source stringlengths 32 199 | text stringlengths 26 3k |
|---|---|
https://en.wikipedia.org/wiki/Soft%20privacy%20technologies | Soft privacy technologies fall under the category of PETs, Privacy-enhancing technologies, as methods of protecting data. Soft privacy is a counterpart to another subcategory of PETs, called hard privacy. Soft privacy technology has the goal of keeping information safe, allowing services to process data while having full control of how data is being used. To accomplish this, soft privacy emphasizes the use of third-party programs to protect privacy, emphasizing auditing, certification, consent, access control, encryption, and differential privacy. Since evolving technologies like the internet, machine learning, and big data are being applied to many long-standing fields, we now need to process billions of datapoints every day in areas such as health care, autonomous cars, smart cards, social media, and more. Many of these fields rely on soft privacy technologies when they handle data.
Applications
Health care
Some medical devices like Ambient Assisted Living monitor and report sensitive information remotely into a cloud. Cloud computing offers a solution that meets the healthcare need for processing and storage at an affordable price. Together, this system is used to monitor a patient's biometric conditions remotely, connecting with smart technology when necessary. In addition to monitoring, the devices can also send a mobile notification when certain conditions pass a set point such as a major change in blood pressure. Due to the nature of these devices, which report data constantly and use smart technology, this type of medical technology is subject to a lot of privacy concerns. Soft privacy is thus relevant for the third-party cloud service, as many privacy concerns center there, including risk in unauthorized access, data leakage, sensitive information disclosure, and privacy disclosure.
One solution proposed for privacy issues around cloud computing in health care is through the use of Access control, by giving partial access to data based on a user's role: such as a doctor, family, etc. Another solution, applicable for wireless technology that moves data to a cloud, is through the usage of Differential privacy. The differential privacy system typically encrypts the data, sends it to a trusted service, then opens up access to it for hospital institutions. A strategy that is often used to prevent data leakage and attacks works by adding ‘noise’ into the data which changes its values slightly. The real underlying information can be accessed through security questions. A study by Sensors concluded that differential privacy techniques involving additional noise helped achieve mathematically-precise guaranteed privacy.
Adding noise to data by default can prevent devastating privacy breaches. In the mid-90's the Commonwealth of Massachusetts Group Insurance Commission released anonymous health records while hiding some sensitive information such as addresses and phone numbers. Despite this attempt to hiding personal information while providi |
https://en.wikipedia.org/wiki/Shuffle-exchange%20network | In graph theory, the shuffle-exchange network is an undirected cubic multigraph, whose vertices represent binary sequences of a given length and whose edges represent two operations on these sequence, circular shifts and flipping the lowest-order bit.
Definition
In the version of this network introduced by Tomas Lang and Harold S. Stone in 1976, simplifying earlier work of Stone in 1971, the shuffle-exchange network of order consisted of an array of cells, numbered by the different binary numbers that can be represented with bits. These cells were connected by communications links in two different patterns: "exchange" links in which each cell is connected to the cell numbered with the opposite value in its lowest-order bit, and "shuffle" links in which each cell is connected to the cell whose number is obtained by a circular shift that shifts every bit to the next more significant position, except for the highest-order bit which shifts into the lowest-order position. The "exchange" links are bidirectional, while the "shuffle" links can only transfer information in one direction, from a cell to its circular shift.
Subsequent work on networks with this topology removed the distinction between unidirectional and bidirectional communication links, allowing information to flow in either direction across each link.
Applications
The advantage of this communications pattern, over earlier methods, is that it allows information to be rapidly transferred through a small number of steps from any vertex in the network to any other vertex, while only requiring a single bit of control information (which of the two communications links to use) for each communications step. Fast parallel algorithms for basic problems including sorting, matrix multiplication, polynomial evaluation, and Fourier transforms are known for parallel systems using this network.
Layout area
If this network is given a straightforward layout in the integer lattice, with the vertices placed on a line in numerical order, with each lattice edge carrying part of at most one communication link, and with each vertex or crossing of the network placed at a lattice point, the layout uses area , quadratic in its number of vertices. However, more compact and asymptotically optimal layouts with area were described by F. Thomson Leighton in his 1981 doctoral dissertation.
Related networks
A related communications network, the "omega network" or multi-stage shuffle-exchange network, consists of a given number of stages, each consisting of vertices, with the shuffle links connecting pairs of vertices in consecutive stages and the exchange links connecting pairs of vertices in the same stage as each other.
The same operations on binary words, of rotation and flipping the first bit, can also be used to generate the cube-connected cycles, a different cubic parallel communications network with a greater number of vertices. Instead of having the binary words themselves as its vertices, the vertices |
https://en.wikipedia.org/wiki/MiHoYo | miHoYo Co., Ltd. (), also known as miHoYo Network Technology Co., Ltd. () is a Chinese video game development and publishing company. In addition to games, the company has created various products such as animated series, novels, comics, music, and merchandise.
The company is the creator of the Honkai series, which consists of several games, including Honkai Impact 3rd and Honkai: Star Rail. miHoYo also developed Tears of Themis, a free-to-play adventure game. Another game that they have developed is Genshin Impact, an open-world action role-playing game, which is one of the highest-grossing mobile games of 2021.
Aiming to expand its content production, technology research, and publications outside China, in February 2022, miHoYo launched its global publishing subsidiary Cognosphere Pte., Ltd. (trading as HoYoverse and stylized as COGNOSPHERE) based in Queenstown, Singapore. Since then, miHoYo has been doing business globally under the brand and has operations in Montreal, Los Angeles, Tokyo, and Seoul.
miHoYo also operates under the subsidiaries Shanghai miHoYo Yingtie Technology and Shanghai miHoYo Tianming Technology; the former is the publisher of Genshin Impact, Honkai: Star Rail, and Zenless Zone Zero, while the latter is the developer of Tears of Themis. The global subsidiary Cognosphere Pte., Ltd. known as HoYoverse is the co-publisher of Tears of Themis, Genshin Impact, Honkai: Star Rail and Zenless Zone Zero.
Etymology
The letters "H" and "Y" in miHoYo's name come from the names 2 of 3 founders, Cai Haoyu and Luo Yuhao, and the letter "O" was added based on the fact that names of famous companies such as Facebook, Google and Microsoft contain that letter. Due to "HoYo" already being registered, "mi" from the VOCALOID software Hatsune Miku was prepended to the name. Hatsune Miku was picked because of her popularity among otaku.
History
Foundation
miHoYo began with three computer science students from Shanghai Jiao Tong University who shared an interest in technology and ACG (anime, comics, and games) culture: Cai "Hugh" Haoyu (), Liu "Forrest" Wei (), and Luo Yuhao (). Before establishing the miHoYo name, the three have worked on projects together. Their first project was an open-source literature community which won them scholarships worth CNY 200,000 at a competition.
In 2010, the team developed an isometric tile-based game engine called the "Misato Engine" or "Misato2D" using Adobe Flash Player. Katsuragi Misato, a character from the Japanese franchise Neon Genesis Evangelion, inspired the name. Using an upgraded version of the engine, they developed a game called Legend of Saha () for a Flash game development competition held during the second China Game Developers Conference (CGDC) in July of that year. The team won a cash prize of CNY 30,000 provided by Shanda Games. Shanda Games later outsourced them to develop a mini-game called Bubble Hero ().
Studio business
In January 2011, the three students set up the miHoYo studio |
https://en.wikipedia.org/wiki/List%20of%201978%20box%20office%20number-one%20films%20in%20the%20United%20States | This is a list of films which placed number one at the weekly box office in the United States during 1978 per Variety. The data was based on grosses from 20 to 22 key cities and therefore, the gross quoted may not be the total that the film grossed nationally in the week.
Number-one films
Highest grossing films
See also
List of American films — American films by year
Lists of box office number-one films
Notes
References
External links
Domestic Box Office Weekends For 1978 (Box Office Mojo)
Theatrical Weekly Box Office Chart Calendar for 1978 (The Numbers)
Chronology
1978
1978 in American cinema
1978-related lists |
https://en.wikipedia.org/wiki/Call%20setup | In telecommunication, call setup is the process of establishing a virtual circuit across a telecommunications network. Call setup is typically accomplished using a signaling protocol.
The term call set-up time has the following meanings:
The overall length of time required to establish a circuit-switched call between users.
For data communication, the overall length of time required to establish a circuit-switched call between terminals; i.e., the time from the initiation of a call request to the beginning of the call message.
Note: Call set-up time is the summation of: (a) call request time—the time from initiation of a calling signal to the delivery to the caller of a proceed-to-select signal; (b) selection time—the time from the delivery of the proceed-to-select signal until all the selection signals have been transmitted; and (c) post selection time—the time from the end of the transmission of the selection signals until the delivery of the call-connected signal to the originating terminal.
Success rate
In telecommunications, the call setup success rate (CSSR) is the fraction of the attempts to make a call that result in a connection to the dialled number (due to various reasons not all call attempts end with a connection to the dialled number). This fraction is usually measured as a percentage of all call attempts made.
In telecommunications a call attempt invokes a call setup procedure, which, if successful, results in a connected call. A call setup procedure may fail due to a number of technical reasons. Such calls are classified as failed call attempts. In many practical cases, this definition needs to be further expanded with a number of detailed specifications describing which calls exactly are counted as successfully set up and which not. This is determined to a great degree by the stage of the call setup procedure at which a call is counted as connected. In modern communications systems, such as cellular (mobile) networks, the call setup procedure maybe very complex and the point at which a call is considered successfully connected may be defined in a number of ways, thus influencing the way the call setup success rate is calculated. If a call is connected successfully but the dialled number is busy, the call is counted as successful.
Another term, used to denote call attempts that fail during the call setup procedure, is blocked calls.
The call setup success rate in conventional (so-called land-line) networks is extremely high and is significantly above 99.9%. In mobile communication systems using radio channels the call setup success rate is lower and may range for commercial networks between 90% and 98% or higher. The main reasons for unsuccessful call setups in mobile networks are lack of radio coverage (either in the downlink or the uplink), radio interference between different subscribers, imperfections in the functioning of the network (such as failed call setup redirect procedures), overload of the different element |
https://en.wikipedia.org/wiki/Michael%20Overton | Michael L. Overton is an American computer scientist and mathematician.
He is the Silver Professor of Computer Science and former Chair of the Computer Science department at Courant Institute of Mathematical Sciences, New York University. His research interests are in
Numerical Analysis, Optimization, and Scientific Computing.
Education and career
Overton received his B.Sc. in Computer Science from the University of British Columbia in 1974 and received his Ph.D. in computer science from Stanford University in 1979, under the supervision of Gene Golub. He joined the Computer Science Department at Courant Institute of Mathematical Sciences, New York University soon after that, and served as its chair. He was the editor-in-chief of the SIAM Journal on Optimization from 1995 to 1999 and is an inaugural SIAM Fellow.
Works
Numerical Computing with IEEE Floating Point Arithmetic, SIAM, 2001.
References
External links
Google Scholar
Homepage at NYU
American computer scientists
Courant Institute of Mathematical Sciences faculty
Fellows of the Society for Industrial and Applied Mathematics
Living people
Scientific computing researchers
Stanford University alumni
Year of birth missing (living people)
Silver professors
University of British Columbia alumni |
https://en.wikipedia.org/wiki/The%20Sims%20Spark%27d | The Sims Spark'd is a reality competition television series that premiered on the TBS network on July 17, 2020. The first season of the series, filmed from December 9 to 14, 2019, features 12 contestants, selected from those known to feature The Sims in their online gaming channels, tasked with challenges within The Sims 4 to create characters and stories following the challenge's themes and limitations. Each competitor's creation is judged by a panel consisting of EA Maxis developer and The Sims 4 producer Dave Miotke ( "SimGuruNinja" within the Sims Community), YouTube personality Kelsey Impicciche (known for her "100 Baby Challenge"), and singer-songwriter Tayla Parx, who is also a voice actress in The Sims 4. The series is hosted by American Idol season 14 finalist Rayvon Owen.
Each episode of the first season premiered on TBS on Friday nights at 11pm ET/PT in the United States, and was later uploaded on YouTube channel BuzzFeed Multiplayer the following Monday for international audiences at 8am Eastern. Challenges were posted to The Sims 4 website following the series premiere to seek potential contestants for a second season.
Format
At the beginning of the competition, all 12 contestants were assigned to teams via random draw. Each team is composed of a Stylist (handling the designs), Builder (in charge of buildings), and the Storyteller (invents the stories related to Sims). For every episode, they have to fulfill specific challenges as a team based around several scenarios.
Cast
Notes
Challenge Results
Episodes
Each episode premiered on TBS on Friday nights at 11pm ET/PT and on YouTube channel BuzzFeed Multiplayer the following Monday at 8am Eastern.
Development
As a project in planning, Spark'd had a long lead time as Electronic Arts wanted to combine the players' personal stories with a TV reality format filled with challenges. The company decided to make the show in-house instead of outsourcing it to anyone else. EA was worried about the specifics of translating a video game into another medium, and thus tried not to diverge from the main aspects of The Sims while putting an effort to represent diversity. The initial idea was to develop Spark'd as a short-length show for the millennials. However, after the initial filming in December 2019, the COVID-19 pandemic prompted EA to retool their marketing plans from scratch. The Sims Spark'd was found to be a fit for a TBS's ELeague Friday programming block change to include shows that are not just aimed at dedicated gamers.
During and following the broadcast of the first season, EA posted Spark'd challenges on The Sims 4 website for players to complete in-game and upload to the website for the opportunity to be selected for a potential second season of The Sims Spark'd.
References
External links
Reality competition television series
Television shows about video games
2020 American television series debuts
TBS (American TV channel) original programming
The Sims |
https://en.wikipedia.org/wiki/Nazir%20Peroz | Nazir Peroz (born 1955 in Kabul) is a German/Afghan computer scientist whose research focus is on IT in Afghanistan and other developing countries.
Background
He decided to study in Berlin(Germany) in 1977.
In 1999, Peroz founded the ``Zentrum für internationale und interkulturelle Kommunikation (ZiiK) at his faculty, which he has headed since 2000. In this capacity, he has been actively involved in the reconstruction of his home country Afghanistan since 2001. Between 2003 and 2014, he established five IT centers at the universities Kabul University, Herat, Nangarhar, Balkh and Kandahar. In 2007, he established a master program in computer science for Afghan lecturers at the TU Berlin and founded an IT competence center in Kabul (ITCC Afghanistan).
Peroz is an expert at the Department of Computer Science and Society of the Gesellschaft für Informatik (GI e. V.), from 1996 to 2010 there as speaker of the department "Informatics and Third World" (today "Informatics and Social Development"). From 1996 to 2006 he was a member of the Development Planning Department of the TU Berlin, since 2002 he was the DAAD Coordinator for Information Technology and Computer Science for Afghanistan, since 2003 Advisor to the Afghan Ministry of Higher Education, since 2017 "Brain City Berlin Ambassador".
Honors and awards
2012: Honorary Professor of the University of Herat
2015: Prize of the Faculty of Electrical Engineering and Computer Science
2016: Sayed Djamal ad-Din Afghani Medal, highest state award in the field of science in Afghanistan
Publications (selection)
Mahr, B., Peroz, N.: Establishing Academic Structures in Computer Science at Herat University, IKO-Verlag 2006,
Peroz, N.: Framework for a Functional IT Supply in Higher Education in Afghanistan, LIT-Verlag 2009,
Peroz, N.: Strategieentwicklung für bestimmte Entwicklungsländer im Bereich Informationstechnologie book on demand,
Peroz, N.: Digitale Revolution? Soziale Netzwerke in Nordafrika In: Wissenschaft & Frieden 2011-4 , Darmstadt, page 31-32
Peroz, N.: Establishing IT Structures at Kabul University IKO Publishing House 2013,
Memberships (selection)
Department of Computer Science and Society of Gesellschaft für Informatik e.V.
References
External links
entries for Nazir Peroz in the search engine Google Scholar.
Website of the IT Center of Kabul University, ITCK
Project overview of the ZiiK of the TU Berlin.
Website of the IT Competence Center Afghanistan (ITCC Afghanistan).
Expedition Heimat - A Journey with Nazir Peroz through Afghanistan on behalf of the German Foreign Office, carried out by Deutsche Welle, 2017.
Website of the Center for International and Intercultural Communication (ZiiK) of the TU Berlin.
1955 births
Living people |
https://en.wikipedia.org/wiki/East%20Front%20II%3A%20The%20Russian%20Front | East Front II: The Russian Front is a 1999 computer wargame developed and published by TalonSoft. Part of the Campaign series, it is the follow-up to East Front and West Front.
East Front II was followed by Rising Sun and Divided Ground.
Gameplay
East Front II is a computer wargame that simulates conflict on the Eastern Front of World War II between 1939 and 1945.
Development
East Front II was developed by TalonSoft as an entry in its Campaign series, and follow-up to the game East Front. Rather than being a strict sequel, East Front II builds on the foundation of East Front, combining patches for the first game, improvements from the East Front Campaign CD1 expansion pack, additions from West Front and new material. It uses an upgraded version of West Fronts game engine. The game was released in 1999.
Reception
Martin E. Cirulis of CNET Gamecenter called East Front II "what East Front should have been." Computer Games Strategy Plus reviewer Richard A. Lechowich similarly dubbed it "a better game than its previous incarnations." In Computer Gaming World, Jim Cobb concurred, but found that the game was "not quite up to the level of West Front, much less The Operational Art of War".
Legacy
The third game in the Campaign series, East Front II was followed by Rising Sun and Divided Ground: Middle East Conflict 1948–1973.
References
External links
Official page (archived)
1999 video games
Computer wargames
Turn-based strategy video games
Video games about Nazi Germany
Video games set in the Soviet Union
Windows games
Windows-only games
World War II video games
Video games developed in the United States
TalonSoft games
Multiplayer and single-player video games |
https://en.wikipedia.org/wiki/Rising%20Sun%20%28video%20game%29 | Rising Sun is a 2000 computer wargame developed by TalonSoft and published by Take-Two Interactive. Set during the Pacific War, it is an entry in TalonSoft's Campaign series.
Rising Sun won positive reviews from critics and was nominated for awards by Computer Gaming World and Computer Games Magazine.
Gameplay
Rising Sun is a computer wargame that simulates conflict during the Pacific War.
Development
Rising Sun was developed by TalonSoft as the last game in its Campaign series, following titles such as East Front and West Front. It was released on February 1, 2000.
Reception
Rising Sun received an average score of 82% on the review aggregation website GameRankings. The game was nominated for Computer Games Magazines 2000 "Wargame of the Year" award. Computer Gaming World nominated Rising Sun in the same category, but gave the prize to Combat Mission: Beyond Overlord. The editors called Rising Sun a "terrific" title that "took the traditional hex-based wargame to its zenith".
In Computer Games Magazine, Carl Lund wrote that Rising Suns "epic scope and sheer massiveness ensure replayability for months, if not years, to come." Bruce Geryk of Computer Gaming World similarly praised the game for "tak[ing] the hex-based, sequential-turn wargame to a level of refinement previously unseen".
Legacy
Imperial Strike
Sequel
Although announced as the final game in the Campaign series, Rising Sun received a follow-up in 2001 under the title Divided Ground: Middle East Conflict 1948-1973.
References
External links
Official page (archived)
2000 video games
Computer wargames
Japan in non-Japanese culture
Turn-based strategy video games
Windows games
Windows-only games
World War II video games
Video games developed in the United States
Video games set in the Marshall Islands
Video games set in the Philippines
Pacific War video games
TalonSoft games
Multiplayer and single-player video games
Take-Two Interactive games |
https://en.wikipedia.org/wiki/Sue%20Sentance | Susan Sentance is a British computer scientist, educator and director of the Raspberry Pi Foundation Computing Education Research Centre at the University of Cambridge. Her research investigates a wide range of issues computer science education, teacher education and the professional development of those teaching computing. In 2020 Sentance was awarded a Suffrage Science award for her work on computing education.
Early life and education
Sentance studied artificial intelligence (AI) and information technology (IT) at the University of Edinburgh where she was awarded a Master of Science degree in 1989 followed by a PhD in 1993 investigating intelligent computer-assisted language learning (ICALL) supervised by Helen Pain and Elisabet Engdahl.
Career and research
In 2014 Sentance joined King's College London as a lecturer in computing education. Sentance served on the Royal Society computing education advisory group in 2016, with whom she investigated computer science education in the United Kingdom. Sentance was involved with the evaluation of .NET Gadgeteer and the Micro Bit.
Sentance joined the Raspberry Pi Foundation in 2018 as Chief Learning Officer where she oversees a gender disparity in computing program that seeks to improve the representation of girls in computer science classes. She has served on the board of Computing at School (CAS). Her research has been funded by the Engineering and Physical Sciences Research Council (EPSRC) and Microsoft. She collaborates with the National Centre for Computing Education (NCCE) and joined the Department of Computer Science and Technology, University of Cambridge in 2021.
With Erik Barendsen and Carsten Schulte, she edited the book Computer Science Education: Perspectives on Teaching and Learning in School.
Awards and honours
2017: British Educational Research Association (BERA) public engagement and impact award
2020: Suffrage Science award for her work on computing education.
References
British computer scientists
Alumni of the University of Edinburgh
Living people
Year of birth missing (living people)
Academics of King's College London
Members of the University of Cambridge Computer Laboratory |
https://en.wikipedia.org/wiki/Hancock%20%28programming%20language%29 | Hancock is a C-based programming language, first developed by researchers at AT&T Labs in 1998, to analyze data streams. The language was intended by its creators to improve the efficiency and scale of data mining. Hancock works by creating profiles of individuals, utilizing data to provide behavioral and social network information.
The development of Hancock was part of the telecommunications industry's use of data mining processes to detect fraud and to improve marketing. However, following the September 11, 2001 attacks, and the increased government surveillance of individuals, Hancock and similar data mining technologies came into public scrutiny, especially regarding its perceived threat to individual privacy.
Background
Data mining research, including Hancock, grew during the 1990s, as scientific, business, and medical interest in massive data collection, storage, and management increased. During the early 1990s, transactional businesses became increasingly interested in data warehousing, which provided storage, query, and management capabilities for the entirety of recorded transactional data. Data mining research with a focus on databases became focused on creating efficient data structures and algorithms, particularly for data which was located off of main memory storage, on a disk, for example. Padharic Smyth believed that data mining researchers aimed to write algorithms which could scale the massive amounts of data in shorter amounts of time.
Researchers at AT&T Labs, including Corinna Cortes, pioneered the Hancock programming language from 1998 to 2004. Hancock, a C-based domain specific programming language, was intended to make program code for computing signatures from large transactional data streams easier to read and maintain, thus serving as an improvement over the complex data mining programs written in C. Hancock also managed issues of scale for data mining programs.
