source stringlengths 32 199 | text stringlengths 26 3k |
|---|---|
https://en.wikipedia.org/wiki/Polyfill | Polyfill may refer to:
Polyester fiberfill, also known as Poly-fil or polyfill, a synthetic fiber
Polyfill (programming), in web development, code that implements a feature on web browsers that do not support the feature
In graphics programming, the use of flood fill for filling polygons
Polyfilla, a DIY spackling paste product |
https://en.wikipedia.org/wiki/Air%20Traffic%20Controller%20%281978%20video%20game%29 | Air Traffic Controller is a 1978 video game written by air traffic controller David Mannering, and released by Creative Computing for the TRS-80 Model I and Exidy Sorcerer in 1978, and for the Apple II, Apple II Plus and Sol-20 in 1979. It was later rewritten by Will Fastie and Bill Appelbaum for Data General AOS in 1980, and ported to DOS for release by PC Disk Magazine in 1983.
An enhanced version titled Advanced Air Traffic Controller was released by Creative Computing in 1981 for the TRS-80, Apple II, Commodore PET, and Atari 800.
Gameplay
Air Traffic Controller is a game in which the player directs local air traffic.
Reception
Alan Isabelle reviewed Air Traffic Controller in The Space Gamer, commenting that it was "Unquestionably worth [the price]. I highly recommend this to anyone with the computer to run it.".
Reviews
Moves #56, p24-25
See also
Kennedy Approach
References
External links
Air Traffic Controller for Windows
Advanced Air Traffic Controller at Atari Mania
Review in 80-US
Book of Atari Software 1983
Article in ANALOG Computing
1978 video games
Apple II games
Exidy Sorcerer games
Simulation video games
TRS-80 games
Video games developed in the United States |
https://en.wikipedia.org/wiki/History%20of%20computing%20in%20the%20Soviet%20Union | The history of computing in the Soviet Union began in the late 1940s, when the country began to develop its Small Electronic Calculating Machine (MESM) at the Kiev Institute of Electrotechnology in Feofaniya. Initial ideological opposition to cybernetics in the Soviet Union was overcome by a Khrushchev era policy that encouraged computer production.
By the early 1970s, the uncoordinated work of competing government ministries had left the Soviet computer industry in disarray. Due to lack of common standards for peripherals and lack of digital storage capacity the Soviet Union's technology significantly lagged behind the West's semiconductor industry. The Soviet government decided to abandon development of original computer designs and encouraged cloning of existing Western systems (e.g. the 1801 CPU series was scrapped in favor of the PDP-11 ISA by the early 1980s).
Soviet industry was unable to mass-produce computers to acceptable quality standards and locally manufactured copies of Western hardware were unreliable. As personal computers spread to industries and offices in the West, the Soviet Union's technological lag increased.
Nearly all Soviet computer manufacturers ceased operations after the breakup of the Soviet Union. A few companies that survived into 1990s used foreign components and never achieved large production volumes.
History
Early history
In 1936, an analog computer known as a water integrator was designed by Vladimir Lukyanov. It was the world's first computer for solving partial differential equations.
The Soviet Union began to develop digital computers after World War II. A universally programmable electronic computer was created by a team of scientists directed by Sergey Lebedev at the Kiev Institute of Electrotechnology in Feofaniya. The computer, known as MESM (), became operational in 1950. By some authors it was also depicted as the first such computer in continental Europe, even though the Zuse Z4 and the Swedish BARK preceded it. The MESM's vacuum tubes were obtained from radio manufacturers.
The attitude of Soviet officials towards computers was skeptical or hostile during the Stalinist era. Joseph Stalin considered the computer an evil product of capitalism. Government rhetoric portrayed cybernetics in the Soviet Union as a capitalist attempt to further undermine workers' rights. The Soviet weekly newspaper Literaturnaya Gazeta published a 1950 article strongly critical of Norbert Wiener and his book, Cybernetics: Or Control and Communication in the Animal and the Machine, describing Wiener as one of the "charlatans and obscurantists whom capitalists substitute for genuine scientists". After the publication of the article, his book was removed from Soviet research libraries.
The first large-scale computer, the BESM-1, was assembled in Moscow at the Lebedev Institute of Precision Mechanics and Computer Engineering. Soviet work on computers was first made public at the Darmstadt Conference in 1955.
Post-Stalin |
https://en.wikipedia.org/wiki/DataCore | DataCore, also known as DataCore Software, is a developer of software-defined storage based in Fort Lauderdale, Florida, United States. The company is a pioneer in the development of SAN virtualization technology, and offers software-defined storage solutions across core data center, edge and cloud environments.
History
DataCore was founded in Fort Lauderdale in February 1998 by George Teixeira and Ziya Aral, co-workers at parallel computing company Encore Computer. The premise behind the company was to allow network operators to purchase commodity disk drives, external storage arrays or SAN disk drive arrays, and treat them all as virtual disks of networked, block-access storage. This storage was controlled using DataCore software.
They were joined by 10 other former Encore colleagues, and they all worked without pay until January 1999, when the company secured its first funding round, of $8 million.
In 2000, the company had a $35 million Series C funding round.
In 2006, seeing an exodus of venture funding, company employees mortgaged their homes to keep the business going, until 2008 when a US$30 million round of funding stabilized company finances.
In 2011, the company launched SANsymphony-V, an upgrade to its storage virtualization software offering faster performance.
In April 2014, the company released version 10 of its SANsymphony product.
In March 2015, DataCore partnered with Chinese technology vendor Huawei to run SANsymphony-V software on Huawei's FusionServer to create virtual storage networks.
In 2016, the company's SANsymphony-V software was reported to have set new price performance records based on testing done by Redwood City, California-based non-profit testing company Storage Performance Council using their SPC-1 storage performance benchmark. The results led to complaints from multiple vendors, who claimed that storing all the "test" data in cache made the results unfair. One of the three SPC-1 benchmark results was later withdrawn.
In March 2017, the company partnered with technology company Lenovo to develop its data center business by integrating DataCore's SANsymphony software defined storage with Lenovo's servers. This was reportedly to compete with companies like Nutanix and SimpliVity (now part of Hewlett Packard Enterprise (HPE)) that were shipping whole hyper-converged stacks rather than just a software-defined storage component. In September 2017, in an attempt to compete with the in-memory database features of SQL Server, the company released its MaxParallel driver, which uses parallel I/O technology to accelerate database-related processing such as with SQL Server databases. This product has been discontinued in August 2018.
In April 2018 DataCore announced that Dave Zabrowski, previously CEO of cloud-based financial services company Cloud Cruiser, was its new CEO, and former CEO George Teixeira was named Executive Chairman.
In October 2019, DataCore was awarded a patent for performing parallel I/O oper |
https://en.wikipedia.org/wiki/Nuno%20Manuel%20Gavina%20do%20Couto | Nuno Manuel Gavina do Couto (; born November 20, 1969) is a Portuguese radio voice, producer and owner of OR2 Web Productions (based legally in Høvik, Norway). Gavina do Couto developed a Network composed by 21 Online Systems which broadcasts Audio and Visual Streams, known as OR2 Multimedia Streams. He also contributes to several online communities as an author and producer.
Early life
Gavina do Couto grew up in Sintra, Portugal with his family. He was raised Roman Catholic, yet, is now member of the Church of Norway. He studied Electrical engineering in a school near Lisbon.
Radio
Between 1985 and 1989, Gavina do Couto was responsible for the production and development of the several radio programs in Portuguese Local Radio Stations. After the 'shutdown' of Portuguese Pirate Radio Stations on 24 December 1988, he was a collaborator on the legalization of SINTRA FM Radio Project.
In 1990, the Radio program 'H2POP' returned to the so-called Portuguese Riviera, Sintra. Gavina do Couto was also co-responsible with the production of 'Good Morning Sintra', both transmitted by SINTRA FM RADIO Station.
Career
Since 1989, Gavina do Couto worked with his father, initially as a collaborator of the meanwhile biggest Club of Micro Computers in Portugal, with a registered Brand called ClubeMicro, represented by C.M.U. - Informatic, Electronic & Telecomunications, Lda and T.M.S.I. - Technology, Maintenance and Computer Systems Security. In 1991, was admitted to work in full-time on ClubeMicro. In 1999, after his father retirement, Gavina do Couto was nominated the Administrator of ClubeMicro and CEO of both Companies. With the emergence of Internet and alternative suppliers, ClubeMicro commercial activity was officially extinct in 2009.
Since 2015, Gavina do Couto is Owner of OR2 Web Productions (based legally in Høvik, Norway).
Author
Gavina do Couto is also Author of several online publications where he tries to explain Web II technology through metaphorical, symbolical or even pertinent perspectives based on simply to understand logical approaches and terminologies.
Besides unique blog posts, also writes genuine contents that are broadcast via OR2 Streams.
References
1969 births
Living people
Portuguese radio presenters
Portuguese radio producers
Portuguese writers
Radio writers |
https://en.wikipedia.org/wiki/Let%27s%20Enhance | Let's Enhance is a Ukrainian start-up which develops an online service driven by artificial intelligence which allows improving images and zooming them without losing quality.
According to the developers, they used the super-resolution technology of machine learning. The neural network, trained on a large base of real photographs, learns to restore details and keep clear lines and contours, relying on its knowledge of typical objects and textures that exist in the real world.
In October 2021, Let's Enhance got $3 mln of investments. In addition to Chamaeleon investment company, the startup was invested by Margo Georgiadis, Hype Ventures, and Acrobator.
In June 2022, Let's Enhance introduced the second generation of its product called Claid, which improves images for marketplaces and increases conversions. It allows to automate the editing of any number of user-generated photos, control enhancement settings by changing multiple variables, and achieve a consistent and beautiful look that increases conversions.
References
Image processing software
Deep learning software applications |
https://en.wikipedia.org/wiki/Dawlish%2C%20South%20Australia | Dawlish is a former government town whose site is located in the locality of Erskine north of Peterborough, South Australia.<ref>{{cite web|title=Search results for "Dawlish, Gtwn" using datasets selected for 'Suburbs and Localities', Government Towns' and 'Gazetter'|url=http://location.sa.gov.au/viewer/|website=Location SA Map Viewer|publisher=Government of South Australia|accessdate=25 December 2017}}</ref>
The area is arid and although a town was laid out, on 8 June 1882 but it never developed. "In 1964, as there was no demand for allotments, the few that had been sold were acquired compulsorily by the Crown and reverted back to broad acres."''
The name comes from Devon, England, where in the Domesday Book the Town of Dawlish was recorded as Doelis or ‘hallowed place’
References
Ghost towns in South Australia |
https://en.wikipedia.org/wiki/Average%20with%20limited%20data%20validity | In image analysis, the average with limited data validity is an image filter for feature-preserving noise removal, consisting in a smoothing filter that only involves pixels satisfying some validity criterion. If some feature of noise elements is known, it is possible to use it to define a criterion to detect invalid pixels, and selectively smooth only invalid pixels using data coming only from valid pixels, thus avoiding to affect other features of the image.
Possible criteria are:
based on image intensity, by defining an interval of invalid data, with the filter only modifying pixels in that interval and only averaging data from other pixels from its neighbourhood that are valid, i.e. their intensity does not fall in the same interval. For instance, given a pixel of invalid data, its convolution kernel becomes
This approach allows to effectively remove extraneous elements that have different intensity from the rest of the image, with blurring limited to valid parts of the image which share intensity values with the extraneous elements, or portions of edges that were previously covered by such extraneous artefacts.
based on image brightness, similarly defining an interval of invalid brightness change, with the filter only involving pixels that fall in that interval. This approach allows to remove artefacts due to a continuous change of background brightness.
based on edge strength, by computing some gradient operator over the image and using its value to define as invalid those pixels that fall beyond a certain threshold. This approach gives an edge-preserving smoothing.
See also
Gaussian filter
References
Image noise reduction techniques |
https://en.wikipedia.org/wiki/List%20of%20number-one%20Billboard%20Latin%20Pop%20Airplay%20songs%20of%202016 | The Billboard Latin Pop Airplay is a chart that ranks the best-performing Spanish-language Pop music singles of the United States. Published by Billboard magazine, the data are compiled by Nielsen SoundScan based collectively on each single's weekly airplay.
Chart history
References
United States Latin Pop
2016
2016 in Latin music |
https://en.wikipedia.org/wiki/Lattice%20and%20bridged-T%20equalizers | Lattice and bridged-T equalizers are circuits which are used to correct for the amplitude and/or phase errors of a network or transmission line. Usually, the aim is to achieve an overall system performance with a flat amplitude response and constant delay over a prescribed frequency range, by the addition of an equalizer.
In the past, designers have used a variety of techniques to realize their equalizer circuits. These include the method of complementary networks; the method of straight line asymptotes; using a purpose built test-jig; the use of standard circuit building blocks,; or with the aid of computer programs. In addition, trial and error methods have been found to be surprisingly effective, when performed by an experienced designer.
In video or audio channels, equalization results in waveforms that are transmitted with less degradation and have sharper transient edges with reduced overshoots (ringing) than before. In other applications, such as CATV distribution systems or frequency multiplexed telephone signals where multiple carrier signals are being passed, the aim is to equalize the transmission line so that those signals have much the same amplitude. The lattice and bridged-T circuits are favoured for passive equalizers because they can be configured as constant-resistance networks such as the Zobel network, as pointed out by Zobel and later by Bode.
The single word description “equalizer” is commonly used when the main purpose of the network is to correct the amplitude response of a system, even though some beneficial phase correction may also be achieved at same time. When phase correction is the main concern, the more explicit term "phase equalizer" or "phase corrector" is used. (In this case, the circuit is usually an all-pass network which does not alter the amplitude response at all such as the lattice phase equalizer).
When equalizing a balanced transmission line, the lattice is the best circuit configuration to use, whereas for a single-ended circuit with an earth plane, the bridged-T network is more appropriate. Although equalizer circuits, of either form, can be designed to compensate for a wide range of amplitude and phase characteristics, they can become very complicated when the compensation task is difficult, as is shown later.
A variety of methods has been used to design equalizers and some of these are described below. Several of the procedures date back to the early part of the 20th century when equalizers were needed by the rapidly expanding telephone industry. Later, with the advent of television, the equalisation of video links became very important too.
Amplitude correction
The aim of an equalizer network is to correct for deficiencies in the amplitude response of a transmission line, lumped element network or amplifier chain. Equalisation is often necessary with transmission lines and lumped element delay lines which tend to have increasing loss with frequency. Without |
https://en.wikipedia.org/wiki/List%20of%20people%20and%20organisations%20named%20in%20the%20Paradise%20Papers | This is a list of people and organisations named in the Paradise Papers as connected to offshore companies. The International Consortium of Investigative Journalists stated in their politicians database, as a disclaimer, "There are legitimate uses for offshore companies and trusts. We do not intend to suggest or imply that any people, companies or other entities included in the ICIJ Offshore Leaks Database have broken the law or otherwise acted improperly."
Government officials
Current or former heads of state or government of their country as defined by their political position at the time of announcement, not whether the documents in the Papers relating to them coincided with their period of office.
Heads of state
Former heads of state
Elizabeth II, former Queen of the United Kingdom and the other Commonwealth realms
José María Figueres, former President of Costa Rica
Juan Manuel Santos, former President of Colombia
Ellen Johnson Sirleaf, former President of Liberia
Petro Poroshenko, former President of Ukraine
Heads of government
Former heads of government
Shaukat Aziz, former Prime Minister of Pakistan
Jean Chrétien, former Prime Minister of Canada
Alfred Gusenbauer, former Chancellor of Austria
Yukio Hatoyama, former Prime Minister of Japan
Paul Martin, former Prime Minister of Canada
Brian Mulroney, former Prime Minister of Canada
Gerhard Schröder, former Chancellor of Germany
Hamad bin Jassim bin Jaber Al Thani, former Prime Minister of Qatar
Cabinet officials
Argentina
Juan José Aranguren, Minister of Energy
Luis Caputo, Minister of Finance
Brazil
Blairo Maggi, Minister of Agriculture
Henrique Meirelles, Minister of Finance
India
Ashok Gehlot, former Chief Minister of Rajasthan
Sachin Pilot, former Minister of Corporate Affairs
Y. S. Jaganmohan Reddy, Opposition Leader, Andhra Pradesh
Kazakhstan
Mukhtar Ablyazov, former Minister of Energy and Trade
Sauat Mynbayev, Minister of Oil and Gas
Kenya
Sally Kosgei, former Minister of Agriculture
Lebanon
Adnan Kassar, former Minister of State and Minister of Economy and Trade
Mexico
Pedro Aspe, former Secretary of Finance and Public Credit
Alejandro Gertz Manero, former Secretary of Public Security
Serbia
Nenad Popović, Minister without portfolio
United States
Steven Mnuchin, former Secretary of the Treasury
Penny Pritzker, former Secretary of Commerce
Wilbur Ross, former Secretary of Commerce
Rex Tillerson, former Secretary of State
Members of legislatures
Canada
Leo Kolber, former member of the Senate
European Union
Antanas Guoga, Member of the European Parliament
India
Vijay Mallya, former member of the Rajya Sabha and son of businessman Vittal Mallya
Jayant Sinha, member of the Lok Sabha and Minister of State for Civil Aviation
Ravindra Kishore Sinha, member of the Rajya Sabha
Iraq
Mudhar Shawkat, former member of the Council of Representatives
Japan
Masamitsu Naito, member of the House of Council |
https://en.wikipedia.org/wiki/The%20Strawberry%20Shortcake%20Movie%3A%20Sky%27s%20the%20Limit | The Strawberry Shortcake Movie: Sky's the Limit is a 2009 computer-animated adventure film directed by Michael Hack and Mucci Fassett. It serves as the pilot for Strawberry Shortcake's Berry Bitty Adventures, a series that aired one year after the film's release. It also takes place after a pilot cartoon based on it.
Synopsis
After the Berryworks water supply is blocked by a giant rock brought down by a lightning storm, Strawberry Shortcake and her friends are desperate to find a water source before they will have to evacuate their hometown, Berry Bitty City, for good to live in another region far away, but also a large source of water. She then hears the legend about an ancient artifact found in the mountains to expose eternal water when revealed to sunlight. She and her friends head off on a quest to retrieve the object and try to save the city with it, but unknown to them, the main "legend" is actually a false hoax.
Production
When Hasbro had won the TV license from Playmates in 2008, American Greetings, the original owner of the Strawberry Shortcake franchise, announced a new series to debut in 2010, but would first produce a pilot cartoon and a film to introduce the new setting. The film first began production in August and ended later in June 2009. It was first screened in the FOX Studios in Los Angeles on July 31. It was then directly released on DVD and Blu-Ray by 20th Century Fox on September 15 the same year and was also distributed by Kidtoon Films in April 2011.
In France, it made its premiere as a TV movie on Playhouse Disney on December 5, 2009 and was later released on DVD on December 9.
Cast
Anna Cummer as Strawberry Shortcake
Ashleigh Ball as Plum Pudding/Berrykin #2
Ingrid Nilson as Raspberry Torte
Janyse Jaud as Orange Blossom/Berrykin #3
Britt McKillip as Blueberry Muffin/Small Berrykin
Andrea Libman as Lemon Meringue/Princess Berrykin
Paul Dobson as Mr. Longface/Construction Berrykin/Berrykin #1
Reception
Common Sense Media gave the film 2 out of 5 stars.
References
External links
2009 films
2009 fantasy films
2009 direct-to-video films
2009 computer-animated films
2000s American animated films
2000s French animated films
2000s children's adventure films
2000s children's fantasy films
2000s children's animated films
2000s fantasy adventure films
2000s English-language films
American computer-animated films
American children's animated adventure films
American children's animated fantasy films
American fantasy adventure films
American direct-to-video films
American television series premieres
Canadian computer-animated films
Canadian children's animated films
Canadian animated fantasy films
Canadian fantasy adventure films
Canadian direct-to-video films
Canadian television series premieres
French computer-animated films
French children's adventure films
French animated fantasy films
French fantasy adventure films
Direct-to-video animated films
Television films as pilots
Reboot films
Strawberry Shortcake |
https://en.wikipedia.org/wiki/North%20Atlantic%20Convoy%20Raider | North Atlantic Convoy Raider is a wargame published by Microcomputer Games for TRS-80, Commodore PET, and Apple II in 1980. An Atari 8-bit family version was released in 1981.
