source stringlengths 32 199 | text stringlengths 26 3k |
|---|---|
https://en.wikipedia.org/wiki/AMR%20radiotelephone%20network%20%28Czechoslovakia%29 | The very first analog mobile radio telephone in Czechoslovakia (and in the whole Eastern Bloc) was AMR (sometimes AMRAD), in Czech Automatizovaný městský radiotelefon (Automated Municipal Radiotelephone).
The system was developed by company Tesla in Pardubice. Since 1978 it was tested in experimental mode and in 1983 it switched into full mode. At the time it was used mainly for communication between distant employees (typically in telecommunication industry). After 1989 commercial use was allowed and the network stayed until 1999 when it was stopped. The network was owned and operated by state telecom company "SPT Telecom" (later Český Telecom, then Telefónica O2 Czech Republic).
Technical features
The complete network has 63 base stations and capacity for 9,999 users (4 numbers were used for identification).
Reach of base station was 15 – 25 km, the radiophones were also able to communicate directly with one another.
Three frequency bands were used: 162/167 MHz for the experimental network, 161/165 MHz for the country level network and 152/157 MHz for local networks.
Fixed monthly payment tariff was used, 1000 Kčs per month in 1990, because the system was unable to record call details.
Authentication of the users was added only in 1993.
There was no encryption of the transmission and it was possible to listen to the traffic on any tuned receiver (as standard radio).
The only services provided were incoming and outgoing voice calls within the country.
AMR network was followed by mobile network based on NMT standard (450 MHz, on 12 September 1991, by Eurotel) and a radio-paging service (RDS) in 1992. In 1996 the first network based on GSM standard was started in the Czech Republic.
Mobile radio telephone systems
Science and technology in Czechoslovakia |
https://en.wikipedia.org/wiki/Throwdown%21%20with%20Bobby%20Flay | Throwdown! with Bobby Flay is a Food Network television program in which celebrity chef Bobby Flay challenges cooks renowned for a specific dish or type of cooking to a cook-off of their signature dish.
At the beginning of each show, Flay receives – via bicycle messenger – a package detailing the chef he is to compete against as well as the dish. Examples of opponents include a skilled chili maker or a famous wedding cake designer. After practicing and preparing the item in question, Flay shows up for a surprise competition (or "Throwdown"). During the competition, both chefs prepare their particular version of the dish, and both are then evaluated by local judges to determine a winner.
Format
Each show includes a mini-biography about the chef who is to be challenged, shown before the challenge takes place. The content for the biography is actually collected as part of an elaborate ruse or setup, where the chef or cook is told that they are going to be featured on a fictitious Food Network show. As part of the show, the featured chef (and their associated restaurant, if any) hosts a small party, which is then unexpectedly "crashed" by Bobby Flay. Upon Flay's arrival, he reveals the true nature of the show, and the "Throwdown" is initiated.
In the Food Network's test kitchen, Flay and his two sous-chefs (Stephanie Banyas and Miriam Garron) experiment and prepare the particular dish, often opting for a variant of the dish.
When Flay makes his appearance at a rival's event, he is usually greeted with surprise and confusion, although there has been one occasion where the challenged chef figured out that Flay would be appearing for a throwdown and ended up challenging him. Flay's comment was that he "had been set up." However, the rival usually quickly gets over the initial shock and warms up to the challenge. After the dishes are prepared, the two chefs taste each other's creations and are usually quite complimentary towards one another. Finally, the dishes are evaluated by one or more connoisseurs or notable veterans in that field (via a blind taste test), with the winner then being announced.
Each episode ends with a challenge from Flay looking directly into the camera and saying, "All you chefs keep doing what you do, but ask yourself this..." Finished by the featured chef saying "are you ready for a Throwdown?"
The format of the show does not edit or disguise Flay's lack of knowledge of technique regarding cooking for the challenge. He often makes use of New York City-area experts to teach him basic techniques. In other instances, he acknowledges the traditional approach to the dish but then explains how he will make it more modern or more his own style of cooking with various added ingredients.
Flay's record is 32 wins, 1 tie, and 68 losses. Flay has a winning record (5 wins and 4 losses) with cake challenges, winning throwdowns for cheesecake and cupcakes in season 2, coconut cake and red velvet cake in season 5, and German chocolate |
https://en.wikipedia.org/wiki/Mixed%20complementarity%20problem | Mixed Complementarity Problem (MCP) is a problem formulation in mathematical programming. Many well-known problem types are special cases of, or may be reduced to MCP. It is a generalization of nonlinear complementarity problem (NCP).
Definition
The mixed complementarity problem is defined by a mapping , lower values and upper values .
The solution of the MCP is a vector such that for each index one of the following alternatives holds:
;
;
.
Another definition for MCP is: it is a variational inequality on the parallelepiped .
See also
Complementarity theory
References
Mathematical optimization |
https://en.wikipedia.org/wiki/Kenneth%20Koedinger | Kenneth R. Koedinger (born 1962 in Wisconsin) is a professor of human–computer interaction and psychology at Carnegie Mellon University. He is the founding and current director of the Pittsburgh Science of Learning Center. He is widely known for his role in the development of the Cognitive Tutor software. He is also widely published in cognitive psychology, intelligent tutoring systems, and educational data mining, and his research group has repeatedly won "Best Paper" awards at scientific conferences in those areas, such as the EDM2008 Best Paper, ITS2006 Best Paper, ITS2004 Best Paper, and ITS2000 Best Paper.
Education
Koedinger received his bachelor's degree in Mathematics and Computer Science from the University of Wisconsin–Madison, working with Richard Lehrer, and his M.S. in Computer Science from the University of Wisconsin–Madison. He then obtained his Ph.D. in Cognitive Psychology from Carnegie Mellon University. His doctoral advisor was John Robert Anderson.
Career
Koedinger worked as a Research Scientist in the Human-Computer Interaction Institute at Carnegie Mellon University. Eventually, Koedinger became an Associate Professor and subsequently a professor at Carnegie Mellon University. He has had many prestigious graduate students and post-doctoral fellows, in particular Neil Heffernan and Vincent Aleven.
Research
Knowledge-Learning-Instruction Framework (KLI Framework)
Koedinger studied and developed the KLI framework of Learning Science. In 2012, Koedinger, along with his colleague Albert Corbett from the HCII and Charles Perfetti from the University of Pittsburgh, introduced the Knowledge-Learning-Instruction framework. The propositions within the KLI framework can help generate research questions within specific domains and instructional situations that, with further work, yield precise and falsifiable predictions. The KLI framework relates a set of observable and unobservable events: Learning Events, Instructional Events, Assessment Events and Knowledge Components.
Instructional Events: Variations, typically planned, in the learning environment that are intended to produce learning. Instructional Events cause Learning Events.
Learning Events: Changes in cognitive and brain states that can be inferred from data, but cannot be directly observed or directly controlled.
Assessment Events: Involve student responses that are evaluated. Assessment Events are usually test items that can be directly observed, but they can also be embedded in the context of instruction.
Knowledge Components: A description of a mental structure or process that a learner uses, alone or in combination with other knowledge components, to accomplish steps in a task or a problem. A knowledge component is also closely related to an assessment event, since it is an acquired unit of cognitive function or structure that can be inferred from performance on a set of related tasks.
Cognitive Tutor
Koedinger has a huge contribution to the Intelligent Tut |
https://en.wikipedia.org/wiki/Rosemary%20Church | Rosemary Church (born 10 November 1962) is an Australian CNN International news anchor. Based at the network's world headquarters in Atlanta, she anchors the 2 to 4 a.m. ET edition of CNN Newsroom. She previously worked as a reporter and newsreader for the Australian Broadcasting Corporation, news and current affairs division.
Early life and education
Born in Belfast, Northern Ireland, Church has lived in England and Australia. She has a Bachelor of Arts degree from the Australian National University in Canberra and has completed graduate studies in Media and Law.
Career
Church joined CNN International in August 1998 as an anchor on World News, based in the network's Atlanta headquarters.
At ABC News, she primarily worked for the international arm Australia Television as Senior Anchor. She also reported for the program Foreign Correspondent and anchored the evening news in Tasmania and the summer edition of The World At Noon.
Previously she presented weekend news on Network Ten and worked for five years in Canberra for the National Media Liaison Service. Where she also hosted the weekday nightly weather report for Network Ten.
Church spent several years in the late 1980s to early 1990s as the host of a Sunday morning radio show "Church on Sunday" on the 2SSS-FM, later called Triple S FM, covering music and happenings in Canberra with notable guests such as Marilyn Dooley, National Film and Sound Archive and regular phone in guests like Keith (KC Bell) from Scullin, a rock and roll trivia buff, among others. 2SSS-FM was a community sports radio station, managed by James Patterson, covering the Canberra region. It ran from 1986 to 2003. Another notable that started out on Triple S FM was Gaven Morris, who was later with CNN before returning to Australia to rejoin the ABC as Director of News (2015).
Church won the New York Festival's TV programming award (silver) for coverage of the handover of Hong Kong to China in 1997.
References
External links
CNN profile
1962 births
Living people
Journalists from Northern Ireland
British television journalists
Television personalities from Belfast
Australian National University alumni
CNN people
Women television journalists
Women journalists from Northern Ireland |
https://en.wikipedia.org/wiki/WKPS | WKPS (90.7 FM, The LION 90.7fm) is a college radio station owned by Penn State University. The station runs on a full-time, multi-format schedule featuring a wide variety of programming. "The LION 90.7fm" transmits to a potential audience of over 125,000 from its studio in the Hetzel Union Building (HUB)-Robeson Center. The station also has a live webcast, which is capable of streaming live to hundreds of listeners. WKPS is licensed by the Federal Communications Commission (FCC) with the primary goal being to serve the campus and local community and secondary goals being the training, education and instruction of students in broadcast radio and station management. The station is run entirely by Penn State undergraduates, and maintains its tradition of public service by allowing student broadcasters from any academic major and community broadcasters local to the area. It also retains its programmatic independence by remaining unaffiliated with any academic college.
History
WPSC
WPSC, Penn State's original student station, emerged from the Senior Gift of the Class of 1912. Initially an experimental shortwave installation, it represented "the first licensed club in the nation" and possessed "one of the first experimental licenses" granted by the government. By 1921 WPSC was broadcasting on the AM dial at 500 watts and was one of the earliest college radio stations in the nation. Due to a combination of the Great Depression and increasing costs of regulatory compliance, the station ceased operations in 1932. Today, the WPSC call letters are assigned to William Paterson University.
WDFM
In an effort to reestablish the tradition of student radio at Penn State, WDFM went on the air on December 6, 1953 as a result of the Senior Gift of the Class of 1951. Headquarters in 304 Sparks on the University Park campus, WDFM served its student audience for more than three decades. It changed its call letters to WPSU-FM in 1985. From the 1980s onward, student programming was progressively cut back. Later in the decade, more NPR programming was added to the schedule. By 1992, WPSU had become a full-fledged NPR affiliate with very few student ties and very little student programming. Despite the fact that the "new" radio station's mission and goals were dissimilar to those of early WDFM, the university allowed WPSU to exist.
Residence Hall Stations
WHR (West Halls Radio)
Founded in the 1960s, WHR was the first of three stations at Penn State specific to University Park residence halls. WHR, which stood for West Halls Radio, rebroadcast the WDFM signal and also produced and broadcast original content to its area residence halls.
WEHR (East Halls Radio)
On the AM dial, there also existed WEHR, a radio station in Penn State's East Residence Halls ("EHR" stands for "East Halls Radio"). At one time, three of Penn State's five residence areas possessed their own stations. WEHR was a typical freeform radio station; its playlist depended on the deejay.
Founded in 19 |
https://en.wikipedia.org/wiki/EiffelStudio | EiffelStudio is a development environment for the Eiffel programming language developed and distributed by Eiffel Software.
EiffelStudio includes a combination of tools integrated under a single user interface: compiler, interpreter, debugger, browser, metrics tool, profiler, diagram and code inspector tool. The user interface rests on a number of specific UI paradigms, in particular "pick-and-drop" for effective browsing.
EiffelStudio is available on a number of platforms including Windows, Linux, Mac OS, Solaris, VMS, RaspberryPi. The source is available under GPL; other commercial licenses are also available.
Status, license and community process
EiffelStudio is an open-source development with beta versions of the next release made regularly available.
The Eiffel community actively participates in its development; its official website is Eiffel.org, where projects and resources are listed. The source code base is usually available for check-out via Subversion or Git. Also available are discussion forums and the like.
Since 2019, no new release of the open-source version has been made, and the svn repository has been protected by a password. The code is still available via a GitHub public mirror, but with a 12-month delay.
Compilation technology
EiffelStudio uses a specific compilation technology known as Melting Ice (claimed by Eiffel Software as a trademark) which integrates compilation proper with interpretation of the elements changed since the last compilation, for very fast turnaround (recompilation time proportional to the size of the change, not the size of the overall program). Although such "melted" programs can be delivered, the common practice is to perform a "finalization" step before release. Finalization is a highly optimized form of compilation, which takes longer but generates optimized executables.
The interpreter part of EiffelStudio relies on a bytecode-oriented virtual machine. The compiler generates either C or .NET CIL (Common Intermediate Language).
Round-trip engineering
The Diagram Tool of EiffelStudio provides a graphical view of software structures. It can be used in both
Forward engineering, as a design tool for producing software from graphical descriptions.
Reverse engineering, automatically producing graphical representations of existing program texts.
The tool guarantees integrity of changes made in either style, for full "roundtrip engineering".
The graphical notation is either BON (the Business Object Notation, see bibliography) or UML. BON is the default.
User interface paradigm
EiffelStudio makes it possible to display many different views of classes and features: text view (full program text), contract view (interface only, with contracts), flat view (which includes inherited features), clients (all the classes and features that use a given class or feature), inheritance history (what happens to a feature up and down the inheritance structure) and many others.
EiffelStudio relies on an origina |
https://en.wikipedia.org/wiki/Dorsal%20venous%20network%20of%20hand | The dorsal venous network of the hand is a venous network on the dorsum (backside) of hand. It is formed by the dorsal metacarpal veins, a dorsal digital vein from the radial side of the index finger and one from the ulnar side of the little finger, and both dorsal digital veins of the thumb. The venous network gives rise to the cephalic vein and the basilic vein; an accessory cephalic vein may arise from it as well.
References
Veins of the upper limb |
https://en.wikipedia.org/wiki/Prison%20Tycoon | Prison Tycoon is a business simulation computer game developed by Virtual Playground and published by ValuSoft in July 2005 that puts the user in charge of a prison. Objectives are to keep the prison running, keep the staff happy, keep the prisoners in line, all while trying to make money.
Users are allowed to choose between a New England prison, a modern U.S. Southwestern-style prison, and a West Coast-style prison modelled after San Quentin.
A sequel, Prison Tycoon 2: Maximum Security, was released on September 8, 2006, followed by Prison Tycoon 3: Lockdown in 2007 and Prison Tycoon 4: Supermax in 2008, then Prison Tycoon: Alcatraz in late 2010.
Also, THQ Wireless released a version of Prison Tycoon for the iPhone in May 2009.
Reception
Prison Tycoon has generally received poor grades from critics. X-Plays Time Stevens gave the game only one star out of five, concluding his review by writing that "Prisons aren't supposed to be fun, so maybe it shouldn't be a surprise that a game about prisons isn't either." GameZone gives the game a score of 5/10, praising the idea and concept but complaining about clunky graphics, dysfunctional camera angles and lack of instructions.
Some common complaints of the game include bad camera angles, lackluster graphics, choppy or slow framerates, annoying music and sound, and limited help for players; while most players agreed the concept was neat.
Gameplay
The premise of the game is to create a functional prison complete with walls, guard towers, housing wings, dining, workout and medical facilities. The objective of the game is ultimately to turn your low security incarceration facility into a profitable maximum security prison. Funding is collected by the player through state funding, charitable donations and inmate labor depending on a myriad factors, such as employee satisfaction and inmate happiness and rehabilitation. You have the option to start with a completely blank slate in a free-play mode or with the basic layout of an existing prison with several problems that need to be addressed in the challenge mode.
The challenges range from rehabilitating a certain number of inmates, reducing the number of riots and fights within the prison or simply to reaching a certain level of security. To create a prison the player places buildings or walls along a grid system by selecting which building they would like and placing it somewhere within the boundaries of the map. There are over 100 different buildings that can be constructed. Within certain buildings the player can build different rooms from over 100 to choose from, such as rooms with multiple beds within one cell or solitary confinement cells. Buildings come with their appropriate staffing, for example guard towers come with guards already positioned in the tower and medical facilities come with medical staffing.
Once a player has constructed sufficient housing and basic amenities, prisoners begin arriving on buses depending on the capacity of |
https://en.wikipedia.org/wiki/List%20of%20WNBA%20Finals%20broadcasters | The following is a list of the television networks and announcers that have broadcast the WNBA Finals.
2020s
2010s
2000s
1990s
See also
WNBA on ESPN
WNBA on ABC
NBA on NBC
NBA on ABC
NBA on ESPN
References
External links
Sports Media Watch: WNBA
Episode List: WNBA Finals - TV Tango
Broadcasters
Women's National Basketball Association media
National Basketball Association on television
Basketball on NBC
WNBA
ESPN2
ABC Sports
Lifetime (TV network)
Lists of announcers of American sports events
Lists of Women's National Basketball Association broadcasters |
https://en.wikipedia.org/wiki/Lesley%20Brooker | Lesley Brooker is an Australian ornithologist based in Western Australia following retirement from a career with the CSIRO's Division of Wildlife Research. There she worked, as a database manager and computer modeller, on developing methodologies for the re-design and restoration of agricultural lands for bird conservation. Since then she has collaborated with her husband Michael Brooker in studies on cuckoo evolution, population ecology of fairy-wrens and spatial dynamics of birds in fragmented landscapes.
Awards
In 2004 she was awarded the Royal Australasian Ornithologists Union's D.L. Serventy Medal which recognizes excellence in published work on birds in the Australasian region.
Career
Brooker has contributed to ornithological research in Australia, in various states across Australia, including Western Australia, and Queensland, as well as researching and publishing on Explorers, as well as biodiversity, for over thirty years. Her work involved research on Wedge-Tailed Eagles, Blue-breasted Fairy wrens and ecosytem connectvity. Booker was also a trip leader for the Western Australian Branch of Birdlife Australia and contributed to the Birds in the Great Western Woodlands, a joint project between BirdLife Australia and The Nature Conservancy
Brooker has also contributed to research on paternity of bird families, in Molecular Ecology.
She has published on animal dispersals, and habitat quality, on corridor use and connectivity. Brooker served on the Emu advisory commitee.
Selected works
References
Olsen, Penny. (2005). D.L. Serventy Medal 2005: Citation. Lesley and Michael Brooker. Emu 105: 341.
External links
Living people
Australian ornithologists
CSIRO people
Women ornithologists
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/Charles%20Dalziel | Charles Dalziel (1904–1986) was a professor of electrical engineering and computer sciences
at UC Berkeley. According to volume 54 of UCB's Blue and Gold, Dalziel graduated with a Mechanics degree in 1927 and was from Santa Maria, CA. He was a member of: Eta Kappa Nu, Tau Beta Pi, American Institute of Electrical Engineers, De Molay Club (VP), and Engineers Council.
He studied the effects of electricity on animals and humans. He wrote The Effects of Electric Shock on Man, a book in which he explains the effects of different amounts of electricity on human subjects. He also invented the ground-fault circuit interrupter or GFCI in 1961. The GFCI is commonly found in home bathrooms or kitchens. The device operates normally until 5 milliamps passes from the appliance to ground. Charles Dalziel was a pioneer in understanding electric shock in humans.
Dalziel married Helen Bradford in 1931. They had a daughter, Isabelle. After Helen died of cancer in 1963, Charles married Alice Sohl Lundberg in 1969.
See also
Self-experimentation
References
Dalziel, Charles F. The effects of electric shock on man / by Charles F. Dalziel. Washington, D.C. : U.S. Atomic Energy Commission, Office of Health and Safety, 1956. Series: Safety and fire protection technical bulletin; no. 7
External links
ibiblio.org: Electric Safety Worksheet, from Tony Kuphaldt Socratic Electronics textbook
This Old House: An explanation of a ground-fault circuit interrupter
Photograph of Charles Dalziel
UC Berkeley College of Engineering faculty
UC Berkeley College of Engineering alumni
American electrical engineers
1904 births
1986 deaths
20th-century American engineers
20th-century American inventors |
https://en.wikipedia.org/wiki/Odesa%20catacombs | The Odesa catacombs are a labyrinth-like network of tunnels (subterranean cavities) located under the city of Odesa and its outskirts in Ukraine, that are mostly (over 90%) the result of stone mining, particularly coquina. The system of Odesa Catacombs consists of a network of basements, bunkers, drainage tunnels and storm drains as well as natural caves.
The catacombs are on three levels and reach a depth of below sea level. It is one of the world's largest urban labyrinths, running up to . Parts were used as air-raid shelters during World War II. Part of the tunnels, only under the city, were turned into bomb shelters in the Cold War. Such bomb shelters supposed to be refuge for civilians in case of nuclear strike or gas attack.
In the 19th century, most houses in Odesa were built of limestone that was mined nearby. According to urban legend, these mines were abandoned and later used and widened by local smugglers who created a labyrinth of tunnels and hid treasure beneath Odesa. Many of the tunnels have been filled up with earth, concrete or sand by construction companies, and are no longer accessible.
Description
The approximate topography of the Odesa underground labyrinth is unknown as the catacombs have not been fully mapped. It is thought that most (95–97%) of the catacombs are former coquina multilevel mines from which stone was extracted to construct the city above. The remaining catacombs (3-5%) are either natural cavities or were excavated for other purposes such as sewerage. As of 2019, there are more than 1,000 known entrances to the tunnels.
Only one small portion of the catacombs is open to the public, within the "Museum of Partisan Glory" in Nerubayskoye, north of Odesa. Other caves attract extreme tourists, who explore the tunnels despite the dangers involved. Such tours are not officially sanctioned because the catacombs have not been fully mapped and the tunnels themselves are unsafe.
History
The first underground stone mines started to appear in the 19th century, while vigorous construction took place in Odesa. They were used as a source of cheap construction materials.Limestone was cut using saws, and mining became so intensive that by the second half of the 19th century, the extensive network of catacombs created many inconveniences to the city.
After the Russian Revolution of 1917, stone mining was banned within the central part of Odesa (inside the Porto-Franko zone, bounded by Old Port Franko and Panteleymonovskaya streets).
During World War II the catacombs served as a hiding place for Soviet partisans, in particular the squad of Vladimir Molodtsov. In his work The Waves of The Black Sea, Valentin Kataev described the battle between Soviet partisans against Axis forces, underneath Odesa and its nearby suburb Usatove.
In 1961 the "Search" (Poisk) club was created in order to explore the history of partisan movement among the catacombs. Since its creation, it has expanded understanding of the catacombs, and p |
https://en.wikipedia.org/wiki/Torrens%20Transit | Torrens Transit is an Australian bus service operator in Adelaide. It operates some services as part of the Adelaide Metro network under contract to the Government of South Australia. It is a subsidiary of Transit Systems, which is a part of the Kelsian Group.
History
In April 2000, Torrens Transit began operating the Adelaide Metro East–West contract, with 255 buses under contract to the Government of South Australia.
In April 2005, Torrens Transit began operating the North–South and Outer North East contracts that had previously been run by Serco.
In July 2011, Torrens Transit began operating a new eight-year East–West contract, with an optional four-year extension exercisable based on performance criteria. The North–South and Outer North East area contracts passed to Light-City Buses in October 2011.
In April 2013, Light-City Buses was stripped of eight routes for continued poor performance, with these being returned to Torrens Transit.
In November 2014, Torrens Transit began operating a new service between the CBD and Adelaide Airport with a double deck Bustech CDi.
In June 2018, the Light-City Buses business was integrated with Torrens Transit, following Transit Systems purchasing it from Broadspectrum, doubling the fleet to 700 buses. This marked the return of Light-City routes to Torrens Transit after seven years.
In July 2020, Torrens Transit retained its East West, Outer North East and North South contracts, and took over the Outer North contract from SouthLink. All four bus contracts will run for 8 years. Its North–South contract was expanded to include the Glenelg tram line and is operated by Torrens Connect, a joint venture between Torrens Transit, UGL Rail and John Holland.
