source
stringlengths
32
199
text
stringlengths
26
3k
https://en.wikipedia.org/wiki/3D%20Content%20Retrieval
A 3D Content Retrieval system is a computer system for browsing, searching and retrieving three dimensional digital contents (e.g.: Computer-aided design, molecular biology models, and cultural heritage 3D scenes, etc.) from a large database of digital images. The most original way of doing 3D content retrieval uses methods to add description text to 3D content files such as the content file name, link text, and the web page title so that related 3D content can be found through text retrieval. Because of the inefficiency of manually annotating 3D files, researchers have investigated ways to automate the annotation process and provide a unified standard to create text descriptions for 3D contents. Moreover, the increase in 3D content has demanded and inspired more advanced ways to retrieve 3D information. Thus, shape matching methods for 3D content retrieval have become popular. Shape matching retrieval is based on techniques that compare and contrast similarities between 3D models. 3D retrieval methods Derive a high level description (e.g.: a skeleton) and then find matching results This method describes 3D models by using a skeleton. The skeleton encodes the geometric and topological information in the form of a skeletal graph and uses graph matching techniques to match the skeletons and compare them. However, this method requires a 2-manifold input model, and it is very sensitive to noise and details. Many of the existing 3D models are created for visualization purposes, while missing the input quality standard for the skeleton method. The skeleton 3D retrieval method needs more time and effort before it can be used widely. Compute a feature vector based on statistics Unlike Skeleton modeling, which requires a high quality standard for the input source, statistical methods do not put restriction on the validity of an input source. Shape histograms, feature vectors composed of global geo-metic properties such as circularity and eccentricity, and feature vectors created using frequency decomposition of spherical functions are common examples of using statistical methods to describe 3D information. 2D projection method Some approaches use 2D projections of a 3D model, justified by the assumption that if two objects are similar in 3D, then they should have similar 2D projections in many directions. Prototypical Views and Light field description are good examples of 2D projection methods. 3D Engineering Search System In Purdue University, researchers led by Professor Karthik Ramani at the Research and Education Center for Information created a 3D search engine called the 3D Engineering Search System (3DESS). It is designed to find computer-generated engineering parts. The mechanism behind this search engine is that it starts from an algorithm which can transform query drawing to voxels, then extracts the most important shape information from the voxels by using another algorithm called thinning, and formulates a skeleton of the object’s ou
https://en.wikipedia.org/wiki/MakerSquare
MakerSquare was a provider of software engineering bootcamp based in Austin, TX, with additional campus locations in San Francisco, CA, Los Angeles, CA and New York, NY. MakerSquare provided a career-focused program that includes job training and employer outreach within its curriculum. In January 2015, MakerSquare was purchased by software engineering bootcamp Hack Reactor, and in 2016, all MakerSquare campuses were rebranded to share the Hack Reactor name. History MakerSquare was founded in 2013 by Harsh Patel, Shaan Shah, Shehzan Devani, and Ravi Parikh. The four created the company with no investor funding and initially operated from Parikh's parent's home. MakerSquare was acquired by Hack Reactor in January 2015 for an undisclosed amount. Since the acquisition, MakerSquare has adopted the Hack Reactor curriculum, course structure and name. Locations MakerSquare was originally located on Congress Avenue in downtown Austin, TX; however, it was since relocated to the offices of Capital Factory, within the Omni Hotel, still in downtown Austin. MakerSquare opened a second campus in SoMa in San Francisco, CA in 2014 and subsequently two more campuses in Los Angeles (2015) and New York City (2016). Programs MakerSquare has adopted the Hack Reactor program which is a course where students spend 12-weeks learning software engineering for 60 to 80 hours a week. Cohorts usually consist of 15 to 30 students with a low student-to-teacher ratio. Students are expected to have an intermediate level understanding of JavaScript before entering. Following completion of the course, MakerSquare students are assisted in their job search by the MakerSquare Student Outcomes team, and connected to their hiring network of 300+ employers. The Student Outcomes staff also provide support for resume preparation, technical interview readiness, personal branding, online presence management, and personal portfolio creation. Immersive courses start every seven weeks. Currently, MakerSquare has achieved a 96% placement rate. Graduate salaries average $106,000 in San Francisco, $92,000 in Los Angeles, and $75,000 in Austin with a 96% success rate of graduates who were placed in a full-time programming job within 3 months of graduation. MakerSquare offered a part-time course which allowed students to focus on a particular division of web development. MakerSquare's part-time courses were geared towards professionals seeking not to become developers, but to understand more technical aspects of their career. As of November 2014, these classes have been discontinued and have been replaced with MakerPrep, a part-time evenings class for aspiring programmers. MakerSquare offered a K-12 web development program called Hatch After School in which younger students attend a weekly session to learn programming basics. Consisting of mostly middle school students, Hatch After School consists of three 8-week phase. As of 2015, Hatch After School has been retired. Student intake and outr
https://en.wikipedia.org/wiki/Computer%20lock
A computer lock is a physical lock on a computer with an accompanying key used for access control or as an anti-theft system. History In the 1980s and early 1990s, IBM Personal Computers and some PC compatibles included a tubular pin tumbler lock on the computer's casing performing a security function that varied by manufacturer. In some instances, the lock would prevent the case from being opened to inhibit the theft or modification of internal components. In other cases, the lock was used to forbid unauthorized access to the computer by disabling the power supply, hard drive, or keyboard. Other early personal computer locks include Maclocks, introduced by Compulocks in 1986. Built-in computer locks for access control were phased out by computer manufacturers in the 1990s as operating systems and other software incorporated user profiles with passwords, but computer locks to prevent theft are still in use, more commonly in the form of Kensington locks that attach cables to laptops and small desktops in an effort to prevent them from being taken. See also Physical security Computer access control Data security References Computer lock
https://en.wikipedia.org/wiki/Wouzee
wouzee is an interactive broadcast platform for streaming video that allows users to visualize and share play and stream video using different devices video camera or a computer through Internet. The user produces, shares and consumes information actively. In addition to the free support, Wouzee offers a premium service through livestreaming event production. Wouzee became known nationally when one of their users decided to upload a video in which Infanta Cristina stated on the Noos Case. afterwards, was published by the Spanish newspaper El Mundo. References External links Official site Video
https://en.wikipedia.org/wiki/Latvijas%20Radio%205
Latvijas Radio 5 - Pieci.lv is part of Latvijas Radio public service broadcasting network based in Riga, Latvia. Pieci.lv is public service broadcasting for youth, combining subculture, different lifestyle and opinion leaders. Currently the network consists of nine internet only stations and a nationwide FM station. On 15 March 2015, Pieci.lv competed in first European Radio Championship which was held in Milan. In the Championship the station was represented by Toms Grēviņš and Marta Līne. History Latvijas Radio 5 - Pieci.lv was launched at 10pm on 14 July 2013. The first station to be launched was Pieci Koncerti which played exclusive live recordings from the Positivus Festival in Salacgrīva. Stations Pieci.lv streams several stations, available both online and in mobile apps: Pieci Latvieši - Latvian bands Pieci Hiti - pop music Pieci Rīti - replays of pieci.lv morning programmes Pieci Rokeri - Latvian and foreign rock Pieci Atklājumi - hits Pieci Bīti - club music Pieci Latgalieši - music in Latgalian Pieci Koncerti - live concerts Pieci Hip Hop - hip hop from around the world Frequency See also Latvijas radio References External links Latvijas Radio 5 - Pieci.lv homepage Radio stations established in 2013 Radio stations in Latvia
https://en.wikipedia.org/wiki/Proxmox%20Virtual%20Environment
Proxmox Virtual Environment (Proxmox VE or PVE) is a hyper-converged infrastructure open-source software. It is a hosted hypervisor that can run operating systems including Linux and Windows on x64 hardware. It is a Debian-based Linux distribution with a modified Ubuntu LTS kernel and allows deployment and management of virtual machines and containers. Two types of virtualization are supported: container-based with LXC (starting from version 4.0 replacing OpenVZ used in version up to 3.4, included), and full virtualization with KVM. It includes a web-based management interface. History Development of Proxmox VE started when Dietmar Maurer and Martin Maurer, two Linux developers, found out OpenVZ had no backup tool and no management GUI. KVM was appearing at the same time in Linux, and was added shortly afterwards. The first public release took place in April 2008. It supported container and full virtualization, managed with a web-based user interface similar to other commercial offerings. Features Proxmox VE is an open-source server virtualization platform to manage two virtualization technologies: Kernel-based Virtual Machine (KVM) for virtual machines and LXC for containers - with a single web-based interface. It also integrates out-of-the-box-tools for configuring high availability between servers, software-defined storage, networking, and disaster recovery. High-availability cluster Proxmox VE (PVE) can be clustered across multiple server nodes. Since version 2.0, Proxmox VE offers a high availability option for clusters based on the Corosync communication stack. Starting from the PVE v.6.0 Corosync v.3.x is in use (not compatible with the earlier PVE versions). Individual virtual servers can be configured for high availability, using the built-in ha-manager. If a Proxmox node becomes unavailable or fails, the virtual servers can be automatically moved to another node and restarted. The database and FUSE-based Proxmox Cluster filesystem (pmxcfs) makes it possible to perform the configuration of each cluster node via the Corosync communication stack with SQLite engine. Virtual appliances Proxmox VE has pre-packaged server software appliances which can be downloaded via the GUI. See also Comparison of platform virtualization software Kernel-based Virtual Machine (KVM) oVirt References External links Hyper-converged infrastructures 2008 software Debian-based distributions Free software programmed in Perl Free virtualization software Linux distributions Perl software Software using the GNU AGPL license
https://en.wikipedia.org/wiki/Microman%C3%ADa
Micromanía is a Spanish computer game magazine. It was founded by the publisher HobbyPress, currently a subsidiary of Axel Springer SE. It was created in May 1985 and is one of the first magazines in Europe exclusively devoted to video games. It was first published soon after MicroHobby, which had been created just a few months earlier by the same publisher. The magazine in its two first periods was a major outlet supporting of the golden era of Spanish software. Micromanía celebrated its 25th anniversary in 2010. In July 2012, Axel Springer sold Micromanía to other owner, focussing its video game coverage in its other magazine, Hobby Consolas. Micromanía team continues the printed magazine independently, published by BlueOcean Publishing. History The first issue of Micromanía was published in 1985, with new issues released monthly. The publication of the magazine has been divided into three periods, called in Spanish "Épocas". The first period lasted for three years, with 35 issues. The second period, starting in 1988, changed its physical size to adopt what became its iconic large newspaper size. The second period had 80 issues, the last one published in January 1995, the 11th year since the magazine's inception. In February 1995 the third "Época" started, which as of 2015 continues to be published. The magazine reshaped itself to a normal-sized magazine. The magazine celebrated its 20 years anniversary in 2005, and its 30 years anniversary in 2014. 35th anniversary was celebrated in 2019. See also Hobby Consolas References External links Official website Profile of magazine and database of all issues at Devuego.es 1985 establishments in Spain Axel Springer SE Magazines established in 1985 Magazines published in Madrid Monthly magazines published in Spain Spanish-language magazines Video game magazines published in Spain
https://en.wikipedia.org/wiki/Ceres%20Power
Ceres Power Holdings plc is a UK developer of solid oxide fuel cell technology for use in distributed power systems aimed at decarbonising cities, factories, data centres and electric vehicle charging. Founded in 2001, it is headquartered at Horsham in the UK. It is listed on the London Stock Exchange and is a constituent of the FTSE 250 Index. It is also classified by the LSE Green Economy Mark, which recognises listed companies that derive more than 50% of their activity from the green economy. History In 2001, Ceres Power spun-out from Imperial College London after more than 10 years of fundamental research led by Professor Brian Steele. In November 2004, Ceres was first listed on the London Stock Exchange. In September 2013, Phil Caldwell became the CEO of Ceres Power following investment from IP Group. Technology Ceres Steel Cell The Ceres patented Steel Cell is a Solid oxide fuel cell (SOFC) that can operate on mains natural gas for distributed power generation. The steel cell operates at 500-600 °C which allows the use of cerium gadolinium oxide (CGO) in the anode and electrolyte and the bulk of the fuel cell to be mostly made from ferritic steel. The technology is reversible. In one direction it can generate electricity from multiple fuels; in the other, it can generate green hydrogen at low cost and high efficiencies. Hydrogen The UK Hydrogen Strategy cites UK companies including ITM Power, Johnson Matthey and Ceres as being at the forefront of hydrogen technology development worldwide. Ceres is an Executive Member of the UK Hydrogen and Fuel Cell Association UK Hydrogen and Fuel Cell Association and a founding member of the Long Duration Energy Storage Council. Business Model Ceres operates a licensing business model and partners with global industry partners to develop clean energy systems and products. Partners included Bosch, Weichai, Doosan, Miura and Shell. Awards In July 2023, Ceres Power was awarded the 2023 MacRobert Award by the Royal Academy of Engineering. This is the UK's most prestigious engineering prize. In its award citation, the academy recognised Ceres for its "ground-breaking fuel cell technology that promises to make a major contribution to decarbonising the world at the scale and pace required to save the planet." In 2021 Ceres was awarded the Queen’s Award for Enterprise 2021 in the category of International Trade. References External links Official site Official video featured in MacRobert Award citation from Royal Academy of Engineering Engineering companies of the United Kingdom Fuel cell manufacturers
https://en.wikipedia.org/wiki/Voivodeship%20road%20113
Voivodeship road 113 (, abbreviated DW 113) is a route in the Polish voivodeship roads network. The route runs through the Goleniów County. The route has 19 km in length. Important settlements along the route Żółwia Błoć Żółwia Mosty Jarosławki Maszewo Route plan References 113
https://en.wikipedia.org/wiki/GoIP
GoIP is a GSM-gateway[1] and SIM bank produced by the Hybertone and DBL technology companies. It enables connections between the GSM network and VoIP. Usage concept Sim-card is put into GSM-gateways (or SIM-bank connected to GSM-gateway) in order to register it with the GSM network, at the same time the gateway is associated with VoIP through program switch. Accordingly, the traffic can be converted in and out between GSM and VoIP channels. SIP and H.323 protocols are used for media traffic termination. GoIP equipment is compatible with all main IP PBX: Asterisk, Mera, Oktell, 3CX, etc. Compared with PSTN, GSM-gateways provide a drastic economy by amending the infrastructure and lowering the expenditures on technical support. GoIP includes integral support of SIP and H.323 protocols with flexible settings. Duplex authentification of password and trust-list backup will significantly decrease telecommunication expenditures while maintaining an adaptable system of call transfer. The GoIP gateway supports several devices' groups, with flexible settings of large GSM-gateways groups with different channels. There are several models of GoIP GSM gateways 1 Port GSM VoIP Gateway, 4 Port GSM VoIP Gateway, 8 Port GSM VoIP Gateway, 16 Port GSM VoIP Gateway, 32-Port GSM VoIP Gateway. 64 Ports GSM VoIP Gateway, Applications of GoIP gateways: They are vastly usable by system integrators, TCP, call centers, large and little companies, and domestic users of VoIP as well. VoIP-GSM gateways produced on the GoIP platform help to accomplish the following: Adding the mobile lines in the existing telephone system (GoIP provides a GSM network between telephone systems and IP PBX, and ensures a fast connection to PSTN where usual telephone lines are unavailable) Organization of outbound call-centers Call transfer from GSM into SIP and backward (inbound and outbound calls between GSM and VoIP) Determination of SIM-bank SIM-bank is a SIM-card controller that provides remote control over VoIP GSM gateways and allows to simplify and automatize many procedures likewise: - fast connection of SIM cards to the gateway, rapid exchange of SIM-cards via the Internet, and their prearranged synchronous replacement. The cooperative use of GoIP gateways and GoIP SIM-bank enables the management of unmanned devices and reduces the work pressure in SIM-cards operations, for example, SIM-cards replacement and replenishment. The remote access advantages for SIM cards Central management of SIM cards, their dynamic allocation, no need to change or reinsert the SIM card in the device, rapid replacement of SIM cards with no breakdowns in service. For instance, the remote GoIP gateway will no longer require the replacement of SIM cards in the device or their reinsertion. One can manage the group of GoIP gateways remotely, effectively, and with the minimal loss with the help of a SIM bank. The main advantages of SIM-bank appliances include 1) the replacement of SIM car
https://en.wikipedia.org/wiki/Hacker%20Bible
The Hacker Bible is a publication of the German hacker organization Chaos Computer Club (CCC). It has been published in two editions to date, 1985 and 1988. Both were edited by Wau Holland and published on the Grüne Kraft press. Information The Hacker Bible is a compendium of documents and stories from the hacker scene, for example the instruction guide to the acoustic coupler named “Data-loo”(Germ.:Datenklo). Furthermore, it offers manuals and other technical explanations. The first edition appeared in 1985 with the subtitle “Cable salad is good for you" ("Kabelsalat ist gesund”) and had sold 25,000 copies by mid-1988. The second edition in 1988 was given the additional name “The New Testament”. The comic images on the cover sleeve are a creation of German comic artists Mali Beinhorn and Werner Büsch from the comic workshop Büsch-Beinhorn. The production and distribution of the Hacker Bible was discontinued by 1990. Since 1999, the CCC has offered a scanned and full-text version online (in German) with further materials such as texts from Peter Glaser, a documentation on Karl Koch and works from Tron from the Chaos-CD. Bibliography . . References External links Hackerbibel Archive 1 Hackerbibel Archive 2 Hacking Technology Ethical Hacking German books Hacker culture Computer clubs Hacker magazines Computer security Works about computer hacking 1985 books 1988 books
https://en.wikipedia.org/wiki/Voivodeship%20road%20114
Voivodeship road 114 (, abbreviated DW 114) is a route in the Polish voivodeship roads network. The route links Nowe Warpno with the Voivodeship Road 115 in Tanowo. Route plan References 114
https://en.wikipedia.org/wiki/Voivodeship%20road%20115
Voivodeship Road 115 (, abbreviated DW 115) is a route in the Polish voivodeship roads network. On 5 June 2008 the route allowed access with Germany by the border crossing Dobieszczyn - Hintersee and the route was added 900 metres to be able to join with the border. Important settlements along the route Szczecin Tanowo Dobieszczyn Route plan References 115
https://en.wikipedia.org/wiki/Chessboard%20detection
Chessboards arise frequently in computer vision theory and practice because their highly structured geometry is well-suited for algorithmic detection and processing. The appearance of chessboards in computer vision can be divided into two main areas: camera calibration and feature extraction. This article provides a unified discussion of the role that chessboards play in the canonical methods from these two areas, including references to the seminal literature, examples, and pointers to software implementations. Chessboard camera calibration A classical problem in computer vision is three-dimensional (3D) reconstruction, where one seeks to infer 3D structure about a scene from two-dimensional (2D) images of it. Practical cameras are complex devices, and photogrammetry is needed to model the relationship between image sensor measurements and the 3D world. In the standard pinhole camera model, one models the relationship between world coordinates and image (pixel) coordinates via the perspective transformation where is the projective space of dimension . In this setting, camera calibration is the process of estimating the parameters of the matrix of the perspective model. Camera calibration is an important step in the computer vision pipeline because many subsequent algorithms require knowledge of camera parameters as input. Chessboards are often used during camera calibration because they are simple to construct, and their planar grid structure defines many natural interest points in an image. The following two methods are classic calibration techniques that often employ chessboards. Direct linear transformation Direct linear transformation (DLT) calibration uses correspondences between world points and camera image points to estimate camera parameters. In particular, DLT calibration exploits the fact that the perspective pinhole camera model defines a set of similarity relations that can be solved via the direct linear transformation algorithm. To employ this approach, one requires accurate coordinates of a non-degenerate set of points in 3D space. A common way to achieve this is to construct a camera calibration rig (example below) built from three mutually perpendicular chessboards. Since the corners of each square are equidistant, it is straightforward to compute the 3D coordinates of each corner given the width of each square. The advantage of DLT calibration is its simplicity; arbitrary cameras can be calibrated by solving a single homogeneous linear system. However, the practical use of DLT calibration is limited by the necessity of a 3D calibration rig and the fact that extremely accurate 3D coordinates are required to avoid numerical instability. Multiplane calibration Multiplane calibration is a variant of camera auto-calibration that allows one to compute the parameters of a camera from two or more views of a planar surface. The seminal work in multiplane calibration is due to Zhang. Zhang's method calibrates cameras by so
https://en.wikipedia.org/wiki/Local%20pixel%20grouping
In image Noise reduction, local pixel grouping is the algorithm to remove noise from images using principal component analysis (PCA). Image denoising Sensors such as CCD, CMOS or ultrasonic probe may encapsulate noise signal. Noise reduction is commonly used to improve quality of the image. However, techniques such as smoothing filters and many other algorithms may lose local structure of image while denoising the image. More over, efficiency is also taken into consideration. Principal component analysis PCA was invented in 1901 by Karl Pearson, to transform original dataset into linearly uncorrelated PCA domain. PCA works in the way that principal components with larger possible variance are preserved while discarding low variance components. Image denoising by principal component analysis with local pixel grouping(LPG-PCA) was developed by Lei et. in 2010. It is based on the assumption that the energy of a signal will concentrate on a small subset of the PCA transformed dataset, while the energy of noise will evenly spread over the whole dataset. Assume original image is denoted by and noise is denoted by , then the measured image will be . In order to denoising , first a train dataset must be constructed using local pixel group. Using this and apply PCA the noise in the image can be reduced. Construct local pixel group For each pixel in the image, select a window centered at denoted by and a training window centered at . The training window is . Take the pixels in each possible block within the training block yields samples . If the distance between a sample and the center window is smaller than some threshold, then accept the sample. So the train dataset is acquired by put all the accepted sample together as column vectors into a matrix. Denoising using local pixel group First step of this part is centralize and is obtained. By computing the covariance matrix of denoted by , the PCA transformation matrix can be obtained. Apply to we have The covariance matrix of can also be calculated by Shrink the coefficient of by and transform back to , the noise in that pixel is reduced. Apply this to all the pixels in the image and the denoised image can be obtained. Experiments by Lei show that LGP-PCA can effectively preserve the image fine structures while smoothing noise. The solution is competitive compared with other algorithms such as Block-matching algorithm. References External links Lei's homepage and matlab code of LPG-PCA Computer-related introductions in 2010 Image noise reduction techniques