Contents
North Atlantic Convoy Raider is a game where the player controls the Bismarck on its military maneuvers against British convoys and warships in the North Atlantic.
Reception
David Boyle reviewed North Atlantic Convoy Raider in The Space Gamer No. 35. Boyle commented that "The game overall is worthwhile for anyone who enjoys putting his wits against the computer, and doesn't mind a little luck playing a part."
Reviews
Moves #56, p26-27
References
External links
Review in 80 Micro
Review in The Addison Wesley Book Of Atari Software 1984
Review in Creative Computing
1980 video games
Apple II games
Atari 8-bit family games
Commodore PET games
Computer wargames
Microcomputer Games games
Naval video games
Ship simulation games
TRS-80 games
Video games developed in the United States |
https://en.wikipedia.org/wiki/Space%20and%20Sport%20Games | Space and Sport Games is a 1980 collection of video games published by Creative Computing.
Contents
Space and Sport Games is a compilation of nine simple games, three of which have a space theme.
Reception
Bruce F. Webster reviewed Space and Sport Games in The Space Gamer No. 35. Webster commented that "There are nine games in all on this diskette, all of the same quality. I suspect all nine were placed there because the folks at Creative Computing couldn't justify selling them in smaller groups. I'm not sure they can justify selling them in this large group. Don't buy it."
References
1980 video games
Science fiction video games
Sports video games
Video games developed in the United States |
https://en.wikipedia.org/wiki/Connie%20Kunkle | Connie Leigh Kunkle (April 4, 1958 – December 14, 2016) was an American television personality and singer who was best known as a host on the shopping network ShopHQ (formerly ShopNBC and Evine Live).
Early life
Connie grew up in Indiana, Pennsylvania, to parents Ruth Miller Kunkle and Thomas L. Kunkle. She started developing her musical talent in public schools and performed in the school musicals, choirs, and orchestra. After graduating from Ohio University with a BS in communications, Kunkle's first job was at Walt Disney World as one of the Kids of the Kingdom. A few years later she became an original cast member for Top of the World, also at Disney World.
Career
Kunkle went on to have an extensive career on stage and television. Her career spanned 40 years, including touring with the original cast of Andrew Lloyd Webber’s The Music of Andrew Lloyd Webber, starring opposite Tim Curry in Me and My Girl, starring opposite Donny Osmond in Joseph and the Amazing Technicolor Dreamcoat, and starring as Fantine in Les Misérables. Her concerts include many performances with the Orlando Philharmonic Orchestra and the Queen’s Royal Marine Band in England. In addition to many television hosting opportunities, which included hosting infomercials, she spent the past 11 years as an on-air host for ShopNBC/Evine Live where she started to work there in 2004. In December 2010, Kunkle released her own Christmas album titled Connie Kunkle Christmas.
Personal life
Kunkle had three sisters, Judy Kunkle King Skelton of College Station, Texas; Patti Kunkle of Atlanta, Georgia; and Debbie Kunkle-Bramblett of Huntsville, Alabama. She also had nieces and nephews as well as a “chosen family” made up of a number of close friends.
Death
In 2015, Kunkle was diagnosed with frontotemporal dementia. In the last few months of her life, she transitioned to a memory care facility in College Station where she received loving care from her family. Kunkle died in her sleep on December 14, 2016, due to complications from the disease. She was 58 years old. She was laid to rest at Greenwood Cemetery (Orlando, Florida).
Discography
Connie Kunkle Christmas (December 1, 2010)
References
1958 births
2016 deaths
American television personalities
American women television personalities
People from Indiana, Pennsylvania
Ohio University alumni |
https://en.wikipedia.org/wiki/Poisk%20%28computer%29 | Poisk (, "The Search") is an IBM-compatible computer built by KPO Electronmash () in Kyiv, Ukrainian SSR during the Soviet era. It is based on the K1810VM88 microprocessor, a clone of the Intel 8088. Developed since 1987 and released in 1989, it was the most common IBM-compatible computer in the Soviet Union.
The basic version did not include an expansion module for parallel or serial ports for connecting a printer, mouse or other devices. The computer had 128 KB of RAM, and displayed CGA graphics.
It was not fully IBM compatible, despite being hardware-identical, and its performance lagged behind the IBM XT. Poisk entered mass production in 1991, just before the Soviet collapse, and production output in the early 1990s reached several tens of thousands units a year.
References
Ministry of Radio Industry (USSR) computers
Computer-related introductions in 1989 |
https://en.wikipedia.org/wiki/Sabine%20S%C3%BCsstrunk | Sabine Süsstrunk is a computer scientist and professor at Ecole Polytechnique Fédérale de Lausanne (EPFL) in Switzerland, where she leads the Images and Visual Representation Lab in the School of Computer and Communication Sciences. Her research areas are in computational imaging and computational photography, color image processing (including spectral sensitivity) and computer vision, and image quality and computational aesthetics. She is a fellow of the Institute of Electrical and Electronics Engineers and Society for Imaging Science and Technology and received the Society of Imaging Science and Technology and International Society for Optics and Photonics 2013 Electronic Imaging Scientist of the Year Award.
From 2015 to 2020, Süsstrunk was the first director of the Digital Humanities Institute in the College of Humanities at EPFL, and the first director of the Master of Science in the Digital Humanities program.
From 2016 to 2020, Süsstrunk was a member of the Foundation Council and Executive Committee of the Swiss National Science Foundation. Furthermore, she acted as President of the EPFL WISH Foundation (2014-2018) where she is still member of the board. On January 1, 2018, she joined the Board of Directors of the Swiss Broadcasting Corporation. As of 2021, Süsstrunk is the president of the Swiss Science Council.
References
External links
Sabine Süsstrunk at EPFL
Year of birth missing (living people)
Living people
Swiss computer scientists
Swiss women computer scientists
Academic staff of the École Polytechnique Fédérale de Lausanne |
https://en.wikipedia.org/wiki/Dell%20EMC%20Data%20Domain | Dell EMC Data Domain was Dell EMC’s data deduplication storage system. Development began with the founding of Data Domain, and continued since that company’s acquisition by EMC Corporation (and EMC’s later merger with Dell to form Dell EMC).
History
The technology started in a separate company, which was then acquired and re-branded twice.
Data Domain Corporation
The Data Domain Corporation was founded by Kai Li, Ben Zhu, and Brian Biles in 2001 as a company specializing in target-based data deduplication products for disk-based backup.
Hugo Patterson joined as chief architect 3 months after initial funding.
The company started operations in a series of venture capital offices around Palo Alto, California, pre-funding at U.S. Venture Partners, where Zhu was an entrepreneur in residence (EIR), then at New Enterprise Associates (NEA), where Li was an EIR, and post-funding at Greylock Partners.
NEA and Greylock provided Series A funding in 2002.
The first product revenue was realized in the beginning of 2004.
Funding, IPO and Acquisition
NEA and Greylock led the company’s $9.3 million Series A funding round in 2002. Sutter Hill Ventures led its $17 million Series B funding round in 2003, joined again by NEA and Greylock. Through 2005, the three companies invested a total of $40 million in Data Domain.
The company had their initial public offering on June 27, 2007, with a total market capitalization of $776.5 million, above its forecast range despite years of losses. This put the stock price at $15 per share, above the forecasted range of $11.50 to $13.50. The company’s market capitalization was $776.5 million at the time of the IPO. It was listed on Nasdaq with symbol DDUP.
EMC Data Domain
In May 2009, NetApp announced it would acquire Data Domain for about $1.5 billion. In June 2009, EMC Corporation announced their intention to acquire Data Domain Corp for $2.4 billion, outbidding the previous offer. In July, the two companies agreed to the acquisition. Post-acquisition, Data Domain would operate as a brand and line of products under EMC, known as EMC Data Domain.
Former CEO Frank Slootman published a book about his experiences in 2011.
Since acquiring Data Domain, EMC integrated the Data Domain platform with its Data Protection Suite software and expanded software enhancements. According to a 2013 analysis sponsored by EMC, Data Domain reduced loss of user productivity from backup, restore, and retrieval operations.
Dell EMC Data Domain
In 2016, EMC merged with Dell to become Dell EMC, which continued the Data Domain brand until 2019. During this period, the brand was named Dell EMC Data Domain. On September 24, 2019, Dell EMC announced via blog post that Data Domain products will be branded as PowerProtect DD products going forward.
Technologies
The goal of the Data Domain technology was to eliminate logistical concerns of using backup or archival tape libraries, by implementing a suitable disk-based substitute for backup tapes. I |
https://en.wikipedia.org/wiki/TALC%2B | The Tanker Airborne Long-range Communication Plus (TALC+) Kit is a USAF satellite communication system for low-data-rate, classified communications. TALC+ includes an Iridium radio-modem, an antenna installed in the sextant port, a strong encryption device, a classified laptop computer, a handset, and a headset within a carry-on sized case.
TALC+ provides KC-135 aircraft affordable, secure, global, and simple communication. TALC+ can call almost any telephone worldwide for non-secure voice communication, talk up to Secret with STEs (or other SCIP-based telephones), or join chatrooms on SIPRNet.
TALC+ may be customized, renamed, and certified for other platforms such as KC-10s, C-130s, and other Iridium-compatible aircraft, trucks or buildings.
TALC+ was created by the Air Force Research Laboratory's Center for Rapid Innovation and NAL Research Corporation in response to requests from AMC and AFGSC leadership needs. TALC+ has been purchased by the Air Mobility Command and
on the MC-130J
To watch a four-chapter video explaining how to use and install TALC+, just CAC-into milTube and search for TALC+.
References
Communications satellites |
https://en.wikipedia.org/wiki/Pilgrim%20%28video%20game%29 | Pilgrim is a text adventure game by CRL that runs on the Commodore 64 computer.
Plot
After facing a massacre at the wrath of the Silvian army, the player character goes on quest around the land of Meridan to revive the Guardian in order to save the land from the Silvian's carnage.
Gameplay
Most of the text in the screen describe the current whereabouts and situation of the player. The player needs to type in a set of text commands to interact with the location and progress with the quest.
Reception
Reviews
Jeux & Stratégie #41
References
External links
1986 video games
Adventure games
Commodore 64 games
Commodore 64-only games
Video games developed in the United Kingdom |
https://en.wikipedia.org/wiki/Mar%C3%ADa-Esther%20Vidal | María-Esther Vidal Serodio is a Venezuelan professor at the Computer Science Department of the Simón Bolívar University since 2005 and dean assistant for research and development in applied science and engineering since 2011, on-leave since 2015. She currently leads the Semantic Web Group, which includes members from multiple fields such as databases, distributed systems and artificial intelligence, and whose research is focused on the solving problems from said fields.
Career
Esther Vidal graduated as a computer engineer from the Simón Bolívar University in 1987, with a master in computer science in 1991 and as a doctor in computer science in 2000. From 1995 to 1999 she was faculty research assistant of the Institute of Advanced Computer Studies (UMIACS) in the University of Maryland. In 2011 she became the director of direction for faculty development of the Simón Bolívar University. Since 1988 she has advised and mentored more than 80 students: 65 undergraduate, 10 master, and 7 PhD. As a PhD student, she worked with Louiqa Raschid from the University of Maryland, College Park.
In 2020, Esther Vidal was awarded in Germany with a honorific mention as one of the 50 most influential personalities of Computer Science Engineering in the last decade, as well as number four female researcher in the list. She is currently the director of the Scientist Data Management Group of the German National Library of Science and Technology and member of the L3S Research Centre of Leibniz University Hannover.
Esther Vidal has published more than 160 peer-reviewed papers in semantic web, databases, bioinformatics, and artificial intelligence, co-authored one monograph and co-edited books and journal special issues. She has addressed the challenges of creating knowledge graphs to support precision medicine; these techniques are being applied in projects like iASiS and BigMedylitics, and for over 15 years she has participated in international projects in collaboration with Louiqa Raschid from the University of Maryland, College Park. She is also part of various editorial boards and has been the general chair, co-chair, senior member, and reviewer of several scientific events and journals, a supervisor of MSCA-ETN projects WDAqua and NoBIAS, a visiting professor of universities such as Uni Maryland, KIT Karlsruhe.
References
External links
Curriculum vitae (PDF)
Research profile of Vidal at TIB
Living people
Academic staff of Simón Bolívar University (Venezuela)
Venezuelan women scientists
Semantic Web people
Year of birth missing (living people)
Venezuelan women educators |
https://en.wikipedia.org/wiki/Integrated%20route%20network | An integrated route network is one that allows the traveller to experience a safe, convenient, and comfortable trip door-to-door. Segments of journeys are continuous in space, services are scheduled to minimize waiting times, and ticketing or other administrative tasks are reduced to the minimum. The concept may be applied to single transport modes or to combinations. Key elements include coordinated planning, continuous infrastructure, carefully timed operations, and information to users.
Planning
In order to achieve an integrated network including different modes of transport, all agencies responsible for the various modes must work effectively together. If they are fragmented, and especially if they are in direct competition with each other, effective joint working is unlikely.
Traveller information
Prospective travellers must be able to access information about their possible journey. For public transport services, travellers should be able to access real-time information on services, or should (in high-use areas) be confident that the next service will arrive very shortly.
References
Intermodal transport |
https://en.wikipedia.org/wiki/The%20President%27s%20Keepers | The President's Keepers: Those Keeping Zuma in Power and out of Prison a 2017 book by Jacques Pauw, a South African investigative journalist, about allegedly corrupt and compromised power networks in the South African government under President Jacob Zuma.
Synopsis
In eighteen chapters and an epilogue, the book details the creation and functioning of a "shadow mafia state" created by and surrounding President Jacob Zuma. Pauw makes a number of serious allegations about Zuma, including that he did not pay taxes during his presidency, that he was illegally paid R1 million ($70,000) a month by a private company while president, that he failed to pay back loans, and that he has poor financial acumen.
The book also makes a number of accusations concerning criminal and other misconduct by various associates of Zuma. These include that the Gupta family groomed the children of African National Congress (ANC) politicians to gain political influence and that Nkosazana Dlamini-Zuma's 2017 campaign for ANC president was funded by a cigarette company engaged in corruption. It also contains details of the state capture of the South African Revenue Service (SARS) and the wasteful creation of a R1-billion (around US$70,000,000) spy network within the State Security Agency (SSA) that allegedly engaged in widespread corruption.
Reception
Within four days of the book's publication it was cited in parliamentary questions directed at the president by the opposition Democratic Alliance. On 3 November 2017, the SSA issued a cease and desist letter against Pauw and NB Publishers, arguing that the book contravened the Intelligence Service Act. SARS also stated that they would consider initiating criminal charges against Pauw for publicising confidential tax records. The actions by the SSA and SARS were criticised as censorship by civil society organisations including the Right2Know Campaign and Corruption Watch, as well as by the South African Communist Party. The Public Protector, Busisiwe Mkhwebane, also cautioned the public against purchasing the book, and the family of SSA head Arthur Fraser said that they would consider taking legal action against Pauw for what they said were inaccuracies in the book.
NB Publishers and various book stores said that they would continue to distribute the book, which they said contained factual information that was in the public interest. Indeed, fear that the book would be banned caused a spike in its sales: it sold out of its first print run of 20,000 books within 24 hours of the SSA's cease and desist letter and became an international best seller. Because of the resulting shortage of books, combined with the threat of censorship, a digitally pirated version of the book was widely shared in the week after the cease and desist letter.
A launch of the book on the evening of Wednesday 8 November 2017 was cancelled after a power outage. During the launch, Pauw told attendees that he expected to spend years fighting legal battle |
https://en.wikipedia.org/wiki/Elektronika%20MS%201504 | Elektronika MS 1504 () was the first, and reportedly only, laptop computer to be manufactured in the Soviet Union. Produced by the "Integral" Scientific Production Association in 1991, it was a clone of the Toshiba T1100 Plus.
References
Ministry of the Electronics Industry (Soviet Union) computers |
https://en.wikipedia.org/wiki/Kanchana%20Kanchanasut | Kanchana Kanchanasut () is a Thai computer science professor at the Asian Institute of Technology who became the first Thai person to use email. She hosted the first server in Thailand connected to the Internet and registered Thailand's country code top-level domain .th in 1988. Kanchanasut was inducted into the Internet Hall of Fame in 2013.
Early life and education
Kanchanasut graduated from the University of Queensland in 1974 with a Bachelor of Science in mathematics and an additional diploma in computer science. She moved on to the University of Melbourne in 1979 to complete a Master of Science and later returned to Melbourne for a Doctor of Philosophy in 1991.
Career
After completing her studies at the University of Melbourne in 1984, she began her career at the Asian Institute of Technology. While at the AIT, Kanchanasut became the first Thai person to use email in 1986 after she co-created a computer network to email universities in Melbourne and Tokyo. After establishing connections to the universities in 1987, Kanchanasut set up Thailand's first server connected to the Internet in 1988. Kanchanasut was elected as the AIT's vice president of research in 2013 and currently teaches computer science.
Outside of her work at the AIT, Kanchanasut registered the country code top-level domain .th for Thailand as a computer administrator in 1988. In 2016, she co-led the creation of the first internet exchange point in Bangkok.
Awards and honours
In 2013, Kanchanasut was inducted into the Internet Hall of Fame. In 2016, she was awarded the Jonathan B. Postel Service Award.
References
Living people
Kanchana Kanchanasut
Kanchana Kanchanasut
Academic staff of the Asian Institute of Technology
University of Queensland alumni
University of Melbourne alumni
Year of birth missing (living people)
Kanchana Kanchanasut
Kanchana Kanchanasut |
https://en.wikipedia.org/wiki/Tram%20%C4%B0zmir | Tram İzmir, alternatively known as İzmir Tram (), is a tram network in İzmir, Turkey. Owned by the İzmir Metropolitan Municipality and operated by İzmir Metro A.Ş., the system consists of two separate, unconnected lines: one in Karşıyaka, which opened on 11 April 2017, and the other in Konak, which opened on 24 March 2018.
The operating length is and consists of a total 33 stations. The total cost of these two lines is about ₺450 million (approx. US$120 million).
History
The first tram line in İzmir opened in 1890, between Alsancak Terminal and Pasaport pier. The Alsancak-Pasaport portion was abandoned in 1956 and the last remaining line in İzmir (Konak-Pasaport) was taken up in the early 1960s. Automobile traffic rose greatly in the decades that followed and in the early 2000s, the city was plagued with congestion in central areas.
In 2009, the Metropolitan Municipality released an overall transportation plan for the city. The plan included the construction of three new tram lines: one in Konak, Karşıyaka and in Buca respectively. These three lines were to be integrated with the city's metro line as well as the two commuter rail lines. Construction was originally expected to start by the end of 2011; however, due to the delayed Environmental Impact Report, this date was pushed back to 2015. In 2013, the Municipality secured necessary funding from the Ministry of Development and finalized system plans in 2014. In the finalized plan, the Buca Tram line was removed due to pressure from the Ministry of Transport. Construction began in April 2015 on the Karşıyaka Tram, and in November 2015 on the Konak Tram.
The first tram vehicles were delivered in 2016 and showcased at the İzmir International Fair in August of the same year. The rest of the vehicles were delivered in February 2017.
The general name of the system was branded Tram İzmir by the Metropolitan Municipality.
