source stringlengths 32 199 | text stringlengths 26 3k |
|---|---|
https://en.wikipedia.org/wiki/Nordstromia%20undata | Nordstromia undata is a moth in the family Drepanidae. It was described by Watson in 1968. It is found in Yunnan, China.
References
Moths described in 1968
Drepaninae |
https://en.wikipedia.org/wiki/2015%20Horizon%20League%20women%27s%20basketball%20tournament | The 2015 Horizon League women's basketball tournament, held from March 9–15, concluded the 2014–15 season of the Horizon League. For the first time, every game was available on an ESPN Network. Rounds 1 & 2 were on ESPN3, with the semifinals on TWCS and simulcast on ESPN3. The championship was on ESPNU. The tournament champion received an automatic bid to the 2015 NCAA tournament.
Seeds
All 9 Horizon League schools participated in the tournament. Teams were seeded by 2014–15 Horizon League season record. The top 7 teams received a first-round bye.
Seeding for the tournament was determined at the close of the regular conference season:
Schedule
Bracket
References
External links
Horizon League Women's Basketball Tournament
2014–15 Horizon League women's basketball season
Horizon League women's basketball tournament |
https://en.wikipedia.org/wiki/TeslaCrypt | TeslaCrypt was a ransomware trojan. It is now defunct, and its master key was released by the developers.
In its early forms, TeslaCrypt targeted game-play data for specific computer games. Newer variants of the malware also affect other file types.
In its original, game-player campaign, upon infection the malware searched for 185 file extensions related to 40 different games, which include the Call of Duty series, World of Warcraft, Minecraft and World of Tanks, and encrypted such files. The files targeted involve the save data, player profiles, custom maps and game mods stored on the victim's hard drives. Newer variants of TeslaCrypt were not focused on computer games alone but also encrypted Word, PDF, JPEG and other files. In all cases, the victim would then be prompted to pay a ransom of $500 worth of bitcoins in order to obtain the key to decrypt the files.
Although resembling CryptoLocker in form and function, Teslacrypt shares no code with CryptoLocker and was developed independently. The malware infected computers via the Angler Adobe Flash exploit.
Even though the ransomware claimed TeslaCrypt used asymmetric encryption, researchers from Cisco's Talos Group found that symmetric encryption was used and developed a decryption tool for it. This "deficiency" was changed in version 2.0, rendering it impossible to decrypt files affected by TeslaCrypt-2.0.
By November 2015, security researchers from Kaspersky had been quietly circulating that there was a new weakness in version 2.0, but carefully keeping that knowledge away from the malware developer so that they could not fix the flaw. As of January 2016, a new version 3.0 was discovered that had fixed the flaw.
A full behavior report, which shows BehaviorGraphs and ExecutionGraphs was published by JoeSecurity.
Shut down
In May 2016, the developers of TeslaCrypt shut down the ransomware and released the master decryption key, thus bringing an end to the ransomware. After a few days, ESET released a public tool to decrypt affected computers at no charge.
References
Blackmail
Windows malware
Cryptographic attacks
2015 in computing
Ransomware |
https://en.wikipedia.org/wiki/Small%20Claims%3A%20White%20Wedding | Small Claims: White Wedding is an Australian television film starring Rebecca Gibney and Claudia Karvan, which first aired on Network Ten in 2005. The film was a co-production with subscription television and was also broadcast on the Foxtel, Austar, and Optus Television Subscription Television services. The series was written by husband and wife team, Keith Thompson and Kaye Bendle.
The film is part two of a mystery series about two overworked young mums, de-skilled beyond their worst nightmares, who become a formidable pair of sleuths, directed by Cherie Nowlan. Their cases are the murders, greed and dark passions that lurk behind the anonymous facade of the suburbs.
Cast
Rebecca Gibney, as Chrissy Hindmarsh
Claudia Karvan, as Jo Collins
Alyssa McClelland, as Kiara Duffy
Deborah Kennedy as Trudy Duffy
Paul Barry, as Greg Collins
Carol Burns, as Pamela
Gyton Grantley, as Detective Senior Constable Brett
Wayne Blair, as Detective Senior Constable Lacey
Roy Billing, as Ron Duffy
Brooke Satchwell, as Imogen
Michael Dorman, as Sean
Victoria Thaine, as Tori
Rupert Reid, as David
See also
Australian films of 2004
Cinema of Australia
List of films shot in Sydney
List of Australian films
References
External links
Australian Television Archive
Essential Viewing Website
Network 10 original programming
Australian television films
Films directed by Cherie Nowlan
2000s English-language films |
https://en.wikipedia.org/wiki/Small%20Claims%3A%20The%20Reunion | Small Claims: The Reunion is an Australian television film starring Rebecca Gibney and Claudia Karvan, which first aired on Network Ten in 2006. The film was a co-production with subscription television and was also broadcast on the Foxtel, Austar, and Optus Television Subscription Television services. The series was written by husband and wife team, Keith Thompson and Kaye Bendle.
The film is part three of a mystery series about two overworked young mums, de-skilled beyond their worst nightmares, who become a formidable pair of sleuths, directed by Cherie Nowlan. Their cases are the murders, greed and dark passions that lurk behind the anonymous facade of the suburbs.
Cast
Rebecca Gibney, as Chrissy Hindmarsh
Claudia Karvan, as Jo Collins
Lisa Chappell, as Louise Page
Simon Burke, as Jon
Alison Whyte, as Pip
Maggie Dence, as Roma
Peter Phelps, as Paul Loyd
Emma Booth, as Annie
Steve Vidler, as Ross Page
Daisy Betts, as Amber
Gyton Grantley, as Detective Senior Constable Brett
Wayne Blair, as Detective Senior Constable Lacey
See also
Australian films of 2004
Cinema of Australia
List of films shot in Sydney
List of Australian films
References
External links
Australian Television Archive
Essential Viewing Website
Network 10 original programming
Australian television films
Films directed by Tony Tilse
2000s English-language films |
https://en.wikipedia.org/wiki/Lo%20Nuestro%20Award%20for%20Regional%20Mexican%20Song%20of%20the%20Year | The Lo Nuestro Award for Regional Mexican Song of the Year is an honor presented annually by American television network Univision at the Lo Nuestro Awards. The accolade was established to recognize the most talented performers of Latin music. The nominees and winners were originally selected by a voting poll conducted among program directors of Spanish-language radio stations in the United States and also based on chart performance on Billboard Latin music charts, with the results being tabulated and certified by the accounting firm Deloitte. However, since 2004, the winners are selected through an online survey. The trophy awarded is shaped in the form of a treble clef.
The award was first presented to "Y Ahora Te Vas" by Mexican band Los Bukis. Mexican performer Gerardo Ortíz holds the record for the most awards, winning on three occasions. Fellow Mexican band Los Yonics is the most nominated act without a win, with four unsuccessful nominations.
Winners and nominees
Listed below are the winners of the award for each year, as well as the other nominees for the majority of the years awarded.
See also
Latin Grammy Award for Best Regional Song
References
Regional Mexican Song of the Year
Regional Mexican songs
Song awards
Awards established in 1989 |
https://en.wikipedia.org/wiki/Overview%20of%20RESTful%20API%20Description%20Languages | RESTful (representational state transfer) API (application programming interface) DLs (description languages) are formal languages designed to provide a structured description of a RESTful web API that is useful both to a human and for automated machine processing. API description languages are sometimes called interface description languages (IDLs). The structured description might be used to generate documentation for human programmers; such documentation may be easier to read than free-form documentation, since all documentation generated by the same tool follows the same formatting conventions. Additionally, the description language is usually precise enough to allow automated generation of various software artifacts, like libraries, to access the API from various programming languages, which takes the burden of manually creating them off the programmers.
History
There are two previous major description languages: WSDL 2.0 (Web Services Description Language) and WADL (Web Application Description Language). Neither is widely adopted in the industry for describing RESTful APIs, citing poor human readability of both and WADL being actually unable to fully describe a RESTful API.
Principle
Hypertext-driven API
The principle behind building RESTful APIs is known under the acronym HATEOAS (Hypermedia as the Engine of Application State). In this approach, the client software is not written to a static interface description shared through documentation. Instead, the client is given a set of entry points and the API is discovered dynamically through interaction with these endpoints. HATEOAS was introduced in Roy Fielding's doctoral thesis Architectural Styles and the Design of Network-based Software Architectures. HATEOAS is one of the key elements distinguishing REST from RPC mechanisms.
List of RESTful API DLs
Web Services Description Language (WSDL)
Hydra
Open Data Protocol (OData)
References
Cloud standards
Software architecture |
https://en.wikipedia.org/wiki/Virtru | Virtru is a global data encryption and digital privacy provider founded in 2012. The company is headquartered in Washington, D.C.
History
Virtru was co-founded by CEO John Ackerly and his brother and CTO, Will Ackerly, in 2012.
While working in national security, the co-founders experienced the unmet necessity for secure sharing firsthand. As a White House policy advisor during 9/11, John saw how secure data sharing and collaboration could have helped connect the dots and save lives. Will spent eight years at the National Security Agency (NSA) where he specialized in cloud analytic and security architecture and experienced similar frustrations with data silos in the intelligence community. During his tenure at the NSA, Will created the Trusted Data Format (TDF) so analysts and operators could confidently share data and collaborate across organizations.
Funding
Virtru is privately funded with investments from ICONIQ Capital, Bessemer Venture Partners and other private investors. Iconiq Capital's founding partner, Will Griffith, and Bessemer partner David Cowan, co-founder of Verisign, serve on the company’s board of directors. Sonatype CEO and Former CEO at Sourcefire, Wayne Jackson, and Authentic8 CEO, Scott Petry, who founded the email security company Postini, are also Virtru board members.
On August 22, 2016, Virtru announced that it closed a $29 million Series A funding led by Bessemer Venture Partners with New Enterprise Associates, Soros Fund Management, Haystack Partners, Quadrant Capital Advisors, and Blue Delta Capital also participating in the round. On May 31, 2018, Virtru announced a $37 million Series B round led by Iconiq Capital with participation from returning investors Bessemer Venture Partners, New Enterprise Associates, Samsung, Blue Delta Capital, and Soros Fund Management.
References
Email clients
Privacy |
https://en.wikipedia.org/wiki/ZipcodeZoo | ZipcodeZoo was a free, online encyclopedia intended to document all living species and infraspecies known to science. It was compiled from existing databases. It offered one page for each living species, supplementing text with video, sound, and images where available. ZipcodeZoo was integrated into an app called Lookup Life. As of 2019 the site no longer works.
ZipcodeZoo was an online database that collected the natural history, classification, species characteristics, conservation biology, and distribution information of thousands of species and infraspecies. It included over 800,000 photographs, 50,000 videos, 160,000 sound clips, and 3.2 million maps describing nearly 3.2 million species and infraspecies. Its content is now only available on the Internet Archive
The site and its sister site lookup.life included a number of specialized search functions, such as identifying a bird species from its color, shape and other traits, including where it was seen; or generating a list of plants or animals likely to be found in or near a specific location (a zipcode, state, country, latitude/longitude, etc.). The searches could be restricted to specific taxa, or broad categories like reptiles or fish. A sound trainer could play multiple bird song recordings simultaneously.
ZipcodeZoo drew on the Catalogue of Life for its basic species list, the Global Biodiversity Information Facility for its maps, Flickr for many of its photos, YouTube for videos, Xeno-canto for some of its sound recordings, the IUCN for conservation status, and other major sources.
All the pages were published under one of the Creative Commons licenses.
References
Biodiversity databases
Biology websites
Online encyclopedias
Internet properties established in 2004
Taxonomy (biology)
Websites which use Wikipedia
Encyclopedias of science
Defunct websites |
https://en.wikipedia.org/wiki/Lo%20Nuestro%20Award%20for%20Regional%20Mexican%20Male%20Artist%20of%20the%20Year | The Lo Nuestro Award for Regional Mexican Male Artist of the Year is an award presented annually by American network Univision. The accolade was established to recognize the most talented performers of Latin music. The nominees and winners were originally selected by a voting poll conducted among program directors of Spanish-language radio stations in the United States and also based on chart performance on Billboard Latin music charts, with the results being tabulated and certified by the accounting firm Deloitte. At the present time, the winners are selected by the audience through an online survey. The trophy awarded is shaped in the form of a treble clef.
Prior to 1992, the award was known as Regional Mexican Artist of the Year, until the category was split to form this award and the Regional Mexican Female Artist of the Year award.
The award was first presented to Mexican singer Vicente Fernández in 1992. Mexican performers Marco Antonio Solis and Espinoza Paz hold the record for the most awards with 4 each. Mexican singer Julión Álvarez is the most nominated performer without a win, with five unsuccessful nominations.
Winners and nominees
Listed below are the winners of the award for each year, as well as the other nominees for the majority of the years awarded.
References
Regional Mexican Male Artist of the Year
Regional Mexican musicians
Awards established in 1992 |
https://en.wikipedia.org/wiki/Lo%20Nuestro%20Award%20for%20Regional%20Mexican%20Group%20or%20Duo%20of%20the%20Year | The Lo Nuestro Award for Regional Mexican Group or Duo of the Year is an award presented annually by American network Univision. It was first awarded in 1989 and has been given annually since. The accolade was established to recognize the most talented performers of Latin music. The nominees and winners were originally selected by a voting poll conducted among program directors of Spanish-language radio stations in the United States and also based on chart performance on Billboard Latin music charts, with the results being tabulated and certified by the accounting firm Deloitte. At the present time, the winners are selected by the audience through an online survey. The trophy awarded is shaped in the form of a treble clef.
The award was first presented to Mexican band Los Bukis. American group Intocable holds the record for the most awards, winning on five occasions out of seven nominations. Mexican band La Original Banda el Limón de Salvador Lizarraga are the most nominated band without a win, with four unsuccessful nominations.
Winners and nominees
Listed below are the winners of the award for each year, as well as the other nominees for the majority of the years awarded.
References
Regional Mexican Group or Duo of the Year
Regional Mexican music groups
Awards established in 1992 |
https://en.wikipedia.org/wiki/Shadow%20Squad | Shadow Squad is a British TV series that ran from 1957-59 starring Peter Williams and George Moon. 179 episodes were made, of which only four survive. Network released the surviving episodes on DVD in 2011, along with the sole surviving episode of the spin-off, Skyport. Both series were produced by Granada Television.
Premise
Criminal cases investigated by the Shadow Squad detective agency run by former Scotland Yard sleuth Don Carter, along with his trusty Cockney sidekick Ginger Smart.
Main cast
George Moon as Ginger Smart
Peter Williams as Don Carter
John Horsley as Supt. Whitelaw
Rex Garner as Vic Steele
Kathleen Boutall as Mrs. Moggs
References
External links
Shadow Squad at IMDb
1957 British television series debuts
1959 British television series endings
1950s British drama television series
Black-and-white British television shows
British detective television series
English-language television shows
ITV (TV network) original programming
Lost television shows
Television series by ITV Studios
Television shows produced by Granada Television |
https://en.wikipedia.org/wiki/Wu%20Lebao | Wu Lebao () (born 8 June 1983) is a cyber-dissident from Bengbu, Anhui, People's Republic of China. Wu is an active critic of the Chinese government and its foreign influence, and has expressed concerns about the impact on freedom in Australia and other democratic countries during many of his media interviews. He has claimed that the Chinese Students and Scholars Association is directly controlled by Chinese embassies and Chinese government, and that it has intentionally worked to sabotage academic freedom in campuses of Western universities. In 2019, media revealed that Lebao was among one hundred or so dissidents, including Ai Weiwei, 14th Dalai Lama, and Liu Xiaobo, whose name and works are totally forbidden to print in China even for oversea publications.
Wu Lebao suspected of leading the Chinese Jasmine Revolution with Ai Weiwei and was interrogated by the Public Security Bureau of the People's Republic of China.
He was formally arrested on 14 July 2011, and detained in Bengbu's No. 2 Detention Center for 'inciting subversion of state power' over three months. He was bailed on 28 October 2011, but was forbidden to get in touch with other Chinese dissidents. As reported, he was tortured during the detention.
He departed China after his bail was ceased in February 2013. After he arrived in Australia, he declared that he did not lead the Chinese Jasmine Revolution. He had then settled in Melbourne, Victoria, Australia.
In May 2015, Wu, as a Chinese refugee, participated in a signatory of an open letter with Gu Yi appealing that Chinese Government end its secrecy over the Tiananmen Square massacre and hold those responsible to account. Mr Wu took an interview with The Guardian, in the report, Wu was titled as “China's lonely voice of dissent refuses to forget the victims of Tiananmen Square”. Wu told his story about his imprisonment in China, and his concern about the Chinese influence will impact the freedom of speech in Australia.
In 2016, Lebao and his friends published an open letter on Change Org to support Wu Wei, a tutor from University of Sydney who burned his Chinese passport and then was attacked by Chinese students. In the letter, Lebao argued that "the burning of a Chinese passport is only Mr. Wu's way of expressing political dissent." It believes that Wu Wei "is becoming a victim of the Chinese government’s increasingly intrusive attempts to curb voices of dissent among overseas Chinese."
Later in that year, Lebao gave an interview with a journalist from Woroni, the Newspaper of Australian National University, revealing that he had commenced studies there. Lebao is often harassed by Chinese students at ANU because of his political views and his refugee background. In September 2016, Lebao and his friend Alex Joske, who was a student journalist at ANU then, attended a gala organised by Chinese student in their university. They were trailed to a bathroom by those Chinese Students and Scholars Association organisers. Lately in 20 |
https://en.wikipedia.org/wiki/Global%20Network%20for%20Rights%20and%20Development | Global Network for Rights and Development (commonly known as GNRD) is a Norwegian non-governmental human rights organization established in June 2008. It was declared bankrupt in 2016. While operational, the organization focused on advancing the rights of refugees, poverty eradication, women's empowerment, and good governance, most notably in the Middle East and North Africa.
Organization
GNRD operated as a research and advocacy organization that worked to advance the rights of disadvantaged and vulnerable persons, primarily by organizing roundtables, debates, and exhibitions at the European Parliament in Brussels, Belgium, and at the United Nations Human Rights Council in Geneva, Switzerland. After establishing its office in Brussels in 2013, GNRD organized of a series of roundtables with Members of the European Parliament focusing on poverty eradication, the rights of children in conflict zones, the role of women in democracy, and the impact of counterterrorism policy on human rights.
According to the European Parliament register, the Brussels office implemented the following consultative committee meetings:
"Children in Conflict Zones: The Impact of the War in Yemen", a conference held under the joint auspices of GNRD and MEP Ms. Julie Ward, on 23 June 2015.
“Eradicating Poverty for Social Development”, a conference held under the joint auspices of GNRD and MEP Ms. Elly Schlein, on 21 April 2015.
“Protecting Human Rights in Counter-Terrorism”, a conference held under the joint auspices of GNRD and MEP Mr Afzal Khan, Vice Chair for the Security and Defence Committee, on 9 December 2014.
“Tunisian International Observation Mission: Women Working Towards Democracy”, a conference held under the joint auspices of GNRD and MEP Ms. Mariya Gabriel, on 13 November 2014.
"Children in Conflict: Urgent Humanitarian Aid for Gaza's Youth", a conference held under the joint auspices of GNRD and MEP Mr. Sajjad Karim, on 14 October 2014.
“International Observation of Egypt’s Constitutional Referendum – Challenges Ahead", round-table and interactive dialogue hosted by GNRD and MEP Eija-Riitta Korhola, on 17 March 2014.
“The Role of Media in Human Rights and Democracy - Press Freedom", a round-table and an interactive dialogue hosted by GNRD and MEP Eija-Riitta Korhola, on 29 January 2014.
"Violence against women in situations of armed conflict", on the occasion of the International Day for Elimination of Violence against Women, hosted by GNRD and MEP Ms. Nikki Sinclaire, on 25 November 2013.
GNRD's headquarters were located in Stavanger, Norway, on Kvalaberg Road in the borough Hillevåg. More than 20 employees, mostly of foreign origin, worked in the Stavanger office. In addition to its offices in Norway and Belgium, GNRD also had offices in Amman, Jordan; Dubai, UAE; Geneva, Switzerland; and Valencia, Spain.
The board of directors consisted of Hassan Mousa, Ali Ahmad Abdalla Alananzeh, Shawqi Abdelmajid Issa, Tamam Khalil M J Abushammala, Magdy El |
https://en.wikipedia.org/wiki/Neighbours%2030th%3A%20The%20Stars%20Reunite | Neighbours 30th: The Stars Reunite is a 2015 Australian television documentary, which celebrates 30 years of the soap opera Neighbours. It first aired on Network Ten and Eleven on 16 March 2015, two days before the show celebrated its 30th anniversary. Hosted by actors Stefan Dennis and Tim Phillipps, the documentary features current and former cast members reminiscing about their time on the show and their favourite memories. The results of a poll to find viewers' top five favourite Neighbours moments are also revealed. The documentary received mostly positive reviews from critics, but underperformed in the Australian ratings.
