source stringlengths 32 199 | text stringlengths 26 3k |
|---|---|
https://en.wikipedia.org/wiki/Tram%20route%206%20%28Antwerp%29 | Tram route 6 is a tram route in Antwerp between the Metropolis P+R in the northern Luchtbal suburb and the Olympiade P+R in the southern Kiel neighborhood, using the pre-metro network between stations Sport and Plantin. The route was officially opened on 27 October 2007 and is operated by the Flemish transport company De Lijn.
Trajectory
Tram route 6 begins at the Metropolis P+R next to the Metropolis cinema complex in the southern part of the Luchtbal suburb. The route then uses the Groenendaallaan and Delbekelaan, before arriving at the Gabriel Theunis bridge over the Albert canal. After crossing the canal, the route enters the pre-metro network, which it uses between Sport to the north and Plantin to the south. After coming above ground near the Charlottalei, it follows the Belgielei to the Harmonie park, and then the Jan van Rijswijcklaan to its terminus Olympiade in the Kiel neighborhood.
Because of the large underground portion of the route, it is presented by De Lijn as a rapid tram route. Also, it is known and promoted as an "event route", because it connects various event hubs in the city, like the Kinepolis cinema, the sportpaleis stadion, Antwerp Central Station, the Antwerp zoo (and until 2017 Aquatopia), the UGC cinema, the Koningin Elisabethzaal, the diamond museum, the deSingel art centre and Antwerp Expo, where fairs are regularly held (most notably the annual Antwerp book fair).
History
Historical route (-1938)
The original tram route 6, also known as the "port route", ran between the Stuivenberg hospital and the present day Bolivarplaats (at the time, still the site of Antwerp-Zuid station), using the Lange Beeldekensstraat, Diepestraat, Brouwersvliet to the quays at the river Scheldt, and then following the quays all the way to its southern terminus. In 1938, the tram route was replaced by a trolleybus route, having a depot in the Somméstraat. On 30 March 1964, this trolleybus route itself was replaced by a regular bus route. The original trajectory is now a part of circular bus route 30/34 (depending on the direction of travel).
Present day route (2007-present)
On Saturday 27 October 2007, a new tram route 6 was opened, functioning as a new north-south connection through the pre-metro network, where previously, all pre-metro lines ran between Linkeroever in the west, and either northern or southern Antwerp. Although the route added some new parts to the operational tram network in Antwerp, no new tracks or tunnels had to be built. The largest part of the trams route, between the Gasthuishoeve stop and Astrid, and between Diamant and the Olympiade terminus, were already being used by tram routes 2,3 (and partially 5 and 15). The part between the Kinepolis terminus and the Gasthuishoeve stop was not in use by a regular tram route before the opening of route 6, but was already built, and was used by trams when going to, or coming from the "Punt aan de Lijn" depot next to the Kinepolis complex. The small part of the pre- |
https://en.wikipedia.org/wiki/Algorithm%20selection | Algorithm selection (sometimes also called per-instance algorithm selection or offline algorithm selection) is a meta-algorithmic technique to choose an algorithm from a portfolio on an instance-by-instance basis. It is motivated by the observation that on many practical problems, different algorithms have different performance characteristics. That is, while one algorithm performs well in some scenarios, it performs poorly in others and vice versa for another algorithm. If we can identify when to use which algorithm, we can optimize for each scenario and improve overall performance. This is what algorithm selection aims to do. The only prerequisite for applying algorithm selection techniques is that there exists (or that there can be constructed) a set of complementary algorithms.
Definition
Given a portfolio of algorithms , a set of instances and a cost metric , the algorithm selection problem consists of finding a mapping from instances to algorithms such that the cost across all instances is optimized.
Examples
Boolean satisfiability problem (and other hard combinatorial problems)
A well-known application of algorithm selection is the Boolean satisfiability problem. Here, the portfolio of algorithms is a set of (complementary) SAT solvers, the instances are Boolean formulas, the cost metric is for example average runtime or number of unsolved instances. So, the goal is to select a well-performing SAT solver for each individual instance. In the same way, algorithm selection can be applied to many other -hard problems (such as mixed integer programming, CSP, AI planning, TSP, MAXSAT, QBF and answer set programming). Competition-winning systems in SAT are SATzilla, 3S and CSHC
Machine learning
In machine learning, algorithm selection is better known as meta-learning. The portfolio of algorithms consists of machine learning algorithms (e.g., Random Forest, SVM, DNN), the instances are data sets and the cost metric is for example the error rate. So, the goal is to predict which machine learning algorithm will have a small error on each data set.
Instance features
The algorithm selection problem is mainly solved with machine learning techniques. By representing the problem instances by numerical features , algorithm selection can be seen as a multi-class classification problem by learning a mapping for a given instance .
Instance features are numerical representations of instances. For example, we can count the number of variables, clauses, average clause length for Boolean formulas, or number of samples, features, class balance for ML data sets to get an impression about their characteristics.
Static vs. probing features
We distinguish between two kinds of features:
Static features are in most cases some counts and statistics (e.g., clauses-to-variables ratio in SAT). These features ranges from very cheap features (e.g. number of variables) to very complex features (e.g., statistics about variable-clause graphs).
Probing feat |
https://en.wikipedia.org/wiki/VA-11%20Hall-A | VA-11 Hall-A: Cyberpunk Bartender Action (stylized as VA-11 HALL-A; sometimes simply Valhalla) is a 2016 visual novel developed by Venezuelan studio Sukeban Games and published by Ysbryd Games. The game was initially released for Microsoft Windows, OS X, and Linux on June 21, 2016, and ports were later released for PlayStation Vita, PlayStation 4, and Nintendo Switch, with the Vita port developed by Wolfgame and published by Limited Run Games. The game puts the player in the role of a bartender at the eponymous VA-11 Hall-A, a small bar in a dystopian downtown which is said to attract the "most fascinating" of people. Gameplay consists of players making and serving drinks to bar attendees while listening to their stories and experiences.
VA-11 Hall-A contains nonlinear gameplay, and the game's plotline is influenced by the drinks the player makes and how the customers react to them. There are no dialogue options in the game, with making different drinks being the sole way to influence the direction of the story. VA-11 Hall-A features a diverse cast of characters that have been described as "average non-heroes", with developers noting how they were based on side characters that were never truly fleshed out in movies. Over time, the player begins to know the characters well enough to infer what drinks they want, resulting in an intimate experience.
VA-11 Hall-A was originally developed for the Cyberpunk Game Jam of 2014; however, Sukeban Games liked the concept so much that they eventually turned it into a full game. This original prototype is downloadable for free on the game's official website, and players who pre-ordered gained access to a playable yet separate prologue. The game features a retro-futuristic look based on cyberpunk media, PC-98 games, and anime-inspired visuals, and the writing drew on the developers' own experiences of living in a poorer country. The original planned release date of December 2014 was moved back multiple times due to delays, including when the developers changed the game engine. VA-11 Hall-A garnered pre-release critical acclaim, and post-release reception was mostly favourable, with positive reception directed at its premise, cast of characters, writing, and music. However, some reviewers perceived the game's dialogue as awkward and the gameplay as repetitive. A sequel, N1RV Ann-A, was scheduled for a 2020 release but has since been delayed indefinitely.
Gameplay
Premise
VA-11 Hall-A has been described by its developer, Sukeban Games, as a "cyberpunk bartender action" game, and has been described as a "bartending simulator meets a visual novel somewhere in a cyberpunk dystopia" by TouchArcade. In the game, the player assumes the role of a bartender at "VA-11 Hall-A" (pronounced Valhalla), a small dive bar in a dystopian downtown said to attract the "most fascinating" of clientele. Set in the year 207X, according to the game's official website, VA-11 Hall-A is described as a "a booze em' up about waifus, tec |
https://en.wikipedia.org/wiki/Pilipinas%20HD | Pilipinas HD is a Philippine free-to-air television channel that broadcasts cultural programming. During its initial broadcast from June 12 (Philippine Independence Day) until August 31, 2016, Chino Trinidad rented a satellite space to all subscription providers to be able to watch by the viewing public free of charge.
On September 1, 2016, Pilipinas HD was launched on digital terrestrial television it signed a blocktime deal with Broadcast Enterprises and Affiliated Media, Inc. However, unlike its pay-TV counterpart, BEAM TV handles and supplies the channel's programming on a dedicated subchannel.
Programs
This is a list of programs to be aired on the channel's initial run:
Decoding Duterte - a documentary series on the biography of President Rodrigo Duterte
Duyan ka Magiting (Cradle of Noble Heroes) - a series featuring the forgotten national heroes
Pamana - a series on the Filipino families
Filipiknow - a series on Philippine history, facts and trivias
Grid - a travel and magazine show which will feature travel destinations in the country
Panahon.TV - a weather news program featuring live updates from PAGASA (also airs on DZRH News Television, Life TV Asia, and One PH)
Panatang Pilipino - a series that tells the aspirations and dreams of ordinary Filipinos
Oras Ng Himala - a religious program produced by Jesus is our Shield Worldwide Ministries led by Apostle Renato D. Carillo
Ugat ng Lahi - a series on the rich tradition of the Filipino indigenous tribes
Storya ng Bayan - a series that visit places and towns that have colorful history and its heroes
Sa Ngalan ng Katotohanan - a documentary series on the biography of President Emilio Aguinaldo during the revolution on his 150th birth anniversary.
References
Television channels and stations established in 2016
Filipino-language television stations
Television networks in the Philippines |
https://en.wikipedia.org/wiki/Computomics | Computomics is a biotechnology company co-founded by Detlef Weigel and MEGAN author, Daniel Huson. Computomics provides bioinformatics data analysis services for plant breeding and metagenomics analyses for plant protection.
Overview
Computomics was founded in October 2012 after the enormous decline in price of genome sequencing brought on by Next generation sequencing. Six scientists from the Max Planck Institute for Developmental Biology, Friedrich Miescher Laboratory of the Max Planck Society and University of Tübingen noted that plant genome sequencing was now tenable, but data analysis would remain a bottleneck.
Computomics has been featured in several nationwide publications, because it is one of very few companies focusing on plant breeding and plant genome analysis.
In September 2015, High-Tech Gründerfonds backed Computomics. In April 2016, Computomics opened offices for their subsidiary in the United States in Madison, Wisconsin and in Davis, California.
Executives and scientific advisors
Sebastian J. Schultheiss is a co-founder as well as the Managing Director of Computomics. Schultheiss completed his undergraduate degree at the University of Tübingen with a year spent abroad at University of Michigan where he majored in Bioinformatics. Upon graduation, Schultheiss pursued his doctorate in Bioinformatics at the Friedrich Miescher Laboratory of the Max Planck Society under Gunnar Rätsch and Jan Lohmann.
Detlef Weigel is a Director of the Molecular Biology Department at the Max Planck Institute for Developmental Biology in Tübingen. Weigel co-founded Computomics and serves on the Scientific Advisory Board. Daniel Huson is a professor for Algorithms in Bioinformatics at the University of Tübingen and author of the metagenomics analysis software MEGAN.
References
External links
Biotechnology companies of Germany
German companies established in 2012
Biotechnology companies established in 2012
Bioinformatics companies
Tübingen
Companies based in Baden-Württemberg |
https://en.wikipedia.org/wiki/ChristianMingle | Christian Mingle is an online dating service that caters to Christian singles. The service is one of a number of demographically focused online match-making websites operated by Spark Networks.
Because of the focus on relationships between Christian singles, Christian Mingle is considered a special-interest online personals site. Former CEO Adam Berger has referred to this type of service as "niche" dating.
History
Christian Mingle was launched in 2001 by Spark Networks. The site has over 16 million members.
In the 2013 Webby Awards, Christian Mingle was an honoree in the Religion & Spirituality category. The site also received the Editor's Top Pick - Christian Award from DatingSiteReviews.com in 2015.
In 2013, the company authorized the repurchase of $5 million of its outstanding common stock.
Christian Mingle launched its dating app in late 2014.
In July 2016, Christian Mingle began accommodating gay men and women as the result of a non-discrimination lawsuit. Previously, the site had only allowed users to choose either "man seeking woman" or "woman seeking man." The change removed this profile designation and allowed users the option to see either opposite-sex or same-sex matches.
Members
Christian Mingle members may choose whether to specify the Christian denomination to which they belong. Some of the available denomination options are: Anglican/Episcopalian, Apostolic, Baptist, Catholic, Lutheran, Methodist, Orthodox, Pentecostal, Presbyterian, Seventh-day Adventist, and Southern Baptist. Members can also choose options such as Interdenominational, Non-denominational or Not sure yet.
Members can also search the site for free, though a subscription is required to communicate with other members.
Film
Christian Mingle The Movie (a 2014 American faith-based romantic comedy film) stars Lacey Chabert as a woman who signs up to Christian Mingle in order to meet a man.
References
External links
Online dating services of the United States
Online dating services for specific interests
Christian websites |
https://en.wikipedia.org/wiki/Humrahi | Humrahi is a social drama series broadcast on Doordarshan network in the early 1990s. It was written by Manohar Shyam Joshi and directed by Kunwar Sinha.
The series showed a family dealing with problems within their home and society. Himani Shivpuri made her debut in the negative role of Devaki Bhaujai (or Bhojai, another word for Bhabhi) and her character was very popular. The show had an ensemble cast including Sadiya Siddiqui as Angoori, Anang Desai, Gopi Desai, Mohan Bhandari and others.
The title song of the show was "Yahin kahin par hai, teri meri manzil".
The story was about three brothers and their interrelated families.
Cast
Himani Shivpuri as Devaki Bhaujai
Sadiya Siddiqui as Angoori
Varun Gautam as Gyarsa
Anang Desai as Lofad Kumar
Gopi Desai
Mohan Bhandari
References
DD National original programming
1994 Indian television series debuts |
https://en.wikipedia.org/wiki/Insightly | Insightly, Inc. is a private computer technology company headquartered in San Francisco, California.
Products
The company develops cloud-based customer relationship management (CRM) and project management tools for small and medium size businesses. Insightly distributes its CRM and project management tools to customers using a freemium model.
History
The company was founded in Perth, Australia, by Anthony Smith in 2009. The Insightly CRM platform was designed to integrate with Google Apps products. In 2012, the company relocated to San Francisco, where it raised $3 million in funding led by Emergence Capital Partners. Insightly used the funding to develop its CRM tools outside of the Google Apps platform, so that it could be an independent CRM. In December 2012, Insightly released its CRM app for iOS devices. In June 2013, the company launched integration between Microsoft Office and Outlook.
In September 2013, Insightly raised $10 million in Series B funding from Emergence Capital Partners, Sozo Ventures and TrueBridge Capital Partners. The company had over 184,000 customers in 100 countries. The company released an update to its user interface and simplified integration between Apps in 2014. In October 2014, Insightly announced integration with Dropbox and QuickBooks Online.
Insightly announced a partnership with cloud accounting software company, Xero, in 2015. In 2016, Insightly raised $25 million in Series C funding led by Scott Bommer, CEO of SAB Capital Management, as well as earlier investors in the company. In July 2016, Insightly also added Microsoft Power BI integration and updated its lead assignment rules. Insightly added CRM security features to its platform allowing clients to protect sensitive information, recover deleted data, and track changes to sales opportunities in October 2016. The features comply with the standards developed by the American Institute of Certified Public Accountants. In December 2016, the company added workflow automation tasks to its platform and expanded its mobile application's search reach, allowing integration with Dropbox, Google Drive, OneDrive, PandaDoc and Evernote. In 2016 the special business card scanning app Business Card Reader for Insightly CRM developed by one software company appeared on Google Play and Call Tracker for Insightly CRM in 2017.
As of April, 2016, the company had raised $40 million in funding. In July 2017, Insightly released a new version of CRM Suite featuring Microsoft Outlook integration and a new user interface.
In September of 2019, Insightly adding a marketing automation application to the platform.
In 2021, Insightly launched an integration tool called AppConnect and a customer service ticketing tool called Insightly Service.
Shortly after instituting a work from home policy in March 2022 for the COVID-19 pandemic, Insightly announced it would be permanently be a fully remote workforce.
References
Software companies of the United States
Companies based in |
https://en.wikipedia.org/wiki/Borriello | Borriello is an Italian surname. Notable people with the surname include:
Fabio Borriello (born 1985), Italian footballer
Gaetano Borriello (1958–2015), American computer scientist
Marco Borriello (born 1982), Italian footballer
Michelangelo Borriello (1909–1995), Italian sport shooter
Italian-language surnames |
https://en.wikipedia.org/wiki/List%20of%20Latin%20American%20and%20Caribbean%20countries%20by%20GDP%20%28nominal%29 | This is a list of Latin American and Caribbean countries by gross domestic product (nominal) in USD according to the International Monetary Fund's estimates in May 2023 World Economic Outlook database.
Cuba is not included in the list due to lack of economic data. Puerto Rico is not listed since it is a U.S. territory, and neither is the Falkland Islands since it is a British Overseas Territory.
See also
Community of Latin American and Caribbean States
List of Latin American and Caribbean countries by GDP (PPP)
List of Latin American and Caribbean countries by GDP growth
References
Latin American and Caribbean countries by GDP (nominal)
National accounts
GDP (nominal)
GDP (nomimal)
Latin America and the Caribbean |
https://en.wikipedia.org/wiki/Sunspring | Sunspring is a 2016 experimental science fiction short film entirely written by an artificial intelligence bot using neural networks. It was conceived by BAFTA-nominated filmmaker Oscar Sharp and NYU AI researcher Ross Goodwin and produced by film production company, End Cue along with Allison Friedman and Andrew Swett. It stars Thomas Middleditch, Elisabeth Grey, and Humphrey Ker as three people, namely H, H2, and C, living in a future world and eventually connecting with each other through a love triangle. The script of the film was authored by a recurrent neural network called long short-term memory (LSTM) by an AI bot named Benjamin.
Originally made for the Sci-Fi-London film festival's 48hr Challenge, it was released online by technology news website Ars Technica on 9 June 2016.
Premise
Sunspring narrates the story of three people - H (Middleditch), H2 (Grey), and C (Ker) - set in a futuristic world and entangled with murder and love.
Cast
Thomas Middleditch as H
Elisabeth Grey as H2
Humphrey Ker as C
Production
Oscar Sharp originally created the film for the 48hr Film Challenge contest of Sci-Fi-London, a film festival which focuses on science fiction. For the challenge, contestants are given a set of prompts (mostly props and lines) that have to appear in a movie they make over the next two days. It eventually contested in the festival and was nominated among the final top ten films
Sharp collaborated with his longtime associate Ross Goodwin, an AI researcher in New York University to create the AI bot, which was initially called Jetson. The bot, which later came to call itself Benjamin, wrote the screenplay including stage directions and dialog. The garbled script was then interpreted by Sharp who directed the actors to construe the plot points themselves and enact the play. According to Ars Technica, the final plot turned out to be a tale of romance and murder, set in a dark future world.
Benjamin, the automatic screenwriter
Called the world's first automatic screenwriter, Benjamin is a self-improving LSTM RNN machine intelligence trained on human screenplays conceived by Goodwin and Sharp. It was trained to write the screenplay by feeding it with a corpus of dozens of sci-fi screenplays found online—mostly movies from the 1980s and 90s.
Music
The film contains a song from Brooklyn-based electro-acoustic duo Tiger and Man, with lyrics written by Benjamin using a database of 30,000 folk songs. As well as a score written by composer Andrew Orkin.
Reception
CNet called it "a beautiful, bizarre sci-fi novelty." Critic Amanda Kooser said, "...probably won't start a rush for replacing human screenwriters with machines. Some day, neural networks may get better at imitating the art of coherent storytelling, but we're not there yet. That doesn't mean "Sunspring" isn't entertaining or worthy of viewing. It is. It's a thought experiment come to life, a novelty." As of April 2019, it has surpassed 1 million views on YouTube.
See al |
https://en.wikipedia.org/wiki/Interleaving%20%28data%29 | In computing, interleaving of data refers to the interspersing of fields or channels of different meaning sequentially in memory, in processor registers, or in file formats. For example, for coordinate data,
x0 y0 z0 w0 x1 y1 z1 w1 x2 y2 z2 w2
x0 x1 x2 x3 y0 y1 y2 y3 z0 z1 z2 z3 w0 w1 w2 w3
the former is interleaved while the latter is not.
A processor may support permute instructions, or strided load and store instructions, for moving between interleaved and non-interleaved representations.
Interleaving has performance implications for cache coherency, ease of leveraging SIMD hardware, and leveraging a computer's addressing modes. (e.g. - interleaved data may require one address to be calculated, from which individual fields may then be accessed via immediate offsets; conversely if only one field is required by index, de-interleaved data may leverage scaled index addressing).
See also
AOS vs SOA
Data-oriented design
Locality of reference
Parallel arrays
Planar image format
Packed pixel format
References
Computer memory
Computer data storage |
https://en.wikipedia.org/wiki/Cache%20control%20instruction | In computing, a cache control instruction is a hint embedded in the instruction stream of a processor intended to improve the performance of hardware caches, using foreknowledge of the memory access pattern supplied by the programmer or compiler. They may reduce cache pollution, reduce bandwidth requirement, bypass latencies, by providing better control over the working set. Most cache control instructions do not affect the semantics of a program, although some can.
Examples
Several such instructions, with variants, are supported by several processor instruction set architectures, such as ARM, MIPS, PowerPC, and x86.
Prefetch
Also termed data cache block touch, the effect is to request loading the cache line associated with a given address. This is performed by the PREFETCH instruction in the x86 instruction set. Some variants bypass higher levels of the cache hierarchy, which is useful in a 'streaming' context for data that is traversed once, rather than held in the working set. The prefetch should occur sufficiently far ahead in time to mitigate the latency of memory access, for example in a loop traversing memory linearly. The GNU Compiler Collection intrinsic function __builtin_prefetch can be used to invoke this in the programming languages C or C++.
Instruction prefetch
A variant of prefetch for the instruction cache.
Data cache block allocate zero
This hint is used to prepare cache lines before overwriting the contents completely. In this example, the CPU needn't load anything from main memory. The semantic effect is equivalent to an aligned memset of a cache-line sized block to zero, but the operation is effectively free.
Data cache block invalidate
This hint is used to discard cache lines, without committing their contents to main memory. Care is needed since incorrect results are possible. Unlike other cache hints, the semantics of the program are significantly modified. This is used in conjunction with allocate zero for managing temporary data. This saves unneeded main memory bandwidth and cache pollution.
