Heart Evangelista as young Adora Del Prado / Isadora Gloria Romero as older Adora Del Prado Geoff Eigenmann as Ramon / Patrick Supporting cast Isabel Oli as Monica del Prado Gian Magdangal as Rico Gallardo III Candy Pangilinan as Susie Saab Magalona as Leila Guest cast Marc Abaya as Federico Gallardo Ernie Zarate as older Federico Gallardo Ronnie Henares as Jaime Del Prado Angie Ferro as Apeng Rox Montealegre as Maggie Dex Quindoza as Jason Roldan Aquino as Barabas Carme Sanchez as Kate Production and development Writer, director and GMA Entertainment TV head, Jun Lana began conceptualizing the series early 2012 and intended to be the initial offering of the network's for their coveted Afternoon Prime block for 2013. The series is, somewhat, based on the 1980 classic film Somewhere in Time and in 2006 GMA Films' Moments of Love, because of its fictitious "Love knows no boundaries" and "time warf" plot. The network’s entertainment TV department approved the concept and found the story "something new" for an afternoon show to feature a period piece. Ratings According to AGB Nielsen Philippines' Mega Manila household television ratings, the pilot episode of Forever earned a 15.3% rating. While the final episode scored a 12.4% rating. References External links 2013 Philippine television series debuts 2013 Philippine television series endings Filipino-language television shows GMA Network drama series Philippine romance television series Television shows set in the Philippines
https://en.wikipedia.org/wiki/Akka%20%28toolkit%29
Akka is a source-available toolkit and runtime simplifying the construction of concurrent and distributed applications on the JVM. Akka supports multiple programming models for concurrency, but it emphasizes actor-based concurrency, with inspiration drawn from Erlang. Language bindings exist for both Java and Scala. Akka is written in Scala and, as of Scala 2.10, the actors in the Scala standard library are deprecated in favor of Akka. History An actor implementation, written by Philipp Haller, was released in July 2006 as part of Scala 2.1.7. By 2008 Scala was attracting attention for use in complex server applications, but concurrency was still typically achieved by creating threads that shared memory and synchronized when necessary using locks. Aware of the difficulties with that approach and inspired by the Erlang programming language's library support for writing highly concurrent, event-driven applications, the Swedish programmer Jonas Bonér created Akka to bring similar capabilities to Scala and Java. Bonér began working on Akka in early 2009 and wrote up his vision for it in June of that year. The first public release was Akka 0.5, announced in January 2010. Akka is now part of the Lightbend Platform together with the Play framework and the Scala programming language. In September 2022, Lightbend announced that Akka would change its license from the free software license Apache License 2.0 to a proprietary source-available license, known as the Business Source License (BSL). Any new code under the BSL would become available under the Apache License after three years. Distinguishing features The key points distinguishing applications based on Akka actors are: Concurrency is message-based and asynchronous: typically no mutable data are shared and no synchronization primitives are used; Akka implements the actor model. The way actors interact is the same whether they are on the same host or separate hosts, communicating directly or through routing facilities, running on a few threads or many threads, etc. Such details may be altered at deployment time through a configuration mechanism, allowing a program to be scaled up (to make use of more powerful servers) and out (to make use of more servers) without modification. Actors are arranged hierarchically with regard to program failures, which are treated as events to be handled by an actor's supervisor (regardless of which actor sent the message triggering the failure). In contrast to Erlang, Akka enforces parental supervision, which means that each actor is created and supervised by its parent actor. Akka has a modular structure, with a core module providing actors. Other modules are available to add features such as network distribution of actors, cluster support, Command and Event Sourcing, integration with various third-party systems (e.g. Apache Camel, ZeroMQ), and even support for other concurrency models such as Futures and Agents. Project structure Viktor Klang became the tech
https://en.wikipedia.org/wiki/Joan%20Feigenbaum
Joan Feigenbaum (born 1958 in Brooklyn, New York) is a theoretical computer scientist with a background in mathematics. She is the Grace Murray Hopper Professor of Computer Science at Yale University. At Yale she also holds a courtesy appointment in the Department of Economics. Feigenbaum co-invented the computer-security research area of trust management. Education and career Feigenbaum did her undergraduate work in Mathematics at Harvard University. She became interested in computers during the Summer Research Program at AT&T's Bell Labs between her junior and senior years. She then earned a Ph.D. in computer science at Stanford University, under the supervision of Andrew Yao, while working summers at Bell Labs. After graduation she joined Bell Labs. She became the Hopper Professor at Yale in 2008. Family She is married to Jeffrey Nussbaum. They have a son, Sam Baum. Baum was chosen as child's surname as the greatest common suffix of Feigenbaum and Nussbaum. Awards and honors In 1998 Feigenbaum was an Invited Speaker of the International Congress of Mathematicians in Berlin. In 2001 she became a fellow of the Association for Computing Machinery for her "foundational and highly influential contributions to cryptographic complexity theory, authorization and trust management, massive-data-stream computation, and algorithmic mechanism design." In 2012 she was named a fellow of the American Association for the Advancement of Science and, in 2013, a member of the Connecticut Academy of Science and Engineering. The Connecticut Technology Council chose her as a Woman of Innovation in 2012. She acts as one of the three award-committee members on ACM SIGecom test of time award. References 1958 births American women mathematicians American women computer scientists Living people Theoretical computer scientists Harvard College alumni Stanford University alumni Yale University faculty Fellows of the American Association for the Advancement of Science Fellows of the Association for Computing Machinery American computer scientists 21st-century American mathematicians 20th-century American mathematicians American women academics 20th-century women mathematicians 21st-century women mathematicians 20th-century American women 21st-century American women
https://en.wikipedia.org/wiki/Samsung%20Galaxy%20Mini%202