Karşıyaka Tram Line
The Karşıyaka Tram is long. It has 14 stations and began operation in April 2017. The tram line begins at Alaybey as a single track line with passing loops. After Karşıyaka station, the line proceeds with two tracks on the Alaybey bound side of Cemal Gürsel Avenue. Between Yunuslar and Bostanlı the Ataşehir bound track crosses Cemal Gürsel Avenue and the line proceeds on both sides of the road. After crossing Bostanlı Creek, the line runs through Cengiz Topel Street. The tramline then continues through the median of Dudayev Blvd. The depot is located next to Çevre Yolu station.
Konak Tram Line
The Konak Tram is long. The line serves 19 stations and began operating on 24 April 2018. The entire line is double track. The Halkapinar and Fahrettin Altay bound tracks run on opposite sides of the Mustafa Kemal Sahil Boulevard from Fahrettin Altay station to Sadık Bey Station. Then after Sadık Bey, the two lines run parallel to each other, between the seaside and the west-bound Mustafa Kemal Sahil Boulevard. The Tramline turns inland at Gazi Boulevard and the |
https://en.wikipedia.org/wiki/Trolls%3A%20The%20Beat%20Goes%20On%21 | Trolls: The Beat Goes On! is an American animated streaming television series produced by DreamWorks Animation. The show, based on the 3D computer-animated comedy musical film Trolls, was released on Netflix on January 19, 2018, exclusively in the United States, Canada, Latin America, United Kingdom, Ireland, Australia, New Zealand, the Nordics, Benelux, and France, and takes place between the events of the first film and the sequel, Trolls World Tour. Amanda Leighton, Skylar Astin, Kari Wahlgren, Sam Lerner, David Kaye, David Fynn, Sean T. Krishnan, Kevin Michael Richardson, and Fryda Wolff provide the new voices for Princess Poppy, Branch, Bridget, King Gristle, King Peppy, Biggie and Mr. Dinkles, Guy Diamond, Smidge, DJ Suki and Satin & Chenille for this series respectively; only Ron Funches and Walt Dohrn reprise their roles as Cooper and Cloud Guy, also respectively. Matt Lowe also voices Creek in the series, who returns in "Creek Week".
Hannah Friedman, Sam Friedman, and Matthew Beans developed the series, with music from Alex Geringas and original songs by Alana Da Fonseca. James Zahn of The Rock Father confirmed that there would be a second season, which was released on March 9 and consists of seven episodes.
The third season was released on August 24, 2018, the fourth season on November 2, 2018, the fifth season on January 18, 2019, the sixth season on April 9, 2019, the seventh season on August 27, 2019, and the eighth and final season was released on November 22, 2019.
A new Trolls series called Trolls: TrollsTopia was released on Hulu on November 19, 2020. It was also released on Peacock on the same day.
Cast and characters
Main characters
Amanda Leighton as Queen Poppy, the excitable and optimistic queen of the Trolls
Skylar Astin as Branch, an over-cautious, but good-hearted survivalist Troll and Poppy's best friend
David Fynn as:
Biggie, a large, friendly Troll
Mr. Dinkles, Biggie's pet worm
Fryda Wolff as:
DJ Suki, a cheerful and positive Troll who uses DJ equipment made of insects
Satin and Chenille, twin Trolls with a flair for fashion design and conjoined by their hair. Satin is very cheerful and talkative while Chenille is calm and sassy.
Ron Funches as Cooper, a giraffe-like Troll
Sean T. Krishnan as Guy Diamond, a glittery, naked Troll with a highly auto-tuned voice
Kevin Michael Richardson as Smidge, a small, inordinately strong female Troll with a masculine voice
Supporting characters
David Kaye as King Peppy, the former king of the Trolls and Poppy's father
Sam Lerner as King Gristle Jr., the king of the Bergens
Kari Wahlgren as:
Bridget, a Bergen who is a former scullery maid, Gristle Jr's girlfriend, and Poppy's best friend
Harper, a very artistic, creative, sassy, jocund, competitive and optimistic Troll who loves to paint
Matt Lowe as Creek, a Troll with zen-like wisdom and Branch's treacherous rival
Gary Cole as Sky Toronto, the boss and owner of Sky Toronto's Party Shop
Declan Churchil Ca |
https://en.wikipedia.org/wiki/Max%20Monroe%3A%20Loose%20Cannon | Max Monroe: Loose Cannon is an American television drama series. It ran one season.
Created by Dean Hargrove and Joel Steiger, it ran on the CBS Television Network from January 5, 1990 to April 19, 1990.<ref>Terrace, Vincent. Encyclopedia of Television Shows, 1925 through 2007 (Jefferson, North Carolina: McFarland & Co., 2008), p.971.</ref> The show centered around a Los Angeles Police Department detective with unconventional methods, who always manages to "get his man". The theme song was performed by Yello.
Cast of characters
Detective Max Monroe--Shadoe Stevens
Detective Charlie Evers--Bruce A. Young
Captain Farraday--David Schramm
Loretta Evers--Arnetia Walker
Episodes
Notes
Sources
Terrace, Vincent. "Max Monroe" in Encyclopedia of Television Shows, 1925 through 2007''. Jefferson, North Carolina: McFarland & Co., 2008.
External links
1990 American television series debuts
1990 American television series endings
Television shows set in Los Angeles
English-language television shows
CBS original programming
1990s American crime drama television series
Serial drama television series
Television shows filmed in Los Angeles
Television series by CBS Studios |
https://en.wikipedia.org/wiki/Sam%20Shahidi | Sam Shahidi (born August 1, 1983) is a businessperson and co-founder of Shots Podcast Network and CEO of Happy Dad Hard Seltzer. Also, a partner of the popular YouTube group, Nelk Boys.
In 2009, he and his brother John Shahidi started the video game development company RockLive, where they developed mobile games for athletes such as Cristiano Ronaldo and Mike Tyson. In 2013, RockLive became Shots Mobile before becoming Shots Podcast Network.
Early life
Sam Shahidi was born to an Iranian Kurdish family in Los Angeles, California.
He and his older brother John Shahidi grew up in Southern California. They were raised by their mother and grandmother.
Career
RockLive
John and Sam Shahidi started developing iOS apps in 2009 and started out as a video game development company called Rock Software, later renamed RockLive. Their first commercial app was RunPee.
The Shahidis were childhood friends of football players Carson and Jordan Palmer. The Shahidis ran Chad "Ochocinco" Johnson's social media, and developed his two apps, Chad Ochocinco Experience, and its follow-up, MadChad.
Between 2009 and 2012, they developed additional apps for celebrity athletes, including Usain Bolt, Terrell Owens, Ronaldo and Mike Tyson. To promote the game Mike Tyson Main Event in 2011, Shahidi rented a boxing ring during the festival South by Southwest in Austin, Texas, with Tyson making an appearance.
Shots app
RockLive was rebranded to Shots Mobile. Shots, a selfie photo sharing app, was released in November 2013. It was intended as an anti-bullying social media network. The inspiration for the app came after Facebook was forced take down a page that attracted cyberbullying. As a child, Shahidi had been bullied due to his Iranian Kurdish heritage. In Shots, photos had to be taken real-time, without the use of filters or other editing material and users could not comment on pictures or see how many "likes" other people received. "Your social status doesn't matter inside Shots. It's about expressing your feelings in a picture, which is why we don't allow comments. We never want our users hurt, harmed or bullied by what they read about themselves on social media — it's about signaling what you're feeling inside", Shahidi's brother John said.
Shots had a user base of 10 million people. At one point, Twitter was in talks to buy the app for US$150 million.
Shots raised $15.2 million in funding. Investors included boxer Floyd Mayweather and singer Justin Bieber, who, through involvement in Shots, became friends with the Shahidis. Bieber lost to Shahidi in a drinking contest in September 2015.
In its first 18 months, Shots gained 1.8 million daily active users. Due to the strong competition from other photo and video sharing apps like Instagram and Snapchat, its number of users dropped from 7 million in March 2016 to 2.5 million in October 2016. Notable users included Snoop Dogg, Shaquille O'Neal and future Shots Studios artists Rudy Mancuso and Lele Pons.
Shots Studi |
https://en.wikipedia.org/wiki/Dwijesh%20Dutta%20Majumdar | Dwijesh Kumar Dutta Majumder INSA (1932-2020) was a Professor Emeritus in the Computer and Communication Sciences Division of the Indian Statistical Institute, Kolkata and Honorary Director-Secretary of the Institute of Cybernetics Systems and Information Technology in the same city. He is also an Emeritus Scientist of the Council of Scientific & Industrial Research, operated by the Government of India.
Career
Dwijesh Kumar Dutta Majumder obtained a BSc (Hons) in physics honors (1952) with a First Class First distinction from Guwahati University before studying at the Rajabazar Science College, University of Calcutta, where he was awarded an MSc (Tech.) in 1955 and a PhD in 1962–1963 in Radiophysics and Electronics.
Dutta Majumder worked for the Computer Development and Research Division of the Indian Statistical Institute (ISI) and there helped to develop magnetic memory systems and other digital electronic circuits. In particular, he had a role in building the first solid state transistorised computer in India, which was called ISI-JU-1.
In 1964, Dutta Majumder visited the University of Michigan, USA, to work with N. R. Scott on computer system design, pattern recognition and problems related to both computer and human memory, He was awarded a UNDP Fellowship for this purpose.
Upon his return to India after his post-doctoral fellowship in the United States, Dutta Majumder subsequently became Head of the Electronics and Communication Sciences Unit (ECSU), Professor-in-Charge of Physical & Earth Sciences Division, and Joint Secretary and Joint Director of ISI. Upon his retirement as the head of ECSU, he was honored to accept a Professor Emeritus position at the newly formed Knowledge-based Computer Systems (KBCS) division of ISI, which he helped build from the ground up. Dutta Majumder has published over 500 research papers and several books.
Honours & awards
Dutta Majumder has received recognition for his work, including:
Norbert Wiener Award (1977)
IAPR Fellow (1994): First Indian fellow.
P. C. Mahalanobis Medal (1993)
J. L. Nehru Birth Centenary Lecture Award of INSA (1994)
Shri Om Prakash Bhasin Award (1996)
Frank George Research Award (1999)
Rathindra Purashkar from Viswa Bharathi University (2001)
Professor Jnan Chandra Ghosh Award from Bengal Science Association (2003)
Life-time Achievement Award from INAE (2004)
Norbert Wiener Award of Excellence from Western Oklahoma State College (WOSC) (2005)
National Vasvik Award (2008)
He has been elected as a Fellow of the Indian National Science Academy, the Indian National Academy of Engineering and the Academy of Sciences for the Developing World.
Bibliography
References
External links
http://www.tandfonline.com/doi/abs/10.1080/03772063.1969.11485755
http://www.tandfonline.com/doi/abs/10.1080/03772063.1970.11486585
http://www.tandfonline.com/doi/abs/10.1080/03772063.1962.11486338
http://library.isical.ac.in:8080/jspui/bitstream/10263/899/1/IJOP-37-1-1963-P67-100.pdf
Living people
Un |
https://en.wikipedia.org/wiki/Nij%C5%8D%20Tamefuyu | Nijō Tamefuyu (二条為冬, ?–1335), also known as Fujiwara no Tamefuyu (藤原為冬), was a Japanese courtier and waka poet of the late Kamakura period.
He was briefly considered as a possible compiler for the Shokugoshūi Wakashū an imperial anthology of waka, but was opposed by his nephew Nijō Tamesada. Twenty of his poems were eventually included in this and later imperial anthologies, with more in private collections.
He died in 1335 fighting against the winning army of Ashikaga Takauji at the Battle of Takenoshita.
Biography
Ancestry and birth
Tamefuyu's year of birth is unknown. He was the youngest child of Nijō Tameyo, Tameyo himself being a son of Nijō Tameuji, a grandson of Fujiwara no Tameie, and a great-grandson of Fujiwara no Teika.
Political career
At the height of his political career, he held the position of Middle Captain of the Left (左中将).
Death
He died on the twelfth day of the twelfth month of Kenmu 2 (1335/1336). He had been in the army sent to hunt down and kill Ashikaga Takauji, but lost at the and committed suicide.
Name
He was a member of the Nijō branch of the Fujiwara clan, so is known as both Nijō Tamefuyu and Fujiwara no Tamefuyu.
Poetry
Tamefuyu participated in a number of formal waka poetry gatherings, including at the imperial palace, beginning around 1323, when he was present at the Kameyama-dono shichihyaku-shu (亀山殿七百首).
In the seventh month of 1324, when Nijō Tamefuji suddenly dropped out as a compiler of the Shokugoshūi Wakashū, his father Tameyo attempted to replace him with Tamefuyu, who was then probably only in his twenties, but was overruled by Nijō Tamesada.
20 of his poems are included in imperial collections from the Shokugoshūi Wakashū on. Several of his poems are also known from private collections (私撰集 shisenshū), such as the Shoku Gen'yō Wakashū (続現葉和歌集) and the Rin'ei Wakashū (臨詠和歌集). There is a work known as the Zen-sangi Tamefuyu-kyō Shū (前参議為冬卿集, literally "Former Councilor Tamefuyu Collection"), but despite its name this is actually a selection of poems taken from the Waka Dairin Gushō (和歌題林愚抄) rather than a personal anthology compiled by Tamefuyu himself.
References
Works cited
Year of birth unknown
1335 deaths
Fujiwara clan
Nijō family
14th-century Japanese poets |
https://en.wikipedia.org/wiki/Argus%20Cyber%20Security | Argus Cyber Security is an Israeli automotive cyber security company. It was purchased by Continental AG in 2017, for $430 million. In October 2017, Argus added a solution to enable OEMs to deliver over-the-air vehicle software updates.
History
The company was founded in 2013, by Ofer Ben-Noon, Oron Lavi, and Yaron Galula, three ex-soldiers of Israel's Unit 8200. The Argus management team includes former employees of Daimler, Fiat Chrysler, and General Motors.
The Israeli startup is headquartered in Tel Aviv, has a team of more than 200 people and offices in Detroit, Silicon Valley, Stuttgart and Tokyo. The company has dozens of pending and granted patents and was identified as a Top 25 Technology Company To Watch by The Wall Street Journal.
As a result of an acquisition in November 2017, Argus Cyber Security is part of Germany's Continental's subsidiary Elektrobit (EB).
In December 2020, Argus Co-founder Ofer Ben-Noon stepped down from his position as CEO and was replaced by Ronen Smoly, previously Argus VP Sales.
Partnerships
In January 2016, Argus partnered with Check Point Software Technologies to extend the Argus offering with Check Point Car Capsule for secure communication between vehicle and the cloud.
In July 2016, Argus was chosen to participate in Startup Autobahn, a joint project run by Daimler AG, Plug and Play, University of Stuttgart and ARENA2036.
Argus partnered with Infineon in November 2016 to create an integrated cyber security solution for central gateway protection.
In January 2017, Argus joined with Elektrobit to create a solution to protect electronic control units (ECU). The same month they announced a combined solution with Qualcomm.
In February 2017, NXP Semiconductors announced its partnership with Argus creating a joint solution including Argus IDPS and NXP Calyso MCU to detect and prevent advanced cyber attacks in real-time.
In July 2017, Argus and Riscure announced a joint 'capture the flag' competition, participants faced challenges simulating real-life automotive cyber security scenarios to win.
In June 2018, Argus partnered with Phantom Auto on a teleoperation safety technology that blocks attacks on connected vehicles.
Awards and recognition
Inc. Top 20 Tech Innovators to watch in 2018
Red Herring 2017 Top 100
The Wall Street Journal 25 Technology Companies to Watch
Fast Company Most Innovative Companies of 2017
Fortune Top 3 Auto Startups of 2016
WIRED Europe's hottest startups 2016
ABIresearch 118 Top Up-and-coming Technology Innovators Set to Disrupt Tech Markets
References
Companies based in Tel Aviv
Israeli brands
Security companies of Israel
Online automotive companies |
https://en.wikipedia.org/wiki/E-Theses%20Online%20Service | E-Theses Online Service (EThOS) is a bibliographic database and union catalogue of electronic theses provided by the British Library, the National Library of the United Kingdom. EThOS provides access to over 500,000 doctoral theses awarded by over 140 UK higher education institutions, with around 3000 new thesis records added every month.
EThOS services
EThOS records thesis data and metadata which can then be searched with basic and advanced search terms.
Data recorded in EThOS
Theses indexed by EThOS have a minimum of a thesis title, author, awarding body and date. Optional additional metadata may be included such as the thesis abstract, doctoral advisor, sponsor, cross links to other databases and the full text of the thesis itself.
the EThOS website gives open access to the full text of around 160,000 UK doctoral theses that have been digitised. Theses can be accessed by freely registering for then logging into EThOS. Open access is also provided by links to the Institutional repository of the awarding body. Since 2015, EThOS has integrated authority control and other unique identifiers including:
The author's ORCID identifier..
The International Standard Name Identifier (ISNI).
The Handle System.
Digital Object Identifiers (DOIs).
Some thesis records include the name of the doctoral advisor.
Doctoral advisor metadata can be used in academic genealogies like academictree.org, Wikidata and the Mathematics Genealogy Project. Academic genealogies in Wikidata are built using the doctoral advisor relation (Property:P184).
Searching EThOS metadata
Where present, metadata can be used as search criteria. So for example, in addition to a basic search, an advanced search facility allows users to search for theses by publication year, awarding body, author's given name, surname, thesis title, doctoral advisor and various other metadata. Data in EThOS can also be accessed programmatically (by machines) using the Protocol for Metadata Harvesting (PMH) from the Open Archives Initiative (OAI), DataCite and its Application Programming Interface (API).
Types of thesis included
As well as indexing Doctor of Philosophy theses, EThOS holds records of other kinds of doctorates including:
Doctor of Medicine (MD) theses, for example Pensée Wu's thesis.
Doctor of Science (ScD or DSc) theses, for example Else Bartels thesis.
Doctor of Engineering (EngD or DEng) theses, for example Chris Dighton's thesis.
Doctor of Professional Studies (ProfD or DProf) theses, for example Andreas Georgiou's thesis.
Doctor of Music (MusD or DMus) and Doctor of Musical Arts (DMA) theses, for example Evaristo Lopez thesis.
Doctor of Education (EdD or DEd) theses, for example Mary Greaves thesis.
Doctor of Philosophy (PhD or DPhil) by prior publication in peer reviewed journals, for example Jill Steward's thesis.
Doctor of Philosophy in creative writing, for example Sally O'Reilly's thesis.
Master's degree theses such as Master of Philosophy (MPhil), Master of R |
https://en.wikipedia.org/wiki/Jay%20Martin%20Tenenbaum | Jay Martin "Marty" Tenenbaum is an American computer scientist and entrepreneur. He is noted for his early work in artificial intelligence and as an Internet commerce pioneer.
Biography
Tenenbaum attended the Massachusetts Institute of Technology for his bachelor's and master's degrees in electrical engineering, graduating in 1964 and 1966 respectively. He then attended Stanford University for his PhD, working under Jerome Feldman. He worked at SRI International as a research scientist in artificial intelligence and ran the AI lab at Schlumberger Palo Alto Research from 1980 to 1988. After Schlumberger moved to Texas, Tenenbaum was unable to find another job as a research lab director and returned to Stanford. There, he worked with James D. Plummer on using the internet to coordinate large engineering projects. He left Stanford in 1990 and founded Enterprise Integration Technologies, which conducted the first commercial internet transaction, the first secure transaction, and the first online auction. He founded the global commerce consortium CommerceNet in 1994 and served as CEO until 1997. In 1997, he co-founded Veo Systems, a spin-off for-profit consulting firm from CommerceNet that pioneered the use of XML for automating business-to-business transactions, and joined Commerce One as Chief Scientist after it acquired Veo Systems in 1999. After leaving Commerce One in 2001, Tenenbaum was an officer and director of Webify Solutions (which was sold to IBM in 2006) and Medstory (which was sold to Microsoft in 2007). He also founded and served as chairman of CollabRx in 2008 and the non-profit network Cancer Commons in 2011.
In 1990, he was elected a fellow of the Association for the Advancement of Artificial Intelligence.
