source stringlengths 32 199 | text stringlengths 26 3k |
|---|---|
https://en.wikipedia.org/wiki/Scientific%20Time%20Sharing%20Corporation | Scientific Time Sharing Corporation (STSC) was a pioneering timesharing and consulting service company which offered APL from its datacenter in Bethesda, MD to users in the United States and Europe.
History
Scientific Time Sharing Corporation (STSC) was formed in 1969 in Bethesda, Maryland by Dan Dyer, Burton C. Gray, and some of the people who originally implemented the programming language APL, notably Philip S. Abrams, Lawrence M. Breed, and Allen Rose. In 1970, STSC released APL*Plus, a version of the APL\360 language with many practical extensions oriented toward fostering business use of APL. Together with I. P. Sharp Associates, STSC made many enhancements to the APL language, including:
[]FMT formatting
[]VR and []FX, APL program reflection features
a file system to store APL variables outside of the APL environment
STSC continued to make enhancements to the interpreter, notably improving the performance of many of the primitive functions.
In 1985, Dan Dyer of STSC and Ian Sharp of I. P. Sharp Associates jointly received the Kenneth E. Iverson Award for Outstanding Contribution to APL.
In the early 1980s, the timesharing market began collapsing, mostly due to the appearance in the marketplace of relatively lower cost IBM mainframe computers, such as the IBM 4300. STSC quickly changed its focus to supply APL services for in-house and the rapidly developing personal computer (PC) market.
In 1982, STSC released APL*Plus/PC, which was a very successful APL interpreter for the IBM personal computer. In the mid 1980s, STSC developed the APL*Plus/Unix interpreter, a full 32-bit interpreter which was the basis of further APL development, notably APL*Plus/386, which was later available for Intel 386 class machines and higher. Arguably, the APL*Plus/386 interpreter fostered the exodus of APL applications from mainframe to PC environments, as the hardware and software were finally correctly matched to facilitate a straightforward migration of medium- to large-sized applications away from mainframes.
In the mid 1980s, STSC released an APL compiler for its APL*Plus add-on for the IBM VSAPL License Program Product. Along with language features designed to profile code execution, this compiler implementation was oriented toward replacing resource-consuming functions in place with compiled ones, leading to overall performance improvements.
By the mid 1990s, the APL*Plus/386 system had become one of the leading APL interpreters in the market, however it did not run under the then-new Microsoft Windows 3.1. Although there were some attempts at Windows interoperability, development on the APL*Plus/Win product began shortly before the APL products were sold to LEX2000. This latest Windows product is the basis for the current APLNow (formerly APL2000) interpreter product line.
Timeline
1969 – Scientific Time Sharing Corporation formed
1971 – APL Mailbox, also called 666 BOX, an early email system by Larry Breed and Francis Bates
1976 – STSC M |
https://en.wikipedia.org/wiki/Chris%20Kubasik | Christopher E. Kubasik is chair, and chief executive officer of L3Harris Technologies, a provider of global ISR, communications and networked systems, and electronic systems for military, homeland security and commercial aviation customers. In this position, he is responsible for leading the execution of L3Harris's strategic growth objectives.
Biography
Career
Kubasik joined L3 Technologies in October 2015. On July 19, 2017, the L3 Board elected Kubasik to the position of CEO and president, and to the Board of Directors effective January 1, 2018. When L3 merged with Harris Corporation in 2019 to form L3Harris Technologies, Kubasik was president and chief operating officer of the new company. He was appointed chief executive officer in June 2021 and was appointed as chair in June 2022.
Prior to joining L3, Kubasik was president and COO of Lockheed Martin Corporation. While in that role, an ethics investigation confirmed that Kubasik had a long-term extramarital affair with a subordinate employee, and on November 9, 2012, Bob Stevens, chairman and CEO, asked for and received Chris Kubasik's resignation.
Education
Kubasik earned his bachelor's degree (Magna Cum Laude) in accounting from the University of Maryland's School of Business in 1983. In 1997, he attended the Executive Program at Northwestern University’s Kellogg School of Management. In 2004, he completed the Systems Acquisition Management Course for Flag Officers at the Defense Acquisition University, Fort Belvoir. He is also a Certified Public Accountant.