Overview
Producers FremantleMedia Australia confirmed in November 2014, that a special show celebrating [[Neighbours 30th Anniversary|Neighbours''' 30th anniversary]] would air on Network Ten in March 2015. The following month, it was announced that the special would be a 90-minute documentary. Michael Lallo of The Sydney Morning Herald confirmed former co-stars Kylie Minogue, Jason Donovan and Guy Pearce would be involved. Network Ten's drama chief Rick Maier commented that the documentary includes scenes from the show and "an affectionate nod" to Labrador Retriever Bouncer. It also clears up some myths about the show's ratings after its move from Channel Seven to Network Ten.Neighbours 30th: The Stars Reunite is hosted by cast members Stefan Dennis and Tim Phillipps. It features interviews with current and former Neighbours actors, as they share memories about their time on the show and the impact Neighbours has had on their careers. Series producer Jason Herbison said the documentary was "a celebration of Neighbours past and present" and provides viewers with an insight into the show and its success. The documentary features a look back at the beginning of Neighbours in the 1980s, its appeal to viewers, its overseas success, the weddings, scandals, deaths and dramatic moments. Minogue, Donovan and Pearce's original audition tapes are also included. Neighbours 30th: The Stars Reunite concludes with the results of a poll to find Australian and UK fans' top five favourite moments.
Top five favourite Neighbours moments
Scott and Charlene's wedding (1987)
Toadie and Dee car crash (2003)
Plain Jane Super Brain makeover (1986)
Harold back from the dead (1996)
The plane crash (2005)
Cast
The present and former cast members involved are:
Natalie Bassingthwaighte (Izzy Hoyland)
Ashleigh Brewer (Kate Ramsay)
Anne Charleston (Madge Bishop)
Lucinda Cowden (Melanie Pearson)
Jason Donovan (Scott Robinson)
Terence Donovan (Doug Willis)
Alan Fletcher (Karl Kennedy)
Delta Goodrem (Nina Tucker)
Annie Jones (Jane Harris)
Paul Keane (Des Clarke)
Mark Little (Joe Mangel)
Daniel MacPherson (Joel Samuels)
Scott McGregor (Mark Brennan)
Craig McLachlan (Henry Ramsay)
Kylie Minogue (Charlene Robinson)
Ryan Moloney (Toadfish Rebecchi)
Tom Oliver (Lou Carpenter)
Guy Pearce (Mike Young)
Margot Robbie (Donna Freedman)
Ian Smith (Harold Bisho |
https://en.wikipedia.org/wiki/Freedo | Freedo or variants may refer to
Freedo (producer), German music producer
Freedo, penguin cartoon mascot of Linux-libre, an operating system kernel and software package
FreeDO, an emulator for the 3DO
See also
FreeDOS operating system
Fredo given name |
https://en.wikipedia.org/wiki/ACM%20Transactions%20on%20Algorithms | ACM Transactions on Algorithms (TALG) is a quarterly peer-reviewed scientific journal covering the field of algorithms. It was established in 2005 and is published by the Association for Computing Machinery. The editor-in-chief is Edith Cohen. The journal was created when the editorial board of the Journal of Algorithms resigned out of protest to the pricing policies of the publisher, Elsevier. Apart from regular submissions, the journal also invites selected papers from the ACM-SIAM Symposium on Discrete Algorithms (SODA).
Abstracting and indexing
The journal is abstracted and indexed in the Science Citation Index Expanded, Current Contents/Engineering, Computing & Technology, and Scopus. According to the Journal Citation Reports, the journal has a 2022 impact factor of 1.3.
Past editors
The following persons have been editors-in-chief of the journal:
Harold N. Gabow (2005-2008)
Susanne Albers (2008-2014)
Aravind Srinivasan (2014-2021)
See also
Algorithmica
Algorithms (journal)
References
External links
Association for Computing Machinery academic journals
Quarterly journals
Academic journals established in 2005
English-language journals
Computer science journals |
https://en.wikipedia.org/wiki/List%20of%20minor%20planets%3A%20430001%E2%80%93431000 |
430001–430100
|-bgcolor=#E9E9E9
| 430001 || || — || October 24, 2009 || Kitt Peak || Spacewatch || — || align=right data-sort-value="0.92" | 920 m ||
|-id=002 bgcolor=#E9E9E9
| 430002 || || — || September 23, 2008 || Mount Lemmon || Mount Lemmon Survey || — || align=right | 2.5 km ||
|-id=003 bgcolor=#fefefe
| 430003 || || — || November 20, 2006 || Kitt Peak || Spacewatch || — || align=right data-sort-value="0.61" | 610 m ||
|-id=004 bgcolor=#E9E9E9
| 430004 || || — || October 6, 2004 || Kitt Peak || Spacewatch || — || align=right | 1.8 km ||
|-id=005 bgcolor=#fefefe
| 430005 || || — || November 29, 2003 || Kitt Peak || Spacewatch || — || align=right data-sort-value="0.80" | 800 m ||
|-id=006 bgcolor=#fefefe
| 430006 || || — || February 28, 2008 || Kitt Peak || Spacewatch || — || align=right data-sort-value="0.73" | 730 m ||
|-id=007 bgcolor=#fefefe
| 430007 || || — || January 13, 2011 || Mount Lemmon || Mount Lemmon Survey || V || align=right data-sort-value="0.74" | 740 m ||
|-id=008 bgcolor=#fefefe
| 430008 || || — || October 12, 2010 || Mount Lemmon || Mount Lemmon Survey || — || align=right data-sort-value="0.64" | 640 m ||
|-id=009 bgcolor=#fefefe
| 430009 || || — || August 28, 2006 || Kitt Peak || Spacewatch || — || align=right data-sort-value="0.70" | 700 m ||
|-id=010 bgcolor=#fefefe
| 430010 || || — || October 24, 2003 || Kitt Peak || Spacewatch || — || align=right data-sort-value="0.62" | 620 m ||
|-id=011 bgcolor=#E9E9E9
| 430011 || || — || January 30, 2011 || Mount Lemmon || Mount Lemmon Survey || — || align=right | 1.5 km ||
|-id=012 bgcolor=#E9E9E9
| 430012 || || — || August 28, 2005 || Kitt Peak || Spacewatch || KRM || align=right | 1.5 km ||
|-id=013 bgcolor=#E9E9E9
| 430013 || || — || April 30, 2003 || Kitt Peak || Spacewatch || — || align=right | 1.8 km ||
|-id=014 bgcolor=#fefefe
| 430014 || || — || January 26, 2007 || Kitt Peak || Spacewatch || — || align=right data-sort-value="0.82" | 820 m ||
|-id=015 bgcolor=#E9E9E9
| 430015 || || — || September 1, 2013 || Mount Lemmon || Mount Lemmon Survey || — || align=right | 1.8 km ||
|-id=016 bgcolor=#fefefe
| 430016 || || — || September 22, 2000 || Kitt Peak || Spacewatch || — || align=right data-sort-value="0.67" | 670 m ||
|-id=017 bgcolor=#fefefe
| 430017 || || — || January 13, 2011 || Mount Lemmon || Mount Lemmon Survey || — || align=right data-sort-value="0.80" | 800 m ||
|-id=018 bgcolor=#fefefe
| 430018 || || — || January 27, 2007 || Kitt Peak || Spacewatch || NYS || align=right data-sort-value="0.86" | 860 m ||
|-id=019 bgcolor=#E9E9E9
| 430019 || || — || December 20, 2009 || Mount Lemmon || Mount Lemmon Survey || — || align=right | 2.2 km ||
|-id=020 bgcolor=#E9E9E9
| 430020 || || — || January 7, 2006 || Kitt Peak || Spacewatch || — || align=right | 1.2 km ||
|-id=021 bgcolor=#E9E9E9
| 430021 || || — || October 4, 1999 || Kitt Peak || Spacewatch || GEF || align=right | 1.2 km ||
|-id=022 bgcolor=#d6d6d6
| 430022 || || — || Sept |
https://en.wikipedia.org/wiki/Threat%20Intelligence%20Platform | Threat Intelligence Platform (TIP) is an emerging technology discipline that helps organizations aggregate, correlate, and analyze threat data from multiple sources in real time to support defensive actions. TIPs have evolved to address the growing amount of data generated by a variety of internal and external resources (such as system logs and threat intelligence feeds) and help security teams identify the threats that are relevant to their organization. By importing threat data from multiple sources and formats, correlating that data, and then exporting it into an organization’s existing security systems or ticketing systems, a TIP automates proactive threat management and mitigation. A true TIP differs from typical enterprise security products in that it is a system that can be programmed by outside developers, in particular, users of the platform. TIPs can also use APIs to gather data to generate configuration analysis, Whois information, reverse IP lookup, website content analysis, name servers, and SSL certificates.
Traditional approach to enterprise security
The traditional approach to enterprise security involves security teams using a variety of processes and tools to conduct incident response, network defense, and threat analysis. Integration between these teams and sharing of threat data is often a manual process that relies on email, spreadsheets, or a portal ticketing system. This approach does not scale as the team and enterprise grows and the number of threats and events increases. With attack sources changing by the minute, hour, and day, scalability and efficiency is difficult. The tools used by large Security Operations Centers (SOCs), for example, produce hundreds of millions of events per day, from endpoint and network alerts to log events, making it difficult to filter down to a manageable number of suspicious events for triage.
Threat intelligence platforms
Threat intelligence platforms make it possible for organizations to gain an advantage over the adversary by detecting the presence of threat actors, blocking and tackling their attacks, or degrading their infrastructure. Using threat intelligence, businesses and government agencies can also identify the threat sources and data that are the most useful and relevant to their own environment, potentially reducing the costs associated with unnecessary commercial threat feeds.
Tactical use cases for threat intelligence include security planning, monitoring and detection, incident response, threat discovery and threat assessment. A TIP also drives smarter practices back into SIEMs, intrusion detection, and other security tools because of the finely curated, relevant, and widely sourced threat intelligence that a TIP produces.
An advantage held by TIPs, is the ability to share threat intelligence with other stakeholders and communities. Adversaries typically coordinate their efforts, across forums and platforms. A TIP provides a common habitat which makes it possible for s |
https://en.wikipedia.org/wiki/Making%20Today%20a%20Perfect%20Day | "Making Today a Perfect Day" is a song from the 2015 Walt Disney Animation Studios computer-animated short film Frozen Fever, with music and lyrics by Kristen Anderson-Lopez and Robert Lopez and performed throughout most of the short. It was released as a single in the United States on March 12, 2015.
Production and writing
On September 2, 2014, during the ABC airing of The Story of Frozen: Making a Disney Animated Classic, Walt Disney Animation Studios' chief creative officer John Lasseter announced that a Frozen short film with a new song would be released in the future. On the same day, Variety announced that the short would be released in early 2015 under the title Frozen Fever, with Chris Buck and Jennifer Lee returning as co-directors, Peter Del Vecho returning as producer and a new song by Kristen Anderson-Lopez and Robert Lopez. In a mid-October interview, Idina Menzel revealed that the cast had already recorded their vocal tracks, stating "We just worked on a short for Frozen." On December 3, 2014, it was announced that Aimee Scribner would be a co-producer and that Frozen Fever would debut in theaters alongside Walt Disney Pictures' Cinderella on March 13, 2015. In late December, the co-directors told the Associated Press "There is something magic about these characters and this cast and this music. Hopefully, the audiences will enjoy the short we're doing, but we felt it again. It was really fun." Around the same time, Dave Metzger, who worked on the orchestration for Frozen, disclosed he was already at work on Frozen Fever.
In March 2015, the directors revealed that Walt Disney Animation Studios had brought up the possibility of creating a short film in April 2014. Buck and Lee were initially reluctant because they were still trying to determine why Frozen had been such a success, but agreed to start brainstorming possibilities. After early discussions about Olaf, head story artist Marc Smith pitched the idea of what might happen if Elsa had a cold, which became the basis for the short's plot. The directors began working on the short in June and by August were back in the recording studio with the cast to lay down vocal tracks.
The short features the song "Making Today a Perfect Day", by Anderson-Lopez and Lopez. At the premiere of Cinderella and Frozen Fever at the El Capitan Theatre in Hollywood, California, on March 1, 2015, Josh Gad told USA Today, "I want to apologize to parents everywhere for the fact that children are going to be singing a whole new Frozen song..." Gad's wife noticed he was still humming it two days after he recorded his lines.
Composition
In "Making Today a Perfect Day" there is a lyrical reference to "Let It Go"—Elsa notes to Anna that "a cold never bothered me anyway", this time re-purposing the line by referring to an actual cold. Billboard suggests that the songwriting duo included this Easter egg because they "know exactly what the fanbase wanted".
The beginning of the song also includes a passage |
https://en.wikipedia.org/wiki/Roberts%20Orya | Roberts U. Orya is a former managing director and CEO of the Nigerian Export-Import Bank (NEXIM) and honorary president of the Global Network of Export-Import Banks and Development Finance Institutions. He entered office in August 2009 to lead the bank's executive management team.
Family background and early education
Orya was born in Ugwe, Benue State, Nigeria, from a poor background and a father who was physically challenged. He later attended Benue State Polytechnic from where he got an Ordinary National Diploma after completing his studies at the Teacher's College where he obtained a National Certificate of Education.
NEXIM Bank
By December 2009, the new management of the bank inherited debts totaling about ₦14.6 billion, about 72 per cent of which was categorized as non-performing, while over ₦10.03 billion (69.05 per cent) was classified lost or irrecoverable in line with prudential guidelines.
Achievements and initiatives At NEXIM Bank
Orya led the initiative of the Nigerian Export-Import Bank (NEXIM) in conjunction with the Federation of West African Chambers of Commerce and Industry.
To broaden the scope of the credit offering by the bank to guarantee credits for both export and import as well as credit insurance, he led the bank entered into agreements with some international credit institutions like the Islamic Development Bank.
Through his leadership the bank also generated about 1.3 billion dollars (about ₦164 billion) foreign exchange earnings for the country during the period.
Legal proceedings
In May 2021, the Benue State High Court ordered NEXIM to pay ₦500 million to Orya as damages for "unlawful arrest and detention".
Policies and presentations
Orya's leadership in NEXIM initiated the Sealink project. He has contributed to national and international policies including:
"Economic diversification, non-oil export growth back on front burner", by Roberts Orya
A Practical Framework for Boosting Intra-Africa Trade, Financial Nigeria Magazine, August 2013
Funding/investment Opportunities in the creative/entertainment industry
Facilitating the non-oil sector in Nigeria
References
Nigerian chief executives
University of Ibadan alumni
Living people
Year of birth missing (living people)
People from Benue State |
https://en.wikipedia.org/wiki/Congress%20Rental%20Network | Congress Rental Network (CRN) is a worldwide network of technology meeting specialists. As an organization, it aims to provide technical solutions, in regards to conference, congress and audiovisual requirements for meetings and events. It is linked to conference equipment manufactured by German conglomerate Bosch.
History
CRN was created in 1990 with the first members to joining in, under the guidance of Philips (at that time - now Bosch), were located in Denmark, the Netherlands and Italy. It has been associated with G20's meetings and with the International Association of Conference Interpreters (AIIC).
References
External links
CRN official website
Business services companies established in 1990
Dutch companies established in 1990
Event management companies |
https://en.wikipedia.org/wiki/PredictifyMe | PredictifyMe is a predictive analytics company with headquarters in Research Triangle Park, North Carolina. The company uses advanced algorithms and data sets to predict outcomes of social and commercial problems. It works primarily in the fields of security, retail, education, insurance and healthcare.
History
PredictifyMe was founded in 2012 by Rob Burns, Garrett Perdue and Marcy Bucci. Rob met Dr. Usmani during Eisenhower Fellows. Usmani had completed his Ph.D. at Florida Institute of Technology where his thesis involved a predictive model of suicide bombings that is used for forensic investigations and prevention tool. Burns received his M.B.A. from George Washington University and spent 15 years studying how kids' lives are impacted based on the location where they are born. Burns and Usmani worked together for two years, adapting Usmani's predictive model to predict social and commercial impacts for various regions of the world.
PredictifyMe started with seed round funding of approximately $250,000. The company tried to raise $1 million, but stopped asking for funding due to the number of clients it signed up minimized the need for extra capital. The final amount of funding totaled $305,263 according to its Form D filing. PredictifyMe was officially launched in 2014.
Products and services
PredictifyMe's initial products included Hourglass and its various versions for different verticals.
The company ventured into the healthcare market in 2015, developing its Hourglass software. The software predicts potential medical outcomes such as the anticipated number of pregnancies in a particular area. It also assists in optimizing healthcare spending, predicting healthcare demands based on preemptive healthcare. Hourglass Retail is part of the software that measures impact of marketing dollars in the retail industry.
Partnership with the United Nations
On March 18, 2015, UN special envoy for global education and former British Prime Minister Gordon Brown announced Partnership of United Nations with PredictifyMe. The sole purpose of Partnership was to involve the technical abilities of PredictifyMe to counter terrorist attacks on educational institutes all over the world. Mr. Brown pledged to fight terrorism and related causes that hinders the basic right of education to children.
References
External links
PredictifyMe official website
Companies based in North Carolina |
https://en.wikipedia.org/wiki/List%20of%20The%20CW%20affiliates%20%28by%20U.S.%20state%29 | The CW is an American television network, which launched on September 18, 2006, as a programming and management consolidation of its two predecessors The WB (majority-owned by Time Warner) and UPN (owned at the time of that network's shutdown by CBS Corporation), both of which began broadcasting in January 1995.
The network currently has over-the-air coverage on thirty-six owned-and-operated stations and 192 affiliates available on analog, low-power or digital broadcast signals (primarily covering the 100 largest Nielsen-designated markets with moderate over-the-air coverage in smaller markets); and 17 additional local affiliates distributed exclusively through cable television providers. Counting only its broadcast affiliates, The CW covers 99.80% of all households in the United States with at least one television set.
The following article is a listing of CW-affiliated television stations, arranged alphabetically by state and territory, and based on the station's city of license and followed in parentheses by the Designated Market Area if differing from the city of license. There are links to and articles on most of the stations, describing their histories, local programming and technical information, such as broadcast frequencies.
For broadcast affiliates, the station's advertised channel number follows the call letters. In most cases, this is the station's virtual channel (PSIP) number.
Stations listed in boldface are owned and operated by the CW's majority owner Nexstar Media Group. Stations listed with the superscript identification CW+ are broadcast or cable affiliates of The CW Plus, a programming service distributed mainly to areas ranked among the 110 smallest U.S. television markets, which alongside CW network programming, carries syndicated and brokered programs acquired and scheduled by the network.
United States
Alabama
Bessemer – WDBB 17 (satellite of WTTO)
Dothan – WRGX-LD2 23.2 / WTVY-DT3 4.3 (simulcast of WRGX-LD2)CW+, 1
Gulf Shores (Mobile) – WFNA 55
Homewood (Birmingham) – WTTO 21 (ATSC 3.0 TV Station) / WIAT (ATSC 1.0 Simulcast)
Huntsville – WHDF 15
Montgomery – WBMM 22CW+, 1
Alaska
Anchorage – KYUR-DT2 13.2CW+, 1
Fairbanks – KATN-DT3 2.3CW+, 1
Juneau – KJUD-DT2 8.2CW+, 1
Arizona
Phoenix – KASW 61 (ATSC 3.0 TV Station) / KNXV-TV (ATSC 1.0 Simulcast)
Tucson – KWBA-TV 58
Arkansas
Fayetteville – KHOG-DT2 29.2 (satellite of KHBS)CW+, 1
Fort Smith – KHBS-DT2 40.2CW+, 1
Jonesboro – KAIT-DT3 8.3CW+, 1
Little Rock – KASN 38
California
Bakersfield – KGET-DT2 17.2CW+, 1, 4
Chico – KHSL-DT2 12.2CW+, 1
El Centro (Yuma, Arizona) – KECY-DT3 9.3CW+, 1
Eureka – KECA-LD 29.1
Los Angeles – KTLA 5
Monterey – KCBA 35CW+
Palm Springs – KCWQ-LD 2 / KESQ-DT3 2.3 (simulcast of KCWQ-LP)CW+, 1
San Diego – KFMB-DT2 8.2
San Francisco – KRON-TV 4
Sanger (Fresno) – KFRE-TV 59 (ATSC 3.0 TV Station) / KGPE (ATSC 1.0 Simulcast)
San Luis Obispo (Santa Barbara) – KSBY-DT2 6.2CW+, 1
Stockton (Sacramento) – KQCA 58
Colorado
|
https://en.wikipedia.org/wiki/Joy%20Mountford | S. Joy Mountford is an internationally recognized leader in the field of computer-human interaction or interface design. From 1986 to 1994, she was Head of the Human Interface Group at Apple Computer where she invented, among other things, the initial use of QuickTime. In 2012, Mountford won the Lifetime Practice Award from SIGCHI and was invited to join the CHI Academy. She was given an Osher Fellowship Award at the Exploratorium in San Francisco. In 2019, she received the Mission College Women Leadership award.
Career
Mountford received her Bachelor of Science in Cognitive Psychology from University College London, then received a scholarship to study Engineering Psychology at the University of Illinois. Her graduate work was in multi-modal models of information processing.