Personal life
In 1995, Tenenbaum was diagnosed with metastatic melanoma. He underwent a Phase III trial of Canvaxin and survived, although the drug ultimately failed clinical trial.
Tenenbaum's son, Joshua Tenenbaum, is a professor of cognitive science at MIT.
References
Living people
American computer scientists
Internet pioneers
MIT School of Engineering alumni
Stanford University alumni
SRI International people
Fellows of the Association for the Advancement of Artificial Intelligence
American Internet company founders
American computer businesspeople
American technology company founders
1945 births |
https://en.wikipedia.org/wiki/List%20of%20Billboard%20Hot%20100%20number%20ones%20of%202018 | The Billboard Hot 100 is a chart that ranks the best-performing songs in the United States. Its data, published by Billboard magazine and compiled by Nielsen SoundScan, is based collectively on each song's weekly physical and digital sales, as well as the amount of airplay received on American radio stations and streaming on online digital music outlets.
During 2018, eleven singles reached number one on the Hot 100; a twelfth single, "Perfect" by Ed Sheeran, solo or duet with Beyoncé, began its run at number one in December 2017. Of those eleven number-one singles, four were collaborations. In total, thirteen acts topped the chart as either lead or featured artists, with nine—Camila Cabello, Young Thug, Childish Gambino, Ty Dolla Sign, XXXTentacion, Bad Bunny, J Balvin, Ariana Grande and Travis Scott—achieving their first Hot 100 number-one single. Drake's "God's Plan" was the longest-running number-one of the year, leading the chart for eleven weeks; it subsequently topped the Billboard Year-End Hot 100. Drake beat the record for most weeks at number one in a year for a single artist, with 29 weeks at number one. XXXTentacion became the first artist to have a posthumous number one since Static Major featured on Lil Wayne's "Lollipop" in 2008 and the first artist to lead the chart with a posthumous number one since The Notorious B.I.G.'s "Hypnotize" in 1997, and is the eighth overall.
Drake and Cardi B were the only acts to have multiple number one songs in 2018, with Drake having the most with three and Cardi B with two.
Chart history
Number-one artists
See also
2018 in American music
List of Billboard 200 number-one albums of 2018
List of Billboard Hot 100 top-ten singles in 2018
Billboard Year-End Hot 100 singles of 2018
Notes
References
United States Hot 100
2018
Hot 100 number-one singles |
https://en.wikipedia.org/wiki/The%20Mentor%20%28TV%20series%29 | The Mentor is an Australian reality television series that first screened on the Seven Network on 23 April 2018. It features Mark Bouris, the founder and chairman of Wizard Home Loans and Yellow Brick Road, who helps struggling small businesses transform into genuine successes.
The series was announced at Seven's upfronts in October 2017. Applications for the series opened in November 2017 and closed on 15 December 2017.
Ratings
References
Australia
Seven Network original programming
2010s Australian reality television series
2018 Australian television series debuts
2018 Australian television series endings
English-language television shows |
https://en.wikipedia.org/wiki/ORSC | ORSC may denote:
Oxidizer-rich staged combustion, in rocket engineering
Open Root Server Confederation, in computing
Oak Ridges Soccer Club, in sports
Organization Science (journal)
Journal of the Operations Research Society of China |
https://en.wikipedia.org/wiki/Arlene%20Hiss | Arlene Hiss (born 1954 according to Mortorsport Database or born 1941) is an American former race car driver and schoolteacher. Hiss has the distinction of being the first woman to start an Indy car race, doing so in the 1976 season. She is the ex-wife of 1972 Indianapolis 500 Rookie of the Year Mike Hiss.
Personal life
Hiss worked as a dance teacher at Fullerton High School in Fullerton, California, and was married to Mike Hiss, 1972 Indianapolis 500 Rookie of the Year, although by the time of her USAC career they were no longer married.
Racing career
Hiss started her racing career in 1964, competing in Sports Car Club of America-sanctioned Showroom Stock racing, winning two California club championships. In 1974, she was named "Most Outstanding Woman Driver" by the Sports Car Racing Enterprises for Women.
In 1976, having received a USAC competition licence for the first two races of the 1976 USAC Championship Car season, she became the first woman to start an USAC Championship Car – "Indy car" – race when she entered the Jimmy Bryan 150 at Phoenix International Raceway. Hiss drove the No. 51 Copper State Racing Eagle 74-Offenhauser that had formerly been driven by Lloyd Ruby. Hiss qualified 21st out of 22 cars with a speed of , while pole sitter Al Unser had a speed of . In the race, Hiss was black flagged for going too slow. She said of this issue "I went up high on the track to let faster cars past. I guess the officials were concerned I was tired, so they brought me in to check. I told them I wasn't and went back out." Hiss ultimately finished in 14th place, albeit with only 128 of 150 laps complete.
Hiss also announced that she would enter the Indianapolis 500 and she tested at Ontario Motor Speedway, a track nearly identical to Indianapolis Motor Speedway. Her best lap speed was around . Ultimately, Hiss was not entered at Indianapolis and Lloyd Ruby drove the car. Instead Hiss moved to the United States Auto Club Stock Car series, running five races over the course of the remainder of the year. Her best finish was a 9th in her first race at Texas World Speedway, driving the No. 9 Steve Drake Dodge Charger, although she finished 20 laps down to winner A. J. Foyt.
Later that year, Hiss entered the 1976 season finale for the NASCAR Winston Cup Series, the Los Angeles Times 500 at Ontario Motor Speedway in the No. 38 Let's Dine Out Chevrolet Monte Carlo owned by Tom Williams (whom Hiss had previously driven for in USAC), but failed to qualify. In 1977, she entered the West Coast 250 at Ontario Motor Speedway, an event for the NASCAR Pro Series West in a Chevrolet, but failed to qualify.
Hiss retired from racing in June 1978, to pursue a business career.
Criticism
During Hiss' brief career in Indy cars, she attracted criticism from people in the sport. Gary Bettenhausen said, "This is a man’s business and she has to be measured by a man’s standards if she is going to compete. By those standards, she didn't measure up." Bobby Unser, who |
https://en.wikipedia.org/wiki/Barbie%20Dolphin%20Magic | Barbie Dolphin Magic or Barbie: Dolphin Magic is a 2017 computer-animated adventure television film directed by Conrad Helten and written by Jennifer Skelly.
The 36th entry in the Barbie film series and the pilot to the Barbie: Dreamhouse Adventures television series, it features the voice of Erica Lindbeck as Barbie and is the only Barbie film to be produced by Mainframe Studios under the name of "Rainmaker Studios" following internal business structure reorganization after consolidation into a division of WOW! Unlimited Media. This marks the first time a Barbie film has neither premiered on American television nor distributed by Universal Pictures, although Universal did release a DVD, video on demand and Digital HD copies of the film.
The film was dedicated to the memory of the production editor David Hall; he and his pregnant wife were killed in a car accident a few months prior to the release of the film.
Plot
A mermaid and her four dolphin companions hide from a ship. The youngest dolphin, named Emerald, curiously goes near the boat and is instantly captured as a rare "gemstone dolphin", as there is a mysterious woman offering a reward for these. The mermaid tells the dolphins to stay put and sets off in pursuit of the boat.
Meanwhile, Ken has taken an internship at a marine biology institute, and has arranged for Barbie and her sisters to stay in a beachside cabin nearby. While scuba diving, Skipper notices a strange animal heading towards the institute, and they follow it in the boat. Upon arrival, they find the perfectly healthy dolphin imprisoned in a cove modified into a recovery tank. Ken concludes that Emerald must have accidentally gotten in when the gate was open. Marlo, the institute's director, stops them from letting Emerald out, saying she has to wait until a vet can see him per protocol.
Once the group leaves, the 'animal' appears and reveals itself as the mermaid, who magically turns her tail to legs and tries to free the dolphin herself; however, Marlo has locked the gate. Barbie spots her, and tells her what Marlo said. The mermaid introduces herself as Isla, and reluctantly agrees to trust Barbie and return next afternoon when the Vet is supposed to be there. The sisters offer her a bed in the cabin, and she proceeds to amuse and puzzle them with her lack of experience with such simple concepts as mattresses, toothbrushes, sisters, dogs, and even sandwiches.
The next day, Emerald's family Ruby, Topaz, and Amethyst show up, and Isla reveals her secret to Barbie while swearing her to silence about it, which Barbie agrees to keep on condition that Isla teach her how to swim like a mermaid. They hear Emerald's cries through a cave, and realize there is an underwater tunnel from the bay into the cove. Isla and the Dolphins try to find the way through to free Emerald, but the cave system is too complex, and they have to give up. Meanwhile, Stacie, Chelsea, and Skipper see a sideshow company's helicopter land at the inst |
https://en.wikipedia.org/wiki/List%20of%20number-one%20digital%20albums%20of%202009%20%28Australia%29 | The ARIA Albums Chart ranks the best-performing albums and extended plays (EPs) in Australia. Its data, published by the Australian Recording Industry Association, is based collectively on the weekly digital sales of albums and EPs.
Chart history
See also
2009 in music
ARIA Charts
List of number-one singles of 2009 (Australia)
References
Digital 2009
Australia albums
Number-one albums |
https://en.wikipedia.org/wiki/ONTAP | ONTAP or Data ONTAP or Clustered Data ONTAP (cDOT) or Data ONTAP 7-Mode is NetApp's proprietary operating system used in storage disk arrays such as NetApp FAS and AFF, ONTAP Select, and Cloud Volumes ONTAP. With the release of version 9.0, NetApp decided to simplify the Data ONTAP name and removed the word "Data" from it, and remove the 7-Mode image, therefore, ONTAP 9 is the successor of Clustered Data ONTAP 8.
ONTAP includes code from BSD Net/2 and 4.4BSD-Lite, Spinnaker Networks technology, and other operating systems.
ONTAP originally only supported NFS, but later added support for SMB, iSCSI, and Fibre Channel Protocol (including Fibre Channel over Ethernet and FC-NVMe). On June 16, 2006, NetApp released two variants of Data ONTAP, namely Data ONTAP 7G and, with nearly a complete rewrite, Data ONTAP GX. Data ONTAP GX was based on grid technology acquired from Spinnaker Networks. In 2010 these software product lines merged into one OS - Data ONTAP 8, which folded Data ONTAP 7G onto the Data ONTAP GX cluster platform.
Data ONTAP 8 includes two distinct operating modes held on a single firmware image. The modes are called ONTAP 7-Mode and ONTAP Cluster-Mode. The last supported version of ONTAP 7-Mode issued by NetApp was version 8.2.5. All subsequent versions of ONTAP (version 8.3 and onwards) have only one operating mode - ONTAP Cluster-Mode.
NetApp storage arrays use highly customized hardware and the proprietary ONTAP operating system, both originally designed by NetApp founders David Hitz and James Lau specifically for storage-serving purposes. ONTAP is NetApp's internal operating system, specially optimized for storage functions at both high and low levels. The original version of ONTAP had a proprietary non-UNIX kernel and a TCP/IP stack, networking commands, and low-level startup code from BSD. The version descended from Data ONTAP GX boots from FreeBSD as a stand-alone kernel-space module and uses some functions of FreeBSD (for example, it uses a command interpreter and drivers stack). ONTAP is also used for virtual storage appliances (VSA), such as ONTAP Select and Cloud Volumes ONTAP, both of which are based on a previous product named Data ONTAP Edge.
All storage array hardware includes battery-backed non-volatile memory, which allows them to commit writes to stable storage quickly, without waiting on disks while virtual storage appliances use virtual nonvolatile memory.
Implementers often organize two storage systems in a high-availability cluster with a private high-speed link, either a Fibre Channel, InfiniBand, 10 Gigabit Ethernet, 40 Gigabit Ethernet, or 100 Gigabit Ethernet. One can additionally group such clusters under a single namespace when running in the "cluster mode" of the Data ONTAP 8 operating system or on ONTAP 9.
Data ONTAP was made available for commodity computing servers with x86 processors, running atop VMware vSphere hypervisor, under the name "ONTAP Edge". Later ONTAP Edge was renamed to ONTAP Select a |
https://en.wikipedia.org/wiki/Martha%20Kwataine | Martha Kwataine is a Malawian health and human rights activist, and the founder and former executive director of the Malawi Health Equity Network (MHEN).
In October 2006, Kwataine founded the Malawi Health Equity Network (MHEN), and became its executive director. MHEN is an "independent alliance of organizations and individuals promoting equity and quality" in health care, and is based in Lilongwe, the capital of Malawi.
In 2010, a MHEN report showed that the government's health department had spent 50-60% of its budget on activities at its headquarters, rather than on facilities across the country. Kwataine commented, "This is money spent on allowances and four-wheel drive vehicles that race in the streets of the capital, yet 80 percent of Malawians are in the rural areas where health problems are forever acute".
In 2012, Kwataine moved to Washington D.C. in the United States to lobby the US government for help and support.
In 2012 Martha Kwataine was chosen by the former president madam Joyce Banda to come the board chair of Malawi communications Regulatory authority MACRA. At MACRA she remained controversial and continued to question the government as an activist at one point she contradicted Joyce Banda whose government had wanted to rehire the then director general.
In November 2015, Kwataine unexpectedly resigned as executive director of the Malawi Health Equity Network. She is reported to have left MEHN to take up a job with ActionAid.
In 2016 Martha kwataine left action aid to go on to head Baobab Health Trust (BHT). In BHT she worked hand in hand with Malawian hospitals to ensure that the hospitals would have electronic medical records they were doing well till when their biggest donor pulled out.
In October 2020 Martha Kwataine left BHT as she was appointed by Rev Dr Lazarus Chakwera to be the presidential advisor on Civil Society Organization and from her remarks she seemed to be pro ruling party
References
Living people
Malawian women
Malawian activists
Malawian feminists
Year of birth missing (living people)
Malawian human rights activists
Malawian women's rights activists |
https://en.wikipedia.org/wiki/Confusion%20network | A confusion network (sometimes called a word confusion network or informally known as a sausage) is a natural language processing method that combines outputs from multiple automatic speech recognition or machine translation systems. Confusion networks are simple linear directed acyclic graphs with the property that each a path from the start node to the end node goes through all the other nodes. The set of words represented by edges between two nodes is called a confusion set. In machine translation, the defining characteristic of confusion networks is that they allow multiple ambiguous inputs, deferring committal translation decisions until later stages of processing. This approach is used in the open source machine translation software Moses and the proprietary translation API in IBM Bluemix Watson.
References
Machine translation
Natural language and computing
Natural language processing |
https://en.wikipedia.org/wiki/Open%20by%20default | Open by Default, as widely used in the contexts of Open Government and Open Data, is the principle in which government makes its data accessible to the public by default, unless there is a sufficient justification to explain that greater public interest may be at stake, as a result of disclosure. Since the principle empowers the public's right to know and capacity to oversee government activities, it is closely associated with government transparency, civic engagement, and e-governance in organizing public life. In many cases, the principle is accompanied with the technological commitment to create "metadata standardization for all datasets, publication of a machine-readable data catalogue or inventory of both released and to-be released datasets ... (and) use of open licenses."
Definition
International Open Data Charter defines Open by Default as one of the six key principles that enable society to enjoy the full benefits of open government data. The other five principles are Timely and Comprehensive Data, Accessible and Usable Data, Comparable and Inter-operable Data, Data for Improved Governance and Engagement, and Data for Inclusive Development and Innovation. While each principles share some overlapping backgrounds, they respectively strive to propose different deliverable qualifications for government entities. The qualifications under Open By Default, as proposed by International Open Data Charter, are roughly as follows:
1) Data that are open must be government data and have significant benefit to the public
2) Government data should be made accessible, clearly communicated, and usable without restriction for the public
3) Government should promote the open data practices
4) Disclosure of government data should not infringe citizens' privacy
5) Government develop and adopt policies and practices to ensure all government data is made open; provide clear justifications as to why certain data cannot be released; establish a culture of openness; develop leadership, management, oversight, performance incentives, and internal communication policies necessary" in "all government departments and agencies; observe and update appropriately domestic laws and internationally recognized standards regarding security, privacy confidentiality, and intellectual property; and anonymity data at its disclosure, to remove sensitive, personally-identifiable data get removed in accordance with privacy legislation and standards.
In the meantime, there are other scholars and institutions that advocate for more rigorous standards, such as disclosure of data collection methodologies, and publishing processes, as they provide more contextual information for measuring the quality of data.
Principles and policies at national governments
United States
In the United States, the early forms of open government data have largely been the weather data released by National Oceanic and Atmospheric A |
https://en.wikipedia.org/wiki/Madhura%20Datar | Madhura Datar is an Indian singer in Bollywood in the Marathi language. She is known for singing the songs of Asha Bhosle.
Early life and education
Datar is from a musical family from the city of Pune in India. She attended Renuka Swaroop Memorial Girls High School there and Sir Parashurambhau College, affiliated to Pune University, from where she obtained a bachelor's degree. She was a student of Shaila Datar and Hridaynath Mangeshkar for her musical training. She has sung in many Marathi movies.
Career
Datar has performed in TV programs like Saregama. She is also a part of the musical program by Hridaynath Mangeshkar named Bhavsargam. Her programs named Diwali Pahat are often performed don Diwali mornings.
She also has an independent program called Swarmadhura. She was appreciated by P L Deshpande for her singing.
Films as playback singer
Rama Madhav (2014)
Baburao cha Pakda (2012)
Parambi (2011)
Dhyanimani (2017)
Source:
Notable songs
"Ashi Kashi Vedi Maya" - lyrics: Dhyanimani
"Lut Liyo Mohe Sham Savre" - Rama Madhav
Awards
Shahu Modak award for newcomer
Ram Kadam smruti puraksar
Zee awards
References
Living people
Indian women playback singers
Tamil-language singers
Marathi-language singers
Singers from Pune
Date of birth missing (living people)
Women musicians from Maharashtra
21st-century Indian singers
21st-century Indian women singers
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/Relative%20likelihood | In statistics, when selecting a statistical model for given data, the relative likelihood compares the relative plausibilities of different candidate models or of different values of a parameter of a single model.
Relative likelihood of parameter values
Assume that we are given some data for which we have a statistical model with parameter . Suppose that the maximum likelihood estimate for is . Relative plausibilities of other values may be found by comparing the likelihoods of those other values with the likelihood of . The relative likelihood of is defined to be
where denotes the likelihood function. Thus, the relative likelihood is the likelihood ratio with fixed denominator .
The function
is the relative likelihood function.
Likelihood region
A likelihood region is the set of all values of whose relative likelihood is greater than or equal to a given threshold. In terms of percentages, a % likelihood region for is defined to be.
If is a single real parameter, a % likelihood region will usually comprise an interval of real values. If the region does comprise an interval, then it is called a likelihood interval.
Likelihood intervals, and more generally likelihood regions, are used for interval estimation within likelihood-based statistics ("likelihoodist" statistics): They are similar to confidence intervals in frequentist statistics and credible intervals in Bayesian statistics. Likelihood intervals are interpreted directly in terms of relative likelihood, not in terms of coverage probability (frequentism) or posterior probability (Bayesianism).
Given a model, likelihood intervals can be compared to confidence intervals. If is a single real parameter, then under certain conditions, a 14.65% likelihood interval (about 1:7 likelihood) for will be the same as a 95% confidence interval (19/20 coverage probability). In a slightly different formulation suited to the use of log-likelihoods (see Wilks' theorem), the test statistic is twice the difference in log-likelihoods and the probability distribution of the test statistic is approximately a chi-squared distribution with degrees-of-freedom (df) equal to the difference in df-s between the two models (therefore, the −2 likelihood interval is the same as the 0.954 confidence interval; assuming difference in df-s to be 1).
Relative likelihood of models
The definition of relative likelihood can be generalized to compare different statistical models. This generalization is based on AIC (Akaike information criterion), or sometimes AICc (Akaike Information Criterion with correction).
Suppose that for some given data we have two statistical models, and . Also suppose that . Then the relative likelihood of with respect to is defined as follows.