References
Businesspeople in aviation
University of Maryland, College Park alumni
Kellogg School of Management alumni
Defense Acquisition University alumni
American business executives
American chief operating officers
Living people
Year of birth missing (living people)
L3Harris Technologies
Ernst & Young people |
https://en.wikipedia.org/wiki/Enterprise%20Architecture%20Body%20of%20Knowledge | The Enterprise Architecture Body of Knowledge (EABOK) is a guide to Enterprise Architecture produced by MITRE's Center for Innovative Computing and Informatics, and is substantially funded by US government agencies. It provides a critical review of enterprise architecture issues in the context of the needs of an organization. Because it provides a "big picture" view of needs and methods, some enterprise architecture practitioners recommend it as starting point for a business establishing an enterprise architecture unit.
Overview
The current printable version is marked DRAFT, dated 06-Feb-2004, and edited by Dr Paula J Hagan. It has been approved for public release; distribution unlimited. No updates have been made to any publicly released version of this document since 2004, and the project appears to have been abandoned.
Since the most recent publication, the extensions of DODAF, including MODAF, as well as the work at the Object Management Group, have created a model that satisfies both frameworks.
Perspective
EABOK (and the discipline it describes) is evolving (and partially incomplete). It places enterprise architecture in context. Because there are so many different frameworks and viewpoints about enterprise architecture, it provides a critique of alternatives (such as between the original Zachman Framework, TOGAF and DODAF). The bibliographies are particularly useful.
It treats Enterprise Architecture as not including merely diagrams and technical descriptions, but gives a holistic view that includes US legislative requirements and guidance, as well as giving technologists a better understanding of business needs with a quick explanation of the value chain for a business as outlined by Michael Porter.
It is worth reading between the lines of many sections, the comments make many experienced information systems and business professionals appreciate the EABOK: while it reviews a range of approaches, it is not frightened to put a personal point of view:
Another example of possible implied criticism of some EA practitioners:
While many of the references to legislation and guidance are US-centric, the issues and the references are useful to government agencies and businesses across the world.
See also
Enterprise architecture
References
External links
Enterprise Architecture Body of Knowledge (EABOK) home page.
2004 works
Enterprise architecture
Mitre Corporation
Bodies of knowledge |
https://en.wikipedia.org/wiki/CIFAL | The CIFAL Global Network is part of the United Nations Institute for Training and Research (UNITAR). The Network comprises 25 International Training Centres (CIFALs) and aims to serve as a platform for capacity-building of government authorities and civil society leaders on topics related to sustainable development, as well as on global mandates and goals of the United Nations. Since its inception in 2003, the Network has trained more than 60,000 beneficiaries through over 600 training and knowledge-sharing events (as of December 2015). It reached more than 10,000 beneficiaries from 75 countries in 2015.
The acronym CIFAL stands for "International Training Centre for Authorities and Leaders" () or in Spanish: ‘Centro Internacional de Formación para Autoridades y Lideres’). Each CIFAL Centre is a hub for capacity building and knowledge sharing between local and regional authorities, national governments, international organisations, the private sector, and civil society. It is an important resource in the United Nations long-term efforts towards the achievement of the Sustainable Development Goals.
Approach
The central purpose of CIFAL's training programmes is to develop and strengthen human capacities to better respond to development challenges. CIFAL Centres rely on a facilitative approach that aims to:
Facilitate the transfer of knowledge, experiences and best practices amongst government officials, private sector and civil society leaders
Enhance capabilities to effectively perform relevant tasks
Encourage cooperation and the development of multi-stakeholder partnerships
Provide networking opportunities leading to city-to-city collaboration
Contribute to the development of local and national strategies
Each of its learning and training activities present a variety of learning resources blending core content, assignments, tasks, assessments, peer-to-peer collaboration, interactive activities, and mentoring. Depending on the needs of the beneficiaries and the objectives of the training, activities are delivered in different formats: face-to-face, virtually, or blended, combining both.
Work
As of 2020, the CIFAL Global Network comprises 20 centres across Africa, Asia, Europe, Australia and the Americas. Each CIFAL provides innovative training on key areas related to sustainable development and serves as hubs for the exchange of knowledge amongst government officials, non-governmental and international organizations, the private sector, civil society, academic institutions and the UN system.