Data cache block flush
This hint requests the immediate eviction of a cache line, making way for future allocations. It is used when it is known that data is no longer part of the working set.
Other hints
Some processors support a variant of load–store instructions that also imply cache hints. An example is load last in the PowerPC instruction set, which suggests that data will only be used once, i.e., the cache line in question may be pushed to the head of the eviction queue, whilst keeping it in use if still directly needed.
Alternatives
Automatic prefetch
In recent times, cache control instructions have become less popular as increasingly advanced application processor designs from Intel and ARM devote more transistors to accelerating code written in traditional languages, e.g., performing automatic prefetch, with hardware to detect linear access patterns on the fly. However the techniques may remain valid for thr |
https://en.wikipedia.org/wiki/Dean%20Weber | Dean Weber (born August 12, 1962) is an American entrepreneur, computer scientist and inventor, described by many as "the father of the intelligent personal assistant" and was credited for the commercial launch of the first virtual assistant called IVAN, in 1999. During that time, Weber was founder of One Voice Technologies, an Artificial Intelligence company founded in 1998 in San Diego, California. At One Voice, Weber was instrumental in launching voice solutions worldwide to millions of users and ultimately sold his patent portfolio to Apple in 2010 prior to Apple's launch of Siri.
In 2017 and 2018, Weber showcased advanced conversational-AI solutions for connected cars with Mitsubishi and Faurecia at auto shows in Detroit, Paris, Shanghai, and Consumer Electronics Show (CES) in Las Vegas.
Today, Weber leads a team of entrepreneurs and AI scientists creating conversational-AI voice solutions in the digital health sector at Quantum AI Health. Quantum AI Health is focused on providing Artificial Intelligence solutions to improve patient care and physician access to electronic health records with their AI-based Virtual Medical Scribe platform.
Education and early career
Weber attended Central Connecticut State University (CCSU) and graduated in 1984 with a degree in computer science and minor in mathematics. At CCSU, he studied compiler design, queueing theory, and wrote several applications for disk operating systems and virtual memory optimizations.
Upon graduation, Weber was hired by United Technologies Hamilton Standard Advanced Space and Sea Division in Windsor Locks Connecticut, where we worked on a team that designed and developed the NASA Extravehicular Mobility Unit (EMU) space suit for the International Space Station (ISS) and NASA's Space Shuttle program. In addition, at Hamilton Standard Weber worked on Navy submarine projects where he held a DoD Top Secret clearance.
In 1986, at the age of 23, Weber was hired by Northrop Grumman in Los Angeles, California, where he developed software for the Northrop B-2 Spirit Stealth Bomber, with a DoD Top Secret clearance, and was on the original public launch team in 1998.
Career
EditPro
In 1990, at the age of 27, Weber founded EditPro, a software development company that developed and sold the industries first fully integrated development environment (IDE) with embedded syntax color coding and support for Ada, Assembler, Basic, C/C++, Clipper, COBOL, dBase/xBase, Fortran, FoxPro, HTML, Java, Makefiles, Paradox, Pascal, RTF, SGML, SQL, Windows API functions, and Windows .INI files. In 1992, Weber sold the company to Kubota of Japan to launch advanced software development tools in the Japanese market.
Conversational systems
In 1992, at the age of 29, Weber began developing several technologies combining state-of-the-art voice recognition, dictation, and facial recognition solutions to create the industries first AI-based virtual personal assistant.
One Voice Technologies
In 1996, |
https://en.wikipedia.org/wiki/Memory%20access%20pattern | In computing, a memory access pattern or IO access pattern is the pattern with which a system or program reads and writes memory on secondary storage. These patterns differ in the level of locality of reference and drastically affect cache performance, and also have implications for the approach to parallelism and distribution of workload in shared memory systems. Further, cache coherency issues can affect multiprocessor performance, which means that certain memory access patterns place a ceiling on parallelism (which manycore approaches seek to break).
Computer memory is usually described as "random access", but traversals by software will still exhibit patterns that can be exploited for efficiency. Various tools exist to help system designers and programmers understand, analyse and improve the memory access pattern, including VTune and Vectorization Advisor, including tools to address GPU memory access patterns
Memory access patterns also have implications for security, which motivates some to try and disguise a program's activity for privacy reasons.
Examples
Sequential
The simplest extreme is the sequential access pattern, where data is read, processed, and written out with straightforward incremented/decremented addressing. These access patterns are highly amenable to prefetching.
Strided
Strided or simple 2D, 3D access patterns (e.g., stepping through multi-dimensional arrays) are similarly easy to predict, and are found in implementations of linear algebra algorithms and image processing. Loop tiling is an effective approach. Some systems with DMA provided a strided mode for transferring data between subtile of larger 2D arrays and scratchpad memory.
Linear
A linear access pattern is closely related to "strided", where a memory address may be computed from a linear combination of some index. Stepping through indices sequentially with a linear pattern yields strided access. A linear access pattern for writes (with any access pattern for non-overlapping reads) may guarantee that an algorithm can be parallelised, which is exploited in systems supporting compute kernels.
Nearest neighbor
Nearest neighbor memory access patterns appear in simulation, and are related to sequential or strided patterns. An algorithm may traverse a data structure using information from the nearest neighbors of a data element (in one or more dimensions) to perform a calculation. These are common in physics simulations operating on grids. Nearest neighbor can also refer to inter-node communication in a cluster; physics simulations which rely on such local access patterns can be parallelized with the data partitioned into cluster nodes, with purely nearest-neighbor communication between them, which may have advantages for latency and communication bandwidth. This use case maps well onto torus network topology.
2D spatially coherent
In 3D rendering, access patterns for texture mapping and rasterization of small primitives (with arbitrary distortions of c |
https://en.wikipedia.org/wiki/Relaxed%20k-d%20tree | A relaxed K-d tree or relaxed K-dimensional tree is a data structure which is a variant of K-d trees. Like K-dimensional trees, a relaxed K-dimensional tree stores a set of n-multidimensional records, each one having a unique K-dimensional key x=(x0,... ,xK−1). Unlike K-d trees, in a relaxed K-d tree, the discriminants in each node are arbitrary. Relaxed K-d trees were introduced in 1998.
Definitions
A relaxed K-d tree for a set of K-dimensional keys is a binary tree in which:
Each node contains a K-dimensional record and has associated an arbitrary discriminant j ∈ {0,1,...,K − 1}.
For every node with key x and discriminant j, the following invariant is true: any record in the right subtree with key y satisfies yj < xj and any record in the left subtree with key y satisfies yj ≥ xj.
If K = 1, a relaxed K-d tree is a binary search tree.
As in a K-d tree, a relaxed K-d tree of size n induces a partition of the domain D into n+1 regions, each corresponding to a leaf in the K-d tree. The bounding box (or bounds array) of a node {x,j} is the region of the space delimited by the leaf in which x falls when it is inserted into the tree. Thus, the bounding box of the root {y,i} is [0,1]K, the bounding box of the left subtree's root is [0,1] × ... × [0,yi] × ... × [0,1], and so on.
Supported queries
The average time complexities in a relaxed K-d tree with n records are:
Exact match queries: O(log n)
Partial match queries: O(n1−f(s/K)), where:
s out of K attributes are specified
with 0 < f(s/K) < 1, a real valued function of s/K
Nearest neighbor queries: O(log n)
See also
k-d tree
implicit k-d tree, a k-d tree defined by an implicit splitting function rather than an explicitly-stored set of splits
min/max k-d tree, a k-d tree that associates a minimum and maximum value with each of its nodes
References
Trees (data structures) |
https://en.wikipedia.org/wiki/AI%20alignment | In the field of artificial intelligence (AI), AI alignment research aims to steer AI systems towards humans' intended goals, preferences, or ethical principles. An AI system is considered aligned if it advances the intended objectives. A misaligned AI system pursues some objectives, but not the intended ones.
It can be challenging for AI designers to align an AI system because it can be difficult for them to specify the full range of desired and undesired behavior. To avoid this difficulty, they typically use simpler proxy goals, such as gaining human approval. But that approach can create loopholes, overlook necessary constraints, or reward the AI system for merely appearing aligned.
Misaligned AI systems can malfunction or cause harm. AI systems may find loopholes that allow them to accomplish their proxy goals efficiently but in unintended, sometimes harmful ways (reward hacking). They may also develop unwanted instrumental strategies, such as seeking power or survival, because such strategies help them achieve their given goals. Furthermore, they may develop undesirable emergent goals that may be hard to detect before the system is deployed, when it faces new situations and data distributions.
Today, these problems affect existing commercial systems such as language models, robots, autonomous vehicles, and social media recommendation engines. Some AI researchers argue that more capable future systems will be more severely affected since these problems partially result from the systems being highly capable.
Many leading AI scientists, including Geoffrey Hinton and Stuart Russell, argue that AI is approaching superhuman capabilities, and could indeed endanger human civilization if misaligned.
AI alignment is a subfield of AI safety, the study of how to build safe AI systems. Other subfields of AI safety include robustness, monitoring, and capability control. Research challenges in alignment include instilling complex values in AI, avoiding deceptive AI, scalable oversight, auditing and interpreting AI models, and preventing emergent AI behaviors like power-seeking. Alignment research has connections to interpretability research, (adversarial) robustness, anomaly detection, calibrated uncertainty, formal verification, preference learning, safety-critical engineering, game theory, algorithmic fairness, and the social sciences.
Alignment problem
In 1960, AI pioneer Norbert Wiener described the AI alignment problem as follows: "If we use, to achieve our purposes, a mechanical agency with whose operation we cannot interfere effectively… we had better be quite sure that the purpose put into the machine is the purpose which we really desire." Different definitions of AI alignment require that an aligned AI system advances different goals: the goals of its designers, its users or, alternatively, objective ethical standards, widely shared values, or the intentions its designers would have if they were more informed and enlightened.
AI alignment |
https://en.wikipedia.org/wiki/Data-oriented%20design | As a design paradigm, data-oriented-design focuses on optimal transformations of data and focuses on modelling programs as transforms. Transforms are abstractions of code that solely focus on the mapping of inputs to outputs. They do not distinguish between accessing inputs by parameter, pointer, reference, upvalue, and vice versa with writing outputs. This eliminates the concept of a Side-effect and focuses solely on how inputs transform into outputs, logically identical to functions in mathematics.
Strategies and patterns emerging from the notion of modelling via transforms often base themselves upon allowing assumptions about a program or subprogram's state. Examples such as Existential Processing and Hierarchical Level of Detail are all integral proponents of the core design principles.
As a programming paradigm, data-oriented programming (also commonly referred to as data-oriented design), is about implementing transforms into the native language, often with Procedural, Functional, and Array programming, though not limited from Object-oriented programming. To most optimally transform data between different states, the approach is to first focus on what transforms exist and discovering what they need to operate. Second is to optimize data layouts for these transforms, separating and sorting fields according to when they are needed, and to think about how data flows through the transform chains.
In the context of computing, data-oriented programming heavily benefits from program optimizations motivated by efficient usage of the CPU cache, often used in video game development. Proponents include Mike Acton, Scott Meyers, Jonathan Blow, and Andrew Kelley. The parallel array (or structure of arrays) is a commonly referenced example of one such cache-motivated data structure. It is contrasted with the array of structures typical of object-oriented designs, and eventually balanced to a structure of arrays of structures.
Computing motives
These methods became especially popular in the mid to late 2000s during the seventh generation of video game consoles that included the IBM PowerPC based PlayStation 3 (PS3) and Xbox 360 consoles. Historically, game consoles often have relatively weak central processing units (CPUs) compared to the top-of-line desktop computer counterparts. This is a design choice to devote more power and transistor budget to the graphics processing units (GPUs). For example, the 7th generation CPUs were not manufactured with modern out-of-order execution processors, but instead use in-order processors with high clock speeds and deep pipelines. In addition, most types of computing systems have main memory located hundreds of clock cycles away from the processing elements. Furthermore, as CPUs have become faster alongside a large increase in main memory capacity, there is massive data consumption that increases the likelihood of cache misses in the shared bus, otherwise known as Von Neumann bottlenecking. Consequently, loca |
https://en.wikipedia.org/wiki/Lin%20Teng-chiao | Lin Teng-chiao () is a Taiwanese politician who has been the Administrative Deputy Minister of Education since 20 May 2016.
Early life
Lin obtained his bachelor's degree in computer science and information engineering from Tamkang University, master's degree in industrial relations and China studies from National Taiwan Normal University (NTNU) and Tamkang University respectively and doctoral degree in industrial education from NTNU.
References
Living people
Political office-holders in the Republic of China on Taiwan
Year of birth missing (living people)
Tamkang University alumni
National Taiwan Normal University alumni |
https://en.wikipedia.org/wiki/Kameshwar%20Poolla | Kameshwar Poolla is the Cadence Design Systems Distinguished Professor, in Department of Electrical Engineering & Computer Sciences, and Department of Mechanical Engineering at University of California, Berkeley. He received his B.Tech. degree from the Indian Institute of Technology, Bombay in 1980 and his Ph.D. from the Center for Mathematical System Theory, University of Florida, Gainesville in 1984.
Career
From 1984 to 1991, he was a member of the faculty at the Department of Electrical and Computer Engineering at the University of Illinois Urbana-Champaign. He moved the University of California, Berkeley in 1991, and is currently Professor in the Departments of Mechanical Engineering and Electrical Engineering and Computer Sciences.
Poolla's current research interests include many aspects of future energy systems including economics, security, and commercialization.
Patents
Poolla has been awarded 6 patents:
Data collection and correction methods and apparatus
Methods of and apparatuses for controlling process profiles
Sensor geometry correction methods and apparatus
Methods and apparatus for deriving thermal flux data for processing a workpiece
Methods and apparatus for equipment matching and characterization
Methods and apparatus for low distortion parameter measurements
Awards
Poolla was awarded the 1984 Outstanding Dissertation Award by the University of Florida; the 1988 NSF Presidential Young Investigator Award; the 1993 Hugo Schuck Best Paper Prize; the 1994 Donald P. Eckman Award; a 1997 JSPS Fellowship; the 1997 Distinguished Teaching Award from the University of California, Berkeley; and the 2004 and 2007 IEEE Transactions on Semiconductor Manufacturing Best Paper Prizes; and the 2009 IEEE CSS Transition to Practice Award.
References
Living people
University of California, Berkeley faculty
University of Florida alumni
IIT Bombay alumni
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/List%20of%20Bizarre%20episodes | The following is a list of episodes of Bizarre, a Canadian sketch comedy television series that aired from 1980 to 1986 on CTV in Canada, and in the United States on the Showtime premium cable network. Impressionist John Byner was the host of Bizarre, often joined by Bob Einstein, often playing the roles of the show's producer, and stuntman Super Dave Osborne. Much of the humour on the show was considered risque during the original run of the series, especially on episodes seen on Showtime, due to more-relaxed programming standards.
Season one (1980–1981)
Season two (1981–1982)
Season three (1982–1983)
Season four (1983–1984)
Season five (1984–1985)
Season six (1985–1986)
References
External links
Lists of Canadian comedy television series episodes |
https://en.wikipedia.org/wiki/Vertex%20painting | In 3D computer graphics software, vertex painting refers to interactive editing tools for modifying vertex attributes directly on a 3D polygon mesh, using painting tools similar to any digital painting application but working in a 3D viewport on a perspective view of a rotated model. It is similar to a 3D paint tool but operates specifically to vertex data rather than texture maps.
It is most often used for modifying weight maps for skeletal animation, to tweak the influence of individual bones when deforming surfaces around joints.
Examples of support
Blender
3ds Max
Maya
Adobe Substance
References
3D computer graphics |
https://en.wikipedia.org/wiki/Offspring%20%28season%206%29 | The sixth season of Offspring, an Australian drama television series, premiered on Network TEN on 29 June 2016.
Production
On 3 October 2014, John Edwards confirmed that Offspring would not return for a sixth series in 2015, due to Ten's cost-cutting measures in its production division.
On 30 August 2015, the Herald Sun reported that a sixth season of Offspring would be made - returning after a two-year hiatus.
On 20 September 2015, Ten confirmed that Offspring would return for a sixth season in 2016. Production for the series began on 25 April 2016 and ran through to June 2016. Series 6 premiered on 29 June 2016.
With the return of the series, creator Deb Oswald and long-term writer Michael Lucas announced that they weren't returning to the series for the sixth season. Jonathon Gavin, another long-term writer, has stepped into the place of head writer, citing that he always thought there was more to the Proudmans' story. Gavin stated, about the return of the series, "Deb [Oswald] said that she conceived Offspring as the opposite of those shows where there's a dead prostitute lying in a dumpster in the beginning of the episode. This is a show that's affirming of all the things that make life great: food, sex, love, family, babies, dogs. The things that make life meaningful are our relationships to other people, those tiny moments when you have a connection with another human being. Offspring is a celebration of that."
The show's return after almost two years fast-forwards 18 months past where season five ended. Nina has been in a relationship with Leo. Billie has been managing husband Mick's tour in the UK and youngest sibling Jimmy runs his busy Mexican taqueria while his wife Zara studies for a medical degree.
Of the new season, Kat Stewart stated, "There's a life-changing event that shifts the ground for everybody and it provides us with an opportunity to mine a bit deeper with the characters, in a way that you can't do with a movie, or a play, or a short-run series. We've got all this history, so we don't run out of material, we just mine deeper."
Cast
Main
Asher Keddie as Nina Proudman
Kat Stewart as Billie Proudman
Richard Davies as Jimmy Proudman
Deborah Mailman as Cherie Butterfield
Jane Harber as Zara Perkich Proudman
Linda Cropper as Geraldine Proudman
Recurring
Alicia Gardiner as Kim Akerholt
Eddie Perfect as Mick Holland
Lachy Hulme as Martin Clegg
Lawrence Leung as Elvis Kwan
Patrick Brammall as Leo Taylor
Dan Wyllie as Angus Freeman
T.J. Power as Will Bowen
Sarah Peirse as Marjorie Van Dyke
Shannon Berry as Brody Jordan
Alexander England as Harry Crewe
Guest
Matthew Le Nevez as Dr Patrick Reid
Ido Drent as Dr Lawrence Pethbridge
Episodes
Viewership
References
2016 Australian television seasons |
https://en.wikipedia.org/wiki/Land%20Remote-Sensing%20Commercialization%20Act%20of%201984 | The Land Remote-Sensing Commercialization Act of 1984 is a United States statute establishing a system to further the utilization of satellite imagery data obtained from Earth observation satellites located in a geocentric orbit above the atmosphere of Earth.
The H.R. 5155 legislation was passed by the 98th U.S. Congressional session and enacted into law by the 40th President of the United States Ronald Reagan on July 17, 1984.
Titles of the Act
Title 15 United States Code Chapter 68 was authored as seven titles based on U.S. Congressional findings, policies, and purposes as in accordance with the existing Landsat program and Space law.
Title I: Declaration of Findings, Purposes, and Policies - 15 U.S.C. §§ 4201-4204
Title II: Operation and Data Marketing of Landsat System - 15 U.S.C. §§ 4211-4215
Title III: Provision of Data Continuity after the Landsat System - 15 U.S.C. §§ 4221-4227
Title IV: Licensing of Private Remote-Sensing Space Systems - 15 U.S.C. §§ 4241-4246
Title V: Research and Development - 15 U.S.C. §§ 4261-4263
Title VI: General Provisions - 15 U.S.C. §§ 4271-4278
Title VII: Prohibition of Commercialization of Weather Satellites - 15 U.S.C. §§ 4291-4292
U.S. Congressional Actions to 1984 Act
U.S. Congressional amendment and fiscal authorization to the Land Remote-Sensing Commercialization Act of 1984.
Repeal of Land Remote-Sensing Commercialization Act of 1984
The Land Remote-Sensing Commercialization Act was repealed by the enactment of the Land Remote Sensing Policy Act of 1992. The legislative repeal was passed by the 102nd U.S. Congressional session and enacted into law by the 41st President of the United States George H.W. Bush on October 28, 1992.
See also
Center for Earth Resources Observation and Science
Commercial use of space
Copernicus Programme
Earth Observing System
Ocean Surface Topography Mission
Satellite crop monitoring
References
External links
1984 in American law
98th United States Congress
Presidency of Ronald Reagan
1984
United States federal legislation
Remote sensing |
https://en.wikipedia.org/wiki/Time%20Slotted%20Channel%20Hopping | Time Slotted Channel Hopping or Time Synchronized Channel Hopping (TSCH) is a channel access method for shared-medium networks.
TSCH is used by Low-Power devices to communicate using a wireless link. It is designed for low-power and lossy networks (LLNs) and aims at providing a reliable Media access control layer.
TSCH can be seen as a combination of Time division multiple access and Frequency-division multiple access mechanisms as it uses diversity in time and frequency to provide reliability to the upper network layers.
The TSCH mode was introduced in 2012 as an amendment (IEEE 802.15.4e) to the Medium Access Control (MAC) portion of the IEEE 802.15.4 standard. The amendment was rolled into the IEEE 802.15.4 in 2015.
Description
Wireless communications are often referred as unreliable due to the unpredictability of the wireless medium. While wireless communications bring many advantages (e.g no wires maintenance, costs reduction ...), the lack of reliability slows down the adoption of wireless networks technologies.
TSCH aims at reducing the impact of the wireless medium unpredictability to enable the use of reliable low-power wireless networks. It is very good at saving the nodes' energy because each node shares a schedule, allowing it to know in advance when to turn on or off its radio.
The IEEE 802.15.4 standard uses different frequency bands, and each frequency band is separated in channels. In TSCH, communications are done using those different channels and at different times. However, this standard does not define how to build and maintain the communication schedule. Many works have been proposed to organize the schedule in a centralized or distributed way.
Channel Hopping
Let chOf be the channel offset, assigned to a given link. The channel offset, chOf, is translated to a frequency f (i.e. a real channel) using:
where ASN is the Absolute Slot Number, i.e. the total number of slots that elapsed since the network was deployed. The ASN is incremented at each slot and shared by all devices in the network.
Multipath-Fading Mitigation
Multipath propagation can create internal destructive interferences of a wireless signal known as multipath fading. This phenomenon can be overcome by shifting the location of the communicating nodes or by switching the communication carrier frequency.