The data streams Hancock programs analyzed were intended to handle hundreds of millions of signatures daily, ideally suited for transactions like telephone calls, credit card purchases, or website requests. At the time Hancock was developed, this data were usually amassed for billing or security purposes, and increasingly, to analyze how transactors behaved. Data mining can also be useful for identifying atypical patterns in transactor data. In regards to anti-terrorist activities, data mining’s assistance in pattern-finding can help find links between terrorist suspects, through funding or arms transfers, for example.
Data stream applications also include network monitoring, financial monitoring, such as security derivative pricing, prescription drug effect monitoring, and e-commerce. Data mining can be used by firms to find their most profitable consumers or to conduct churn analysis. Data mining can also help firms make credit-lending decisions by designing models which determine a customer’s credit worthiness. These models are intended to minimize risk |
https://en.wikipedia.org/wiki/Quantile-parameterized%20distribution | A quantile-parameterized distribution (QPD) is a probability distributions that is directly parameterized by data. They were created to meet the need for easy-to-use continuous probability distributions flexible enough to represent a wide range of uncertainties, such as those commonly encountered in business, economics, engineering, and science. Because QPDs are directly parameterized by data, they have the practical advantage of avoiding the intermediate step of parameter estimation, a time-consuming process that typically requires non-linear iterative methods to estimate probability-distribution parameters from data. Some QPDs have virtually unlimited shape flexibility and closed-form moments as well.
History
The development of quantile-parameterized distributions was inspired by the practical need for flexible continuous probability distributions that are easy to fit to data. Historically, the Pearson and Johnson families of distributions have been used when shape flexibility is needed. That is because both families can match the first four moments (mean, variance, skewness, and kurtosis) of any data set. In many cases, however, these distributions are either difficult to fit to data or not flexible enough to fit the data appropriately.
For example, the beta distribution is a flexible Pearson distribution that is frequently used to model percentages of a population. However, if the characteristics of this population are such that the desired cumulative distribution function (CDF) should run through certain specific CDF points, there may be no beta distribution that meets this need. Because the beta distribution has only two shape parameters, it cannot, in general, match even three specified CDF points. Moreover, the beta parameters that best fit such data can be found only by nonlinear iterative methods.
Practitioners of decision analysis, needing distributions easily parameterized by three or more CDF points (e.g., because such points were specified as the result of an expert-elicitation process), originally invented quantile-parameterized distributions for this purpose. Keelin and Powley (2011) provided the original definition. Subsequently, Keelin (2016) developed the metalog distributions, a family of quantile-parameterized distributions that has virtually unlimited shape flexibility, simple equations, and closed-form moments.
Definition
Keelin and Powley define a quantile-parameterized distribution as one whose quantile function (inverse CDF) can be written in the form
where
and the functions are continuously differentiable and linearly independent basis functions. Here, essentially, and are the lower and upper bounds (if they exist) of a random variable with quantile function . These distributions are called quantile-parameterized because for a given set of quantile pairs , where , and a set of basis functions , the coefficients can be determined by solving a set of linear equations. If one desires to use more quant |
https://en.wikipedia.org/wiki/Regan%20Mandryk | Regan Lee Mandryk is a Professor of Computer Science at the University of Saskatchewan. She specializes in Human-computer interaction.
Early life and education
Mandryk was born on December 9, 1975, in Winnipeg, Manitoba. Mandryk earned her Bachelor of Science degree from the University of Winnipeg in 1997. She completed her Master's degree and PhD at Simon Fraser University in British Columbia. Mandryk's PhD dissertation applied physiological measures to model user emotion in interactive play environments. She was awarded the 2005 Dean of Graduate Studies Convocation Medal in Applied Sciences and was nominated for the Canadian Association of Graduate Studies Distinguished Dissertation Award. She then completed post-doctoral fellowships at the University of British Columbia and Dalhousie University.
Career
Upon completing her fellowships, Mandryk joined the University of Saskatchewan's Human-Computer Interaction Lab under the guidance of Carl Gutwin to research video games. She had originally never looked at the university for she had no family connections to Saskatoon but was convinced by Gutwin's work. As an assistant professor, she co-received a Natural Sciences and Engineering Research Council grant to study how to increase university-aged students physical activity. Alongside Kevin Stanley, they developed a game called Gemini which would incorporate a player's real-world activities such as walking, running or riding a bicycle into a role-playing computer game.
In January 2015, Mandryk was selected as an inaugural member of the Royal Society of Canada’s College of New Scholars, Artists and Scientists. She later received the University of Saskatchewan's New Researcher Award. The following year, Mandryk and researchers at the Interaction Lab began developing concentration exercises to assist children with fetal alcohol spectrum disorder. Their game involved the player's avatar runs endlessly forward, collecting coins and avoiding obstacles, while the player wore a headset to monitor their brain activity. Through the use of positive reinforcement, Mandryk's research team were attempting to train those with fetal alcohol spectrum disorder to focus. She also received a $1.65 million grant to create a graduate program in game-user research for the Saskatchewan Waterloo Games User Research Initiative.
Mandryk later began researching whether video games could be used to assess mental health. This project earned her a E.W.R. Steacie Memorial Fellowship, $250,000 over two years, by the Natural Sciences and Engineering Research Council of Canada to fund her research. During the COVID-19 pandemic in North America, Mandryk promoted the use of video games while isolating as a way to deal with stress, anxiety and other mental health challenges. She said that due to social isolation, children were missing out on interactions with their friends and video games were a way to socialize.
References
External links
Living people
1975 births
University of Win |
https://en.wikipedia.org/wiki/List%20of%20spyware%20programs | This is a list of spyware programs.
These common spyware programs illustrate the diversity of behaviours found in these attacks. Note that as with computer viruses, researchers give names to spyware programs which may not be used by their creators. Programs may be grouped into "families" based not on shared program code, but on common behaviors, or by "following the money" of apparent financial or business connections. For instance, a number of the spyware programs distributed by Claria are collectively known as "Gator". Likewise, programs that are frequently installed together may be described as parts of the same spyware package, even if they function separately.
Spyware programs
CoolWebSearch, a group of programs, takes advantage of Internet Explorer vulnerabilities. The package directs traffic to advertisements on Web sites including coolwebsearch.com. It displays pop-up ads, rewrites search engine results, and alters the infected computer's hosts file to direct DNS lookups to these sites.
FinFisher, sometimes called FinSpy is a high-end surveillance suite sold to law enforcement and intelligence agencies. Support services such as training and technology updates are part of the package.
GO Keyboard, virtual Android keyboard apps (GO Keyboard - Emoji keyboard and GO Keyboard - Emoticon keyboard), transmit personal information to its remote servers without explicit users' consent. This information includes user's Google account email, language, IMSI, location, network type, Android version and build, and device's model and screen size. The apps also download and execute a code from a remote server, breaching the Malicious Behavior section of the Google Play privacy policies. Some of these plugins are detected as Adware or PUP by many Anti-Virus engines, while the developer, a Chinese company GOMO Dev Team, claims in the apps' description that they will never collect personal data including credit card information. The apps with about 2 million users in total were caught spying in September 2017 by security researchers from AdGuard who then reported their findings to Google.
Hermit is a toolkit developed by RCS Lab for government agencies to spy on iOS and Android mobile phones.
HuntBar, aka WinTools or Adware.Websearch, was installed by an ActiveX drive-by download at affiliate Web sites, or by advertisements displayed by other spyware programs—an example of how spyware can install more spyware. These programs add toolbars to IE, track aggregate browsing behavior, redirect affiliate references, and display advertisements.
Internet Optimizer, also known as DyFuCa, redirects Internet Explorer error pages to advertising. When users follow a broken link or enter an erroneous URL, they see a page of advertisements. However, because password-protected Web sites (HTTP Basic authentication) use the same mechanism as HTTP errors, Internet Optimizer makes it impossible for the user to access password-protected sites.
Spyware such as Look2Me hides insi |
https://en.wikipedia.org/wiki/Sarah%20Ezekiel | Sarah Ezekiel (born 1965) is an artist. She has ALS and uses technology to control a computer cursor and create her images.
Ezekiel studied art and art history and had begun her career as an artist using primarily pastels, watercolors, and acrylics. She was diagnosed with motor neuron disease in 2000. She had a young child and was expecting her second child at the time. She cannot speak or move her arms. She uses EyeGaze from assistive technology company Tobii Dynavox to paint with her eyes.
She is a Lifelites ambassador, facilitating fundraising for the organization that brings technological assistance to children in hospice care. She is also the co-chair of the Northwest London chapter of the MND Association.
Exhibits and public events
Ezekiel's art has been shown internationally, including at The Royal Academy Schools and Katara Art Center in Qatar. In 2019, her works were among those exhibited by the MND Association at their 40th anniversary event. In 2016 Ezekiel spoke at a Parliamentary reception supporting hospice medical care. She was also awarded the Third Sector Volunteer of the Year Award at this event.
References
1965 births
Living people
English contemporary artists
21st-century British women artists
British artists with disabilities
English people with disabilities |
https://en.wikipedia.org/wiki/Black-box%20obfuscation | In cryptography, black-box obfuscation was a proposed cryptographic primitive which would allow a computer program to be obfuscated in a way such that it was impossible to determine anything about it except its input and output behavior. Black-box obfuscation has been proven to be impossible, even in principle.
Impossibility
The unobfuscatable programs
Barak et al. constructed a family of unobfuscatable programs, for which an efficient attacker can always learn more from any obfuscated code than from black-box access.
Broadly, they start by engineering a special pair of programs that cannot be obfuscated together. For some randomly selected strings of a fixed, pre-determined length , define one program to be one that computes
and the other program to one that computes
(Here, interprets its input as the code for a Turing machine. The second condition in the definition of is to prevent the function from being uncomputable.)
If an efficient attacker only has black-box access, Barak et al. argued, then the attacker only has an exponentially small chance of guessing the password , and so cannot distinguish the pair of programs from a pair where is replaced by some program that always outputs "0". However, if the attacker has access to any obfuscated implementations of , then the attacker will find with probability 1, whereas the attacker will always find unless (which should happen with negligible probability). This means that the attacker can always distinguish the pair from the pair with obfuscated code access, but not black-box access. Since no obfuscator can prevent this attack, Barak et al. conclude that no black-box obfuscator for pairs of programs exists.
To conclude the argument, Barak et al. define a third program to implement the functionality of the two previous:
Since equivalently efficient implementations of can be recovered from one of by hardwiring the value of , Barak et al. conclude that cannot be obfuscated either, which concludes their argument.
Impossible variants of black-box obfuscation and other types of unobfuscable programs
In their paper, Barak et al. also prove the following (conditional to appropriate cryptographic assumptions):
There are unobfuscatable circuits.
There is no black-box approximate obfuscator.
There are unobfuscatable, secure, probabilistic private-key cryptosystems.
There are unobfuscatable, secure, deterministic digital signature schemes.
There are unobfuscatable, secure, deterministic message authentication schemes.
There are unobfuscatable, secure pseudorandom functions.
For many protocols that are secure in the random oracle model, the protocol becomes insecure if the random oracle is replaced with an artificial cryptographic hash function; in particular, Fiat-Shamir schemes can be attacked.
There are unobfuscatable circuits in TC0 (that is, constant-depth threshold circuits).
There are unobfuscatable sampling algorithms (in fact, these cannot be obfuscated approximatel |
https://en.wikipedia.org/wiki/Rochkind | Rochkind is a surname. Notable people with the surname include:
Marc Rochkind, American computer scientist
Shimon Rochkind, Israeli clinician and neurosurgeon |
https://en.wikipedia.org/wiki/2K10 | 2K10 may refer to:
the year 2010
Major League Baseball 2K10, 2010 video game
NBA 2K10, 2009 video game
NHL 2K10, 2009 video game
Y2K+10, a nickname for the Year 2010 problem in computing |
https://en.wikipedia.org/wiki/Amber%20S.%20Boehnlein | Amber S. Boehnlein is a particle physicist, computer scientist, and administrator who has held leadership positions at several United States national laboratories and the United States Department of Energy.
Education
Boehnlein grew up in Germantown, Ohio, where she taught herself how to code in high school. She received her Bachelor of Science degree in physics from Miami University of Ohio in 1984 and her doctorate in physics in 1990 from Florida State University, where Vasken Hagopian was her doctoral advisor.
Career
After completing her PhD, Boehnlein held a postdoctoral position at Texas A&M University from 1991 to 1994. She began working at Fermilab in 1993, where she ultimately managed computing and applications support for the lab's experiments. She was also a member of the Fermilab-based experiment DØ from 1991 to 2013, and she was that experiment's computing and software coordinator from 1999 to 2006. From 2008 to 2011, Boehnlein was program manager for the U.S. Large Hadron Collider Detector Operations program at the U.S. Department of Energy’s Office of High Energy Physics. Boehnlein joined SLAC National Accelerator Laboratory in 2011, where she led the Scientific Computing Applications Division. In 2015, she left SLAC for Jefferson Laboratory, where she became that lab's Chief Information Officer. In 2020, she became head of the lab's new Computational Sciences and Technology Division.
References
External links
Amber Boehnlein's author page at INSPIRE-HEP
Particle physicists
Florida State University alumni
Miami University alumni
20th-century American physicists
21st-century American physicists
American women physicists
Living people
Year of birth missing (living people)
20th-century American women scientists
21st-century American women scientists |
https://en.wikipedia.org/wiki/MetaMask | MetaMask is a software cryptocurrency wallet used to interact with the Ethereum blockchain. It allows users to access their Ethereum wallet through a browser extension or mobile app, which can then be used to interact with decentralized applications. MetaMask is developed by ConsenSys Software Inc., a blockchain software company focusing on Ethereum-based tools and infrastructure.
Overview
MetaMask allows users to store and manage account keys, broadcast transactions, send and receive Ethereum-based cryptocurrencies and tokens, and securely connect to decentralized applications through a compatible web browser or the mobile app's built-in browser.
Websites or other decentralized applications are able to connect, authenticate, and/or integrate other smart contract functionality with a user's MetaMask wallet (and any other similar blockchain wallet browser extensions) via JavaScript code that allows the website to send action prompts, signature requests, or transaction requests to the user through MetaMask as an intermediary.
The application includes an integrated service for exchanging Ethereum tokens by aggregating several decentralized exchanges (DEXs) to find the best exchange rate. This feature, branded as MetaMask Swaps, charges a service fee of 0.875% of the transaction amount.
, MetaMask's browser extension had over 21 million monthly active users, according to Bloomberg.
History
MetaMask was created by ConsenSys in 2016.
Prior to 2019, MetaMask had only been available as a desktop browser extension for Google Chrome and Firefox browsers. Given the popularity of MetaMask among cryptocurrency users, and its lack of an official mobile app for several years, instances of malicious software posing as MetaMask became problematic for Google in regulating its Chrome Web Store and Google Play platforms. In one instance, Google Play unintentionally removed MetaMask's official beta app before reverting the decision a week later on January 1, 2020.
Starting in 2019, MetaMask began releasing mobile app versions for closed beta testing, followed by their official public release for iOS and Android in September 2020.
During October 2020, MetaMask Swaps, a built-in DEX aggregation service was added to the desktop extension. The product became available on mobile devices in March 2021.
Criticism
While MetaMask and other "Web3" focused applications aim to decentralize control over personal data and increase user privacy, critics have pointed to the potential for MetaMask's browser extension to leak identifiable information to data collection networks and web trackers as a fundamental flaw.
References
Ethereum
Mobile applications
Blockchain entities
2016 software
Cryptocurrency projects |
https://en.wikipedia.org/wiki/Leo%20Nuia | Leo Nuia was an officer in the Papua New Guinea Defence Force.
In 1991, when he was a Colonel, he replaced Colonel Lima Dataona as local commander on Bougainville Island, during a civil uprising. Security Challenges described him as a "hardliner". It said he led an unauthorized landing on Bouganville, that was counter to an interim ceasefire Papua New Guinea's civilian leadership had negotiated with Bouganville rebel forces, and disrupted their attempts to reach a lasting Peace Agreement. Nuia was suspended, after he publicly criticized the Minister of Defence.
The final result of the conflict was that the rebels earned Bouganville Island the status of an autonomous region, within Papua New Guinea.
In 1997 Nuia served as Commander of the Papua New Guinea Defence Force.
References
Year of birth missing (living people)
Living people
Papua New Guinean military personnel |
https://en.wikipedia.org/wiki/Stay%20Grounded | Stay Grounded is a global network of more than 160 member organizations promoting alternatives to aviation to address climate change. Founded in 2016, their work is rooted in fostering sustainable transport and campaigning against controversial climate strategies. The network consists of local airport opposition groups, climate justice activists, NGOs, trade unions and academics, among others.
Mission
Stay Grounded's mission is rooted in campaigning for a reduction in aviation and airport expansion and supporting initiatives that promote alternatives to flying such as night trains and ships. The network's members campaign against offsetting emissions, geo-engineering and biofuels.
History
In October 2016, the ICAO held a conference on the aviation industry's response to climate change. Their proposal was to have further aviation growth, incorporated with offsets that aimed to represent a way for airline passengers or 'emitters' to be encouraged to reduce emissions from other sectors as an individualized contribution towards global emission reductions. Climate activists viewed this proposal as a greenwashing strategy. While the conference was taking place, a group of locally-affected opposition groups and organizations coordinated complimentary global action days under the name Stay Grounded. Aviation Growth Cancelled Due to Climate Change, in various countries, including Austria, Mexico, the United Kingdom, Canada, Turkey, France and Australia. In conjunction with these actions, a petition was signed by 50 organisations, including Attac Europe, Friends of the Earth International, Global Justice Now, Greenpeace, Indigenous Environmental Network, among several others, which are united against airport expansion projects. A civil society statement was also signed by almost 100 organizations and NGOs, including Greenpeace and Friends of the Earth, rejecting the ICAO's proposal of offsetting the aviation industry's emissions on the basis that it would propel global warming beyond 1.5 °C.
Magdalena Heuwieser, a climate justice activist living in Germany, and Mira Kapfinger, an Austrian climate justice activist, are founders of Stay Grounded. Since 2017, they have been organizing network meetings twice a year.
Media attention
Since their inception in 2016, Stay Grounded has received attention as a result of activism and campaigns. Significant moments include the November 2019 climate protest at Berlin's Tegel airport in which several climate protesters staged a sit-in, resulting in traffic jams and delays for airline passengers. Approximately 50 members of the group gathered in the main entrance of a terminal to stage the sit-in while another 80 people organized a public demonstration. Many of the climate activists present were dressed in penguin costumes, and carried signs that urged people to think of alternative forms of transport instead of flying.
In light of the Covid-19 pandemic and the ensuing economic recovery packages, the Stay Grounded |
https://en.wikipedia.org/wiki/ApplyBoard | ApplyBoard is a Canadian educational technology company founded in 2015 in Waterloo, Ontario, Canada. It offers an "artificial intelligence-enabled recruitment platform" that helps international students apply for post-secondary studies abroad. In 2019, Deloitte recognized ApplyBoard as one of Canada's fastest-growing tech company.
History
ApplyBoard was founded by three brothers Martin Basiri, Massi Basiri and Meti Basiri. Martin, originally from Iran, faced challenges while applying to study in Canada to complete a Masters Degree. In 2018, the company maintained partnerships with 750 high schools, colleges and universities in Canada and the U.S. In 2019, the company had 170 employees and partnerships with 1,200 secondary and post-secondary institutions in North America; the company also moved its headquarters to its current location in Kitchener, Ontario.
In 2020, the company had 500 employees and expanded its partnership with secondary and post-secondary institutions in United Kingdom. In February 2020, Jo Johnson, the former Minister of State for Universities, Science, Research and Innovation of the United Kingdom, joined the company as the chairman of the Advisory Board.
In October 2020, the company announced a partnership with Times Higher Education.
In November 2022, the company laid off 6% of its global workforce.
Products and Services
Application Platform
ApplyBoard is centred around its application platform that has a listing of more than 1,500 colleges, universities, and K-12 schools in Canada, the United States, the United Kingdom, and Australia. Schools have a listing of their institutional details, programs, and application information. International students and recruitment partners, often called agents, then apply directly through the ApplyBoard platform to these programs.
ApplyProof
In October 2019, ApplyBoard launched a secondary technology platform called ApplyProof that supports peer-to-peer verification of Letters of Acceptance (LoA) from a university. The aim being to establish trust in the documents being shared with immigration and visa officials.
The offerings from ApplyProof were expanded in May 2021 to include verification of English language proficiency tests through separate partnerships with IELTS and Pearson Education who administer TOEFL and PTE scores, respectively.
Awards and recognition
ApplyBoard was named Canada’s fastest growing technology company in 2019 by Deloitte as it ranked #1 on the accounting firm’s Fast 50 list. ApplyBoard was listed in Deloitte’s Fast 50 in 2020 by ranking #2 in Canada and #14 in North America.
ApplyBoard was named to LinkedIn’s list of Top Startups in Canada for 2020 that recognizes Canada’s top private companies that have remained “resilient during a tumultuous time, continuing to attract investment, employees and attention.”
Controversy
Described as "international-student recruiting on steroids", ApplyBoard has been criticized for the consequences of not adequate |
https://en.wikipedia.org/wiki/Squad%20Battles%3A%20Vietnam | Squad Battles: Vietnam is a 2001 computer wargame developed and published by HPS Simulations. It was designed by John Tiller.
Gameplay
Squad Battles: Vietnam is a computer wargame that simulates conflict during the Vietnam War.
Development
Squad Battles: Vietnam was designed by John Tiller. For its design, he was inspired by the board wargame Squad Leader, published by Avalon Hill.
Reception
{{Video game reviews
| CGW =
| PCGUS = 90%<ref name=pcgamerus>{{cite web | archiveurl=https://web.archive.org/web/20050425172904/http://www.pcgamer.com/reviews/archives/review_2002-01-02p.html |url=http://www.pcgamer.com/reviews/archives/review_2002-01-02p.html | title=Reviews; Squad Battles: Vietnam | author=Trotter, William R. | authorlink=William R. Trotter | work=PC Gamer US | date=January 2, 2002 | archivedate=April 25, 2005 | url-status=dead}}</ref>
}}
In Computer Gaming World, Bruce Geryk wrote that Squad Battles: Vietnam was "not the most original design, but it's one of the best of recent years". William R. Trotter of PC Gamer US was strongly positive toward the game, which he considered "one of the best tactical games since Avalon Hill's Squad Leader boardgame".Computer Gaming World and Wargamer named Squad Battles: Vietnam the best computer wargame of 2001; the former publication dubbed it a "compelling" title that "shows that there's still some life in traditional wargaming systems". The editors of Computer Games Magazine nominated the game in this category, but ultimately gave the prize to Panzer Campaigns: Bulge '44'', another John Tiller title.