Fleet
As at October 2023, the fleet consisted of 821 buses. Buses are painted in Adelaide Metro liveries v1, v2, New, Hybrid, and sometimes in All Over Advertising. In 2000 Torrens Transit inherited a fleet of Dennis Dart, MAN NL202, MAN SL202, Volvo B58 articulated and Volvo B59s from TransAdelaide.
They currently run a mix of:
Bustech - Precision Buses 'XDi', SLF Designline SLF 'Olympbus', FTH12 Hydrogen City Bus Foton, Hino Poncho HX Hino, Iveco Metro C260 Custom 'CB80', MAN 18.260 Custom Coaches 'CB60', MAN 18.280 HOCL-NL ABM 'CB64A', MAN NL202 CNG ABM '160', MAN NL202 CNG ABM 'CB62A', MAN NL232 CNG ABM 'CB62A', Mercedes-Benz O405NH Custom Coaches 'CB60', Mercedes-Benz O405NH O-Bahn ABM 'CB60A', Mercedes-Benz O500LE Volgren 'CR228L', Scania K230UB Custom 'CB80', Scania K230UB Custom Coaches 'CB60 Evo II', Scania K230UB O-Bahn Custom Coaches 'CB60 Evo II’, Scania K280UB Custom 'CB80', Scania K280UB Volgren 'CR228L', Scania K280UB O-Bahn Custom 'CB80', Scania K310UA Custom Coaches 'CB60 Evo II', Scania K320CB BusTech (SA) 'VST', Scania K320UA Custom 'CB80', Scania K320UA Custom Coaches 'CB60 Evo II', Scania K320UA O-Bahn Custom Coaches'CB60 Evo II', Scania K320UB BusTech (SA) 'VST', Scania K320UB Bustech 'VST', Scania K320UB Custom 'CB80 Series 2', |
https://en.wikipedia.org/wiki/Computer%20graphics%20lighting | Computer graphics lighting is the collection of techniques used to simulate light in computer graphics scenes. While lighting techniques offer flexibility in the level of detail and functionality available, they also operate at different levels of computational demand and complexity. Graphics artists can choose from a variety of light sources, models, shading techniques, and effects to suit the needs of each application.
Light sources
Light sources allow for different ways to introduce light into graphics scenes.
Point
Point sources emit light from a single point in all directions, with the intensity of the light decreasing with distance. An example of a point source is a standalone light bulb.
Directional
A directional source (or distant source) uniformly lights a scene from one direction. Unlike a point source, the intensity of light produced by a directional source does not change with distance over the scale of the scene, as the directional source is treated as though it is extremely far away. An example of a directional source is sunlight on Earth.
Spotlight
A spotlight produces a directed cone of light. The light becomes more intense as the viewer gets closer to the spotlight source and to the center of the light cone. An example of a spotlight is a flashlight.
Area
Area lights are 3D objects which emit light. Whereas point lights and spot lights sources are considered infinitesimally small points, area lights are treated as physical shapes. Area light produce softer shadows and more realistic lighting than point lights and spot lights.
Ambient
Ambient light sources illuminate objects even when no other light source is present. The intensity of ambient light is independent of direction, distance, and other objects, meaning the effect is completely uniform throughout the scene. This source ensures that objects are visible even in complete darkness.
Lightwarp
A lightwarp is a technique of which an object in the geometrical world refracts light based on the direction and intensity of the light. The light is then warped using an ambient diffuse term with a range of the color spectrum. The light then may be reflectively scattered to produce a higher depth of field, and refracted. The technique is used to produce a unique rendering style and can be used to limit overexposure of objects. Games such as Team Fortress 2 use the rendering technique to create a cartoon cel shaded stylized look.
Lighting interactions
In computer graphics, the overall effect of a light source on an object is determined by the combination of the object's interactions with it usually described by at least three main components. The three primary lighting components (and subsequent interaction types) are diffuse, ambient, and specular.
Diffuse
Diffuse lighting (or diffuse reflection) is the direct illumination of an object by an even amount of light interacting with a light-scattering surface. After light strikes an object, it is reflected as a function of |
https://en.wikipedia.org/wiki/Simple%20Sensor%20Interface%20protocol | The Simple Sensor Interface (SSI) protocol is a simple communications protocol designed for data transfer between computers or user terminals and smart sensors. The SSI protocol is an Application layer protocol as in the OSI model.
The SSI protocol has been developed jointly by Nokia, Vaisala, Suunto, Ionific, Mermit and University of Oulu. Currently SSI is being developed within the Mimosa Project, part of the European Union Framework Programmes for Research and Technological Development.
The SSI protocol is used in point-to-point communications over UART and networking nanoIP applications. SSI also provides polling sensors and streaming sensor data. For RFID sensor tags SSI specifies memory map for sensor data.
The criteria for SSI protocol development are:
general purpose
simple – minimal overhead
small footprint on the server (sensor) side
Sample implementation of the SSI protocol for MSP430 microcontrollers will be published as open source during August 2006 by Nokia.
SSI message structure
An SSI message consists of a 2-byte header and an n-byte payload. The header consists of a one byte address (wildcard is '?', 0x3F in ASCII) and a one byte message/command type. The different possible values for the message/command type are presented in SSI v1.2 command base.
SSI v1.2 command base
The group of commands:
Q – query
A – query reply
C – sensor discovery
N – discovery reply
Z – reset
G – get sensor configuration
S – set sensor configuration
are used to find and configure sensor units utilizing the SSI-protocol.
The group of commands:
R – request sensor data
V – data response
D – data response with status field
are used to read sensor data infrequently.
For data streaming purposes defined commands are:
O – create sensor observer
Y – observer created
K – delete observer
U – observer finished
L – request sensor listener
J – sensor listener created.
V – data response
M – data response with many data points
Point-to-point SSI
Point-to-point messaging with SSI can be done with SSI/UART. An SSI UART message consists of a 3-byte UART header, an SSI message as the payload and an optional Cyclic redundancy check checksum. The use of a checksum is defined by the SSI message/command type, with lower case commands indicating the use of CRC. The header consists of a start byte (0xFE), a 2-byte (total) length of the message and a 2-byte bitwise Negation length to help identify the frame start.
Networking SSI
SSI networking in a variable environment is done using nanoIP. In a typical case using SSI, an individual message is not important, and so nanoUDP (simplified UDP defined by nanoIP) is used as the message format. If individual messages are important, nanoTCP can be used, as it provides flow control and retransmission at a cost of message size and increase in network traffic.
A nanoUDP message consists of a 5-byte nanoUDP header, an n-byte message payload and an optional 2-byte CRC checksum. The header consists of o |
https://en.wikipedia.org/wiki/Bantay%20Radyo | Bantay Radyo (or El Nuevo Bantay Radyo, "The New Guardian Radio") is a Philippine radio network in the Visayas and Mindanao region owned by Sarraga Integrated and Management Corporation. Its main headquarters are located in Brgy. Capitol Site, Cebu City, with repeaters located in Bogo and Guihulngan.
History and background
Bantay Radyo is a network of AM radio stations each with a power of 10,000 kilowatts and strategically located in Cebu and in Negros Oriental. The network is owned by Cagayan de Oro–based Sarraga Integrated and Management Corporation, with the leadership of provincial Board Member Gigi Sanchez of the province of Cebu, as Chief Executive Officer. It was managed by PAFI Techno Resources Corporation from 2002 until mid-2015, when PAFI's contract with SIAM expired.
Demise
In 2009, Bantay Radyo Davao went off the air for unknown reasons.
On August 1, 2015, Bantay Radyo stations temporarily went off the air due to management issues. Representatives from SIAM confiscated their transmitter equipment. SIAM decided to let CFI Community Cooperative take over the operations of Bantay Radyo once PAFI's contract expired.
However, by 2022 it revived under the new management.
Radio stations
References
Radio stations in the Philippines
Radio stations established in 1991 |
https://en.wikipedia.org/wiki/Bob%20Kushell | Bob Kushell is an American television writer and producer. He has written for network television comedies including The Simpsons, 3rd Rock from the Sun, Malcolm in the Middle, Grounded For Life, American Dad!, Samantha Who?, Suburgatory, Anger Management, and FAM. In 2015, Kushell joined Bill Prady to co-create The Muppets, which ran for 1 season on ABC Television and won a Nickelodeon Kids' Choice Award.
Kushell has been nominated for two primetime Emmy Awards and won a Golden Globe. Paley Center for Media has preserved the first season Salute Your Shorts episode "Sponge Saga" in its New York archive, which had its teleplay written by Kushell.
Kushell is also the creator and writer of Way to Go, a comedy series for the UK's BBC Three about three men who start an assisted suicide business. It was first commissioned by the BBC in November 2012.
In December 2008 he hosted his own online talk show, co-created with his brother-in-law Russell Arch, Anytime with Bob Kushell, on Crackle. The show was a fully featured talk show in five minutes, including a one-joke monologue, a comedy bit and an interview with a celebrity guest. The show ran for two seasons.
References
External links
http://www.tv.com/people/bob-kushell/
http://www.emmys.com/nominations/1997
http://www.emmys.com/nominations/1998
https://web.archive.org/web/20130521182756/http://www.goldenglobes.org/browse/?param=%2Fyear%2F1996
Living people
Place of birth missing (living people)
Year of birth missing (living people)
American television writers
American male television writers
American television producers |
https://en.wikipedia.org/wiki/Two%20Twisted | Two Twisted is an Australian TV mystery anthology drama which premiered on the Nine Network on 14 August 2006. Narrated by Bryan Brown, who also produced the series' predecessor, Twisted Tales, each episode of the series contains two short half-hour stories, that have a twist ending. Also present in each episode is a link or connection between the two tales.
Rather than draw on a pool of experienced writers, the producers of the series issued a call to up-and-coming writers to submit screenplays. Some 2,400 entries were received and from these, 14 finalists were chosen. Directors were chosen in a similar fashion. A mix of experienced and emerging directors were chosen to shoot each episode.
Each episode was shot over a period of four days with each director given another four days to edit.
Cast
Aden Young as Patrick Dempsey
Alex Dimitriades as Roll
Anthony Hayes as Julian Knox
Anh Do as Paramedic
Asher Keddie as Sarah
Bill Hunter as Grandfather
Bryan Brown as Narrator
Craig Horner
Daniel Wyllie as Angus Wilder
Deborah Mailman as Jones
Frank Gallacher as Pierce Bristow
Garry McDonald as Norm
Gary Waddell as Jimmy Kitchen
Greta Scacchi as Adele Partridge
Jacqueline McKenzie as Sarah Carmody
John Sheerin as Mr Rogers
Kestie Morassi as Rose
Kick Gurry as Jenkins
Lisa Hensley as Annabel
Lisa McCune as Fiona Wells
Mark Owen-Taylor as Barry
Melissa George as Mathilda Banks
Peta Sergeant as Isabelle Dempsey
Peta Wilson as Mischa Sparkle
Roy Billing as Barber
Sam Neill as Mick
Sam Worthington as Gus Rogers
Sandy Winton as Bill Banks
Steve Bisley as Frank
Susan Prior as Nurse Hughes
Susie Porter as Sam
Tom Long as Karl Wells
Victoria Thaine as Danielle Carmody
Vince Colosimo as Duncan Cross
Wendy Hughes as Barber's wife
Episodes
(Episode information retrieved from Australian Television Information Archive).
<onlyinclude>
Ratings
Episode Pair Links
In each pair of episodes in Two Twisted, there is a link between them (Like an object or a name that's in both episode).
Here are the links in each pair of episodes:
There's Something About Kyanna & Finding Frank
Mid way into the first episode, the camera moves over a book titled Trespassers.
About the same way through the second episode, the main character Frank, looks at a picture. Behind it is the same book, Trespassers.
Call Back & Heart Attack
Toward the end of the first episode, an ambulance blocks the road as it tends to a fallen bicyclist.
In the second, the lead male suffers a heart attack while on his bike, the same model seen in the previous episode.
Von Stauffenberg's Stamp & A Date With Doctor D
In the middle of the first episode, an offer was made to buy the barbershop.
In the second, Rolly broke a coffee cup that had underneath it a corporate proposal to buy the barbershop in the first episode.
Soft Boiled Luck & Arkham's Curios and Wonders
Near the start of the first episode, a red cube puzzle is used as "a cognitive test for the shrinks, part |
https://en.wikipedia.org/wiki/Mikro-Gen | Mikro-Gen was a UK software company based in Bracknell, Berkshire that produced games for home computers in the early to mid-1980s.
The company was formed by Mike Meek and Andrew Laurie in 1981, in order to capitalise on the growing boom of microcomputers in the home. The company had a solid reputation but became more prominent with its series of games featuring Wally Week and his family, all of which got excellent reviews in the highly respected computer magazine Crash. Later, the company produced the Mikro-Plus add-on for the ZX Spectrum.
The company was bought out by Creative Sparks Distribution in 1987, which subsequently went into receivership six months later.
Releases
Star Trek - 1982.
Knockout - 1983.
Mad Martha - 1983.
Genesis II - 1984 - written by Dale & Shelley McLoughlin.
Witch's Cauldron - 1985 - written by Dale & Shelley McLoughlin
Laserwarp - 1983; Reviewed in Crash with an overall score of 77%
Air Traffic Control - 1984 - by Dale McLoughlin
Shadow of the Unicorn - 1985. Reviewed in Crash issue 24 - 7/10 - required Mikro-Plus Expansion Unit to run
Battle of the Planets - 1985. Reviewed in Crash issue 26 - 71%
Equinox - 1986. Reviewed in Crash issue 30 - 87%
Stainless Steel - 1986.
Wally Week series
Automania - 1984. Reviewed in Crash with an overall score of 88%
Pyjamarama - 1984. Reviewed in Crash issue 10 - 92%
Everyone's A Wally - 1985. Reviewed in Crash issue 14 - 93%
Herbert's Dummy Run - 1985. Reviewed in Crash issue 18 - 90%
Three Weeks in Paradise - 1985. Reviewed in Crash issue 26 - 93%
Mikro-Plus
The Mikro-Plus was an add-on for the ZX Spectrum computer. While this computer was limited to 48KB of usable RAM, the Mikro-Plus let it load 64KB programs by storing 16KB as a shadow ROM in the add-on itself, and loading the remaining 48KB from cassette tape as usual. Mikro-Gen invested £130,000 in producing it. Bundled with the game Shadow of the Unicorn, it reached no. 5 in the ZX Spectrum charts and no.9 in the All Formats charts in October 1985. It sold 11,000 copies, almost 30,000 short of the number needed to break even and no further Mikro-Plus games were produced.
References
Software companies of the United Kingdom
Defunct video game companies of the United Kingdom
Companies based in Bracknell
1987 mergers and acquisitions |
https://en.wikipedia.org/wiki/Lieutenant%20Green | Lieutenant Green is a fictional character in the 1960s British Supermarionation television series Captain Scarlet and the Mysterons and its 2000s computer-animated remake, New Captain Scarlet.
In both series, Green serves as the personal assistant to Spectrum commander-in-chief Colonel White, and is shown to be an expert in computer programming and electronics. In the former, which depicts him as a native of Trinidad and Tobago, he is the only non-white male officer on Cloudbase and the only lieutenant among its personnel. In the latter, the character is re-imagined as a woman.
The original Green is the only black male character to have a substantial role in a Gerry Anderson Supermarionation series.
Appearances
Captain Scarlet
In the original series, Green (born Seymour Griffiths) spends most of his time in the Cloudbase control room. He assists Colonel White in the execution of Spectrum assignments by accessing data and radio links from a large supercomputer, which he operates from a moveable chair. At White's command, Green can activate the control room's display screen or speak on the base's public address system. Green rarely leaves Cloudbase, although he occasionally mentions how he would relish an opportunity to meet the Mysteron agent Captain Black "face to face". Other Cloudbase personnel assist White whenever Green is absent.
The character's voice was provided by Guyanese actor and singer Cy Grant, on whom the puppet's appearance was based. He was known to series creators Gerry and Sylvia Anderson for his regular calypso contributions to the current affairs programme Tonight.
New Captain Scarlet
In the remake series, Green (born Serena Lewis) is re-imagined as a 27-year-old African-American woman, originally from Texas. She remains confined to Skybase (the new series' Cloudbase), but her desk is smaller and her computer uses holographic technology. She is knowledgeable about all aspects of Spectrum and used to work for the United Nations. She is attracted to Captain Blue. At the end of the episode "Proteus", she is offered a promotion to the rank of captain but elects to remain a lieutenant. Gerry Anderson described the re-imagined character as an "incredibly efficient assistant" to Colonel White.
The character's appearance was loosely modelled on "Jinx" Johnson (played by Halle Berry) in the James Bond film Die Another Day (2002). She was voiced by Jules de Jongh.
Reception
When it was repeated on British television in 1993, Captain Scarlet and the Mysterons drew criticism for its use of the codenames "White" (for the benevolent Colonel White) and "Black" (for the villainous Captain Black), with some commentators viewing these opposing colour designations as racially charged and politically incorrect. Gerry Anderson responded to these allegations by pointing out that the series features heroic non-white characters in the form of Green, Melody Angel and Harmony Angel.
Green's original voice actor, Cy Grant, believed that Captain |
https://en.wikipedia.org/wiki/Smartfren | PT Smartfren Telecom Tbk, commonly known as Smartfren (stylized as smartfren.), formerly known as PT Mobile 8 Telecom Tbk, is an Indonesia-based wireless network operator headquartered in Central Jakarta. It is owned by Indonesian conglomerate Sinar Mas under the company PT Sinar Mas Komunikasi Teknologi. Smartfren operates exclusively using a 4G LTE network after shifting away from CDMA technologies in 2014. As of 2018, Smartfren has 10.1 million active subscribers, making them the fifth-largest wireless carrier in the country.
Smartfren provides wireless voice (via VoLTE) and data services in Indonesia, which it claims is available in over 200 cities. In 2015, the company launched their LTE-Advanced network, becoming the first in the country to do so.
Andromax
Smartfren has partnered with some China-based smartphone manufacturers such as Hisense, Haier and ZTE to produce smart devices under the Smartfren Andromax brand. These phones operate on either CDMA 2000 1x or LTE on the newer models. They use the following naming scheme:
C and G models denote lower-end smartphone models
I and T models denote lower to midrange models
U, V and Z models denote mid to high-end smartphones.
More recently they have also launched the E, Q and R models which has LTE capability; and the E2 and R2 models which supports VoLTE.
Slogans
As Smart Telecom
Smart, Hebat, Hemat (2006-2011)
As Mobile-8 Telecom
Fren
Kartu Selularku (2003-2006)
Seluler Pilihan Cerdas (2006-2008)
Murah, Tidak Repot. (2008-2009)
hemat, Tidak Repot. (2009-2011)
Hepi
Pasti Lebih Untung (2008-2010)
As Smartfren
Live Smart (2011-2018)
4G Go For It (2015-2018, After Smartfren Launch Andromax 4G LTE)
Hebat, Hemat, Cepat (2018-present)
Juaranya Internet Unlimited (2018-present)
References
External links
Official websites:
Indonesian
English
Indonesian brands
Indonesian companies established in 2002
Mobile phone companies of Indonesia
Companies listed on the Indonesia Stock Exchange
Sinar Mas Group
Telecommunications companies established in 2002
Telecommunications companies of Indonesia
2006 initial public offerings |
https://en.wikipedia.org/wiki/Common%20Hybrid%20Interface%20Protocol%20System | Common Hybrid Interface Protocol System (CHIPS) is the definition of a computer network that consists of a mixture of common serial data protocols such as RS-232 and RS-485, or can be even PC keyboard interface communication. CHIPS may also consist of Bluetooth and Wi-Fi for wireless communication can be installed on all major hardware platforms.
There are several CHIPS projects and products available today where such systems are i.e. MISOLIMA DOLLx8 and Olivetti's "Mael Gateasy". As new bus systems are gaining market shares, there will always be needs for CHIPS to enable serial network protocols to be integrated into one single connection point. By using CHIPS, it will be possible to control I/O data from different sources and systems without having the need to install several serial interface cards and drivers.
CHIPS users will, in most cases, be able to work with several serial data transceiver sources at the same time. Such serial data might originate from PC Keyboards, CANbus, RS and wireless communication where all data connects into one or several CHIPS units that communicate over the mixed serial data protocols.
Due to some mixed baud rates between the connected systems, the compatibility with CHIPS means that some devices will have reduced transfer rates, but CHIPS are primary designed for Lab-, office-, home-, factory- and building automation also used in Internet of Things.
References
Network architecture |
https://en.wikipedia.org/wiki/Yankees%20Classics | Yankees Classics is a program on the YES Network which features classic New York Yankees games.
Each Yankees Classics episode is hosted by Yankees radio announcer John Sterling, who discusses the game's impact on Yankees history at the beginning and end of the telecast.
Network broadcast library
When it debuted in 2002 as one of the first series to air on YES, Yankees Classics consisted entirely of regular season games from the team's local broadcasts, via WPIX, MSG Network, and WNYW. In 2003, YES acquired rights to rebroadcast playoff games that aired nationally on Fox. In 2007, YES and Major League Baseball acquired rights to games that aired on ABC as part of MLB's then-TV deal with ESPN, including Bobby Murcer's five runs batted in during the game the night of Thurman Munson's funeral. Other games included in this transaction are Game 5 of the 1976 ALCS and Game 6 of the 1977 World Series. In 2008, YES and MLB gained the rights to NBC's telecasts of 1978 and 1999 World Series games.
Graphics and announcers used
The logos of the original broadcasters originally were covered by the YES Network logo; eventually, the logos were then replaced by the Yankees logo. The announcers used were a combination of the Yankees radio announcers and national broadcasters used during the telecast, with the audio feed constantly changing during the game from one announcing team to the other, possibly to prevent advertisements or station promos to be heard, or to include Yankee broadcasters Sterling and Michael Kay giving calls of a Yankee home run, or of Sterling's signature victory closing: "Ballgame over! Yankees win! The-e-e-e Yankees win!" Regular season games since YES' launch in 2002 simply take the TV broadcast, with most out-of-date sponsor plugs removed.
Typically scheduled air dates
A specific Yankees Classic often is shown on its anniversary or on a day when the current team is playing the same opponent. (For example, on October 2, or when the Yankees are scheduled to play the Boston Red Sox, the 1978 playoff game for the American League Eastern Division title, featuring the improbable home run by Bucky Dent, often is broadcast.) Other possibilities include honoring a Yankee on his birthday by showing a Yankees Classics in which he was the game's hero. (For example, on June 26, Derek Jeter's birthday, YES may broadcast Game 4 of the 2001 World Series, which Jeter won with an extra-inning home run; this was his "Mr. November" game.) Games featuring individual Yankee achievements, such as Ron Guidry's 18-strikeout game, no-hitters, and David Cone's 1999 perfect game often are shown, for example, to coincide with programs about Yankee pitchers.
As with other re-broadcast games, some innings are skipped due to time restrictions.
Criticism
Yankees Classics has been criticized for showing recent games, including those from the current MLB season, when there are many games which haven't been seen in decades. For example, although the memorable 1978 pla |
https://en.wikipedia.org/wiki/FINE | FINE is an informal association of the four main fair trade networks: Fairtrade Labelling Organizations International (FLO), International Fair Trade Association (now the World Fair Trade Organization, WFTO), Network of European Worldshops (NEWS!) and European Fair Trade Association (EFTA) that was created in 1998.
Aims and goals
The aim of FINE is to enable these networks and their members to cooperate on:
the development of harmonized core standards and guidelines for fair trade,
harmonization, and increase in the quality and efficiency of fair trade monitoring systems,
advocacy and campaigning work, harmonization of their information and communication systems.
FINE is an informal working group. It has no formal structure and no decision-making power. Meetings are held as required. Preparation, hosting and facilitation of the meetings rotates between members. Decisions are taken by the boards of the FINE members.
Since April 2004 FINE has run a fair trade advocacy office in Brussels. Its role is to coordinate the advocacy activities of fair trade proponents at both the European and the international levels. The aim of the office is to step up public support for fair trade and to speak out for trade justice.
