source
stringlengths
32
199
text
stringlengths
26
3k
https://en.wikipedia.org/wiki/Top%20Chef%20Canada%20%28season%203%29
The third season of the Canadian reality competition show Top Chef Canada was broadcast on Food Network in Canada. It is a Canadian spin-off of Bravo's hit show Top Chef. Contestants 16 chefs competed in season three. Names, ages, hometowns, and cities of residence (at time of filming) are from the Food Network Canada website. In the order eliminated: Eliminated: Frederick "Fred" Boucher, 28, Price, QC (Hometown: Price, QC) Ruth Eddolls, 30, Acton, ON (Hometown: Bristol, England) Clement Chan, 33, Vancouver, BC (Hometown: Vancouver, BC) Kayla Dhaliwall, 28, Victoria, BC (Hometown: Victoria, BC) Daniel Hudson, 29, Coalville, UK (Hometown: Coalville, UK) Chris Chafe, 24, St. John's, NL (Hometown: St. John's, NL) Chris Shaften, 28, Calgary, AB (Hometown: Calgary, AB) Rory White, 23, Mississauga, ON (Hometown: Mississauga, ON) Rebecca "Becky" Ross, 24, Medicine Hat, AB (Hometown: Medicine Hat, AB) Caitlin "Caity" Hall, 24, Maple Ridge, BC (Hometown: Maple Ridge, BC) Geoff Rogers, 31, Calgary, AB (Hometown: Calgary, AB) Nicole Gomes, 34, Richmond, BC (Hometown: Richmond, BC) Dennis Tay, 34, Windsor, ON (Hometown: Windsor, ON) Jonathan Goodyear, 34, Toronto, ON (Hometown: Toronto, ON) Danny "Smiles" Francis, 27, Montreal, QC (Hometown: Montreal, QC) Matthew Stowe, 30, Cloverdale, BC (Hometown: Surrey, BC) Contestant Progress : Did not gain immunity. : For winning immunity in the quickfire, Jonathan did not participate in the elimination challenge. : Although in the bottom, Dan had won immunity in the quickfire challenge, so he was not eligible to be eliminated. : Kayla had decided not to bring any of her team members with her to judges' table, thus automatically eliminating her. : Only Kayla and Chris C, the team captains, were called to judges' table. Chris C, the winning captain, was told by the judges that Becky had made the best dish and won the elimination challenge. : Following the Quickfire, Dennis was permitted back into the competition. : Starting from this quickfire, immunity is no longer available. : As the captain of the losing team, Becky declared that she would withdraw from the competition, assuming that she would be eliminated anyway. : The finale Quickfire was a High Stakes Quickfire with the losing chef being eliminated. No winner was announced for the Quickfire. (WINNER) The chef won the season and was crowned Top Chef. (RUNNER-UP) The chef was a runner-up for the season. (THIRD-PLACE) The chef placed third in the competition. (WIN) The chef won that episode's Elimination Challenge. (HIGH) The chef was selected as one of the top entries in the Elimination Challenge, but did not win. (LOW) The chef was selected as one of the bottom entries in the Elimination Challenge, but was not eliminated. (OUT) The chef lost that week's Elimination Challenge and was out of the competition. (IN) The chef neither won nor lost that week's Elimination Challenge. They also were not up to be eliminated. (WITHDRAW) The chef withdrew from t
https://en.wikipedia.org/wiki/List%20of%20metropolitan%20areas%20in%20British%20Columbia
The table below lists the census metropolitan areas and agglomerations in British Columbia by population, using data from the Canada 2016 Census. Each entry is identified as a census metropolitan area (CMA) or a census agglomeration (CA) as defined by Statistics Canada. Any other census subdivision that comprises at least 10 percent of the CMA or CA population is listed in parentheses. A city's metropolitan area in colloquial or administrative terms may be different from its CMA as defined by Statistics Canada, resulting in differing populations. Such is the case with the Greater Toronto Area and the National Capital Region, in the separate provinces of Ontario, where their metropolitan populations are notably higher than their respective CMA populations. Statistics Canada listed 19 CMAs and CAs at the Canada 2016 Census. Metropolitan areas See also List of Canadian census agglomerations by province or territory List of census agglomerations in Canada List of municipalities in British Columbia List of population centres in British Columbia Population of Canada by year References Metropolitan areas of British Columbia British Columbia metropolitan areas British Columbia
https://en.wikipedia.org/wiki/Smart%20fixture
A smart fixture is an advanced test fixture which combines a fixture with sensors to collect data and provide feedback. They are a subset of cyber-physical systems. Sensors and/or instrumentation embedded in the fixture are connected to a programmable logic controller or computer which apply algorithms to determine if required criteria are met i.e. functional testing. A smart fixture can be a manufacturing fixture or simply a test fixture. The smart aspect is fully realised in the use of the data collected via IIoT/ Industry 4.0. machine learning, artificial intelligence and other big data tools can be applied to perform real time analysis and predictive decision making to improve operational efficiencies. Electronics Circuit boards, are held in place and subjected to controlled electronic test signals. Examples of fixtures: Uploading a software into a microcontroller and testing the functionality of the PCBA Checking the correct parameters of a LED light See also Device under test Bed of nails tester References SmartFixture of 6TL, by David Batet. SmartFixture of Columbia Smartfixture from Romex BV, by Peter van Oostrom (Dutch Language) Unit testing Tests
https://en.wikipedia.org/wiki/Eupithecia%20nevadata
Eupithecia nevadata is a moth in the family Geometridae first described by Alpheus Spring Packard in 1871. It is found in western North America. The wingspan is about 20 mm. The forewings are pale grey with various reddish brown patches along the costa. The larvae feed on Purshia and Ceanothus species. Subspecies Eupithecia nevadata nevadata (Nevada, California) Eupithecia nevadata geneura Swett & Cassino, 1919 (Utah, Colorado) Eupithecia nevadata morensata Cassino & Swett, 1922 (southern California) References Moths described in 1871 nevadata Moths of North America
https://en.wikipedia.org/wiki/S8%20%28Munich%29
Line S8 is a line on the Munich S-Bahn network. It is operated by DB Regio Bayern. It runs from Herrsching via Weßling, Pasing, central Munich and Munich East to Munich Airport station. The line operates at 20-minute intervals between Weßling and Munich Airport. Two out of three trains an hour continue from Weßling to Herrsching, so that the gap between trains alternates between 20 and 40 minutes. It is operated using class 423 four-car electrical multiple units, usually as two coupled sets. In the evenings and on Sundays, they generally run as single sets. The line runs over sections built at various times: from Herrsching to Pasing over the Munich–Herrsching railway, opened on 1 July 1903 by the Royal Bavarian State Railways from Pasing to the beginning of the S-Bahn trunk line over tracks running parallel to the Munich–Augsburg railway, opened by the Munich–Augsburg Railway Company on 1 September 1839 the S-Bahn trunk line from the approaches to Munich Central Station (Hauptbahnhof) to Munich East station, opened on 1 May 1971 from Munich East to Ismaning over the Munich East–Ismaning railway, opened by the Royal Bavarian State Railways. The section through Ismaning was placed underground in 1992 and the section through Unterföhring station in 2005. from Ismaning to Munich Airport over a section of the Munich East–Munich Airport railway opened by Deutsche Bundesbahn in 1992. S-Bahn services commenced in 1992 as S-Bahn line between Munich Airport and Pasing. It was later merged with line , which had previously run between Nannhofen (now Mammendorf) and Ismaning. Since December 2009, line has run from Pasing to Herrsching instead of Mammendorf, taking over a section of the former line from Herrsching to Ebersberg. Operation Munich Airport – Herrsching Munich Airport – Weßling Munich East (Ostbahnhof) – Germering-Unterpfaffenhofen/Gilching-Argelsried (Monday to Friday only) References Munich S-Bahn lines 1992 establishments in Germany
https://en.wikipedia.org/wiki/Eupithecia%20placidata
Eupithecia placidata is a moth in the family Geometridae first described by Taylor in 1908. It is found in western North America from British Columbia south to California. The wingspan is about 20 mm. The forewings have a greyish ground color with rather obscure maculation apart from two black crosslines. Adults have been recorded on wing from February to October. The larvae feed on Juniperus scopulorum, Juniperus communis, Thuja plicata, Populus balsamifera trichocarpa, Pinus strobus, Pinus contorta var. latifolia, Pseudotsuga menziesii var. glauca, Abies lasiocarpa, Tsuga heterophylla and Betula papyrifera. The larvae are twig mimics. They are rusty brown with a greenish-brown head. Full-grown larvae reach a length of about 20 mm. Larvae can be found from mid-July to September and pupation occurs in September. The species overwinters in the pupal stage. References Moths described in 1908 placidata Moths of North America
https://en.wikipedia.org/wiki/Chessington%20Computer%20Centre
Chessington Computer Centre was an organisation based in Chessington that provided administration services to the UK Government. Originally part of central government, it became an executive agency and trading fund of the Cabinet Office on 1 April 1993. In July 1996 it was sold to a management and employee buy-out team for £12.5 million. It was acquired by Automatic Data Processing in September 1998, but was later closed in June 2005. The chess player Michael Basman worked at the Chessington Computer Centre as a computer programmer. References Privatised executive agencies of the United Kingdom government ADP (company)
https://en.wikipedia.org/wiki/Global%20Labour%20Institute
The Global Labour Institute (GLI Network Ltd) in the UK, is part of an international network of not-for-profit organisations with the stated aim of promoting international solidarity among trade union organisations and affiliated groups in order to achieve a democratic and sustainable world society. The major activities of the GLI organisations are developing education, capacity-building and research on international labour movement development, gender policy and organising strategies. The Global Labour Institute works with global union federations, national trade unions, workers' associations, development agencies, research institutions, workers' education organisations and NGOs such as LabourStart, WIEGO and Oxfam, and it states an ideological commitment to democratic socialism. History The first Global Labour Institute was established in Geneva in 1997 and is chaired by Dan Gallin, a former General Secretary of the International Union of Food, Agricultural, Hotel, Restaurant, Catering, Tobacco and Allied Workers' Association (IUF) who has published widely on the history and future of the international trade union movement. The international GLI network is now formed of five organisations: GLI Geneva, GLI Manchester, GLI Paris, the Praxis Centre in Moscow, Russia, and the Trade Unions for Energy Democracy initiative in New York. GLI Manchester currently coordinates the GLI Network. Activities From 2012-2016, the Global Labour Institute (GLI) ran an International Summer School at Northern College, Barnsley, bringing together trade unionists from across the world to discuss what are, and what should be, the politics of the international trade union movement. The schools were supported by a range of national unions in the UK and overseas and international trade union federations. The first International Summer School took place in July 2012, and included 86 participants from 26 different countries. The Global Labour Institute has run four subsequent Schools in 2013, 2014 2015, and 2016. As well as the International Summer School, the GLI offers a wide range of courses and education programmes to the trade union movement. These include both GLI courses and bespoke education programmes commissioned from GLI by unions. Currently GLI undertakes courses as part of the national education programme for Unite the Union. The GLI also supports the organisation, representation and livelihood of workers in the informal passenger transport economy through research and education programmes, working in partnership with the International Transport Workers Federation (ITF) and various other organisations. The GLI also develops research and education tools to address gender inequality, ensure that the voices and concerns of women are better represented and support the development of women's programmes within the trade union. References External links Global Labour Institute, Geneva Global Labor Institute, New York Global Labour Institute, UK Praxis Center
https://en.wikipedia.org/wiki/Midwest%20Radio%20Network
Midwest Radio Network is an Australian company which has a global media business concentrated in two main areas, broadcasting and digital media. The broadcasting division focuses on the operation of FM and AM commercial radio stations in the Midwest region, west of Sydney. The digital media platform comprising newspaper-style news portals is internationally concentrated. Overview Midwest Radio Network was founded on 7 June 1938 as Lithgow Broadcasters Pty Ltd and was granted a license to transmit that year. Initially the company was a subsidiary of Western Newspapers Pty Ltd. In July 1939 the company began broadcasting with the channel name 2LT as part of the Macquarie Central Western Network. In the 1970s the company was acquired by the Transcontinental Broadcasting Company Limited. This in turn was bought by Broadcast Investments Pty Limited, the former owner of 2UE, in 1979. Late in 1979 Lithgow Broadcasters was transferred to interests associated with John McEvoy of the Metro Hotels group. On 21 June 1984 the company changed its name to Midwest Radio Network Pty Ltd, and in 1986 became a major shareholder in a new Australian Securities Exchange listed public company called Midwest Radio Limited. Midwest Radio Limited was involved in a number of ventures during the 1980s and 1990s, including regional radio stations in New Zealand and FM broadcasting operations in the United Arab Emirates, Qatar and Bahrain. In 1996 Midwest Radio Network established a new FM station which launched with the call sign Kiss FM, which it began operating in conjunction with 2LT, and servicing a similar coverage area. In 2001 Midwest Radio Network cut most of its connections with Midwest Radio Limited when that company was taken over in a reverse takeover by Unitel, a former listed public company whose principal asset was a network of radio stations jointly owned with Rural Press Limited comprising River 94.9 in Ipswich, Queensland, and South Australian stations 5AU Port Augusta, 5RM in Renmark, 5CC Port Lincoln, 5CS in Port Pirie, Magic FM in Port Lincoln, and Magic FM in Renmark. Subsequently, the name of the public company was changed to Media Corporation Australia Limited.. Control of the radio assets had passed to MCA and Midwest Radio Network was now concentrating on online news portals. However, in March 2006 Media Corporation Australia went into liquidation and asked Midwest Radio Network to appoint a receiver for the radio assets. Both stations were offered for sale but no buyers emerged. Four years later Midwest Radio Network terminated the receivership and resumed control of the radio stations. History Early days After the license to establish 2LT was granted to Midwest Radio Network (then named Lithgow Broadcasters Pty Ltd) in 1938 it was proposed a trade union lease the license on a ten-year term basis, and for the union, the Professional Radio Employees Institute, to build and own the station, a first for a union in Australia. The proposal did n
https://en.wikipedia.org/wiki/Frank%20Honywill%20George
Frank Honywill George (2 May 1921 – 10 September 1997) was a British psychologist, cyberneticist and former Professor of Cybernetics and Director of the Institute of Cybernetics at the Brunel University, best known for his 1962 book The Brain as a Computer. Biography Born in Bristol, England, George received his MA at the University of Cambridge and his PhD in psychology at the University of Bristol. In 1949 he started his academic career at the University of Bristol, Department of Psychology as lecturer in psychology. In 1968 he was elected first Chairman of the Institution of Computer Sciences of the University of Bristol. In that time he was also working as computer consultant to the NATO, and became fellow of the British Computer Society (FBCS) From the early 1970s until the early 1980s George was Professor of Cybernetics and Director of the Institute of Cybernetics at the Brunel University. From late 1970s to early 1990s George was director of the UK Bureau of Information Science. George's research interests concerned cybernetics and related fields. In the 1980s his research ranged from "artificial intelligence; industrial and management cybernetics with emphasis on modelling and heuristic programming approaches to research in organizational behaviour". During his academic career he authored over 20 books ranging from psychology, cybernetics, digital computing and robotics, to philosophy of science. George died on 10 September 1997 in High Wycombe, Buckinghamshire, England. Publications Books, a selection: 1962. The Brain As A Computer Pergamon Press. 1964. Psychology for Everyman. With Larry Seymour Skurnik. Penguin Books 1966. An introduction to digital computing 1971. Cybernetics,Teach Yourself Books 1974. The robots are coming With John D. Humphries. 1970. Science and the crisis in society 1976. The foundations of cybernetics 1977. Cybernetics and the Environment. Elek. 1977. Precision, language and logic, Pergamon Press. 1981. The science of philosophy 1985. Purposive Behavior and Teleological Functions. With Les Johnson. Gordon & Breach Publishing Group. 1986. Artificial intelligence: its philosophy and neural context Documentary Citizen 63, 1963 (30 min.) produced by John Boorman for BBC West (Bristol) References External links 1921 births 1997 deaths Cyberneticists Academics of Brunel University London Academics of the University of Bristol Alumni of the University of Bristol Alumni of the University of Cambridge Academics from Bristol 20th-century British psychologists
https://en.wikipedia.org/wiki/Toplofikatsiya%20Plovdiv
Toplofikatsiya Plovdiv () is the district heating company in the city of Plovdiv in Southern Bulgaria. It is one of the largest district heating networks in the country, also supplying heat energy to the town of Asenovgrad, around 10 km to the southeast, and serves a total of 35 000 customers. As of 2007, Toplofikatsiya Plovdiv is wholly owned by Austrian company EVN, which also holds the electricity distribution monopoly for the whole of southeastern Bulgaria. Since it was taken over by EVN, Toplofikatsiya Plovdiv's official name is "EVN Toplofikatsiya Bulgaria". Toplofikatsiya Plovdiv has two power stations – one of which is a cogeneration plant and the other a heat-only boiler station. According to the company's website, the Plovdiv North cogeneration plant was renovated in 2011 with extra capacity of an extra 50 MWe and an extra 54 MWt, brought into exploitation in Sept 2011, although the original plans were for an extra 123 MWt of heating capacity to be constructed. References External links evn.bg – official website Electric power companies of Bulgaria
https://en.wikipedia.org/wiki/Federal%20Statistical%20System%20of%20the%20United%20States
The Federal Statistical System of the United States is the decentralized network of federal agencies which produce data and official statistics about the people, economy, natural resources, and infrastructure of the United States. Background In contrast to many other countries, the United States does not have a primary statistical agency. Instead, the statistical system is decentralized, with 13 statistical agencies, two of which are independent agencies and the remaining 11 generally located in different government departments. This structure keeps statistical work in close proximity to the various cabinet-level departments that use the information. In addition, three other statistical units of government agencies are recognized by the OMB as having statistical work as part of their mission. As of fiscal year 2013 (FY13), the 13 principal statistical agencies have statistical activities as their core mission and conduct much of the government’s statistical work. A further 89 federal agencies were appropriated at least $500,000 of statistical work in FY11, FY12, or FY13 in conjunction with their primary missions. All together, the total budget allocated to the Federal Statistical System is estimated to be $6.7 billion for FY13. The Federal Statistical System is coordinated through the Office of Management and Budget (OMB). OMB establishes and enforces statistical policies and standards, ensures that resources are proposed for priority statistical programs, and approves statistical surveys conducted by the Federal government under the Paperwork Reduction Act. The Chief Statistician of the United States, also housed within OMB, provides oversight, coordination, and guidance for Federal statistical activities, working in collaboration with leaders of statistical agencies. Centralization efforts To streamline operations and reduce costs, several proposals have been made to consolidate the federal statistical system into fewer agencies, or even a single agency. In 2011, President Barack Obama's proposal to reorganize the U.S. Department of Commerce included placing several statistical agencies under one umbrella. Principal statistical agencies Statistical units These are subcomponents of agencies recognized by the OMB as having statistical work as part of their mission: Microeconomic Surveys Unit (Federal Reserve Board of Governors) Center for Behavioral Health Statistics and Quality (Substance Abuse and Mental Health Services Administration, Department of Health and Human Services) National Animal Health Monitoring System (Animal and Plant Health Inspection Service, Department of Agriculture) See also Federal Statistical Research Data Centers References External links Statistical Programs and Standards, U.S. Office of Management and Budget: obamawhitehouse.archives.gov Statistical organizations in the United States Agencies of the United States government
https://en.wikipedia.org/wiki/Hit%20Parade%20%28TV%20series%29
The Hit Parade was an early Australian television pop music series which aired on the Seven Network's HSV-7 from 1956 to 1959. It is often mentioned in books discussing Australian television of the 1950s. The series presented hit recordings, which were danced to and lip-synced by the cast ("The Hit Paraders"), often presenting the songs in settings with sets and costumes (anticipating the music video). Over 20 episodes of this series are held by National Film and Sound Archive, along with a few episodes of These Were the Hits, a similar series. See also The Dotty Mack Show - U.S. series in which popular recordings were lip-synced by cast References External links Seven Network original programming 1956 Australian television series debuts 1959 Australian television series endings Black-and-white Australian television shows English-language television shows Australian music television series Pop music television series Dance television shows
https://en.wikipedia.org/wiki/Saadatabad-e%20Golshan
Saadatabad-e Golshan (, also Romanized as Sa‘ādatābād-e Golshan; also known as Sa‘ādatābād) is a village in Azizabad Rural District, in the Central District of Narmashir County, Kerman Province, Iran. At the 2006 census, its population was 594, in 120 families. References Populated places in Narmashir County
https://en.wikipedia.org/wiki/Bugurnidja%20language
Bugurnidja is an Australian Aboriginal language of Arnhem Land in northern Australia. Almost nothing is known of it; apparently Nicholas Evans collected some data from a single speaker, and this showed similarities to Ngomburr. References Darwin Region languages Extinct languages of the Northern Territory
https://en.wikipedia.org/wiki/Addepar