Samsung Galaxy Mini 2 is a smartphone manufactured by Samsung that runs the open source Android 2.3 "Gingerbread" operating system. It was announced and released by Samsung in February 2012. It is available in three colors: black, yellow and orange. Hardware Galaxy Mini 2 features the Qualcomm Snapdragon S1 SoC design in an MSM7227A chip. This contains an ARMv7-based ARM Cortex-A5 CPU clocked to a slightly faster speed of up to 800 MHz, and an enhanced Adreno 200 GPU core. The display is a 3.27-inch HVGA TFT LCD screen with a higher pixel density (320×480) than on a previous-generation model. Inclusion of NFC (Near Field Communication) varies by model. The phone includes a plain 3-megapixel rear camera protected by a hardened scratch-proof glass, but does not include autofocus and flash. Official product literature does not specify the exact camera sensor size beyond "3 MP", though the total pixel count does amount to approximately 3.15 Mpix. The camera supports geotagging and video recording; video is recorded in an H.264 format at VGA resolution (640×480 pixels @ 30 fps). Further device features include A-GPS for navigation, Bluetooth, USB data transfer and charging via microUSB, and an FM radio with RDS support. The FM radio app has slots for twelve channel presets. Software upgrade path Samsung announced on September 24, 2012, that Galaxy Mini 2 was to be updated in the future with Android 4.1 "Jelly Bean", but later abandoned development of Jelly Bean for Mini 2. An unofficial port of CyanogenMod 10.1 (of Jelly Bean branch, v4.2.2) for Galaxy Mini 2 has been rated stable as of the 2013-12-27 release date. Model variations There are several different sub-models of Galaxy Mini 2: Successor models A little over a year later, Samsung in April 2013 released Samsung Galaxy Fame S6810, and in October 2013 released Samsung Galaxy Fame Lite S6790. Most improvements over Galaxy Mini 2 are incremental. The SoC design is now based on Broadcom BCM21654G. Both phone models are equipped with slightly higher-clocked CPUs (1 GHz/850 MHz), Bluetooth 4.0, Android 4.1.2 Jelly Bean, and 3G connectivity gains HSUPA. Differing features in Galaxy Fame include a 5 Mpix camera with auto-focus, a front camera, support for up to 64 Gb microSD cards, and NFC or dual-SIM variants depending on model. This model still supports Mini-SIM cards. Galaxy Fame Lite differs from Galaxy Mini 2 with Micro-SIM support. Inclusion of NFC or the FM radio may vary depending on submodel (some have one or the other, both, or neither). The camera remains at 3.0 Mpix. A sibling model released in October 2013 is Galaxy Fame Lite Duos (S6792, with L as one known region-specific submodel), which differs by having dual-SIM support. References External links Samsung Galaxy Mini 2 on m.samsung.com (UK) Galaxy Mini 2 Galaxy Mini 2 Android (operating system) devices Mobile phones introduced in 2012 Discontinued smartphones
https://en.wikipedia.org/wiki/Tom%20Christiansen
Thomas S. "Tom" Christiansen (born February 13, 1963), nicknamed tchrist or occasionally thoth, is a Unix developer and user known for his work with the Perl programming language. Christiansen worked for several years at TSR Hobbies before attending the University of Wisconsin - Madison where he earned B.A.'s in Spanish and Computer Science, and an M.S. in Computer Science. He worked for five years at Convex Computer. In 1993, he established the Tom Christiansen Perl Consultancy, located in Lake Geneva, Wisconsin. In 2010, he joined the Biomedical Text Mining Group at the University of Colorado School of Medicine. Christiansen, with a C-and-Unix background, was one of the early contributors to Perl after its public release in 1987. He presented the first public Perl tutorial in 1989 and wrote the first academic paper to highlight Perl in 1990. He was the author of much of the core Perl documentation, including the manual pages perlfaq and perltoot, development of perl.com. In 1996, Christiansen wrote "Csh Programming Considered Harmful" about the limitations inherent in C Shell Programming. Books he co-authored include: The second (1996) and third (2000) editions of Programming Perl. The second (1997) edition of Learning Perl (and its spin-off Learning Perl on Win32 Systems). The Perl Cookbook (1998). In 1999, Christiansen was one of the original recipients of the White Camel awards from Perl Mongers for his contribution to Perl's documentation. Christiansen has been called a "UNIX luminary". The common phrase "Only perl can parse Perl" is attributed to Tom Christiansen. It is not inspired by "Only tex can understand TeX", but rather refers to Perl's unique capability, akin to a typedef or a #define in C or C++, where it can modify its syntactic rules dynamically while running. This empowers Perl to alter how its parser interprets code during execution, much like a type declaration changes the parsing process in C. Randal Schwartz also credits him with accidentally naming the Schwartzian Transform for optimizing some types of sorts. This happened after Schwartz used it in a Usenet message, and Christiansen replied to the message giving some corrections and in one place said "the Schwartzian transform" to refer to the transform that Schwartz used. References External links (1999) "Plural of Virus" perl.com "The Seven Deadly Sins of Perl" UNIX faq - shell "Csh Programming Considered Harmful". (1991) "GUIs Considered Harmful". PerlMonks (1997) Interview with Tom Christiansen and Larry Wall, Web Review magazine, Feb 28, 1997 issue (link to archived copy) (2009) Redhat perl != perl (mailing list message) 1963 births Living people Perl writers O'Reilly writers University of Wisconsin–Madison College of Letters and Science alumni
https://en.wikipedia.org/wiki/Nueve%20%28Spanish%20TV%20channel%29
Nueve was a private Spanish television channel owned by Mediaset España Comunicación. Their programming is aimed at more conventional women. Nueve officially began broadcasting its programming on January 21, 2013 (20 days after starting the test broadcasts). The channel uses the song "Sweet About Me" by Gabriella Cilmi for its jingle and theme. History Project TV-channel With the expansion of the number of channels in 2010, before the merger of Telecinco and Cuatro, Telecinco was considering launching a free channel dedicated to women. The channel would have been launched on September 1, 2010, as "LaNueve" (The Nine) corresponding to its logical channel number on digital terrestrial television. Its programming would have included: current affairs, entertainment, fiction series and informative spaces for women. A month after the announcement, Telecinco rescinded the project and replaced it with a children's channel: Boing. Recovery of the project and launch the channel On December 10, 2012, Mediaset España Comunicación decided to start taking the necessary steps back towards the recovery of the "project LaNueve", throwing a new channel (La Tienda en Casa) to act as a relay station occupying the appropriate signal—Nueve. The chosen name was Nueve, a channel specially aimed at a more conventional female audience. This gamble made by Mediaset would compete directly with the younger and urban focusing