Each CIFAL is specialized in thematic areas that are defined by the needs and priorities of the regions they serve. The thematic areas include:
Urban Governance and Planning
Economic Development
Social Inclusion
Environmental Sustainability
Capacity for Agenda 2030 for Sustainable Development
The CIFAL Global Network also plays a key role in building capacity for the implementation of the Agenda 2030 for Sustainable Development.
Their trainin |
https://en.wikipedia.org/wiki/Kylie%20Gillies | Kylie Gillies (born 4 May 1967) is Australian television presenter for the Seven Network, based in Sydney, Australia. Gillies is the co-host of The Morning Show with Larry Emdur.
Career
Gillies was born in Tamworth and attended Tamworth High School. She started working as a researcher at radio station 2TM, then began working as a reporter, producer and news presenter for Prime Television for ten years. Her first role at Seven was an assistant producer on Seven's Late News with Anne Fulwood.
Prior to The Morning Show, Gillies was on Sportsworld as the sports news presenter. Gillies has also been a reporter for Seven's Australian Open Tennis coverage, providing the weather and the sports reports for each day of the Open.
In December 2006, Kylie was a regular presenter of the weekend sport report on Sydney's edition of Seven News. She has also been a fill in presenter on Sunrise, Weekend Sunrise, Seven Morning News, Seven 4.30 News, Today Tonight and Seven News in Sydney. In June 2007, Gillies began her role as co-host on The Morning Show with Larry Emdur, which airs after Sunrise
In June 2009, Kylie announced that she would take part in Dancing With The Stars. She finished in third place.
In 2010, Gillies received a Walkley Award for her contribution to journalism.
In April 2011, she presented reports for The Morning Show and Seven News live from London for the Royal Wedding of Prince William and Catherine Middleton.
In 2014, Gillies and her The Morning Show co-host Larry Emdur reported on the events of the 2014 Sydney hostage crisis before transferring transmission to the network's Melbourne Studios
Gillies celebrated 20 years with the Seven Network, and 10 years with co-host Emdur on The Morning Show in 2017.
Personal life
Gillies married journalist Tony Gillies in 1989 and they have two sons, Gus and Archie.
References
External links
Kylie Gillies profile on The Morning Show website
Australian television presenters
Australian television journalists
Australian women television presenters
Australian women journalists
People from Tamworth, New South Wales
1967 births
Living people |
https://en.wikipedia.org/wiki/Monique%20Wright | Monique Wright (born 18 May 1973) is an Australian journalist and television presenter.
Wright is currently co-host of Weekend Sunrise.
Career
Wright joined the Seven Network as a reporter in 1996 and has covered politics, human interest stories, celeb interviews, royal weddings and Olympic Games, including for Sunday Night.
In 2007, she was appointed weather presenter on the Seven Network's national breakfast program, Sunrise, replacing Grant Denyer. She remained in the role for a year before being replaced by meteorologist David Brown.
In June 2013, Wright was announced as a co-host of The Daily Edition. She remained with the show until 2015 and was replaced by Ryan Phelan.
From August 2013 to February 2014, Wright temporarily replaced Samantha Armytage as co-host on Weekend Sunrise and was officially appointed co-host in February 2014.
References
Living people
Australian television journalists
Seven News presenters
1973 births |
https://en.wikipedia.org/wiki/Obesity%20Canada | Obesity Canada - Obésité Canada (OC), formerly known as the Canadian Obesity Network - Réseau canadien en obésité (CON-RCO), is a Canadian charitable organization. It connects members of the public affected by obesity, researchers, health professionals and others with an interest in obesity.
History
The Canadian Obesity Network was launched as a not-for-profit organization in March 2006 at McMaster University, Hamilton, Ontario, with funding from the Networks of Centres of Excellence of Canada. In August 2007, the Canadian Obesity Network moved to the University of Alberta, Edmonton, Alberta.
In 2017, it registered as a charitable organization and in 2018 it officially changed its name from the Canadian Obesity Network to Obesity Canada.