Addepar, Inc. is an American wealth management platform for registered investment advisors, specializing in data aggregation, analytics, and portfolio reporting. Origin In 2004, Peter Thiel founded Palantir Technologies along with several others, including Joe Lonsdale. In 2009, Lonsdale stopped working full-time at Palantir to launch Addepar with Jason Mirra, another Palantir employee. In 2012, Addepar expanded its target clients to include registered investment advisers (RIAs) and initiated a sales and marketing effort to attract larger clients. In 2013, Addepar focused on expanding risk analytics and their client portal. Management transition In 2013, Addepar hired a head of sales from Advent (Black Diamond). During 2013, Addepar's primary competitors Black Diamond, Tamarac and Orion "pulled away in the battle for RIA market share, with each of the brands adding about 50% to their asset administration totals". In 2013, Addepar sought to transition out of start-up mode, replacing Lonsdale with new CEO Eric Poirier previously of Palantir and hiring a COO to start building out the company's management. Funding and expansion In 2017, Addepar received a $140 million round of funding from Valor Equity Partners. The same year, Addepar partnered with Morgan Stanley, providing software that consolidated information and tailored reporting about the assets of high net-worth Morgan Stanley clients. In May 2017, Addepar acquired AltX, a machine learning platform aimed at alternative investments. In 2019, Addepar hired six new executives to the company's team and launched a mobile app for its portfolio management software. Products and services Addepar's platform provides analytics and performance analysis of portfolios and market data with software for managing high-net-worth and ultra-high-net-worth clients. Its technology involves a mixture of proprietary and open-source software. The web frontend runs on Node.js and is developed with Ember, Lodash, QUnit, and D3. Addepar's backend services run primarily on Java, with Jetty and Jersey. Platform The first algorithms for the Addepar platform were collaborated on by early Palantir employees. In 2012, Fortune described Addepar as a service for connecting family offices and endowments to their respective investment managers and third parties managing their assets. Addepar software facilitates both visualizing an investment portfolio's exposures at the individual asset class and also tabulating the portfolio's total value according to real time value of the assets under management. The Wall Street Journal described the Addepar platform as providing investment advisors "a dashboard to track the performance of many types of asset classes in one place." In April 2015, Addepar released a fully browser-based version of the platform. Open API In September 2016, Salesforce.com announced their partnership with Addepar for Salesforce's Wave Financial Services Cloud for financial advisers, making it ea
https://en.wikipedia.org/wiki/Broken%20Oghibbeway
During the fur trade era, a pidgin form of Ojibwe known as Broken Oghibbeway was used as a trade language in the Wisconsin and Mississippi River valleys. Data on the language was collected during the 1820s at Prairie du Chien, Wisconsin by Edwin James, a physician and naturalist, who also gave the pidgin its name. It has been described as "…a language with a restricted vocabulary drawn from the Ottawa dialect of Ojibwe with a few words from the Fox language, another Algonquian language of the region, and restructured and reduced, but not absent, Ojibwe morphology." James recognized that Broken Oghibbeway was different from the variety of Ojibwe spoken in Wisconsin Territory. He noted that it "…is of the dialect used by the traders and the people of mixed blood in speaking with the Menomonies and Winnebagoes also many of the Sioux, Saxes and Foxes." Morphology Although Broken Oghibbeway retains many aspects of the complex inflectional morphology that characterizes Ojibwe, it is nonetheless simplified and restructured, with reductions in the treatment of transitivity and gender, with simplification of the system of personal prefixes used on verbs, loss of the negative suffix that occurs on verbs, and loss of inflectional suffixes that indicate grammatical objects. For example, in Ojibwe, the inverse marker is suffixed to the animate stem of the verb to express the present tense and a prefix is added to indicate the object of the sentence. However, in Broken Oghibbeway, the inanimate verb stem is used and the object of a sentence is expressed with an independent pronoun. Animacy distinctions for nouns were completely lost in Broken Oghibbeway, but are somewhat preserved for verbs: animate third person subjects are marked in the verb with the o- prefix, while inanimate subjects have no prefix. References Anishinaabe languages North America Native-based pidgins and creoles Native American history of Wisconsin Languages attested from the 1820s Extinct languages of North America
https://en.wikipedia.org/wiki/Marco%20Sison
Raul Marco Sison (; born July10, 1957) is a Filipino singer, actor, and politician. Singing career Sison started his singing career after his triumph on a singing contest on GMA Network's noontime variety show Student Canteen in the late 1970s and early 1980s. Being one of the classic balladeers to have captured the true vocal essence of OPM in the '80s, Sison was responsible for the songs "My Love Will See You Through" [his biggest hit thus far], "Si Aida, Si Lorna, O Si Fe", "I'll Face Tomorrow", "Always" and "Make Believe". In 1991, the Philippine independent record company, Universal Records, released Best of Marco Sison. The album consists entirely of romantic, easy-listening music, a style of music quite popular in the Philippines. In 1992, Sison released After All These Years. In 1999, Sison released Memories, his first album for local independent record company, Viva Music Group. One of the international hits covered by Sison in the said album is Crazy. The album also includes Someone That I Used To Love and Kung Maibabalik Ko Lang. May Iba Ka Na Ba? is the first single lifted from Sison's comeback album, Hindi Ko Akalain, released by Star Records. The songs in the album perfectly captures that distinct OPM feel as proven in the tracks Hindi Ko Akalain, Baby, Puwede Ba?, Right Beside You, Try My Number and the lead single "May Iba Ka Na Ba?". The singer was simply doing live performances both here in the country and abroad. Sison has been part of the touring group called The Greatest Hitmakers composed of veteran OPM artists Rico J. Puno, Hajji Alejandro and Rey Valera. Aside from his hit-making albums, Sison also joined popular singers Rico J. Puno, Rey Valera and Nonoy Zuñiga, collectively known as the Hitmakers. Sison and the group had a successful series of shows abroad, most of them in the U.S. cities such as Reno, Houston and Las Vegas. Sison emerges on the release of his love ballad collection titled Isang Pagkakataon, distributed by PolyEast Records. The album has been preceded by other newly written songs by Vehnee Saturno like Selos, Kahit Na Minsan Pa, Sa Iisang Puso Mo and Kwento. It also features Sabik Na Puso, a song that was penned by Sison. Isang Pagkakataon features five new songs from Vehnee Saturno. Acting career Aside from singing, Sison was also into movie acting. His first movie was the romantic drama Beautiful Girl by Seiko Films, released in 1990. His second movie was José Rizal, where he plays national hero Pio Valenzuela who accompanied the titular national hero (played by Cesar Montano). It was released by GMA Films on June 12, 1998, during the Philippine Independence's 100th anniversary. The movie also won as Best Festival Movie in the 1998 Metro Manila Film Festival. His third movie is a wackiest comedy movie (and also Marco's 1st comedy movie), Who's That Girl, where made his special participation in the film as a funeral singer. Political career Sison served as a municipal councilor of Biñan for two
https://en.wikipedia.org/wiki/Rostock%20Matrikelportal
The Rostock Matrikelportal (matriculation portal) disseminates about 186,000 individual-level datasets drawn from the student registers of the University of Rostock from its establishment in 1419 to today. Each entry is faithfully transcribed and linked with a digitized image of a student's original, partly handwritten register entry. Users may search and comment on individual entries, thus expanding the information on single students. Places of origin are geo-tagged and displayed on interactive maps. Additional links refer to professors that were active at the time of matriculation (see: Catalogus Professorum Rostochiensium) and lectures held. Integrated Authority Files (GNDs) identify notable students and interlink them with further personal data in web portals and platforms on the Internet. References External links Rostock Matrikelportal University of Rostock History of universities 2008 establishments in Germany Online person databases
https://en.wikipedia.org/wiki/Eupithecia%20sheppardata
Eupithecia sheppardata is a moth in the family Geometridae first described by James Halliday McDunnough in 1938. It is found in North America, including New Brunswick, Ontario, Quebec, Maine and New York. The wingspan is about 17 mm. Adults are light fawn grey. References Moths described in 1938 sheppardata Moths of North America
https://en.wikipedia.org/wiki/Eupithecia%20exudata
Eupithecia exudata is a moth in the family Geometridae first described by Pearsall in 1909. It is found in the eastern United States, including Pennsylvania, Indiana, Kentucky and Ohio. The wingspan is about 15–16 mm. The forewings have a brownish tinge. There are a number of small, dark patches along the costa, a small dark discal dot and traces of a rather upright, darker median band and a whitish dot above the tornus. Adults are on wing in early spring. References Moths described in 1909 exudata Moths of North America
https://en.wikipedia.org/wiki/Rodos%20%28operating%20system%29
Rodos (Realtime Onboard Dependable Operating System) is a real-time operating system for embedded systems and was designed for application domains demanding high dependability. History Rodos was developed at the German Aerospace Center and has its roots in the operating system BOSS. It is used for the current micro satellite program of the German Aerospace Center. The system runs on the operational satellite TET-1 and will be used for the currently developed satellite BiROS. Rodos is further enhanced and extended at the German Aerospace Center as well as the department for aerospace information technology at the University of Würzburg. Features An important aspect of Rodos is its integrated real time middleware. Developing the control and payload software on the top of a middleware provides the maximum of modularity today. Applications/modules can be developed independently and it is very simple to interchange modules later without worrying about side effects, because all modules are encapsulated as Building Blocks (BB) and can be accessed and they can access other resources only by well defined interfaces. Rodos was implemented as a software framework in C++ with an object oriented application interface (API). it is organized in layers: The lowest layer (1) is responsible for control of the embedded system hardware (HAL: Hardware abstraction layer). The next layer (2) kernel: administrates the local resources, threads and time. On top of the kernel we have the middleware (layer 3) which enables communication between BBs using a publisher subscriber multicast protocol. And on the top of the middleware the user may implement his applications (layer 4) as a distributed software network of simple BBs. The Building Blocks API on the top of the middleware is a service oriented interface. BBs interact by providing services to other BBs and using services from other BBs. As mentioned before, the original purpose of Rodos was to control satellites. It was designed as the brain of the Avionic system and introduces for the first time (2001) the NetworkCentric concept. A networkCentric core avionics machine consists of several harmonized components which work together to implement dependable computing in a simple way. In an NetworkCentric system we have a software network of BBs and a hardware Network interconnecting vehicles (radio communication), computers inside of vehicles (buses and point to point links), intelligent devices (attached to buses) and simple devices attached to front end computers. To communicate with (node) external units, including devices and other computing units, each node provides a gateway to the network and around the network's several devices (IO Devs and computing nodes) may be attached to the system. The messages exchange provided by the middleware and gateways is asynchronous, using the publisher-subscriber protocol. No fixed communication paths are established and the system can be reconfigured easily at run-tim
https://en.wikipedia.org/wiki/Guccifer
Marcel-Lehel Lazăr (born ), known as Guccifer, is a Romanian hacker responsible for high-level computer security breaches in the U.S. and Romania. Lehel targeted celebrities, Romanian and U.S. government officials, and other prominent persons. Lehel first appeared in news media in February 2013 after the website The Smoking Gun reported he was responsible for hacking the AOL account of Dorothy Bush Koch, sister of former president George W. Bush. Family photos of former president George H. W. Bush, who was in the hospital at the time, were circulated to the internet. He also circulated a self-portrait painted by George W. Bush. Lehel went on to hack a number of AOL, Yahoo!, Flickr, and Facebook accounts, giving him access to information about current and former high-level government officials. In January 2014, Lehel was jailed in his native Romania for seven years after being convicted of hacking emails of Romanian officials. Lehel was subsequently extradited by Romania to the United States, where he was indicted on federal charges. In May 2016, Lehel pleaded guilty in federal court to two charges. In September 2016, he was sentenced to 52 months in prison in the United States. Romanian authorities asked for Lehel to be released to his home nation to complete his seven-year prison sentence there before being returned to the U.S. to serve his federal prison sentence. Background Lehel is of Romanian and Hungarian ancestry. He lived in the village of Sâmbăteni, part of the Păuliș commune, to the east of Arad, Romania. Computer hacking activities Lehel has said that his pseudonym Guccifer is a portmanteau of "Gucci" and "Lucifer" (a reference, he says, to "the style of Gucci and the light of Lucifer"). Lehel had no particular computer expertise, but instead used patience and persistence to obtain private information. Lehel had "no fancy equipment, only a clunky NEC desktop and a Samsung cellphone, and no special skills beyond what he had picked up on the web." He used the simple technique of finding information about his victims online and then using this to guess the correct answers to security questions. At the time of his arrest in 2014, Lehel was an unemployed taxi driver. Lehel later hacked Colin Powell's website and accessed years' worth of his correspondence from another AOL account. The correspondence included personal financial information as well as e-mails to George Tenet, Richard Armitage, and John Negroponte. Through six months of trial and error, Lehel guessed the password of Romanian politician Corina Crețu and gained access to her correspondence with Powell. The hacker also targeted U.S. Senator Lisa Murkowski; a senior UN official; members of the Rockefeller family; former FBI and Secret Service agents, as well as the brother of Barbara Bush, CBS sportscaster Jim Nantz, and former Miss Maine Patricia Legere. On March 20, 2013, USA Today reported that Lehel had successfully hacked the e-mail account of Sidney Blumenthal, a fo
https://en.wikipedia.org/wiki/Kevin%20Lynch%20%28computing%29
Kevin M. Lynch is an American software developer. He is currently the vice president of technology at Apple Inc., joining in 2013 after working as the chief technology officer of Adobe Systems. Lynch has been responsible for developing the software of Apple's smartwatch project, the Apple Watch, a device he demonstrated at the September 2014 Apple Launch Event. Education Lynch graduated from Lincoln-Way Central High School in New Lenox, Illinois. He attended the University of Illinois at Chicago (UIC) College of Engineering as an undergraduate student, where he studied computer science and interactive computer graphics and worked in the UIC College of Engineering's Electronic Visualization Laboratory. Career Lynch helped start one of the first Mac software startups called Mac3D—the first Mac 2D/3D drawing application. He also created innovative desktop publishing software that combined drawing and page layout, word processing, the first editable property inspectors in the GUI, and a controllable page layout pane. Early in his career, Lynch worked at Frame Technology, General Magic, and Macromedia. He helped develop General Magic's personal digital assistant in the early 1990s, widely recognized as the precursor to the modern smartphone. At Macromedia, Lynch led the Dreamweaver HTML authoring tool and introduced Flash to enable multimedia on the web, eventually reaching over 1 billion people. In 2005, Lynch became chief software architect at Adobe Systems after being involved in the company's $3.4 billion acquisition of Macromedia. He helped integrate the companies and develop new technology including a cross-OS application runtime called AIR, which enables an app to run across iOS, Android, Mac and Windows. In 2008, he was promoted to chief technology officer, where he helped transform the company through the advancement of mobile, social and cloud technology. During his time at Adobe, Lynch was a staunch advocate of Flash—Adobe's multimedia software platform—and had highly visible debates with Apple CEO Steve Jobs for hindering the use of Flash on its mobile devices, the iPhone and iPad. Later, Jobs tried to recruit Lynch to Apple. Honorary doctorate In 2017, Lynch was awarded an honorary Doctor of Engineering degree by UIC for his work in software development. He is one of only two individuals who has received this distinction in the UIC College of Engineering's 50+ year history. The other recipient is Richard Hill, former CEO of Novellus Systems. In a letter supporting Lynch's nomination for the honorary Doctor of Engineering degree, Apple's Chief Operating Officer Jeff Williams stated: “Truly brilliant technical minds exist. Truly amazing leaders exist. The intersection of the two isn’t seen very often.” References External links Apple Inc. employees American chief technology officers Living people Year of birth missing (living people)
https://en.wikipedia.org/wiki/Feature%20learning
In machine learning, feature learning or representation learning is a set of techniques that allows a system to automatically discover the representations needed for feature detection or classification from raw data. This replaces manual feature engineering and allows a machine to both learn the features and use them to perform a specific task. Feature learning is motivated by the fact that machine learning tasks such as classification often require input that is mathematically and computationally convenient to process. However, real-world data such as images, video, and sensor data has not yielded to attempts to algorithmically define specific features. An alternative is to discover such features or representations through examination, without relying on explicit algorithms. Feature learning can be either supervised, unsupervised or self-supervised. In supervised feature learning, features are learned using labeled input data. Labeled data includes input-label pairs where the input is given to the model and it must produce the ground truth label as the correct answer. This can be leveraged to generate feature representations with the model which result in high label prediction accuracy. Examples include supervised neural networks, multilayer perceptron and (supervised) dictionary learning. In unsupervised feature learning, features are learned with unlabeled input data by analyzing the relationship between points in the dataset. Examples include dictionary learning, independent component analysis, matrix factorization and various forms of clustering. In self-supervised feature learning, features are learned using unlabeled data like unsupervised learning, however input-label pairs are constructed from each data point, which enables learning the structure of the data through supervised methods such as gradient descent. Classical examples include word embeddings and autoencoders. SSL has since been applied to many modalities through the use of deep neural network architectures such as CNNs and transformers. Supervised Supervised feature learning is learning features from labeled data. The data label allows the system to compute an error term, the degree to which the system fails to produce the label, which can then be used as feedback to correct the learning process (reduce/minimize the error). Approaches include: Supervised dictionary learning Dictionary learning develops a set (dictionary) of representative elements from the input data such that each data point can be represented as a weighted sum of the representative elements. The dictionary elements and the weights may be found by minimizing the average representation error (over the input data), together with L1 regularization on the weights to enable sparsity (i.e., the representation of each data point has only a few nonzero weights). Supervised dictionary learning exploits both the structure underlying the input data and the labels for optimizing the dictionary elements. For
https://en.wikipedia.org/wiki/Entity%20linking
In natural language processing, entity linking, also referred to as named-entity linking (NEL), named-entity disambiguation (NED), named-entity recognition and disambiguation (NERD) or named-entity normalization (NEN) is the task of assigning a unique identity to entities (such as famous individuals, locations, or companies) mentioned in text. For example, given the sentence "Paris is the capital of France", the idea is to determine that "Paris" refers to the city of Paris and not to Paris Hilton or any other entity that could be referred to as "Paris". Entity linking is different from named-entity recognition (NER) in that NER identifies the occurrence of a named entity in text but it does not identify which specific entity it is (see Differences from other techniques). Introduction In entity linking, words of interest (names of persons, locations and companies) are mapped from an input text to corresponding unique entities in a target knowledge base. Words of interest are called named entities (NEs), mentions, or surface forms. The target knowledge base depends on the intended application, but for entity linking systems intended to work on open-domain text it is common to use knowledge-bases derived from Wikipedia (such as Wikidata or DBpedia). In this case, each individual Wikipedia page is regarded as a separate entity. Entity linking techniques that map named entities to Wikipedia entities are also called wikification. Considering again the example sentence "Paris is the capital of France", the expected output of an entity linking system will be Paris and France. These uniform resource locators (URLs) can be used as unique uniform resource identifiers (URIs) for the entities in the knowledge base. Using a different knowledge base will return different URIs, but for knowledge bases built starting from Wikipedia there exist one-to-one URI mappings. In most cases, knowledge bases are manually built, but in applications where large text corpora are available, the knowledge base can be inferred automatically from the available text. Entity linking is a critical step to bridge web data with knowledge bases, which is beneficial for annotating the huge amount of raw and often noisy data on the Web and contributes to the vision of the Semantic Web. In addition to entity linking, there are other critical steps including but not limited to event extraction, and event linking etc. Applications Entity linking is beneficial in fields that need to extract abstract representations from text, as it happens in text analysis, recommender systems, semantic search and chatbots. In all these fields, concepts relevant to the application are separated from text and other non-meaningful data. For example, a common task performed by search engines is to find documents that are similar to one given as input, or to find additional information about the persons that are mentioned in it. Consider a sentence that contains the expression "the capital of France":
https://en.wikipedia.org/wiki/2013%20South%20Korea%20cyberattack