Definition of fair trade
In 2001, FINE members agreed the following definition of fair trade, on which to base their
work:
FINE members further agreed to define fair trade's strategic intent as:
deliberately to work with marginalised producers and workers in order to help them move from a position of vulnerability to security and economic self-sufficiency,
to empower producers and workers as stakeholders in their own organisations,
actively to play a wider role in the global arena to achieve greater equity in international trade.
FINE publications
FINE. (2005) Fair Trade in Europe 2005: Facts and Figures on Fair Trade in 25 European countries. Brussels: Fair Trade Advocacy Office
FINE (2006). Business Unusual. Brussels: Fair Trade Advocacy Office
External links
Fairtrade Labelling Organizations International (FLO)
World Fair Trade Organization (WFTO)!
European Fair Trade Association (EFTA)
Fair Trade Advocacy Office
Fair trade organizations
Organizations established in 1998
Organisations based in Bonn |
https://en.wikipedia.org/wiki/Double%20dabble | In computer science, the double dabble algorithm is used to convert binary numbers into binary-coded decimal (BCD) notation. It is also known as the shift-and-add-3 algorithm, and can be implemented using a small number of gates in computer hardware, but at the expense of high latency.
Algorithm
The algorithm operates as follows:
Suppose the original number to be converted is stored in a register that is n bits wide. Reserve a scratch space wide enough to hold both the original number and its BCD representation; bits will be enough. It takes a maximum of 4 bits in binary to store each decimal digit.
Then partition the scratch space into BCD digits (on the left) and the original register (on the right). For example, if the original number to be converted is eight bits wide, the scratch space would be partitioned as follows:
Hundreds Tens Ones Original
0010 0100 0011 11110011
The diagram above shows the binary representation of 24310 in the original register, and the BCD representation of 243 on the left.
The scratch space is initialized to all zeros, and then the value to be converted is copied into the "original register" space on the right.
0000 0000 0000 11110011
The algorithm then iterates n times. On each iteration, any BCD digit which is at least 5 (0101 in binary) is incremented by 3 (0011); then the entire scratch space is left-shifted one bit. The increment ensures that a value of 5, incremented and left-shifted, becomes 16 (10000), thus correctly "carrying" into the next BCD digit.
Essentially, the algorithm operates by doubling the BCD value on the left each iteration and adding either one or zero according to the original bit pattern. Shifting left accomplishes both tasks simultaneously. If any digit is five or above, three is added to ensure the value "carries" in base 10.
The double-dabble algorithm, performed on the value 24310, looks like this:
0000 0000 0000 11110011 Initialization
0000 0000 0001 11100110 Shift
0000 0000 0011 11001100 Shift
0000 0000 0111 10011000 Shift
0000 0000 1010 10011000 Add 3 to ONES, since it was 7
0000 0001 0101 00110000 Shift
0000 0001 1000 00110000 Add 3 to ONES, since it was 5
0000 0011 0000 01100000 Shift
0000 0110 0000 11000000 Shift
0000 1001 0000 11000000 Add 3 to TENS, since it was 6
0001 0010 0001 10000000 Shift
0010 0100 0011 00000000 Shift
2 4 3
BCD
Now eight shifts have been performed, so the algorithm terminates. The BCD digits to the left of the "original register" space display the BCD encoding of the original value 243.
Another example for the double dabble algorithm value 6524410.
104 103 102 101 100 Original binary
0000 0000 0000 0000 0000 1111111011011100 Initialization
0000 0000 0000 0000 0001 1111110110111000 Shift left (1st)
0000 0000 0000 0000 0011 1111101101110000 Shift left (2nd)
0000 0000 0000 0000 0111 1111011011100000 Shift left (3rd)
0000 000 |
https://en.wikipedia.org/wiki/Subtext%20%28software%29 | Subtext is a blog publishing system written in C# on ASP.NET. All data is stored in a Microsoft SQL Server database.
The latest release of Subtext is 2.5, released on June 6, 2010. It is distributed under the BSD License.
Features
XHTML and CSS compliant
Search engine-friendly permalink structure via friendly URLs
TrackBack and Pingback
Hosts multiple blogs on a single installation
MetaWeblog API support
Skinnable
Really Simple Discovery
BlogML support
OpenID support
Tag support
History
Subtext was announced on May 4, 2005, but the first release (Subtext Nautilus Edition) wasn't announced until March 2, 2006.
Subtext was founded as a fork of the BSD Licensed .Text blogging engine written by Scott Watermasysk. .Text went on to be packaged within the Telligent Community product (formerly known as Community Server by Telligent Systems. Subtext is the blog engine used by MySpace for its Chinese site.
Subtext is hosted on Google Code and is led by Phil Haack.
Releases
Subtext 1.0 - March 4, 2006
Subtext 1.5 - June 7, 2006
Subtext 1.9 - August 31, 2006
Subtext 1.9.2 - October 26, 2006
Subtext 1.9.3 - December 14, 2006
Subtext 1.9.4 - February 12, 2007
Subtext 1.9.5 - May 12, 2007
Subtext 2.0.0 - August 10, 2008
Subtext 2.1 - November 27, 2008
Subtext 2.1.2 - July 29, 2009
Subtext 2.5.0 - June 6, 2010
See also
Blog software
Blog
References
External links
SubtextProject.com - Official Subtext Project Website
Blog software
Internet services supporting OpenID
Content management systems
Website management
Software using the BSD license |
https://en.wikipedia.org/wiki/The%20Pet%20Psychic | The Pet Psychic is an hour-long television program that was broadcast on the Animal Planet network in the United States. The show was created by Yehuda Goldman and co-created by Todd Thompson, and senior broadcast executive Todd Mason, who also served as the shows executive producer. The program premiered on June 3, 2002, and featured Sonya Fitzpatrick as a psychic who claimed she could communicate with various animals including audience members' departed pets. Subject animals included the normal cats and dogs as well as horses, various birds and farm animals.
The program was scheduled on Monday evenings beginning at 8:00PM Eastern/7:00PM Central. The last regular airing of the program was on January 1, 2003. Animal Planet schedules no further broadcasts.
Background of Sonya Fitzpatrick
As a young girl in England, Sonya learned early of her alleged unusual ability to feel the emotions and physical aches and pains of her terrier dog. One year her family raised three geese on their farm. Sonya became very attached to the fowls and believed she could feel their thoughts and emotions. When her father killed the geese for the family Christmas meal, she realized that no one else in her family had the same attachments to the animals. She then decided to make every effort to ignore her alleged unique abilities.
Around 1994, Sonya reconnected with her alleged psychic abilities and used her alleged telepathic skills to serve as a conduit for all types of animals. She attempts to use her alleged talent to explain pets’ behavioral problems and ailments.
Notes
Further reading
External links
American non-fiction television series
Animal Planet original programming
2002 American television series debuts
2003 American television series endings |
https://en.wikipedia.org/wiki/Process%20mining | Process mining is a family of techniques relating the fields of data science and process management to support the analysis of operational processes based on event logs. The goal of process mining is to turn event data into insights and actions. Process mining is an integral part of data science, fueled by the availability of event data and the desire to improve processes. Process mining techniques use event data to show what people, machines, and organizations are really doing. Process mining provides novel insights that can be used to identify the execution paths taken by operational processes and address their performance and compliance problems.
Process mining starts from event data. Input for process mining is an event log. An event log views a process from a particular angle. Each event in the log should contain (1) a unique identifier for a particular process instance (called case id), (2) an activity (description of the event that is occurring), and (3) a timestamp. There may be additional event attributes referring to resources, costs, etc., but these are optional. With some effort, such data can be extracted from any information system supporting operational processes. Process mining uses these event data to answer a variety of process-related questions.
There are three main classes of process mining techniques: process discovery, conformance checking, and process enhancement. In the past terms like Workflow Mining and Automated Business Process Discovery (ABPD) were used.
Overview
Process mining techniques are often used when no formal description of the process can be obtained by other approaches, or when the quality of existing documentation is questionable. For example, application of process mining methodology to the audit trails of a workflow management system, the transaction logs of an enterprise resource planning system, or the electronic patient records in a hospital can result in models describing processes of organizations. Event log analysis can also be used to compare event logs with prior model(s) to understand whether the observations conform to a prescriptive or descriptive model. It is required that the event logs data be linked to a case ID, activities, and timestamps.
Contemporary management trends such as BAM (Business Activity Monitoring), BOM (Business Operations Management), and BPI (business process intelligence) illustrate the interest in supporting diagnosis functionality in the context of Business Process Management technology (e.g., Workflow Management Systems and other process-aware information systems). Process mining is different from mainstream machine learning, data mining, and artificial intelligence techniques. For example, process discovery techniques in the field of process mining try to discover end-to-end process models that are able to describe sequential, choice relation, concurrent and loop behavior. Conformance checking techniques are closer to optimization than to traditional learning app |
https://en.wikipedia.org/wiki/Redbanc | Redbanc is an interbank network in Chile connecting the ATMs of all the banks in Chile. ATMs are available all over Chile and Redbanc ATMs work with any Cirrus, MasterCard, or Visa card.
History
All the ATMs in Chile are on the Redbanc system after Redbanc merged with Banlider and the ATMs of Banco del Estado.
External links
Official website
Interbank networks
Financial services companies of Chile
Chilean companies established in 1987
Financial services companies established in 1987 |
https://en.wikipedia.org/wiki/Emily%20J.%20Miller | Emily Miller (born ) is an American political communications strategist, journalist and author. She has worked as the senior political correspondent at One America News Network, and before that as chief investigative reporter for WTTG, the local Fox affiliate in Washington, D.C., and was senior editor of The Washington Times opinion pages. She also worked as deputy press secretary for Secretaries of State Colin Powell and Condoleezza Rice, and as communications director for House Majority Whip Tom DeLay. In 2012, she was awarded the Clark Mollenhoff Award for Investigative Reporting from the conservative Institute on Political Journalism for her column series "Emily Gets Her Gun".
In August 2020, she was the Assistant Commissioner for Media Affairs at the U.S. Food and Drug Administration until she was dismissed from her position after only 11 days.
Education
Miller graduated from Georgetown University.
Career
Deputy press secretary at Department of State
Miller served as the deputy press secretary at the U.S. Department of State for Secretaries of State Colin Powell and Condoleezza Rice. Before this, Miller worked as communications director for House Majority Whip Tom DeLay.
In 2004, while working as deputy press secretary for Colin Powell, Miller was criticized when she attempted to abruptly end an interview he was giving to Meet the Press. She instructed the cameraman to stop filming Powell, although Powell finished the interview after instructing Miller to allow him to continue. A spokesman for the State Department later defended Miller, saying that she had ended the interview because it had run long despite her "[making] every attempt to get NBC to finish up".
Editor, columnist and reporter
Miller worked at ABC News as an associate producer for the television shows This Week and Good Morning America. She then went on to become a senior editor for Human Events and a gossip columnist for Politics Daily. After this, she worked at The Washington Times as a columnist and senior editor of their opinion pages, where she wrote opinion pieces with titles such as "Maryland's bathroom bill benefits few transgenders, puts all girls at risk from pedophiles" and "New Obamacare ads make young women look like sluts".
In April 2014, WTTG, a Fox affiliate in Washington, D.C., announced their hiring of Miller as their chief investigative reporter. In June 2016, she moved to One America News Network as their senior political correspondent.
Home invasion
Miller has described herself as a victim of a home invasion several times, including in a speech at a gun lobbyist event and in a reenactment produced by NRA All Access.
In 2012, Miller was awarded the Clark Mollenhoff Award for Investigative Reporting by the conservative Institute on Political Journalism for her "Emily Gets Her Gun" column series in The Washington Times, in which she describes her attempt to legally acquire and register a handgun in Washington D.C. after experiencing a home invasio |
https://en.wikipedia.org/wiki/Otto. | Otto. (spelled with the period) is Finland's interbank network, connecting the ATMs of nearly every bank in the country. It is owned and operated by Automatia. They offer service in Finnish and Swedish, but also in English to holders of international ATM cards. The word "Otto" means "withdrawal" in Finnish, and is also a relatively common given name. The withdrawal points use machines from two different equipment manufacturers: NCR's Scottish subsidiary and German Wincor Nixdorf. The software and the new chip card readers have been supplied by Fujitsu Finland, and the information system is in charge of Tieto-Evry.
Some of the particularities of Otto. are that there are no bank-specific ATMs in Finland. Every ATM only bears the Otto. logo, plus the other interbank networks, which include Mastercard, Visa, American Express and their affiliated brands. Also, there are two separate slots. The blue one is for chip cards, whereas the yellow one is for non-chip cards that only have a magnetic stripe.
History
Automatia Pankkiautomaatit started its operations in 1994, when it bought the cash machines of the biggest banks, namely SYP, KOP, Postipankki and Osuuspankki.
Automatia was jointly owned by four banking conglomerates. The background to the establishment was cutting the costs of automatic machines and the banking crisis in Finland. The goal was to prune the banks' automated network, which had grown too dense, and to centralize maintenance. Savings banks still had their own machines after this.
Since the beginning of 2005, the ATMs of the largest banks have been in the possession of Automatia Pankkiautomaatit Oy.
The number of withdrawal points has decreased. In 2006, there were about 1,700 of them.
Ottopistiei had a monopoly position in the Finnish ATM market until the spring of 2008, when Nosto machines were installed in the R-kiosks still owned by Rautakirja. In 2012, they were joined by the Cash machine brand from Eurocash.
In 2009, Ottopistei started showing an advertisement for Saunalahti after the end of the transaction. In the 2010s, Ottopiste had the opportunity to make a donation to charity when withdrawing.
The number of withdrawal points decreased slightly during 2017 because the S group removed them from its premises due to the end of the cooperation. They were replaced by Nosto automata. Most of the removed Ottopoints were placed in new premises.
In February 2020, Danske Bank, Nordea and OP Ryhmä sold Automatia Pankkiautomaatit Oy to Swedish Loomis AB.
References
External links
Official website
Financial services companies of Finland
Interbank networks |
https://en.wikipedia.org/wiki/Identity%20driven%20networking | Identity driven networking (IDN) is the process of applying network controls to a network device access based on the identity of an individual or a group of individuals responsible to or operating the device. Individuals are identified, and the network is tuned to respond to their presence by context.
The OSI model provides a method to deliver network traffic, not only to the system but to the application that requested or is listening for data. These applications can operate either as a system based user-daemon process, or as a user application such as a web browser.
Internet security is built around the idea that the ability to request or respond to requests should be subjected to some degree of authentication, validation, authorization, and policy enforcement. Identity driven networking endeavors to resolve user and system based policy into a single management paradigm.
Since the internet comprises a vast range of devices and applications there are also many boundaries and therefore ideas on how to resolve connectivity to users within those boundaries. An endeavor to overlay the system with an identity framework must first decide what an Identity is, determine it, and only then use existing controls to decide what is intended with this new information.
The Identity
A digital identity represents the connectedness between the real and some projection of an identity; and it may incorporate references to devices as well as resources and policies.
In some systems, policies provide the entitlements that an identity can claim at any particular point in time and space. For example, a person may be entitled to some privileges during work from their workplace that may be denied from home out of hours.
How it might work
Before a user gets to the network there is usually some form of machine authentication, this probably verifies and configures the system for some basic level of access. Short of mapping a user to a MAC address prior or during this process (802.1x) it is not simple to have users authenticate at this point. It is more usual for a user to attempt to authenticate once the system processes (daemons) are started, and this may well require the network configuration to have already been performed.
It follows that, in principle, the network identity of a device should be established before permitting network connectivity, for example by using digital certificates in place of hardware addresses which are trivial to spoof as device identifiers. Furthermore, a consistent identity model has to account for typical network devices such as routers and switches which can't depend on user identity, since no distinctive user is associated with the device. Absent this capability in practice, however, strong identity is not asserted at the network level.
The first task when seeking to apply Identity Driven Network controls comprises some form of authentication, if not at the device level then further up the stack. Since the first piece of infrastru |
https://en.wikipedia.org/wiki/Jiawei%20Han | Jiawei Han (; born August 10, 1949) is a Chinese-American computer scientist and writer. He currently holds the position of Michael Aiken Chair Professor in the Department of Computer Science at the University of Illinois at Urbana-Champaign. His research focuses on data mining, text mining, database systems, information networks, data mining from spatiotemporal data, Web data, and social/information network data.
Biography
Born in Shanghai on 10 August 1949, Han received his BS from University of Science and Technology of China in 1979 and earned his PhD from the University of Wisconsin-Madison in Computer Science in 1985.
Currently he is a professor at the Department of Computer Science in the University of Illinois at Urbana-Champaign, where he teaches courses on Data Mining, Text Mining, and Information Networks. Han served as the Director of Information Network Academic Research Center (INARC) supported by Network Science Collaborative Technology Alliance (NSCTA) program of U.S. Army Research Lab (ARL) from 2009–2016, and the Co-Director of KnowEng, a BD2k (Big Data to Knowledge) research center funded by NIH in 2014–2019.
Han has chaired or served on over 100 program committees of international conferences and workshops, including PC co-chair of the Second International Conference on Knowledge Discovery and Data Mining (KDD 1996), 2005 (IEEE), International Conference on Data Mining (ICDM), Americas Coordinator of 2006 International Conference on Very Large Data Bases (VLDB). He also served as the founding Editor-In-Chief of ACM Transactions on Knowledge Discovery from Data.
He is an ACM Fellow and an IEEE Fellow. He received the 2004 ACM SIGKDD Innovations Award, and the 2005 IEEE Computer Society Technical Achievement Award. The book: Han, Kamber and Pei, "Data Mining: Concepts and Techniques" (3rd ed., Morgan Kaufmann, 2011) has been popularly used as a textbook worldwide. He was the 2009 winner of the McDowell Award, the highest technical award made by IEEE.
Bibliography
Data Mining: Concepts and Techniques, 3rd edition (with Micheline Kamber and Jian Pei), The Morgan Kaufmann Series in Data Management Systems, Jim Gray, Series Editor Morgan Kaufmann Publishers, 2011.
References
External links
Data Mining Research Group
Jiawei Han's academic website
1949 births
Living people
20th-century American scientists
20th-century American writers
21st-century Chinese scientists
21st-century Chinese writers
Academic staff of Simon Fraser University
American computer scientists
American technology writers
Chinese computer scientists
Chinese emigrants to the United States
Chinese technology writers
Data miners
Fellow Members of the IEEE
Fellows of the Association for Computing Machinery
Scientists from Shanghai
University of Illinois Urbana-Champaign faculty
University of Science and Technology of China alumni
University of Wisconsin–Madison College of Letters and Science alumni
Writers from Shanghai |
https://en.wikipedia.org/wiki/NBC%20News%20Overnight | NBC News Overnight was a television news program on the NBC television network that aired weekday mornings from 1:30 a.m. to 2:30 a.m. (12:30 a.m. to 1:30 a.m. Central) Mondays through Thursdays and 2:00 a.m. to 3:00 a.m. (1:00 a.m. to 2:00 a.m. Central) Fridays from July 5, 1982, to December 3, 1983, for 367 telecasts. The program was noteworthy because during this era, a large majority of TV stations signed off between 1 and 3 a.m., with those few stations that operated 24 hours a day at the time either running syndicated shows and/or old movies.
Key personalities
NBC News Overnight was the brainchild of NBC News president Reuven Frank, who conceived the show as inexpensive overnight programming after Late Night with David Letterman (Mondays-Thursdays) or SCTV Network (Fridays; later Friday Night Videos). The time slot was one that had originally been offered to and partially occupied by Tom Snyder's Tomorrow, before Snyder quit and ended that program in 1981 (and being replaced by Letterman in Snyder's former timeslot in February 1982). Frank had created the news program Weekend in 1974, and the two programs shared a similar, sometimes ironic outlook on the news. Weekend's co-hosts Lloyd Dobyns and Linda Ellerbee were reunited for the program initially, though Bill Schechner replaced Dobyns in November 1982. Herb Dudnick was the program's first executive producer and was succeeded by Deborah B. Johnson.
Humorous sign offs
During the show's early months, the anchors were known for ending the program in a humorous fashion. For example, during one installment, Dobyns was given a very long, complex word to say and he stumbled over it; at the end of that broadcast, the anchor took a moment to praise his writing staff, only to light-heartedly threaten to "take it all back" if they ever included such a word in his scripts again. Dobyns and then Ellerbee closed each show by saying, "And So It Goes." (which had been Dobyns' closing on Weekend). It became a bit of a catchphrase and was the title of Ellerbee's first autobiographical book.
Critical response
NBC News Overnight was widely regarded as one of the smartest television news shows. Appealing to an eclectic audience of college students, nursing mothers, and late shift workers, the show broke the conventional "lowest common denominator" style of most news programs and injected humor into an otherwise seemingly boring medium, while providing news analysis of a kind usually unseen on other major-network newscasts. TIME named it one of the best programs of 1982, calling it "TV's wittiest, toughest, least snazzy news strip", and, after the program left the air, one of the best programs of 1983. The duPont Columbia Awards awards jury cited NBC News Overnight as "possibly the best written and most intelligent news program ever."
Influences
NBC News Overnight was the inspiration for many news shows. From ABC's World News Now to Countdown with Keith Olbermann, many have attempted to imitate Overnig |
https://en.wikipedia.org/wiki/Presidential%20Broadcast%20Service | The Presidential Broadcast Service - Bureau of Broadcast Services (PBS-BBS) (Filipino: Pampanguluhang Serbisyong Pambrodkast - Kawanihan ng mga Serbisyong Pambrodkast), is a state radio network owned by the Philippine government under the Presidential Communications Office (PCO).
PBS operates national radio brands: Radyo Pilipinas 1 - News, Radyo Pilipinas 2 - Sports, Radyo Pilipinas 3 - Alert, Republika FM1 and Capital FM2, as well as international shortwave station Radyo Pilipinas World Service. PBS, along with its television network counterparts People's Television Network and Intercontinental Broadcasting Corporation, which forms the media arm of the PCO.
As one of the attached agencies of the OPS, the PBS-BBS receives funding from the General Appropriations Act (Annual National Budget) and sales from blocktimers and advertisers, among others.
History
Commonwealth and Third Republic
On May 8, 1933, the United States-sponsored Insular Government established and operated radio station DZFM (then KZFM) in the Philippines on the frequency of 710 kilohertz with a power of 10,000 watts through the United States Information Service. In 1944, during the liberation campaign. In September 1946, two months after the Philippines became a republic, KZFM was turned over to the Philippine government. With the transfer was born the Philippine Broadcasting Service (PBS), the second broadcasting organization after Manila Broadcasting Company.
KZFM first operated under the Department of Foreign Affairs until it was transferred to the Radio Broadcasting Board (RBB), created by President Manuel Quezon on September 3, 1937. In 1947, an International Telecommunications Conference in Atlantic City, New Jersey, assigned the letter "D" to replace "K" as the first call letter for all radio stations in the Philippines. On January 1, 1952, the RBB was abolished to give way to the establishment of the Philippine Information Council (PIC) which assumed the function of the RBB, including the operation of DZFM. On July 1, 1952, after the PIC was abolished, DZFM and the Philippine Broadcasting Service (PBS) operated under the Office of the President. In 1959, the both were placed under the newly created Department of Public Information (DPI).
Years hence, the PBS acquired 13 more radio stations, one TV station, DZFM-TV Channel 10 which it time-shared with two other organizations, and changed its name to Bureau of Broadcast Services. September 13 is marked as the anniversary of the PBS.
In the 1960s, PBS expanded to the key provinces with DZEQ in Baguio, DYMR in Cebu, DYCI in Iloilo, DXRP in Davao and DZMQ in Dagupan.
Martial law and into the Fifth Republic
At the same time that the BBS creating its network, another government organization was building up its broadcast capability to rival, or in some instances, complement, that of the BBS. The National Media Production Center (NMPC) had acquired the facilities of Voice of America in Malolos, Bulacan in 1965 and steadil |
https://en.wikipedia.org/wiki/Proc | Proc may refer to:
Proč, a village in eastern Slovakia
Proč?, a 1987 Czech film
procfs or proc filesystem, a special file system (typically mounted to ) in Unix-like operating systems for accessing process information
Protein C (PROC)
Proc, a term in video game terminology
Procedures or process, in the programming language ALGOL 68
People's Republic of China, the formal name of China
the official acronym for the Canadian House of Commons Standing Committee on Procedure and House Affairs
People's Republic of the Congo
Pro*C, a programming language |
https://en.wikipedia.org/wiki/Casio%20BASIC | Casio BASIC is a programming language used in the Casio calculators such as the Classpad, PRIZM Series, fx-9860G Series, fx-5800P, Algebra FX and CFX graphing calculators.