To see that this is a generalization of the earlier definition, suppose that we have some model with a (possibly multivariate) parameter . Then for any , set , and also set . The general definition now gives the same result as the earlier def |
https://en.wikipedia.org/wiki/Ab%20epistulis | Ab epistulis was the chancellor's office in the Roman Empire with responsibility for the emperor's correspondence. The office sent mandata (instructions) to provincial governors and other officials.
Ab epistulis wrote in Latin (ab epistulis latinis) and in Greek (ab epistulis graecis), and composed the short responses to petitions on behalf of the emperor. Holders of the position usually had a particular vocation for literary matters.
Notable ab epistulis
Augustus punished his secretary Thallus "for divulging the contents of a letter". Caligula dictated a letter to an ab epistulis. Narcissus apparently worked as ab epistulis, because he was in charge of the grammata of Claudius against Agrippina. Beryllus was the ab epistulis graecis of Nero. The famous biographer Suetonius Tranquillus was ab epistulis to Hadrian, according to the Historia Augusta until he was replaced for too-close relations with Empress Sabina.
One of the leading rhetoricians of this time, Alexander Peloplaton, was Marcus Aurelius's ab epistulis in the 170s. Marcus was impressed by the orator Hadrian of Tyre, so he offered him the job ab epistulis to recognise his excellence. Aspasius of Ravenna was a Greek orator, who between AD 211 and 216 served as ab epistulis. Aelius Antipater was the ab epistulis of the emperor Caracalla, who defined him "my friend and teacher, entrusted with the composition of Greek letters". Marcius Agrippa was a cognitionibus and ab epistulis of Caracalla.
References
Bibliography
Government of the Roman Empire |
https://en.wikipedia.org/wiki/Susan%20Halabi | Susan Halabi is a professor of biostatistics and bioinformatics at Duke University, known for her research on prostate cancer.
As a member of the data safety monitoring board for a study of the anti-prostate cancer effects of abiraterone acetate (Zytiga), she argued that stopping the study early had prevented the study from accurately determining the effectiveness of the drug, and possibly made it appear to be more effective than it actually was. She also took part in a study showing that, when prostate cancer has reached the point of spreading to other parts of the body, the parts that it spreads to can be used to predict the survival rate from the disease.
Halabi earned her Ph.D. in biometry from the University of Texas Health Science Center at Houston in 1994, and joined the Duke faculty in 1996. She grew up in a family of engineers in Lebanon, where she was one of the first students in the undergraduate biostatistics program at the American University of Beirut. She was named a fellow of the Society for Clinical Trials in 2014, "for her outstanding leadership in cancer clinical trials and prognostic development, ... educational activities, and for dedicated service on national review committees, DSMBs and scientific advisory committees and for the SCT".
She was elected as a Fellow of the American Statistical Association in 2015.
References
Year of birth missing (living people)
Living people
American statisticians
Women statisticians
UTHealth School of Public Health alumni
American people of Lebanese descent
Duke University faculty
Fellows of the American Statistical Association |
https://en.wikipedia.org/wiki/Kimberlite%20Diamond | Kimberlite Diamond () is China's first diamond jewellery manufacturer and retailer with a nationwide sales network.
History
Kimberlite Diamond was founded in 1995 and the brand is China's first diamond-based retailing jewelry company. In 1997, the company reached a "Quality Appraisal Agreement" with the HRD (Belgian High-level Diamond Council). In September, 1998, Kimberlite became a member of the Gems & Jewelry Association of China.
In 2007, Kimberlite Diamond Design's work "SOPRANO (Soprano)" was one of the finalists for the "Opera Night" Diamond Design Competition in the HRD AWARDS 2007 held by the Belgian High-level Diamond Council. Kimberlite Diamond Design's "Diamond Mustache" was one of the finalists for the "Best Design Work" at the HRD AWARDS 2009 Diamond Design Competition. On January 19, 2011, the brand received the "Leopold Knight Medal" from the Order of Leopold. In 2013, the "2013 Asia Top 500 Brands" was released at the 8th Asian Brand Gala in Hong Kong, and Kimberlite Diamond ranked at 153 among the Top 500 Asian Brands. In November 2015, Kimberlite Diamond Design's piece "Past Fragments" won the 23rd Hong Kong JMA International Jewelry Design Competition.
Kimberlite Diamond is sponsor of the first season of the Chinese variety show, Go Fighting!.
Distribution network
Boutiques
Kimberlite Diamond opened its first store in Mainland China on May 18, 1995.
In 1999, Kimberlite Diamond opened its 100th store.
In 2000, Shanghai Kimberlite Diamond Co., Ltd was formed and in May of the same year, the first store opened in Shanghai.
In 2009, Shanghai Kimberlite Diamond became the official partner of the 2010 Shanghai Expo Belgium-EU Pavilion. It also become the licensed manufacturer and retailer of the 2010 Shanghai Expo.
In 2014, Kimberlite Diamond founded China's first youth diamond fashion brand - KELLAN diamonds, and opened its first flagship store in Shanghai on September 19.
As of 2016, the distribution network and branches in mainland China, Hong Kong, Canada and Belgium included nearly 600 franchise stores, covering 30 provinces and cities in China and the brand was China's largest diamond retailer.
In May, 2018, Kimberlite Diamond unveiled its new Shanghai flagship at the landmark Bund No.3.
On July, 06 2018, Kimberlite Diamond launched its first boutique in Vancouver, Canada located at South Granville.
Industrial Park
Kimberlite Diamond's diamond industrial park in Pudong, Shanghai covers an area of , covering the import sorting, cutting, diamond designing, gold production mosaic, and all aspects of the diamond supply chain with design processing capacity up to 150,000 carats. The Kimberlite Diamond Industrial Park which was completed on October 9, 2008, is the first diamond industrial park in Shanghai built by Kimberlite Diamond and is also the biggest in China.
Design
Wenjun Zhu, the chief designer of Kimberlite Diamond, has designed several high jewellery collections for Kimberlite Diamond every year, includ |
https://en.wikipedia.org/wiki/List%20of%20number-one%20Billboard%20Latin%20Pop%20Airplay%20songs%20of%202017 | The Billboard Latin Pop Airplay is a chart that ranks the best-performing Spanish-language Pop music singles of the United States. Published by Billboard magazine, the data are compiled by Nielsen SoundScan based collectively on each single's weekly airplay.
Chart history
References
United States Latin Pop
2017
2017 in Latin music |
https://en.wikipedia.org/wiki/Data%20Gunj%20Bakhsh%20Zone | Data Gunj Bakhsh is an administrative zone in Lahore, Punjab, Pakistan. It forms one of 10 zones of the Lahore metropolitan area.
Neighbourhoods
See also
Lahore City District
References
External links
City Government Lahore website - Archived
Populated places in Lahore District |
https://en.wikipedia.org/wiki/Sasada | Sasada (written: 笹田) is a Japanese surname. Notable people with the surname include:
Koichi Sasada, Japanese computer scientist
Ludovicus Sasada (1598–1624), Japanese Roman Catholic saint
, Japanese artistic gymnast
Japanese-language surnames |
https://en.wikipedia.org/wiki/Mireille%20Broucke | Mireille Esther Broucke is a professor of electrical and computer engineering at the University of Toronto, interested in control theory, mathematical systems theory, and swarm robotics.
Broucke did her undergraduate studies at the University of Texas at Austin, where her father Roger A. Broucke, an immigrant from Belgium, was a professor of aerospace engineering and engineering mechanics. She graduated in 1984, with a bachelor's degree in electrical engineering. She went on to graduate study in electrical engineering and computer science at the University of California, Berkeley, earning a master's degree in 1987,
with summer jobs working on missile tracking software for Texas Instruments, General Dynamics, and Lockheed Corporation.
After completing her master's degree, she stayed in the San Francisco Bay Area, working on software for control systems and simulation at Intergraph and Integrated Systems. She returned to Berkeley for a Ph.D., which she completed in 2000. Her dissertation, supervised by Alberto Sangiovanni-Vincentelli, was Qualitative Analysis, Model Checking, and Controller Synthesis of Hybrid Systems.
After postdoctoral studies at Berkeley she joined the Toronto faculty in 2001.
References
External links
Home page
Year of birth missing (living people)
Living people
American electrical engineers
Canadian electrical engineers
Canadian women engineers
American people of Belgian descent
Roboticists
Women roboticists
Control theorists
Cockrell School of Engineering alumni
Academic staff of the University of Toronto
Place of birth missing (living people)
Computer engineers
UC Berkeley College of Engineering alumni
21st-century women engineers |
https://en.wikipedia.org/wiki/Celina%20Tio | Celina Tio is an American chef. She has appeared on several Food Network television series and she owns The Belfry restaurant in Kansas City.
Career
Celina Tio trained at Drexel University. Her first culinary work was in the kitchen of a Bennigan's Irish pub-themed casual dining restaurant, after convincing the manager to take her on. She then began working at the Ritz-Carlton Philadelphia. By the time she was 23, she was executive chef at the grill room within the hotel. She then moved to Florida, where she opened the Mediterranean restaurant Spoodles, the French restaurant Citricos, and the Northern Italian restaurant Palo for Walt Disney World. She then moved to Missouri, to work as executive chef at the American Restaurant in Kansas City. While there, she was named Best Chef by Chef magazine in 2005 and won the James Beard Foundation Award for Best Mid-West Chef in 2007.
She subsequently left to open her own restaurant, Julian in Brookside, Kansas City, in 2009. While at Julian, Tio appeared on several television cooking series such as Top Chef Masters, Iron Chef America and The Next Iron Chef. Julian was a change in cuisine for Tio, with a more relaxed menu instead of the fine dining she served while at the American Restaurant. She opened a second restaurant, called Collection, in 2013, and a further restaurant entitled The Belfry, during the following year.
After eight years, Tio decided not to renew the lease for Julian in 2017, saying "I’ve been very fortunate that Julian has been and remains successful and am super grateful for all the continued support of my guests over the years. But I feel like the time is right to move on and give another local restaurateur an opportunity to thrive in Brookside".
Personal life
Regarding her ethnicity, Tio has described herself as "half-Chinese".
References
External links
1970s births
Date of birth missing (living people)
American people of Chinese descent
American businesspeople
American television chefs
Drexel University alumni
James Beard Foundation Award winners
Living people
Participants in American reality television series
American women chefs
21st-century American women |
https://en.wikipedia.org/wiki/Sarah%20Ann%20Douglas | Sarah Ann Douglas (born January 25, 1944 in Asheville, North Carolina) is a distinguished computer scientist, known for her work in human-computer interaction (HCI), a field of computer science that she has helped pioneer, and, in particular, pointing devices and haptic interactions, WWW interfaces and bioinformatics, and visualization and visual interfaces. She is a Professor Emerita of Computer and Information Science and a member of the Computational Science Institute at the University of Oregon.
Early life and education
Sarah Douglas was born in Asheville, North Carolina. She lived in Bermuda and the Philippines, as well as in many states in the U.S. During her high school years in Palo Alto, California, she was recruited by the high school district to learn how to program a computer. She began her undergraduate career at Smith College in Northampton, Massachusetts on a full scholarship, transferred to University of California, Berkeley in her junior year, and graduated from UC Berkeley in 1966 with an A.B. degree in philosophy.
Career
Upon her graduation from college she left the United States and lived in Europe for 18 months, settling in Majorca, Spain for much of that time. Upon returning to the United States, she worked as a professional programmer, systems analyst, Director of Software Development and Director at Computing Systems at Cabrillo College and San Jose State University in California. She returned to graduate school at Stanford University in 1979 and earned a Ph.D. in cognitive ergonomics (computer science, psychology, and engineering) from Stanford in 1983. During her tenure at Stanford, Douglas also served as a research intern at Xerox Palo Alto Research Center (Xerox PARC). Upon her graduation from Stanford, she joined the faculty of the Department of Computer and Information Science Department at the University of Oregon, where she remained until her retirement in 2011. At Oregon, Douglas was a member of the Cognitive and Decision Sciences Institute(Director, 1995–1998) and led the technology team that conceived of and built the Zebrafish Information Network, an international online multimedia database of information for zebrafish researchers. She is the author of over 70 technical papers and a research monograph, The Ergonomics of Pointing Devices; her work has been highly cited.
Douglas served on the editorial board of the journal Interacting with Computers (1996–2005), and as a reviewer for ACM Transactions on Computer-Human Interaction and the ACM Conference on Human Factors in Computing Systems. At the national level she was the Chair of the Human-Computer Interaction Knowledge Focus Group for the IEEE-ACM Computing Curriculum 2001.
Honors and awards
Douglas was the recipient of grants and awards from the National Science Foundation, National Institutes of Health, Fund for the Improvement of Post- Secondary Education, Computer Research Association, Keck Foundation, US West, Apple Computer, and Intel Corp.
P |
https://en.wikipedia.org/wiki/Sarah%20Douglas | Sarah Douglas may refer to:
Sarah Douglas (actress) (born 1952), British actress
Sarah Douglas (sailor) (born 1991), Canadian sailor
Sarah Ann Douglas (born 1944), computer scientist
See also
Sarah Douglass (disambiguation)
Sara Douglass (1957–2011), Australian writer |
https://en.wikipedia.org/wiki/VENOM | VENOM (short for Virtualized Environment Neglected Operations Manipulation) is a computer security flaw that was discovered in 2015 by Jason Geffner, then a security researcher at CrowdStrike. The flaw was introduced in 2004 and affected versions of QEMU, Xen, KVM, and VirtualBox from that date until it was patched following disclosure.
The existence of the vulnerability was due to a flaw in QEMU's virtual floppy disk controller.
VENOM is registered in the Common Vulnerabilities and Exposures database as .
References
Computer security exploits |
https://en.wikipedia.org/wiki/Meta-Trek | Meta-Trek is a 1980 video game published on disk only by The Alternate Source for TRS-80 32K microcomputers.
Contents
Meta-Trek is a Star Trek style game where the object is to explore and claim as many of the 256 available quadrants as possible, while destroying enemy Binarians.
Reception
J. Mishcon reviewed Meta-Trek in The Space Gamer No. 37. Mishcon commented that "All in all, I would say that for those interested in a first rate original-Trek style game, this fits the bill nicely."
References
1980 video games
TRS-80 games
TRS-80-only games
Video games developed in the United States |
https://en.wikipedia.org/wiki/Nitish%20V.%20Thakor | Nitish V. Thakor (koli) (born 1952) is an American biomedical engineer and is a professor of
Biomedical Engineering at the Johns Hopkins University, a professor of Electrical and Computer Engineering, and a professor of Neurology at the Johns Hopkins University.
He is also the director of the Singapore Institute for Neurotechnology (SINAPSE) at the National University of Singapore. Thakor is a leading researcher in Neuroengineering, having pioneered technologies for brain monitoring to prosthetic arms and neuroprostheses.
Biography
Thakor graduated from the Indian Institute of Technology in Bombay. Thakor joined the Johns Hopkins Biomedical Engineering department in 1983. In 2012 he was invited to lead the Singapore Institute for Neurotechnology. Thakor has authored more than 360 refereed journal papers (h-index 68; i10-index 313 as of November 2017)
References
1952 births
Living people
Johns Hopkins Biomedical Engineering faculty
American bioinformaticians
IIT Bombay alumni
Indian emigrants to the United States |
https://en.wikipedia.org/wiki/Lale%20Mansur | Lale Mansur (née Yurdatapan; born 1956) is a Turkish actress. She has appeared in more than twenty films since 1988.
Selected filmography
References
External links
1956 births
Living people
Turkish former Muslims
Turkish agnostics
Turkish film actresses
Best Actress Golden Orange Award winners |
https://en.wikipedia.org/wiki/Saltzer%20and%20Schroeder%27s%20design%20principles | Saltzer and Schroeder's design principles are design principles enumerated by Jerome Saltzer and Michael Schroeder in their 1975 article The Protection of Information in Computer Systems, that from their experience are important for the design of secure software systems.
The design principles
Economy of mechanism: Keep the design as simple and small as possible.
Fail-safe defaults: Base access decisions on permission rather than exclusion.
Complete mediation: Every access to every object must be checked for authority.
Open design: The design should not be secret.
Separation of privilege: Where feasible, a protection mechanism that requires two keys to unlock it is more robust and flexible than one that allows access to the presenter of only a single key.
Least privilege: Every program and every user of the system should operate using the least set of privileges necessary to complete the job.
Least common mechanism: Minimize the amount of mechanism common to more than one user and depended on by all users.
Psychological acceptability: It is essential that the human interface be designed for ease of use, so that users routinely and automatically apply the protection mechanisms correctly.
Work factor: Compare the cost of circumventing the mechanism with the resources of a potential attacker.
Compromise recording: It is sometimes suggested that mechanisms that reliably record that a compromise of information has occurred can be used in place of more elaborate mechanisms that completely prevent loss.
References
Saltzer and Schroeder's design principles
The resources of the Industrial Internet Consortium – Volume 4 Industrial IoT Chapter 7.9 FROM FUNCTIONAL TO IMPLEMENTATION VIEWPOINT page 58]
Computer security software
Software design |
https://en.wikipedia.org/wiki/School%20of%20Engineering%2C%20University%20of%20South%20Wales | The School of Engineering at the University of South Wales is one of university's largest schools, and is part of the university's Faculty of Computing, Engineering and Science. The school was originally part of the University of Glamorgan, before the university's formation in 2013.
It has divisions in aeronautical, mechanical, civil, electronic engineering and the built environment. The school hosts undergraduate courses from foundation years, to HND and HNC and bachelor's degrees (BSc and BEng). It also offers postgraduate taught (MSc and MEng) and research degrees, and doctoral level study.
In 2017, the university announced that it was establishing an aviation academy in Dubai South, in Dubai, United Arab Emirates, initially to provide aviation courses in the region.
Research
The school hosts the Centre for Automotive & Power System Engineering (CAPSE), a nationally recognised independent research, development, test and certification house within the advanced automotive and power systems engineering sectors.
The school contributes to the Energy and Environment Research Instititue which comprises the following research centres:
Sustainable Environment Research Centre
Wireless and Optoelectronics Research and Innovation Centre
Engineering Research Centre
Dubai
The University of South Wales Dubai was announced in 2017, and is set to open to students in September 2018, offering undergraduate courses in aviation. The aviation academy was formally agreed by Sheikh Ahmed bin Saeed Al Maktoum, president of Dubai Civil Aviation Authority (DCAA) and chairman and chief executive of Emirates and the Pro Chancellor Professor John Andrews of the university.
External links
University of South Wales website
References
Universities and colleges in Wales
University of South Wales |
https://en.wikipedia.org/wiki/Campagnes%20TV | Campaigns TV was a French television channel specialized in rurality, environment and agriculture, broadcasting its program in France by cable, satellite and ADSL networks. The channel was founded by Thierry Laval.
History
The TV channel was born on January 15, 2013. Inspired by its American-British sister channel, Rural TV, it was the leading news and entertainment channel in France, offering programs around the art of living in the country, terroirs, agriculture, agro-food and environment. In December 2014, Guy Vasseur, President of the Chambers of Agriculture (Chambres d'agriculture/APCA) also became President of the channel and Olivier Alleman was appointed as Deputy Chief Executive Officer. In March 2015, Campaigns TV launched its replay channel on the platform Wat.tv. Since June 2015, the program schedule of Campaigns TV was taken over by the weekly Télécâble Sat Hebdo. At the end of October 2017, the channel announced by video message that it will definitely cease broadcasting on October 31, 2017.
Partnerships
Since its creation, Campagnes TV has been a partner of many events, like Fête de la Gastronomie, Game Fair, Grand National du Trot, Anjou Vélo Vintage.
References
External links
Defunct television channels in France
Television channels and stations established in 2013
Television channels and stations disestablished in 2017
2013 establishments in France
2017 disestablishments in France
Agricultural television stations |
https://en.wikipedia.org/wiki/Robert%20McNaughton | Robert Forbes McNaughton, Jr. (1924–2014) was an American mathematician, logician, and computer scientist with several key contributions in formal languages, grammars and rewriting systems, and word combinatorics.
