source
stringlengths
32
199
text
stringlengths
26
3k
https://en.wikipedia.org/wiki/Milk%20%28programming%20language%29
Milk is a dynamically-typed, object-oriented, imperative, scripting language. Also it's easy to understand for programming beginners and it lets application developers manage memory more efficiently in programs that deal with scattered data points in large data sets. Data Types. Booleans: true or false Numbers: Only one type- double-precision floating point. 1234 and 12.34 all fit under the same variable. Strings: Enclosed in "double quotes". ""; "crazy stuff!"; Nil: Had to distinguish the null value with Java's null, so used Nil. Expressions A lot of stuff going on here. Arithmetic Just like normal. add + this; subtract - me; multiply * me; divide / this; -negateThis Comparisons less < than lessThan =< orEqual greater > than greaterThan >= orEqual 1==2; //false "cat"!="dog"; //true //You can compare different types! 314 == "pi"; //false 123 == "123"; //false Logic !true; //false !false; //true true and false; //false true and true; //true false or false; //false true or true; //true // Use () to change precedence var avg = (min + max) / 2; Statements Statements produce an effect. The print statement is an example. You can pack a series of statements { print "One statement."; print "Two statements."; } Variables Like other languages, use = to initialize variables. Omitting the initializer defaults to nil. Because Milk is dynamically-typed there is only one key word for defining variables, var. var hello = "World"; var stillAVar; Access and assign variables using the name var breakfast = "bagels"; print breakfast; // "bagels". breakfast = "beignets"; print breakfast; // "beignets". Control Flow[edit] There are if, for, and while statements. // If/Else statements if(condition){ print "correct"; } else{ print "wrong"; } // While Loop var a = 0; while(a<10) { print "Ming is so cool"; a = a + 1; } // For Loop for(var a = 1; a < 10; a = a +5) { print a; } Functions[edit] Really let the power get to my head at this point. Functions can be run with or without arguments and look just like Java's functions. doThing() build(brick, clay) Use the keyword ming to declare functions...Clever right? LOL. // No I'm not joking. ming printSum(a,b) { print a + b; } Functions are first class in Milk, meaning they work just real values. Imagine function pointers in C. ming addPair(a, b) { return a + b; } ming identity(a) { return a; } print identity(addPair)(1, 2); // Prints "3". Functions can be declared within functions. It's a pretty cool feature. Shout out to Bob Nystrom (the author of the book). ming returnFunction() { var outside = "outside"; ming inner() { print outside; } return inner; } var woah = returnFunction(); fn(); Classes Milk is OOP. Here's what one would look like. class Breakfast { cook() { print "Eggs a-fryin'!"; } serve(who) { print "Enjoy your breakfast, " + who + ".";
https://en.wikipedia.org/wiki/VSDX%20Annotator
VSDX Annotator is a software application to view and annotate Microsoft Visio documents on the Apple Mac OS X operating system. There are some Visio file Viewers or Visio alternatives for creating flowcharts, diagrams, mind-maps, concept-maps and other graphical data. VSDX Annotator is the first application that allows you to comment and annotate MS Visio files on OS X. Capabilities VSDX Annotator allows annotating Visio drawings - flowcharts, diagrams, schemes, and other visual graphic files on a Mac. It makes it possible to view multi-page drawings while displaying shape data, layers, and hyperlinks. The Annotation tab includes 16 tools that can be used to edit files. The Viewing tab contains 12 tools to navigate drawings. VSDX Annotator provides an ability to export modified Visio files in a PDF, send the PDF via email and save VSDX files in the same extension. See also Alternative software for Visio on OS X system: Lucidchart (online tool) OmniGraffle (application) ConceptDraw (a suite of applications) References External links Official website Visio Viewer Mac software Apple World Today - Notable apps and app updates for Aug. 8, 2016 MacOS software
https://en.wikipedia.org/wiki/Latin%20American%20Federation%20of%20the%20Society%20of%20Jesus
Latin American Federation of the Society of Jesus (FLACSI) promotes the Ignatian model in the network of schools and organizations of the Society of Jesus in the Latin America and Caribbean area. The federation includes 90 schools spread across Latin America. This network of Jesuit schools is part of the "Education Sector" of the Society of Jesus in Latin America, along with the international organizations Fe y Alegría and the Association of Universities Entrusted to the Society of Jesus in Latin America (AUSJAL), all being dependent on the Conference of Provincials for Latin America (CPAL). The non-profit FLACSI along with CPAL were founded in 2001. Related organizations Fe y Alegría Association of Universities Entrusted to the Society of Jesus in Latin America Pontifical Xavierian University Alberto Hurtado University References Society of Jesus Education in Latin America Organizations based in Latin America
https://en.wikipedia.org/wiki/Gillian%20Lovegrove
Gillian Lovegrove (born 1942) is a retired computer scientist and academic. She was Dean of the School of Informatics at Northumbria University, president of the Conference of Professors and Heads of Computing and was Higher Education consultant to the British Computer Society and manager of its Education and Training Forum. She is known for her interest in gender imbalance in computer education and employment, and her public discussion of possible solutions to a shortage of information technology graduates in the UK. Early life and education Gillian Lesley Lowther, now Gillian Lovegrove, was born in Yorkshire on 28 October 1942 and grew up in the Hull area. She went to Malet Lambert School and then to Newnham College, Cambridge to study mathematics. After her first degree in 1964, she did a Masters-equivalent Diploma at Cambridge University in Numerical Analysis and Automatic Computing. Career She was a lecturer in mathematics at Portsmouth Polytechnic from 1965 to 1968 and then went as a research fellow to Southampton University, where she started maths lecturing in 1969. Her career had to be part-time as she combined it with motherhood responsibilities for a few years in the 1970s. In 1974 she got her PhD with a dissertation on modular operating systems, after studying under David Barron, and in 1980 she began full-time lecturing in computer studies at Southampton. Her next research interest was object-oriented computing. She co-wrote two papers about girls and computer education: Where Are All the Girls? (1987) and Where Are the Girls Now? (1991) with Wendy Hall, a colleague at Southampton. Lovegrove also organised "Women into Computing" conferences in the late 1980s where one of the themes that emerged was "dismay at the low number of women taking computing courses or following computing careers". In 1992 she went to the University of Staffordshire's School of Computing where she was associate dean and head of information systems. She was also in the "IT EQUATE" team exploring ways of encouraging more girls at school to consider IT as an area of study and as a future career. In 1995 a reviewer said her chapter, Women in Computing, in Professional Awareness in Software Engineering "grapples with the very difficult policy issues in the areas of legislation, institutional culture, and positive action". She was concerned not only about a shortage of women in computing but also more generally about a shortage of information technology graduates in the UK and gave evidence on this subject to the Parliamentary Information Technology Committee in 2001. She suggested ways for universities to help create "a culture which does not exclude women" from computing. She continued making similar points about under-representation of women and an inadequate supply of IT graduates at conferences and elsewhere. The Times Higher Education Supplement said her field had become "the image of computing and what more computing departments can do for the UK econo
https://en.wikipedia.org/wiki/Corythoichthys%20flavofasciatus
Corythoichthys flavofasciatus, known commonly as the network pipefish, reticulate pipefish and yellow-banded pipefish, is a species of marine fish in the family Syngnathidae. Distribution and habitat This species can be found from the Red Sea and Eastern Africa to the Tuamotu, the Ryukyu Islands, northern Australia and the Austral Islands. It lives in tropical climate and it is associated with lagoons and coral reefs at depths from the low tide line to 25 m. Description Corythoichthys flavofasciatus can reach a length of about in males. These fishes have 26-36 dorsal soft rays. Body has yellow and brown stripes, while the snout is red. Males develop orange stripes and brilliant light blue spots. This species is quite similar to Corythoichthys conspicillatus. Biology This species is ovoviviparous. These fishes are probably monogamous and are usually found in pairs. The male carries the eggs in a ventral pouch, which is below the tail. Hatching time usually lasts 10–12 days. These fishes feed on small invertebrates especially copepods, but also small isopods and ostracods. In French Polynesia it is predated by Epinephelus merra. Taxonomy Some authorities consider that Corythoichthys flavofasciatus is a species which is restricted to the Red Sea and that the species found in the remainder of the Indo-Pacific is Corythoichthys conspicillatus. Bibliography Fenner, Robert M.: The Conscientious Marine Aquarist. Neptune City,: T.F.H. Publications, 2001. Helfman, G., B. Collette y D. Facey: The diversity of fishes. Blackwell Science, Malden, Massachusetts, 1997. Hoese, D.F. 1986:. A M.M. Smith y P.C. Heemstra (eds.) Smiths' sea fishes. Springer-Verlag, Berlin. Moyle, P. and J. Cech.: Fishes: An Introduction to Ichthyology, 4th. ed., Upper Saddle River, New jersey: Prentice-Hall. Nelson, J.: Fishes of the World, 3rd. ed. New York: John Wiley and Sons.. Wheeler, A.: The World Encyclopedia of Fishes, 2nd. Ed. London: Macdonald. References External links Syngnathidae Fish described in 1838
https://en.wikipedia.org/wiki/Brett%20Novak%20%28media%20personality%29
Brett Novak (Jett Novak) is an Australian entrepreneur and media personality, best known as a television presenter on the Seven Network television program Our Town and as the Creative Director of advertising agency The Freeform Foundry. Early life and education Novak was born in Perth, Western Australia, Australia. He graduated with Honours in Performing Arts from Corpus Christi College, Perth. He then studied Interactive Multimedia & Design and in 2009 completed a Bachelor of Commerce (Marketing & Advertising) at Curtin University in Bentley, Western Australia, while working as a designer, developer & salesperson. Career Advertising and business career Novak began his career in marketing working client side in the renewables sector, starting as a Graphic Designer before working his way to become a National Marketing Manager. After moonlighting alongside his full-time position, in 2011 he formed a team and founded digital marketing & advertising agency The Freeform Foundry, which provided a platform to launch several other businesses. He has been responsible for launching major Advertising campaigns for Tourism Australia among other iconic Australian brands and developments. Media career After completing studies at Western Australian Academy of Performing Arts, in April 2016 it was announced he would host the weekend program Our Town on Australian television network Seven Network with co-host Pip O'Connell. Novak is also a guest on FM radio networks Nova 93.7 and Hit 92.9 and has featured in advertising campaigns for companies including Westnet. Television appearances Cosmopolitan Media Bachelor Of The Year 2016 On 12 September 2016, Novak was nominated for Cosmopolitan Media Bachelor Of The Year, among 90 Australian media and marketing personalities. Charity boxing event On 4 March 2018, Novak was announced as the main card in the Perth Corporate Rumble, a charity boxing event against The Bachelor, Richie Strahan. References 1984 births Living people People from Perth, Western Australia Australian television presenters
https://en.wikipedia.org/wiki/HealthUnlocked
HealthUnlocked is a social networking service for health. The company uses health-specific artificial intelligence to support patients to better manage their own health, by recommending relevant and tailored health content, information and services to patients The site enables peer support for various health conditions and promotes patient empowerment by actively engaging people with their healthcare. Communities The social network hosts online communities within a dedicated health web platform. There are currently over 700 different health communities on the HealthUnlocked website, for a wide range of health and wellbeing conditions. After registering to use the site, users can create a user profile and join one or more of these online communities. Many of the online communities are run in partnership with health organizations, non-profit organization's (NPO) and charities worldwide, including Anxiety and Depression Association of America (ADAA), British Liver Trust, Endometriosis UK and The Multiple Sclerosis Association Of America. Each month over 4M people from across the world come to the platform, the majority of which are from the UK and US. HealthUnlocked is in the top 20 private health websites globally according to Alexa Internet. HealthUnlocked is also available through an app for iPhone A study (2017) by University of Manchester concluded that use of the HealthUnlocked platform positively affects a person's Patient Activation Measure and research (University of Warwick, 2016) found use of platforms such as HealthUnlocked helps people to come together and cope with illnesses and diseases such as diabetes, cancer and mental health problems. The network was identified as a technology that will change health and care by the Kings Fund, a tech startup that is on track to become one of Britain's next billion dollar companies, and won an award in the Axa PPP Health Tech & You Awards (2017) while being named as a truly standout, disruptive innovation. HealthUnlocked was one of the first companies selected to join NHS England's, NHS Innovation Accelerator (NIA) programme, which aims to have proven innovations adopted faster and more systematically through the NHS, delivering on the commitment detailed within the Five Year Forward View. HealthUnlocked works with organisations including think tanks and the pharmaceutical industry to better understand long term health conditions and to recruit people from its online health communities to surveys, advisory boards and panels, as well as clinical trials. An academic review into patient involvement in drug development found that social media and peer networks are evolving to play a much deeper role in innovation and clinical research in industry and changing opportunities for patients to participate in research and development of new therapies. A study into patients experiences on steroids taken from data on the health platform found that the timing of glucocorticoid administration varies signi
https://en.wikipedia.org/wiki/Mass-assignment%20protection
In the computing world, where software frameworks make life of developer easier, there are problems associated with it which the developer does not intend. Software frameworks use object-relational mapping (ORM) tool or active record pattern for converting data of different types and if the software framework does not have a strong mechanism to protect the fields of a class (the types of data), then it becomes easily exploitable by the attackers. These frameworks allow developers to bind parameters with HTTP and manipulate the data externally. The HTTP request that is generated carries the parameters that is used to create or manipulate objects in the application program. The phrase mass assignment or overposting refers to assigning values to multiple attributes in a single go. It is a feature available in frameworks like Ruby on Rails that allows the modifications of multiple object attributes at once using modified URL. For example, @person = Person.new(params[:person]) #params contains multiple fields like name, email, isAdmin and contactThis Mass Assignment saves substantial amount of work for developers as they need not set each value individually. Threats In Mass Assignment, a malicious agent can attack and manipulate the data in various ways. It can send the tags which can make him assign various permissions which would otherwise be forbidden. For example, a database schema has a table "users" having field "admin" which specifies if corresponding user is admin or not. Malicious agent can easily send the value for this field to the server through HTTP request and mark himself as an admin. This is called Mass assignment vulnerability. It explores the security breaches that can be done using mass assignment. GitHub got hacked in 2012 by exploiting mass assignment feature. Homakov who attacked the GitHub gained private access to Rails by replacing his SSH with SSH key of one of the members of Rails GitHub. Protection ASP.NET Core In ASP.NET Core use the Bind attribute. [HttpPost] public IActionResult OnPost( [Bind("LastName,FirstMidName,HireDate")] Instructor instructor) Ruby We can perform some changes in the active record models to ensure the protection of our data. To use attr_protected: We specify the attributes which need to be protected. If the user tries mass assignment, then the user will get an error page which says Mass Assignment Security error and the attribute value will not be changed. This is also called blacklisting In this method, sometimes keeping track of all the attributes we want to protect is difficult. For example, in the code below, assign_project attribute is protected.Class Person < ActiveRecord::Base has_many :projects attr_protected :assign_project endThis method optionally takes a role option using :as which enables to define multiple mass-assignment groupings. These attributes will have the :default role in case no role role is assigned. Here is an example which illustrates that assign_project
https://en.wikipedia.org/wiki/Veritas%20Technologies
Veritas Technologies LLC. is an American international data management company headquartered in Santa Clara, California. The company has its origins in Tolerant Systems, founded in 1983 and later renamed Veritas Software. It specializes in storage management software including the first commercial journaling file system, VxFS, VxVM, VCS, the personal/small office backup software Backup Exec and the enterprise backup software, NetBackup. Veritas Record Now was an early CD recording software. Before merging with Symantec (now known as Gen Digital) in 2004, Veritas was listed on the S&P 500 and the NASDAQ-100 under the VRTS ticker symbol. In 2014, Symantec announced that it would demerge its information management business as Veritas Technologies LLC, to focus on security. It was purchased as part of the demerger by the private equity firm The Carlyle Group for $8 billion in cash. History Early history The company was founded by Eli Alon and Dale Shipley (both from Intel) as Tolerant Systems in 1983 to build fault-tolerant computer systems based on the idea of "shoe box" building blocks. The shoe box consisted of an OS processor, running a version of Unix called TX, and on which applications ran, and an I/O processor, running a Real Time Executive, developed by Tolerant, called RTE: both processors were 320xx processors. The system was marketed as the "Eternity Series." The TX software gained a level of fault-tolerance through check-pointing technology. Applications needed to be fortified with this check-pointing to allow roll-back of the application on another processor if a hardware failure occurred. Tolerant also developed a forerunner of today's RAID systems by incorporating a journaling file system and multiple copies of the disk drive content. Dale Ship Tolerant Software in January 1988. Tolerant Software produced a journaling file system and a virtual disk management system for the AT&T UNIX platform, which was built by a new team led by John Carmichael. The firm started out with a relationship with AT&T to provide the file (Veritas File System – VxFS) and disk management (Veritas Volume Manager – VxVM) software for its UNIX operating system, and to jointly market and support the products to the System OEMS (Sun, HP, etc.). The OEM model provided royalties to Veritas when the OEM shipped its products to end users. On December 9, 1993, the company had its initial public offering (IPO), selling 16 million shares to the public, and valuing the company at $64 million. Growth and acquisitions At the end of 1996, Veritas had revenues of $36 million. Tidalwave Technologies Acquisition: In 1995 the company acquired Tidalwave Technologies, a small San Francisco-based company for $4.2 million in stock. Tidalwave specialized in cross-platform High Availability (HA) Software and thus entered the HA business. OpenVision Acquisition: In 1997 the company acquired OpenVision Technologies, another public company of the same size, and thus entered
https://en.wikipedia.org/wiki/Open%20Data%20Indices
Open data indices are indicators which assess and evaluates the general openness of an open government data portal. Open data indices not only show how open a data portal is, but also encourage citizens and government officials alike, to participate in their local open data communities, particularly in advocating for local open data and local open data policies. There are two mainstream methodologies, which are Global Open Data Index and Open Data Barometer. The Global Open Data Index evaluates an open data portal from 11 different aspects based on the Open Definition of open data, while the Open Data Barometer adds two more indices compared to the previous one. Scoring standard According to the service offered by Open Knowledge International, they run a measurement called "Global Open Data Index" which is "an annual effort to measure the state of open government data around the world". And they evaluate the openness of an open dataset according to the following questions: 1. Does the data exist? (5 marks) The Open Knowledge Foundation specifically indicates that the data of an open data portal should be directly comes from the official government department or a third party with the permission of the government that they can fully represent the government. And if so, the third party should explicitly states the permission. 2. Is data in digital form? (5 marks) This question does not examines if the data can be accessed online or by public but if the data exists in any digital format. 3. Publicly available? (5 marks) A data could be considered as publicly available when it can be accessed without any permission or password by every individual (not just government officers) and there is no restrictions for the amount of photocopies can be made if the data is in the paper form. For this question, it does not matter if the data is in paper form or digital form. 4. Is the data available for free? (15 marks) The data is available for free if the access of the data does not require any forms of charges. 5. Is the data available online? (5 marks) The data is available online if it can be accessed through the Internet from an official source. 6. Is the data machine-readable? (15 marks) This question addresses whether the data is in a form that can be easily processed by the computer. File types such as XLS, CSV, JSON, XML are considered as machine-readable, while PDF, or HTML are not. 7. Available in bulk? (10 marks) If the whole dataset can be easily downloaded, it can be considered as available in bulk. 8. Openly licensed? (30 marks) This question addresses whether the data can be freely used, reused, and redistributed by everyone without any restrictions. A list of types of licenses that meet the requirements is listed at http://opendefinition.org/licenses/. 9. Is the data provided on a timely and up to date basis? (10 marks) This question examines if the data is updated on a regular basis. It requires personal ju
https://en.wikipedia.org/wiki/ProBiS