In 2013, there were two major sets of cyberattacks on South Korean targets attributed to elements within North Korea. March On 20 March 2013, six South Korean organizations suffered from a suspected cyberwarfare attack. The organizations included three media companies (KBS, MBC, &YTN) and three financial institutions (The National Agricultural Cooperative Federation, Shinhan Bank, & Jeju Bank). The South Korean communications watchdog Korea Communications Commission raised their alert level on cyber-attacks to three on a scale of five. North Korea has been blamed for similar attacks in 2009 and 2011 and was suspected of launching this attack as well. This attack also came at a period of elevated tensions between the two Koreas, following Pyongyang’s nuclear test on 12 February. South Korean officials linked the incident to a Chinese IP address, which increased suspicion of North Korea as "[i]ntelligence experts believe that North Korea routinely uses Chinese computer addresses to hide its cyber-attacks." It was later revealed that the IP address did not originate from China but from the internal network of one of the attacked organizations. The attacks on all six organizations derived from one single entity. The networks were attacked by malicious codes, rather than distributed denial-of-service (DDoS) attacks as suspected at the beginning. It appeared to have used only hard drive overwrites. This cyberattack “damaged 32,000 computers and servers of media and financial companies.” The Financial Services Commission of South Korea said that Shinhan Bank reported that its Internet banking servers had been temporarily blocked and that and NongHyup reported that operations at some of their branches had been paralyzed after computers were infected with viruses and their files erased. Woori Bank reported a hacking attack, but said it had suffered no damage. This cyberattack “caused US$750 million in economic damage alone. (Feakin 2013)” Also, “[t]he frequency of cyber attacks by North Korea and rampant cyber espionage activities attributed to China are of great concern to the South Korean government. (Lewis 2013)” June The June 25 cyber terror is an information leak that occurred on June 25, 2013 that targeted Cheongwadae and other institutions. The hacker that caused this incident admitted that the information of 2.5 million Saenuri Party members, 300 thousand soldiers, 100 thousand Cheongwadae homepage users and 40 thousand United States Forces Korea members. There were apparent hacking attacks on government websites. The incident happened on the 63rd anniversary of the start of the 1950-53 Korean War, which was a war that divided the Korean peninsula. Since the Blue House’s website was hacked, the personal information of a total of 220,000 people, including 100,000 ordinary citizens and 20,000 military personnel, using the “Cheong Wa Dae” website were hacked. The website of the office for Government Policy Co-ordination and some media servers we
https://en.wikipedia.org/wiki/International%20Conference%20on%20Reachability%20Problems
RP, the International Conference on Reachability Problems is an annual academic conference in the field of computer science. The RP is specifically aimed at gathering together scholars from diverse disciplines and backgrounds interested in reachability problems that appear in Algebraic structures Automata Theory and Formal languages Concurrency and Distributed computations Decision Procedures in Computational models Hybrid systems Logic and Model checking Formal verification of Finite and Infinite-state Systems Algorithmic game theory Topics of interest include (but are not limited to): Reachability problems in infinite state systems, rewriting systems, dynamical and hybrid systems; reachability problems in logic and verification; reachability analysis in different computational models, counter timed/ cellular/ communicating automata; Petri nets; computational aspects of algebraic structures (semigroups, groups and rings); frontiers between decidable and undecidable reachability problems; predictability in iterative maps and new computational paradigms. History of the Workshop RP'22 in Kaiserslautern, Germany, LNCS proceedings, Springer Verlag RP'21 in Liverpool, UK, LNCS proceedings, volume 13035, Springer Verlag RP'20 in Paris, France, LNCS proceedings, volume 12448, Springer Verlag RP'19 in Brussels, Belgium, LNCS proceedings, volume 11674, Springer Verlag RP'18 in Marseille, France, LNCS proceedings, volume 11123, Springer Verlag RP'17 in London, UK, LNCS proceedings, Springer Verlag RP'16 in Aalborg, Denmark, LNCS proceedings, Springer Verlag RP'15 in Warsaw, Poland, LNCS proceedings, Springer Verlag RP'14 in Oxford, UK, LNCS proceedings, Springer Verlag RP'13 in Uppsala, Sweden, LNCS proceedings, Springer Verlag RP'12 in Bordeaux, France, LNCS proceedings, Volume 7550/2012, Springer Verlag RP'11 in Genova, Italy, LNCS proceedings, Volume 6945/2011, Springer Verlag RP'10 in Brno, Czech Republic, LNCS proceedings, Volume 6227/2010, Springer Verlag RP'09 in Palaiseau, France, LNCS proceedings, Volume 5797/2009, Springer Verlag RP'08 in Liverpool, UK, ENTCS proceedings, Volume 223, Elsevier RP'07 in Turku, Finland, TUCS General Publication Serie, Volume 45, Turku Centre for Computer Science References Theory of computation
https://en.wikipedia.org/wiki/Error%20concealment
Error concealment is a technique used in signal processing that aims to minimize the deterioration of signals caused by missing data, called packet loss. A signal is a message sent from a transmitter to a receiver in multiple small packets. Packet loss occurs when these packets are misdirected, delayed, resequenced, or corrupted. Receiver-Based Techniques When error recovery occurs at the receiving end of the signal, it is receiver-based. These techniques focus on correcting corrupted or missing data. Waveform substitution Preliminary attempts at receiver-based error concealment involved packet repetition, replacing lost packets with copies of previously received packets. This function is computationally simple and is performed by a device on the receiver end called a "drop-out compensator". Zero Insertion When this technique is used, if a packet is lost, its entries are replaced with 0s. Interpolation Interpolation involves making educated guesses about the nature of a missing packet. For example, by following speech patterns in audio or faces in video. Buffer Data buffers are used for temporarily storing data while waiting for delayed packets to arrive. They are common in internet browser loading bars and video applications, like YouTube. Transmitter-Based Techniques Rather than attempting to recover lost packets, other techniques involve anticipating data loss, manipulating the data prior to transmission. Retransmission The simplest transmitter-based technique is retransmission, sending the message multiple times. Although this idea is simple, because of the extra time required to send multiple signals, this technique is incapable of supporting real-time applications. Packet Repetition Packet repetition, also called forward error correction (FEC), adds redundant data, which the receiver can use to recover lost packets. This minimizes loss, but increases the size of the packet. Interleaving Interleaving involves scrambling the data before transmission. When a packet is lost, rather than losing an entire set of data, small portions of several sets will be gone. At the receiving end, the message is then deinterleaved to reveal the original message with minimal loss. Transmission without interleaving: Original transmitted sentence: ThisIsNotAnExampleOfInterleaving Received sentence with a burst error: ThisIsNot__pleOfInterleaving The term "AnExample" ends up mostly unintelligible and difficult to correct. With interleaving: Transmitted sentence: ThisIsAnExampleOfInterleaving... Error-free transmission: TIEpfeaghsxlIrv.iAaenli.snmOten. Received sentence with a burst error: TIEpfe__Irv.iAaenli.snmOten. Received sentence after deinterleaving: T_isI_AnE_amp_eOfInterle_vin_... No word is completely lost and the missing letters can be recovered with minimal guesswork. Applications Depending on the method o
https://en.wikipedia.org/wiki/San%20Francisco%20Bay%20Area%20Water%20Trail
The San Francisco Bay Area Water Trail is a growing network of launch and landing sites that allow people in non-motorized small boats and beachable sail craft such as kayaks, canoes, dragon boats, stand up paddle and windsurf boards, to safely enjoy San Francisco Bay through single and multiple-day trips. The Water Trail is enhancing Bay Area communities’ connections to the Bay and creating new linkages to existing shoreline open spaces and other regional trails as well as increasing education about personal safety, navigational safety, and appropriate boating behavior near sensitive wildlife species and shoreline habitat. The Water Trail is implemented under the leadership of the California Coastal Conservancy in close collaboration with the Association of Bay Area Governments, the San Francisco Bay Conservation and Development Commission, and the California Department of Boating and Waterways. History The Water Trail was created largely through the efforts of Bay Access, Inc., a dedicated group of non-motorized-small-boat enthusiasts who recognized the need and benefit for this unique regional trail. The California legislature established the Water Trail with the passage of the San Francisco Bay Area Water Trail Act on 22 September 2005. The Water Trail Act directed the San Francisco Bay Conservation and Development Commission, in coordination with other agencies and organizations, to conduct a public planning process for the Water Trail. As a result of this effort, the San Francisco Bay Area Water Trail Plan was prepared on 7 September 2007. The California State Coastal Conservancy led the environmental review of the Water Trail Plan under the California Environmental Quality Act and certified the Final Environmental Impact Report (FEIR) on 17 March 2011. Changes directed by the FEIR were incorporated into the Water Trail Plan and on 17 March 2011 the Conservancy adopted the Enhanced Water Trail Plan. The Water Trail Act directed the Coastal Conservancy to be the lead for implementation of the Water Trail. The Enhanced Water Trail Plan recommends 112 existing and planned launch and destination sites for inclusion into the Water Trail network, although the final trail network may not include all 112 sites or may include additional sites not initially identified. Purpose The competing pressures of increased non-motorized small boat use and increased development in the Bay Area point to the benefits that a planned and coordinated approach to non-motorized small boat access around the Bay could provide. Natural deterioration and a lack of funding to pay for repairs could lead to the loss of existing non-motorized small boat access locations over time. Without an overarching program, such as the Water Trail, to help find funding to replace or improve deteriorating sites, additional access sites may be lost. The Water Trail is expected to provide the following benefits or serve the following needs: Create a coordinated set of access locations all
https://en.wikipedia.org/wiki/Kakambal%20ni%20Eliana
Eliana (International title: Eliana's Twin / ) is a 2013 Philippine television drama fantasy series broadcast by GMA Network. Directed by Roderick Lindayag, it stars Kim Rodriguez. It premiered on April 15, 2013 on the network's Afternoon Prime line up replacing Forever. The series concluded on August 23, 2013 with a total of 93 episodes. It was replaced by Pyra: Babaeng Apoy in its timeslot. Premise The story revolves around the life of Eliana, a girl who was born with a black snake attached to her back. The reptile wraps itself around her hand every time she experience extreme emotions like sadness or anger. She spends her life hidden in a basement, until she manages to get away. In the process, she strives to find out the truth about herself and her family. She will eventually discover new things and meet people that will eventually change her life. In the outside world, she meets new friends and two of them, Gabo and Julian fall in love with her. Gabo is a street-smart lad who accepts Eliana for who she is, while Julian is a fashion photographer who is bewildered by Eliana's beauty, not knowing that she has a snake twin. However, she also meets her rival, Margarita, who is Julian's model-girlfriend and unknown to everyone, her half sister. Cast and characters Lead cast Kim Rodriguez as Isabella Eliana Cascavel-Dominguez Supporting cast Jean Garcia as Isabel "Bel" Cascavel-Dominguez (formerly Monteverde) Kristofer Martin as Gabriel "Gabo" Santillan Jomari Yllana as Emmanuel "Eman" Dominguez Chynna Ortaleza as Minerva San Beda Enzo Pineda as Julian de Vera Lexi Fernandez as Margarita "Marga" Dominguez Leo Martinez as Eddie Cascavel Eva Darren as Aurora Cascavel Sherwin Revister as the voice of Naja Recurring cast Antonio Aquitania as Sebastian "Basti" Monteverde Sherilyn Reyes-Tan as Nora Dominguez Carlene Aguilar as Angie De Vera Jay-R as Nathan De Vera Ernie Garcia as Samuel Dominguez Carmen Soriano as Henrietta Monteverde Mosang as Tetay Rez Cortez as Prof. Banal Aicelle Santos as Kate Banal Sue Prado as Cora Anette Samin as Claire Cascavel Marnie Lapuz as Mrs. San Jose Production and development Screenwriter, Des Garbes Severino conceptualized and developed the series in mid-2011, initially titled as "Serpentina". The idea for the series is inspired from the urban myth—that has been around since the 80's—about the daughter of a mall owner who has a snake twin and dwells in a secret room/basement of the mall. The title later change to Kakambal ni Eliana. February 11, 2013 the four main characters underwent "snake workshop" with two Mexican black kingsnakes. The drill required them to get familiarized with all the snake species. Ratings According to AGB Nielsen Philippines' Mega Manila household television ratings, the pilot episode of Eliana earned a 12.2% rating. While the final episode scored a 17.3% rating. Accolades References External links 2013 Philippine television series debuts 2013 Philippine te
https://en.wikipedia.org/wiki/Derek%20H.%20Sleeman
Derek H. Sleeman is Emeritus Professor of Computing Science at the University of Aberdeen, Scotland (since 2008), and Visiting Professor, in the School of Medicine and the University of Glasgow (since 2009). He is a Fellow of the Royal Society of Edinburgh (1992), the British Computer Society (1995), and the European AI Society (2004). Sleeman began his career as a Lecturer in Computing at the University of Leeds and co-founded the Computer-Based Learning Unit there in 1969. This led to his interest in Intelligent tutoring systems and an edited volume on that subject with John Seely Brown. He moved to Stanford University in 1982 where he was an Associate Professor of AI & Education, and Senior Research Associate in the Knowledge Systems Laboratory of the Stanford Computer Science Department. Sleeman returned to Aberdeen in 1986 where he was appointed the University’s first Professor of Computing Science. Sleeman's research activities have remained at the intersection of AI and Cognitive Science, but his focus has moved from Intelligent Tutoring Systems to Co-operative Knowledge Acquisition and Knowledge Refinement Systems, Reuse and Transformation of Knowledge Sources, and Ontology Management systems. Sleeman has been a Program Committee member for the International European National Conferences in Machine Learning & Knowledge Acquisition, and involved in all the KCAP series of meetings; and was the Conference Chair for the 2007 meeting held in Whistler, British Columbia. Further, with Mark Musen, Sleeman organized one of the 2008 AAAI Stanford Spring Symposia entitled: Symbiotic relationship between the Semantic Web & Knowledge Engineering. He has also served on various Editorial boards including the Machine Learning Journal and the International Journal of Human-Computer Studies. He was one of the Principal Investigators of the EPSRC-sponsored IRC in Advanced Knowledge Technologies (2000 - 2007), and PI of the DTI/Rolls-Royce sponsored IPAS project (2005-2008). Sleeman has a track-record of interdisciplinary Research work with Education, Engineering, Science and Medicine. As well as developing some early medical CAI programs whilst in Leeds, he also developed a Bayesian system (with Tim de Dombal) to diagnose abdominal pain. At Stanford he collaborated with Edward Shortliffe and Bill Clancey (developers respectively of the MYCIN & neo-MYCIN systems). Since returning to Scotland he has collaborated in Aberdeen with Anesthetics, ICU, General Practice, Oncology, & Respiratory Medicine Departments, and in Edinburgh (Neuro ICU, Western General Hospital). Currently the focus of his work is with the Dialysis Unit at Aberdeen/Elgin Hospitals, and with the ICU at Glasgow Royal Infirmary. In both these activities Sleeman's team is analysing patient datasets produced and have developed an infrastructure which supports the analyst/clinician in preparing datasets to investigate various clinically led hypotheses. Notes Scottish computer scientists A
https://en.wikipedia.org/wiki/Tallinn%20Manual
The Tallinn Manual (originally entitled, Tallinn Manual on the International Law Applicable to Cyber Warfare) is an academic, non-binding study on how international law (in particular the jus ad bellum and international humanitarian law) applies to cyber conflicts and cyber warfare. Between 2009 and 2012, the Tallinn Manual was written at the invitation of the Tallinn-based NATO Cooperative Cyber Defence Centre of Excellence by an international group of approximately twenty experts. In April 2013, the manual was published by Cambridge University Press. In late 2009, the Cooperative Cyber Defence Centre of Excellence convened an international group of legal scholars and practitioners to draft a manual addressing the issue of how to interpret international law in the context of cyber operations and cyber warfare. As such, it was the first effort to analyse this topic comprehensively and authoritatively and to bring some degree of clarity to the associated complex legal issues. Process and authors Collectively calling themselves the International Group of Experts, the authors of the Tallinn Manual include highly respected legal scholars and legal practitioners with experience in cyber issues who were consulted throughout the duration of the project by information technology specialists. The group was led by Professor Michael N. Schmitt, chairman of the international law department at the United States Naval War College, who also served as the project director. Other members of the group included Professor Wolff Heintschel von Heinegg from Viadrina European University, Air Commodore (ret.) William H. Boothby from the United Kingdom Royal Air Force, Professor Thomas C. Wingfield from the George C. Marshall European Center for Security Studies, Bruno Demeyere formerly from the Catholic University of Leuven, Professor Eric Talbot Jensen from Brigham Young University, Professor Sean Watts from Creighton University, Dr. Louise Arimatsu from Chatham House, Captain (Navy) Geneviève Bernatchez from the office of the judge advocate general of the Canadian Forces, Colonel Penny Cumming from the Australian Defence Force, Professor Robin Geiss from the University of Potsdam, Professor Terry D. Gill from the University of Amsterdam, Netherlands Defence Academy, and Utrecht University, Professor Derek Jinks from the University of Texas, Professor Jann Kleffner from the Swedish National Defence College, Dr. Nils Melzer from the Geneva Centre for Security Policy, and Brigadier General (ret.) Kenneth Watkin from the Canadian Forces. The technical advisors were Professor James Bret Michael from the United States Naval Postgraduate School as well as Dr. Kenneth Geers and Dr. Rain Ottis, both of whom previously were associated with the NATO Cooperative Cyber Defence Centre of Excellence. Three organisations were represented by observers throughout the drafting process: NATO through its Allied Command Transformation due to the relationship of the NATO Cooperative Cyb
https://en.wikipedia.org/wiki/RedHack
RedHack is a Turkish Marxist-Leninist computer hacker group founded in 1997. The group has claimed responsibility for hacking the websites of institutions which include the Council of Higher Education, Turkish police forces, the Turkish Army, Türk Telekom, and the National Intelligence Organization others. The group's core membership is said to be twelve. RedHack is the first hacker group which has been accused of being a terrorist organization and circa 2015 is one of the world's most wanted hacker groups. Pre-2012 2010: Hacking the international system of the Turkish Police Department Traffic Services and erasing all fines. 2000: Hacking and decoding the CCTV system. 2 July 2010: In memory of the Sivas massacre the group hacked and defaced 256 government and hundreds of dissident websites, the Ministry of the Interior was also under the affected websites. 2 July 2011: Hacking and defacing more than 1000 websites, among them websites of Adnan Oktar and dissident websites in memory of the Sivas massacre. 2012 22 February 2012: After taking down 350 police websites, the group leaked internal data. 6 March 2012: 900 record numbers, names, email addresses and passwords belonging to the staffers of Turkey’s National Police have been published online by the group. The group commented "We also held a grudge against Ankara police for their brutality against Tekel workers and their arbitrary blacklisting of citizens. Everyone can forget, but communists do not." 22 April 2012: A subpage of the Ministry of Interior of Turkey was defaced. 27 April 2012: As a result of a DDoS attack the Turkish ISP TTNet internet slows down. The spokesman of the Presidency of Telecommunication and Communication confirmed this attack, but denied any damage on the infrastructure. 2 May 2012: With hacking into the system of the Land Force Command, the group leaked information of personnel of the Turkish Armed Forces. 3 May 2012: In reaction to the poisoning of pupil which started with the project of the Ministry of Education, the group hacked the websites of the responsible supplying milk companies. 14 May 2012: On Mother's Day the group hacked and defaced the website of the Ministry of Family Affairs and left a message which criticized the level of women rights in Turkey. 29 May 2012: In support of the strike the group took down the website of Turkish Airlines. The current Minister of the Ministry of Transport, Maritime and Communication Binali Yıldırım confirmed the attack but denied any damage. 3 July 2012: The group targeted and file sharing system of the Ministry of Foreign Affairs, disclosed the IDs of foreign diplomats. It is worth mentioning that the group was also able to steal 65 gigabyte of internal files, which have not been leaked so far. 16 July 2012: As a reaction to the threats against journalists and academics who supported RedHack, the group leaked a 77 megabyte-big text file which was stolen on 22 February 2012 from the internal system of th
https://en.wikipedia.org/wiki/Preferred%20pharmacy%20network
In the United States, a preferred pharmacy network is a group of pharmacies that involves a prescription drug plan that selects a group of preferred pharmacies, which likely include pharmacies willing to give the plans a larger discount than other pharmacies. Consumers are then able to choose between preferred or non-preferred pharmacies. Those who choose the preferred pharmacies then save money in the form of lower copayment. Cost savings A study released by Visante in January 2013 found that the greater use of "preferred" and "limited" pharmacy networks could save taxpayers $115 billion over the next 10 years on prescription drug costs. Many networks offer savings through discount card programs. According to a report on this new study in The Hill, "embracing these models would save Medicaid, Medicare and commercial plans $26 billion, $35 billion and $54 billion, respectively, over the next decade". However, real-world comparisons of costs between preferred pharmacy networks and non-preferred pharmacy networks (or "open" pharmacy networks) are not as clear. In 2013 the U.S. government's Centers for Medicare & Medicaid Services(CMS) examined preferred pharmacy network prescriptions and found that "prices are sometimes higher in certain preferred networks" for Medicare and, therefore, taxpayers. Ultimately, CMS concluded that it could not confirm the hypothesis that preferred network pharmacy prices are lower than non-preferred network pharmacy prices. Comparing the pharmaceutical prices reimbursed by plans with preferred pharmacy networks, many only have minimal savings compared to overall prices at local independent pharmacies. Many local pharmacies can provide accurate saving reports based on the Medicare.gov when selecting a plan that have preferred networks. Growing popularity According to the Centers for Medicare and Medicaid Services (CMS), Medicare Part D Prescription Drug Plans (PDPs) saw a significant increase in 2012 in enrollment in prescription drug plans that included preferred pharmacy networks. According to the CMS data, severn Medicare Part D plans use preferred pharmacy networks. 2012 saw three new preferred pharmacy network plans come online. Of these three, two saw a combined enrollment level of almost 700,000 enrollees. 31.8% of all prescription drug plan enrollees are now enrolled in a plan with a preferred pharmacy network. In 2012, United States' seniors had the opportunity to keep their existing plan or switch to a new one. Patient access concerns Currently the government does not require preferred pharmacy networks to meet any minimum access standard. As a result, some patients, particularly those living in rural areas, may be 20 miles or further from the closest "preferred" pharmacy. A January 2013 survey of 400 community pharmacists documented such instances as well as widespread confusion among patients when it comes to distinguishing between "preferred pharmacies" and "non-preferred" or "network" pharmacies.