References
External links
Official page
2001 video games
Computer wargames
Turn-based strategy video games
Video games developed in the United States
Windows games
Windows-only games
Vietnam War video games
Video games set in Vietnam |
https://en.wikipedia.org/wiki/Magnum%20P.I.%20%282018%20TV%20series%2C%20season%201%29 | The first season of the crime and action drama Magnum P.I. premiered on September 24, 2018, on CBS, for the 2018–19 United States network television schedule. The series is a remake of the 1980 series of the same name and centers on Thomas Magnum, a former Navy SEAL who works as a private investigator and solves mysteries with the help of his friends. The season stars Jay Hernandez, Perdita Weeks, Zachary Knighton, and Stephen Hill. Amy Hill and Tim Kang also appear in the series and joined in the series third episode. CBS first announced the series on October 20, 2017; it was initially given a thirteen episode order but an additional seven were ordered bringing the total to twenty. Multiple Hawaii Five-0 stars appeared as their Hawaii Five-0 characters in guest roles throughout the season in minor crossover events.
The season was viewed by an average of 8.36 million viewers and ranked 37 out of all television series for the season. "I Saw The Sun Rise", the series premiere, brought in 8.12 million viewers while "The Day It All Came Together", the season finale was viewed by 5.54 million. "Winner Takes All", the seasons twelfth episode, aired directly after the American Football Conference championship causing it to be the highest viewed episode of the season at 8.76 million. The season primarily received mixed reviews from both critics and viewers and was nominated for two Imagen Awards, one of which was won. The season concluded on April 1, 2019, and despite the mixed reviews Magnum P.I. was renewed for a second season which premiered on September 27, 2019.
Cast and characters
Main
Jay Hernandez as Thomas Magnum, a former Navy SEAL who is a security consultant for the successful novelist Robin Masters, living in the guest house on his estate, while also working as a private investigator
Perdita Weeks as Juliet Higgins, a former MI6 agent who is majordomo to Robin Masters; she and Magnum bicker but become allies
Zachary Knighton as Orville "Rick" Wright, a Marine veteran and former door gunner, who is also a playboy
Stephen Hill as Theodore "T.C." Calvin, a Marine veteran and helicopter pilot who runs helicopter tours of Hawaii and is a member of Magnum's team
Amy Hill as Teuila "Kumu" Tuileta, the cultural curator of Robin Masters' estate
Tim Kang as Honolulu Police Department (HPD) Detective Gordon Katsumoto, who dislikes Magnum but usually comes to the team's aid when needed
Recurring
Domenick Lombardozzi as Sebastian Nuzo
Christopher Thornton as Kenny "Shammy" Shamberg
Notable guests
Sung Kang as HPD Lieutenant Yoshi Tanaka
Ken Jeong as Luther Gillis
Carl Weathers as Dan Sawyer
Elisabeth Röhm as Brooke Mason
Cyndi Lauper as Vanessa Nero
Ben Vereen as Henry Barr
Corbin Bernsen as Francis "Icepick" Hofstetler
Jamie-Lynn Sigler as Toni
Ryan Blaney as Shane Powell
Eddie George as Travis Leet
Jordana Brewster as Hannah
Christian Yelich as himself
Roger E. Mosley as John Booky
Brooke Lyons as Abby Miller
Crossover
Ki |
https://en.wikipedia.org/wiki/Scary%20Godmother%3A%20Halloween%20Spooktakular | Scary Godmother: Halloween Spooktakular is a 2003 Canadian computer-animated Halloween comedy film based on the Scary Godmother series of books by Jill Thompson, specifically a community theater stage production of the first book. The special depicts Hannah, while trick-or-treating with her cousin Jimmy and his friends, encountering the titular witch and her many friends for a Halloween party at the Fright Side. It stars Canadian voice actors Tabitha St. Germain, Britt McKillip, Garry Chalk, Noel Callahan, Alex Doduk, Brittney Irvine, Danny McKinnon, Scott McNeil and Adam Pospisil. It was directed by Zeke Norton (credited as Ezekiel Norton) and produced by Kevin Gamble and Sharan Wood with heavy involvement by Thompson.
Scary Godmother: Halloween Spooktakular was produced by Vancouver-based animation company Mainframe Entertainment, notable for other computer-animated television series such as ReBoot (1994–2001), and was the company's first production to use a Softimage XSI pipeline as previously they used Softimage 3D; its animation consists of 3D characters and backgrounds that appear 2D (although most of them were actually modeled in 3D and cartoon-edged to appear like 2D watercolored backgrounds a la the source material). The special was meant to launch an episodic Scary Godmother series, but the only other Scary Godmother media that has been released is the studio's sequel to the special, Scary Godmother: The Revenge of Jimmy (2005); as of October 2020, a series is still in the works according to Norton and Thompson.
Scary Godmother: Halloween Spooktakular premiered at the San Diego Comic-Con on July 18, 2003 before it was released to region 1 DVD on September 3. It aired during that year's Halloween season in most territories except the United States, where it premiered on television the following year on Cartoon Network on October 1, 2004. The special was a ratings hit on its U.S. television premiere, well received by critics, and won Leo Awards for the program itself as well as its score and direction. It, along with The Revenge of Jimmy, continued to re-air every Halloween season on Cartoon Network in later years.
Plot
On Halloween night, Hannah Marie, dressed as a fairy princess, is about to go trick-or-treating with her spoiled cousin, Jimmy, wearing a devil hoodie, and his friends Katie, dressed as a black cat, Daryl, in a candy piece costume, and Bert, pretending to be a baseball player driving inside a powerful SUV that can shoot atomic lasers. Jimmy, annoyed with having to go with Hannah, conceives a prank to scare her home. While near an abandoned house in a graveyard, Jimmy concocts a myth about residents at the house (the "spook house") not feeding candy to monsters surrounding its exterior and being eaten as a result; ever since, candy has to be in the basement every year to prevent the monsters from killing other children in the world. Jimmy tells Hannah to go in the house and leave some candy. A frightened Hannah walks i |
https://en.wikipedia.org/wiki/Ehsan%20Afshari | Ehsan Afshari is an Iranian-American electrical engineer, researcher and academic. He is Professor of Electrical and Computer Engineering at University of Michigan.
Afshari's research is focused on high frequency circuits and systems for imaging, bio-sensing, and high data rate communications. He has written over 150 papers. He was the recipient of the 2008 DAPRA Young Faculty Award and the 2010 NSF Early CAREER Award.
Education
Afshari received a B.Sc. in Electrical Engineering from Sharif University of Technology in 2001. He then moved to the United States, where he joined California Institute of Technology, completing his M.Sc. in Electrical Engineering in 2003 and his Ph.D. in Electrical Engineering in 2006.
Career
After completing his Ph.D., Afshari joined Cornell University as an assistant professor, becoming associate professor in 2012. In 2016, he joined University of Michigan as an Associate Professor of Electrical and Computer Engineering. In 2019, he became Full Professor at University of Michigan.
As a result of his research, Afshari co-founded Airvine and Lassenpeak.
Afshari has been an advisor to many PhD students that became faculty members at major universities.
Research and work
After completing his Ph.D., Afshari changed his research focus to terahertz circuits and systems. When he began research in this area, most of the terahertz systems used expensive and bulky devices such as quantum cascade lasers. Starting from 2010, Afshari's team started to develop circuit blocks and systems operating at terahertz frequencies using conventional transistor technologies. One of the early milestones of his group was the design and fabrication of the first integrated oscillator operating above 400 GHz which generated more than 100 uW of power. At the time of design, this oscillator generated three orders of magnitude higher power compared to prior art.
His team has continued advancing the terahertz electronics research and have designed the first terahertz voltage controlled oscillator (VCO), the first 2-dimensional terahertz phased array, the highest frequency active multiplier, the first fully integrated frequency modulated continuous wave (FMCW) radar operating above 200 GHz, and the first phase-locked terahertz imaging transceiver chipset all based on standard Si/SiGe technologies. Aside from these designs, Afshari's team has been active in other areas of research including but not limited to low-phase-noise radio-frequency VCO's, high-power and power-efficient mm-wave oscillators, and non-boolean pattern recognition circuits.
Awards and honors
2000 - Presidential Award of National Best Engineering Student, Awarded by the President of Iran
2004 - Dr. Dimitri Award of Excellence in Engineering Education Association of Professors and Scholars of Iranian Heritage (APSIH)
2004 - Best Paper Award in the IEEE Custom Integrated Circuits Conference (CICC)
2008 - Selected to the Cornell's First Faculty Institute for Diversity
2008 - D |
https://en.wikipedia.org/wiki/Cyberbiosecurity | Cyberbiosecurity is an emerging field at the intersection of cybersecurity and biosecurity. The objective of cyberbiosecurity has been described as addressing "the potential for or actual malicious destruction, misuse, or exploitation of valuable information, processes, and material at the interface of the life sciences and digital worlds". Cyberbiosecurity is part of a system of measures that collectively aim to "Safeguard the Bioeconomy", an objective described by the National Academies of Sciences, Engineering and Medicine of the United States.
Cyberbiosecurity threats
Cyberbiosecurity threats are becoming increasingly important as technological progress continues to accelerate in fields such as artificial intelligence, automation, and synthetic biology. Moreover, not only is the pace of progress in these fields accelerating, but they are also becoming increasingly integrated, leading to a growing overlap that is generating new security vulnerabilities. Many of the potential risks from future progress in bioengineering that were identified by researchers fall within the bounds of cyberbiosecurity, for instance, the use of cyberattacks to exploit bio-automation for malicious purposes. Against this background, cyberbiosecurity measures are becoming increasingly important to prevent or protect against the misuse of innovations in the life sciences, including to reduce the proliferation risk of biological weapons. In recent years, there has been a growing amount of research characterizing cyberbiosecurity threats, including by conducting surveys on cyberbiosecurity risk perceptions in the biotech sector, and offering first recommendations for measures to prevent or protect against these threats. Researchers have observed that in the future it may be critical to consider the risk of computer systems being exploited by adversarially created DNA.
In light of the COVID-19 pandemic, some research has focused on the cyberbiosecurity implications of the pandemic.
References
Biosecurity
Computer security |
https://en.wikipedia.org/wiki/MIT%20Jameel%20Clinic | The MIT Abdul Latif Jameel Clinic for Machine Learning in Health (commonly, MIT Jameel Clinic; previously, J-Clinic) is a research center at the Massachusetts Institute of Technology (MIT) in the field of artificial intelligence (AI) and health sciences, including disease detection, drug discovery, and the development of medical devices. The MIT Jameel Clinic also supports the commercialization of solutions through grant funding, and has partnered with pharmaceutical companies, like Takeda and Sanofi, to forge collaborations between research and development functions and MIT researchers.
Co-founded in 2018 by MIT and Community Jameel, the MIT Jameel Clinic is housed in the MIT Schwarzman College of Computing. The mission of the Jameel Clinic is to "revolutionize the prevention, detection, and treatment of disease", and it describes itself as "the epicenter of AI and healthcare at MIT".
The MIT Jameel Clinic is known for using AI for the discovery of the antibiotics halicin and abaucin, and the development of early cancer detection platforms Mirai for breast cancer, and Sybil for lung cancer.
History
On September 17, 2018, the MIT Jameel Clinic was co-founded by MIT and Community Jameel, an organisation of the Jameel family, owners of the Abdul Latif Jameel business. The launch took place at a signing ceremony at MIT with MIT President L. Rafael Reif, and Fady Jameel and Hassan Jameel, then-presidents of Community Jameel. The MIT Jameel Clinic is the fourth major collaboration between MIT and Community Jameel, after the Abdul Latif Jameel Poverty Action Lab, the MIT Abdul Latif Jameel Water and Food Systems Lab, and the MIT Abdul Latif Jameel World Education Lab.
MIT-Takeda Program
On January 6, 2020, the MIT School of Engineering and Takeda, the pharmaceutical company, announced a new funding program to support research and education in AI and health. The MIT-Takeda Program is housed in the MIT Jameel Clinic. The steering committee for the program is led by Professor Anantha P. Chandrakasan, Dean of the School of Engineering, and Anne Heatherington, senior vice president and head of Data Sciences Institute (DSI) at Takeda.
Discovery of halicin
On February 19, 2020, the MIT Jameel Clinic's faculty leads for AI and life sciences, Professor Regina Barzilay and Professor Jim Collins, published a paper in Cell confirming the discovery—for the first time by deep learning—of halicin, the first new antibiotic compound for 30 years, which kills over 35 powerful bacteria, including antimicrobial-resistant tuberculosis, the superbug C. difficile, and two of the World Health Organization's top-three most deadly bacteria.
AI Cures initiative
In 2020, during the COVID-19 pandemic, the MIT Jameel Clinic launched the AI Cures initiative to apply AI techniques to the discovery of effective therapeutics for the disease, and the development of medical devices. The AI Cures initiative is in partnership with the Patrick J. McGovern Foundation, the Defense |
https://en.wikipedia.org/wiki/Nova%20Supersports%20Cup | The Nova SuperSport Cup was an association football friendly tournament competition hosted by Greek premium sports network Nova Sports between 1999 and 2001, held in Athens.
The first tournament occurred from 31 July to 1 August 1999 with the participation of English Premier League club Leicester City, Hertha Berlin from the Bundesliga, Iraklis from the Alpha Ethniki and AEK Athens from the Alpha Ethniki, which eventually won the tournament.
The second tournament occurred between 4 and 5 August 2000 with the participation of Greek Alpha Ethniki club AEK Athens, Werder Bremen from the Bundesliga, Rapid Wien from the Austrian Bundesliga and Brescia from the Serie A, which eventually won the tournament. The third and last tournament occurred on 3 August 2001 with the participation of Greek Alpha Ethniki club AEK Athens, Sevilla from the La Liga and Bologna from the Serie A, which eventually won the tournament.
Venue
All the games were played at the Nikos Goumas Stadium a 27,729-seat multi-use venue, home ground of hosts AEK Athens. The ground was demolished in June 2003.
Results
By club
By nation
References
Bibliography
Συλλογικό έργο (2014). 90 ΧΡΟΝΙΑ, Η ΙΣΤΟΡΙΑ ΤΗΣ ΑΕΚ . Αθήνα, Ελλάδα: Εκδοτικός Οίκος Α. Α. Λιβάνη. .
Παναγιωτακόπουλος, Παναγιώτης (2021). 1963-2021 Η ΕΥΡΩΠΑΪΚΗ ΙΣΤΟΡΙΑ ΤΗΣ Α.Ε.Κ. ΜΕΣΑ ΑΠΟ ΤΑ ΕΙΣΙΤΗΡΙΑ ΤΩΝ ΑΓΩΝΩΝ: το ταξίδι συνεχίζεται...!!! . Αθήνα, Ελλάδα: .
Παναγιωτακόπουλος, Παναγιώτης (2022). 1979-2003 ΤΟ ΤΑΞΙΔΙ ΣΥΝΕΧΙΖΕΤΑΙ...Νο2: Οι επίσημοι αγώνες της Α.Ε.Κ. στο Ναό μέσα από τα εισιτήρια των αγώνων . Αθήνα, Ελλάδα: .
Παναγιωτακόπουλος, Παναγιώτης (2023). 100 ΧΡΟΝΙΑ Α.Ε.Κ. - 100 ΣΤΙΓΜΕΣ ΔΟΞΑΣ μέσα από τα εισιτήρια των αγώνων: Το Ταξίδι Συνεχίζεται...!!! Νο3 . Αθήνα, Ελλάδα: .
External links
Supersport Tournament (Athinai) 1999-2001
AEK Athens Fixtures of the period 1999-2000
AEK Athens Fixtures of the period 2000-2001
AEK Athens Fixtures of the period 2001-2002
SK Rapid Wien Fixtures of the period 2000-2001
Supersport-Turnier Athen 2000
1999 establishments in Greece
2000 establishments in Greece
2001 establishments in Greece |
https://en.wikipedia.org/wiki/1999%20Nova%20Supersports%20Cup | The 1999 Nova Supersports Cup was an association football friendly tournament competition hosted by Greek premium sports network Nova Sports in 1999, held in Athens.
The tournament occurred from 31 July to 1 August 1999 with the participation of English Premier League club Leicester City, Hertha Berlin from the Bundesliga, Iraklis from the Alpha Ethniki and AEK Athens from the Alpha Ethniki, which eventually won the tournament.
Teams
The teams who accepted the invitation are:
AEK Athens – Alpha Ethniki (host)
Iraklis – Alpha Ethniki
Leicester City – Premier League
Hertha Berlin – Bundesliga
Venue
All the games were played at the Nikos Goumas Stadium a 27,729-seat multi-use venue, home ground of hosts AEK Athens. The ground was demolished in June 2003.
Games
Semi-finals
Consolation final
Final
Results
Scorers
References
Bibliography
Συλλογικό έργο (2014). 90 ΧΡΟΝΙΑ, Η ΙΣΤΟΡΙΑ ΤΗΣ ΑΕΚ . Αθήνα, Ελλάδα: Εκδοτικός Οίκος Α. Α. Λιβάνη. .
Παναγιωτακόπουλος, Παναγιώτης (2021). 1963-2021 Η ΕΥΡΩΠΑΪΚΗ ΙΣΤΟΡΙΑ ΤΗΣ Α.Ε.Κ. ΜΕΣΑ ΑΠΟ ΤΑ ΕΙΣΙΤΗΡΙΑ ΤΩΝ ΑΓΩΝΩΝ: το ταξίδι συνεχίζεται...!!! . Αθήνα, Ελλάδα: .
Παναγιωτακόπουλος, Παναγιώτης (2022). 1979-2003 ΤΟ ΤΑΞΙΔΙ ΣΥΝΕΧΙΖΕΤΑΙ...Νο2: Οι επίσημοι αγώνες της Α.Ε.Κ. στο Ναό μέσα από τα εισιτήρια των αγώνων . Αθήνα, Ελλάδα: .
Παναγιωτακόπουλος, Παναγιώτης (2023). 100 ΧΡΟΝΙΑ Α.Ε.Κ. - 100 ΣΤΙΓΜΕΣ ΔΟΞΑΣ μέσα από τα εισιτήρια των αγώνων: Το Ταξίδι Συνεχίζεται...!!! Νο3 . Αθήνα, Ελλάδα: .
External links
Supersport Tournament (Athinai) 1999-2001
AEK Athens Fixtures of the period 1999-2000
Semi-finals Highlights
AEK Athens-Hertha BSC Highlights
1999 establishments in Greece |
https://en.wikipedia.org/wiki/2000%20Nova%20Supersports%20Cup | The 2000 Nova Supersports Cup was an association football friendly tournament competition hosted by Greek premium sports network Nova Sports in 2000, held in Athens.
The tournament occurred between 4 and 5 August 2000 with the participation of Greek Alpha Ethniki club AEK Athens, Werder Bremen from the Bundesliga, Rapid Wien from the Austrian Bundesliga and Brescia from the Serie A, which eventually won the tournament.
Teams
The teams who accepted the invitation are:
AEK Athens – Alpha Ethniki (host)
Rapid Wien – Austrian Bundesliga
Brescia – Serie A
Werder Bremen – Bundesliga
Venue
All the games were played at the Nikos Goumas Stadium a 27,729-seat multi-use venue, home ground of hosts AEK Athens. The ground was demolished in June 2003.
Games
Semi-finals
Consolation final
Final
Results
Scorers
References
Bibliography
Συλλογικό έργο (2014). 90 ΧΡΟΝΙΑ, Η ΙΣΤΟΡΙΑ ΤΗΣ ΑΕΚ . Αθήνα, Ελλάδα: Εκδοτικός Οίκος Α. Α. Λιβάνη. .
Παναγιωτακόπουλος, Παναγιώτης (2021). 1963-2021 Η ΕΥΡΩΠΑΪΚΗ ΙΣΤΟΡΙΑ ΤΗΣ Α.Ε.Κ. ΜΕΣΑ ΑΠΟ ΤΑ ΕΙΣΙΤΗΡΙΑ ΤΩΝ ΑΓΩΝΩΝ: το ταξίδι συνεχίζεται...!!! . Αθήνα, Ελλάδα: .
Παναγιωτακόπουλος, Παναγιώτης (2022). 1979-2003 ΤΟ ΤΑΞΙΔΙ ΣΥΝΕΧΙΖΕΤΑΙ...Νο2: Οι επίσημοι αγώνες της Α.Ε.Κ. στο Ναό μέσα από τα εισιτήρια των αγώνων . Αθήνα, Ελλάδα: .
Παναγιωτακόπουλος, Παναγιώτης (2023). 100 ΧΡΟΝΙΑ Α.Ε.Κ. - 100 ΣΤΙΓΜΕΣ ΔΟΞΑΣ μέσα από τα εισιτήρια των αγώνων: Το Ταξίδι Συνεχίζεται...!!! Νο3 . Αθήνα, Ελλάδα: .
External links
Supersport Tournament (Athinai) 1999-2001
AEK Athens Fixtures of the period 2000-2001
SK Rapid Wien Fixtures of the period 2000-2001
2000 establishments in Greece |
https://en.wikipedia.org/wiki/2001%20Nova%20Supersports%20Cup | The 2001 Nova Supersports Cup was an association football friendly tournament competition hosted by Greek premium sports network Nova Sports in 2001, held in Athens.
The tournament occurred on 3 August 2001 with the participation of Greek Alpha Ethniki club AEK Athens, Sevilla from the La Liga and Bologna from the Serie A, which eventually won the tournament.
Teams
The teams who accepted the invitation are:
AEK Athens – Alpha Ethniki (host)
Sevilla – La Liga
Bologna – Serie A
Venue
All the games were played at the Nikos Goumas Stadium a 27,729-seat multi-use venue, home ground of hosts AEK Athens. The ground was demolished in June 2003.
Games
Table
Results
Scorers
References
Bibliography
Συλλογικό έργο (2014). 90 ΧΡΟΝΙΑ, Η ΙΣΤΟΡΙΑ ΤΗΣ ΑΕΚ . Αθήνα, Ελλάδα: Εκδοτικός Οίκος Α. Α. Λιβάνη. .
Παναγιωτακόπουλος, Παναγιώτης (2021). 1963-2021 Η ΕΥΡΩΠΑΪΚΗ ΙΣΤΟΡΙΑ ΤΗΣ Α.Ε.Κ. ΜΕΣΑ ΑΠΟ ΤΑ ΕΙΣΙΤΗΡΙΑ ΤΩΝ ΑΓΩΝΩΝ: το ταξίδι συνεχίζεται...!!! . Αθήνα, Ελλάδα: .
Παναγιωτακόπουλος, Παναγιώτης (2022). 1979-2003 ΤΟ ΤΑΞΙΔΙ ΣΥΝΕΧΙΖΕΤΑΙ...Νο2: Οι επίσημοι αγώνες της Α.Ε.Κ. στο Ναό μέσα από τα εισιτήρια των αγώνων . Αθήνα, Ελλάδα: .