ProBiS is a computer software which allows prediction of binding sites and their corresponding ligands for a given protein structure. Initially ProBiS was developed as a ProBiS algorithm by Janez Konc and Dušanka Janežič in 2010 and is now available as ProBiS server, ProBiS CHARMMing server, ProBiS algorithm and ProBiS plugin. The name ProBiS originates from the purpose of the software itself, that is to predict for a given Protein structure Binding Sites and their corresponding ligands. Description ProBiS software started as ProBiS algorithm that detects structurally similar sites on protein surfaces by local surface structure alignment using a fast maximum clique algorithm. The ProBiS algorithm was followed by ProBiS server which provides access to the program ProBiS that detects protein binding sites based on local structural alignments. There are two ProBiS servers available, ProBiS server and ProBiS CHARMMing server. The latter connects ProBiS and CHARMMing servers into one functional unit that enables prediction of protein−ligand complexes and allows for their geometry optimization and interaction energy calculation. The ProBiS CHARMMing server with these additional functions can only be used at National Institutes of Health, USA. Otherwise it acts as a regular ProBiS server. Additionally a ProBiS PyMOL plugin and ProBiS UCSF Chimera plugin have been made. Both plugins are connected via the internet to a newly prepared database of pre-calculated binding site comparisons to allow fast prediction of binding sites in existing proteins from the Protein Data Bank. They enable viewing of predicted binding sites and ligands poses in three-dimensional graphics. Protein building sites tools Detect structurally similar binding sitesThis tool takes as an input a query protein or a binding site. The ProBiS algorithm structurally compares the query independently of sequence or fold with a database of non-redundant protein structures. The output of this tool are a 3D query protein colored by degrees of structural conservation from blue (unconserved) to red (structurally conserved) in Jmol viewer and a table of similar proteins. Pairwise local structural alignmentThis tool takes as an input two proteins or binding sites. The ProBiS algorithm compares structures based on geometry as well as physicochemical properties and returns their local structural alignment. ProBiS web server RESTful Web ServicesThe ProBiS web server features RESTful (Representational State Transfer) web services to make the binding site similarities and local pairwise alignments for any PDB protein structure easily accessible from any script. ProBiS-Database accessProBiS-Database can be accessed directly from ProBiS (CHARMMing) server, ProBiS-Database widget, which can be included in any web page to provide access to the ProBiS-Database, or RESTful Web Services, which make ProBiS-Database easily accessible from any script. History ProBiS algorithm for detection of structurally si
https://en.wikipedia.org/wiki/Maveric%20Systems
Maveric Systems is an engineering services company founded in 2000. It works across digital platforms, banking solutions, data technologies, and regulatory systems. Maveric Systems has dedicated offshore delivery and research centers in Chennai & Bengaluru, India. Headquartered in Chennai, India, Maveric Systems has branches in Mumbai, Bangalore, Singapore, Mexico City, London, Dubai, Riyadh, New Jersey, and Kuala Lumpur. The firm operates in the APAC and Middle East. History The company was founded in 2000 by Ranga Reddy, P Venkatesh, NN Subramanian and VN Mahesh. The company initially offered testing services to banks and financial institutions, but by 2012, Maveric Systems diversified into requirements assurance, application assurance, and program assurance. Maveric additionally offered domain specialisation, platforms, and technical competency. In 2018, the company expanded its board to include Chitra Ramakrishna, the former CEO and Managing Director of National Stock Exchange, and D. K. Sharma, a technology specialist and former CIO of Citigroup Global Consumer Banking’s International Business as independent Board of Directors. References Software testing Information technology industry of Chennai Companies based in Chennai 2000 establishments in Tamil Nadu Indian companies established in 2000
https://en.wikipedia.org/wiki/I%27m%20a%20Celebrity...Get%20Me%20Out%20of%20Here%21%20%28Australian%20season%203%29
The third season of Australia's I'm a Celebrity...Get Me Out of Here, which was commissioned by Network Ten on 1 August 2016, premiered on 29 January 2017. Casey Donovan won the series, beating Natalie Bassingthwaighte and footballer Dane Swan, and was crowned the first ever "Queen of the Jungle", the $100,000 prize money, was won for her selected charity, the Starlight Children's Foundation . Celebrities Celebrity guests Results and elimination Indicates that the celebrity received the most votes from the public Indicates that the celebrity was immune from the vote Indicates that the celebrity was named as being in the bottom 2, 3 Indicates that the celebrity received the fewest votes and was eliminated immediately (no bottom three) Tucker Trials The contestants take part in daily trials to earn food. These trials aim to test both physical and mental abilities. Success is usually determined by the number of stars collected during the trial, with each star representing a meal earned by the winning contestant for their camp mates. The public voted for who they wanted to face the trial The contestants decided who did which trial The trial was compulsory and neither the public nor celebrities decided who took part The contestants were chosen by the evicted celebrities The voting for the trial was of dual origin - see note for details. Notes The winning team of this tucker trial received; the quickest way into camp, their choice of bed in the camp & a pillow. Tom was voted by Australia to do this Tucker Trial but was told six people are involved in it and he had to choose the other five to join him. Casey & Ash had to decide which celebrities would be involved in this Tucker Trial. This trial was used in the second season of the show with Laurina Fleure also winning 12/12 stars, however, this time two celebrities competed with double the number of snakes. During the trial, they failed one meal but succeeded in the rest giving them 10/11 stars, but were given the option to have Chris Brown & Osher Günsberg to have an extra meal, they accepted and Chris & Osher succeeded in this, which gave them the 11th star. As a new celebrity, Keira was automatically placed in the trial. Voting took place for a second celebrity to join her in the trial. Australia voted for Dane to be a part of the trial. The trial involved 2 celebrities versing each other throughout 6 rounds, the celebrity who wins went into the winners circle and the celebrity that lost went into the losers circle, ending with 6 celebrities in each group. The winners received a share in a family meat pie with tomato sauce & quickest way into camp, whilst the losers only received beans and rice. Keira & Steve got to choose a celebrity to join them as support (Steve chose Ash, Keira chose Lisa). In the trial, Steve & Keira would face-off against each other. The winner would return to camp with 10 stars while the celebrity that loses the trial, and their supporter, would be exiled to
https://en.wikipedia.org/wiki/List%20of%20Commonwealth%20Games%20medallists%20in%20netball
The following is a list of medal winners at the Commonwealth Games netball tournament. Commonwealth Games medallists 1998 2002 2006 2010 2014 2018 2022 References Source Results Database from the Commonwealth Games Federation Netball Lists of netball players Medalists in netball
https://en.wikipedia.org/wiki/Great%20Cocky%20Count
The Great Cocky Count is an annual census designed to provide accurate data about the number and distribution of black cockatoos. It is the largest single survey of black cockatoos in Western Australia. The count is a citizen science survey and is conducted at sunset one night in autumn, usually in early April. It was first held in 2010 and has been conducted each year since apart from 2020 (cancelled due to Covid-19). Over 700 registered volunteers participated each year at hundreds of locations between Geraldton and Esperance, Western Australia. The 2019 count had over 700 volunteers surveying over 400 sites, with the endangered Carnaby's black cockatoo being the main focus of the count but the vulnerable Baudin's black cockatoo and forest red-tailed black cockatoo also being counted. In 2016 a total of 426 roost sites were surveyed by approximately 700 volunteers. The results included: 16,392 white-tailed black cockatoos recorded at 100 occupied roosts. 1,907 forest red-tailed black cockatoos recorded at 66 occupied roosts 4,897 Carnaby's black cockatoos were found at a single roost site It was estimated that 27% of the black cockatoos that inhabit the south west of Western Australia were counted in a single night. The long-term results from the surveys, which have been conducted since 2010, have found that the Carnaby's black cockatoo population of the Perth-Peel coastal plain declined at a rate of roughly 4 per cent each year. There has been a reduction in flock size and fewer occupied roost sites around Perth, mostly as a result of increased urban sprawl and land clearing. 70% of the population are found in the Gnangara pine plantation, which is scheduled to be cleared by 2025. The reduction in numbers is mostly a result of clearing breeding grounds and reducing their range. Currently the birds are thought to be using all available habitat, which is barely enough to support the population. References Bird censuses Environmental volunteering Citizen science
https://en.wikipedia.org/wiki/Social%20sorting
Social sorting is understood as the breakdown and categorization of group- or person-related raw data into various categories and segments by data manipulators and data brokers. Social sorting involves the key task of separating one group from the other. These groups can be based on income, education, race, ethnicity, gender, occupation, social status, derived power (social and political) and geographic residence. Depending on the goals of the manipulator raw data is collected and then further evolves into meaningful data in order to be exploited for a specific purpose. For example, the formulation of profiling and predictive policing are all derivations of social sorting. History The concept is accredited to David Lyon, a sociologist who is best known for his work in surveillance studies. Contemporary times have allowed for the influx and constant growth of data collection especially in the countries of the global north. A prime example of social terming is surveillance. This practice was not always as sophisticated as today. Historically, simple tools such as labor-intensive watchers, book keeping and record keeping acted as the enablers of this form. Surveillance is now done by governments and various organizations. This technological tools that are equipped with surveillance are cameras, records of transactions done at banking machines and point of sale terminals, machine readable passports before boarding, cellular phone calls along with many other examples. This collection of raw data then enables trends to be found and the fostering of predictions. In other contextual fashion, social sorting bears much of its resemblance to social stratification. In primitive societies there are evidence of the roots of social sorting where the sexual division of labour was concerned. Women would do most of the gathering where men would concentrate on hunting. It was argued that although this specific task of the woman may point to domestic oppression according to some observers, hunter-gatherer women would not understand this interpretation. The primitive society did show groupings and deployed categorization which perhaps without their own understanding of the understanding of the social construct was still insinuated. Further confirmation of social sorting was evident through slavery. The racial divide between whites and blacks manifested for generations. Based on the visual appearance of their skin people of a darker complexion were grouped and made to endure hardships that included beatings, laborious field work, confinement and executions. A prime example of social sorting at work during the African slave era were mullatos were grouped together to perform household and other domestic work. Criticism Criticisms are often directed at the laws, implemented rules, educational system, job employment opportunities and at the government. Questions are asked of the integrity of many socially constructed programs led by private and government institutio
https://en.wikipedia.org/wiki/Tastemade
Tastemade, Inc. is a video network that offers food- and travel-related programming for online audiences. Overview Founded in 2012 by Larry Fitzgibbon, Steven Kydd and Joe Perez in Santa Monica, California, Tastemade is a global, digital food and travel network for millennials that lets users explore cuisine from around the world through a mix of original content and user-submitted videos. Tastemade's content reaches over 100 million people a month across over 200 countries. Tastemade's content is available on Facebook, Instagram, Snapchat, Prime Video Channels, Apple TV Channels, Pinterest, Roku, YouTube TV, TiVo+, DirecTV, Sling TV and Tastemade's website and the service's app. More than half of Tastemade's views happen on mobile devices and connected TVs. History In 2014, Tastemade's original program Thirsty For... won a James Beard Award in the New Media category for Video Webcast, Fixed Location and/or Instructional. That same year, The Perennial Plate, a documentary series about sustainable food practices on the Tastemade network, also won a James Beard Award in the New Media category for Video Webcast, on Location. The Grill Iron, a Tastemade travel show about college football tailgating, generated over 5 million total views and was nominated for a James Beard Award in 2015. Later, The Grill Iron became Tastemade's first show to migrate from digital to broadcast television in September 2015. In 2016, Tastemade won a Webby Award in the Online Film & Video category for Documentary Series for its show, Heritage. In early 2015, Apple added the Tastemade channel to its Apple TV device. That same year, Tastemade was named one of the World's Top 10 Most Innovative Companies by Fast Company. Tastemade was the third most viewed channel in the world on Facebook in July 2016. In July 2015, Facebook began testing a revenue sharing program with its video partners, Tastemade being among them. Tastemade is also part of Facebook's Anthology program, which creates video ads by teaming up advertisers and publishers. In April 2016, Tastemade announced an agreement with Facebook to produce and air 100 Facebook Live shows every month. Tastemade debuted as one of Snapchat's new publishers on its Discover platform in August 2015, producing original food and travel content for the app on a daily basis. The following month, Tastemade's Snapchat Discover channel launched in the United Kingdom and France. Tastemade's Snapchat channel was nominated for a Webby Award in 2016. Funding In 2014, Tastemade announced $25 million in series C funding, led by Scripps Networks Interactive with participation by Liberty Media Corporation, bringing the startup's total funding to $40 million. In December 2015, Tastemade secured a $40 million Series D funding round led by Goldman Sachs, with participation from existing investors Redpoint Ventures, Raine Ventures, Comcast Ventures, Liberty Media, Scripps Networks Interactive, and Tohokushinsha Film Corporation, bringing th
https://en.wikipedia.org/wiki/The%20Snow%20Queen%202
The Snow Queen 2: The Snow King (also released as The Snow Queen: Magic of the Ice Mirror) and released in Russia as (), is a 2014 Russian 3D computer-animated fantasy comedy family film that is produced by animation studio Wizart Animation. Written by Aleksey Tsitsilin, Vladimir Nikolaev, , Aleksey Zamyslov and directed by Aleksey Tsitsilin, the film is the sequel to the 2012 animated film The Snow Queen. Produced by Timur Bekmambetov, Yuri Moskvin, Vladimir Nikolaev and Diana Yurinova, the film was released by Bazelevs Company theatrically in Russia and Commonwealth of Independent States on 1 January 2015 with an international pre-release during November and December 2014 in US and UK. The film stars the voices of Nyusha as Gerda and Ivan Okhlobystin as Snow King with Garik Kharlamov, Valeriya Nikolayeva, Shura Bi-2, Fyodor Dobronravov, Mikhail Tikhonov, Galina Tyunina and Ramilya Iskander in supporting roles. An international voice cast was announced for the film that included Bella Thorne as Gerda, Sharlto Copley as Snow King, and Sean Bean as Arrog with Isabelle Fuhrman, Pat Fraley, Jeff Bennett, Candi Milo, Cindy Robinson in supporting roles. The film follows the story of troll Orm who gets mired again in lies and financial irresponsibility after he sees a reflection while working as a miner. The vainglorious troll Orm gets a chance to become a hero again when the Troll King Arrog proclaims the decree that whoever rescues his royal family trapped at the palace of the Snow Queen will receive a grand prize. Development began in 2014, as the writers signed up for a sequel in response to the rousing reception of The Snow Queen. The animation focused on improving the animation quality of the film from its predecessor. The film became the first Russian film to top weekend box office in a European country. The film was noted for its good humor, bright characters and epic battles. Plot A year after the Snow Queen was defeated by Gerda, Orm the troll has thawed out the rest of his kind and now lives with his grandmother Rosa and Gerda's pet white ferret Luta, works in the troll village as a miner. Orm takes an oath at Lake Gao never to tell another lie and from that moment his reflection comes to life and starts manipulating him into doing the wrong things, including lying. Upon being fired from his job after insulting the knight Arrog and facing eviction from his cottage, Orm is manipulated by his reflection into donning armor so he can take part in a competition to decide who will marry Princess Maribel. In order to impress the Princess and her uncle, the King, Orm lies about defeating the Snow Queen. However, Gerda, who had arrived at the village with her brother Kai and friend Alfida, overhear Orm's lies, leading to an argument between the two that culminates in Gerda leaving. Later, as Orm and Rosa are moving into the King's palace, the King says he feels as if he has seen Rosa before, to which she asks if she has changed that much over
https://en.wikipedia.org/wiki/List%20of%20number-one%20digital%20albums%20of%202015%20%28Australia%29
The ARIA Albums Chart ranks the best-performing albums and extended plays (EPs) in Australia. Its data, published by the Australian Recording Industry Association, is based collectively on the weekly digital sales of albums and EPs. Chart history Number-one artists See also 2015 in music ARIA Charts List of number-one singles of 2015 (Australia) References Digital 2015 Australia albums Number-one albums
https://en.wikipedia.org/wiki/List%20of%20Commonwealth%20Games%20medallists%20in%20rugby%20sevens
This is the complete list of Commonwealth Games medallists in rugby sevens from 1998 to 2014. Medallists Men Women References Results Database from the Commonwealth Games Federation Rugby Medalists Commonw
https://en.wikipedia.org/wiki/Shadow%20stack
In computer security, a shadow stack is a mechanism for protecting a procedure's stored return address, such as from a stack buffer overflow. The shadow stack itself is a second, separate stack that "shadows" the program call stack. In the function prologue, a function stores its return address to both the call stack and the shadow stack. In the function epilogue, a function loads the return address from both the call stack and the shadow stack, and then compares them. If the two records of the return address differ, then an attack is detected; the typical course of action is simply to terminate the program or alert system administrators about a possible intrusion attempt. A shadow stack is similar to stack canaries in that both mechanisms aim to maintain the control-flow integrity of the protected program by detecting attacks that tamper the stored return address by an attacker during an exploitation attempt. Shadow stacks can be implemented by recompiling programs with modified prologues and epilogues, by dynamic binary rewriting techniques to achieve the same effect, or with hardware support. Unlike the call stack, which also stores local program variables, passed arguments, spilled registers and other data, the shadow stack typically just stores a second copy of a function's return address. Shadow stacks provide more protection for return addresses than stack canaries, which rely on the secrecy of the canary value and are vulnerable to non-contiguous write attacks. Shadow stacks themselves can be protected with guard pages or with information hiding, such that an attacker would also need to locate the shadow stack to overwrite a return address stored there. Like stack canaries, shadow stacks do not protect stack data other than return addresses, and so offer incomplete protection against security vulnerabilities that result from memory safety errors. In 2016, Intel announced upcoming hardware support for shadow stacks with their Control-flow Enforcement Technology. Shadow stacks face some compatibility problems. After a program throws an exception or a longjmp occurs, the return address at the top of the shadow stack will not match return address popped from the call stack. The typical solution for this problem is to pop entries from the shadow stack until a matching return address is found, and to only terminate the program when no match is found in the shadow stack. A multithreaded program, which would have a call stack for each executing thread, would then also have a shadow stack shadowing each of the call stacks. See also Call stack Return address Buffer overflow References Computer security
https://en.wikipedia.org/wiki/Latency%20oriented%20processor%20architecture
Latency oriented processor architecture is the microarchitecture of a microprocessor designed to serve a serial computing thread with a low latency. This is typical of most central processing units (CPU) being developed since the 1970s. These architectures, in general, aim to execute as many instructions as possible belonging to a single serial thread, in a given window of time; however, the time to execute a single instruction completely from fetch to retire stages may vary from a few cycles to even a few hundred cycles in some cases. Latency oriented processor architectures are the opposite of throughput-oriented processors which concern themselves more with the total throughput of the system, rather than the service latencies for all individual threads that they work on. Flynn's taxonomy Typically, latency oriented processor architectures execute a single task operating on a single data stream, and so they are SISD under Flynn's taxonomy. Latency oriented processor architectures might also include SIMD instruction set extensions such as Intel MMX and SSE; even though these extensions operate on large data sets, their primary goal is to reduce overall latency. Implementation techniques There are many architectural techniques employed to reduce the overall latency for a single computing task. These typically involve adding additional hardware in the pipeline to serve instructions as soon as they are fetched from memory or instruction cache. A notable characteristic of these architectures is that a significant area of the chip is used up in parts other than the Execution Units themselves. This is because the intent is to bring down the time required to complete a 'typical' task in a computing environment. A typical computing task is a serial set of instructions, where there is a high dependency on results produced by the previous instructions of the same task. Hence, it makes sense that the microprocessor will be spending its time doing many other tasks other than the calculations required by the individual instructions themselves. If the hazards encountered during computation are not resolved quickly, then latency for the thread increases. This is because hazards stall execution of subsequent instructions and, depending upon the pipeline implementation, may either stall progress completely until the dependency is resolved or lead to an avalanche of more hazards in future instructions; further exacerbating execution time for the thread. The design space of micro-architectural techniques is very large. Below are some of the most commonly employed techniques to reduce the overall latency for a thread. Instruction set architecture (ISA) Most architectures today use shorter and simpler instructions, like the load/store architecture, which help in optimizing the instruction pipeline for faster execution. Instructions are usually all of the same size which also helps in optimizing the instruction fetch logic. Such an ISA is called a RISC architec
https://en.wikipedia.org/wiki/Janikhel%20offensive