https://en.wikipedia.org/wiki/Making%20Waves%20%28software%29
Making Waves (MW) is computer software designed to produce professional quality audio from basic Windows multimedia PCs. This application was among the first of the 16-bit digital sequencers that evolved from the MS-DOS WAV trackers of the Eighties to become the digital audio workstation software available today including Steinberg Cubase, Pro Tools and ACID Pro. Making Waves enabled a small community of independent artists (originally including Daniel Bedingfield) to use existing hardware to record, sample, mix and render their own original work creating professional-quality audio with a modest investment of less than $100. This same dynamic user community played a significant role in the application's development, suggesting program revisions and performing extensive beta testing. These users were all organized and mentored by Stephen John Steele, the original programmer and developer of Making Waves as well as a founding director of Perceptive Solutions, Spacehead Systems and Making Waves Software Limited. Overview The application's interface integrates a sequencer, mixer, sampler and wave editor compatible with Musical Instrument Digital Interface (MIDI), Virtual Studio Technology (VST) and some DirectX plugins (only effects, not instruments), and the program's key feature is live mixing of MIDI input with VST (instruments and effects) and digital samples including Yamaha XG (EXtended General MIDI) sound libraries. Making Waves Studio renders mp3, wav and MIDI files or can be purchased as an inexpensive audio-only wav sequencer. The early commercial success of this embryonic digital audio workstation (DAW) was relatively brief and seemed to build on two significant events, the release of a stable graphical user interface (GUI) version and the production of a "hit" record and album by an independent artist. First, with the release of the 32-bit Making Waves Studio version in April 1998, Perceptive Solutions had a product compatible with the Windows 95 GUI. The version provided a number of audio features never before or since consolidated at that price point. Next, Daniel Bedingfield's number one UK single was created with Making Waves and released in November 2001. His number two first album of the same name, Gotta Get Through This, soon followed. Making Waves began to gain sales and acceptance within the digital audio community as an affordable professional audio platform and VST host, a complete "recording studio-in-a-box"." While still available for sale, Making Waves lacks a 64-bit version, is not approved for use on Windows 8 and is no longer being maintained following the death of the original developer in 2011. References External links Sound on Sound, August 2002 Sound on Sound, July 2003 MIDI Connections 2003 Katharsis! REMASTERED! Katharsis! on Soundcloud Windows audio Software synthesizers Digital audio workstation software Windows multimedia software
https://en.wikipedia.org/wiki/The%20Drive%20%28TV%20series%29
The Drive is a television documentary franchise on the Pac-12 Network. American football and men's basketball within the Pac-12 Conference are chronicled by The Drive: Pac-12 Football and The Drive: Pac-12 Basketball, respectively, in a series of weekly 30-minute episodes. The football series debuted in 2013, while its basketball counterpart began in 2015. Football In its inaugural season in 2013, The Drive: Pac-12 Football featured the Arizona State Sun Devils and the California Golden Bears. In its second season, The Drive followed the UCLA Bruins, while 2015 had Utah and Oregon State. Starting in 2016, The Drive started to cover all 12 teams in the conference, just like its basketball counterpart, that started in 2015. The show is patterned after Hard Knocks, an HBO series with behind-the-scenes access to National Football League training camps. Production of The Drive is led by Pac-12 Networks’ Senior Coordinating Producer Michael Tolajian, who won two Emmy Awards as producer for NBA Entertainment and HBO’s Real Sports with Bryant Gumbel. His production team includes Jim Jorden, who helped launch Hard Knocks and has won 16 Emmys. Basketball After two seasons of football coverage, The Drive expanded into men's basketball in 2015. Unlike the football series, The Drive: Pac-12 Basketball covers all 12 teams in the conference. Eight episodes were scheduled for 2015, with two teams featured in each of the six initial shows, followed by coverage of the Pac-12 tournament. References External links 2013 American television series debuts 2010s American documentary television series 2010s American reality television series 2020s American documentary television series 2020s American reality television series Pac-12 Conference men's basketball Pac-12 Conference football English-language television shows American sports television series
https://en.wikipedia.org/wiki/Networking%20in%20Purgatory
Networking in Purgatory is the third album by Australian folk-rock band Ned Collette + Wirewalker, released in 2014. Writing in The Quietus, reviewer Kate Hennessy praised the album as "very good, even exceptional". She described Collette's voice as "sibilant, astringent and at times vaguely waspish ... a voice that alchemises its flaws into powerful strengths, sitting neither above nor below the mix but slicing through it in both directions, reminiscent of the Brians (Eno and Ferry) and the Davids (Byrne and Bowie)". She noted of its lyrics that Collette's "bitterness runs cold and constant even beneath songs that, sonically, express a kind of genial largesse, a contradiction that is this record's most brilliant aspect". The Sydney Morning Herald described it as "a warm, lush record bursting (quietly) with a clutch of songs that dip and dive like springtime swallows, as intricate as they are robust ... It's a considered album, one for headphones with time on one's hands, and it rewards handsomely." Track listing (all songs by Ned Collette & Wirewalker) "At the Piano" — 4:33 "Networking in Purgatory" — 0:46 "Bird" — 4:06 "Falls" — 3:35 "Vanitas Quack" — 4:32 "Opiate Eyes" — 2:26 "Across the Frozen Bridge" — 6:17 "Echoes Toes" — 4:35 "Helios" — 2:31 "A Lawyer or a Gimmick" — 4:00 "Meltemi " — 2:43 Personnel Ned Collette — voice, guitars, bass, synths, mellotron, drum machine, percussion Joe Talia — drums, percussion, synths, revox James Rushford — backing vocals, viola, synths, ocarina, piano ("At the Piano", "Across the Frozen Bridge") Ben Bourke — bassoon, bass ("At the Piano", "Across the Frozen Bridge") Erkki Veltheim — violin ("Opiate Eyes") References Ned Collette albums 2014 albums Dot Dash Recordings albums
https://en.wikipedia.org/wiki/SBS9
SBS9 is a Dutch commercial television channel owned by Talpa Network through Talpa TV. The channel was launched on 1 January 2015 at 12:00 CET with a movie marathon. The channel can be received via all television providers in the Netherlands. Other channels of the group in the Netherlands are SBS6, Net5 and Veronica. History SBS Broadcasting announced its plans for a launch of a fourth channel in the Netherlands already in 2009. On 22 August 2014, the company officially released its definite plans for a new channel targeting female viewers. The channel got its name SBS9 on 27 September 2014. The launch date was set in January 2015. On 10 April 2017 Talpa Holding acquired a 67% stake from Sanoma Media Netherlands. Programming Mainly films and television series with every day of the week a different theme: Mondays: Various Tuesdays: Comedy Wednesdays: Action Thursdays: Drama Fridays: Family Saturdays: Thriller Sundays: Romance References External links Television channels in the Netherlands Television channels and stations established in 2015 Mass media in Amsterdam 2015 establishments in the Netherlands Talpa Network
https://en.wikipedia.org/wiki/The%20Royals%20%28TV%20series%29
The Royals is an American primetime television drama soap opera that premiered on E! on March 15, 2015. Created by Mark Schwahn and starring Elizabeth Hurley, it is the network's first scripted series. It began as a loose adaptation of the 2011 Michelle Ray novel Falling for Hamlet. E! renewed it for a second season two months before its debut, and picked up a third season on January 5, 2016. E! renewed it for a fourth season on February 16, 2017, which began airing on March 11, 2018. E! cancelled the series after four seasons in August 2018. Lionsgate Television was shopping the series to other networks with discussions for a pick-up by sister network Pop, but on September 24, Lionsgate failed to find a new home for the series and it was officially cancelled. Hurley stars as Queen Helena, a fictional contemporary queen consort of England, along with William Moseley and Alexandra Park as her twin children, Prince Liam and Princess Eleanor; Jake Maskall as Helena's brother-in-law and nemesis, the new King Cyrus; Tom Austen as Eleanor's bodyguard and blackmailer, Jasper Frost; and Oliver Milburn as Ted Pryce, the Royal Family's head of security. Season 1 also starred Vincent Regan as Helena's husband, King Simon, and Merritt Patterson as Liam's love interest, Ophelia Pryce. Plot summary Helena is the matriarch of a fictional contemporary British royal family who must struggle with both common and atypical family dramas while in the public eye. Twins Prince Liam and Princess Eleanor enjoy the hedonistic pleasures available to them as royals, knowing that their older brother Robert bears the responsibility of being heir to the throne of England. But when Robert is killed, the family is thrown into disarray and a grieving King Simon fears for the future of the monarchy. Unexpectedly next in line for the throne, Liam must adjust to his new role while navigating his attraction to Ophelia, the American daughter of the royal head of security. His self-destructive sister Eleanor finds rock-bottom when her bodyguard turns out to be a conman. Trying to preserve the status quo and keep the royal family under her control, Queen Helena allies herself with Simon's brother Cyrus to preserve their way of life at any cost. Cast Main Recurring Production Development In April 2013, E! announced several scripted projects in development, including The Royals, "a contemporary family ensemble… steeped in all of the regal opulence of the British Monarchy and framed by Shakespeare's Hamlet." Deadline Hollywood reported in June 2013 that E! would produce pilots for The Royals and another series named Songbyrd, which would be its first scripted pilots to date. The Royals was picked up for series in March 2014, to be shot in the United Kingdom and scheduled to debut in 2015. Shooting for the first season began in London in June 2014. In August 2014, E! released its first promotional trailer. The first season consisted of ten episodes. In December 2014, E! announced t
https://en.wikipedia.org/wiki/Voivodeship%20road%20116
Voivodeship road 116 (, abbreviated DW 116) is a route in the Polish voivodeship roads network. The route links Nojewo with the cross road of the Voivodeship Road 184 and Voivodeship Road 186 near Dobrojewo. Route plan References 115
https://en.wikipedia.org/wiki/Voivodeship%20road%20117
Voivodeship road 117 (, abbreviated DW 117) is a route in the Polish voivodeship roads network. The route links DW 180 with Jędrzejewo and was formerly DW 309 before 2017. Former route DW 117 originally ran from Obrzycko to Ostroróg. This was downgraded to a powiat road on 23 December 2015. Important settlements along the route Górnica Biernatowo Średnica Jędrzejewo Route plan References 117
https://en.wikipedia.org/wiki/List%20of%20countries%20by%20past%20military%20expenditure
This is a list of countries by past military expenditure, starting 1987. Methodology Figures for the tables below are provided by the Stockholm International Peace Research Institute (SIPRI) database. They are presented in millions of United States dollars in current prices, converted at the exchange rate for the given year. If there is no data for a particular year, a cell is left blank. Although the database includes statistics for over 150 countries, per SIPRI's Terms and Condition permission is needed to directly reproduce more than 10% of the database. 1987–1989 * indicates "Military of COUNTRY" links. 1990–1999 * indicates "Military of COUNTRY" links. 2000–2009 * indicates "Military of COUNTRY" links. 2010–2019 * indicates "Military of COUNTRY" links. See also Military budget List of countries by military expenditures List of countries by military expenditure per capita References Expenditures Military Military economics Military budgets
https://en.wikipedia.org/wiki/Voivodeship%20road%20118
Voivodeship Road 118 (, abbreviated DW 118) is a route in the Polish voivodeship roads network. The route links Średnica with Nowe Dwory. Important settlements along the route Średnica Zielonowo Nowe Dwory Route plan References 118
https://en.wikipedia.org/wiki/Edimax
Edimax Technology Co., Ltd. () is a Taiwanese manufacturer of data networking products. It also operates in the telephone and telegraph apparatus sector. The company was founded in 1986 and has been listed at the Taiwan Stock Exchange since 2001. See also List of companies of Taiwan References External links Open source software support Manufacturing companies based in Taipei Telecommunications companies of Taiwan Networking hardware companies Taiwanese companies established in 1986 Electronics companies of Taiwan Companies listed on the Taiwan Stock Exchange Taiwanese brands
https://en.wikipedia.org/wiki/UXP/DS
UXP/DS is a discontinued Unix operating system developed by Fujitsu for its line of workstations and network servers. UXP/DS is based on AT&T System V Release 4 (SVR4), and targets Fujitsu's DS/90 7000 series of computers, as well as some GP7000 series computers. History In 1991, Fujitsu announced the DS/90 7000 series of workstations and servers, powered by SPARC processors, and running the UXP/DS operating system. In 1998, Fujitsu's new GP7000 series (GRANPOWER 7000) was divided into three parts. Series "S" represented their previous systems running UXP/DS. Series "D" represented their new systems also running UXP/DS. Series "F" represented their new systems running Solaris operating system. GP7000F running Solaris became the basis for later lines of Fujitsu Unix servers. In 1999, UXP/DS on the DS/90 7000 series was one of the reference platforms for the Common Desktop Environment (CDE). In 2000, when Fujitsu released its new PRIMEPOWER line of Unix servers, only Solaris was available as an option for the operating system. See also EWS-UX Sony NEWS Fujitsu VP2000 optional running UXP/M for Mainframes as Vector and Parallel Processors References External links IPSJ Computer Museum: FUJITSU DS/90 7000 Series Fujitsu software UNIX System V
https://en.wikipedia.org/wiki/Malaysia%20Airlines%20Flight%20370%20satellite%20communications
The analysis of communications between Malaysia Airlines Flight 370 and Inmarsat's satellite telecommunication network provide the primary source of information about Flight 370's location and possible in-flight events after it disappeared from military radar coverage at 2:22 Malaysia Standard Time (MYT) on 8 March 2014 (17:22 UTC, 7 March), one hour after communication with air traffic control ended and the aircraft departed from its planned flight path while over the South China Sea. Flight 370 was a scheduled commercial flight with 227 passengers and 12 crew which departed Kuala Lumpur, Malaysia at 0:41 and was scheduled to land in Beijing, China at 6:30 China Standard Time (6:30 MYT; 22:30 UTC, 7 March). Malaysia has worked in conjunction with the Australian Transport Safety Bureau to co-ordinate the analysis, which has also involved the UK's Air Accidents Investigation Branch, Inmarsat, and US National Transportation Safety Board. Other groups have also made efforts to analyse the satellite communications, albeit challenged by a lack of publicly available information for several months after the disappearance. On 29 July 2015, debris was discovered on Réunion Island which was later confirmed to have come from Flight 370; it is the first physical evidence that Flight 370 ended in the Indian Ocean. During flight, the aircraft maintains a datalink with a satellite communication network for data and telephone calls. The datalink connects the aircraft and a ground station via satellite, which translates (changes) the signal's frequency and amplifies the signal; the ground station is connected to telecommunication networks which allows messages to be sent to and received from other locations, such as the airline's operations centre. Normal communications from Flight 370 were last made at 1:07 MYT. The datalink between the aircraft and satellite telecommunication network was lost at some point between 1:07 and 2:03, when the aircraft did not acknowledge a message sent from the ground station. Three minutes after the aircraft left the range of radar coverage—at 2:25—the aircraft's satellite data unit (SDU) transmitted a log-on message, which investigators believe occurred when the SDU restarted after a power interruption. Between the 2:25 message and 8:19, the SDU acknowledged two ground-to-aircraft telephone calls, which were not answered, and responded to automated, hourly requests from the ground station that were made to determine whether the SDU was still active. None of the communications from 2:25-8:19 contain information about the aircraft's location. The aircraft's final transmission at 8:19 was a log-on message; the aircraft did not respond to a message from the ground station at 9:15. Investigators believe the 8:19 log-on message was made when the SDU was restarting after the aircraft ran out of fuel and the aircraft's auxiliary power unit was started. The search for Flight 370 was launched in Southeast Asia near the location of the l
https://en.wikipedia.org/wiki/Centripetal%20%28disambiguation%29
Centripetal usually refers to centripetal force, a force that keeps a body on a curved path. It may also refer to: Centripetal acceleration Centripetal Catmull–Rom spline (computer graphics) Centripetal harmony Centripetal obesity Centripetal Spring Armchair Centripetal structure (theoretical linguistics) – see Lucien Tesnière See also Centrifugal (disambiguation) History of centrifugal and centripetal forces
https://en.wikipedia.org/wiki/Scottish%20Unemployed%20Workers%20Network
The Scottish Unemployed Workers Network (SUWN) is a left-leaning political organisation in Scotland which advocates on behalf of unemployed working-class people. It aims to be "a source of advice and information" as well as a vehicle for campaigning and organisation. The organisation is based principally in Dundee and campaigns heavily on the issues of welfare sanctions and poverty. The organisation has highlighted the struggle of many people to find jobs and the challenges in living on benefits. In December 2014, the organisation published a detailed report claiming that Scottish welfare claimants are being hit by excessive and arbitrary sanctions as a result of UK Government welfare reforms. References Political organisations based in Scotland
https://en.wikipedia.org/wiki/Voivodeship%20road%20119
Voivodeship road 119 (, abbreviated DW 119) is a route in the Polish voivodeship roads network. The route links the village of Radziszewo with Gardno. Important settlements along the route Radziszewo Chlebowo Wysoka Gryfińska Gardno Route plan References 119
https://en.wikipedia.org/wiki/Until%20the%20Ribbon%20Breaks
Until the Ribbon Breaks (often abbreviated to UTRB), is a British band consisting of the frontman Pete Lawrie-Winfield (lead vocals, keyboards, programming, percussion, brass, guitar) and Elliot Wall (drums, programming, backing vocals). The band was founded in Cardiff, Wales in 2012, initially as Lawrie-Winfield's solo project and "blends genres like electronic, pop, rock, and hip-hop, but it’s all done with a sharp alternative edge". History 2012: Founding The group began as the solo project of Pete Lawrie Winfield, from Cardiff, Wales. Both his parents were musicians, and Winfield grew up to listening to artists such as Marvin Gaye, Stevie Wonder, and Elton John. Winfield went to school to study film, but found he preferred music after he started making soundtracks for his own movies. He has stated, "Until The Ribbon Breaks started as a concept I had for one record. Ribbon being film or a cassette tape as the whole thing was based around this idea of the combination of music and film. At the time I made it I didn't know how far I was going to go with it." 2013: Early releases Pitchfork Media stated on 20 June 2013, Until the Ribbon Breaks' early single "Pressure" "was written during a period when Winfield was sleeping on the floor of his studio with no concrete plan for his career". For the music video, Winfield combined scenes from David Lynch's 1997 thriller Lost Highway, stating; "Lost Highway seemed like the perfect match visually for the mood I was trying to convey...The film feels willfully claustrophobic and always on the verge of losing any sense of continuity." With the track "2025", released in June 2013, Pitchfork writes that Winfield "manages to paint a starkly provocative picture of emotional decay, exhaling his vocals with a painfully resigned rasp circled by lurching drum machines, deflating synths, and industrial clanging. '2025' is a beautiful dirge, a bleak track kept barely afloat by an aching, human sadness". Winfield soon recruited James Gordon and Elliot Wall to join the band. To create their debut album, the band "buried themselves in a hidden studio space armed with just a film projector, a microphone, a drum machine, and a piano". The trio would project films without sound on the studio walls while working, with Winfield stating "I’d shut the sound off, watch the movies, and make music to them. It was everything from David Lynch to Terrence Malick”. The band finished their first tour of North America in 2013, in support of Lorde, and also finished a five-date tour across the United States with Phantogram that year. Spin named the Until The Ribbon Breaks one of the Best 5 Artist of the Month for June 2013. As of 2013, they released remixes of The Weeknd's "Wicked Games," Sam Smith's "Nirvana," and Lorde's "Royals." UTRB was featured on Run the Jewels' "Job Well Done" in 2013. 2014–Present: Recent projects In 2014, the band released a remix of "Sights" by London Grammar, in which an accompanying music video was
https://en.wikipedia.org/wiki/National%20Cybersecurity%20Center%20of%20Excellence
The National Cybersecurity Center of Excellence (NCCoE) is a US government organization that builds and publicly shares solutions to cybersecurity problems faced by U.S. businesses. The center, located in Rockville, Maryland, was established in 2012 through a partnership with the National Institute of Standards and Technology (NIST), the state of Maryland, and Montgomery County. The center is partnered with nearly 20 market-leading IT companies, which contribute hardware, software and expertise. The NCCoE asks industry sector members about their cybersecurity problems, and then selects issues that affect an entire sector or reach across sectors. The center forms a team of people from cybersecurity technology companies, other federal agencies and academia to address each problem. The teams work in the center's labs to build example solutions using commercially available, off-the-shelf products. For each example solution, the NCCoE publishes a practice guide, a collection of the materials and information needed to deploy the example solution, and makes it available to the general public. The center's goal is to "accelerate the deployment and use of secure technologies" that can help businesses improve their defenses against cyber attacks. History NIST The NCCoE is part of NIST, a non-regulatory federal agency within the U.S. Department of Commerce that develops measurement standards and conducts research in measurement science. According to the NIST website, the Federal Information Security Management Act of 2002 (FISMA) "reaffirmed NIST's role of developing information security standards (Federal Information Processing Standards) and guidelines for non-national security federal information systems and assigned NIST some specific responsibilities, including the development of: Standards to be used by Federal agencies to categorize information and information systems based on the objectives of providing appropriate levels of information security according to a range of risk levels; Guidelines recommending the types of information and information systems to be included in each category; and Minimum information security requirements (management, operational and technical security controls) for information and information systems in each category." Many private sector organizations voluntarily adopt these standards, guidelines and security requirements. As a NIST center, the NCCoE is an applied space for the demonstration of standards-based approaches to cybersecurity. Executive Order 13636, "Improving Critical Infrastructure Cybersecurity" President Barack Obama issued Executive Order 13636, "Improving Critical Infrastructure Cybersecurity", in February 2013 tasking NIST to create a cybersecurity framework that helps organizations mitigate risks to the nation's essential systems such as power generation and distribution, the financial services sector, and transportation. NIST released the Framework for Improving Critical Infrastructure Cybersecur