https://en.wikipedia.org/wiki/Homicide%20Hunter
Homicide Hunter (also known as Homicide Hunter: Lt. Joe Kenda) is an American crime documentary television series which aired on the Investigation Discovery (ID) television network for nine seasons, totalling 144 episodes. The series showcases the career of retired Colorado Springs, Colorado, police department detective Joe Kenda. Kenda joined the department in 1973 and was promoted to detective in 1977 and assigned to the burglary division. However, after solving a double shooting which veteran detectives believed was unsolvable, he was assigned to the homicide division. The case was presented in the Season 4 finale "My First Case". Kenda states he solved 387 cases (other sources state he solved 356 of 387 cases). At the time of his retirement in 1996, he was the commander of the department's major crimes unit. The cases are told by Kenda in his trademark deadpan manner, with touches of dry humor. Re-enactments feature actor and former deputy sheriff Carl Marino portraying a younger Kenda, and narration by Josh Casaubon. Episodes also featured contextual contributions by witnesses to the crimes, family and friends of the victims, members of law enforcement and the media, and others. Homicide Hunter debuted on October 25, 2011. In May 2019, Kenda announced in a video posted on the show's official Facebook page that the ninth season of Homicide Hunter would be its last. However, he is still committed to working with Investigation Discovery. Kenda recounted that at age nine during a visit to the Pittsburgh Zoo, he experienced what he calls an epiphany: "There was a big sign, and it read, 'Around this corner is the most dangerous animal on earth' ... and it was a mirror from ceiling to floor. Everyone was looking in the mirror, and everyone was wondering, 'Well, what is this about?'" The ninth and final season premiered on August 28, 2019. The final episode aired on January 29, 2020. Episodes Season 1 (2011) Season 2 (2012) Season 3 (2013) Season 4 (2014) Season 5 (2015–16) Season 6 (2016–17) Season 7 (2017–18) Season 8 (2018–19) Season 9 (2019–20) Ratings On Tuesday, November 12, 2013, during the third season, Homicide Hunter reached a new peak with 1.3 million viewers and ranking No. 8 in ad-supported cable programs. Ratings continued to grow, with the Tuesday, August 18, 2015, Season 5 premiere setting a then-record for Investigation Discovery, delivering 3.8 million viewers and making it a Top 5 cable program in its time period. During the 2017 calendar year, which included the last seven episodes of the sixth season and the first 13 episodes of the seventh season, the series averaged 1.9 million viewers, part of a then nine-year network-wide trend of Investigation Discovery steadily increasing its ratings. References 2010s American documentary television series Television shows set in Colorado 2011 American television series debuts English-language television shows 2010s American crime television series American non-fiction te
https://en.wikipedia.org/wiki/TraceSecurity
TraceSecurity is a cybersecurity company that provides cloud-based IT governance, risk, and compliance management solutions for organizations. Peter Stewart and Jim Stickley founded TraceSecurity in 2003. The firm is based in Baton Rouge, Louisiana, United States, with executive offices in Los Gatos, California. Paul McCown serves as CEO. History TraceSecurity was founded in 2003 by Peter Stewart and Jim Stickley. Stickley wrote The Truth About Identity Theft and created a series of informative videos to help protect the public from various types of fraud and security exploits. In October 2012, TraceSecurity launched TraceCSO, a cloud-based software system. Lake Trust Credit Union was an early adopter of TraceCSO who used the software system to track remediation processes and assure that the financial institution was in line with risk-compliance responsibilities. The purpose of the software was to streamline compliance regulations and policy adherence for organizations. TraceCSO provided a single point of aggregation for risk and compliance management as well as process management to provide a more comprehensive view of risk and compliance across all IT systems. The software focuses on centralizing and integrating key functional areas including, risk management, auditing, governance and compliance reporting as well as specific areas of policy, process, training, vendor, and vulnerability management. TraceCSO uses wizards where possible to assist users of any skill level through setup and usage. The initial setup process guides the user through the set up of departments, roles, users, network scanning, and authority documents. Once setup is complete, the software system performs a holistic risk assessment to identify assets and threats. TraceSecurity partnered with Qualys in 2013 to integrate products and create a cloud-based GRC package. The company also launched a phishing simulator in 2013. The simulator allowed organizations to evaluate the effectiveness of existing information and security policies, determine how well employees adhere to internet security procedures when presented with a phishing email, assess the level of security awareness among employees, and identify areas for remediation. The phishing simulator was listed as product of the week on April 1, 2013 on Network World. In 2014, TraceSecurity entered a joint product agreement with GFI Software. GFI Software is one of the world’s largest providers of IT solutions for small to mid-sized businesses. The same year TraceSecurity partnered with Rackspace, a cloud hosting provider. The partnership was designed to increase exposure of TraceCSO to Rackspace users. In October 2018, TraceSecurity released a new anti-phishing product called PhinPoint In December 2018, TraceSecurity was named 2018 Cybersecurity Provider of the Year by US Business News. Operations TraceSecurity is headquartered in Baton Rouge, Louisiana and has executive offices in Los Gatos, California. In 2018, the
https://en.wikipedia.org/wiki/TRS-80%20%28disambiguation%29
TRS-80 is the name of Tandy Corporation's original 1977 microcomputer system (also known as the Model I). The TRS-80 brand was also later applied to many different computers sold by Tandy, including several unrelated in design to the Model I. Computers TRS-80 Model I (1977), the original TRS-80 Micro Computer System TRS-80 Model III (1980), improved and compatible replacement for the Model I TRS-80 Model 4 (including Model 4P), successor to the Model III TRS-80 Model II (1979), small-business oriented microcomputer, not related to the original Model I TRS-80 Model 12 (1982), successor to the Model II TRS-80 Model 16, (including Model 16B), successor to the Model 12 TRS-80 Color Computer ("CoCo") (1980), a Motorola 6809-based line of computers TRS-80 MC-10 (1983), a short-lived, low-end hobbyist-oriented computer TRS-80 Model 100 (1983), an early portable computer TRS-80 Pocket Computer, a series of rebadged pocket computers manufactured by Sharp and Casio for Tandy TRS-80 Pocket Computer PC-1, the original model in the lane (a rebadged Sharp PC-1211) TRS-80 Pocket Computer PC-2, a rebadged Sharp PC-1500 TRS-80 Pocket Computer PC-3, a rebadged Sharp PC-1251 Other TRS-80 (group), an electronic music group formed in Chicago in 1997 See also Video Genie, a line of TRS-80 Model I clones sold as the TRZ-80 in South Africa List of TRS-80 clones
https://en.wikipedia.org/wiki/WGZR
WGZR (88.9 FM) is a non-commercial religious radio station in Alpena, Michigan, airing Catholic talk programming from Relevant Radio. WGZR can also be heard on FM translator W221CA at 92.1 MHz in Gaylord. The station was formerly owned by Baraga Broadcasting, which was named after Frederik Baraga, a missionary to several Indian tribes in northern Michigan and later the first Bishop of the Sault Ste. Marie Catholic Diocese which is now the Diocese of Marquette. The station also formerly aired programming from EWTN Global Catholic Radio in addition to Ave Maria Radio (based at WDEO in Ypsilanti). WGZR is an FM repeater of WTCY 88.3 FM licensed to Greilickville serving the Traverse City area from its new studio and offices also located in Traverse City. Some local programs also originate from the WGJU satellite studio located at Holy Family School in East Tawas. Brief history WGZR began as a construction permit granted by the FCC on July 24, 2009, to the All Saints School in Alpena. The construction permit and subsequent license was then sold to Baraga Broadcasting in October 2011. On December 11, 2019, WGZR and its sister stations were acquired by Immaculate Heart Media, bringing Relevant Radio programming to Northern Michigan. Callsign history WGZR was also the callsign used from 2003 to 2011 at 106.9 FM (now WUBB) in Bluffton, South Carolina. See also WTCY (originating station) WIDG WTCK WGJU WMQU References External links Relevant Radio Catholic radio stations GZR Relevant Radio stations
https://en.wikipedia.org/wiki/Carna%20botnet
The Carna botnet was a botnet of 420,000 devices created by an anonymous hacker to measure the extent of the Internet in what the creator called the “Internet Census of 2012”. Data collection The data was collected by infiltrating Internet devices, especially routers, that used a default password or no password at all. It was named after Carna, "the Roman goddess for the protection of inner organs and health". Collected data was compiled into a GIF portrait to display Internet use around the world over the course of 24 hours. The data gathered included only the IPv4 address space and not the IPv6 address space. The Carna Botnet creator believes that with a growing number of IPv6 hosts on the Internet, 2012 may have been the last time a census like this was possible. Results Of the 4.3 billion possible IPv4 addresses, Carna Botnet found a total of 1.3 billion addresses in use, including 141 million that were behind a firewall and 729 million that returned reverse domain name system records. The remaining 2.3 billion IPv4 addresses are probably not used. An earlier first Internet census by the USDHS LANDER-study had counted 187 million visible Internet hosts in 2006. Further implications The data provided by the Carna botnet was used by security researcher Morgan Marquis-Boire to determine in how many countries FinFisher spyware was being used. The use of such legally-gray data to conduct open source analysis raised questions for some, but Marquis-Boire expressed a belief that data is data. "I consider this more like rogue academia rather than criminal activity," he told Wired Magazine. Number of hosts by top level domain Amongst other, Carna Botnet counted the number of hosts with reverse DNS names observed from May to October 2012. The top 20 Top Level Domains were: See also BASHLITE Mirai (malware) Remaiten Linux.Darlloz Linux.Wifatch Hajime (malware) References External links Internet Census 2012: Port scanning /0 using insecure embedded devices, Carna Botnet, June — October 2012 All of the data can be found on GitHub, BitBucket, SourceForge, and Internet Archive. Botnets History of the Internet IoT malware Cybercrime in India
https://en.wikipedia.org/wiki/Eunice%20%28software%29
Eunice was a Unix-like working environment for VAX computers running DEC's VAX/VMS, based on the BSD version of Unix. It was originally developed ca. 1981 by David Kashtan at SRI, and later maintained and marketed by The Wollongong Group. Eunice was one of several Unix compatibility packages developed during the 1980s. It provided VMS binary versions of Unix tools, a VMS object library emulating the Unix API (including the system call interface) and an assembler that produced VMS binaries. Eunice was criticized for its performance problems and not quite complete Unix compatibility. Eunice's reputation for poor compatibility inspired the "Congratulations. You aren't running Eunice." message included in the Perl configure script. See also Cygwin, UWIN — modern Unix emulators for Microsoft Windows Franz Lisp POSIX References OpenVMS software Unix emulators Unix history
https://en.wikipedia.org/wiki/Accounts%20%26%20SSO
Accounts & SSO, accounts-sso, or lately gSSO is a single sign-on framework for computers. Originating as part of Maemo 5 Accounts-SSO is free software licensed under LGPL 2.1. Accounts-SSO was deployed as a standard component of Nokia N900, Nokia N9, Tizen, and Ubuntu. Later it was integrated in KDE Plasma Workspaces. History Accounts-SSO was originally developed by Nokia who eventually shipped it as part of Maemo 5 on . It was later integrated into MeeGo 1.2 Handset software platform which was formally released on . After the MeeGo project ended, Accounts-SSO was transferred into an independent project by Intel. Canonical Ltd then adopted Accounts-SSO for Ubuntu 12.10 (later also Ubuntu Touch) and KDE integrated it in November 2012. Features Among Accounts-SSO's features are a plugin-based architecture, working with diverse user interfaces, storage back-ends, and varying levels of security. While Accounts-SSO is primarily being used for centralized login management to social networking services, e.g. sharing photos to a service from an image managing application and chatting on the same service from an instant messenger, its plugin-based architecture also allows for local usage, such as disk encryption for which a cryptsetup plugin for Accounts-SSO was developed. The Accounts-SSO framework consists of several individually released components: signond: A daemon providing the SSO service over D-Bus – originally Qt-based, it's being rewritten by Intel using only GLib. libaccounts-glib: GLib-based client library for managing the accounts database. libaccounts-qt: Client library for managing the accounts database for Qt-based applications – implemented as wrapper around libaccounts-glib. libsignon-glib: GLib-based client library for applications handling account authentication through the signond Single Sign-On service. signon plugins: A handful of signond authentication plugins are developed within the Accounts-SSO project. Among them plugins for Digest access, OAuth, SASL, and X.509. account plugins: The Accounts-SSO project leaves development of plugins for specific services to 3rd parties. Open source plugins for various services (Facebook, Google, Twitter,...) are being developed by Canonical. See also List of single sign-on implementations External links on Gitlab.com on Launchpad.net References Identity management Intel products Nokia services Free software programmed in C++
https://en.wikipedia.org/wiki/Eupithecia%20suboxydata
Eupithecia suboxydata is a moth in the family Geometridae. It is found in the eastern Palearctic realm, west to south-eastern Russia and the southern Urals. References Moths described in 1897 suboxydata Moths of Europe Moths of Asia
https://en.wikipedia.org/wiki/M%C3%B6ller%E2%80%93Trumbore%20intersection%20algorithm
The Möller–Trumbore ray-triangle intersection algorithm, named after its inventors Tomas Möller and Ben Trumbore, is a fast method for calculating the intersection of a ray and a triangle in three dimensions without needing precomputation of the plane equation of the plane containing the triangle. Among other uses, it can be used in computer graphics to implement ray tracing computations involving triangle meshes. Calculation Definitions The ray is defined by an origin point and a direction vector . Every point on the ray can be expressed by , where the parameter ranges from zero to infinity. The triangle is defined by three vertices, named , , . The plane that the triangle is on, which is needed to calculate the ray-triangle intersection, is defined by a point on the plane, such as , and a vector that is orthogonal to every point on that plane, such as the cross product between the vector from to and the vector from to : , where , and and are any points on the plane. Check if the ray is parallel to the triangle First, find out if the ray intersects with the plane that the triangle is on, and if it does, find the coordinates of that intersection. The only way that the ray will not intersect the plane is if the ray's direction vector is parallel to the plane. When this happens, the dot product between the ray's direction vector and the plane's normal vector will be zero. Otherwise, the ray does intersect the plane somewhere, but not necessarily within the triangle. Check if the ray-plane intersection lies outside the triangle Using barycentric coordinates, any point on the triangle can be expressed as a convex combination of the triangle's vertices: The coefficients must be non-negative and sum to 1, so w can be replaced with : , where is any point on the plane. Observe that and are vectors on the edge of the triangle, and together, they span a plane (which goes through the origin). Each point on that plane can be written as and can be translated by to "move" that point onto the plane that the triangle is on. To find and for a particular intersection, set the ray expression equal to the plane expression, and put the variables on one side and the constants on the other. This is a system of linear equations with three equations (one each for , , ) and three unknowns (, , and ), and can be represented as a matrix-vector multiplication. This equation will always have a solution when the matrix has three linearly independent column vectors in and is thus invertible. This happens if and only if the triangle vertices aren't collinear and the ray isn't parallel to the plane. The algorithm can use Cramer's Rule to find the , , and values for an intersection, and if it lies within the triangle, the exact coordinates of the intersection can be found by plugging in to the ray's equation. C++ implementation The following is an implementation of the algorithm in C++: bool RayIntersectsTriangle(Vector3D rayOrigin,
https://en.wikipedia.org/wiki/Hybrid%20Memory%20Cube
Hybrid Memory Cube (HMC) is a high-performance computer random-access memory (RAM) interface for through-silicon vias (TSV)-based stacked DRAM memory competing with the incompatible rival interface High Bandwidth Memory (HBM). Overview Hybrid Memory Cube was co-developed by Samsung Electronics and Micron Technology in 2011, and announced by Micron in September 2011. It promised a 15 times speed improvement over DDR3. The Hybrid Memory Cube Consortium (HMCC) is backed by several major technology companies including Samsung, Micron Technology, Open-Silicon, ARM, HP (since withdrawn), Microsoft (since withdrawn), Altera (acquired by Intel in late 2015), and Xilinx. Micron, while continuing to support HMCC, is discontinuing the HMC product in 2018 when it failed to achieve market adoption. HMC combines through-silicon vias (TSV) and microbumps to connect multiple (currently 4 to 8) dies of memory cell arrays on top of each other. The memory controller is integrated as a separate die. HMC uses standard DRAM cells but it has more data banks than classic DRAM memory of the same size. The HMC interface is incompatible with current DDRn (DDR2 or DDR3) and competing High Bandwidth Memory implementations. HMC technology won the Best New Technology award from The Linley Group (publisher of Microprocessor Report magazine) in 2011. The first public specification, HMC 1.0, was published in April 2013. According to it, the HMC uses 16-lane or 8-lane (half size) full-duplex differential serial links, with each lane having 10, 12.5 or 15 Gbit/s SerDes. Each HMC package is named a cube, and they can be chained in a network of up to 8 cubes with cube-to-cube links and some cubes using their links as pass-through links. A typical cube package with 4 links has 896 BGA pins and a size of 31×31×3.8 millimeters. The typical raw bandwidth of a single 16-lane link with 10 Gbit/s signalling implies a total bandwidth of all 16 lanes of 40 GB/s (20 GB/s transmit and 20 GB/s receive); cubes with 4 and 8 links are planned, though the HMC 1.0 spec limits link speed to 10 Gbit/s in the 8-link case. Therefore, a 4-link cube can reach 240 GB/s memory bandwidth (120 GB/s each direction using 15 Gbit/s SerDes), while an 8-link cube can reach 320 GB/s bandwidth (160 GB/s each direction using 10 Gbit/s SerDes). Effective memory bandwidth utilization varies from 33% to 50% for smallest packets of 32 bytes; and from 45% to 85% for 128 byte packets. As reported at the HotChips 23 conference in 2011, the first generation of HMC demonstration cubes with four 50 nm DRAM memory dies and one 90 nm logic die with total capacity of 512 MB and size 27×27 mm had power consumption of 11 W and was powered with 1.2 V. Engineering samples of second generation HMC memory chips were shipped in September 2013 by Micron. Samples of 2 GB HMC (stack of 4 memory dies, each of 4 Gbit) are packed in a 31×31 mm package and have 4 HMC links. Other samples from 2013 have only two HMC links and a small
https://en.wikipedia.org/wiki/Zsa%20Zsa%20%28EP%29
Zsa Zsa is an EP by Sugarsmack, released in 1992 through Three AM Records. Track listing Personnel Sugarsmack John Adamian – drums Chris Chandek – guitar, programming Deanna Gonzales – percussion Hope Nicholls – vocals, saxophone, design Aaron Pitkin – bass guitar, guitar, keyboards, programming Production and additional personnel Mel Gray – bass guitar on "He's a Party" Raymond Grubb – photography Scott Hull – mastering Conrad Hunter – engineering Tom Poston – design Sugarsmack – production References 1992 EPs Sugarsmack albums
https://en.wikipedia.org/wiki/LibertyEiffel
Liberty Eiffel is the free GNU Eiffel compiler. The compiler translates Eiffel code to C. Hence it can be used to write programs that run on virtually any platform for which an ANSI C compiler exists. Liberty Eiffel uses type inference to make it possible to implement a more efficient compiler. Liberty Eiffel depends on the work of the legacy SmartEiffel compiler, which was considered complete by 2007, forking their code base in 2005 to continue its development towards the disputed ECMA TC39-TG4 (now TC49-TG4) standard for the language. History Liberty Eiffel started as an Open Source version of Eiffel, first named SmallEiffel in 1994, then named SmartEiffel. In June 2013, the forked project Liberty Eiffel became the official GNU compiler for the Eiffel programming language. References External links Compilers Free compilers and interpreters GNU Project software
https://en.wikipedia.org/wiki/Unified%20interoperability