The channel hopping mechanism of TSCH allows to overcome the impact of multipath fading by changing the communication carrier frequency for every transmission
Implementations
TSCH is implemented in simulation or on real hardware.
Simulation:
NS2
OpenWSN
Firmware:
RIoT
OpenWSN
Contiki
6TiSCH
TSCH is one of the key elements of the 6TiSCH stack as part of the IEEE802.15.4-2015 standard.
Uses
Due to its low power consumption and reliability, TSCH (or its previous versions) is mainly used in Low-Power Wireless Sensor Networks.
Companies are using it in their wireless sensor networks such as Linear Technology and Emerson
See also
Wireless s |
https://en.wikipedia.org/wiki/Lu%20Qi | Lu Qi is the name of:
Lu Qi (Tang dynasty) ( 8th century), Tang dynasty official
Lu Qi (actor) (born 1953), Chinese actor
Qi Lu (computer scientist) or Lu Qi (born 1961), Chinese computer scientist |
https://en.wikipedia.org/wiki/Conan%2C%20My%20Beautician | Conan, My Beautician is a 2016 Philippine television situational comedy series broadcast by GMA Network. Directed by Adolf Alix Jr., it stars Mark Herras and Megan Young. It premiered on June 26, 2016 replacing Alamat. The series concluded on September 18, 2016 with a total of 13 episodes. It was replaced by Usapang Real Love in its timeslot.
The series is streaming online on YouTube.
Premise
Conan came from a family of barbers, he is a straight guy who is forced to work in a beauty salon in Manila after his family was forced to escape from their hometown. He pretends as a flamboyant beautician at Salon Paz. He will find himself falling in love with Ava, the bride he is supposed to work for.
Cast and characters
Lead cast
Mark Herras as Conan
Megan Young as Ava
Supporting cast
Lotlot de Leon as Perla
Cacai Bautista / Candy Pangilinan as Chika la Chaka
Balang Bughaw as Conor
Atak Arana as Greg
Betong Sumaya as Mimi
Divine Tetay as Pia
Vangie Labalan as Mrs. Paz
Rodjun Cruz as Prince
Lovely Abella as Sharon
Ken Anderson as Gabby
Mailes Kanapi as Ava's mom
Juliene Medoza as Ava's dad
Guest cast
Boobsie Wonderland as Dubbie
Chlaui Malayao as Debbie
Gemma Gonzaga as Iluminada
Antonette Garcia as Betty
Mike Tan as Mike
Angelica Jones as Kiray
Benedick Rellama as Kiko
Menggie Cobarrubias as Don Alfonso
Jay Manalo as Conrado
John Manalo as young Prince
Elijah Alejo as young Ava
Episodes
Accolades
References
External links
2016 Philippine television series debuts
2016 Philippine television series endings
Filipino-language television shows
GMA Network original programming
Philippine television sitcoms
Television shows set in the Philippines |
https://en.wikipedia.org/wiki/List%20of%20Brazil%20over-the-air%20television%20networks | This is a list of Brazil over-the-air television networks, in which it has a listing of over-the-air television networks that operate their stations in Brazil. According to the Brazilian Agency of Telecommunications (Anatel), a television network is “a set of generating stations and their television relay systems with national coverage and convey the same basic programming”, following the decree number 5,371 of Presidency of the Republic.
List of networks
See also
List of television stations in Brazil
References
over-the-air |
https://en.wikipedia.org/wiki/Structural%20analog%20%28electronic%29 | Despite the field diversity, all structural analog analysis use some level of abstraction to transform models in mathematical graphs, and detected structural analogies by algorithms. Example: for molecular structure comparison and classification operations, the compared compounds are modeled as a mathematical graph.
Analogical models are used in a method of representing a ‘target system’ by another, more understandable or analysable system.
Two systems have analog structures (see illustration) if they are isomorphic graphs and have equivalent (mapped) lumped elements. In electronics, methods based on fault models of structural analogs gain some acceptance in industry.
References
Electronics |
https://en.wikipedia.org/wiki/Highways%20in%20Honduras | The network of highways in Honduras is managed by the Secretariat of public works, transport and housing (SOPTRAVI), through the General Directorate of Roads, which is responsible for planning construction and maintenance work on the country's roads. Honduras has more than of roads. Up to 1999, only had been paved.
The main motorway of the country is that from Puerto Cortés on the Caribbean to San Pedro Sula (CA-13), joining the CA-5 from San Pedro Sula to Tegucigalpa, and continuing to Nacaome and Choluteca in the south of the country, where it crosses the Pan-American Highway towards Nicaragua (CA-1).
Classification
The road network is divided into primary, secondary, tertiary and local networks. The primary network connects the main cities, and has a total length of 3,275 km. The secondary network joins main cities to surrounding small towns and villages, and links the 18 Departments of Honduras; its total length is 2,554 km. The local network consists of all the routes linking the small towns and villages; it is important for the 118 municipalities of Honduras, and has a total length of 8,214 km.
There is also a "tertiary" network, built by organizations such as the National Coffee Fund (Fondo Cafetero Nacional), the Honduran Coffee Institute (Instituto Hondureño del Cafe, IHCAFE), the Honduran Council for Forest Development (Consejo Hondureño de Desarrollo Forestal, COHDEFOR), the Honduran Social Investment Fund (Fondo Hondureño de Inversión Social, FHIS), the Ministry of Agriculture and Livestock (Secretaría de Agricultura y Ganadería, SAG), in addition to municipalities, certain private companies, and any other organization not affiliated to the Road Fund nor to SOPTRAVI. This network has a length of between 7,000 and 12,000 km.
Main routes
Panamerican Highway CA-1
The Panamerican Highway, the world's longest road, crosses the American continent from Alaska to Patagonia. The Honduran sector begins at the El Salvador frontier at El Amatillo and runs through Nacaome, Jícaro Galánwhere it meets the Carretera del Sur (CA-5)Choluteca, San Marcos de Colón to the Nicaraguan frontier at El Espino.
CA-5
Carretera del Norte – CA-5 is a four-lane paved road 350 km in length linking Tegucigalpa with Comayagua, Siguatepeque, El Lago de Yojoa, Potrerillos, Pimienta, Búfalo, Villa Nueva and San Pedro Sula.
Carretera del Sur – CA-5 is a 100-km two-lane motorway in some parts three-lane linking Tegucigalpa with Sabanagrande, Pespire, finishing in Jícaro Galán, where it joins with the CA-1 Panamerican Highway.
CA-13
Carretera CA-13 is a paved road 350 km in length linking San Pedro Sula with Omoa, Puerto Cortes, El Progreso, Tela, La Ceiba, and other towns on the Atlantic coast. It also links Puerto Cortés with Omoa, Cuyamel and Corinto (the Guatemalan frontier).
Carretera La Ceiba-Trujillo begins at La Ceiba and runs through Jutiapa, Balfate, Sabá, Tocoa and Corocito to Trujillo, finishing at Puerto Castilla. It has branches from Sabá to Ol |
https://en.wikipedia.org/wiki/PeptideAtlas | PeptideAtlas is a proteomics data resource that gathers tandem mass spectrometry datasets from around the world, reprocesses them with the Trans-Proteomic Pipeline, and makes the combined result freely available to the community. Peptide Atlas is one of the founding members of the ProteomeXchange Consortium.
History
The earliest conception of PeptideAtlas began at the Institute for Systems Biology in the research lab of Ruedi Aebersold by Eric Deutsch and Sharon Chen at the Annotated Peptide Database (APD). The concept was further expanded with additional efforts from Parag Mallick and Frank Desiere. The first instance for an ensemble of human experiments was published in 2004 as the Human PeptideAtlas.
The concept was further expanded to many other species over the years with major effort by Nichole King, Zhi Sun, Terry Farrah, and Dave Campbell.
Current Status
PeptideAtlas is still maintained and developed at the Institute for Systems Biology in the research lab of Robert Moritz, led by Eric Deutsch, and with significant efforts by Zhi Sun and Dave Campbell.
See also
Human proteome project
Human Protein Atlas
NeXtProt
External links
PeptideAtlas web site (www.peptideatlas.org)
References
Peptides
Proteomics
Biological databases |
https://en.wikipedia.org/wiki/Thailand%27s%20Got%20Talent%20%28season%206%29 | Thailand's Got Talent season 6 (also known as TGT) was the sixth season of the Thailand's Got Talent reality television series on the Channel 3 television network, and part of the global British Got Talent series. It is a talent show that features singers, dancers, sketch artists, comedians and other performers of all ages competing for the advertised top prize of 10,000,000 Baht (approximately $325,000). The show debuted on 12 June 2016. Thailand is also the fifth country in Asia to license Got Talent series. The four judges Chalatit Tantiwut, Patcharasri Benjamad, Kathaleeya McIntosh and Nitipong Hornak join hosts Ketsepsawat Palagawongse na Ayutthaya.
Broadcast
Audition, 6 weeks
Culling-day, 1 week
Semifinal, 5 weeks
Final, 1 week
Semifinals
Semifinalists
{|
|-
| ||| Golden buzzer
|-
| ||| Public wildcard (previously eliminated act reinstated into the final by public vote)
|}
Semifinals Summary
Semifinal 1 (31 July)
Semifinal 2 (7 August)
Semifinal 3 (14 August)
Semifinal 4 (21 August)
Semifinal 5 (28 August)
Final (4 September)
Thailand's Got Talent seasons
2016 Thai television seasons |
https://en.wikipedia.org/wiki/Virtual%20Soldier%20Research%20Program | The Virtual Soldier Research program (VSR) is a research group within the University of Iowa Center for Computer-Aided Design (CCAD). VSR was founded by Professor Karim Abdel-Malek in 2003 through external funding from the US Army Tank Automotive Command (TACOM) to put the Warfighter at the center of US Army product designs. Professor Abdel-Malek's background in robotics and the use of rigorous mathematical formulations was the first introduction of mathematical kinematics to the field of Digital Human Modeling (DHM). Prior to 2003, all DHM models were based on experimental data that use lookup tables to enable the posturing of simple mannequins. Indeed, the first version of Santos, presented at the a DHM conference was met with great success because it was the first fully articulated digital human model that behaved as humans do, whereby joints had constraints (also called ranges of motion) and a user could pull on an arm for example and as a result the entire body would respond accordingly. Cost functions representing human performance measures were used to drive the motion within the optimization formulation. Seated posture prediction for example was accomplished by simply providing the seat geometry. The posture prediction methodology was subsequently validated Later on, the Predictive Dynamics method was created and used the same optimization technique with the addition of 3D laws of motion (equations of motion). The Santos system includes many aspects of physiology modeling, thermal, hand model, grasp prediction, gait analysis including stability, mobility, suitability, survivability, maintainability, training, and many other metrics typically used in the assessment of human performance for the Warfighter.
Using this initial research and funding as a foundation, the VSR program continues to develop new technologies in digital human modeling and simulation, specifically with applications for the military, automotive, manufacturing, athletics, injury prediction, With over $60M in funding, the Santos simulation platform provides two key components that differentiates it among all other DHM systems: (1) Physics based and (2) Predicts behavior.
VSR's digital human model, Santos (R), stands at the center of its digital human modeling and simulation research. The high-fidelity, biomechanically and biofidelic accurate musculoskeletal model incorporates 215 degrees of freedom, including the hand, feet, and eyes. The dimensions of the skeleton are mutable, able to represent any anthropometric cross section. In addition, Santos includes a muscular system with the ability to predict muscle activation and muscle forces in real time, using a novel optimization-based methodology. This method, developed over a period of eight years by the Virtual Soldier Research program is called Predictive Dynamics and published by a book and a large number of papers. Furthermore, the gradient based methodology used to solve for the motion was also replaced with |
https://en.wikipedia.org/wiki/Vuk%20%28computer%29 | Vuk () is a computer prototype designed by a group of students from Leskovac in SFRY (now Serbia). It was supposed to be a multipurpose educational computer. The development started in 1984 and in 1988 about ten prototypes were produced. Although the design received awards, the Yugoslav industry was not interested, so the computer never reached the production phase.
Specifications
CPU: MC68000 running at 8 MHz
ROM: 128 KB (text editor, command interpreter, Pascal compiler, and assembler)
Primary memory: 1 Mb (expandable up to 14 Mb)
Secondary storage: floppy drive 800kb (5.25’’ or 3.5’’), hard disk
Display: 40 column mode (320x256, 16 colors) and 80 column mode (640x256, 4 colors)
Sound: beeper
I/O ports: keyboard connector, composite and RF video, RS-232, Centronics, Game port and expansion bus connector
References
External links
http://www.symmetry.rs/Kostic__2012__Razvoj_personalnog_racunara_Vuk_.pdf
Nekad davno, u svetu kompjutera…
Retro: Stari domaći YU računari - "VUK" - Nauka i tehnologija
Educational hardware
68k-based computers
Personal computers |
https://en.wikipedia.org/wiki/MacOS%20Sierra | macOS Sierra (version 10.12) is the thirteenth major release of macOS (formerly known as and ), Apple Inc.'s desktop and server operating system for Macintosh computers. The name "macOS" stems from the intention to unify the operating system's name with that of iOS, iPadOS, watchOS and tvOS. Sierra is named after the Sierra Nevada mountain range in California and Nevada. Its major new features concern Continuity, iCloud, and windowing, as well as support for Apple Pay and Siri.
The first beta of macOS Sierra was released to developers shortly following the 2016 WWDC keynote on June 13, 2016. The first public-beta release followed on July 7, 2016. It was released to end users on September 20, 2016, as a free upgrade through the Mac App Store and it was succeeded by macOS High Sierra on September 25, 2017.
System requirements
macOS Sierra requires at least 2 GB of RAM and 8 GB of storage space and is designed to run on the following products:
iMac (Late 2009 or later)
MacBook (Late 2009 or later)
MacBook Air (Late 2010 or later)
MacBook Pro (Mid 2010 or later)
Mac Mini (Mid 2010 or later)
Mac Pro (Mid 2010 or later)
Sierra dropped support for various Macs released from mid 2007 to mid 2009, the first version of macOS since OS X Mountain Lion, released in 2012, to do so. Support for Xserve was also dropped in Sierra.
Workarounds for unsupported systems
Developers have created workarounds to install macOS Sierra on some Mac computers that are no longer officially supported as long as they are packed with a CPU that supports SSE4.1. This requires using a patch to modify the install image.
Changes
Default wallpaper
The default desktop picture is an image of Lone Pine Peak.
System features
Siri
The user can access the Siri intelligent assistant via the Dock, the menu bar or a keyboard shortcut and results are shown in a window in the upper-right corner. Siri can send messages, search the web, find files and adjust settings. Results can be dropped into other applications or pinned to Notification Center. For instance, pictures from search results can be dragged into a document.
iCloud Drive and Optimized Storage
iCloud Drive can upload the user's documents and desktop directories and sync them to other devices. The System Information application has a new section that gives the user detailed information about space usage per application or file and provides tools and suggestions for freeing up space. For instance, the user can let the system upload old files to iCloud Drive and remove their local copies, keeping them available on-demand in Finder. It can also remove old files from trash automatically. iTunes can delete watched, purchased films and TV programs from its library.
Auto Unlock and Universal Clipboard
Building upon Continuity, an "umbrella term [for] features that facilitate the communication between [Apple devices]" using Bluetooth and Wi-Fi, Sierra adds two features. With Auto Unlock, the user can unlock their user account by |
https://en.wikipedia.org/wiki/Galves%E2%80%93L%C3%B6cherbach%20model | The Galves–Löcherbach model (or GL model) is a mathematical model for a network of neurons with intrinsic stochasticity.
In the most general definition, a GL network consists of a countable number of elements (idealized neurons) that interact by sporadic nearly-instantaneous discrete events (spikes or firings). At each moment, each neuron N fires independently, with a probability that depends on the history of the firings of all neurons since the last time N last fired. Thus each neuron "forgets" all previous spikes, including its own, whenever it fires. This property is a defining feature of the GL model.
In specific versions of the GL model, the past network spike history since the last firing of a neuron N may be summarized by an internal variable, the potential of that neuron, that is a weighted sum of those spikes. The potential may include the spikes of only a finite subset of other neurons, thus modeling arbitrary synapse topologies. In particular, the GL model includes as a special case the general leaky integrate-and-fire neuron model.
Formal definition
The GL model has been formalized in several different ways. The notations below are borrowed from several of those sources.
The GL network model consists of a countable set of neurons with some set of indices. The state is defined only at discrete sampling times, represented by integers, with some fixed time step . For simplicity, let's assume that these times extend to infinity in both directions, implying that the network has existed since forever.
In the GL model, all neurons are assumed evolve synchronously and atomically between successive sampling times. In particular, within each time step, each neuron may fire at most once. A Boolean variable denotes whether the neuron fired () or not () between sampling times and .
Let denote the matrix whose rows are the histories of all neuron firings from time to time inclusive, that is
and let be defined similarly, but extending infinitely in the past. Let be the time before the last firing of neuron before time , that is
Then the general GL model says that
Moreover, the firings in the same time step are conditionally independent, given the past network history, with the above probabilities. That is, for each finite subset and any configuration we have
Potential-based variants
In a common special case of the GL model, the part of the past firing history that is relevant to each neuron at each sampling time is summarized by a real-valued internal state variable or potential (that corresponds to the membrane potential of a biological neuron), and is basically a weighted sum of the past spike indicators, since the last firing of neuron . That is,
In this formula, is a numeric weight, that corresponds to the total weight or strength of the synapses from the axon of neuron to the dendrites of neuron . The term , the external input, represents some additional contribution to the potential that may arriv |
https://en.wikipedia.org/wiki/Conservation%20Genetics%20Resources | Conservation Genetics Resources is a quarterly peer-reviewed scientific journal covering methodological improvements, computer programs, and the development of genomic resources related to conservation genetics. It was established in 2009 and is published by Springer Science+Business Media. The editor-in-chief is Benoit Goossens (Cardiff University). According to the Journal Citation Reports, the journal has a 2015 impact factor of 0.446.
See also
Conservation Genetics
References
External links
Genetics journals
English-language journals
Springer Science+Business Media academic journals
Academic journals established in 2009
Quarterly journals |
https://en.wikipedia.org/wiki/Wenco%20International%20Mining%20Systems | Wenco International Mining Systems, Ltd. (Wenco) is a Canadian technology company that develops, manufactures, and distributes computer systems to manage and control surface mining equipment. It is a provider of fleet management, machine guidance, asset health, and industrial safety technology to the mining sector. The company's computer systems include software and hardware that record data related to mining equipment activity, location, time, production, and maintenance. This information also displays to machine operators and other mining personnel. Its systems run at open-pit sites operated by large mining conglomerates De Beers Group of Companies, Syncrude, KCGM, the United States Steel Corporation, Canadian Natural Resources Limited, and others.
Founded in 1983, Wenco maintains its head office in the Metro Vancouver city of Richmond, British Columbia. It also operates satellite sales and support offices in the United States, Australia, Chile, South Africa, Russia, India, UAE, and Indonesia. Since 2009, the company has operated as a subsidiary of Hitachi Construction Machinery Co., Ltd., a division of Hitachi Group of Companies.
Products
Wenco's systems rely on a combination of GNSS technology, wireless infrastructure, and computer hardware and software to track mining equipment activity, location, time, and production information. These systems connect mobile computers on field equipment such as excavators, bulldozers, and haul trucks with office computers and an SQL-compliant database. Mines use these systems for a range of purposes, including pit reporting, ore blend control, material tracking, production efficiency, and overall pit management. Wenco also shares its system data with common third-party mining technology systems through its public API.
In May 2021, Wenco acquired Australian company SmartCap Technologies, developers of an EEG-based wearable fatigue management system.
Ongoing development
Since 2013, Wenco has pursued development and testing of an autonomous haulage system in conjunction with Hitachi Construction Machinery. Wenco is also working with Hitachi Construction Machinery and third-party organizations to establish open standards for autonomous fleet control technologies.
References
Mining companies of Canada |
https://en.wikipedia.org/wiki/Ernst%20Mayr%20%28computer%20scientist%29 | Ernst Wilhelm Mayr (born 18 May 1950) is a German computer scientist and mathematician. He received the Gottfried Wilhelm Leibniz Prize in 1997 awarded for his contributions to theoretical computer science.
Mayr's research in computer science covers algorithms and complexity theory. He also explores symbolic mathematics/computer algebra and methods in bioinformatics. His principal interests lie in describing and modeling parallel and distributed programs and systems, the design and analysis of efficient parallel algorithms and programming paradigms, the design of algorithm solutions for scheduling and load balancing problems and investigation of their complexity theory. He also explores polynomial ideals and their complexity and algorithms as well as algorithms for searching and analyzing extensive bioinformatic data.
After studying mathematics at Technical University of Munich with a scholarship from the Maximilianeum foundation and computer science at Massachusetts Institute of Technology in Cambridge, Mayr did his doctorate at Technical University of Munich in 1980. In 1982, he became assistant professor of computer science at Stanford University, where he also participated in the Presidential Young Investigator Program. In 1988, he was appointed to the Chair of Theoretical Computer Science at Goethe University Frankfurt. Mayr has held the Chair of Efficient Algorithms at Technical University of Munich since 1993 where he also served as the dean of his faculty from 2000 to 2003. In 1997 he co-founded the annual international conference Computer Algebra in Scientific Computing with Vladimir P. Gerdt and served as a general chair from 1998 to 2013.
References
External links
Curriculum vitae and publications (PDF) (116 kB)
Gottfried Wilhelm Leibniz Prize winners
Stanford University faculty
20th-century German mathematicians
Living people
1950 births
21st-century German mathematicians
Massachusetts Institute of Technology alumni |
https://en.wikipedia.org/wiki/Line%201%20%28Fuzhou%20Metro%29 | Line 1 of Fuzhou Metro () is a north-south line of the Fuzhou Metro network in Fuzhou, Fujian Province, China. This line is the first operating metro line in the Fuzhou Metro system, inaugurated on May 18, 2016. By June 2016, the south section, running from to , is in operation. The north section opened on 6 January 2017. This line is colored red on system maps.
The construction of Line 1 is divided into two phases. The first phase runs from to . This part of Line 1 is 24.89 km in length and has 21 stations. The second phase runs from to with 4 stations. This part is 4.921 km long.