https://en.wikipedia.org/wiki/List%20of%20suicides%20attributed%20to%20bullying
The following is a list of suicides attributed to bullying — both in-person and via the Internet (aka cyberbullying). For a list of people who died from suicide, regardless of reason, see List of suicides and List of suicides in the 21st century. Victims August Ames (1994–2017) (born Mercedes Grabowski), age 23, was a Canadian pornographic actor and model. On December 5, 2017, Ames was found dead after hanging herself. Her death was ruled a suicide by the Ventura County Medical Examiner's Office. Media outlets have insinuated Ames died by suicide following successive comments on Twitter, in which she defended her refusal to perform in a pornographic movie with a man who had previously worked in gay pornography, and sparking an "online firestorm". Ames wrote that the decision was out of concern for her health. Some members of the gay community suggested her comments were homophobic and ill-informed about STI testing in the adult industry. Friends said she suffered from depression, and Ames had previously discussed struggles with bipolar disorder and "multiple personality" disorder. Jadin Bell (1997–2013), age 15, was an Oregon youth known for his suicide which raised the national profile on youth bullying and gay victimization in bullying. Bell, a gay teenager, was allegedly intensely bullied both in person and on the Internet because he was gay. He was a member of the La Grande High School cheerleading team in La Grande, Oregon, where he was a sophomore. On January 14, 2013, Bell went to a local elementary school and hanged himself from the play structure. He did not immediately die from the strangulation, and was rushed to the emergency room, where he was kept on life support. The Associated Press reported that a spokesman for the Oregon Health and Science University's Portland hospital announced that after being taken off life support Bell died on February 3, 2013. Bell's death was largely reported in the media, starting discussions about bullying, the effect it has on youth, and gay bullying. The Huffington Post, Salon, Oregon Public Broadcasting, GLAAD, PQ Monthly, PinkNews, and many other media outlets reported on Bell's death. The media reported his suicide stemmed from being bullied for being gay, which Bell's father fully believed, stating, "He was hurting so bad. Just the bullying at school. Yeah there were other issues, but ultimately it was all due to the bullying, for not being accepted for being gay." Danny Chen (1992–2011), age 19, was an American U.S. Army soldier from New York City, who had served in the war in Afghanistan. Chen was found dead of a self-inflicted gunshot wound in his living quarters on October 3, 2011, in Kandahar, Afghanistan, after being relentlessly bullied, harassed, tortured, and hazed by his fellow soldiers on the basis of his racial heritage. His death resulted in a military investigation, which led to eight U.S. soldiers being charged for their involvement in Chen's suicide. Four of the eight soldi
https://en.wikipedia.org/wiki/Social%20selling
Social selling is the process of developing relationships as part of the sales process. Today this often takes place via social networks such as LinkedIn, Twitter, Facebook, and Pinterest, but can take place either online or offline. Examples of social selling techniques include sharing relevant content, interacting directly with potential buyers and customers, personal branding, and social listening. Social Selling is gaining popularity in a variety of industries, though it is used primarily for B2B (business-to-business) selling or highly considered consumer purchases (e.g., financial advisory services, automotive, realty). C2C companies (often referred to as direct selling companies) have been using social selling techniques (i.e. relationship building) since far before the Internet existed. B2B and B2C companies are now adopting many of those techniques as they are translated to social media platforms. While social selling is sometimes confused with social marketing, there are two key differences. First, social selling is focused on sales professionals, rather than marketing professionals. Second, social selling aims to cultivate one-on-one relationships, rather than broadcast one-to-many messages. social marketing is a powerhouse which can provide right info at right time, but potential consumer expects established relationship rather than just info, so a completely successful selling process requires both social selling and social marketing to act together. Overview The University of British Columbia first established the science of social selling during research. They found that where there are incidental similarities between a buyer and seller, it is more likely a purchase would take place. For example, if two people follow the same sports team, they are more likely to feel a connection. The use of social technology can be used to discover incidental similarities and thus creating a quicker bond with the potential client. Whilst the University of British Columbia discovered the science, it was Nigel Edelshain who was first to put the science into practice and coined the term sales 2.0. The name came from the web 2.0 development in 2006. Edelshain suggested in an interview that he felt the biggest problem with selling was regarding the prospecting phase. The reason is many sales techniques during the 1990s and early 2000s often could only be put into practice once a salesman had contact or was in a meeting. Following the development of sales 2.0, the buzzword social selling emerged. Social selling has become more popular since companies have looked to increase their return on investment of social media interaction. Sales teams within organizations frequently mine data from social media that may help them connect to customers in order to create a more genuine sales lead. The technique frequently focuses on approaching potential clients in a less direct way, meaning they don't interrupt their daily lives with cold calls and hard sells. K
https://en.wikipedia.org/wiki/Voivodeship%20road%20120
Voivodeship Road 120 (, abbreviated DW 120) is a route in the Polish voivodeship roads network. The route links with the border crossing with Germany in Gryfino–Mescherin at the Motaniec junction with the National Road 10. The route runs through Gryfino County and Stargard County. After the village of Gardno the route joins with the S10 Expressway junction Gryfino. Route plan References 120
https://en.wikipedia.org/wiki/Rolls-Royce%20Controls%20and%20Data%20Services
Rolls-Royce Controls and Data Services Limited provides safety critical controls and asset intelligence solutions for industrial power, marine, civil and military aerospace. It produces engine control software, electronic engine controls (EEC), fuel metering units (FMU), fuel pumps and engine actuators for a large number of common commercial and military aircraft. Together these parts comprise the control system for a jet engine, responsible for delivering the correct amount of fuel and maintaining engine safety. History The company was originally part of Lucas Industries, responsible for producing fuel systems for aircraft. From 1938 the company produced fueling systems for second world war aircraft. In August 1996 the company was merged, along with the rest of Lucas Industries, with the North American Varity Corporation to form LucasVarity. In 1999 LucasVarity was acquired by TRW for $6.6bn, which sold the Lucas Aerospace section of the company to Goodrich Corporation for $1.5bn in 2002. In 2008 Rolls-Royce was the second largest producer of aircraft engines worldwide behind General Electric and ahead of Pratt & Whitney. As the focus for engine efficiency shifts towards sophisticated engine control techniques, Rolls-Royce found it could potentially fall behind its competitors as the only one of the three companies to outsource these key components. Rolls-Royce and the Goodrich Corporation saw an opportunity for partnership, combining the existing manufacturing capability of Goodrich with the expertise of Rolls-Royce. The Rolls-Royce Goodrich engine controls joint venture was announced on 14 August 2008 and agreement between the two companies was made on 22 December 2008 to form 'Rolls-Royce Goodrich Engine Control Systems Limited' with the trading company name of Aero Engine Controls. In the formation of Aero Engine Controls both companies contributed over £14m in assets and cash to the joint venture, with Rolls-Royce making a cash payment to the Goodrich Corporation of $100m. Following the acquisition of Goodrich by United Technologies Corporation in July 2012, Rolls-Royce announced it would purchase Goodrich's 50% share of Aero Engine Controls. The purchase was completed on 10 December 2012 and Aero Engine Controls became wholly owned by Rolls-Royce Plc and a part of the Rolls-Royce Group. in 2014 Rolls-Royce announced the merger of two wholly owned subsidiaries, Aero Engine Controls (AEC) and Optimized Systems and Solutions (OSyS), to form a new business, Controls and Data Services (CDS) which would continue to operate as part of the Rolls-Royce Group. The new business would bring together equipment sensors, controls and monitoring systems with performance analysis and health management services, delivering greater asset intelligence at a faster pace. Locations Birmingham, UK Controls and Data Services has one manufacturing and engineering site in Birmingham and employs ~1800 employees. Derby, UK This is a systems and software engi
https://en.wikipedia.org/wiki/Donkey%20Kong%20Country%20%28TV%20series%29
Donkey Kong Country is a Canadian computer-animated musical television series based on the video game Donkey Kong Country from Nintendo and Rare. Co-produced by Nelvana, Medialab Studio L.A. (Season 1) and Hong Guang Animation (Season 2), in association with WIC Entertainment, with the participation of Teletoon—for Season 1, it was produced in co-production with France 2, Canal+, in association with Valar 4. The show was first introduced in France on September 4, 1996, on France 2, on a hybrid live action and motion capture animated block titled La Planète de Donkey Kong (The Planet of Donkey Kong). It later became a full series and broadcast from August 15, 1997 to July 7, 2000. Donkey Kong Country is the first television series that has been primarily animated with motion capture technology. Several elements of the series, such as the Crystal Coconut, appeared in later Donkey Kong video games like Donkey Kong 64 (itself released three years after the show began airing on television). The second season was produced by Taiwanese CGI studio CGCG (which featured updated character models, silkier lighting and key framing), and was announced as early as May 1999. Plot Taking place on Kongo Bongo Island, the show focuses on Donkey Kong, the island's resident hero. Before the series' events, he was chosen as the island's future ruler by a magical artifact known as the Crystal Coconut, which is connected to a spirit known as Inka Dinka Doo. In the present, Donkey Kong must prove he deserves the role through his heroics and by simply guarding the coconut. Alongside various allies such as his best friend and sidekick Diddy Kong and his mentor Cranky Kong, he must protect the Crystal Coconut from various threats, most notably the villainous King K. Rool and his army who long to steal it in order to rule Kongo Bongo. Oftentimes, Donkey Kong has to juggle his guardian duties with his social life, his relationship with Candy Kong, and his love of gorging on bananas. Each episode features two songs performed by the show's various characters. Characters Game characters Donkey Kong — the strong but slow-witted future ruler of Kongo Bongo Island, tasked with guarding the Crystal Coconut. A bit of a slacker, he loves to eat bananas, which are often his main motivation for solving problems. His catchphrase is, "Banana Slamma!" Diddy Kong — DK's excitable sidekick and buddy, who loves to cause mischief and is a fan of movies and TV. He and DK often take turns acting as the voice of reason for one another. Cranky Kong — DK and Diddy's wise, but ill-tempered mentor. He enjoys playing the organ and making potions to solve the heroes’ problems; the latter was soon carried over into Donkey Kong 64. The Crystal Coconut is stored in a globe inside his treehouse. Funky Kong — an eccentric, laid-back friend of DK, who speaks in a Jamaican accent, believes in the spiritual, and is also fond of surfing. Much like in the games, he owns Funky's Flights and often flie
https://en.wikipedia.org/wiki/Hard%20Knocks%20%281987%20TV%20series%29
Hard Knocks is an American comedy-drama television series that aired on the Showtime Network. It featured Bill Maher and Tommy Hinkley as ideologically opposed private detectives looking to make money by solving the problems of their wealthy clients. Synopsis Gower Rhodes and Nick Bronco open a private detective agency in the back of a restaurant to make money by solving cases. However, nothing seems to go their way. Cast Main characters Bill Maher as Gower Rhodes Tommy Hinkley as Nick Bronco Recurring and Guest Roles Judith-Marie Bergan as Maggie Babette Props as Terry James Vallely as Silky Gracie Harrison as Sheila Jesswalters Episodes Reception Critical reception John J. O'Connor of the New York Times called the show "something truly different." The show has also been reviewed in the Spartanburg Herald-Journal as "hard to watch," and in the Chicago Tribune as having woeful writing, unappealing characters, an infantile premise, and as "making programmers at the three networks look like charter members of Mensa." Awards and nominations Hard Knocks was nominated for a CableACE Award in 1988 Sources Hard Knocks (1987) on TV.com Hard Knocks (1987 TV series) on imdb.com Hard Knocks- Series Overview on nytimes.com TV Review; 'Hard Knocks,' Sitcom on nytimes.com US Copyright Office on copyright.gov References English-language television shows 1980s American sitcoms 1987 American television series debuts 1987 American television series endings Television shows set in Los Angeles Showtime (TV network) original programming
https://en.wikipedia.org/wiki/Verification-based%20message-passing%20algorithms%20in%20compressed%20sensing
Verification-based message-passing algorithms (VB-MPAs) in compressed sensing (CS), a branch of digital signal processing that deals with measuring sparse signals, are some methods to efficiently solve the recovery problem in compressed sensing. One of the main goal in compressed sensing is the recovery process. Generally speaking, recovery process in compressed sensing is a method by which the original signal is estimated using the knowledge of the compressed signal and the measurement matrix. Mathematically, the recovery process in Compressed Sensing is finding the sparsest possible solution of an under-determined system of linear equations. Based on the nature of the measurement matrix one can employ different reconstruction methods. If the measurement matrix is also sparse, one efficient way is to use Message Passing Algorithms for signal recovery. Although there are message passing approaches that deals with dense matrices, the nature of those algorithms are to some extent different from the algorithms working on sparse matrices. Overview The main problem in recovery process in CS is to find the sparsest possible solution to the following under-determined system of linear equations where is the measurement matrix, is the original signal to be recovered and is the compresses known signal. When the matrix is sparse, one can represent this matrix by a bipartite graph for better understanding. is the set of variable nodes in which represents the set of elements of and also is the set of check nodes corresponding to the set of elements of . Besides, there is an edge between and if the corresponding elements in is non-zero, i.e. . Moreover, the weight of the edge . Here is an example of a binary sparse measurement matrix where the weights of the edges are either zero or one. The basic idea behind message passing algorithms in CS is to transmit appropriate messages between variable nodes and check nodes in an iterative manner in order to efficiently find signal . These messages are different for variable nodes and check nodes. However, the basic nature of the messages for all variable node and check nodes are the same in all of the verification based message passing algorithms. The messages emanating from variable node contains the value of the check node and an indicator which shows if the variable node is verified or not. Moreover, the messages emanating from check node contains the value of the check node and the remaining degree of the check node in the graph. In each iteration, every variable node and check node produce a new message to be transmitted to all of its neighbors based on the messages that they have received from their own neighbors. This local property of the message passing algorithms enables them to be implemented as parallel processing algorithms and makes the time complexity of these algorithm so efficient. Message passing rules The common rule between all verification based message passing algorithms i
https://en.wikipedia.org/wiki/CNAP
CNAP may refer to: Cnap Twt, a disused quarry that is a Site of Special Scientific Interest in the Vale of Glamorgan, south Wales Calling Name Presentation (CNAP), functionality on phone networks to provide the name identification of the calling party. Centre national des arts plastiques (CNAP), a French institution that supports the visual arts Center for Non-Anthropocentric Play, is a Norwegian Biocentric research Laboratory in the line of the philosopher Arne Naess. Clann na Poblachta (CnaP), a defunct Irish republican political party Colorado Natural Areas Program, a statewide program to protect threatened and endangered species Continuous noninvasive arterial pressure (CNAP), method of measuring arterial blood pressure in real-time
https://en.wikipedia.org/wiki/AT%26T%20Cybersecurity
AT&T Cybersecurity is a managed security service provider for network security, extended detection and response, and endpoints. From traditional computing to edge computing, the company focuses on providing strategic services to customers. AT&T Cybersecurity also offers consulting services that are product neutral. Products AT&T Cybersecurity offers a paid security platform, called Unified Security Management, that integrates threat detection, incident response, and compliance management into one application. Threat applications are offered via hardware, virtual machines, and as a cloud service. Other services that AT&T provides include network vulnerability scanning, vulnerability assessment, and vulnerability management. The Open Threat Exchange (OTX) allows security experts to research and collaborate on threats, compare data, and integrate threat information into their security systems. A big data platform, OTX uses natural language processing and machine learning. Awards Cybersecurity Excellent Awards awarded AT&T Cybersecurity as Gold Winner for AT&T Managed Threat Detection and Response; AT&T Managed Endpoint Security, AT&T SASE, and AT&T Managed Security Services in 2022. Cyber Defense Awards awarded AT&T Cybersecurity as a Market Leader in 3 categories, including Endpoint Security, MSSP and Network Security Management in their Global InfoSec Awards in 2022. Business Intelligence Group named AT&T Managed XDR as a product category winner in their Fortress Cybersecurity Awards in 2022. References AT&T subsidiaries Companies based in San Mateo, California Software companies of the United States Software companies established in 2007 Computer security companies Security compliance 2018 mergers and acquisitions
https://en.wikipedia.org/wiki/Cloud%20robotics
Cloud robotics is a field of robotics that attempts to invoke cloud technologies such as cloud computing, cloud storage, and other Internet technologies centered on the benefits of converged infrastructure and shared services for robotics. When connected to the cloud, robots can benefit from the powerful computation, storage, and communication resources of modern data center in the cloud, which can process and share information from various robots or agent (other machines, smart objects, humans, etc.). Humans can also delegate tasks to robots remotely through networks. Cloud computing technologies enable robot systems to be endowed with powerful capability whilst reducing costs through cloud technologies. Thus, it is possible to build lightweight, low-cost, smarter robots with an intelligent "brain" in the cloud. The "brain" consists of data center, knowledge base, task planners, deep learning, information processing, environment models, communication support, etc. Components A cloud for robots potentially has at least six significant components: Building a "cloud brain" for robots. It is the main object of cloud robotics. Offering a global library of images, maps, and object data, often with geometry and mechanical properties, expert system, knowledge base (i.e. semantic web, data centres); Massively-parallel computation on demand for sample-based statistical modelling and motion planning, task planning, multi-robot collaboration, scheduling and coordination of system; Robot sharing of outcomes, trajectories, and dynamic control policies and robot learning support; Human sharing of "open-source" code, data, and designs for programming, experimentation, and hardware construction; On-demand human guidance and assistance for evaluation, learning, and error recovery; Augmented human–robot interaction through various way (Semantics knowledge base, Apple SIRI like service etc.). Applications Autonomous mobile robots Google's self-driving cars are cloud robots. The cars use the network to access Google's enormous database of maps and satellite and environment model (like Streetview) and combines it with streaming data from GPS, cameras, and 3D sensors to monitor its own position within centimetres, and with past and current traffic patterns to avoid collisions. Each car can learn something about environments, roads, or driving, or conditions, and it sends the information to the Google cloud, where it can be used to improve the performance of other cars. Cloud medical robots a medical cloud (also called a healthcare cluster) consists of various services such as a disease archive, electronic medical records, a patient health management system, practice services, analytics services, clinic solutions, expert systems, etc. A robot can connect to the cloud to provide clinical service to patients, as well as deliver assistance to doctors (e.g. a co-surgery robot). Moreover, it also provides a collaboration service by sharing information between doct
https://en.wikipedia.org/wiki/Application%20Networks
Application Networks Inc. (AppNet) was a Palo Alto-based company, provider of JRisk, a packaged financial risk management software to use on-premises or as part of cloud computing environments. Its customers included global banks. Banks used JRisk for the risk management of their portfolio of securities, OTC contracts and financial derivative transactions. Application Networks Inc. was acquired by Reuters in June 2006. References 1998 establishments in California Cloud computing providers Companies based in Palo Alto, California Companies established in 1998 Software companies based in the San Francisco Bay Area Defunct software companies of the United States 1998 establishments in the United States Software companies established in 1998
https://en.wikipedia.org/wiki/M-theory%20%28learning%20framework%29
In machine learning and computer vision, M-theory is a learning framework inspired by feed-forward processing in the ventral stream of visual cortex and originally developed for recognition and classification of objects in visual scenes. M-theory was later applied to other areas, such as speech recognition. On certain image recognition tasks, algorithms based on a specific instantiation of M-theory, HMAX, achieved human-level performance. The core principle of M-theory is extracting representations invariant under various transformations of images (translation, scale, 2D and 3D rotation and others). In contrast with other approaches using invariant representations, in M-theory they are not hardcoded into the algorithms, but learned. M-theory also shares some principles with compressed sensing. The theory proposes multilayered hierarchical learning architecture, similar to that of visual cortex. Intuition Invariant representations A great challenge in visual recognition tasks is that the same object can be seen in a variety of conditions. It can be seen from different distances, different viewpoints, under different lighting, partially occluded, etc. In addition, for particular classes objects, such as faces, highly complex specific transformations may be relevant, such as changing facial expressions. For learning to recognize images, it is greatly beneficial to factor out these variations. It results in much simpler classification problem and, consequently, in great reduction of sample complexity of the model. A simple computational experiment illustrates this idea. Two instances of a classifier were trained to distinguish images of planes from those of cars. For training and testing of the first instance, images with arbitrary viewpoints were used. Another instance received only images seen from a particular viewpoint, which was equivalent to training and testing the system on invariant representation of the images. One can see that the second classifier performed quite well even after receiving a single example from each category, while performance of the first classifier was close to random guess even after seeing 20 examples. Invariant representations has been incorporated into several learning architectures, such as neocognitrons. Most of these architectures, however, provided invariance through custom-designed features or properties of architecture itself. While it helps to take into account some sorts of transformations, such as translations, it is very nontrivial to accommodate for other sorts of transformations, such as 3D rotations and changing facial expressions. M-theory provides a framework of how such transformations can be learned. In addition to higher flexibility, this theory also suggests how human brain may have similar capabilities. Templates Another core idea of M-theory is close in spirit to ideas from the field of compressed sensing. An implication from Johnson–Lindenstrauss lemma says that a particular number of im