Nova channel. One of the more notable things about the "Nueve's" beginnings is that the channel started its official broadcasts on January 21, 2013, just 20 days after its test broadcasts, speaking to its immediate popularity. However, from the outset, the launching was announced for two days later. Closed The channel ceased broadcasting on 5 May 2014, as a consequence of a sentence by the Supreme Court that annulled the concessions for nine channels broadcasting in DTT, because their permissions for frequencies were granted without the required public consensus and assignments system according to the Audiovisual Law. Programming Nueve's programming was especially aimed at a more conventional female audience, with a daily schedule consisting of miniseries, telenovelas, TV-series, news programs, talent shows and a live 12-hour broadcasting of the Big Brother Spain house. References External links Women's interest channels Channels of Mediaset España Comunicación Defunct television channels in Spain Television channels and stations established in 2012 Television channels and stations disestablished in 2014 Spanish-language television stations
https://en.wikipedia.org/wiki/Regional%20Universities%20Network
The Regional Universities Network (RUN) is a network of seven universities primarily from regional Australia, as well as campuses in the Australian capital cities and some international campuses. Members History The Regional Universities Network was formed in October 2011 as a response to the regional focus for higher education of Australian government. Many of these universities were part of a previous group, known as the "New Generation Universities". The current Chairperson of the Network is Professor Nick Klomp, of Central Queensland University. On 29 May 2019, Charles Sturt University has announced it will join the Regional Universities Network (RUN), becoming the seventh member of the group. The Members of this group are: Central Queensland University Charles Sturt University Federation University Australia Southern Cross University University of New England University of Southern Queensland University of the Sunshine Coast Map See also References External links Regional Universities Network Homepage College and university associations and consortia in Australia
https://en.wikipedia.org/wiki/Aackosoft
Aackosoft International B.V. (1983 to 1988) was a Dutch video game developer and publisher that exclusively developed games for the MSX home computer, becoming one of the biggest publishers for the MSX platform. It re-released some titles for the ZX Spectrum and Commodore 64, for which it also distributed software in their early years. Aackosoft filed for bankruptcy in 1988. Aackosoft released its software under multiple labels. Besides the Aackosoft brand name, software was also released as Aackosoft Edusystems (for the educational titles), Eaglesoft (for budget titles released on cassette tapes), Eurosoft, Methodic Solutions and The ByteBusters. The latest was also the name of Aackosoft's programming team. Many of Aackosoft's games are clones of more famous arcade games: Boom! (Galaxian), Hopper (Frogger), MacAttack (Burgertime), Oh Shit! (Pac-Man), Scentipede (Centipede), Jet Bomber (Zaxxon), Moon Rider (Moon Patrol), Space Busters (Space Invaders), Break In (Breakout), Time Curb (Time Pilot) and Robot Wars (Berzerk). Some more original games include Life in the Fast Lane, Kick It!, Drome, Skooter, North Sea Helicopter and Ultra Chess. In 1986 Aackosoft released Sprinter (aka The Train Game), featuring a 3D train simulation. In addition to games, Aackosoft developed accounting and educational software for the MSX. References Defunct video game companies of the Netherlands Companies based in Leiden Video game companies established in 1983 Zoeterwoude
https://en.wikipedia.org/wiki/Similarity%20learning
Similarity learning is an area of supervised machine learning in artificial intelligence. It is closely related to regression and classification, but the goal is to learn a similarity function that measures how similar or related two objects are. It has applications in ranking, in recommendation systems, visual identity tracking, face verification, and speaker verification. Learning setup There are four common setups for similarity and metric distance learning. Regression similarity learning In this setup, pairs of objects are given together with a measure of their similarity . The goal is to learn a function that approximates for every new labeled triplet example . This is typically achieved by minimizing a regularized loss . Classification similarity learning Given are pairs of similar objects and non similar objects . An equivalent formulation is that every pair is given together with a binary label that determines if the two objects are similar or not. The goal is again to learn a classifier that can decide if a new pair of objects is similar or not. Ranking similarity learning Given are triplets of objects whose relative similarity obey a predefined order: is known to be more similar to than to . The goal is to learn a function such that for any new triplet of objects , it obeys (contrastive learning). This setup assumes a weaker form of supervision than in regression, because instead of providing an exact measure of similarity, one only has to provide the relative order of similarity. For this reason, ranking-based similarity learning is easier to apply in real large-scale applications. Locality sensitive hashing (LSH) Hashes input items so that similar items map to the same "buckets" in memory with high probability (the number of buckets being much smaller than the universe of possible input items). It is often applied in nearest neighbor search on large-scale high-dimensional data, e.g., image databases, document collections, time-series databases, and genome databases. A common approach for learning similarity is to model the similarity function as a bilinear form. For example, in the case of ranking similarity learning, one aims to learn a matrix W that parametrizes the similarity function . When data is abundant, a common approach is to learn a siamese network - A deep network model with parameter sharing. Metric learning Similarity learning is closely related to distance metric learning. Metric learning is the task of learning a distance function over objects. A metric or distance function has to obey four axioms: non-negativity, identity of indiscernibles, symmetry and subadditivity (or the triangle inequality). In practice, metric learning algorithms ignore the condition of identity of indiscernibles and learn a pseudo-metric. When the objects are vectors in , then any matrix in the symmetric positive semi-definite cone defines a distance pseudo-metric of the space of x through the form . When is a sy
https://en.wikipedia.org/wiki/Tracy%20Camp