McNaughton was originally from Brooklyn, and earned a bachelor's degree from Columbia University.
He completed his Ph.D. at Harvard University; his dissertation, On Establishing the Consistency of Systems, was supervised by Willard Van Orman Quine.
He taught at the University of Pennsylvania and then at the Rensselaer Polytechnic Institute.
He died in 2014 in Troy, New York.
References
1924 births
2014 deaths
20th-century American mathematicians
21st-century American mathematicians
American computer scientists
Theoretical computer scientists
Columbia University alumni
Harvard University alumni
University of Pennsylvania faculty
Rensselaer Polytechnic Institute faculty |
https://en.wikipedia.org/wiki/Caustic%20Graphics | Caustic Graphics was a computer graphics and fabless semiconductor company that developed technologies to bring real-time ray-traced computer graphics to the mass market.
The company name derived from an optical effect caused by the concentration of light on to a surface resulting from focusing through reflection or refraction phenomena.
Caustic was founded on the premise that realistic 3D graphics would be easier to create if GPU hardware were as efficient at processing a ray as processing a vertex or fragment using existing rasterisation methods.
History
Caustic was founded in 2006 by three ex-Apple engineers, one of which had developed graphics technologies for the 5th Generation iPod and 1st Generation iPhone. The founding business plan was to build a complete real-time ray traced graphics system to initially accelerate professional 3D visualisation and later for entertainment applications on PCs and gaming consoles.
In 2008, Caustic Graphics acquired Splutterfish, a company that developed and sold a production rendering software product called Brazil R/S.
Caustic later released a series of commercial software products called "Visualiser Plugins" that leveraged the Brazil R/S rendering technology and Caustic hardware to enable interactive and offline ray traced rendering inside Autodesk 3DSMax, Autodesk Maya, McNeel Rhino and later SketchUp
In 2010, Caustic Graphics was acquired by Imagination Technologies.
Technologies
Hardware
The Caustic ray tracing hardware was not a replacement for existing rasterisation GPUs, but rather added several new hardware functions to increase the efficiency of ray-tracing:
Coherence gathering: The ability for the GPU to generate work for itself and for those work-units to be deferred and sorted into coherent groups that were requesting a common resource, such as a data or shader program address in memory.
Fixed-function triangle intersection units: A unit was developed that could intersect a ray with an edge sharing triangle pair and return barycentric coordinates and other hit information.
Fixed-function bounding volume intersection units: A unit was developed that could intersect a ray with an AABB and return hit information.
Framebuffer accumulator: This unit would receive commands from the ALUs to add colour to a given pixel in the frame buffer.
Scene hierarchy generator: This unit would read lists of triangles (or other scene geometry representations) and stream out to memory a directed acyclic graph of 3D volumes surrounding the geometry, known as a bounding volume hierarchy.
Coherence gathering
The Caustic architecture parallelised execution not on pixels, but on individual rays. This allowed for hardware to gather these rays into coherent groups to perform a common operation, such as access a memory address within the scene acceleration structure and underlying geometry or execution of a common material shader program.
Streaming bounding volume hierarchy generator
Caustic developed a |
https://en.wikipedia.org/wiki/Jihan%20Wu | Jihan Wu (; born 1986) is a Chinese billionaire cryptocurrency entrepreneur. Together with Micree Zhan, he co-founded Bitmain in 2013, which has become the world's largest computer chip company for bitcoin mining, with US$2.5 billion in revenue in 2017. He is a leading supporter of Bitcoin Cash, a hard fork of bitcoin created in 2017 with increased transaction capacity. He topped Forbes' 2020 World’s Billionaires List as one of the five youngest billionaires in Asia.
Early life and career
Wu was born in 1986 in Chongqing, China. After graduating from Chongqing Nankai Secondary School, he entered Peking University, where he earned dual degrees in economics and psychology in 2009.
After graduating from university, Wu worked as a financial analyst for a private equity firm. In May 2011, he discovered Bitcoin and raised 100,000 yuan (US$15,373 as of 2011) from family and friends to purchase 900 bitcoins. He and fellow Bitcoin enthusiast Chang Jia (长铗) founded Babite (巴比特), China's first Bitcoin community site. In late 2011, he was the first to translate Satoshi Nakamoto's Bitcoin white paper into Chinese.
In 2012, Wu invested in the bitcoin mining company ASICMINER, one of the first company produced ASIC that is used to mine Bitcoin worldwide which was co-founded by Friedcat (烤猫). Although initially successful with more than a thousand times of investment return given to its investors, Friedcat later ran into technical difficulties and exited the business. Wu also lost his investment purchasing hardware from another mining hardware company, Canaan Creative.
Bitmain and Matrixport
Having realized the importance of technical expertise, in 2013 Wu reached out to the microelectronics engineer Micree Zhan, whom he had met a few years before, and convinced Zhan to co-found Bitmain with him. In November 2013, Zhan developed Antminer S1, the company's first mining rig. Sales soon took off, but hit a downturn in 2014 when fraud was discovered at the Japanese bitcoin exchange Mt. Gox, leading to its collapse. In 2015, Bitmain developed Antminer S5, which became the best-selling mining equipment as bitcoin prices recovered. Bitmain grew into the world's largest computer chip company for bitcoin mining, reporting US$2.5 billion in revenue in 2017. In 2018, Wu owned 20% of Bitmain shares, and Zhan 36%.
Wu has been a vocal proponent for increasing bitcoin's transaction capacity, which is limited to only seven per second due to the 1-megabyte size limit of bitcoin blocks, but the proposal was opposed by traditionalists. After two years of debate between the two camps, a Shenzhen-based mining company called ViaBTC, which Bitmain had invested in, orchestrated a hard fork of bitcoin, creating Bitcoin Cash in August 2017. Wu's critics accuse him of being the mastermind behind the fork, calling him "Jihad", a play on his given name, but Wu denied that he or Bitmain had so much influence in the matter.
In 2019, Wu stepped down as co-CEO of Bitmain and founded Mat |
https://en.wikipedia.org/wiki/Duoyi%20Network | Duoyi Network (), or Duoyi Games, is a Chinese video game company headquartered in Guangzhou, Guangdong. Founded in 2006 by Xu Youzhen, the company is known for developing some of China’s most acclaimed game franchises, including the Shenwu series and the Dream World series. Their most recent projects include the third generation of the Shenwu series Shenwu 3, the cross-platform game for the Dream World franchise Dream World 3D, the 3D MMORPG Eternal Magic, the mobile turn-based RPG Legion of Knights, the multiplayer sandplay SLG Circle of War, and the sandbox RPG Portal Knights.
In 2015, Duoyi reached a net profit of USD 150 million with a 50% growth rate and ranked the 4th among Chinese game companies in iOS revenue. In 2016, the company kept the same level of performance and started IPO. Duoyi ranked 25th among the MIIT’s 2017 Top 100 Chinese Internet Enterprises, and 4th among all game companies in China.
History
Duoyi Network was founded by Xu Youzhen, one of China's most well-known game designers since the early 2000s. Before founding Duoyi Network, Xu was the main designer of Fantasy Westward Journey and responsible for the architecture of the core gameplay. He led the development of Dream World and Shenwu as the founder and president of Duoyi Network.
On September 24, 2007, Duoyi released its first PC title, Dream World, a 2D turn-based MMORPG. In 2008, Duoyi received the Gold Finger Award from the China Cultural Industry Association for the creation of Dream World.
In 2010, Duoyi released Dream Emperor, a strategy mini-client game, and Shenwu, a turn-based MMORPG based on the story line of Journey to the West.
In 2011, Duoyi launched Tank Force!, an action mobile game that hit No. 1 on the App Store Download Chart. In 2012, Duoyi ranked the 40th of “China’s Top 100 Internet Companies” jointly released by the Internet Society of China and MIIT.
In 2015, Duoyi released Shenwu Mobile, which hit the first on App Store Grossing Chart in China and 9th globally. Shenwu Mobile remained a top 10 grossing app for over 80 consecutive weeks. Shenwu 2, a major expansion set for both Shenwu PC and Shenwu Mobile, was released on July 3, 2015. On March 19, 2016, Shenwu 2 received two Gold Finger Awards for Excellent Online Game and Excellent Mobile Game at the Chinese Game Industry Annual Conference. Shenwu 3, the second major expansion set for the Shenwu franchise, was released on December 24, 2017.
Dream World Mobile and Dream World 3D were released, respectively in June 2015 and July 2017. In December 2017, the Dream World franchise announced its 10th Anniversary Event.
Duoyi established a partnership with 505 Games for the exclusive right to operate Portal Knights, a survival action role-playing game, in China. Duoyi released Portal Knights in China on November 21, 2017.
In 2017, Duoyi Network ranked the 25th of “China’s Top 100 Internet Companies”, released by Internet Society of China and MIIT, and the 4th among game companies in China.
|
https://en.wikipedia.org/wiki/List%20of%20French%20films%20of%202016 | A list of French-produced films scheduled for release in 2016.
2016
Notes
External links
French films of 2016 at the Internet Movie Database
2016 in France
2016 in French television
French
2016
Films |
https://en.wikipedia.org/wiki/The%20Great%20Canadian%20Cookbook | The Great Canadian Cookbook is a Canadian television and web series, which aired on Food Network in 2015. Hosted by Noah Cappe and Lynn Crawford, the series profiled the diversity and richness of Canadian cuisine, through visits to various restaurateurs and other people involved in the food industry throughout the country.
The series consisted of four full television episodes, with additional segments presented as a web series on the program's website.
The series was a shortlisted finalist for Lifestyle Program or Series at the 5th Canadian Screen Awards.
References
External links
2015 Canadian television series debuts
2015 Canadian television series endings
2010s Canadian reality television series
2010s Canadian cooking television series
Food Network (Canadian TV channel) original programming
Canadian non-fiction web series |
https://en.wikipedia.org/wiki/23rd%20Critics%27%20Choice%20Awards | The 23rd Critics' Choice Awards were presented on January 11, 2018 at the Barker Hangar at the Santa Monica Airport, honoring the finest achievements of filmmaking and television programming in 2017. The ceremony was broadcast on The CW and hosted by Olivia Munn. The nominations were announced on December 6, 2017. Netflix led the nominations for television with 20, followed by HBO with 15. Big Little Lies won four awards, becoming the biggest television winner of the night and repeating its victory four days prior at the 75th Golden Globe Awards.
Winners and nominees
Film
Television
{| class=wikitable style="width=72%"
|-
! colspan="2"| Best Series
|-
! Best Comedy Series
! Best Drama Series
|-
| valign="top" |
The Marvelous Mrs. Maisel (Amazon) The Big Bang Theory (CBS)
Black-ish (ABC)
GLOW (Netflix)
Modern Family (ABC)
Orange Is the New Black (Netflix)
| valign="top" |The Handmaid's Tale (Hulu) American Gods (Starz)
Game of Thrones (HBO)
Stranger Things (Netflix)
This Is Us (NBC)
The Walking Dead (AMC)
|-
! Best Limited Series
! Best Movie Made for TV
|-
| valign="top" |Big Little Lies (HBO) American Vandal (Netflix)
Fargo (FX)
Feud: Bette and Joan (FX)
Godless (Netflix)
The Long Road Home (Nat Geo)
| valign="top" |The Wizard of Lies (HBO) Flint (Lifetime)
I Am Elizabeth Smart (Lifetime)
The Immortal Life of Henrietta Lacks (HBO)
Sherlock: The Lying Detective (PBS)
|-
! colspan="2"| Best Animated Series
|-
| valign="top" colspan="2" |Rick and Morty (Adult Swim) Archer (FX)
Bob's Burgers (Fox)
Family Guy (Fox)
The Simpsons (Fox)
South Park (Comedy Central)
|-
! colspan="2"| Best Acting in a Comedy Series
|-
! Best Actor
! Best Actress
|-
| valign="top" |Ted Danson as Michael – The Good Place
Anthony Anderson as Andre "Dre" Johnson, Sr. – Black-ish
Aziz Ansari as Dev Shah – Master of None
Hank Azaria as Jim Brockmire – Brockmire
Thomas Middleditch as Richard Hendricks – Silicon Valley
Randall Park as Louis Huang – Fresh Off the Boat
| valign="top" |
Rachel Brosnahan as Miriam "Midge" Maisel – The Marvelous Mrs. Maisel
Kristen Bell as Eleanor Shellstrop – The Good Place
Alison Brie as Ruth "Zoya the Destroya" Wilder – GLOW
Sutton Foster as Liza Miller – Younger
Ellie Kemper as Kimmy Schmidt – Unbreakable Kimmy Schmidt
Constance Wu as Jessica Huang – Fresh Off the Boat
|-
! Best Supporting Actor
! Best Supporting Actress
|-
| valign="top" |
Walton Goggins as Lee Russell – Vice Principals
Tituss Burgess as Titus Andromedon – Unbreakable Kimmy Schmidt
Sean Hayes as Jack McFarland – Will & Grace
Marc Maron as Sam Sylvia – GLOW
Kumail Nanjiani as Dinesh Chugtai – Silicon Valley
Ed O'Neill as Jay Pritchett – Modern Family
| valign="top" |
Mayim Bialik as Dr. Amy Farrah Fowler – The Big Bang Theory
Alex Borstein as Susie Myerson – The Marvelous Mrs. Maisel
Betty Gilpin as Debbie "Liberty Belle" Eagan – GLOW
Jenifer Lewis as Ruby Johnson – Black-ish
Alessandra Mastronardi as Francesca – Master of None
Rita Moreno |
https://en.wikipedia.org/wiki/OpenTimestamps | OpenTimestamps (OTS) is an open-source project that aims to provide a standard format for blockchain timestamping.
With the advent of systems like Bitcoin, it is possible to create and verify proofs of existence of documents (timestamps) without relying on a trusted third party; this represents an enhancement in term of security, since it excludes the possibility of a malicious (or careless) trusted third party to compromise the timestamp.
OTS defines a set of rules for conveniently creating timestamps and later independently verifying them. Currently, timestamping with Bitcoin is fully supported, however the format is flexible enough to support a variety of methods.
Anyone could create timestamp with the permissionless blockchain by paying the transaction fees, for convenience OTS built an infrastructure that aggregates timestamp requests from users and packs them into transactions funded by public calendar servers; as a result, users can timestamp for free, in a trust-minimized setting.
What is a timestamp
A timestamp is a proof that some data d existed prior to a certain point in time.
To create such proof, it turns out that it is not necessary to publish d on the blockchain, which would be expensive, but it is enough to commit d to the blockchain.
Such commitment proves that d existed prior to a certain block, in the sense that if d changes, then the proof becomes invalid and hence useless.
The proof consists in a sequence of commitment operations, such as sha256, append, prepend.
These operations are the cryptographic path that proves that d commits to a certain block header. In other words, that d caused the block header to have its value, indeed, if d were different then, due to the mathematical properties of commitment operations, the block header would be different.
To verify the commitment, the operations are applied in sequence to the data d, then the result, which should be the transaction merkle root, is checked to be equal to the one observed in the blockchain; if the check goes fine, then one can assert that d existed prior to the block.
For the timestamped file hello.txt, the OTS proof is encoded in a file named hello.txt.ots which contains:
the hash of the timestamped file;
the commitment operations;
one or more attestations on the blockchain.
With this information, a challenger can independently verify that hello.txt existed prior to a certain block.
Usage
OTS provides users multiple and easy ways to create and independently verify timestamps:
With opentimestamps-client in Python;
With java-opentimestamps;
With javascript-opentimestamps;
On .
In the following sections it is shown an example of the usage of the Python client.
Timestamp creation
The stamp operation creates the first version of the timestamp. It is applied to the file for which you want to prove its existence (original file).
$ cat hello.txt
Hello World!
$ ots stamp hello.txt
Submitting to remote calendar https://a.pool.opentimestamps.org
Subm |
https://en.wikipedia.org/wiki/The%20Radio%202%20Breakfast%20Show | The Radio 2 Breakfast Show refers to a range of programming on weekday mornings on BBC Radio 2 since the station's inception on 30 September 1967. The show's longest serving host to date was Sir Terry Wogan, who worked on the programme for 28 years in 2 separate stints, from 3 April 1972 until 28 December 1984, and again from 4 January 1993 until 18 December 2009. The show's shortest serving host to date was Brian Hayes, who hosted the show from 6 January to 23 December 1992. Since 14 January 2019, the show is now hosted by Zoe Ball.
One of the show's longest running features has been "Pause for Thought", a short interlude of religious-related opinion at around 7:15am or 9:15 am, similar to "Thought for the Day" on BBC Radio 4's Today. In the 1960s-1970s, Rev. Frank Thewlis was a frequent "Pause for Thought" guest. He would later write a book Think Again, a compendium of his frequent talks given on the "Pause for thought" segment.
History
Data supplied by the BBC Genome Project.
Breakfast Special (Various Presenters: 19671970)
From Radio 2's inception in 1967, a breakfast programme was broadcast in tandem with Radio 1 Breakfast, featuring a mix of news, music, traffic and weather reports. Unlike its Radio 1 counterpart which had started with a single presenter, Breakfast Special was a continuation of a BBC Light Programme format which had been running since 1965 with a roster of presenters who hosted in weekly rotation. These included Paul Hollingdale (the very first weekday presenter), Ray Moore, Peter Latham, Bruce Wyndham, and John Dunn. The music played was largely easy listening of the type with which Radio 2 would be particularly associated until the 1990s. An early feature was "Band of the Day", which would feature recordings of standards and traditional jazz by artists such as Sidney Sax, Frank Chacksfield, Syd Dale and Leon Young.
During its first year the Breakfast Show began at 5:30am and ended at 8:30am, at which time Radios 1 and 2 would broadcast the same programme, however in 1968 this was changed to a 9am finish, after which Radio 2 would broadcast its own programme.
John Dunn (19701972)
Dunn became the first permanent presenter of the show on 5 January 1970, with Ray Moore providing cover. The show was still broadcast during this period between 5.30am and 9.00am.
Sir Terry Wogan (First tenure: 19721984)
On 3 April 1972, Dunn was replaced by Sir Terry Wogan (with Dunn moving to begin his long running popular Drivetime show). During the Wogan era, the programme was also moved to a later start time of 7am, with an Early Show preceding it, finishing at 9am. During this period Wogan's cover again principally came from Ray Moore, who presented the Early Show at other times. David Hamilton, who at the time was presenting the Afternoon Show also provided holiday cover. From 3 January 1978 Sir Jimmy Young's programme was moved earlier in the day to follow Wogan, and until the end of its run Wogan's programme was broadcast betwee |
https://en.wikipedia.org/wiki/Andy%20and%20Bill%27s%20law | Andy and Bill's law is a statement that new software will always consume any increase in computing power that new hardware can provide. The law originates from a humorous one-liner told in the 1990s during computing conferences: "what Andy giveth, Bill taketh away." The phrase is a riff upon the business strategies of former Intel CEO Andy Grove and former Microsoft CEO Bill Gates. Intel and Microsoft had entered into a lucrative partnership in the 1980s through to the 1990s, and the standard chipsets in Microsoft Windows were Intel brand. Despite the profit Intel gained from the deal, Grove felt that Gates was not making full use of the powerful capabilities of Intel chips, and that he was in fact refusing to upgrade his software to achieve optimum hardware performance. Grove's frustration with the dominance of Microsoft software over Intel hardware became public, which spawned the humorous catchphrase; and, later, the law.
See also
Jevons paradox
Moore's law
Wirth%27s law
References
Computer architecture statements |
https://en.wikipedia.org/wiki/Grace%20Rolek | Grace Sakura Rolek is an American actress. She is best known for voicing Connie Maheswaran, Steven's best friend and eventual girlfriend on the Cartoon Network animated series Steven Universe (2013–2019) and its two follow-ups, Steven Universe Future (2019–2020) and Steven Universe: The Movie (2019).