Παναγιωτακόπουλος, Παναγιώτης (2023). 100 ΧΡΟΝΙΑ Α.Ε.Κ. - 100 ΣΤΙΓΜΕΣ ΔΟΞΑΣ μέσα από τα εισιτήρια των αγώνων: Το Ταξίδι Συνεχίζεται...!!! Νο3 . Αθήνα, Ελλάδα: .
External links
Supersport Tournament (Athinai) 1999-2001
AEK Athens Fixtures of the period 2001-2002
2001 establishments in Greece |
https://en.wikipedia.org/wiki/Tracsis | Tracsis is a United Kingdom-based company that provides software technologies to for the rail, traffic data and wider transport industries. The company is headquartered in Leeds and is listed on the London Stock Exchange.
History
The company was created as a spin-out of the Computing Department of the University of Leeds, and rapidly grew through expansion. The company's first acquisition, Robert Watson Associates, was larger than Tracsis at the time and was spun-out of Loughborough University.
In 2005, John McArthur became CEO of the company.
The company has been on the AIM market since November 2007.
In 2014, Tracsis won the Growth Business of the Year Award from the UK Tech Awards.
In 2016, McArthur sold a tenth of his holding in the company.
In 2019, McArthur was succeeded by Chris Barnes, who was previously head of automotive consulting at Ricardo plc.
Acquisitions
Operations
Originally focused on software to help railway operators manage their operations, such as vehicle and crew scheduling, resource management, and monitoring, it has expanded to cover ticketing, data analytics, and event management for the wider transport industry.
Clients include Network Rail and bus and train operating companies such as Go-Ahead Group and FirstGroup.
References
Organisations based in Leeds
2004 establishments in the United Kingdom |
https://en.wikipedia.org/wiki/Tomahawk%20%28video%20game%29 | Tomahawk is a 1985 video game published by Datasoft.
Gameplay
Tomahawk is a game in which the player pilots a AH-64 Apache gunship.
Reception
M. Evan Brooks reviewed the game for Computer Gaming World, and stated that "Tomahawk does offer cloudbase and turbulence as interesting options, but overall, the simulation is simply not innovative or exciting enough to justify a strong recommendation."
Reviews
Amtix! - Jul, 1986
Amtix! - Nov, 1986
Commodore User - Feb, 1987
Zzap! - Mar, 1987
Popular Computing Weekly - Feb 12, 1987
Computer Gaming World - Jun, 1991
References
External links
Review in Antic
Review in ANALOG Computing
Review in Info
Review in Page 6
Review in Page 6
Review in Computer Play
Review in Your Sinclair
Review in Hardcore Computist
1985 video games
Amstrad CPC games
Amstrad PCW games
Apple II games
Apple IIGS games
Atari 8-bit family games
Combat flight simulators
Commodore 64 games
Datasoft games
Digital Integration games
DOS games
Helicopter video games
Video games developed in the United Kingdom
ZX Spectrum games |
https://en.wikipedia.org/wiki/Wooden%20Ships%20and%20Iron%20Men%20%281996%20video%20game%29 | Wooden Ships and Iron Men is a 1996 computer wargame developed by Stanley Associates and published by Avalon Hill. It is an adaptation of the board wargame Wooden Ships and Iron Men.
Gameplay
Wooden Ships and Iron Men is a computer wargame that simulates historical naval warfare, around the time of the Napoleonic Wars.
Development
Wooden Ships and Iron Men was developed by Stanley Associates and published by Avalon Hill, as an adaptation of the publisher's board wargame Wooden Ships and Iron Men. The two companies had previously worked together on 5th Fleet. Stanley's Mike Inella said that the team wanted to make "a PC treatment [of Wooden Ships] that completely eliminated any feeling of counting hexes". One change to the design was an increase in the number of wind directions from four to eight. The game was under production for more than two years.
Reception
Wooden Ships and Iron Men sold fewer than 50,000 units globally. This was part of a trend for Avalon Hill games during the period; Terry Coleman of Computer Gaming World wrote in late 1998 that "no AH game in the past five years" had reached the mark.
Wooden Ships and Iron Men was a finalist for Computer Gaming Worlds 1996 "Wargame of the Year" award, which ultimately went to Battleground 4: Shiloh. The magazine's wargame columnist Terry Coleman gave it his 1996 "Most Pleasant Surprise" award, and dubbed it "easily the best game ever on the Age of Sail".
See also
Wooden Ships and Iron Men (1987)
References
External links
1996 video games
Avalon Hill video games
Computer wargames
DOS games
DOS-only games
Multiplayer and single-player video games
Napoleonic Wars video games
Naval video games
Turn-based strategy video games
Video games based on board games
Video games developed in the United States
Video games set in the 18th century
Stanley Associates games |
https://en.wikipedia.org/wiki/Expatriate%20social%20capital | Social capital is the product of human interactions and relationships, which occur between individuals and social networks. Therefore, it can be summarized as the shared links, understandings and values that allow individuals and groups to trust each other, and therefore, to work with each other in society.
In the case of expatriation—the process through which an individual lives and works in a country other than their country of citizenship, often temporarily and for work reasons—, social capital has been identified as an important factor for expatriate career success, performance, cultural and psychological adjustment, and international knowledge transfers, among other topics.
General definitions of social capital
Given the long history of the social capital concept, a range of definitions have emerged over the years, especially since the topic gained more prominence in the 1990s. Still, the most cited definitions in 2019 belonged to Pierre Bourdieu, Robert Putnam, Nan Lin, James Coleman, and Janine Nahapiet and Sumantra Ghoshal. The table below shows some of the definitions these authors put forward:
Expatriate social capital in International Human Resource Management
Social resources theory
According to social resources theory, there are a number of resources embedded in a person's social network and social ties, including material goods and intangible items—for instance, trust, values, or status. In this way, individuals can benefit from their social ties and use them as resources when they are able to receive information and support through them to achieve certain goals and objectives.
Expatriate social capital is distinct from other forms of social capital because it usually involves social connections across a range of different countries. Additionally, it has especial relevance for International Human Resource Management (IHRM) because it can be viewed as a resource, not only useful for expatriates themselves, but also for the multinational companies and enterprises (MNCs and MNEs) employing them.
Business expatriates
Historically, the use of the term expatriate has been inconsistent and varied. For this reason, it is important to know that IHRM concerns a specific type of expatriate: the business expatriate. According to McNulty and Brewster, who argued that a concise and universal definition should be adopted, business expatriates are “legally working individuals who reside temporarily in a country of which they are not a citizen in order to accomplish a career-related goal, being relocated abroad either by an organization, by self-initiation or directly employed within the host-country”.
Organizational knowledge benefits of expatriate social capital.
Needless to say, individuals can share their resources with others. In the case of expatriates, they can transfer the knowledge they earned through their social resources during international experiences to the organizations they work for. As a result, organizations can leve |
https://en.wikipedia.org/wiki/Mark%20Fellows%20%28hitman%29 | Mark Fellows (nicknamed "The Iceman")
(5 September 1980) is an English hitman convicted of the murders of John Kinsella and Paul Massey, rival enforcers to the Anti A Team criminal network. At the time of his conviction he was one of only 70 prisoners sentenced to a whole life term.
Background
Fellows lived in Warrington but was originally from Salford.
Murders
Paul Massey murder
On 26 July 2015, Massey was shot dead outside his home on Manchester Road, Clifton, by a lone gunman. The killer was reported to have been wearing military style fatigues and carried a weapon "similar to a sub machine gun". Greater Manchester Police offered a £50,000 reward for information pertaining to the killing.
John Kinsella murder
Kinsella was shot dead on 5 May 2018 near St Helens Linkway in Rainhill as he walked with his pregnant partner Wendy Owen. The killers used encrypted EncroChat handsets to co-ordinate the murder.
Trial
The trial lasted eight weeks, with heavily armed police officers in attendance. His fellow criminal Steven Boyle was also on trial. Boyle was described as Fellows' "brother in arms" and accused of acting as a spotter, watching the victims and providing assistance to the gunman.
During the trial, evidence from a Garmin fitness watch with a GPS function found in Fellows' house was used to show that he had travelled from his home to a field opposite Massey's home.
Conviction
Fellows was found guilty of the murders of both Massey and Kinsella, but found not guilty of the attempted murder of Owen. Mr Justice William Davis sentenced him to a whole-life term. Boyle was convicted of the murder of Kinsella, but cleared of the murder of Massey and the attempted murder of Owen.
Assault in prison
In February 2019 Fellows was seriously injured when he was slashed by another prisoner with a weapon believed to have been made from a razor blade. He was attacked in HM Prison Whitemoor and airlifted to hospital.
Appeal of sentence
He appealed against his sentence on the grounds that it was "excessive", but in July 2019 the appeal was turned down.
2020 attempted murder trial
In October 2020 Fellows went on trial accused of attempting to murder Abduhl Khan and Aaron Williams, associates of Paul Massey. In 2015, there were a number of incidents as a result of a dispute between two Salford organised crime groups who called themselves the 'A Team' and 'Anti-A Team'. The incidents were all investigated as part of 'Operation Leopard', led by detectives from GMP's Major Incident Team.
These sentences are the culmination of Operation Leopard: Phase Three. Under phases One and Two, 11 members of organised crime groups were jailed in connection with linked incidents including the murders of Paul Massey and John Kinsella and the shootings of seven-year-old Christian Hickey Junior and his mother, Jayne.
The first incident investigated as part of Operation Leopard: Phase Three happened on 18 February 2015 on Doveleys Road. Three men were in a parked car when |
https://en.wikipedia.org/wiki/Plessey%20AR-320 | The AR-320 is a 3D early warning radar developed by the UK's Plessey in partnership with US-based ITT-Gilfillan. The system combined the receiver electronics, computer systems and displays of the earlier Plessey AR-3D with a Gilfillan-developed transmitter and planar array antenna from their S320 series. The main advantage over the AR-3D was the ability to shift frequencies to provide a level of frequency agility and thus improve its resistance to jamming.
The system was designed for sales to the Royal Air Force and a NATO contract for mobile radars on the southern flank of Europe. In 1983, after an extended contest against the Hughes Air Defence Radar, the Royal Air Force ordered six AR-320 systems for their newly forming IUKADGE network under the service name AMES Type 93. The AR-320s were to be held in off-site locations and quickly moved to pre-surveyed areas in case the main radars in the network were attacked. In service, the AR-320 proved to be much less robust than advertised and was ultimately used only in fixed emplacements.
As the radar market grew more demanding and new solid state systems began to replace former vacuum tube systems as high-power microwave sources, the system was extensively redesigned as the AR-325, which, through a series of mergers, became the modern BAe Commander series.
History
Background
During the installation of the first high-power microwave frequency radars using slot antennas, operators of the AMES Type 14 noticed that the apparent angle of the blips on the radar display did not always match the physical angle of the antenna. This was traced to an effect in the waveguides, which had slightly different transmission characteristics based on frequency. When the cavity magnetron warmed and cooled during use, its frequency changed slightly, and a delay was introduced in the waveguide. This caused the signal to no longer exactly match the positioning of the radiators in the antenna, and caused the beam to shift. This effect became known as "squint" and was generally considered annoying, especially on the AMES Type 80 where servicing the magnetron required a lengthy recalibration process to bring the beam back in line with the antenna.
This effect also opened the possibility of steering the beam electronically by deliberately changing the frequency during the period of a long pulse. A magnetron's output is fixed by its physical construction and does not easily allow such shifting. To make practical use of this effect, a much wider bandwidth would be needed, which became possible with the introduction of high-power klystrons and travelling wave tubes in the later 1950s. A number of radar systems began using this technique to provide beam-steering, typically in elevation while the radar spun around its vertical axis to scan in azimuth.
SQUIRT and AR-3D
In 1964, Decca Radar won a contract to study the use of this effect in combination with another emerging technique, pulse compression. In follow-on work they bu |
https://en.wikipedia.org/wiki/Divided%20Ground%3A%20Middle%20East%20Conflict%201948%E2%80%931973 | Divided Ground: Middle East Conflict 1948–1973 is a 2001 computer wargame developed by TalonSoft and published by Take-Two Interactive. It is part of the Campaign series, and follows Rising Sun.
Gameplay
Divided Ground is a computer wargame that simulates Arab–Israeli military conflict between the foundation of Israel in 1948 through the Yom Kippur War in 1973.
Development
Divided Ground was developed by TalonSoft as an entry in its Campaign series, which had previously included titles such as East Front and Rising Sun. It reuses the game engine from earlier titles in the series. The game was first announced under the title Arab-Israeli Wars in March 2001. Divided Ground was shipped to retailers on July 31.
Reception
Divided Ground received a negative review from Computer Gaming Worlds Bruce Geryk, who argued that its "scenario design is quite possibly the worst of any recent computer game." In a middling review, Tom Chick of GameSpot wrote, "The Campaign engine has been around far too long to be simply rehashed with so few changes."
References
External links
Official page (archived)
2001 video games
Computer wargames
Mass media about the Arab–Israeli conflict
Turn-based strategy video games
Windows games
Windows-only games
Video games developed in the United States
Video games set in Israel
TalonSoft games
Multiplayer and single-player video games
Take-Two Interactive games |
https://en.wikipedia.org/wiki/Alla%20Sheffer | Alla Sheffer is a Canadian researcher in computer graphics, geometric modeling, geometry processing, and mesh generation, particularly known for her research on mesh parameterization and angle-based flattening. She is currently a professor of computer science at the University of British Columbia.
Education and career
Sheffer was educated at the Hebrew University of Jerusalem, earning a bachelor's degree in mathematics and computer science in 1991, a master's degree in computer science in 1995, and a Ph.D. in computer science in 1999. Her dissertation, Geometric Modeling and Applied Computational Geometry, was supervised by Michel Bercovier.
After postdoctoral research at the University of Illinois at Urbana–Champaign, she became an assistant professor at the Technion – Israel Institute of Technology in 2001. She moved to the University of British Columbia in 2003, and became a full professor there in 2013.
Recognition
The Canadian Human–Computer Communications Society gave Sheffer their Achievement Award in 2018, "for her numerous highly impactful contributions to the field of computer graphics research".
In 2020, Sheffer was elected as a Fellow of the Royal Society of Canadaand a member of the ACM SIGGRAPH Academy. In 2021, she was elected as a Fellow of IEEE. She was named a 2021 ACM Fellow "for contributions to geometry processing, mesh parameterization, and perception-driven shape analysis and modeling".
References
External links
Home page
Year of birth missing (living people)
Living people
Canadian computer scientists
Canadian women computer scientists
Israeli computer scientists
Israeli women computer scientists
Researchers in geometric algorithms
Hebrew University of Jerusalem alumni
Academic staff of Technion – Israel Institute of Technology
Academic staff of the University of British Columbia
Fellows of the Royal Society of Canada
Fellows of the Association for Computing Machinery |
https://en.wikipedia.org/wiki/Laugh%20Out%20Loud%20Productions | Laugh Out Loud Productions, LLC is an American production company and digital comedy network founded by comedian Kevin Hart. Founded in 2017, Laugh Out Loud (LOL) operates four divisions: LOL Network, LOL Studios, LOL Audio, and LOL X!, which produce, develop, and distribute digital, audio, and experiential comedic content. LOL is headquartered in Encino, CA, and has a full-service production studio in Canoga Park, California.
Since 2017, the company has evolved from an on-demand streaming service to a broader entertainment company. LOL's offerings encompass multiple comedy formats, including stand-up performances, scripted and unscripted video content, social media programming, radio, podcasting, and live events. LOL Network has distribution partnerships with Plex, PlutoTV, Peacock, Roku, Snap, Xumo, and YouTube, and LOL Studios has produced content for Quibi, Peacock, and Katz Networks (BounceTV).
Company history
In 2017, in partnership with Lionsgate, Kevin Hart launched Laugh Out Loud as a subscription comedy streaming service. The network launched with seven original programs featuring comedians, including Hart, GloZell, King Bach, Dormtainment, and David So. In early 2019, Hart purchased most of Lionsgate's stake in the company to become the majority owner. The company's executive team includes Founder and Chairman Kevin Hart, CEO Jeff Clanagan, and President and COO Thai Randolph.
In 2018 LOL signed its first major distribution partnership with Bell Media to launch its content on Canada's Snackable TV.
In January 2020, LOL signed a multi-year deal with NBCUniversal Media, making LOL a flagship partner for Peacock TV, a video-on-demand streaming service that launched in July 2020. The partnership included an equity stake in LOL, a “first-look” agreement, distribution rights to the network's catalog, a Kevin Hart comedy special, exclusive short-form content, and the “Hart to Heart” interview series.
In February 2020, LOL debuted on the newly launched Pluto TV, featuring the stand-up show “Comedy in Color” and D.L. Hughley show, “Hughley Uncut.” LOL's “Comedy in Color” programming focuses on diversity and includes 300 comedians from over 30 countries. Pluto users have access to a curated selection of Laugh Out Loud's content, including Cold as Balls, Kevin Hart: Lyft Legend, and Black Geo. In September 2020, Simon & Schuster and LOL Audio released an audio series containing live recordings from “Comedy in Color,” hosted by Lil Rel. Through their “Comedy in Color” programming, LOL provides opportunities for emerging comedic talent to help comedians of all ethnicities, colors, and genders.
LOL launched its experiential division, LOL X! in early 2020, to produce comedy showcases, tours, and other experiential comedy events, such as live tapings. The division led marketing initiatives for Nick Cannon’s Wild N’ Out tour in partnership with ViacomCBS. In March, the division partnered with Advertising Week to launch a B2B podcast focused on |
https://en.wikipedia.org/wiki/Nussinov%20algorithm | The Nussinov algorithm is a nucleic acid structure prediction algorithm used in computational biology to predict the folding of an RNA molecule that makes use of dynamic programming principles. The algorithm was developed by Ruth Nussinov in the late 1970s.
Background
RNA origami occurs when an RNA molecule "folds" and binds to itself. This folding often determines the function of the RNA molecule. RNA folds at different levels, this algorithm predicts the secondary structure of the RNA.
Algorithm
Scoring
We score a solution by counting the total number of paired bases. Thus, attempting to maximize the score that maximizes the total number of bonds between bases.
Motivation
Consider an RNA sequence whose elements are taken from the set . Let us imagine we have an optimal solution to the subproblem of folding to , and an optimal solution for folding to . Now, to align to , we have two options:
Leave unpaired, and keep the structure of to . The score for this alignment will be equal to the score of the alignment of to , as no new base pairs were created.
Pair with , where . The score for this alignment will be the score of the base pairing, plus the score of the best alignment of to and to .
Algorithm
Consider an RNA sequence of length such that .
Construct an matrix . Initialize such that
for .
will contain the maximum score for the subsequence . Now, fill in entries of up and to the right, so that
where
After this step, we have a matrix where represents the optimal score of the folding of .
To determine the structure of the folded RNA by traceback, we first create an empty list of pairs . We initialize with . Then, we follow one of three scenarios.
If , the procedure stops.
If , then set and continue.
Otherwise, for all , if and are complementary and , append to , then traceback both with and .
When the traceback finishes, contains all of the paired bases.
Limitations
The Nussinov algorithm does not account for the three-dimensional shape of RNA, nor predict RNA pseudoknots. Furthermore, in its basic form, it does not account for a minimum stem loop size. However, it is still useful as a fast algorithm for basic prediction of secondary structure.
References
Bioinformatics algorithms |
https://en.wikipedia.org/wiki/Read%20Along | Read Along, formerly known as Bolo, is an Android language-learning app for children developed by Google for the Android operating system. The application was released on the Play Store on March 7, 2019. It features a character named Dia helping children learn to read through illustrated stories. It has the facility to learn English and Indian major languages i.e. Hindi, Bengali, Tamil, Telugu, Marathi and Urdu as well as Spanish and Portuguese. It basically uses text-to-speech technology, through which the character named Dia reads the story, as well as speech-to-text technology, which mechanically identifies the matches between the text and the reading of the user. The story of Chhota Bheem and Katha Kids was added in September 2019. In April 2020, a new version of the application was released. In September 2020, it added Arabic language to its language option. A web version was launched in August 2022.
References
Google software
Android (operating system) software
2019 software |
https://en.wikipedia.org/wiki/ZuluWar%21 | ZuluWar! is a 1996 computer wargame published by Incredible Simulations. Designed by Jeff Lapkoff and Dennis Bishop, it simulates the Anglo-Zulu War.
Gameplay
ZuluWar! is a computer wargame that simulates the Anglo-Zulu War from a strategic level. The player may control either the British Empire or Zulu Kingdom.
Development
ZuluWar! was designed by Jeff Lapkoff and Dennis Bishop for Incredible Simulations, a company owned by Lapkoff. It follows the design trend in Lapkoff's earlier work, such as Custer's Last Command and Defend the Alamo, of focusing on losing battles. It was the first computer wargame dedicated to the Anglo-Zulu War released since the 1980s, and Lapkoff's first game developed for Microsoft Windows.
Reception
Computer Gaming World wargame columnist Terry Coleman offered ZuluWar! a positive review. He later the game for his 1996 "Good Things Come in Small Packages" award, highlighting its "nice balance between historicity, play balance, simplicity, and fun."
References
External links
Official page (archived)
1996 video games
Computer wargames
Windows games
Windows-only games
Multiplayer and single-player video games
Turn-based strategy video games
Video games developed in the United States
Video games set in South Africa
Video games set in the 19th century
Works about the Anglo-Zulu War |
https://en.wikipedia.org/wiki/Flight%20Commander%202 | Flight Commander 2 is a 1994 computer wargame developed by Big Time Software and published by Avalon Hill. It was designed by Charles Moylan.
Gameplay
Flight Commander 2 is a computer wargame that simulates aerial warfare at the tactical level.
Development
Flight Commander 2 was designed by Charles Moylan, later responsible for Combat Mission. It is the sequel to Moylan's board wargame Flight Commander, which William R. Trotter of PC Gamer US wrote had "gained a small but fanatical following, even though it was too complicated to capture a large market."
The game was released for Mac computers in November 1994.
Reception
Flight Commander 2 sold fewer than 50,000 units globally. This was part of a trend for Avalon Hill games during the period; Terry Coleman of Computer Gaming World wrote in late 1998 that "no AH game in the past five years" had reached the mark.
William R. Trotter of PC Gamer US gave Flight Commander 2 a positive review, calling it a "thoughtful, intelligent simulation, and one that really has no current competition."
In 1996, Computer Gaming Worlds wargame columnist Terry Coleman named Flight Commander 2 his pick for the 15th-best computer wargame of all time. In 2017, Tim Stone of Rock, Paper, Shotgun wrote that the game's "brilliant design still hastens heart rates and evaporates evenings more effectively than any other winged wargame I know."