It is also known as "BasicLike" in some models.
This programming language has nothing to do with the more or less standard BASIC, which incorporated from the beginning of the 80s, the so-called "Pocket computers" or "Pocket PC" from Casio, among which the FX series can be found. -702P, Series 100 (PB-100), Series 700 (PB-100), and many others. The version of BASIC of these machines is called Casio POCKETPC BASIC
The language is a linear structured, BASIC-based programming language. It was devised to allow users to program in commonly performed calculations, such as the Pythagorean theorem and complex trigonometric calculations.
Output from the program can be in the form of scrolling or located text, graphs, or by writing data to lists and matrices in the calculator memory. Casio also makes label printers which can be used with rolls of paper for the Casio BASIC calculators. Programs, variables, data, and other items can be exchanged from one calculator to another (via SB-62 cable) and to and from a computer (via USB cable). All new models of Casio graphing calculators have both ports and include both cables.
The Casio calculators, as with those of many of the other big three manufacturers' machines, can acquire data from instruments via a data logger to which probes for temperature, light intensity, pH, sound intensity (dBA), voltage and other electrical parameters, as well as other readings, and custom probes to attach to the data logger can be built and configured for use with the data logger and calculator. Existing instruments can also be modified to interface with the calculator-data logger, in order to collect such data including such things as weather instruments and means of collecting data such as pulse, blood pressure, galvanic skin resistance, EKG and so on.
Like Tiny BASIC, the BASIC interpreter for Casio BASIC restricts variable names to the letters A-Z with just one predefined array (in Casio BASIC, Z, as compared to A in Level I BASIC and @ in Palo Alto Tiny BASIC). For Casio's graphical calculators, italic x, y, r and θ are also used as variable names for certain calculations. Therefore, extending the array size of predefined variable names from 26 to 30.
Numerical data can be stored in the lists and matrices available on Casio calculators. This data can be used to create sprites for non-text programs. In this way, the language can also be used to create games, such as Pong, Monopoly and role-playing games.
Additionally, characters can be stored as strings in the string memory.
Examples
Hello world program in Casio BASIC:
"Hello, world!"
Program to calculate the Fibonacci sequence:
References
External links
A tutorial for making games with Casio BASIC
A source for games and programs written in Casio BASIC. (Not tested/verified)
A complete explan |
https://en.wikipedia.org/wiki/Game%20Description%20Language | Game Description Language, or GDL, is a logic programming language designed by Michael Genesereth for general game playing in artificial intelligence, as part of the General Game Playing Project at Stanford University. GDL describes the state of a game as a series of facts, and the game mechanics as logical rules. GDL is hereby one of the alternative representations for game theoretic problems.
Purpose of GDL
Quoted in an article in New Scientist, Genesereth pointed out that although Deep Blue can play chess at a grandmaster level, it is incapable of playing checkers at all because it is a specialized game player. Both chess and checkers can be described in GDL. This enables general game players to be built that can play both of these games and any other game that can be described using GDL.
Specification
Syntax
GDL is a variant of Datalog, and the syntax is largely the same. It is usually given in prefix notation. Variables begin with "?".
Keywords
The following is the list of keywords in GDL, along with brief descriptions of their functions:
distinct
This predicate is used to require that two terms be syntactically different.
does
The predicate does(?r,?m) means that player (or role) ?r makes move ?m in the current game state.
goal
The predicate goal(?r,?n) is used to define goal value ?n (usually a natural number between 0 and 100) for role ?r in the current state.
init
This predicate refers to a true fact about the initial game state.
legal
The predicate legal(?r,?m) means that ?m is a legal move for role ?r in the current state.
next
This predicate refers to a true fact about the next game state.
role
This predicate is used to add the name of a player.
terminal
This predicate means that the current state is terminal.
true
This predicate refers to a true fact about the current game state.
Rules
A game description in GDL provides complete rules for each of the following elements of a game.
Players
Facts that define the roles in a game. The following example is from a GDL description of the two-player game Tic-tac-toe:
(role xplayer)
(role oplayer)
Initial state
Rules that entail all facts about the initial game state. An example is:
(init (cell 1 1 blank))
...
(init (cell 3 3 blank))
(init (control xplayer))
Legal moves
Rules that describe each move by the conditions on the current position under which it can be taken by a player. An example is:
(<= (legal ?player (mark ?m ?n))
(true (cell ?m ?n blank))
(true (control ?player)))
Game state update
Rules that describe all facts about the next state relative to the current state and the moves taken by the players. An example is:
(<= (next (cell ?m ?n x))
(does xplayer (mark ?m ?n)))
(<= (next (cell ?m ?n o))
(does oplayer (mark ?m ?n)))
Termination
Rules that describe the conditions under which the current state is a terminal one. An example is:
(<= terminal
(line x))
(<= terminal
(line o))
(<= terminal
not boardopen)
Goal states
The goa |
https://en.wikipedia.org/wiki/Test%20data | Test data plays a crucial role in software development by providing inputs that are used to verify the correctness, performance, and reliability of software systems. Test data encompasses various types, such as positive and negative scenarios, edge cases, and realistic user scenarios, and it aims to exercise different aspects of the software to uncover bugs and validate its behavior. By designing and executing test cases with appropriate test data, developers can identify and rectify defects, improve the quality of the software, and ensure it meets the specified requirements. Moreover, test data can also be used for regression testing to validate that new code changes or enhancements do not introduce any unintended side effects or break existing functionalities. Overall, the effective utilization of test data in software development significantly contributes to the production of reliable and robust software systems.
Background
Some data may be used in a confirmatory way, typically to verify that a given set of inputs to a given function produces some expected result. Other data may be used in order to challenge the ability of the program to respond to unusual, extreme, exceptional, or unexpected input.
Test data may be produced in a focused or systematic way (as is typically the case in domain testing), or by using other, less-focused approaches (as is typically the case in high-volume randomized automated tests). Test data may be produced by the tester, or by a program or function that aids the tester. Test data may be recorded for reuse or used only once. Test data can be created manually, by using data generation tools (often based on randomness), or be retrieved from an existing production environment. The data set can consist of synthetic (fake) data, but preferably it consists of representative (real) data.
Limitations
Due to privacy rules and regulations like GDPR, PCI and HIPAA it is not allowed to use privacy sensitive personal data for testing. But anonymized (and preferably subsetted) production data may be used as representative data for test and development. Programmers can also choose to generate mock data, but this comes with its own limitations. It is not always possible to produce enough fake or mock data for testing.
AI-generated "synthetic data" can be another option to generate test data. AI-powered synthetic data generators learn the patterns and qualities of a sample database. Once the training of the AI algorithm has taken place, it can produce as much or as little test data as defined. AI-generated synthetic data needs additional privacy measures to prevent the algorithm from overfitting. Some commercially available synthetic data generators come with additional privacy and accuracy controls. The amount of data to be tested is determined or limited by considerations such as time, cost and quality. Time to produce, cost to produce and quality of the test data, and efficiency.
Domain testing
Domain testing is a famil |
https://en.wikipedia.org/wiki/Deductive%20language | A deductive language is a computer programming language in which the program is a collection of predicates ('facts') and rules that connect them. Such a language is used to create knowledge based systems or expert systems which can deduce answers to problem sets by applying the rules to the facts they have been given.
An example of a deductive language is Prolog, or its database-query cousin, Datalog.
History
As the name implies, deductive languages are rooted in the principles of deductive reasoning; making inferences based upon current knowledge. The first recommendation to use a clausal form of logic for representing computer programs was made by Cordell Green (1969) at Stanford Research Institute (now SRI International). This idea can also be linked back to the battle between procedural and declarative information representation in early artificial intelligence systems. Deductive languages and their use in logic programming can also be dated to the same year when Foster and Elcock introduced Absys, the first deductive/logical programming language. Shortly after, the first Prolog system was introduced in 1972 by Colmerauer through collaboration with Robert Kowalski.
Components
The components of a deductive language are a system of formal logic and a knowledge base upon which the logic is applied.
Formal Logic
Formal logic is the study of inference in regards to formal content. The distinguishing feature between formal and informal logic is that in the former case, the logical rule applied to the content is not specific to a situation. The laws hold regardless of a change in context. Although first-order logic is described in the example below to demonstrate the uses of a deductive language, no formal system is mandated and the use of a specific system is defined within the language rules or grammar.
As input, a predicate takes any object(s) in the domain of interest and outputs either one of two Boolean values: true or false. For example, consider the sentences "Barack Obama is the 44th president" and "If it rains today, I will bring an umbrella". The first is a statement with an associated truth value. The second is a conditional statement relying on the value of some other statement. Either of these sentences can be broken down into predicates which can be compared and form the knowledge base of a deductive language.
Moreover, variables such as 'Barack Obama' or 'president' can be quantified over. For example, take 'Barack Obama' as variable 'x'. In the sentence "There exists an 'x' such that if 'x' is the president, then 'x' is the commander in chief." This is an example of the existential quantifier in first order logic. Take 'president' to be the variable 'y'. In the sentence "For every 'y', 'y' is the leader of their nation." This is an example of the universal quantifier.
Knowledge Base
A collection of 'facts' or predicates and variables form the knowledge base of a deductive language. Depending on the language, the |
https://en.wikipedia.org/wiki/York%20Suburban%20School%20District | York Suburban School District is a midsized, suburban, public school district located in York County, Pennsylvania, (USA). It encompasses approximately . According to 2000 federal census data, it serves a resident population of 21,067 people. In 2010 the US Census Bureau reported a population of 21,684 people. In 2009, the District residents’ per capita income was $27,028, while the median family income was $59,192. In the Commonwealth, the median family income was $49,501 and the United States median family income was $49,445, in 2010.
York Suburban School District operates six schools: Yorkshire Elementary School (Valley View at Yorkshire), Valley View Elementary School, East York Elementary School, Indian Rock Elementary School, York Suburban Middle School, and York Suburban Senior High School. Valley View and Yorkshire consist of grades K-2. Indian Rock Elementary and East York Elementary both consist of grades 3–5. York Suburban Middle School consists of grades 6–8. York Suburban Senior High School consists of grades 9-12. The district's colors are orange and black with the Trojan as the mascot.
Extracurriculars
York Suburban School District's students have access to a wide variety of clubs, activities and an extensive sports program.
Sports
The District funds:
Boys
Baseball - AAA
Basketball- AAA
Cross Country - AA
Football - AAA
Golf - AAA
Lacrosse - AAAA
Soccer - AA
Swimming and Diving - AA
Tennis - AA
Track and Field - AAA
Volleyball - AA
Wrestling - AAA
Girls
Basketball - AAA
Cross Country - AA
Field Hockey - AA
Golf - AAA
Lacrosse - AAAA
Soccer (Fall) - AA
Softball - AAA
Swimming and Diving - AA
Girls' Tennis - AAA
Track and Field - AAA
Volleyball - AA
Middle School Sports
Boys
Basketball
Cross Country
Football
Track and Field
Wrestling
Girls
Basketball
Cross Country
Field Hockey
Track and Field
According to PIAA directory July 2012
References
School districts in York County, Pennsylvania
Springettsbury Township, York County, Pennsylvania |
https://en.wikipedia.org/wiki/Deus%20Vitae | Deus Vitae, or is a manga series created by Takuya Fujima.
Plot
In 2068, Leave, a powerful android, is created by the Brain Computer and raised by the human scientist Fenrir to be the new root of mankind; the "Goddess", deciding that the previous human beings are no longer useful, wipes them out and creates four "mothers", each one in charge of a different quarter of the world, and a new race of androids, the Selenoids, classified in castes depending on their strength.
Ash Ramy is one of the few human survivors, member of the Revolutional Organization; after killing a high-ranking Selenoid, he escapes with the help of Lemiu Winslet, one of the lower ranking Selenoids, who joins his fight against the new Goddess.
References
External links
Official web page on Tokyopop's web site
Mania review
2000 manga
Kodansha manga
Seinen manga
Science fiction anime and manga
Tokyopop titles |
https://en.wikipedia.org/wiki/Alin | Alin may refer to:
Alin, Iran, a village
Arid Lands Information Network, a Kenyan NGO
Alin, a magical civilization in the video game Rise of Nations: Rise of Legends
Alianza de Izquierda Nacional (Alliance of the National Left), a left-wing political party in Bolivia
Oscar Alin (1846–1900), Swedish historian and politician
Alin Goyan (born 1983), Armenian singer
A-Lin (born 1983), aboriginal Taiwanese pop singer
See also |
https://en.wikipedia.org/wiki/Moore%20School%20Lectures | Theory and Techniques for Design of Electronic Digital Computers (popularly called the "Moore School Lectures") was a course in the construction of electronic digital computers held at the University of Pennsylvania's Moore School of Electrical Engineering between July 8, 1946, and August 30, 1946, and was the first time any computer topics had ever been taught to an assemblage of people. The course disseminated the ideas developed for the EDVAC (then being built at the Moore School as the successor computer to the ENIAC) and initiated an explosion of computer construction activity in the United States and internationally, especially in the United Kingdom.
Background
The Moore School in Philadelphia, Pennsylvania was at the center of developments in high-speed electronic computing in 1946. On February 14 of that year it had publicly unveiled the ENIAC, the first general-purpose electronic digital computer, developed in secret beginning in 1943 for the Army's Ballistics Research Laboratory. Prior even to the ENIAC's completion, work had begun on a second-generation electronic digital computer, the EDVAC, which incorporated the stored program model. Work at the Moore School attracted researchers including John von Neumann, who served as a consultant to the EDVAC project, and Stan Frankel and Nicholas Metropolis of the Manhattan Project, who arrived to run one of the first major programs written for the ENIAC, a mathematical simulation for the hydrogen bomb project.
World War II had spawned major national efforts in many forms of scientific research—continued in peacetime—that required computationally intensive analysis; the thirst for information about the new Moore School computing machines had not been slaked, but instead intensified, by the distribution of von Neumann's notes on the EDVAC's logical design. Rather than allow themselves to be inundated with requests for demonstrations or slow progress in computer research by withholding the benefits of the Moore School's expertise until papers could be published formally, the administration, including Dean Harold Pender, Prof. Carl Chambers, and Director of Research Irven Travis, respectively proposed, organized, and secured funding for what they envisioned as a lecture series for between 30 and 40 participants enrolled by select invitation.
The 8-week course was conducted under the auspices of the United States Army Ordnance Department and the U.S. Navy's Office of Naval Research, who promised (by verbal authorizations) the $3,000 requested to cover lecturer salaries and fees and $4,000 for travel, printing, and overhead. ($1,569 over this figure was ultimately claimed.)
Even as the Moore School found itself in the computing spotlight, its computer design team was disintegrating into splinter groups who hoped to advance computing research commercially, or academically at more prestigious institutions. In the former group were ENIAC co-inventors J. Presper Eckert and John Mauchly, who t |
https://en.wikipedia.org/wiki/Counterpart%20%28TV%20series%29 | Counterpart is an American science fiction thriller television series starring J. K. Simmons. It was created by Justin Marks and was first broadcast on the premium cable network Starz. The series ran for 20 episodes across two seasons. It premiered on December 10, 2017, and aired its final episode on February 17, 2019.
Premise
Howard Silk, a gentle, quiet office worker, has been working for a Berlin-based United Nations agency, the Office of Interchange (OI), for thirty years. His position is too low for him to be told what his work—exchanging apparently nonsensical messages—really involves. The OI oversees a checkpoint below its headquarters between parallel Earths (the "Alpha" and "Prime" worlds). The parallel Earths were created in 1987 during an experiment by East Germany when only a scientist named Yanek was on-site. The "Alpha world" Yanek met his "Prime world" counterpart, and they soon began studying how the initially identical Earths diverge.
The differences between the two worlds become more pronounced after 1996, when a flu pandemic killed hundreds of millions in the Prime world, setting back the world technologically but advancing it in life sciences. The virus was suspected of being purposely released by the Alpha world into the Prime world, which resulted in a tense cold war between the two worlds, with counterparts used as spies and sleeper agents. Silk's Alpha world continues to resemble ours, but the Prime world becomes quite different. Howard Silk Prime is a ruthless intelligence operative. Matters escalate during the series when a powerful rogue faction on Prime executes long-simmering plans to get revenge on Alpha.
Cast and characters
Main
J. K. Simmons as Howard Silk, an Interface employee at the Alpha world's Office of Interchange (OI), and as Howard Silk Prime, an accomplished agent for Section 2 (clandestine operations) of OI in the Prime world
Olivia Williams as Emily Burton-Silk, Howard's wife in the Alpha world and an employee of Housekeeping (the counterintelligence function) at OI, and as Emily Burton, Prime Howard's ex-wife and also an employee of OI Housekeeping
Harry Lloyd as Peter Quayle, OI Director of Strategy in the Alpha world
Nazanin Boniadi as Clare, Baldwin's handler.
Sara Serraiocco as Nadia Fierro/Baldwin, a mysterious assassin from the Prime world
Ulrich Thomsen as Josef Aldrich (season 1), OI Director of Housekeeping in the Alpha world
Nicholas Pinnock as Ian Shaw, an aggressive OI Housekeeping operative and watchdog in the Prime world, and Emily Prime's lover after her marriage broke down
Mido Hamada as Cyrus (season 1), an OI Housekeeping operative under Aldrich
Betty Gabriel as Naya Temple (season 2), a former FBI agent hired by the OI in the Alpha world to clean house
James Cromwell as Yanek (season 2), the warden of Echo, an underground facility in the Prime world, the scientist from Alpha in 1987 (played by Samuel Roukin) whose inattentive moment allowed an experiment to run amok and |
https://en.wikipedia.org/wiki/Diagnostic%20program | A diagnostic program (also known as a test mode) is an automatic computer program sequence that determines the operational status within the software, hardware, or any combination thereof in a component, a system, or a network of systems. Diagnostic programs ideally provide the user with guidance regarding any issues or problems found during its operation.
Diagnostics programs may be simple or complex, operating unknowingly within everyday devices or awaiting their invocation to make more complex performance assessments. Everyday examples are a microwave oven that displays code F6 to warn of a shorted temperature probe or a garage door opener that flashes its control board's LED four times warning of critically misaligned safety sensors and impending shutdown.
Diagnostic programs are also inserted into consumer electronic products and electronic games. Sometimes if the owner of an electronic device asks the manufacturer how to access the hidden diagnostic program, they may reply to the consumer saying that the information is considered to be "proprietary" and cannot be shared.
History
Early diagnostics programs were procedural instructions performed by humans, not by computer programs. See Built-in test equipment that enabled system operators to perform testing and diagnostics.
As computers became smaller, more mobile, computer programs were used to perform diagnostics tasks. In the late 1960s, Volkswagen introduced the first on-board computer system with diagnostics provisions.
Methods of operation
The diagnostics program for a device or system may be independently located or integrated within. These Methods of Operation are arranged, more-or-less, in order of increasing complexity and their increasing value of diagnostics information.
Background monitoring of system indicators, for statistical analysis of trends, and for recording abnormal events.
Solution-based diagnostics, that test for known failure modes by identifying if their known symptoms are detected.
Black box, which is testing of a mechanism without knowing how it works, and merely focusing on the accuracy of output data based on a known input.
White box, which uses knowledge of a mechanism's inner functions for direct testing.
Operation-oriented, a combination of both black and white box, with one or more black-box operations interleaved with one or more white-box operations. This mode of testing is not preferred, however, some complex systems do not have the necessary interfaces to perform one or the other type independently.
Integrated background diagnostics, that perform testing of system components during idle-time of a system.
Operation-interleaved diagnostics, that incorporate diagnostics into the normal operation of a system component, thus any marginal operating mode is immediately diagnosed. Examples of hardware components with features that assist a diagnostic program are:
Modern hard drives have Self-Monitoring, Analysis and Reporting Technology (SMART) com |
https://en.wikipedia.org/wiki/Spectra | Spectra may refer to:
The plural of spectrum, conditions or values that vary over a continuum, especially the colours of visible light
Spectra (journal), of the Museum Computer Network (MCN)
The plural of spectrum (topology), an object representing a generalized cohomology theory in algebraic topology
Spectra (mathematical association), an association of LGBT mathematicians
Spectra (Latreille 1802), an order of stick-insects, or Phasmatodea
Companies and products
Kia Spectra, a car developed by Kia Motors from 2000 to the present.
Motorola Spectra and Astro Spectra, models of two-way radio.
Optare Spectra, a bus body built by Optare.
Polaroid Spectra, a type of instant camera and instant film formerly produced by the Polaroid Corporation.
RCA Spectra 70, the name for a series of mainframe computers made by RCA, and which were sold to Univac to become the Univac 90/60 series computer.
Spectra, a brand of ultra-high-molecular-weight polyethylene fiber.
Spectra Energy, an American company that was spun out of Duke Energy.
SPECTRA helmet, a ballistic helmet made of Dyneema.
Thales Spectra, an integrated defensive aids suite developed by Thales Group for the Dassault Rafale series of fighter aircraft.
Spectra Group, a Bangladesh conglomerate.
Spectra Experiences, a venue management company.
Entertainment
Bantam Spectra, the science fiction/fantasy imprint of Bantam Books
Sally Spectra, a fictional character on The Bold and the Beautiful
Spectra (poetry collection), a 1916 American literary hoax
Spectra Books, publishing imprint
Spectra, a subsidiary of Comcast Spectacor, an American sports and entertainment company
Spectra Phantom, a character from the TV series Bakugan Battle Brawlers: New Vestroia
Spectra, the name of the enemy planet in the 1970s anime television series Battle of the Planets
Spectra (installation), an artistic installation for the First World War centenary in London
Spectra Vondergeist, a Monster High character
Spectra, a video game published by Mastertronic Group and scored by Chipzel
See also
Spector (disambiguation) (includes Spektor)
Spectre (disambiguation) (includes Specter)
Spectrum (disambiguation)
Specctra (auto-router)
Spectra BSC is a charity crypto token partnered with the National Autistic Society |
https://en.wikipedia.org/wiki/Quantum%20%28video%20game%29 | Quantum is a color vector arcade video game developed at General Computer Corporation for Atari, Inc. and released in December 1982. It was designed by Betty Ryan () who was the first female developer at GCC. The premise of the game is related loosely to quantum physics; the player directs a probe with a trackball to encircle atomic "particles" for points, without touching various other particles. Once the particles are surrounded by the probe's tail they are destroyed.
Gameplay
High score table
To enter initials for a high score, the player uses the trackball to circle letters in the same fashion used during gameplay. If the player achieves the highest score on the table, the initials screen is preceded by another on which adept players can use the trackball to draw their initials.
Legacy
A screenshot of a clone called Tachyon was previewed in Atari 8-bit family magazine ANALOG Computing, but the game was never completed.
A remake, Quantum Recharged, was released in August 2023 for the Nintendo Switch, PlayStation 4, PlayStation 5, Windows, Xbox One, and Xbox Series X/S. It is part of Atari SA's Recharged remake series.
See also
Disco No. 1
Libble Rabble
References
External links
Quantum at Arcade History
1982 video games
Arcade video games
Arcade-only video games
Atari arcade games
Drawing video games
Trackball video games
Vector arcade video games
Video games about microbes
Video games about nuclear technology
Video games developed in the United States |
https://en.wikipedia.org/wiki/CNN%20Newsroom | CNN Newsroom (also simply known as Newsroom) is the branding used for blocks of rolling news programming carried by the U.S. cable network CNN. The program debuted on September 4, 2006, consolidating most of CNN's existing rolling news blocks (including CNN Live Today, Live From, CNN Saturday, CNN Saturday Night, CNN Sunday, and CNN Sunday Night) under a single brand.
Newsroom features live and taped news reports, in addition to analysis from experts on the issues being covered, and headlines throughout each hour.
In April 2023, CNN began to replace Newsroom on weekdays with CNN News Central, with only its weekend editions remaining on the main channel. In September 2023, CNN reintroduced weekday blocks of Newsroom on its new streaming platform CNN Max.
History
CNN Newsroom features various anchors on weekdays and weekends. Since the start of September 8, 2008, the program has employed a single-presenter format.
The program shares the same name of an earlier CNN/U.S. program, debuted in 1989, that was shown commercial-free by teachers in schools.