Tracy Kay Camp (born September 27, 1964) is an American computer scientist noted for her research on wireless networking. She is also noted for her leadership in broadening participation in computing. She was the co-chair of CRA-W from 2011 to 2014 and she was the co-chair of ACM-W from 1998 to 2002. Biography Camp received a B.A. in Mathematics from Kalamazoo College in 1987. She received a M.S. in Computer Science from Michigan State University in 1989 and a Ph.D in Computer Science from The College of William & Mary in 1993. She then joined the Department of Computer Science at the University of Alabama as an assistant professor in 1993. In 1998 she moved to the Colorado School of Mines as an assistant professor, and was then promoted to associate professor in 2000 and to professor in 2007. In 2010–11, she was interim head of Mathematical and Computer Sciences and then interim head of Electrical Engineering and Computer Science. In this role, she helped lead this re-organization of the university. She is currently Head of the Department of Computer Science at Colorado School of Mines. Awards In 2012 she was named an ACM Fellow. Her other notable awards include: ACM Fellow (2012) IEEE Fellow (2016) References External links Colorado School of Mines: Tracy Kay Camp, Department of Computer Science American women computer scientists American computer scientists Colorado School of Mines faculty Fellows of the Association for Computing Machinery Living people 1964 births Scientists from Detroit American women academics 21st-century American women
https://en.wikipedia.org/wiki/Carl%20Landwehr
Carl E. Landwehr is an American computer scientist whose research focus is cybersecurity and trustworthy computing. His work has addressed the identification of software vulnerabilities toward high assurance software development, architectures for intrusion-tolerant and multilevel security systems, token-based authentication, and system evaluation and certification methods. In an invited essay for ACSAC 2013, he proposed the idea of developing building codes for building software that is used in critical infrastructures. He has organized an NSF funded workshop to develop a building code and research agenda for medical device software security. The final committee report is available through the Cyber Security and Policy Institute of the George Washington University, and the building code through the IEEE. Carl Landwehr has developed and led cybersecurity research programs at the National Science Foundation (2001-2004, 2009–2011), IARPA (2005-2009), Mitretek Systems and the Naval Research Laboratory (1982-1999). From 2007 to 2010, he served as editor-in-chief of IEEE Security & Privacy Magazine as well as associate editor of several IEEE journals. He was a member of DARPA's Information Science and Technology Study Group and has served on several studies for the National Academy of Sciences. Research begun while visiting at the Isaac Newton Institute at Cambridge eventually led to the development of a patent for a secure identification system held by Dr. Landwehr and Daniel Latham. He is the author of several highly cited publications. Carl Landwehr holds degrees from Yale University (BS) and the University of Michigan (MS, PhD). While at Michigan, he worked for the Merit Network, currently the longest running regional computer network in the United States. He has taught and lectured widely, including at Purdue University, Georgetown University, Virginia Tech University, and the University of Maryland. He is currently a lead research scientist at the Cyber Security Policy and Research Institute at George Washington University. In 2015 and 2016, Dr. Landwehr was the visiting McDevitt Professor of Computer Science at the McDevitt Center for Creativity and Innovation of LeMoyne College to develop and teach an inter-disciplinary undergraduate course entitled "Cybersecurity for Future Presidents". In 2019, he became a visiting professor in the Electrical and Computer Engineering Division of the University of Michigan in Ann Arbor. Dr. Landwehr joined the Board of Directors of the Center for Democracy and Technology in September 2016. Carl Landwehr was interviewed by Gary McGraw of Cigital for the Silver Bullet podcasts on Security for IEEE discussing changing threats in cybersecurity. He has also been interviewed for the computer history series hosted by the Charles Babbage Institute of the University of Minnesota. For the 30th Anniversary IEEE Symposium on Security and Privacy, he provided a history of U.S. Government investments in cyber secur
https://en.wikipedia.org/wiki/Lightbend
Lightbend, formerly known as Typesafe, is a company founded by Martin Odersky, the creator of the Scala programming language, Jonas Bonér, the creator of the Akka middleware, and Paul Phillips in 2011. It provides a platform for building reactive applications for the JVM, consisting of the Play Framework, Akka middleware and Scala programming language, with additional supporting products and development tools such as the Slick database library for Scala and the sbt build tool. Lightbend also provides training, consulting and commercial support on the platform. Lightbend is one of the main contributors of Reactive Streams. In February 2016, the company was renamed from Typesafe to Lightbend and adopted a new logo. Leadership The company's CEO is Jonas Bonér. Investors Lightbend initially raised $3 million for Series A funding from Greylock Partners. Lightbend then raised another $14 million for Series B from Shasta Ventures, Greylock Partners, Juniper Networks and Francois Stieger. Intel Capital is leading a new $20 million Series C round of funding along with new investor Blue Cloud Ventures and current backers Bain Capital Ventures, Polytech Ecosystem Ventures, and Shasta Ventures. This brings funding to date to $42 million. Products Lightbend leads the following open-source or source-available software projects: Akka event-driven middleware It is also a core participant in the development of: Scala programming language Lightbend also offers Lightbend Subscription, which offers 24/7 developer support and a commercial product Lightbend Production Suite. Lightbend Production Suite includes service orchestration, Lightbend Monitoring, application resilience, and enhanced availability. Conferences Lightbend initiated the Scala Days conference which brings together developers from around the world to share their experiences and new ideas around creating applications with Scala. Since its inception, the Scala Center has taken over the responsibility for organizing Scala Days. Lightbend even initiated Reactive Summit as a conference around the principles for asynchronous stream processing with Reactive Streams which was later donated to the Linux Foundation. Educational Resources Lightbend offers an educational platform called Lightbend Academy, which includes online courses for subscription customers. References External links Software companies of the United States Companies established in 2011 Middleware
https://en.wikipedia.org/wiki/Legends%20of%20Chima