Unified interoperability is the property of a system that allows for the integration of real-time and non-real time communications, activities, data, and information services (i.e., unified) and the display and coordination of those services across systems and devices (i.e., interoperability). Unified interoperability provides the capability to communicate and exchange processing across different applications, data, and infrastructure. Unified communications Unified communications has been led by the business world, which has a need for efficiency, simplicity, and speed. Rather than a single tool or product, unified communications is a set of products that deliver a nearly identically user experience across multiple devices or media types. The system begins with “presence information” - a feature of telecommunications technology that “senses” where a user is in relation to the technology. This change has been dominated by telecommunications providers integrating video, instant messaging, voice, and collaboration. Unified Communications Interoperability Forum In May 2010, a number of communications technology vendors founded a nonprofit organization for the advancement of interoperability. The goal of the Unified Communications Interoperability Forum is to enable complete interoperability of hardware and software across huge networks of systems. The UCIF relies on existing standards rather than the authoring of new ones. Members of the UCIF include (*founding member): HP* Microsoft* Polycom* Logitech* Juniper Networks* Acme Packet Huawei Aspect Software AudioCodes Broadcom BroadSoft Brocade Communications Systems ClearOne Jabra Plantronics Siemens Enterprise Communications Teliris Interoperability In the broadest sense, interoperability is the ability of multiple systems (usually computer systems) to work together seamlessly. In the Information Age, interoperability is a highly desirable trait for most business systems. Likewise, as homes become more infused with networked technologies (desktop PCs, tablet computers, smartphones, Internet-ready television), interoperability becomes an issue even for the average consumer. Computer operating systems are a prime example of interoperability, wherein several programs from different vendors are able to co-exist and, in many cases, exchange data in a meaningful way. An operating system is also “unified” in the sense that it presents the user with a common, easy to understand computer interface for executing numerous tasks. The unified interoperability of computers means that users need not have specialized knowledge about how computers function. A system with the property of interoperability will retain that property well into the future. The system will be adaptable to the rapid changes in technology with only minor adjustments. Syntactic interoperability The most fundamental level of interoperability is syntactic interoperability. At this level, systems can exchange data wit
https://en.wikipedia.org/wiki/Transformation%20Priority%20Premise
Transformation Priority Premise (TPP) is a programming approach developed by Robert C. Martin (Uncle Bob) as a refinement to make the process of test-driven development (TDD) easier and more effective for a computer programmer. Transformation Priority Premise states that simpler transformations should be preferred: This approach facilitates the programmer doing the simplest possible thing for the purposes of test-driven development as they can explicitly refer to the list of transformations and favor the simpler transformations (from the top of the list) over those further down in the list in the first instance. The Transformations ({} → nil) no code at all → code that employs nil (nil → constant) (constant → constant+) a simple constant to a more complex constant (constant → scalar) replacing a constant with a variable or an argument (statement → statements) adding more unconditional statements. (unconditional → if) splitting the execution path (scalar → array) (array → container) (statement → tail-recursion) (if → while) (statement → non-tail-recursion) (expression → function) replacing an expression with a function or algorithm (variable → assignment) replacing the value of a variable. (case) adding a case (or else) to an existing switch or if Uncle Bob also explicitly stated: "There are likely others", and How to use the Transformations in Practice Ridlehoover clarifies that the Transformations help you pick which tests to write and in what order. Corey Haines provides a live coding demo (Roman Numerals Kata) where he solves a coding challenge utilising the Transformations. References Roman Numerals Kata with Commentary Transformation Priority Premise Applied The Transformation Priority Premise explained by Uncle Bob External links Bob Martin's original blog post on TPP A subsequent blog post in which Bob Martin extended the list of transformations Extreme programming Software development philosophies Software development process Software testing
https://en.wikipedia.org/wiki/Gus%20Hunt
Gus Hunt is an American cybersecurity expert, and former intelligence officer. He is the managing director and cyber strategy lead for Accenture Federal Services. He formerly served as the Chief Technology Officer for the Chief Information Officer at the Central Intelligence Agency (CIA). Early life Gustavo Moses Hunt was born in Pinola, MS to parents Merrill & June Hunt. He is an only child. He briefly attended Columbia High School in Columbia, MS where he excelled in science, math and French. Gus Hunt is a graduate of Tulsa Welding School and received a ME in Civil/Structural Engineering from Vanderbilt University in Nashville, Tennessee. Career Hunt started his career as an aerospace engineer in the private sector for seven years. Hunt joined the CIA in 1991. He served as director of Architecture and Systems Engineering (ASE), chair of the CIA Architecture Review Board and the Architecture and Systems Engineers Occupational Panel, and chief of the CIO's Advanced Technology Group within the Directorate of Intelligence (DI). He also served as chief of research and development for the Director of Central Intelligence's (DCI) Crime and Narcotics Center and deputy chief of the Operations Support Group in the DCI's Non-Proliferation Center. He later served as director of applications services for CIA. He later served as chief technology officer for the chief information officer at the CIA. Hunt also briefly appeared as "The Banker", the shadowy figure on the game show Deal or No Deal who offers contestants "deals" in exchange for their briefcase. Following the cancelation of the series, Hunt consulted on various international versions of the series. Hunt is now the managing director and cyber strategy lead for Accenture Federal Services. Personal life Hunt is married, and has two grown children. References Living people Year of birth missing (living people) Vanderbilt University alumni Analysts of the Central Intelligence Agency American chief technology officers Chief information officers Accenture people
https://en.wikipedia.org/wiki/Ontario%20Disability%20Employment%20Network
The Ontario Disability Employment Network is a network of employment service providers who serve people with a disability in Ontario, Canada. The network is known for their involvement within the Mayor's Challenge, which involved Sarnia, Ontario, Mayor Mike Bradley issuing a challenge to all mayors in Ontario to make a point of hiring people who have a disability, and for the creation of their Champions League which honours members of the Ontario business community who promote the hiring of people with a disability. References External links Disability organizations based in Canada Employment in Canada Organizations based in Ontario
https://en.wikipedia.org/wiki/Iron%20tree
Iron tree may refer to: Olea europaea subsp. cuspidata, a subspecies of the olive tree Parrotia persica, a tree species found in Azerbaijan Prosopis africana, a tree species found in Africa The Iron Tree, the first book in the Crowthistle Chronicles, written by Cecilia Dart-Thornton The nickname of a tree discovered in 1896 in Three Tuns, Pennsylvania, United States See also Iron wood (disambiguation) Wooden iron, a polemical term often used in philosophical rhetoric to describe the impossibility of an opposing argument
https://en.wikipedia.org/wiki/NA32%20experiment
NA32, "Investigation of Charm Production in Hadronic Interactions Using High - Resolution Silicon Detectors", was a research project at CERN. The project was approved on 18 November 1982, data taking completed on 20 August 1986 and the analysis of the results was formally considered finished on 20 August 1996. It was also known as ACCMOR, an acronym of the names of the collaborating research institutes which carried it out — the Amsterdam-Bristol-CERN-Cracow-Munich-Rutherford Collaboration, which was also responsible for the WA3 experiment. The experiment was designed to measure precisely the momentum of charged particles emerging from high energy hadron interactions and identify these particles over a large range of momenta. Experimental setup consists of two large spectrometer magnets, forty-eight planes of drift chambers arranged in several arms and four multicell threshold Cerenkov counters. A calorimeter at the end was used to measure the position and energy of photons and electrons. The target region consisted of a telescope of seven silicon microstrip detectors to measure the incoming beam, a forward vertex detector to precisely track secondary particles produced in high energy hadronic interactions and a 2.5 mm thick copper target. Microstrip detectors used in the NA32 experiment come from three different sources. Most were produced by J.Kemmer at the TU Munich following a technique developed earlier by Kemmer. In an early stage of the experiment (1982), four detectors in the beam telescope produced by ENERTEC in Strasbourg were used. In 1984 and 1985 two prototype detectors produced by MICRON in England were included for specific tests. The pixel size of the NA32 detectors was 22 x 22 μm, and the effective detector thickness ~15 μm. The relatively shallow active area lead to a very small signal demanding cooling and very low noise electronics. In the NA32 the data was read out at a rate of 1.5-3 MHz, allowing ~50 000 pixels to be read out in 16 ms. NA32 proved that tracking using silicon microstrip detectors was a practical technique for resolving particle tracks over very short distances, and in particular for detecting short-lived particles down to half lives of fractions of picoseconds. See also List of Super Proton Synchrotron experiments References Further reading A.Ali, P.Soeding. High Energy Electron-positron Physics, 1988. p. 373 External links CERN-NA-32 experiment record on INSPIRE-HEP Particle experiments CERN experiments
https://en.wikipedia.org/wiki/IBM%20POWER%20architecture
IBM POWER is a reduced instruction set computer (RISC) instruction set architecture (ISA) developed by IBM. The name is an acronym for Performance Optimization With Enhanced RISC. The ISA is used as base for high end microprocessors from IBM during the 1990s and were used in many of IBM's servers, minicomputers, workstations, and supercomputers. These processors are called POWER1 (RIOS-1, RIOS.9, RSC, RAD6000) and POWER2 (POWER2, POWER2+ and P2SC). The ISA evolved into the PowerPC instruction set architecture and was deprecated in 1998 when IBM introduced the POWER3 processor that was mainly a 32/64-bit PowerPC processor but included the IBM POWER architecture for backwards compatibility. The original IBM POWER architecture was then abandoned. PowerPC evolved into the third Power ISA in 2006. IBM continues to develop PowerPC microprocessor cores for use in their application-specific integrated circuit (ASIC) offerings. Many high volume applications embed PowerPC cores. History The 801 research project In 1974, IBM started a project with a design objective of creating a large telephone-switching network with a potential capacity to deal with at least 300 calls per second. It was projected that 20,000 machine instructions would be required to handle each call while maintaining a real-time response, so a processor with a performance of 12 MIPS was deemed necessary. This requirement was extremely ambitious for the time, but it was realised that much of the complexity of contemporary CPUs could be dispensed with, since this machine would need only to perform I/O, branches, add register-register, move data between registers and memory, and would have no need for special instructions to perform heavy arithmetic. This simple design philosophy, whereby each step of a complex operation is specified explicitly by one machine instruction, and all instructions are required to complete in the same constant time, would later come to be known as RISC. By 1975 the telephone switch project was canceled without a prototype. From the estimates from simulations produced in the project's first year, however, it looked as if the processor being designed for this project could be a very promising general-purpose processor, so work continued at Thomas J. Watson Research Center building #801, on the 801 project. 1982 Cheetah project For two years at the Watson Research Center, the superscalar limits of the 801 design were explored, such as the feasibility of implementing the design using multiple functional units to improve performance, similar to what had been done in the IBM System/360 Model 91 and the CDC 6600 (although the Model 91 had been based on a CISC design), to determine if a RISC machine could maintain multiple instructions per cycle, or what design changes need to be made to the 801 design to allow for multiple-execution-units. To increase performance, Cheetah had separate branch, fixed-point, and floating-point execution units. Many changes wer
https://en.wikipedia.org/wiki/Smart%20Sparrow
Smart Sparrow is an ed-tech (education technology) start-up, the commercialization of an adaptive learning technology incubated within the Adaptive eLearning Research Group at the School of Computer Science and Engineering at the University of New South Wales in Sydney, Australia. Adaptive learning is an educational method using computers as interactive teaching devices, adapting educational material according to students' learning needs. The technology incorporates the interactivity previously only afforded by an actual human teacher, and integrates ideas from various fields, including computer science, education, and psychology. The Smart Sparrow software tools, known collectively as the Adaptive eLearning Platform, are a web-based suite that develops adaptive learning content and applications, deploys that material to students and analyses how students learn from their responses to the material. The platform implements an intelligent tutoring system that combines Constraint-Based Modeling with Model Tracing. In 2013, an educational white paper "LEARNING TO ADAPT: A Case for Accelerating Adaptive Learning in Higher Education" identified Smart Sparrow as one of six ‘notable’ adaptive learning platform providers. The same paper, part of a study funded by the Bill & Melinda Gates Foundation, cited the impact of the Smart Sparrow platform on increasing enrollments and reducing dropouts. Other studies cite accelerated learning times with the platform. By 2013, the platform had become the basis of Australia's national Biomedical Education Skills and Training Network, and was being integrated into tertiary courses in differing disciplines at universities in the US and Australia. By later that year, Smart Sparrow was being deployed in Australian high schools, as part of a collaborative partnership with Australian universities to improve student engagement in mathematics and science. In January 2020, Smart Sparrow has been acquired by Pearson Education References Educational technology companies of Australia
https://en.wikipedia.org/wiki/IBM%20Power%20microprocessors
IBM Power microprocessors (originally POWER prior to Power10) are designed and sold by IBM for servers and supercomputers. The name "POWER" was originally presented as an acronym for "Performance Optimization With Enhanced RISC". The Power line of microprocessors has been used in IBM's RS/6000, AS/400, pSeries, iSeries, System p, System i, and Power Systems lines of servers and supercomputers. They have also been used in data storage devices and workstations by IBM and by other server manufacturers like Bull and Hitachi. The Power family was originally developed in the late 1980s, and remains under active development. In the beginning, they implemented the POWER instruction set architecture (ISA), which evolved into PowerPC and later into Power ISA. In August 2019, IBM announced it would open source the Power ISA. As part of the move, it was also announced that administration of the OpenPOWER Foundation will now be handled by the Linux Foundation. History Early developments The 801 research project In 1974 IBM started a project to build a telephone switching computer that required, for the time, immense computational power. Since the application was comparably simple, this machine would need only to perform I/O, branches, add register-register, move data between registers and memory, and would have no need for special instructions to perform heavy arithmetic. This simple design philosophy, whereby each step of a complex operation is specified explicitly by one machine instruction, and all instructions are required to complete in the same constant time, would later come to be known as RISC. When the telephone switch project was canceled, IBM retained the design for the general purpose processor and named it 801 after building #801 at Thomas J. Watson Research Center. The Cheetah project By 1982 IBM continued to explore the superscalar limits of the 801 design by using multiple execution units to improve performance to determine if a RISC machine could maintain multiple instructions per cycle. Many changes were made to the 801 design to allow for multiple execution units and the Cheetah processor has separate units for branch prediction, fixed-point, and floating-point execution. By 1984 CMOS was chosen because it allows improved circuit integration and transistor-logic performance. The America project In 1985, research on a second-generation RISC architecture started at the IBM Thomas J. Watson Research Center, producing the "AMERICA architecture". In 1986, IBM Austin started developing the RS/6000 series computers based on that architecture. This was to become the first POWER processors using the first POWER ISA. POWER The first IBM computers to incorporate the POWER ISA are the RISC System/6000 or RS/6000 series. They were released in February 1990. These RS/6000 computers were divided into two classes, POWERstation workstations and POWERserver servers. The first RS/6000 CPU has 2 configurations, called the "RIOS-1" and "RIOS.9" (or m
https://en.wikipedia.org/wiki/Lauren%20Corrao
Lauren Corrao is an American television executive. She became Executive Vice President of Original Programming and Development at Freeform in 2019. She is a former programming executive for Comedy Central, where she oversaw The Daily Show With John Stewart and The Colbert Report. She was also formerly co-president of Tornante TV and Vice President of MTV. Corrao earned her B.A. from Brown University. She has two children. References Year of birth missing (living people) Living people Comedy Central executives American television executives Women television executives
https://en.wikipedia.org/wiki/Content-oriented%20workflow%20models
The goal of content-oriented workflow models is to articulate workflow progression by the presence of content units (like data-records/objects/documents). Most content-oriented workflow approaches provide a life-cycle model for content units, such that workflow progression can be qualified by conditions on the state of the units. Most approaches are research and work in progress and the content models and life-cycle models are more or less formalized. The term content-oriented workflows is an umbrella term for several scientific workflow approaches, namely "data-driven", "resource-driven", "artifact-centric", "object-aware", and "document-oriented". Thus, the meaning of "content" ranges from simple data attributes to self-contained documents; the term "content-oriented workflows" appeared at first in as an umbrella term. Such general term, independent from a specific approach, is necessary to contrast the content-oriented modelling principle with traditional activity-oriented workflow models (like Petri nets or BPMN) where a workflow is driven by a control flow and where the content production perspective is neglected or even missing. The term "content" was chosen to subsume the different levels in granularity of the content units in the respective workflow models; it was also chosen to make associations with content management. Both terms "artifact-centric" and "data-driven" would also be good candidates for an umbrella term, but each is closely related to a specific approach of a single working group. The "artifact-centric" group itself (i.e. IBM Research) has generalized the characteristics of their approach and has used "information-centric" as an umbrella term in. Yet, the term information is too unspecific in the context of computer science, thus, "content-orientated workflows" is considered as good compromise. Workflow Model Approaches Data-driven The data-driven process structures provides a sophisticated workflow model being specialized on hierarchical write-and-review-processes. The approach provides interleaved synchronization of sub-processes and extends activity diagrams. Unfortunately, the COREPRO prototype implementation is not publicly available. Research on the project had been ceased. The general idea has been continued by Reichert in form of the #Object-aware approach. Synonyms data-driven process structures / data-driven modeling and coordination Protagonists Dr. Dominic Müller (University of Twente), Joachim Herbst (DaimlerChrysler Research), and Manfred Reichert (at this time Assoc. Prof. at Univ. of Twente, currently Prof. at Ulm Univ.) Organization(s) University of Twente, DaimlerChrysler Period 2005 - 2007 Selected publications Implementation COREPRO Resource-driven The resource-driven workflow system is an early approach that considered workflows from a content-oriented perspective and emphasizes on the missing support for plain document-driven processes by traditional activity-oriented workflow engine