On June 18, 2012, CNN introduced Around the World presented by Suzanne Malveaux. This hour-long block of news focuses on news across the globe. The show is based in CNN's World Headquarters in Atlanta. On February 25, 2013, Newsroom International was changed to Around the World, but was cancelled on February 7, 2014.
Weekend mornings, which formerly aired under the Newsroom banner before being relaunched as weekend editions of New Day in June 2013, are anchored by Victor Blackwell and Christi Paul. Fredricka Whitfield hosts the weekend daytime edition of Newsroom. The weekend afternoon/evening edition was originally hosted by Don Lemon (later Poppy Harlow and Ana Cabrera).
On August 12, 2013, CNN/U.S. rebranded the a portion of the broadcast of Newsroom as Legal View with Ashleigh Banfield. The 60-minute-long show based in New York focused on the most important legal news of the day, and aired its last episode on September 23, 2016.
From August 12, 2013 to February 7, 2014, Newsroom, with its reduced airtime, aired weekday mornings for two hours anchored by Carol Costello. Wolf Blitzer anchored the a later hour of the program with Brooke Baldwin until February 2014, when the slot was renamed as Wolf. The new show details the latest on politics, breaking news and international news, and was simulcast on CNN International. Wolf was cancelled on November 9, 2018.
On February 10, 2014, an hour of CNN Newsroom was renamed At This Hour with Berman and Michaela , hosted by John Berman and Michaela Pereira.
In November 2014, Poppy Harlow took over primetime anchoring duties on weekend evening editions of CNN Newsroom. The shift was covered by rotating anchors following Don Lemon's move to CNN Tonight in early 2014.
In February 2017, Carol Costello left CNN for HLN, and was succeeded by John Berman and Poppy Harlow. Ana Cabrera took over Harlow's weekend evening slot.
In May 2018, John Berman left t |
https://en.wikipedia.org/wiki/OFFSystem | The Owner-Free File System (OFF System, or OFFS for short) is a peer-to-peer distributed file system in which all shared files are represented by randomized multi-used data blocks. Instead of anonymizing the network, the data blocks are anonymized and therefore, only data garbage is ever exchanged and stored and no forwarding via intermediate nodes is required. OFFS claims to have been created with the expressed intention "to cut off some gangrene-infested bits of the copyright industry."
History
OFFS development started within the hacktivism group The Big Hack in 2003 by the hackers Cheater512, CaptainMorgan, Aqlo and WhiteRaven. In 2004, a rudimentary version was finished, written in PHP, which was distributed as two demo CDs. Following these, SpectralMorning re-implemented the functionality in 2004 in C++, which led to the current "mainline" OFFS client.
On August 14, 2006, CaptainMorgan posted a letter of "closing" addressed to the "Copyright Industry Associations of America", such as the RIAA and MPAA, stating that they have created OFFS with the purpose of ending "all of your problems with consumer copyright infringement."
In 2008, the network consisted of around 50 nodes. On April 11, 2008, a beta test was held with a network size of over 100 nodes. Since SpectralMorning stopped work on OFFS in late 2008, only minor bug fix releases were made to mainline OFF.
Starting from 2007, an alternative, but compatible client was developed, called BlocksNet. Written in Ruby and well-maintained, it saw major improvements over recent time. It has been under development until 2011.
The client OFFLoad is a fork from mainline OFFS, which seemingly adds no features. Reasons for the fork are unclear. Another distantly related program is Monolith, which uses a similar principle to OFFS. It was created after OFFS and features no multi-use of blocks and no networking.
Functional Principle
The OFF System is a kind of anonymous, fully decentralized P2P file sharing program and network. In contrast to other anonymous file sharing networks, which derive their anonymity from forwarding their data blocks via intermediate network nodes, OFFS derives its anonymity from anonymizing the data files. Thus, the system refers to itself as a brightnet to contrast its method of operation with that of private file sharing systems known as darknets and with traditional, forwarding anonymous P2P programs.
Store Procedure
In order to store a file into the local OFFS storage, resp. block cache, choose the tuple size (default 3), split the source file into blocks of size 128 KiB (pad with random data to fit) and for each, do the following:
Select blocks for use as randomizer blocks, or for short, randomizers, from the existing OFFS cache, which have not been used in previous iterations. If not enough randomizers exist in the cache, generate them using a random number generator.
Calculate and store the resulting block in the cache, being the XOR operation.
Update t |
https://en.wikipedia.org/wiki/KOCM | KOCM (channel 46) is a religious television station licensed to Norman, Oklahoma, United States, serving the Oklahoma City area as an owned-and-operated station of the Daystar Television Network. The station's offices and master control facilities are located on 72nd Avenue Northeast in Norman, and its transmitter is located near the John Kilpatrick Turnpike/I-44 in northeast Oklahoma City.
The station first signed on the air in 2003, and was built and signed on by Daystar through Word of God Fellowship.
Technical information
Subchannels
The station's digital signal is multiplexed:
Analog-to-digital conversion
Because it was granted an original construction permit after the Federal Communications Commission (FCC) finalized the DTV allotment plan on April 21, 1997, the station did not receive a companion channel for a digital television station. Instead, at the end of the digital conversion period for full-service television stations, KOCM was required to turn off its analog signal and turn on its digital signal (called a "flash-cut"). KOCM discontinued regular programming on its analog signal, over UHF channel 46, on June 12, 2009, as part of the federally mandated transition from analog to digital television. The station "flash-cut" its digital signal into operation UHF channel 46.
References
External links
Television channels and stations established in 2003
2003 establishments in Oklahoma
OCM
Daystar Television Network affiliates |
https://en.wikipedia.org/wiki/Visual%20Eiffel | Visual Eiffel is an implementation of the Eiffel programming language developed and distributed by Object Tools GmbH, a German company.
Visual Eiffel provides an integrated development environment running on Microsoft Windows. A major design goal is to provide an environment that, unlike EiffelStudio, does not use an original user interface paradigm but instead is comfortable to programmers familiar with such tools as Microsoft's Visual Studio and Borland's Delphi.
Visual Eiffel includes a "Display Machine" for developing GUI applications.
While many other Eiffel compilers generate C, Java bytecode or bytecode for .NET Framework, the Visual Eiffel compiler generates native X86 code.
The compiler (not the graphical environment) is, besides Windows, also available on Linux.
Licensing is free for personal use (with banner) or commercial, with the core GPL.
External links
Visual Eiffel web site
Integrated development environments |
https://en.wikipedia.org/wiki/List%20of%20Statutory%20Instruments%20of%20the%20United%20Kingdom%2C%201963 | This is an incomplete list of Statutory Instruments of the United Kingdom in 1963. This listing is the complete, 68 items, "Partial Dataset" as listed on www.legislation.gov.uk (as at September 2017).
Statutory Instruments
1-499
The Pipe-lines (Notices) Regulations 1963 SI 1963/151
The Consular Conventions (Kingdom of Denmark) Order 1963 SI 1963/370
The Exchange of Securities Rules 1963 SI 1963/490
500-999
The National Insurance (New Entrants Transitional) Amendment Regulations 1963 SI 1963/502
The Companies Registration Office (Fees) Order 1963 SI 1963/511
The Companies Registration Office (Fees) (No. 2) Order 1963 SI 1963/596
The Prison Commissioners Dissolution Order 1963 SI 1963/597
The Consular Conventions (Spanish State) Order 1963 SI 1963/614
The Consular Conventions (Income Tax) (Kingdom of Denmark) Order 1963 SI 1963/615
The Double Taxation Relief (Taxes on Income) (Israel) Order 1963 SI 1963/616
The National Insurance (Consequential Provisions) Regulations 1963 SI 1963/676
The House to House Collections Regulations 1963 SI 1963/684
The Town and Country Planning (Use Classes) Order 1963 SI 1963/708
The Betting Levy Appeal Tribunal (England and Wales) Rules 1963 SI 1963/748
The Criminal Justice Act, 1961 (Commencement No.2) Order, 1963 SI 1963/755
The Clergy Pensions (Channel Islands) Order 1963 SI 1963/785
The Cycle Racing on Highways (Amendment) Regulations 1963 SI 1963/929
The National Parks and Access to the Countryside (Amendment) Regulations 1963 SI 1963/968
The National Insurance (Modification of the Royal Naval Pension Scheme) (Amendment) Regulations 1963 SI 1963/970
The Manorial Documents (Amendment) Rules 1963 SI 1963/976
The Tithe (Copies of Instruments of Apportionment) (Amendment) Rules 1963 SI 1963/977
The Local Government (Compensation) Regulations 1963 SI 1963/999
1000-1499
Horsey Island Mussel Fishery Order 1963 SI 1963/1005
The Copyright (Falkland Islands) Order 1963 SI 1963/1037
The Copyright (St. Helena) Order 1963 SI 1963/1038
The Air Corporations (General Staff, Pilots and Officers Pensions) (Amendment) Regulations 1963 SI 1963/1068
The Air Corporations (General Staff, Pilots and Officers Pensions) (Amendment) (No.2) Regulations 1963 SI 1963/1108
Transport Boards (Payments for Rating Authorities) Regulations 1963 (1) SI 1963/1109
The Foreign Compensation (Hungary) Order 1963 SI 1963/1148
The Government Annuity Table Order 1963 SI 1963/1178
The Federated Superannuation System for Universities (Reckoning of Certain previous Service) Regulations 1963 SI 1963/1219
The Superannuation (Transfer of Agricultural Staff) Rules, 1963 SI 1963/1220
The Meat Inspection Regulations 1963 SI 1963/1229
The National Insurance (Non-participation-Assurance of Equivalent Pension Benefits) Amendment Regulations, 1963 SI 1963/1265
The Animals (Cruel Poisons) Regulations 1963 SI 1963/1278
The Merchant Shipping (Certificates of Competency as A.B.) (Ghana) Order 1963 SI 1963/1316
The Double Taxation Relief (Estate Duty) (France) Order 1963 |
https://en.wikipedia.org/wiki/SoundEdit | SoundEdit was the first popular GUI-based audio editor for digitized audio. It was one of the first significant audio applications for personal computers in general.
SoundEdit was known for its ease of use. It made audio manipulation accessible to those who were not musicians or audio professionals.
History
SoundEdit was one of three audio applications created during a sabbatical by Steve Capps during 1986. The Macintosh had no built-in sound input, so the MacRecorder audio digitizer was invented for this purpose in 1985 by Michael Lamoureux, a mathematics student at the University of California, Berkeley. The MacRecorder hardware and software was publicly released through the Berkeley Macintosh Users Group as a kit in late 1985. SoundEdit first shipped in January 1988, as part of a hardware product called MacRecorder Sound System, by a company called Farallon Computing (which eventually became Netopia). The default sampling rate in SoundEdit was 22,256 Hz.
One of the major drivers for SoundEdit was Apple's HyperCard. With MacRecorder Sound System, stack makers could finally create alternatives to HyperCard's two built-in sounds. The other multimedia programs of the time, (Director and Authorware) also adopted it right away.
In 1991, SoundEdit was bought by Macromind-Paracomp, which became Macromedia (now Adobe Systems).
SoundEdit 16
Macromedia rebranded the program as 'SoundEdit 16' and expanded its capabilities to support CD-quality stereo audio (16-bit) and added QuickTime soundtrack editing and an audio plug-in architecture. The new version also supported handling of sound files bigger than available RAM. A free plug-in was included to convert sound files into '.SWA' format, an early form of mp3 file. These SWA files could be streamed to web viewers using by the free web audio player (downloadable from Macromedia) or by creating a custom interactive Shockwave experience embedded into a web page. Shockwave content is created by using the Director multimedia authoring program.
The SoundEdit 16 software was discontinued by Macromedia in December 2004. The final version only runs on PowerPC Macs running Classic Mac OS. It does not run under Mac OS X.
References
Macintosh-only software
Audio editors |
https://en.wikipedia.org/wiki/Bionix | Bionix may refer to:
Bionix (TV programming block), a program block on the Canadian channel YTV
Air Creation BioniX, a French ultralight trike wing design
AOI: Bionix, a 2001 album by De La Soul, and its title song
Bionix AFV, a family of Singaporean armoured fighting vehicles
The Bionix, a Belgian music production team; see 2014 album Aznavour, sa jeunesse
See also
BionX, a Canadian e-bike electric assist motor manufacturer |
https://en.wikipedia.org/wiki/Sa%20Pobla | Sa Pobla () is a small municipality in the district of Raiguer on Majorca, one of the Balearic Islands. It is a terminus on the Majorca rail network.
The town is in the north of the island. With an area of , stretching from the Serra de Tramuntana, the Plan and the Bay of Alcúdia. It comprises three very different areas: the Marjal, fertile plains in large part devoted to irrigated agriculture; l 'lagoon, a large area of scenic and ecological value where the streams and San Miguel de Muro (of Almadrà).
References
External links
Official website
Populated places in Mallorca |
https://en.wikipedia.org/wiki/CodeSynthesis%20XSD | CodeSynthesis XSD is an XML Data Binding compiler for C++ developed by Code Synthesis and dual-licensed under the GNU GPL and a proprietary license. Given an XML instance specification (XML Schema), it generates C++ classes that represent the given vocabulary as well as parsing and serialization code. It is supported on a large number of platforms, including AIX, Linux, HP-UX, OS X, Solaris, Windows, OpenVMS, and z/OS. Supported C++ compilers include GNU G++, Intel C++, HP aCC, Solaris Studio C++, IBM XL C++, and Microsoft Visual C++. A version for mobile and embedded systems, called CodeSynthesis XSD/e, is also available.
One of the unique features of CodeSynthesis XSD is its support for two different XML Schema to C++ mappings: in-memory C++/Tree and stream-oriented C++/Parser. The C++/Tree mapping is a traditional mapping with a tree-like, in-memory data structure. C++/Parser is a new, SAX-like mapping which represents the information stored in XML instance documents as a hierarchy of vocabulary-specific parsing events. In comparison to C++/Tree, the C++/Parser mapping allows one to handle large XML documents that would not fit in memory, perform stream-oriented processing, or use an existing in-memory representation. The XSD-generated code can target C++98/03 or C++11.
CodeSynthesis XSD itself is written in C++.
References
External links
CodeSynthesis XSD Home Page
An Introduction to the C++/Tree Mapping
An Introduction to the C++/Parser Mapping
An Introduction to XML Data Binding in C++
XML
XML parsers
C++
C++ libraries |
https://en.wikipedia.org/wiki/FactSet | FactSet Research Systems Inc., trading as FactSet, is an American financial data and software company headquartered in Norwalk, Connecticut, United States. The company provides integrated data and software. For fiscal year 2023, FactSet's total ASV and professional services revenues were $2.09 billion. FactSet's total market value is approximately $15 billion.
FactSet provides client support & learning, implementation services, business advisory, data delivery, index services, portfolio data management, and transition services.
FactSet's competitors include Bloomberg L.P., Refinitiv, and S&P Global.
History
1977–1980
FactSet was founded by Howard Wille and Chuck Snyder in 1978. Their partnership began in 1977 when the two worked on Wall Street at Faulkner, Dawkins & Sullivan.
As computers became more prominent at the end of the 1970s, Wille and Snyder thought the industry was changing. When Shearson purchased Faulkner, Dawkins & Sullivan and the company started to expand, Wille and Snyder decided to set out on their own and test their idea for a company that could deliver computer-based financial information. At the time, companies had to purchase raw data directly from a vendor such as Compustat, then hire programmers to make the data user-friendly. Wille and Snyder's vision would offer usable data directly to the client.
Originally, all data was delivered to clients on papers, often by bike messenger. The first and namesake product was a program called "Company FactSet," which produced a four-page company analysis report using the Value Line database. Today, FactSet users connect to FactSet's private network via WAN, Internet, and wireless devices.
1981–1989
In the early 1980s, FactSet employees numbered fewer than 10. In 1981, Snyder found a way to download data from the FactSet computer into Visicalc, meaning that clients could retrieve data from a database directly into a spreadsheet. For the first time, several steps in the process were eliminated, making the data download process dramatically quicker.
In 1984, FactSet added limited screening capabilities, which were expanded in 1988 with the introduction of Universal Screening, which allowed users to stipulate their own screening criteria. Another development during the 1980s was the 1989 release of the company's Private Database Service. Users could now store proprietary data and integrate it with their own information to perform custom analysis.
Former Chairman Philip A. Hadley joined the company as a consultant in 1985.
1990–2000
In 1990, FactSet for Windows was released. That same year, company headquarters moved from New York City to Greenwich, CT.
A London office opened in 1993, the first in Europe. The first Asia-Pacific office opened in Tokyo in 1995.
By the end of 1995, FactSet had fewer than 400 customers, but they included 84 of the United States' top investment managers. The company also changed its name in June 1995, becoming FactSet Research Systems Inc. in prepar |
https://en.wikipedia.org/wiki/Internet%20scavenger%20hunt | An Internet scavenger hunt or CyberHunt is an educational lesson which introduces the Internet to students. It is often used as tool for teaching students how to search the Internet and how to use the resources and information available on the Internet.
It is an online activity in the form of a scavenger hunt that focuses on gathering information from web sites to answer questions or to support a concept on a particular theme or content area. The intent is to hunt for facts or information to add details for the answer to the question. The questions themselves may vary from the simple fact or statement to the more complex, depending upon the age and skill level of the student. By completing CyberHunts, students learn how to navigate a web site, scan a page for detailed information, and then apply the facts or ideas to the question. A CyberHunt is an excellent way to teach beginning internet researching skills.
An Internet scavenger hunt is a fact-finding exercise where students answer a list of questions or solve problems as they practice information seeking skills. A hunt can serve as a powerful tool to introduce the study of a new subject or to supplement the exploration of various sides of an issue.
Although hunts frequently move from web site to web site, some direct a student's exploration of a single, content rich site. The single site strategy is employed to introduce users to the elements of a highly sophisticated site like the Library of Congress site, the government site Congress.gov or the Smithsonian site. This permits the teacher to highlight the key areas of a web site.
History
The first Internet Scavenger Hunt was developed in 1992 by Rick Gates. He was a professor at the University of California at the time. He created the hunt to encourage adults to explore the resources on the Internet. Gates distributed the questions to various Usenet newsgroups, LISTSERV discussion lists, and Gopher and FTP sites. He offered a prize for successful completion. As time went by he developed themed and then highly challenging hunts like researching a single email address.
Levels of sophistication
Beginner hunts are highly directive taking the user via a link, to the specific web page. A moderately challenging activity takes the user to a web site that has the answer to a posed question and requires them to choose an appropriate link, use the site map, or site search engine to locate facts that support their answer. The most sophisticated activity may post several open ended questions that require the student to make many choices including search tool and method, web sites and finally the correct supporting information.
Hunts offer several advantages to using the Internet with younger web users. Since the developer chooses the web pages and links directly to them, this minimizes the risk of students being exposed to inappropriate material. With the student's web interaction highly scripted, misdirection by ads or video can be controlled.
Ins |
https://en.wikipedia.org/wiki/List%20of%20Statutory%20Instruments%20of%20the%20United%20Kingdom%2C%201951 | This is an incomplete list of Statutory Instruments of the United Kingdom in 1951. This listing is the complete, 30 items, "Partial dataset" as listed on www.legislation.gov.uk (as at March 2014).
Statutory Instruments
1-999
The Merchant Shipping (Registration of Sierra Leone Government Ships) Order 1951 SI 1951/143
The Trading with the Enemy (Custodian) Order 1951 SI 1951/153
The National Assistance (Adaptation of Enactments) Regulations 1950 1951 SI 1951/174
The Superannuation (English Local Government and Isle of Man) Interchange Rules 1951 SI 1951/309
The Coal Industry (Superannuation Scheme) (Winding Up, No. 2) Regulations 1951 SI 1951/393
The Airways Corporations (Pilots Pensions) Regulations 1951 SI 1951/527
The Veterinary Surgeons (University Degrees) (Glasgow) Order of Council 1951 SI 1951/571
The Trading with the Enemy (Custodian) (No. 2) Order 1951 SI 1951/779
The Trading with the Enemy (Custodian) (No. 3) Order 1951 SI 1951/780
The Conveyance of Explosives Byelaws 1951 SI 1951/869
The Prevention of Damage by Pests (Application to Shipping) Order 1951 SI 1951/967
The National Insurance and Industrial Injuries (Reciprocal Multilateral Agreement) (France and the Netherlands) Order 1951 SI 1951/972
1000-2224
The Cupro-Nickel Coins (Carriers' Liability) Regulations 1951 SI 1951/1032
The Consular Conventions (Kingdom of Norway) Order in Council 1951 SI 1951/1165
The Administration of Children’s Homes Regulations 1951 SI 1951/1217
The Workmen's Compensation Rules 1951 SI 1951/1235
The Reserve and Auxiliary Forces (Protection of Civil Interests) Rules 1951 SI 1951/1401
The Reserve and Auxiliary Forces (Protection of Civil Interests) (Business Premises) Regulations 1951 SI 1951/1402
The Reserve and Auxiliary Forces (Protection of Industrial Assurance &c. Policies) Regulations 1951 SI 1951/1407
The Reserve and Auxiliary Forces (Protection of Friendly Society Life Policies) Regulations 1951 SI 1951/1408
The Tithe Fees Rules 1951 SI 1951/1534
The Corn Rent Annuities (Apportionment and Redemption) Rules 1951 SI 1951/1535
The Trading with the Enemy (Custodian) (No. 4) Order 1951 SI 1951/1625
The Trading with the Enemy (Custodian) no(No. 5) Order 1951 SI 1951/1626
The National Insurance and Industrial Injuries (Reciprocal Multilateral Agreement) (Belgium) Order 1951 SI 1951/1801
The Hill Farming Improvements (Settled Land and Trusts for Sale) Regulations 1951 SI 1951/1816
The Distribution of German Enemy Property (No. 2) Order 1951 SI 1951/1899
The Coal Industry (Superannuation Scheme) (Winding Up, No. 3) Regulations 1951 SI 1951/2010
The Superannuation (Local Government Staffs) (National Service) (Amendment) Rules 1951 SI 1951/2145
The Town and Country Planning (Construction and Improvement of Private Streets) Regulations 1951 SI 1951/2224
Unreferenced Listings
The following 3 items were previously listed on this article, however are unreferenced on the authorities site, included here for a "no loss" approach.
Luxembourg (Extradition) Order in |
https://en.wikipedia.org/wiki/Birch%20%28disambiguation%29 | Birch is the common name for trees of the genus Betula.
Birch or Birchs may also refer to:
BIRCH, a clustering algorithm
"Birches" (poem), a poem by Robert Frost
Birch (surname)
The Birch, an American undergraduate journal of Eastern European and Eurasian culture
"Birch", a song by Big Red Machine featuring Taylor Swift from the album How Long Do You Think It's Gonna Last?
Places
Australia
Birchs Inlet, Tasmania
United Kingdom
Birch, Essex, England
Birch, Greater Manchester, England
United States
Birch, Nevada, a ghost town
Birch, Wisconsin, a town
Birch, Ashland County, Wisconsin, an unincorporated community
Birch Hill, Wisconsin, a census-designated place
Birch Township, Minnesota
Birch Tree, Missouri
Birch County, South Carolina, a proposed county
Companies
Birch Communications, phone company in the US
See also
Birching, a form of corporal punishment with a birch rod
Birch Brothers, a former bus and coach operator in England
Birchwood (disambiguation)
Burch (disambiguation)
The Birches (disambiguation)
Birch Creek (disambiguation)
John Birch Society, is an advocacy group supporting anti-communism and limited government
White birch (disambiguation) |
https://en.wikipedia.org/wiki/Allpoint | Allpoint is an interbank network connecting automated teller machines (ATMs). It offers surcharge-free transactions at ATMs in its network. It operates in the United States, Canada, Mexico, United Kingdom, Australia, and New Zealand. Allpoint is owned by Cardtronics and is headquartered in Houston, Texas.
History
Allpoint was founded in 2003 by entrepreneur Ben Psillas of ATM National, Inc., who was tired of looking for ATMs from his own bank.
In 2005, Cardtronics acquired ATM National, Inc. and Allpoint.
In September 2008, Allpoint added ATMs at 5,500 7-Eleven stores to its network.
In October 2010, the network expanded to Australia.