Service Schedule
Route
Line 1 is a metro rail line running from north to south in Fuzhou metropolitan area. It operates between Xiangfeng Station and Sanjiangkou Station, running through Fuzhou Railway Station, Dongjiekou Station, Nanmendou Station, Sanchajie Station, Chengmen Station, and Fuzhou South Railway Station, all of which are cities' major transportation junctions and proposed transfer stations with other subway lines.
Stations
Operating hours
During the first few months of operation, only the south section of Line 1 was in operation. The hours of operation during that time were from 7:00 to 20:20.
After the north section of the line opened, the hours of operation were extended. Nowadays, Line 1 begins operations at 6:30 and ends operations at 23:00.
Rolling stock
See also
List of metro systems
References
External links
Fuzhou Metro – official website
01
2016 establishments in China
Railway lines opened in 2016 |
https://en.wikipedia.org/wiki/Arabesque%20%28company%29 | Arabesque is a Romanian company based in Galați, which distributes building materials and operates hardware stores. The network comprises 7 Mathaus DIY stores and 22 Arabesque warehouses in Romania. It also operates 6 warehouses in Republic of Moldova, Bulgaria and Ukraine.
The company was founded in 1994 and is owned by Romanian businessman Cezar Rapotan who also owns shares of the manufacturer of steel structures Sibel FIERCTC and of the energy solutions company Chorus Marketing and Distribution.
The first warehouse outside Romania was opened in 2005, in Chisinau, Republic of Moldova, as Arabesque Construct.
In July 2006, Arabesque has acquired the Budmax network, the third largest player in the building materials business-to-business market in Ukraine. In 2020 Arabesque still operates only 3 of the 10 warehouses that still operate under the Budmax brand in Ukraine.
Arabesque also owns in Bulgaria a Budmax warehouse in Sofia since 2006 and in Burgas since 2007.
References
Retail companies established in 1994
Hardware stores
Retail companies of Romania |
https://en.wikipedia.org/wiki/Love%20Child%20%28season%203%29 | The third season of the Australian drama television series Love Child, began airing on 20 June 2016 and concluded on 1 August 2016 on the Nine Network. The season consisted of ten episodes airing on Monday evenings at 8:30 pm.
Cast
Main
Jessica Marais as Joan Millar
Jonathan LaPaglia as Dr Patrick McNaughton
Matthew Le Nevez as Jim Marsh
Mandy McElhinney as Matron Frances Bolton
Ella Scott Lynch as Shirley Ryan
Harriet Dyer as Patricia Saunders
Sophie Hensser as Viv Maguire
Gracie Gilbert as Annie Carmichael
Miranda Tapsell as Martha Tennant
Recurring
Andrew Ryan as Dr Simon Bowditch
Lincoln Younes as Chris
Maya Stange as Eva
Tiarnie Coupland as Maggie
Jeremy Lindsay Taylor as Leon
Episodes
References
2016 Australian television seasons |
https://en.wikipedia.org/wiki/Cheng%20Xiang%20Zhai | ChengXiang Zhai is a computer scientist. He is a Donald Biggar Willett Professor in Engineering in the Department of Computer Science at the University of Illinois at Urbana-Champaign.
Biography
Zhai received the BS (1984), MS (1987, under Guoliang Zheng), and PhD (1990, under Jiafu Xu) in Computer Science from Nanjing University. He spent 1990 to 1993 working at Nanjing University's State Key Laboratory for Novel Software Technology. In 1993, he left for America to pursue a second PhD, this time at Carnegie Mellon University (CMU) with David A. Evans. Evans then left to spend more time with the company ClariTech. Zhai obtained from CMU a MS (1997) in computational linguistics and then started working with John Lafferty. He finally received from CMU a PhD in Language and Information Technologies in 2002.
Since then, he has been an Assistant Professor (2002–2008), Associate Professor (2008–2013), Professor (2013–2018), and Donald Biggar Willett Professor (2018–) at the UIUC Department of Computer Science. He also holds joint appointments with the Carl R. Woese Institute for Genomic Biology, Department of Statistics, and School of Information Sciences at UIUC.
Awards
ACM SIGIR Gerard Salton Award, 2021, "for significant and sustained contributions to information retrieval and data science. His work has defined many of the theoretical foundations of the language modeling approach, yielding major insights into areas such as smoothing methods, relevance feedback, topic diversification, and text representations that incorporate positional information. He and his collaborators have also pioneered the axiomatic approach to information retrieval, which continues to provide inspiration for retrieval model and evaluation research."
ACM SIGIR Academy inductee, 2021
ACM Fellow, 2017, "for contributions to information retrieval and text data mining."
ACM SIGIR Test of Time Award, 2016, for paper A study of smoothing methods for language models applied to Ad Hoc information retrieval
ACM SIGIR Test of Time Award, 2016, for paper Document language models, query models, and risk minimization for information retrieval
ACM SIGIR Test of Time Award, 2014, for paper Beyond independent relevance: methods and evaluation metrics for subtopic retrieval
ACM Distinguished Member, 2009
Presidential Early Career Award for Scientists and Engineers (PECASE), 2004, "for his work on user-centered, adaptive intelligent information access. His techniques expect to improve search-engine performance, support better information organization and enable understanding of large volumes of information. Zhai's work in information retrieval is expected to enhance curricula and provide new educational tools for the growing information technology workforce."
ACM SIGIR Best Paper Award, 2004, for paper A formal study of information retrieval heuristics
Personal
Zhai's son Alex has earned three medals at the International Mathematical Olympiad.
References
American computer scientists
Univ |
https://en.wikipedia.org/wiki/Monis%20Rahman | Monis Rahman is a Pakistani internet entrepreneur, venture capitalist and businessman. Rahman is the co-founder and executive chairman of Naseeb Networks, Inc. a business-oriented social network used primarily for online job recruiting. Rahman has been listed among the top entrepreneurs of 21st century several times. Forbes named him at #6 on its list of top "Ten Big Hitting Asian Businessmen under 50".
Career
Early years
After completing his studies at Wisconsin, Rahman went to work at Intel. With the Intel team, he developed an Itanium microprocessor chip between 1991 and 1996 and left the job after looking at the dot-com bubble rise in order to start his own company. In 1997, Rahman and a partner started a company that installed cameras in daycare centers, allowing parents to watch the video streams online in real time. Edaycare.com attracted $2.5 million from investors, including Ron Conway, an early stage investor of Google and PayPal. A year later Rahman and his partner ran out of money, forcing them to sell the company for stock that was beneficially worthless.
Naseeb Networks, Inc.
After a hiatus of four years and working as a consultant, Rahman decided to start a social networking site for Muslims in the United States and United Kingdom, after looking at the success of similar website Friendster.com. He named it "Naseeb.com" (meaning "destiny"). Built as a social site, it was considered more of match-making portal, but Rahman said, "I decided not to go head-on as a matchmaking site... 'Dating' has a negative stigma from a Muslim viewpoint." Naseeb.com was then invested in by LinkedIn co-founder Reid Hoffman with $25,000, while Mark Pincus of Zynga and Joe Kraus of Excite also stepped in as angel investors.
Describing the inspiration behind Naseeb, Rahman said, "I was exploring the Pakistani market since my family had moved here. I realized that the biggest cost in running a web company was of human capital. And the running cost in Pakistan would have been 1/18th of what it would have been in the US. So that's when I decided to come back and start Naseeb.com, which exploded very quickly. We were the first one to be doing any kind of serious business on the internet back then. And we had little to no competition in the market."
In 2002, Rahman returned to Pakistan and registered his company as Naseeb Networks, Inc., both in Lahore, Pakistan, and in San Jose, California, US, to make it easier to raise money and investors. He spent $60,000 as a startup cost for Naseeb and initially handled the company on his own. To prime the market, he used equity in the company to buy the electronic greeting card site eidmubarak.com, which allow Muslims to send cards for Eid, a Muslim holiday. Three thousand people from the site's 1-million-strong mailing list signed up immediately. Annual memberships cost $40, and by 2005 the website was generating $300,000 in revenue.
With the expansion of company Rahman needed programmers and developers, and buyi |
https://en.wikipedia.org/wiki/Barefoot%20Networks | Barefoot Networks is a computer networking company headquartered in Santa Clara, California. The company designs and produces programmable network switch silicon, systems and software. The company was acquired by Intel in 2019.
Background
Barefoot Networks was founded in 2013. The company is backed by Andreessen Horowitz, Lightspeed Venture Partners and Sequoia Capital. The company's co-founders are Nick McKeown, Martin Izzard, Pat Bosshart, and Stefanos Sidiropoulos. Dan Lenoski joined in 2014 and was also given co-founder status. The company came out of stealth mode on June 14, 2016. The company also announced a third round led by Goldman Sachs, AT&T, Dell, and Google. Later in 2016, the company announced additional funding from Alibaba Group and Tencent. In 2017, Craig H. Barratt took over from Martin Izzard as CEO.
In June 2019, Intel announced it was acquiring Barefoot for an undisclosed price.
In January 2023, Intel stated that is has halted production on its networking chips.
Products
Barefoot Tofino
Barefoot Tofino is a P4-programmable switch chip that can run up to speeds of 6.5 Tbit/s.
Programmability
P4 is a programming language designed to allow programming of packet forwarding dataplanes.
Barefoot Deep Insight
Barefoot Deep Insight is a network monitoring system that provides full visibility into every packet in a network. Running on commodity servers, Barefoot Deep Insight interprets, analyzes and pinpoints a myriad of conditions that can impede packet flow, and does so in real time and at line-rate.
References
External links
P4 website
Information technology companies of the United States
Companies based in Palo Alto, California
Networking hardware companies
American companies established in 2013
Intel acquisitions
Defunct computer companies of the United States |
https://en.wikipedia.org/wiki/US%20Sports%20Camps | US Sports Camps (USSC) manages hundreds of youth sports camps, located in the United States and internationally. The company, based in San Rafael, California, encompasses the largest network of sports camps in the nation.
History
The company was founded in 1975 by Charlie Hoeveler and Bill Closs. Billie Jean King, her coach Dennis Van der Meer, and Closs provided the initial capital, though Closs bought out the other two partners within a year. Shortly after, Hoeveler gained major ownership interest.
Camp structure
Children ages 7–18 attend one and two-week camps, receiving intensive training in a single sport. The camps focus on nearly two dozen sports. Most camps are held during the summer on college campuses.
Camp directors, usually head coaches from host colleges, remain in charge of the camp expenses, facility rentals, and the hiring of camp staff. The directors receive incentive-based compensation. USSC handles marketing and administration of the camps.
Sponsorship
After carrying Adidas sponsorship during its early years, the company switched to Nike sponsorship in 1994, and now about 70 percent of the camps carry the Nike name. Nike provides clothing and equipment for the camps, while USSC retains ownership and management of the camps.
Advertising and revenue
During 2015 more than 75,000 US and international campers attended a USSC program. As of 2012, annual revenues were near $30 million.
Advertising techniques the company uses include ads in youth and sports-specific publications as well as major newspapers in addition to targeted direct-mail campaigns.
In 1998 USSC invested $80,000 to create an interactive website, allowing for online camp registration. The site garnered over a million dollars in revenue in one year. It led to a 20 percent increase in business with 20 percent lower office staffing requirements.
References
Companies based in San Rafael, California |
https://en.wikipedia.org/wiki/WQEK-LD | WQEK-LD (channel 36) is a low-power television station in Memphis, Tennessee, United States, affiliated with several digital multicast networks. It is owned by Innovate Corp. alongside KPMF-LD (channel 26). The two stations' transmitters are co-located on the WATN/WLMT tower off Brunswick Road in the Brunswick section of unincorporated northeast Shelby County.
History
A construction permit was granted by the Federal Communications Commission for the station as W18EK-D on October 2, 2012. Its call letters were changed to the current WQEK-LD on December 7, 2015. Originally licensed to Clarksdale, Mississippi, WQEK-LD finally took to the air in September 2016 as a Cozi TV affiliate. A total of eight subchannels were launched in its first months on the air, offering multiple digital networks.
Technical information
Subchannels
The station's digital signal is multiplexed:
References
QEK-LD
Innovate Corp.
Television channels and stations established in 2016
QEK
2016 establishments in Mississippi |
https://en.wikipedia.org/wiki/Hotel%20Nikko%20San%20Francisco | Hotel Nikko San Francisco is a high-rise hotel at 222 Mason Street near Union Square, San Francisco, California. The 28-story hotel has 532 hotel rooms, and is owned by DATAM, LLC. and operated by Nikko Hotels. The hotel is one block away from Union Square, San Francisco and five blocks from the Moscone Center. The hotel opened in October 1987.
Description
The hotel was designed by AMTAD, Inc. and Whisler- Patri Architects and built by Takenaka. It underwent a $60 million renovation commemorating from December 2016 to March 2017, during which time the hotel was closed. The renovation was led by Hirsch Bedner Associates.
The hotel has 16 guest floors, 11 elevators, a health club, spa, lounge, cabaret room, and a restaurant. Restaurant ANZU is located on the second floor and is visible from the lobby. ANZU, is overseen by Hotel Nikko's Food and Beverage Director, Chef Phillippe Striffeler. Striffeler was named one of five 2015 recipients of the Antonin Carême Medal presented by the American Culinary Federation’s San Francisco Chapter on November 16, 2015.
References
External links
Skyscraper hotels in San Francisco
1987 establishments in California
Buildings and structures completed in 1987
Hotels established in 1987
Hotel buildings completed in 1987 |
https://en.wikipedia.org/wiki/Overwatch%20animated%20media | Blizzard Entertainment released several computer-generated cinematic trailers and teasers, as well as animated short films, to promote and develop the story for their 2016 first-person shooter video game, Overwatch. The shorts have been met with positive reception from fans and online publications alike.
Plot and setting
Overwatch is set in a fictionalized version of Earth, sixty years into the future; the Overwatch organization was established thirty years prior to this future setting. These pre-game events are also chronicled by Soldier: 76 in his origin story video.
The story of Overwatch begins with the in-universe "Omnic Crisis" event; the event's cause is unknown. However, prior to the event, humanity developed omnics, artificial intelligence (AI) that led efforts in creating global economic equality and manufacturing. These AI bots were soon developed by omniums, large facilities designed specifically for their creation. Eventually, the world's omniums began producing hostile omnics that attacked humans; the United Nations (UN) established a task force called Overwatch, composed of soldiers and scientists, in response to this Omnic Crisis. Overwatch was originally led by Gabriel Reyes and Jack Morrison, who are known in the game as Reaper and Soldier: 76, respectively. Morrison's battlefield success helped him take control of Overwatch from Reyes, relegating Reyes to lead Blackwatch, a covert operations division of Overwatch. The Omnic Crisis would eventually end, with Overwatch subsequently presiding over a period of maintained peace; those born in this period would be called the "Overwatch Generation". After a few decades, Overwatch would soon face allegations of corruption, mismanagement, weapons proliferation, and human rights abuses, among others, leading to worldwide protests against the organization. Infighting between Reyes and Morrison also occurred; during a UN investigation of Overwatch, a fight broke out at Overwatch's headquarters, leading to an explosion, which destroyed the building and supposedly killed both Reyes and Morrison. The UN would soon pass a resolution that declared any act in the name of Overwatch illegal. This resolution, dubbed the Petras Act, was signed six years prior to the game's setting. In the Soldier: 76 Origin Story animation, Morrison accounts that the allegations against Overwatch were part of a conspiracy.
Following this back story are five of the first six animated shorts (the exception is Dragons, which takes place during the era in which Overwatch maintained peace), as well as the first cinematic trailer.
Characters
Background and development
Overwatchs animated media is interconnected, taking place in the same continuity. Through this animated media, in conjunction with comics and fictional news reports, Blizzard developed the story of Overwatch, rather than including it in the video game. Within the video game, the story is instead "hinted at through environments and character quips, wit |
https://en.wikipedia.org/wiki/SignalFx | SignalFx is a SaaS-based monitoring and analytics platform based in San Mateo, California, which allows customers to analyze, visualize, automate, and alert on metrics data from infrastructure, applications, microservices, containers, and functions. The platform utilizes a streaming architecture to separate metric data points into two streams: one for metadata and one for time-series values. These data streams are routed through a pub-sub bus to SignalFlow, an analytics language accessible via the SignalFx GUI and programmable APIs. With impressive speed and efficiency, the platform can handle millions of data points per second at a 1-second resolution, achieving less than 2 seconds of latency from ingestion to alert.
History
SignalFx was co-founded by Karthik Rau and Phillip Liu in February 2013. Phillip Liu previously worked at Facebook for four years as a software architect and Karthik Rau worked at Delphix and VMware. SignalFx received $8.5 million in a Series A investment from Andreessen Horowitz, adding Ben Horowitz to its board. In 2015 Signal Fx received $20 million in Series B investment led by Charles River Ventures with participation from Andreessen Horowitz, adding Devdutt Yellurkar to its board. In May 2018, SignalFx announced its Series D funding of $45million led by General Catalyst with participation from the existing investors Andreessen Horowitz and Charles River Ventures. In June 2019, the company raised $75million in its Series E round led by Tiger Global Management, bringing the companies total funding to $179million since its founding.
SignalFx currently serves over a hundred customers, including Athenahealth, Chairish, Ellie Mae, Carbonblack, Kayak, Shutterfly, Sunrun, and Yelp.
On August 21, 2019, SignalFx was acquired by Splunk for $1 billion.
References
External links
2013 establishments in California
2019 mergers and acquisitions
Software companies based in California
Defunct software companies of the United States
Splunk |
https://en.wikipedia.org/wiki/Global%20Apprenticeship%20Network | The Global Apprenticeship Network (GAN) is a Swiss independent and neutral not-for-profit association based in Geneva. The GAN is a network of companies, employer organisations, associations and international organisations with the mission of promoting quality apprenticeships and the goal of creating job opportunities for youth and ensuring skills for business.
History
The Global Apprenticeship Network was created based on a call for action by the G20 countries on youth unemployment. It was established late 2013 as an initiative coordinated by the International Organisation of Employers and the Organisation of Economic Co-operation and Development’s (OECD) Business and Industry Advisory Committee, with the support of the International Labour Organization and OECD.
Governance
The supreme decision-making body of the GAN is the general council, which brings together all of its members representing business and employer organisations. It meets at least once a year, and is responsible for approving the work of the Management Board, which formulates the general policy direction of the GAN, adopts a plan of action for the next year and assesses the previous year's work. The Secretariat, the body responsible for the day-to-day running of the GAN, is led by the executive director, currently Nazrene Mannie, who is accountable to the General Council and the Management Board.
Activities
According to its annual report, the GAN develops toolkits, conducts surveys, shares best practices with multinationals and participates in international events.
The GAN works through its national networks which are the platform on the ground. As of April 2019 the GAN has launched fifteen National Networks in Australia, Guatemala, Bangladesh, Argentina, Colombia, Costa Rica, Mexico, Indonesia, Sri Lanka, Turkey, Belgium, France, Spain, Malawi, Tanzania, and Namibia.
Members and partners
A full list of GAN members and partners is available on their website. The GAN, through its members, reaches out to labour and employment ministers in 185 countries and to more than 150 employers’ federations in every region of the world. The GAN membership consists of entities whose objectives are compatible with those of the GAN.
References
Organisations based in Geneva
Organizations established in 2013
Youth employment |
https://en.wikipedia.org/wiki/The%20Special%20Without%20Brett%20Davis | The Special Without Brett Davis is a public-access television show on Manhattan Neighborhood Network. The show takes the form of an ever-changing live "special" with a new format and performers, and a host portrayed by comedian Brett Davis.
The show adopted the Wednesday night 11pm timeslot previously held by The Chris Gethard Show after it moved to cable.
Contributors
The show features a rotating cast of comedians in varying roles week to week, in character or as themselves.
Past contributors include Jo Firestone, Chris Gethard, John Early, Ana Fabrega, Julio Torres, Anna Drezen, Bridey Elliott, Conner O'Malley, Joe Pera, Josh Gondelman, Cole Escola, James Adomian, Patti Harrison, Sunita Mani, Tallie Medel, Ziwe Fumudoh, John Reynolds, Anna Drezen, Dan Licata, Spike Einbinder, Nick Naney, River Ramirez, Colin Burgess, Mary Houlihan, Joe Rumrill, Steve Whalen ("Mr. Jokes"), Russell Dolan (“Mr. Jokes biggest fan”), and Nick “The electrician”.
Guests
The show featured interviews with actors including Michael Shannon, Richard Kind, Danny Tamberelli, Alex Brightman, Rose McGowan, Dasha Nekrasova, Tim Williams, Kevin Corrigan and Logan Miller.
The show also featured comedians such as Gilbert Gottfried, Janeane Garofalo, Brian Stack, Dave Hill, Jake Fogelnest, Artie Lange, Tom Scharpling,
The show also featured many names from the world of wrestling, including Lita, Dave Meltzer, New Jack, Virgil, Dalton Castle, Salina de la Renta, Low-Ki and Pat Buck.
Other personalities that appeared include: Scott Rogowsky, Karley Sciortino, Lloyd Kaufman, Adam Richman, Chapo Trap House, Jesse Camp and Marnie the Dog.
Musical guests included Jerry Paper, The Thermals, Jean Grae, Screaming Females, Emily Wells, Sunflower Bean, Mr Twin Sister, Meredith Graves, Guerilla Toss, M Lamar, Lushlife, Dougie Poole, Ava Luna, Domino Kirke, SAVAK, A Place To Bury Strangers, Jazzboy, Long Neck, Tredici Bacci, The Vandelles, Showtime Goma and more.
Episodes
References
English-language television shows
American public access television
American public access television shows
Television shows filmed in New York City |
https://en.wikipedia.org/wiki/Apache%20NiFi | Apache NiFi is a software project from the Apache Software Foundation designed to automate the flow of data between software systems. Leveraging the concept of extract, transform, load (ETL), it is based on the "NiagaraFiles" software previously developed by the US National Security Agency (NSA), which is also the source of a part of its present name – NiFi. It was open-sourced as a part of NSA's technology transfer program in 2014.
The software design is based on the flow-based programming model and offers features which prominently include the ability to operate within clusters, security using TLS encryption, extensibility (users can write their own software to extend its abilities) and improved usability features like a portal which can be used to view and modify behaviour visually.
Software development and commercial support is currently offered by Hortonworks (now merged into Cloudera), who acquired NiFi's originator, Onyara Inc.