https://en.wikipedia.org/wiki/SGG
SGG may refer to: School of Geodesy and Geomatics Sermiligaaq Heliport (IATA: SGG) Silicon Gulch Gazette, a West Coast Computer Faire-related gazette by Jim Warren between 1977 and 1985 Societe Generale Group Sultanganj railway station (station code:SGG), Bihar, India Supergiant Games Swiss-German Sign Language (ISO 639:sgg) Sega Game Gear
https://en.wikipedia.org/wiki/Ubuntu%20Kylin
Ubuntu Kylin () is the official Chinese version of the Ubuntu computer operating system. It is intended for desktop and laptop computers, and has been described as a "loose continuation of the Chinese Kylin OS". In 2013, Canonical Ltd. reached an agreement with the Ministry of Industry and Information Technology to co-create and release an Ubuntu-based operating system with features targeted at the Chinese market. The first official release, Ubuntu Kylin 13.04, was released on 25 April 2013, on the same day as Ubuntu 13.04 (Raring Ringtail). Features include Chinese input methods, Chinese calendars, a weather indicator, and online music search from the Dash. History Version 20.04 introduced version 3.0 of its own, newly developed UKUI (Ubuntu Kylin User Interface). Formerly, UKUI was a customization of the MATE desktop. Version 14.10 introduced the Ubuntu Kylin Software Center (UKSC), and a utility which helps end-users for daily computing tasks called Youker Assistant. The team cooperates with Sogou to develop Sogou Input Method for Linux. Since it is closed source, it is not included in the official Ubuntu Kylin image, but users can download it from UKSC or Sogou's website. WPS Office, also closed-source, is the default office suite in the pro and enhanced editions. LibreOffice however is used mainly as default in the official vanilla Ubuntu Kylin image from the main Ubuntu server website without WPS Office installed. Release history See also BOSS Linux Kingsoft WPS Office Debian GNU/Linux Inspur Linux adoption Red Flag Linux Astra Linux – a similar project by the Russian government Unity Operating System Canaima (operating system) – a similar project by the Venezuelan computer manufacturer VIT, C.A. and Chinese information technology company Inspur GendBuntu – a similar project used by Gendarmerie in France LiMux – a similar project of the city council of Munich Nova (operating system) – a similar project by the Cuban government Red Star OS – a similar project by the North Korean government References External links Ubuntu Kylin, wiki of the Ubuntu Kylin Team at wiki.ubuntu.com. Chinese-language Linux distributions Linux distributions Ubuntu derivatives
https://en.wikipedia.org/wiki/Health%20in%20Senegal
Expenditure on health in Senegal was 4.7% of GDP in 2014, US$107 per capita. Life expectancy at birth was estimated as 65 years for men in 2016 and 69 for women. In 2001 data, 54% of the population of Senegal was below the poverty line, which has implications on people's wellbeing. Common medical problems in Senegal include child mortality, maternal death, malaria, and sexual diseases including HIV/AIDS. There is a high disparity in both the quality and extent of health services between urban and rural areas. The greatest problems in public health are in the East and South (Louga, Kaolack, and Tambacounda) and the region of Casamance. The Human Rights Measurement Initiative finds that Senegal is fulfilling 73.3% of what it should be fulfilling for the right to health based on its level of income. Specific diseases A number of diseases continue to afflict persons who live in and travel to Senegal, some of which are related to Senegal's tropical climate. One of the most prominent diseases is malaria, a parasitic disease transmitted by mosquito bites. Other diseases affecting Senegal include: Syphilis, which is directly related to the social environment, poor health, and housing conditions Tuberculosis, which is mostly localized in Dakar and Thies, and affects more men than women, with approximately 9500 cases of tuberculosis per year in Senegal and a 2–4% mortality rate Schistosomiasis, a parasitic disease common in the tropics Trypanosomiasis, or sleeping sickness, a parasitic disease that has long affected the valleys in Eastern Senegal, known as Ferlo Meningitis, with outbreaks between February and March, especially in Eastern Senegal and occasionally in Dakar. Cholera, with outbreaks continuing to be problematic. In 2007 alone, there were over 2000 reported cases of cholera in Senegal. Malaria While the number of reported malaria cases has dropped in recent years (due in part to a change in case definition), malaria is still a major cause of morbidity and mortality and a high priority for the government. Malaria is endemic throughout Senegal, and the entire population is at risk. Transmission occurs seasonally and is affected by rainfall and persistent flooding, especially in peri-urban areas. Plasmodium falciparum is the major cause of infection. Senegal has made significant progress against malaria and remains a leader in piloting and scaling up new recommendations and innovative strategies. The National Malaria Control Program has adopted a National Strategic Plan for 2016–2020, which strives to achieve the pre-elimination of malaria (defined as annual incidence < 5 cases per 1,000) by 2020. Under this plan, malaria interventions will continue to be targeted to the different transmission zones. In addition to the standard interventions, low transmission areas (pre-elimination zones) are eligible for case investigation and reactive case detection, while the highest transmission regions (control zones) receive seasonal malaria chemopre
https://en.wikipedia.org/wiki/Shearline%20Boatworks
Shearline Boatworks is a Morehead City, North Carolina based boat manufacturer. The computer designed boats are built around a wooden core using epoxy and cloth. The custom center-console boats are computer design and made by hand. The company is owned by Mason Cox III and Chip King. The boats style is referred to as Carolina. References Companies based in North Carolina Manufacturing companies based in North Carolina
https://en.wikipedia.org/wiki/Digital%20Image%20Archive%20of%20Medieval%20Music
The Digital Image Archive of Medieval Music (DIAMM) is an online database of all European polyphonic music sources before 1550. Founded in 1998, it is based in Oxford and maintained by the University of Oxford's Music Faculty and the Bodleian Library. Overview It is the only complete listing of all medieval and early modern manuscripts of European polyphonic music. It is founded on a digital archive of images of European medieval and early to high-Renaissance polyphonic music ranging from complete manuscripts to fragments. The collection, created by the University of Oxford and Royal Holloway University of London, includes metadata for all manuscripts from 800 to 1550 A.D., and most of those from 1550 to 1650, with images for about 20% of the sources. The image collection is added to on a regular basis thanks to donations from libraries and collaborations with projects who acquire images and are able to donate them to DIAMM for display. The project has recently benefited from collaborations with two AHRC-funded projects: Sources of British Song (contributing images of manuscripts of monophonic song c. 1150-1300. The project uses sub-pages on DIAMM for its website) and Tudor Partbooks (contributing images of all Tudor partbooks dating from c. 1500 to c. 1630). DIAMM relies primarily on grant funding and donations from users for its maintenance. The project is currently not funded, and is maintained on a voluntary basis. It has recently founded DIAMM Publications, which produces high-quality colour facsimiles of manuscripts in the image collection accompanied by academic introductory studies by leaders in their fields, without the considerable markup of conventional publishers. The income from publications is largely put back into other publications, but is also available to support the online resource when funds are urgently required. Publications Magnus Williamson. The Eton Choirbook. Full colour facsimile with introductory study (Oxford: DIAMM Publications, 2010). John Milsom. The Dow Partbooks. Full colour facsimile with introductory study 6 vols (Oxford: DIAMM Publications, 2010). Kerry McCarthy. William Byrd, Masses for 3, 4 and 5 voices. Full colour facsimile with introductory study 5 vols paperback (Oxford: DIAMM Publications, 2013). David Fallows. The Henry Book. Full colour facsimile with introductory study (Oxford: DIAMM Publications, 2014). Earp, Lawrence, Leo, Domenic, Shapreau, Carla. The Ferrell-Vogüé Machaut Manuscript. Full colour facsimile with introductory study 2 vols (Oxford: DIAMM Publications, 2014). References Citations Sources External links DIAMM Publications on the Oxford University Stores website Medieval music manuscript sources Music libraries
https://en.wikipedia.org/wiki/Cornell%20Policy%20Review
The Cornell Policy Review is an online academic journal published by the Cornell Institute for Public Affairs. It is verified by the Network of Schools of Public Policy, Affairs, and Administration and edited and run by the program's students. It was originally published biannually, but switched to a rolling online publication in the 2015–16 academic year. Formerly known as The Current, the journal publishes articles, commentaries, and interviews relating to public policy. References External links Academic journals edited by students Cornell University academic journals Biannual journals English-language journals Political science journals Publications with year of establishment missing Academic journals published by universities and colleges of the United States 1996 establishments in New York (state)
https://en.wikipedia.org/wiki/Eupithecia%20sewardata
Eupithecia sewardata is a moth in the family Geometridae. It is found in Alaska. References Moths described in 1977 sewardata Moths of North America
https://en.wikipedia.org/wiki/Hangul%20Syllables
Hangul Syllables is a Unicode block containing precomposed Hangul syllable blocks for modern Korean. The syllables can be directly mapped by algorithm to sequences of two or three characters in the Hangul Jamo Unicode block: one of U+1100–U+1112: the 19 modern Hangul leading consonant jamos; one of U+1161–U+1175: the 21 modern Hangul vowel jamos; none, or one of U+11A8–U+11C2: the 27 modern Hangul trailing consonant jamos. This block is encoded according to the canonically equivalent order of these (two or three) jamos (one in each subrange of jamos above) composing each syllable. Note that a full Hangul syllable may include one of these characters but may be preceded by one or more leading consonant jamos, and followed by one or more trailing jamos (possibly preceded by one or more vowel jamos if the encoded syllable is composed by two jamos does not include any trailing consonant jamos). As well some Hangul syllables may not include any one of these precomposed character. But such extension of the Hangul script (which allows creating more complex syllables composed in the same square) is not very common in modern Korean. Block History Encoding hangul syllables in Unicode was complicated by a reorganization of the code points: Unicode version 1.0.0 encoded 2,350 modern Korean hangul syllables from KS C 5601-1987 at U+3400–U+3D2D. This range is now part of CJK Unified Ideographs Extension A. Version 1.1 added 1,930 additional modern syllables from KS C 5657-1991 at U+3D2E–U+44B7, six modern syllables from GB 12052-89 at U+44B8–U+44BD, and the first 2,370 syllables that are not in the aforementioned three sets at U+44BE–U+4DFF. These collectively cover the remainder of what is now CJK Unified Ideographs Extension A and all of what is now Yijing Hexagram Symbols. In addition, there were three errors in Unicode 1.1: U+384E: 삤 in the Unicode Character Database, but 삣 in the Unicode 1.0 and ISO/IEC 10646-1:1993 code charts and per the source standard mappings U+40BC: 삣 in the Unicode Character Database, but 삤 in the ISO/IEC 10646-1:1993 code charts and per the source standard mappings U+436C: 콫 in the Unicode Character Database, but 콪 in the ISO/IEC 10646-1:1993 code charts and per the source standard mappings Version 2.0 added the 4,516 remaining possible syllables from KS C 5601-1992 and rearranged all of the encoded syllables into the current U+AC00–U+D7AF range which allows algorithmic decomposition into individual jamo. explains that this significant incompatible change was made on the assumption that no data or software using Unicode for Korean existed: Subsequently, Unicode adopted an encoding stability policy which states that "Once a character is encoded, it will not be moved or removed". The following Unicode-related documents record the purpose and process of defining specific characters in the Hangul Syllables block: References See also Unicode blocks Hangul
https://en.wikipedia.org/wiki/CodeMirror
CodeMirror is a JavaScript component that provides a code editor in the browser. It has a rich programming API and a focus on extensibility. History The first version of the editor was written early 2007, for the console in the Eloquent JavaScript website. The code was first packaged up and released under the name CodeMirror in May 2007. This version was based on the contentEditable feature of browsers. In late 2010, the Ace project, another JavaScript-based code editor, pioneered new implementation techniques and demonstrated that it is possible, even in JavaScript, to handle documents with many thousands of lines without degraded performance. This prompted a rewrite of CodeMirror along the same principles. The result was version 2, which no longer relied on contentEditable and significantly improved performance. Version 6 was released in 2022. The library has been split into a collection of packages, and core packages are released independently. See also Comparison of JavaScript-based source code editors References External links Blog series about CodeMirror internals JavaScript libraries JavaScript-based HTML editors Software using the MIT license
https://en.wikipedia.org/wiki/Klutho%20Park
Henry J. Klutho Park is an public park, located between downtown Jacksonville, Florida and the historic neighborhood of Springfield. It is part of a network of parks that parallel Hogans Creek, Klutho Park being the largest. Klutho Park is home to an 18-hole disc golf course. History Formerly known as Springfield Park, most of the park was created between 1899 and 1901 on land donated by the Springfield Company. The park also once housed the city’s first zoo, opening at the park in 1914. The Hogans Creek Improvement Project of 1929–30, designed by architect Henry J. Klutho (1873–1964) and engineered by Charles Imeson, turned much of the park grounds into a Venetian-style promenade. Klutho was a well-respected Springfield resident. His highrise buildings and use of the Prairie School style of architecture transformed Jacksonville after the Great Fire of 1901. In 1984, the City of Jacksonville renamed portions of Springfield Park in honor of Klutho. References Culture of Jacksonville, Florida Geography of Jacksonville, Florida Parks in Jacksonville, Florida Klutho Park 1899 establishments in Florida
https://en.wikipedia.org/wiki/Tuxera
Tuxera Inc. (natively Tuxera Oy) is a Finnish company that develops and sells file systems, flash management and networking software. The company was founded in 2008 and is headquartered in Espoo, Finland. Tuxera's other offices are located in the US, South Korea, Japan, Hungary, Germany, Taiwan and China. The company focuses on data management software for embedded systems: industry-standard file system technologies (APFS, exFAT, FAT, HFS+, NTFS), other embedded proprietary file systems, flash translation layer software, and networking stacks. Tuxera has network file systems that support enterprise storage use cases as well. History The origin of the company dates back to the open-source NTFS development in the late 1990s. NTFS had been introduced in 1993 by Microsoft as the file system for Windows NT. At that time Anton Altaparmakov emerged as the lead developer and maintainer of the Linux NTFS kernel driver. Meanwhile, Szabolcs Szakacsits continued to lead a platform-independent project under the name NTFS-3G. In 2006, NTFS-3G became the first driver to gain full read and write support. Commercial activity started in 2007 and the company was founded next year. In 2009 the company signed agreements with Microsoft, which was followed by global expansion and establishing collaboration with chipset vendors and software platform companies. After several years of contributions to the Linux kernel, Tuxera joined the Linux Foundation in 2011. In 2019, the company became a board member of the SD Association. Tuxera also acquired Datalight that year, adding more file systems and flash management software to their offering. Later in 2021, Tuxera acquired HCC Embedded, adding more deeply embedded networking and storage software focused on real-time operating systems and micro-controllers. Embedded software products Microsoft NTFS by Tuxera (formerly Tuxera NTFS) Tuxera develops a fully compatible NTFS file system driver for commercial use, primarily by OEMs and other device manufacturers. It's deployed in car IVIs, smart TVs, set-top boxes, smartphones, tablets, routers, NAS and other devices. It is available for Android and other Linux platforms, QNX, WinCE Series 40, Nucleus RTOS and VxWorks. Supported architectures are ARM architecture, MIPS architecture, PowerPC, SuperH and x86. Microsoft exFAT by Tuxera (formerly Tuxera exFAT) Tuxera exFAT technology is used for SDXC memory card support. Tuxera was the first independent vendor to receive legal access to exFAT and TexFAT specifications, source code and verification tools from Microsoft. Tuxera exFAT can be found in automotive infotainment systems, Android phones and tablets from ASUS, Fujitsu, Panasonic, Pantech and others. Microsoft FAT by Tuxera (formerly Tuxera FAT) Tuxera FAT software provides interoperability and support for storage types such as SD memory card, CF card, Memory Stick, SSD, HDD via USB, SATA, eSATA, MMC and others. It is used by chipset and hardware manufacturers, an
https://en.wikipedia.org/wiki/Prorella%20insipidata
Prorella insipidata is an American moth of the family Geometridae first described by Pearsall in 1910. It lives in Oregon, California, Arizona, New Mexico and Texas. The wingspan is about 16 mm. Adults have been recorded on wing from July to October. References Moths described in 1910 Eupitheciini
https://en.wikipedia.org/wiki/Flex%20%28programming%20language%29
In computing, the FLEX language was developed by Alan Kay in the late 1960s while exploring ideas that would later evolve into the Smalltalk programming language. References Programming languages created in the 1960s
https://en.wikipedia.org/wiki/European%20cable%20television%20frequencies
These tables detail the frequencies used in European cable networks. Cable networks use frequencies which are used by different users terrestrially, like the military, police radio, etc. Because of the late introduction of cable television in Europe, older television sets generally could not receive the special cable-only channels, so some countries (like Germany) still have the rule that the public TV stations must be located either in Band I or Band III. The Hyperband was allocated later than the other cable-only channels, so television sets produced in the late 80s and early 90s may lack this band. In most cable networks, the UHF band is unusable because its frequency is too high, so TV stations are only allocated within Band I, III, the Mid-, Super- and Hyperband. Even in modern cable networks, only some UHF channels (like only channels 21–26) may be usable. This leads to a high level of congestion in many European cable TV networks, especially as analogue transmission, which is still commonplace in cable television in Europe, is being migrated to digital transmission. Band I Channels 2–4, if they are used for TV, are only used for analog transmission. In other cases, the frequencies are in use for DOCSIS. Channels D73 and D81 are not formally assigned, but are used in certain regions of Germany as an interim solution until the cable networks are upgraded. In other regions, programs on these channels are usually located in the UHF band. Midband Channel S01 cannot be used at all because it overlaps with the FM radio band. The frequency used by channels S02-S05 are used terrestrially for air radio. This has led to disruptions in aircraft operations due to cable TV channels. Therefore, some countries, like Germany, have prohibited the use of these frequencies for analogue transmission in recent times. Because analogue VHF transmission used a bandwidth of 7 MHz, but digital transmissions need 8 MHz, the frequencies are shifted accordingly, with one channel being unavailable for digital transmission. Due to the proximity to the FM radio band, some cable networks have opted to further shifting the frequencies by one megahertz. Because analogue transmission on these frequencies uses 7 MHz bandwidth, digital also uses the same bandwidth. QAM carrier frequencies can vary in 0.5 MHz steps in the given range. CCIR Band III These channels are only used for analog and digital transmission. Because of the CCIR analogue channel raster, digital transmission also uses 7 MHz bandwidth channels. Only OIRT channel raster uses 8 MHz bandwidth in the VHFIII band. OIRT Band III In VHF band III 8 MHz channel bandwidth is not used in the EU for digital transmission. Superband Hyperband Band IV Band V See also North American cable television frequencies Bandplans Television in Europe
https://en.wikipedia.org/wiki/Chamber%20Music%20America