She began her career in Aviation at Honeywell Systems Research Center designing speech recognition systems, stereographic helmet displays, and automated flight controls for B52, RF4, and F-16/18. She continued Artificial Intelligence research efforts at Microelectronics Computer Consortium (MCC) in Austin, Texas as a project leader of the Visual Metaphors team.
Mountford moved to California to establish the first Apple Human Interface Group. This team nurtured interdisciplinary teams of artists and scientists to practice user experience and design, initiating what is now referred to as 'Design Thinking'. At Apple her team became highly influential by teaching and training a new generation of designers at international schools such as RCA, Stanford, NYU, UCB, CMU, IIT, and many others. This program was named the International Design Expo; it ran for over 20 years and had various corporate sponsors. This had a huge impact on creating the next generation of interdisciplinary design innovators in both education and industry.
At Apple many of the team’s interface ideas were seminal, media-based and came to life in current Apple products. In 2020 ‘stacks’ was released as part of system software, which was based on the work performed in the Human Interface Group in 1992. Additional projects were SonicFinder, Transition Factory, Photologger, Quicktime VR, and Bubble Help in derivative forms. During her Apple tenure Mountford also completed a Management Business Program at INSEAD Business School.
Mountford was a senior project lead at Interval Research (Paul Allen’s research company) focusing on Soundscapes using both physical objects and software to compose non-notational audio scapes. In addition, her team built printable internet-aware books serving as new interactive experiences. Some of this work made its way into products of toy companies like Lego and Mattel, under her own company.
As a VP of User Experience Design at Yahoo!, her work focused on bringing data to use through data visualizations. These were installed as some of the first ever realtime 3D data visualisations on the building walls. Examples were real time travel of mail around the world, as well as live |
https://en.wikipedia.org/wiki/Rakuten%20Rewards | Rakuten Rewards (), formerly known as Ebates, is a cash-back and shopping rewards company. Its revenue comes from affiliate network links. Members of the site click through affiliate links before shopping at a retailer's site. Once the member makes a purchase, Rakuten Rewards receives an affiliate commission from the retailer which is then shared with the member. The company publishes links both on its website and through a browser extension as well as a mobile app.
History
Rakuten Rewards was founded as Ebates in 1998 in Menlo Park, California, by two former deputy district attorneys, Alessandro Isolani and Paul Wasserman. Funded by the venture capital firm Foundation Capital, Ebates.com was launched on 3 May 1999, offering up to 25% cash back from about 40 online retailers.
In September 2014, Ebates was acquired by the Japanese e-commerce company Rakuten for US$1 billion. In 2019, the Ebates brand was phased out and replaced with Rakuten Rewards.
Acquisitions
Services/tools
Logos
References
American companies established in 1998
Internet properties established in 1998
1998 establishments in California
Companies based in San Mateo, California
Rakuten
2014 mergers and acquisitions
American subsidiaries of foreign companies |
https://en.wikipedia.org/wiki/Low-power%20wide-area%20network | This needs to include cellular LPWAN technologies such as NB-IoT, LTE-M, Cat-M1
A low-power, wide-area network (LPWAN or LPWA network) is a type of wireless telecommunication wide area network designed to allow long-range communication at a low bit rate between things, such as sensors operated on a battery.
Low power, low bit rate, and intended use distinguish this type of network from a wireless WAN that is designed to connect users or businesses, and carry more data, using more power. The LPWAN data rate ranges from 0.3 kbit/s to 50 kbit/s per channel.
A LPWAN may be used to create a private wireless sensor network, but may also be a service or infrastructure offered by a third party, allowing the owners of sensors to deploy them in the field without investing in gateway technology.
Attributes
Range: The operating range of LPWAN technology varies from a few kilometers in urban areas to over 10 km in rural settings. It can also enable effective data communication in previously infeasible indoor and underground locations.
Power: LPWAN manufacturers claim years to decades of usable life from built-in batteries, but real-world application tests have not confirmed this.
Platforms and technologies
Some competing standards and vendors for LPWAN space include:
DASH7, a low latency, bi-directional firmware standard that operates over multiple LPWAN radio technologies including LoRa.
Wize is an open and royalty-free standard for LPWAN derived from the European Standard Wireless Mbus.
Chirp spread spectrum (CSS) based devices.
Sigfox, UNB-based technology and French company.
LoRa is a proprietary, chirp spread spectrum radio modulation technology for LPWAN used by LoRaWAN, Haystack Technologies, and Symphony Link.
MIoTy, implementing Telegram Splitting technology.
Weightless is an open standard, narrowband technology for LPWAN used by Ubiik
ELTRES, a LPWA technology developed by Sony, with transmission ranges of over 100 km while moving at speeds of 100 km/h.
IEEE 802.11ah, also known as Wi-Fi HaLow, is a low-power, wide-area implementation of 802.11 wireless networking standard using sub-gig frequencies.
Ultra-narrow band
Ultra Narrowband (UNB), modulation technology used for LPWAN by various companies including:
Sigfox, French UNB-based technology company.
Weightless, a set of communication standards from the Weightless SIG.
NB-Fi Protocol, developed by WAVIoT company.
Others
DASH7 Mode 2 development framework for low power wireless networks, by Haystack Technologies. Runs over many wireless radio standards like LoRa, LTE, 802.15.4g, and others.
LTE Advanced for Machine Type Communications (LTE-M), an evolution of LTE communications for connected things by 3GPP.
MySensors, DIY Home Automation framework supporting different radios including LoRa.
NarrowBand IoT (NB-IoT), standardization effort by 3GPP for a LPWAN used in cellular networks.
Random phase multiple access (RPMA) from Ingenu, formerly known as On-Ramp Wireless, |
https://en.wikipedia.org/wiki/Augur%20%28software%29 | Augur is a decentralized prediction market platform built on the Ethereum blockchain. Augur is developed by Forecast Foundation, which was founded in 2014 by Jack Peterson, Joey Krug, and Jeremy Gardner. Forecast Foundation is advised by Ron Bernstein, founder of now-defunct company Intrade, and Ethereum founder Vitalik Buterin.
Operation
Augur allows any user to create a prediction market on any topic.
There are two kinds of markets:
Categorical markets have up to seven options; for example, "Will Alice win X election?" with "yes" and "no" as options, or "Who will win X election?" with five candidates as options. These markets are winners take all, making them similar to binary options.
Scalar markets offer a spectrum of numerical outcomes; for example, "What will the closing price of Apple's stock be on January 1 2021?" Traders can "long" or "short" any value, i.e. bet that the result will be higher or lower than a certain value. If a trader longs at X value, the more above X the result is, the more money they make (and similarly for shorts).
"Invalid" is one of the outcomes in all markets, which is intended to help prevent scam markets and ensure that market questions and resolutions are unambiguous.
To resolve markets, "reporting" fees are used to incentivize the reporting of market outcomes. Augur uses an ERC-20 token called REPv2 to incentivize reporters on its network to back their reports with tokens. The REPv2 token holders are entitled to the trading fees generated on the platform. Augur's security model has been rigorously quantified and shown to be secure. Augur runs on Ethereum.
History
After a crowdfunding in August 2015, the project launched in July 2018.
Soon after the platform launched, users had created death pools — or assassination markets — on famous people.
Augur's user numbers dropped off sharply after launch in 2018: from 265 daily users in early July, to 37 on 8 August.
In July 2018, the Commodity Futures Trading Commission noted resemblance of the Augur contracts to binary options, which would fall under its jurisdiction. Augur's decentralised design may allow it to sidestep regulatory difficulties, because Augur is just a protocol that allows users to set up their own prediction market, which developer Joseph Krug says "shift(s) legal responsibility to bettors".
In July 2020, Augur v2 was released. It included dramatic changes including the usage of DAI (a stablecoin pegged to the US dollar) for trading, faster resolution of market outcomes (24 hours vs. v1's 7 days), a more user-friendly interface, making "Invalid" a tradeable outcome, allowing market creators to add affiliate fees to encourage others to share the market, and allowing the creation of orders without any fees.
Forbes described Augur v2 as "a significant leap forward in the world of decentralized applications that function similar to the internet but without the need for trusted third parties. If successful, the profound upgrades could be u |
https://en.wikipedia.org/wiki/Minsk%20II%20%28disambiguation%29 | Minsk II is the second cease-fire agreement in the War in Donbas, Ukraine.
Minsk-II or Minsk-2 may also refer to:
Minsk-2 International Airport, Belarus
MINSK-2, of the Minsk family of computers
"Minsk-2", a song on the album Modern Thrills by the Russian band Tesla Boy |
https://en.wikipedia.org/wiki/Nemenman | Nemenman is a surname. Notable people with this surname include:
Ilya Nemenman ( 1975), American theoretical physicist
Mark Nemenman ( 1936), Soviet computer scientist
Surnames of Jewish origin
Yiddish-language_surnames |
https://en.wikipedia.org/wiki/Moments%20%28social%20networking%29 | Moments (Chinese: 朋友圈 pinyin: péngyǒu quān) is a function of the smartphone app WeChat, launched on 19 April 2012 in the WeChat version 4.0. It serves new social-networking functions for Wechat users. The Chinese translation of Moment is known as “Friends' circle”, which means users can share and get access to accepted WeChat friends' information, creating an intimate and private communicating circle within the users' choice of close friends.
Moments mainly focuses on sharing pictures with captions, while sharing statuses and sharing websites are also permitted.
History
On 19 April 2012, Moments was initially launched.(WeChat 4.0)
On 22 August 2012, Moments was updated with the new feature of comments to selected friends.(WeChat 4.2)
In September 2012, whether to receive the updating of friends and make private photos public could be decided by users.(WeChat 4.3)
On 7:30 22 July 2013, it was widely complained that Moments could not be refreshed.
In March 2014, users could attach location of restaurants or scenic.(WeChat 5.21)
On 19 May 2014, creating location information was available in Moments.(WeChat 5.3)
On 6 November 2014, Moments allowed the shoot and post of small videos.(WeChat 6.0.1 for iOS, the same for Android on 24 December 2014)
On 20 January 2015, searching within Moments and booing towards the posts were allowed.(WeChat 6.1 for iOS, the same for Android on 9 February 2015)
On 18 May 2017, the ability to synchronize Moments posts with Facebook and Twitter was added to the iOS version of Moments
Features
Being semi-closed is the most significant feature of Moments. After registering a WeChat account, users can add other WeChat users as "friends" and "like" or "comment" on friends’ posts freely. However, different from other social-networking sites or applications, Moments follows the principle of "my friend's friend is not my friend". That is to say, a user can only see those likes and comments made by conjunct friends between the user and the author, while cannot see the expressions made by people beyond their friend lists. Except this general principle, individual setting for blocking certain friends from seeing owners' posts can be made by users.
Strict censorship is another feature of Moments. On Dec 12, 2014, WeChat announced that according to "related regulations,"domains of the web pages that want to get shared in WeChat Moments need to get an ICP license by Dec 31, 2014 to avoid being restricted by WeChat.<
Derived Cultures
According to the On Device Research, WeChat has 93% market penetration in mainland China. Its giant user group and mode of “content proceeding from relationship”enables the development of particular culture in Moments, which can be summarized as “circle culture”. “Circle culture” can further include some specific cultures such as the culture of sharing and“like” and the culture of grouping.
Circle culture
Moments has strict verification for participants, which makes one's virtua |
https://en.wikipedia.org/wiki/Africa%20Magic | Africa Magic is a collection of Pay TV entertainment channels that focus on African programming, most popularly Nigerian series and movies. Africa Magic, which started off as single channel of the same name, is a brand owned by M-Net and now comprises seven channels.
History
Africa Magic was launched in July 2003 as a movie and general entertainment channel geared at showcasing Nollywood talent and African culture and couture. At the time of its launch it received high popularity amongst DStv subscribers, especially in South Africa and Nigeria. Thus the launching of a sister channel, Africa Magic Plus, was made possible. The two channels went on another brand identity
and over the next decade, the brand expanded to include seven more channels comprising movies, television shows and general entertainment. Africa Magic broadcasts in more than 50 African countries. The channels include Africa Magic Family, Africa Magic Showcase, Africa Magic Yoruba, Africa Magic Igbo, Africa Magic Hausa. Africa Magic Epic and Africa Magic Urban. Africa Magic is also responsible for the annual Africa Magic Viewers' Choice Awards (AMVCAs), the biggest celebration of film and television talent in Africa.
Africa Magic's original programmes
Stations
Africa Magic started out as a single Nollywood channel which gained popularity from Multichoice's biggest revenue generators, South Africa and Nigeria, the reason why Africa Magic plus was launched. These were later renamed along with the creation of new channels.
In 2017, Its rerun channel, Africa Magic World was discontinued due to lack of viewership.
Africa Magic Showcase
Previously Africa Magic Plus then Africa Magic Entertainment. The premium tier channel showing first-run original series, reality shows and latest nollywood movie premiers.
Africa Magic Urban
Previously Africa Magic Movies 1. A contemporary lifestyle entertainment channel with predominantly movies and talk shows, as well as series from Mzansi Magic. Dropped the word 'Movies' on March 2015.
Africa Magic Epic
Previously Africa Magic Movies. A channel inspired by Africa's traditional roots with movies and series depicting cultural aspects.
Africa Magic Family
The parent Africa Magic channel serving family-oriented programs.
Regional channels
Launched = 2010
Launched = 2010
Africa Magic Hausa – Movies and series broadcast in Hausa
Africa Magic Yoruba –Movies and series broadcast in Yoruba
Launched:2010
Africa Magic Igbo – Movies and series broadcast in Igbo
Launched:2015
Affiliates
These are channels affiliated to the Africa Magic and share most of the programs, which are independently sourced from their respective regions. Content from these channels are either displayed in their original soundtrack or dubbed in English.
Maisha Magic – Formerly Africa Magic Swahili. A channel catering for the East African diaspora. Has five dedicated entertainment channels, Maisha Magic East, Maisha Magic Plus, Maisha Magic Bongo, Maisha Magic Movies an |
https://en.wikipedia.org/wiki/BoBoiBoy%3A%20The%20Movie | BoBoiBoy: The Movie is a 2016 Malaysian Malay-language computer-animated superhero comedy film directed by Nizam Razak, who also co-wrote the screenplay with Anas Abdul Aziz. It is Animonsta Studios' first feature film, based on their animated TV series BoBoiBoy. The film follows BoBoiBoy and his friends on an adventure on a mysterious island to find Ochobot, who is kidnapped by a group of alien treasure hunters so that they could locate an ancient Power Sphere that predates Ochobot.
BoBoiBoy: The Movie was released on 3 March 2016 in Malaysia, and 13 April 2016 in Indonesia. It received positive reviews and was a box office success in the region, having grossed around RM20 million. A sequel, BoBoiBoy Movie 2, was released on 8 August 2019.
Plot
When BoBoiBoy is going camping with his friends and his ninth-generation Power Sphere companion Ochobot, he spots a chase between the police and a group of robbers, which turns out to be a part of a robbery in progress. Instead of going to the camp, he decides to catch the robbers and leaves Ochobot alone. BoBoiBoy eventually manages to help the police find the robbers, going to Tok Aba's Kopitiam forgetting the camping trip which he only went when Aba reminded of it.
A gang of Kubulus Power Sphere hunters, the Tengkotak, led by Bora Ra, plan to capture Klamkabot, the first generation Power Sphere. Bora Ra becomes angry and threatens Yoyo Oo to either search for it or expel his from his spaceship. He nervously searches for it, but finds another Power Sphere with a lower frequency than Klamkabot. Yoyo Oo lies that he found Klamkabot's location.
Arriving late to the camp, BoBoiBoy meets Papa Zola, who motivates him to persuade his friends to go squid fishing. BoBoiBoy later agrees to follow Papa Zola. The next day, Bora Ra and Gaga Naz demand BoBoiBoy to give up Ochobot. Ochobot gets taken by the Tengkotak, with Adu Du and Probe stowing away at Tengkotak's ship. Back at the town, Fang comes late to Tok Aba's Kokotiam.
BoBoiBoy and his friends ask Papa Zola to help them find Ochobot. They find a clue about the floating island's location, which is near the lighthouse. Adu Du finds Kiki Ta and falls in love with her. After a conversation between Probe and Bora Ra, the other Tengkotak members erupt with laughter, leading to a heated squabble. As they notice that BoBoiBoy is near, Bora Ra gives Adu Du the Kurita, a small squid that enlarges when exposed to water. Adu Du and Probe set off with it.
Meanwhile, Zola realises that Adu Du is coming closer. They eventually encounter Adu Du and Probe and questions him of Ochobot's whereabouts. Kurita, exposed to the seawater, grows to a gigantic size and attacks the goat and Adu Du. Escaping from Kurita, they eventually land on the big island. After a chase, Zola has Gopal turn it to food.
Meanwhile, Yoyo Oo monitors Ochobot's movements. Klamkabot emerges from nowhere and attacks Ochobot, losing the latter's transmission. Consequently, Bora Ra commands Yoyo Oo |
https://en.wikipedia.org/wiki/Healthcare%20availability%20for%20undocumented%20immigrants%20in%20the%20United%20States | A considerable portion of the United States' population is foreign-born. Undocumented immigrants make up about 28% of the foreign-born residents. A model analyzing data from 1990-2016 estimates the number of undocumented immigrants in the US range from 16.7 million to 22.1 million.
Significant barriers to health care face undocumented immigrants, including low socioeconomic status, difficulty negotiating time off of work, lack of transportation and language barriers. Having medical insurance coverage—whether private or through Medicaid—significantly influences the actual utilization of healthcare services.
Only a handful of municipalities in the United States offer health care coverage for undocumented immigrants, including Los Angeles County's My Health LA program, and San Francisco's Healthy San Francisco. The lack of coverage of undocumented immigrants has shown increases in spread of preventable diseases. The lack of funding of prenatal care in undocumented women has also been calculated in being more expensive in the long run.
Overview
Estimates suggest as of 2010 there are approximately 11.2 million undocumented immigrants living in the United States, some of whom have U.S. citizen family members. This has resulted in a number of "mixed status" families concentrated in states such as California, Florida, New York and Texas, as well as newer immigrant destination states such as Illinois and Georgia. Within these mixed-status families there are often inequalities in access to a variety of resources, including healthcare.
Health care usage
Many undocumented immigrants delay or do not get necessary health care, which is related to their barriers to health insurance coverage.
According to study conducted using data from the 2003 California Health Interview Survey, of the Mexicans and other Latinos surveyed, undocumented immigrants had the lowest rates of health insurance and healthcare usage and were the youngest in age overall. In fact, the study found that overall undocumented Mexicans had 1.6 fewer physician visits and undocumented Latinos had 2.1 fewer physician visits compared to their U.S.-born counterparts. Some scholars have attributed this lower usage of healthcare services to the "Hispanic Epidemiological Paradox" where the health outcomes of Hispanic and Latino Americans have been found to be comparable or better than white Americans, paradoxical to their lower socioeconomic status. However, others point to the negative experiences of undocumented groups when seeking medical treatment or other forms of healthcare service. For example, this same study from the 2003 California Health Interview Survey found that both illegal groups—Mexican and Other Latino—were more likely to report negative experiences with healthcare providers and less likely to have a regular source of care because of such experiences. Meanwhile, US-born Latinos with U.S. citizenship were more likely to self-report their health as good or excellent and more likel |
https://en.wikipedia.org/wiki/Blue%20Book%20Top%2020%20Network%20Rankings | The Performance Marketing Blue Book, owned by privately held , provides online affiliates and merchants with an independently researched ranking of affiliate networks worldwide. It is published in the form of two "Top 20" league tables, one for CPA networks and one for networks using a revenue sharing business model, cost-per-sale. The tables are updated each year from the results of an annual research-based process that includes a survey of over 20,000 online publishers and advertisers. The Blue Book has been produced each year since 2009 and is a recognized information resource within the performance marketing industry.
Methodology
The Blue Book is based upon a research process that incorporates multiple sources of affiliate marketing industry data and includes over 500 affiliate networks each year. One major component is an annual survey of over 20,000 online publishers and merchants. The survey includes anti-fraud security measures to prevent multiple responses from a single individual as well question structured to avoid selection-bias.
In addition to the survey, the research process aggregates industry expert views, traffic data, measures of industry influence and other information.
The Blue Ribbon Panel
The Blue Ribbon Panel is a group of performance marketing industry experts representing each of the three core parts of the industry: advertisers, publishers and networks. Members are selected on the basis of their experience and reputation. Their opinions are collected via interviews and online survey, and are incorporated into the research process for the Performance Marketing Blue Book.