The Janikhel offensive was launched by the Taliban and the Haqqani network in early August 2016 to conquer the Janikhel District within the contested Paktia Province from government forces. Due to the district's geographic location, it is of great strategic and tactical value to any force that controls it. After being besieged by insurgents for weeks and not receiving any outside help, the local government forces retreated from the district on 27 August. Even though the district was retaken by the government on 5 September, the fact that the district had been captured by the Taliban in the first place was widely considered a heavy blow for the government, which faced increasing insecurity and loss of territory since the ISAF retreat in 2014. Background The Janikhel district, inhabited by c.120,000 people, is strategically significant due to its location and the Khost-Gardez highway that runs through it. The highway is of vital importance for the supply and stability of the region, and its capture by rebel forces could result in the collapse of several local districts, while allowing insurgents to use it to move weapons, money, supplies, and forces from the Pakistani tribal areas into Afghanistan. Furthermore, the Janikhel district is historically important for the Haqqani Network, which suffered one of its largest defeats there during the Battle for Hill 3234 of the Soviet–Afghan War. It has been concluded that "the destabilization and fall of Janikhel [could be] the first possible stage in Haqqani establishing a secure foothold in eastern Afghanistan — the prospect of which could make Kabul a far bloodier scene." The offensive On 10 August, hundreds of Taliban and Haqqani network fighters began their offensive, reportedly supported by the Pakistani ISI, quickly closing in on the district center. At this point, the local governor Abdul Rahman Zurmati already said that his forces needed reinforcements or Janikhel would fall. TOLONews regarded the district "on the verge of collapse". No external aid came, however, causing a local pro-government militia to lay down arms in protest and reducing the defenders' strength to around 90–150 soldiers and policemen, while the number of attackers had reportedly increased to 1,200 fighters by end of the month. Vastly outnumbered, government forces attempted to halt the Taliban advances in the mountainous terrain, though by 22 August they were completely besieged in the district center. In an attempt to secure reinforcements or other support, Governor Zurmati complained to the provincial police chief, and even called President Ashraf Ghani's public phone line to no avail. On 27 August, the defenders' ammunition ran out, finally forcing them to retreat from the district. The New York Times considered the defense of Janikhel "chaotic [...], mustered by troops scrambling until the last minute, then forced to retreat after their requests for reinforcements are delayed or denied because government forces are stret
https://en.wikipedia.org/wiki/Hahamakin%20ang%20Lahat
(International title: Love and Defiance / ) is a Philippine television drama romance series broadcast by GMA Network. Directed by Don Michael Perez, it stars Joyce Ching and Kristofer Martin. It premiered on October 31, 2016 on the network's Afternoon Prime line up replacing Sinungaling Mong Puso. The series concluded on February 17, 2017 with a total of 80 episodes. It was replaced by Legally Blind in its timeslot. The series is streaming online on YouTube. Premise Ivy and Nelson will fall in love each other. Due to Ivy's father's disapproval to her relationship with Nelson, the two will escape which will lead to a car crash and Nelson's death. Ivy will find out that she's pregnant and the child will be raised by her sister. Cast and characters Lead cast Joyce Ching as Rachel Tan-Ke /Patricia Tan Solano Labsat Kristofer Martin as Luisito "Junior / Junjun" Labsat Jr. Supporting cast Snooky Serna as Laura Caraca-Labsat Ariel Rivera as Nelson Solano / Alfred Benitez Eula Valdez as Ivy Tan-Ke Thea Tolentino as Phoebe Ke Chinggoy Alonzo as Ericson Tan Jett Pangan as Charlie Ke Marc Abaya as Luisito "Sito" Labsat Sr. Marina Benipayo as Cynthia Tan-Ke Renz Valerio as Puloy Dionisio Mona Louise Rey as Gigi Labsat Bruno Gabriel as Crisanto "Santi" Valderama III Recurring cast Tina Monasterio as Divina Valderama Marlon Mance as Renato Valderama Marika Sasaki as Aliyah Lovely Rivero as Lily Allysa del Real as Cheska Mike "Pekto" Nacua as Johnny Jana Trites as Didith Mel Kimura as Bibsy Chinggay Riego as Flor Rebecca Chuaunsu as Karen Dexter Doria as Inyang Guest cast Daria Ramirez as Elisa "Loring" Caraca Jordan Hong as Franklin Ke Leanne Bautista as young Rachel Geson Granado as young Luisito Althea Ablan as young Phoebe Ratings According to AGB Nielsen Philippines' Mega Manila household television ratings, the pilot episode of earned a 10.1% rating. While the final episode scored a 13.4% rating. Accolades References External links 2016 Philippine television series debuts 2017 Philippine television series endings Filipino-language television shows GMA Network drama series Philippine romance television series Television shows set in Quezon City
https://en.wikipedia.org/wiki/WOLG
WOLG is an FM radio station at 95.9 MHz in Carlinville, Illinois, owned and operated by the Covenant Network of Catholic radio stations. History WCNL went on the air December 8, 1990. Owned by the Carlinville Broadcasting Company, a subsidiary of Miller Media Group, the station aired a country format. Covenant Network acquired WCNL and WTIM in Taylorville in 1998, with the FM station going for $300,000. WOLG and WIHM, the former WTIM, began simulcasting programming. WOLG was the first FM radio station owned by Covenant Network. Translators WOLG is the nominal source of Covenant programming to nine translators, the most of any full-power station in the network. References External links OLG Catholic radio stations Radio stations established in 1990 1990 establishments in Illinois
https://en.wikipedia.org/wiki/University%20of%20Georgia%20Computer%20Science
The University of Georgia Computer Science Major is under The UGA School of Computing, formerly known as the Computer Science Department. It is jointly administered by the Franklin College of Arts and Sciences and College of Engineering after a proposal to elevate the department into its own school due to rapid growth in the major at the University of Georgia. While the original Computer Science department was established in 1984, the All-New School of Computing was established on July 1, 2022. 2014–2016 growth Computer Science is, as of September 2016, the third-most enrolled major at the University of Georgia and is the university's fastest growing major. The number of undergraduates enrolled as Computer Science majors increased from 614 in fall 2014 to 751 in fall 2015 (an increase of 22%). In 2016, the Computer Science department was able to hire more faculty to keep up with its own growth and the national need for IT and programming related skills. This hiring process was primarily sparked by a student petition, which amassed over 1000 signatures, to the Computer Science department head and the dean of the Franklin College of Arts and Sciences. The petition requested more funding and instructors for the department. Computer Science is also the 3rd highest paying major at UGA, with each student making a $59,800 starting salary and a $102,000 mid career salary on average. Student Involvement and Achievement Being the 3rd most enrolled major at the University of Georgia, the Computer Science department has a plethora of student groups and organizations. Hackathons In 2015, the University of Georgia's first hackathon was organized by a student organization, led by an undergraduate Jaicob Stewart, known as UGAHacks, which is now officially endorsed by Major League Hacking. The first edition was co-run by Paul Hwang (who designed all of the digital art for the event) and Anurag Banerjee (who led technical infrastructure and sponsorship). Since the first edition, the event has grown in terms of attendees, organizers, and a plethora of companies have sponsored the event over the years as a way to interact and potentially recruit skillful computer science and engineering students. On February 7–9, 2020, the fifth edition of the event (UGAHacks 5) will take place at the Zell B. Miller Learning Center. Association for Computational Machinery The University of Georgia of has an Association for Computing Machinery branch that operates at the school. The University also has a branch of ACM-W, which focuses on empowering collegiate women in computer science. Small Satellite Research Laboratory The UGA Small Satellite Research Laboratory was founded in 2016 by Caleb Adams, an undergraduate computer science student, and involves around 20 students. This organization will be building the university's first satellite, which will deployed in late 2018 from the International Space Station. References External links University of Georgia Colleges and sc
https://en.wikipedia.org/wiki/C-4%20%28Cercan%C3%ADas%20Madrid%29
The C-4 is a line and rail service of Cercanías Madrid commuter rail network, operated by Renfe Operadora. It runs from Colmenar Viejo and Alcobendas – San Sebastián de los Reyes north of Madrid to Parla south of Madrid. The C-4 shares tracks for part of its length with Madrid commuter rail service line through the city of Madrid. The line has been in operation since 1981. Infrastructure Like the rest of Cercanías Madrid lines, the C-4 runs on the Iberian gauge mainline railway system, which is owned by Adif, an agency of the Spanish government. All of the railway lines carrying Rodalies de Catalunya services are electrified at 3000 volts V direct current (DC) using overhead lines. The C-4 operates on a total line length of , which is entirely double-track. The trains on the line call at up to 18 stations, using the following railway lines, in order from north to south: List of stations The following table lists the name of each station served by line C-4 in order from north to south; the station's service pattern offered by C-3 trains; the transfers to other Cercanías Madrid lines; remarkable transfers to other transport systems; the municipality in which each station is located; and the fare zone each station belongs to according to the Madrid Metro fare zone system. References Cercanías Madrid 3000 V DC railway electrification
https://en.wikipedia.org/wiki/Wagon%20numbering%20system%20in%20India
A new wagon numbering system was adopted in Indian Railways in 2003. Wagons are allocated 11 digits, making it easy for identification and computerization of a wagon's information. The first two digits indicate Type of Wagon, the third and fourth digits indicate Owning Railway Zone, the fifth and sixth digits indicate Year of Manufacture, the seventh through tenth digits indicate Individual Wagon Number, and the last digit is a Check digit. First two digits These two digits indicate Type of Wagon. Open wagon Code allotted is from 10 to 29 Covered wagon Code allotted is from 30 to 39 Tank wagon Code allotted is from 40 to 54 Flat wagon Code allotted is from 53 to 69 Hopper wagon Code allotted is from 70 to 79 Well wagon Code allotted is from 80 to 84 Brake van For Brake Van code allotted is from 85 to 89 Third & fourth digits These two digits indicate the owning railway zone. Fifth & sixth digits These two digits indicate the last two digits of the year of manufacture For example,08 for 200815 for 2015 Seventh to tenth digits These digits indicate Individual Wagon Number. This is a running serial number from 0001 to 9999. Numbers 0001 to 0999 are departmental stock. Numbers 1000 to 9999 are for other traffics stock. Last digit This is a Check digit. The Check Digit for each wagon is calculated using a six-step algorithm as indicated below. Let the wagon number be C1 C2 C3 C4 C5 C6 C7 C8 C9 C10 C11. (C1 is the first digit, C2 is the second digit, and so on) Step 1 : Starting from the left, add all the Characters in the even position. S1 = C2 + C4 + C6 + C8 + C10 Step 2 : Multiply the sum by 3 to get 3×S1 Step 3 : Starting from the left.. add all the Characters in the odd position. S2 = C1 + C3 + C5 + C7 + C9 Step 4 : Add the sum of step 2 to the sum of step 3 to get S4= 3×S1+S2 Step 5 : Round this total up to the next multiple of 10. Step 6 : The check digit is the number required to the added to round up to the next multiple of 10 An example for the calculation, Let the wagon number is 31101695215 Step 1 : S1 = C2 + C4 + C6 + C8 + C10 = 1+0+6+5+1 = 13 Step 2 : 3 × S1 = 39 Step 3 : S2 = C1+ C3 + C5 + C7 + C9 = 3+1+1+9+2 = 16 Step 4 : S4= 3 × S1 + S2 = 39 + 16 = 55 Step 5 : Next 10th multiple of 55 = 60 Step 6 : Check digit = 60 - 55 = 5 Hence the eleventh digit is assigned as 5 for this particular wagon. Abbreviations used for wagon type code Gauge code M :- (prefix) MG N :- (prefix) NG Wagon type code B :- (prefix) Bogie wagon (sometimes omitted) BV :- Brake van V :- Brake/parcel van (see above for brake van codes) O :- Open wagon (gondola) C :- Covered wagon (boxcar) F :- Flat car FK :- Flat car for container transport FU :- Well wagon LA :- Low flat car with standard buffer height LB :- Low flat car with low buffer height LAB :- Low flat car, one end with low buffers, the other with high buffers R :- Rail-carrying wagon T :- Tanker (additional letters indicate material carried) U :- Well wagon W :- Well wagon K :- Open wag
https://en.wikipedia.org/wiki/Gem%20Drill
"Gem Drill" is the second episode of the third season of American animated television series Steven Universe, which premiered on May 12, 2016 on Cartoon Network. It was written and storyboarded by Raven Molisee and Paul Villeco. The episode was viewed by 1.693 million viewers. The episode deals with one of the two prominent threats of the second season, the Cluster. Steven and Peridot use their completed drill to travel down into Earth's mantle to stop The Cluster from taking form and destroying the Earth after it starts showing signs of manifestation. Plot Picking up immediately after the events of "Super Watermelon Island", with the other Crystal Gems stranded on Mask Island, Steven (Zach Callison) tells Peridot (Shelby Rabara) that it is up to the two of them to stop the Cluster, the underground geo-weapon that threatens to destroy the Earth. Steven and Peridot climb into their drill and begin tunneling. As they drill, Steven and Peridot discuss Peridot's previous life on the Gem homeworld and how it compares to her life on Earth. When Cluster prototypes—artificial, deformed fusions of broken Gem shards buried in the Earth—attack the drill, Steven fights them off but feels uneasy about not trying to help them. The drill eventually arrives at the Cluster, an immense spherical formation of millions of Gem shards. It is trying to take a physical form, but is not yet able to. Peridot prepares the drill as Steven frets that maybe the Cluster just doesn't know what it is doing. Peridot is still determined to destroy it, as there is a possibility that it still could destroy Earth if they don't stop it, and begins to drill into the Cluster, but is unable even to pierce the surface. Rendered unconscious by the resulting ordeal, Steven experiences a vision of himself floating among the shards of the Cluster. He realizes he can communicate with the shards, which are obsessed with trying to take form in order to feel whole. He tries to persuade them that perhaps all they need is each other's company. The shards begin conversing with each other, but cannot resist the impulse to take form. Steven encases a few shards in bubbles, and then wakes up in the drill to see the shards slowly begin to bubble each other. Steven eventually merges all the small bubbles into one huge bubble, encasing the Cluster. After Steven and Peridot arrive back on the surface, Pearl (Deedee Magno Hall), Garnet (Estelle), and Amethyst (Michaela Dietz) finally return with an unconscious Lapis Lazuli, and Steven tells them what happened. The last shot of the episode is the Cluster, peacefully lying deep in the Earth inside of Steven's bubble. Production The episode was written and storyboarded by Raven Molisee and Paul Vileco and directed by Ki-Yong Bae and Jin-Hee Park (animation), Jasmin Lai (art), Kat Morris (supervising) and Ian Jones-Quartey (co-executive producer). Broadcast and reception "Gem Drill" premiered on May 12, 2016 on Cartoon Network. Its initial American broad
https://en.wikipedia.org/wiki/Drillia%20recordata
Drillia recordata is a species of sea snail, a marine gastropod mollusk in the family Drilliidae. Description The length of the shell attains 23 mm, its diameter 9.5 mm. The species was described from a young shell which is not in very good condition. The form now described as a variety may prove to be a distinct species. In fresh condition the shell is of an olive-green tint, with a brown area either covering the larger and lower portion of the body whorl or confined to a small region at the base. The protoconch, in the variety, is well elevated, acute, and, though a little worn, appears smooth. The shell differs from the type in its smaller size (an adult shell of the typical form, decollated, measuring 31 mm. long), by the slightly more swollen whorls, and the more numerous and more closely set longitudinal ribs, which latter are more produced over the whorls and do not leave so marked a smooth area below the suture. The type compared to has become a synonym as Crassispira consociata (E.A. Smith, 1877). Distribution This marine species occurs off Angola. References Tucker, J.K. 2004 Catalog of recent and fossil turrids (Mollusca: Gastropoda). Zootaxa 682:1–1295 External links Endemic fauna of Angola recordata Gastropods described in 1905
https://en.wikipedia.org/wiki/Drillia%20regia
Drillia regia is a species of sea snail, a marine gastropod mollusk in the family Drilliidae. The database Gastropods.com regards this species as a synonym of Neodrillia enna (W.H. Dall, 1918), in turn regarded by WoRMS as a synonym of Drillia enna (W.H. Dall, 1918). Description The length of the shell varies between 25 mm and 60 mm. Distribution This species occurs in the Southwestern Pacific and off the Philippines. References Tippett D.L. (2006a) Taxonomic notes on some Indo-Pacific and West African Drillia species (Conoidea: Drillidae). Iberus, 24, 13–21. page(s): 18–19 Tucker, J.K. 2004 Catalog of recent and fossil turrids (Mollusca: Gastropoda). Zootaxa 682:1–1295 External links Specimen at MNHN, Paris regia Gastropods described in 1970
https://en.wikipedia.org/wiki/Algoid%20%28programming%20language%29
Algoid is an educational programming language developed around 2012, by Yann Caron a student of computer science at CNAM, (Conservatoire national des arts et métiers at Paris) Features Algoid is an educational language that allows the student to use different paradigms: Imperative Procedural Functional Recursive Object-oriented (multi-inheritance) Aspect-oriented programming. It leads onto programming in industry standard language (such as C, Java and C++) and its syntax as close as possible to their respective syntaxes. It implements powerful idioms like meta-object protocol (from python) and cascade (from smalltalk). To do this, the fundamental principles of Algoid are: A function is an expression. An object is an expression. An expression is an object. So a function is a meta-function and an object is a meta-object. References External links Algoid website Computer programming
https://en.wikipedia.org/wiki/Array%20Based%20Queuing%20Locks
Array-Based Queuing Lock (ABQL) is an advanced lock algorithm that ensures that threads spin on unique memory locations thus ensuring fairness of lock acquisition coupled with improved scalability. Overview Synchronization is a major issue in the designing and programming of shared memory multiprocessors. The common problem with lock implementations is the high network contention due to the processors spinning on a shared synchronization flag or memory location. Thus the scalability of the lock is reduced significantly in terms of the number of contending processors. The Array Based Queuing Lock is an extension to the ticket lock algorithm which ensures that, on a lock release, only one processor attempts to acquire the lock, decreasing the number of cache misses. This effect can be achieved by having all the processors spin on unique memory locations. One analogy used to explain the lock mechanism is the relay race where the athlete passes on the baton to the next athlete in the queue, which ensures that only one athlete acquires the baton at a time. ABQL also guarantees fairness in lock acquisition by using a first in, first out (FIFO) queue-based mechanism. Additionally, the amount of invalidation is significantly less than ticket-based lock implementations since only one processor incurs a cache miss on a lock release. Implementation The foremost requirement of the implementation of array based queuing lock is to ensure that all the threads spin on unique memory locations. This is achieved with an array of length equal to the number of threads which are in contention for the lock. The elements of the array are all initialized to 0 except the first element which is takes the value 1, thus ensuring successful lock acquisition by the first thread in the queue. On a lock release, the hold is passed to the next thread in queue by setting the next element of the array to 1. The requests are granted to the threads in FIFO ordering. Pseudo Code example is listed below. ABQL_init(int *next_ticket, int *can_serve) { *next_ticket = 0; for (int i = 1; i < MAXSIZE; i++) can_serve[i] = 0; can_serve[0] = 1; } ABQL_acquire(int *next_ticket, int *can_serve) { *my_ticket = fetch_and_inc(next_ticket); while (can_serve [*my_ticket] != 1) ; } ABQL_release (int *can_serve) { can_serve[*my_ticket + 1] = 1; can_serve[*my_ticket] = 0; // prepare for next time } To implement ABQL in the pseudo code above, 3 variables are introduced namely can_serve, next_ticket and my_ticket. The roles of each are described below: can_serve array represents the unique memory locations that the threads waiting in the queue for the lock acquisitions spin on. next_ticket represents the next available ticket number that is assigned to a new thread. my_ticket represents the ticket thread of each unique thread in the queue. In the initialization method (ABQL_init), the variable next_ticket is initialized to 0. All the elements of the can_serve array except t
https://en.wikipedia.org/wiki/Automated%20threat
An automated threat is a type of computer security threat to a computer network or web application, characterised by the malicious use of automated tools such as Internet bots. Automated threats are popular on the internet as they can complete large amounts of repetitive tasks with almost no cost to execute. Threat ontology The OWASP Automated Threat Handbook provides a threat ontology list for classifying automated threats, which are enumerated below. References Types of malware Impact of Automation
https://en.wikipedia.org/wiki/Credential%20stuffing
Credential stuffing is a type of cyberattack in which the attacker collects stolen account credentials, typically consisting of lists of usernames or email addresses and the corresponding passwords (often from a data breach), and then uses the credentials to gain unauthorized access to user accounts on other systems through large-scale automated login requests directed against a web application. Unlike credential cracking, credential stuffing attacks do not attempt to use brute force or guess any passwords – the attacker simply automates the logins for a large number (thousands to millions) of previously discovered credential pairs using standard web automation tools such as Selenium, cURL, PhantomJS or tools designed specifically for these types of attacks, such as Sentry MBA, SNIPR, STORM, Blackbullet and Openbullet. Credential stuffing attacks are possible because many users reuse the same username/password combination across multiple sites, with one survey reporting that 81% of users have reused a password across two or more sites and 25% of users use the same passwords across a majority of their accounts. In 2017, the FTC issued an advisory suggesting specific actions companies needed to take against credential stuffing, such as insisting on secure passwords and guarding against attacks. According to former Google click fraud czar Shuman Ghosemajumder, credential stuffing attacks have up to a 2% login success rate, meaning that one million stolen credentials can take over 20,000 accounts. Wired Magazine described the best way to protect against credential stuffing is to use unique passwords on accounts, such as those generated automatically by a password manager, enable two-factor authentication, and to have companies detect and stop credential stuffing attacks. Credential spills A credential spill, alternatively referred to as a data breach or leak, arises when unauthorized individuals or groups illicitly obtain access to sensitive user credentials that organizations store. Such credentials frequently comprise usernames, email addresses, and passwords. The repercussions of credential spills can be significant, as they commonly subject users to a range of hazards, including identity theft, financial fraud, and unauthorized account infiltration. Credential stuffing attacks are considered among the top threats for web and mobile applications as a result of the volume of credential spills. More than three billion credentials were spilled through online data breaches in 2016 alone. Origin The term was coined by Sumit Agarwal, co-founder of Shape Security, who was serving as Deputy Assistant Secretary of Defense at the Pentagon at the time. Incidents On 20 August 2018, U.K. health and beauty retailer Superdrug was targeted with an attempted blackmail, with hackers showing purported evidence that they had penetrated the company's site and downloaded 20,000 users' records. The evidence was most likely obtained from hacks and spillages and