https://en.wikipedia.org/wiki/Symposium%20on%20Discrete%20Algorithms
The Annual ACM-SIAM Symposium on Discrete Algorithms (SODA) is an academic conference in the fields of algorithm design and discrete mathematics. It is considered to be one of the top conferences for research in algorithms. SODA has been organized annually since 1990, typically in January. SODA is jointly sponsored by the ACM Special Interest Group on Algorithms and Computation Theory (SIGACT) and the SIAM Activity Group on Discrete Mathematics, and in format is more similar to a theoretical computer science conference than to a mathematics conference. History The first Symposium on Discrete Algorithms was held in 1990 at San Francisco, organized by David Johnson. In 2012, the ACM Special Interest Group on Algorithms and Computation Theory (ACM SIGACT) and SIAM Activity Group on Discrete Mathematics (SIAG/DM) jointly established SODA Steering Committee to work with SIAM and ACM on organizing SODA. References Theoretical computer science conferences Association for Computing Machinery conferences
https://en.wikipedia.org/wiki/Raymond%20Lau
Raymond Lau or Ray Lau may refer to: Raymond Lau, a developer of StuffIt, a computer software Raymond Lau, a character of The Unwritten Law (film), portrayed by Andy Lau Lau Kong-wah, a Hong Kong politician, also called Ray Lau
https://en.wikipedia.org/wiki/U.S.%20Naval%20Information%20Forces
The Naval Information Forces (NAVIFOR) is an Echelon III command under US Fleet Forces Command, (USFLTFORCOM). It is the Type Command (TYCOM) for meteorology and oceanography, cryptology/SIGINT, cyber, electronic warfare, information operations, intelligence, networks, and space disciplines. Like other TYCOMs, this is the manpower, training, modernization, and maintenance component for these disciplines. NAVIFOR's mission is to support operational commanders ashore and afloat by providing combat-ready information warfare forces, which are forward deployable, fully trained, properly crewed, capably equipped, always ready, well maintained and combat sustainable. The current commander of NAVIFOR is Vice Admiral Kelly Aeschbach. On February 9, 2016, the command was renamed from Navy Information Dominance Forces (NAVIDFOR) to Naval Information Forces as part of the alignment of the Information Dominance Corps under its new name, the Information Warfare Community. In June 2018 Vice Admiral Brian B. Brown took command of NAVIFOR. On May 7, 2021, Vice Admiral Brian B. Brown was relieved by Vice Admiral Kelly A. Aeschbach in a ceremony at a Department of Homeland Security complex in Suffolk, Virginia. List of commanders See also Fleet Cyber Command/Tenth Fleet U.S. Cyber Command U.S. Navy Cyber Forces References External links Naval Information Forces (NAVIFOR) NAVIDFOR on IDC Self Synchronization Commands of the United States Navy Military units and formations established in 2014
https://en.wikipedia.org/wiki/Phoma%20narcissi
Phoma narcissi is a fungal plant pathogen of Narcissus, Hippeastrum and other Amaryllidaceae, where it causes a leaf scorch, neck rot and red leaf spot disease Taxonomy The USDA's Fungal Database states that P. narcissi may be a synanamorph of Stagonosporopsis curtisii (Peyronellaea curtisii (Berk.) Aveskamp, Gruyter & Verkley). References External links Species Fungorum USDA ARS Fungal Database Mycobank Fungal plant pathogens and diseases microspora Fungi described in 1993
https://en.wikipedia.org/wiki/Australian%20National%20Bibliographic%20Database
The Australian National Bibliographic Database (ANBD), formerly part of the Australian Bibliographic Network (ABN) and for some years renamed Kinetica, is a national shared library cataloguing network, hosted by the National Library of Australia. It commenced in 1981 in Australia as the ABN, and after a series of rebrandings and added services, has since 2006 been available through Libraries Australia (the successor to the ABN). In mid-2019, Libraries Australia partnered with Trove, and as of June 2020 is set to be co-branded with Trove. ANBD is Australia's largest single bibliographic resource, containing bibliographic records of published and unpublished sources that form part of an Australian collection, as well as catalogue records of items from the US Library of Congress and other institutions. It includes holdings data, name and subject authority records. It supplies records to Libraries Australia in various supported formats, in order to provide enriched data and support copy cataloguing, thus streamlining services for all libraries in Australia. It is a subscription-based service, via Libraries Australia, for librarians, used for reference, collection development, cataloguing and inter-library loans. It thus also serves as a kind of enhanced union catalogue. History The National Library of Australia (NLA) began investigating the potential for a national shared cataloguing network in the 1970s. The idea behind the network was that, instead of every library in Australia separately cataloguing every item in their collection, an item would be catalogued just once and stored on a single database. Librarians in other libraries could then copy the record, thus bringing about huge savings in efficiency and money. In August 1978, following a feasibility study, the NLA announced a pilot project. The Australian Bibliographic Network (ABN) commenced operations on 2 November 1981, with six participating libraries, which all contributed cataloguing records. During those pre-Internet days, library catalogues were on cards or microfiche, so the use of the digital dabase was seen as revolutionary. The database was known as the Australian National Bibliographic Database (ANBD), while the library network was the Australian Bibliographic Network. The ABN may be seen as the forerunner to Libraries Australia. The National Library established an advisory body, the ABN Network Committee (now Libraries Australia Advisory Committee, or LAAC) to advise the Library on the operation and development of the service. Various state library systems joined the network within the next few years, such as State Library Victoria in 1982, and the first ABN conference was held in Melbourne in 1983. The ABN system was as a multi-sector network, including university, state, public and special libraries. Services to school libraries were provided under a separate national service, the Schools Catalogue Information Service (SCIS), first developed in 1984 as ASCIS. National sta
https://en.wikipedia.org/wiki/Amnon%20Shashua
Amnon Shashua (; born May 26, 1960) is an Israeli computer scientist and businessman. Shashua is the Sachs Professor of Computer Science at the Hebrew University of Jerusalem, the President and chief executive officer (CEO) of the autonomous driving and driver-assistance technology company Mobileye, Co-founder of the artificial vision devices company OrCam, Founder and Owner of digital bank and chairman of the artificial intelligence company AI21 Labs. Biography Amnon Shashua received his B.Sc. in mathematics and computer science from Tel-Aviv University in 1985 and his M.Sc. in computer science in 1989 from the Weizmann Institute of Science under the supervision of Shimon Ullman titled "Structural Saliency". His Ph.D. in brain and cognitive sciences was received from the Massachusetts Institute of Technology (MIT), while working at the Artificial Intelligence Laboratory, in 1993; and his postdoctoral training under Tomaso Poggio at the center for biological and computational learning at MIT. Career Academic Shashua has been on the computer science faculty at the Hebrew University of Jerusalem since 1996. In 1999 he was appointed as an associate professor and in 2003 received full professorship. From 2002 to 2005 he was the head of the engineering and computer science school at the Hebrew University. Shashua has held the Sachs chair in computer science at the Hebrew University since 2007. Shashua's work includes early visual processing of saliency and grouping mechanisms, visual recognition and learning, image synthesis for animation and graphics, theory of computer vision in the areas of multiple-view geometry and multi-view tensors, multilinear algebraic systems in vision and learning, primal/dual optimization for approximate inference in MRF and Graphical models, and (since 2014) deep layered networks. Business In 1995, Shashua founded CogniTens, which was sold to Hexagon AB in 2007. In 1999, Shashua co-founded Mobileye, a company that develops systems-on-chip and computer vision algorithms for driving assistance systems, as well as autonomous driving technology. On August 1, 2014, Mobileye launched its IPO on the NYSE which was the biggest Israeli IPO ever in the US raising approximately $1 billion at a market cap of $5.3 billion. In 2010, Shashua co-founded OrCam, an Israeli company which launched an assistive device for the visually impaired based on computer vision capabilities. In August 2017, Intel acquired Mobileye for approximately $15.3 billion. Shashua became a senior vice president at Intel, in addition to his title of President and CEO of Mobileye. In 2017, he also co-founded AI21 Labs. In October 2022, Mobileye went public again, trading on the Nasdaq Stock Exchange with Shashua as its CEO. Awards and recognition Shashua received his first prize in the 2004 Kaye Innovation award, and the 2005 Mifal HaPayis Landau Prize for Science and Research in the area of Exact Sciences - Robotics. On Israeli Independence Day 2017
https://en.wikipedia.org/wiki/Code%20Project
Code Project (formerly The Code Project) is a community for computer programmers with articles on different topics and programming languages such as web development, software development, C++, Java, and other topics. Once a visitor registers a user account on the site, they can gain reputation which allows users to unlock different privileges such as the ability to store personal files in the user's account area, have live hyperlinks in their profile biography, and more. Members can also write and upload their own articles and code for other visitors to view. Articles can be related to general programming, GUI design, algorithms or collaboration. Most of the articles are uploaded by visitors and do not come from an external source. Nearly every article is accompanied with source code and examples which can be downloaded independently. Most articles and sources are released under the Code Project Open License (CPOL), although the license can be configured by the user. These articles either go through a moderation and editing phase or are immediately posted as unedited reader contributions. Code Project employs a rating and comment system that helps to filter the good articles from the poor. It also has forums, and is a resource for resolving difficult software development issues. Rather than being just a collection of samples, contributors are encouraged to explain concepts and ideas, and discuss design decisions. A separate format, "Tips and Tricks", was introduced in 2010 as a place to post short code snippets that don't fit the requirements for an article. Code Project strives to be a wealth of information and a valuable resource. The site encourages users to share what source code or knowledge they can in order to give back to the community. Code Project also conducts interviews with notable developers. Code Project also awards Code Project Members Choice Awards in various categories. These awards are based on the votes of Code Project members and editors, reflecting which companies and products application developers value most. Users may also be awarded MVP status with Code Project, which is presented to a small handful of people. Code Project's Most Valuable Professional award is given to those members who have contributed the most to the community in both article submissions and in answering questions on the site. The award is given annually. Community There are non-programming forums, where members can discuss news and sporting events, or comment on the latest thread. There is a high volume of posts to these, mainly in 'The Lounge'. They hit the 10-million-member mark in August 2013. Languages Code Project contains articles and code pertaining to the following programming languages: C/C++ (emphasis on Microsoft Foundation Classes, but many other domains are dealt with) C# VB.NET ASP JavaScript Common Lisp Ajax SQL Delphi Java Perl Python Topics Code Project contains articles pertaining to the following topics: Android iOS I
https://en.wikipedia.org/wiki/Charles%20Hamya
Charles Hamya (born 1973) is a Ugandan businessman. He was the Managing Director of MultiChoice Uganda Limited, a digital communications network provider, until his resignation in January 2019. He is reported to be one of the country's wealthiest individuals. He also served as a member of the board of directors of Uganda Airlines from May 2019 to 2022 when the board was suspended amid reports of underperformance, abuse of office and financial mismanagement. He resigned from Uganda Airlines board in January 2022 after being cleared of any wrongdoing by the shareholders. Background and education He was born in Uganda in 1973. He attended the oldest school in Uganda, Mengo Senior School, established in 1895. Career He started out as the Chief Accountant at MultiChoice Uganda Limited, during the early 2000s. He rose to the rank of General Manager and later assumed the position of Managing Director and CEO. In 2015, his monthly salary, excluding allowances, was reported at over USh50.7 million (approximately US$14,000). He is currently the Executive Director of HCH Financial Services and also remains a special advisor to MultiChoice Uganda. Has since been appointed and is the current Board Chairman of MultiChoice Uganda Limited. See also List of wealthiest people in Uganda References External links Piracy Hampering Growth of Pay TV Living people Ugandan businesspeople 1970 births
https://en.wikipedia.org/wiki/Multiple%20kernel%20learning
Multiple kernel learning refers to a set of machine learning methods that use a predefined set of kernels and learn an optimal linear or non-linear combination of kernels as part of the algorithm. Reasons to use multiple kernel learning include a) the ability to select for an optimal kernel and parameters from a larger set of kernels, reducing bias due to kernel selection while allowing for more automated machine learning methods, and b) combining data from different sources (e.g. sound and images from a video) that have different notions of similarity and thus require different kernels. Instead of creating a new kernel, multiple kernel algorithms can be used to combine kernels already established for each individual data source. Multiple kernel learning approaches have been used in many applications, such as event recognition in video, object recognition in images, and biomedical data fusion. Algorithms Multiple kernel learning algorithms have been developed for supervised, semi-supervised, as well as unsupervised learning. Most work has been done on the supervised learning case with linear combinations of kernels, however, many algorithms have been developed. The basic idea behind multiple kernel learning algorithms is to add an extra parameter to the minimization problem of the learning algorithm. As an example, consider the case of supervised learning of a linear combination of a set of kernels . We introduce a new kernel , where is a vector of coefficients for each kernel. Because the kernels are additive (due to properties of reproducing kernel Hilbert spaces), this new function is still a kernel. For a set of data with labels , the minimization problem can then be written as where is an error function and is a regularization term. is typically the square loss function (Tikhonov regularization) or the hinge loss function (for SVM algorithms), and is usually an norm or some combination of the norms (i.e. elastic net regularization). This optimization problem can then be solved by standard optimization methods. Adaptations of existing techniques such as the Sequential Minimal Optimization have also been developed for multiple kernel SVM-based methods. Supervised learning For supervised learning, there are many other algorithms that use different methods to learn the form of the kernel. The following categorization has been proposed by Gonen and Alpaydın (2011) Fixed rules approaches Fixed rules approaches such as the linear combination algorithm described above use rules to set the combination of the kernels. These do not require parameterization and use rules like summation and multiplication to combine the kernels. The weighting is learned in the algorithm. Other examples of fixed rules include pairwise kernels, which are of the form . These pairwise approaches have been used in predicting protein-protein interactions. Heuristic approaches These algorithms use a combination function that is parameterized. The parameters are
https://en.wikipedia.org/wiki/Template%20generator
Template Generator or Template generating software is a tool used for developing website, email, and document templates without manually formatting or writing computer programming language code. Such tools provide a GUI (graphical user interface) for design purposes, and produce the source code or formatted structure for websites, emails, or documents. Categories of Template Generators There are two types of template generators: online and desktop. Online template generators allow users to design templates without downloading a tool onto their personal computer. Users must be online and make an account to begin using an online template generator, and sign in each time they use the tool. Desktop template generators or desktop-based template generators, unlike online, have to be downloaded onto the user's computer. However, this eliminates the need to make an account and sign in before using the tool. CMS Theme Generators CMS templates describe the web templates which are specifically made for use by websites built on content management systems. CMS templates can be categorized according to the number of CMSs available. On that basis, there are many generators which typically generate themes or templates for a particular CMS. The four major CMSs are: WordPress: The web design templates developed for the websites based on WordPress are called WordPress themes. Joomla: Templates developed for Joomla websites are called Joomla templates. Magento : Templates developed for Magento websites are called Magento themes. See also References Graphic design Page layout
https://en.wikipedia.org/wiki/High%20Bandwidth%20Memory
High Bandwidth Memory (HBM) is a computer memory interface for 3D-stacked synchronous dynamic random-access memory (SDRAM) initially from Samsung, AMD and SK Hynix. It is used in conjunction with high-performance graphics accelerators, network devices, high-performance datacenter AI ASICs, as on-package cache in CPUs and on-package RAM in upcoming CPUs, and FPGAs and in some supercomputers (such as the NEC SX-Aurora TSUBASA and Fujitsu A64FX). The first HBM memory chip was produced by SK Hynix in 2013, and the first devices to use HBM were the AMD Fiji GPUs in 2015. High Bandwidth Memory was adopted by JEDEC as an industry standard in October 2013. The second generation, HBM2, was accepted by JEDEC in January 2016. Technology HBM achieves higher bandwidth while using less power in a substantially smaller form factor than DDR4 or GDDR5. This is achieved by stacking up to eight DRAM dies and an optional base die which can include buffer circuitry and test logic. The stack is often connected to the memory controller on a GPU or CPU through a substrate, such as a silicon interposer. Alternatively, the memory die could be stacked directly on the CPU or GPU chip. Within the stack the die are vertically interconnected by through-silicon vias (TSVs) and microbumps. The HBM technology is similar in principle but incompatible with the Hybrid Memory Cube (HMC) interface developed by Micron Technology. HBM memory bus is very wide in comparison to other DRAM memories such as DDR4 or GDDR5. An HBM stack of four DRAM dies (4Hi) has two 128bit channels per die for a total of 8 channels and a width of 1024 bits in total. A graphics card/GPU with four 4Hi HBM stacks would therefore have a memory bus with a width of 4096 bits. In comparison, the bus width of GDDR memories is 32 bits, with 16 channels for a graphics card with a 512bit memory interface. HBM supports up to 4 GB per package. The larger number of connections to the memory, relative to DDR4 or GDDR5, required a new method of connecting the HBM memory to the GPU (or other processor). AMD and Nvidia have both used purpose-built silicon chips, called interposers, to connect the memory and GPU. This interposer has the added advantage of requiring the memory and processor to be physically close, decreasing memory paths. However, as semiconductor device fabrication is significantly more expensive than printed circuit board manufacture, this adds cost to the final product. Interface The HBM DRAM is tightly coupled to the host compute die with a distributed interface. The interface is divided into independent channels. The channels are completely independent of one another and are not necessarily synchronous to each other. The HBM DRAM uses a wide-interface architecture to achieve high-speed, low-power operation. The HBM DRAM uses a 500 MHz differential clock CK_t / CK_c (where the suffix "_t" denotes the "true", or "positive", component of the differential pair, and "_c" stands for the "complementary" on
https://en.wikipedia.org/wiki/Constructive%20cooperative%20coevolution
The constructive cooperative coevolutionary algorithm (also called C3) is a global optimisation algorithm in artificial intelligence based on the multi-start architecture of the greedy randomized adaptive search procedure (GRASP). It incorporates the existing cooperative coevolutionary algorithm (CC). The considered problem is decomposed into subproblems. These subproblems are optimised separately while exchanging information in order to solve the complete problem. An optimisation algorithm, usually but not necessarily an evolutionary algorithm, is embedded in C3 for optimising those subproblems. The nature of the embedded optimisation algorithm determines whether C3's behaviour is deterministic or stochastic. The C3 optimisation algorithm was originally designed for simulation-based optimisation but it can be used for global optimisation problems in general. Its strength over other optimisation algorithms, specifically cooperative coevolution, is that it is better able to handle non-separable optimisation problems. An improved version was proposed later, called the Improved Constructive Cooperative Coevolutionary Differential Evolution (C3iDE), which removes several limitations with the previous version. A novel element of C3iDE is the advanced initialisation of the subpopulations. C3iDE initially optimises the subpopulations in a partially co-adaptive fashion. During the initial optimisation of a subpopulation, only a subset of the other subcomponents is considered for the co-adaptation. This subset increases stepwise until all subcomponents are considered. This makes C3iDE very effective on large-scale global optimisation problems (up to 1000 dimensions) compared to cooperative coevolutionary algorithm (CC) and Differential evolution. The improved algorithm has then been adapted for multi-objective optimization. Algorithm As shown in the pseudo code below, an iteration of C3 exists of two phases. In Phase I, the constructive phase, a feasible solution for the entire problem is constructed in a stepwise manner. Considering a different subproblem in each step. After the final step, all subproblems are considered and a solution for the complete problem has been constructed. This constructed solution is then used as the initial solution in Phase II, the local improvement phase. The CC algorithm is employed to further optimise the constructed solution. A cycle of Phase II includes optimising the subproblems separately while keeping the parameters of the other subproblems fixed to a central blackboard solution. When this is done for each subproblem, the found solution are combined during a "collaboration" step, and the best one among the produced combinations becomes the blackboard solution for the next cycle. In the next cycle, the same is repeated. Phase II, and thereby the current iteration, are terminated when the search of the CC algorithm stagnates and no significantly better solutions are being found. Then, the next iteration is started.