Publications
Canadian Adult Obesity Clinical Practice Guidelines 2020
Report Card on Access to Obesity Treatment for Adults in Canada 2017
Best Weight: A Practical Guide to Office-Based Obesity Management (2010)
Report Card on Access to Obesity Treatment for Adults in Canada 2019
Local chapters, Students and New Professionals, and affiliate organizations
Local chapters
There are 12 local Obesity Canada chapters. Each chapter connects health professionals and members of the public for networking, learning, building partnerships, engaging in advocacy, and improving strategies to address, prevent, and treat obesity. Current chapters are located in Calgary, Gatineau-Ottawa, Halifax, Hamilton, Sudbury, Toronto, Vancouver, Edmonton, Moncton, Montreal, Winnipeg and Windsor.
Students and New-Professionals (OC-SNP)
The Obesity Canada - Students and New Professionals (OC-SNP) initiative was established in 2006, and is a forum for students and new professionals (within five years of their last degree) to connect across disciplines for the advancement of obesity education, research, treatment, and management.
It is composed of over 1,200 students in undergraduate, Master's, Doctoral and Postdoctoral programs, as well as new professionals in academia, industry, healthcare and government agencies in Canada.
OC-SNP holds chapters in nearly 20 post-secondary institutions across the country, which organize a variety of initiatives, including journal clubs, conferences, guest lectures, public outreach events, fundraisers, and physical activity/challenge events (National Pedometer Challenge).
Affiliate organizations
The Fund for Obesity Collaboration and Unified Strategies (FOCUS) initiative was launched by Obesity Canada, formerly known as the Canadian Obesity Network, with the goal of leveraging resources and expertise from Canadian leaders in research, business and the public sector to raise a minimum of $1.5 million annually toward funding research, education, and outreach initiatives.
Obesity Canada’s everyBODY Matters Collaborative is a multi-disciplinary partnership of weight bias and obesity stigma researchers. The goal of the collaborative is to raise awareness of the existence of weight bias and stigma in Ca |
https://en.wikipedia.org/wiki/Page%20Up%20and%20Page%20Down%20keys | The Page Up and Page Down keys (sometimes abbreviated as PgUp and PgDn) are two keys commonly found on computer keyboards.
The two keys are primarily used to scroll up or down in documents, but the scrolling distance varies between different applications. In word processors, for instance, they may jump by an emulated physical page or by a screen view that may show only part of one page or many pages at once depending on zoom factor. In cases when the document is shorter than the full screen, and often have no visible effect at all.
Operating systems differ as to whether the keys (pressed without modifier) simply move the view – e.g. in Mac OS X – or also the input caret – e.g. in Microsoft Windows. In right-to-left settings, will move either upwards or rightwards (instead of left) and will move down or leftwards (instead of right). The keys have been dubbed and , accordingly.
The arrow keys and the scroll wheel can also be used to scroll a document, although usually by smaller incremental distances. Used together with a modifier key, such as , , or a combination thereof, they may act the same as the Page keys.
In most operating systems, if the Page Up or Page Down key is pressed along with the key in editable text, all the text scrolled over will be highlighted.
In some applications, the and keys behave differently in caret navigation (toggled with the function key in Windows). For a claimed 30% of people, the paging keys move the text in the opposite direction to what they find natural, and software may contain settings to reverse the operation of these keys to accommodate that.
In August 2008, Microsoft received the US patent #7,415,666 for the functions of the two keys – Page Up & Page Down.
See also
Arrow keys
Scroll wheel
References
Computer keys |
https://en.wikipedia.org/wiki/Humanist%20%28electronic%20seminar%29 | Humanist is an international electronic seminar on humanities computing and the digital humanities, in the form of a long-running electronic mailing list and its associated archive. The primary aim of Humanist is to provide a forum for discussion of intellectual, scholarly, pedagogical, and social issues and for exchange of information among members.
Humanist is also a publication of the Alliance of Digital Humanities Organizations (ADHO) and the Office for Humanities Communication (OHC) and an affiliated publication of the American Council of Learned Societies (ACLS). In 2008, there were 1650 subscribers.
History
The Humanist list was created in 1987 by Willard McCarty, then at the University of Toronto, as a BITNET (NetNorth in Canada) electronic mail newsletter for people who support computing in the humanities for the Association for Literary and Linguistic Computing. McCarty, later at King's College London, continued to edit it.