Legends of Chima is a computer-animated epic science-fantasy television series created by Tommy Andreasen and produced by The Lego Group. It was created to coincide with the Lego Legends of Chima line of construction toys. It centers on the fictional world of Chima, a place inhabited by warring tribes of anthropomorphic animals. The series was broadcast on Cartoon Network in the United States. It began with two episodes that aired on January 16, 2013, with the Season 1 finale airing on December 5, 2013. On March 15, 2014, Season 2 premiered on Cartoon Network and ended on April 19 of the same year. Season 3 aired on August 9 and ended on November 22, 2014. Plot Chima is a pristine realm filled with tribes consisting of various anthropomorphic animals. It is a parallel universe to the realm of Ninjago. As told in the great stories by Fluminox and Lagravis, Chima used to be inhabited by incipient, ordinary animals until the mysterious elemental Chi evolved them. Only a handful of species evolved initially, but evolution increased after the war between the Phoenix and Hunter tribes, led by the warlord Fangar. To defeat them, the Phoenix performs a "Great Illumination" to imprison the Hunters in a dreamless sleep, causing the mountain, Cavora, to suspend above the continent and distribute Chi water to every species in the form of drinkable water. They existed for thousands of years, and inevitably, the civilizations suffered from regular warfare even before the present. Season 1: Power of the Chi When young Prince Cragger loses his parents in the Gorge of Eternal Depth and becomes the King of the Crocodile Tribe, his sister Crooler uses Persuader Plants to force him to do whatever she wants (mostly to destroy the Lions). His former best friend, Prince Laval of the Lion Tribe, becomes his worst enemy. Thus, a terrible war breaks out between the eight animal tribes over the powerful Chi, a substance that can both sustain and destroy life. Before the final battle, a black cloud stops the Chi Falls. At the final battle, since Crooler has run out of Persuader Plants, and Laval fakes his death, Cragger is redeemed and apologizes for everything he has done. It is revealed that Laval faked his death to find the Crocodile Legend Beast, along with Cragger's mother. Season 2: Quest for the Legend Beasts When the Crawlers use the advantages of the tribal war for the Chi to steal the Chi from Mount Cavora by blocking the falls, representatives from the eight main tribes of Chima must travel to the Outlands to rescue the eight Legend Beasts, which are the keys to restoring the falls of Mount Cavora. After the defeat of the Crawlers, the Legend Beasts enter Mount Cavora and unclog the Chi Waterfalls. Chima becomes a peaceful land again. Meanwhile, in the Gorge of Eternal Depth, Scorm, King of the Scorpion tribe, and the Crawler Tribes are angry at Laval for giving him his Chi. He blames the substance for their newfound sentience and feeling of defeat and hopeles
https://en.wikipedia.org/wiki/Hash%20calendar
A hash calendar is a data structure that is used to measure the passage of time by adding hash values to an append-only database with one hash value per elapsed second. It can be thought of special kind of Merkle or hash tree, with the property that at any given moment, the tree contains a leaf node for each second since 1970‑01‑01 00:00:00 UTC. The leaves are numbered left to right starting from zero and new leaves are always added to the right. By periodically publishing the root of the hash-tree is it possible to use a hash calendar as the basis of a hash-linking based digital timestamping scheme. History The hash calendar construct was invented by Estonian cryptographers Ahto Buldas and Mart Saarepera based on their research on the security properties of cryptographic hash functions and hash-linking based digital timestamping. Their design goal was to remove the need for a trusted third party i.e. that the time of the timestamp should be verifiable independently from the issuer of the timestamp. Construction of a hash calendar There are different algorithms that can be used to build a hash calendar and extract a relevant hash chain per second. The easiest is to imagine the calendar being built in two phases. In the first phase, the leaves are collected into complete binary trees, starting from left, and making each tree as large as possible. In the second phase, the multiple unconnected trees are turned into a single tree by merging the roots of the initial trees, but this time starting from the right and adding new parent nodes as needed (red nodes). The hash chains can then be extracted as from any hash tree. Since the hash calendar is built in a deterministic manner, the shape of the tree for any moment can be reconstructed knowing just the number of leaf nodes in the tree at that moment, which is one more than the number of seconds from 1970‑01‑01 00:00:00 UTC to that moment. Therefore, given the time when the calendar tree was created and a hash chain extracted from it, the time value corresponding to each leaf node can be computed. Distributed hash calendar The Distributed hash calendar is a distributed network of hash calendar nodes. In order to ensure a high availability service it is possible to have multiple calendars in different physical locations all of which communicate with each other to ensure that each calendar contains identical hash values. Ensuring that the calendars remain in agreement is a form of Byzantine fault tolerance To the right a 5 node calendar cluster is shown where each node communicates with every other node in the cluster and there is no single point of failure. Although each node has a clock the clock is not used for setting the time directly but as a metronome to ensure that the nodes “beat” at the same time. Applications A five node hash calendar cluster is a component of Keyless Signature Infrastructure (KSI), each leaf in the hash calendar being the aggregate hash value of a globally d
https://en.wikipedia.org/wiki/MasterChef%20Australia%3A%20The%20Professionals
MasterChef Australia: The Professionals is an Australian cooking television show, based on the original BBC MasterChef: The Professionals. It aired on Network Ten from 20 January to 17 March 2013. The show was won by Rhys Badcock. Contestants Episodes Guest chefs Adriano Zumbo Jacques Reymond Stefano de Pieri Peter Gilmore Shannon Bennett Donovan Cooke Curtis Stone David Chang Ratings Colour key: – Highest rating during the series – Lowest rating during the series Notes ^N/A = not in top 20 International syndications Accolades References External links Official website MasterChef Australia Australian cooking television series 2013 Australian television series debuts 2013 Australian television series endings English-language television shows Television shows set in Victoria (state)
https://en.wikipedia.org/wiki/Data%20Cap%20Integrity%20Act