Chamber Music America (CMA) is an American non-profit organization that provides small ensemble professionals with access to a variety of professional development, networking, and funding resources. CMA's regular initiatives include grants, awards, and commissioning programs for ensembles and presenters, a national conference held annually in New York City, and the publication of Chamber Music magazine. CMA-members organizations and individuals include ensembles, musicians, concert presenters, artist managers, composers, educators, and others involved in the performance of classical, jazz, contemporary, and world music. In May 2012, Chamber Music America introduced National Chamber Music Month, a month-long initiative to raise awareness of small ensemble performance in the United States. History Chamber Music America was founded in 1977 by 34 musicians with the principal aims of uniting, serving, and advocating for small ensemble music professionals. After first initiating a series of residencies designed to bring small ensemble performance into new, community-oriented venues, CMA was chosen by the National Endowment for the Arts to administer NEA's first chamber music grant program. The first Chamber Music America National Conference was held in 1978, and membership was extended to presenters, artist managers, publicists, and music-related businesses shortly thereafter. In the early 1980s, CMA began its first commissioning series. Among the first pieces commissioned with CMA-support were works by Martin Bresnick, Ellen Taaffe Zwilich, and Charles Wuorinen. Aaron Jay Kernis's String Quartet No. 2—commissioned by the Lark Quartet with CMA support—won the Pulitzer Prize in 1997. The current Classical Commissioning program is supported by the Andrew W. Mellon Foundation. Since 2000, jazz has been a significant part of Chamber Music America's grants and professional development programs. CMA's two jazz-specific grant programs—New Jazz Works: Commissioning and Ensemble Development and Presenter Consortium for Jazz—are supported by the Doris Duke Charitable Foundation. CMA defines chamber music as "music composed for small ensembles, with one musician per part, generally performed without a conductor. The term once referred only to Western classical music for small ensembles, such as string quartets. But today chamber music encompasses myriad forms, including contemporary and traditional jazz, classical, and world genres." In September 2021, the organization appointed Kevin Kwan Loucks as its chief executive officer. He succeeded Margaret Lioi who previously held the position for 21 years. National Chamber Music Month In 2012, Chamber Music America introduced the first National Chamber Music Month (NCMM). According to Chamber Music America, the goals of NCMM are to "raise public awareness of the chamber music field nationally and to help ensembles and presenters attract new audiences and media attention within their own communities." Nationa
https://en.wikipedia.org/wiki/Laurence%20Wolsey
Laurence Alexander Wolsey is an English mathematician working in the field of integer programming. He is a former president and research director of the Center for Operations Research and Econometrics (CORE) at Université catholique de Louvain in Belgium. He is professor emeritus of applied mathematics at the engineering school of the same university. Early life and education Wolsey received a MSc in Mathematics from Cambridge in 1966 and a Ph.D. in Mathematics from the Massachusetts Institute of Technology in 1969 under the supervision of Jeremy F. Shapiro. Career Wolsey was visiting researcher at the Manchester Business School in 1969–1971. He was invited by George L. Nemhauser as a Post-Doctoral student to CORE in Belgium in 1971. He met his future wife, Marguerite Loute, sister of CORE colleague Etienne Loute, and settled in Belgium. He was later a visiting professor at the London School of Economics in 1978–1979, at Cornell University in 1983, at Ecole polytechnique de Lausanne in 1986–1987, and Donders professor at University of Utrecht in 1998. Wolsey was the editor-in-chief of the Mathematical Programming journal from 1999 to 2003. Research Wolsey has made seminal contributions in duality theory for integer programming, submodular optimization, the group-theoretic approach and polyhedral analysis of fixed-charge network flow and production planning models. Awards and honours Wolsey has received the Beale-Orchard Hays Prize in 1988, the Frederick W. Lanchester Prize in 1989, the EURO Gold Medal in 1994, the John von Neumann Theory Prize in 2012, and the Dantzig Prize in 2012. The ORBEL Wolsey award is a Belgian prize recognizing the best and most significant OR implementation contributed to Open-Source during the year. Selected publications Integer and Combinatorial Optimization (with George L. Nemhauser, Wiley, 1988) Integer Programming (Wiley, 1998) Production Planning by Mixed Integer Programming (with Yves Pochet, Springer, 2006) References External links Google Scholar report INFORMS: Biography of Laurence Wolsey from the Institute for Operations Research and the Management Sciences Year of birth missing (living people) Living people English mathematicians Massachusetts Institute of Technology School of Science alumni Academic staff of the Université catholique de Louvain John von Neumann Theory Prize winners
https://en.wikipedia.org/wiki/Columnar%20%28disambiguation%29
Columnar (or epithelium) is a type of epithelial cell. Columnar may also refer to: Columnar cacti, a descriptive term for smaller cacti Columnar database, a type of database which stores data tables by column rather than by row Columnar disposition, a technique in encryption Columnar jointing, a geological structure shaped as a regular array of polygonal prisms Columnar basalt, a type of rock formed during the cooling of a thick lava flow Columnar Peak, a subsidiary peak of Mount Garibaldi, British Columbia, Canada Columnar phase, a class of floating crystals which can exist in a cylindrical shape Columnar Valley, a valley in Victoria Land, eastern Antarctica See also Column (disambiguation) Columnaria, an extinct genus of rugose coral Columnarios, silver coins that were minted by Spain from 1732 to 1773 Columnaris, a symptom of disease in fish caused by the Flavobacterium columnare bacterium
https://en.wikipedia.org/wiki/Single-core
A single-core processor is a microprocessor with a single core on its die. It performs the fetch-decode-execute cycle once per clock-cycle, as it only runs on one thread. A computer using a single core CPU is generally slower than a multi-core system. Single core processors used to be widespread in desktop computers, but as applications demanded more processing power, the slower speed of single core systems became a detriment to performance. Windows supported single-core processors up until the release of Windows 11, where a dual-core processor is required. Single core processors are still in use in some niche circumstances. Some older legacy systems like those running antiquated operating systems (e.g. Windows 98) cannot gain any benefit from multi-core processors. Single core processors are also used in hobbyist computers like the Raspberry Pi and Single-board microcontrollers. The production of single-core desktop processors ended in 2013 with the Celeron G470. Development The first single core processor was the Intel 4004, which was commercially released on November 15, 1971 by Intel. Since then many improvements have been made to single core processors, going from the 740 KHz of the Intel 4004 to the 2 GHz Celeron G470. Advantages Single core processors draw less power than larger, multi-core processors. Single core processors can be made a lot more cheaply than multi core systems, meaning they can be used in embedded systems. Disadvantages Single core processors are generally outperformed by multi-core processors. Single core processors are more likely to bottleneck with faster peripheral components, as these components have to wait for the CPU to finish its cycle. Single core processors lack parallelisation, meaning only one application can run at once. This reduces performance as other processes have to wait for processor time, leading to process starvation. Increasing parallel trend Single-core one processor on a die. Since about 2012, even most smartphones CPUs marketed are no longer single-core; Microcontrollers are still single-core, while there are exceptions. Multi-core processors a 'few' processors on a die, e.g. 2, 4, 8. Manycore processors a 'large number' of processors on a die, e.g. 10s, 100s, 1000s. Some specialist ASICs/Accelerators and GPUs fall into this category. References Computer architecture Microprocessors Flynn's taxonomy fa: Single-core
https://en.wikipedia.org/wiki/Soffice.exe
soffice.exe, as the name of a process on a computer running Microsoft Windows, may refer to: StarOffice, a proprietary office suite which was acquired by Oracle OpenOffice.org, which is descended from StarOffice and is open source LibreOffice, a fork of OpenOffice created in 2010 Collabora Online, runs LibreOffice Kit, with broader OS support, and enterprise level support options
https://en.wikipedia.org/wiki/Artspeak
Artspeak is a computer language conceived by Jacob T. Schwartz at New York University's Courant Institute of Mathematical Sciences. Until 2011, the only known compiler/interpreter was written for the CDC 6600, a mainframe computer. In order to program in Artspeak on the CDC 6600, one had to use punch cards and utilize batch processing. Artspeak was a specialized language that worked with a single-color graphical plotter to produce graphical output on a 10-inch by 10-inch sheet of paper. It used simple, English language-based statements to draw elemental shapes, including circles, points, text, and many types of curves (including lines). In 2011, Ron Schnell (author of Dunnet) found an old draft manual for the language, and after discovering that the language ceased to exist, wrote it from scratch in Python. The new version of Artspeak outputs to a computer monitor, as opposed to a plotter, and allows local and server storage of Artspeak programs. There are other differences from the original Artspeak, all of which are detailed in the reference guide. General references Ron Schnell's 2011 implementation of an Artspeak Interpreter Henry Mullish (1974): The art of programming ARTSPEAK: A computer graphics language References Educational programming languages High-level programming languages
https://en.wikipedia.org/wiki/Vietnam%20Television%20Network
Vietnam Television (, abbreviated THVN), sometimes also unofficially known as the National Television (), Saigon Television () or Channel 9 (, THVN9), was one of two national television broadcasters in the South Vietnam from February 7, 1966, until just before the Fall of Saigon on April 29, 1975. It was the first television broadcaster in Vietnam. THVN9 was operated by the Vietnamese Bureau of Television (), part of the General Department of Radio, Television, and Cinema () in the Ministry of Propaganda. Vietnam Television broadcast from the capital Saigon on channel 9 (4.5 MHz) in FCC-standard black and white. However, from 1972, all important events were broadcast in color as standard. The other national broadcaster was the English-language Armed Forces Vietnam Network or NWB-TV on channel 11. Both channels used an airborne transmission relay system from airplanes flying at the high altitudes, called Stratovision, as part of Operation Blue Eagle. History Vietnam Television Station (THVN) was established in 1965; its first broadcast was on February 7, 1966, at 6:58 pm, and the last one was at 11:58 pm on April 29, 1975. The first broadcast recorded images of Prime Minister Nguyễn Cao Kỳ and US ambassador Cabot Lodge. Initially lasting for an hour, the duration was later increased to two hours. On October 25, 1966, THVN's first above-ground establishment was finished. THVN was established at the same time as AFRTS (Armed Forces Radio Television Service), which was renamed as AFVN (Armed Forces Vietnam Network) in 1967. THVN broadcast on band 9, while AFVN on frequency band 11. AFVN broadcast the landing of Neil Armstrong on the Moon in 1969 for audiences in South Vietnam. Recording was first performed at the National Cinema Center No. 9 on Thi Sach Street. In 1967, THVN was split into 2 separate departments - Cinema and Television. THVN's headquarter was moved to 9 Hồng Thập Tự Avenue (now Nguyen Thi Minh Khai Street) - which later became the headquarter of the current Ho Chi Minh City Television. Historical events in early 1975 were also broadcast by Saigon Television. The chaotic and bloody evacuation from the Central Highlands to Tuy Hoa along Highway 7, dubbed as the "Convoy of Tears" was broadcast on television - causing more terror for the people in the South. This was followed by a live broadcast of the resignation speech of President Nguyễn Văn Thiệu on the evening of April 21, 1975. On April 30, the TV crew of THVN9 went to the Independence Palace to broadcast for President Dương Văn Minh, but did not because around 7 am, Minh told everyone to leave. A few hours later, the regime of the Republic of Vietnam ended. The last broadcast of THVN9 was from 18:45 to 22:45 on April 29, 1975, the day before the Fall of Saigon. After the Fall of Saigon, THVN9 was handed over to the Viet Cong. Vietnam Television's final programming aired the evening of April 29, 1975. The next day, the station was reconstituted as Saigon Liberation Televi
https://en.wikipedia.org/wiki/Television%20Kiribati
Television Kiribati Ltd, or TV Kiribati, was the sole, state-owned service in Kiribati. Programming Established in 2002, it broadcast "local and foreign programmes", and was accessible only in South Tarawa (the country's capital) and in the neighbouring island-town of Betio. It provided "about one hour of local programming" on weekdays, and did not broadcast over week-ends. Undetermined Suspension Television Kiribati was suspended by the government in March 2013, due to "serious financial problems", and its personnel's "lack [of] expertise and knowledge in programming and production". The government announced a review to determine whether the closure should be permanent. As it was the only television service, viewers in Tarawa South were left with access to radio and newspapers as their media for information. See also Media in Kiribati References Television stations in Kiribati Television channels and stations established in 2004
https://en.wikipedia.org/wiki/Leiba
Leiba may refer to: Leiba Township () in Gansu in the People's Republic of China People with the surname Barry Leiba (born 1957), American computer scientist Raw Leiba, American actor
https://en.wikipedia.org/wiki/Mark%20Nelson%20%28video%20game%20designer%29
Mark E. Nelson is an American video game designer and humor writer best known for his work with Bethesda Game Studios and the game series The Elder Scrolls. In March 2007, he joined computer games company Big Huge Games to create a new role-playing game, joining industry veteran Brian Reynolds and long-time collaborator Ken Rolston. Mark has a bachelor's degree from Duke University and is a member of the Writers Guild of America. He has been a professional games designer since 1999. In 2013, Nelson founded Nelson Game Design LLC, a game consulting company providing comprehensive design services. From 2014 to 2016, Nelson served as design director at robotics company Sphero. While there, he was responsible for the design of the successful BB-8 app-controlled droid released in 2015. In July 2017, Nelson was named Chief R&D and Design Officer of Bit Fry Game Studios, Inc. Early career Before entering the computer game field, Mark spent many years as both a writer and editor. He designed multimedia training for Raytheon, edited environmental impact statements for the United States Department of Energy, and was an editor of The Washington Wit, a Washington, DC-based humor magazine. Videogame Industry Nelson joined Bethesda Game Studios as a designer on The Elder Scrolls III: Morrowind. He then led the design on its expansions, The Elder Scrolls III: Tribunal and The Elder Scrolls III: Bloodmoon. Nelson went on to work as a designer on award-winning games The Elder Scrolls IV: Oblivion, and Fallout 3. He was the lead designer on 2007's The Elder Scrolls IV: Shivering Isles. Mark joined Big Huge Games in 2007 and served as lead narrative designer on their RPG project, cancelled when the studio was sold in 2009. Nelson went on to be the lead designer and creative director of Kingdoms of Amalur: Reckoning, a single player RPG designed by Big Huge Games, a Baltimore subsidiary of 38 Studios. The game was created for the Xbox 360, PS3 and PC platforms and is set in the world of Amalur. In July 2007, Nelson became the design director for Zynga East, a Baltimore-based social game studio, which produced the titles FrontierVille and CityVille 2. In February 2013, Nelson left Zynga when the Zynga East studio was shut down. Games CityVille 2 (2012) (design director) Kingdoms of Amalur: Reckoning (2011) (creative director, lead designer) Fallout 3 (2008) (designer) The Elder Scrolls IV: Shivering Isles (2007) (lead designer) The Elder Scrolls IV: Oblivion (2006) (designer) Pirates of the Caribbean (2003) (additional design) The Elder Scrolls III: Bloodmoon (2003) (writer, designer) The Elder Scrolls III: Tribunal (2002) (writer, designer) The Elder Scrolls III: Morrowind (2002) (writer, designer) References External links Mark E. Nelson at MobyGames Year of birth missing (living people) American video game designers Bethesda Softworks employees Living people Video game writers Zynga people
https://en.wikipedia.org/wiki/Eupithecia%20feliscaudata
Eupithecia feliscaudata is a moth in the family Geometridae described by David Stephen Fletcher in 1956. It is found in Tanzania (it was described from Mount Kilimanjaro). References Moths described in 1956 feliscaudata Moths of Africa
https://en.wikipedia.org/wiki/Super-channel
A super-channel is an evolution in dense wavelength-division multiplexing (DWDM) in which multiple, coherent optical carriers are combined to create a unified channel of a higher data rate, and which is brought into service in a single operational cycle. Background From around the year 2010, coherent optical transmission at 40Gbit/s and 100Gbit/s began to be deployed in long-haul optical networks around the world. Coherent technology enables higher data rates to be sent over long haul (typically >2,000 km) optical transmission networks, compared to the historical modulation and detection technique, Intensity Modulation with Direct Detection (sometimes referred to as Non-Return to Zero, NRZ or On/Off Keying, OOK), which had been widely used for several decades. However, a coherent detector requires that the incoming phase modulation information is digitized before being sent to a high-performance digital signal processor (DSP). Within the DSP, optical impairments such as chromatic dispersion and polarization mode dispersion can be compensated for. Digitizing the received signal requires an extremely high speed analog-to-digital converter (ADC) capability. Current commercially deployed coherent products are limited to 200 Gbit/s per optical carrier. Going beyond 200 Gbit/s per WDM channel requires the use of multiple carriers to make up a single WDM interface. The resulting multiplex, called a super-channel (or superchannel), creates a multi-wavelength signal in which each wavelength will operate at the maximum data rate permitted by commercially available ADC components. The primary advantages of a super-channel approach are increased spectral efficiency (a consequence of both coherent detection and the possibility of tight spectral packing of the subcarriers making up a super-channel), and operational scalability (the ability to bring larger units of long haul optical capacity into service for a given operational effort). Introduction about super-channels The major difference between superchannel and conventional WDM is the channel gap. Any technique which can reduce the channel gap close to the Nyquist bandwidth (equal signal baud) can be attributed to "superchannel transmission system". These techniques include orthogonal-band-multiplexed (OBM)-orthogonal frequency-division multiplexing (OFDM), no-guard-interval (NGI)-OFDM, Nyquist WDM, multi-channel equalization (MCE)-WDM (also named as Joint ICI Cancellation) Examples of super-channels Early work on DWDM super-channels included attempts using multiple laser sources, and wavelength combs generated from a single source – a form of optical orthogonal frequency-division multiplexing (Optical OFDM). The first experimental demonstration of long-haul superchannel transmission, which coined the term `superchannel' for this type of application, was performed by Bell Labs' S. Chandrasekhar and X. Liu in 2009. The approach being brought to market by companies such as Infinera, Alcatel-Lucent, H
https://en.wikipedia.org/wiki/Advance-Decline%20Data
The Advance-Decline data also known as AD data are calculated to show the number of advancing and declining stocks and traded volume associated with these stocks within a market index, stock market exchange or any basket of stocks with purpose of analysis of the sentiment within the analysed group of stocks. Advance-Decline data are used to measure overall market breadth as well as to measure sentiment within the stock market sectors. First time Advance-Decline data were calculated and analyzed back in 1926 by Colonel Leonard Ayres, an economist and market analyst at the Cleveland Trust Company. Later James Hughes pioneered the "Market Breadth Statistics". In 1931 Barron's started to publish Advance-Decline numbers. Advance-Decline data analysis remained in shadow until the early 1960s when Richard Russell (Dow Theory) started to use them in his "Dow Theory Letters" and Joseph Granville used them in his "Granville Market Letter". Advancing and Declining stocks. Stock considered as advancing stock when it is traded above the previous trading session's close price. Stock is considered as declining stock when it is traded below the previous trading session's close price. Advance-Decline Volume Advance Volume refers to the cumulative total number of shares traded for all stocks from the group of the Advancing stocks within a given time frame. Decline Volume refers to the total cumulative number of shares traded for all stocks from the group of the Declining stocks within a given time frame. L.M. Lowry, founder of Lowry Research Corporation has been credited with creating the concept of Advancing and Declining Volume in 1938. Breadth Indicators Breadth indicators represent the group of technical indicators that are based on the Advance-Decline data. Advance-decline line A-D Line = [Advancing Stocks] – [Declining Stocks] + [Previous Period's A-D Line Value] Advance-Decline Oscillator A-D Oscillator = [Advancing Stocks] – [Declining Stocks] Advance/Decline Ratio A/D Ratio = [Advancing Stocks] / [Declining Stocks] Advance-Decline Percentage Oscillator A/D PO = ([Advancing Stocks] - [Declining Stocks]) / ([Advancing Stocks] + [Declining Stocks]) x 100 Absolute Breadth Index ABI = abs([Advancing Stocks] – [Declining Stocks]) Breadth Thrust Thrust = [x-Day Moving Average of Advancing Stocks] / [x-Day Moving Average of (Advancing Stocks + Declining Stocks)] TRIN Arms Index (see TRIN (finance)) TRIN = (([Advancing stocks]/[Declining stocks]) / ([Advancing volume]/[Declining volume])) McClellan oscillator McClellan Oscillator = (EMA1 of [(Advancing Issues - Declining Issues)/Total Issues] - EMA2 of [(Advancing Issues - Declining Issues)/total issues]) * 1000 McClellan Summation Index Index = Previous Index's Value + Current McClellan Oscillator Value References Technical indicators