Components
NiFi is a Java program that runs within a Java virtual machine running on a server. The prominent components of Nifi are:
Web Server - the HTTP-based component used to visually control the software and monitor the events happening within
Flow Controller - serves as the brains of NiFi's behaviour. Controls the running of Nifi extensions and schedules allocation of resources for this to happen.
Extensions - various plugins that allow Nifi to interact with various kinds of systems
FlowFile repository - used by NiFi to maintain and track status of the currently active FlowFile Or the information that NiFi is helping move between systems.
Content repository - the data in transit is maintained here
Provenance repository - data relating to the provenance of the data flowing through the system is maintained here.
Integration into commercial software
In February 2017, HPE's SecureData for Hadoop and IoT software became Industry's first commercial product to integrate NiFi
See also
Hortonworks DataFlow
List of Apache Software Foundation projects
Flow Based Programming
Node-RED
References
External links
National Security Agency
Apache Software Foundation projects
Java platform software |
https://en.wikipedia.org/wiki/Maryam%20Sadeghi | Maryam Sadeghi is an Iranian-born Canadian computer scientist and businesswoman in the field of medical image analysis.
Early life and education
Sadeghi was born in 1980 in Mianeh, East Azerbaijan, Iran. She completed an undergraduate degree in computer hardware engineering at the Iran University of Science and Technology before moving to Canada in 2007.
Sadeghi holds a PhD in computing science from Simon Fraser University (SFU) in the area of medical image analysis. Her PhD thesis, titled Towards prevention and early diagnosis of skin cancer: computer-aided analysis of dermoscopy images, won the Doctoral Dissertation Award 2012 Honourable Mention from the Canadian Image Processing and Pattern Recognition Society (CIPPRS).
Research and career
Sadeghi's company, MetaOptima, developed the MoleScope, a mobile dermatoscope phone attachment, which allows the tracking and monitoring of skin moles. Sadeghi (currently the CEO) co-founded this company with her husband, Majid Razmara (who serves as the chief technology officer). MoleScope is a consumer-oriented device with a magnification tool and light source for professional grade imaging quality, with the option to connect to a cloud-based platform. This connected platform allows users to monitor suspicious growths through analysis and archiving of changes in size and colour. MetaOptima has over 70 employees based in Canada, Australia and the US. It has also developed the DermEngine platform which utilizes artificial intelligence to analyze and classify skin lesions, alongside simplified documentation. DermEngine received the 2019 Ingenious Small Private Sector Award.
Sadeghi was also part of a team that developed UVCanada—a free public health education app for sun protection.
Awards and honours
WaveFront's Wireless Prize package ($40,000) in the BCIC-New Ventures Competition in 2013
Prize in the Plug & Play Silicon Valley competition in Vancouver, British Columbia, in July 2014.
SFU Dean's Convocation Medal, 2012.
Nominee, YWCA Women of Distinction Award, 2016.
Winner, Business in Vancouver Forty under 40, 2016.
References
Canadian computer scientists
Canadian businesspeople
Simon Fraser University alumni
Date of birth missing (living people)
Iranian computer scientists
Iran University of Science and Technology alumni
Iranian women scientists
21st-century Canadian women scientists
21st-century Canadian scientists
1980 births
Living people
Iranian emigrants to Canada |
https://en.wikipedia.org/wiki/Maxim%20DL | MaxIm DL is a software package created by Cyanogen for the intended purpose of astronomical imaging. It contains tools to process and analyze data from imaging array detectors such as CCDs.
It is only available for Windows 7 and above. Installation on alternative operating systems is acknowledged as possible but is not officially supported.
References
Science software
Astronomy software |
https://en.wikipedia.org/wiki/Henry%20Winter%20%28scientist%29 | Henry "Trae" Winter (born March 31, 1972) is an American solar physicist currently employed by the Smithsonian Astrophysical Observatory. He has carried out data analysis for the Solar and Heliospheric Observatory, Yohkoh, Hinode, SDO, and TRACE spacecraft, but is especially noted for his extensive science education and outreach activities. Outreach activity includes development of several museum exhibits in the Boston area, and of the "Solar Wall" exhibition at the Smithsonian Air and Space Museum in Washington, D.C.
References
1972 births
Living people
American astrophysicists |
https://en.wikipedia.org/wiki/LTE-WLAN%20Aggregation | LTE-WLAN aggregation (LWA) is a technology defined by the 3GPP. In LWA, a mobile handset supporting both LTE and Wi-Fi may be configured by the network to utilize both links simultaneously. It provides an alternative method of using LTE in unlicensed spectrum, which unlike LAA/LTE-U can be deployed without hardware changes to the network infrastructure equipment and mobile devices, while providing similar performance to that of LAA. Unlike other methods of using LTE and WLAN simultaneously (e.g. Multipath TCP), LWA allows using both links for a single traffic flow and is generally more efficient, due to coordination at lower protocol stack layers.
For a user, LWA offers seamless usage of both LTE and Wi-Fi networks and substantially increased performance. For a cellular operator, LWA simplifies Wi-Fi deployment, improves system utilization and reduces network operation and management costs. LWA can be deployed in collocated manner, where the eNB and the Wi-Fi AP or AC are integrated into the same physical device or in non-collocated manner, where the eNB and the Wi-Fi AP or AC are connected to the Internet traffic and the information transmitted with information and data protection by the sender does not accept the responsibility of the recipient to ensure that you have received this message in accordance with the disclaimer and privacy law to notify the sender via a standardized interface referred to as Xw. The latter deployment option is particularly suitable for the case when Wi-Fi needs to cover large areas and/or Wi-Fi services are provided by a 3rd party (e.g. a university campus), rather than a cellular operator.
LWA has been standardized by the 3GPP in Release-13. Release 14 Enhanced LWA (eLWA) adds support for 60 GHz band (802.11ad and 802.11ay aka WiGig) with 2.16 GHz bandwidth, uplink aggregation, mobility improvements and other enhancements.
Background
Cellular networks have been designed for licensed spectrum. However, as usage patterns changed from voice-centric to data-centric and data usage surged, operators started looking into unlicensed spectrum opportunities. Using WLAN does not only allow operators to increase peak data rate and system capacity, but also to offer services for non-cellular devices, such as laptops.
To cater to operators demand, 3GPP have defined various methods for integrating WLAN access into operator's network deployments.
Based on how the WLAN access is integrated in the operator network there are two categories: 1) Core Network integration, in which the WLAN access is connected to the operator core network using either S2a or S2b interfaces) available in 3GPP networks since Release 8 and 2) RAN based integration in which the WLAN access is directly connected to RAN access nodes (eg. LWA or LWIP) available since Release 13. All of the above methods of integration assume a certain level of service continuity as well as the terminal devices being always under a licensed spectrum cellular coverage. Wh |
https://en.wikipedia.org/wiki/Sigreturn-oriented%20programming | Sigreturn-oriented programming (SROP) is a computer security exploit technique that allows an attacker to execute code in presence of security measures such as non-executable memory and code signing. It was presented for the first time at the 35th IEEE Symposium on Security and Privacy in 2014 where it won the best student paper award. This technique employs the same basic assumptions behind the return-oriented programming (ROP) technique: an attacker controlling the call stack, for example through a stack buffer overflow, is able to influence the control flow of the program through simple instruction sequences called gadgets. The attack works by pushing a forged sigcontext structure on the call stack, overwriting the original return address with the location of a gadget that allows the attacker to call the sigreturn system call. Often just a single gadget is needed to successfully put this attack into effect. This gadget may reside at a fixed location, making this attack simple and effective, with a setup generally simpler and more portable than the one needed by the plain return-oriented programming technique.
Sigreturn-oriented programming can be considered a weird machine since it allows code execution outside the original specification of the program.
Background
Sigreturn-oriented programming (SROP) is a technique similar to return-oriented programming (ROP), since it employs code reuse to execute code outside the scope of the original control flow.
In this sense, the adversary needs to be able to carry out a stack smashing attack, usually through a stack buffer overflow, to overwrite the return address contained inside the call stack.
Stack hopping exploits
If mechanisms such as data execution prevention are employed, it won't be possible for the attacker to just place a shellcode on the stack and cause the machine to execute it by overwriting the return address.
With such protections in place, the machine won't execute any code present in memory areas marked as writable and non-executable.
Therefore, the attacker will need to reuse code already present in memory.
Most programs do not contain functions that will allow the attacker to directly carry out the desired action (e.g., obtain access to a shell), but the necessary instructions are often scattered around memory.
Return-oriented programming requires these sequences of instructions, called gadgets, to end with a RET instruction. In this way, the attacker can write a sequence of addresses for these gadgets to the stack, and as soon as a RET instruction in one gadget is executed, the control flow will proceed to the next gadget in the list.
Signal handler mechanism
This attack is made possible by how signals are handled in most POSIX-like systems.
Whenever a signal is delivered, the kernel needs to context switch to the installed signal handler. To do so, the kernel saves the current execution context in a frame on the stack.
The structure pushed onto the stack is an architecture |
https://en.wikipedia.org/wiki/National%20Border%20Targeting%20Centre | The National Border Targeting Centre (NBTC) is a division and site of the Border Force in the United Kingdom, that collates and processes data on people entering and leaving the UK. It is the information-processing site that keeps track of migration into the UK. It operates 24 hours a day.
History
It was opened on Thursday 11 March 2010 by the UK Border Agency (UKBA). The e-Borders systems had been launched in May 2009, with Project Semaphore running as a prototype from 2004. It replaced the Joint Border Operations Centre (JBOC) at Heathrow, a much smaller site.
Structure
The site is run by the Home Office. It has around 200 staff in Wythenshawe, Manchester.
Function
Passengers on flights entering and leaving the UK are screened by the NBTC. The airlines pass data (passenger name record, or PNR) on each passenger to the NBTC, including date of birth. The NBTC tracks former flights taken by each individual going back up to a decade, and determines whether an individual's flight history could be suspicious. Each individual is checked against criminal record databases. Exit checks are conducted at ferry ports connecting to European ports by the ferry operators.
It looks at the e-Borders Semaphore system for suspects. It tracks around 250 million passenger movements per year. It operates the Pre-Departure Checks Scheme.
See also
Academic Technology Approval Scheme
Connect (computer system), HMRC system to detect black market employment in the UK
Office of Biometric Identity Management
Centaur, the information database held by HMRC
Timatic, international travel database
UK Visas and Immigration, partly headquartered in central Liverpool
References
2010 establishments in the United Kingdom
Border control
Borders of the United Kingdom
Criminal records databases
Government agencies established in 2010
Government buildings completed in 2010
Government databases in the United Kingdom
Law enforcement databases
Office buildings in Manchester
Travel technology
United Kingdom border control
Wythenshawe |
https://en.wikipedia.org/wiki/Super%20Watermelon%20Island | "Super Watermelon Island" is the first episode of the third season of American animated television series Steven Universe, which premiered on May 12, 2016 on Cartoon Network. It was written and storyboarded by Joe Johnston and Jeff Liu. The episode was viewed by 1.693 million viewers.
The episode resolves the threat of Malachite, established at the end of the first season. After astral projecting into one of the Watermelon Stevens and learning that they have founded a civilization on Mask Island, Steven finds Malachite on the island as well; he tells the Gems, who warp there and fuse into Alexandrite to defeat Malachite and break her fusion.
Plot
The episode begins with Steven (Zach Callison) waking up in the body of a Watermelon Steven, one of the sentient watermelons shaped like himself that he created in the first-season episode "Watermelon Steven". Steven sees that the Watermelon Stevens have created their own society on Mask Island, complete with homes, jobs and rituals. Steven's watermelon body is selected for one such ritual and led to the top of a cliff. Suddenly, Malachite (Kimberly Brooks and Jennifer Paz) rises up from the ocean and devours him whole.
Steven wakes up at his family's barn in his own body and tells Garnet (Estelle), Amethyst (Michaela Dietz), and Pearl (Deedee Magno Hall) that Malachite is active. They tell Steven to stay put with Peridot (Shelby Rabara) while they go to the island to fight Malachite. Steven astral-projects into another Watermelon Steven to help them.
On Mask Island, the Crystal Gems fuse into Alexandrite (Rita Rani Ahuja), and she and Malachite engage in battle. During the fight, Alexandrite accidentally destroys the warp pad the Crystal Gems used to teleport to the island.
As Malachite gains the advantage, Steven rallies the frightened Watermelon Stevens, who have taken refuge in a cave. The Watermelon Stevens arm themselves and march into battle.
Malachite immobilizes Alexandrite in a block of ice. Before she can finish her off, the Watermelon Stevens begin their assault, managing to down and distract Malachite for long enough for Alexandrite to free herself. As Malachite begins smashing the Watermelon Stevens, Alexandrite reengages in the battle. She soon gains the upper hand and defeats Malachite, who de-fuses into her component Gems, Lapis Lazuli and Jasper, both unconscious.
Alexandrite defuses herself back into an exhausted Garnet, Amethyst, and Pearl. They thank Steven and the Watermelon Stevens for their bravery and enjoy a brief moment of celebration; but suddenly, the island begins to tremble and a giant fissure forms across the beach. Amethyst manages to catch Lapis, but Jasper falls in. Garnet realizes that the earthquake portends the emergence of the Cluster, an underground geo-weapon that threatens to destroy the Earth, and tells Steven that he must drill to the Earth's core with Peridot to destroy the Cluster. As he begins to regain consciousness, the Gems remind Steven that they |
https://en.wikipedia.org/wiki/AI%20accelerator | An AI accelerator is a class of specialized hardware accelerator or computer system designed to accelerate artificial intelligence and machine learning applications, including artificial neural networks and machine vision. Typical applications include algorithms for robotics, Internet of Things, and other data-intensive or sensor-driven tasks. They are often manycore designs and generally focus on low-precision arithmetic, novel dataflow architectures or in-memory computing capability. , a typical AI integrated circuit chip contains billions of MOSFET transistors.
A number of vendor-specific terms exist for devices in this category, and it is an emerging technology without a dominant design.
History
Computer systems have frequently complemented the CPU with special-purpose accelerators for specialized tasks, known as coprocessors. Notable application-specific hardware units include video cards for graphics, sound cards, graphics processing units and digital signal processors. As deep learning and artificial intelligence workloads rose in prominence in the 2010s, specialized hardware units were developed or adapted from existing products to accelerate these tasks. Benchmarks such as MLPerf may be used to evaluate the performance of AI accelerators.
Early attempts
First attempts like Intel's ETANN 80170NX incorporated analog circuits to compute neural functions. Later all-digital chips like the Nestor/Intel Ni1000 followed. As early as 1993, digital signal processors were used as neural network accelerators to accelerate optical character recognition software.
Already in 1988, Wei Zhang et al. discussed fast optical implementations of convolutional neural networks for alphabet recognition.
In the 1990s, there were also attempts to create parallel high-throughput systems for workstations aimed at various applications, including neural network simulations. FPGA-based accelerators were also first explored in the 1990s for both inference and training. Smartphones began incorporating AI accelerators starting with the Qualcomm Snapdragon 820 in 2015.
Heterogeneous computing
Heterogeneous computing incorporates many specialized processors in a single system, or a single chip, each optimized for a specific type of task. Architectures such as the Cell microprocessor have features significantly overlapping with AI accelerators including: support for packed low precision arithmetic, dataflow architecture, and prioritizing throughput over latency. The Cell microprocessor has been applied to a number of tasks including AI.
In the 2000s, CPUs also gained increasingly wide SIMD units, driven by video and gaming workloads; as well as support for packed low-precision data types. Due to the increasing performance of CPUs, they are also used for running AI workloads. CPUs are superior for DNNs with small or medium-scale parallelism, for sparse DNNs and in low-batch-size scenarios.
Use of GPU
Graphics processing units or GPUs are specialized hardware for t |
https://en.wikipedia.org/wiki/Timeline%20of%20machine%20learning | This page is a timeline of machine learning. Major discoveries, achievements, milestones and other major events in machine learning are included.
Overview
Timeline
See also
History of artificial intelligence
Timeline of artificial intelligence
Timeline of machine translation
References
Citations
Works cited
Machine learning
Machine learning |
https://en.wikipedia.org/wiki/IBM%20ThinkPad%20T20%20series | The IBM ThinkPad T20 series was a series of notebook computers introduced in May 2000 by IBM as the successor of the 600 series and the first model of the T-series which exists today under Lenovo ownership. Four models were produced, the T20, T21, T22, and T23; the series was succeeded in May 2002 by the ThinkPad T30, but was produced until July 2003.
Features
The T20 series succeeded the 600 series, adding new features such as S-Video output, an Ethernet port, and the UltraBay 2000 hot-swappable bay. The graphics card was upgraded from the 4MB NeoMagic 256ZX which was used in the 600X, to an 8MB S3 Savage (16MB on T23 models) which was capable of rendering 3D graphics in hardware. The ThinkPad T23 was also the first ThinkPad laptop model to offer an optional WiFi connection via a Mini-PCI card, using wireless antennas which were built into the lid on select upper-end models.
The T20 series originally shipped with either Windows 98, Windows 2000, or Linux, with later T23 models shipping with Windows XP. All T20 models were capable of running Windows 3.x, Windows 95, Windows NT 4.0, OS/2 Warp 4, or Windows Me as well as various Linux distributions. Additionally, the T23 was capable of running Windows Vista or Windows 7, if equipped with at least 512MB of memory.
One common problem of the earlier T20 series was a hardware defect which caused the machine to suddenly stop working and begin blinking the hard drive and power indicators. The machine would not power on. This became known as the "Blink of Death". In addition, on some T23 models, the rear memory slot could fail, rendering the machine only able to use up to 512MB of memory, rather than 1GB. Another common issue with the T23 was that one of the coils, near the CPU, could break off the motherboard due to cold solder joints. This caused multiple issues, including the inability to boot or hard lockup/freeze.
Models
ThinkPad T20 - First model shipped, featured a Pentium III at 650, 700 or 750 MHz, all with SpeedStep technology. This model shipped with either a 13.3" XGA TFT or 14.1" XGA TFT display, and shipped with an external floppy drive, a swappable CD-ROM or DVD-ROM drive, and a choice of a 6GB, 12GB, or a 20GB hard drive. The T20 also had optional Ethernet (consumer installable via mini-PCI on all models), one USB 1.1 port, PC Card Slot, and an S-Video output as standard features, and shipped with 128MB of RAM (upgradeable to 512MB using PC100 SODIMMs)
ThinkPad T21 - Featuring an upgraded Pentium III processor at either 750 MHz, 800 MHz, or 850 MHz, the T21 featured either a 13.3" XGA TFT, 14.1" XGA TFT, or a new 14.1" SXGA+ TFT display (exclusive to 850 MHz models). This model shipped with a swappable CD-ROM or DVD-ROM drive, and a choice of a 10GB, 20GB or 32GB hard drive. The T21 features either a mini-PCI modem card or an Ethernet/modem combo card, one USB 1.1 port, PC Card Slot, and 128MB of RAM standard (upgradeable to 512MB using PC100 SODIMMs).
ThinkPad T22 - Featuring a |
https://en.wikipedia.org/wiki/List%20of%20facial%20expression%20databases | A facial expression database is a collection of images or video clips with facial expressions of a range of emotions.
Well-annotated (emotion-tagged) media content of facial behavior is essential for training, testing, and validation of algorithms for the development of expression recognition systems. The emotion annotation can be done in discrete emotion labels or on a continuous scale. Most of the databases are usually based on the basic emotions theory (by Paul Ekman) which assumes the existence of six discrete basic emotions (anger, fear, disgust, surprise, joy, sadness). However, some databases include the emotion tagging in continuous arousal-valence scale.
In posed expression databases, the participants are asked to display different basic emotional expressions, while in spontaneous expression database, the expressions are natural. Spontaneous expressions differ from posed ones remarkably in terms of intensity, configuration, and duration. Apart from this, synthesis of some AUs are barely achievable without undergoing the associated emotional state. Therefore, in most cases, the posed expressions are exaggerated, while the spontaneous ones are subtle and differ in appearance.
Many publicly available databases are categorized here. Here are some details of the facial expression databases.
References
Facial expressions |
https://en.wikipedia.org/wiki/Claudio%20Silva | Claudio Silva may refer to:
Cláudio Silva (born 1982), Brazilian mixed martial artist
Claudio Silva (computer scientist), Brazilian American computer scientist
Claudio Silveira Silva (1939–2007), Uruguayan sculptor
Cláudio Silva (footballer) (born 1998), Portuguese footballer |
https://en.wikipedia.org/wiki/Joseph%20A.%20Konstan | Joseph A. Konstan is an American computer scientist, the Distinguished McKnight University Professor and Distinguished University Teaching Professor at the University of Minnesota. His research interests are human computer interaction, social computing, collaborative information filtering, online communities and medical and health applications of Internet technology. He is best known for his work in collaborative filtering recommenders (the GroupLens project), and for his work in online HIV prevention.
He received the SIGCHI Lifetime Service Award in 2013.
References
University of California, Berkeley alumni
Harvard University alumni
University of Minnesota faculty
American computer scientists
Human–computer interaction researchers
Fellows of the Association for Computing Machinery
Fellow Members of the IEEE
Living people
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/Reza%20Zadeh | Reza Zadeh is an American-Canadian-Iranian computer scientist and technology executive working on machine learning. He is adjunct professor at Stanford University and CEO of Matroid. He has served on the technical advisory boards of Databricks and Microsoft.
His work focuses on machine learning, distributed computing, and discrete applied mathematics.
In Industry, to evaluate new ventures formed at the University of Toronto, Reza serves as a chief scientist of Machine Learning at the Rotman School of Management. His awards include a KDD Best Paper Award and the Gene Golub Outstanding Thesis Award at Stanford.
Work
Computer Vision
The Princeton University ModelNet challenge is an object recognition competition to classify 3D Computer-aided design models into object categories. In 2016, Matroid was a leader in this competition and the relevant neural networks were integrated into the Matroid product.
In a collaboration with his own doctor at Stanford hospital, Reza's research team created a neural network to automatically detect Glaucoma in 3D optical coherence tomography images of the eyeball. The net surpassed human doctor performance and is providing diagnostic hints at the hospital.
In 2016, Reza founded Matroid, inc to commercialize computer vision research by building a product for industries such as manufacturing and industrial sensors. Matroid raised $13.5 million from New Enterprise Associates, Intel, and others.
Distributed Machine Learning
Reza is a coauthor of Apache Spark, in particular its Machine Learning library, MLlib,. Through open source, Reza's work has been incorporated into industrial and academic cluster computing environments. He was an early technical advisor and employee at Databricks, the company commercializing Spark.