Legacy
Charles Moylan continued working with Avalon Hill on the aerial combat wargames Over the Reich (1996) and Achtung Spitfire! (1997). He went on to found Battlefront.com and designed the game Combat Mission: Beyond Overlord.
References
External links
1994 video games
Avalon Hill video games
Computer wargames
Windows games
Windows-only games
Multiplayer and single-player video games
Turn-based strategy video games
Video games based on board games
Video games developed in the United States |
https://en.wikipedia.org/wiki/Medieval%20%28video%20game%29 | Medieval is a 1998 computer wargame developed and published by Incredible Simulations.
Development
Medieval was developed at Incredible Simulations by Jeff Lapkoff, the company's owner and primary employee. He created the majority of the game by himself. It carries over interface design elements from Incredible's earlier ZuluWar! (1996).
Reception
According to William R. Trotter of PC Gamer US, Medieval won positive reviews from critics and "gained a passionate cult following." It was Incredible Simulations' most successful game at the time, which helped to establish the company financially.
References
External links
Official page (archived)
Computer wargames
Video games set in the Middle Ages |
https://en.wikipedia.org/wiki/Dai%20%28cryptocurrency%29 | Dai (or DAI, formerly Sai or SAI) is a stablecoin on the Ethereum blockchain whose value is kept as close to one United States dollar as possible through a system of decentralized participants incentivized by smart contracts to perform maintenance and governance functions. Dai is maintained and regulated by MakerDAO, a decentralized autonomous organization (DAO) composed of the owners of its governance token, MKR, who may propose and vote on changes to certain parameters in its smart contracts in order to ensure the stability of Dai.
Together, Dai and MakerDAO are considered the first example of decentralized finance to receive significant adoption.
Overview
Dai is created and destroyed through an overcollateralized loan and repayment process facilitated by MakerDAO's smart contracts in the form of a decentralized application. Users who deposit one of the accepted collateral types (such as Ether) are able to mint new DAI, as a loan, against the value of their collateral. The USD value of the collateral divided by the amount of DAI borrowed is the loan's collateralization ratio; this is calculated using the USD price of a unit of the collateral asset as reported by a set of decentralized oracles. Each loan type has a minimum collateralization ratio, which is usually in the range of 110-200%. If the collateralization ratio of a loan falls below the minimum ratio, anyone may call a function of the contract to cause a portion of the collateral to be sold for DAI on a decentralized exchange, which is then used to pay off the debt and pay a reward to the account that called the function. Setting a minimum ratio well above 100% provides enough time to sell the collateral in the event of a flash crash in the price of the asset; generally, the lower a minimum ratio is, the higher the interest rate will be, to offset the systemic risk.
Upon repayment of the loan and its accrued interest, the returned Dai is automatically destroyed, and the collateral is made available for withdrawal. In this way the USD value of Dai can be said to be backed by the USD value of the underlying collateral held by MakerDAO's smart contracts. By controlling the types of accepted collateral, minimum collateralization ratios, and the interest rates for borrowing or storing Dai, MakerDAO is able to control the amount of Dai in circulation, and thus its value.
The power to propose and implement changes to such variables is granted, through code, to holders of the MKR token. Owners of the governance token are able to vote on proposed modifications in equal proportion to the amount of tokens they hold. The MKR token also serves as an investment in the MakerDAO system. Added interest that borrowers pay back, on top of their loan's principal, is used to buy up MKR tokens from the market and burn them, taking them permanently out of circulation. This mechanism aims to make MKR deflationary in correlation to the revenues from lending Dai.
History
MakerDAO was formed in 2014 by Dan |
https://en.wikipedia.org/wiki/Fatmah%20Baothman | Fatmah Baothman is Saudi Arabian computer scientist who is the first woman in the Middle East with a Ph.D. in artificial intelligence. She was recently appointed the board president for the Artificial Intelligence Society. Baothman has worked over 25 years as, and is currently, an assistant professor at King Abdulaziz University Faculty of Computing & Information Technology Baothman established the women's Department which is the foundation of the Computer Science College at King Abdulaziz University, and became the first teaching assistant faculty member.
Education and career
In 2003, Baothman earned her Ph.D. from The University of Huddersfield, the School of Computing and Engineering in the United Kingdom. Her AI dissertation is AI application in "phonology-based automatic speech recognition for Arabic." She was awarded with distinction in 2003.
Baothman became the chairwoman of the IEEE Women in Engineering Western Region, established the King Abdulaziz University KAU IEEE chapter for women and the President of Women Engineers Committee at Women Engineers Committee at “Saudi Council of Engineering” western region.
Books and articles
Representing coarticulation processes in Arabic speech', co-authored with Michael Ingleby, S Boudelaa, 2006
Phonology-based automatic speech recognition for Arabic, 2002
Comparative Study from Several Business Cases and Methodologies for ICT Project Evaluation, 2016for ICT project evaluation with her co-authors Farrukh Saleem, Naomie Salim, Abdulrahman H Altalhi, AL Abdullah, Zahid Ullah, Fatmah A Baothman, Muhammad Haleem Junejo.
EMPTY NUCLEI IN ARABIC SPEECH PATTERNS AND THE DIACRITIC SUKU UN, co-authored with Michael Ingleby
Syllabic Markov models of Arabic HMMs of spoken Arabic using CV units, coauthored with Michael Ingleby
References
External links
Living people
Women computer scientists
Alumni of the University of Huddersfield
Date of birth missing (living people)
Academic staff of King Abdulaziz University
Artificial intelligence researchers
Year of birth missing (living people)
Women technology writers |
https://en.wikipedia.org/wiki/Lin%20Cai | Lin Cai is a Chinese-Canadian telecommunications engineer known for her work on topology control in wireless networks and in the applications of wireless communications to self-driving cars. She was educated at the University of Waterloo and is a professor of electrical and computer engineering at the University of Victoria.
Cai should be distinguished from a younger wireless networking engineer, also an alumna of the University of Waterloo named Lin Cai, who is a member of the faculty at the Illinois Institute of Technology. The younger Cai publishes as "Lin X. Cai", and has coauthored research with Lin Cai.
Education and career
Cai has a bachelor's degree from the Nanjing University of Science and Technology. She completed her Ph.D. at the University of Waterloo in 2005, and in the same year joined the University of Victoria faculty.
Recognition
Cai became an E. W. R. Steacie Memorial Fellow of the Canadian Natural Sciences and Engineering Research Council in 2019. She was named an IEEE Fellow in 2020, affiliated with the IEEE Vehicular Technology Society, "for contributions to topology control of wireless networks". She was elected to the College of New Scholars of the Royal Society of Canada in 2020.
References
External links
Home page
Year of birth missing (living people)
Living people
Canadian telecommunications engineers
Canadian women engineers
Chinese telecommunications engineers
Chinese electrical engineers
Chinese women engineers
Nanjing University of Science and Technology alumni
University of Waterloo alumni
Academic staff of the University of Victoria
Fellow Members of the IEEE |
https://en.wikipedia.org/wiki/Curry%20General%20Hospital | Curry General Hospital in Gold Beach, Oregon, is a general medical and surgical acute care and critical access facility. It was founded in 1951, and has been part of the Curry Health Network since 1983. New facilities were opened in May 2017.
History
Construction on the original hospital building, an unreinforced brick structure, began in 1949, with additional wings constructed in the 1950s and 60s. It began operation in 1951.
By 2013, the facility no longer met building codes or patient needs, and there was widespread community support to build a new hospital. Voters of Curry Health District passed a US$10 million general obligation bond issue in November 2013. Curry Health Network donated an additional US$521,000, and USDA Rural Development provided US$20.96 million in low-interest loans.
New building located in tsunami zone
In 2013, the State of Oregon first published its "Resilience Plan", which stated, "The majority of buildings in Oregon have not been designed to resist the shaking from a magnitude 9.0 Cascadia earthquake." Early in 2014, state officials began asking questions about the proposed site local officials had chosen for the new Curry General Hospital, which was four blocks from the ocean, inside Oregon's proposed tsunami zone.
Hospital and city officials had rejected alternative sites for two basic reasons: prohibitive costs of construction on higher ground, and ease of access for aging residents. They also cited mitigating conditions built into their plan: "New plans for the building also include high seismic standards, like piles being sunk deep under ground for stabilization in the event of a large quake. Important mechanics, like the HVAC system, will also be placed on the roof, to keep them as far away from any water as possible."
According to Kristian Foden-Vencil, of Oregon Public Broadcasting, "The building is about 50 feet above sea level. Scientists estimate that waves from a 9.0 subduction earthquake off the coast of Oregon could reach between 60 and 100 feet above sea level."
Construction completed, 2017
In 2014, the hospital served a population base of about 22,000. In April 2014, Erdman Co. of Wisconsin was selected to design and build a new US$20 million building. Groundbreaking for the new building took place in May 2015, and the community celebrated ribbon cutting for the new state-of-the-art hospital on April 1, 2017. The multi-story critical care hospital and clinic provides 62,000-square-feet of space for medical specialist and modern equipment, including a new CT scanner.
With a total investment in the building and equipment of approximately US$34.8 million, the building has 18 inpatient beds, and an emergency department about ten times larger than the one in the original building.
Covid-19 response
When the State of Oregon halted all elective surgical procedures in March 2020, Curry General Hospital experienced an approximate 50% drop in revenue.
On March 15, the hospital announced screening ex |
https://en.wikipedia.org/wiki/Project%20Verona | Project Verona is an experimental research programming language developed by Microsoft and aimed at dealing with memory situations to make other programming languages safer.
The project is being supported by C# project manager Mads Torgensen and Microsoft Research Cambridge research software engineer Juliana Franco. Project Verona is also being aided by academics at Imperial College London. Unlike in Rust where the ownership model based on a single object, it is based on groups of objects in Verona.
According to Microsoft, the goal of the project is to create a safer platform for memory management.
Project Verona is open source released under MIT License and is under active development on GitHub.
Example
while_sum(x: List[U32]) : U32
{
var sum: U32 = 0;
let iter = x.values();
while { iter.has_value() }
{
// This has to be `a`, same as in the for loop above
let a = iter();
// Increments the iterator
next iter;
// This is the body of the for loop
sum = sum + a
}
sum
}
See also
List of programming language researchers
Go (programming language)
Rust (programming language)
Cyclone (programming language)
References
External links
Project Verona - Microsoft Research
Microsoft Research
Systems programming languages
2019 software
High-level programming languages
Programming languages created in 2019
Cross-platform software
Software using the MIT license
Free and open-source software
Microsoft free software
Microsoft programming languages |
https://en.wikipedia.org/wiki/5th%20Fleet%20%28video%20game%29 | 5th Fleet is a 1994 computer wargame developed by Stanley Associates and published by Avalon Hill.
Gameplay
5th Fleet is a computer wargame that simulates modern naval warfare in the Indian Ocean.
Development
5th Fleet was developed by Stanley Associates and published by Avalon Hill. It is an adaptation of Avalon's board wargame 5th Fleet by Victory Games. The team was led by Stanley Associates' Mike Innella, with assistance from the board version's designer, Joe Balkoski. 5th Fleet was an early piece of Avalon Hill's wider effort to rebuild its computer game branch, a project begun in late 1992. The publisher hired Jim Rose to lead the plan. Overseeing 5th Fleet, Rose noted that he asked Balkoski to "tell us where you cut corners ... for playability" in the board version, and Stanley Associates would include "everything he [had] wanted to put in".
Reception
5th Fleet sold fewer than 50,000 units globally. This was part of a trend for Avalon Hill games during the period; Terry Coleman of Computer Gaming World wrote in late 1998 that "no AH game in the past five years" had reached the mark.
In PC Gamer US, William R. Trotter called 5th Fleet "an elegant conversion of a board-gaming classic; a must-have for fans of naval war who relish action above all other elements." Tim Carter of Computer Gaming World was similarly positive, dubbing it "great fun".
Legacy
Stanley Associates went on to adapt the Avalon Hill board wargame Wooden Ships and Iron Men into a computer format, resulting in the game Wooden Ships and Iron Men (1996).
References
External links
1994 video games
DOS games
Avalon Hill video games
Computer wargames
Naval video games
Multiplayer and single-player video games
Turn-based strategy video games
Video games based on board games
Video games developed in the United States
Stanley Associates games |
https://en.wikipedia.org/wiki/VoTT | VoTT (Visual Object Tagging Tool) is a free and open source electron app for image annotation and labeling developed by Microsoft. The software is written in the TypeScript programming language and used for building end to end object detection models from image and videos assets for computer vision algorithms.
Overview
VoTT is a React+Redux web application that requires Node.js and npm. It is available as a stand-alone web application and can be used in any modern web browser.
Notable features include the ability to label images or video frames, support for importing data from local or cloud storage providers, and support for exporting labeled data to local or cloud storage providers.
Labeled assets can be exported into the following formats:
Comma-separated values (CSV)
Microsoft Azure Custom Vision Service
Microsoft Cognitive Toolkit (CNTK)
TensorFlow (Pascal VOC and TFRecords)
VoTT (generic JSON schema)
The VoTT source code is licensed under MIT License and available on GitHub.
See also
List of manual image annotation tools
Computer Vision Annotation Tool
LabelMe
Supervised learning
Image segmentation
References
External links
Visual Object Tagging Tool (VoTT) v2.2.0
Computer vision software
Datasets in computer vision
Object recognition and categorization
Free and open-source software
Microsoft free software
Software using the MIT license
2018 software |
https://en.wikipedia.org/wiki/Magnum%20P.I.%20%282018%20TV%20series%2C%20season%202%29 | The second season of the crime and action drama Magnum P.I. premiered on September 27, 2019, on CBS, for the 2019–20 United States network television schedule. The series is a remake of the 1980 series of the same name and centers on Thomas Magnum, a former Navy SEAL who works as a private investigator and solves mysteries with his business partner Juliet Higgins and other friends. It stars Jay Hernandez, Perdita Weeks, Zachary Knighton, Stephen Hill, Amy Hill, and Tim Kang. The season was ordered on January 25, 2019, for a twenty episode season. Multiple Hawaii Five-0 stars appeared as their Hawaii Five-0 characters in a two-part crossover event as well as in guest roles throughout the season in minor crossover events.
The season was split into two parts, with the first part concluding on January 31, 2020, after airing fourteen episodes, to allow for MacGyver to enter the television schedule as a mid-season replacement. It then continued airing its remaining six episodes on April 10, 2020, holding the timeslot that was freed up by airing its series finale. The season was viewed by an average of 8.91 million viewers and ranked 27 out of all television series for the season. "Payback For Beginners," the season premiere, brought in 6.40 million viewers while "A Leopard on the Prowl," the season finale was viewed by 6.49 million. "Desperate Measures," the seasons twelfth episode, which also served as the conclusion to the two-part fictional crossover with Hawaii Five-0, was the highest viewed episode of the season at 8.76 million. The season concluded on May 8, 2020, and was renewed for a third season that premiered on December 4, 2020.
Cast and characters
Main
Jay Hernandez as Thomas Magnum, a former Navy SEAL who is a security consultant for the successful novelist Robin Masters, living in the guest house on his estate, while also working as a private investigator
Perdita Weeks as Juliet Higgins, a former MI6 agent who is majordomo to Robin Masters; she and Magnum bicker but become allies
Zachary Knighton as Orville "Rick" Wright, a friend of Magnum's who is a Marine veteran and former door gunner, who runs his own tiki bar and is also a playboy
Stephen Hill as Theodore "T.C." Calvin, a friend of Magnum's who is a Marine veteran and helicopter pilot who runs helicopter tours of Hawaii
Amy Hill as Teuila "Kumu" Tuileta, the cultural curator of Robin Masters' estate
Tim Kang as Honolulu Police Department (HPD) Detective Gordon Katsumoto, who dislikes Magnum but usually comes to the team's aid when needed.
Recurring
Christopher Thornton as Kenny "Shammy" Shamberg
Bobby Lee as Jin Jeong
Notable guests
Brooke Lyons as Abby Miller
Deontay Wilder as Noah
Aaron Donald as himself
Corbin Bernsen as Icepick
Hans Hedemann as himself
Patrick Monahan as himself
Skylar Grey as herself
Jerry Becker as himself
Luis Carlos Maldonado as himself
Stephanie Lum as herself
Domenick Lombardozzi as Sebastian Nuzo
Louis Lombardi as Paulie Nuzo
J |
https://en.wikipedia.org/wiki/Modern%20Miracle%20Network | Modern Miracle Network (MMN) is a Canadian fossil fuel advocacy organization that was incorporated in 2016 by entrepreneur Michael Binnion, and operates out of the offices of Calgary, Alberta-based Questerre Energy. Binnion is chair of the Manning Foundation and a member of the board of governors of the Canadian Association of Petroleum Producers (CAPP).
Overview
According to The Globe and Mail, Modern Miracle Network (MMN) hosted a "highly political" private event to "map out strategy for ousting Justin Trudeau's Liberals" in the 2019 Canadian federal election. Journalist John Lornic described the organization as an "astroturf advocacy operation with a curiously anachronistic handle" that has hosted an event with "energy industry operatives, senior Conservative advisors and then Conservative leader Andrew Scheer to win the 2019 Canadian federal election. DeSmogBlog calls the MMN, a "Canadian pro-oil advocacy group". Michael Binnion and Vivian Krause were among the speakers at the 2019 Indigenous Energy Summit.
Michael Binnion also wrote a column in the Toronto Sun ahead of the conversation between President Joe Biden and Prime Minister Justin Trudeau, following the President's inauguration and cancellation of the Keystone XL pipeline, promoting the steps the Canadian Oil and Gas Industry has committed to, and create a conversation around Canada's energy independence.
Administration
Modern Miracle Network was incorporated by Michael Binnion in 2016. Binnion is chair of the Manning Foundation and a member of the board of governors Canadian Association of Petroleum Producers (CAPP).
Board members include representatives from energy and oil companies.
Publications
MMN funded the publication of Moment of truth: how to think about Alberta's future co-edited by economist Jack Mintz, Ted Morton, and Tom Flanagan. Both Morton and Flanagan had co-signed the 2001 "Firewall Letter"—also known as the Alberta Agenda—in which they called for Alberta to create a protective firewall around the province of Alberta to "limit the extent to which an aggressive and hostile federal government can encroach on legitimate provincial jurisdiction." They called on then Alberta premier Ralph Klein to withdraw from the Canada Pension Plan, replace the Royal Canadian Mounted Police (RCMP), take over health care decision-making, and collect income tax in order to "limit the extent to which an aggressive and hostile federal government can encroach on legitimate provincial jurisdiction." The book echoes the firewall message, which is restated in Premier Jason Kenney's 2019 Fair Deal Panel report.
Following the inauguration of President Joe Biden and the cancellation of the Keystone XL pipeline the MMN wrote briefing notes that were published in the Toronto Sun. In this publication it should be noted the MMN mission is "...to promote serious, respectful and non-partisan conversations about energy", and when speaking about the Canadian Oil and Gas industry "...our industry |
https://en.wikipedia.org/wiki/List%20of%20Brazilian%20federative%20units%20by%20homicide%20rate | This is a list of Brazilian federative units by homicide rate, according to data from the Atlas da Violência (years 1996 to 2021, prepared by the Instituto de Pesquisa Econômica Aplicada (Ipea) and the Fórum Brasileiro de Segurança Pública (FBSP) and the Mapa da Violência from 1998 (1980s to 1988 ) and 2000 (years 1989 to 1995, prepared by United Nations Educational Organization, Science and Culture (UNESCO).
List
The 2000s and 2020s
The list of decades, by default, is ordered by homicide rate in a decreasing manner according to 2021. That is, the federative units with the highest rates this year are closer to the top of the list.
Decades of 1980 and 1990
See also
Crime in Brazil
List of cities by murder rate
Homicide in world cities
List of countries by firearm-related death rate
List of Brazilian states
References
Crime in Brazil
Murder in Brazil
Brazil
Murder rate
Brazil, Murder |
https://en.wikipedia.org/wiki/Transport%20in%20Guangdong | Guangdong has well-developed road, rail, air and water transport networks. Different areas of Guangdong are connected both economically and culturally by the waterways of the Pearl River. Water transport is responsible for more than two-fifths of Guangdong's total traffic tonnage. Connection with other provinces rely on Guangdong's extensive road and rail networks, one of the best networks in China.
Guangzhou Baiyun International Airport is one of the busiest airports in China and in the world.
Air transport
Two international airports, Guangzhou Baiyun International Airport and Shenzhen Bao'an International Airport, connect the province with major cities in China and in other countries.
Rail transport
Canton–Sam Shui Railway, built from 1902 to 1904, was the first railway line in Guangdong.
As of 2018 in Guangdong, China Railway Guangzhou Group manages of railway and regional enterprises manage . Operating high-speed rail networks span .
Inter-city train services crossing the Hong Kong-Guangdong border connect major cities in Guangdong with Hong Kong. Guangzhou–Kowloon through train and Guangzhou–Shenzhen–Hong Kong Express Rail Link (XRL) serve cities between Guangzhou and Hong Kong.
Road transport
The Guangzhou Provincial Passenger Bus Station is the largest bus station in Guangdong.
In 2020, Guangdong became the first province in China to have over 10,000 km of Expressways.
Water transport
Ferries connect Guangdong cities within the Pearl River Delta and Hong Kong and Macau.
See also
Transport in Hong Kong
Transport in Macau
References
External links
Department of Transportation of Guangdong Province
China Railway Guangzhou Group |
https://en.wikipedia.org/wiki/Il%20Mattino%20di%20Padova | is an Italian newspaper published in Padua, Italy.
The newspaper, which was first published in 1978, is part of GEDI Gruppo Editoriale and specifically GEDI News Network, controlling , , and several local newspapers. In Veneto, other than , GEDI publishes , and .
As of 2020, the newspaper is edited by Paolo Possamai.
External links
1978 establishments in Italy
Italian-language newspapers
Newspapers established in 1978
Daily newspapers published in Italy |
https://en.wikipedia.org/wiki/Lucy%20Gilbert | Lucy Gilbert is an American computer programmer and video game developer. She worked for Atari, Inc. via General Computer Corporation and developed computer graphics software for Autographix.
Education
Gilbert went to MIT and graduated with two degrees. Her master's thesis was about distributed computing using Ada.
Career
Gilbert was hired by General Computer Corporation (GCC) right out of college in 1983. There she became interested in computer graphics. She was let go a year later and hired by Autographix, where she went on font rendering, as well as a large-scale presentation system for multiple screens.
In 1986, while working for Autographix, Gilbert co-authored the paper Limitations of Synchronous Communication with Static Process Structure in Languages for Distributed Computing. The paper explores the idea of a programming language for distributed programs, using a specific combination of communication principles and process structures. It suggests using either synchronous communication or a static process structure, but not both, in order to improve concurrency.