https://en.wikipedia.org/wiki/GOFAI
In the philosophy of artificial intelligence, GOFAI ("Good old fashioned artificial intelligence") is classical symbolic AI, as opposed to other approaches, such as neural networks, situated robotics, narrow symbolic AI or neuro-symbolic AI. The term was coined by philosopher John Haugeland in his 1985 book Artificial Intelligence: The Very Idea. Haugeland coined the term to address two questions: Can GOFAI produce human level artificial intelligence in a machine? Is GOFAI the primary method that brains use to display intelligence? AI founder Herbert A. Simon speculated in 1963 that the answers to both these questions was "yes". His evidence was the performance of programs he had co-written, such as Logic Theorist and the General Problem Solver, and his psychological research on human problem solving. AI research in the 1950s and 60s had an enormous influence on intellectual history: it inspired the cognitive revolution, led to the founding of the academic field of cognitive science, and was the essential example in the philosophical theories of computationalism, functionalism and cognitivism in ethics and the psychological theories of cognitivism and cognitive psychology. The specific aspect of AI research that led to this revolution was what Haugeland called "GOFAI". Western rationalism Haugeland places GOFAI within the rationalist tradition in western philosophy, which holds that abstract reason is the "highest" faculty, that it is what separates man from the animals, and that it is the most essential part of our intelligence. This assumption is present in Plato and Aristotle, in Shakespeare, Hobbes, Hume and Locke, it was central to the Enlightenment, to the logical positivists of the 1930s and to the computationalists and cognitivists of the 1960s. As Shakespeare wrote: Symbolic AI in the 1960s was able to successfully simulate the process of high-level reasoning, including logical deduction, algebra, geometry, spatial reasoning and means-ends analysis, all of them in precise English sentences, just like the ones humans used when they reasoned. Many observers, including philosophers, psychologists and the AI researchers themselves became convinced that they had captured the essential features of intelligence. This was not just hubris or speculation -- this was entailed by rationalism. If it was not true, then it brings into question a large part of the entire Western philosophical tradition. Continental philosophy, which included Nietzsche, Husserl, Heidegger and others, rejected rationalism and argued that our high-level reasoning was limited, prone to error, and that most of our abilities come from our intuitions, our culture, and from our instinctive feel for the situation. Philosophers who were familiar with this tradition were the first to criticize GOFAI and the assertion that it was sufficient for intelligence, such as Hubert Dreyfus and Haugeland. Haugeland's GOFAI Critics and supporters of Haugeland's position, fro
https://en.wikipedia.org/wiki/SPARQL%20Query%20Results%20XML%20Format
A SPARQL Query Results XML(also sometimes called SPARQL Results Document) is a file stores data (value, uri and text) in XML. This document is generally the response by default of a RDF database after a SPARQL query. See also SPARQL SPARQL Query Results JSON Format References Data serialization formats SPARQL
https://en.wikipedia.org/wiki/TVB%20Star%20Awards%20Malaysia
The TVB Star Awards Malaysia () is an annual awards ceremony honoring Cantonese programming achievements in Malaysia. It is produced by TVB Entertainment News, with Astro and MY FM as media partners. The ceremony was previously known as the My Astro On Demand Favourites Awards (), which succeeded the Astro Wah Lai Toi Drama Awards (). The Malaysian television channel Astro Wah Lai Toi, presented by Astro, airs Hong Kong television programmes produced by TVB. In 2005, Astro organised its first awards ceremony, the 2004 Astro Wah Lai Toi Drama Awards, presenting awards to Hong Kong actors and actresses for their acting achievements in TVB television dramas. TVB Entertainment News took over the production of the awards series in 2013, renaming it The TVB Star Awards. It has since become an annual event, and is regarded as a prelude to Hong Kong's TVB Anniversary Awards. The nominations for the TVB Star Awards are jointly determined by Astro and TVB for TVB programmes shown on Astro Wah Lai Toi throughout the designated year. Winners are decided by the Malaysian public. Presently, voting is done through a mobile app produced by TVB and Astro. Categories Current categories Current award categories include: My Favourite TVB Drama Series,...Actor and ...Actress in a Leading Role, ...Actor and ...Actress in a Supporting Role, ...Drama Characters, ...On Screen Couple, and ...Drama Theme Song. These categories have been awarded since 2004. In 2011, My Favourite Most Improved TVB Actor and Actress categories were added. In 2013, My Favourite TVB Host In a Variety Program, ...Variety Program, and ...Enrichment Program awards were added bringing the total to thirteen My Favourite TVB awards. Discontinued or special categories Discontinued or special categories include: Most Unforgettable Slap in 2004. In 2005, categories included: My Favourite Gunshot, My Favourite Beauty, My Favourite Father-figure, and My Favourite Mother-figure. Most Unforgettable Kiss category was awarded in 2004 and 2008. My Favourite Supporting Character and My Favourite Extreme Appearance were awarded between 2006 and 2008 inclusive. Most Unforgettable Scene was awarded for the years 2004–2008. Most Unforgettable Villain was awarded in 2004, 2008 and 2009. My Favourite Legendary Character and My Favourite Outstanding Popularity King were awarded in 2012. Rising TVB Star in Malaysia was awarded in 2014 and Astro MY FM’s Special Pick for TVB Drama Theme Song was awarded in 2015. Honorary awards The TVB Star Achievement Award was first awarded in 2014. Years Favourite TVB Drama Characters References Acting awards Awards established in 2004 Astro Malaysia Holdings Entertainment events in Malaysia Mass media in Malaysia
https://en.wikipedia.org/wiki/Center%20for%20Data-Driven%20Discovery
The Center for Data-Driven Discovery is a multi-division research group at the California Institute of Technology, focusing on the methodologies for handling and analysis of large and complex data sets, facilitating the data-to-discovery process. It supports all applications of data-driven computing in various scientific domains, such as biology, physics, astronomy, geophysics, etc. It also functions as a catalyst for new collaborations and projects between different scientific disciplines, and between the campus and JPL, with especial interest in the sharing and transfer of methodologies, where the solutions from one field can be reapplied in another one. The Center for Data-Driven Discovery is a part of a joint initiative with the Center for Data Science and Technology at the Jet Propulsion Laboratory. It became operational in the fall of 2014. Directors Stanislav George Djorgovski (2014 – present) References Computational science Jet Propulsion Laboratory California Institute of Technology 2014 establishments in California
https://en.wikipedia.org/wiki/Journal%20of%20Interactive%20Advertising
The Journal of Interactive Advertising (JIA) is a peer-reviewed international journal covering the field of interactive advertising, marketing and communication in the constantly expanding networked world. It publishes original research related to advertising using interactive means, including both online and offline, to promote mutual actions among consumers, messages and brands. It covers any aspects of interactive advertising: the roles of interactivity on advertising effectiveness, interactive advertising in global and multi-cultural settings, data analytics and methodological issues, along with more macro aspects such as economic and social impacts of interactive advertising. It is published by Routledge on behalf of the American Academy of Advertising. History The journal was established in Fall 2000 by John D. Leckenby (University of Texas at Austin) and Hairong Li (Michigan State University), who served as founding editors-in-chief. It was an official publication of the Department of Advertising, Public Relations, and Retailing at Michigan State University and the Department of Advertising at The University of Texas at Austin until December 31, 2007. The American Academy of Advertising became its publisher on January 1, 2008. It is currently published (since 2013) by Routledge on behalf of the American Academy of Advertising. Editors-in-chief The following persons have been editor-in-chief: John D. Leckenby (2000-2007) Hairong Li (2000-2011) Steve Edwards (2012-2014) Terry Daugherty (2015-2018) Jooyoung Kim (2019-current) Abstracting and indexing The journal is abstracted and indexed in Scopus and EBSCOhost. References External links American Academy of Advertising Business and management journals Academic journals established in 2000 Biannual journals Taylor & Francis academic journals English-language journals Communication journals
https://en.wikipedia.org/wiki/Drop%20%28company%29
Drop (formerly Massdrop) is an American e-commerce company based in San Francisco, California. In 2023, Corsair acquired Drop, while retaining its original brand and staff. Drop uses data and insights from community to develop and find products that feed their interests in audio products and mechanical keyboards. The Drop community can also learn, share, shop with others, and participate in product development through polls, discussions, and interest checks. History Drop founders Steve El-Hage and Nelson Wu met in Toronto, Canada, where El-Hage was studying economics at the University of Toronto. The two had grown up using online forums as a way to explore their hobbies, but believed these forums had many shortcomings, including disorganized meetups and unreliable group buys. They thought that by combining their forum experience with their interest in bulk buying, they could create a site that would better support enthusiast communities. The pair moved to Silicon Valley, where they met Will Bright and started Massdrop in 2012. Drop changed its name from Massdrop in April 2019. On July 17, 2023, Corsair announced it had acquired Drop. Business model Initially, Drop sold products exclusively from existing manufacturers. Intending to provide a collaborative environment, users were able to purchase as a group and influence the types of products sold, through participation in polls, community discussions, and posts. The company has since introduced exclusive enthusiast targeted private label products under the Drop name. Past Drop products Past products include the Massdrop x Sennheiser HD 6XX headphones, Massdrop x Sennheiser HD 58X headphones, Massdrop CTRL Mechanical Keyboard, Massdrop x Sennheiser PC37X gaming headset, Massdrop x Koss ESP/95X, among others. Funding In September 2014, Drop raised $6.5 million in a Series A round led by Mayfield Fund with additional investment from previous backers Kleiner Perkins Caufield & Byers, First Round Capital, and Cowboy Ventures. In August 2015, the company secured $40 million in Series B funding led by August Capital with additional investment from Mayfield Fund, First Round Capital, and Cowboy Ventures. References External links Drop on Facebook Drop on Twitter Online retailers of the United States
https://en.wikipedia.org/wiki/Lo%20Nuestro%20Award%20for%20New%20Artist%20of%20the%20Year
The Lo Nuestro Award for New Artist of the Year is an honor presented annually by American network Univision. The Lo Nuestro Awards have been held since 1989 to recognize the most talented performers of Latin music. The nominees and winners were originally selected by a voting poll conducted among program directors of Spanish-language radio stations in the United States and also based on chart performance on Billboard Latin music charts, with the results tabulated and certified by the accounting firm Arthur Andersen. Starting from 2004, the winners are selected by the audience through an online survey. The trophy is shaped in the form of a treble clef. The award was first presented in every field awarded on the Lo Nuestro Awards: Pop, Tropical, Regional Mexican and, for one time only, Rock/Alternative; however in 2013 the former categories for new artist were merged in a single one for Best New Artist in the General Field. Mexican band 3Ball MTY won the Lo Nuestro after earning the same recognition at the Latin Grammys; their record Inténtalo was the third-best selling Latin album of 2012 in the United States and received the Lo Nuestro for Regional Mexican Album. The following year two awards were created in the Pop and Tropical fields, with Mexican singer América Sierra winning for Pop New Artist, and Alex Matos earning the Tropical New Artist. In 2015, the nominees were included in only one category and featured solo artists, Aneeka and Johhny Sky, and ensembles, Kent y Tony and Proyecto X. Proyecto X received the award. In 2017, no nominees were announced for New Artist of the Year. Winners and nominees Listed below are the winners of the award for each year, as well as the other nominees for the majority of the years awarded. See also Grammy Award for Best New Artist Latin Grammy Award for Best New Artist References New Artist of the Year Music awards for breakthrough artist Awards established in 2013
https://en.wikipedia.org/wiki/Lo%20Nuestro%20Award%20for%20Regional%20Mexican%20Female%20Artist%20of%20the%20Year
The Lo Nuestro Award for Regional Mexican Female Artist of the Year is an award presented annually by American network Univision.The accolade was established to recognize the most talented performers of Latin music. The nominees and winners were originally selected by a voting poll, conducted among program directors of Spanish-language radio stations in the United States and also based on chart performance on Billboard Latin music charts, with the results being tabulated and certified by the accounting firm Deloitte. At the present time, the winners are selected by the audience through an online survey. The trophy awarded is shaped in the form of a treble clef. The award was first presented to Mexican singer Ana Gabriel in 1992. Mexican-American performer Jenni Rivera holds the record for the most awards with nine, out of ten nominations. Mexican singer Graciela Beltrán is the most nominated performer without a win, with ten unsuccessful nominations. In 2017, the award was not included in the categories. Winners and nominees Listed below are the winners of the award for each year, as well as the other nominees for the majority of the years awarded. See also List of music awards honoring women References Regional Mexican Female Artist of the Year Music awards honoring women Regional Mexican musicians Awards established in 1992
https://en.wikipedia.org/wiki/Approximation-preserving%20reduction
In computability theory and computational complexity theory, especially the study of approximation algorithms, an approximation-preserving reduction is an algorithm for transforming one optimization problem into another problem, such that the distance of solutions from optimal is preserved to some degree. Approximation-preserving reductions are a subset of more general reductions in complexity theory; the difference is that approximation-preserving reductions usually make statements on approximation problems or optimization problems, as opposed to decision problems. Intuitively, problem A is reducible to problem B via an approximation-preserving reduction if, given an instance of problem A and a (possibly approximate) solver for problem B, one can convert the instance of problem A into an instance of problem B, apply the solver for problem B, and recover a solution for problem A that also has some guarantee of approximation. Definition Unlike reductions on decision problems, an approximation-preserving reduction must preserve more than the truth of the problem instances when reducing from one problem to another. It must also maintain some guarantee on the relationship between the cost of the solution to the cost of the optimum in both problems. To formalize: Let and be optimization problems. Let be an instance of problem , with optimal solution . Let denote the cost of a solution to an instance of problem . This is also the metric used to determine which solution is considered optimal. An approximation-preserving reduction is a pair of functions (which often must be computable in polynomial time), such that: maps an instance of to an instance of . maps a solution of to a solution of . preserves some guarantee of the solution's performance, or approximation ratio, defined as . Types There are many different types of approximation-preserving reductions, all of which have a different guarantee (the third point in the definition above). However, unlike with other reductions, approximation-preserving reductions often overlap in what properties they demonstrate on optimization problems (e.g. complexity class membership or completeness, or inapproximability). The different types of reductions are used instead as varying reduction techniques, in that the applicable reduction which is most easily adapted to the problem is used. Not all types of approximation-preserving reductions can be used to show membership in all approximability complexity classes, the most notable of which are PTAS and APX. A reduction below preserves membership in a complexity class C if, given a problem A that reduces to problem B via the reduction scheme, and B is in C, then A is in C as well. Some reductions shown below only preserve membership in APX or PTAS, but not the other. Because of this, careful choice must be made when selecting an approximation-preserving reductions, especially for the purpose of proving completeness of a problem
https://en.wikipedia.org/wiki/Gad%20Landau
Gad Menahem Landau (born 1954) is an Israeli computer scientist noted for his contributions to combinatorial pattern matching and string algorithms and is the founding department chair of the Computer Science Department at the University of Haifa. He has coauthored over 100 peer-reviewed scientific papers. Academic background Landau received his Ph.D. in Computer Science from Tel Aviv University in 1987. From 1988 to the present he has held positions as Assistant, Associate, and Research Professor at Polytechnic University in New York (now called NYU Polytechnic School of Engineering, New York University). In 1995, Landau joined the faculty of the University of Haifa, where he founded the Department of Computer Science and was the first department head. In 2006, Landau was promoted to his current position of full Professor at the University of Haifa. Research Landau's research interests focus on string algorithms, data structures, computational biology, and parallel computation. He has made several profound contributions to these areas, even in the early days of his scientific career. His Ph.D. thesis, supervised by Prof. Uzi Vishkin, includes the fundamental text-book solution for the k-differences problem, solving one of the major open problems in the area at the time. His solution was the first to combine suffix trees and lowest common ancestor queries, and has since inspired many extensions of this technique to other problems. The footprints of Landau's research can be found in almost every subarea of string algorithms, including his foundational work on dynamic programming algorithms for the edit distance problem, his numerous papers on modeling digitized images and 2D matching, incremental sequence alignment, and recently, his work on jumbled pattern matching and compressed text algorithms. He was instrumental in the application of pattern matching techniques to the area of computational biology, working on problems in several diverse areas such as DNA and RNA comparison, clustering, haplotype inference, protein secondary structure prediction, and tandem repeats. Landau's research has been continually funded by the U.S. National Science Foundation, the Israel Science Foundation, and the U.S.-Israel Binational Science Foundation. He received the IBM Faculty award, and was awarded funding from the DFG and Yahoo!. Landau co-chaired the International Symposium on Combinatorial Pattern Matching in both 2001 and 2008. He serves on the editorial board of Journal of Discrete Algorithms, and served as a guest editor for TCS and Discrete Applied Mathematics. He has served on numerous program committees for international conferences, most recently, International Conference on Language and Automata Theory and Applications (LATA), International Symposium on String Processing and Information Retrieval (SPIRE), International Symposium on Algorithms and Computation (ISAAC), Annual Symposium on Combinatorial Pattern Matching (CPM), Workshop on Algo
https://en.wikipedia.org/wiki/Una%20mentira
Una mentira is a Mexican telenovela produced by Televisa for Telesistema Mexicano in 1967. Cast Silvia Derbez Data to highlight Of is soap opera does not have much information. It was filmed in black and white, with a total of 20 chapters. References External links 1967 telenovelas Televisa telenovelas Spanish-language telenovelas 1967 Mexican television series debuts 1967 Mexican television series endings
https://en.wikipedia.org/wiki/Digital%20Nations