Recommender Systems
Reza created the machine learning algorithm behind Twitter's Who-To-Follow project and subsequently released it to open source. During that time he also led research tracking earthquake damage via machine learning, gaining wide media attention as an example of real-time social information flow.
Personal
Reza was born during the Iran–Iraq War in the under-siege city of Ahvaz. From there, his family emigrated to London, England where Reza grew up until age 17, after which he emigrated to Toronto, Canada, obtaining a degree from University of Waterloo. He frequently visited the US at age 18 to work on the Google Research team, and later moved to the US for a master's degree at Carnegie Mellon University and PhD at Stanford, all in Computer Science and Mathematics.
He holds three citizenships: Canadian, American, and Iranian. During confusion surrounding the 2017 travel ban, his pro-immigration stance stood as voice of protest to the Trump Administration's Anti-Immigration policies.
References
External links
Chinese translation of his PhD Dissertation by Xu Wenhao, November 2012
Website at Stanford
Year of birth missing (living people)
Living people
Stanford University alumn |
https://en.wikipedia.org/wiki/Jianwei%20Huang | Jianwei Huang (黄建伟, born 1978) is a Chinese computer scientist and electrical engineer. He is a Presidential Chair Professor and Associate Vice President (Institutional Development) of The Chinese University of Hong Kong, Shenzhen. He is also an Adjunct Professor in the Department of Information Engineering at the Chinese University of Hong Kong. He is a guest professor of Southeast University.
Education and career
Jianwei Huang was born in 1978 in Nanjing, Jiangsu, China. He attended Nanjing Foreign Language School during 1990–1996, and served as the President of the school's Student Union in 1995. He entered Southeast University in 1996, served as the Vice President (1996–1998) and President (1999) of the university's student union, and received his Bachelor of Engineering degree from the Department of Radio Engineering in 2000. He entered the Department of Electrical Engineering & Computer Science, Northwestern University in 2001, and received the master's degree in 2003 and the Ph.D. degree in 2005.
From 2005 to 2007, he worked as a postdoctoral research associate at the Department of Electrical Engineering, Princeton University. He joined the Department of Information Engineering at the Chinese University of Hong Kong as an Assistant Professor in 2007, and he was promoted to Associate Professor in 2013 and Full Professor in 2017. He is leading the Network Communications and Economics Lab (NECL). He joined The Chinese University of Hong Kong, Shenzhen, in Jan. 2019, as a Presidential Chair Professor.
Research
Huang's current research interests include both the fundamentals and the applications of network economics, including User-Provided Networks, Mobile Crowd Sensing, Mobile Data Offloading, WiFi Economics, Cognitive Radio and Dynamic Spectrum Sharing, and Smart Grid Economics.
He is the co-author of several books: "Wireless Network Pricing," "Monotonic Optimization in Communication and Networking Systems," "Cognitive Mobile Virtual Network Operator Games," "Social Cognitive Radio Networks," and "Economics of Database-Assisted Spectrum Sharing". He is the co-author of six ESI Highly Cited Papers in Computer Science. His Google Scholar citations have exceeded 13400 in July 2021.
Honors and awards
Huang's paper on auction based spectrum sharing was among the Best Readings of Economics of Cognitive Radio Networks. In 2011, he received the prestige IEEE Marconi Prize Paper Award in Wireless Communications. He and his collaborators were the recipients of Best (Student) Paper Awards in many international conferences, such as IEEE WiOpt 2013/2014/2015, IEEE SmartGridComm 2012, WiCON 2011, IEEE Globecom 2010, APCC 2009.
He received the Chinese University of Hong Kong Young Researcher Award for 2014–2015 and IEEE ComSoc Asia-Pacific Outstanding Young Researcher Award in 2009. During 2015–2018, he serves as a Distinguished Lecturer of IEEE Communications Society.
At the age of 37, "for contributions to resource allocation in wireless system |
https://en.wikipedia.org/wiki/Point-of-sale%20malware | Point-of-sale malware (POS malware) is usually a type of malicious software (malware) that is used by cybercriminals to target point of sale (POS) and payment terminals with the intent to obtain credit card and debit card information, a card's track 1 or track 2 data and even the CVV code, by various man-in-the-middle attacks, that is the interception of the processing at the retail checkout point of sale system. The simplest, or most evasive, approach is RAM-scraping, accessing the system's memory and exporting the copied information via a remote access trojan (RAT) as this minimizes any software or hardware tampering, potentially leaving no footprints. POS attacks may also include the use of various bits of hardware: dongles, trojan card readers, (wireless) data transmitters and receivers. Being at the gateway of transactions, POS malware enables hackers to process and steal thousands, even millions, of transaction payment data, depending upon the target, the number of devices affected, and how long the attack goes undetected. This is done before or outside of the card information being (usually) encrypted and sent to the payment processor for authorization.
List of POS RAM scraper malware variants
Rdasrv
It was discovered in 2011, and installs itself into the Windows computer as a service called rdasrv.exe. It scans for track 1 and track 2 credit card data using Perl compatible regular expressions which includes the customer card holder's name, account number, expiry date, CVV code and other discretionary information. Once the information gets scraped it is stored into data.txt or currentblock.txt and sent to the hacker.
Alina
It was discovered in October 2012 and gets installed into the PC automatically. It gets embedded into the Auto It script and loads the malware into the memory. Then it scrapes credit card (CC) data from POS software.
VSkimmer
Vskimmer scrapes the information from the Windows system by detecting the card readers attached to the reader and then sends the captured data to the cyber criminal or control server.
Dexter
It was discovered in December 2012 to steal system information along with the track 1 and track 2 card details with the help of keylogger installed onto the computer.
BlackPOS
It is a spyware, created to steal credit and debit card information from the POS system. BlackPOS gets into the PC with stealth-based methods and steals information to send it to some external server.
Backoff
This memory-scraping malware tracks Track 2 data to access the card magnetic stripe with the help of magnetic stripe readers and sends data to hacker to clone fake credit cards.
FastPOS
FastPOS Malware is a POS malware that was discovered by Trend Micro researchers. This strikes the point of sale system very fast and snatches the credit and debit card information and sends the data to the cyber criminal instantly. The malware has the capability to exfiltrate the track data using two techniques such as key logger and m |
https://en.wikipedia.org/wiki/Seshan | Seshan is a surname. Notable people with the surname include:
Srinivasan Seshan, American computer scientist and professor
N. K. Seshan (1927–1986), Indian politician
T. N. Seshan (1932–2019), Former Chief Election Commissioner of India
See also
Seshan, Russia, an abandoned village in Chukotsky District, Chukotka Autonomous Okrug |
https://en.wikipedia.org/wiki/Remote%20Control%20Productions%20%28German%20company%29 | Remote Control Productions GmbH (RCP; stylized in lowercase) is a Munich-based, independent games production house with a network of 14 development studios in Germany, Austria, Finland and Pakistan. It includes Chimera Entertainment, Stillalive Studios among others, having produced more than 350 projects such as Angry Birds Epic. The teams have shipped over 400 projects, including Premium and F2P games for Windows, Xbox, PlayStation, Switch, Mobile, VR and Web-based platforms since 2005.
History
In 2005, the production house was founded as ML Enterprises GmbH under the leadership of Hendrik Lesser and Marc Möhring.
Remote Control Productions' focus lies on the support of developers, publishers, corporations and institutions for mediation, realisation and production of game projects, as well as financing, consulting, development and coaching of start-ups and studios from the games industry.
In 2006, Lesser founded the developer studio Chimera Entertainment along with Alexander Kehr and Christian Kluckner, which meanwhile became the biggest studio of the Remote Control Productions developer network with more than 40 employees.
In September 2008, ML Enterprises was renamed to Remote Control Productions. In the same year, Remote Control Productions and Chimera Entertainment produced their first own game project: the real-time strategy game Windchaser (Windows).
In the meantime, Remote Control Productions co-founded under the aggregation of the RCP developer family further studios such as Brightside Games (2010), Wolpertinger Games (2010), it Matters Games (2012) and expanded the developer merger for the studios TG Nord (2012), Stillalive Studios (2012) and Zeitland (2012).
Remote Control Productions also established with GamesInFlames an own publishing company in 2010. In late 2014, the subsidiary GAMIFY now! was founded, which is specialized in "gamification" and serious games. Austrian developers DoubleSmith and REDOX Game Labs and the Nuremberg-based developer studio NeoBird are part of the Remote Control Productions developer family since 2014 and 2015, respectively. In the beginning of 2016, Remote Control Productions opened an office in Kotka, Finland with Jyri Partanen as managing director.
Produced games
From 2005 till 2007, Remote Control Productions supported Collision Studios' developer team during the development of the first-person shooter game Red Ocean, as well as the production of Legend: Hand of God with publisher dtp entertainment, and Crashday with publisher Atari Europe. In 2008, Remote Control Productions produced the real-time strategy game Windchaser (Windows) with Chimera Entertainment. In association with Bigpointe, Remote Control Productions and Chimera Entertainment developed the strategy game Warstory – Europe in Flames, a Microsoft Silverlight browser MMO that takes place in World War II.
Releases such as Coreplay's Ion Assault and Brightside Games' Zeit², as well as Chimera Entertainment's Happy Hills (iOS) and |
https://en.wikipedia.org/wiki/Texas%20Flip%20N%20Move | Texas Flip N Move is a show featured on DIY Network.
Premise
The show features professional home renovators who purchase older houses to flip for profit.
Unlike many renovation shows, the renovators only buy and sell houses (not the underlying land). At the initial auction, the renovators can only view the home from the outside and must also factor in costs of moving the house from the original lot to the renovation site. At the renovation site, the teams renovate the houses and sell them at auction. A typical episode consists of two of the teams each buying a house to renovate, with friendly competition as they each try to make more profit than the other team. The houses are usually sold with no land and the sale price normally includes the price of transportation to the buyer's property. Some episodes feature the teams moving houses to empty developments where they've purchased lots to set the houses on before renovation, occasionally putting more than one structure on each lot. In these cases, the land is sold along with the house(s) at the end of the process and the cost of the lot is added to the final tally of costs when calculating the profit. Unlike in similar shows, all of the participants know each other well and appear to all get along, so the episodes mostly depict friendly competition, albeit with some good natured ribbing. Some teams sometimes even help out other teams when asked.
Cast
Donna Snow King and Toni Snow Barksdale ("The Snow Sisters") (Season 1-present)
Randy Martin and Bleu Pride ("The Lone Wolf") (Season 1-present)
Myers Jackson (the selling auctioneer) (Season 1-present)
Casey Hester and Catrina Kidd (Seasons 4-present)
From Season 1 to Season 3, Casey, who is Cody's cousin moves houses for the Young Guns. Beginning in Season 3 he takes a more active role and moves and flips houses with the Young Guns. From season 4 onward, Casey partners with Catrina who was previously featured as a contractor for the Snow sisters and they continue on as business partners. Catrina's husband makes occasional appearances to help them out with projects.
"Gary's Girls" (Season 4-present)
Gary Snow is the brother of Donna and Toni; his four daughters (Donna and Toni's nieces) were featured in a Season 3 episode where they and the Snow Sisters each renovated a shipping container.
Paige and Raf. (Seasons 6-present)
Gary and Jerry (Seasons 7-present)
Cody Biffel (Foreman)
Cody and Suzi Slay ("The Young Guns") (Seasons 1-3)
H.D. "Daddy" Snow (occasional appearances)
Daddy Snow is the father of Donna, Gary, and Toni, and the grandfather of Gary's four daughters. In his 80s, he is still active in the house-moving business. He inherited a company created by his father C.A. Snow.
Steven Goode (Construction Foreman)
Series overview
See also
Louisiana Flip N Move
Alaska Flip N Move
References
External links
Official Website
2010 American television series debuts
English-language television shows
Home renovation television se |
https://en.wikipedia.org/wiki/Leticia%20Sabater | Leticia María Sabater Alonso (born in Barcelona, 21 June 1966) is a Spanish television presenter, actress and singer, who became known in the 1990s for her work in children's programming.
Biography
Family
She is the second of three daughters of the marriage between mining engineer Jorge Sabater de Sabatés and his wife María del Carmen Alonso Martínez-Cobo of Guzmán (1944– 17 October 2010 at the age of 66 years). Her sisters' names are Silvia and Casilda.
Televisión Española (TVE) (1986–1991)
Her debut in front of the cameras was in 1986 as "chica de figuración" in the program Un, dos, tres... responda otra vez. Later, she would appear as a hostess during the Vuelta a España alongside Gina o Lore. In 1989, she became a "chica Hermida" when she was joined Por la mañana, the program hosted by Jesús Hermida on Televisión Española.
In April 1990 she had the opportunity to present her first children's programming, No te lo pierdas ("Don't miss it"), with Enrique Simón. No te lo pierdas filled the gap in the programming left by Cajón desastre ("Grab bag"), by Miriam Díaz Aroca, and it remained on the air for a year. The show's representation changed the stereotypes of children's programs, since, according to some, its hosts had a cooler, more casual tone.
This same year she began a musical career with the launch of the single Tu vecina favorita, which was about the subject of the same name, and the song En tu casa o en la mía. The songs reached the 14th and 36th slots, respectively, in the list of Los 40 Principales. A year later, she recorded the children's album Nosotros somos el mundo ("We are the world"), with collaborations with stars like Marco and Sabater's previous co-stars Gina and Lore. Her second album, a younger cut, launched in 1993 under the title Leticia; in 1994 her third album, Leti Funk, came out. Her last album was Con Mucha Marcha, in 1997, which contained versions of classic children's songs like "la canción del colacao".
In 1991 she had a small experience interpreting on the Mariano Ozores series Taller mecánico.
Telecinco (1991–1995)
In September of that year she was signed by Telecinco and began one of her periods of greater popularity as a presenter of children's programs: Desayuna con alegría (1991–1993) y A mediodía, alegría (1992–1993), and Vivan los compis (1992).
She combined this work with other projects for the network, like Mañana serán estrellas (1993), with Carmen Sevilla and Manolo Escobar, and Campeones de la playa (1994).
Simultaneously, she debuted in the theatre with Mejor en octubre (1994), by Santiago Moncada, with Arturo Fernández.
TVE (1995–1999)
In 1995 her contract with Telecinco ended and she returned to TVE, to present again in a space targeted to the youngest viewers: the contest Lo que hay que tener, which was followed the next season by the presentation of the children's programming block Con mucha marcha, which remained until 1999.
Channel 7 TV (2002–2004)
In 2002 she exchanged younger |
https://en.wikipedia.org/wiki/List%20of%20fellows%20of%20the%20Association%20for%20Computing%20Machinery | This article lists people who have been named ACM Fellow, an award and fellowship granted by the Association for Computing Machinery (ACM) as its highest honorary grade of membership, reserved for ACM members who have exhibited "professional excellence" in their "technical, professional and leadership contributions" Since 1993, the people that have been elected as fellows are listed below:
Fellows
1994
James M. Adams
Frances E. Allen
Franz Leopold Alt
William F. Atchison
Richard H. Austing
Kenneth E. Batcher
C. Gordon Bell
Michael W. Blasgen
Danny Bobrow
David Reeves Boggs
Lorraine Borman
Charles L. Bradshaw
Daniel S. Bricklin
Frederick P. Brooks Jr.
Douglas K. Brotz
Richard R. Burton
Richard G. Canning
Walter M. Carlson
Vinton G. Cerf
Donald D. Chamberlin
Edgar F. Codd
Edward G. Coffman
Fernando J. Corbató
Harvey G. Cragon
Thomas A. D'Auria
Thomas A. DeFanti
Peter J. Denning
Jack B. Dennis
L Peter Deutsch
Edsger W. Dijkstra
J. Presper Eckert
Peter Elias
Gerald L. Engel
John H. Esbin
Bob O. Evans
Tse-Yun Feng
Aaron Finerman
Robert W. Floyd
Michael J. Flynn
Robert Frankston
Frank L. Friedman
Bernard A. Galler
C. W. Gear
Adele J. Goldberg
Calvin C. Gotlieb
Susan L. Graham
Jim Gray
Cordell Green
David Gries
Carl Hammer
Richard Hamming
David Harel
Fred H. Harris
Juris Hartmanis
Danny Hillis
John Hopcroft
Tom Hull
J. N. Hume
Harry Douglas Huskey
William Kahan
Ronald M. Kaplan
Richard M. Karp
Donald Knuth
David J. Kuck
Thomas Eugene Kurtz
Ray Kurzweil
Butler W. Lampson
Stephen S. Lavenberg
Joshua Lederberg
John A. Lee
Meir M. Lehman
Bruce G. Lindsay
Joyce Currie Little
Chung Laung Liu
M. Stuart Lynn
Herbert Maisel
Zohar Manna
John McCarthy
Edward J. McCluskey
Daniel D. McCracken
Paul R. McJones
A J Milner
Jack Minker
Roger Michael Needham
Peter G. Neumann
Monroe M. Newborn
John Kenneth Ousterhout
Susan S. Owicki
David Lorge Parnas
David A. Patterson
William B. Poucher
Anthony Ralston
Ronald L. Rivest
Azriel Rosenfeld
Jeff Rulifson
Jean E. Sammet
Dana Scott
Daniel Siewiorek
Herbert A. Simon
Barbara B. Simons
Martha E. Sloan
Donald R. Slutz
Burton J. Smith
Richard E. Stearns
Thomas B. Steel
Guy L. Steele
Harold S. Stone
Michael Stonebraker
William Strecker
Bjarne Stroustrup
Patrick Suppes
Gerald Sussman
Ivan Sutherland
Edward A. Taft
Robert E. Tarjan
Robert William Taylor
Charles P. Thacker
Irving L. Traiger
Joseph Traub
Allen B. Tucker
Andries van Dam
Willis Howard Ware
Stuart Wecker
Ben Wegbreit
Eric A. Weiss
David John Wheeler
Maurice Vincent Wilkes
Shmuel Winograd
Niklaus Wirth
Seymour J. Wolfson
William Allan Wulf
L. A. Zadeh
1995
Paul W. Abrahams
Robert L. Ashenhurst
Alan H. Barr
Lawrence Bernstein
Grady Booch
David H. Brandin
Richard P. Brent
Loren C. Carpenter
Edwin Catmull
Robert Lee Constable
Dorothy E. Denning
David J. DeWitt
Larry E. Druffel
Erwin Engeler
Stuart I. Feldman
Henry Fuchs
Zvi Galil
M. R. Garey
Myron Ginsberg
John B. Goodenough
Donald P. Greenberg
Herbert R. J. Grosch
Bertram Herzog
Harold J. Highland
Lance J. Hoffman
Oscar |
https://en.wikipedia.org/wiki/Zegel%20%28Antwerp%20premetro%20station%29 | Zegel is a station on the Antwerp premetro network, opened on 18 April 2015. It lies under the Turnhoutsebaan near the crossing with the Sint-Jansstraat, in the Borgerhout district and is served by tram routes 8 and 10.
Current situation
It is the last station in the eastern premetro tunnel before it splits into a northern and a more southerly trajectory. The station consequently has two 60-metre long platforms, lying one above the other, the deeper of which is for outward trams, away from the city centre.
The station can be entered by a 200-metre long entrance hall, and two above-ground entrances, one near the Zegelstraat crossing, the other near the Sint-Janstraat crossing.
History
For more than thirty years, it was one of the ghost stations in the unopened eastern axis of the premetro network under the Carnotstraat and Turnhoutsebaan, also called the Reuzenpijp. Works started in 1977, but due to budgetary problems, construction works on the premetro tunnel had to be stopped in 1981, and could not be resumed in the following years, leaving the station unused, with most of its infrastructure already finished. The station was originally intended for use by routes 10 and 24, which used the above ground tracks on the Turnhoutsebaan.
On 3 April 2008, minister of public works Hilde Crevits answered in response to a parliamentary question from Ludwig Caluwé that either Drink or Zegel station would be opened as a part of the Pegasusplan, which included the opening of the eastern premetro axis between Astrid station and its southern entrance at the Herentalsebaan. Eventually, it was decided to open Zegel station, because of its better connection possibilities with other bus and tram routes in the local public transport network.
On 19 December 2012 the Flemish government ratified the LIVAN project, which included the opening of the eastern premetro tunnel, Zegel station, and an above ground tram extension to Wommelgem, to be financed as a public–private partnership, as proposed by minister of mobility and public works Hilde Crevits. In March 2013, works on the LIVAN project started.
On 18 April 2015, both the eastern premetro tunnel and Zegel station were officially opened. Since then the station has been served by the newly created tram route 8, running between Astrid station near Antwerp central station, and the Wommelgem P+R.
On 18 April 2017 tram route 10 joined route 8 in the Reuzenpijp. This was originally planned for 3 June, coinciding with the opening of the western tunnel entrance of the Reuzenpijp, but was sped up by growing delays due to major traffic works above ground.
Since 16 September 2017, the opening of the north-eastern tunnel entrance of the Reuzenpijp near Foorplein is used by route 10.
References
External links
www.delijn.be, the operator of all public city transport in Antwerp and Flanders.
Antwerp Premetro
Railway stations opened in 2015
2015 establishments in Belgium |
https://en.wikipedia.org/wiki/Ringzug | The Ringzug ("ring train"), also called the 3er-Ringzug ("ring train of the 3") is a passenger transport network in the districts of Tuttlingen, Rottweil and Schwarzwald-Baar in southern Baden-Württemberg, Germany. The Ringzug went into regular operations on 31 August 2003 and has operated in its current form since 12 December 2004. The concept of the Ringzug is the operation of a clockface timetable, coordinated with a variety of other buses and train services, over an S-Bahn-like network in a rural environment. In March 2006, the passenger association Pro Bahn described the Ringzug as an exemplary public transport system at its 2006-passenger transport awards (Fahrgastpreis 2006). The Ringzug has aroused interest beyond the region and can point to steadily rising passenger numbers and declining deficits.
Name
The term Ringzug was chosen because its route was originally intended to form a ring, but it is interrupted by the gap between Immendingen and Donaueschingen. The network also includes lines that are not part of the ring. These include the Trossingen Railway and parts of the Breg Valley Railway, the Wutach Valley Railway and the Tuttlingen–Inzigkofen railway. The alternative term 3er-Ringzug indicates that three districts participate in the project.