References
External links
January 2016, "2016 Blue Book CPA & CPS Network Rankings" Revenue Performance Magazine
January 2015, "2015 Blue Book CPA & CPS Network Rankings" Revenue+performance magazine, pp 3–4
January 2016, "2016 CLICKBANK CPA & CPS Network Rankings" Revenue Performance Magazine
Chris Trayhorn, Winter 2014, "The Best Performance Marketing Networks in The World", Revenue+performance Magazine, pp 8–9
Joe Ferguson, January 19, 2015, "MaxBounty is Your Number One CPA Network, Again"
January 16, 2015, "Matomy Ranked a Top-10 CPA Network for Second-Straight Year,"
Sarah Jones, January 15, 2014 "Affiliate Window Climbs The Blue Book Rankings," Press Release
What Is Affiliate Management? Affiliate Marketing Info & More Advertise Purple. Retrieved 2021-09-12
Top 20 CPA and CPS Network Tables Winter 2013, Revenue+performance magazine, p BB 11 & p BB 13
Effective Platform For Rapidly Increasing Amazon Business On The Planet Retrieved 2022-08-02
Joey (2020-09-22) How Does Amazon Affiliate Work? Pro Marketing Trends. Retrieved 2020-09-26
Chris Trayhorn, Winter 2012 "Year of Living Dangerously", Revenue magazine PP BB 2-3
A Free Advice 77 Best Affiliate Programs For Beginners in 2021 Retrieved 2021-03-03
Online advertising
Affiliate marketing
Online advertising services and affiliate networks |
https://en.wikipedia.org/wiki/Stockholm%20Internet%20eXchange | Stockholm Internet eXchange (STHIX) manages multiple carrier- and data center-neutral internet exchange point (IXP) situated in Copenhagen / Malmö, Gothenburg, Stockholm, Sundsvall, and Umeå. The Stockholm IXP is the second largest IXP in the region in terms of both bandwidth (average/peak) and number of members. Peak bandwidth is above 230 gigabits per second.
History
STHIX was founded in 2005 and had its first members connected in late 2006. Since then the members count has grown to more than 120. It was initially located at two data centers in the Stockholm area (Telecity Bromma and Stokab KN1) with a 100 megabit interconnect and has since expanded to a total of 6 data centers in Stockholm, 1 in Gothenburg, 1 in Sundsvall, 1 in Umeå and 5 in Copenhagen/Malmö.
Today
STHIX offers free 100M ports at all of the data centers, and 1G / 10G / 100G ports at a cost-effective price, compared to the competition in the region, while still delivering a highly reliable service. STHIX is based mainly on Arista Networks hardware.
See also
Netnod Internet Exchange i Sverige
List of Internet exchange points
List of Internet exchange points by size
References
External links
Traffic statistics
Member list
Internet exchange points in Europe |
https://en.wikipedia.org/wiki/Alternative%20purchase%20network | An alternative purchase network (APN) is a contemporary commerce channel established as an alternative to perceived consumerism, and the cultural and economic hegemony of the global market. Alternative purchase networks aim to promote ethical shopping behaviour, which has an environmentally-friendly approach and considers local realities.
Aims
Indeed, undertaking an economic action in favour of local environment is “one of the aspirations of alternative and critical consumer practices”. Furthermore, “a global humanitarian consumer-citizenship may require a further economic disentanglement, as it commands growth rates and volumes for green and ethical products which are at odds with small-scale local production”. Alternative products are commodities which embody a critical dialogue with many aspects of commoditization: they are concerned with the length of commodity chains, the environmental and human costs and the importance of nature and health.
Role of the consumer
The importance of the consumer’s role within economics is rapidly growing: indeed, the consumer has been becoming an active, moral and political subject. It’s necessary to consider that ‘to buy is to vote’: when someone buys a good, he votes “yes”; when he decides not to buy a product, he votes “no”, forcing the companies to diversify into products he prefer, or to change some features of the good. According to consumers’ votes, we have to consider the concept of elegant sufficiency, which is “a mixture of environmentalism […] and detachment from mass fashion. Its emphasis is on choice as a political and ethical process”.
The consumer can do three different actions to influence the market:
Positive buying: he/she can buy things made ethically by ethical companies
Negative purchasing: he/she can avoid the products he/she disapproves of
Boycotting: he/she can decide not to buy things that are produced by unethical companies
From a sociological point of view, consumers are considered citizens because they can influence politics, economics and culture through their choices and activities: in fact, every consumer can make a difference with every product he/she buys.
An ethical consumer ought to consider not only the actual cost of a product, but also the sustainability cost of his choice, for example in terms of pollution generated by the production, the non-renewable resources used in manufacturing and distribution and the workers’ conditions. In fact, the parameters used to choose a product are no longer price and quantity, like the neoclassical economics and the free-market rules promote; ethical consumers want to get closer to producers, relying on new forms of distribution, to shorten commodity chains, which limit consumers’ choices and increase the pollution, to take back the production process.
When we think about the critical development of the consumer’s role, there are two main socio-political trends to consider: “the process of individualization, on the one hand, whereb |
https://en.wikipedia.org/wiki/Tridrepana%20bicuspidata | Tridrepana bicuspidata is a moth in the family Drepanidae. It was first described by Song, Xue and Han in 2011. It is found in Hainan, China.
References
Moths described in 2011
Drepaninae |
https://en.wikipedia.org/wiki/AdmitSee%20Inc. | AdmitSee is an educational technology company and college-oriented social-networking site with offices in San Francisco and New York City. AdmitSee is a database of successful college application essays and resumes. The service allows college applicants to read applications and resumes of accepted students. They browse basic profiles for free, and then pay to access full application files, including essays and advice; half of this money gets paid to the college students who shared their content. Applicants can also communicate directly with verified college students via the paid mentor messaging feature.
As of January 2016, the platform has over 50,000 application files and over 100,000 active users. AdmitSee uses official school IDs to verify student profiles and facilitates universities screening for plagiarism.
Founding
The company was founded by Lydia Fayal and Stephanie Shyu in 2013 while attending law school at the University of Pennsylvania. The idea to create a database of application files came from Fayal's work as a college consultant when clients would ask how they compared to other applicants. After meeting at a Wharton event, the classmates expanded the idea to include peer mentoring and big data analysis. The founders were introduced in 2013 to founding engineer, Jerry Huyghe, who built the initial version of the website. The company advanced to the final round of the Wharton Business Plan Competition in 2014.
Early funding for the company came from Founder.org and the edtech accelerator Imagine K12. The company raised $1.8million seed funding in 2015 with plans to build a lead generation offering. Earlier in 2015, Fayal and Shyu were named to the Forbes 30 Under 30 list as influencers in the field of education.
The founders credit early traction to their virtual internship program, which they modeled after oDesk and to early adoption of online communities, such as Reddit.
Reception
Press for AdmitSee includes USA Today lauding its plagiarism prevention methods and calling AdmitSee a "must-visit site this application season." News coverage has tended to focus on the company's published data, which include linguistic analysis of the site's repository of essays and of survey responses. Responses to this data have been mixed; some critics maintain that the data help students "game the system". AdmitSee has also received pushback from offline college consulting and test prep groups, who criticize AdmitSee's voyeuristic potential, comparing it to an online dating site. Despite criticism, the company does have its supporters in the admissions community and collaborates with educational partners.
References
2013 establishments in the United States
Educational technology companies of the United States
Mobile technology companies |
https://en.wikipedia.org/wiki/Model%2067 | Model 67 may refer to:
Curtiss BF2C Goshawk (Model 67), a United States naval biplane aircraft in the 1930s
IBM System/360 Model 67, an IBM mainframe computer of the late 1960s
Model 67 mine, an Austrian anti-tank mine
Mauser-Norris Model 67, a German bolt-action rifle
Smith & Wesson Model 67, an American revolver
Winchester Model 67, an American bolt-action rifle |
https://en.wikipedia.org/wiki/ThousandEyes | ThousandEyes, Inc. is a network intelligence company headquartered in San Francisco with offices in Dublin, London, New York, Tokyo, and Austin, Texas. The company produces software that analyzes the performance of local and wide area networks. On May 29, 2020, Cisco announced it would be acquiring ThousandEyes.
History
The company was founded in 2010 by Mohit Lad and Ricardo Oliveira who had worked together during grad school in the UCLA Internet Research Lab to visualize Autonomous System topologies. ThousandEyes received a $500K National Science Foundation grant in 2011 to focus on DNS infrastructure troubleshooting. In 2011, Sequoia Capital led a Series A round to invest $5.5M. The company launched their network monitoring product in June 2013. In 2014, Sutter Hill Ventures led a Series B round, joined by Sequoia Capital and Salesforce.com, to invest $20M in the company. In 2016, Tenaya Capital and GV joined a Series C round, along with previous investors, with $35M more in capital. In February 2019 the company announced it has raised $50M in a Series D round of funding led by GV (formerly Google Ventures), bringing ThousandEyes' total funding to more than $110 million. Additionally, Thomvest Ventures joined the round as a new investor alongside existing investors Salesforce Ventures, Sequoia Capital, Sutter Hill Ventures and Tenaya Capital.
Technology
ThousandEyes is a software-as-a-service (SaaS) product that uses synthetic monitoring probes to measure network performance. The product includes elements of network tomography for loss and latency, route analytics to visualize BGP advertisements, DNS monitoring, VoIP monitoring, website monitoring for HTTP and HTTPS and SNMP device polling.
Business
ThousandEyes was privately held until 2020 and backed by venture investors including Sequoia Capital, Sutter Hill Ventures, Salesforce, Tenaya Capital and GV. Its customers include Twitter, Equinix, ServiceNow, EBay, DocuSign, top US banks, and many software-as-a-service cloud companies. In May 2020, Cisco announced intent to acquire ThousandEyes. In August 2020, Cisco completed the acquisition for an undisclosed amount that was reported to be near $1 Billion.
Recognition
ThousandEyes has been recognized by Fortune as one of the 2019 Best Workplaces in Texas and by the San Francisco Business Times as one of the 2019 Bay Area Best Places to Work. ThousandEyes has also been recognized by Battery Ventures as one of the 50 Highest-Rated Private Cloud-Computing Companies to Work For, with data specifically provided from Glassdoor. In June 2019, ThousandEyes was recognized as one of the winners of the 2019 Cloud Computing Product of the Year Award by TMC's Cloud Computing Magazine. In November 2018, ThousandEyes was recognized in Credit Suisse AG's inaugural Disruptive Technology Recognition (DTR) Program, an annual recognition of five top companies who are disrupting traditional enterprise information technology (IT Infrastructure). ThousandEyes |
https://en.wikipedia.org/wiki/Elza%20Erkip | Elza Erkip is a Turkish-American electrical and computer engineer, professor and wireless technology researcher at New York University.
Education
Erkip received her B.S. in Electrical and Electronics Engineering from Middle East Technical University in Turkey, and her M.S. and Ph.D. (1996, under Thomas Cover) in Electrical Engineering from Stanford University. She ranked among the top 1% of highly cited scholars in computer science from 2002 to 2012 according to Thomson Reuters.
Background
Erkip is one of the researchers at NYU WIRELESS, where they are currently conducting indepth research into 5G wireless cell technology using millimeter wave (mmWave) wireless communications. She is also a fellow and member of the Board of Governors of IEEE, and a member of The Science Academy Society of Turkey.
Awards
IEEE Fellow, 2011
Finalist, The New York Academy of Sciences Blavatnik Awards for Young Scientists, 2010
Best Paper Award, IEEE ICC Communication Theory Symposium, 2007
Student Paper Award, co-author, IEEE International Symposium on Information Theory, 2007
IEEE Communications Society Stephen O. Rice Paper Prize in the Field of Communication Theory, 2004
National Science Foundation CAREER Award, 2001
References
Computer engineers
Turkish women computer scientists
Turkish computer scientists
American academics of Turkish descent
Fellow Members of the IEEE
Electrical engineers
Living people
Middle East Technical University alumni
Stanford University alumni
Polytechnic Institute of New York University faculty
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/CIYU-FM | CYIU-FM is a low-power Type B Native radio station which provides First Nations community radio programming on the frequency of 106.3 FM/MHz in Fort McKay, Alberta, Canada, serving listeners within the Fort McKay First Nation.
The station, owned by the Fort McKay Radio Society, received approval to broadcast from the CRTC on March 17, 2015. The station will broadcast with an effective radiated power of 50 watts (non-directional antenna with an effective height of antenna above average terrain of 6.6 metres).
In the application, the station said that it would broadcast at least 26 hours a week in Cree and Dene, with the remainder of its programming in English.
References
External links
Fort McKay Radio Society (CYIU-FM)
IYU
Radio stations established in 2015
Cree culture
Dene culture
2015 establishments in Alberta |
https://en.wikipedia.org/wiki/Oh%20Sang-jin | Oh Sang-jin (; born February 15, 1980) is a South Korean former news anchor, television personality, and actor.
Career
He joined MBC in 2006, and became one of the network's most popular news anchors and TV show hosts. A member of the reporters' union, Oh was an outspoken critic of MBC's management, which he claimed compromised journalistic independence by keeping close ties with the Lee Myung-bak government. When Oh took part in the broadcasters' strike of 2012, MBC removed him from all its news and entertainment programs for the rest of that year, and he resigned from the network in 2013. Now a freelancer, Oh continued his television and hosting career. He also began acting, with roles in the television dramas My Love from the Star, Sweden Laundry and The Family Is Coming.
In February 2017 it was announced that Oh joined YG Entertainment.
In April 2019, Oh left YG Entertainment and signed with new agency IOK Company.
Personal life
Oh and his wife welcomed their first child, a daughter, in 2019. On September 18, 2023, the couple announced their second pregnancy.
Filmography
Variety show
Television series
Film
Hosting
Ambassadorship
Ambassador of Public Relations to Seoul (2023)
Awards and nominations
References
External links
1980 births
Living people
South Korean announcers
South Korean male television actors
South Korean television presenters
Yonsei University alumni
People from Ulsan
Haeju Oh clan |
https://en.wikipedia.org/wiki/The%20Thrilling%20Adventures%20of%20Lovelace%20and%20Babbage | The Thrilling Adventures of Lovelace and Babbage: The (Mostly) True Story of the First Computer is a steampunk graphic novel written and drawn by Sydney Padua. It features Ada Lovelace and Charles Babbage in an alternative universe where they have successfully built an Analytical Engine and use it to "fight crime".
The book was published simultaneously by Pantheon Books in the US and Penguin Books in the UK on April 21, 2015. It has received positive reviews and awards.
Setting and publication history
The book grew out of a webcomic of the same name. The comic began as a single comic strip for Ada Lovelace Day in 2009, a celebration of women in science, technology, engineering and mathematics. Disliking the fact that both Babbage and Lovelace died with their life work incomplete, Padua created a fictional ending for the strip, then found that "a lot of people saw it and thought that I was actually going to do a comic, which I had no intention of doing. But then I started thinking, 'What if I actually did the comic?' I started fooling around, and I guess I'm still fooling around with it."
The setting describes an alternative historical reality in which Ada Lovelace and Charles Babbage have actually built an Analytical Engine and use it to "fight crime" at Queen Victoria's request. Also featured in the comic is the great engineer Isambard Kingdom Brunel, whom Padua has called "the Wolverine of the early Victorians".
The comic is based on thorough research on the biographies of and correspondence between Babbage and Lovelace, as well as other bits of early Victoriana, which are then twisted for humorous effect. "Some of the documents are more entertaining than the actual comic. Plenty of times, I've thrown something into the comic just so I'd have an excuse to refer to some document," Padua says.
Awards and reception
The book received positive early reviews from Publishers Weekly and Kirkus Reviews.
In December 2015 it was announced that, for The Thrilling Adventures of Lovelace and Babbage, Padua would receive the biennial Neumann Prize of the British Society for the History of Mathematics, which is "awarded for a book in English ... dealing with the history of mathematics and aimed at a broad audience". The UK edition of the book received the 2015 British Book Design and Production Award for graphic novels.
In April 2016 The Thrilling Adventures of Lovelace and Babbage was nominated for the Eisner Award in the Best Graphic Album–New category, and Padua was nominated in the Best Writer/Artist category.
An opera based on the book, with music by Elena Ruehr and libretto by Royce Vavrek, was first performed on February 3–5, 2023, by Guerilla Opera in collaboration with the MIT Center for Art, Science & Technology. The Guerilla Opera production was also presented by the Rozsa Center for the Performing Arts at Michigan Technological University on October 12–15, 2023.
References
External links
2D Goggles - Dangerous experiments in comics, off |
https://en.wikipedia.org/wiki/Automatic%20tool%20changer | In machining, an automatic tool changer (ATC) is used in computerized numerical control (CNC) machine tools to improve the production and tool carrying capacity of the machine. ATCs change tools rapidly, reducing non-productive time. They are generally used to improve the capacity of the machines to work with a number of tools. They are also used to change worn out or broken tools. They are one more step towards complete automation.
Description
Simple CNC machines work with a single tool. Turrets can work with a large number of tools. But if even more tools are required, then an ATC is needed. The tools are stored in a magazine. This allows the machine to work with a large number of tools without operator intervention.
The main parts of an automatic tool changer are the base, the gripper arm, the tool holder, the support arm, and the tool magazines.
Although the ATC increases the reliability, speed, and accuracy of a machine, it creates more challenges compared to manual tool change. For example, the tooling used must be easy to center, be easy for the changer to grab, and there should be a simple way to provide the tool's self-disengagement. Tools used in ATC are secured in tool holders specially designed for this purpose.
Types of tool changers
Depending on the shape of the magazine, an ATC can be of two types: 1) Drum Type changers are used when the number of tools is lower than 30. The tools are stored on the periphery of the drum.
2) Chain type changers are used when the number of tools is higher than 30 (The number is different depending on the design and manufacturer. It is important to note that the number of tools for the drum type is fewer than the chain type). But the tool search speed will be lower in this case.
Automatic tool changer mechanism
After receiving the tool change command, the tool to be changed will assume a fixed position known as the "tool change position". The ATC arm comes to this position and picks up the tool. The arm swivels between the machine turret and the magazine. It will have one gripper on each of the two sides. Each gripper can rotate 90°, to deliver tools to the front face of the turret. One will pick up the old tool from the turret and the other will pick up the new tool from the magazine. It then rotates 180° and places the tools into their needed position.
Tool changers on sheet metal working machinery
ATCs were first used on chip-removal machines, such as mills and lathes. Systems for automatic rearrangement of tools have also been used on sheet metal working machinery. Panel benders have an integrated CNC-controlled device that allows punches to be moved according to the size of the part. Automated tool changes on press brakes were limited to machines integrated on a robotic bending cell. Typically a 6-axis robot used for handling sheet metal blanks is also in charge of changing punches and dies between different batches.
Since the 2020s automatic tool changers have appeared on non-roboti |
https://en.wikipedia.org/wiki/UCLUST | UCLUST
is an algorithm designed to cluster nucleotide or amino-acid sequences into clusters based on sequence similarity. The algorithm was published in 2010 and implemented in a program also named UCLUST. The algorithm is described by the author as following two simple clustering criteria, in regard to the requested similarity threshold T. The first criterion states that any given cluster's centroid sequence will have a similarity smaller than T to any other clusters' centroid sequence. The second criterion states that each member sequence in a given cluster will have similarity to the cluster's centroid sequence that is equal or greater than T.
UCLUST algorithm is a greedy one. As a result, the order of the sequences in the input file will affect the resulting clusters and their quality. For this reason, it is advised that the sequences will be sorted before entering clustering stage. The program UCLUST is equipped with some options to sort the input sequences prior to clustering them.
UCLUST program is widely utilized among the bioinformatic research community, where it used for multiple applications including OTU assignment (e.g. 16s), creating non-redundant gene catalogs, taxonomic assignment and phylogenetic analysis.
External links
See also
Sequence clustering
References
2010 software
Bioinformatics algorithms
Metagenomics |
https://en.wikipedia.org/wiki/Jit%20Bose | Prosenjit K. "Jit" Bose is a Canadian mathematician and computer scientist who works at Carleton University as a professor in the School of Computer Science and associate dean of research and graduate studies for the Faculty of Science. His research concerns graph algorithms and computational geometry, including work on geometric spanners and geographic routing in wireless ad hoc networks.
Bose did his undergraduate studies in mathematics at the University of Waterloo, graduating in 1990, and earned a master's degree from Waterloo in 1991. He earned his Ph.D. in computer science from McGill University in 1994 under the supervision of Godfried Toussaint. After postdoctoral studies at the University of British Columbia, he became an assistant professor at the Université du Québec à Trois-Rivières in 1995, and moved to Carleton in 1997.
Selected publications
.
.
.
References
External links
Home page
Google scholar profile
Year of birth missing (living people)
Living people
Canadian computer scientists
20th-century Canadian mathematicians
21st-century Canadian mathematicians
University of Waterloo alumni
McGill University Faculty of Science alumni
Academic staff of the Université du Québec à Trois-Rivières
Academic staff of Carleton University
Graph drawing people
Researchers in geometric algorithms |
https://en.wikipedia.org/wiki/Iranian%20Cyber%20Army | The Iranian Cyber Army is an Iranian computer hacker group. It is thought to be connected to Iranian government, although it is not officially recognized as an entity by the government. It has pledged loyalty to Supreme Leader of Iran.
According to Tehran Bureau, the Islamic Revolutionary Guard initiated plans for the formation of an Iranian Cyber Army in 2005. The organisation is believed to have been commanded by Mohammad Hussein Tajik until his assassination.