In January 2011, the network expanded to Mexico. In July 2016, Fifth Third Bank joined the network.
In 2015, network member KeyBank of Ohio was awarded a contract to distribute unemployment claims in the state of New York. Large numbers of New Yorkers were able to leverage the network affiliation to avoid surcharges against their COVID-19 related unemployment benefits when their preferred ATM machines were emptied during the 2020 pandemic.
In September 2016, First Tennessee joined the network.
In July 2017, Rite Aid joined the network. Kroger stores in Atlanta were also added to the network. Effective July 2017, ATMs in 7-Eleven stores were removed from the network.
In September 2017, Speedway LLC joined the network.
In October 2017, Five Star Bank joined the network.
Also in 2017, the network counted over 200,000 affiliated ATM machines and became the largest ATM owner/operator in the world.
References
Interbank networks
Financial services companies established in 2003
Financial services companies of the United States
Companies based in Houston
Software companies established in 2003
2003 establishments in Maryland |
https://en.wikipedia.org/wiki/Bootstrap%20Network | The Bootstrap Network is an organization of entrepreneurs founded in Austin, Texas in 2003 by Bijoy Goswami. The members, who are all founders of companies, give each other advice on building companies, the name referring to starting a company without outside financing, or 'bootstrapping'.
By 2006, the network had over 500 members in Austin and sister networks in 10 other cities in the US and India. By 2009, it had 1,000 members. Gary Hoover, founder of Hoover's and Bookstop has called Bootstrap Austin "among the most effective tools for entrepreneurs that I have ever seen - and I've seen a lot."
References
External links
Bootstrap Network
Bootstrap Austin (founding chapter)
Organizations based in Austin, Texas
Business organizations based in the United States |
https://en.wikipedia.org/wiki/Nintendo%20Zone | Nintendo Zone was a download service and an extension of the DS Download Station. Users could access content, third-party data, and other services from a hotspot or download station. The service had demos of upcoming and currently available games and may have location-specific content. When the service debuted, users could also connect to the Nintendo Wi-Fi Connection and DSi Shop.
The Nintendo Zone Viewer application allows the Nintendo DSi and 3DS to detect and use the Nintendo Zone service. This application has been discontinued worldwide, but all other Nintendo Zone functionality remains.
History
In collaboration with the restaurant chain McDonald's, the service originated in the Kantō, Chūkyō and Kansai regions of Japan. Over 1,000 DS Download Stations in Japan were planned to be converted into Nintendo Zones to enable SpotPass communications. Nintendo Zone content was available at over 29,000 locations in the United States. The service launched in Europe on April 25, 2012 with approximately 25,000 locations. Nintendo announced in July 2013 that the service would receive StreetPass enhancements. The StreetPass Relay Points system was introduced as part of an firmware update to Nintendo 3DS consoles in August 2013. When a 3DS owner visited a Nintendo Zone location, his or her StreetPass data would have been stored there then transferred when another owner visited with the same games. The viewer would always remain on even if it is out range of a Nintendo Zone.
On December 8, 2011, a 3DS update began that allowed users to access new Nintendo Zones through a variety of new hotspots. A press release showed that Boingo Wireless teamed up with Nintendo of America to allow users automatic access to the zone within 42 Boingo-serviced airports within North America. This has offered a new range of encounters and features without any additional cost.
In December 2013, a new feature was added on in celebration of National StreetPass Weekend. This feature combined and mixed together all Nintendo Zones within North America into one and allowed users who come across a Nintendo Zone to streetpass and exchange data with other 3DS users from all around the continent, as opposed to only those 3DS users who have passed by that specific zone. Through this feature, users were able to StreetPass a maximum of 6 users at a time from other parts of North America. This feature helped raise awareness about Nintendo Zone and what it could offer to 3DS users. It encouraged 3DS users to access a nearby zone in order to meet users from other parts of the continent and to gather more StreetPass relay points. Through this feature, many users were able to exchange information and gameplay items with other users. It also encouraged interaction between 3DS users who own the same game to initiate item exchanges that each users would be able to take away with them once the events are over.
Locations
North American Nintendo 3DS users were able to access the Nintendo Zone i |
https://en.wikipedia.org/wiki/Crystal%20Computing | Crystal Computing, later renamed Design Design, was a British video game developer founded in 1982 by Chris Clarke and Ian Stamp while students at the University of Manchester. Graham Stafford, Neil Mottershead, Simon Brattel and Martin Horsley, joined the company as it expanded. The company's first software release was a compilation of games for the Sinclair ZX81, though it was with the ZX Spectrum that Crystal found its greatest success. A deal with the machine's manufacturer Sinclair to distribute Crystal's Zeus Assembler gave the company sufficient funds for a major marketing campaign for their next product, Halls of the Things, an arcade adventure game that became their most successful title.
Clarke left in 1984 to join Artic Software, where he worked on the "business side", before collaborating with Jon Ritman on the Match Day series.
With Clarke's departure the company was reorganised as Design Design, a trading name that had been used by Brattel since 1976 for his electronic audio designs. Design Design's core consisted of Stafford working mainly on titles for the Commodore 64, Brattel and Mottershead working on the ZX Spectrum and Amstrad CPC, and David Lewellyn, the company's administrator. According to Stafford the new name was part of a wider re-branding, as they wanted a more professional image, along with a better relationship with the press and the public.
Stafford went on to form developer Walking Circles producing titles including The Living Daylights and Spitting Image for Domark and the PC version of Bloodwych for Image Works.
Softography
Crystal Computing
ZX81 Games Pack, ZX81, 1982. Includes versions of Asteroids and Space Invaders, as well as a Dungeons & Dragons style adventure game and a slalom skiing game, all designed to run on an unexpanded machine with 1K RAM.
Merchant of Venus, ZX81, 1982. A space trading/investment game.
Monitor and Disassembler, ZX81, ZX Spectrum, 1982. An assembly language utility.
Cosmic Guerilla, ZX Spectrum, 1983
The Dungeon Master, ZX Spectrum, 1983
Halls of the Things, ZX Spectrum, Amstrad CPC and Commodore 64, 1983
Invasion of the Body Snatchas!, ZX Spectrum, 1983
Zeus Assembler, ZX Spectrum, 1983
Rommel's Revenge, ZX Spectrum, 1984
Bug Blaster, ZX Spectrum, 1984. A Centipede clone.
Cyber Zone, ZX Spectrum, 1984
The Island, ZX Spectrum, 1984
The Warlock of Firetop Mountain, ZX Spectrum, 1984
It's the Wooluf!, ZX Spectrum, 1984.
Tube Way Army, Dragon 32 and Tandy 32K, 1984
Design Design
Dark Star, ZX Spectrum and Amstrad CPC, 1984
Spectacle, ZX Spectrum, 1984 (Additional program supplied with Dark Star - simulated a Teletext environment)
Return of the Things, ZX Spectrum, 1984
2112 AD, ZX Spectrum and Amstrad CPC, 1985
On the Run, ZX Spectrum and Amstrad CPC, 1985
Forbidden Planet, ZX Spectrum and Amstrad CPC, 1986
Halls of the Things Remix, ZX Spectrum, 1986
Invaders, ZX Spectrum, 1986. A Space Invaders clone published as part of the Action Replay compilation of Crystal and Design Design g |
https://en.wikipedia.org/wiki/W%20Channel | W Channel can refer to:
W (British TV channel), UK TV channel
W Network, Canadian cable channel
SoHo (Australian TV channel), Australian cable channel (formerly called W Channel) |
https://en.wikipedia.org/wiki/Gemini%20TV | Gemini TV is an Indian Telugu language general entertainment pay television channel owned by Sun TV Network. It was launched on 9 February 1995. Gemini TV is the first satellite TV channel in Telugu. The channel's programming consists of serials, films, film-based programs and game shows alongside some reality shows. Gemini TV HD was launched on 11 December 2011.
History
Gemini TV was launched on 9 February 1995. It is founded by Gemini Group of Hyderabad (run by A. Manohar Prasad, grandson of L. V. Prasad), in association with Sun TV Network. In 1996-97, Sun TV Network acquired a controlling interest in the channel. Gemini TV is the first satellite TV channel in Telugu. Gemini TV began with only a four-hour service via a Rimsat satellite uplinked from Singapore. Later it expanded its broadcast time to 12 hours a day. By May 2000, Gemini was considered as a strong number two to the leader ETV.
The Sun Group started working in the television business through three companies of which Gemini Television Private Limited broadcast Telugu language channels, while Sun Television Private Limited and Uday Television Private Limited broadcast Tamil and Kannada language channels respectively. In November 2006, Kalanithi Maran merged Gemini TV Ltd with Sun TV Network Ltd along with Udaya TV Ltd for the IPO listing of Sun TV Network.
Sun18
Network18 Group has 50% dealing distribution with Sun TV Network, which led them to make Sun18. In July 2010, with the creation of Sun18, Sun TV Network became responsible for the South Indian market, while Network18 was responsible for the North Indian market.
Market
By May 2000, Gemini was considered as a strong number two to the leader ETV. From early 2000s, Gemini remained the market leader until 2016. But in 2017-18, Gemini TV slipped to third or fourth positions, due to heavy competition from ETV, Zee Telugu and especially Star Maa. This situation further worsened during the years 2019, 2020 and 2021 and Gemini TV lost most of its market share. But sometimes it did regain its majority share, but it was not constant.
Sun TV Network, its parent company tried to regain its lost viewership by introducing some new reality shows. But it was only a partial success. As of September 2022, it still has not regained its lost viewership, with its situation worsening.
Sister Channels
Current Channels
Gemini Movies
Gemini Movies is an Indian Telugu language pay television movies channel. It is a part of the Sun TV Network and was launched in May 2000 under the name Teja TV. In October 2010, Teja TV was renamed as Gemini Movies.
Gemini Music
Gemini Music is the first non-stop Telugu language music channel, operated by the Sun TV Network in India. It was launched in 2005.
Kushi TV
Kushi TV is an Indian Telugu English language kids pay television channel part of Sun TV Network. It was launched on 9 April 2009 and broadcasts cartoons and kids programmes in Telugu & English.
Gemini Comedy
Gemini Comedy is the first Tel |
https://en.wikipedia.org/wiki/Li%20Sanli | Li Sanli (; 24 August 1935 – 23 April 2022) was a Chinese computer scientist and also an academician of the Chinese Academy of Engineering (CAE), professor of Tsinghua University, dean and professor of School of Computer Engineering and Science in Shanghai University.
Biography
Li was born into a highly educated family in Shanghai, on 24 August 1935. His name "Sanli" () comes from Zuo Zhuan () and means "three Immortalities of speech, morality and meritorious service". In 1951, he entered Tsinghua University, majoring in the Radio Electronics Department. After graduation, he stayed at the university and worked at there. He began graduate work at Soviet Academy of Sciences in 1956 and earned his vice-doctorate under the advisement of C. A. Lebedev in 1960.
He returned to China in 1960 and continued to teach at Tsinghua University. In 1961, he became leader of the Operation Control Group of Tsinghua University for developing electronic tube computer 911. In 1972, he was responsible for developing a 724 computer system with small and medium-sized integrated circuits as the main components. In 1988, he concurrently served as dean of the School of Computer Engineering and Science, Shanghai University. In 2000, he was responsible for the successful development of the cluster system "Ziqiang 2000" with 220 processors in Shanghai University. In August 2003, he developed a "Shenchao 21C" supercomputer with 256 CPUs and a peak speed of 1.5 trillion times for Shenzhen University. In 2004, his research team cooperated with Hewlett-Packard to complete a supercomputer "Shangda Ziqiang 3000" with a total of 352 CPUs and a peak speed of more than 2 trillion times in Shanghai University.
On 23 April 2022, he died of an illness in Beijing, at the age of 86.
Contributions
Li was one of China's pioneers in computer science and engineering. He has won many domestic awards for research in the fields of computer architecture and organization. The achievement of "cluster- based high performance computer Ziqian2000," which was organized by Li at Shanghai University, won the First Grade Award from the government of Shanghai in 2001. In addition, the president of Hong Kong Polytechnic University offered him the university's Outstanding Scholar Award in 1995.
Li has published 12 books and more than 100 papers in key journals and at international conferences. Of these, his book "RISC-Single and Multiple Issuing Architecture" won the Special Grade Award for Excellent Academic Books conferred by State Education Commission.
Li was also a deputy director of the Information Technology Consultant Committee of Shanghai Municipal Government and executive director of the Chinese Computer Federation. He was the chief scientist on the High Performance Computing project of the State Climbing Program from 1995 to 2000 and has served as co-chairperson in Computer Disciplines of the Academic Degree Committee of the China State Council. He was elected vice-president and president of |
https://en.wikipedia.org/wiki/The%20Big%20Red%20Adventure | The Big Red Adventure is an adventure video game developed by Dynabyte and published by Core Design for MS-DOS in 1995. It was released for the Amiga computers in 1997 by Power Computing on CD-ROM.
The Big Red Adventure is a sequel to Dynabyte's Nippon Safes Inc., a game that had been "a moderate hit in Europe" according to Hardcore Gaming 101. It was developed in Italy.
Gameplay
The Big Red Adventure is a graphic adventure controlled with a point-and-click interface.
Plot
The Big Red Adventure follows the protagonists of Nippon Safes Inc. - Doug, Donna and Dino - as they find themselves in post-Soviet Russia. The villainous Doctor Virago hopes to revive Vladimir Lenin to help him revert Russia from capitalism to communism.
Development
While The Big Red Adventures predecessor, Nippon Safes Inc., used pixel art graphics, the artist left Dynabyte before the sequel's creation. Instead, the team digitized drawings done on paper to create the game's sprites. The game uses SVGA graphics.
Developed in Italy, The Big Red Adventure was published by the British company Core Design.
Reception
Writing for Amiga Format, Andy Smith called The Big Red Adventure as a jolly good game, accessible to people who don't normally play adventure games and yet convoluted enough for people who do. Coming Soon magazine praised the graphics and humour. Generation 4 gave it 35% while PC Joker gave it 36%.
Hardcore Gaming 101 gave a negative review in 2016, citing its "obscure puzzles, lame humor and heavy-handed satire".
References
External links
The Big Red Adventure at Lemon Amiga
1995 video games
Adventure games
Amiga games
Core Design games
DOS games
Point-and-click adventure games
Video games developed in Italy
Video games featuring female protagonists
Video games set in Russia |
https://en.wikipedia.org/wiki/Alice%20Burks | Alice Burks (née Rowe, August 20, 1920 – November 21, 2017) was an American author of children's books and books about the history of electronic computers.
Early life and education
Burks was born Alice Rowe in East Cleveland, Ohio, in 1920. She began her undergraduate degree at Oberlin College on a competitive mathematics scholarship and transferred to the University of Pennsylvania in Philadelphia where she completed her B.A. in mathematics in 1944. During this period, she was employed as a human computer at the University of Pennsylvania's Moore School of Electrical Engineering.
Career
Burks retired from full-time employment after marrying Moore School lecturer Dr. Arthur Burks, a mathematician who served as one of the principal engineers in the construction of the ENIAC, the world's first general-purpose electronic digital computer, built at the Moore School between 1943 and 1946. Unlike some of the Moore School women computers, she never worked directly with the ENIAC.
At the conclusion of Arthur's work with the Moore School and at the Institute for Advanced Study in 1946, Burks moved with her husband to Ann Arbor, Michigan, where he joined the faculty of the University of Michigan and helped to found the computer science department. She returned to school, earning an M.S. in educational psychology in 1957 from Michigan.
Starting in the 1970s following the decision of Honeywell v. Sperry Rand, the federal court case that invalidated the ENIAC patent, she and husband Arthur championed the work of John Vincent Atanasoff, the Iowa State College physics professor whom the court had ruled invented the first electronic digital computer (a machine that came to be called the Atanasoff–Berry Computer) and from whom the subject matter of the ENIAC was ruled to be derived. In articles and two books, the first co-authored with Arthur, Mrs. Burks sought to bolster the judge's decision and highlight testimony and evidence from the case. This pitted the Burkses in a deeply acrimonious controversy against exponents of ENIAC inventors John Mauchly and J. Presper Eckert.
Burks later lived in Ann Arbor, Michigan, where she was assisting her husband Arthur Burks with writing his memoirs and preparing his papers for university donation. Arthur died on May 14, 2008. Burks died in November 2017 at the age of 97.
Works
Children's books
References
External links
Oral history interview with Alice R. Burks and Arthur W. Burks. Charles Babbage Institute, University of Minnesota.
International Biographical Dictionary of Computer Pioneers
1920 births
2017 deaths
American children's writers
Human computers
Oberlin College alumni
University of Michigan School of Education alumni
Writers from Ann Arbor, Michigan |
https://en.wikipedia.org/wiki/KFBB-TV | KFBB-TV (channel 5) is a television station in Great Falls, Montana, United States, affiliated with ABC, Fox and MyNetworkTV. Owned by the Cowles Company, the station maintains studios and transmitter facilities on Old Havre Highway in Black Eagle (with a Great Falls mailing address).
KHBB-LD (channel 21) in Helena operates as a semi-satellite of KFBB-TV. As such, it simulcasts all network and syndicated programming as provided through KFBB-TV, but airs separate commercial inserts and legal identifications. KHBB-LD is operated out of KFBB's sales office and news bureau on Euclid Avenue in Helena, while its transmitter is located atop Copper Butte. Both stations offer Fox via their second digital subchannels (until 2009, only KHBB-LD did so, as Fox programming in Great Falls was seen on KLMN). KFBB-TV is also repeated on several translators.
History
KFBB-TV began broadcasting on March 21, 1954. As the first television station in Great Falls, KFBB-TV was affiliated with all four major networks, and would broadcast programming from all three until KRTV signed on and took the NBC affiliation in October 1958. KFBB-TV continued to air CBS and ABC programming as a member of the Skyline Network (as the Montana Television Network was then called).
At first KFBB-TV was owned by Wilkins Broadcasting along with KFBB radio (1310 AM, now KEIN), of which The Anaconda Company owned a 27.5% share. Anaconda, through its Fairmount division, controlled most of the major newspapers in Montana (although not the Great Falls Tribune) and was notorious for manipulating the state's political visions for its own needs. Then in 1959, Anaconda sold its media holdings to Lee Enterprises of Davenport, Iowa. Because of antitrust concerns, Lee decided to sell KFBB. The station was sold in 1962 to Harriscope Broadcasting, which in 1965 scored a deal for a primary ABC affiliation—Montana's first. The new affiliation took effect on February 1, 1966. Harriscope severed KFBB's links with the Skyline Network (which signed up with KRTV), and sold off KFBB radio in February 1969, but continued to run KFBB-TV, eventually selling it to Donald P. Nathanson in 1977. After affiliating primarily with ABC, the station continued secondary affiliation with CBS until that network switched to KRTV in 1969, and then started running NBC on a per program basis as late as December 1986, when KTGF (now KJJC-TV) signed on and took over the NBC affiliation. KFBB also carried Sesame Street for several years, before Montana had a PBS service of its own.
KFBB's ABC affiliation allowed it to be carried on cable television systems in both Alberta and Saskatchewan; it even maintained a sales office in Saskatoon, as did Williston stations KUMV-TV and KXMD-TV. This arrangement continued until 1986, when KFBB was largely replaced by a satellite signal from WXYZ-TV, the ABC affiliate in Detroit.
An April 1981 application with the Federal Communications Commission (FCC) requested transfer of control of the li |
https://en.wikipedia.org/wiki/Router%20table | Router table may refer to
Routing table - a concept in computer networking
Router table (woodworking) - a power tool used in woodworking |
https://en.wikipedia.org/wiki/Ribeir%C3%A3o%20dos%20%C3%8Dndios | Ribeirão dos Índios is a municipality in the state of São Paulo in Brazil. The population is 2,224 (2020 est.) in an area of 196 km2.
Demography
Data from the Census-2000
Total Population - 2,222
Urban: 1,760
Rural: 462
Men: 1,144
Women: 1,078
Population Density (inhabitants/km2): 11.28
Infant Mortality (up to 1 year old per 1000): 14.48
Life Expectation: 71.98
Fertility rate (children per women): 2.06
Literacy Rate: 84.27%
Administration
Mayor - Jose Amauri Lenzoni (2005-2008)
President of the Board - Aparecido de Almeida (2007-2008)
References
Municipalities in São Paulo (state) |
https://en.wikipedia.org/wiki/Failing%20badly | Failing badly and failing well are concepts in systems security and network security (and engineering in general) describing how a system reacts to failure. The terms have been popularized by Bruce Schneier, a cryptographer and security consultant.
Failing badly
A system that fails badly is one that has a catastrophic result when failure occurs. A single point of failure can thus bring down the whole system. Examples include:
Databases (such as credit card databases) protected only by a password. Once this security is breached, all data can be accessed.
Fracture critical structures, such as buildings or bridges, that depend on a single column or truss, whose removal would cause a chain reaction collapse under normal loads.
Security checks which concentrate on establishing identity, not intent (thus allowing, for example, suicide attackers to pass).
Internet access provided by a single service provider. If the provider's network fails, all Internet connectivity is lost.
Systems, including social ones, that rely on a single person, who, if absent or becomes permanently unavailable, halts the entire system.
Brittle materials, such as "over-reinforced concrete", when overloaded, fail suddenly and catastrophically with no warning.
Keeping the only copy of data in one central place. That data is lost forever when that place is damaged, such as the 1836 U.S. Patent Office fire, the American 1973 National Personnel Records Center fire, and the destruction of the Library of Alexandria.
Failing well
A system that fails well is one that compartmentalizes or contains its failure. Examples include:
Compartmentalized hulls in watercraft, ensuring that a hull breach in one compartment will not flood the entire vessel.
Databases that do not allow downloads of all data in one attempt, limiting the amount of compromised data.
Structurally redundant buildings conceived to resist loads beyond those expected under normal circumstances, or resist loads when the structure is damaged.
Computer systems that restart or proceed to a stopped state when an invalid operation occurs.
Access control systems that are locked when power is cut to the unit.
Concrete structures which show fractures long before breaking under load, thus giving early warning.
Armoured cockpit doors on airplanes, which confine a potential hijacker within the cabin even if they are able to bypass airport security checks.
Internet connectivity provided by more than one vendor or discrete path, known as multihoming.
Star or mesh networks, which can continue to operate when a node or connection has failed (though for a star network, failure of the central hub will still cause the network to fail).
Ductile materials, such as "under-reinforced concrete", when overloaded, fail gradually – they yield and stretch, giving some warning before ultimate failure.
Making a backup copy of all important data and storing it in a separate place. That data can be recovered from the other location when |
https://en.wikipedia.org/wiki/Progressive%20Broadcasting%20Corporation | Progressive Broadcasting Corporation (PBC) is a Philippine radio and television network owned by businessman Alfredo L. Henares with 70% equity share together with Joselito N. Pedero (15.3%) and Dennis T. Villareal (14.5%). The company was registered in the Philippine Securities and Exchange Commission (SEC) on October 6, 1986. Its studios are located at Unit 4002 Summit One Tower, Shaw Boulevard, Mandaluyong. PBC derives most of its income by selling airtime to blocktimers.
PBC's flagship UHF TV station in Mega Manila, UNTV Channel 37 (now UNTV News and Rescue) is operated and maintained by its content provider Breakthrough and Milestones Productions International, Inc. (BMPI), led by veteran broadcaster and TV host "Kuya" Daniel Razon. PBC is also known for its FM station DWNU (Wish 107.5) in Mega Manila, it formerly aired NU 107 (until 2010) and Win Radio (until 2014, moved to DWKY 91.5 FM).
History
Legislative Franchise
It was granted a 25-year legislative franchise on November 19, 1991, under Republic Act (R.A.) 7163 to construct, install, operate and maintain commercial radio and TV broadcasting stations in Metro Manila, Region I, Region VI and Region VII signed by Philippine President Corazon C. Aquino. On September 23, 1995, R.A. 8162 was approved to amend its franchise extending its operations throughout the Philippines. On August 24, 2015, House Bill No. 5940 was approved by the House of Representatives and by the Senate of the Philippines on January 18, 2016, to extend PBC's franchise. On May 18, 2016, President Benigno S. Aquino III signed Republic Act No. 10820 which renewed PBC's license for another 25 years. The law grants PBC a franchise to construct, install, operate, and maintain, for commercial purposes, radio broadcasting stations and television stations, including digital television system, with the corresponding facilities such as relay stations, throughout the Philippines.