Gilbert was laid off after having her second child, but returned to work in 2008 with her own web design company.
Personal life
Gilbert has six children, all of them working in or being educated in subjects related to STEM.
References
External links
Lucy Gilbert's story at Atari Women
Video game programmers
Women video game programmers
Computer programmers
Living people
Computer graphics professionals
Computer graphics researchers
1960 births |
https://en.wikipedia.org/wiki/Microselia | Microselia is a genus of flies in the family Phoridae.
Species
M. beaveri Disney, 1983
M. cuspidata Beyer, 1965
M. daccordii Gori, 1999
M. deemingi Disney, 1983
M. espanaensis Disney, 2006
M. forsiusi (Schmitz, 1927)
M. micropila Carles-Tolrá, 2006
M. rivierae Schmitz, 1934
M. southwoodi Disney, 1988
M. texana Disney, 1982
M. yemenensis Disney, 2006
References
Phoridae
Platypezoidea genera |
https://en.wikipedia.org/wiki/Norwegian%20Telecommunication%20and%20Data%20Workers%27%20Union | The Norwegian Telecommunication and Data Workers' Union (, TD) was a trade union representing telecommunication and information technology workers in Norway.
The union was founded on 18 November 1988, when the Norwegian Union of Telecommunication Workers merged with the Norwegian Telecommunication Organisation. It affiliated to the Norwegian Confederation of Trade Unions, and by 1996, it had 14,608 members. In 1999, it merged with the Norwegian Union of Electricians and Power Station Officials, to form the Electrician and IT Workers' Union.
Presidents
1988: Tore Lundberg
1990s: Tore Gulbrandsen
References
Telecommunications trade unions
Trade unions established in 1988
Trade unions disestablished in 1999
Defunct trade unions of Norway |
https://en.wikipedia.org/wiki/Manifold%20Data%20Mining%20Inc. | Manifold Data Mining Inc. is a Canadian company specializing in consumer data products, analytics, and predictive modeling. As a data and analytical service provider in Canada, they have been providing businesses, charities, and governmental organizations with comprehensive data products since being founded in 2001. For each neighbourhood, they provide estimates of what products consumers buy, where and how often they shop, how much they spend, which media channels they use, their lifestyles, and their attitudes or psychographics.
Data Products
Their data products include demographics (e.g. geo-demographics), consumer behaviour, and a number of other categories. The Canadian census is conducted every 5 years, so in order to produce inter-censal estimates, e.g. for Sault Ste. Marie, they need to take into consideration other factors. They also consider factors which affect the standard census such as undercount.
All data products are modelled down to the 6-digit postal code level and various levels of census geographic units, with each postal code averaging 10–15 households.
Manifold is a partner of Vividata and Numeris, and models their survey responses down to the 6-digit postal code level, i.e. all across Canada and in markets not covered by their surveys.
CanaCode Lifestyle Clusters
One of their popular data products is CanaCode Lifestyles, which is a lifestyle segmentation system based on over 10,000 variables, ranging from demographic to spending to consumer behaviour and media usage patterns.
Scientific Research
Manifold Data Mining has also published numerous peer-reviewed research papers on topics such as Type 2 Diabetes. Manifold also publishes papers on Machine Learning techniques like collaborative filtering, which they use in their modelling and as part of their proprietary techniques.
Other Usage
Manifold is often cited by municipalities in their community profiles, 5 and 10 year economic and land development plans.
Manifold's data has been used by university researchers, for example those investigating poverty odds, living standards, and low socio-economic status.
References
External links
Manifold Data Mining Inc.
2001 establishments in Ontario
Publishing in Canada
Market research companies of Canada
Business services companies established in 2001
Geomarketing
Business intelligence companies
Marketing analytics
Market research |
https://en.wikipedia.org/wiki/Nusantara%20TV | Nusantara TV (abbrievated as NTV) is an Indonesian digital terrestrial television network based in Central Jakarta, owned by NT Corp. NTV was launched on and granted permanent broadcasting permit (IPP) from the Indonesian government in 2019.
History
NTV is owned by PT Nusantara Media Mandiri, one of business units of NT Corp, that engage in digital television broadcasting media with national coverage and has the status of private broadcasting institution. Nusantara TV and its logo has granted a trademark certificate from Ministry of Law and Human Rights of Republic of Indonesia, based on Act No.20 of 2016, with registration number IDM000806608 regarding trademarks since .
NTV also received the broadcasting operation license since then permanent broadcasting operation permit (permanent IPP) in , granted by Ministry of Communication And Information Technology of Republic of Indonesia through the decree No.463/T.02.02/2019 dated . Nusantara TV began officially broadcast on that followed a trial of digital broadcast in 20 cities on , then digital terrestrial broadcast nationwide throughout Indonesia since .
Programs
Buletin Berita (News Bulletin)
Apa Kata Dunia (What The World Said)
Perempuan Kita (Our Women)
Update-in
Arena Olahraga (Sports Arena)
Local’s Talk
Telisik Hukum (Unveil The Law)
Bincang Virtual (Virtual Talks)
Cinepedia
Cinekids
Presenters
Current
Muhammad Irsal
Dannys Citra
Elisa Sinaga
Gati Kamka (former news anchor GTV)
Nuke Azwita (former news anchor GTV)
Former
Adi Wiranata
Okie Achmad Zainufry
Indah Warsetio
Ruby Matondang
Stephan Tambunan
Tasya Felder
Broadcasting networks
See also
List of television stations in Indonesia
References
External links
Television networks in Indonesia |
https://en.wikipedia.org/wiki/British%20Rail%20Double%20Arrow | The British Rail Double Arrow is a logo that was created for British Rail (BR), the then state-owned operator of Britain's railway network, in 1965. It has remained in use as part of the National Rail brand used for Britain's passenger rail services after the disbanding of British Rail, having been officially renamed as the National Rail Double Arrow and more recently being updated and reworked for continued use under the name Rail Symbol 2.
Origins
The logo grew out of a desire for modernisation in the 1960s, with the management of what was then known as British Railways wanting to divest the organisation of older motifs and develop a corporate identity to rival that of London Transport. BR's design panel set up a working party led by Milner Gray of the Design Research Unit. They drew up a Corporate Identity Manual which established a coherent brand and design standard for the whole organisation, specifying Rail Blue and pearl grey as the standard colour scheme for all rolling stock; Rail Alphabet as the standard corporate typeface, designed by Jock Kinneir and Margaret Calvert; and introducing the now-iconic corporate identity symbol of the "Double Arrow" logo. Designed by Gerry Barney (also of the DRU), this arrow device was formed of two interlocked arrows across two parallel lines, symbolising a double track railway. The new BR corporate identity and Double Arrow were rolled out in 1965, and the brand name of the organisation was truncated to "British Rail".
The logo was used widely by British Rail on trains, stations and tickets. It was also used by subsidiary companies, most notably on the funnels of Sealink ferries, where the standard image was used on the starboard side, but a mirror image on the port side, so that the top arrow always pointed to the bow of the ship. On flags, too, the logo appeared in reverse on the back with the top arrow pointing towards the flagpole.
Post-privatisation use
With the privatisation of the railways in the mid-1990s, the trademark registration for the logo was transferred to the Secretary of State for Transport. As British railway trains are now operated by a number of independent train operating companies, the double arrow logo no longer appears on railway vehicles except those preserved. However it still appears on railway tickets, which can usually be used on the services of a variety of train operators, and is used to denote stations within the National Rail network.
As such it is still printed on railway tickets and used to denote railway stations, including usage on street signs pointing to such stations. The logo has traditionally been used in a variety of colours, and in both positive and reversed forms.
Rail Symbol 2
In September 2022 official specifications for an updated version of the logo were released by Network Rail, the body responsible for Britain's national railway infrastructure.
Created with the input of graphic designer Nick Job and the Design Council, the revised design a |
https://en.wikipedia.org/wiki/Multiway%20number%20partitioning | In computer science, multiway number partitioning is the problem of partitioning a multiset of numbers into a fixed number of subsets, such that the sums of the subsets are as similar as possible. It was first presented by Ronald Graham in 1969 in the context of the identical-machines scheduling problem. The problem is parametrized by a positive integer k, and called k-way number partitioning. The input to the problem is a multiset S of numbers (usually integers), whose sum is k*T.
The associated decision problem is to decide whether S can be partitioned into k subsets such that the sum of each subset is exactly T. There is also an optimization problem: find a partition of S into k subsets, such that the k sums are "as near as possible". The exact optimization objective can be defined in several ways:
Minimize the difference between the largest sum and the smallest sum. This objective is common in papers about multiway number partitioning, as well as papers originating from physics applications.
Minimize the largest sum. This objective is equivalent to one objective for Identical-machines scheduling. There are k identical processors, and each number in S represents the time required to complete a single-processor job. The goal is to partition the jobs among the processors such that the makespan (the finish time of the last job) is minimized.
Maximize the smallest sum. This objective corresponds to the application of fair item allocation, particularly the maximin share. It also appears in voting manipulation problems, and in sequencing of maintenance actions for modular gas turbine aircraft engines. Suppose there are some k engines, which must be kept working for as long as possible. An engine needs a certain critical part in order to operate. There is a set S of parts, each of which has a different lifetime. The goal is to assign the parts to the engines, such that the shortest engine lifetime is as large as possible.
These three objective functions are equivalent when k=2, but they are all different when k≥3.
All these problems are NP-hard, but there are various algorithms that solve it efficiently in many cases.
Some closely-related problems are:
The partition problem - a special case of multiway number partitioning in which the number of subsets is 2.
The 3-partition problem - a different and harder problem, in which the number of subsets is not considered a fixed parameter, but is determined by the input (the number of sets is the number of integers divided by 3).
The bin packing problem - a dual problem in which the total sum in each subset is bounded, but k is flexible; the goal is to find a partition with the smallest possible k. The optimization objectives are closely related: the optimal number of d-sized bins is at most k, iff the optimal size of a largest subset in a k-partition is at most d.
The uniform-machines scheduling problem - a more general problem in which different processors may have different speeds.
Approximati |
https://en.wikipedia.org/wiki/Greedy%20number%20partitioning | In computer science, greedy number partitioning is a class of greedy algorithms for multiway number partitioning. The input to the algorithm is a set S of numbers, and a parameter k. The required output is a partition of S into k subsets, such that the sums in the subsets are as nearly equal as possible. Greedy algorithms process the numbers sequentially, and insert the next number into a bin in which the sum of numbers is currently smallest.
Approximate algorithms
The simplest greedy partitioning algorithm is called list scheduling. It just processes the inputs in any order they arrive. It always returns a partition in which the largest sum is at most times the optimal (minimum) largest sum. This heuristic can be used as an online algorithm, when the order in which the items arrive cannot be controlled.
An improved greedy algorithm is called LPT scheduling. It processes the inputs by descending order of value, from large to small. Since it needs to pre-order the inputs, it can be used only as an offline algorithm. It guarantees that the largest sum is at most times the optimal (minimum) largest sum, and the smallest sum is at least times the optimal (maximum) smallest sum. See LPT scheduling for more details.
Complete greedy algorithm
The complete greedy algorithm (CGA) is an exact algorithm, i.e., it always finds an optimal solution. It works in the following way. After sorting the numbers in descending order (as in LPT), it constructs a k-ary tree. Each level corresponds to a number, and each of the k branches corresponds to a different set in which the current number can be put. Traversing the tree in depth-first order requires only O(n) space, but might take O(kn) time. The runtime can be improved by using the greedy heuristic: in each level, develop first the branch in which the current number is put in the set with the smallest sum. This algorithm finds the greedy (LPT) solution first, but then proceeds to look for better solutions.
Several additional heuristics can be used to improve the runtime:
In a node in which the current sum-difference is at least the sum of all remaining numbers, the remaining numbers can just be put in the smallest-sum subset.
If we reach a leaf in which the sum-difference is 0 or 1, then the algorithm can terminate since this is the optimum.
If two or more subset sums in the current node are equal, then we can put the current number only in one of these subsets, thus reducing the size of the subtree by at least half.
The last number can be assigned only to the subset with the smaller sum.
Generalizations
In the fair item allocation problem, there are n items and k people, each of which assigns a possibly different value to each item. The goal is to partition the items among the people in as fair way as possible. The natural generalization of the greedy number partitioning algorithm is the envy-graph algorithm. It guarantees that the allocation is envy-free up to at most one item (EF1). Moreover, |
https://en.wikipedia.org/wiki/Pseudopolynomial%20time%20number%20partitioning | In computer science, pseudopolynomial time number partitioning is a pseudopolynomial time algorithm for solving the partition problem.
The problem can be solved using dynamic programming when the size of the set and the size of the sum of the integers in the set are not too big to render the storage requirements infeasible.
Suppose the input to the algorithm is a multiset of cardinality :
S = {x1, ..., xN}
Let K be the sum of all elements in S. That is: K = x1 + ... + xN. We will build an algorithm that determines whether there is a subset of S that sums to . If there is a subset, then:
if K is even, the rest of S also sums to
if K is odd, then the rest of S sums to . This is as good a solution as possible.
e.g.1 S = {1, 2, 3, 5}, K = sum(S) = 11, K/2 = 5, Find a subset from S that is closest to K/2 -> {2, 3} = 5, 11 - 5 * 2 = 1
e.g.2 S = {1, 3, 7}, K = sum(S) = 11, K/2 = 5, Find a subset from S that is closest to K/2 -> {1, 3} = 4, 11 - 4 * 2 = 3
Recurrence relation
We wish to determine if there is a subset of S that sums to . Let:
p(i, j) be True if a subset of { x1, ..., xj } sums to i and False otherwise.
Then p(, N) is True if and only if there is a subset of S that sums to . The goal of our algorithm will be to compute p(, N). In aid of this, we have the following recurrence relation:
p(i, j) is True if either p(i, j − 1) is True or if p(i − xj, j − 1) is True
p(i, j) is False otherwise
The reasoning for this is as follows: there is some subset of S that sums to i using numbers
x1, ..., xj
if and only if either of the following is true:
There is a subset of { x1, ..., xj−1 } that sums to i;
there is a subset of { x1, ..., xj−1 } that sums to i − xj, since xj + that subset's sum = i.
The pseudo-polynomial algorithm
The algorithm consists of building up a table of size by containing the values of the recurrence. Remember that is the sum of all elements in . Once the entire table is filled in, we return . Below is a depiction of the table . There is a blue arrow from one block to another if the value of the target-block might depend on the value of the source-block. This dependence is a property of the recurrence relation.
function can_be_partitioned_equally(S) is
input: A list of integers S.
output: True if S can be partitioned into two subsets that have equal sum.
n ← |S|
K ← sum(S)
P ← empty boolean table of size ( + 1) by (n + 1)
initialize top row (P(0,x)) of P to True
initialize leftmost column (P(x, 0)) of P, except for P(0, 0) to False
for i from 1 to
for j from 1 to n
x = S[j-1]
if (i-x) >= 0 then
P(i, j) ← P(i, j-1) or P(i-x, j-1)
else
P(i, j) ← P(i, j-1)
return P(, n)
Example
Below is the table P for the example set used above S = {3, 1, 1, 2, 2, 1}:
Analysis
This algorithm runs in time , where is the number of elements in the input set and is the sum of ele |
https://en.wikipedia.org/wiki/Largest%20differencing%20method | In computer science, the largest differencing method is an algorithm for solving the partition problem and the multiway number partitioning. It is also called the Karmarkar–Karp algorithm after its inventors, Narendra Karmarkar and Richard M. Karp. It is often abbreviated as LDM.
The algorithm
The input to the algorithm is a set S of numbers, and a parameter k. The required output is a partition of S into k subsets, such that the sums in the subsets are as nearly equal as possible. The main steps of the algorithm are:
Order the numbers from large to small.
Replace the largest and second-largest numbers by their difference.
If two or more numbers remain, return to step 1.
Using backtracking, compute the partition.
Two-way partitioning
For k=2, the main step (2) works as follows.
Take the two largest numbers in S, remove them from S, and insert their difference (this represents a decision to put each of these numbers in a different subset).
Proceed in this way until a single number remains. This single number is the difference in sums between the two subsets.
For example, if S = {8,7,6,5,4}, then the resulting difference-sets are {6,5,4,1} after taking out the largest two numbers {8,7} and inserting the difference 8-7=1 back;
Repeat the steps and then we have {4,1,1}, then {3,1} then {2}.
Step 3 constructs the subsets in the partition by backtracking. The last step corresponds to {2},{}. Then 2 is replaced by 3 in one set and 1 in the other set: {3},{1}, then {4},{1,1}, then {4,5}, {1,6}, then {4,7,5}, {8,6}, where the sum-difference is indeed 2.
The runtime complexity of this algorithm is dominated by the step 1 (sorting), which takes O(n log n).
Note that this partition is not optimal: in the partition {8,7}, {6,5,4} the sum-difference is 0. However, there is evidence that it provides a "good" partition:
If the numbers are uniformly distributed in [0,1], then the expected difference between the two sums is . This also implies that the expected ratio between the maximum sum and the optimal maximum sum is .
When there are at most 4 items, LDM returns the optimal partition.
LDM always returns a partition in which the largest sum is at most 7/6 times the optimum. This is tight when there are 5 or more items.
On random instances, this approximate algorithm performs much better than greedy number partitioning. However, it is still bad for instances where the numbers are exponential in the size of the set.
Multi-way partitioning
For any k ≥ 2, the algorithm can be generalized in the following way.
Initially, for each number i in S, construct a k-tuple of subsets, in which one subset is {i} and the other k-1 subsets are empty.
In each iteration, select two k-tuples A and B in which the difference between the maximum and minimum sum is largest, and combine them in reverse order of sizes, i.e.: smallest subset in A with largest subset in B, second-smallest in A with second-largest in B, etc.
Proceed in this way until a single |
https://en.wikipedia.org/wiki/Verena%20Rieser | Verena Rieser (born 1979) is a German computer scientist specialising in natural-language generation, including conversational modelling as well as studies of how gender cues in synthetic language can trigger biases in the people who interact with them. She is a professor in the School of Mathematical and Computer Sciences at Heriot-Watt University in Edinburgh, where she directs the Natural Language Processing Laboratory.
Education and career
After beginning her university studies in literature, Rieser switched to linguistics, and earned a master's degree in applied linguistics and information science from the University of Regensburg in 2003. She earned a second master's degree in informatics from the University of Edinburgh in 2005, supervised by Johanna Moore, and completed a Ph.D. in computational linguistics at Saarland University in 2008.
After returning to the University of Edinburgh as a postdoctoral researcher, she became an assistant professor at Heriot-Watt University in 2011, and was promoted to Professor of Artificial Intelligence there in 2017.
In 2020 she became co-founder of a company, ALANA AI, for which she works part-time.
Book
With Oliver Lemon, Rieser is a coauthor of the book Reinforcement Learning for Adaptive Dialogue Systems: A Data-driven Methodology for Dialogue Management and Natural Language Generation (Springer, 2011)
References
External links
Home page
1979 births
Living people
German computer scientists
German women computer scientists
British computer scientists
British women computer scientists
Computational linguistics researchers
University of Regensburg alumni
Alumni of the University of Edinburgh
Saarland University alumni
Academics of Heriot-Watt University
Natural language processing researchers |
https://en.wikipedia.org/wiki/Hannibal%20%28network%29 | Hannibal was the name of a network of far-right prepper groups and individuals operating in Germany, Austria, and Switzerland, which coordinated via the chat service Telegram in anticipation of the government's collapse on what they dubbed "Tag X" ("Day X"). Founded in 2015, the network was subject to an investigation by German authorities in 2017, at which time its founder ordered the deletion of the chat groups. However, government investigations into members of groups affiliated with "Hannibal" are ongoing.
History
The name stems from the online handle of André Schmitt, a non-commissioned officer in the Kommando Spezialkräfte, who founded, administered, and coordinated the network beginning in autumn 2015. Schmitt supplied the network with confidential information about Germany's security situation. Some of the groups linked to the Hannibal network developed concrete plans for violent actions on "Day X", preparing safe houses, stockpiling arms and ammunition, and compiling lists of political enemies. Among the participants were army reservists, police officers, judges, members of SEK police tactical units, and other German security authorities. The German news media likened the group to Organisation Consul and similar nationalist cells within the Reichswehr that plotted to overthrow the Weimar Republic during the 1920s and called Hannibal a "shadow army". Schmitt stated in 2016 that the network had around 2,000 members in total.
The chat network was subdivided into four regional groups in Germany (north, south, west, and east), with the geographical division following the model of the former German . There were also separate groups for Switzerland and Austria.
Government investigation
According to its own statements, the Federal Office for the Protection of the Constitution already had knowledge of at least parts of the network at the end of 2016. Other German authorities started investigating "Hannibal" in 2017, in the course of an investigation into Franco Albrecht and the Day X plot. Albrecht, who is accused of having planned false flag attacks, had been a member of the network. Once Schmitt learned of the investigation, he immediately ordered the deletion of the chat groups. The investigations into the network have led to a number of police raids, including raids of places that Schmitt had mentioned as potential "safe houses" in the "Hannibal" chat groups. One of these raids uncovered explosives and components of explosives, stashed in a cellar that belongs to Schmitt's parents. Schmitt was tried and sentenced to a fine of 1800 Euros.
As of July 2020, investigations into a number of members of groups affiliated with "Hannibal" were still ongoing.
References
Right-wing terrorism
Far-right movements in Europe
Survivalism
Paramilitary organizations based in Europe |
https://en.wikipedia.org/wiki/Memory%20%28storage%20engine%29 | MEMORY is a storage engine for MySQL and MariaDB relational database management systems, developed by Oracle and MariaDB. Before the version 4.1 of MySQL it was called Heap.
The SHOW ENGINES command describes MEMORY as: Hash based, stored in memory, useful for temporary tables.
MEMORY writes table data in-memory. While the table structures are persisted on-disk, the rows in MEMORY tables are lost when MySQL stops.
Use cases
MEMORY is designed to store data that must be accessed quickly, for example caches, or intermediate data that needs to be transformed before storing it to regular tables.
In MariaDB and before MySQL 5.6, MEMORY was used for internal temporary tables, e.g. to materialize the intermediate results of a query. However, MEMORY tables don't support BLOB and TEXT types, and the user may limit the total size of MEMORY tables and temporary tables. When an internal temporary table could not be created with the MEMORY engine, it had to be created on disk, which is slower. For this reason Percona Server implemented improvements to MEMORY to support BLOB and TEXT.
In MySQL 8.0, by default the TempTable engine is used in place of MEMORY for internal temporary tables.