https://en.wikipedia.org/wiki/List%20of%20companies%20involved%20in%20quantum%20computing%20or%20communication
This article lists the companies worldwide engaged in the development of quantum computing or quantum communication. Quantum computing and communication are two sub-fields of quantum information science, which describes and theorizes information science in terms of quantum physics. While the fundamental unit of classical information is the bit, the basic unit of quantum information is the qubit. Company details See also Quantum programming Quantum supremacy List of quantum processors References Further reading Quantum Computing Report's list of quantum players The Quantum Insider's list of quantum computing companies Companies Lists of technology companies Companies involved in quantum computing
https://en.wikipedia.org/wiki/Archaeology%20of%20Banda%20District%20%28Ghana%29
Banda District in Ghana plays an important role in the understanding of trade networks and the way they shaped the lives of people living in western Africa. Banda District is located in West Central Ghana, just south of the Black Volta River in a savanna woodland environment. This region has many connections to trans-Saharan trade, as well as Atlantic trade and British colonial and economic interests. The effects of these interactions can be seen archaeologically through the presence of exotic goods and export of local materials, production of pottery and metals, as well as changes in lifestyle and subsistence patterns. Pioneering archaeological research in this area was conducted by Ann Stahl. Trans-Saharan trade period The period of trans-Saharan trade in what's now Banda District started around C.E. 1300 and lasted into the 17th century. Many of the early villages in this area were heavily influenced by the trade networks connecting the Sahara. The Banda in particular had a relationship with the Nigerian trade network, where wooded savanna resources such as gold, kola nut, and ivory were traded for northern goods like copper alloys, salt, and textiles. There is some question as to whether peoples in Banda District received these goods directly, or if they were obtained through larger settlements in the area. European interest European interest in Western African resources really took off during this period starting around C.E. 1400 through C.E. 1650. A major contributing factor to this sudden interest was due to the tales of Mansa Musa, the leader of Mali, and his travels to Mecca covered in gold. The Portuguese had a particularly large presence along the Gold Coast at this point, setting up a fort at Elmina and rapidly exploring the surrounding area. Craft production Pottery The form and decoration of pottery in these sites is very similar to that of Begho, and its well made homogeneous nature implies that a good deal of specialization was occurring. Before the Ngre and Kuulo Phases of ceramics in Banda District, there was the Volta Phase, whose pottery was characterized by red painted geometric motifs, with no real evidence for northern relationships. Neutron activation analysis of shards excavated from the site Kuulo Kataa show that the different clay types being used were fairly homogeneous as well, which supports the idea of local production. Much of the clay used came from east of the Banda hills, and craftsmen were using the same clay regardless of the form or treatment of the vessels they were making. Jars are broken down into two main categories, those whose rims flare out from the constriction point, and those that are more globular in shape. Much of the decoration is found on the rims of the vessels, and they are either surface treated with cord wrapped roulette or mat impressions which are then offset by grooved lines and motifs. Various tempering agents were used as well, with some vessels even having evidence of metal s
https://en.wikipedia.org/wiki/Ho%C3%ABrskool%20Ficksburg%2C%20Ficksburg
Akademiese personneel en vakke A Zeederberg- Computer Technologies S Human- Rekeningkunde, Besigheidstudies L Els- English A Dreyer- Fisiese Wetenskap Cherice Marais- Lewensoriëntering M Hanekom- Consumer Studies A Duminy- Afrikaans J Coetzee- Afrikaans B da Silva- Mathematics I Pretorius- Life Orientation, Wiskunde en Fisiese Wetenskap L van Niekerk- Engels B Nthinya- Wiskunde M Thuysman- Ingenieurs Grafika en Ontwerp K Lekenyane- Lewensoriëntering, Natural Sciences J Grobbelaar- Wiskunde (Departmenshoof) J Hanekom- Tegniese Tekeninge en Wiskundige Geletterdheid H Kotze- Natuurwetenskap en Lewenswetenskap Christine Marais- Afrikaans C Jonck- Aardrykskunde M Pelser- Engels G Pelser- Tegnologie en Meganiese Tegnologie C Swanepoel- Afrikaans JA Swanepoel- Natural Sciences Venter T- N/A J Lathlieff- Afrikaans S van Schalkwyk- Natuurwetenskap en Lewenswetenskap Representative Council of Learners (2023) Head Leaders Clement Molapo Clementina Molapo Deputy Head Leaders Xavier Moll Joline Wang Grade Representatives Graad 12 Seuns Juandré Steenkamp Zakir Hoosen Lefa Lekekiso Lefa Lehalehale Girls Jessica Mofokeng Jahandri Heroldt Cassidy Maree Aresha Ahmed Grade 11 Boys Taahir Karim Lebo Lehohla Mzili Mokomatsili Meisies Zahraa Patel Carla Kotzè Neo Saul Ali Sowaibah Grade 10 Boys Jonkers Rowan Notoria NM Sorour Alec Meisies Wang Jo-Anne Mevane Bokomosa Lesego Leboela Graad 9 Seuns Thabo Janki Mabula Lebohang Girls Khatija Abubaker Amy vd Westhuizen Algemene univorm Seuns Wit lang of kort hemp Skool trui (opsioneel) Skool baadjie (opsioneel) Skool das Grys lang broek Grys kouse Swart leer of valse leer skoene Meisies Skool rok Skool trui (opsioneel) Skool baadjie (opsioneel) Wit kouse Swart skool skoene OF Wit lang of kort hemp Skool trui (opsioneel) Skool baadjie (opsioneel) Skool das Blou skoolbroek Wit kouse Swart skool skoene Buitemuurse aktiwiteite Sport Rugby Tennis Gholf Sokker Krieket Hokkie Netbal Swem Landloop Perdry Skiet Tweekamp Hardloop Stap Verspring Hoogspring Gewigstoot Spiesgooi Werpskyf Skaak Kulturele aktiwiteite Debate Orators Drama Glee UCSA Fotografie First Aid Expo Eksterne skakels Ficksburg High School Website Schools in the Free State (province)
https://en.wikipedia.org/wiki/David%20Zuckerman%20%28computer%20scientist%29
David Zuckerman is an American theoretical computer scientist whose work concerns randomness in computation. He is a professor of computer science at the University of Texas at Austin. Biography Zuckerman received an A.B. in mathematics from Harvard University in 1987, where he was a Putnam Fellow in 1986. He went on to earn a Ph.D. in computer science from the University of California at Berkeley in 1991 advised by Umesh Vazirani. He then worked as a postdoctoral fellow at the Massachusetts Institute of Technology and Hebrew University of Jerusalem before joining the University of Texas in 1994. Zuckerman was named a Fellow of the ACM in 2013, and a Simons Investigator in 2016. Research Most of Zuckerman's work concerns randomness in computation, and especially pseudorandomness. He has written over 80 papers on topics including randomness extractors, pseudorandom generators, coding theory, and cryptography. Zuckerman is best known for his work on randomness extractors. In 2015 Zuckerman and his student Eshan Chattopadhyay solved an important open problem in the area by giving the first explicit construction of two-source extractors. The resulting paper won a best-paper award at the 2016 ACM Symposium on Theory of Computing. References American computer scientists University of Texas at Austin faculty Theoretical computer scientists Fellows of the Association for Computing Machinery Living people Harvard College alumni Simons Investigator UC Berkeley Graduate School of Education alumni Year of birth missing (living people) Putnam Fellows
https://en.wikipedia.org/wiki/Keras
Keras is an open-source library that provides a Python interface for artificial neural networks. Keras acts as an interface for the TensorFlow library. Up until version 2.3, Keras supported multiple backends, including TensorFlow, Microsoft Cognitive Toolkit, Theano, and PlaidML. As of version 2.4, only TensorFlow is supported. However, starting with version 3.0 (including its preview version, Keras Core), Keras will become multi-backend again, supporting TensorFlow, JAX, and PyTorch. Designed to enable fast experimentation with deep neural networks, it focuses on being user-friendly, modular, and extensible. It was developed as part of the research effort of project ONEIROS (Open-ended Neuro-Electronic Intelligent Robot Operating System), and its primary author and maintainer is François Chollet, a Google engineer. Chollet is also the author of the Xception deep neural network model. Features Keras contains numerous implementations of commonly used neural-network building blocks such as layers, objectives, activation functions, optimizers, and a host of tools for working with image and text data to simplify programming in deep neural network area. The code is hosted on GitHub, and community support forums include the GitHub issues page, and a Slack channel. In addition to standard neural networks, Keras has support for convolutional and recurrent neural networks. It supports other common utility layers like dropout, batch normalization, and pooling. Keras allows users to produce deep models on smartphones (iOS and Android), on the web, or on the Java Virtual Machine. It also allows use of distributed training of deep-learning models on clusters of graphics processing units (GPU) and tensor processing units (TPU). See also Comparison of deep-learning software References External links Keras on GitHub Deep learning software Free statistical software Python (programming language) scientific libraries Software using the Apache license
https://en.wikipedia.org/wiki/Dance%20Se%20Puder
Dance se Puder (Dance If You Can) is a talent show produced in Brazil and aired as a segment of the Sunday program "Eliana", on SBT network. During the competition, a number of young artists known to the public compete to find out who is the best dancer. It is hosted by Eliana. Each participant has to dance to a song chosen by the producers and they have a week to learn the choreography. On stage, they are judged by Jaime Arôxa, Ivan Santos and the new judge Li Martins. The winner will earn R$50,000. Judging The panel of judges is formed by three people. During the first season, only Jaime Arôxa and Ivan Santos were regular judges, accompanied by a guest. In the second season, singer Li Martins joined the panel. Their function is to make criticism of the performances and give points on a scale of 0 to 10. Series overview References Talent shows 2016 Brazilian television series debuts
https://en.wikipedia.org/wiki/IBM%20System/360%20Model%2065
The IBM System/360 Model 65 is a member of the IBM System/360 family of computers. It was announced April 1965, and replaced two models, the Model 60 and Model 62, announced one year prior but never shipped. It was discontinued in March 1974. Models There are six submodels of the S/360-65. They vary by the amount of core memory with which the system is offered. The G65, H65, I65, IH65 and J65 submodels are configured with 128K, 256K, 512K, 768K or 1M of core memory, respectively. By 1974 the smallest G submodel had been discontinued. The MP (multiprocessor) model was added supporting from 512K to 2MB of system memory. The system can also attach IBM 2361 Large Capacity Storage (LCS) modules which provide up to 8MB of additional storage, however with a considerably slower memory cycle time of 8 microseconds compared to the 750 nanoseconds of processor storage. Relative performance The performance of the Model 65 is more than triple that of a S/360-50, whereas the Model 75, the next step up, was less than double that of a S/360-65. Features The Model 65 implements the complete System/360 "universal instruction set" architecture, including floating-point, decimal, and character operations as standard features. It offers optional compatibility features to permit emulation of the IBM 7040 and 7044 and the IBM 7090 and 7094, the IBM 7070 and 7074, and the IBM 7080. Main memory in the Model 65 can be interleaved for faster access. The Model 65, like the Model 67, was available in a dual-CPU offering. Multi-processing (Dual-CPU) systems have two I65s, IH65s or J65s, and "the main storage of each processing unit is accessible to the other." Systems software The Model 65 supports BPS, DOS/360, TOS/360, and OS/360 - PCP, MFT and MVT. MVT was a fairly typical choice of operating system for the Model 65. A special version of MVT, called MP65, is needed for the multi-process (dual CPU) Model. MP65 uses special CPU-to-CPU/Multisystem mode instructions, such as Write Direct. The Model 65MP implements asymmetric multiprocessing: "certain input output equipment is accessible from only one processor." Time-sharing can be provided on a Model 65 using IBM's Time Sharing Option (TSO). See also Smithsonian Institution – has a System/360 Model 65, though it is no longer on public display References System 360 Model 65
https://en.wikipedia.org/wiki/European%20Thermoelectric%20Society
The European Thermoelectric Society (ETS) is a non-profit organization founded in 1995. The goals of the ETS are to promote European research and development activities and professional networking in the field of thermoelectricity. As of June 2021, the society had an average of about one hundred members and is located in the Institute for Materials Sciences (Chair of Materials Chemistry) at the University of Stuttgart, Germany. History The idea to establish a ″thermoelectric network″ within the European Union started to take shape at the 1st European Workshop on Thermoelectricity in Dresden/Germany in October 1994. The actual foundation assembly of the European Thermoelectric Society with participants from eight European countries was held in Cologne/Germany in February 1995. The first elected president was Hubert Scherrer (France). Purpose The purpose of ETS is to represent the interests of everyone in Europe involved in thermoelectricity. It offers a platform to the European thermoelectric community to improve exchange of information and pool resources. On the other hand, it acts as a single point of contact for economy, politics and the interested public. It is committed to watch trends, give directions for future activities, develop visions, and render guidance to those interested in the field. An important function is to raise awareness of thermoelectricity and its applications in Europe. In order to live up to these purposes, the ETS is organizer of conferences in topics of interest to the community and establishes a communication network between members. In addition, the ETS is in close contact to other thermoelectric groups and societies in Europe: DTG (Germany), STS (Switzerland), GDR TE (France), AIT (Italy) and worldwide (ITS). Structure The society consists of the general assembly, the executive committee, the extended committee and the auditors. The general assembly consists of all individual members of the society. A member can be any individual person from industry or academic institutions with activities or interests in thermoelectricity. Registration for the European Conference on Thermoelectrics (ECT) involves an obligatory one year membership. The executive committee consisting of president, secretary, and treasurer manages and represents the society, while the extended committee acts in an advisory capacity. The members of both committees are elected by the general assembly for a three-year term. Meetings The European countries take turns at organizing the annual European Conference on Thermoelectrics (ECT) showcasing trends, developments, products and services of academia and industry in the field. Every three years the ECT coincides with the International Conference on Thermoelectrics (ICT). Awards Together with the German, Italian and Swiss Thermoelectric Societies, the ETS sponsors three poster prizes every year. The prizes are endowed with a prize money of 500 Euro each and awarded at the annual ECT. Honora
https://en.wikipedia.org/wiki/Fabrizio%20Capobianco
Fabrizio Capobianco (born December 2, 1970) is an Italian serial entrepreneur based in Silicon Valley. He currently serves as Chief Innovation Officer at Minerva Networks. He was the founder and CEO of the sports social network TOK.tv and of Funambol, a white-label “personal cloud” provider. Early life and first companies Fabrizio Capobianco was born in Sondrio (Valtellina), in the Italian Alps. After studying Greek and Latin at the Liceo Classico G. Piazzi, he graduated from the University of Pavia in 1994 with a MS in Computer Science, as an alumnus of the Almo Collegio Borromeo. In 1997 he received a PhD in Computer Science with a focus on usability from the University of Pavia. In 1994 he founded Internet Graffiti, the first Italian Web Company, anticipating the Internet phenomenon. His simple idea was that the Internet would change the world, and every company in Italy needed a web site. In 1996 he founded Stigma OnLine. The company built one of the first Intranet products in the market, SolWeb Intra, a web document management product which became the backbone for the Intranet of Kraft, Novartis, the Italian Broadcasting Television, the Italian Stock Exchange and the Bocconi University. In 1999 he permanently moved to the United States, in Silicon Valley. For a few years - from 1999 to 2002 - Capobianco worked in Palo Alto at Tibco Finance (then Reuters) as Director of Reuters’ Brokerage System, where he was in charge of pre-sale and post-sale activities for one of the first web trading consumer platforms, TIBMercury. The Dual Model: Headquarters in Silicon Valley, R&D in Italy In 2002 Fabrizio Capobianco founded Funambol, a white-label personal cloud solution for mobile operators and device manufacturers. Funambol's vision was to make it easy to automatically sync billions of mobile phones, tablets, computers and connected devices with the systems and online services people use everyday via the cloud. The project was initially based on open source software, also called Funambol, that quickly became the largest open source project in mobile. During his tenure as CEO of Funambol, Capobianco created the HPL (Honest Public License), which was then merged into the GNU AGPLv3, which he submitted on behalf of Funambol to the Open Source Initiative in 2008. With headquarter in Silicon Valley, but R&D in Pavia (Italy), Funambol has raised over $30 million in Venture Capital funding in multiple rounds and established partnership with Télefonica, Movistar Spain and many other leading mobile operators worldwide. Having managed software development teams in Italy, and in Silicon Valley, Capobianco concluded that the development team of his first Italian companies were as good (if not better) than the ones he found in Silicon Valley. Aware that Silicon Valley is the best place to start a tech company, he pioneered a dual model for software startup: headquarters in Silicon Valley with US Venture Capital, but R&D in Italy. The model is often refer
https://en.wikipedia.org/wiki/Reduction%20operator
In computer science, the reduction operator is a type of operator that is commonly used in parallel programming to reduce the elements of an array into a single result. Reduction operators are associative and often (but not necessarily) commutative. The reduction of sets of elements is an integral part of programming models such as Map Reduce, where a reduction operator is applied (mapped) to all elements before they are reduced. Other parallel algorithms use reduction operators as primary operations to solve more complex problems. Many reduction operators can be used for broadcasting to distribute data to all processors. Theory A reduction operator can help break down a task into various partial tasks by calculating partial results which can be used to obtain a final result. It allows certain serial operations to be performed in parallel and the number of steps required for those operations to be reduced. A reduction operator stores the result of the partial tasks into a private copy of the variable. These private copies are then merged into a shared copy at the end. An operator is a reduction operator if: It can reduce an array to a single scalar value. The final result should be obtainable from the results of the partial tasks that were created. These two requirements are satisfied for commutative and associative operators that are applied to all array elements. Some operators which satisfy these requirements are addition, multiplication, and some logical operators (and, or, etc.). A reduction operator can be applied in constant time on an input set of vectors with elements each. The result of the operation is the combination of the elements and has to be stored at a specified root processor at the end of the execution. If the result has to be available at every processor after the computation has finished, it is often called Allreduce. An optimal sequential linear-time algorithm for reduction can apply the operator successively from front to back, always replacing two vectors with the result of the operation applied to all its elements, thus creating an instance that has one vector less. It needs steps until only is left. Sequential algorithms can not perform better than linear time, but parallel algorithms leave some space left to optimize. Example Suppose we have an array . The sum of this array can be computed serially by sequentially reducing the array into a single sum using the '+' operator. Starting the summation from the beginning of the array yields: Since '+' is both commutative and associative, it is a reduction operator. Therefore this reduction can be performed in parallel using several cores, where each core computes the sum of a subset of the array, and the reduction operator merges the results. Using a binary tree reduction would allow 4 cores to compute , , , and . Then two cores can compute and , and lastly a single core computes . So a total of 4 cores can be used to compute the sum in steps instead of th
https://en.wikipedia.org/wiki/Effi
Effi may refer to: Effi Birnbaum (born 1954), Israeli basketball coach Effi Eitam (born 1952), Israeli politician and retired brigadier-general Effi Wizen (born 1956), Israeli computer animator and visual effects specialist Effi Briest, title character of the 1896 novel and various film and television adaptations Effi (C++), an application development framework See also Effie (disambiguation) Effy Stonem, a character in the television series Skins
https://en.wikipedia.org/wiki/Chapter%206%20%28American%20Horror%20Story%29
"Chapter 6" is the sixth episode of the sixth season of the anthology television series American Horror Story. It aired on October 19, 2016, on the cable network FX. The episode was written by Ned Martel and directed by Angela Bassett. One of the first major story arc changes of the series, the format of the series becomes a found footage horror depicting the aftermath of My Roanoke Nightmare and the development of a follow-up series, Return to Roanoke: Three Days in Hell. Plot The events of Shelby and Matt's ordeal are turned into a hit TV show called My Roanoke Nightmare, which received over 23 million views by its finale. Eager to capitalize on the success of the series, executive producer Sidney Aaron James pitches a new idea for a follow-up series entitled, Return to Roanoke: Three Days in Hell. Sidney informs the network that he intends to bring the reenactors together with their real-life counterparts in the Roanoke house for three days during the Blood Moon. It is later revealed that his true intention—to expose Lee Harris as Mason's murderer and bring her to justice. The set of Return to Roanoke is plagued with gruesome incidents similar to the ones depicted in the original series. This leads Sidney to confront Agnes Mary Winstead, the actress who played Thomasin. Obsessed with the role, Agnes has attacked tourists in Hollywood while dressed as Thomasin and uprooted her life to move from Los Angeles to Roanoke. Sidney serves her with a restraining order, barring Agnes from further interaction with the show. Outraged, Agnes attempts to attack him as he leaves while hysterically screaming in character as Thomasin before orderly prevents her. When the cast arrive, Sidney distributes cellphones with only the cameras enabled and tells them that they should use them to film. He leaves and tensions between all the participants begin to rise as the actors' personal issues come to the surface while questioning the truth of their real-life counterparts' stories. Audrey Tindall, the British actress who originally played Shelby, is attacked by the Piggy Man. Her husband, Rory Monahan, who played Edward Philippe Mott, is stabbed to death by the two nurses. Matt goes into the living room and sees that the word "Murder" has been completely spelled out. He relates what he found to the others, stating blankly that, "R is for Rory". An intertitle reveals that during the three days, all but one of the participants died. The planned series never made it to air, and what remains is assembled from found footage. Reception The episode was watched by 2.48 million people during its original broadcast, and gained a 1.4 ratings share among adults aged 18–49. "Chapter 6" received largely positive reviews with much of the praise going towards the concept and Bassett's direction. It earned a 93% approval rating on Rotten Tomatoes, based on 15 reviews with an average score of 8.7/10. The critical consensus reads, "The promised surprise twist is revealed in "Chap