https://en.wikipedia.org/wiki/Taizerbo
Taizerbo is a proposed protected area of Libya. According to data of the World Database on Protected Areas (WDPA) published by the United Nations this small protected area (surface 0.3 km2) has not yet been established in 2014. The name Taizerbo is an alternative spelling of Tazirbu. References Protected areas of Libya
https://en.wikipedia.org/wiki/Geoffrey%20James
Geoffrey James may refer to: Geoffrey James (photographer) (born 1942), Canadian photographer Geoffrey James (journalist) (born 1953), American author of The Tao of Programming See also Jeffrey James (disambiguation)
https://en.wikipedia.org/wiki/Alisto
() is a Philippine television public service show broadcast by GMA Network and GMA News TV. Hosted by Arnold Clavio, it premiered on GMA Network on March 23, 2013 on the network's Saturday evening line up replacing Kandidato. The show concluded on GMA Network on April 14, 2020. The show moved to GMA News TV on July 28, 2020 on the network's Power Block line up. The show returned to GMA Network on January 5, 2021. The show concluded on February 9, 2021. It was replaced by On Record in its timeslot. Overview The show features stories from actual videos of people in life-threatening situations. The program also has a regular segment exposing the latest modus operandi in crime as well as breaches in safety. It also features a road traffic segment hosted by Arianne Bautista as "Agent A". Production In March 2020, production was halted due to the enhanced community quarantine in Luzon caused by the COVID-19 pandemic. The show resumed its programming on July 28, 2020. Ratings According to AGB Nielsen Philippines' Mega Manila household television ratings, the pilot episode of earned a 7.9% rating. Accolades References External links 2013 Philippine television series debuts 2021 Philippine television series endings Filipino-language television shows GMA Network original programming GMA Integrated News and Public Affairs shows GMA News TV original programming Philippine television docudramas Philippine television shows Television productions suspended due to the COVID-19 pandemic
https://en.wikipedia.org/wiki/Instant%20People
Instant People was an Australian television series which aired from 1962 to 1963 on the Seven Network, hosted by Keith Smith. It was also known as The Nestle's Show. Format It was a Vox pop interview show. For example, one episode asked women on the street the question "should married women go to work?"; another interviewed a 16-year-old who left school to look after her ill mother and younger siblings following the death of her father; tested people's reactions to a bitter fruit cocktail; interviewed an art teacher, among other segments. Episode status 22 of the episodes are held by the National Film and Sound Archive. It would appear the series was produced on film, which may explain the high survival rate, though this is not confirmed. References Australian non-fiction television series 1962 Australian television series debuts 1963 Australian television series endings Black-and-white Australian television shows English-language television shows Seven Network original programming
https://en.wikipedia.org/wiki/National%20Pediatric%20Research%20Network%20Act%20of%202013
National Pediatric Research Network Act of 2013 () is a bill in the 113th United States Congress on February 4, 2013. It passed the United States House of Representatives and was sent to the Senate, where it was referred to the United States Senate Committee on Health, Education, Labor, and Pensions. The purpose of the bill is "to amend title IV of the Public Health Service Act to provide for a National Pediatric Research Network, including with respect to pediatric rare diseases or conditions." The bill has received some support for researchers in the area of pediatric health who support the bill's goal of facilitating research, although there are some concerns about avoiding the creation of government red tape. Background In the 112th United States Congress a previous version of the Bill passed twice, one as a stand-alone bill and one as part of a larger piece of legislation. Neither version was adopted because they did not make it out of the Senate. Procedural history Introduction The Bill was introduced on January 14, 2013 by Rep. Lois Capps (D-CA). She was joined by Rep. Cathy McMorris Rodgers (R-WA) and four other original cosponsors. Sponsor Rep. Lois Capps (D-CA) Original Co-Sponsors Rep. Cathy McMorris Rodgers (R-WA) Rep. Diana DeGette (D-CO) Rep. Gregg Harper (R-MS) Rep. Doris O. Matsui (D-CA) Rep. Peter T. King (R-NY) Additional Co-Sponsors Rep. Donna M. Christensen (D-VI) Rep. Janice D. Schakowsky (D-IL) Rep. Henry A. Waxman (D-CA) Rep. Frank Pallone Jr. (D-NJ) Rep. Kathy Castor (D-FL) Committee The Bill was referred to the United States House Committee on Energy and Commerce. It was reported out of Committee on February 4, 2013. Final debate and passage The Bill was passed by the House on February 4, 2013 by a vote of 375-27. It was considered under a suspension of the rules, something which typically only happens in the case of noncontroversial bills. Senate Referral After being passed by the House, the Bill was received by the United States Senate on February 7, 2013 and referred to the United States Senate Committee on Health, Education, Labor, and Pensions. Provisions/Elements of the bill The Bill would amend the Public Health Service Act to authorize the Director of the National Institutes of Health (NIH), in carrying out the Pediatric Research Initiative, to establish a National Pediatric Research Network. The bill authorizes the Director of the NIH to award funding to public or private nonprofit groups that those groups can use to plan, establish, or improve pediatric research consortia. The money can also be used to provide basic operating support for those consortia, including doing actual clinical research and training other researchers. The awards should go to 20 or fewer consortia. The Bill goes into greater specifics about the characteristics of these consortia and the rules they must agree to follow in order to get the funding. The bill indicates that this support will be for five years, with the opt
https://en.wikipedia.org/wiki/Saadatabad%2C%20Bardsir
Saadatabad (, also Romanized as Sa‘ādatābād) is a village in Mashiz Rural District, in the Central District of Bardsir County, Kerman Province, Iran. At the 2006 census, its population was 51, in 13 families. References Populated places in Bardsir County
https://en.wikipedia.org/wiki/Arkadium
Arkadium is a founder-led creator of casual games for adults. Its games can be found on its own owned-and-operated site, Arkadium.com, as well as across a network of digital publishers including USA Today and the Washington Post. The company is headquartered in New York City with an additional office in Krasnodar, Russia. History Husband-and-wife team Kenny Rosenblatt and Jessica Rovello founded Arkadium in 2001, inspired by a game of Ms. Pac-Man. Arkadium developed the Microsoft Solitaire Collection in 2011 as well as the modern iteration of Minesweeper. In 2014, after the Russian annexation of the Crimea, the US put sanctions on companies operating there. Arkadium had a 100-person team in Crimea, which was reduced to 50 and relocated from that region. In January 2017, the company announced it signed 300 new publishers in 2016 and saw record growth, and in 2019 announced a partnership with Sportradar to make it easy to bet on sports trivia questions to make web-based content more interactive and engaging for fans. In September 2018, Arkadium used its profits to buy out the investors, allowing the company to remain independent and grow on its own terms. CEO Jessica Rovello said she had no regrets about stepping off the venture-funded path. Arkadium games were played 830 million times in 2018. Corporate affairs Leadership Arkadium is managed by CEO and Co-Founder Rosenblatt and President and Co-Founder Rovello. Other key executives are: Tom Rassweiler, SVP Product Greg Gallo, SVP Operations Neal Sinno, Chief Partnership Officer Vivian Lee, SVP People Innovation Customer and revenue The company reaches over 500 million users each month across Windows, iOS, and Android. Its games include the Microsoft Solitaire Collection which comes loaded on Windows 10, Windows 8, and mobile devices. In March, 2017, the company released InHabit, which creates interactive visualizations called factives; these are automatically embedded into articles and are intended to increase session duration and user engagement. Awards Arkadium was named one of 14 New York Tech Companies to watch in 2016 by Forbes, and 'Best Workplace' by Inc. Magazine in its 2016 and 2017 issues. The company was named by Digiday as Employer of the Year, Tech platform category, in 2017, Crain's 100 Best Places to Work in New York City in 2017, and number 27 in AdAge's Best Places to Work in 2017. In 2019, Arkadium was named 'Best Workplace by Inc. Magazine, and the company's InHabit product, in conjunction with Spark Foundry and NBA, was named a Digiday Publishing Awards winner in the 'Best Custom Advertising' category for a 2018-19 NBA Tip Off campaign. In 2020, the company was certified as a Great Place to Work, as well as won an award for Best Place to Work by the Business Intelligence Group. In December 2019, Forbes featured Arkadium's HR and hiring practices. Developed video games References External links Mass media companies of the United States
https://en.wikipedia.org/wiki/Vahdatabad%2C%20Kerman
Vahdatabad (, also Romanized as Vaḩdatābād) is a village in Negar Rural District, in the Central District of Bardsir County, Kerman Province, Iran. A census in 2006 acknowledged its existence, but its population was not reported. References Populated places in Bardsir County
https://en.wikipedia.org/wiki/Information%20Centre%20on%20Academic%20Mobility%20and%20Equivalence
The Information Centre on Academic Mobility and Equivalence (CIMEA) is the Italian centre in the National Academic Recognition Information Centre (NARIC) network. It was established in 1984 and since 1986 has operated through an agreement with Italy's Ministry of Education, Universities and Research. References External links Organizations established in 1984 Educational testing and assessment organizations Education in Italy
https://en.wikipedia.org/wiki/HodHod%20TV
HodHod TV is a kurd based kids channels are the kids channel that launched in 2011 and headed in Arab world. Programming broadcast by HodHod TV Fix & Foxi and Friends Thomas & Friends Bernard Oggy and the Cockroaches Tommy & Oscar The Adventures of Tintin The Pink Panther Inspector Gadget Rainbow Ruby Care Bears & Cousins External links Arabic-language television stations Children's television networks Preschool education television networks
https://en.wikipedia.org/wiki/Gorlin
Gorlin may refer to: People Dan Gorlin, computer game programmer, designer and founder of Dan Gorlin Productions Eitan Gorlin, filmmaker, author and actor Mikhail Gorlin, Russian emigre poet Richard Gorlin, American cardiologist, co-developed the Gorlin equation Robert J. Gorlin, a professor and researcher at the University of Minnesota In medicine Gorlin sign, the ability to touch the tip of the nose with the tongue and touch the elbow with the tongue Gorlin syndrome, also known as basal cell nevus syndrome The Gorlin equation, a method to calculate the effective area of a heart valve during cardiac catheterization
https://en.wikipedia.org/wiki/Mycorrhizal%20network
A mycorrhizal network (also known as a common mycorrhizal network or CMN) is an underground network found in forests and other plant communities, created by the hyphae of mycorrhizal fungi joining with plant roots. This network connects individual plants together. Mycorrhizal relationships are most commonly mutualistic, with both partners benefiting, but can be commensal or parasitic, and a single partnership may change between any of the three types of symbiosis at different times. The formation and nature of these networks is context-dependent, and can be influenced by factors such as soil fertility, resource availability, host or mycosymbiont genotype, disturbance and seasonal variation. Some plant species, such as buckhorn plantain, a common lawn and agricultural weed, benefit from mycorrhizal relationships in conditions of low soil fertility, but are harmed in higher soil fertility. Both plants and fungi associate with multiple symbiotic partners at once, and both plants and fungi are capable of preferentially allocating resources to one partner over another. Referencing an analogous function served by the World Wide Web in human communities, the many roles that mycorrhizal networks appear to play in woodland have earned them a colloquial nickname: the Wood Wide Web. Many of the claims made about common mycorrhizal networks, including that they are ubiquitous in forests, that resources are transferred between plants through them, and that they are used to transfer warnings between trees, have been criticised as being not strongly supported by evidence. Types There are two main types of mycorrhizal networks: arbuscular mycorrhizal networks and ectomycorrhizal networks. Arbuscular mycorrhizal networks are formed between plants that associate with glomeromycetes. Arbuscular mycorrhizal associations (also called endomycorrhizas) predominate among land plants, and are formed with 150–200 known fungal species, although true fungal diversity may be much higher. Ectomycorrhizal networks are formed between plants that associate with ectomycorrhizal fungi and proliferate by way of ectomycorrhizal extramatrical mycelium. In contrast to glomeromycetes, ectomycorrhizal fungal are a highly diverse and polyphyletic group consisting of 10,000 fungal species. These associations tend to be more specific, and predominate in temperate and boreal forests. Communication Reports discuss the ongoing debate within the scientific community regarding what constitutes communication, but the extent of communication influences how a biologist perceives behaviors. Communication is commonly defined as imparting or exchanging information. Biological communication, however, is often defined by how fitness in an organism is affected by the transfer of information in both the sender and the receiver. Signals are the result of evolved behavior in the sender and effect a change in the receiver by imparting information about the sender's environment. Cues are similar
https://en.wikipedia.org/wiki/Earth%20Journalism%20Network
Earth Journalism Network (EJN) is an Internews and Internews Europe project. Internews is an international non-profit organization. Work Fellowships Both independently and in partnership with other organizations, the Earth Journalism Network awards fellowships to journalists which allow them to attend conferences within the field of environmentalism. During these events, which have included several Conferences of the Parties (COPs) and Rio+20, journalists participate in activities and report on event developments for their local media outlets. Prior to and throughout these events, EJN holds workshops to train reporters on environmental journalism best practices. Partners At the start of 2013, the Earth Journalism Network established a partnership with the graduate School of Communication of the University of California in Berkeley. Advocacy Murder of Hang Serei Oudom In September 2012, the Earth Journalism Network and the Society of Environmental Journalists circulated a joint petition calling on the Cambodian government to launch a full investigation into the murder of environmental journalist Hang Serei Oudom. Oudom had been covering illegal logging activities for the local newspaper Vorakchun Khmer Daily when his body was discovered with several axe blows to the head. The New York Times''' Andrew Revkin called attention to this petition on his blog Dot Earth. Leadership James Fahn is the executive director of Earth Journalism Network. Fahn was originally based in Thailand for nine years where he was a reporter and editor for The Nation'', an English-language daily newspaper based in Bangkok. References Further reading External links Official website Internews Internews Europe InfoAmazonia Climate Commons International non-profit organizations Journalism organizations Organizations established in 2004
https://en.wikipedia.org/wiki/Iacono%27s%20working%20set%20structure
In computer science, Iacono's working set structure is a comparison based dictionary. It supports insertion, deletion and access operation to maintain a dynamic set of elements. The working set of an item is the set of elements that have been accessed in the structure since the last time that was accessed (or inserted if it was never accessed). Inserting and deleting in the working set structure takes time while accessing an element takes . Here, represents the size of the working set of . Structure To store a dynamic set of elements, this structure consists of a series of Red–black trees, or other Self-balancing binary search trees , and a series of deques (Double-ended queues) , where . For every , tree and deque share the same contents and pointers are maintained between their corresponding elements. For every , the size of and is . Tree and deque consist of the remaining elements, i.e., their size is . Therefore, the number of items in all trees and the number of elements in all deques both add up to . Every element that has been inserted in the data structure is stored in exactly one of the trees and its corresponding deque. Working set Invariant In the deques of this structure, elements are kept in sorted order according to their working set size. Formally, element lies after in deque if and only if . Moreover, for every , the elements in deque have a smaller working sets than the elements in deque . This property is referred to as the Working set invariant. Every operation in the data structure maintains the Working set invariant. Operations The basic operation in this structure is called shift from to , where and are indices of some trees in the structure. Two cases are considered in a shift from to : If , then for every , taken in increasing order, an item is dequeued from and enqueued into . The corresponding item is deleted from and inserted into . The running time of this operation is . Analogously, if , then for every , taken in decreasing order, an item is dequeued from and enqueued into . The corresponding item is deleted from and inserted into . The running time of this operation is . Regardless of the case, after a shift operation, the size of decreases by one whereas the size of increases by one. Since that elements in the deques are sorted with respect to their working sets sizes, a shift operation maintains the Working set invariant. Search To search for an element , search for in , in increasing order, until finding a tree containing . If no tree is found, the search is unsuccessful. If is found, it is deleted from and then inserted into , i.e., it is moved to the front of the structure. The search finishes by performing a shift from to which restores the size of every tree and every deque to their size prior to the search operation. The running time of this search is if the search was successful, or otherwise. By the Working set property, every element in trees belongs to the w
https://en.wikipedia.org/wiki/Enstratius
Enstratius (formerly enStratus) was a cloud computing infrastructure management platform founded in Minneapolis in 2008. It was intended to address governance issues associated with deploying systems in public, private, and hybrid clouds. More than twenty public and private clouds are supported, as well as configuration management tools such as Chef and Puppet. Enstratius supports both SaaS and on-premises deployment models. Enstratius was headquartered in Eden Prairie, Minnesota, with remote workers across the United States, and offices in Auckland, New Zealand, and Edinburgh, Scotland. It was purchased by Dell in 2013 and ceased operations as a separate entity by 2016. History The company was originally formed in 2008 as enStratus Networks, a spin-off of marketing software maker Valtira. The software forming the backbone of enStratus was a set of cloud management tools that Valtira had developed in support of its cloud operations. The company announced itself publicly at the MinneDemo conference in February 2009 and began accepting on-demand accounts. Co-founders were David Bagley and George Reese. Enstratius moved from a focus purely on security to the wider problem of governance over multiple cloud computing environments. In 2010, Enstratius spun off part of its intellectual property as an open source project hosted at GitHub under the Apache license called Dasein Cloud. Dasein Cloud is a Java abstraction API that Enstratius uses to talk to the clouds it supports. The company raised a Series A financing of $4.5 million in November 2011 from El Dorado Ventures, Vesbridge Partners, and Citrix. In March 2013, enStratus Networks changed its name to Enstratius, Inc. In May 2013, the company was acquired by Dell. Two weeks later, Dell discontinued its own cloud computing service. In June 2016 Dell shifted the Enstratius product line to support-only. They continue to support customers, but are no longer selling this cloud management platform. References External links Official site Cloud computing providers Cloud infrastructure Cloud platforms Cloud storage Technology companies established in 2008 Software companies based in Minneapolis Dell acquisitions 2013 mergers and acquisitions Technology companies disestablished in 2016