The Digital Nations or DN (previously the Digital 5, Digital 7 and Digital 9) is a collaborative network of the world's leading digital governments with a common goal of harnessing digital technology to improve citizens' lives. Members share world-class digital practices, collaborate to solve common problems, identify improvements to digital services, and support and champion the group's growing digital economies. Through international cooperation, the Digital Nations aims to identify how digital government can provide the most benefit to citizens. The group embodies minilateral engagement, where small groups of states cooperate on specific topics with a global impact. Members Estonia, Israel, New Zealand, the Republic of Korea, and the United Kingdom are the founding members of the D5. In February 2018, Canada and Uruguay joined the group to form the D7. In November 2018, Mexico and Portugal joined to form the D9. Denmark joined as the tenth member of Digital Nations in November 2019. The following government departments lead their country's engagement with the DN: Treasury Board of Canada Secretariat Agency for Digitisation, Danish Ministry of Finance Ministry of Economic Affairs and Communications of the Republic of Estonia National Digital Affairs Directorate in the Israeli Ministry of Economy in the Government of Israel National Digital Strategy Coordination, President's Office of the Government of Mexico Department of Internal Affairs of the Government of New Zealand Ministry for Modernisation of the State and Public Administration of the Government of Portugal Ministry of the Interior and Safety of the Government of the Republic of Korea Department for Digital, Culture, Media and Sport of the Government of the United Kingdom Agency for e-Government and Information Society at the President's Office of the Government of Uruguay Charter In 2014, the founding members signed a charter committing to share and improve upon the participant nations' practices in digital services and digital economies. Updated to reflect a growing membership, the DN Charter outlines a mutual commitment to digital development and leadership through nine core principles: User needs – the design of public services for the citizen Open standards – a commitment to credible royalty-free open standards to promote interoperability Open source – future government systems, tradecraft, standards and manuals are created as open source and are shareable between members Open markets – in government procurement, create true competition for companies regardless of size. Encourage and support a start-up culture and promote growth through open markets Open government (transparency) – be a member of the Open Government Partnership and use open licenses to produce and consume open data Connectivity – enable an online population through comprehensive and high-quality digital infrastructure Digital skills and confidence – support children, young people and adults in
https://en.wikipedia.org/wiki/Seabird%20Exploration
SeaBird Exploration () is a global provider of marine 2D and 3D seismic data and associated products and services to the oil and gas industry. The Company is listed on the Oslo Stock Exchange with headquarters in Cyprus. They also have regional offices in Houston, Texas and Oslo. The company operate a fleet of six seismic vessels, specialising in long offset 2D and shallow water 3D seismic data acquisition. During autumn 2014 it became known that Seabird Exploration operated controversial seismic surveys off the coast of Western Sahara. Moroccan oil exploration has previously been considered illegal under international law according to the UN Office of Legal Affairs. The company later apologized for its operations in Western Sahara. References Oilfield services companies Companies listed on the Oslo Stock Exchange Technology companies of Cyprus
https://en.wikipedia.org/wiki/Billboard%20Year-End%20Hot%20100%20singles%20of%202014
The Billboard Hot 100 is a chart that ranks the best-performing singles of the United States. Its data, published by Billboard magazine and compiled by Nielsen SoundScan, is based collectively on each single's weekly physical and digital sales, as well as airplay and streaming. Throughout a year, Billboard will publish an annual list of the 100 most successful songs throughout that year on the Hot 100 chart based on the information. For 2014, the list was published on December 9, calculated with data from December 7, 2013 to November 29, 2014. Katy Perry was the top Hot 100 artist of 2014, with "Dark Horse", ranked as the number-two song of the year and featuring Juicy J, the highest of her three placements on the list. This was the first time in eight years that a male artist topped the chart with a non-collaboration. List See also 2014 in American music List of Billboard Hot 100 number-one singles of 2014 List of Billboard Hot 100 top-ten singles in 2014 References 2014 record charts Lists of Billboard Year-End Hot 100 singles
https://en.wikipedia.org/wiki/Arria%20NLG
Arria NLG plc is a New Zealand-based company with headquarters in the US. Arria offers Artificial Intelligence technology in data analytics and information delivery. It is one of the pioneering companies in the space of automatic text generation, with a focus on Natural Language Generation (NLG). When it floated on London's Alternative Investment Market (AIM) in December 2013, it was valued at over £160 million. However, Arria was later delisted from the stock exchange. Subsequently, Arria has raised over US$100 million from private sources. Arria's technology is based on three decades of scientific research in the field of Natural Language Generation (NLG). History The company was founded in 2009 under the name Data2Text Limited by Professor Ehud Reiter, Senior Lecturer Dr Yaji Sripada, and post-doctoral researcher Dr Ross Turner from the NLG research group at the University of Aberdeen, and meteorologist/entrepreneur Ian Davy. In May 2012, Data2Text joined forces with a specialist software development and marketing firm, Arria NLG (then a limited company), which took a 20% stake in Data2Text. In late 2013, Arria NLG acquired the remaining 80% of Data2Text, and in December 2013 Arria NLG converted to a public listed company and was floated on the AIM. In September 2018, Arria shareholders approved a scheme of arrangement that placed a New Zealand holding company (Arria NLG Limited) over the original Arria UK company and its direct subsidiary, now known as Arria Data2Text Limited. In late 2018 Arria located its global headquarters in Morristown, New Jersey, and now maintains offices in New Zealand, Scotland, Australia, and British Columbia, Canada. Technology/Science Arria's technology analyzes large datasets to derive patterns, facts and insights, before structuring this information in the best possible manner to build a narrative expressed in written text or voice that is valuable, fluent and informative says Neil Burnett, CTO to Arria NLG. To reach this goal, the Arria NLG Engine, a cloud-based enterprise software platform, automatically recognises patterns in large volumes of complex data, which are then distilled into a narrative description of the most significant information. The NLG Engine consists of two components: The analysis and interpretation component takes raw transactional or sensor data and turns it into information using rules based on the knowledge of a domain expert. The NLG component communicates this information in natural language, based on general linguistic rules augmented with industry-specific terminology and usage. Arria NLG's capabilities are rooted in the scientific research conducted since the 1980s by its founder and Chief Scientist, Professor Ehud Reiter, and former Chief Technology Officer Dr Robert Dale. Arria has been awarded over 40 US patents in the NLG field. Among Arria's founders are Professor Ehud Reiter and Dr Yaji Sripada, both currently teaching and researching in the Department of Computi
https://en.wikipedia.org/wiki/Confederation%20of%20European%20Data%20Protection%20Organisations
The Confederation of European Data Protection Organisations (CEDPO) is a European umbrella organisation of data protection organisations. Data protection umbrella organisation CEDPO was founded in September 2011 by national data protection organisations as their European umbrella organisation, so far (2014) without any explicit legal form. CEDPO pursues to promote the role of the Data Protection Officer and to provide advice on balanced, practicable, and effective data protection. In addition, CEDPO aims to contribute to a better harmonisation of data protection law and practices in the European Union (EU) / European Economic Area (EEA). Founder members The four founder members of CEDPO are the Association française des correspondants à la protection des données à caractère personnel (AFCDP, France), the Asociación Profesional Española de Privacidad (APEP, Spain), the Gesellschaft für Datenschutz und Datensicherheit e.V. (GDD, Germany) and the Nederlands Genootschap van Functionarissen voor de Gegevensbescherming (NGFG, Netherlands). Members Present legal entities of CEDPO include: Association of Data Protection Officers (ADPO), Ireland, http://www.dpo.ie/ Association Française des Correspondants à la Protection des Données à Caractère Personnel (AFCDP), France, http://www.afcdp.net/ Asociación Profesional Española de Privacidad (APEP), Spanien, http://www.apep.es/ , Austria, http://www.argedaten.at/ Association Data Protection Officer (ASSO DPO), Italy, https://www.assodpo.it/ , Germany, https://www.gdd.de/ Nederlands Genootschap van Functionarissen voor de Gegevensbescherming (NGFG), Netherlands, http://www.ngfg.nl/ Stowarzyszenie Administratorów Bezpieczeństwa Informacji (SABI), Poland, http://www.sabi.org.pl/ Associação de Encarregados de Proteção de Dados (AEPD), Portugal, https://www.aepd.pt/ Asociația Specialiștilor în Confidențialitate și Protecția Datelor (ASCPD), Romania, https://ascpd.ro/ References External links Data protection 2011 establishments in Europe Organizations established in 2011
https://en.wikipedia.org/wiki/Zoomdata
Zoomdata is a business intelligence software company that specializes in real-time data visualization of big data, streaming data, and multisource analysis. The company's products are deployable on-prem, in the cloud, and embedded in other applications. SAP Data Visualization by Zoomdata is a SaaS version of Zoomdata for SAP customers. On June 10, 2019, Zoomdata was acquired by Logi Analytics for an undisclosed sum. Product and Differentiators Zoomdata sells a data visualization and analytics platform designed for people to explore and analyze vast quantities of data and near-real-time data. The product is different from other offerings in the business intelligence industry in several ways. One distinction is due to a patent the company holds around "Data Sharpening" to visualize big data. The user's dashboard "sharpens" and becomes clearer as more data is processed, . Matt Asay of readwrite.com compared it to watching a streaming movie, where you see some results immediately, soon followed by the whole. The Zoomdata web software also includes a Data DVR with a "Live mode" feature so dashboard visualizations can be updated in near-real-time, paused, rewinded, and fast-forwarded at different speeds. Zoomdata claims that their product is intended for business users to explore "modern" data on their own. They claim that unlike traditional business intelligence products that are designed to work with relational databases and are SQL-centric, Zoomdata "Smart Data Connectors" connect to a wide variety of modern data sources and can retrieve data using SQL, native APIs, or a combination of both SQL and native APIs. This allows users to work with data in such disparate systems as search-engine databases like Elasticsearch, big data Hadoop databases like Apache Impala, cloud data warehouses like Snowflake, and more. The company offers several methods of working with multiple databases at the same time, including a data blending feature they call Data Fusion. Another distinction is that Zoomdata pushes down ad-hoc queries, filters, groupings (aggregations), and even calculations to existing high-performing databases. This is in contrast to solutions that take custody of data in a proprietary system, such as Power BI import and Tableau extract, and is also more open and flexible than Arcadia Data's bet on Hadoop with a tightly-coupled, converged BI platform. The company claims that its advanced support for pushdown processing takes advantage of investments in modern, high-performing data platforms, and since data does not need to be moved, extracted, or imported, Zoomdata claims it is more accessible for organizations with regulated, PII (personally identifiable information), proprietary, and other sensitive data that must be tightly monitored for security purposes in a single system. Patents and Technology Zoomdata has been granted a number of patents since 2014. Patent US8631325, Real-time data visualization of streaming data, has been cited in pat
https://en.wikipedia.org/wiki/Lo%20Nuestro%20Award%20for%20Rock%20New%20Artist%20of%20the%20Year
The Lo Nuestro Award for New Rock Artist of the Year is an honor presented annually by American network Univision. The Lo Nuestro Awards have been held since 1989 to recognize the most talented performers of Latin music. The nominees and winners were originally selected by a voting poll conducted among program directors of Spanish-language radio stations in the United States and also based on chart performance on Billboard Latin music charts, with the results tabulated and certified by the accounting firm Arthur Andersen. Starting from 2004, the winners are selected by the audience through an online survey. The trophy is shaped in the form of a treble clef. The award was first presented in every field awarded on the Lo Nuestro Awards: Pop, Tropical, Regional Mexican and, for one time only, Rock/Alternative; In 2004, the nominees included Puerto-Rican ensemble Circo, Mexican group Inspector, Spanish R&B trio Las Niñas, Argentinian band La Zurda, and Mexican solo singers Jorge Correa, Natalia Lafourcade, and Alessandra Rosaldo; with Rosaldo receiving the award. Winners and nominees Listed below are the winners of the award for each year, as well as the other nominees. See also Grammy Award for Best New Artist Latin Grammy Award for Best New Artist References Music awards for breakthrough artist Rock music awards Latin rock albums Rock New Artist of the Year Awards established in 2004 Awards disestablished in 2004
https://en.wikipedia.org/wiki/Oh%2C%20No%21%20Not%20THEM%21
Oh, No! Not THEM! was an untelevised 1990 television pilot for an American television series remake of the British television show The Young Ones, commissioned by the Fox network. It starred Nigel Planer as Neil (reprising his Young Ones role) and Jackie Earle Haley, It was directed and produced by David Mirkin and featured an animated opening credit sequence set to "Tomorrow Never Knows" by The Beatles. Fox did not pick up the series. Robert Llewellyn wrote in his book The Man in the Rubber Mask (1994): Aside from the title sequence, no footage, images, or audio from the pilot have resurfaced in any form, and the majority of its elements remain a mystery. References External links Television pilots not picked up as a series Unaired television pilots 1990 American television episodes 1990 in American television American television series based on British television series The Young Ones (TV series)
https://en.wikipedia.org/wiki/Joel%20Sherman%20%28sportswriter%29
Joel Sherman is a sportswriter for the New York Post. He is also a baseball insider with MLB Network and co-hosts with Jon Heyman the baseball podcast The Show. He was born and raised in Canarsie in Brooklyn, New York. He graduated from NYU in 1985. Sherman worked for both the in-house Washington Square News and the UPI while at NYU. Sherman joined the New York Post in 1989, and served as a beat writer writing about the New York Yankees from 1989 to 1995. In 2013, Sherman joined MLB Network as an insider. Sherman has been a voter for the National Baseball Hall of Fame since 1998. References External links MLB Network bio NY Post archive Living people New York Post people MLB Network personalities People from Canarsie, Brooklyn Sportswriters from New York (state) Journalists from New York City 20th-century American journalists American male journalists 21st-century American journalists 20th-century American male writers 21st-century American male writers American male non-fiction writers Year of birth missing (living people)
https://en.wikipedia.org/wiki/To%20Be%20or%20Not%20to%20Be%20%28TV%20series%29
To Be or Not to Be (), formerly titled Hakka Women (, and released overseas under that name) is a 2014 television series produced by Hong Kong Television Network. The first episode premiered on December 12, 2014. Cast Maggie Cheung Ho-yee as Anson, Leung Mei-hang Hill's ex-girlfriend, Cheung Tai-loi's girlfriend Prudence Liew as Leung Mei-tin Cheung Kwok-cheung's wife, Tam Jeun-fai's girlfriend Poon Chan-leung as Hill, Au-yeung Shan Anson's ex-boyfriend, Isabella's boyfriend Zac Kao as Cheung Tai-loi Savio Tsang as Cheung Kwok-cheung Queena Chan as Isabella, Zhang Dan-feng Lam Lei as Tam Jeun-fai May Tse as Ma Yau-kam Oscar Chan as Jacky Pang Janice Ting as Lana Hui Emily Wong as Lennon Ching Mimi Kung as Siu Suk-wai Wilson Tsui as Leung Chun-kong Fung So-bor as Cheung Kwok-cheung's mother Cheng Shu-fung as Cheung Kwok-cheung's father Ng Wai-shan as Siu Lai Amy Tsang as Susan Chan Nadia Lun as Pancy Carlos Koo as Roy Jan Tse as Cindy Danel Yu as Fiona Simon Lo as Kin Leung Kin-ping as Ken Vivi Lee as Lam Siu-bing Dexter Young as Anson's lawyer, episode 22 to 25 Candy Chu as kitchen staff, episode 25 External links Official website Hong Kong Television Network original programming 2014 Hong Kong television series debuts 2010s Hong Kong television series Hakka culture in Hong Kong
https://en.wikipedia.org/wiki/ARX%20%28company%29
ARX (Algorithmic Research Ltd.) is a digital security company headquartered in San Francisco, CA, with offices in the UK, the Netherlands, Australia and Israel. It is the creator of CoSign by ARX, a digital signature technology, along with related digital signature security technology products. ARX was acquired by DocuSign in May 2015. The acquisition builds on a three-year business partnership between DocuSign and ARX, bringing together ARX's CoSign digital signature technology with DocuSign's Digital Transaction Management (DTM) platform and broadens The DocuSign Global Trust Network. The ARX digital signature products are based on public key infrastructure (PKI) technology, with the digital signatures resulting from a cryptographic operation that creates a ‘fingerprint’ unique to both the signer and the content, so that they cannot be copied, forged or tampered with. This process provides proof of signer identity, data integrity and the non-repudiation of signed documents, all of which can be verified without the need for proprietary verification software. The company's CoSign solution integrates into a large range of document management and workflow automation systems and is intended to streamline workflow processes requiring signatures. ARX partners with document management and workflow solution providers including SharePoint, OpenText, Oracle, Alfresco, Nintex and K2. Industries of focus include life science (particularly research and clinical trials), engineering, legal and federal/local governments. ARX clients are based in North America, Africa, Europe and Asia-Pacific. In Italy, CoSign is used by the Ministry of Defence, RAI, Senate, Court of Accounts, State Police and Bank of Italy. It is also used by the European Court of Human Rights to digitize and streamline their application process. ARX solutions have been validated for security standards such as NIST FIPS 140-2 level 3, FIPS 186 and ETSI TS 101 733. In 2013, CoSign was named “the strongest digital signature solution” in the 2013 report. In August 2014, CoSign received Common Criteria EAL4+ certification, thus becoming the first remote / server-side digital signature solution to be fully compliant with the EU's newly enacted Electronic Identification and Trust Services regulation for Electronic Transactions in the Internal Market (eIDAS). ARX solutions also comply with ESIGN, UETA, FDA 21 CFR Part 11, SOX, HIPAA, USDA, among many other signature-related country- and industry-specific laws and regulations. History ARX was founded in 1987 by Prof. Amos Fiat and Yossi Tulpan and focused on developing encryption-based products, which included an RSA-smartcard developed for Canal+ in 1989, a secure-PIN entry keyboard connected smartcard reader, cryptographic toolkits, a network-attached cryptographic server (HSM), and a VPN. In September 1997 ARX was acquired by Cylink Corp (NASDAQ:CYLK) from Sunnyvale, California. In 2001 the company went through a management buy-out (MBO) init
https://en.wikipedia.org/wiki/Rigid%20motion%20segmentation
In computer vision, rigid motion segmentation is the process of separating regions, features, or trajectories from a video sequence into coherent subsets of space and time. These subsets correspond to independent rigidly moving objects in the scene. The goal of this segmentation is to differentiate and extract the meaningful rigid motion from the background and analyze it. Image segmentation techniques labels the pixels to be a part of pixels with certain characteristics at a particular time. Here, the pixels are segmented depending on its relative movement over a period of time i.e. the time of the video sequence. There are a number of methods that have been proposed to do so. There is no consistent way to classify motion segmentation due to its large variation in literature. Depending on the segmentation criterion used in the algorithm it can be broadly classified into the following categories: image difference, statistical methods, wavelets, layering, optical flow and factorization. Moreover, depending on the number of views required the algorithms can be two or multi view-based. Rigid motion segmentation has found an increase in its application over the recent past with rise in surveillance and video editing. These algorithms are discussed further. Introduction to rigid motion In general, motion can be considered to be a transformation of an object in space and time. If this transformation preserves size and shape of the object it is known as a Rigid Transformation. Rigid transform can be rotational, translational or reflective. We define rigid transformation mathematically as: where F is a rigid transform if and only if it preserves isometry and space orientation. In the sense of motion, rigid transform is the movement of a rigid object in space. As shown in Figure 1: this 3-D motion is the transformation from original co-ordinates (X,Y,Z) to transformed co-ordinates (X',Y',Z') which is a result of rotation and translation captured by rotational matrix R and translational vector T respectively. Hence the transform will be: where, has 9 unknowns which correspond to the rotational angle with each axis and has 3 unknowns () which account for translation in X,Y and Z directions respectively. This motion (3-D) in time when captured by a camera (2-D) corresponds to change of pixels in the subsequent frames of the video sequence. This transformation is also known as 2-D rigid body motion or the 2-D Euclidean transformation. It can be written as: where, X→ original pixel co-ordinate. X'→ transformed pixel co-ordinate. R→ orthonormal rotation matrix with R ⋅ RT = I and |R| = 1. t→ translational vector but in the 2D image space. To visualize this consider an example of a video sequence of a traffic surveillance camera. It will have moving cars and this movement does not change their shape and size. Moreover, the movement is a combination of rotation and transformation of the car in 3D which is reflected in its subsequent video frames.