Radio
On August 31, 1987, an unknown radio station started broadcasting at the frequency of 107.5 on the FM band. Playing what was then known as new wave, the station aired for a month, no call letters, no jocks. When they finally announced "This is dwNU, if you're listening, please call..." After mentioning the phone number on air, the phone rang constantly for three hours.
DWNU 107.5 FM was the brainchild of banker/businessman Atom Henares, and radio veteran Mike Pedero. Born out of the need to come up with a product that would set the standard for good taste in music amongst the youths, NU 107 blasted the airwaves with rock, music that is "dynamic, young, passionate, creative, and always ready to renew itself."
On November 7, 2010, NU 107 made its final broadcast and it was rebranded as 107.5 Win Radio with a Hot AC (masa) format on November 9, 2010. Win Radio transferred to 91.5 FM and currently managed by Zimzam Management Corporation led by Manuelito "Manny" Luzon.
In 2014, UNTV-BMPI became the content provider for 107.5 FM. The newest stati |
https://en.wikipedia.org/wiki/Crime%20%2B%20Investigation%20%28Australian%20TV%20channel%29 | Crime + Investigation (also known as CI) is an Australian pay television channel which focuses on crime, investigation and mystery programming. It is run by Foxtel Management Pty Ltd and programming and name are licensed to them by A&E Television Networks.
The channel shows a variety of shows dealing with criminal investigations. The content is mostly sourced from overseas except for limited original content such as the popular Crime Investigation Australia hosted by Steve Liebmann focusing on infamous Australian crimes.
In 2007, the channel became available in New Zealand on Sky, channel 71.
Programming
Accident Investigator
Child Snatchers
Cold Case Files
COPS
Crime Investigation Australia
Crimes That Shook Australia
Forensic Files
Gangland
Homicide Hunter
Kings Cross ER: St Vincent's Hospital
Masterminds
Paradise Lost
Road Wars
Rookies
Street Patrol
S.W.A.T.
Snapped
Tough Nuts: Australia's Hardest Criminals
The Art of the Heist
The New Detectives
Trace Evidence
Bounty Girls
See also
Crime & Investigation Network (UK)
Crime & Investigation Network
References
External links
Television networks in Australia
Television channels and stations established in 2005
2005 establishments in Australia
English-language television stations in Australia
English-language television stations in New Zealand
A&E Networks
Foxtel
Crime television networks |
https://en.wikipedia.org/wiki/Bride%20of%20Chaotica%21 | "Bride of Chaotica!" is the 106th episode of the American science fiction television series Star Trek: Voyager airing on the UPN network, the 12th episode of the fifth season. The episode originally aired on January 27, 1999. The episode largely takes place on the holodeck, which is running a holo-program in black and white instead of the usual color. This was because of a small fire to the Bridge set that had occurred while the episode was in production; as a result the Bridge scenes were shot weeks later after the set was repaired and scenes that were originally set for the Bridge were either entirely rewritten or set on a different part of the ship. The episode satirizes numerous elements of the classic 1936 film serial Flash Gordon and classic 1939 film serial Buck Rogers.
In this episode, Voyager becomes stuck in a interdimensional rift as photonic beings from another dimension attempt first contact in the holodeck, meeting the photonic villains of Ensign Paris' "Captain Proton" program, who promptly attack them.
Plot
During an episode of The Adventures of Captain Proton on the holodeck in a recurring Voyager hologram program in the style of vintage movie serials such as Flash Gordon and Buck Rogers, Ensigns Tom Paris and Harry Kim are forced to leave the program running when spatial distortions trap the ship and disrupt their control over the computer. While the command staff of Voyager seek to discover a way to free the ship from the spatial distortions, extra-dimensional aliens who exist in a photonic state cross over from their own dimension through a distortion located in the holodeck. There, they are detected and attacked by Dr. Chaotica, who believes them to be from the fifth dimension, and whose holographic (photonic) weaponry — though harmless to humans — is deadly to the aliens.
Eventually, the crew discover the war being waged between Chaotica and the fifth dimension and must defeat him by playing out their roles as the fictional Captain Proton (Tom Paris), his sidekick Buster Kincaid (Harry Kim), the President of Earth (the Doctor, who is himself a photonic being), and Arachnia, Queen of the Spider People - a campy space queen who is destined to be Chaotica's bride. Paris asks Captain Janeway to take on the role of femme fatale Queen Arachnia. Mortified, she refuses such an indignity, but reluctantly agrees in order to help Voyager out of its predicament.
Inside the program and now in full costume, Janeway/Queen Arachnia uses her charms to try to manipulate Chaotica into lowering the "lightning shield" protecting his fortress under the pretence that her loyal subjects in their "spider ships" can attend their wedding. Chaotica becomes suspicious of Arachnia so she attempts to deactivate the shield herself but Chaotica traps her in his "confinement rings" force field for double crossing him, telling her he will kill her after their wedding night. Using a vial of her "spider pheromones" to hypnotize Chaotica's guard, Arachnia m |
https://en.wikipedia.org/wiki/Computational%20complexity%20of%20mathematical%20operations | The following tables list the computational complexity of various algorithms for common mathematical operations.
Here, complexity refers to the time complexity of performing computations on a multitape Turing machine. See big O notation for an explanation of the notation used.
Note: Due to the variety of multiplication algorithms, below stands in for the complexity of the chosen multiplication algorithm.
Arithmetic functions
This table lists the complexity of mathematical operations on integers.
On stronger computational models, specifically a pointer machine and consequently also a unit-cost random-access machine it is possible to multiply two -bit numbers in time O(n).
Algebraic functions
Here we consider operations over polynomials and denotes their degree; for the coefficients we use a unit-cost model, ignoring the number of bits in a number. In practice this means that we assume them to be machine integers.
Special functions
Many of the methods in this section are given in Borwein & Borwein.
Elementary functions
The elementary functions are constructed by composing arithmetic operations, the exponential function (), the natural logarithm (), trigonometric functions (), and their inverses. The complexity of an elementary function is equivalent to that of its inverse, since all elementary functions are analytic and hence invertible by means of Newton's method. In particular, if either or in the complex domain can be computed with some complexity, then that complexity is attainable for all other elementary functions.
Below, the size refers to the number of digits of precision at which the function is to be evaluated.
It is not known whether is the optimal complexity for elementary functions. The best known lower bound is the trivial bound
.
Non-elementary functions
Mathematical constants
This table gives the complexity of computing approximations to the given constants to correct digits.
Number theory
Algorithms for number theoretical calculations are studied in computational number theory.
Matrix algebra
The following complexity figures assume that arithmetic with individual elements has complexity O(1), as is the case with fixed-precision floating-point arithmetic or operations on a finite field.
In 2005, Henry Cohn, Robert Kleinberg, Balázs Szegedy, and Chris Umans showed that either of two different conjectures would imply that the exponent of matrix multiplication is 2.
Transforms
Algorithms for computing transforms of functions (particularly integral transforms) are widely used in all areas of mathematics, particularly analysis and signal processing.
Notes
References
Further reading
Computer arithmetic algorithms
Computational complexity theory
Mathematics-related lists
Number theoretic algorithms
Unsolved problems in computer science |
https://en.wikipedia.org/wiki/Internal%20sort | An internal sort is any data sorting process that takes place entirely within the main memory of a computer. This is possible whenever the data to be sorted is small enough to all be held in the main memory. like a hard-disk. Any reading or writing of data to and from this slower media can slow the sortation process considerably. This issue has implications for different sort algorithms.
Some common internal sorting algorithms include:
Bubble Sort
Insertion Sort
Quick Sort
Heap Sort
Radix Sort
Selection sort
Consider a Bubblesort, where adjacent records are swapped in order to get them into the right order, so that records appear to “bubble” up and down through the dataspace. If this has to be done in chunks, then when we have sorted all the records in chunk 1, we move on to chunk 2, but we find that some of the records in chunk 1 need to “bubble through” chunk 2, and vice versa (i.e., there are records in chunk 2 that belong in chunk 1, and records in chunk 1 that belong in chunk 2 or later chunks). This will cause the chunks to be read and written back to disk many times as records cross over the boundaries between them, resulting in a considerable degradation of performance. If the data can all be held in memory as one large chunk, then this performance hit is avoided.
On the other hand, some algorithms handle external sorting rather better. A Merge sort breaks the data up into chunks, sorts the chunks by some other algorithm (maybe bubblesort or Quick sort) and then recombines the chunks two by two so that each recombined chunk is in order. This approach minimises the number or reads and writes of data-chunks from disk, and is a popular external sort method.
Sorting algorithms |
https://en.wikipedia.org/wiki/Kiribathgoda%20Gnanananda%20Thero | Kiribathgoda Gnanananda Thero (born: 1 July 1961) is a Sri Lankan monk. who is the Founder of Mahamevnawa Buddhist Monastery and Shraddha Media Network.
Spiritual biography
Gnanananda became a monk at age 17 on 26 March 1979 under Dambagasare Sumedhankara Thero and Dikwelle Pannananda Thero at Seruwavila. He received a traditional Buddhist academic education and entered the University of Sri Jayewardenepura. He founded Mahamevnawa Buddhist Monastery in August 1999 in Waduwava, Polgahawela. Mahamevnawa Buddhist Monastery now has 58 branch monasteries in Sri Lanka and 28 overseas monasteries in Canada, the United States, Australia, the United Kingdom, Germany Italy, Dubai, South Korea and India.
Teachings
He now teaches Buddhism (Theravada), emphasizing the need to practice it in pure form (i.e. as in the Suttas) and casting off what is not advocated by the Buddha.
Thousands of practicing Buddhists are associated with Mahamevnawa.
"Maha Sthupa Wandanawa" conducted on 2 February 2008 at Anuradhapura with participation of over 100,000 disciples, and "Somawathi Stupa Vandanawa" conducted on 8 May 2010 at Somawathiya temple with participation of over 1,000,000 devotees, bear evidence for the popularity his Damma program has achieved.
Gnanananda reintroduced the usage of "Namo Buddhaya" to the Sri Lankan Buddhists as a way of Buddhist greeting. Also, there was a weekly dhamma discussion program telecasted on TNL television named "Namo Buddhaya" in which the Thero participated. He was accused for the death of Gangodawila Soma Thero to take his place in the country.
Publications
Gnanananda thero has written many books based on the teachings of Buddha and also translated many pali written books like Mahavamsa and Nettipakarana. These publications are aimed to emphasize uncontaminated Buddhism that can be understood by anyone who reads it.
The thera has also instigated a culture in Sri Lanka (traditionally known as Dhamma Dīpa – Island full of Buddha's Teachings) to teach the Buddha's teaching in the national language of Sinhala (සිංහල), even though the teachings are traditionally taught in the Pali language. Many disciples believe that they are now able to teach the Buddha's teachings with the right understanding.
References
External links
Short Spiritual Biography of Bhikkhu Ñānānanda (Buddha Vision)
Living people
Sri Lankan Buddhist monks
Sri Lankan Theravada Buddhists
Theravada Buddhist spiritual teachers
1961 births
Alumni of the University of Sri Jayewardenepura
Converts to Buddhism from Roman Catholicism
Sinhalese monks |
https://en.wikipedia.org/wiki/Alexander%20Halavais | Alexander Halavais (born July 21, 1971) is an Associate Professor and Graduate Director of the Social Data Science master's program at Arizona State University, a social media researcher and former President of the Association of Internet Researchers. Before joining the faculty at Arizona State University, Halavais taught in the Interactive Media program at Quinnipiac University, the School of Informatics at the University at Buffalo and at the University of Washington.
In 1993, Halavais earned a bachelor's degree in political science from the University of California, Irvine and a Ph.D. in communication from the University of Washington in 2001. His dissertation examined the social implications of the Slashdot website. He also completed coursework in communication and cognitive science at the University of California, San Diego and complex adaptive systems at the Santa Fe Institute.
Online Journalism Review has referred to Halavais as one of a number of "blogologists," exploring the ways in which social computing affects the society at large. His work has explored how blogs are used in education, the patterns of international hyperlinks, the benefits and pitfalls of personal branding, and the role of pornography on the Internet. He is the editor of a volume on cyberporn and society.<ref>Halavais, Alexander, Cyberporn and Society, Dubuque, Iowa: Kendall/Hunt Pub. Co., 2006.</ref>
In one project, Lackaff and Halavais explored Wikipedia's topical coverage using the Library of Congress Classification to compare Wikipedia's coverage with that of Books in Print.
Halavais was an early proponent of hyperlink analysis and webometrics, and has examined the relationship between national borders and hyperlinks, as well as hyperlinks between US cities. With Maria Garrido, he also looked at the linking patterns among global NGOs and grassroots organizations.
To test Wikipedia as a trustworthy source of accurate information, Halavais created one of the more publicized examples of Wikipedia vandalism. He afterwards dubbed it "The Isuzu Experiment". Halavais altered 13 records in Wikipedia to include spurious information. A number of Wikipedia editors spotted the errors, and quickly corrected the articles.
His most recent book is Search Engine Society''. He has more recently spoken about the role of peer to peer surveillance in participatory government.
References
1971 births
Living people
Quinnipiac University faculty
University of California, San Diego alumni
University of California, Irvine alumni
University of Washington alumni
University at Buffalo faculty |
https://en.wikipedia.org/wiki/CHEX-DT-2 | CHEX-DT-2 (channel 22) is a television station licensed to Oshawa, Ontario, Canada, serving the Regional Municipality of Durham as part of the Global Television Network. It is owned and operated by network parent Corus Entertainment, and maintains studios on Simcoe Street (just north of King Street) in Downtown Oshawa and a transmitter on Enfield Road in Clarington.
CHEX-TV-2 was originally a CBC Television affiliate until August 31, 2015, when it became an affiliate of CTV. On August 14, 2018, it was announced that CHEX-TV-2's affiliation agreement with CTV would expire on August 27; the station subsequently became a Global owned-and-operated station known as Global Durham as of September 6.
Although operating as a separate station from Peterborough sister station CHEX-DT, it retains the CHEX-DT-2 callsign used when the station operated as a rebroadcaster of CHEX.
History
Oshawa, although larger in population than Peterborough, had not been granted a television station in the original channel assignments issued during the 1950s. Instead, the city was folded into the Toronto market. CHEX-TV-2 signed on the air in 1992, when CBC Television affiliate CHEX-TV in Peterborough began relaying its programming on a new rebroadcast transmitter in Oshawa; prior to 1988, the UHF channel 22 allocation had been used by CIII-TV's Toronto-area transmitter (and de facto flagship transmitter) in Uxbridge.
In 1993, the Oshawa transmitter became a semi-satellite with some slight differences in local programming. In 2004, the station relaunched as a full-fledged station with a very different schedule; for instance, the station produces a separate local newscast, Studio 12 News and current affairs program In Depth with Dan Carter, that are produced independently from CHEX and focus on the Durham Region. The station remained affiliated with CBC despite the fact its signal overlaps with that of the network's Toronto owned-and-operated station (O&O) CBLT-DT; as a result, the Toronto market was served by two CBC stations (the first since 1961, when CHCH-TV became an independent station).
On May 20, 2015, Corus and Bell Media announced an agreement whereby Corus' CBC affiliates, including CHEX-TV-2, would leave the public network and instead affiliate with CTV. The affiliation switch took effect on August 31, 2015. Due to the overlapping coverage discussed above, most TV service providers serving the region already carry CBLT, and any that do not will have to add a CBC affiliate such as CBLT to their basic services in order to comply with Canadian Radio-television and Telecommunications Commission (CRTC) regulations. CTV already served the CHEX-TV-2 viewing area through its Toronto O&O CFTO-DT; in consequence, the Toronto market was then served by two CTV outlets in most parts of the market (CFTO plus either CHEX-TV-2 or CKCO-DT in Kitchener). However, CHEX-TV-2 provided exclusive terrestrial coverage of CTV programming in most of the Durham Region and Toronto's eas |
https://en.wikipedia.org/wiki/Rudi%20Studer | Rudi Studer (born 1951 in Stuttgart) is a German computer scientist and professor emeritus at KIT, Germany. He served as head of the knowledge management research group at the Institute AIFB and one of the directors of the Karlsruhe Service Research Institute (KSRI). He is a former president of the Semantic Web Science Association, an STI International Fellow, and a member of numerous programme committees and editorial boards. He was one of the inaugural editors-in-chief of the Journal of Web Semantics, a position he held until 2007. He is a co-author of the "Semantic Wikipedia" proposal which led to the development of Wikidata.
Education
He obtained a degree (1975) and a PhD (1982) in Computer Science at the University of Stuttgart.
Career and research
From 1985 to 1989 he was project leader and manager at IBM Germany, Institute of Knowledge Based Systems. November 1989 he became professor at Karlsruhe Institute of Technology. Since then, he led his research group to become one of the world leading institutions in Semantic Web technology, and he played a leading role in establishing highly acknowledged international conferences and journals in this area.
Rudi Studer was also director in the department Information Process Engineering at and one of the presidents of the Research Center for Information Technology as well as co-founder of the spin-off company ontoprise GmbH that developed semantic applications.
He is a member of Association for Computing Machinery (ACM) and German Informatics Society.
His research interests span over the main topics important for semantic web technology, including knowledge management, knowledge engineering, ontology management, data and text mining, and semantic web services.
Publications
His publications include:
Knowledge processes and ontologies
Handbook on ontologies
Knowledge engineering: Principles and methods
John Davies, Rudi Studer, Paul Warren (Eds.), Semantic Web Technologies - trends and research in ontology-based systems, John Wiley & Sons. June 2006.
Rudi Studer, Stephan Grimm, Andreas Abecker (Eds.), Semantic web services: concepts, technologies, and applications, Springer Verlag, Heidelberg. 2007.
Mark A. Musen, Bernd Neumann, Rudi Studer, Intelligent Information Processing, Kluwer Academic Publishers, Boston/Dordrecht/London. 2002.
References
1951 births
German computer scientists
Scientists from Stuttgart
Living people
University of Stuttgart alumni
Academic staff of the Karlsruhe Institute of Technology
Semantic_Web_people |
https://en.wikipedia.org/wiki/Answer-seizure%20ratio | The answer-seizure ratio (ASR) is a measurement of network quality and call success rates in telecommunication. It is the percentage of answered telephone calls with respect to the total call volume.
Definition
In telecommunication an attempted call is termed a seizure. The answer-seizure ratio is defined as 100 times the number of answered calls, i.e. the number of seizures resulting in an answer signal, divided by the total number of seizures:
Busy signals and other call rejections by the telephone network count as call failures. However, the inclusion in the ASR accounting of some failed calls varies in practical applications. This makes the ASR highly dependent on end-user action. Low answer-seizure ratios may be caused by far-end switch congestion, not answering by called parties and busy destination circuits.
See also
Network Effectiveness Ratio
Call detail record
Average call duration
References
Telephony |
https://en.wikipedia.org/wiki/Bowie%20Lam | Bowie Lam (, Lam Bo-yee; born 4 September 1965) is an Hong Kong actor with the TVB network. He has starred in several popular dramas including File of Justice and Healing Hands.
Before working in entertainment, Lam held other occupations, including serving in the Hong Kong Police Force for a short time. He made his acting debut in 1986 in Kiss Me Goodbye and his singing debut in 1989.
Lam's acting career took off after joining the major television network TVB in 1991. His first project was a supporting role in the 1992 drama The Greed of Man, which starred Sean Lau, Vivian Chow, Adam Cheng, and Amy Kwok. The Greed of Man as of 2011 remained one of TVB's highest-rated dramas. After The Greed of Man, Lam was featured in TVB dramas File of Justice (1994–1997), Untraceable Evidence (1997 and 1999), and Healing Hands (1998, 2000, and 2005). His major break-out role is considered the 2004 War and Beauty, which was a huge success in Hong Kong and China.
Television series
Host
Filmography
Kiss Me Goodbye (1986)
People's Hero (1987)
On the Run (1988)
Give From Heaven (1989)
Bachelor's Swan Song (1989)
Doctor Vampire (1991)
It's Now or Never (1992)
Rogues From The North (1992)
Now You See Love, Now You Don't (1992)
Gun n' Rose (1992)
The Sting (1992)
Hard Boiled (1992)
Once a Cop (1993)
Man of the Time (1993)
Rose Rose I Love You (1993)
Cop Image (1994)
A Fatal Jump (1994)
Modern Romance (1994)
Beginner's Luck (1994)
The Most Wanted (1994)
Those Were the Days... (1995)
The Day That Doesn't Exit Part A... (1995)
Heaven Can't Wait (1995)
Faithfully Yours (1995)
King of Robbery (1996)
Wild (1996)
Rich For One Night (1996)
Passionate Night (1997)
Lost Control (1997)
Lawyer Lawyer (1997)
Evil Instinct (1997)
Oh! My God (1998)
Hong Kong X File (1998)
The Sniper (2009)
I Corrupt All Cops (2009)
Better and Better (2013)
Caught in Trap (2014)
The Crossing (2014)
Massagist (2015)
S Storm (2016)
La Historia Du Un Amor (2017)
Wait Here (2018)
First Night Nerves (2018)
TV series theme songs
"Unsuspectingly" (不知不覺), with Kit Chan, opening theme song for Healing Hands II (2000)
"Love Does Not Leave" (愛不出口), insert song for Healing Hands II (2000)
"Escape to Life Sky" (逃出生天), opening theme for Fight for Love (2002)
"Cover Your Eyes to See the World" (闔上眼睛看世界), opening theme for Invisible Journey (2002)
"Don't Fear the Dark" (不要怕黑), insert song for Invisible Journey (2002)
"Split" (一字馬), opening theme song for Vigilante Force (2003)
"If You Were My Lover" (如果你是我的愛人), insert song for Vigilante Force (2003)
"Children" (兒女), opening theme song for War and Beauty (2004)
"Arsenic" (砒霜), insert song for War and Beauty (2004)
"The Eagle Soars" (飛鷹翱翔(完整)), ending theme for Always Ready (2005)
"With You Every Day" (和你的每一天), theme song for Healing Hands III (2005)
"The Wrong Gray Is Correct" (灰色錯對), opening theme song for Misleading Track (2005)
"Intelligence" (情報), opening theme song for CIB Files (2006)
"Wind Sand" (風沙 |
https://en.wikipedia.org/wiki/Lxrun | In Unix computing, lxrun is a compatibility layer to allow Linux binaries to run on UnixWare, SCO OpenServer and Solaris without recompilation. It was created by Mike Davidson. It has been an open source software project since 1997, and is available under the Mozilla Public License. Both SCO and Sun Microsystems began officially supporting lxrun in 1999.
Timeline
August 22, 1997: lxrun is cited as a proof of concept of cross-platform binary compatibility at the 86open conference hosted by SCO in Santa Cruz, CA.
August 29, 1997: lxrun's first mention on Usenet, in comp.unix.sco.misc. Most notably, the post mentions lxrun's availability in source and binary form from the SCO Skunkware FTP site. A later post in the thread mentions contributions by various authors, both inside and outside of SCO.
October 1, 1997: The official lxrun website is established.
June 19, 1998: Ronald Joe Record, Michael Hopkirk, and Steven Ginzburg present a paper on lxrun at the USENIX 1998 Technical Conference in New Orleans, LA.
Mar 1, 1999: SCO announces Linux compatibility in UnixWare 7 and demonstrates lxrun at LinuxWorld Expo and Conference in San Jose, CA.
May 12, 1999: Sun Microsystems announces support for Linux binaries on Solaris using lxrun.
Status
According to the official lxrun website, as of 2003 lxrun is in "maintenance" mode, meaning that it is no longer being actively developed. Reasons cited for the declining interest in lxrun include the wide availability of real Linux machines, and the availability of more capable emulation systems, such as SCO's Linux Kernel Personality (LKP), OpenSolaris BrandZ, and various virtual machine solutions. Newer Linux applications and host operating systems are not officially supported by lxrun.
References
External links
Sun's Solaris get compatible with Linux apps (CNN, Fri 14 May 1999)
Lxrun - why wasn't it released under the GPL? (Pamela Jones, Groklaw, Wed 16 Aug 2006)
Linux
UNIX System V
Compatibility layers
Sun Microsystems software |
https://en.wikipedia.org/wiki/RK05 | Digital Equipment Corporation's RK05 is a disk drive whose removable disk pack can hold about 2.5 megabytes of data. Introduced 1972, it is similar to IBM's 1964-introduced 2310, and uses a disk pack similar to IBM's 2315 disk pack, although the latter only held 1 megabyte. An RK04 drive, which has half the capacity of an RK05, was also offered.