Although Humanist started off as a means of communication for people directly involved in the support of humanities computing, it grew in scope to become an extended conversation about the nature of "humanities computing" (or "digital humanities", or one of a contested range of other names), about what computing looks like viewed from the humanities, and humanities from computing: "Humanist remains the forum within which the technology, informed by the concerns of humane learning, can be viewed from an interdisciplinary common ground."
As of 12 August 2020 the list went on hiatus for "a few weeks" for technical improvements. However, in February 2021 the list eventually moved to a new infrastructure, hosted at the University of Cologne, Germany.
References
External links
(from February 2021) at the Department for Digital Humanities of the University of Cologne, Germany
Old website (effective until August 2020) at King's College London, allied with Alliance of Digital Humanities Organizations (ADHO)
Office for Humanities Communication (OHC)
Digital humanities
Electronic mailing lists
Humanities education
Computer-related introductions in 1987 |
https://en.wikipedia.org/wiki/List%20of%20South%20of%20Nowhere%20episodes | This is a list of episodes for South of Nowhere. The series premiered on November 4, 2005 on Noggin's teen-targeted programming block, The N, and ended on December 12, 2008. 40 episodes of the series were produced in total.
Series overview
{| class="wikitable plainrowheaders" style="text-align:center;"
|-
! colspan="2" rowspan="2" |Season
! rowspan="2" |Episodes
! colspan="2" |Originally aired
|-
! First aired
! Last aired
|-
| bgcolor="38A969" |
| [[List of South of Nowhere episodes#Season 1: 2005–06|1]]
| 11
| November 4, 2005
| February 3, 2006
|-
| bgcolor="999999" |
| [[List of South of Nowhere episodes#Season 2: 2006|2]]
| 13
| September 29, 2006
| December 22, 2006
|-
| bgcolor="000000" |
| [[List of South of Nowhere episodes#Season 3: 2007–08|3]]
| 16
| August 10, 2007
| December 12, 2008
|}
Episodes
Season 1: 2005–06
The first season originally aired as part of The N, a teen block on the Noggin channel, in the United States from November 4, 2005 to February 3, 2006. The season consisted of 11 episodes, all of which aired on Friday nights.
Production
Thomas W. Lynch first had the idea for South of Nowhere when one of his close conservative friends told Lynch that his son had just come out to him. The man asked his son, "How do you know you're gay?" and the son responded, "How do you know you're straight?" When Lynch heard this, he says, he "knew there was a series in there about identity." He wondered why such a noteworthy event—an adolescent's coming out to their parents—had never before been explored as an ongoing subject on a television series. He "sat with the idea for a few days" and then wrote an outline of the show's pilot over a few weeks. In an effort to maintain authenticity in depicting teenage experiences, Lynch spoke to high school counselors and asked drama students at a Los Angeles high school for feedback. He pitched the series—which he was then calling "Out"—to The N executives Amy Friedman and Essie Chambers, who then commissioned him to write the pilot script.
Gabrielle Christian first auditioned for the role of Spencer (then called "Zooey") in July 2004, though Lynch also had her read for Ashley's part. Mandy Musgrave also auditioned for the role of Spencer, but Lynch liked her chemistry with Christian, so he paired the two up with Musgrave as Ashley. The pilot was first shot in October 2004 and directed by Rose Troche, but after the series was picked up by The N in January 2005, Lynch decided to recast many of the characters. He said that "I didn't pick [Christian] up right away, I had her keep re-auditioning. ... I [had] to make sure that this combination [was] perfect." Her contract was finally picked up in May 2005 and the pilot was re-filmed with the new cast in July. Filming took place in Los Angeles, with a correctional facility used largely as the high school set. Donna Deitch, who directed the second version of the pilot but no subsequent South of Nowhere episodes said that the pilot is "something I'm rea |
https://en.wikipedia.org/wiki/James%20Monaco | James F. Monaco (November 15, 1942 – November 25, 2019) was an American film critic, author, publisher, and educator.