https://en.wikipedia.org/wiki/Fresh%20Ideas%20TV
Fresh Ideas TV was a digital advertorial datacasting channel owned by the Seven Network. The channel launched on 22 November 2013 and broadcast infomercials and home shopping content on channel 78. The channel was available to Seven's metropolitan markets of Sydney, Melbourne, Brisbane, Adelaide and Perth as well as their regional Queensland station. Fresh Ideas TV was closed on 1 December 2014. Channel 78 was later re-purposed for Racing.com, which began broadcasting on 26 June 2015. References Seven Network English-language television stations in Australia Television channels and stations established in 2013 Television channels and stations disestablished in 2014 Home shopping television stations in Australia 2013 establishments in Australia 2014 disestablishments in Australia Defunct television channels in Australia
https://en.wikipedia.org/wiki/OGAS
OGAS (, "National Automated System for Computation and Information Processing") was a Soviet project to create a nationwide information network. The project began in 1962 but was denied necessary funding in 1970. It was one of a series of socialist attempts to create a nationwide cybernetic network. The US government in 1962 regarded the project as a major threat due to the “tremendous increments in economic productivity” which could disrupt the world market. Arthur Schlesinger Jr, historian and special assistant to President Kennedy, described “an all out Soviet commitment to cybernetics” as providing the Soviet Union a “tremendous advantage” in respect to production technology, complex of industries, feedback control and self-teaching computers. Concept The primary architect of OGAS was Viktor Glushkov. A previous proposal for a national computer network to improve central planning, Anatoly Kitov's Economic Automated Management System, had been rejected in 1959 because of concerns in the military that they would be required to share information with civilian planners. Glushkov proposed OGAS in 1962 as a three-tier network with a computer centre in Moscow, up to 200 midlevel centres in other major cities, and up to 20,000 local terminals in economically significant locations, communicating in real time using the existing telephone infrastructure. The structure would also permit any terminal to communicate with any other. Glushkov further proposed using the system to move the Soviet Union towards a moneyless economy, using the system for electronic payments. In 1962, Glushkov estimated that had the paper-driven methods of economic planning continued unchanged in the Soviet Union, then the planning bureaucracy would have grown by almost fortyfold by 1980. He urged the full implementation of the OGAS project to Politburo members in 1970 with the view: "If we do not do [the full OGAS] now, then in the second half of the 1970s the Soviet economy will encounter such difficulties that we will have to return to this question regardless." Glushkov sought financial funding with an estimated amount of "no less than 100 billion rubles" or equivalent to $850 billion in 2016 U.S. dollars but believed the saving returns would be fivefold on the first fifteen-year investment. The project failed because Glushkov's request for funding on 1 October 1970 was denied. The 24th Communist Party Congress in 1971 was to have authorised implementation of the plan, but ultimately endorsed only expansion of local information management systems. Glushkov subsequently pursued another network plan, EGSVT, which was also underfunded and not carried out. The OGAS proposal was resented by some liberals as excessive central control, but failed primarily because of bureaucratic infighting. It was under the auspices of the Central Statistical Administration, and fell afoul of Vasily Garbuzov, who saw a threat to his Ministry of Finance. When EGSVT failed, the next atte
https://en.wikipedia.org/wiki/KAHC-LD
KAHC-LD (channel 43) is a low-power television station in Sacramento, California, United States, airing paid programming via the OnTV4U network and is affiliated with Cozi TV on its third digital subchannel. The station is owned by HC2 Holdings. Operator DTV America Corporation, which also operates Stockton-licensed KFKK-LD, retains the station license. History KAHC-LD began operations in 1988 as K69FB, on analog channel 69, and was originally affiliated with the Trinity Broadcasting Network (TBN). On June 17, 2004, its call letters changed to K45HC and switched to analog channel 45. In 2015, K45HC disaffiliated with TBN after 27 years and the station went silent for about a year. In 2016, it went on the air again with new call letters as KAHC-LP, later becoming its current call letters of KAHC-LD, after the station switched from analog to digital, remaining on its analog-era channel number 45. However, its virtual channel number was switched to channel 43 as sister station KFTY-LD in Middletown, California has its virtual channel number as 45 and its broadcasting radius overlapped that of KAHC. Secondly, KAHC wasn’t assigned KFTY's digital channel number of 2 as its virtual channel number due to a broadcasting radius overlap of Fox owned-and-operated station KTVU in Oakland, operating on virtual channel 2. When KAHC returned to the air in 2016, it was briefly affiliated with Laff, before switching affiliations to American Sports Network, which later became Stadium. When KMAX-TV, channel 31, affiliated with Stadium on subchannel 31.4 in 2018, KAHC retained the Stadium affiliation for a time as both stations became dual affiliates. However, in 2019, KAHC disaffiliated from Stadium and switched to infomercials. In early 2020, KAHC became a CBN News affiliate, returning religious programming to the channel since its disaffiliation with TBN. The affiliation was dropped later that year, reverting to infomercials. In early 2021, KAHC affiliated with shopping network ShopHQ until April 2022 when the affiliation was dropped and the channel reverted to infomercials again via the OnTV4U network. Technical information Subchannels The station's digital channel is multiplexed: When KAHC-LD switched to digital in 2016, initial subchannel affiliates included Comet on LD2, Cozi TV on LD3, Shop LC on LD4, QVC on LD5 and QVC Plus (later QVC2) on LD6. Comet was dropped in 2018 as it moved to KMAX-TV (channel 31.3). KAHC affiliated with Tuff TV on LD7 in 2017 up until 2018, shortly before the network ceased operations. Despite NBCUniversal's purchase of local Telemundo affiliate KCSO-LD (channel 33) in 2019, Cozi TV, which is owned by NBCUniversal and usually affiliated with other NBC or Telemundo-owned stations on their digital subchannels, remained on KAHC. In June 2023, QVC and QVC2 were dropped. References External links DTV America Cozi TV affiliates AHO Low-power television stations in California Innovate Corp. Television channels and stations est
https://en.wikipedia.org/wiki/Critical%20brain%20hypothesis
In neuroscience, the critical brain hypothesis states that certain biological neuronal networks work near phase transitions. Experimental recordings from large groups of neurons have shown bursts of activity, so-called neuronal avalanches, with sizes that follow a power law distribution. These results, and subsequent replication on a number of settings, led to the hypothesis that the collective dynamics of large neuronal networks in the brain operates close to the critical point of a phase transition. According to this hypothesis, the activity of the brain would be continuously transitioning between two phases, one in which activity will rapidly reduce and die, and another where activity will build up and amplify over time. In criticality, the brain capacity for information processing is enhanced, so subcritical, critical and slightly supercritical branching process of thoughts could describe how human and animal minds function. History Discussion on the brain's criticality have been done since 1950, with the paper on the imitation game for a Turing test. In 1995, Herz and Hopfield noted that self-organized criticality (SOC) models for earthquakes were mathematically equivalent to networks of integrate-and-fire neurons, and speculated that perhaps SOC would occur in the brain. Simultaneously Stassinopoulos and Bak proposed a simple neural network model working at criticality which was expanded later by Chialvo and Bak. In 2003, the hypothesis found experimental support by Beggs and Plenz. The critical brain hypothesis is not a consensus among the scientific community. However, there exists more and more support for the hypothesis as more experimenters take to verifying the claims that it makes, particularly in vivo in rats with chronic electrophysiological recordings and mice with high-density electrophysiological recordings. References Brain Biological hypotheses
https://en.wikipedia.org/wiki/EXAPT
EXAPT (a portmanteau of "Extended Subset of APT") is a production-oriented programming language that allows users to generate NC programs with control information for machining tools and facilitates decision-making for production-related issues that may arise during various machining processes. EXAPT was first developed to address industrial requirements. Through the years, the company created additional software solutions for the manufacturing industry. Today, EXAPT offers a suite of SAAS products and services for the manufacturing industry. The tradename EXAPT is most commonly associated with the CAD/CAM-System, production data, and tool management Software of the German company EXAPT Systemtechnik GmbH based in Aachen, DE. General EXAPT is a modularly built programming system for all NC machining operations as Drilling Turning Milling Turn-Milling Nibbling Flame-, Laser-, Plasma- and Water jet cutting Wire eroding Operations with Industrial robots Due to the modular structure the main product groups EXAPTcam and EXAPTpdo are gradually expandable and permit individual software solutions for the manufacturing industry used individually and also in compound with an existing IT environment. Functionality EXAPTcam meets the requirements for NC planning especially for the cutting operations as turning, drilling and milling up to 5-axis simultaneous machining. Thereby new process technologies, tool and machine concepts are constantly involved. In the NC programming data from different sources as 3D CAD models, drawings or tables can flow in. The possibilities of NC programming reaches from the language-oriented to the feature-oriented NC programming. The integrated EXAPT knowledge database and intelligent and scalable automatisms support the user. The EXAPT NC planning also covers the generation of production information as clamping and tool plans, presetting data or time calculations. The realistic simulation possibilities of NC planning and NC control data provide with production reliability. EXAPTpdo (EXAPT ProductionsDataOrganization) provides a neutrally applicable technology platform for the information compound of the NC planning - to the shop floor. This applies to all NC production data which are necessary for the set-up of NC machines, for the provision, presetting and stocking of manufacturing resources and provided by EXAPTpdo in a central database. Beside classical functions of the tool management system (TMS) as the management of cutting tools, measuring, testing and clamping devices the technology data management and tool lifecycle management (TLM) is also included. System-supported "where-used lists" help to handle the manufacturing resource cycle by secured requirement determination and requirement fulfillment. Unnecessary transports and unplanned dispositive adjustments are dropped, stocks are reduced, set-up times reduced and the throughput is increased. EXAPTpdo synchronizes involved systems within the value chain
https://en.wikipedia.org/wiki/The%20Amazing%20World%20of%20Gumball%20%28season%206%29
The sixth season of the British-American animated television sitcom The Amazing World of Gumball, created by Ben Bocquelet, premiered on Cartoon Network in the United States on January 5, 2018, and was produced by Cartoon Network Development Studio Europe. The series focuses on the misadventures of Gumball Watterson, a blue 12-year-old cat, along with his adopted brother, Darwin, a goldfish. Together, they cause mischief among their family, as well as with the wide array of students at Elmore Junior High, where they attend middle school. Unlike the previous seasons of the show, this season has 44 episodes, making it the longest season of the series. Development Production On June 22, 2016, Cartoon Network renewed the series for a sixth season. This is the final season where Donielle T. Hansley Jr. voices Darwin. He voices Darwin until Christian J. Simon takes the role in "The Anybody" onward when Darwin clears his throat. This is Shane Rimmer (voice of Louie) and Gillian Hanna's (voice of Betty) final acting roles before their deaths on March 29, 2019, and August 18, 2019, respectively. The writers for the season were Ben Bocquelet, James Hamilton, Joe Markham, Joe Parham, Jon Purkis, Tobi Wilson, Jack Bernhardt, Andrew Jones, Ciaran Murtagh, Tom Neenan, Cariad Lloyd, Tom Neenan, Jess Ransom, Mic Graves, Jess Ransom, Eddie Robson, Natasha Hodgson, Gemma Arrowsmith, Sophie Duker, Lucien Young, Tony Hull, Richard Overall, and Paul Rice. The storyboard artists for the season were Adrian Maganza, Chloé Nicolay, Richard Méril, Wandrille Maunoury, Max Loubaresse, Bianca Ansems, Zhihuang Dong, Ben Marsaud, and Oliver Hamilton. The sixth season production began on July 13, 2017, and ended on October 24, 2018. On October 7, 2018, series creator Ben Bocquelet retweeted a tweet with an article saying that the sixth season may be the final season, but the author of that article made a follow-up article clarifying that there could still be more seasons. Episodes Notes References 2018 American television seasons 2018 British television seasons 2019 American television seasons 2019 British television seasons 6
https://en.wikipedia.org/wiki/Oracle%20Cloud
Oracle Cloud is a cloud computing service offered by Oracle Corporation providing servers, storage, network, applications and services through a global network of Oracle Corporation managed data centers. The company allows these services to be provisioned on demand over the Internet. Oracle Cloud provides Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS), and Data as a Service (DaaS). These services are used to build, deploy, integrate, and extend applications in the cloud. This platform supports numerous open standards (SQL, HTML5, REST, etc.), open-source applications (Kubernetes, Spark, Hadoop, Kafka, MySQL, Terraform, etc.), and a variety of programming languages, databases, tools, and frameworks including Oracle-specific, Open Source, and third-party software and systems. Services Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) Oracle's cloud infrastructure was made generally available (GA) on October 20, 2016 under the name "Oracle Bare Metal Cloud Services." Oracle Bare Metal Cloud Services was rebranded as Oracle Cloud Infrastructure in 2018 and dubbed Oracle's "Generation 2 Cloud" at Oracle OpenWorld 2018. Oracle Cloud Infrastructure offerings include the following services: Compute: The company provides Virtual Machine Instances to provide different shapes (VM sizes) catering to different types of workloads and performance characteristics. They also provide on-demand Bare metal servers and Bare metal GPU servers, without a hypervisor. In 2016, Oracle Cloud Infrastructure launched with bare metal instances with Intel processors. These first bare metal instances offered were powered by Intel servers. In 2018, Oracle Cloud added bare metal instances powered by AMD processors, followed by Ampere Cloud-native processors in 2021. In 2021, Oracle also released its first VM-based compute instances based on Arm processors. Storage: The platform provides block volumes, file storage, object storage, and archive storage for database, analytics, content, and other applications across common protocols and APIs. Networking: This cloud platform provides network with fully configurable IP addresses, subnets, routing, and firewalls to support new or existing private networks with end-to-end security. Governance: For auditing, identity and access management, the platform has data integrity checks, traceability, and access management features. Database Management / Data Management: Oracle offers a data management platform for database workloads as well as hyper-scale big data and streaming workloads including OLTP, data warehousing, Spark, machine learning, text search, image analytics, data catalog, and deep learning. The platform allows Oracle, MySQL, and NoSQL databases to be deployed on demand as managed cloud services. Oracle Databases uniquely offer the Oracle Autonomous Database (optimized for data warehouse, transaction processing, or JSON), the Exadata shape, as well as Real
https://en.wikipedia.org/wiki/Bolt%20%28network%20protocol%29
The Bolt Protocol (Bolt) is a connection oriented network protocol used for client-server communication in database applications. It operates over a TCP connection or WebSocket. Bolt is statement-oriented, allowing a client to send messages containing a statement consisting of a single string and a set of typed parameters. The server responds to each statement with a result message and an optional stream of result records. History The Bolt protocol was first introduced to the public in November 2015, during an interview conducted by Duncan Brown and published on DZone. The first release of software implementing the protocol occurred in December 2015, as part of a milestone release of Neo4j Server. In April 2016, Neo4j Server 3.0 was released and contained the first server implementation of the protocol, accompanied by a suite of Bolt client drivers. This release received attention from several mainstream media outlets. Versioning The protocol supports explicit versioning and version negotiation between the client and the server. There is only one published version of the protocol: version 1. Protocol overview - version 1 Messaging Bolt clients and servers both send data over the connection as a sequence of messages. Each message has a type (denoted by a "signature" byte) and may include additional data. The client drives the interaction, and each message sent by the client will cause one or more response messages to be sent by the server. Client messages: Server messages: Message transfer encoding Each message is encoded into a sequence of bytes. These bytes are transferred using a binary chunked encoding, where each chunk is preceded by an unsigned, big-endian 16-bit integer denoting the number of bytes that immediately follow. A length of 0 is used to denote the end of the message. Failure handling A client may send multiple messages to a server, without first waiting for a response. The server processes each message sequentially. However, as there may be logical dependencies between messages sent by the client, the server will not evaluate requests it receives after sending FAILURE in response to a preceding message. Instead, it will send an IGNORED message in reply to every client message, until the client acknowledges the failure by sending an ACK_FAILURE message. This is similar to the failure handling and recovery in the PostgreSQL wire protocol. Data encoding Bolt supports encoding for a number of different data types. References External links Bolt protocol specification Network protocols
https://en.wikipedia.org/wiki/Pascale%20Fung
Pascale Fung (馮雁) (born in Shanghai, China) is a professor in the Department of Electronic & Computer Engineering and the Department of Computer Science & Engineering at the Hong Kong University of Science & Technology(HKUST). She is the director of the newly established, multidisciplinary Centre for AI Research (CAiRE) at HKUST. She is an elected Fellow of the Institute of Electrical and Electronics Engineers (IEEE) for her “contributions to human-machine interactions”, an elected Fellow of the International Speech Communication Association for “fundamental contributions to the interdisciplinary area of spoken language human-machine interactions” and an elected Fellow of the Association for Computational Linguistics (ACL) for her “significant contributions toward statistical NLP, comparable corpora, and building intelligent systems that can understand and empathize with humans”. She is a member of the Global Future Council on Artificial Intelligence and Robotics, a think tank of the World Economic Forum, and blogs for the Forum's online publication Agenda. She is a member of the Partnership on AI. She has been invited as an AI expert to different government initiatives in China, Japan, the UAE, India, the European Union and the United Nations. Fung's publication topics include spoken language systems, natural language processing, and empathetic human-robot interaction. She co-founded the Human Language Technology Center (HLTC) and is an affiliated faculty with the Robotics Institute and the Big Data Institute, both at HKUST. Additionally, she is the founding chair of the Women Faculty Association at HKUST. She is actively involved in encouraging young women into careers in engineering and science. Early life and education Fung was born to professional artist parents in Shanghai, China, who gave her an early education in the arts. Her mother was a graduate of the Central Academy of Fine Arts in Beijing, and her father of the Zhejiang Academy of Fine Arts (now known as the Chinese Academy of Fine Arts). An ethnic Han Chinese, she also has Indonesian and mixed ancestry through her maternal and paternal grandmothers. Her early immersion in the arts has a great impact on her interest in applying technology to art. At age 11, she emigrated to Hong Kong with her mother and sister while her father was permitted to join them later on. She has been a science fiction fan since she read her first book about robots at age seven. This, and her fondness of mathematics, motivated her to study computer engineering later on. She graduated from Belilios Public School, the oldest girls’ school in Hong Kong, where she founded the Electronics Club and the Astronomy Club. She did not find the environment encouraging to her ambition of becoming an engineer. This experience led her to actively engage in encouraging young women into STEM fields. She received her B.S. in electrical engineering from Worcester Polytechnic Institute in Massachusetts in 1988, her M.Sc. i
https://en.wikipedia.org/wiki/Kenneth%20Cukier
Kenneth Neil Cukier (born 1968) is an American journalist and author of books on technology and society. He is best known for his work at The Economist and the book Big Data: A Revolution that Will Transform How We Work, Live and Think, coauthored with Viktor Mayer-Schönberger and published by Houghton Mifflin Harcourt in 2013. Career He has also written for The New York Times, Financial Times, Foreign Affairs and other publications. He was technology editor of the Wall Street Journal Asia edition in Hong Kong in 2001. In 1999 he coined the term "Frenchelon" to describe the French government's surveillance capabilities. Publications Big Data was a New York Times bestseller, translated into 21 languages and a finalist for the Financial Times and McKinsey Business Book of the Year Award. The pair published a follow-on work in 2014, Learning With Big Data: The Future of Education. In 2021 Cukier published Framers: Human Advantage in an Age of Technology and Turmoil on the power of mental models and the limits of artificial intelligence with Mayer-Schönberger and a third coauthor, Francis de Véricourt. Media In a radio interview in September 2016, Cukier described the current big data revolution as an agent of change similar to the Gutenberg press and the Printing Revolution. He cautioned that while there will be huge benefits, there is a need to have limitations in place to "preserve our fundamental freedoms" and to prevent Big Data from being another version of Orwell's Big Brother. Boards In 2008 he was named to the board of directors of International Bridges to Justice. In 2015 he joined the board of The Open String Foundation, which provides classical instruments to disadvantaged children. Affiliations In 2016 he was elected a trustee of Chatham House, a British international affairs institute. In 2017 he was named an associate fellow at Oxford University's Said Business School, where he has run sessions on artificial intelligence and business. Awards He received an honorary doctorate of humane letters from Wittenberg University in Springfield, Ohio. References External links Kenneth Neil Cukier A current list of press appearances and articles in the Economist Living people 1968 births American male journalists The Economist people