The group has claimed responsibility for several attacks conducted over the Internet since 2009, most notably attacks against Baidu and Twitter. The attack against Baidu resulted in the so-called Sino-Iranian Hacker War. In 2012, a group self-identified as "Parastoo" ( - Swallow) hacked the International Atomic Energy Agency's servers: the Iranian Cyber Army is suspected of being behind the attack.
In 2013, a general in the Islamic Revolutionary Guards stated that Iran had "the 4th biggest cyber power among the world's cyber armies", a claim supported by the Israeli Institute for National Security Studies.
See also
Cyberwarfare in Iran
Islamic Revolutionary Guards Corps Cyber Security Command
References
Hacker groups
Cyberwarfare in Iran
Hacking in the 2010s |
https://en.wikipedia.org/wiki/Cyberwarfare%20and%20Iran | Cyberwarfare is a part of Iran's "soft war" military strategy. Being both a victim and wager of cyberwarfare, Iran is considered an emerging military power in the field.
Since November 2010, an organization called "The Cyber Defense Command" (; Gharargah-e Defa-e Saiberi) has been operating in Iran under the supervision of the country's "Passive Civil Defense Organization" (; Sazeman-e Padafand-e Gheyr-e Amel) which is itself a subdivision of the Joint Staff of Iranian Armed Forces.
According to a 2014 report by Institute for National Security Studies, Iran is "one of the most active players in the international cyber arena". In 2013, a Revolutionary Guards general stated that Iran has "the 4th biggest cyber power among the world's cyber armies."
According to a 2021 report by a cyber-security company, "Iran is running two surveillance operations in cyber-space, targeting more than 1,000 dissidents".
NIN
Iranian cyber defense system - digital fortress part of national information network (national internet) - is developed for thwarting attacks and engaging attackers. In November 2022, the Iranian Majlis Islamic Consultative Assembly recommended a Passive Defence Incorporation.
Attacks against Iran
In June 2010, Iran was the victim of a cyber-attack when its nuclear facility in Natanz was infiltrated by the cyber-worm 'Stuxnet'. Reportedly a combined effort by the United States and Israel, Stuxnet destroyed perhaps over 1,000 nuclear centrifuges and, according to a Business Insider article, "[set] Tehran's atomic programme back by at least two years." The worm spread beyond the plant to allegedly infect over 60,000 computers, but the government of Iran indicates it caused no significant damage. Iran crowdsourced solutions to the worm and is purportedly now better positioned in terms of cyber warfare technology. No government has claimed responsibility for the worm. The cyber-worm was also used against North Korea.
Events
In October 2013, media reported Mojtaba Ahmadi, who served as commander of the "Cyber War Headquarters" was found dead wounded by bullets in Karaj.
November 2018: The Iranian telecommunication minister Mohammad-Javad Azari Jahromi accuses Israel of a failed cyberattack on its telecommunications infrastructure, and vows to respond with legal action.
October 2021: An attack paralyzed gas stations across the country, preventing users from purchasing fuel using state-issued cards and digital billboards displaying antigovernment messages
In September, October and November 2022, Iranian state networks and emails came under attack by Anonymous and other hacking groups acting in solidarity with Iranian protestors.
In the year 2023 several government ministries were fully hacked by multiple people including Ministry of Science research and technology in September 23rd. Veterans affairs Ministry of foreign affairs(50TB) Central Insurance and 19 subsidiary corporations(119 million lines records) City of Tehran municipality , State |
https://en.wikipedia.org/wiki/Third%20World%20Forum | Third World Forum (Forum Tiers Monde) is an international network of research centers. Third World Forum was established by the Egyptian economist and politician Ismail Sabri Abdullah in 1975. It is based in Dakar. It was among the organizations that helped to set up the World Forum for Alternatives, created in Cairo in 1997. Samir Amin was its co-founder.
Goals and Activities
Third World Forum is composed of a network of intellectuals throughout Africa, Asia and Latin America, seeking to promote debate on contemporary processes and patterns of development. To this end, it conducts critical research on global capitalism, geo-politics, north–south relations, national and regional security, ecological degradation and formulates policy recommendations on alternatives. Its analyses and proposals are produced through interaction with social movements and civil society actors, with which it maintains a close connection.
References
External links
TWF Website
International organisations based in Senegal |
https://en.wikipedia.org/wiki/List%20of%20biopunk%20works | This is a list of works classified as biopunk, a subgenre of science fiction and derivative of the cyberpunk movement. Some works may only be centered around biotechnologies and not fit a more constrained definition of biopunk which may include additional cyberpunk or postcyberpunk elements.
Print media
Novels
The Butterfly Effect by Rajat Chaudhuri
Blood Music (1985) by Greg Bear
Change Agent (novel) (2017) by Daniel Suarez − described as doing for biopunk what William Gibson did for cyberpunk
Clade (2003) and Crache (2004) by Mark Budz
Darwin series (1999–2003) by Greg Bear
Got a Bad Case of the Horribly Wrongs (2016) by Khurt Khave
Holy Fire (1996) by Bruce Sterling
Leviathan Trilogy (2009–11) by Scott Westerfeld
The Xenogenesis trilogy (1987–89) by Octavia E. Butler
The Movement of Mountains (1987) by Michael Blumlein
Ribofunk (1996) by Paul Di Filippo
Rifter series (1999–2004) by Peter Watts
Schismatrix (1985) by Bruce Sterling
Sleepless series (1991–99) by Nancy Kress
The Sky Lords trilogy by John Brosnan.
Unwind (2007) by Neal Shusterman
Wetware (1988) by Rudy Rucker
White Devils (2004) by Paul J. McAuley
The Windup Girl (2009) by Paolo Bacigalupi − on Time's list "The Top 10 Everything of 2009"
Winterlong (1990) by Elizabeth Hand
Twig (web novel) (2015–17) by John C. McCrae
Short stories
"The Brains of Rats" (1988) by Michael Blumlein
The People of Sand and Slag (2004) by Paolo Bacigalupi
"Gene Wars" (1991) by Paul J. McAuley
Graphic novels and comics
Blame! (1998) by Tsutomu Nihei
Doktor Sleepless (2007—present) by Warren Ellis
Fluorescent Black (2008–2010) by M.F. Wilson and Nathan Fox
Film and television
Feature films
Frankenstein (1931)
Blade Runner (1982)
Super Mario Bros. (1993)
Gattaca (1997)
eXistenZ (1999)
Resident Evil series (2002–2016; 2021)
Code 46 (2003)
Mercedes Ray (2007)
Tokyo Gore Police (2008)
Splice (2009)
Repo Men (2010)
Antiviral (2012)
Prometheus (2012)
Vesper (2022)
Short films
LOOM (2012) by Jake Scott
STEM (TBA) by Julien Planté
Television series
Dark Angel (2000–2002)
ReGenesis (2004–2008)
Orphan Black (2013–2017)
Orphan Black – 7 Genes (2017–present)
Kamen Rider Amazons (2016–2017)
Video games
The Ooze (1995) developed by Sega Technical Institute where a scientist gets turned into a blob-like creature by a chemicals corporation seeking to unleash on the world a bioweapon in the form of a virus that only them possesses the cure for.
Terranigma (Tenchi Sōzō) (1995) and Final Fantasy VII (1997) are Japanese RPGs which feature some biopunk elements: the mad scientist Beruga in Terranigma and the Shinra Corporation in Final Fantasy VII are trying to control the world via biotechnology and genetic manipulations.
Panzer Dragoon series (1995-2002) developed by Team Andromeda/Smilebit and published by Sega
Resident Evil series (1996–present) developed and published by Capcom
Parasite Eve (1998) developed by Square and published by Square Electronic Arts
|
https://en.wikipedia.org/wiki/Pyspread | Pyspread is a non-traditional spreadsheet. Cells in pyspread's grid accept expressions in the Python programming language.
A cell can return any Python object, which allows calculations with vectors, matrices, fractions, arbitrary precision numbers and symbols.
Therefore, pyspread follows an approach that is similar to the spreadsheet SIAG from Siag Office.
Besides text, pyspread can display bitmap and vector images in its cells.
It provides a graphical front-end for creating matplotlib charts and starting from version 2.2 R (programming language) charts.
Pyspread can import and export data from and to CSV files.
Spreadsheets can be exported to files in Portable Document Format and Scalable Vector Graphics format.
Pyspread has been mentioned for its GNU Privacy Guard based security approach
and its capability to access local files and the Web from cell code.
Pyspread runs on Linux and Microsoft Windows.
It has been packaged for the Linux distributions Arch, Debian, Mageia, Slackware
and Ubuntu.
Pyspread is developed and maintained by Martin Manns.
It is licensed under the GPL-3.0-or-later license and therefore is free software.
References
External links
https://gitlab.com/pyspread/pyspread
Spreadsheet software
Python (programming language) software
Software that uses wxWidgets
Free software
Free spreadsheet software
Cross-platform software |
https://en.wikipedia.org/wiki/Game%20of%20Homes | Game of Homes is a Canadian reality television series, which premiered on W Network on March 17, 2015. Hosted by Cameron Mathison in season 1 and Dave Salmoni in season 2, the series features four couples per season who are competing to renovate four rundown houses. Season 1 is based in Vancouver, while the show moves to Toronto for season 2.
In conjunction with the series, Corus Entertainment also produced a shorter web series, Cameron's House Rules, which profiles Mathison doing renovation projects on his own home.
Broadcast
In Australia, the series premiered on 6 August 2015 on LifeStyle Home. The show aired in the United States on Discovery Family from September 6, 2016 to October 23, 2017.
References
2015 Canadian television series debuts
2016 Canadian television series endings
2010s Canadian reality television series
English-language television shows
Home renovation television series
Television series by Corus Entertainment
W Network original programming |
https://en.wikipedia.org/wiki/LINGO%20%28mathematical%20modeling%20language%29 | LINGO is a mathematical modeling language designed for formulating and solving optimization problems, including linear, integer, and nonlinear programming problems.
References
Mathematical modeling
Programming languages |
https://en.wikipedia.org/wiki/Optimization%20Programming%20Language | Optimization Programming Language (OPL) is an algebraic modeling language for mathematical optimization models, which makes the coding easier and shorter than with a general-purpose programming language. It is part of the CPLEX software package and therefore tailored for the IBM ILOG CPLEX and IBM ILOG CPLEX CP Optimizers. The original author of OPL is Pascal Van Hentenryck.
References
Mathematical optimization software
Algebraic modeling languages |
https://en.wikipedia.org/wiki/Jessica%20McKellar | Jessica Tess McKellar is an American software developer, engineering manager, and author.
Education
McKellar attended the Massachusetts Institute of Technology and studied computer science and chemistry.
Work
McKellar was an early employee and engineering manager at Ksplice, which was acquired by Oracle in 2011. In 2012, she co-founded Zulip, a chat software company. In 2014, the company was acquired by Dropbox. She has spoken at several conferences about outreach efforts to increase the diversity of open-source communities.
From 2012 to 2014, she was a director of the Python Software Foundation. In 2013, McKellar won the O'Reilly Open Source Award for her contributions to Python. In 2016, she won the Women in Open Source Community Award, awarded by Red Hat. She is a contributor to Twisted, a networking framework for Python. From 2014 to 2017, she was a Director of Engineering and the chief of staff to the VP of Engineering at Dropbox.
McKellar was a senior technical advisor for 16 episodes of the HBO show Silicon Valley.
Author
McKellar is the co-author of the book Twisted Network Programming Essentials, 2nd Edition (O'Reilly Media - 2013).
References
Massachusetts Institute of Technology alumni
Place of birth missing (living people)
Living people
American women computer scientists
American computer scientists
1987 births
21st-century American women |
https://en.wikipedia.org/wiki/Monero | Monero (; Abbreviation: XMR) is a cryptocurrency which uses a blockchain with privacy-enhancing technologies to obfuscate transactions to achieve anonymity and fungibility. Observers cannot decipher addresses trading Monero, transaction amounts, address balances, or transaction histories.
The protocol is open source and based on CryptoNote, a concept described in a 2013 white paper authored by Nicolas van Saberhagen. Developers used this concept to design Monero, and deployed its mainnet in 2014. The Monero protocol includes various methods to obfuscate transaction details, though users can optionally share view keys for third-party auditing. Transactions are validated through a miner network running RandomX, a proof-of-work algorithm. The algorithm issues new coins to miners and was designed to be resistant to application-specific integrated circuit (ASIC) mining.
Monero's privacy features have attracted cypherpunks and users desiring privacy measures not provided in other cryptocurrencies. It is used in illicit activities such as money laundering, darknet markets, ransomware, cryptojacking, and other organized crime. The United States Internal Revenue Service (IRS) has posted bounties for contractors that can develop Monero-tracing technologies.
Background
Monero's roots can be traced back to CryptoNote, a cryptocurrency protocol first described in a white paper published by Nicolas van Saberhagen (presumed pseudonymous) in October 2013. The author described privacy and anonymity as "the most important aspects of electronic cash" and called bitcoin's traceability a "critical flaw". A Bitcointalk forum user "thankful_for_today" coded these ideas into a coin they dubbed BitMonero. Other forum users disagreed with thankful_for_today'''s direction for BitMonero, so forked it in 2014 to create Monero. Monero translates to coin in Esperanto. Both van Saberhagen and thankful_for_today remain anonymous.
Monero has the third-largest community of developers, behind bitcoin and Ethereum. The protocol's lead maintainer was previously South African developer Riccardo Spagni. Much of the core development team chooses to remain anonymous.
Improvements to Monero's protocol and features are, in part, the task of the Monero Research Lab (MRL), some of whom are anonymous.
Privacy
Monero's key features are those around privacy and anonymity. Even though it is a public and decentralized ledger, all transaction details are obfuscated. This contrasts to bitcoin, where all transaction details, user addresses, and wallet balances are public and transparent. These features have given Monero a loyal following among crypto anarchists, cypherpunks, and privacy advocates.
The transaction outputs, or notes, of users sending Monero are obfuscated through ring signatures, which groups a sender's outputs with other decoy outputs. Encryption of transaction amounts began in 2017 with the implementation of ring confidential transactions (RingCTs). Developers also implem |
https://en.wikipedia.org/wiki/List%20of%20number-one%20digital%20tracks%20of%202007%20%28Australia%29 | The ARIA Digital Track Chart ranks the best-performing digital tracks of Australia. It is published by Australian Recording Industry Association (ARIA), an organisation who collects music data for the weekly ARIA Charts.
To be eligible to appear on the chart, the recording must be a single not an EP and only paid downloads counted from downloadable outlets.
Chart history
Number-one artists
See also
List of number-one singles of 2007 (Australia)
References
Australia Digital Singles
2007 in Australian music
Digital 2007 |
https://en.wikipedia.org/wiki/Igor%20Hawryszkiewycz | Igor Titus Hawryszkiewycz (born c. 1948) is an American computer scientist, organizational theorist, and Professor at the School of Systems, Management and Leadership of the University of Technology, Sydney, known for his work in the field of database systems, systems analysis, and knowledge management.
Biography
Hawryszkiewycz obtained his PhD in computer science from Massachusetts Institute of Technology in 1973 with the thesis, entitled "Semantics of data base systems." developed within the Project MAC.
Hawryszkiewycz started his academic career as lecturer in information Systems at the University of Canberra in 1975. Since 1986 he is Professor at the University of Technology, Sydney and Head of its Department of Information Systems. From 1989 to 1993 he also directed its Key Center of Advanced Computing Sciences.
Hawryszkiewycz's research interest is focussed on "developing design thinking environments to provide business solutions in complex environments by integrating processes, knowledge, and social networking... [and] facilitating agility and evolution of business systems through collaboration."
Selected publications
I.T. Hawryszkiewycz. Semantics of data base systems. PhD thesis, Massachusetts Institute of Technology, Cambridge (1973)
Hawryszkiewycz, Igor Titus, and I. T. Hawryszkiewycz. Database analysis and design. Chicago, IL: Science Research Associates, 1984.
Hawryszkiewycz, Igor T. Introduction to systems analysis and design. Prentice Hall PTR, 1994.
Hawryszkiewycz, Igor. Knowledge Management: Organizing Knowledge Based Enterprises. Palgrave Macmillan P." (2009)
Articles, a selection
Hawryszkiewycz, Igor. "A metamodel for modeling collaborative system s." (2005).
References
External links
Igor Hawryszkiewycz | University of Technology, Sydney
1940s births
Living people
American business theorists
American computer scientists
MIT School of Engineering alumni
Academic staff of the University of Technology Sydney |
https://en.wikipedia.org/wiki/US%20Cyber%20Challenge |
US Cyber Challenge is a private program which recruits, trains, and places candidates in cybersecurity jobs in the United States. US Cyber Challenge was formerly a DHS S&T-funded not-for-profit organization, and is currently a program of the Center for Internet Security.
History
The founding director of US Cyber Challenge was Karen S. Evans.
Methodology
The US Cyber Challenge uses an online competition each April to select qualified candidates for a one-week cybersecurity training program the following summer. The summer program includes workshops, a job fair, and a capture the flag competition. Topics covered in the workshops include intrusion detection, penetration testing and forensics. Participation is limited to high school and college students who are US citizens.
References
External links
Official web site
2010 establishments in the United States
Computer security
Recurring events established in 2010 |
https://en.wikipedia.org/wiki/St%C3%B6%C3%B0%203 | Stöð 3 was an Icelandic general television channel, owned and operated by Sýn. Founded on September 7, 2013. The channel showcases a wide range of programming from the US and domestic programming. The channel was only available based as a subscription service. All non-Icelandic programming is subtitled.
Programmes
Almost Human
American Idol
Arrow
Dads
Graceland
Hart of Dixie
Hunted
Raising Hope
Shameless
South Park
Super Fun Night
The Amazing Race
The Carrie Diaries
The X Factor USA
Zero Hour
See also
Bylgjan
Fréttablaðið
References
External links
Official Site
Television channels in Iceland
Companies based in Reykjavík |
https://en.wikipedia.org/wiki/Signature%20Record%20Type%20Definition | In near field communications the NFC Forum Signature Record Type Definition (RTD) is a security protocol used to protect the integrity and authenticity of NDEF (NFC Data Exchange Format) Messages. The Signature RTD is an open interoperable specification modeled after Code signing where the trust of signed messages is tied to digital certificates.
Signing NDEF records prevents malicious use of NFC tags (containing a protected NDEF record). For example, smartphone users tapping NFC tags containing URLs. Without some level of integrity protection an adversary could launch a phishing attack. Signing the NDEF record protects the integrity of the contents and allows the user to identify the signer if they wish. Signing certificates are obtained from third party Certificate Authorities and are governed by the NFC Forum Signature RTD Certificate Policy.
How it works
The NDEF signing process
Referring to the diagrams. An author obtains a signing certificate from a valid certificate authority. The author's private key is used to sign the Data Record (text, URI, or whatever you like). The signature and author's certificate comprise the signature record. The Data Record and Signature Record are concatenated to produce the Signed NDEF Message that can be written to a standard NFC tag with sufficient memory (typically on the order of 300 to 500 bytes). The NDEF record remains in the clear (not encrypted) so any NFC tag reader will be able to read the signed data even if they cannot verify it.
The NDEF Verification Process
Referring to the diagram. Upon reading the Signed NDEF Message, the Signature on the Data Record is first cryptographically verified using the author's public key (extracted from the Author's Certificate). Once verified, the Author's Certificate can be verified using the NFC Root Certificate. If both verifications are valid then one can trust the NDEF record and perform the desired operation.
Supported certificate formats
The Signature RTD 2.0 supports two certificate formats. One being X.509 certificate format and the other the Machine to Machine (M2M) Certificate format. The M2M Certificate format is a subset of X.509 designed for limited memory typically found on NFC tags. The author's certificate can optionally be replaced with a URI reference to that certificate or Certificate Chain so that messages can be cryptographically verified. The URI certificate reference designed to save memory for NFC tags.
Supported cryptographic algorithms
The Signature RTD 2.0 uses industry standard digital signature algorithms. The following algorithms are supported:
On the security of the Signature RTD
The Signature RTD 2.0's primary purpose is the protect the integrity and authenticity of NDEF records. Thus, NFC tag contents using the Signature RTD 2.0 is protected. The security of the system is tied to a certificate authority and the associated Certificate Chain. The NFC Forum Signature RTD Certificate Policy defines the policies under w |
https://en.wikipedia.org/wiki/Paul%20Vall%C3%A9e | Paul Vallée (born 1972) is a Canadian data specialist and businessperson. He is the founder and Chief Executive Officer of Tehama Inc., a company offering a secure virtual-workforce platform in a Software as a Service paradigm.
Vallée holds a bachelor's degree in Management Information Systems from the University of Ottawa. He started his career as a data scientist and continued as a systems architect; by the age of 25 (1997), he had started his fourth company — database infrastructure management, architecture, and performance outsourcing company, Pythian. He received the Ottawa Forty Under 40 award from the Ottawa Business Journal in 2011, an award that recognizes the achievements of forty business people under the age of forty.