https://en.wikipedia.org/wiki/European%20Urban%20Knowledge%20Network
The EUKN is an independent network of national governments that deals with sustainable urban development through policy development, research and practice. The EUKN secretariat is based in The Hague and EUKN member countries are Belgium, Czechia, France, Germany, the Netherlands, Poland, Slovenia and Spain. The EUKN provides strategic knowledge and expertise to these national ministries as they develop their National Urban Policies, including via the facilitation of tailored knowledge sharing events. The EUKN also provides support to countries holding the rotating Presidency of the Council of the European Union and has contributed to various milestones in European urban policy including the Leipzig Charter, New Leipzig Charter and Ljubljana agreement. The EUKN also works to promote sustainable urban development with a broad range of other stakeholders including policymakers at all levels of government, academic experts and practitioners. It collaborates with partners on agenda-setting research in urban development. The EUKN fosters collaboration between its network and all stakeholders to create just, green, productive and digitalised cities. The EUKN holds legal status as a European Grouping for Territorial Cooperation (EGTC) allowing it engage directly in cross-border cooperation and activities. References www.eukn.eu External links eukn.eu official webpage International organizations based in Europe Organizations established in 2004 Organisations based in The Hague
https://en.wikipedia.org/wiki/The%20New%20Fly%20Fisher
The New Fly Fisher is a popular fly fishing show in North America on the World Fishing Network and Public Television PBS. Created in March 2001, the show is hosted primarily by Colin McKeown and Bill Spicer and teaches fly fishing, marine biology, and fishing destinations. History The idea for The New Fly Fisher was first conceived by Colin McKeown in 1999. During the 1990s when Colin was attempting to learn how to fly fish, he was frustrated with the poor quality of information provided by popular television fishing shows. Most series were focused on promoting products and show hosts. He felt many were nothing but glorified “infomercials”. At the time, Colin was an officer in the Royal Canadian Navy and was getting ready to retire. Creating a quality fly fishing show that taught people about fly fishing, biology, destinations and much more seemed like a great concept. Of importance, Colin wanted to create a series that was of top quality in every aspect of production. To achieve this Colin attended several college courses that taught him about television production and producing. In May 2000, Colin pitched the concept of his fly fishing series to the VP of Programming at the Outdoor Life Network in Canada. It was accepted in late June and principal photography of the first 13 episodes commenced in July. First broadcast was slated for March 2001. Throughout the past fifteen years the concept has remained essentially the same. To provide viewers with a television series that teaches by bringing on every episode subject matter experts that taught the hosts methods of fly fishing for differing species in locations throughout North America. Whether the SME’s are guides, authors or fly fishing celebrities – all help the series hosts learn. Hence the series name, The New Fly Fisher. The New Fly Fisher Inc. is owned by JenCor Entertainment Inc. the principle production company created by Colin McKeown. Early years Right from the start of broadcast on OLN Canada, the series was a hit with anglers. Both conventional tackle and fly fishing enthusiasts loved the series because of the blend of detailed information, nature and biology combined with fishing. Though the series was a hit with anglers, the first three years of production were very tough. Learning the craft of television production in often challenging environments was stressful. In addition, securing funding for the series was a constant concern because the series was relatively unknown outside of Canada. However, two events in 2003 had a dramatic and positive impact on the eventual success of the series. The first was the addition of a new and large series commissioned by OLN Canada. This series was called Truth Duty Valour and the theme was the training the Canadian Army, Navy and Air Force conducted in support of peacekeeping and peacemaking operation around the world. The series was composed of 13 one-hour episodes featuring the best of training in the military Truth Duty Valour and it w
https://en.wikipedia.org/wiki/SubOS
In computing, a SubOS may mean several related concepts: A process-specific protection mechanism allowing potentially dangerous applications to run in a restricted environment. It worked by setting a sub-user id which was user id of the owner of the file rather than the person running the file. A substitute-operating system, which simulated a full operating system. These were mainly developed by the GameMaker community. An interface (graphical or terminal based) that provides additional functions or command for a specific audience target. It can also make processes easier and add details to the main operating system. See also Virtual machine Sandbox (computer security) Computing terminology Operating system security Virtualization software
https://en.wikipedia.org/wiki/Kevin%20Wilson%20%28game%20designer%29
Kevin Wilson is a game designer who has worked primarily on board games and role-playing games. Early life and education Wilson received a B.A. in Cognitive Science (Artificial Intelligence) from U.C. Berkeley in 1997, and was active in the interactive fiction community at the time. He wrote several works of interactive fiction — including Once and Future and The Lesson of the Tortoise — and founded the annual Interactive Fiction Competition and the Internet magazine SPAG. Career Kevin Wilson has been a game designer since the late 1990s. Wilson co-designed Alderac Entertainment Group's second role-playing game, 7th Sea (1998), with Jennifer Wick and John Wick. Wilson wrote the adventure Wonders Out of Time (2001), the sequel to Akrasia: Thief of Time (2001) from Eden Studios's "Eden Odyssey" series of adventures. Wilson is the co-designer of the Spycraft roleplaying game. As Fantasy Flight Games's d20 System success grew, they hired Wilson to oversee a retooling of the Legends & Lairs line, and he split it into a number of smaller sublines filled with smaller sourcebooks. The wargame, A Game of Thrones (2003) by Christian T. Petersen and Wilson, was one of several games published by Fantasy Flight in the American style while the company had been republishing eurogames. Wilson is the author of the RPG book Spellslinger. Petersen and Wilson created a gaming system for Doom: The Boardgame (2004), which was later revised and used in Descent: Journeys in the Dark (2006). Wilson also designed World of Warcraft: The Board Game (2005), as well as Arkham Horror second edition (with Richard Launius). He also designed Sid Meier's Civilization: The Board Game (2010). Wilson lives near the Twin Cities. References External links Home page Kevin Wilson :: Pen & Paper RPG Database archive Board game designers Living people Role-playing game designers Year of birth missing (living people)
https://en.wikipedia.org/wiki/Jack%20Emmert
Jack Emmert is an American game designer who has worked primarily on role-playing games and computer games. Career Jack Emmert had been playing Champions since it came out in 1981. Emmert spent his teenage years reading comic books and playing AD&D. During his student years, Emmert wrote several pen and paper RPG supplements to make ends meet. After a lengthy stint in academia, Emmert co-founded Cryptic Studios. He designed the MMORPGs City of Heroes and City of Villains. Emmert was the chief creative officer and directed the design of all games from Cryptic Studios, and was involved in the development of Marvel Universe Online. Emmert and the rest of Cryptic later decided that Champions would be a great replacement for the Marvel Comics IP they had lost, thus Cryptic purchased the Champions game and the Champions universe from Hero Games in 2008. Emmert was the online producer for Star Trek Online. In March 2010, Bill Roper was promoted to chief creative officer, succeeding Emmert (who became the chief operations officer). In March 2011, Emmert was promoted to chief executive officer when John Needham left to pursue other opportunities in the gaming industry. On June 8, 2016, Jack Emmert was made CEO of Daybreak Game Company Austin's Texas-based studio, as the head of the Daybreak Games studio responsible for the Action Combat MMORPG DC Universe Online (DCUO), Emmert will oversee all development in Austin and will report into Daybreak headquarters in San Diego. In May 2022, Emmert was put in charge of NetEase's new US-based studio, Jackalope Games. References External links Jack Emmert :: Pen & Paper RPG Database archive Living people Place of birth missing (living people) Role-playing game designers Year of birth missing (living people)
https://en.wikipedia.org/wiki/Naruto%20Shippuden%3A%20Ultimate%20Ninja%20Storm%204
Naruto Shippuden: Ultimate Ninja Storm 4, known in Japan as , is a fighting game developed by CyberConnect2 and published by Bandai Namco Entertainment for PlayStation 4, Xbox One, and Windows (through Steam) in February 2016. It is the sixth installment and the final main installment in the Naruto: Ultimate Ninja Storm series inspired by Masashi Kishimoto's manga Naruto, and the sequel to the 2013 game Naruto Shippuden: Ultimate Ninja Storm 3 Full Burst. The narrative follows the young ninjas Naruto Uzumaki and Sasuke Uchiha as they participate in a world war between shinobithe Fourth Shinobi World Waragainst the terrorist organization Akatsuki and unite to defeat it. Similar to Storm 3, the game uses regular fighting systems; however, players can switch among a team of three fighters who can assist each other. Other returning elements involve boss fights, where quick time events are required to reach hidden scenes and hack and slash areas. The expansion version is entitled Naruto Shippuden: Ultimate Ninja Storm 4 - Road to Boruto; this version, under development, was compiled with three other series titles as Naruto Shippuden: Ultimate Ninja Storm Legacy and released on in August 2017. It adds new characters from the 2015 film, Boruto: Naruto the Movie, and adult versions of the younger fighters. The game was developed for PlayStation 4 and Xbox One over a two-year period. CyberConnect2 took advantage of the hardware's potential to incorporate more fighting mechanics and add new fighters. The game received generally-positive reviews, according to Metacritic; its narrative and graphics were praised, but critics were also divided about the length of the story and the depth of the controls. A Nintendo Switch port of Naruto Shippuden: Ultimate Ninja Storm 4 - Road to Boruto was released in April 2020. Including Road to Boruto, the game had sold 11.88 million copies by December 2022, making it one of the best-selling fighting games of all time. Gameplay Ultimate Ninja Storm 4 gameplay is similar to that of previous games in the series, in which players battle each other in 3D arenas. A returning feature, omitted since the original Ultimate Ninja Storm, is the ability to wall-run; players can battle on the sides (walls) of each arena. A major change to the feature is the ability to have one character on the wall and the other on the field; the second player was originally also moved to the wall to keep the battle flowing and the system in check. The game has the largest number of fighters in series history. Its roster includes 106 fighters from the Naruto universe, including duplicates of the same characters, such as Naruto (Part 1) and Naruto (Six Paths Sage Mode). The game also includes characters from the films The Last: Naruto the Movie (2014) and Boruto: Naruto the Movie (2015). There is total of over a hundred characters in the game. The option to select one of three fighting types was removed; it was introduced in Naruto Shippuden: Ulti
https://en.wikipedia.org/wiki/Security%20type%20system
In computer science, a type system can be described as a syntactic framework which contains a set of rules that are used to assign a type property (int, boolean, char etc.) to various components of a computer program, such as variables or functions. A security type system works in a similar way, only with a main focus on the security of the computer program, through information flow control. Thus, the various components of the program are assigned security types, or labels. The aim of a such system is to ultimately be able to verify that a given program conforms to the type system rules and satisfies non-interference. Security type systems is one of many security techniques used in the field of language-based security, and is tightly connected to information flow and information flow policies. In simple terms, a security type system can be used to detect if there exists any kind of violation of confidentiality or integrity in a program, i.e. the programmer wants to detect if the program is in line with the information flow policy or not. A simple information flow policy Suppose there are two users, A and B. In a program, the following security classes (SC) are introduced: SC = {∅, {A}, {B}, {A,B}}, where ∅ is the empty set. The information flow policy should define the direction that information is allowed to flow, which is dependent on whether the policy allows read or write operations. This example considers read operations (confidentiality). The following flows are allowed: → = {({A}, {A}), ({B}, {B}), ({A,B}, {A,B}), ({A,B}, {A}), ({A,B}, {B}), ({A}, ∅), ({B}, ∅), ({A,B}, ∅)} This can also be described as a superset (⊇). In words: information is allowed to flow towards stricter levels of confidentiality. The combination operator (⊕) can express how security classes can perform read operations with respect to other security classes. For example: {A} ⊕ {A,B} = {A} — the only security class that can read from both {A} and {A,B} is {A}. {A} ⊕ {B} = ∅ — neither {A} nor {B} are allowed to read from both {A} and {B}. This can also be described as an intersection (∩) between security classes. An information flow policy can be illustrated as a Hasse diagram. The policy should also be a lattice, that is, it has a greatest lower-bound and least upper-bound (there always exists a combination between security classes). In the case of integrity, information will flow in the opposite direction, thus the policy will be inverted. Information flow policy in security type systems Once the policy is in place, the software developer can apply the security classes to the program components. Use of a security type system is usually combined with a compiler that can perform the verification of the information flow according to the type system rules. For the sake of simplicity, a very simple computer program, together with the information flow policy as described in the previous section, can be used as a demonstration. The simple program is given in th
https://en.wikipedia.org/wiki/Janice%20Lourie
Janice Richmond "Jan" Lourie (born July 9, 1930) is an American computer scientist and graphic artist. In the late 1960s she was a pioneer in CAD/CAM (computer-aided design/computer-aided manufacture) for the textile industry. She is best known for inventing a set of software tools that facilitate the textile production stream from artist to manufacturer. For the Graphical Design Of Textiles process she was granted IBM's first software patent. Other projects, in differing disciplines, share the focus on graphic representation. She returns throughout an ongoing career to the stacked two-dimensional tabular arrays of textiles and computer graphics, and the topological structures of interrelated data. Education Lourie studied music theory and history at the Longy School of Music in Cambridge Massachusetts. Rosario Mazzeo was her clarinet teacher. She performed in chamber music concerts in the tapestry gallery series at the Boston Museum of Fine Arts and with amateur orchestras and chamber music groups in the Boston area. In 1954 she became a founding member of the Camerata of the Museum of Fine Arts. Her instruments were the tenor shawm and psaltery from the museum collection, and contemporary Dolmetsch recorders. When she received her AB degree in philosophy from Tufts University she was employed as a technical editor at Parke Mathematical Laboratories in Concord, Mass. Her interest in the material she edited led to work at the MIT Whirlwind computer which she combined with basic mathematics courses. She returned to school and received a master's degree in mathematics from Boston University. IBM In 1957 Lourie began working at IBM. At that time IBM was recruiting musicians to train as programmers. Her first assignment was to assist Dr. John (Giampiero) Rossoni who was in charge of the IBM part of the Operation Moonwatch Project then being conducted at the Smithsonian Astrophysical Observatory. Operations research Lourie's next assignment was in operations research, also known as management science. Her first major project was to implement the stepping stone algorithm of Abraham Charnes to solve the machine loading problem, a generalization of the classic linear transportation problem. In 1958 a software solution to the transportation problem was a staple operations research tool. The solution determines the pattern of delivery of one type of goods from multiple sources to multiple destinations satisfying all requirements at a minimum cost. The generalized problem, expressed as machine loading, states that all the products may be different and may be produced on different machines. The variability of sources and destinations in this model has a drastic effect on the topological structure underlying the solution. The topology of each stage of an iterative solution in the transportation problem is a tree structure. In the generalized transportation problem the topological structure of the evolving iterative solution is a set of disconnected
https://en.wikipedia.org/wiki/DoubleDOS
DoubleDOS was a computer program that extended the IBM PC DOS operating system with limited multitasking capabilities. The program partitioned the computer's memory in two, running an instance of DOS in both, and allowed users to switch between the two. DoubleDOS was announced in 1984 by a firm called Softlogic Solutions, and sold for USD299. In a 1987 ad, the company offered the software for USD49.99, pitting it against competitors TopView and Windows. A review in 1986's Business Software found programs running under DoubleDOS ran considerably slower, "even when nothing is running in the other partition". See also DESQview PC-MOS/386 References DOS extenders
https://en.wikipedia.org/wiki/Shandong%20Television
Shandong Television (SDTV; ) is a television network covering the Jinan city and Shandong province area. It was founded and started to broadcast on October 1, 1960. SDTV currently broadcasts in Chinese. External links Official Website Official Video Website 1960 establishments in China Television networks in China Government-owned companies of China Mass media in Shandong Organizations based in Jinan Television channels and stations established in 1960 Mass media in Jinan
https://en.wikipedia.org/wiki/Criticism%20of%20TV%20Globo
Criticism of TV Globo (formerly Rede Globo until 2021) refers to the extensive history of controversies involving the Brazilian television network monopoly, which has an unparalleled ability to influence Brazil's culture and shape the country's public opinion. The owners of Rede Globo had enriched themselves with government favors to become billionaires. The Globo Grupo are remanagment the branding in the internet for self-promote since 2010's decade. The main historical controversy surrounding the television network, as well as the remainder of Grupo Globo (formerly known as Globo Organizations) media empire, is centered on the news broadcasts' support for the Brazilian military government and its censorship of pro-democracy developments. According to critics of the broadcaster, the military regime provided government concessions to Rede Globo, which had very poor coverage of the 1984 Diretas Já protests. In 2013, pressured by protests in Brazil, Rede Globo admitted in the Jornal Nacional that its support given to the 1964 Brazilian coup d'état and the subsequent regime was "a mistake". In the late 1980s, Grupo Globo was targeted by critics due to edits made to the pre-recorded television debates between the presidential candidates in the 1989 election. The edits to the final debate favored candidate Fernando Collor de Mello, who won the election. Towards the end of the 1990s, Grupo Globo faced severe financial problems and was bailed out by the government, despite being a strictly private company. During this period, the conglomerate utilized its influence in the political arena and changed an article in the Constitution of Brazil to allow 30% of foreign capital investment in the country's media sector. In 2002, the federal government offered R$280million in assistance to the Globocabo cable TV company, part of Grupo Globo, by financing through the Brazilian Development Bank. Rede Globo was again criticized for its biased coverage of the 2006 and 2010 elections. Accusations of political influence Support of military regime TV Globo was founded in 1965 as Rede Globo, one year after the 1964 Brazilian coup d'état, and it became the largest television network in Brazil during the 1970s. During this period, Brazil's military government implemented a policy to modernize Brazil's telecommunications infrastructure. In 1965, the government created Embratel at the same time that Brazil was joining Intelsat. In 1968, the Ministry of Communications was created, the first FM radio stations appeared, and the AERP (Assessoria Especial de Relações Públicas) was created, reinforcing the need to propagate patriotic ideas and nationalism. Brazil integrated with the global system of satellite communications in 1969. The military government intended to oppose the left, which was culturally dominant at the time. One of the government's weapons would have been television, with the regime turning a blind eye to the partnership between the former Chairman of G
https://en.wikipedia.org/wiki/REFInd
rEFInd is a boot manager for UEFI and EFI-based machines. It can be used to boot multiple operating systems that are installed on a single non-volatile device. It also provides a way to launch UEFI applications. It was forked from discontinued rEFIt in 2012, with 0.2.0 as its first release. rEFind supports x86, x86-64, and AArch64 architecture. Features rEFInd has several features: Automatic operating systems detection. Customisable OS launch options. Graphical or text mode. Theme is customisable. Mac-specific features, including spoofing booting process to enable secondary video chipsets on some Mac. Linux-specific features, including autodetecting EFI stub loader to boot Linux kernel directly and using fstab in lieu of rEFInd configuration file for boot order. Support for Secure Boot. Adoption rEFInd is the default Unified Extensible Firmware Interface (UEFI) boot manager for TrueOS. rEFInd is included in official repositories of major Linux distributions. Development GNU-EFI and TianoCore are supported as main development platforms for writing binary UEFI applications in C to launch right from the rEFInd GUI menu. Typical purposes of an EFI application are fixing boot problems and programmatically modifying settings within UEFI environment, which would otherwise be performed from within the BIOS of a personal computer (PC) without UEFI. rEFInd can be built with either GNU-EFI or TianoCore EDK2/UDK. Fork RefindPlus is a fork of rEFInd that add several features and improvements for Mac devices, specifically MacPro3,1 and MacPro5,1, and equivalent Xserve. See also GNU GRUB - Another boot loader for Unix-like systems Comparison of boot loaders References Free boot loaders Free system software Macintosh firmware Software using the BSD license Software forks
https://en.wikipedia.org/wiki/Yoonil%20Auh