https://en.wikipedia.org/wiki/HFST
Helsinki Finite-State Technology (HFST) is a computer programming library and set of utilities for natural language processing with finite-state automata and finite-state transducers. It is free and open-source software, released under a mix of the GNU General Public License version 3 (GPLv3) and the Apache License. Features The library functions as an interchanging interface to multiple backends, such as OpenFST, foma and SFST. The utilities comprise various compilers, such as hfst-twolc (a compiler for morphological two-level rules), hfst-lexc (a compiler for lexicon definitions) and hfst-regexp2fst (a regular expression compiler). Functions from Xerox's proprietary scripting language xfst is duplicated in hfst-xfst, and the pattern matching utility pmatch in hfst-pmatch, which goes beyond the finite-state formalism in having recursive transition networks (RTNs). The library and utilities are written in C++, with an interface to the library in Python and a utility for looking up results from transducers ported to Java and Python. Transducers in HFST may incorporate weights depending on the backend. For performing FST operations, this is currently only possible via the OpenFST backend. HFST provides two native backends, one designed for fast lookup (hfst-optimized-lookup), the other for format interchange. Both of them can be weighted. Uses HFST has been used for writing various linguistic tools, such as spell-checkers, hyphenators, and morphologies. Morphological dictionaries written in other formalisms have also been converted to HFST's formats. See also Foma (software) Notes External links https://github.com/hfst/hfst/wiki - A documentation wiki References Free software Finite automata
https://en.wikipedia.org/wiki/Abacus%20Data%20Systems
Abacus Data Systems, doing business as Caret (formerly AbacusNext) is an American software and private cloud services provider headquartered in San Diego, California. Services and software Cloud Abacus Private Cloud is a private cloud sold as Desktop-as-a-Service within a Windows Server 2012 R2 environment. This service relies on Veeam Software for backup support, and is built on Intel-based architecture. This private cloud service is colocated across three carrier-neutral data centers that are interconnected via a self-run optical network. These data centers are Scalematrix in San Diego, California, Skybox Houston One in Houston, Texas, and SUPERNAP by Switch in Las Vegas, Nevada. Software AbacusNext offers four Windows-based platforms, all of which rely on relational database management systems. Two are law practice management software for lawyers; AbacusLaw uses Advantage Database, while Amicus Attorney uses Microsoft SQL Server. AbacusNext has two platforms for accounting firms that rely on Microsoft SQL Server: ResultsCRM, a customer relationship management for QuickBooks, and OfficeTools practice management software. Management Keri Gohman, CEO (previously a partner at Bain Capital Ventures) Mike Skelly, CFO (former CFO of Trio Health, UpWind Solutions, and Active Network) In December 2015, American private equity investment firm Providence Equity Partners took a strategic majority investment in AbacusNext (Abacus Data Systems at that time). Acquisitions May 2016: acquired Toronto-based software company Gavel & Gown, makers of Amicus Attorney. February 2017: acquired Virginia-based software company Results Software, makers of ResultsCRM. February 2017: acquired San Diego–based cloud hosting provider Cloudnine Realtime. May 2017: acquired Palmdale-based software company OfficeTools. November 2017: acquired Scotland-based software company HotDocs. HotDocs was previously owned by LexisNexis before being sold in 2009. December 2017: acquired New Hampshire–based software company Commercial Logic. References External links Official website Software companies of the United States Cloud applications Cloud computing providers American companies established in 1983 Software companies based in California Technology companies based in San Diego
https://en.wikipedia.org/wiki/Hybrid%20navigation
Hybrid navigation is the simultaneous use of more than one navigation system for location data determination, needed for navigation. By using multiple systems at once, the accuracy as a whole is improved. It also allows for a more reliable navigation system, as if one system fails, the other can kick in and provide accurate navigation for the user. Especially for self-driving cars, the exact and continuous knowledge of the navigating object's location is essential. Function GPS or other satellite based systems (GLONASS, GALILEO, BEIDOU, QZSS) provide a way to learn one's location, but these methods require free field conditions in order to receive the radio signal. Various satellite systems are subject to switching-off or reduction of data precision by the company or government that runs them. They are also prone to intentional or unintentional disturbances. Even passing through a tunnel or a garage interrupts the data flow. In situations where the signal cannot be received reliably, alternate sources of location data are needed. Combining GPS with other methods can avoid these limitations, but each method has its own specific limitations. A hybrid system provides fault tolerance for each underlying method and improves the overall precision of the result. The hybrid system needs to decide how to choose among the different methods at any given time. One solution is a triple configuration, allowing 'result voting' for data collecting systems. Alternate systems that supply navigational data include: Beacons providing radio- or infrared based signals. Inertial navigation systems. This system determines location by summing the movement vectors from start of the trip or some other waypoint whose location is well-defined. Incremental sensors. This system uses vehicle speed data supplied by a Fleet Management System. Differential GPS. This system uses terrestrial radio transmitters with well-defined locations that broadcast information about how accurate the GPS signals are at identifying the locations of these transmitters. See also Automotive navigation system Hybrid positioning system Navigation Data Standard Sensor fusion References External links Homepage of 'Deutschen Gesellschaft für Ortung und Navigation (DGON)' Wildau Video Mobile technology Communication Navigational equipment
https://en.wikipedia.org/wiki/George%20Bard%20Ermentrout
G. Bard Ermentrout is an American mathematician and distinguished professor at University of Pittsburgh and a member of the Odor2Action research network. He uses nonlinear dynamics for the mathematical modeling of problems in neuroscience. He explores patterns of activation in neural systems as they relate to biological problems such as olfaction. Bard Ermentrout is known for his contributions to computational and mathematical neuroscience. His joint work with Nancy Kopell derived the Ermentrout and Kopell canonical model, He and David Terman wrote the book Mathematical Foundations of Neuroscience. He helped to develop the dynamical systems software XPPAuto. One approach he uses in the study of olfaction is to program a virtual creature, implement various movement strategies for tracking scents, and examine their success rate under a different conditions. This enables researchers to better understand olfactory navigation strategies such as tropotaxis and klinotaxis and how they work in conditions such as high turbulence. Outside of work, he is fond of his many pets and has owned many pet parrots over the years. He most recently owns a galah and two corgis. He is also a lover of limericks. References Living people 20th-century American mathematicians 1954 births 21st-century American mathematicians
https://en.wikipedia.org/wiki/Gab%20%28social%20network%29
Gab is an American alt-tech microblogging and social networking service known for its far-right userbase. Widely described as a haven for neo-Nazis, racists, white supremacists, white nationalists, antisemites, the alt-right, supporters of Donald Trump, conservatives, right-libertarians, and believers in conspiracy theories such as QAnon, Gab has attracted users and groups who have been banned from other social media platforms and users seeking alternatives to mainstream social media platforms. Founded in 2016 and launched publicly in May 2017, Gab claims to promote free speech, individual liberty, the "free flow of information online", and Christian values. Researchers and journalists have characterized these assertions as an obfuscation of its extremist ecosystem. Antisemitism is prominent in the site's content and the company itself has engaged in antisemitic commentary. Gab CEO Andrew Torba has promoted the white genocide conspiracy theory. Gab is based in Pennsylvania. Researchers note that Gab has been "repeatedly linked to radicalization leading to real-world violent events". The site received extensive public scrutiny following the Pittsburgh synagogue shooting in October 2018. The perpetrator of the attack, Robert Gregory Bowers, had a history of making extreme, antisemitic postings on the platform, as well as messages indicating an immediate intent to cause harm before the shooting. After the shooting, Gab briefly went offline when it was dropped by its hosting provider and denied service by several payment processors. In 2021, Gab was among the platforms used to plan the United States Capitol attack on January 6. Also in 2021, Gab suffered from a data breach called "GabLeaks". Gab's functionality is similar to that of Twitter. Users of Gab can publish posts, initiate private chats, join groups, livestream and buy products. The company also maintains an email service, cloud service, text messaging service, advertisement sales system, server farm, marketplace website, news aggregation website, advertising platform, video-conferencing platform, blog, video hosting, web browser, and browser extension to allow commenting on third-party websites. In July 2019, Gab switched its software infrastructure to a Mastodon fork, a free and open-source social network platform. Mastodon released a statement in protest, denouncing Gab as trying to "monetize and platform racist content while hiding behind the banner of free speech". History 2016–2018 Gab was founded in 2016 by chief executive officer (CEO) Andrew Torba and chief technology officer (CTO) Ekrem Büyükkaya, who had previously worked together at advertising technology company Automate Ads (formerly Kuhcoon). Torba started working on the site in May 2016 and on August 15, 2016, Gab launched in private beta, billing itself as a "free speech" alternative to social networking sites Twitter and Facebook. Torba has cited "the entirely left-leaning Big Social monopoly", "social justice bullying
https://en.wikipedia.org/wiki/Cristina%20Alesci
Cristina Alesci was the Chief Corporate Affairs Officer at Chobani until March 2022. Until December 2020, she was a CNN and CNNMoney correspondent based out of the network’s New York bureau. She covers breaking news for the network as well as financial fraud and controversies facing major companies. Her investigative series focuses on public policy issues of the 2016 election cycle, food production, and documenting the early struggles of successful leaders. Education In 2008, Alesci graduated with a M.A. in Journalism with honors from City University of New York's Graduate School of Journalism. While at the school, she broke a story that gained national recognition. Her reporting uncovered an FBI file on journalist David Halberstam in the mid-1960s. The story was followed by the Associated Press, Politico and the Huffington Post. Before getting her masters, she graduated magna cum laude from Pace University in New York City, earning a B.S. in Criminal Justice. Additionally, she received a post-baccalaureate certificate in business from Columbia University. Career After freelancing for several local New York City publications and an internship at the New York Daily News, Alesci started as a reporter for Bloomberg News where she covered mergers and acquisitions, private equity and venture capital. She broke news on the biggest deals of the decade, including Facebook’s initial public offering and Dell’s takeover battle. She later transitioned to Bloomberg Television. CNN In 2014, Alesci joined CNN where she frequently appears on the network’s Newsroom programs, CNN International, and HLN. She also writes for its websites. In her role as a business reporter, Alesci has interviewed leading CEOs, including Starbucks' CEO Howard Schultz, JP Morgan chief executive Jamie Dimon and J.Crew's Mickey Drexler. In 2016, Alesci created the docu-series "Raw Ingredients" for CNN, about the food industry in the United States. Business career Alesci joined Chobani in 2020 as the company's chief corporate affairs officer where she is responsible for internal and external communications, philanthropy, social impact, community efforts and government relations. She exited the company in March 2022. Personal life In 2016, Alesci was diagnosed with adult onset Type 1 diabetes, about which she has written in various publications, including the Huffington Post and CNN Opinion." Alesci is a board member of Craig Newmark Graduate School of Journalism at CUNY. She grew up in Queens, New York, where her parents emigrated to from Italy. See also New Yorkers in journalism References External links CNN Profile Living people Warner Bros. Discovery people CNN people CUNY Graduate School of Journalism alumni American women television journalists People with type 1 diabetes Year of birth missing (living people) 21st-century American women
https://en.wikipedia.org/wiki/The%20Unknown%20%28Over%20the%20Garden%20Wall%29
"The Unknown" is the final episode of the American animated television miniseries Over the Garden Wall. It first aired on Cartoon Network on November 7, 2014. The episode's story was supervised by Amalia Levari, Tom Herpich, and series creator Patrick McHale, while writing and storyboarding were managed by Herpich, Jim Campbell, and Natasha Allegri. Plot The bluebird Beatrice navigates through a snowstorm in search of Wirt, and comes across Greg, who is performing meaningless tasks at the request of the Beast. Upon finding Wirt, Beatrice begins to lead him to where she saw Greg. Meanwhile, the Woodsman journeys into the forest as the sun sets, in search of Edelwood. He finds Greg, who is in the process of being turned into an Edelwood tree by the Beast. He attempts to help Greg and to drive the Beast away as Wirt and Beatrice arrive. Having knocked down the Woodsman, the Beast offers to Wirt to keep Greg's soul alive within his lantern, as long as Wirt takes on the Woodsman's task of keeping the lantern alight. Wirt however, realizes that the Beast's soul resides inside the lantern, explaining this to all present, and refuses the offer. Wirt frees Greg and gives Beatrice the magical scissors belonging to Adelaide, which will cure Beatrice and her family of the curse that transformed them into bluebirds. As they depart, the Woodsman, who had been told by the Beast that he was keeping his daughter alive by keeping the lantern alight, ignores the Beast's continuous lies and extinguishes the lantern, defeating the Beast. After Wirt and Beatrice exchange goodbyes, Wirt is shown awakening underwater in a lake. He pulls Greg up to the surface with him, where the police and his friends await. After being taken by ambulance to a hospital, Wirt regains consciousness and finds that his friends and Sara are present. Sara tells Wirt that she hasn't listened to a cassette tape that he made for her, as she does not own a cassette tape player. Greg, having detailed his adventures in the Unknown to those around him, shakes his pet frog, who rings and glows, indicating that Auntie Whispers' magical bell is still inside him and that Wirt and Greg's journey into the Unknown was not in their imaginations. In the Unknown, the melancholic Woodsman sits on his porch, and is happily surprised when his daughter appears, having been restored back to life. The other inhabitants of the Unknown appear to be living pleasant lives, and Beatrice and her family are shown in their original human forms. As Greg's frog plays a piano and sings, Greg returns a stolen rock to Mrs. Daniels' garden. Production The show, created by Patrick McHale, is based on the 2013 animated short film Tome of the Unknown, which McHale wrote and directed for Cartoon Network Studios as part of their shorts development program. The final episode features Elijah Wood as Wirt, Collin Dean as Greg, Melanie Lynskey as Beatrice, Christopher Lloyd as the Woodsman, and Samuel Ramey as the Beast. Critical re
https://en.wikipedia.org/wiki/XEIZ-AM
XEIZ-AM is a radio station on 1230 AM in Monterrey, Nuevo León. It carries Radio Fórmula programming. History XEIZ received its concession on November 10, 1967. Originally owned by Jesús Dionisio González González and Francisco Antonio González Sánchez of Multimedios Radio, XEIZ broadcast on 1310, then 1240 kHz with 1,000 watts during the day and 250 at night. In 2000, González Sánchez became the sole concessionaire after Jesús died in 1997. XEIZ was then sold to Radio Fórmula. In 2002, Radio Fórmula was approved to move XEIZ from downtown Monterrey to the Guadalupe transmitter site already used by its other AM stations, XEACH-AM 770 and XEMON-AM 1370, and to shift its frequency to 1230 kHz. References Mass media in Monterrey Radio Fórmula
https://en.wikipedia.org/wiki/XHMON-FM
XHMON-FM is a radio station on 89.3 FM in Monterrey, Nuevo León, Mexico. It carries Radio Fórmula programming. History XEMON-AM received its concession on November 29, 1988. It was owned by Radio Color, S.A., a subsidiary of Radiorama, and was sold to Radio Fórmula in the person of Rogerio Mariano Azcárraga Madero in 1997. In April 2018, XEMON-AM conducted its second-wave migration to FM as XHMON-FM 89.3. The station broadcasts in HD Radio and originally offered four subchannels, including feeds of XEACH-AM and XEIZ-AM and the Trión musical format. References Mass media in Monterrey Radio Fórmula
https://en.wikipedia.org/wiki/Salt%20Mobile%20SA
Salt Mobile SA (officially stylized as Salt.) is a Swiss telecommunications provider focusing on mobile telephony and fiber-optic land-line services. It operates the third-largest mobile network in the country, with 17% market share. The merger with Sunrise Communications AG was prohibited by the Swiss competition authority Weko in April 2010. Salt began as the Swiss subsidiary of Orange S.A. Later, in 2012, it was sold to the British investment company, Apax Partners. It continued to license and operate under the Orange name until 2015, when the company was sold by Apax Partners to NJJ Capital of Xavier Niel and the Salt brand launched. References Telecommunications companies of Switzerland
https://en.wikipedia.org/wiki/International%20Festival%20of%20Computer%20Arts
The International Festival of Computer Arts (IFCA; Slovenian: Mednarodni festival računalniških umetnosti, MFRU) is the longest-running computer arts festival in Slovenia. IFCA presents theory and practices of computer arts and new media arts. It is one of the major institutions for the presentation, support and production of computer media, electronics, and interdisciplinary art in the region and is responsible for the development of new media art and theory. History The International Festival of Computer Arts (IFCA) was first held in 1995 in Maribor, the second-largest city in Slovenia. The festival presented a number of local and foreign artists, theoreticians, performers, developers and curators. In 2009, the festival joined forces with Kibla and have held a joint festival in the media arts. Supporters of the festival include the University of Maribor, the Maribor Art Gallery, and Arts Council England. Course The IFCA has been held annually for about five days and is organized by the Maribor Youth Culture Centre (MKC Maribor). The program consists of seminars, conferences, exhibitions and performances selected by invited curators and selectors and by the program director of the festival, who has a three-year mandate. The festival connects different locations in the town and in neighboring cities – and different urban, regional and international producers, institutions and festivals of similar interests. From its beginnings, it has established cooperation with educational institutions of all levels: from nursery, primary and secondary schools, to colleges and universities with new media programs in Maribor, nationally and internationally. Festival themes and editions 1995 – presentation of Slovenian new media artists 1996 – new body 1997 – interactivity 1998 – 1999 – n/a 2000 – the incidence and attitudes towards physicality in art dependent on new technologies 2001 – BODY: fleeting, sick and cloned in erotic embrace of technology + establish a domain and website www.mfru.org 2002 – expanded body 2003 – transformation / metamorphosis 2004 – n/a 2005 – n/a 2006 – light up, plug in, outage 2007 – where there are computers, there is life: error and chance 2008 – can image today shows something (the potential of media images)? + establishing www.mkc.si/hiperfilm 2010 – new image, new nature, new consciousness 2011 – transmedia storytelling 2012 – robotics and new ways of thinking man 2013 – when worlds collide 2014 – 2.0 (20th edition of the festival) 2015 – Lift Me Up 2016 – Trust.1 List of curators and selectors 1995 – Marina Gržinić, Aleksandra Kostić, Jože Slaček 1996 – Erkki Huhtamo, Aleksandra Kostić, Machiko Kusahara, Jože Slaček 1997 – Peter Tomaž Dobrila, Aleksandra Kostić, Jože Slaček 1998 – Stelarc, Igor Štromajer 1999 – Marina Gržinić, Stelarc, Igor Štromajer 2000 – Kathy Rae Huffman, Jurij Krpan, Marina Gržin
https://en.wikipedia.org/wiki/UNTV
UNTV, (formally known as UNTV News and Rescue and UNTV Public Service), is the flagship Philippine television network of the Progressive Broadcasting Corporation (known on air as UNTV-PBC), together with Breakthrough and Milestones Productions International (known on air as UNTV-BMPI), the network's content provider and marketing arm, and Christian religious organization Members Church of God International (MCGI), its major blocktimer. DWAO-TV is one of very few NTSC-System M stations in the world that broadcast on Ultra High Frequency (UHF) Channel 37. In 2019, UNTV transferred its studios from the old UNTV Building at 907 EDSA Quezon City to La Verdad Christian College (LVCC) Caloocan Building, 351 EDSA, Brgy. Bagong Barrio West, Caloocan. UNTV transmitter is located at Emerald Hills, Sumulong Highway in Antipolo, Rizal. The 16-storey UNTV Broadcast Center, also referred to as The Millennial Tower and now called The Philippine Broadcast Hub along EDSA Philam is currently under construction to serve as its new headquarters. UNTV is known for its broadcast of Ang Dating Daan (The Old Path), the longest-running religious program in the Philippines, hosted by radio and televangelist Bro. Eli Soriano of the Members Church of God International (MCGI). UNTV's public service programs and free services are manned by BMPI chairman and CEO, Daniel Razon. Razon is also known as the co-host of Ang Dating Daan and MCGI's Overall Servant. Network profile PBC Blocktime UNTV Manila and Cebu were part of a blocktime programming agreement between Progressive Broadcasting Corporation (PBC) majority owned by Alfredo "Atom" Henares and Breakthrough and Milestones Productions International Inc. led by Daniel Razon. BMPI is the broadcast arm of Members Church of God International (MCGI) in the Philippines. Assigned to PBC is the broadcast license, the radio frequency spectrum (UHF) necessary for broadcasting in key populated areas. The owners entrusted Razon with the network's programming and marketing through BMPI. UNTV is referred to as "The Kasangbahay Network", a Filipino word which means "household", a group of people, often a family, who live together. It was introduced in 2007. History Original network, 2001 to 2004 In July 2001, the Progressive Broadcasting Corporation (PBC) owned by businessman Alfredo "Atom" Henares ventured into UHF television through UNTV 37, which initially branded as NUTV Channel 37. After almost a year of test broadcast, UNTV (pronounced as "un-TV", implying "the opposite of TV") was launched in May 2002 as a television counterpart to PBC's FM radio station NU 107 (DWNU 107.5 FM), airing rock and alternative rock music videos. NU 107 was a brainchild of Henares and radio veteran Mike N. Pedero. It carved a niche in the radio broadcast history as one of the first alternative radio stations that played artists who break new ground in music. In its early years on television, UNTV gained a cult following through comedy and reality