Career
Rolek is known for voicing Connie Maheswaran on Steven Universe, as well as for appearing in Happiness Is a Warm Blanket, Charlie Brown, radio host for Appalachia radio in Fallout 76, and Final Fantasy VII: Advent Children. She also made voice acting appearances in Cloudy with a Chance of Meatballs, Kung Fu Panda: Secrets of the Furious Five and Horton Hears a Who!.
She made several public appearances as a guest of many fan conventions and gatherings, such as Cartoon Fair in France, Florida Supercon in Miami, and Beach City Con in Virginia Beach.
Personal life
Rolek is of African-American, Italian, Polish and Japanese descent.
Rolek is bisexual.
Filmography
References
External links
Bisexual actresses
Living people
American people of Polish descent
American people of Italian descent
African-American actresses
American actresses of Japanese descent
American voice actresses
American film actresses
American television actresses
American film actors of Japanese descent
21st-century American actresses
21st-century American singers
21st-century African-American women singers
American bisexual actors
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/Alan%20Woodward%20%28computer%20scientist%29 | Alan Woodward is a British computer scientist at the University of Surrey. He is a specialist in computer security and a core member of the Surrey Centre for Cyber Security.
He studied physics as an undergraduate student and conducted research in signal processing as a postgraduate student. Both of these were at the University of Southampton.
He has worked in government service, business as well as academia.
In addition to his academic qualifications, his practical accomplishments have resulted in him being elected Fellow of the Institute of Physics, a Chartered Physicist, Chartered IT Practitioner, Chartered Engineer, Fellow of the British Computer Society, a EUR ING, and Fellow of the Royal Statistical Society.
References
External links
https://www.linkedin.com/in/woodwardalan/
https://www.profwoodward.org/
British computer scientists
Internet security
Alumni of the University of Southampton
Academics of the University of Surrey
Fellows of the Royal Statistical Society
Fellows of the British Computer Society
Living people
1962 births
InfoSec Twitter |
https://en.wikipedia.org/wiki/Jeffrey%20Siewerdsen | Jeffrey Harold Siewerdsen (born 1969) is an American physicist and biomedical engineer who is a Professor of Biomedical Engineering, Computer Science, Radiology, and Neurosurgery at Johns Hopkins University. He is Co-Director of the Carnegie Center for Surgical Innovation at Johns Hopkins School of Medicine and is a member of the Malone Center for Engineering in Healthcare. He is among the original inventors of cone-beam CT-guided radiotherapy as well as weight-bearing cone-beam CT for musculoskeletal radiology and orthopedic surgery. His work also includes the early development of flat-panel detectors on mobile C-arms for intraoperative cone-beam CT in image-guided surgery. He developed early models for the signal and noise performance of flat-panel detectors and later extended such analysis to dual-energy imaging and 3D imaging performance in cone-beam CT. His core laboratory at Johns Hopkins University is the ISTAR Lab (Imaging for Surgery, Therapy, and Radiology) in the Department of Biomedical Engineering at the Johns Hopkins Hospital.
Biography and scientific work
Jeffrey Siewerdsen did his undergraduate studies at the University of Minnesota in Minneapolis, MN, where he received his Bachelor of Arts degree in Physics and Astrophysics with a minor in Japanese in 1992. His undergraduate research experience included construction and testing of particle detectors for the Soudan 2 proton decay project.
Siewerdsen began graduate studies at the University of Michigan in Ann Arbor, MI, in 1992, working initially in high-energy physics (D0 experiment) under supervision of Professor Homer Neal and earning his Master of Science degree in Physics in 1994.
Siewerdsen's doctoral research involved early development of amorphous silicon Flat panel detector for medical x-ray imaging under the supervision of Professor Larry E. Antonuk. Siewerdsen's work focused on the development of early flat-panel detector systems for diagnostic radiography, fluoroscopy, and mammography as well as megavoltage portal imaging for guidance of radiation therapy. His doctoral dissertation established mathematical models for the signal-to-noise properties (specifically, the modulation transfer function, noise-power spectrum, and detective quantum efficiency) of flat-panel x-ray detectors. His Ph.D. thesis was awarded the Kent M. Terwilliger Prize for Best Doctoral Dissertation in Physics, 1998.
Siewerdsen conducted post-graduate research beginning in 1998 as a Research Scientist at William Beaumont Hospital in Royal Oak, MI, with Dr. David Jaffray and Dr. John Wong on the topic of cone beam computed tomography (CBCT) for image-guided radiation therapy (IGRT). The Beaumont team produced the first IGRT system for CBCT, beginning with laboratory studies to investigate image quality characteristics, and translating to clinical studies for guidance of prostate cancer therapy.
Siewerdsen joined the Ontario Cancer Institute and University of Toronto Department of Medical Biophysic |
https://en.wikipedia.org/wiki/Kojij%C5%AB-sh%C5%AB | The Kojijū-shū (小侍従集) is a Japanese anthology of waka poetry. It is the personal anthology (kashū) of Kojijū.
Compiler and date
The earliest form of the Kojijū-shū, the personal anthology of the twelfth-century waka poet Kojijū, was compiled by the poet herself around 1181 for submission to a collection of personal anthologies. Later editors then created different sets of poems based on this earlier text. For more details, see #Contents below.
Contents
There are four versions of the text in the surviving manuscripts, which are referred to as kō, otsu, hei and tei (甲乙丙丁).
The kō text, the earliest, was probably compiled by Kojijū herself in the summer or autumn of 1181, in response to a request from Kamo no Shigeyasu (賀茂重保). It is composed of two sections on "the seasons and love" and "various topics", consisting of 118 poems and 69 poems respectively.
The otsu text was then created because of Shigeyasu's request for collections of 100 original poems, and consists of 40 poems on the seasons, 20 on love, and 60 on various topics, a total of 120, 100 of which were composed by Kojijū herself. It is one of the Juei Hyakushu Kashū (寿永百首家集).
While the seasonal and love poems were all composed on a set topic, most (50) of the poems in the "various topics" section are accompanied by headnotes that reminisce about the circumstances of their composition with little concern for their primary themes, although they are largely in the form of poems sent as gifts to lovers. These 50 poems are all common to both the kō and otsu texts.
The hei text was created when a later editor took 33 poems that had been included in imperial anthologies and appended them to the otsu text.
The tei text consists of poems that had been removed from the kō text to create the otsu text. It consists of 69 poems, but the text is damaged and incomplete.
Textual tradition
The surviving manuscripts are placed in three groups and exist in four distinct textual lines. The first group (1) consists of the textual line of theKatsuranomiya-bon, a manuscript held by the Archives and Mausolea Department of the Imperial Household Agency, forming the kō text. The second group consists of the textual lines of the manuscript held by the (2-a), forming the otsu text, and the manuscript held by the Gunsho Ruijū (2-b), forming the hei text. The third group (3) consists of the text contained in the Tankaku Sōsho (丹鶴叢書), forming the tei text.
The popular (rufubon) form of the text is 2-a, and this is the one that was used as a source by compilers of imperial anthologies from the Senzai Wakashū on. Copies of it are held in Archives and Mausolea Department, the Mite Archives (三手文庫), the Ise Grand Shrine Archives (神宮文庫) and the Kannarai Archives (神習文庫).
References
Works cited
Kashū |
https://en.wikipedia.org/wiki/DWRC-FM | DWRC (95.5 FM), broadcasting as Sigaw 95.5 Music & News FM, is a radio station owned and operated by Filipinas Broadcasting Network. Its studio and transmitter are located along Capt. F. Aquende Dr., Legazpi, Albay.
References
Radio stations in Legazpi, Albay
DWRC |
https://en.wikipedia.org/wiki/Capitol%20Broadcasting%20Center | Capitol Broadcasting Center is a Philippine radio network. Its corporate office is located at Unit 1802, 18/F, OMM-Citra Building, San Miguel Avenue, Ortigas Center, Pasig.
CBC Stations
Source:
AM Stations
FM Stations
Like Radio
Affiliate stations
Former Stations
References
Radio stations in the Philippines
Philippine radio networks |
https://en.wikipedia.org/wiki/CTV%20Building%20%28disambiguation%29 | CTV Building was the headquarters of Canterbury Television in Christchurch, New Zealand.
CTV Building may also refer to one of the following buildings associated with the CTV Television Network in Canada:
299 Queen Street West in downtown Toronto
9 Channel Nine Court in the Scarborough district of Toronto
750 Burrard Street in Vancouver
Masonic Temple (Toronto) in midtown Toronto, formerly a CTV studio |
https://en.wikipedia.org/wiki/Cray%20XC50 | The Cray XC50 is a massively parallel multiprocessor supercomputer manufactured by Cray. The machine can support Intel Xeon processors, as well as Cavium ThunderX2 processors, Xeon Phi processors and NVIDIA Tesla P100 GPUs. The processors are connected by Cray's proprietary "Aries" interconnect, in a dragonfly network topology. The XC50 is an evolution of the XC40, with the main difference being the support of Tesla P100 processors and the use of Cray software release CLE 6 or 7.
Deployed Cray XC50 systems
India
Indian Institute of Technology, Bombay (IITB) has deployed a Cray XC50 system named Spacetime with a peak performance of 1 petaflops coupled with Cray ClusterStor L300 Lustre storage system.
Japan
The Japanese National Institutes for Quantum and Radiological Science and Technology has deployed on 2018 26th July a XC50 to support the ITER fusion project. At deployment, it will not be as fast as the Swiss Piz Daint computer; however, it is predicted as one of the top 30 supercomputers in the world, and the fastest available to fusion researchers.
The Japan Meteorological Agency is planning to deploy 2 Cray XC50s to help with weather forecasting. The systems will be deployed with the assistance of Cray and Hitachi.
The Center for Computational Astrophysics at the National Astronomical Observatory of Japan have deployed a XC50 named ATERUI II, named after a Japanese chief. It has 40,200 Xeon cores, with a peak performance of 3.087 petaflops.
The Railway Technical Research Institute (RTRI) will install five XC50 cabinets and a 720 TB Cray ClusterStor L300 for storage to gain insights on rail transportation. This is their third Cray machine after acquiring an XC30 and CS300, both in 2013.
Yokohama City University has selected the air-cooled XC50-AC for life sciences research.
New Zealand
New Zealand Science Infrastructure (NeSI) is deploying a XC50 at their High Performance Computing Facility in Wellington.
South Korea
The Institute for Basic Science (IBS) is installing a 1.43-petaflop XC50, named Aleph, for climate physics research.
Switzerland
The Swiss National Supercomputing Centre in Lugano has a 361,760-core XC50 called Piz Daint. This has been upgraded from a Cray XC30 and Cray XC40 configurations.
United Kingdom
Cray is developing a XC50 system with ARM processors called Isambard. This will be used for a consortium of Bristol, Bath, Cardiff and Exeter universities.
References
External links
Cray XC Series Supercomputers
XC50
X86 supercomputers |
https://en.wikipedia.org/wiki/Hackers.mu | hackers.mu is a group of developers from Mauritius who are focused on computer security, IETF standards and Linux and Open Source Software adoption. They have worked on implementing TLS 1.3 in Linux and Open Source Software during the IETF 100 Hackathon as part of the TLS Working Group. They have also prepared high school students for Google Code-in in 2016 which marked the first time that Mauritius participated. In 2017, they trained another batch of high school students and this would lead to the first Grand Prize Winner for Mauritius. During IETF 101, hackers.mu acted as TLS 1.3 champions, and continued to work on application integration support. In June 2018, hackers.mu organized a hackathon with codename "Operation JASK" to fix sigspoof3 in a number of open source projects. In July 2018, hackers.mu participated in IETF 102 hackathon as TLS 1.3 champions to work on inter-operability and applications support and http 451. Additionally, they have been active in authoring IETF Standards such as RFC 8270.
References
External links
Organisations based in Mauritius |
https://en.wikipedia.org/wiki/Local%20Computer%20Networks%20Conference | The Local Computer Networks Conference (LCN) is an annual international academic conference organized by the IEEE Computer Society. The first LCN was held in 1976, with the full name of "Conference on Experiments in New Approaches to Local Computer Networking". The second meeting in 1977 was called the "Conference on 'A Second Look at Local Computer Networking'" before it changed its name to "Third Conference on Local Computer Networks" in 1978. After that the conference was simply called LCN. The IEEE Technical Committee on Computer Communications has sponsored the LCN since 1979.
LCN has grown to be a premier conference on theoretical and practical aspects of computer networking and is ranked as an A conference according to the CORE Rankings Portal in 2017.
History of the Conference
Historical Events
The conference celebrated its 40th anniversary 2015 in Clearwater Beach, Florida where Robert Metcalfe (founder of 3COM and co-inventor of the Ethernet network technology) gave the keynote speech and held a panel session with Harvey Freeman (President of the IEEE Communications Society 2017), Howard Salwen ("father of the token ring" and founder of Proteon), and Peter Martini (Director of Institute Fraunhofer FKIE).
References
Telecommunication conferences
IEEE conferences
Computer networking conferences |
https://en.wikipedia.org/wiki/Life%27s%20Most%20Embarrassing%20Moments | Life's Most Embarrassing Moments is a series of television comedy specials primarily featuring "blooper" outtakes, and appeared on the ABC network in the United States from 1983 to 1986.
Created by Alan Landsburg Productions the first special aired on April 27, 1983, hosted by John Ritter, and was the most-watched prime time television show of the week. Steve Allen hosted approximately nine subsequent installments, which started in September 1983, with the last special airing in May 1986. The content of the show was primarily outtakes of celebrity mishaps. A number of the specials were also rerun as a "weekly series" in August to early September 1985. Each installment was numbered, e.g., Life's Most Embarrassing Moments III.
The first special was highly watched, but reviewer Tom Shales at The Washington Post was not impressed. Noting the show was plainly a response to NBC's Bloopers specials, Shales called it a "grossly irritating hour" where after every clip "the director cut to the studio audience for a hefty round of artificially augmented applause." The comparison to Bloopers was noted by many, and that show's creator Dick Clark Productions sued Alan Landsburg Productions over it in federal court. The case was eventually dismissed, and the dismissal was affirmed on appeal. The trial court concluded that copyright protections do not protect the format of a show: "The format of the two shows look similar, but so do the formats of virtually every television news show. The 'look' of a show is not the proper subject of copyright protection."
In 1988-89, a syndicated version of the show was created with Roy Firestone as the host.
Episodes
April 27, 1983 (hosted by John Ritter) (Most viewed prime time show of the week per Nielsen ratings, with 28.0 rating and 44 share)
September 18, 1983 (hosted by Steve Allen, as were all subsequent specials)(21.7 Nielsen rating, or 18.1 million homes, tied for 2nd place for week)
November 10, 1983 (Nielsen rating 19.8, 16.5 million homes, #16 for week)
February 23, 1984
May 1984 (rerun?) (#3 rated show of the week)
November 11, 1984
February 17, 1985
May 5, 1985
August ?, 1985
February 1, 1986 (lowest Nielsen rating of week, 6.9 rating, 68 out of 68 shows)
May 24, 1986
References
External links
American Broadcasting Company original programming
1980s American reality television series
1983 American television series debuts
1986 American television series endings
Blooper shows |
https://en.wikipedia.org/wiki/Salient%20CRGT | GovCIO, previously Salient CRGT, Inc, is an American private firm that provides health analytics, cloud services, Agile software development, mobility services, cyber security, data analytics, and infrastructure optimization to civilian, defense, homeland and intelligence agencies. In addition, it offers services in the areas of command and control, enterprise IT, enterprise mobility, legacy IT transformation, training, and user experience design; as well as a government wide acquisition program management office. The company serves federal civilian, state and local, DoD, national security, commercial, and international markets.
GovCIO is headquartered in Fairfax, Virginia, and has 22 offices with personnel in more than 270 global locations.
In 2017, as Salient CRGT, GovCIO purchased Springfield-based Information Innovators Inc. The acquisition propelled the company to more than half a billion dollars in yearly revenue.
Salient CRGT was acquired by GovernmentCIO LLC, now GovCIO, in August of 2021
References
2015 establishments in Virginia
American companies established in 2015
Companies based in Fairfax, Virginia
Defense companies of the United States
Manufacturing companies based in Virginia
Manufacturing companies established in 2015 |
https://en.wikipedia.org/wiki/Nigel%20Linge | Nigel Linge is Professor of Telecommunications at the University of Salford. He is a specialist in computer networking and telecommunications heritage.
Early life
Linge was educated at Wolsingham Comprehensive School and then at the University of Salford where he obtained a degree in Electronics in 1983. He subsequently completed his PhD there in 1987 for a thesis on the subject of "The interconnection of local area networks using bridges".
Career
Linge is Professor of Telecommunications at the University of Salford. He is a specialist in computer networking and telecommunications heritage about which he has written two books with Andy Sutton. He is a Chartered Engineer and was elected Fellow of the Institution of Engineering and Technology, Fellow of the British Computer Society, and Fellow of the Higher Education Academy.
Selected publications
30 Years of Mobile Phones in the UK. Amberley Publishing, 2015. (With Andy Sutton)
The British Phonebox. Amberley Publishing, 2017. (With Andy Sutton)
References
Alumni of the University of Salford
Academics of the University of Salford
Fellows of the British Computer Society
Fellows of the Higher Education Academy
Fellows of the Institute of Engineering and Technology
Living people
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/Kosaburo%20Hashiguchi | is a Japanese mathematician and computer scientist at the Toyohashi University of Technology and Okayama University, known for his research in formal language theory.
In 1988, he found the first algorithm to determine the star height of a regular language, a problem that had been open since 1963 when Lawrence Eggan solved the related star height problem, showing that there is no finite bound on the star height.
Hashiguchi's algorithm for star height is extremely complex, and impractical on all but the smallest examples. A simpler method, showing also that the problem is PSPACE-complete, was provided in 2005 by Kirsten.
Earlier, in 1979, Hashiguchi had also solved another open problem on regular languages, of deciding whether, for a given language , there exists a finite number such that .
Hashiguchi is the uncle of Japanese-born American pianist Grace Nikae.
Selected publications
References
External links
Home page
Year of birth missing (living people)
Living people
Japanese mathematicians
Japanese computer scientists
Theoretical computer scientists |
https://en.wikipedia.org/wiki/George%20Kurtz | George Kurtz (born May 5, 1965) is the co-founder and CEO of cybersecurity company CrowdStrike and an American racing driver. He was also the founder of Foundstone and chief technology officer of McAfee.
Early life and education
Kurtz grew up in Parsippany-Troy Hills, New Jersey and attended Parsippany High School. He claims that he started programming video games on his Commodore when he was in fourth grade. He went on to build bulletin board systems in high school. He graduated from Seton Hall University with a degree in accounting.
Career
Price Waterhouse and Foundstone
After college, Kurtz began his career at Price Waterhouse as a CPA. In 1993, Price Waterhouse made Kurtz one of its first employees in its new security group. In 1999, he co-wrote Hacking Exposed, a book about cybersecurity for network administrators, with Stuart McClure and Joel Scambray. The book sold more than 600,000 copies and was translated into more than 30 languages. Later that year he started a cybersecurity company, Foundstone, one of the first dedicated security consulting companies. Foundstone focused on vulnerability management software and services and developed a well-recognized incident response practice, with much of the Fortune 100 among its customers.
McAfee
McAfee acquired Foundstone for $86 million in August 2004, with Kurtz assuming the title of senior vice president and general manager of risk management at McAfee. During his tenure, he helped craft the company's strategy for security risk management. In October 2009, McAfee appointed him to the roles of worldwide chief technology officer and executive vice president. In 2010, he participated in Operation Aurora, the investigation of a series of cyber attacks against Google and several other companies. In 2011, he led McAfee's research around the emerging Night Dragon and Shady RAT threats, alongside McAfee's vice president of threat research Dmitri Alperovitch.