In 2014, he was appointed Chief Executive Officer (CEO) of Pythian. In the same year, he was awarded the Trudeau Medal from the Telfer School of Management of the University of Ottawa. This recognizes the leadership, initiative, and contributions of Telfer alumni to the business world, the community, and their alma mater.
In 2016, the Canadian Women in Communications and Technology organization awarded Vallée the Diversity Champion Award for "[having] publicly spoken out against the 'bro culture'" in the technology industry, and for "[having] made Pythian the first Canadian company to release its gender statistics and set clear goals to recruit more capable women."
In 2019, Vallée led the evolution of a new company, Tehama, from Pythian, based on cybersecurity and compliance technologies developed and employed at the latter company. He is CEO of Tehama, and continues to sit on Pythian's board of directors.
Vallée is a proponent of Basic Income. He serves on the board of directors for the Basic Income Canada Network, Canada's national basic income advocacy organization.
In the early phases of the COVID-19 pandemic, Vallée publicly argued for greater pandemic preparedness in businesses and organizations, with special regard to remote work strategies and policies.
Vallée also advocates for a Canadian national data strategy. In this pursuit, he has published with the Centre for International Governance Innovation.
References
Living people
Businesspeople in software
Chief executives in the technology industry
Canadian technology chief executives
Canadian technology company founders
Businesspeople from Ottawa
University of Ottawa alumni
1972 births |
https://en.wikipedia.org/wiki/Steven%20Ilous | Steven Ilous (born 2 June 1981) is an entrepreneur, director, writer, and producer. He is the leading founder and CEO of The Feature Inc.. He is best known for his expertise in computer graphics, virtual production, and visual effects, having worked in the visual effects department on over 18 films, including The Matrix Reloaded, The Matrix Revolutions and The Polar Express.
In early 2015, Ilous's short film Polis won New Regency and Defy Media's PROTOTYPE competition. As a result, he was awarded a first look development deal at New Regency.
The Superslice listed Ilous 25th on their list of the Top 100 cultural influencers of 2012.
Steven Ilous is based in Los Angeles, California.
Career
Ilous has worked independently as well as for some of the leading film makers including Sony Imageworks, New Regency, Legendary, Warner Bros, DreamWorks and 20th Century Fox.
He began in visual effects at the age of 18 working with Stan Lee at Stan Lee Media, where he became a Senior Animator. He was part of a core team to produce the first ever webisodic animated series using Macromedia Flash. One year later, he became a part of the visual effects team on The Matrix Reloaded and The Matrix Revolutions. In 2004, Ilous helped create facial motion capture technology used in The Polar Express, Monster House, and Beowulf.
In 2008, Ilous teamed up with Michael Davidoff, Bill Rosenthal, and Steve Freeman to write The Life and Times of Jimmy Jaxx for 20th Century Fox, an animated series loosely based on the life of Tommy Lee. Ilous then made his directorial debut in commercials with the World of Tanks video game teaser for Gamescom 2011. The video has received over 10 million YouTube views and took 60 artists 60 days to create. He has also directed and produced music videos for Electric Youth, Bloody Beetroots, Theophilous London, Gary Go, and Benny Benassi. His music videos have appeared on MTV, VH1, and CMT. Ilous also created original video content for Kanye West's live tour which debuted at Lollapalooza in 2011.
In November 2012, Ilous released a proof-of-concept teaser for his sci-fi feature film project 2088. Described as "a visual style reminiscent of Blade Runner", Wired.com summarizes "The brief piece of “found footage” sells a gritty urban vision of the future, when cops from Los Angeles’ Non-Human Crimes Division get squashed by a Transformers-meets-King Kong robotic thug." Currently 2088 is in development as a feature-length movie.
In January 2015, New Regency and Defy Media announced Ilous and Daniel Perea the winners of their filmmaking competition PROTOTYPE. The two won with their 5-minute short film, Polis, a sci-fi thriller. The competition's prize was a development deal with New Regency, where Polis is to become a feature-length film. After viewing Polis, David Fincher signed on to produce. In early 2015 Polis became a Vimeo staff pick and was named "Short of the Week" at OneRoomwithaView.com in February 2015.
Filmography
Feature films
Sh |
https://en.wikipedia.org/wiki/Takao%20Nishizeki | was a Japanese mathematician and computer scientist who specialized in graph algorithms and graph drawing.
Education and career
Nishizeki was born in 1947 in Fukushima, and was a student at Tohoku University, earning a bachelor's degree in 1969, a master's in 1971, and a doctorate in 1974. He continued at Tohoku as a faculty member, and became a full professor there in 1988. He was the Dean of the Graduate School of Information Sciences, Tohoku University, from April 2008 to March 2010. He retired in 2010, becoming a professor emeritus at Tohoku University, but continued teaching as a professor at Kwansei Gakuin University until March 2015. He was an Auditor of Japan Advanced Institute of Science and Technology from April 2016 to October 2018.
Contributions
Nishizeki made significant contributions to algorithms for series–parallel graphs, finding cliques in sparse graphs, planarity testing and the secret sharing with any access structure. He is the co-author of two books on planar graphs and graph drawing.
In 1990, Nishizeki founded the annual International Symposium on Algorithms and Computation (ISAAC).
Awards and honors
At the 18th ISAAC symposium, in 2007, a workshop was held to celebrate his 60th birthday.
In 1996, he became a life fellow of the IEEE "for contributions to graph algorithms with applications to physical design of electronic systems."
In 1996 he was selected as a fellow of the Association for Computing Machinery "for contributions to the design and analysis of efficient algorithms for planar graphs, network flows and VLSI routing".
Nishizeki was also a foreign fellow of the Bangladesh Academy of Sciences; one of his students and frequent co-authors, Md. Saidur Rahman, is from Bangladesh.
Selected publications
Books
.
.
Research articles
.
.
.
.
References
External links
1947 births
2022 deaths
Japanese computer scientists
20th-century Japanese mathematicians
21st-century Japanese mathematicians
Graph drawing people
Fellows of the Association for Computing Machinery
Fellow Members of the IEEE
Fellows of Bangladesh Academy of Sciences
Tohoku University alumni
Academic staff of Tohoku University
Academic staff of Kwansei Gakuin University
People from Fukushima, Fukushima |
https://en.wikipedia.org/wiki/Colbourn | Colbourn is a surname. Notable people with the surname include:
Charles Colbourn (born 1953), Canadian computer scientist and mathematician
Trevor Colbourn (1927–2015), Australian academic and President of the University of Central Florida
See also
Colburn (disambiguation) |
https://en.wikipedia.org/wiki/Linda%20Macaulay | Linda Ann Macaulay is the Emeritus Professor of System Design at the University of Manchester, specialising in Human–computer interaction, Requirements engineering and Service science, management and engineering.
Education
Linda Macaulay obtained a Bachelor of Science degree in Mathematics at the University of Sheffield in 1972, and a Research master's degree in Computational Science from the University of St Andrews in 1976. She later obtained her Doctor of Philosophy in Computation from the University of Manchester, becoming a Fellow of the British Computer Society.
Research
Human Computer Interaction
Professor Macaulay's 1995 book Human Computer Interaction for Software Designers, served presents a number of techniques for use by System Designers to help them take account of user needs within the design process. The Engineering and Physical Sciences Research Council recognised her HCI research through the award "Human Factors in the Design of Electronic Service Delivery Systems for use in Complex Environments".
Requirements Engineering
Her book on requirements engineering focussed on techniques for involving users in the early stages of requirements in the software design process led to an EPSRC award for "Co-operative Requirements Capture", and a number of articles including USTM: A New Approach to Requirements Specification, Requirements as a Co-operative Activity, A Seven Layer Model of the Role of the Facilitator in Requirements Engineering. She won the Economic and Social Research Council award for "Human Issues in Security and Privacy in e-Commerce".
Service System Design
Macaulay's contributed to one of the earliest publications recognising the need for more flexible software, known as "software as a service", and to be co-investigator in the Interdisciplinary Software Engineering Network. She later founded the EPSRC UK network in Service Science, to develop and promote UK capability in service sciences. Her book Case Studies in Service Innovation presents a study of how service innovation occurs in practice.
Career
In 1999 Linda was the first female Professor to be appointed to the Department of Computation at the University of Manchester Institute of Science and Technology. She is now at Manchester Business School.
Awards
IBM Faculty Award for research in service science
Personal life
Professor Macaulay is married to Patrick Macaulay, they have three children Jon-Sebastian, Theresa and Christine.
References
Alumni of the University of St Andrews
Academics of the University of Manchester
Year of birth missing (living people)
Living people |
https://en.wikipedia.org/wiki/Synthetic%20Reaction%20Updates | Synthetic Reaction Updates is a current awareness bibliographic database from the Royal Society of Chemistry that provides alerts of recently published developments in synthetic organic chemistry.
It covers primary research in general and organic chemistry published in chemistry journals. Each record contains a reaction scheme, as well as bibliographic data and a link to the original article on the publisher's website. Subscribers are able to search by topic and reaction type or register for email alerts of new content based on their search preferences.
History
The database was established in 2015 to replace the two discontinued databases Methods in Organic Synthesis () and Catalysts and Catalysed Reactions (.
Methods in Organic Synthesis was an online database that was established in 1998 and updated weekly with the latest developments in organic synthesis. It was also available as a monthly print bulletin.
Catalysts & Catalysed Reactions was a monthly current-awareness journal that was published from 2002 to 2014. It covered the research areas of catalysed reactions and catalysts.
References
External links
Methods in Organic Synthesis
Catalysts & Catalysed Reactions
Chemical synthesis
Royal Society of Chemistry
Bibliographic databases and indexes
2015 establishments in the United Kingdom |
https://en.wikipedia.org/wiki/Pythian%20Group | Pythian Services Inc., commonly known as Pythian, is an American and Canadian multinational corporation that provides data and cloud-related services. Pythian Services provides services for Oracle, SQL Server, MySQL, Hadoop, Cassandra and other databases and their supporting infrastructure. It also provides transformation services that include cloud migration services, cloud managed services and analytics data platform design and management products and services. Pythian has partnerships with major public cloud vendors including Amazon, Google and Microsoft.
They are a Google Cloud Premier Partner and also a Google MSP Partner. They are also a Microsoft Gold Partner and hold a number of competency accreditations from Microsoft. Pythian is also listed as an AWS Partner Network Advanced Consulting Partner.
History
The company is based in Ottawa, Ontario, and has offices in New York City, London, and Hyderabad, India.
Founded by Paul Vallée in 1997, the company employs approximately 400 employees. In 2014 they acquired Blackbird.io, which was formerly PalominoDB and DriveDev. In 2019 Pythian was acquired by Mill Point Capital, a middle-market private equity firm focused on control-oriented investments in North American IT services, business services, and industrial companies.
Products and services
Pythian is the creator of Adminiscope, a privileged access-management and supervision product named in Database Trends and Applications Magazine's Trend-Setting Products for both 2014 and 2015. Adminiscope permits service providers that deliver their services remotely an additional differentiator and revenue stream by offering its security, audit and replay features to customers.
Blackbird is a wholly owned subsidiary of The Pythian Group, following its acquisition in 2014. The DevOps and data services provider acquisition meant that Pythian was one of the largest open-sourced database, managed-service companies globally.
In 2018, Pythian announced they were launching Tehama, a new SaaS product. The software enables corporations to securely manage third-party vendors and freelancers and also integrate them into the corporation's working environment. It targets common problems such as secure outbound connectivity, mailing out laptops or monitoring work activity. The SaaS product was formed as a subsidiary startup of The Pythian Group.
In 2019, Pythian Services was acquired by NYC based private equity firm Mill Point Capital. MPC invested in organic and inorganic growth as well as IP and GTM. In 2020, Pythian purchased Agosto. Agosto is a Minneapolis-based Google Cloud reseller and IT service management company specializing in IoT. In 2021, Pythian acquired ManageServe, a Chicago-based SAP managed & professional services company.
Awards and recognition
Pythian was named in Canada's Top Small and Medium Employers of 2015. In 2013 and 2014 they received the Global Outsourcing 100 Rising Star by the International Association of Outsourcing Professional |
https://en.wikipedia.org/wiki/Serpent%20in%20the%20Staglands | Serpent in the Staglands is an old-school isometric computer role-playing game developed by independent game developer Whalenought Studios for Microsoft Windows, OS X and Linux. Using the tagline "a 90s CRPG in every way but the release date", The game resembles several classic games such as Fallout, Baldur's Gate, and Darklands. The game is notable for being "brutally old-school", lacking several features seen in modern RPGs such as introductory or tutorial levels, automatically updated journals and quest-markers. It also has a distinct pixelated graphics style. The game uses the Unity Technologies' Unity engine.
In Serpent of the Staglands, you assume the role of Necholai, a lesser God who has descended to earth to take part in a festival in his honor. However, once the festivities are over, some unseen force prevents you from leaving your mortal form and returning to your home. Therefore, you disguise yourself as a spice merchant, trying to move unnoticed throughout the land in an endeavor to find out who is blocking your passage to the astral planes to finally reclaim your immortality.
The game was the subject of a successful Kickstarter campaign raising $28,058 from 1,092 backers. It was released via the Whalenought website as well as GOG.com, Steam and Humble Store on 28 May 2015. Josh Sawyer and Feargus Urquhart from Obsidian Entertainment were among the backers.
An expansion pack is currently under development.
Despite initially being "almost completely ignored by the specialized press", favorable reviews and impressions are starting to appear.
Gameplay
The game features a classless role-playing system reminiscent of the SPECIAL system used in Fallout. The player is free to create builds using any combination of the magic, combat and aptitude skills available. You create your character at the start of the game, and might optionally create up the five more. Alternatively, you recruit companions you meet in the game world. A noteworthy feature is the ability to bind the souls of these companions to the will of the player character, making sure that they will not leave your party later on.
Similarly reminiscent of Fallout, the game allows open world sandbox exploration, meaning that the player is free to move about the map as he chooses and solve quests in any order desired. The game also features a non-linear storyline, with multiple endings according to the choices made by the player.
Combat has been noted by reviewers to be "especially brutal". It uses real-time with pause, as popularized by Infinity Engine games such as Baldur's Gate and Icewind Dale, as well as the more recent Pillars of Eternity. The player is encouraged to pause often to take tactical decisions, using the abilities of the different party members. While one reviewer noted that he died "repeatedly despite learning how to manage combat", he nevertheless described combat as "strategic" and "fun".
Setting
Serpent in the Staglands takes place in the world of Vo |
https://en.wikipedia.org/wiki/Valerie%20Spencer | Valerie Spencer is a fictional character from General Hospital, an American soap opera on the ABC network, portrayed by Brytni Sarpy. Introduced as the niece of the legendary Luke Spencer (Anthony Geary), Valerie is the daughter of the late Pat Spencer (Dee Wallace). Upon losing her mother, Valerie relocates to Port Charles and moves in with her cousin, Lulu Spencer (Emme Rylan), and bonds with her husband Dante Falconeri (Dominic Zamprogna). The two end up having a one-night stand, only for Dante to reconcile with Lulu and Valerie briefly dates Lulu's ex-boyfriend Dillon Quartermaine (Robert Palmer Watkins).
Storylines
Looking for answers about Luke Spencer (Anthony Geary)'s mental state, his daughter Lulu (Emme Rylan) and his ex-wife Tracy Quartermaine (Jane Elliot) go searching for his estranged older sister Pat, and find her daughter Valerie instead. As she is held hostage by a gun wielding Luke, Valerie tells them Pat is dead. Luke ties Valerie up and threatens to kill her when he finds out she lied about her mother being dead. They struggle over his gun and Luke escapes leaving Valerie unconscious and she is discovered by Lulu and her husband Dante Falconeri (Dominic Zamprogna). Valerie reveals that Pat is alive and living in a nursing home because she suffers from Multiple sclerosis and Luke has gone after her. Dante and Valerie find Pat (Dee Wallace) at her childhood home in Port Charles with the rest of the Spencers only for their reunion to be cut short when Pat suddenly passes away. Blaming Luke for her mother's death, Valerie tries to kill him, but Dante talks her down.
Valerie temporarily moves in with Dante and Lulu, and she bonds with him over being raised by single moms. Lulu becomes insecure about their growing closeness though Valerie and Dante maintain they are just friends. Valerie moves in with Lulu's brother Nikolas (Tyler Christopher) to give them space. However, Dante and Valerie become even closer when she starts working for the police department as an administrative assistant. Meanwhile, Valerie bonds with her aunt Bobbie (Jacklyn Zeman) when Bobbie tells her about their childhood. Later, Aunt Bobbi will encourage Valerie to go after her cousin Lulu's husband Dante. Valerie also moves in with her cousin and Bobbie's daughter Carly Corinthos (Laura Wright).
On Independence Day, Dante and Valerie end up sleeping together after a drunken Dante is mistakenly led to believe that Lulu is having an affair with her ex-boyfriend Dillon Quartermaine (Robert Palmer Watkins) while Valerie is grieving her mother. Valerie admits that she took advantage of a drunken Dante the morning after the tawdry one night stand. Dante and Lulu reconcile while Valerie agrees to keep quiet about the affair despite having feelings for him. Valerie later begins dating Dillon.
Valerie clashes with Lulu's best friend Maxie Jones (Kirsten Storms) who accuses her of going after Dante. They later reconcile and help Carly pick jewelry for her wedding. V |
https://en.wikipedia.org/wiki/Shadowrun | Shadowrun is a science fantasy tabletop role-playing game set in an alternate future in which cybernetics, magic and fantasy creatures co-exist. It combines genres of cyberpunk, urban fantasy, and crime, with occasional elements of conspiracy, horror, and detective fiction. From its inception in 1989, it has spawned a franchise that includes a series of novels, a collectible card game, two miniature-based tabletop wargames, and multiple video games.
The title is taken from the game's main premise – a near-future world damaged by a massive magical event, where industrial espionage and corporate warfare runs rampant. A shadowrun – a successful data theft or physical break-in at a rival corporation or organization – is one of the main tools employed by both corporate rivals and underworld figures. Deckers (futuristic hackers) can tap into an immersive, three-dimensional cyberspace on such missions as they seek access, physical or remote, to the power structures of rival groups. They are opposed by rival deckers and lethal, potentially brain-destroying artificial intelligences called "Intrusion Countermeasures" (IC), while they are protected by street fighters and/or mercenaries, often with cyborg implants (called cyberware), magicians, and other exotic figures. Magic has also returned to the world after a series of plagues; dragons who can take human form have returned as well, and are commonly found in high positions of corporate power.
Setting
Shadowrun takes place several decades in the future (2050 in the first edition, currently ). The end of the Mesoamerican Long Count calendar ushered in the "Sixth World", with once-mythological beings (e.g. dragons) appearing and forms of magic suddenly emerging. Large numbers of humans have "Goblinized" into orks and trolls, while many human children are born as elves, dwarves, and even more exotic creatures. In North America, indigenous peoples discovered that their traditional ceremonies allow them to command powerful spirits, and rituals associated with a new Ghost Dance movement let them take control of much of the western U.S. and Canada, where they formed a federation of Native American Nations. Seattle remains under U.S. control by treaty as a city-state enclave, and most game materials are set there and assume campaigns will use it as their setting.
In parallel with these magical developments, the setting's 21st century features technological and social developments associated with cyberpunk science fiction.
Megacorporations control the lives of their employees and command their own armies; many of the largest have extraterritoriality, such as currently enjoyed by foreign heads of state. Technological advances make cyberware (mechanical replacement body parts) and bioware (augmented vat-grown body parts implanted in place of or in tandem with natural organs) common. The Computer Crash of 2029 led to the creation of the Matrix, a worldwide computer network that users interact with via direct |
https://en.wikipedia.org/wiki/Edna%20%26%20Harvey | Edna & Harvey may refer to either of two computer games running on Microsoft Windows:
Edna & Harvey: The Breakout (2008)
Edna & Harvey: Harvey's New Eyes (2012) |
https://en.wikipedia.org/wiki/Quantopian | Quantopian aimed to create a crowd-sourced hedge fund by letting freelance quantitative analysts develop, test, and use trading algorithms to buy and sell securities.
In November 2020, Quantopian announced it will shut down after having operated for 9 years.
History
John Fawcett and Jean Bredeche founded Quantopian in 2011. Over its history, Quantopian raised $48.8M from investors such as Spark Capital, Khosla Ventures, Bessemer Venture Partners, Point72 Ventures, and Andreessen Horowitz. As of July 2016, the company consisted of 45 employees, up from 20 employees in January 2014 and 12 in January 2014. As of August 2018, the company had over 210,000 members compared to 85,000 in July 2016, 20,000 in May 2014, and 10,000 in October 2013. In July 2016, Steven A. Cohen, chief executive officer of Point72 Asset Management, announced his firm will put up to $250M under the direction of algorithms managed by Quantopian and make an investment in Quantopian itself. The company has funded individual algorithms with as much as $50,000,000. In February 2020, Quantopian announced it would return investors' money due to the underperformance of its investment strategies.