https://en.wikipedia.org/wiki/Data-Intensive-Computing%20as%20a%20Service
{{safesubst:#invoke:RfD|||month = October |day = 29 |year = 2023 |time = 16:32 |timestamp = 20231029163229 |content= REDIRECT As a service#Data-intensive computing }}
https://en.wikipedia.org/wiki/DICaaS
{{safesubst:#invoke:RfD|||month = October |day = 29 |year = 2023 |time = 19:12 |timestamp = 20231029191215 |content= REDIRECT As a service#Data-intensive computing }}
https://en.wikipedia.org/wiki/Deadline%20Design%20with%20Shaynna%20Blaze
Deadline Design with Shaynna Blaze (commonly known as Deadline Design) is a 10-part Australian renovation television series which premiered on Wednesday, 19 October 2016 on Foxtel network LifeStyle HOME. The series sees interior designer Shaynna Blaze and her team visit everyday homes to help renovate them in time for a special occasion or event that is to be held at the house. Production The location of the series took place around Melbourne, Victoria with filming commencing in November 2015 and concluding in June 2016. Synopsis Shaynna Blaze helps everyday homeowners who need to have their home renovated on a budget of their own within a deadline for an event, e.g. baby arrival, milestone birthday, visiting relatives etc. Shaynna enlists the help of builder, Mike Griggs & designer, Yasmine Ghoniem. Series overview Episodes References 2010s Australian reality television series 2016 Australian television series debuts
https://en.wikipedia.org/wiki/Volume%20cartography
Volume Cartography is the name of a computer program for locating and mapping 2-dimensional surfaces within a 3-dimensional object. X-rays can reveal minute details of what is in an object, and computer program such as Volume Cartography can organize the images into layers, a process called volume rendering. Burned scrolls Ein Gedi is a community that was destroyed by Byzantine emperor Justinian in 800 AD. The burning of the synagogue reduced its scrolls on parchment to lumps of charcoal. The burned scrolls were discovered by archaeologists during an excavation in 1970. They were so fragile that they disintegrated whenever touched. Various attempts were made to mechanically unwind and read the scrolls, but the scrolls were too delicate. In 2016, W. Brent Seales, a researcher at the University of Kentucky, created a set of computer programs called Volume Cartography to reconstruct the layers of text in a digital X-ray image of the one of the scrolls, known as the En-Gedi Scroll. Process Volumetric scan An X-ray microtomography (Micro-CT) scanner creates a 3-dimensional image of the sample. An X-ray scanner can produce a spot as small as 10 microns. Segmentation Surfaces are found and broken into small triangles, resulting in a triangular mesh defining the surface. Texturing Each point in the mesh is assigned a weight, indicating the likelihood that the point contains writing. Flattening The mesh surface is mapped onto a plane. Merging The pieces of the recovered surface are assembled into a single image. References Cartography Data visualization software Hebrew manuscripts
https://en.wikipedia.org/wiki/NIS-ITA
The International Technology Alliance in Network and Information Sciences (NIS-ITA) was a research program initiated by the UK Ministry of Defence (United Kingdom) (MoD) and the US Army Research Laboratory (ARL), which was active for 10 years from May 2006 to May 2016. It was led by IBM Research in the U.S. and IBM Hursley in the UK. NIS ITA was the first International Technology Alliance started by the two countries. Overview The complete name of the alliance that ran from 2006–2016 was United States/United Kingdom International Technology Alliance in Network and Information Sciences. It was a research group tasked with conducting fundamental research in network science and information science which affected coalition operations. The program was a combination of country-specific research programs that were run by ARL and MoD respectively. The ARL ran several programs called Collaborative Technology Alliances (CTAs) and the MoD ran equivalent programs, each of which were collaborative research programs involving multiple research institutes and universities. The CTAs programs were run for the duration of 3–5 years, and usually involved a consortium of industrial research laboratories and universities to team together to solve research problems in a specific domain. The International Technology Alliance differed from the CTAs primarily in the fact that its scope was international, and spanned two countries, the United States and the United Kingdom. Thus, the alliance consisted of researchers from ARL and MoD working together with several UK and US based industries and universities to solve several fundamental research problems. The work done by ITA was fundamental research in nature, and the goal was to perform public domain research by means of published papers. The restriction of research to fundamental research was done in order to avoid running into any issues related to ITAR which often arise in work focused on or sponsored by the armed forces of a country. A unique aspect of ITA was its focus on solving scientific problems in the context of coalition operations. However, due to the nature of fundamental research, many results are applicable in situations which fall outside coalition operations, e.g. within networks of a single country military or for federation of commercial networked systems. During the first five years of its existence, ITA was focused on research in four technical areas (i) network theory focusing on wireless and sensor networks (ii) security across systems of systems focusing on solving security issues that arise when two different networks need to inter-operate (iii) sensor information processing and delivery focusing on issues involving sensor network information management and (iv) distributed decision making and coalition planning focusing on how humans from different countries use the network to make informed decisions. In the last five years of its existence, the four technical areas were consolidated and
https://en.wikipedia.org/wiki/List%20of%20Deus%20Ex%20media
Deus Ex is a cyberpunk franchise created by Ion Storm and owned and published by Eidos Interactive, later Square Enix, and currently Eidos-Montréal. Video games Main series Spin-off games Print media Novels Comic books Art books Soundtracks References Media Deus Ex Deus Ex
https://en.wikipedia.org/wiki/Yahoo%21%20data%20breaches
The Internet service company Yahoo! was subjected to the largest data breach on record. Two major data breaches of user account data to hackers were revealed during the second half of 2016. The first announced breach, reported in September 2016, had occurred sometime in late 2014, and affected over 500 million Yahoo! user accounts. A separate data breach, occurring earlier around August 2013, was reported in December 2016. Initially believed to have affected over 1 billion user accounts, Yahoo! later affirmed in October 2017 that all 3 billion of its user accounts were impacted. Both breaches are considered the largest discovered in the history of the Internet. Specific details of material taken include names, email addresses, telephone numbers, encrypted or unencrypted security questions and answers, dates of birth, and hashed passwords. Further, Yahoo! reported that the late 2014 breach likely used manufactured web cookies to falsify login credentials, allowing hackers to gain access to any account without a password. Yahoo! has been criticized for their late disclosure of the breaches and their security measures, and is currently facing several lawsuits as well as investigation by members of the United States Congress. The breaches impacted Verizon Communications's July 2016 plans to acquire Yahoo! for about $4.8 billion, which resulted in a decrease of $350 million in the final price on the deal closed in June 2017. Description July 2016 discovery Around July 2016, account names and passwords for about 200 million Yahoo! accounts were presented for sale on the darknet market site, "TheRealDeal". The seller, known as "Peace_of_Mind" or simply "Peace", stated in confidential interviews with Vice and Wired, that he had the data for some time and had been selling it privately since about late 2015. Peace has previously been connected to sales of similar private information data from other hacks including that from the 2012 LinkedIn hack. Peace stated the data likely dates back to 2012, and security experts believed it may have been parts of other data hacks at that time; while some of the sample accounts were still active, they lacked necessary information to fully login properly, reflecting their age. Experts believe that Peace is only a broker of the information that hackers obtain and sell through him. Yahoo! stated they were aware of the data and were evaluating it, cautioning users about the situation but did not reset account passwords at that time. Late 2014 breach The first reported data breach in 2016 had taken place sometime in late 2014, according to Yahoo! The hackers had obtained data from over 500 million user accounts, including account names, email addresses, telephone numbers, dates of birth, hashed passwords, and in some cases, encrypted or unencrypted security questions and answers. Security experts noted that the majority of Yahoo!'s passwords used the bcrypt hashing algorithm, which is considered difficult to crack, with
https://en.wikipedia.org/wiki/NYC%20Ferry
NYC Ferry is a public network of ferry routes in New York City operated by Hornblower Cruises. , there are six routes, as well as one seasonal route, connecting 25 ferry piers across all five boroughs. NYC Ferry has the largest passenger fleet in the United States with a total of 38 vessels, providing between 20 and 90 minute service on each of the routes, depending on the season. New York City had an extensive ferry network until the 1960s, when almost all ferry services were discontinued, but saw a revival in the 1980s and 1990s. During 2013 the city government officially proposed its own ferry service, which was announced two years later under the tentative name of Citywide Ferry Service. The first of two phases launched in 2017 with service along the East River and to the Rockaways, Bay Ridge, and Astoria. A second phase launched to the Lower East Side and Soundview in 2018. A ferry to St. George, Staten Island, and a stop in Throgs Neck/Ferry Point Park launched in 2021, while a route to Coney Island is planned. Single-ride trips on the system cost $4.00, including free transfers between routes, but there is no free transfer to other modes of transport in the city. NYC Ferry also provides free shuttle buses, connecting to ferry stops in the Rockaways and Midtown Manhattan. The ferry service was originally expected to transport 4.5 to 4.6 million passengers annually, but the annual ridership estimates were revised in early 2018 to 9 million. Despite its crowding, the ferry has generally received positive reviews from passengers. However, there has been criticism over the highly subsidized nature of the service, and NYC Ferry's low ridership compared to the city's other public transit modes. Background Early ferries Until the 19th century, when the first fixed crossings were put in place across the city's waterways, there were many ferries traversing the area. New York's first ferries date to when the city was a Dutch colony named New Amsterdam, which comprised modern-day Lower Manhattan. A ferry across the East River, between New Amsterdam and modern-day Brooklyn, was created in 1642 by Cornelius Dircksen, who was reportedly "the earliest ferryman of whom the records speak." By 1654, New Amsterdam's government passed ordinances to regulate East River ferries. The first ferry to New Jersey was founded in 1661, traveling across the Hudson River from Manhattan to Communipaw (now part of Jersey City). Ferries along the Harlem River, between uptown Manhattan and the Bronx, started in 1667, and a ferry to Staten Island was started in 1712. The number of ferries would grow, and by 1904, there would be 147 ferry services operating in New York City waters. One of the first documented horse-powered "team" boats in commercial service in the United States was the Fulton Ferry Company, an East River ferry run that Robert Fulton implemented in 1814. The South Ferry Company, founded in 1836, merged with the Fulton Ferry Company three years later, and
https://en.wikipedia.org/wiki/List%20of%20Commonwealth%20Games%20medallists%20in%20field%20hockey
This is the complete list of Commonwealth Games medallists in field hockey from 1998 to 2022. Medallists Men's Women's External links Results Database from the Commonwealth Games Federation References Field Medalists Commonwealth
https://en.wikipedia.org/wiki/Europe%20Elects
Europe Elects is a poll aggregator that collects and publishes election-related data such as opinion polls in European countries. Genesis and history Europe Elects was founded in 2014 as a Twitter account. The project quickly rose to prominence, as it was the first account that gathered European polling and election data in one spot. Format Europe Elects provides election results during election days on social media, referring to the European Parliament affiliation of candidates and parties. The organization publishes polls done by polling companies in all European countries and its subdivisions in order to show both the level of support for national parties as well as for the European Union in each country. Europe Elects's visualization of the data is unique, as it uses standardized labels and colours for national parties of one European Parliament group across national borders. The publications regularly point out the affiliation of national parties with their respective European Parliament groups, which has been adopted by other media outlets over time. Furthermore, overviews of the positions of the single parties and candidates are being provided. Europe Elects publishes on the basis of the collected data a European projection for the European Parliament on a regular basis and shows how the results as if there were elections on that day. After the 2019 European Parliament election, Europe Elects claimed to have had the most precise forecast for the European Parliament. In 2019, the platform launched the Europe Elects Podcast. In 2019 and 2020, America Elects, Oceania Elects, Africa Elects, and Asia Elects were launched. Asia Elects received attention in the context of the Hong Kong local elections, being quoted in media such as The Washington Post. The platform hosts an extensive calendar of local, regional, national, and European election dates in Europe. Spread and perception Europe Elects is considered a major media source concerning the European Parliament and electoral analysis in Europe. It is quoted frequently in both European and worldwide publications, is referenced by the Centre for European Policy Studies, and is listed in the database of the European Data Journalism Network, a consortium of media and journalists promoting data-driven multilingual coverage of European topics. In 2021, Europe Elects formed a partnership with Euractiv and Decision Desk HQ. Partnering projects as Africa Elects, America Elects, Asia Elects, and Oceania Elects are in progress. Awards In 2022, Europe Elects was awarded the Dalhousie Impact Award. See also EUobserver FiveThirtyEight Voxeurop References External links Elections in Europe Non-profit organisations based in Rhineland-Palatinate Non-profit organisations based in Austria Organisations based in Vienna Organizations established in 2014 Pan-Europeanism Pan-European media companies Public opinion research companies
https://en.wikipedia.org/wiki/FRAD
FRAD may refer to: Frame Relay assembler/disassembler Functional Requirements for Authority Data Republican Front for Democratic Change; see Jean-Marie Doré FRAD, postnominal for Fellow of the Royal Academy of Dance
https://en.wikipedia.org/wiki/Billionaire%20space%20race
The billionaire space race is the rivalry among entrepreneurs who have entered the space industry from other industries - particularly computing. This private spaceflight race involves sending privately developed rockets and vehicles to various destinations in space, often in response to government programs or to develop the space tourism sector. Today, the billionaire space race is primarily between three billionaires and their respective firms: Jeff Bezos's Blue Origin, which is seeking to establish an industrial base in space. Richard Branson's Virgin Group (through Virgin Galactic and Virgin Orbit), which seeks to dominate space tourism, low-cost small orbital launch vehicles, and intercontinental sub-orbital spaceflight. Elon Musk's SpaceX, which seeks to colonize Mars as well as provide satellite-based internet through its Starlink project. Prior to his death in 2018, Paul Allen was also a major player in the billionaire space race through the aerospace division of his firm Vulcan and his financing of programs such as Scaled Composites Tier One. Allen sought to reduce the cost of launching payloads into orbit. Background The groundwork for the billionaire space race and private spaceflight was arguably laid by Peter Diamandis, an American entrepreneur. In the 1980s, he founded an American national student space society, the Students for the Exploration and Development of Space (SEDS). Later, Jeff Bezos became a chapter president of SEDS. In the 1990s, Diamandis, disappointed with the state of space development, decided to spur it on and spark the suborbital space tourism market, by initiating a prize, the X Prize. This led to Paul Allen becoming involved in the competition, creating the Scaled Composites Tier One platform of SpaceShipOne and White Knight One which won the Ansari X-Prize in 2004. The technology of the winning entrant was then licensed by Richard Branson's Virgin Group as a basis to found Virgin Galactic. The base techniques of Tier One also form the basis for Stratolaunch Systems (formerly of Vulcan Aerospace). Elon Musk's SpaceX was established in 2002, last among the three main rivals. Elon Musk has expressed excitement for a new space race. Government programs have also fuelled the billionaire space race. NASA programs such as the Commercial Crew Program (created in 2010, with grants mostly won by SpaceX and partially by Blue Origin) and the Artemis HLS program (awarded to SpaceX in 2021 and also to Blue Origin in 2023) have pushed the billionaires to compete against each other to be selected for those multi-billion dollar procurement programs. The competition has also resulted in court battles such as Blue Origin v. United States & SpaceX. Those government programs have provided critical funding for the new private space industry and its development. Major milestones 21 June 2004 – Scaled Composites Tier One, funded by Paul Allen, achieves the first entirely privately funded crewed flight to space (suborbita
https://en.wikipedia.org/wiki/MLT%20%28hacktivist%29
MLT, real name Matthew Telfer, (born 1994) is a cybersecurity researcher, former grey hat computer hacker and former member of TeaMp0isoN. MLT was arrested in May 2012 in relation to his activities within TeaMp0isoN, a computer-hacking group which claimed responsibility for many high-profile attacks, including website vandalism of the United Nations, Facebook, NATO, BlackBerry, T-Mobile USA and several other large sites in addition to high-profile denial-of-service attacks and leaks of confidential data. After his arrest, he reformed his actions and shifted his focus to activities as a white hat cybersecurity specialist. He was the founder of now-defunct Project Insecurity LTD. History Believed to be the former co-leader and spokesperson of TeaMp0isoN, MLT, along with Junaid Hussain and other hackers targeted many large websites and corporations over a two-year period, from 2010 up until 2012 when both individuals were arrested. The group first gained popularity after targeting infamous hacking collective LulzSec, releasing personal information on their members and purporting to have hacked their websites, they then went on to target sites such as NATO, and various government officials from the United Kingdom and United States of America . The arrests finally came as a result of the probe into the alleged hacking and wiretapping of the British Security Services Anti-Terrorism Hotline. MLT was the former hacking partner of Junaid Hussain, who later went on to join ISIS and was killed in a drone strike by the US Government after becoming the third highest target on their 'kill list' due to his role in inspiring international lone-wolf terrorism alongside his hacking activities for ISIS under the banner of Islamic State Hacking Division. It was reported by Vice that Junaid Hussain remained in contact with MLT while in Syria, and that he used to occasionally ask for advice relating to hacking or would sometimes even openly boast about his activities within ISIS to MLT. Arrest On 9 May 2012, MLT was arrested in Newcastle upon Tyne by the Metropolitan Police who released a statement saying: "The suspect, who is believed to use the online 'nic' 'MLT', is allegedly a member of and spokesperson for TeaMp0isoN ('TeamPoison')--a group which has claimed responsibility for more than 1,400 offences including denial of service and network intrusions where personal and private information has been illegally extracted from victims in the U.K. and around the world". It was reported that MLT could have faced up to 10 years in prison for the events leading to his arrest. Recent activity In May 2015, someone purporting to be MLT featured on CNN, speaking to them about Junaid Hussain and claiming that he witnessed him appear on video chat once as a 'black power ranger' while wielding an AK-47. In August 2015, MLT featured on Episode 5 of the TV show Viceland Cyberwar where he spoke about subjects ranging from the security of autonomous cars to the death of hi
https://en.wikipedia.org/wiki/MaximaTelecom
MaximaTelecom is a Russian technology company engaged in the development and commercialization of public wireless networks, Wi-Fi network operator in the Moscow Metro. History The company was founded in 2004 and for long time was an asset of the Russian systems integrator . In 2013, MaximaTelecom was purchased by a group of private investors headed by Sergey Aslanyan, the former president of the group Sitronics. In July of the same year the company took part in the auction of the Moscow Metro for the right to create Wi-Fi network and signed a contract as the only bidder. Projects Moscow Metro The main contenders for the creation and maintenance of the network in the Moscow metro were cellular operators, members of the 'big three' - MegaFon, Mobile TeleSystems and VimpelCom. Access to the subway infrastructure was interesting for the companies in terms of expanding the coverage area of their own mobile networks and Internet connections. However, operators did not like rates for cabling and placement of base stations, which were significantly increased in 2011. In 2012, two mobile operators launched pilot projects to create Wi-Fi networks that haven’t been developed: MTS created coverage area in the trains of the Circle Line, Vimpelcom — in two trains of Sokolnicheskaya Line. In December 2012 the Metro held an auction for the right to create a network for the first time. Project Technical requirement presupposed launching of a network for passengers as well as a separate network for internal use; executor of the project received a discount for renting the Moscow subway infrastructure. Companies considered these conditions unattractive and refused to participate in the auction. In the second auction, held in June 2013, the organizer refused to create an internal network and increased preferences for an executor, but the mobile operators were not satisfied with the discount rates. The auction received no bids and it was declared invalid. Third auction, in July, received the only request from MaximaTelecom. Metro signed a 15-years contract with the only participant at the starting price. According to the contract, the company committed to provide all the rolling stock of Moscow subway with Wi-Fi connection - more than 4,800 cars at that time; the pay-back period was estimated as 7 years at a cost for the project of 1.5 billion rubles. On 1 September 2013 the first network was launched in trains of Kakhovskaya line, on 25 December – in trains of Circle Line. The link-up of Kalininskaya and Sokolnicheskaya line was completed in February and March 2014 respectively. The company planned a simultaneous commissioning of the network on the Lyublinsko-Dmitrovskaya, Zamoskvoretskaya, Kaluzhsko-Rizhskaya and Tagansko-Krasnopresnenskaya metro lines in October 2014, but on Lyublinsko-Dmitrovskaya and Zamoskvoretskaya lines network was launched ahead of schedule in July. By 1 December 2014 free Wi-Fi was available on all lines of the Moscow Metro. Moreove
https://en.wikipedia.org/wiki/Cryptographic%20splitting