Over time, Kurtz became frustrated that existing security technology functioned slowly and was not, as he perceived it, evolving at the pace of new threats. On a flight, he watched the passenger seated next to him wait 15 minutes for McAfee software to load on his laptop, an incident he later cited as part of his inspiration for founding CrowdStrike. He resigned from McAfee in October 2011.
CrowdStrike
In November 2011, Kurtz joined private equity firm Warburg Pincus as an "entrepreneur-in-residence" and began working on his next project, CrowdStrike. He, Gregg Marston (former chief financial officer at Foundstone), and Dmitri Alperovitch co-founded CrowdStrike in Irvine, California, formally announcing the company's launch in February 2012. Kurtz pitched the idea for the company to Warburg Pincus and secured $25 million in funding.
CrowdStrike shifted the focus from anti-malware and antivirus products (McAfee's approach to cybersecurity) to identifying the techniques used by hackers in order to spot incoming threats. The company also devel |
https://en.wikipedia.org/wiki/Structural%20vulnerability%20%28computing%29 | In computing, a structural vulnerability is an IT system weakness that consists of several so-called component vulnerabilities. This type of weakness generally emerges due to several system architecture flaws.
An example of a structural vulnerability is a person working in a critical part of the system with no security training, who doesn’t follow the software patch cycles and who is likely to disclose critical information in a phishing attack.
References
Vulnerability
Computer security exploits
Hacking (computer security) |
https://en.wikipedia.org/wiki/What%20You%20See%20Is%20What%20You%20Get%20%28disambiguation%29 | What You See Is What You Get or WYSIWYG is where computer editing software allows content to be edited in a form that resembles its final appearance.
What You See Is What You Get may also refer to:
Music
What You See Is What You Get (EP), a 1998 EP by Pitchshifter
What You See Is What You Get (Glen Goldsmith album), 1988
What You See Is What You Get (Lil' Ed Williams album), 1992
What You See Is What You Get (Luke Combs album), 2019
"What You See Is What You Get" (song), a 1971 song by Stoney & Meatloaf
"What U See Is What U Get", a 1998 song by rapper Xzibit
"What U See (Is What U Get)", a song by Britney Spears from the 2000 album Oops!... I Did It Again
"What You See" a 1981 song by Oingo Boingo from the album Only a Lad
Others
"What you see is what you get", a phrase popularized by Geraldine Jones, a character from the television show The Flip Wilson Show
What You See Is What You Get (book), a 2010 book written by Alan Sugar
See also
WYSIWYG (disambiguation)
Whatcha See Is Whatcha Get (disambiguation)
"What You Get Is What You See", a song by Tina Turner from her 1987 album Break Every Rule
Stand by Me (Whatcha See Is Whatcha Get), 1971 album by Pretty Purdie and The Playboys
What You See Is What You Sweat |
https://en.wikipedia.org/wiki/Merrie%20Melodies%20Starring%20Bugs%20Bunny%20%26%20Friends | Merrie Melodies Starring Bugs Bunny & Friends is an animated anthology television series that aired weekdays in syndication from 1990 to 1992 and on the Fox Kids Network from 1992 to 1994. Originally made to coincide with Bugs Bunny's 50th birthday and the debut of Tiny Toon Adventures, the series featured cartoons from the Looney Tunes and Merrie Melodies library and was distributed by Warner Bros. Domestic Television Distribution.
This series is not to be confused with Warners' earlier syndicated anthology The Merrie Melodies Show.
Format
For the syndicated version of the series, each episode began with a title sequence, directed by Darrell Van Citters, featuring Bugs Bunny and Daffy Duck showing classic cartoon clips on a screen; as usual, Daffy would try to butt in on the action, only for some humorous setback to befall him (five different setups were made, one for each weekday). The show itself ran for a half-hour and contained three classic shorts, one of them starring Bugs Bunny, with a short "Hip Clip" placed in between the second and third shorts. 65 episodes of Merrie Melodies were created and aired in first-run syndication from September 17 to December 14, 1990; reruns aired from then until 1992.
Merrie Melodies moved to the Fox Kids Network in September 1992, which brought forth several changes to the format. A new animated opening was produced featuring Bugs oversleeping and making a frantic run through the Warner Bros. Studios, passing by several Looney Tunes characters as he makes his way to a soundstage.
Episodes
Season 1
An asterisk (*) denotes a black-and-white cartoon that was computer-colorized.
References
External links
1990s American animated television series
1990 American television series debuts
1994 American television series endings
1990s American anthology television series
Looney Tunes television series
American children's animated anthology television series
English-language television shows
Television series by Warner Bros. Animation
Television series by Warner Bros. Television Studios
Fox Kids
Bugs Bunny |
https://en.wikipedia.org/wiki/Leslie%20M.%20Moore | Leslie Melissa (Lisa) Moore is a statistician at Los Alamos National Laboratory. At Los Alamos, she applies statistics to scientific experiments and simulations, as well as studying algorithms for statistical problems and the design of experiments for computerized studies.
Education and career
Moore completed her Ph.D. in 1985 at the University of Texas at Austin, where she had also done her undergraduate studies. Her dissertation, supervised by Peter W. M. John, was Ordering the Points in Factorial Experiments to Protect against Early Termination. She worked at Los Alamos for six years. Then, after moving to Duke University for a year and then working for a personnel supply company in Albuquerque, she returned to Los Alamos in 1998. She chaired the steering committee of the Design and Analysis of Experiments Conference from 2009 to 2012.
Recognition
She is a fellow of the Royal Statistical Society.
In 2010, Los Alamos gave her their lifetime achievement award for her work with the student intern program at Los Alamos,
and in 2013, the San Antonio Chapter of the American Statistical Association gave her their annual Don Owen Award.
In 2014, she was elected as a Fellow of the American Statistical Association.
References
Year of birth missing (living people)
Living people
American statisticians
Women statisticians
University of Texas at Austin College of Natural Sciences alumni
Los Alamos National Laboratory personnel
Fellows of the American Statistical Association
Fellows of the Royal Statistical Society |
https://en.wikipedia.org/wiki/Craig%20of%20the%20Creek | Craig of the Creek is an American animated television series created by Matt Burnett and Ben Levin for Cartoon Network. The show's pilot episode debuted directly on the official app on December 1, 2017. The series premiered online on February 19, 2018, with a double-premiere event airing on March 30, 2018.
On February 17, 2021, the series was renewed for a fourth season which premiered on October 25, 2021. On January 19, 2022, the series was renewed for a fifth season, which premiered on July 10, 2023. Additionally, a spin-off Jessica's Big Little World, and an origin film titled Craig of the Creek: The Movie, are currently in production.
In October 2022, it was announced that the fifth season of the series would be cut in half by Warner Bros. Discovery. In December 2022, it was announced the show's final episode had been written, and that seven episodes were cut from the fifth season.
The series has received positive reviews from critics. Its themes of friendship, diversity, and LGBT representation have attracted a broad fanbase.
Synopsis
In the fictional suburban Baltimore/DC area town of Herkleton, Maryland, a boy named Craig Williams and his two friends, Kelsey Pokoly and "J.P." Mercer, have their many adventures in the titular creek, described as a kid utopia of untamed wilderness in which tribes of children reign over tree forts and dirt bike ramps.
Characters
Main
Craig Williams (voiced by Philip Solomon) – A 10-year-old boy who enjoys playing at the creek with his friends, Kelsey and J.P. He is a natural leader and always tries to help other kids when they need it the most. He has a colorful family that has been the focus of several episodes (such as "King of Camping"). Craig typically carries a homemade staff and a purse, each holding sentimental value. In "Escape From Family Dinner", it is shown that Craig takes advanced math and admits that he likes the class. He also takes on the role of a cartographer as he is constantly making additions to his detailed map of the Creek.
Kelsey Pokoly (voiced by Georgie Kidder (pilot, season 1, episodes 1–3), Noël Wells (season 1, episode 4–present)) – A ginger-haired, 9-year-old girl who is one of Craig's close friends. She is always seen wearing a purple cape and has a pet budgerigar (which she identifies as a falcon) named Mortimor who is usually perched on top of her head. She typically carries a homemade PVC pipe sword which she proudly made herself partly with the help of a blacksmith. She and her family are implied to be Hungarian in "The Invitation" and "The Last Kid in the Creek" due to her knowledge of Hungarian cuisine; Pokoly, her family name, is likely derived from the Hungarian word "pokoli", meaning "hellish". She is adventurous, loves books, and tends to be overly dramatic. She often internally narrates her life, for which others are completely aware. She is raised by her single widower father. In "Doorway to Helen", it is revealed that Kelsey is Jewish, and in "Fire & Ice" |
https://en.wikipedia.org/wiki/Vulnerabilities%20Equities%20Process | The Vulnerabilities Equities Process (VEP) is a process used by the U.S. federal government to determine on a case-by-case basis how it should treat zero-day computer security vulnerabilities; whether to disclose them to the public to help improve general computer security, or to keep them secret for offensive use against the government's adversaries.
The VEP was first developed during the period 2008–2009, but only became public in 2016, when the government released a redacted version of the VEP in response to a FOIA request by the Electronic Frontier Foundation.
Following public pressure for greater transparency in the wake of the Shadow Brokers affair, the U.S. government made a more public disclosure of the VEP process in November 2017.
Participants
According to the VEP plan published in 2017, the Equities Review Board (ERB) is the primary forum for interagency deliberation and determinations concerning the VEP. The ERB meets monthly, but may also be convened sooner if an immediate need arises.
The ERB consists of representatives from the following agencies:
Office of Management and Budget
Office of the Director of National Intelligence (including the Intelligence Community-Security Coordination Center)
United States Department of the Treasury
United States Department of State
United States Department of Justice (including the Federal Bureau of Investigation and the National Cyber Investigative Joint Task Force)
Department of Homeland Security (including the National Cybersecurity and Communications Integration Center and the United States Secret Service)
United States Department of Energy
United States Department of Defense (to include the National Security Agency, including Information Assurance and Signals Intelligence elements), United States Cyber Command, and DoD Cyber Crime Center)
United States Department of Commerce
Central Intelligence Agency
The National Security Agency serves as the executive secretariat for the VEP.
Process
According to the November 2017 version of the VEP, the process is as follows:
Submission and notification
When an agency finds a vulnerability, it will notify the VEP secretariat as soon as is possible. The notification will include a description of the vulnerability and the vulnerable products or systems, together with the agency's recommendation to either disseminate or restrict the vulnerability information.
The secretariat will then notify all participants of the submission within one business day, requesting them to respond if they have an relevant interest.
Equity and discussions
An agency expressing an interest must indicate whether it concurs with the original recommendation to disseminate or restrict within five business days. If it does not, it will hold discussions with the submitting agency and the VEP secretariat within seven business days to attempt to reach consensus. If no consensus is reached, the participants will suggest options for the Equities Review Board.
Det |
https://en.wikipedia.org/wiki/Data%20preservation | Data preservation is the act of conserving and maintaining both the safety and integrity of data. Preservation is done through formal activities that are governed by policies, regulations and strategies directed towards protecting and prolonging the existence and authenticity of data and its metadata. Data can be described as the elements or units in which knowledge and information is created,
and metadata are the summarizing subsets of the elements of data; or the data about the data. The main goal of data preservation is to protect data from being lost or destroyed and to contribute to the reuse and progression of the data.
History
Most historical data collected over time has been lost or destroyed. War and natural disasters combined with the lack of materials and necessary practices to preserve and protect data has caused this. Usually, only the most important data sets were saved, such as government records and statistics, legal contracts and economic transactions. Scientific research and doctoral theses data have mostly been destroyed from improper storage and lack of data preservation awareness and execution. Over time, data preservation has evolved and has generated importance and awareness. We now have many different ways to preserve data and many different important organizations involved in doing so.
The first digital data preservation storage solutions appeared in the 1950s, which were usually flat or hierarchically structured. While there were still issues with these solutions, it made storing data much cheaper, and more easily accessible. In the 1970s relational databases as well as spreadsheets appeared. Relational data bases structure data into tables using structured query languages which made them more efficient than the preceding storage solutions, and spreadsheets hold high volumes of numeric data which can be applied to these relational databases to produce derivative data. More recently, non-relational (non-structured query language) databases have appeared as complements to relational databases which hold high volumes of unstructured or semi-structured data.
Importance
The scope of data preservation is vast. Everything from governmental to business records to art essentially can be represented as data, and is amenable to be lost. This then leads to loss of human history, for perpetuity.
Data can be lost on a small or independent scale whether it's personal data loss, or data loss within businesses and organizations, as well as on a larger or national or global scale which can negatively and potentially permanently affect things such as environmental protection, medical research, homeland security, public health and safety, economic development and culture. The mechanisms of data loss are also as many as they are varied, spanning from disaster, wars, data breaches, negligence, all the way through simple forgetting to natural decay.
Ways in which data collections can be used when preserved and stored properly can be s |
https://en.wikipedia.org/wiki/Leela%20%28software%29 | Leela is a computer Go software developed by Belgian programmer Gian-Carlo Pascutto, the author of chess engine Sjeng. It won the third place for 19x19 board Go and the second place for 9x9 board Go at the Computer Olympiad in 2008, and won the eighth place in the 1st World AI Go Tournament in August 2017. According to its website, it has "Strength over 9 dan on 19 x 19, depending on hardware". The program was named "Leela" because the author wanted a pleasant female name that contrasted with the prevailing style at the time, typified by names like "Shredder", "Tiger", and "Rebel".
A version featuring deep learning technology was released for free in February 2017. It was the first Go engine close to professional level freely available on a personal computer.
Leela should not be confused with Leela Zero, a stronger program developed by Pascutto and collaborators beginning in late 2017.
See also
Leela Zero, an open-source Go-playing program based on DeepMind's AlphaGo Zero paper, also developed by Gian-Carlo Pascutto
Leela Chess Zero, an open-source chess-playing program that was adapted from Leela Zero
References
External links
Leela on Sensei's Library
Go engines
Freeware |
https://en.wikipedia.org/wiki/Leela%20Zero | Leela Zero is a free and open-source computer Go program released on 25 October 2017. It is developed by Belgian programmer Gian-Carlo Pascutto, the author of chess engine Sjeng and Go engine Leela.
Leela Zero's algorithm is based on DeepMind's 2017 paper about AlphaGo Zero.
Unlike the original Leela, which has a lot of human knowledge and heuristics programmed into it, the program code in Leela Zero only knows the basic rules and nothing more. The knowledge that makes Leela Zero a strong player is contained in a neural network, which is trained based on the results of previous games that the program played.
Leela Zero is trained by a distributed effort, which is coordinated at the Leela Zero website. Members of the community provide computing resources by running the client, which generates self-play games and submits them to the server. The self-play games are used to train newer networks. Generally, over 500 clients have connected to the server to contribute resources. The community has provided high quality code contributions as well.
Leela Zero finished third at the BerryGenomics Cup World AI Go Tournament in Fuzhou, Fujian, China on 28 April 2018. The New Yorker at the end of 2018 characterized Leela and Leela Zero as "the world’s most successful open-source Go engines".
In early 2018, another team branched Leela Chess Zero from the same code base, also to verify the methods in the AlphaZero paper as applied to the game of chess. AlphaZero's use of Google TPUs was replaced by a crowd-sourcing infrastructure and the ability to use graphics card GPUs via the OpenCL library. Even so, it is expected to take a year of crowd-sourced training to make up for the dozen hours that AlphaZero was allowed to train for its chess match in the paper.
References
External links
Leela Zero on GitHub
Leela Zero on Sensei's Library
Play Leela Zero on ZBaduk
Go engines
Free and open-source software
2017 software
Applied machine learning |
https://en.wikipedia.org/wiki/National%20Cyber%20Investigative%20Joint%20Task%20Force | The National Cyber Investigative Joint Task Force (NCIJTF) was officially established in 2008. The NCIJTF comprises over 20 partnering agencies from across law enforcement, the intelligence community, and the Department of Defense, with representatives who are co-located and work jointly to accomplish the organization's mission.
Since 2008, NCIJTF has been the primary American agency responsible for coordinating cyber threats investigations, and liaisons with the Central Intelligence Agency (CIA), Department of Defense (DOD), Department of Homeland Security (DHS), and National Security Agency (NSA).
As a multi-agency cyber center, the NCIJTF coordinates, integrates, and shares information to support cyber threat investigations, supply and support intelligence analysis for community decision-makers, and support other efforts in the fight against cyber threats. The task force uses the collective resources of its members and collaborates with international and private sector partners to bring all available resources to bear against domestic cyber threats and their perpetrators.
References
External links
National Cyber Investigative Joint Task Force
Federal law enforcement agencies of the United States
2008 establishments in the United States
Computer security organizations
Federal Bureau of Investigation |
https://en.wikipedia.org/wiki/Spectrum%20TV%20Stream | Spectrum TV Stream is an American over-the-top internet television service owned by Charter Communications. The service – which is structured as a virtual multichannel video programming distributor – is only available to Charter Spectrum internet customers. It is designed as an alternative to other competing OTT skinny bundles for cord cutters, offering a selection of major cable channels and on-demand content that can be streamed through smart TVs, digital media players, and mobile apps. The service offers third party services like Max.
Supported devices
Supported Spectrum TV devices include:
TV-connected
Amazon Fire TV
Apple TV
Chromecast
Roku
Samsung Smart TV
Xbox One
Xbox Series X/S
Mobile
Android mobile devices
Apple iOS mobile devices (including iPhones and iPads)
Computer
macOS
Windows
See also
Spectrum
DirecTV Stream
FuboTV
LocalBTV
Now
PlayStation Vue
Sling TV
YouTube TV
References
External links
Internet television streaming services
Charter Communications |
https://en.wikipedia.org/wiki/Algorithmic%20bias | Algorithmic bias describes systematic and repeatable errors in a computer system that create "unfair" outcomes, such as "privileging" one category over another in ways different from the intended function of the algorithm.
For mapping this to ideas in statistical learning, it is ```extremely important``` to note that the "bias" here is typically the ```variance``` in the bias-variance trade off in machine learning. So it is actually the opposite of real machine learning bias. It is variance, the model is over-fitting the data or data generation process. In situations where there was no training data and or no consistent learning, then the "algorithmic bias" is simply a measure of deviation according to some score.
Bias can emerge from many factors, including but not limited to the design of the algorithm or the unintended or unanticipated use or decisions relating to the way data is coded, collected, selected or used to train the algorithm. For example, algorithmic bias has been observed in search engine results and social media platforms. This bias can have impacts ranging from inadvertent privacy violations to reinforcing social biases of race, gender, sexuality, and ethnicity. The study of algorithmic bias is most concerned with algorithms that reflect "systematic and unfair" discrimination. This bias has only recently been addressed in legal frameworks, such as the European Union's General Data Protection Regulation (2018) and the proposed Artificial Intelligence Act (2021).
As algorithms expand their ability to organize society, politics, institutions, and behavior, sociologists have become concerned with the ways in which unanticipated output and manipulation of data can impact the physical world. Because algorithms are often considered to be neutral and unbiased, they can inaccurately project greater authority than human expertise (in part due to the psychological phenomenon of automation bias), and in some cases, reliance on algorithms can displace human responsibility for their outcomes. Bias can enter into algorithmic systems as a result of pre-existing cultural, social, or institutional expectations; because of technical limitations of their design; or by being used in unanticipated contexts or by audiences who are not considered in the software's initial design.
Algorithmic bias has been cited in cases ranging from election outcomes to the spread of online hate speech. It has also arisen in criminal justice, healthcare, and hiring, compounding existing racial, socioeconomic, and gender biases. The relative inability of facial recognition technology to accurately identify darker-skinned faces has been linked to multiple wrongful arrests of black men, an issue stemming from imbalanced datasets. Problems in understanding, researching, and discovering algorithmic bias persist due to the proprietary nature of algorithms, which are typically treated as trade secrets. Even when full transparency is provided, the complexity of certain alg |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.