Business Model
The company ran a two-sided market business model:
The first side consisted of algorithm-developer members who developed and tested for free, focusing on algorithm development for factors that can be added to Quantopian's offerings to institutional investors. It hosted contests called "Quantopian Open", where anyone could join and enter regardless of education or work experience. Quantopian provided them with free data sources and tools, largely built in the Python programming language.
The second side was institutional investors. These members had their investments managed by the winning algorithms. Successful developer-members could get a royalty or commission from investor-members, who profited from the former's algorithm used with larger resources > $1M. Board member Andrew Parker claimed that Quantopian aimed for modest number of users and a large average revenue per user (ARPU); more like Bloomberg than Facebook.
The business model capitalized on a trend jokingly dubbed "the latest DIY craze" by the Wall Street Journal.
Previously the company provided brokerage integrations to individual investors. These integrations were continued by the community who started the open source project Zipline-Live
In 2018, the company announced the availability of an enterprise software product for asset managers, in partnership with FactSet.
In 2015, Quantopian's Director of Products, Karen Rubin, used the service in a study that showed that a hypothetical portfolio of investments in women-led companies would perform three times better than an investment in an index fund based on the S&P 500 over the same period. Her study was inspired by a Credit Suisse’s Gender 3000 report, specifically that "Companies with more than one woman on the board have returned a compound 3.7% a ye |
https://en.wikipedia.org/wiki/Zhang%20Changhong%20%28businessman%29 | Zhang Changhong (, born 1958/59) is a Chinese entrepreneur, the chairman of DZH (formerly Shanghai Great Wisdom 上海大智慧), a financial data and software provider.
Early life
Zhang Changhong was born in 1958/59, and graduated from Suzhou University of Science and Technology in 1987.
Career
Zhang is chairman of DZH, which competes in China with Reuters and Bloomberg.
Personal life
He is married and lives in Shanghai, China.
References
1950s births
Living people
Businesspeople from Shanghai
Billionaires from Shanghai
Chinese technology company founders |
https://en.wikipedia.org/wiki/Channel%2026%20virtual%20TV%20stations%20in%20Mexico | The following television network and local stations operate on virtual channel 26 in Mexico:
Regional networks
TVMÁS in the state of Veracruz
Local stations
XHCGA-TDT in Aguascalientes, Aguascalientes
References
26 virtual |
https://en.wikipedia.org/wiki/Canadian%20Centre%20for%20Gender%20and%20Sexual%20Diversity | The Canadian Centre for Gender and Sexual Diversity (CCGSD) is a charitable organization whose programming works to stop bullying, discrimination and homophobia in schools and communities in Canada, and abroad. Through workshops, presentations, training conferences, and by supporting youth initiatives, they engage youth in celebrating diversity of gender identity, gender expression, and romantic orientation and/or sexual orientation.
Overview
The CCGSD, originally known as Jer's Vision, was founded by a six-member board in 2005. Started originally as a scholarship, the organization grew to a range of programs that engage schools in examining the culture of their school and providing them with programming to address challenges around bullying, homophobia, transphobia and discrimination.
In March 2015, Jer's Vision changed its name to the Canadian Centre for Gender and Sexual Diversity.
Focus areas
Programming in Schools
The Canadian Centre for Gender and Sexual Diversity works with schools to develop and provide programming that engages students, staff and community to understand bullying, discrimination, homophobia and transphobia. This includes presentations, workshops, conferences, training, professional development and efforts that support youth initiatives and clubs. The organization works across Canada, especially in rural communities, and in the Northern United States.
Working in Communities
In 2007, youth from Jer's Vision were inspired by David Shepherd and Travis Price to start the International Day of Pink. The initiative supports youth actions to stop bullying in schools and communities. In 2012, over 8 million people participate in the International Day of Pink.
The organization sits on a variety of committees and contributes to work across Canada. They have participated in activism and activities with the Parliament of Canada, the Senate of Canada, Government of Ontario, Ontario Chiefs of Police, and the City of Ottawa.
Recognizing Community Leaders
Starting in 2006, Jer's Vision began recognizing individuals and groups with the Youth Role Model of the Year award. The award recognizes persons who have done exceptional work to stop bullying, discrimination in their communities at their annual gala. Past recipients of the award include Rick Mercer, Jack Layton, Lori Taylor and Brandon Timmerman, Stephen Lewis, Brian Burke, Elder William Commanda, Libby Davies, Hedy Fry, Adamo Ruggiero, Matthew Good, Audrey Wolfe, and Sheila Copps.
The Gay Sweater
On March 24, 2015, the CCGSD launched The Gay Sweater. The campaign, aimed at reclaiming the phrase "that's so gay" by creating an actual gay object - namely a sweater knit from yarn made from 100% human hair donated by the LGBT community - was timed to coincide with Toronto Fashion Week. The Gay Sweater received widespread coverage and the YouTube video had 45,000 views in the first 48 hours.
See also
LGBT rights in Canada
List of LGBT rights organisations
International Day of P |
https://en.wikipedia.org/wiki/Autoscaling | Autoscaling, also spelled auto scaling or auto-scaling, and sometimes also called automatic scaling, is a method used in cloud computing that dynamically adjusts the amount of computational resources in a server farm - typically measured by the number of active servers - automatically based on the load on the farm. For example, the number of servers running behind a web application may be increased or decreased automatically based on the number of active users on the site. Since such metrics may change dramatically throughout the course of the day, and servers are a limited resource that cost money to run even while idle, there is often an incentive to run "just enough" servers to support the current load while still being able to support sudden and large spikes in activity. Autoscaling is helpful for such needs, as it can reduce the number of active servers when activity is low, and launch new servers when activity is high. Autoscaling is closely related to, and builds upon, the idea of load balancing.
Advantages
Autoscaling offers the following advantages:
For companies running their own web server infrastructure, autoscaling typically means allowing some servers to go to sleep during times of low load, saving on electricity costs (as well as water costs if water is being used to cool the machines).
For companies using infrastructure hosted in the cloud, autoscaling can mean lower bills, because most cloud providers charge based on total usage rather than maximum capacity.
Even for companies that cannot reduce the total compute capacity they run or pay for at any given time, autoscaling can help by allowing the company to run less time-sensitive workloads on machines that get freed up by autoscaling during times of low traffic.
Autoscaling solutions, such as the one offered by Amazon Web Services, can also take care of replacing unhealthy instances and therefore protecting somewhat against hardware, network, and application failures.
Autoscaling can offer greater uptime and more availability in cases where production workloads are variable and unpredictable.
Autoscaling differs from having a fixed daily, weekly, or yearly cycle of server use in that it is responsive to actual usage patterns, and thus reduces the potential downside of having too few or too many servers for the traffic load. For instance, if traffic is usually lower at midnight, then a static scaling solution might schedule some servers to sleep at night, but this might result in downtime on a night where people happen to use the Internet more (for instance, due to a viral news event). Autoscaling, on the other hand, can handle unexpected traffic spikes better.
Terminology
In the list below, we use the terminology used by Amazon Web Services (AWS). However, alternative names are noted and terminology that is specific to the names of Amazon services is not used for the names.
Practice
Amazon Web Services (AWS)
Amazon Web Services launched the Amazon Elastic Compute |
https://en.wikipedia.org/wiki/List%20of%20Yahoo%21%20Screen%20original%20programming | Beginning in 2011, Yahoo.com distributed some original programs through its Yahoo! Screen service.
In Spring 2015, Yahoo! began to expand their original programming efforts by producing their first longform scripted series with runtimes between 20 and 30 minutes. These shows included Sin City Saints, Other Space, and the sixth season of the NBC series Community.
On January 4, 2016, following a $42 million write-down in the third quarter of 2015 as a result of the poor performance of its three original series, Yahoo! Screen as a portal was discontinued. Yahoo's original video content was re-located to relevant portals of the site; in particular, its original television series were moved to an "originals" section on the Yahoo! TV site.
Original programming
Drama
Comedy
Continuations
Reality
Live sports
Cancelled original programming
Upon Yahoo! Screen's closure, a number of projects in development by Yahoo! were subsequently cancelled. One of the few series that were previously announced was a comedy series entitled The Pursuit. The show was set to be produced by Scott Stuber and Beth McCarthy-Miller. It would have followed "a group of friends in their late 20s who are living in Manhattan and pursuing success, love, wealth and happiness".
Before the fall 2015 television season, Yahoo! had been in negotiations with 20th Century Fox Television to revive then-recently cancelled comedy series Enlisted for a second season. Yahoo! eventually passed on the revival over budgetary concerns.
References
Yahoo! Screen
Yahoo! Screen
Yahoo! |
https://en.wikipedia.org/wiki/Praise%20%28TV%20program%29 | Praise (formerly Praise the Lord) is a Christian-oriented television talk program which is the flagship program of the Trinity Broadcasting Network (TBN), airing every weeknight in primetime. TBN president Matt Crouch and his wife Laurie serve as the primary hosts of the show. On November 14, 2016, the title was changed to the shortened title Praise.
Premise
Originally hosted by TBN founders Paul and Jan Crouch, and later by Paul Crouch Jr., the program features a mix of interviews with celebrities and other performers discussing faith-based topics and their personal relationship with faith, and music performances from various gospel and contemporary Christian artists. It was originally 2 hours, which shifted to 90 minutes, as well as moved to a new timeslot. The program usually originates from the network's Trinity Christian City campus in Costa Mesa, California, though other episodes also originate from TBN's facilities in Irving, Texas, the Trinity Music City complex in Hendersonville, Tennessee, and the Holy Land Experience in Orlando, Florida.
A localized version Praise the Lord is utilized by TBN's owned-and-operated stations and affiliates to fulfill local or educational programming requirements.
Theme and announcer
Jim McClellan has served as the program's announcer for nearly 40 years. Rich Cook serves as the composer of the show's theme music used since 1992, which includes three versions of varying length and an alternate version utilizing a saxophone.
The 1981–1992 TBN Praise the Lord theme song was composed and arranged by Rich Cook.
References
External links
Trinity Broadcasting Network original programming
1973 American television series debuts
1980s American television series
1990s American television series
2000s American television series
2010s American television series
2020s American television series
Christian entertainment television series |
https://en.wikipedia.org/wiki/SparkyLinux | SparkyLinux is a desktop-oriented operating system based on the Debian operating system.
The project offers a ready to use operating system with various desktops to choose from. SparkyLinux is released 3-4 times per year to provide the latest versions of all applications.
History
The project was born on October 2011 as an Ubuntu remix with Enlightenment as the default desktop having the name ue17r (Ubuntu Enlightenment17 Remix). After a few months of testing, the base system was changed to Debian and it was renamed to SparkyLinux.
Features
SparkyLinux is based on "stable" and "testing" branches of Debian and uses a 'rolling-release-cycle' (testing based only).
It includes a collection of tools and scripts to help users with easy administration of the system.
The default desktop environments are LXQt (former LXDE), MATE, Xfce and KDE, but users can install other desktops via 'Sparky APTus'.
As Sparky ISO image features a few proprietary packages, the 'Sparky APTus' provides a small tool called 'Non-Free Remover' which can easily uninstall all 'contrib' and 'non-free' packages from the system.
Since 2023, the project offers storage persistence from a utility which writes USB disk images. The feature so far only works on the MinimalGUI version of SparkyLinux.
Special editions
GameOver Edition, targeted to gamers. It features a large set of free and open-source games and some needed tools;
Rescue Edition, provides a live system and a large number of applications for recovering broken operating systems;
Multimedia for audio, video and html pages creating;
MinimalCLI and MinimalGUI.
See also
List of live CDs
References
Further reading
External links
Debian-based distributions
Linux distributions
LiveDistro
Live USB
LXQt
Operating system distributions bootable from read-only media
X86-64 Linux distributions
Rolling Release Linux distributions |
https://en.wikipedia.org/wiki/Analytics.usa.gov | Analytics.usa.gov is a website of the government of the United States, created through a collaboration between GSA's Digital Analytics Program and 18F, based on unified Google Analytics data for some .gov domains.
History
Website development
Analytics.usa.gov was launched on March 19, 2015 with data for about 300 (out of 1350) .gov domains, including every cabinet department.
On February 18, 2016, analytics.usa.gov introduced agency-specific dashboards for its participating agencies: users could now filter to results only from that specific agency.
Forks
Around April 22, 2015, the government of Philadelphia launched its own analytics website at analytics.phila.gov, built using a forked version of the source code developed for analytics.usa.gov.
On January 6, 2016, a blog post on analytics.usa.gov discussed adaptations of analytics.usa.gov by three regional governments and government agencies in the United States, including comments by people who had worked on each of the adaptations. The adaptations were for: the city of Philadelphia (noted above), the Tennessee Department of Environment and Conservation, and the city of Boulder, Colorado.
As of July 7, 2017, the following adaptations are listed on the main README of the analytics.usa.gov GitHub repository:
City governments
Technology
The 18F blog provided a detailed description of the technology stack used to build the website, which was picked up by Hacker News and formed the basis of a more picture-heavy version in Storify. The data is collected through a unified Google Analytics account that stores anonymized IP addresses to preserve privacy. This is periodically queried using an open source analytics tool built by 18F called the analytics reporter, whose repository is available on GitHub. The JSON result is stored to Amazon S3 and served statically through Amazon CloudFront. The entire website's code is also available in a GitHub repository.
Reception
Privacy concerns
A number of people expressed concerns about the storage of potentially private user data in Google Analytics, despite the IP address anonymization. The creators of analytics.usa.gov emphasized that they were concerned with privacy and therefore only revealed aggregated data to the public, rather than allowing arbitrary queries on the data.
Analysis of data and suggestions for improvement
Discussion of the analytics focused on the fact that pages from the Internal Revenue Service were among the most visited, and the "Where's My Refund?" page had the top spot. This was explained by the timing: taxes were due April 15 and many people had started the process of tax filing. Other top visited pages were on the websites of the National Weather Service, National Park Service, United States Citizenship and Immigration Services, and StopBullying.gov. Greg Boone wrote that analytics.usa.gov is an active expression of government "for the people, of the people, and by the people." He elaborated: "All told, there were nearly |
https://en.wikipedia.org/wiki/Reno%20Rumble | Reno Rumble was an Australian renovation reality television series, it aired on the Nine Network. The series was hosted by Scott Cam and Shelley Craft, and judged by Colin McAllister and Justin Ryan. The series first aired on Tuesday 5 May 2015. On 28 October 2015, the series was renewed for a second season and aired on Monday 21 March 2016.
Contestants renovated two suburban houses, with one team eliminated each week. In season 1, the winner received a $100,000 cheque with half going to the winning couple’s favourite charity and a new Mazda CX-5 and the runner up received $50,000 with half going to charity. Throughout the length of the competition, the contestants will stay in luxury style caravans provided by Elite Caravans.
Each home will be judged by interior design experts who have been briefed by the home owners on the style they want for their renovation. In season two, the winning couple will again receive $100,000 but half will not go to charity.
Each week, each home will be blind judged (unaware of which team renovated which one – or the rooms assigned to each individual couple) and the team with the lowest score that week will be eliminated from the competition.
The series was cancelled due to unexpected low ratings during the second season.
Format
Season 1
Each week each individual team within the red & blue teams are allocated two rooms to deliver, first room is delivered within the first 48 hours, the highest scored individual team will receive immunity from elimination. The teams will then work on their second room the rest of the week, the team with the highest score are safe from elimination, the individual team with the lowest score in the losing team are eliminated.
Every room receives a gift from the homeowners, they must work to the brief/style of this object to be scored highly. Each team are allocated a budget, they must work within this budget.
Season 2
Each week, both teams are given $200,000 to renovate their houses with each individual team within the red & blue teams allocated two rooms to deliver at the end of each week. The homeowners give each individual team a brief for their rooms. The whole team (red or blue) with the highest score are the weeks winning team and avoid elimination, the lowest scoring individual team in the losing team will be eliminated.
Hosts and judges
Series changes
In the first season of Reno Rumble, it pit former contestants from Nine Network series The Block against former contestants from Seven Network series House Rules. Scott Cam hosted the season and was judged by Darren Palmer & Romy Alwill. The winner received $100,000 (half to charity of choice) and a Mazda CX-5.
In the second season, it pit state based rookie teams from the East and West sides of Australia competing against each other. Judges Darren Palmer & Romy Alwill were replaced by Scottish interior decorators Colin McAllister and Justin Ryan and Shelley Craft joined as co-host alongside Scott Cam. Similar to season 1 |
https://en.wikipedia.org/wiki/Kaywa | Kaywa (Quechua for a Cyclanthera species, (Cyclanthera pedata or Cyclanthera brachybotrys) Hispanicized spelling Cayhua) is a mountain in the Andes of Peru, about high. It is situated in the Huancavelica Region, Huancavelica Province, Acobambilla District, and in the Lima Region, Yauyos Province, Huantán District. Kaywa lies west of Wich'iqucha and northwest of Quylluqucha.
References
Mountains of Huancavelica Region
Mountains of Lima Region
Mountains of Peru |
https://en.wikipedia.org/wiki/Transgender%20Equality%20Network%20of%20Ireland | Transgender Equality Network of Ireland (TENI) is an Irish nonprofit organisation founded in 2006, which seeks to improve conditions and rights for transgender people and their families in Ireland.
STAD: Stop Transphobia and Discrimination
In 2013 TENI launched the STAD: Stop Transphobia and Discrimination campaign. The campaign sought to raise awareness of transphobic hate crimes by collecting and providing data to stakeholders such as the Garda Síochána. The first report was launched on 18 June 2014 at the University of Limerick. The report offered six recommendations:
Transphobic incidents should be logged on the PULSE (Police Using Leading Systems Effectively) system
Additional training should be provided for police officers
Conduct further research
Improve the relationship between the trans community and the police
Advocate for legislation to protect trans people
Educate the public about transphobia
National Transgender Healthcare Conference
On 3 December 2015, in partnership with the HSE, TENI co-hosted the first National Transgender Healthcare Conference in Carlow. The conference, which was attended by 380 healthcare professionals, sought to highlight issues that transgender people face accessing health services in Ireland. This conference led to the publication of the HSE's Health Report towards meeting the health care needs of lesbian, gay, bisexual and transgender people.
Gender Recognition Bill 2017
In 2013, TENI supported the recommendation of the Social Protection Committee to lower the legal age for gender recognition from 18 to 16. This led to the passing of the Gender Recognition Act 2017. This Act amends the Gender Recognition Act 2015 in three ways:
Provide a right to self determination for persons who have reached the age of 16 years
Introduce a right to legal gender recognition for persons under the age of 16 years
Ensure consideration of the status of non-binary persons in Irish law
Strategy for Education and Skills 2016–18
TENI made a submission on the Strategy for Education and Skills 2016–18 to improve the conditions and advance the rights of trans people and their families.
Publications
Speaking from the Margins: Trans Mental Health and Wellbeing in Ireland
STAD: Stop Transphobia and Discrimination Report
See also
Transgender rights in Ireland
References
External links
Transgender organizations
LGBT organisations in Ireland |
https://en.wikipedia.org/wiki/Atari%20Program%20Recorder | The Atari Program Recorder is Atari's dedicated magnetic-tape data storage device for the Atari 8-bit family of home computers. The original 410 was launched along with the Atari 400 and 800 machines in 1979. The 1010 was a smaller model introduced to match the styling of the XL series released in 1983. XC12 of 1986 matched the XE series and was sold mostly in eastern Europe and South America. Slight variations of all of these models were also introduced from time to time.
The data rate was nominally 600 bit/s, but the simple error correction and short gaps between the resulting packets lowered this somewhat. In the end, its rate was roughly double that of the formats used by the Commodore Datasette or the TI-99/4. In some markets, where the Program Recorder was the only cost-effective storage solution, software-based high-performance modes were developed that operated more than three times as fast, and as much as four times as fast with simple hardware modifications.
The drives had several features not commonly found on other platforms. The system's device driver supported a packet-based format with checksums for error detection, as opposed to lacking any error detection or using whole-file checksums. The driver included separate formats for binary data and more complex data that required longer to process it. The left audio channel could be used to send audio through to the television speaker, which could be used to provide music during the loading period, or in program-controlled computer aided instruction systems.
Physical design
The original 400 and 800 models, released in 1979, were housed in robust beige colored plastic cases and a series of computer peripherals were released to match this design. The original 410 was a modified Sears model 799.21672500 Solid State Cassette Recorder with a Japanese mechanism by Bigston. It was a relatively large unit and was unique among the line in that it featured a metal carrying handle that slid out from the front of the unit, identical to its Sears counterpart. This was replaced by a somewhat smaller and more rounded unit around 1981 using a new mechanism from Transtek or Chelco Sound in Hong Kong.
The release of the 600XL and 800XL in 1983 led to the system being repackaged in a much smaller form, the 1010. The new model used the black/white/silver styling of the new machines and was assigned a number in the new 1000-series device numbers. Two versions were made, one using a Chelco mechanism and another using Sanyo. They can be distinguished by the colored sticker inside the drive bay, Chelco used silver while Sanyo was orange.