Cryptographic splitting, also known as cryptographic bit splitting or cryptographic data splitting, is a technique for securing data over a computer network. The technique involves encrypting data, splitting the encrypted data into smaller data units, distributing those smaller units to different storage locations, and then further encrypting the data at its new location. With this process, the data is protected from security breaches, because even if an intruder is able to retrieve and decrypt one data unit, the information would be useless unless it can be combined with decrypted data units from the other locations. History The technology was filed for patent consideration in June 2003, and the patent was granted in June 2008. Technology Cryptographic splitting utilizes a combination of different algorithms to provide the data protection. A block of data is first encrypted using the AES-256 government encryption standard. The encrypted bits are then split into different shares and then each share is hashed using the National Security Agency's SHA-256 algorithm. Applications One application of cryptographic splitting is to provide security for cloud computing. The encrypted data subsets can be stored on different clouds, with the information required to restore the data being held on a private cloud for additional security. Security vendor Security First Corp uses this technology for its Secure Parser Extended (SPx) product line. In 2009, technology services company Unisys gave a presentation about using cryptographic splitting with storage area networks. By splitting the data into different parts of the storage area network, this technique provided data redundancy in addition to security. Computer giant IBM has written about using the technology as part of its Cloud Data Encryption Services (ICDES). The technology has also been written about in the context of more effectively using sensitive corporate information, by entrusting different individuals within a company (trustees) with different parts of the information. See also Secret sharing References Information governance Data security
https://en.wikipedia.org/wiki/API%20management
API management is the process of creating and publishing web application programming interfaces (APIs), enforcing their usage policies, controlling access, nurturing the subscriber community, collecting and analyzing usage statistics, and reporting on performance. API Management components provide mechanisms and tools to support developer and subscriber communities. Components While solutions vary, components that provide the following functions are typically found in API management products: Gateway A server that acts as an API front-end, receives API requests, enforces throttling and security policies, passes requests to the back-end service and then passes the response back to the requester. A gateway often includes a transformation engine to orchestrate and modify the requests and responses on the fly. A gateway can also provide functions such as collecting analytics data and providing caching. The gateway can provide the functionality to support authentication, authorization, security, audit and regulatory compliance. Gateways can be implemented using technologies like Nginx or HAProxy. Publishing tools A collection of tools that API providers use to define APIs, for instance using the OpenAPI or RAML specifications, generate API documentation, govern API usage through access and usage policies for APIs, test and debug the execution of API, including security testing and automated generation of tests and test suites, deploy APIs into production, staging, and quality assurance environments, and coordinate the overall API lifecycle. Developer portal/API store A community site, typically branded by an API provider, that can encapsulate for API users in a single convenient source information and functionality including documentation, tutorials, sample code, software development kits, an interactive API console and sandbox to trial APIs, the ability to subscribe to the APIs and manage subscription keys such as OAuth2 Client ID and Client Secret, and obtain support from the API provider and user and community. Reporting and analytics Functionality to monitor API usage and load (overall hits, completed transactions, number of data objects returned, amount of compute time and other internal resources consumed, the volume of data transferred). This can include real-time monitoring of the API with alerts being raised directly or via a higher-level network management system, for instance, if the load on an API has become too great, as well as functionality to analyze historical data, such as transaction logs, to detect usage trends. Functionality can also be provided to create synthetic transactions that can be used to test the performance and behavior of API endpoints. The information gathered by the reporting and analytics functionality can be used by the API provider to optimize the API offering within an organization's overall continuous improvement process and for defining software Service-Level Agreements for APIs. Monetization Funct
https://en.wikipedia.org/wiki/SPARC64
SPARC64 or sparc64 may refer to: sparc64, an alternative name used by free software projects for the SPARC V9 instruction set architecture HAL SPARC64, a microprocessor designed by HAL Computer Systems
https://en.wikipedia.org/wiki/Single%20pushout%20graph%20rewriting
In computer science, a single pushout graph rewriting or SPO graph rewriting refers to a mathematical framework for graph rewriting, and is used in contrast to the double-pushout approach of graph rewriting. References Further reading Graph rewriting
https://en.wikipedia.org/wiki/Friday%20the%2013th%3A%20The%20Computer%20Game
Friday the 13th: The Computer Game (often shortened to Friday the 13th) is the first game adaptation based on the films of the same name. It was released in 1986 by Domark for the Amstrad CPC, Commodore 64, and ZX Spectrum. The game was released on floppy diskette and cassette tape. The player's goal is to find and kill Jason, while making sure their friends or they themselves are not killed by Jason. Gameplay The player can roam freely around the scenery and walk both inside and outside buildings. Jason, as well as other characters, do the same. It is the player's task to make sure their friends do not get killed by Jason, who often appears disguised as one of them, unless he is hit once and becomes visible as a man dressed in black. Various improvised weapons (e.g., a chainsaw, a pitchfork, a machete, etc.) are scattered around the camp and inside various buildings such as a barn, a church and a cabin. Once picked up, they can be used to confront Jason. There are five levels in the game and each time the player assumes the role of another character. The character assignment is random at the start of the round. The game uses an early pseudo-3D view along with a more traditional side view, depending on the character's location. The game also features a "fear meter", in the form of a blonde woman's head with hair standing on end, to symbolize the player character's level of fright at the time. Unlike the later Nintendo Entertainment System (NES) title, the game included scenes of gore consistent with the film franchise. For example, when a character is killed by Jason, sometimes there is a scream followed by a quick cut to a graphic image of a machete embedded into their head. Development Domark based the game on Friday the 13th Part 2. The game was revealed to journalists at Ye Olde Cheshire Cheese in London, England. In the cellar of the pub, Dominic Wheatley, co-founder of Domark burst through a solid door dressed as Jason and holding a cleaver, scaring the assembled journalists. According to The Games Machine, some magazines refused to run ads for the game due to the game's graphic packaging; Crash ran ads for the game and prominently featured Jason Voorhees on the cover of issue #23, which caused the magazine to receive many complaints from parents, including one woman who also wrote to the Press Council about the incident. Computer Gamer described the game's advertising as being "the subject of much controversy"; in March 1986 it was reported that ads for Friday the 13th were withdrawn by Domark due to complaints about their violent content, and the cover was redesigned. Another redesigned version of the cover was used for copies sold at John Menzies stores, omitting the knife. In regards to the game's controversial marketing and the criticism that children can buy the game, Dominic Wheatley stated that "Many X-rated films are accompanied by books which are often more vivid in their descriptions and yet under 18s can buy those. We are tr
https://en.wikipedia.org/wiki/Attributed%20graph%20grammar
In computer science, an attributed graph grammar is a class of graph grammar that associates vertices with a set of attributes and rewrites with functions on attributes. In the algebraic approach to graph grammars, they are usually formulated using the double-pushout approach or the single-pushout approach. Implementation AGG, a rule-based visual language that directly expresses attributed graph grammars using the single-pushout approach has been developed at TU Berlin for many years. Notes References . Ehrig, Heckel, Korff, Lowe, Ribeiro, Wagner and Corradini, 1997. Algebraic Approaches to Graph Transformation - Part II: Single Pushout Approach and Comparison with Double Pushout Approach. Pp. 247-312 of (Rozenberg, 1997). Graph rewriting
https://en.wikipedia.org/wiki/Special%20Real%20Time%20Operating%20System
Special Real Time Operating System (SRTOS) is a discontinued IBM real time operating system, originally designed for use in the electricity industry, but later also applied in other areas of industrial process control. It formed part of the Realtime Plant Management System (RPMS) and Advanced Control System (ACS). Rather than a standalone operating system, it was designed as an extension to the OS/VS1 and OS/VS2 (later MVS) operating systems. It was also used in the paper industry. SRTOS was originally released in 1976, and though no longer supported as a program product, it is currently used as part of several ACS and RPMS installations worldwide. References IBM mainframe operating systems
https://en.wikipedia.org/wiki/NATO%20Software%20Engineering%20Conferences
The NATO Software Engineering Conferences were held in 1968 and 1969. The conferences were attended by international experts on computer software who agreed on defining best practices for software grounded in the application of engineering. The result of the conferences were two reports, one for the 1968 conference and the other for the 1969 conference, that defined how software should be developed. The conferences played a major role in gaining general acceptance for the term software engineering. References History of software Information technology organizations based in Europe History of NATO 1968 conferences 1969 conferences 1968 software 1969 software
https://en.wikipedia.org/wiki/Get%20Squirrely
Get Squirrely (also distributed as A.C.O.R.N.S.: Operation Crack Down) is a 2015 American computer-animated heist comedy film produced by John H. Williams (through Vanguard Animation) and Dan Krech and directed by Ross Venokur. Released on November 4, 2016, the film was Vanguard Animation's first theatrically released feature film since 2010's Space Chimps 2: Zartog Strikes Back. However, the film received mixed reviews. Plot Frankie (Jason Jones), a smooth-talking squirrel, finds out that acorns are being stolen by the evil A.C.O.R.N.S. Corporation. Now he must assemble a rag-tag team of forest animals with only three days to pull off their biggest heist yet. Cast Jason Jones as Frankie Will Forte as Cody John Leguizamo as Fly Boy/Liam Samantha Bee as Raitch Victoria Justice as Lola John Cleese as Mr. Bellwood Jim Cummings as Bear/Edsy Denise Oliver as Floor Guard Development The film was first announced in 2011 under the original title The Nut House. References External links 2015 films 2010s American animated films Vanguard Animation Animated films about squirrels 2010s English-language films
https://en.wikipedia.org/wiki/Michael%20I.%20Miller
Michael Ira Miller (born 1955) is an American-born biomedical engineer and data scientist, and the Bessie Darling Massey Professor and Director of the Johns Hopkins University Department of Biomedical Engineering. He worked with Ulf Grenander in the field of Computational Anatomy as it pertains to neuroscience, specializing in mapping the brain under various states of health and disease by applying data derived from medical imaging. Miller is the director of the Johns Hopkins Center for Imaging Science, Whiting School of Engineering and codirector of Johns Hopkins Kavli Neuroscience Discovery Institute. Miller is also a Johns Hopkins University Gilman Scholar. Biography Miller received his Bachelor of Engineering from The State University of New York at Stony Brook in 1976, followed by a Master of Science degree in 1978 and PhD in biomedical engineering in 1983, both from the Johns Hopkins University. He completed postdoctoral research on medical imaging at Washington University in St. Louis with Donald L. Snyder, then chair of the Electrical Engineering department. In 1985, he joined the faculty of Electrical Engineering at Washington University, where he was later named the Newton R. and Sarah Louisa Glasgow Wilson Professor in Engineering. During his early years at Washington University, Miller received the Presidential Young Investigator Award. From 1994 to 2001, Miller was a visiting professor at Brown University's Division of Applied Mathematics, where he worked with Ulf Grenander on image analysis. In 1998, Miller joined the Department of Biomedical Engineering at Johns Hopkins University as the director of the Center for Imaging Science. He was later named the Herschel and Ruth Seder Professor of Biomedical Engineering, and was appointed by Johns Hopkins University President Ronald J. Daniels as one of 17 inaugural University Gilman Scholars in 2011. In 2015, Miller became the co-director of the newly established Kavli Institute for Discovery Neuroscience. In 2017, Miller was named the Massey Professor and Director of the Department of Biomedical Engineering at the Johns Hopkins University. In 2019, he was elected as a IEEE Fellow. Academic career Neural coding Miller did his doctoral work on neural codes in the Auditory system under the direction of Murray B. Sachs and Eric D. Young in the Neural Encoding Laboratory at Johns Hopkins University. With Sachs and Young, Miller focused on rate-timing population codes of complex features of speech including voice-pitch and consonant-vowel syllables encoded in the discharge patterns across the primary auditory nerve. These neural codes were one of the scientific works discussed as the strategy for neuroprosthesis design at the 1982 New York Academy of Science meeting on the efficacy and timeliness of Cochlear implants. Medical imaging Miller's work in the field of brain mapping via Medical imaging, specifically statistical methods for iterative image reconstruction, began in the m
https://en.wikipedia.org/wiki/Composr%20CMS
Composr CMS (or Composr) is a web application for creating websites. It is a combination of a Web content management system and Online community (Social Networking) software. Composr is licensed as free software and primarily written in the PHP programming language. Composr is available on various web application distributions platforms, including Installatron, Softaculous, Web Platform Installer and Bitnami. History Composr was launched in 2004 as ocPortal. ocPortal was featured on the CMS Report (a CMS editorial website) "Top 30 Web Applications" list. ocPortal was developed up until version 9 and renamed to Composr CMS in 2016 alongside the new version 10 as a product and branding overhaul. Features The main features are for: Content Management of website structure and pages Content Management of custom content types ("Catalogues") Galleries (Photos and Videos) News and Blogging Discussion Forums Chat Rooms Advertising management ("Banners") Calendars File management ("Downloads") wikis ("Wiki+") Quizzes Newsletters Community Points Composr uses a number of built-in languages to build up web content and structure, mainly: Comcode (for creating high-level web content, similar to BBCode) Tempcode (a templating language) Filtercode (for defining content filtering) Selectcode (for defining content selection) Composr is developed distinctly compared to most other Open Source CMSs, with the main distinctions being: Composr is module-orientated, rather than node-orientated Common software components are designed for maximum integration, rather than maximum choice Composr is sponsored by a commercial software company, rather than being volunteer led Some unique (or rare) features of Composr are: Automatic banning of hackers (if hacking attempts are detected) Core integration with spammer block lists Integration with third-party forum software for user accounts and forums (although this is no longer a focus) Automatic color scheme generation using color theory ATAG compliance Criticisms Composr's primary weak point has been noted as its relatively small community. Few community addons or themes have been released for Composr when compared to projects such as Drupal and Wordpress. Some Composr fans argue that the number of built-in features is both the reason and the solution for the lack of popular third party addons. See also List of content management systems References External links Blog software 2004 software Website management Cross-platform software Content management systems Free content management systems Free software programmed in PHP
https://en.wikipedia.org/wiki/Clinton%20Township%2C%20Divide%20County%2C%20North%20Dakota
Clinton Township is a township in Divide County, North Dakota, United States. External links Information on the township www.city-data.com Townships in Divide County, North Dakota
https://en.wikipedia.org/wiki/List%20of%20Commonwealth%20Games%20medallists%20in%20synchronised%20swimming
This is the complete list of Commonwealth Games medallists in synchronised swimming from 1986 to 2010. Solo Duet Figures References Results Database from the Commonwealth Games Federation Medalists Synchr
https://en.wikipedia.org/wiki/Encantadia
Encantadia is a Filipino fantasy franchise produced and published by GMA Network. It consists of four television series that have run from 2005 to present and a single film. The first was shown in 2005 carrying the title alone and ended in the same year with total of 160 episodes. The second series title Etheria premiered in the same year and ended in 2006 with 50 episodes. Due to its significant success, the third series title Encantadia: Pag-ibig Hanggang Wakas premiered in 2006 consisting of 48 episodes. In 2016, 11 years after the original run, a reboot of the series premiered on the same network featuring a new cast. In 2005, Encantadia had a crossover film with Mulawin entitled Mulawin: The Movie, which was produced by GMA Pictures as an entry to the 2005 Metro Manila Film Festival. Production Development Encantadia is a term coined from the Filipino words "enkanto", "enkanta", "enkantada", or "enkantado", which was in turn derived from the Spanish term encant(ad)o/a, which means enchanted beings endowed with supernatural powers. The series was created by GMA Network, the same network that produced the fantasy-themed series Mulawin and Darna. It was directed by Mark Reyes and Gil Tejada, Jr., and written by Suzette Doctolero. Originally, the series was intended as GMA Films' entry to the 2004 Metro Manila Film Festival but they later decided to make Encantadia a daily fantasy soap opera due to its huge production and budget. Encantadia was Doctolero's first head writing project with the network in 2005, and also served as her training for writing a fantasy story for the first time. According to her, it was inspired by the story of Maria Makiling, a diwata (fairy) in Philippine folklore, in four different persona. It was also inspired by different stories around the world combined into one. The first three installment were consecutively shown from 2005 to 2006. In 2010, a second saga or fourth installment was scheduled to be produced by GMA Network, but it was not push through until Atty Gozon, CEO of GMA Network pushed it back for 2012, but was scrapped. In 2015,the director, producer and the writer were given a go signal by the network to make the new Encantadia. In January 2016, it was announced that the fourth installment will be a reboot (often called as requel or retelling-sequel) of the old series . Setting According to Mark Reyes, the sets of Encantadia in 2005 are located in various places in the Philippines. The Kingdom of Adamya is located at Calatagan, Batangas. The cave set of Hathorian Kingdom is located at the Kalinawan Cave in Tanay, Rizal. Lireo's forest is located at Daranak Falls and Batlag Falls in Rizal. A 1,900 square meter warehouse in Pasig served as an indoor set with an improvised pond. The said warehouse was also a setting change for Lireo, Sapiro, Hera Andal, Hera Sensa and others. The Kingdom of Sapiro set is located inside the historic walled city of Intramuros (Old Manila) in the heart of Manila. In its seco
https://en.wikipedia.org/wiki/Gerald%20Friedland
Gerald Friedland (born 1978, Berlin) is an adjunct professor at the Electrical Engineering and Computer Science Department of the University of California, Berkeley. He also maintains an affiliation with the International Computer Science Institute. Education Gerald Friedland completed his Masters and Doctorate degrees in computer science from Free University of Berlin in 2002 and 2006, respectively. His PhD advisor was Raúl Rojas. He then moved to the International Computer Science Institute where he completed his a postdoc under Nelson Morgan before continuing to be a research scientist and group leader there. He then worked as a Principal Data Scientist at Lawrence Livermore National Lab before co-founding Brainome, Inc. He is a faculty fellow of the Berkeley Institute for Data Science where he has been running a discussion group since 2018, understanding the implications of using information theory as universal tool for modeling. Career Friedland is a computer scientist specializing in the processing and analysis of multimedia data and machine learning. He is mostly known as the original author of the widely used "Simple Interactive Object Extraction" image and video segmentation algorithm, created as part of his PhD thesis, and as the co-author of a textbook on Multimedia Computing. He also led the initiative to create and release the YFCC100M corpus (see also: List of datasets for machine learning research), the largest freely available research corpus of consumer-produced videos and images. He co-founded the field of geolocation estimation for images and videos, sometimes also referred to as placing. Friedland also frequently uncovers privacy risks in multimedia publishing practice and heads the development of the teachingprivacy.org portal which provides educational materials for use in US high-schools as part of the AP Computer Science Principles and the Code.org initiative. Friedland is also the co-creator of MOVI, an open-source speech recognition board that allows the creation of cloudless voice interfaces for Internet of things devices. References 1978 births Living people German electrical engineers German computer scientists Lawrence Livermore National Laboratory staff UC Berkeley College of Engineering faculty German expatriates in the United States Free University of Berlin alumni
https://en.wikipedia.org/wiki/List%20of%20Commonwealth%20Games%20medallists%20in%20squash
This is the complete list of Commonwealth Games medallists in squash from 1998 to 2018. Men's singles Women's singles Men's doubles Women's doubles Mixed doubles References Results Database from the Commonwealth Games Federation Squash Medalists Commonw
https://en.wikipedia.org/wiki/Linear%20graph%20grammar
In computer science, a linear graph grammar (also a connection graph reduction system or a port graph grammar) is a class of graph grammar on which nodes have a number of ports connected together by edges and edges connect exactly two ports together. Interaction nets are a special subclass of linear graph grammars in which rewriting is confluent. Implementations Bawden introduces linear graphs in the context of a compiler for a fragment of the Scheme programming language. Bawden and Mairson (1998) describe the design of a distributed implementation in which the linear graph is spread across many computing nodes and may freely migrate in order to make rewrites possible. Notes References Bawden, Alan (1986), Connection graphs, In Proceedings of the 1986 ACM conference on LISP and functional programming, pp. 258–265, ACM Press. Bawden, Alan (1992), Linear graph reduction: confronting the cost of naming, PhD dissertation, MIT. Bawden, Alan (1993), Implementing Distributed Systems Using Linear Naming, A.I. Technical Report No. 1627, MIT. Bawden and Mairson (1998), Linear naming: experimental software for optimizing communication protocols, Working paper #1, Dept. Computer Science, Brandeis University. Graph rewriting