Systems on which it can be used include DEC's PDP-8, PDP-11, and PDP-15.
Overview
The RK05 was a moving head magnetic disk drive manufactured by DEC. It stored approximately 2.5 MB on a 14", single-platter IBM-2315-style front-loading removable disk cartridge. The cartridge permitted users to have relatively unlimited off-line storage and to have very fast access to such data.
The PDP systems to which it could be attached had numerous operating systems for each computer architecture, so by changing disk pack another operating system could also be booted. Although the 14-inch cartridge could not fit in a shirt pocket,
unlike DECtape, the RK05 provided personal, portable, and expandable storage.
Although a minimal PDP-8/A came with only one drive, most computers were configured with at least one additional storage device; some systems had four drives.
Technical details
Occupying 10.5 inches (6U) of space in a standard 19-inch rack, the drive was competitive at the time. The cartridge contained a single, 14" aluminum platter coated with iron oxide in an epoxy binder. The two ferrite and ceramic read/write heads were pressed towards the disk by spring arms, floating on an air bearing maintained by the rotation of the disk. They were positioned by a voice coil actuator using a linear optical encoder for feedback. The track density was 100 tracks-per-inch. The bit density along the track was about 2200 bits-per-inch. Discrete electronics computed the velocity profile for seeks commanded by the controller. An absolute filter (HEPA filter) provided pressurized air to the cartridge, excluding most contaminants that would otherwise cause head crashes.
When used on 16-bit systems such as the PDP-11, the drive stored roughly 1.2 megawords. When used on 12-bit systems such as the PDP-8, the drive stored 1.6 megawords (so roughly the same bit capacity, albeit formatted differently). Multiple drives were daisy chained from their controller using Unibus cabling; a terminator was installed in the farthest drive.
The 16-bit (Unibus) controller was known as the RK11; it allowed the connection of up to eight RK05 drives. Seeks could be overlapped among the drives but only one drive at a time could transfer data.
The most-common 12-bit (Omnibus) controller was known as the RK8E; it supported up to four RK05 drives. The RK05 disk had more than 4096 sectors and so could not be addressed completely by a single PDP-8 12-bit word. To accommodate this, the OS/8 operating system split each drive into two logical volumes, for example, RKA0 and RKB0, representing the outermost and innermost cylinders of the drive.
Predecess |
https://en.wikipedia.org/wiki/WSBC | WSBC (1240 kHz) is a commercial AM radio station in Chicago, Illinois. It broadcasts brokered programming, mostly ethnic and religious. It is owned by Fred Eychaner's Newsweb Corporation, through licensee WSBC LLC. WSBC features programming aimed at ethnic communities including Russian, Ukrainian, Latino, Italian, Latvian and Irish. Hosts buy time on the station and may offer their services or seek donations during their shows.
WSBC transmits with 1,000 watts. Its transmitter is on North Milwaukee Avenue at West Catalpa Avenue in Chicago. It shares its tower with sister station WCPT 820 AM.
History
Early years
WSBC was first licensed on June 26, 1925, to the World Battery Company at 1219 South Wabash Avenue, transmitting on 1430 kHz. Its call sign stood for "World Storage Battery Company". In 1926, its frequency was changed to 1040 kHz and in 1927 it was changed to 1290 kHz.
Following the establishment of the Federal Radio Commission (FRC), stations were initially issued a series of temporary authorizations starting on May 3, 1927. In addition, they were informed that if they wanted to continue operating, they needed to file a formal license application by January 15, 1928, as the first step in determining whether they met the new "public interest, convenience, or necessity" standard. On May 25, 1928, the FRC issued General Order 32, which notified 164 stations, including WSBC, that "From an examination of your application for future license it does not find that public interest, convenience, or necessity would be served by granting it." However, the station successfully convinced the commission that it should remain licensed.
On November 11, 1928, the FRC implemented a major reallocation of station transmitting frequencies, as part of a reorganization resulting from its implementation of General Order 40. WSBC was assigned to 1210 kHz, sharing time with WCRW and WEDC. Its studios and transmitter were located at the New Southern Hotel (later known as the Hotel Crillon) at 13th and Michigan Ave. On March 29, 1941, WSBC, along with most of the stations on 1210 kHz, moved to 1240 kHz, its location ever since, as part of the implementation of the North American Regional Broadcasting Agreement.
Since the station began broadcasting, it has featured a wide variety of ethnic programming. The Sousa Archives and Center for American Music holds the Frank Scheibenreif Slovak, Czech, and Romi Sound Recording Collection, ca. 1930-1950. This collection includes 1,001 recordings, including 753 78-R.P.M., 140 45-R.P.M., and 108 LPs; and one book documenting Eastern Europe music prior to World War II, principally from Czechoslovakia and used by Scheibenreif for the WSBC show, "Slovak American Radio Review."
WSBC hired the nation's first full-time African-American radio announcer, Jack Cooper, who on November 3, 1929, began hosting The All-Negro Hour, a vaudevillesque entertainment program.
On April 1, 1933, Gene Dyer purchased WSBC from C.J. Gordon, who h |
https://en.wikipedia.org/wiki/Nv%20network | A Nv network is a term used in BEAM robotics referring to the small electrical Neural Networks that make up the bulk of BEAM-based robot control mechanisms.
Building blocks
The most basic component included in Nv Networks is the Nv neuron. The purpose of a Nv neuron is simply to take an input, do something with it, and give an output. The most common action of Nv neurons is to give a delay.
BEAM Nv Neurons
The standard for BEAM-based neurons is a capacitor that has one lead as an input, and the other going into the input line of an inverter. That inverter's output is the output of the neuron. The capacitor lead that is inputting into the inverter is pulled to ground with a resistor. The neuron functions because when an input is received (positive power on the input line), it charges the capacitor. Once the input is lost (negative power on the input line), the capacitor discharges into the inverter, causing the inverter to produce an output that is passed to the next neuron. The rate that the capacitor discharges is tied to the resistor that is pulling the input to the inverter to the negative. The larger the resistor, the longer it will take for the capacitor to fully discharge, and the longer it will take for that neuron to completely fire.
Types
There are many common network topologies used in BEAM robots, the most common of which are listed here.
Bicore
Probably the most utilized Nv Net topology in BEAM, the Bicore consists of two neurons placed in a loop that alternates current to the output. Input into the loop is given in the form of changing the resistance in each separate Neuron, which changes the rate at which the Neuron discharges, affecting the pace at which the loop oscillates.
Master/Slave bicores
Another common topology is using two bicores in a master/slave layout where the master bicore leads the slave and sets the pace, while the slave bicore follows at an offset pace. This layout is most commonly used for dual-motor walkers.
Larger networks
Other larger network topologies include the Tricore, and Quadcore which are laid out in a similar way the bicore is, except with more Neurons in the loop. More complex networks exist, but are not as common due to the simplistic nature of BEAM.
Structure
A basic Nv network is built upon several Nv neurons in a loop. The loop's timing is often varied by input sensors. This difference in timing is often meant to affect the output pattern of the Nv loop. An example of this can be seen in a simple BEAM walker robot utilizing a bicore network (2 neurons). The neural network is set up to alternate current going to the main motor in a way where under equal input from the main sensors, the neurons oscillate at an equal pace to each other, producing a steady walking gait. When input (e.g. from light sensors) is present, the timing of each neuron in the loop is varied based on the input from the sensors, affecting the pace at which the loop oscillates. This affected pace is often used to alte |
https://en.wikipedia.org/wiki/1994%E2%80%931996%20United%20States%20broadcast%20television%20realignment | Between 1994 and 1996, a wide-ranging realignment of television network affiliations took place in the United States as the result of a multimillion-dollar deal between the Fox Broadcasting Company and New World Communications, announced on May 23, 1994. Unprecedented in the broadcast industry, the deal resulted in twelve stations owned by, or in the process of being purchased by New World, switching network affiliations to Fox over the course of a two-year period when existing contracts expired. These stations were long-standing affiliates of the traditional "Big Three" television networks—CBS, NBC, and ABC—in some of the country's largest markets, with the majority having been aligned with CBS individually for over 40 years.
The major impetus for the changes was to allow Fox to improve its local affiliate coverage after having successfully outbid CBS for broadcast rights to the National Football Conference (NFC), which the National Football League (NFL) awarded to the fledgling network in December 1993. The alliance started a domino effect of similar deals between the other networks and their affiliates, mainly to shore up existing affiliate bases and, in the case of CBS, to recoup lost affiliates; CBS signed a critical pact with Westinghouse Broadcasting that resulted in Westinghouse's parent company purchasing CBS outright. The switches took place throughout the United States between September 1994 and September 1996, with one additional switch taking place in February 1997, in markets ranging in size from Atlanta, Georgia, to Miles City, Montana. In the case of four markets, CBS and NBC exchanged owned-stations between each other, with one market seeing their CBS and NBC-owned stations swap both channel positions and transmitters. The complexities of these deals saw the "Big Three" affiliates in two markets, Baltimore and Denver, exchange networks with each other, but the Fox affiliate was unchanged. In total, these constitute some of the most sweeping and expansive changes in American television history.
As a result of this realignment, Fox ascended to the status of a major television network, comparable in influence to CBS, NBC, and ABC. Multiple New World-owned stations (which Fox purchased outright in 1996) struggled to adjust to their new affiliations, but many ultimately recovered with news-intensive schedules and were buoyed by Fox's success in prime time, particularly throughout the 2000s. CBS was most impacted among the "Big Three" networks, consigned to UHF stations with high channel numbers in markets like Milwaukee, Detroit and Cleveland, but started to recover in the late 1990s by claiming the American Football Conference (AFC) rights from NBC. Fox Sports, particularly the NFL on Fox, has won acclaim since its 1994 launch for innovations in game presentation, and the network's aggressive bidding in 1993 signaled long-term trends both in American television and professional sports.
Television affiliation switches prior to 1994 |
https://en.wikipedia.org/wiki/UNICA | UNICA may refer to:
Network of Universities from the Capitals of Europe
University of Ciego de Ávila, a university in Ciego de Ávila, Cuba
UNICA, Brazil (), an association of producers of sugarcane and ethanol fuel in Brazil
University of Cagliari (Università degli Studi di Cagliari), a state university in Cagliari, Sardinia, Italy
See also
Unica (disambiguation) |
https://en.wikipedia.org/wiki/Compaq%20Presario%201200 | The Compaq Presario 1200 was a line of notebook computers produced between 1998 and 2000 by Compaq as part of Compaq Presario line.
The Presario 1200 line of notebook computers were originally noted for their AMD processors, light weight and 12-inch LCD screens, while later models included a shift to Intel processors and other changed features. The Compaq Presario 1200 series features a vast set of model numbers and revisions, many of which are not totally compatible, even though the machines share the same general Presario model number.
Specification
The range came with Toshiba HDDs and optical media drives, available as 24X CD-ROMs or 4X DVD-ROMs. Hard drives ranged from 3 to 10 GB and ran at a slow 3300 RPM across the range. This could have been due to noise limitations, as the series is noted for its low noise output. Screens were available as 12.1 / 13.0 inch LCDs yet screen housing varied from model to model. The 1245 and 1246 had very different screen housing to the 1200 and the 1200XL which came with the 13 inch screen. The 1200 also had a silver housing whereas all other models came in black. Screens for this series are notable for their banding and white edges which appear more evident as the machine ages, the backlight at the sides clearly visible. Memory expansion was available on the bottom of the units, allowing up to 128MB of additional SODIMM memory to be added. All models came equipped with a Floppy Disk Drive, VGA output and PC Card slot as standard. They also came with on-board JBL stereo speakers and Synaptics touchpads. These systems were preinstalled with Windows 98, Windows Me or Windows 2000 Professional. They were supplied with a Quick Restore disc which returned the system to its factory condition in the event of change of ownership, wish to reinstall the OS or system failure.
These later models are often noted for having a silver display lid instead of the original black lid.
Processors
Many original models of the Presario 1200 series ran on AMD K6-2 processors, which was quite an adventurous move at a time when AMD was very much second place to the dominant market leader Intel. The chips were notable for their inclusion of 3DNow! technology, enabling marked performance increases from the original K6. The chips came in a variety of speeds, ranging from 333 MHz to 550 MHz, however performance varied only slightly between models.
A number of Presario 1200 series notebooks exist with Intel Celeron, Pentium II or Pentium III processors as well, usually found in the later designs.
Models
1200-(????)
Priced at £1200, the 1200 contained a Type 2 Cardbus slot, PS2 serial port, 1 x USB port, and 3 x Game MRI Slots.
processor: 500 MHz AMD K6-2
RAM: 64 MB
Storage: 1 GB Toshiba HDD
CD drive, 3.5" Floppy Disk Drive
Screen: 12.1" LCD
Lithium Ion battery
Onboard speakers
1200-XL125
Originally priced at $1,699, the 1200-XL125 (designated with model number "12XL125") had:
processor: 533 MHz AMD K6-2+ (some had the K6-III |
https://en.wikipedia.org/wiki/Alteon%20WebSystems | Alteon WebSystems, originally known as Alteon Networks, is a division of Radware that produces application delivery controllers.
Alteon was acquired by Nortel Networks on October 4, 2000.
On February 22, 2009 Nortel Networks sold the Alteon application switching line to Radware.
History
Alteon Networks was founded in 1996 by Mark Bryers, John Hayes, Ted Schroeder and Wayne Hathaway. Initial venture capital investors were Matrix Partners and Sutter Hill Ventures. Dominic Orr became chief executive in October 1996.
Alteon introduced innovative products such as the ACEswitch 180, which was the first network switch to deliver Ethernet with selectable speed, 10/100 or 1000 Mbit/s, on every port via autonegotiation. Their ACEdirector Layer 4-7 switch was designed as an integrated services front-end and server load balancer. They also introduced Jumbo Frames (up to 9,000 bytes) with their ACEnic adapters, and supported by their switches.
In addition to server switches, Alteon produced the first network interface controller (NIC) in 1997 that used Gigabit Ethernet (demonstrated at the Networld + Interop trade show in September 1996).
Alteon's third generation Gigabit Ethernet NIC (code named "Tigon") became the basis for Broadcom's family of Ethernet controllers (series BCM570x) and has shipped over 60 million copies. It was used in low-cost adapters from vendors such as 3Com.
In July 2000, Nortel Networks announced it was buying Alteon for US$6 billion in stock. The deal had originally been announced with a value of $7.8 billion, but the stock market plummeted before the deal closed in October.
Nortel rolled the ACEDirector and ACESwitch products into its Personal Internet product line, but one year later sales had slowed down.
On February 22, 2009 Nortel Networks announced they would sell the Alteon application switching line to Radware, for $17.65 million.
In November 2013, Radware announced the Alteon NG, marketed as an application delivery controller.
References
1999 initial public offerings
2000 mergers and acquisitions
Dot-com bubble
Nortel |
https://en.wikipedia.org/wiki/Grid%20file | In computer science, a grid file or bucket grid is a point access method which splits a space into a non-periodic grid where one or more cells of the grid refer to a small set of points. Grid files (a symmetric data structure) provide an efficient method of storing these indexes on disk to perform complex data lookups.
It provides a grid of n-dimensions where n represents how many keys can be used to reference a single point.
Grid files do not contain any data themselves but instead contain references to the correct bucket.
Uses
A grid file is usually used in cases where a single value can be referenced by multiple keys.
A grid file began being used because "traditional file structures that provide multikey access to records, for example, inverted files, are extensions of file structures originally designed for single-key access. They manifest various deficiencies in particular for multikey access to highly dynamic files."
In a traditional single dimensional data structure (e.g. hash), a search on a single criterion is usually very simple but searching for a second criterion can be much more complex.
Grid files represent a special kind of hashing, where the traditional hash is replaced by a grid directory.
Examples
Census DatabaseElmasri & Navathe Fundamentals of Database Systems, Third Edition. Addison-Wesley, 2000. . Section 6.4.3: Grid Files, pp.185.
Consider a database containing data from a census. A single record represents a single household, and all records are grouped into buckets. All records in a bucket can be indexed by either their city (which is the same for all records in the bucket), and the streets in that city whose names begin with the same letter.
A grid file can be used to provide an efficient index for this structure, where records come in groupings of 26, each of them relating to street names in a city starting with one of the letters of the alphabet. This structure can be thought of as an array, table, or grid with two dimensions which we will call the x and y axes.
One may consider the x-axis to be the city and the y-axis to be each of the letters in the alphabet, or alternatively, the first letter of each street.
Each record in this structure is known as a cell. Each cell will contain a pointer to the appropriate bucket in the database where the actual data is stored. An extra cell, or record header, may be required to store the name of the city. Other cells grouped with it will only need to contain the pointer to their respective bucket, since the first cell corresponds to street names beginning with "A", the second to "B", and so on.
The database can be further extended to contain a continent field to expand the census to other continents. This would cause records in the same bucket to correspond to households on a street beginning with the same letter, in the same city, in the same continent.
The cells in the grid file would then consist of a city header, and six (one for each continent, not including Ant |
https://en.wikipedia.org/wiki/Stacie%20Foster | Stacie Foster is an actress, known for her roles in Night of the Living Dead (1990 film), Cyber Tracker 2, and Steel Frontier.
Filmography
USA High
episode "Excess's Ex" as Judith
Saved by the Bell: The New Class
episode "Mission: Control" as Shelly
episode "Into the Woods" as Shelly
1997 Another World as Kristen
Baywatch Nights
episode "Circle of Fear" as Young Woman
Silk Stalkings
episode "Runway Strip" as Barbara Ferry
1995 Cyber-Tracker 2 as Connie
1995 Steel Frontier as Sarah
1994 CyberTracker as Connie
Star Trek: The Next Generation
episode "Relics" as Lieutenant Bartel
Saved by the Bell
episode "Rockumentary" as Mindy Wallace
1990 Night of the Living Dead as Doll's Mom Zombie
References
External links
American film actresses
American television actresses
Year of birth missing (living people)
Living people
Place of birth missing (living people)
21st-century American women |
https://en.wikipedia.org/wiki/Self-extracting%20archive | A self-extracting archive (SFX or SEA) is a computer executable program which contains compressed data in an archive file combined with machine-executable program instructions to extract this information on a compatible operating system and without the necessity for a suitable extractor to be already installed on the target computer. The executable part of the file is known as a decompressor stub.
Self-extracting files are used to share compressed files with a party that may not necessarily have the software to decompress a regular archive. Users can also use self-extracting to distribute their own software. For example, the WinRAR installation program is made using the graphical GUI RAR self-extracting module Default.sfx.
Overview
Self-extracting archives contains an executable file module, a module used to run uncompressed files from compressed files. Such a compressed file does not require an external program to decompress the contents of the self-extracting file, and can run the operation itself. However, file archivers like WinRAR can still treat a self-extracting file as though it is any other type of compressed file. By using a file archiver, users can view or decompress self-extracting files they received without running executable code (for example, if they are concerned about viruses).
A self-extracting archive is extracted and stored on a disk when executed under an operating system that supports it. Many embedded self-extractors support a number of command line arguments, such as specifying the target location or selecting only specific files.
Unlike self-extracting archives, non-self-extracting archives only contain archived files and must be extracted with a program that is compatible with them. While self-extracting archives cannot be extracted under another operating system, they can usually still be opened using a suitable extractor as this tool will disregard the executable part of the file and extract only the archive resource. The self-extracting executable may need to be renamed to contain a file extension associated with the corresponding packer; archive file formats known to support this include ARJ and ZIP. Typically, self-extracting files have a .exe extension, just like any other executable file.
For example, an archive may be called somefiles.zip—it can be opened under any operating system by a suitable archive manager which supports both the file format and compression algorithm used. It may also be converted into somefiles.exe, which will self-extract under Microsoft Windows. It will not self-extract under Linux, but can be opened with a suitable archive manager. Files that are not recognized as archives by archive managers due to their executable extension can be renamed into .zip. This works for ZIP archives due to the way the ZIP header is defined, but not necessarily for other less flexible archive format.
There are several functionally equivalent but incompatible archive file formats, including ZIP, RAR, 7z |
https://en.wikipedia.org/wiki/Self-organising%20heuristic | In computing, a Self-organising heuristic is an algorithm that modifies a data structure such as a linked list in response to use of the data structure.
Examples might be:
Move-to-front (or 'Move to top')
Self-learning Frequency list (or 'Order by access frequency')
Re-insert at random position
Move to back
Example Applications
Move to front, or Order by access frequency, might be used to organize a cache of information, so that frequently used, or recently used information is at the top (and so can be found quickly, without having to traverse the whole list).
Order by frequency might be used to re-arrange a list of options in a GUI menu, so that the top ones are the ones most commonly selected by the user.
Re-insert at random or Move to back might be used to organise a list of mirror servers, so that once a server has been used for downloading, it goes to the back of the queue, to discourage the user from selecting it again.
Heuristics |
https://en.wikipedia.org/wiki/Tree%20sort | A tree sort is a sort algorithm that builds a binary search tree from the elements to be sorted, and then traverses the tree (in-order) so that the elements come out in sorted order. Its typical use is sorting elements online: after each insertion, the set of elements seen so far is available in sorted order.
Tree sort can be used as a one-time sort, but it is equivalent to quicksort as both recursively partition the elements based on a pivot, and since quicksort is in-place and has lower overhead, tree sort has few advantages over quicksort. It has better worst case complexity when a self-balancing tree is used, but even more overhead.
Efficiency
Adding one item to a binary search tree is on average an process (in big O notation). Adding n items is an process, making tree sorting a 'fast sort' process. Adding an item to an unbalanced binary tree requires time in the worst-case: When the tree resembles a linked list (degenerate tree). This results in a worst case of time for this sorting algorithm.
This worst case occurs when the algorithm operates on an already sorted set, or one that is nearly sorted, reversed or nearly reversed. Expected time can however be achieved by shuffling the array, but this does not help for equal items.
The worst-case behaviour can be improved by using a self-balancing binary search tree. Using such a tree, the algorithm has an worst-case performance, thus being degree-optimal for a comparison sort. However, tree sort algorithms require separate memory to be allocated for the tree, as opposed to in-place algorithms such as quicksort or heapsort. On most common platforms, this means that heap memory has to be used, which is a significant performance hit when compared to quicksort and heapsort. When using a splay tree as the binary search tree, the resulting algorithm (called splaysort) has the additional property that it is an adaptive sort, meaning that its running time is faster than for inputs that are nearly sorted.
Example
The following tree sort algorithm in pseudocode accepts a collection of comparable items and outputs the items in ascending order:
In a simple functional programming form, the algorithm (in Haskell) would look something like this:
data Tree a = Leaf | Node (Tree a) a (Tree a)
insert :: Ord a => a -> Tree a -> Tree a
insert x Leaf = Node Leaf x Leaf
insert x (Node t y s)
| x <= y = Node (insert x t) y s
| x > y = Node t y (insert x s)
flatten :: Tree a -> [a]
flatten Leaf = []
flatten (Node t x s) = flatten t ++ [x] ++ flatten s
treesort :: Ord a => [a] -> [a]
treesort = flatten . foldr insert Leaf
In the above implementation, both the insertion algorithm and the retrieval algorithm have worst-case scenarios.
External links
Tree Sort of a Linked List
Tree Sort in C++
References
Sorting algorithms
Online sorts |
https://en.wikipedia.org/wiki/Beat%20slicing | Beat slicing is the process of using computer programs to slice an audio file of a drumloop in smaller sections, separating different drumhits. This is employed to rearrange the beat with either a sequencer or play them with a sampler, with the results ranging from changing particular hits to completely rearranging the flow of the beat.
Slicing a beat also allows the tempo of the beat to be altered heavily in music sequencers, without resulting downsides such as the pitch being increased or decreased.
This process is the most prominent in genres of Drum and bass, Hip-Hop, Glitch and IDM, the two latter being notorious for their prominent artists rearranging and altering beats in extreme ways.
Common programs used for beat slicing
Ableton Live
BeatCleaver
ReCycle
Renoise
Reaktor
Max/MSP
FL Studio
References
Audio editors |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.