The Data Cap Integrity Act, also called the Data Measurement Integrity Act, is a bill introduced in the United States Senate by Senator Ron Wyden. The bill would require Internet service providers that have bandwidth caps to only apply caps on service to reduce network congestion rather than discourage Internet use, count all data usage equally toward caps, regardless of its source or content, and use a standard method of metering data use, which is to be defined by the Federal Communications Commission (FCC). The FCC would also be required to provide software to allow users to monitor their bandwidth usage. References Related Comparison of network monitoring systems External links Text of the bill Broadband Data transmission
https://en.wikipedia.org/wiki/Species%202000
Species 2000 is a federation of database organizations around the world that compiles the Catalogue of Life, a comprehensive checklist of the world's species, in partnership with the Integrated Taxonomic Information System (ITIS). The creation of Species 2000 was initiated by Frank Bisby and colleagues at the University of Reading in the UK in 1997 and the Catalogue of Life was first published in 2001. While administrators and member organizations of Species 2000 are located around the world, the secretariat is located at the Naturalis Biodiversity Center in Leiden, Netherlands. References External links Species 2000 Catalogue of Life Biodiversity databases 1997 establishments in England
https://en.wikipedia.org/wiki/Frank%20Bisby
Frank Ainley Bisby (April 24, 1945 – October 25, 2011) was a botanist who specialized in legumes, and was a pioneer in the development of taxonomic databases. He is noted for his work in founding Species 2000 in 1997, which coordinated the publication of the Catalogue of Life, the most comprehensive catalogue of species. Bisby was the first chair of the Taxonomic Database Working Group (TDWG), which was founded in 1985. Bisby continued to lead significant projects, including the International Legume Database and Information Service (ILDIS). He served as a professor of botany at the University of Reading for most of his career. After his PhD at Oxford University he worked with the University of Southampton before becoming a professor in botany at Reading University. References External links A latest release of the Catalogue of Life The Catalogue of Life development British taxonomists 1945 births 2011 deaths Academics of the University of Reading Alumni of the University of Oxford
https://en.wikipedia.org/wiki/National%20road%208%20%28Poland%29
National road 8 (, abbreviated as DK8) is a route in the Polish national road network, running diagonally through Poland from the Czech border in Kudowa Zdrój in the south-west to Raczki near the border with Lithuania in the north-east, through the Lower Silesia, Greater Poland, Łódź, Masovian and Podlaskie voivodeships. For most of its length it forms the Polish section of the European route E67 known as the Via Baltica between Warsaw and Tallinn. Until 2022 it was the longest road in Poland with a total length of 804 km. In December 2022 the last segment of the DK 8 to Budzisko on the border with Lithuania was transferred to become a part of the DK 61. A8 motorway The route of the Wrocław Motorway Bypass has the status of a motorway marked as A8. Expressway S8 The middle portion of the route, from the A8 motorway to Białystok, has the status of an expressway marked as S8. Major cities and towns along the route 08
https://en.wikipedia.org/wiki/Charity%20Engine
Charity Engine is a free PC app based on Berkeley University's BOINC software, run by The Worldwide Computer Company Limited. The project works by selling spare home computing power to universities and corporations, then sharing the profits between eight partner charities and periodic cash prize draws for the users; those running the Charity Engine BOINC software on their home computers. When there are no corporations purchasing the computing power, Charity Engine donates it to existing volunteer computing projects such as Rosetta@home, Einstein@Home, and Malaria Control, and prize draws are funded by donations. The company was founded by former journalist Mark McAndrew, who was writing a science fiction novel featuring a similar organisation. He abandoned the book in favour of creating the idea in real life, with the assistance of professor David Anderson from UC Berkeley who created BOINC. The company was incorporated in 2008, but did not start trading until 2011. The company received €70,000 of EU innovation funding through the Framework Programme 7 (FP7). Protein folding In August 2014 the Rosetta@home project reported Charity Engine had contributed over 125,000 new PCs to its grid. In January 2017, Charity Engine was credited as a significant contributor to solving protein-folding problems in the paper "Protein structure determination using metagenome sequence data" published by the journal Science. Sums of three cubes problem In September 2019 a team led by Andrew Booker at the University of Bristol and Andrew Sutherland at Massachusetts Institute of Technology (MIT) used Charity Engine to solve the sums of three cubes problem for the number 42, as well find solutions for four other numbers in the same problem. The numbers found by Charity Engine are: References External links Charity Engine Website Volunteer computing Berkeley Open Infrastructure for Network Computing projects
https://en.wikipedia.org/wiki/Malaria%20Control%20Project
malariacontrol.net was a volunteer computing project to simulate the transmission dynamics and health effects of malaria. It was part of the Africa@home project. History The malariacontrol.net domain name was first registered on 19 May 2005 under Swiss Tropical Institute. This project was under Africa@home where the latter was conceived and developed by European Organization for Nuclear Research (CERN). malariacontrol.net was the first to use volunteer computing to model diseases. The model simulates malaria infection in 50,000 to 100,000 people. Each work unit lasted for an hour in average personal computers and the results were returned to University of Geneva for evaluation by researchers. malariacontrol.net ran all the simulations by using stochastic simulation model. Since 4 November 2010, using the financial support from Bill & Melinda Gates Foundation, Malariacontrol.net developed an open-source software named "Open Malaria" which can be used to simulate outcomes in various types of malaria transmission settings. On 21 June 2016, malariacontrol.net announced that the project has been terminated due to financial constraints in upgrading their servers for further volunteer computing operations. Impact Over 10 years, malariacontrol.net has produced 30 peer-reviewed articles. In 2008, among the studies performed were the effectiveness of different types of Malaria vaccines in high and low malaria transmission settings, effectiveness of Sulfadoxine/pyrimethamine in preventive treatment of malaria in infants, and using individual-based stochastic simulations in Plasmodium falciparum control. In 2012, malariacontrol.net has studied the effectiveness of using RTS,S malaria vaccine in World Health Organization's Expanded Programme on Immunization (EPI) in different