Yoon-il Auh (born March 3, 1961) is a Korean–American educator, violinist and composer. Professional background Yoon-il is a professor at Kyung Hee Cyber University in Seoul Korea, Department of Computer Information Communications Engineering. He is recognized as the lead designer of a project MOOC 2.0 and South Korea's Military MOOC (M-MOOC) Yoon-il Auh served as the vice president of Kyung Hee Cyber University and prior to an academic position in Korea, he was the vice president of the National Labor College of the AFL–CIO (2005-2012). He also served as a director at Central Michigan University, where he was responsible for distance and distributed education from 2001 to 2005. Auh served as Director of Research at the Music for One Foundation (INGO) at the Research Institute for Humanities Performing Arts since 2011. From 2013 ~ 2015, Auh was a Visiting Professor at Global Education Cooperation Program, Interdisciplinary Studies, College of Education at Seoul National University and served as Vice Chair of the South Korean Ministry of Education's Special Committee of the Future of Korean Education in 2015. Auh received a Doctor of Education (Ed.D.) in instructional technology from Teachers College, Columbia University. His doctoral dissertation, "Designing and Creating an Interdisciplinary Learning Environment Using Cognitive Flexibility Theory", received the College President's Doctoral Dissertation Award in 2000. Prior to that, Auh received his MA in Cognition, Computing and Education and an Ed.M. in Music Education and Cognition from Columbia University and an MM and B.A from the Juilliard School. He is also an American Council on Education-certified curriculum reviewer. Music background In addition to his academic career, Auh has been an active violinist, conductor, composer and author of music books. He received musical training from the Juilliard School under Dorothy DeLay for fourteen years. As a concert violinist, he has performed at American concert venues including Avery Fisher Hall, Alice Tully Hall in the Lincoln Center, and Carnegie Hall, where he gave his New York debut at the age of sixteen. He is also the founder of the International Web Concert Hall (IWCH) competition, which was launched in 1998 and continued until 2012. IWCH was the first of its kind in classical music to hold such events at a global level. The IWCH was reviewed in The New York Times He is actively involved in promoting community development via performing arts education at both a local and global level. At the global level, he has presented on the topics of performing arts education, community development through arts, lifelong learning, and online learning Paraguay apunta a mejorar la educación con ayuda de la tecnología. He is also an author of Harmony Nation Education System sponsored by Kyobo Life and Music for One Foundation. The Harmony Nation program and related activity has been sponsored by KOICA since 2013 and has been utilized for promo
https://en.wikipedia.org/wiki/Digimon%20Story%3A%20Cyber%20Sleuth
is a role-playing video game developed by Media.Vision and published by Bandai Namco Entertainment that was released in Japan on March 12, 2015 for PlayStation Vita and PlayStation 4. Part of the Digimon franchise, the game is the fifth installment in the Digimon Story series, following 2011's Super Xros Wars, and the first to be released on home consoles. The game would be released in North America on February 2, 2016, becoming the first installment of the Digimon Story series to be released in North America since 2007's Digimon World Dawn and Dusk, and the first to be released under its original title. A sequel, titled Digimon Story: Cyber Sleuth – Hacker's Memory, was released in Japan in 2017 and in Western territories in 2018. In July 2019, a port of the game and its sequel for Nintendo Switch and Windows, was announced for release on October 18, 2019, as Digimon Story Cyber Sleuth: Complete Edition, although the PC version was released a day early. Gameplay Digimon Story: Cyber Sleuth is a role-playing game, played from a third-person perspective where players control a human character with the ability to command Digimon, digital creatures with their own unique abilities who do battle against other Digimon. Players can choose between either Palmon, Terriermon or Hagurumon as their starting partner at the beginning of the game, with more able to be obtained as they make their way into new areas. A total of 249 unique Digimon are featured, including seven that were available as DLC throughout the life of the game, and two which were exclusive to the Western release. The title features a New Game Plus mode where players retain all of their Digimon, non-key items, money, memory, sleuth rank, scan percentages, and Digifarm progress. The Complete Edition includes the 92 new Digimon from Hacker's Memory, for a total of 341 Digimon. Plot Players assume the role of Takumi Aiba (male) or Ami Aiba (female), a young Japanese student living in Tokyo while their mother is working abroad. After receiving a message from a hacker, Aiba investigates the physical-interaction cyberspace network EDEN, where they meet Nokia Shiramine and Arata Sanada. The hacker gives them "Digimon Capture" programs and locks them in EDEN. While searching for an exit, Aiba meets Yuugo, leader of the hacker team "Zaxon"; Yuugo teaches Aiba how to use their Digimon Capture and tells them that Arata is a skilled hacker himself. Aiba meets up with Nokia and Arata, who unlocks a way out, but the three are then attacked by a mysterious creature that grabs Aiba and corrupts their logout process. Aiba emerges in the real world as a half-digitized entity and is rescued by detective Kyoko Kuremi, head of the Kuremi Detective Agency, which specializes in cyber-crimes. Aiba manifests an ability, Connect Jump, which allows them to travel into and through networks. Recognizing their utility, Kyoko helps Aiba stabilize their digital body and recruits them as her assistant. They investi
https://en.wikipedia.org/wiki/Language-based%20security
In computer science, language-based security (LBS) is a set of techniques that may be used to strengthen the security of applications on a high level by using the properties of programming languages. LBS is considered to enforce computer security on an application-level, making it possible to prevent vulnerabilities which traditional operating system security is unable to handle. Software applications are typically specified and implemented in certain programming languages, and in order to protect against attacks, flaws and bugs an application's source code might be vulnerable to, there is a need for application-level security; security evaluating the applications behavior with respect to the programming language. This area is generally known as language-based security. Motivation The use of large software systems, such as SCADA, is taking place all around the world and computer systems constitute the core of many infrastructures. The society relies greatly on infrastructure such as water, energy, communication and transportation, which again all rely on fully functionally working computer systems. There are several well known examples of when critical systems fail due to bugs or errors in software, such as when shortage of computer memory caused LAX computers to crash and hundreds of flights to be delayed (April 30, 2014). Traditionally, the mechanisms used to control the correct behavior of software are implemented at the operating system level. The operating system handles several possible security violations such as memory access violations, stack overflow violations, access control violations, and many others. This is a crucial part of security in computer systems, however by securing the behavior of software on a more specific level, even stronger security can be achieved. Since a lot of properties and behavior of the software is lost in compilation, it is significantly more difficult to detect vulnerabilities in machine code. By evaluating the source code, before the compilation, the theory and implementation of the programming language can also be considered, and more vulnerabilities can be uncovered. "So why do developers keep making the same mistakes? Instead of relying on programmers' memories, we should strive to produce tools that codify what is known about common security vulnerabilities and integrate it directly into the development process." — D. Evans and D. Larochelle, 2002 Objective of Language-based security By using LBS, the security of software can be increased in several areas, depending on the techniques used. Common programming errors such as allowing buffer overflows and illegal information flows to occur, can be detected and disallowed in the software used by the consumer. It is also desirable to provide some proof to the consumer about the security properties of the software, making the consumer able to trust the software without having to receive the source code and self checking it for errors. A compiler, ta
https://en.wikipedia.org/wiki/Francis%20F.%20Lee
Francis Fan Lee (李凡, born January 28, 1927) is an inventor, entrepreneur, and professor emeritus of Electrical Engineering and Computer Science at the Massachusetts Institute of Technology (MIT). Lee is the founder of Lexicon (company) (originally American Data Sciences). He is best known for three inventions: the Digital Cardiac Monitor (1969), the Digital Audio Signal Processor (1971), and the Digital Time Compression System (1972). In 1984, Lexicon won an Emmy Award for Engineering Excellence for the Model 1200 Audio Time Compressor and Expander, widely used in the television industry. Education Lee was born January 28, 1927, in Nanjing, China. In September 1948, during the Chinese Civil War, Lee left Shanghai aboard the USS General W.H. Gordon to complete his undergraduate education at the Massachusetts Institute of Technology. He studied Electrical Engineering and earned his Bachelor of Science in 1950 and Master of Science in 1951. In Fall 1952, Lee entered the PhD program at MIT. He withdrew in 1954 to pursue his career, becoming a naturalized US citizen on November 15, 1954. He returned to academia in 1964, and completed his PhD in Electrical Engineering in 1965. Early career In 1954, Lee took a full-time position as Research Engineer with the Servomechanism Laboratory. He was part of a team working on the first Digitally Controlled Milling Machine In 1955, Lee joined the Bizmac Computer Division of RCA. He left a year later to join the UNIVAC super-computer division of Remington Rand. Project MAC In 1963, Lee accepted a one-year appointment to work on Project MAC, a time-sharing Multiple Access Computer being developed at MIT under the direction of Robert Fano. Fano launched Project MAC with a 6-week summer session that drew 57 people (including Lee) from universities, industry, and government for brainstorming and collaboration. At the end of the session, Lee described his work on speeding up computer memory in "Lookaside Memory Implementation" (1963). Six years later, Lee presented "Study of Look-Aside Memory," at the IEEE (Institute of Electrical and Electronics Engineers) conference: Transactions on Computers, held in June 1969. Lee's paper was published in IEEE Transactions on Computers. Look-Aside Memory is a forerunner of cache memory. Reading Machine Project At the end of his Project MAC appointment, Lee resumed his graduate studies at MIT and joined Dr. Samuel Jefferson Mason's Cognitive Information Processing Group in the Research Laboratory of Electronics at MIT Lee's group worked on a reading machine for the blind, the first system that would scan text and produce continuous speech. For his Ph.D. thesis, Lee developed a method for converting printed words into phoneme-based spoken language. Lee presented and published two papers on this work. Later professional life and inventions In 1965, Lee joined the MIT faculty as an Associate Professor of Electrical Engineering and Computer Science. He was promoted to full profess
https://en.wikipedia.org/wiki/NA31%20experiment
NA31 is a CERN experiment which was proposed in 1982 as a "Measurement of |η00 /η+-|2 by the CERN-Edinburgh-Mainz-Pisa-Siegen collaboration. It took data between 1986 and 1989, using a proton beam from the SPS through the K4 neutral beam-line. Its aim was to experimentally prove direct CP-violation. CP violation While charge symmetry and parity symmetry are both violated for any transformation under the weak interaction, the CP violation is known only to appear in particular phenomena - kaon and B-meson decays - under the weak interaction. CP-violation was first theoretically developed for the Standard Model by Kobayashi and Maskawa in 1973 when they introduced a third generation of quark (bottom and top) and thus extended the Cabibbo matrix to the 3x3 CKM matrix, parameterizing the couplings between quark-mass eigenstates and the charge weak gauge bosons. CP violation then appears through the presence of complex parameters in this matrix. Determined from the relative decay rates of short- and long-lived neutral kaons into two neutral and charged pions, respectively, the so-called ε'/ε ratio which expresses the relative strength of direct CP-violation was known to be small but expected to be different from zero in the Standard Model. The measurement of this small deviation from zero was the aim of NA31 in order to prove the existence of direct CP-violation in kaon decays under weak interaction. Evolution of the experiment NA31 found the first evidence for direct CP violation in 1988 with a ratio deviating about three standards form zero. However, shortly after, another experiment – E731 at Fermilab – reported a measurement consistent with zero. A better precision was needed by both NA31 and Fermilab to find consistent results and thus to allow a final conclusion. A new generation of detectors were thus built, both at CERN (for what became the NA48 experiment) and at Fermilab (KTeV). Finally, in 1999, the two new experiments confirmed both direct CP violation in the decay of neutral kaons (CERN Courier September 1999 p32), a discovery which was later recognized by honours, as one of the most important discoveries made at CERN. In particular the 2005 European Physics Society High Energy and Particle Physics Prize was awarded jointly to the NA31 Collaboration and its spokesman Heinrich Wahl. The detector The detector was compounded by wire chambers combined with calorimetry in order to determine K0 parameters (e.g. energy, decay vertex). A great precision on these parameters is required to define well the phase space for all the decay modes which are to be compared. It consists of : an evacuated decay region. proportional wires chambers to measure the charged pion direction. liquid argon calorimeter with a good energy and position resolution to measure the photons from the pion decay. a hadron calorimeter to measure the energy of the charged pions. a plane of scintillation counters serving as muon identifiers. See also Li
https://en.wikipedia.org/wiki/%C3%8Ele-de-France%20tramway%20Line%206
Île-de-France tramway Line 6 (usually called simply T6) is part of the modern tram network of the Île-de-France region of France. Line T6 connects Châtillon – Montrouge Paris Métro station and Viroflay-Rive-Droite station, south-west of Paris. Line T6 is one of the Île-de-France's two rubber-tyred tramway lines based on the Translohr system. The line has a length of and 21 stations. It opened to the public on 13 December 2014. The line was extended by (including a tunnel of ) and two stations in May 2016. Line T6 is operated by the Régie autonome des transports parisiens (RATP) under the authority of Île-de-France Mobilités. Route See also List of rubber-tyred tram systems Notes and references Tram lines in Île-de-France Ile-de-France tramway Line 6 2014 establishments in France
https://en.wikipedia.org/wiki/Margaret%20K.%20Butler
Margaret Kampschaefer Butler (March 27, 1924 – March 8, 2013) was a mathematician who participated in creating and updating computer software. During the early 1950s, Butler contributed to the development of early computers. Butler was the first female fellow at the American Nuclear Society and director of the National Energy Software Center at Argonne. Butler held leadership positions within multiple scientific organizations and women's groups. She was the creator and director of the National Energy Software Center. Here, Butler operated an exchange for the editing of computer programs in regards to nuclear power and developed early principles for computer technology. Early life and education Butler was born on March 27, 1924, in Evansville, Indiana. She studied statistics and differential calculus at Indiana University Bloomington and graduated in 1944. Career Butler began her career in 1944 working as a statistician at the Bureau of Labor Statistics. While she worked there, she also taught math at the United States Department of Agriculture Graduate School and took graduate courses related to sampling theory. About a year later, she joined the United States Army Air Forces and worked as a civilian in Germany. She returned to the United States after two years and began working in the Naval Reactors Division of Argonne National Laboratory as a junior mathematician. While working at Argonne, Butler made calculations for physicists creating a prototype for a submarine reactor and attended atomic physics and reactor design classes. In 1949, she worked at the Bureau of Labor Statistics in Minnesota but returned to Argonne National Laboratory in 1951. Following her return to Argonne, Butler became an assistant mathematician in the Reactor Engineering Division and worked on AVIDAC, an early computer. In the 1950s she wrote software, reactor applications, mathematical subroutines, and utilities for three other Argonne computers, the ORACLE, GEORGE, and UNIVAC. Butler led Argonne's Applied Mathematics Division's Application Programming from 1959 to 1965. While working in this department, she developed teams to fix program problems in reactors, biology, chemistry, physics, management, and high energy physics applications. In 1960, she worked with others to establish the Argonne Code Center, which later became the National Energy Software Center (NESC). Butler would later become director of the NESC from 1972–1991. She became the first woman to be named fellow of the American Nuclear Society in 1972, following her nomination a year earlier. She was also a consultant to the European Nuclear Energy Agency during the time it was establishing its computer program. In 1980, Butler was promoted to Senior Computer Scientist at Argonne. She officially retired in 1991, but continued to work at Argonne from 1993 to 2006 as a "special term appointee". Impact During her time in Argonne, Butler was very supportive of her female coworkers. Women working at Argonne
https://en.wikipedia.org/wiki/Flyovers%20in%20Chennai
Chennai is home to the second largest vehicular population in India, behind New Delhi. The total road network in the city's metropolitan area is 2,780 km. With Chennai's vehicular population having experienced a surge in the late 1990s, several flyovers were built to reduce the traffic congestion in the city. Of about 15,600 million invested by the state government between 2005 and 2016, Chennai cornered a major chunk of the investment. As of 2016, there were 42 functional flyovers in the city and about 30 bridges, catering to the city's vehicular population of about 12 million, including about 600,000 cars. In addition, more than 36 flyovers are in the pipeline. Beginnings The city's first flyover is the Anna Flyover at the Gemini Circle built in 1973, which was the third in India, after the ones at Kemps Corner and Marine Drive in Mumbai. It was also the longest flyover in the country when it was built. No major flyovers were built in the following 20 years or so. The number of flyovers in the city began to rise in the late 1990s when a string of nine flyovers were built across the city during the tenure of the then Mayor of the city, M. K. Stalin. Road space As of 1 April 2013, the total vehicle population of Chennai is 3,881,850, including 3,053,233 two wheelers. The flyover construction in the city has resulted in the addition of a mere 12.4 km of extra road capacity between 2005 and 2014. As of 2014, the total length of operational flyovers in the city was 13.5 km. List of flyovers Anna Flyover MIT Flyover Alwarpet Flyover IIT Madras Flyover Doveton Flyover Perambur Flyover Madhuravoyal grade separator Padi grade separator Koyambedu grade separator Kathipara grade separator Tambaram flyover Peters Road flyover Conran Smith Road flyover Dr. Radhakrishnan Road flyover Music Academy flyover Panagal Park flyover TTK Road flyover Mahalingapuram flyover Pantheon Road flyover Thirumangalam flyover Moolakkadai flyover Madhavaram Roundtana Byepass Flyover Vandalur flyover Airport flyover Pallavaram Flyover Pallavaram Railway Station Flyover Pallavaram New Unidirectional Flyover Vyasarpadi flyover Mint flyover G N Chetty Road flyover Velachery Taramani Road - Kamakshi Hospital Junction flyover Medavakkam Junction flyover Keelkattalai flyover Tambaram Sanitorium (Bharatha Matha Street) flyover Kilkattalai - Pallavaram Radial Road Junction flyover Velachery Junction flyover Vadapalani Junction flyover Porur flyover Anna Arch flyover - Arumbakkam Anna Arch flyover Aminjikarai Koyambedu CMBT flyover Retteri Flyover Pallikaranai Flyover Criticism Between 2005 and 2014, the state government has spent over 15,590 million erecting flyovers and grade separators, of which 11,440 million (88%) was invested in Chennai. The city hosts all 21 elevated urban corridors open to traffic in the state in 2014. In the late 1990s, a Traffic Action Plan was prepared for the city. It is said the brain behind the traffic action plan was the Society of Indian Automobi
https://en.wikipedia.org/wiki/Michel%20Raynal
Michel Raynal (born 1949) is a French informatics scientist, professor at IRISA, University of Rennes, France. He is known for his contributions in the fields of algorithms, computability, and fault-tolerance in the context of concurrent and distributed systems. Michel Raynal is also Distinguished Chair professor at the Hong Kong Polytechnic University and editor of the “Synthesis Lectures on Distributed Computing Theory” published by Morgan & Claypool. He is a senior member of Institut Universitaire de France and a member of Academia Europaea. Michel Raynal co-authored numerous research papers on concurrent and distributed computing, and has written 12 books. His last three books constitute an introduction to fault-free and fault-tolerant concurrent and distributed computing. In his publications Michel Raynal strives to promote simplicity as a “first-class citizen” in the scientific approach. Michel Raynal (and his co-authors) won several best paper awards in prestigious conferences such as IEEE ICDCS 1999, 2000 and 2001, SSS 2009 and 2011, Europar 2010, DISC 2010, and ACM PODC 2014. When Michel Raynal became Emeritus professor (2017), INRIA, IRISA and the University of Rennes organized a Workshop in his honor featuring various speakers, including Turing Award recipient (Leslie Lamport) and Dijkstra Prize recipients (Leslie Lamport, Maurice Herlihy, Yoram Moses), and professor at Collège de France (Rachid Guerraoui). Education and career Michel Raynal obtained bachelor degrees (French “Baccalauréat”) both in literature and science. He received his PhD from University of Rennes in 1975, and his “Doctorat d’état” in 1981. During the period 1981-1984 he was a professor in a telecommunications engineer school (ENST de Bretagne) where he created and managed the informatics department. In 1984 he moved to the university of Rennes, and in 1985 he founded a research group entirely devoted to Distributed Algorithms (at that time, one of the first groups on this research topic in the world). Michel Raynal has been an associate member of the editorial board of international journals, including the Journal of Parallel and Distributed Computing (JPDC), IEEE Transactions on Computers (TC), and IEEE Transactions of parallel and Distributed Systems (TPDS), among others. Research areas and scientific interests Michel Raynal’s research contributions concern mainly concurrent and distributed computing, and more specifically: causality, distributed synchronization, fault-tolerance, distributed agreement (consensus) and distributed computability. His first book (on mutual exclusion algorithms in both shared memory and message-passing systems) is recognized as one of the first books entirely devoted to distributed algorithms. On the synchronization side, with Jean-Michel Hélary and Achour Mostéfaoui, Michel Raynal designed a very simple generic message-passing mutual exclusion algorithm from which can be derived plenty of token and tree-based mut