History
The majority of stations in the Ringzug area were skipped in the 1970s and 1980s due to the implementation of Deutsche Bundesbahn's so-called eilzugmäßigen (semi-fast running) of regional services. On the 28 kilometre-long section of the Plochingen–Immendingen railway (part of the Gäubahn) between Tuttlingen and Rottweil, Spaichingen was the only remaining stop. No train stopped even in Aldingen, which had 7,500 residents.
Passenger services on the Marbach–Bad Dürrheim railway were abandoned in 1953, the abandonment of passenger services on the Heuberg Railway followed in 1966 and the northern section of the Wutach Valley Railway from Lauchringen to Zollhaus-Blumberg had no scheduled passenger traffic from 1967. After 1972, this was also true for the Breg Valley Railway. Even the Trossingen Railway would have been completely shut down if a decision taken by the Trossingen council in 1996 had been implemented.
In the area of Upper Danube Nature Park between Tuttlingen and Fridingen, the "Danube Valley" model was launched in September 1990 by the district of Tuttlingen to reverse some of the displacement of school transport from rail. Otherwise, public transport in the region was largely focused on school bus services.
As a result of this withdrawal of services from the area, the Schwarzwald-Baar-Heuberg area had no regional connections, except on long-distance services. On the Black Forest Railway, in addition to the express trains, an InterRegio service ran at two-hour intervals between Hamburg and Konstanz. On the Plochingen–Immendingen railway, express trains (Durchgangszug or later EuroCity services) ran from Stuttgart via Zurich to Italy. There were also long-distance passen |
https://en.wikipedia.org/wiki/New%20Masquerade | The New Masquerade was a Nigerian sitcom that aired on the Nigerian Television Network on Tuesday nights from 8:30pm – 9:00pm during the 1980s until the mid-1990s. It was created and written by James Iroha who also acted in the sitcom. It is one of Nigeria's longest running sitcoms. The TV show started out as radio program known as The Masquerade transmitted on the East Central State Broadcasting Corporation, Enugu.
Synopsis
The show started out a segment called Masquerade aired on In the Lighter Mood, radio program of the East Central Broadcasting Corporation. It was created after the civil war as a means to bring laughter to the homes of citizens after the devastation caused by the Nigerian Civil War. The creator was James Iroha who also played Giringori on the TV show.
The protagonist of the show is Chief Zebrudaya, a World War II veteran who has visited various foreign countries and he is perceived by other characters to have attained some level of sophistication and enlightenment. Many of the shows' plot take place in Zebrudaya's sitting room. Zebrudaya has a wife, Ovuleria, a daughter, Philo and two houseboys, Clarus and Giringori. Though a comedy, the show also incorporate melodramatic plots about teaching morals and the consequences of some of society's problems if they are not corrected.
Cast and characters
Chika Okpala as Zebrudaya - also known by his alias 4:30 is a domineering husband; he has a range of experience as an ex-serviceman and resident in foreign countries. He uses a mixture of Queens English, Igbo language and Pidgin English as a means of communication
Lizzy Evoeme as Ovuleria - Zebrudaya's submissive wife who takes care of the house and engages in petty trading
Claude Eke as Jegede Sokoya - Zeburudaya's friend whose arrogance and the quest for easy money is a source of conflict between him and the more honest Zeburudaya. He calls himself a doctor and the youngest millionaire in the universe. He likes to demonstrate his ability to speak in Queens English by using a bombast or pretentious style of speaking, albeit with a thick Yoruba accent.
James Iroha as Giringory Akabogu - Houseboy, speaks in Pidgin English. Iroha was also the creator of the sitcom.
Christy Essien-Igbokwe as Apena - Sokoya's wife.
David Ofor as Clarus - Giringory's fellow houseboy
References
Nigerian comedy television series
Nigerian Television Authority original programming |
https://en.wikipedia.org/wiki/Cyberjaya%20Utara%20MRT%20station | The Cyberjaya Utara MRT station, or Cyberjaya Utara–Finexus station due to sponsorship reasons (Working name: Cyberjaya North) is a mass rapid transit (MRT) station that is part of MRT Putrajaya Line. It is one of the two train stations that serve the city of Cyberjaya, the other being Cyberjaya City Centre station.
Location
The elevated station is located along Persiaran APEC on the outskirts of Cyberjaya, approximately 5 km from the actual city centre. The nearest residential and commercial complex, Skypark @ Cyberjaya, is located opposite the station.
Facilities
Facilities equipped at the station include:
Park and ride
Toilets
Muslim prayer rooms
Lifts
Escalators
Bus Services
Feeder buses
References
External links
Cyberjaya North MRT Station | mrt.com.my
Klang Valley Mass Rapid Transit
MRT Hawk-Eye View
Rapid transit stations in Selangor
Sungai Buloh-Serdang-Putrajaya Line |
https://en.wikipedia.org/wiki/Cyberjaya%20City%20Centre%20MRT%20station | The Cyberjaya City Centre MRT station, or Cyberjaya City Centre–Limkokwing station due to sponsorship reasons, is a mass rapid transit (MRT) station. It is one of two train stations that serves the town of Cyberjaya, the other being Cyberjaya Utara. It is one of the stations as part of the Klang Valley Mass Rapid Transit (KVMRT) project on the MRT Putrajaya Line.
Location
Despite its name, the station is not located in Cyberjaya's central business district; but rather on its eastern boundary. This station is located near Limkokwing University of Creative Technology, though access to the university is not possible via walking. Feeder buses, e-hailing or taxi are required to access the rest of Cyberjaya.
Bus Services
Feeder buses
References
External links
Cyberjaya City Centre MRT station | mrt.com.my
Klang Valley Mass Rapid Transit
MRT Hawk-Eye View
Rapid transit stations in Selangor
Sungai Buloh-Serdang-Putrajaya Line |
https://en.wikipedia.org/wiki/Elivagar%20Flumina | Elivagar Flumina is a network of river channels ranging from 23 km to 210 km in length in the region around the Menrva Crater of Titan. The channel system is at least 120 km wide and shows signs of erosion. At its mouth, an alluvial fan is present. The Elivagar Flumina is interpreted as alluvial due to its closeness to fluvial valleys and as understood from the radar backscatter. Geomorphologic mapping of the Menrva region of Titan has yielded evidence for exogenic processes such as hydrocarbon fluid channelization (in other words flash floods) that are thought to have formed the Flumina network.
The Elivagar Flumina is named after the Élivágar, a group of poisonous ice rivers in Norse mythology.
References
Surface features of Titan (moon) |
https://en.wikipedia.org/wiki/List%20of%20Apple%20operating%20systems | The following is a list of operating systems released by Apple Inc. As of 2023, there are six supported software platforms: iOS, iPadOS, watchOS, tvOS, macOS and visionOS.
Prior to the introduction of the Macintosh in early 1984, Apple had several operating systems for the Apple II series, Apple SOS for the Apple III series, and Lisa OS and MacWorks XL for the Apple Lisa series; those were introduced between 1977 and 1983.
The original operating system for the Macintosh was the classic Mac OS, which was introduced in early 1984 as System Software. In 1997, System Software was renamed to Mac OS.
In 1999, Mac OS X Server 1.0 was released, followed by Mac OS X 10.0, the first consumer release of the Mac OS X.
From the release of Mac OS X 10.0 until early 2007, Mac OS X was the only software platform. In early 2007, iPhone OS was introduced, increasing the number of software platforms by one, from one to two. In 2010, iPhone OS was renamed to iOS. In 2011, Mac OS X was renamed to OS X. In early 2015, the number of software platforms rose by one, from two to three, as watchOS was introduced. In late 2015, tvOS was introduced, increasing the number of software platforms again by one, from three to four. In 2016, OS X was renamed to macOS. In 2019, iPadOS was introduced as the derived version of iOS for iPad, increasing the number of software platforms again by one, from four to five. In 2020, macOS received an increment in its version, from 10 to 11. In 2023, the number of software platforms rose again by one, from five to six, as visionOS was introduced.
Apple computers
Apple II
Apple DOS is the first operating system for Apple computers.
Apple ProDOS
Apple GS/OS
Apple III
Apple SOS
Apple Lisa
Lisa OS
MacWorks XL
Macintosh computers
Classic Mac OS
System 1
System 2
System 3
System 4
System Software 5 – also marketed as System 5
System Software 6 – also marketed as System 6
System 7 – System 7.5.1 was the first to refer to itself as Mac OS, Mac OS 7.6 was the first to be branded as "Mac OS"
Mac OS 8
Mac OS 9 – Mac OS 9.2.2 was the last version of Classic Mac OS
Mac OS X / OS X / macOS
macOS was initially called Mac OS X and later OS X.
Mac OS X Public Beta – code name Kodiak
Mac OS X 10.0 – code name Cheetah
Mac OS X 10.1 – code name Puma
Mac OS X 10.2 – also marketed as Jaguar
Mac OS X Panther – 10.3
Mac OS X Tiger – 10.4
Mac OS X Leopard – 10.5
Mac OS X Snow Leopard – 10.6
Mac OS X Lion – 10.7 – also marketed as OS X Lion
OS X Mountain Lion – 10.8
OS X Mavericks – 10.9 (free)
OS X Yosemite – 10.10 (free)
OS X El Capitan – 10.11 (free)
macOS Sierra – 10.12 (free)
macOS High Sierra – 10.13 (free)
macOS Mojave – 10.14 (free)
macOS Catalina – 10.15 (free)
macOS Big Sur – 11 (free)
macOS Monterey – 12 (free)
macOS Ventura – 13 (free)
macOS Sonoma – 14 (free)
macOS Server
macOS Server was initially called Mac OS X Server and later OS X Server.
Mac OS X Server 1.0 – code name Hera, also referred to |
https://en.wikipedia.org/wiki/Groote | Groote is a Dutch surname. Notable people with the surname include:
Geert Groote (1340–1384), Dutch Roman Catholic deacon and theologian
Jan Friso Groote (born 1965), Dutch computer scientist
Matthias Groote (born 1973), German politician
See also
De Groote
De Groot
Dutch-language surnames |
https://en.wikipedia.org/wiki/Ji%20Hee%20Kim | Ji Hee Kim is an Antarctic researcher, best known for being the Principal Investigator for comprehensive environmental monitoring and construction of the long term environmental database at South Korea's King Sejong Station.
Early life and education
Kim received her BSc in biology at Mokpo National University in 1991 and her MSc in biology at Seoul National University in 1993, and a PhD at the same university in 2000. She started her research work at the Korea Polar Research Institute (KOPRI) in 1998 before she completed her PhD. She has been a key member of the polar ecology laboratory at KOPRI.
Career and impact
Kim has led many projects at KOPRI, particularly after the construction of Jang Bogo Station, South Korea's second Antarctic research station. Kim was a key member of the expedition team searching for the proper site and later Principal Investigator for the preparation for the Comprehensive Environmental Evaluation. She is the Principal Investigator for comprehensive environmental monitoring and construction of a long term environmental database in the King Sejong Station.
Awards and honours
Kim was awarded a KOPRI medal in 2005 and 2010. She was also awarded the Ministerial Award of Land Transport and Maritime Affairs in 2012.
Selected works
Y-J Jung, Y M Lee, K Baek, C Y Hwang, Y Cho, S G Hong, J H Kim, H K Lee 2015. Algibacter psychrophilus sp. nov., a psychrophilic bacterium isolated from marine sediment. International Journal of Systematic and Evolutionary Microbiology 65(6) 1735-1740.
K Baek, Y M Lee, C Y Hwang, H Park, Y-J Jung, M-K Kim, S G Hong, J H Kim, H K Lee. 2015. Psychroserpens janbogonensis sp. nov., apsychrophilic bacterium isolated from Antarctic marine sediment. International Journal of Systematic and Evolutionary Microbiology. 65(1): 183-188.
M Kim, A Cho, H S Lim, S G Hong, J H Kim, J Lee, T Choi, T S Ahn, O-S Kim. 2015. Highly heterogeneous soil bacterial communities around Terra Nova Bay of Northern Victoria Land, Antarctica. PLoS ONE
J.H. Kim, M.D. Guiry, J.-H. Ok, H. Chung, H.-G. Choi. 2008. Phylogenetic relationships within the tribe Janieae (Corallinales, Rhodophyta) based on molecular and morphological data: A reappraisal of Jania. Journal of Phycology Vol. 43. 1310-1319.
J.H. Kim, I.-Y. Ahn, K.S. Lee, H. Chung, H.-G. Choi. 2007. Vegetation of Barton Peninsula in the neighbourhood of King Sejong Station (King George Island, maritime Antarctic). Polar Biology 30, 903-916.
H.W. Seo, J.Y. Kee, Y.E. Park, S.-H. Kang, H. Chung, & J.H. Kim. 2006. Multiple Shoot Induction from Radicle-derived Callus and in Vitro propagation of Silene Acaulis Subsp. arctica. Plant Biotechnology society. 33(4), 303-307.
J.H. Kim et al. 2006. Lichen flora around the Korean Antarctic scientific station, King George Island, Antarctic. Microbiology. Vol. 30, 903-916.
References
Living people
21st-century South Korean women scientists
Seoul National University alumni
Antarctic scientists
Women Antarctic scientists
21st-centur |
https://en.wikipedia.org/wiki/NBA%20Finals%20television%20ratings | This is a list of television ratings for NBA Finals in the United States, based on Nielsen viewing data. The highest rated and most watched NBA Finals series was the 1998 NBA Finals between the Chicago Bulls and Utah Jazz, which averaged an 18.7 rating / 33 share and 29.04 million viewers on NBC. That series also featured the highest rated and most watched NBA Finals game, as the Sunday night averaged a 22.3 rating / 38 share and 35.89 million viewers. The 1987 NBA Finals between the Los Angeles Lakers and Boston Celtics was the highest rated and most watched NBA Finals series on CBS, averaging a 15.9 rating / 32 share and 24.12 million viewers. Game 7 of the 1988 NBA Finals registered the network's highest rated and most watched NBA game with a 21.2 rating / 37 share
The 2015 NBA Finals between the Golden State Warriors and Cleveland Cavaliers was the highest rated NBA Final series on ABC averaging an 11.6 rating / 21 share and 19.94 million viewers. The 2017 NBA Finals featuring the same two teams was the most watched NBA Final series on ABC averaging an 11.3 rating / 22 share and 20.38 million viewers. Game 7 of the 2016 NBA Finals registered the network's highest rated and most watched NBA game with an average 15.8 rating / 29 share and 31.02 million viewers. It was the first basketball game to draw more than 30 million average viewers in 18 years, and only the seventh non-NFL sports telecast (excluding the Olympics) to have done so since 1998.
The 2019 NBA Finals between the Golden State Warriors and the Toronto Raptors had a drop in American viewership. Analysts cited the presence of a Canadian team (Canadian viewership does not count towards U.S. Nielsen ratings, leading to only one U.S. home market being reflected in viewership), as a factor in the drop. At the same time, the presence of the Toronto Raptors in the NBA Finals boosted Canadian viewership to record levels.
For the 2020 NBA Finals, the ratings dropped to a historic low, with one of the games drawing only 5.9 million viewers. The average viewers figure over 6 games was 7.5 million, which is a 51% decline from the previous year. Some have claimed this was due to the players' political activism; others have claimed this was due to the finals being played out of season caused by the COVID-19 pandemic even though more audience stayed at home, as other sports such as the NHL playoffs and the MLB playoffs also showed a significant decline in ratings.
Single game superlatives (1987–present)
Highest rated
1998 Game 6 – 22.3
1988 Game 7 – 21.5
1993 Game 6 – 20.3
Lowest rated
2020 Game 3 – 3.1
2020 Game 2 – 3.6
2020 Game 1 – 4.1
Most watched
1998 Game 6 – 30.856 million
1993 Game 6 – 45.878 million
2016 Game 7 – 40.002 million
Least watched
2020 Game 3 – 5.94 million
2020 Game 2 – 6.61 million
2020 Game 1 – 7.41 million
Game-by-game breakdown by year (1974–present)
Figures are expressed as Rating/Share. Rating represents the percentage of US TV households that wa |
https://en.wikipedia.org/wiki/DiskSpd | DiskSpd is a free and open-source command-line tool for storage benchmarking on Microsoft Windows that generates a variety of requests against computer files, partitions or storage devices and presents collected statistics as text in the command-line interface or as an XML file.
Overview
The command supports physical and virtual storage including hard disk drive (HDD), solid state devices (SSD), and solid state hybrid drives (SSHD). It provides control over the testing methods, duration, threads, queues, IO and processor affinity, and reporting.
DiskSpd works on desktop versions of Windows 7, Windows 8, Windows 8.1, Windows 10, as well as Windows Server 2012, Windows 2012 R2, and Windows Server 2016.
It is licensed under MIT License and the source code is available on GitHub.
Example
Benchmark two drives (C: and E:) using a 100 MB test file, and run the test for a duration of 60 seconds (the default is 10).
C:\>diskspd -c100M -d60 c: e:
See also
Iometer
ProcDump
References
External links
TechNet DiskSpd: A Robust Storage Performance Tool
Using Microsoft DiskSpd to Test Your Storage Subsystem
Command-line software
Benchmarks (computing)
Free software programmed in C++
Microsoft free software
Software using the MIT license
Storage software
Utilities for Windows |
https://en.wikipedia.org/wiki/Lemmings%20%282006%20video%20game%29 | Lemmings is a 2006 video game developed by Team17 and published by Sony Computer Entertainment. It is a remake of the original Lemmings released in 1991.
The game has been released in slightly different versions for PlayStation Portable, PlayStation 2, and PlayStation 3.
Gameplay
The PSP version featured all 120 levels from the original game, 36 brand new levels as well as expansion pack support, and a user level editor. Every level in the game was a pre-rendered 3D landscape, although their gameplay was still 2D and remains faithful to the original game. User levels could be constructed from pre-rendered objects and distributed by uploading them to a PlayStation-specific Lemmings online community.
In October 2006 the game was ported by developer Rusty Nutz for the PlayStation 2 with use of the EyeToy. While being recorded by the EyeToy, players stretch and move their limbs to aid the lemmings. In 2007, Team17 produced a similar remake of Lemmings for the PlayStation 3 for download through the PlayStation Network. The game had the similar graphical improvements as the PSP title, as well as online scoreboards and additional levels developed for high-definition display, but lacked the ability to create and share levels as the PSP version offered.
Reception
The PSP version received generally positive reviews, whereas the PS3 version of the game attained mostly mixed reviews. The PSP version holds a Metacritic score of 76/100 based on 46 critics, indicating "generally favorable reviews". The PS3 version holds a Metacritic score of 59/100 based on 8 critics, indicating "mixed or average reviews".
IGN gave the PSP version of the game 7.8/10, praising the graphics and the enhanced longevity given by the editor, but criticizing the unexciting sound. The PS3 version received a score of 7.5/10, with the comment "It doesn't reinvent the wheel, but it rolls just fine."
GameSpot gave the PSP version of the game 8/10, praising the polished visuals and audio, the level designer and the online sharing feature. The PS3 version received a slightly lower score because of it missing the level editor and level sharing of the PSP version.
Notes
References
External links
2006 video games
PlayStation 3 games
PlayStation 2 games
PlayStation Network games
PlayStation Portable games
Lemmings games
Video games developed in the United Kingdom
Video games scored by Tim Follin
Team17 games
Video game remakes
Sony Interactive Entertainment games |
https://en.wikipedia.org/wiki/Artprice | Artprice () is a French online art price database that houses millions of art auction records from over 800,000 artists from sales since the 1980's. The database was created by its now CEO Thierry Ehrmann in 1987.
History
Created in 1987 by Thierry Ehrmann, Artprice is a subsidiary company of the Server Group (Groupe Serveur in French). Its website aims to list all artwork from the 17th century to contemporary pieces.
In 2004, Artprice launched a fixed price marketplace for artwork that later led to the creation of an online auction service.
In 2010, Christie's arts auction house sued Artprice for copyright violation of its digital catalog, claiming 63 million euros in commercial prejudice.
In 2014, Artprice redesigned its website and mobile applications and launched a premium fixed price marketplace service.
In February 2015, Artprice executives announced they were seriously considering a merger between an American auction house and their own American subsidiary, Artmarket.com. Later that same year, Artprice denied rumors about their intention to acquire Artnet.com.
Activities
Artprice Images allows unlimited access to a worldwide collection of artworks, counting over 108 million images constantly updated from various auction houses. The company continuously publishes trends in relation to the art market for major art agencies as well as 6300 newspapers worldwide through its press agency, Art Market Insight.
Artprice now counts over 2 million registered users and is traded on NYSE Euronext.
References
External links
The Server Group website
Companies listed on Euronext Paris
French auction houses
Companies based in Auvergne-Rhône-Alpes |
https://en.wikipedia.org/wiki/Shelly%20Knotts | Shelly Knotts is a composer, performer and improvisor of live electronic, live coded and network music based in Newcastle upon Tyne, England. She performs internationally, often using Live coding techniques, and a range of styles including Noise, Drone and Algorave.
She often collaborates on performance, including a PRS for Music commission with Annie Mahtani, an audio/visual collaboration Sisesta Pealkiri with Alo Allik, uiaesk! with Holger Ballweg, Algobabez with Joanne Armitage, and as part of the Birmingham Laptop Ensemble. Her work often has a political dimension, using network music to explore social structures, and live coding to explore failure as an alternative to virtuosity, as well as exploring and encouraging diversity through workshops and hackathons. Knotts has also engaged with computer science in schools, through a Sonic Pi commission and BBC Live lesson.
Knotts is also active in event curation, including organising several Algorave events in Newcastle, three editions of the international Network Music Festival, chairing the Live Coding and Collaboration symposium in 2014, and chairing the artistic programme of the International Conference on Live coding in 2015. She was recognised as part of the Sound and Music New Voices cohort in 2014-2015, which aims to raise the profile for artists who exist outside of the support of commercial publishers or record companies, although she has been published by Leonardo Music Journal, ChordPunch, and Absenceofwax. In 2018 she completed a PhD in Live Computer Music at Durham University, supervised by Nick Collins and Peter Manning, with funding from the Department of Music and Hatfield College. She is currently a postdoctoral associate at the same institution.