malarial transmission settings and reported that such programme only has modest benefits over 14 years period. The study suggested that the RTS,S vaccine should be used in targeted mass vaccination in low malarial transmission settings in order to get the most benefits out of it. In 2013, malariacontrol.net had examined the effectiveness of Rapid Diagnostic Tests (RDT) and other surveillance tools in detecting malaria infections among high and low Plasmodium falciparum transmissions. The project also recommended that screening the whole human population for malaria before treating them would be more cost effective when compared to indiscriminate treatment of the whole population with antimalarial drugs. Another study also revealed that both Pyrethroid-only mosquito nets and Piperonyl butoxide mosquito nets are cost effective in preventing malarial infections in both Pyrethroid-susceptible and Pyrethroid-resistant mosquitoes. Reception As of 2010, malariacontrol.net had about 10,000 active users with 37,002 registered members. Similar to the general BOINC users, malariacontrol.net mainly had a volunteer base of males ranged from 20 to 50 years old, mostly staying in European coun
https://en.wikipedia.org/wiki/ACsEV
The ACsEV (Aradi és Csanádi Egyesült Vasutak, En.: Arad & Csanad United Railways) were a Hungarian joint-stock railway company. Till 1920, the network had a length of 391 km. Since 1903, the company bought more than forty petrol-electric self-propelled rail cars, and thus for some years performed one of the most advanced passenger transports in the world. Due to changes of the borders, in 1920 more than half of the company's network was taken over by the Romanian Railways (CFR). Predecessors The Arad–Körösvölgyi Vasút (Arad – Körös-Valley Railway was founded in 1873. From 1 February 1877 to 25 September 1881, it built its line from Arad northeastward to Boressebes (Ro.: Sebiș) in the Fehér-Körös (Crişul Alb) valley. The Arad–Csanádi Vasút (Arad–Csanád Railway), licensed in 1881, built its Y-shaped network between Arad and Szeged in the short space of time from 5 November 1882 to 20 May 1883. In 1886, both companies merged to form Aradi és Csanádi Egyesült Vasutak. Soon the railway to Kisjenő was built. In 1889 the branch to Csermő was opened, and in 1889–1896, the line in Crişul Alb valley was prolonged to Brad. Tracks The network consisted of two main lines, connecting Arad in opposite directions, and three side lines, two of which forming a circle. Arad** = Uj-Szent-Anna (Sântana) – Pankota (Pâncota) – Borosjenő (Ineu) – Borossebes (Sebiș) – Brád (Brad) (167 km) Uj-Szent-Anna (Sântana) = Kisjenő (Chișineu-Criș) ≠ Kétegyháza** (49 km, due to a 120°-turn in Kisjenö almost two lines) Borosjenő – Csermő (Cermei) (14 km) Arad** ≠ Mezőhegyes – Nagylak (Nădlac) – Apátfalva – Makó* – Kiszombor – Szőreg* ▬ Szeged* (121 km) Mezőhegyes – Kovácsháza° – Kétegyháza** (40 km) Explanation: 1910 – 1918: ** connection to Hungarian State Railways' (MÁV)-line Szolnok – Arad – Temesvár (Timișoara) * connection to other MÁV-lines ▬ joint use of a MÁV-line ° connection to narrow gauge AEGV (Alföldi Első Gazdasági Vasút, En.: Alföld First Rural Railway) Actuel situation: = today part of C.F.R.-line 310 Arad – Oradea ≠ today interrupted (in brackets: Romanian names) Rolling stock End of 1910 the company owned 41 petrol–electric Weitzer railmotors and 37 adequate trailers, furthermore 38 steam engines, 41 conventional passenger cars, 30 luggage cars, 30 luggage cars with a conductors' compartment, 9 mailcars, and 2069 freightcars. The railmotors allowed quite a dense frequency of trains for local commuter traffic as well as for longer distances. They ran as ordinary trains, as express trains, and as mail trains. Szeged–Csanádi Vasút As a result of the treaty of Trianon, the network of ACsEV was divided in 1920. More than half of it came to Romania and was taken over by Căile Ferate Române (C.F.R.): since 1923 was operated by CFR, and in 1927 the whole company was bought by the Romanian state. The Hungarian rest was operated by Győr-Sopron-Ebenfurti Vasút (GySEV) and in 1927 it was renamed to Szeged–Csanádi Vasút (Szeged–Csanádi Railway). In 1945 it
https://en.wikipedia.org/wiki/Susana
Susana may refer to: Sustainable Sanitation Alliance (SuSanA), a network of organizations active in the field of sustainable sanitation Susana (given name), a feminine given name (including a list of people with the name) Susana (magazine), an Argentine magazine for women Susana (film), a 1951 Mexican film Susana (singer), a Dutch trance music vocalist Susana, a 1992 song by Ricky Martin, a cover version of Suzanne by VOF de Kunst See also Santa Susana (disambiguation) Susanna (disambiguation)
https://en.wikipedia.org/wiki/Room%20on%20the%20Broom%20%28film%29
Room on the Broom is a 2012 short stop motion computer animated television film based on the picture book written by Julia Donaldson and illustrated by Axel Scheffler. The film was nominated for the Best Animated Short Film at the 2014 Academy Awards. It also won the British Academy Children's Award for Animation in 2013. Directed by Max Lang and Jan Lachauer, the film was produced by Martin Pope and Michael Rose of Magic Light Pictures, London, in association with Orange Eyes Limited. It was first seen in theatres with Thor: The Dark World. It was first broadcast on BBC One on Tuesday 25 December 2012 before being released on DVD in March 2013 by Magic Light Pictures. It then aired in the United States on PBS Kids Sprout as a Halloween special, on 30 October 2013, and then aired in the United States on PBS Kids as a Christmas special, on 1 December 2017 – 9 December 2018. Voice cast Simon Pegg as the Narrator Gillian Anderson as the Witch Rob Brydon as the Cat Timothy Spall as the Dragon Martin Clunes as the Dog Sally Hawkins as the Bird David Walliams as the Frog See also The Gruffalo The Gruffalo's Child References External links 2012 in British television 2012 television films 2012 films 2012 animated films 2012 short films 2010s animated short films British animated short films German animated short films British television films BBC Film films Animated films based on children's books Films about witchcraft Donaldson and Scheffler 2010s English-language films Films directed by Max Lang 2010s British films 2010s German films
https://en.wikipedia.org/wiki/Hebdogiciel
Hebdogiciel was a French computer magazine which was published from 1983 until January 1987. It was printed in a newspaper style format and focused on 8- and 16-bit home computers of the time, such as the Commodore 64, ZX80, TI-99/4A, and others. Each issue was a collection of both news articles on computer and software testing, treated satirically, and listings of source code which could be typed in by the reader. References External links Hebdogiciel back issues provided by abandonware-magazines.org 1983 establishments in France 1987 disestablishments in France Defunct computer magazines Defunct magazines published in France French-language magazines Video game magazines published in France Magazines established in 1983 Magazines disestablished in 1987