See also
Comparison of MySQL database engines
External links
The MEMORY Storage Engine in the MySQL documentation
MEMORY in the MariaDB KnowledgeBase
Database engines
MySQL
MariaDB
Oracle software |
https://en.wikipedia.org/wiki/Goods%20and%20Services%20Tax%20%28India%29%20Revenue%20Statistics | From 1 May 2018 onwards Ministry of Finance of Government of India started releasing monthly GST revenue collection data via official press release through Press Information Bureau. And to further improve transparency Government of India started issuing state-wise monthly collection data from 1 January 2020.
Revenue Collections
Monthly National Revenue Collections
Official Source
State-Wise Monthly Revenue Collections
States
Note: Below tables does not include GST on import of goods
Andhra Pradesh
Arunachal Pradesh
Assam
Bihar
Chhattisgarh
Goa
Gujarat
Haryana
Himachal Pradesh
Jharkhand
Karnataka
Kerala
Madhya Pradesh
Maharashtra
Manipur
Meghalaya
Mizoram
Nagaland
Odisha
Punjab
Rajasthan
Sikkim
Tamil Nadu
Telangana
Tripura
Uttar Pradesh
Uttarakhand
West Bengal
Union Territories
Note: Below tables does not include GST on import of goods
Andaman and Nicobar Islands
Chandigarh
Dadra and Nagar Haveli and Daman and Diu
Jammu and Kashmir
Ladakh
Lakshadweep
National Capital Territory of Delhi
Puducherry
Other Territory
Note: Below table does not include GST on import of goods
Center Jurisdiction
Note: Below table does not include GST on import of goods
Monthly GST Revenue Collections from Import
Returns
Around 38 lakh new taxpayers have registered under GST regime and the total count has crossed one crore if we include the 64 lakh earlier ones. Total number of taxpayers were above 1.14 crore in October 2018.
GSTR1 Filling Data
GSTR3B Filling Data
Official Source
See also
The Great Hedge of India, a historic colonial-era inland customs border
Goods and Services Tax (India)
Notes
References
External links
Central Board of Indirect Taxes and Customs
Goods and Services Tax Council
e-Way Bill System at ewaybill.nic.in. National Informatics Centre.
Taxation in India
India
Economic history of India (1947–present) |
https://en.wikipedia.org/wiki/Sons%20of%20Liberty%20%28video%20game%29 | Sons of Liberty is a computer wargame published by Strategic Simulations in 1987 for the Apple II, Atari 8-bit family, Commodore 64, and DOS.
Gameplay
Sons of Liberty is a game in which American Revolutionary War scenarios include Bunker Hill, Monmouth, and Saratoga.
Reception
Wyatt Lee reviewed the game for Computer Gaming World, and stated that "In summary, one must note that each release in the "American Civil War" series showed refinements over the previous game. SOL is no exception."
Reviews
The Games Machine - Jul, 1988
Computer Gaming World - Oct, 1990
Computer Play
References
External links
Review in Compute!
Review in ANALOG Computing
Article in Atari Interface
Review in Current Notes
Article in Computer Play
Review in Commodore Disk User
Review in RUN Magazine
1987 video games
Apple II games
Atari 8-bit family games
Commodore 64 games
Computer wargames
DOS games
Strategic Simulations games
Turn-based strategy video games
Video games about the American Revolution
Video games developed in the United States
Video games set in Massachusetts
Video games set in New Jersey
Video games set in New York (state) |
https://en.wikipedia.org/wiki/Multifit%20algorithm | The multifit algorithm is an algorithm for multiway number partitioning, originally developed for the problem of identical-machines scheduling. It was developed by Coffman, Garey and Johnson. Its novelty comes from the fact that it uses an algorithm for another famous problem - the bin packing problem - as a subroutine.
The algorithm
The input to the algorithm is a set S of numbers, and a parameter n. The required output is a partition of S into n subsets, such that the largest subset sum (also called the makespan) is as small as possible.
The algorithm uses as a subroutine, an algorithm called first-fit-decreasing bin packing (FFD). The FFD algorithm takes as input the same set S of numbers, and a bin-capacity c. It heuristically packs numbers into bins such that the sum of numbers in each bin is at most C, aiming to use as few bins as possible. Multifit runs FFD multiple times, each time with a different capacity C, until it finds some C such that FFD with capacity C packs S into at most n bins. To find it, it uses binary search as follows.
Let L := max ( sum(S) / n, max(S) ). Note, with bin-capacity smaller than L, every packing must use more than n bins.
Let U := max ( 2 sum(S) / n, max(S) ). Note, with bin-capacity at least U, FFD uses at most n bins. Proof: suppose by contradiction that some input si did not fit into any of the first n bins. Clearly this is possible only if i ≥ n+1. If si > C/2, then, since the inputs are ordered in descending order, the same inequality holds for all the first n+1 inputs in S. This means that sum(S) > (n+1)C/2 > n U/2, a contradiction to the definition of U. Otherwise, si ≤ C/2. So the sum of each of the first n bins is more than C/2. This again implies sum(S) > n C/2 > n U/2, contradiction.
Iterate k times (where k is a precision parameter):
Let C := (L+U)/2. Run FFD on S with capacity C.
If FFD needs at most n bins, then decrease U by letting U := C.
If FFD needs more than n bins, then increase L by letting L := C.
Finally, run FFD with capacity U. It is guaranteed to use at most n bins. Return the resulting scheduling.
Performance
Multifit is a constant-factor approximation algorithm. It always finds a partition in which the makespan is at most a constant factor larger than the optimal makespan. To find this constant, we must first analyze FFD. While the standard analysis of FFD considers approximation w.r.t. number of bins when the capacity is constant, here we need to analyze approximation w.r.t. capacity when the number of bins is constant. Formally, for every input size S and integer n, let be the smallest capacity such that S can be packed into n bins of this capacity. Note that is the value of the optimal solution to the original scheduling instance.
Let be the smallest real number such that, for every input S, FFD with capacity uses at most n bins.
Upper bounds
Coffman, Garey and Johnson prove the following upper bounds on :
for n = 2;
for n = 3;
for n = 4,5,6,7;
for |
https://en.wikipedia.org/wiki/The%20eSync%20Alliance | The eSync Alliance is a global automotive initiative established to build a secure, multi-vendor platform for end-to-end over-the-air (OTA) updating and data services for the connected car, with a global network of participating suppliers
History
In June 2017, Excelfore publicly announced it would work with several partner companies to form the eSync Alliance as an independent trade association. The aim of the eSync Alliance is to bring automakers, Tier-1 integrators, module and software suppliers into a mutually beneficial partnership to build eSync compliant solutions for the entire vehicle.
In February 2018, Excelfore announced that Rick Kreifeldt, industry executive and former founding chairman of AVNU, joined the eSync Alliance as Executive Director.
In August 2018, the eSync Alliance was incorporated as a non-profit consortium, with 5 founding member companies: Alpine, Excelfore, Hella, Molex and ZF. In September 2018 the eSync Alliance announced the election of officers and management for 2018/2019, and the formation of its first two working groups: Technical Working Group (TWG), and Marketing Working Group (MWG).
In April 2019, the eSync Alliance announced the release of Version 1.0 of the eSync Compliance Specifications. The specifications total nearly 400 pages and consist of Architecture, Requirements, Interfaces and Security.
In June 2019, the eSync Alliance joined the Connected Vehicle Trade Association (CVTA) as an Associate Member.
In June 2020, the eSync Alliance announced that Mike Gardner, Founder and President of mG Consulting, was appointed as Executive Director.
In March 2021, the eSync Alliance released v2.0 of the eSync Specifications for Automotive OTA, expanding the specifications in the areas of cyber security and data gathering.
In April 2021, the eSync Alliance and GENIVI Alliance, now COVESA, announced collaboration in the area of data standardization, as part of the Common Vehicle Interface Initiative (CVII) between GENIVI and W3C. (Note: GENIVI has since rebranded as COVESA - the Connected Vehicle Systems Alliance.)
In November 2021, the eSync Alliance and the Autoware Foundation announced a joint working group to address integration of OTA and data gathering into the software stack for the next generation of autonomous vehicles.
Software architecture
The eSync platform has components in the cloud and in the vehicle. The eSync Server is in the cloud, the eSync Client is in the vehicle and multiple eSync Agents for end devices are in the vehicle.
Structure
The five founding companies of the eSync Alliance each hold one seat on the Board of Directors. Additional board members may be elected by the membership during the Alliance annual general meeting. Current members of the alliance include Alpine, DSA, Excelfore, Faurecia, Hella, Joynext, Mobica, Molex, R Systems and ZF.
References
Mobile technology |
https://en.wikipedia.org/wiki/Protea%20cordata | Protea cordata (heart-leaf sugarbush; hartblaarsuikerbos (Afr.)) is a plant species native to Southern Africa that grows on woody soils or in the soil.
The red, bald-sheared trunk is unbranched and reaches a length of 500 mm. Brown, lance-shaped, scaly leaves appear at the base of the stem, and some stalkless, heart-shaped leaves zigzag along the tip, while others gradually shrink.
Small mammals and insects have been found to contribute to the reproduction and distribution of the Protea cordata, as it has been determined to be a self-incompatible species.
Brown dry paper bracts form a cup – shape that surrounds a cream – colored flower with red tip, with an orange-brown flower at the base of the flower. A new trunk grows from the woody subsoil, while the old one dies after one or two years and is finally blown away. Each reversed fruit contains a single seed and is covered by a thick layer of green, brown or orange-brown leaves, covered with a thin, white, upturned, yellow, green or yellowish orange fruit.
References
cordata |
https://en.wikipedia.org/wiki/Mikecrack | Miguel Bernal Montes (born 1993), better known online as Mikecrack, is a Spanish YouTuber, computer animator and singer known for his let's plays of video games, as well as his animations and musical parodies.
Biography and career
Having studied four years at Juan Tamariz's magician school, Bernal started a YouTube channel in 2009, where he would upload magic tricks. He later left that channel to study biomedical technology in university, where he graduated in 2015. While studying for a master's degree in February 2016, he uploaded his first video to a new YouTube channel focused on gaming content.
Bernal's channel mainly focuses on videos related to the video game Minecraft; he also uploads music parodies and animated videos. A prominent aspect of his videos is his on-screen persona named Mike, an animated dog character similar in likeness to Adventure Times Jake the Dog.
Bernal created a team called Los #CoMPas with Spanish YouTubers ElTrollino, Timba Vk and Sparta356. The team frequently recorded videos together.
In 2020, Forbes Spain named Bernal in their list of the top 100 influencers in Spain for the year.
In 2021, he passed 30 million subscribers and become the third channel in Spain by subscribers. He also created an original animated series named "Las Perrerías de Mike". On 30 July 2023, he became the most subscribed Spanish youtuber, overcaming Rubius.
Awards
References
1993 births
Music YouTubers
Spanish YouTubers
YouTube channels launched in 2009
Minecraft YouTubers
Gaming YouTubers
Living people
People from Madrid |
https://en.wikipedia.org/wiki/The%20Ascent%20%28video%20game%29 | The Ascent is a cyberpunk-themed action role-playing video game developed by Swedish indie game studio Neon Giant and published by Curve Digital for Microsoft Windows, Xbox Series X/S and Xbox One on 29 July 2021. It was developed using Unreal Engine 4 by a team of 12 people and is Neon Giant's debut in the industry. The game received positive reviews from critics upon its release, with praise for its visuals, combat, and soundtrack, but criticism for the emphasis on grinding.
Gameplay
The Ascent is presented from an isometric view overlooking the character(s). It is a twin-stick shooter. It includes the ability to aim both high and low on enemy targets, allowing the player to differentiate between shooting enemies closer or further away. This mechanic is key to the game's cover system, allowing the player to aim at enemies over the top of the props in the environment. The player can fully customize their character's appearance, and can augment their character with cyberware upgrades to get new skills and abilities. Players have an upgradeable cyberdeck device, which they can use to gain access or "hack" into previously locked areas and loot certain chests.
The game features a destructible environment that reacts to the player's actions, such as bullet impacts, skill powers and explosions. A fast travel system is implemented in the game via a built-in subway system and paid taxi, allowing the player to travel vast distances in-game quickly. It is an open world game that IGN described as having "essentially no loading screens". Defeating enemies allows the player to collect loot of various rarities. Items can be obtained by completing missions, exploring the world or purchasing them from vendors with in-game currency. The gameplay modes include single-player, local co-op and online co-op with a maximum of 4 players.
Premise
The game takes place within an arcology in a futuristic dystopian world known as Veles, controlled by a powerful megacorporation called "The Ascent Group". Players assume control of a worker enslaved by the company. After the mysterious collapse of The Ascent Group, the arcology descends into a chaotic free-for-all pitting districts, syndicates and rival corporations against each other for control. The player's role is to stop other factions from seizing control and uncover the mystery behind the demise of The Ascent Group.
Development
The Ascent is developed by Neon Giant, a team of 12 people. On 28 June 2018, it was announced that Epic Games had awarded Neon Giant one of 37 developers grants based on their work on an unannounced title set in a "brand new cyberpunk world". For which they received between $5,000 and $50,000 to help progress the project. In around May 2019, Neon Giant had struck a deal with Microsoft. Creative director Tor Frick said that they (Microsoft) were "immediately very excited" about what they had made in its early development stage. The game was developed using Unreal Engine 4.
The game's inspir |
https://en.wikipedia.org/wiki/Brandon%20Wales | Brandon D. Wales is an American national security official who served as the acting director of the Cybersecurity and Infrastructure Security Agency. Wales assumed office after President Donald Trump fired Chris Krebs, and previously served as first executive director of the agency.
Education
Wales earned a bachelor's degree from George Washington University and a Master of Arts degree from Paul H. Nitze School of Advanced International Studies at Johns Hopkins University.
Career
After serving as a national security advisor to Arizona Senator Jon Kyl, he joined the United States Department of Homeland Security in 2005, managing the Homeland Infrastructure Threat and Risk Analysis Center. From August 2017 to January 2019, he served as a senior counselor to then-Secretary Kirstjen Nielsen.
References
Living people
United States Department of Homeland Security officials
Year of birth missing (living people)
George Washington University alumni
Paul H. Nitze School of Advanced International Studies alumni
Trump administration personnel |
https://en.wikipedia.org/wiki/Pandlr | Pandlr is a Brazilian website and social networking service for discussion forums. The main forum, PAN, is destined for the LGBT community that discusses pop culture and the entertainment industry.
History
Pandlr emerged in 2005 as Jovem Pan community in Orkut, dedicated to Jovem Pan Radio. As the end of Orkut in 2014, the community was no longer using the name Jovem Pan and went through websites like Grupia, Yoble and VK, but only has received a own website in March 2015, which has moved on from being a general pop culture forum to become a social network, being renamed to Pandlr. The website became popular on the Brazilian internet for creating several memes in GIF format, like of the Brazilian singer Gretchen. In 2017, Pandlr gained Brazilian and international media attention after a forum member created several GIFs of the character Cuca, from the Brazilian television series Sítio do Picapau Amarelo, which went viral and became memes. The newspapers The South African and Highsnobiety considered the memes created in Pandlr as one of the bests of that year. In 2018, the forum became involved in a controversy with the rapper Azealia Banks, after Pandlr's Twitter profile declared that Banks "is very unprepared for the music industry, despite having talent". In February 2018, the forum gained more media attention when it spread a rumor that singer Selena Gomez would have been invited to perform at the Super Bowl halftime show in the following year.
See also
List of Internet forums
References
External links
Social networking services
LGBT-related Internet forums
Music Internet forums
Entertainment Internet forums
Internet properties established in 2015 |
https://en.wikipedia.org/wiki/Canyu | Canyu (), also known as Participation or Participation Network, is a United States-based rights protection and pro-democracy website, focusing on China's democracy movement, human rights situation, and commentary critical of the Chinese Communist Party.
Canyu.org was launched in 2005 and is maintained by the China Free Press. Due to the stand of the website, it received many cyberattacks made by hackers. In January 2014, Canyu issued a statement stating that the website had been funded by the National Endowment for Democracy from 2005 to September 30, 2012.
Hacked
In January 2010, Canyu was hit by DDoS attacks, which prevented access to the website and resulted in the violation and destruction of the background data. In December 2016, canyu.org was hacked again by DDoS attacks.
References
Human rights in China
American news websites
2005 establishments in the United States |
https://en.wikipedia.org/wiki/Wilco%20Nienaber | Wilco Nienaber (born 7 April 2000) is a South African professional golfer. He won the 2021 Dimension Data Pro-Am. He plays on the European Tour and is known for his long distance off the tee.
Amateur career
Nienaber won several amateur events in Africa and represented South Africa at the 2018 Eisenhower Trophy in Ireland, where he finished 3 under par individually. He made his European Tour debut as an amateur in December 2018 at the South African Open at Randpark Golf Club, north of Johannesburg, where he opened with two rounds of 69 to make the cut.
His best ranking on the World Amateur Golf Ranking was 28th.
Professional career
Nienaber turned professional in the middle of 2019. His European Tour debut as a professional was made in late November 2019 at the Alfred Dunhill Championship at Leopard Creek CC, Malelane, South Africa, where he finished tied 24th, earning €14,000.
In February 2020, also in his homeland of South Africa, he came close to his first professional win, finishing runner-up in the Limpopo Championship on the Challenge Tour.
In August 2020, Nienaber recorded his first top-10 on the European Tour; finishing 4th in the Hero Open at Forest of Arden CC, England.
In September 2020, 14 months after turning professional, Nienaber advanced to 270th on the Official World Golf Ranking. In the second round of the Joburg Open in November 2020 at Randpark Golf Club in Johannesburg, South Africa, Nienaber hit his drive on the 597-yard, par-5 4th hole a European Tour season record 439 yards. It was also 16 yards longer than the PGA Tour season record at the time. He eventually finished in second place; two shots behind Joachim B. Hansen, and reached a career best 209th on the Official World Golf Ranking.
In May 2021, Nienaber claimed his first professional victory at the Dimension Data Pro-Am. He beat Henric Sturehed in a playoff and advanced to 135th on the Official World Golf Ranking.
Amateur wins
2017 Northern Cape Amateur Open, Central Gauteng Open Stroke Play
2018 Free State Open, Western Province Amateur Strokeplay
2019 Gauteng North Open, South African Amateur Championship
Source:
Professional wins (1)
Sunshine Tour wins (1)
1Co-sanctioned by the Challenge Tour
Sunshine Tour playoff record (1–0)
Challenge Tour wins (1)
1Co-sanctioned by the Sunshine Tour
Challenge Tour playoff record (1–0)
Results in major championships
"T" = tied
Results in World Golf Championships
1Cancelled due to COVID-19 pandemic
NT = No tournament
Team appearances
Amateur
Eisenhower Trophy (representing South Africa): 2018
References
External links
South African male golfers
Sunshine Tour golfers
European Tour golfers
Sportspeople from Bloemfontein
2000 births
Living people |
https://en.wikipedia.org/wiki/Network%20for%20Greening%20the%20Financial%20System | The Network for Greening the Financial System (NGFS) is a network of 114 central banks and financial supervisors that aims to accelerate the scaling up of green finance and develop recommendations for central banks' role for climate change. The NGFS was created in 2017 and its secretariat is hosted by the Banque de France. Its current chair is Ravi Menon, Managing Director of the Monetary Authority of Singapore. The NGFS has been awarded best green initiative of the year 2020 by Centralbanking.com.
According to its charter, the purpose of the NGFS is "to define, promote and contribute to the development of best practices to be implemented within and outside of the Membership of the NGFS and to conduct or commission analytical work on green finance."
The NGFS was announced at the Paris “One Planet Summit” in December 2017. The network was launched by 8 founding central banks, under the leadership of Banque de France's governor François Villeroy de Galhau, the Dutch Central Bank's Frank Elderson and the Bank of England's former governor Mark Carney.
Work and activities
The NGFS organises events and research on climate change.
Recommendations for central banks and supervisory authorities
In 2021, the NGFS identified 9 policy options that could be chosen by central banks to align their monetary policy with climate objectives.
The NGFS work is currently organised around 4 workstreams (WS) and 2 task forces (TF):
WS “Supervision”, chaired by Mr Tolga Yalkin from the Office of the Superintendent of Financial Institutions
WS “Scenario Design and Analysis”, chaired by Mr Livio Stracca from the European Central Bank
WS “Monetary Policy”, chaired by Mr James Talbot from the Bank of England
WS “Net Zero for Central Banks”, co-chaired by Mr Paolo Angelini from the Bank of Italy and Ms Simone Robbers from the Reserve Bank of New Zealand
TF “Nature-Related Risks”, co-chaired by Ms Emmanuelle Assouan from the Bank of France and Ms Saskia de Vries from De Nederlandsche Bank
TF “Capacity Building and Training”, co-chaired by Ms Madelena Mohamed from the Central Bank of Malaysia and Mr Jeffery Yong from the Bank for International Settlements
Climate scenarios
In June 2020, the NGFS presented its climate scenarios as a common baseline for analysing climate risks to the economy and the financial system. Expanded and updated data were published in the two subsequent years. The scenarios are based on the three integrated assessment models REMIND-MAgPIE (Potsdam Institute for Climate Impact Research), GCAM (University of Maryland) and MESSAGEix-GLOBIOM (International Institute for Applied Systems Analysis). Their results were fed into the NiGEM model (National Institute of Economic and Social Research) to conduct further macroeconomic analyses on inflation or unemployment. In addition, climate data provided by Climate Analytics and the ETH Zurich are published.
The following six scenarios were examined: "Current Policies" considers only already imple |
https://en.wikipedia.org/wiki/South%20Asian%20Microform%20Project | The South Asian Microform Project, also known by South Asian Materials Project and SAMP is one of six programs headed by the Center for Research Libraries (CRL) Global network. SAMP preserves higher education material via microform, among other techniques.
Overview
SAMP is affiliated with the Association for Asian Studies. In 2019 SAMP partnered with JSTOR providing over 500,000 digitized pages freely available as of March 2020.
History
Early foundations of SAMP began in 1962 by academic scholars and librarians who felt the need to preserve physical material. These individuals formed the Inter-University Committee on South Asian Scholarly Resources at the University of Chicago, led by chairman Robert E. Frykenberg of the University of Wisconsin History Department. These individuals wanted to coordinate the filming and bibliographic control of these materials. Other earlier objects of SAMP included:
promote cooperative acquisition efforts;
begin a bibliographic survey of existing South Asian microfilm resources in the U.S.
maintain a master file and information clearinghouse for these resources;
assist scholars and librarians in locating filmed materials;
acquire a portable microfilm unit to be found in India to be used on a rental basis by U.S. scholars; and
publish a newsletter dealing with microfilm resources
CRL officially founded SAMP in 1967, focusing on materials from India, Pakistan, Bangladesh, Nepal, and Sri Lanka. They primarily specialized in collecting documents that were difficult to achieve, expensive, or of limited quantities. By the end of their first year, SAMP had gathered a total of thirteen items.