Life and Work
Monaco founded Baseline in 1982, an early online database about the entertainment industry, and a forerunner of the IMDb. It was taken over by The New York Times Company in 2006. In 2011 the Times sold the company to Project Hollywood LLC, which is majority owned by entrepreneurs Laurie Silvers and Mitchell Rubenstein, who sold it to Gracenote in 2014 for a reported $50 million.
He has taught at The New School for Social Research, Columbia University, New York University, and the City University of New York. He was a media commentator for Morning Edition on NPR in the 1980s, and has written for The New York Times, The Village Voice, and The Christian Science Monitor.
He wrote several books, including The New Wave: Truffaut, Godard, Chabrol, Rohmer, Rivette (1976), How To Read A Film (1977, 1981, 1999, 2009) and American Film Now (1979). Monaco was also a contributing editor and writer to the Canadian film magazine, Take One, for many years.
He was the founder and president of UNET 2 Corporation, and he ran Harbor Electronic Publishing in New York and Sag Harbor. In 2012 he co-founded the Long Island Nature Organization, Inc., sponsors of the annual Long Island Natural History Conference.
Since 2001 In Germany a reputable student film award is named after James F. Monaco, "Der Goldene Monaco" or The Golden Monaco.
Every year the student award is handed over to the winners in a large Oscar like show in front of up to 1,600 students in the Siegerlandhalle, a large venue in the city of the University of Siegen, where the award was born.
James Monaco died of vascular disease on November 25, 2019.
Published works
The New Wave: Truffaut, Godard, Chabrol, Rohmer, Rivette. Oxford University Press, 1976
How to Read A Film: Movies, Media, and Beyond. Oxford University Press, 1977, 1981, 2000, 2009
Celebrity. Dell, 1978
Media Culture. Dell, 1978
Alain Resnais: The Role of Imagination. Oxford University Press, 1978
American Film Now: The People, The Power, The Money, The Movies. Oxford University Press, 1979. New York Zoetrope, updated edition 1984
Who's Who in American Film Now. New York Zoetrope, 1981, updated edition 1987
The French Revolutionary Calendar. New York Zoetrope, 1982.
The Connoisseur's Guide to the Movies. Facts on File Publications, 1985
The International Encyclopedia of Film. Putnam and Virgin, 1991
The Movie Guide. Putnam and Virgin, 1992, 1994
Cinemania: Interactive Movie Guide - DVD-ROM. (Contributor) Microsoft, 1992
The Dictionary of New Media. Harbor Electronic Publishing, 1999
How To Read a Film: Multimedia Edition. Harbor Electronic Publishing, 2000
References
External links
About James Monaco - readfilm.com
Background and Links
1942 births
American educators
Living people
American publishers (people)
20th-century American non-fiction writers |
https://en.wikipedia.org/wiki/Cryptographic%20Module%20Testing%20Laboratory | Cryptographic Module Testing Laboratory (CMTL) is an information technology (IT) computer security testing laboratory that is accredited to conduct cryptographic module evaluations for conformance to the FIPS 140-2 U.S. Government standard.
The National Institute of Standards and Technology (NIST) National Voluntary Laboratory Accreditation Program (NVLAP) accredits CMTLs to meet Cryptographic Module Validation Program (CMVP) standards and procedures.
This has been replaced by FIPS 140-2 and the Cryptographic Module Validation Program (CMVP).
CMTL requirements
These laboratories must meet the following requirements:
NIST Handbook 150, NVLAP Procedures and General Requirements
NIST Handbook 150-17 Information Technology Security Testing - Cryptographic Module Testing
NVLAP Specific Operations Checklist for Cryptographic Module Testing
FIPS 140-2 in relation to the Common Criteria
A CMTL can also be a Common Criteria (CC) Testing Laboratory (CCTL).
The CC and FIPS 140-2 are different in the abstractness and focus of evaluation. FIPS 140-2 testing is against a defined cryptographic module and provides a suite of conformance tests to four FIPS 140 security levels. FIPS 140-2 describes the requirements for cryptographic modules and includes such areas as physical security, key management, self tests, roles and services, etc. The standard was initially developed in 1994 - prior to the development of the CC. The CC is an evaluation against a Protection Profile (PP), or security target (ST). Typically, a PP covers a broad range of products.