https://en.wikipedia.org/wiki/The%20Wollongong%20Group
The Wollongong Group (TWG) was one of the first companies to sell commercial software products based on the Unix operating system. It was founded to market a port of Unix Version 6 developed by researchers at the University of Wollongong, Australia (thus the name "Wollongong Group"). The company was active in Palo Alto, California from 1980 to 1995. It later achieved name recognition as a pioneer in developing and selling commercial versions of the TCP/IP protocols. The Wollongong Group had annual sales of $40 million and employed 165 people when it was acquired by former competitor Attachmate in 1995. Commercializing TCP/IP and the Internet Virtually all Wollongong's products were initially based on versions of software that had been developed at Universities and released into the public domain. Wollongong products included: Eunice - A UNIX emulator for the VAX VMS operating system (based on software written by David Kashtan at SRI) individual TCP/IP packages for: the VAX VMS operating system (based on Berkeley TCP/IP) AT&T UNIX Version 7. (also based on Berkeley TCP/IP) the IBM PC (Based on MIT PC-IP by John Romkey) Individual licensing arrangements were made with brand-name vendors such as Philips for the P9000 Unix offerings, and Cray Research. These products, which they advertised in publications such as Computerworld and Hardcopy, were among the first commercially supported systems of their type, allowing people other than software developers access to the Internet. The PC product in particular made it possible for a non-technical user to access the Internet with equipment costing less than $3000 - about one tenth the cost of any other available systems at the time. Original Internet work PATHway was the name they used for a specialized TCP/IP product. By the mid 1980s many Wollongong employees were active in developing new Internet Technologies. Wollongong Employees produced the first Internet tunneling specification (RFC1088) and the first SNMP MIB (RFC1066). Notable Wollongong technical staff that worked on these projects include David H. Crocker (Email), Dr. Marshall Rose (SNMP), Karl Auerbach (Netbios, SNMP), Narayan Mohanram (TCP/IP on UNIX), Jerry Scott (TCP/IP on VMS), Leo McLaughlin III and John Bartas (TCP/IP on IBM PC). Internet Technology companies founded by ex-Wollongong employees include Epilogue Technologies, Taos Mountain Software, Interniche Technologies and iPass Inc. References Internet technology companies of the United States Unix history Unix software
https://en.wikipedia.org/wiki/Italo%20Jose%20Dejter
Italo Jose Dejter (December 17, 1939) is an Argentine-born American mathematician, a retired professor of mathematics and computer science from the University of Puerto Rico, (August 1984-February 2018) and a researcher in algebraic topology, differential topology, graph theory, coding theory and combinatorial designs. He obtained a Licentiate degree in mathematics from University of Buenos Aires in 1967, arrived at Rutgers University in 1970 by means of a Guggenheim Fellowship and obtained a Ph.D. degree in mathematics in 1975 under the supervision of Professor Ted Petrie, with support of the National Science Foundation. He was a professor at the Federal University of Santa Catarina, Brazil, from 1977 to 1984, with grants from the National Council for Scientific and Technological Development, (CNPq). Dejter has been a visiting scholar at a number of research institutions, including University of São Paulo, Instituto Nacional de Matemática Pura e Aplicada, Federal University of Rio Grande do Sul, University of Cambridge, National Autonomous University of Mexico, Simon Fraser University, University of Victoria, New York University, University of Illinois at Urbana–Champaign, McMaster University, DIMACS, Autonomous University of Barcelona, Technical University of Denmark, Auburn University, Polytechnic University of Catalonia, Technical University of Madrid, Charles University, Ottawa University and Simón Bolívar University. The sections below describe the relevance of Dejter's work in the research areas mentioned in the first paragraph above, or in the adjacent box. Algebraic and differential topology In 1971, Ted Petrie conjectured that if X is a closed, smooth 2n-dimensional homotopy complex projective space that admits a nontrivial smooth action of the circle, and if a function h, mapping X onto the 2n-dimensional complex projective space, is a homotopy equivalence, then h preserves the Pontrjagin classes. In 1975, Dejter proved Petrie's Conjecture for n=3, establishing this way that every closed, smooth, 6-dimensional homotopy complex projective space must be the complex 3-dimensional projective space CP3. Dejter's result is most relevant in view of Petrie's exotic S1-actions on CP3, (apart from the trivial S1-actions on CP3). Let G be a compact Lie group, let Y be a smooth G-manifold and let F a G-fibre map between G-vector bundles of the same dimension over Y which on each G-fibre is proper and has degree one. Petrie also asked: What are necessary and sufficient conditions for the existence of a smooth G-map properly G-homotopic to F and transverse to the zero-section? Dejter provided both types of conditions, which do not close to a necessary and sufficient condition due to a counterexample. The main tool involved in establishing the results above by reducing differential-topology problems into algebraic-topology solutions is equivariant algebraic K-theory, where equivariance is understood with respect to the group given by the ci
https://en.wikipedia.org/wiki/Karel%20De%20Smet
Karel De Smet (born 21 August 1980) is a Belgian footballer who plays as centre back for KFC Merelbeke. References External links Karel De Smet on Footballdatabase 1980 births Living people Men's association football defenders Belgian men's footballers K.S.C. Lokeren Oost-Vlaanderen players K.V.K. Tienen-Hageland players Royal Antwerp F.C. players Daejeon Hana Citizen players Belgian Pro League players Challenger Pro League players Footballers from Ghent Belgian expatriate men's footballers K League 1 players Expatriate men's footballers in South Korea K.R.C. Zuid-West-Vlaanderen players
https://en.wikipedia.org/wiki/PTDOS
PTDOS or Processor Technology Disk Operating System is an operating system created in the late 1970s for computers using the Intel 8080 microprocessor and the Processor Technology Helios II Disk Memory System. Commands The following list of commands is supported by PTDOS 1.4. EDIT EDT3 ASSM DEBUG DO DISKCOPY RECOVER FILES FREE? SYST OPEN? COPY IMAGE BLDUTIL EXTRACT KILL RENAME RETYPE REATR XREF DUMP PRINT RNUM SAVE GET CREATE OPEN READ WRITE CLOSE SPACE RANDOM SEEK ENDF SETIN SETOUT SET EXEC ZIP CONFIGR OUT BASC5 FOCAL TREK80 References External links Sol 20 site – This computer used PTDOS when a Helios II disk drive was installed. Disk operating systems 1978 software