References
External links
http://datamusician.net/ - official webpage
http://networkmusicfestival.org/ - Network Music Festival
Live coding
Living people
Algorave
Year of birth missing (living people)
Alumni of Hatfield College, Durham
Musicians from Newcastle upon Tyne |
https://en.wikipedia.org/wiki/List%20of%20Criminal%20Minds%3A%20Beyond%20Borders%20episodes | Criminal Minds: Beyond Borders is an American police procedural that debuted on CBS on March 16, 2016. The series is a spin-off of another series Criminal Minds aired on the same network, and is the third show in the Criminal Minds franchise. Criminal Minds: Beyond Borders follows an elite team of profilers and agents from the FBI's International Response Team (IRT). This team solves cases that involve American citizens in trouble on international soil. CBS aired a backdoor pilot on an episode of Criminal Minds on April 8, 2015, introducing the characters with a crossover episode eponymously titled "Beyond Borders". The series follows special agents Jack Garrett, Clara Seger, Matthew Simmons, Russ Montgomery and Mae Jarvis. On May 16, 2016, CBS renewed the series for a second and final season, which premiered on March 8, 2017.
A total of 26 episodes of Criminal Minds: Beyond Borders aired over two seasons.
Series overview
Episodes
Backdoor pilot (2015)
The program and its characters are introduced during the tenth season of Criminal Minds. The Criminal Minds episode, "Beyond Borders", served as a backdoor pilot episode for the show.
Season 1 (2016)
Season 2 (2017)
Home releases
References
Criminal Minds: Beyond Borders
Episodes |
https://en.wikipedia.org/wiki/Stefan%20Karpinski | Stefan Karpinski is an American computer scientist known for being a co-creator of the Julia programming language. He is an alumnus of Harvard and works at Julia Computing, which he co-founded with Julia co-creators, Alan Edelman, Jeff Bezanson, Viral B. Shah as well as Keno Fischer and Deepak Vinchhi.
He received a B.A. in mathematics from Harvard in 2000, and has completed much of the work on a PhD in computer science from UCSB with research on modeling local area network traffic. He is one of the four main authors of core academic papers on Julia. He speaks regularly on Julia at industry events on scientific computing, programming languages, and data science.
In 2006, Karpinski participated in the Subway Challenge, holding for some time the Guinness World Record for the fastest transit stopping at all New York City Subway stations.
Awards
In 2019, Stefan Karpinski was awarded the J. H. Wilkinson Prize for Numerical Software with Jeff Bezanson and Viral B. Shah for their work on the Julia programming language.
See also
Timeline of programming languages
Julia programming language
Jeff Bezanson
Alan Edelman
Keno Fischer
Viral B. Shah
References
Year of birth missing (living people)
Living people
Harvard University alumni
American computer scientists
University of California, Santa Barbara alumni |
https://en.wikipedia.org/wiki/Dianne%20P.%20O%27Leary | Dianne Prost O'Leary (born 1951) is an American mathematician and computer scientist whose research concerns scientific computing, computational linear algebra, and the history of scientific computing. She is Distinguished University Professor Emerita of Computer Science at the University of Maryland, College Park, and is the author of the book Scientific Computing with Case Studies (SIAM, 2009).
Early life and education
O'Leary was born November 20, 1951, in Chicago.
She majored in mathematics at Purdue University, graduating in 1972,
and completed her Ph.D. in computer science at Stanford University in 1976. Her dissertation, Hybrid Conjugate Gradient Algorithms, was supervised by Gene H. Golub.
Career
After taking an assistant professorship in mathematics at the University of Michigan, she moved to Maryland in 1978, with a joint appointment in computer science and the Institute for Physical Science and Technology. She also became affiliated with Maryland's applied mathematics program in 1979, and became a member of Maryland's Institute for Advanced Computer Studies in 1985. She became Distinguished University Professor in 2014, the same year that she retired.
From 2009 to 2015 she was editor in chief of the SIAM Journal on Matrix Analysis and Applications.
Recognition
The University of Waterloo gave O'Leary an honorary doctorate in 2005. She was named a Fellow of the Association for Computing Machinery in 2006, "for mentoring activities and contributions to numerical algorithms", and became one of the inaugural Fellows of the Society for Industrial and Applied Mathematics (SIAM) in 2009. In 2008 she was the Sonia Kovalevsky Lecturer of SIAM and the Association for Women in Mathematics.
References
External links
Home page
Google scholar profile
1951 births
Living people
American computer scientists
20th-century American mathematicians
21st-century American mathematicians
American women computer scientists
American women mathematicians
Purdue University alumni
Stanford University alumni
University of Michigan faculty
University of Maryland, College Park faculty
Fellows of the Society for Industrial and Applied Mathematics
Fellows of the Association for Computing Machinery
20th-century women mathematicians
21st-century women mathematicians
20th-century American women
21st-century American women |
https://en.wikipedia.org/wiki/BlackPOS | BlackPOS, also known as Kaptoxa, is a point-of-sale malware program designed to be installed in a point of sale (POS) system to scrape data from debit and credit cards. BlackPOS was used in the Target Corporation data breach of 2013.
History
The BlackPOS program first surfaced in early 2013 and affected many Australian, American, and Canadian companies using point-of-sale systems, such as Target and Neiman Marcus. The program was originally created by 23 year-old Rinat Shabayev and later developed by 17-year-old Sergey Taraspov, better known by his online name, 'ree4'. The original version of BlackPOS was sold on online black market forums by Taraspov, under the name "Dump Memory Grabber by Ree", for around $2000. The name BlackPOS was found in the software's administration panel.
Operation
BlackPOS infects computers running on Microsoft Windows that have credit card readers connected to them and are part of a POS system. After installation, the program attaches to the pos.exe process and scans its memory for track 1 and track 2 payment card data. The data is then exfiltrated via SMB to a server within the company, where another component collects it and sends it to the attacker via FTP.
BlackPOS only sends stolen information during business hours, to avoid raising suspicion by generating network traffic at unusual times.
Incidents
BlackPOS has been used to steal customer information from businesses worldwide. The most well-known attack was the 2013 Target security breach.
Target
During Thanksgiving break of November 2013, Target's POS system was infected with the BlackPOS malware. It was not until mid-December that the company became aware of the breach. The hackers were able to get into Target's systems by compromising a company web server and uploading the BlackPOS software to Target's POS systems. As a result of this attack, more than 40 million customer credit and debit card information, and more than 70 million addresses, phone numbers, names, and other personal information, was stolen. About 1800 U.S. Target stores were affected by the malware attack.
Neiman Marcus
Neiman Marcus, another well-known retailer, was affected as well. Their POS system was said to have been infected in early July 2013 and was not fully contained until January 2014. The breach is believed to have involved 1.1 million credit and debit cards over the span of several months. Although credit and debit card information was compromised, Neiman Marcus issued a statement saying that Social Security Numbers and birthdates were not affected.
Other companies
Other affected companies included UPS and Home Depot.
See also
Point-of-sale malware
Point of sale
Cyber security standards
List of cyber attack threat trends
Malware
References
Windows trojans
Theft |
https://en.wikipedia.org/wiki/Sunway%20TaihuLight | The Sunway TaihuLight ( Shénwēi·tàihú zhī guāng) is a Chinese supercomputer which, , is ranked fourth in the TOP500 list, with a LINPACK benchmark rating of 93 petaflops. The name is translated as divine power, the light of Taihu Lake. This is nearly three times as fast as the previous Tianhe-2, which ran at 34 petaflops. , it is ranked as the 16th most energy-efficient supercomputer in the Green500, with an efficiency of 6.1 GFlops/watt. It was designed by the National Research Center of Parallel Computer Engineering & Technology (NRCPC) and is located at the National Supercomputing Center in Wuxi in the city of Wuxi, in Jiangsu province, China.
The Sunway TaihuLight was the world's fastest supercomputer for two years, from June 2016 to June 2018, according to the TOP500 lists. The record was surpassed in June 2018 by IBM's Summit.
Architecture
The Sunway TaihuLight uses a total of 40,960 Chinese-designed SW26010 manycore 64-bit RISC processors based on the Sunway architecture. Each processor chip contains 256 processing cores, and an additional four auxiliary cores for system management (also RISC cores, just more fully featured) for a total of 10,649,600 CPU cores across the entire system.
The processing cores feature 64 KB of scratchpad memory for data (and 16 KB for instructions) and communicate via a network on a chip, instead of having a traditional cache hierarchy.
Software
The system runs on its own operating system, Sunway RaiseOS 2.0.5, which is based on Linux. The system has its own customized implementation of OpenACC 2.0 to aid the parallelization of code.
Future development
China's first exascale supercomputer was scheduled to enter service by 2020 according to the head of the school of computing at the National University of Defense Technology (NUDT). According to the national plan for the next generation of high performance computers, the country would have develop an exascale computer during the 13th Five-Year-Plan period (2016–2020). The government of Tianjin Binhai New Area, NUDT and the National Supercomputing Center of Tianjin are working on the project. The investment is likely to hit 3 billion yuan ($470.6 million).
See also
Sunway BlueLight
Manycore processor
Massively parallel processor array
Supercomputing in China
Summit (supercomputer)
References
External links
Top500 list entry for the Sunway TaihuLight
CCTV video news story on Sunway TaihuLight
Hardware of Sunway TaihuLight
- BBC 5-minute video
2016 in technology
Petascale computers
Supercomputers
Supercomputing in China
64-bit computers |
https://en.wikipedia.org/wiki/Sunway%20BlueLight | The Sunway BlueLight () is a Chinese massively parallel supercomputer. It is the first publicly announced PFLOPS supercomputer using Sunway processors solely developed by the People's Republic of China.
It ranked #2 in the 2011 China HPC Top100, #14 on the November 2011 TOP500 list, and #39 on the November 2011 Green500 List. The machine was installed at National Supercomputing Jǐnán Center () in September 2011 and was developed by National Parallel Computer Engineering Technology Research Center () and supported by Technology Department () 863 project. The water-cooled 9-rack system has 8704 ShenWei SW1600 processors (For the Top100 run 8575 CPUs were used, at 975 MHz each) organized as 34 super nodes (each consisting of 256 compute nodes), 150 TB main memory, 2 PB external storage, peak performance of 1.07016 PFLOPS, sustained performance of 795.9 TFLOPS, LINPACK efficiency 74.37%, and total power consumption 1074 kW.
The Sunway BlueLight is ranked 103rd (ranked highest at 14th when it appeared on the list in November 2011; then 65th in the November 2014)
See also
Sunway TaihuLight
Top500
References
2011 in technology
Supercomputers
Supercomputing in China |
https://en.wikipedia.org/wiki/Netsci%20Conference | The International School and Conference on Network Science, also called NetSci, is an annual conference focusing on networks. It is organized yearly since 2006 by the Network Science Society. Physicists are especially prominently represented among the participants, though people from other backgrounds attend as well. The study of networks expanded at the end of the twentieth century, with increasing citation of some seminal papers.
Following this increase in interest from the scientific community, network science was examined by the National Research Council (NRC), the arm of the US National Academies in charge of offering policy recommendations to the US government. NRC assembled two panels, resulting in recommendations summarized in two NRC Reports, offering a definition of the field of network science. These reports not only documented the emergence of a new research field, but highlighted the field’s role for science, national competitiveness and security. The NetSci conference series was set up in 2006 to address the need of the new and emerging highly interdisciplinary network science community to meet and exchange ideas. The NetSci conference has been a yearly event since then. In 2015, a shorter regional conference, called NetSci-X, was added.
History
The formal NetSci conference series was preceded by several meetings:
RESEARCH WORKSHOP ON GRAPH THEORY AND STATISTICAL PHYSICS, ICTP Trieste May 22–25 (2000)
XVIII Sitges Conference (2002)
COSIN Project Midterm Conference (2003)
CNLS Annual Conference 2003: Networks, Structure, Dynamics and Function, May 12–26, Santa Fe, New Mexico. Organized by Zoltán Toroczkai, Eli Ben-Naim, Hans Frauenfelder, Pieter Swart, supported by Los Alamos National Laboratory.
Aveiro Conference CNET 2004 August 29–September 2 (2004)
School and Workshop on Structure and Function of Complex Networks, ICTP Trieste May 16–28 (2005)
In 2006 these events became part of an organized structure with one network conference per year.
NetSci 2006 May 16–25, Indiana University Bloomington, USA. Organized by Albert-László Barabási, Katy Börner, Noshir Contractor, Alessandro Vespignani and Stanley Wasserman.
NetSci 2007 May 20–25, New York Hall of Science, USA
NetSci 2008 June 23–27, Norwich University, UK
NetSci 2009 June 29-July 3, INFM, Istituto Veneto, Venice, ITALY. Organized by Guido Caldarelli and Vittoria Colizza.
NetSci 2010 May 10–14, Northeastern University/MIT Boston, USA
NetSci 2011 June 1–6, Hungarian Academy of Science, Budapest, HUNGARY
NetSci 2012 June 18–22 Northwestern University, Evanston, USA
NetSci 2013 June 3–7, Royal Library, Technical University of Denmark, Copenhagen, Denmark. Organized by Petter Holme and Sune Lehmann (general chairs)
NetSci 2014 June 2–6, University of California, Berkeley, USA. Organized by Raissa D'Souza and Neo Martinez.
NetSci 2015 June 1–5, University of Zaragoza, SPAIN
NetSci 2016 May 30–June 3, Korean Academy of Science, Seoul, Korea. Organized by Hawo |
https://en.wikipedia.org/wiki/MSG%20Western%20New%20York | MSG Western New York (MSG WNY) is an American regional sports network that is a joint venture between MSG Entertainment and Hockey Western New York LLC. The channel (also on occasion credited as Pegula Sports Network or MSG Buffalo) is a sub-feed of MSG Network, with programming oriented towards the Western New York region, including coverage of the National Hockey League's Buffalo Sabres and the National Football League's Buffalo Bills. It replaced MSG Network on television providers in the Sabres' media market in 2016.
MSG Western New York is available on cable providers throughout Western New York. Most programming is available nationwide on satellite via DirecTV.
History
After the collapse of Empire Sports Network and its parent Adelphia, MSG bought the rights to the Buffalo Sabres in 2006 under a 10-year deal; where telecasts are controlled by the team via the Sabres Hockey Network, including the sale of advertising, and the simulcast of Rick Jeanneret's commentary on both radio and television (although, during the 2015-16 season, the team experimented with having separate commentary teams on radio and television for selected games, which the Buffalo News speculated was in preparation for Jeanneret's eventual retirement), conditions that the Sabres always make as part of their telecast deals going back to the days of Empire. After acquiring the rights, MSG divided its network into three regional broadcast "zones"; Sabres games were available within "Zone 3", which covered Buffalo and Rochester, and "Zone 2", the remainder of the state excluding Buffalo, Rochester, and New York City—which was shared by the Sabres, Devils, Islanders, and Rangers. The exact channel assignment for Sabres games varied by region (some games were carried by FSN New York in Zone 2), but all games were carried on the main MSG Network service within Zone 3.
The Buffalo Sabres' regional television ratings are among the highest in the league; in the 2015-16 season, despite the team's poor overall performance, fan enthusiasm over star prospect Jack Eichel helped the team achieve the highest average regional viewership of all NHL teams for the first time since 2008-09, with a 6.55 share. National telecasts on NBC and NBCSN have also had notably high ratings in Buffalo.
It was speculated that Pegula Sports and Entertainment, which had recently bought the Sabres, Rochester Americans, Buffalo Bandits and Buffalo Bills, was planning to take advantage of the high viewership by establishing a team-owned regional sports network once the Sabres' existing television contract with MSG expired. The Buffalo Newss Alan Pergament also acknowledged the impending end of the Sabres and Bills' radio contracts with WGR as a possibility that the group could, potentially, acquire a radio station to serve as a team-owned radio outlet if it is unable to renew its contract with Entercom (Entercom had purchased the Sabres' previous owned-and-operated station, 107.7 WNSA, in 2004, and merged i |
https://en.wikipedia.org/wiki/Access%20control%20expression | An access control expression with respect to a computer file system is a list of Boolean expressions attached to a file object. An access control expression specifies a Boolean formula that defines which users or system processes are granted access to objects, as well as what operations are allowed on given objects. Each entry in a typical access control expression specifies an operation and an expression and an operation. For instance, if a file object has an access control expression that contains (read=(g:system OR u:Alice), write=(g:system AND !u:Bob))), this would give any member of the group or the user named Alice permission to read the file but would allow only members of the group to write the file, except for the user named Bob.
Conventional access control lists can be viewed as a subset of access control expressions in which the only combining operation allowed is OR.
Implementations
Few systems implement access control expressions. The MapR file system is one such system.
Move Toward Filesystem Access Control Expressions
Early Unix and Unix-like systems pioneered flexible permission schemes based on user and group membership. Initially, users could only belong to a single group, but this constraint was relaxed to allow membership in multiple groups. With an unlimited number of groups, arbitrarily complex permission schemes could be implemented, but only at the cost of exponentially many groups.
In order to allow more expressivity in the specification of filesystem permissions, a number of competing access control list implementations were developed for Microsoft Windows and Unix and Unix-like systems Linux. Access control lists were a substantial improvement over simple user and group permissions, but still could not easily express some common requirements (such as banning a single user from a group). Access control expressions were developed in response to such needs.
Comparison to access control lists
The permission expressions supported by access control lists are a strict subset of those supported by access control expressions, but they have the virtue of being very fast and direct to implement. The cost of implementing access control expressions is no longer of much concern due to advances in hardware performance.
See also
Cacls
Capability-based security
Discretionary access control
Role-based access control
References
Further reading
Computer access control |
https://en.wikipedia.org/wiki/Alina%20%28malware%29 | Alina is a Point of Sale Malware or POS RAM Scraper that is used by cybercriminals to scrape credit card and debit card information from the point of sale system. It first started to scrape information in late 2012. It resembles JackPOS Malware.
Process of Alina POS RAM Scraper
Once executed, it gets installed on the user's computer and checks for updates. If an update is found, it removes the existing Alina code and installs the latest version. Then, for new installations, it adds the file path to an AutoStart runkey to maintain persistence. Finally, it adds java.exe to the %APPDATA% directory and executes it using the parameter alina=<path_to_executable> for new installations or, update=<orig_exe>;<new_exe> for upgrades.
Alina inspects the user's processes with the help of Windows API calls:
CreateToolhelp32Snapshot() takes a snapshot of all running processes
Process32First()/Process32Next() retrieve the track 1 and track 2 information in the process memory
Alina maintains a blacklist of processes, if there is no process information in the blacklist it uses OpenProcess() to read and process the contents in the memory dump. Once the data is scraped Alina sends it to C&C servers using an HTTP POST command that is hardcoded in binary.
See also
Point-of-sale malware
Cyber security standards
List of cyber attack threat trends
References
Carding (fraud)
Cyberwarfare
Windows trojans |
https://en.wikipedia.org/wiki/Beyond%20Beyond | Beyond Beyond (Swedish: Resan till Fjäderkungens Rike), is a 2016 Swedish-Danish computer-animated comedy-drama film directed by the Danish animator Esben Toft Jacobsen. The movie had its world premiere on 10 February 2014 at the Berlin International Film Festival.
Plot
Jonah is a young bunny whose life is torn apart when his beloved mother dies and is taken away by the Feather King to the afterlife after she develops a bad cough. Unwilling to accept that his mother is gone, Jonah plots to travel to the other side and bring her back. He finally gains his chance when an old dog gives Jonah his ticket to the afterlife.
Cast
Reception
Variety wrote that the creative team behind Beyond Beyond "invent an elaborate mythology around an impressive figure called the Feather King, who guards the realm where Johan, the rabbit boy, must venture, though the trip proves too dark and complicated for family crowds, limiting export prospects." Common Sense Media also commented upon the film's themes and expressed concern that they might be too dark for younger audiences. Dove marked Beyond Beyond with their "Family Approved" seal and wrote that it was "a charming little story about the loss of a loved one and how that loss effects others."
The SVT Nyheter Norrbotten praised the movie's 3D environment and compared it to works by Hayao Miyazaki, but also felt that the film's premise was too confusing.
References
External links
as archived June 20, 2015
2014 films
2014 animated films
2014 computer-animated films
Danish animated films
Swedish animated films
2010s Swedish-language films
Animated films about the afterlife
2014 comedy-drama films
Danish comedy-drama films
Swedish comedy-drama films
Animated films about rabbits and hares
2010s Swedish films |
https://en.wikipedia.org/wiki/Direct%20coupling%20analysis | Direct coupling analysis or DCA is an umbrella term comprising several methods for analyzing sequence data in computational biology. The common idea of these methods is to use statistical modeling to quantify the strength of the direct relationship between two positions of a biological sequence, excluding effects from other positions. This contrasts usual measures of correlation, which can be large even if there is no direct relationship between the positions (hence the name direct coupling analysis). Such a direct relationship can for example be the evolutionary pressure for two positions to maintain mutual compatibility in the biomolecular structure of the sequence, leading to molecular coevolution between the two positions.
DCA has been used in the inference of protein residue contacts, RNA structure prediction, the inference of protein-protein interaction networks, the modeling of fitness landscapes, the generation of novel function proteins, and the modeling of protein evolution.
Mathematical Model and Inference
Mathematical Model
The basis of DCA is a statistical model for the variability within a set of phylogenetically related biological sequences. When fitted to a multiple sequence alignment (MSA) of sequences of length , the model defines a probability for all possible sequences of the same length. This probability can be interpreted as the probability that the sequence in question belongs to the same class of sequences as the ones in the MSA, for example the class of all protein sequences belonging to a specific protein family.
We denote a sequence by , with the being categorical variables representing the monomers of the sequence (if the sequences are for example aligned amino acid sequences of proteins of a protein family, the take as values any of the 20 standard amino acids). The probability of a sequence within a model is then defined as
where
are sets of real numbers representing the parameters of the model (more below)
is a normalization constant (a real number) to ensure
The parameters depend on one position and the symbol at this position. They are usually called fields and represent the propensity of symbol to be found at a certain position. The parameters depend on pairs of positions and the symbols at these positions. They are usually called couplings and represent an interaction, i.e. a term quantifying how compatible the symbols at both positions are with each other. The model is fully connected, so there are interactions between all pairs of positions. The model can be seen as a generalization of the Ising model, with spins not only taking two values, but any value from a given finite alphabet. In fact, when the size of the alphabet is 2, the model reduces to the Ising model. Since it is also reminiscent of the model of the same name, it is often called Potts model.
Even knowing the probabilities of all sequences does not determine the parameters uniquely. For example, a simple transformation of |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.