When the XE series were released they were initially sold into existing markets and Atari introduced a number of XE-styled accessories to go with them. This led to the introduction of the XC11 in the UK around 1986, which are essentially the later-model 410's in the new silver-grey XE coloring. Only small numbers seem to have been produced, as by this time floppy disks we |
https://en.wikipedia.org/wiki/Cyber%20manhunt%20in%20Hong%20Kong | A cyber manhunt () in Hong Kong is a term for the behavior of tracking down and exploring an individual's private information via internet media. A cyber manhunt generally involves netizens and is regarded as the purpose of a cyber judgment to the target through blaming, shaming, and naming culprits.
Background
A cyber manhunt is developed from the word ‘manhunt’. A manhunt is a way of searching background information of an objective person. The term is broadly used by the police and media. Manhunts were limited during the use of traditional media in the 1990s because of technological constraints. However, cyber manhunts became popular in the 21st century. It gained popularity on the ‘Hong Kong Golden Forum’ and thus spread to other social media websites.
The emergence of cyber manhunts was led by the common practice of sharing individual photographs and information on social networks. Owing to the exploitation of cyberspace technology, more and more free social networking websites appear nowadays, (i.e. Qzone, Tencent QQ, Tencent Video, Weibo, etc.) People are then more willing to share their daily lives on the web. This trend highly raises the accessibility of various internet users to one's personal information. As it gets easier to find people's personal details on the web, it leads to the present prevalence of cyber manhunts.
People tend to put forward Public trials through cyber manhunts. When there are immoral or unfair scenes that might not be handled by law enforcement, such as the ’14-slaps-girl’ and the ‘Bus Uncle’, citizens use cyber manhunts to raise public attention. It provides a way for victims to seek justice through the internet and also plays a role in monitoring, as people will be careful of their behaviors in public to avoid themselves being shamed on the internet.
Method
Application of search engine
One of the methods is to make use of search engines to obtain the information of people. Netizens search the target by using multitudes of search engines, including Baidu, Petal, Sogou, etc. They type the keywords or the name of the target into the search engines to find related websites, for instance, the social networking sites, private blogs, and albums of the target. They can obtain the target's private information by visiting those websites. Eventually, they would post and show the information they get to the public through the internet.
Browsing public online platforms
Moreover, there are columns in public online platforms called the ‘Column for betraying friends’. Netizens usually post the private information and photos of their friends in these columns. For instance: telephone numbers, emails, addresses, etc. Other netizens would browse these columns and obtain information. Some of them even criticize targets in columns, causing cyber bullying.
Purpose
Expression of dissatisfaction
Cyber manhunt gives the Netizens a good channel to let off their anger and dissatisfaction with the society and social phenomenon. |
https://en.wikipedia.org/wiki/Channel%2010%20virtual%20TV%20stations%20in%20Mexico | The following television stations operate on virtual channel 10 in Mexico:
Regional networks
Canal 10 Chiapas in the state of Chiapas
TV Mar in Baja California Sur and Puerto Vallarta, Jalisco
Tlaxcala Televisión in the state of Tlaxcala
Local stations
XHMEE-TDT in Mexicali, Baja California
XHJUB-TDT (Nu9ve subchannel) in Ciudad Juárez, Chihuahua
XHTSCO-TDT in Saltillo, Coahuila
XHA-TDT in Durango, Durango
XHQMGU-TDT in Guadalajara, Jalisco
XHTPG-TDT in Tepic, Nayarit
XHSECE-TDT in Querétaro, Querétaro
XHCOSL-TDT in Matehuala, San Luis Potosí
XHSLV-TDT in San Luis Potosí, San Luis Potosí
XHQ-TDT in Culiacán, Sinaloa
XHMZ-TDT in Mazatlán, Sinaloa
XHI-TDT in Ciudad Obregón, Sonora
XHFW-TDT in Tampico, Tamaulipas
References
10 virtual |
https://en.wikipedia.org/wiki/Blackfire%20Profiler | Blackfire Profiler is a tool that instruments PHP applications to gather data about consumed server resources like memory, CPU time, and I/O operations. Blackfire is also a SaaS service to visualize any callgrind-compatible profile.
Its architecture is based on a Probe, which is a PHP extension that gathers the raw performance profiles and an Agent, which is a server-side daemon that aggregates and forwards profiles to blackfire.io servers to visualize them.
Blackfire has been used by some popular PHP projects such as ownCloud, Drupal, Symfony and Laravel to improve their performance and to spot performance bottlenecks.
Blackfire is actively developed.
Features
Profile web pages, command line scripts and APIs and web services.
Compatible with the profiles generated with XHProf, Xdebug and Google Chrome CPU Profiler.
Compare two profiles to spot the parts of the application which have been improved or degraded.
Automatic aggregation of negligible internal PHP functions.
Detection of PHP Garbage Collector cycles.
Application performance management (APM).
References
External links
Profiling with Blackfire for WordPress
PHP software
Profilers |
https://en.wikipedia.org/wiki/Channel%2012%20virtual%20TV%20stations%20in%20Mexico | The following television stations operate on virtual channel 12 in Mexico:
Regional networks
Radio y Televisión de Hidalgo in the state of Hidalgo
Local stations
XEWT-TDT in Tijuana, Baja California
XHTUG-TDT in Tuxtla Gutiérrez, Chiapas
XHAMO-TDT in Colima, Colima
XHND-TDT in Durango, Durango
XHAK-TDT in Hermosillo, Sonora
XHFM-TDT in Veracruz, Veracruz
12 virtual |
https://en.wikipedia.org/wiki/Jan%20Kratochv%C3%ADl | Jan Kratochvíl (born 10 February 1959) is a Czech mathematician and computer scientist whose research concerns graph theory and intersection graphs.
Kratochvíl was born on 10 February 1959 in Prague. He studied at Charles University in Prague, earning a master's degree in 1983 and a Ph.D. in 1987; his dissertation, supervised by Jaroslav Nešetřil, combined graph theory with coding theory. He remained at Charles University as a faculty member, earned his habilitation in 1995, and was promoted to full professor in 2003. From 2003 to 2011 he chaired the department of applied mathematics at Charles University, and from 2012 to 2020 he was the dean of the Faculty of Mathematics and Physics there.
Kratochvíl was the program chair and organizer of the 7th International Symposium on Graph Drawing, in 1999. From 2002 to 2010 he was president of the Czech Mathematical Society. Since March 2021, Kratochvíl is editor-in-chief of Elsevier's Computer Science Review (Impact Factor: 7.7), together with Giuseppe Liotta and Jaroslav Nešetřil.
References
External links
Home page
Google scholar profile
1959 births
Living people
Czech computer scientists
20th-century Czech mathematicians
21st-century Czech mathematicians
Graph theorists
Graph drawing people
Charles University alumni
Academic staff of Charles University
Czechoslovak mathematicians |
https://en.wikipedia.org/wiki/Moisil | Moisil is a Romanian surname that may refer to:
Constantin Moisil (1876–1958), historian
Grigore Moisil (1906–1973), mathematician and computer scientist, son of Constantin
Iuliu Moisil (1859–1947), schoolteacher and writer, uncle of Constantin
Grigore Moisil National College of Computer Science (Brașov)
Łukasiewicz–Moisil algebra
Romanian-language surnames |
https://en.wikipedia.org/wiki/VoCore | The VoCore is "a coin-sized Linux computer with wifi". It is a single-board computer developed in China.
It includes WiFi (2.4 GHz 802.11 b/g/n), Ethernet (10/100 Mbit/s x2), USB 2.0 (up to 480M) and 28 GPIO (reused).
It is entirely open source. Both the hardware and the software are available on the VoCore website.
See also
References
External links
Forum
Indiegogo campaign
VoCore manual
Educational hardware
Linux-based devices
Single-board computers
Products introduced in 2014 |
https://en.wikipedia.org/wiki/Gemini%20Guidance%20Computer | The Gemini Guidance Computer (sometimes Gemini Spacecraft On-Board Computer (OBC)) was a digital, serial computer designed for Project Gemini, America's second human spaceflight project. The computer, which facilitated the control of mission maneuvers, was designed by the IBM Federal Systems Division.
Functionality
Project Gemini was the first with an on-board computer, as Project Mercury was controlled by computers on Earth. The Gemini Guidance Computer was responsible for the following functions:
Ascent – serves as a backup guidance system. The switchover is manually controlled by the astronauts
Orbital flight – gives the astronauts the capacity to navigate, allowing them to choose a safe landing spot in an emergency and calculate the timing of retrofire. (on extended missions ground data may become unavailable when ground data network rotates out of the orbital plane.)
Rendezvous – serves as primary reference by providing guidance information to the astronauts. The orbit parameters are determined by the ground tracking which are then sent to the spacecraft; the guidance computer was responsible for processing the information along with sensed spacecraft attitude. The information was presented to the astronauts in terms of spacecraft coordinates.
Reentry – feeds commands directly to the reentry control system for automatic reentry or provides the guidance information to the astronauts for manual reentry.
Specs
The computer was architecturally similar to the Saturn Launch Vehicle Digital Computer, in particular in the instruction set; however its circuit integration was less advanced. The GGC weighed 58.98 pounds (26.75 kg) and was powered by 28V DC. During a short power outage it could be powered by the Auxiliary Computer Power Unit (ACPU)
39-bit words memory, each composed of three 13-bit syllables
Ferrite core memory of 4096 words
Two's complement integer arithmetic
7.143 kilohertz clock (140 us per instruction); all instructions took a single cycle except for multiplication and division
See also
Apollo Guidance Computer
References
External links
Gemini Spacecraft On-Board Computer (OBC)
Gemini Program Overview
IBM and the Gemini Program
Project Gemini
Guidance computers
IBM avionics computers
Spacecraft navigation instruments |
https://en.wikipedia.org/wiki/AN/AYK-14 | The AN/AYK-14(V) is a family of computers for use in military weapons systems. It is a general-purpose 16-bit microprogrammed computer, intended for airborne vehicles and missions. Its modular design provides for common firmware and support software. It is still in use on Navy fleet aircraft including the F/A-18, and the AV-8B. The AN/AYK-14(V) family of systems is designed to meet MIL-E-5400 (airborne) requirements.
General information
The AN/AYK-14(V) computer was designed for military weapons systems. A complete AN/AYK-14(V) computer system is composed of processor, memory and input/output (I/O) modules.
Applications
Aircraft
F-18 Central Mission Computers
LAMPS MKIII Central Mission and ESM Processor
EA-6B Electronic Warfare Computer
E-2C Passive Detection System Computer
AV-8B Central Mission Computer
EP-3 Electronic Data Processor
P-3C ESM Processor
F-14 Avionics Improvement Program
Special applications
ALWT Torpedo Guidance Computer
ACLS Landing System Processor
DASS ASW Training Computer
Firebrand Drone Guidance Computer
Technical description
The AN/AYK-14(V) series of systems are microprogrammed computers, intended for airborne vehicles and missions, but are also capable of shipboard and land use.
General characteristics
The AN/AYK-14(V) is a general-purpose 16-bit computer capable of 675 thousand operations per second. Its modular design provides for common firmware and support software.
System specifications and features
General Features
General-purpose 16-bit digital computer
Physically and functionally modular
Expandable with plug-ins and additional enclosures
Microprogrammed to emulate an extended AN/UYK-20
LSI components
ATR enclosures
Variable configurations
Central Processor
Microprogrammed
2's complement arithmetic
Executive and user states
Two sets of 16-word by 16-bit general registers
Two status registers
Three-level interrupt system
Addressing to 524,288 words
Fixed and floating point arithmetic
4-, 8-, 16-, and 32-bit operands
16-, and 32-bit instructions
Direct, indirect, and indexed addressing
Optional hardware floating point module
Loadable/readable 32-bit RTC clock, 1-MHz rate; 16-bit monitor clock, 10-KHz rate
Built-in-test functions
Bootstrap PROM memory
Power failure shutdown/recovery
I/O controller capability
Chaining capability
Control memory for each channel
Up to 16 channels in various combinations
Interface to support equipment
Sample instruction times
Shift 1.5 μsec
Add, subtract 0.8
Multiply 4.2
Divide 8.4
Basis: single GPM, core memory, overlapped access, interleaved addresses
Memory control and memory
Core memory module (CMM), 32K words of 18 bits
Semiconductor memory module (SMM), 32K words of 18 bits
Interchangeable core and semiconductor memory modules
CMM has 900-nanosecond cycle time and 350-nanosecond access time
SMM has 400-nanosecond cycle time and 200-nanosecond access time
Interleaved or non-interleaved addressing
Read/write e |
https://en.wikipedia.org/wiki/Information%20Sharing%20and%20Analysis%20Center | An Information Sharing and Analysis Center (ISAC) is a nonprofit organization that provides a central resource for gathering information on cyber and related threats to critical infrastructure and providing two-way sharing of information between the private and public sectors.
Sector ISACs began forming in 1999, subsequent to the May 22, 1998 signing of U.S. Presidential Decision Directive-63 (PDD-63), when "the federal government asked each critical infrastructure sector to establish sector-specific organizations to share information about threats and vulnerabilities." Decision Directive-63 (PDD-63) was replaced by Homeland Security Presidential Directive 21 in 2013.
Canada
Global Mining and Metals Information Sharing & Analysis Centre (MM-ISAC)
Europe
European Energy - Information Sharing & Analysis Centre (EE-ISAC) is a network of private utilities, solution providers and (semi) public institutions such as academia, governmental and non-profit organizations which share valuable information on cyber resilience to strengthen the cyber security of the European Power Grid.
India
In India, the Information Sharing and Analysis Center (ISAC) operates as an independent non-profit organization that works closely as Public-Private-Partner (PPP) with the apex nodal agency for cyber security, National Critical Information Infrastructure Protection Center (NCIIPC), designated under the IT Act Law 2000.
Japan
Financials ISAC Japan
ICT Information Sharing And Analysis Center Japan
Japan Elecricity Information Sharing and Analysis Center
Japan Foreign Trade Council ISAC
Medical ISAC Japan Cyber Security Service (MICSS)
Transportation ISAC JAPAN
Singapore
Operational Technology (OT-ISAC)
United States
The National Council of ISACs (NCI Directorate) members include:
Automotive (Auto-ISAC)
Aviation (A-ISAC)
Communications ISAC (NCC)
Defense Industrial Base (DIB-ISAC)
Emergency Services (EMR-ISAC)
Electricity (E-ISAC)
Energy Analytic Security Exchange (EASE)
Elections Infrastructure ISAC (EI-ISAC)
Financial Services (FS-ISAC)
Healthcare Ready
Health (Health-ISAC)
Information Technology (IT-ISAC)
Maritime Security ISAC
Media and Entertainment Sharing Analysis Center (ME-ISAC)
Nuclear (NEI)
Oil and Gas (ONG-ISAC)
Public Transit (PT-ISAC)
Real Estate (RE-ISAC)
Research & Education Network (REN-ISAC)
Retail & Hospitality ISAC (RH-ISAC) Formerly R-CISC
Space ISAC (S-ISAC)
Supply Chain (SC-ISAC)
Surface Transportation (ST-ISAC)
Water ISAC (Water-ISAC)
Many other ISACs exist beyond the National Council of ISACS, which caters only to sectors the US government has declared Critical Infrastructure sectors, such as MFG-ISAC and LS-ISAC.
References
Computer security organizations
National Security Agency |
https://en.wikipedia.org/wiki/Cheng-Chih%20Wu | Cheng-Chih Wu () is currently the president of the National Taiwan Normal University, and was the director of the Graduate Institute of Information and Computer Education at NTNU.
During his deanship at NTNU, he has put through many reforms, including abolishing the rule of expelling students who fail more than half of the registered courses. Wu once said, “students should be responsible for their own education, while we should give them a second chance instead of depriving them of their right to education with this rule.”
Wu's expertise includes designing computer courses and teaching materials, teaching with information technology, and mobile learning.
Education
Science Education (Computer Science Education), The University of Texas at Austin, U.S., Ph.D.
Industrial Education, NTNU, Taiwan (M.Ed.)
Industrial Education, NTNU, Taiwan (B.Ed.)
Positions
2013–2017 Vice President, NTNU
2010-2013 Dean, Office of Academic Affairs, NTNU
2008-2010 Director, Information Technology Center, NTNU
2005-2006 Visiting Scholar, Faculty of Education, University of Cambridge
1999-2001 Chairman, the Department of Information and Computer Education, NTNU
Sports
President of National Taiwan Normal University Football Team
References
Living people
National Taiwan Normal University alumni
Academic staff of the National Taiwan Normal University
University of Texas at Austin alumni
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/Microsoft%20Corp.%20v.%20United%20States | Microsoft Corp. v. United States, known on appeal to the U.S. Supreme Court as United States v. Microsoft Corp., 584 U.S. ___, 138 S. Ct. 1186 (2018), was a data privacy case involving the extraterritoriality of law enforcement seeking electronic data under the 1986 Stored Communications Act (SCA), Title II of the Electronic Communications Privacy Act of 1986 (ECPA), in light of modern computing and Internet technologies such as data centers and cloud storage.
In 2013, Microsoft challenged a warrant by the Federal Bureau of Investigation (FBI) to turn over emails of a target account stored in Ireland, arguing that a warrant issued under Section 2703 of the Stored Communications Act could not compel American companies to produce data stored in servers outside the United States. Microsoft initially lost in the Southern District of New York, with the judge stating that the nature of the Stored Communication Act warrant, as passed in 1986, was not subject to territorial restrictions. Microsoft appealed to the United States Court of Appeals for the Second Circuit, who found in favor of Microsoft by 2016 and invalidated the warrant. In response, the United States Department of Justice appealed to the Supreme Court of the United States, which decided to hear the appeal.
While the case was pending in the Supreme Court, Congress passed the Clarifying Lawful Overseas Use of Data Act (CLOUD Act), which amended the SCA to resolve concerns from the government and Microsoft related to the initial warrant. The Supreme Court, following agreement from both the government and Microsoft, determined the passage of the CLOUD Act and a new warrant for the data filed under it made the case moot and vacated the Second Circuit's decision.
Background
As part of the investigation into a drug-trafficking case in December 2013, a United States magistrate judge in the United States District Court for the Southern District of New York issued a warrant under the Stored Communications Act of 1986 (SCA) requiring Microsoft to produce all emails and information associated with an account they hosted. While the information was held on Microsoft's United States servers, the emails were stored on a server in Dublin, Ireland, one of numerous servers Microsoft operates located around the world.
Microsoft complied with providing the account information but refused to turn over the emails, arguing that a U.S. judge has no authority to issue a warrant for information stored abroad. Microsoft moved to vacate the warrant for the content held abroad on December 18, 2013. In May 2014, a federal magistrate judge, reviewing the history of the SCA (which had not been amended since its passage), disagreed with Microsoft and ordered it to turn over the emails, reasoning that unlike a typical warrant, SCA warrants function as both a warrant and a subpoena, and thus are not restricted by territorial constraints. The magistrate judge considered that Microsoft had control of the material outside |
https://en.wikipedia.org/wiki/Feature%20engineering | Feature engineering or feature extraction or feature discovery is the process of extracting features (characteristics, properties, attributes) from raw data. Due to deep learning networks, such as convolutional neural networks, that are able to learn it by itself, domain-specific- based feature engineering has become obsolete for vision and speech processing.
Other examples of features in physics include the construction of dimensionless numbers such as Reynolds number in fluid dynamics; then Nusselt number in heat transfer; Archimedes number in sedimentation; construction of first approximations of the solution such as analytical strength of materials solutions in mechanics, etc.
Relevance
Features vary in significance. Even relatively insignificant features may contribute to a model. Feature selection can reduce the number of features to prevent a model from becoming too specific to the training data set (overfitting).
Explosion
Feature explosion occurs when the number of identified features grows inappropriately. Common causes include:
Feature templates - implementing feature templates instead of coding new features
Feature combinations - combinations that cannot be represented by a linear system
Feature explosion can be limited via techniques such as: regularization, kernel methods, and feature selection.
Automation
Automation of feature engineering is a research topic that dates back to the 1990s. Machine learning software that incorporates automated feature engineering has been commercially available since 2016. Related academic literature can be roughly separated into two types:
Multi-relational decision tree learning (MRDTL) uses a supervised algorithm that is similar to a decision tree.
Deep Feature Synthesis uses simpler methods.
Multi-relational decision tree learning (MRDTL)
MRDTL generates features in the form of SQL queries by successively adding clauses to the queries. For instance, the algorithm might start out with
SELECT COUNT(*) FROM ATOM t1 LEFT JOIN MOLECULE t2 ON t1.mol_id = t2.mol_id GROUP BY t1.mol_id
The query can then successively be refined by adding conditions, such as "WHERE t1.charge <= -0.392".
However, most MRDTL studies base implementations on relational databases, which results in many redundant operations. These redundancies can be reduced by using techniques such as tuple id propagation. Efficiency can be increased by using incremental updates, which eliminates redundancies.
Open-source implementations
There are a number of open-source libraries and tools that automate feature engineering on relational data and time series:
featuretools is a Python library for transforming time series and relational data into feature matrices for machine learning.
OneBM or One-Button Machine combines feature transformations and feature selection on relational data with feature selection techniques.
getML community is an open source tool for automated feature engineering on time series and relationa |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.