Members
CRL memberships are not required to take part in SAMP. Any institution or nonprofit organization that maintains a library can participate. Members are granted full access to the materials provided by the SAMP. The following is the current list of university members of the SAMP:
University of British Columbia
University of California, Berkeley
University of California, Los Angeles
Centre for Studies in Social Sciences, Calcutta
University of Chicago
Columbia University
Cornell University
Duke University
Emory University
Harvard University
University of Hawaii at Manoa
University of Illinois at Urbana-Champaign
Indiana University
University of Iowa
Kansas State University
Library of Congress
Madan Puraskar Pustakalaya
Michigan State University
University of Michigan
University of Minnesota-Twin Cities
University of Missouri-Columbia
Mushfiq Khwaja Library and Research Centre
New York Public Library
New York University
North Carolina State University
University of North Carolina at Chapel Hill
University of Notre Dame
Ohio State University
University of Pennsylvania
Princeton University
Roja Muthiah Research Library
Rutgers University
Stanford University
Syracuse University
University of Texas at Austin
University of Toronto
University of Virginia
Washington University
Univer |
https://en.wikipedia.org/wiki/Nida%20Allam | Nida Allam (born December 15, 1993) is an American politician, political activist, and data analyst. She currently serves on the Durham County Board of Commissioners, to which she was elected in 2020, making her the first Muslim woman to serve in public office in North Carolina. Allam is one of five women to serve on the Durham County Board of Commissioners; this is the first time the board has consisted entirely of women in its 139-year history.
Since 2018, Allam has served as the Chair of the Durham Mayor’s Council for Women. She was elected as the Third Vice-Chair of the North Carolina Democratic Party and served from 2017 to 2021, becoming the first Muslim to serve on the party’s executive board. On November 8, 2021, Allam announced that she would be seeking the Democratic Party's nomination for Congress in North Carolina's newly redrawn 4th Congressional District.
Early life and education
Allam was born on December 15, 1993, in Ottawa, Canada. She is the daughter of immigrants, her father is from India and her mother is from Pakistan. Allam has two older sisters. When she was five years old her family moved to Brier Creek, a suburb between Raleigh and Durham in North Carolina, after her father took a job with IBM at Research Triangle Park. When she was six years old the family moved to the nearby town of Cary. She became a naturalized United States citizen as a teenager. Her mother, Iffat Allam, served as the Chair of the Women's Committee at their mosque. Allam and her mother volunteered at local food banks and helped set up homes for single mothers and refugees in the Research Triangle. A devout Muslim, she did not begin wearing the hijab full-time until she was in eighth grade.
Allam graduated from Needham B. Broughton High School, a magnet school in downtown Raleigh, where she was a member of the varsity lacrosse team. As a high school student, she chaired the Triangle Health Fair, a Muslim student-led campaign to partner with local doctors, chiropractors, and dentists to provide free health care to low-income community members.
She graduated from North Carolina State University with a degree in sustainable materials and technology. While at university, she founded the NC State For Bernie Club and became Co-Chair of the Triangle For Bernie Club.
Political career
Allam was inspired to become politically involved after her best friend, Yusor Mohammad Abu-Salha, was one of the three people killed in the 2015 Chapel Hill shooting. She had been a bridesmaid at Abu-Salha's wedding that December. The Federal Bureau of Investigation and the United States Department of Justice also launched their own investigations into the shooting. Federal authorities could not find sufficient evidence to charge Hicks with a hate crime. Allam became involved in the grassroots movement and worked as a political director for U.S. Senator Bernie Sanders' 2016 presidential campaign, as well as an organizing director for Justice Cheri Beasley's campaign for |
https://en.wikipedia.org/wiki/Oppo%20Neo | The Oppo Neo is the first phone in Oppo's Neo series. The phone was sold in two colors: white and black, for a price of €160.
References
Oppo smartphones
Android (operating system) devices
Discontinued smartphones
Mobile phones with user-replaceable battery |
https://en.wikipedia.org/wiki/Bradley%20L.%20Pyburn | Bradley L. Pyburn is a United States Air Force major general who has served as the chief of staff of the United States Cyber Command since June 9, 2022. He previously served as the deputy commander of the Sixteenth Air Force.
In March 2022, Pyburn was reassigned as chief of staff of the United States Cyber Command. In May 2022, he was nominated for promotion to major general.
References
Living people
Year of birth missing (living people)
Place of birth missing (living people)
United States Air Force generals
Brigadier generals |
https://en.wikipedia.org/wiki/David%20W.%20Snoddy | David W. Snoddy is a United States Air Force major general who has served as the assistant deputy chief of staff for cyber effects operations of the U.S. Air Force. He previously served as the deputy director for current operations of the United States Cyber Command.
Military career
In 2022, Snoddy was promoted to major general and assigned as the assistant deputy chief of staff for cyber effects operations of the United States Air Force.
References
External links
Living people
Year of birth missing (living people)
Place of birth missing (living people)
United States Air Force generals
Brigadier generals |
https://en.wikipedia.org/wiki/Eric%20P.%20DeLange | Eric P. DeLange is a retired United States Air Force brigadier general who last served as director for cyberspace operations of the North American Aerospace Defense Command and United States Northern Command. He previously served as the director for cyberspace operations and warfighter communications of the United States Air Force. Prior to that, he was the senior executive officer of the Vice Chief of Staff of the Air Force. In April 2021, he was assigned to become director, cyberspace operations of the U.S. Northern Command, replacing Major General Angela M. Cadwell.
References
Living people
Year of birth missing (living people)
Place of birth missing (living people)
United States Air Force generals
Brigadier generals |
https://en.wikipedia.org/wiki/Aldo%20Brunacci | Don Aldo Brunacci (2 April 1913 – 2 February 2007) was the pastor of the San Rufino Cathedral.
During World War II, he was head of the Assisi network (along with the Bishop Giuseppe Placido Nicolini and Father Rufino Nikachi), who worked in order to save Jews.
Early life
Aldo was born on April 2, 1913, in Assisi to a family of artists. He studied at an elementary school in Assisi (named after Papa Jovana, the 23rd pope) and continued his studies in Rome.
Activity during WWII
In 1943, Italy surrendered to the Allies of World War II, and as a result, the Nazis conquered Italy from the north. They appointed Benito Mussolini to be governor, who enacted the Racial Laws of segregation. This led to several Jews and resistance movements against the government to escape from the Nazis to several cities, including Assisi. More than 4000 refugees (over 300 of them were Jews) escaped the Nazis and fled to Assisi. Giuseppe Nicolini, the bishop of the church in Assisi, was given a task by the Vatican to start a secret operation to help Jews by hiding them inside monasteries, in order to help them escape the Nazis and lead a normal life. He appointed Aldo to take charge of the operation, and gave him the task of arranging hiding spots in all the monasteries in the city. Aldo was in charge of organizing fake documents and hiding the Jews inside monasteries in monks’ clothes (some of the monasteries wouldn't allow people who weren't monks to enter).
The Assisi Network brought Jews to the San Quirico monastery in order to receive their fake documents. All of the documents, paperwork and their paraphernalia (usually books or holy books) were hidden in the Bishop Palace in Assisi. Don Aldo Brunacci would ride his bike from Assisi to Perugia to either give the Jews staying there their documents, or have them sign more fake documents. Aldo would leave at nighttime, arrive at the destination and stay with the Jews until morning came, when he would leave very early in order to get to Assisi in time for the lessons he was giving. Several times he would catch a ride with a trail of German vehicles, who did not know that he was sneaking fake documents into Assisi.
The Assisi Network had a lot of accomplices, and two of them were Luigi Brizi and his son, who owned a printing house in Assisi, in which they printed and forged the documents for the Jews. Gino Bartali (a motorcycle rider who was also recognized as a Righteous Among The Nations) was another persona who helped the operation, by delivering forged documents to Assisi on his motorcycle.
In 1943, Brunacci and the Assisi Network established two secret schools for the Jews who lived in Assisi, where they could get educated and study religion. The Church also made efforts to supply the Jews with their religious needs in addition to their basic needs. In 1943, before Yom Kippur (the holiest day to the Jews), the Nuns made the Jews final meal before a fast, decorated the monasteries and supplied kosher food.
At t |
https://en.wikipedia.org/wiki/126%20Artist-run%20Gallery | 126 Artist-run Gallery is an artist-run space located in Galway City, Ireland. It was founded in 2005 and "has built an international reputation for ambitious programming."
History
126 was founded in 2005 by artists Austin Ivers and Ben Geoghegan in the living room of their home in Galway. The gallery was named after the number of the house. The two aimed to create more exhibition opportunities in the city, and to highlight artists who had a connection to Galway. After 2 years, they curated a large "quality" survey show of contemporary Irish art in the Galway Art Centre in the autumn of 2006. After, in late 2006, the gallery moved to a white cube space in an industrial estate outside of Galway City showing the work of Benjamin de Burca for the Tulca Festival of Visual Arts.
In January 2007, it was re-constituted directly on the ethos of Catalyst Arts and the Transmission Gallery democratic, artist-run model – which have their origins in the Scottish New 57 Gallery. This included a membership and annual members show, a non-commercial orientation, a voluntary board, 2-year term limits on board members, and a requirement that board members not show their own work. "The new gallery aims to provide a venue for younger, emerging artists, thus fulfilling an obvious need" and was considered "tremendously innovative" by The Irish Times art critic Aidan Dunne. "126 is the radical departure from galleries, museums, kunsthalles, and art centres. This is a much more rarified offshoot of the world of Artist-run projects. It is derived from the model that came out of Edinburgh’s 57 Gallery."
In 2009, with its future in doubt, the gallery moved to Galway City centre near the docks. Since, the gallery has experienced several struggles for survival in its bids for consistent funding from both local authorities and the Arts Council of Ireland. It has moved 2 additional times, for a total of 5 locations in 15 years. Its most recent location also rents artist studio spaces.
126 has worked regularly with the Galway International Arts Festival, Tulca, and the Burren College of Art. As well as with the Royal Hibernian Academy, Catalyst Arts, ARTFarm, and National Women's Council of Ireland. It has come to be seen as a progressive example of an artist led project, while simultaneously providing important training for its voluntary board.
126 has shown many significant artists, organisations and presentations which is impressive for a small gallery in the west of Ireland. Some of those include: Aideen Barry, Vivienne Dick, Hank Willis Thomas, Rainer Ganahl, Niall De Buitlear, Jim Ricks, Kelly Richardson, Samara Halperin, Stephanie Syjuco, Ceara Conway, Diana Copperwhite, Sylvère Lotringer, Ormston House, Transmission Gallery, and Catalyst Arts.
Bibliography
Ricks, Jim (Editor), Artist-run democracy: sustaining a model, 15 years of 126 gallery, Eindhoven: Onomatopee, 2022. ISBN 9789493148734
Laws, Joanne, Footfall: Articulating the Value of Artist Led Organisatio |
https://en.wikipedia.org/wiki/Communication%20%28Armin%20van%20Buuren%20song%29 | "Communication" is an instrumental composition by Dutch DJ and producer Armin. It was initially released on 19 July 1999 as 12" vinyl in the Netherlands by Cyber Records. A vocal version of the track featuring Carmen Van Den Brakel was released the next year. The track is known as one of the favourite of Armin van Buuren's fanbase. The track reached a notable success in the United Kingdom. It is the first single from Armin's first studio album, 76.
Armin continued then to produce remixes of the track, including "Communication Part 3" released on 2 April 2007 which is the fourth single of Armin's compilation 10 Years.
Background and release
In an interview with Musikexpress, Armin explained that he produced the track alone for 2 days in his parents' house of Leiden. He declared that he was inspired by Speedy J's Ginger album.
Music video
An animated music video was realised for the track 12 years after its official release. It was published on 24 November 2009 by Armada Music's Youtube channel. It shows a robot in front of a conveyor belt fixing metal plates on the wall with Armin van Buuren's logo. Later the robots shares some data towards satellite dishes. At the end, the robot plays the UK CD single of "Communication".
Track listing
Netherlands - 12" - Cyber
"Communication" (Original Mix) – 9:35
"Communication" (Vincent de Moor Mix) – 7:25
Netherlands - CD - Combined Forces
"Communication" (Pronti & Kalmani Vocal Radio Edit) – 3:44
"Communication" (Pronti & Kalmani Instrumental Radio Edit) – 3:42
"Communication" (Original 12" Version) – 9:35
"Communication" (Vincent de Moor Remix) – 7:25
"Communication" (Quake Remix) - 8:45
"Communication" (Jon Vesta Remix) - 8:56
Europe - CD - Combined Forces
"Communication" (Pronti & Kalmani Vocal Radio Edit) – 3:44
"Communication" (Original Version) – 9:34
UK - 12" - AM PM
"Communication" (Original 12" Mix) – 6:44
"Communication" (Jon Vesta Remix) – 6:07
"Communication" (Quake Remake) - 6:59
UK - CD - AM PM
"Communication" (Radio Edit) – 3:28
"Communication" (Quake Radio Edit) – 2:38
"Communication" (Original 12" Mix) – 6:44
"Communication" (Quake Remake) – 6:59
"Communication Part 2" - Netherlands - 12" - Cyber
"Communication" (Armin van Buuren's Remake) – 9:35
"Communication" (Ben Liebrand Electromix) – 6:21
"Communication Part 3" - Netherlands - 12" & Digital download - Armind
"Communication Part 3" (Original Mix) – 8:29
"Communication Part 3" (Coldware Cold Remix) – 8:17
"Communication Part 3" (Remixes) - Netherlands- Digital download - Armind
"Communication Part 3" (John Askew Remix) – 7:06
"Communication Part 3" (James Dymond Remix) – 7:49
"Communication Part 3" (Tomas Heredia Remix) – 7:20
"Communication Part 3" (Faruk Sabanci Remix) – 6:30
"Communication Part 3" (John Askew Radio Edit) – 4:20
"Communication Part 3" (James Dymond Radio Edit) – 5:04
"Communication Part 3" (Faruk Sabanci Radio Edit) – 4:02
"Communication Part 3" (Tomas Heredia Radio Edi |
https://en.wikipedia.org/wiki/Kevin%20B.%20Kennedy | Kevin B. Kennedy is a United States Air Force lieutenant general who serves as commander of the Sixteenth Air Force. He previously served as the director for operations of the United States Cyber Command.
References
Living people
Lieutenant generals
Place of birth missing (living people)
Recipients of the Defense Superior Service Medal
Recipients of the Legion of Merit
United States Air Force generals
United States Air Force personnel of the War in Afghanistan (2001–2021)
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/Mediterranea%20Saving%20Humans | Mediterranea Saving Humans APS is a "civil society platform" making connections between existing networks and individuals and a "non governmental project". Though it is similar to the many NGOs operating in the Mediterranean it is not actually an NGO, it brings together heterogeneous organizations and individuals, secular and religious, social and cultural, unions and political, who have decided to take a stand against the deaths and the human rights violations committed daily in the Mediterranean Sea. It was founded in 2018 to keep watch of the situation in the Mediterranean sea and to save lives in difficulty after the majority of other NGOs were not able to act due the legal obstacles created by the Italian authorities. The group coordinates the search and rescue operations of the ships Mare Jonio and Alex which sail under the Italian flag. The project also has the support of the German association Sea-Watch and the Spanish Proactiva Open Arms. It has carried out several search and rescue operations in the Central Mediterranean Sea with the ship Mare Jonio. Recognition of the work of Mediterranea has come from Pope Francis.
Operations
May 2019
On 9 May 2019, the Mare Jonio and the Italian Coast Guard saved almost 66 people near the Libyan coast. Their boat had capsized in the sea and the Mare Jonio ship welcomed 30 people on board. The minister of the interior announced that neither ship had the permission to make the people land, but later they were authorized. The ship headed north, where it encountered the Italian authorities and was taken to Lampedusa. By order of the Internal ministry, on the night of the 10th the ship was seized and the crew were accused of aiding and abetting illegal immigration. The activists claimed they were undertaking research, and protested against a seizure. On 13 May the Attorney general of Agrigento rejected the preventive seizure for lack of evidence.
July 2019
On 5 July 2019, the ship Alex, a yacht with a sail which had initially just been tasked with accompanying the Mare Jonio, reached the waters off the coast of Lampedusa with fifty four people on board, picked up the previous day. As had happened previously with Sea-Watch 3, the authorities initially refused the request to enter. The Italian government refused to accept people in Lampedusa and referenced Malta, some 100 km away, as an alternative. The spokesperson for the organisation, Alessandra Sciurba, declared the journey to be too long and impossible for the passengers on 6 July 2019. In the afternoon of 6 July 2019, the captain Tommaso Stella entered the port of Lampedusa without permission. The ship was overloaded more than three times the amount agreed upon by the eleven members of the crew. From a maritime point of view, therefore, refusal was not an option.
August–September 2019
On 28 August the rescue ship Mare Jonio saved approximately 100 people from a refugee ship that was sinking. According to the survivors, 6 people, including chil |
https://en.wikipedia.org/wiki/Cerebras | Cerebras Systems Inc. is an American artificial intelligence company with offices in Sunnyvale, San Diego, Toronto, Tokyo and Bangalore. Cerebras builds computer systems for complex artificial intelligence deep learning applications.
History
Cerebras was founded in 2015 by Andrew Feldman, Gary Lauterbach, Michael James, Sean Lie and Jean-Philippe Fricker. These five founders worked together at SeaMicro, which was started in 2007 by Feldman and Lauterbach and was later sold to AMD in 2012 for $334 million.
On August 19, 2019, Cerebras announced its Wafer-Scale Engine (WSE).
In 2020, the company announced an office in Japan and partnership with Tokyo Electron Devices.
In April 2021, Cerebras announced the CS-2 based on the company's Wafer Scale Engine Two (WSE-2), which has 850,000 cores. In August 2021, the company announced its brain-scale technology that can run a neural network with over 120 trillion connections.
In August 2022, Cerebras was honored by the Computer History Museum in Mountain View, California. The museum added to its permanent collection and unveiled a new display featuring the WSE-2—the biggest computer chip made so far—marking an "epochal" achievement in the history of fabricating transistors as an integrated part.
In August 2022, Cerebras announced the opening of a new office in Bangalore, India.
Funding
Cerebras secured $27 million in series A funding led by Benchmark, Foundation Capital and Eclipse Ventures in May 2016. In December 2016, series B funding was led by Coatue Management, followed in January 2017 with series C funding led by VY Capital.
The company closed its series D round with $88 million, making the company a unicorn. Investors in this round included Altimeter, VY Capital, Coatue, Foundation Capital, Benchmark, and Eclipse, in November 2018. The following November, Cerebras closed its series E round with over $270 million for a valuation of $2.4 billion. In November 2021, Cerebras announced that it had raised an additional $250 million in Series F funding, valuing the company at over $4 billion. The Series F financing round was led by Alpha Wave Ventures and Abu Dhabi Growth Fund (ADG).
To date, the company has raised $720 million in financing.
Technology
The Cerebras Wafer Scale Engine (WSE) is a single, wafer-scale integrated circuit processor that includes compute, memory, and interconnect fabric. Scheduling uses a dataflow architecture.
The WSE-1 powers the Cerebras CS-1, the firm's first-generation AI computer. It is a 19-inch rack-mounted appliance designed for AI training and inference workloads in a datacenter. The CS-1 includes one WSE primary processor with 400,000 processing cores, and twelve 100 Gigabit Ethernet connections for data input/output. The WSE-1 has 1.2 trillion transistors, 400,000 compute cores and 18 gigabytes of memory.
In April 2021, Cerebras announced the CS-2 AI system based on the 2nd-generation Wafer Scale Engine (WSE-2), manufactured by the 7 nm process of Taiw |
https://en.wikipedia.org/wiki/MediSys%20Health%20Network | MediSys Health Network is a 1995-established healthcare service provider that also manages medical facilities. It is best known for operating Brookdale University Hospital and Medical Center (for 12 years), Jamaica Hospital Medical Center, and Flushing Hospital.
MediSys also operates a network of family health care clinics and home health agencies.
Overview
In addition to running hospitals, clinics and home health agencies, MediSys has entered—with a partner, the area of organ-procurement.
In 2001, MediSys was entrusted to take over operation of a facility for "350 people with mental illness" of whom 24 had been subjected to unnecessary but profitable surgeries. This success was followed by a similar takeover in 2002.
MediSys also operates Medisys Richmond Hill Family Center, an Urgent Care facility.
Trump Pavilion
MediSys operates "Trump Pavilion, a 228-bed nursing home located in the Jamaica Hospital Medical Center;" the latter is where Donald Trump was born. The nursing home "is named for and was financed by President Trump's mother." Mrs. Trump's family wrote that "contributions in memory of" her late husband "may be made to the Trump Pavilion."
Controversy
MediSys was investigated in 2010 regarding conflict of interest. In 2012, they were forced to drop their ownership/management of Brookdale. following Medisys's CEO and others having pleaded guilty to Federal charges. Money problems created friction between nurses and a facility managed by MediSys.
References
External links
MediSys website
Medical and health organizations based in New York City
American companies established in 1995 |
https://en.wikipedia.org/wiki/Tom%C3%A1s%20Lozano-P%C3%A9rez | Tomás Lozano-Pérez is a Cuban-American computer science professor at the Massachusetts Institute of Technology and member of MIT's Computer Science and Artificial Intelligence Laboratory. On the MIT faculty since 1981, he conducts research in robotics, motion planning and geometric algorithms, and their applications.
Awards and honors
2011 IEEE Robotics Pioneer Award
1985 Presidential Young Investigator Award
A Fellow of the Association for the Advancement of Artificial Intelligence, a Fellow of the Association for Computing Machinery (ACM), and a Fellow of the Institute of Electrical and Electronics Engineers
References
Fellows of the Association for Computing Machinery
Living people
Year of birth missing (living people)
MIT School of Engineering faculty
Massachusetts Institute of Technology alumni |
https://en.wikipedia.org/wiki/Long%20Lance%3A%20A%20Computer%20Game%20of%20Tactical%20Naval%20Combat%20in%20the%20South%20Pacific | Long Lance: A Computer Game of Tactical Naval Combat in the South Pacific is a 1987 video game published by Simulations Canada.
Gameplay
Long Lance is a game in which naval combat is simulated during World War II.
Reception
Johnny L. Wilson reviewed the game for Computer Gaming World, and stated that "Long Lance delivers exciting and challenging games without the graphics or sophisticated sound."
References
1987 video games
Apple II games
Atari ST games
Commodore 64 games
Computer wargames
Japan in non-Japanese culture
Pacific War video games
Simulations Canada video games
Turn-based strategy video games
Video games developed in Canada
Video games set in Oceania |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.