A CC evaluation does not supersede or replace a validation to either FIPS 140-1,FIPS140-2 or FIPS 140-3. The four security levels in FIPS 140-1 and FIPS 140-2 do not map directly to specific CC EALs or to CC functional requirements. A CC certificate cannot be a substitute for a FIPS 140-1 or FIPS 140-2 certificate.
If the operational environment is a modifiable operational environment, the operating system requirements of the Common Criteria are applicable at FIPS Security Levels 2 and above.
FIPS 140-1 required evaluated operating systems that referenced the Trusted Computer System Evaluation Criteria (TCSEC) classes C2, B1 and B2. However, TCSEC is no longer in use and has been replaced by the Common Criteria. Consequently, FIPS 140-2 now references the Common Criteria.
FIPS 140-2 or FIPS 140-3 validation efforts can be in some parts reused in Common Criteria evaluations, specifically in areas related to entropy source and cryptographic algorithms.
External links
List of CMTLs from NIST
Computer security procedures
Tests
Cryptography |
https://en.wikipedia.org/wiki/The%20One%20Network | The One Network was the collective name for thirty-eight regional Independent Local Radio licences operated by GCap Media in the United Kingdom. It was formed from the combination of GWR Group's 'The Mix Network' and Capital Radio Group's 'The Capital Radio Network' when the companies merged in 2005. Its main regional radio network rival was the Big City Network, owned by Bauer Group.
It was announced in September 2008 that most of The One Network would be re-branded 'Heart', this being completed by June 2009 with seven retaining their name as a new Hit Music Network, and Power FM becoming Galaxy South Coast, as part of the Galaxy Network. The One Network was subsequently folded into the Heart Network or The Hit Music Network, both owned by Global, and programming aligned accordingly. In January 2011, the last remaining "heritage" radio stations owned by Global and operating as The Hit Music Network were merged with The Galaxy Network and rebranded under the Capital FM name becoming The Capital FM Network.
Only a handful of the original One Network stations in the English Midlands, sold to Orion Media, remained (see below) until they were merged to create Free Radio.
History
The origin of The One Network stemmed from the merger of GWR Group's The Mix Network and Capital Radio's Capital FM Network. On 1 August 2007 there was a change to the logo and sound of ex-Capital stations to harmonise with former GWR stations.
The One Network (previously 'The Mix Network') was created by GWR Group in attempt to create a national radio network on minimal cost by simulcasting the same programmes across all stations at off-peak times of day. All of GWR's networked stations used the same branding and presentation design, alongside similar slogans, initially "today's better music mix", later "today's best mix" and "the best mix of the 80s, 90s and today."
All centrally produced programming and playlists were broadcast from GWR FM Bristol (later Leicester Square, London at Capital FM's studios), and songs were broadcast simultaneously as neighbouring group stations, albeit with the exception of advertisements and local station identities/slogans, pre-recorded weather and brief social action or What's On inserts. Many avid listeners were disappointed by GWR's approach to networking programmes and reducing local content, but GWR felt that networking was the way forward and as a result, GWR gained much financial success, mainly due to the group's long held philosophy of heavily researching the average person's listening habits and tastes. Such practices were led by Group chairman Ralph Bernard, who oversaw the creation of the tightly formatted sound where popular Top 40 chart hits and ex-Top 40 songs are blended in with older hits. Despite the changes of schedule and management, the stations continued to be commercial market leader in the areas in which they operated. To increase the listener's perception of each station's local output, GWR came up with 'The B |
https://en.wikipedia.org/wiki/Rescue%20%281987%20video%20game%29 | Rescue is a computer game published by Mastertronic in 1987 for the ZX Spectrum. It was written by Ste Cork with music by Tiny Williams and graphics by Mark O'Neill.
Gameplay
The purpose of the game is to rescue the correct scientist and the "ultimate experiment". The player must then guide the scientists back to their spacecraft and refuel it before escaping.
The game generates the same maze layout each time it is played, however it randomises which scientist and which secret experiment (represented by a red test tube) is the correct one.
Enemies are spawned randomly and go around destroying the scientists, experiments, fuel and ammo caches, sometimes making it to your spaceship and destroying items you had already recovered.
Reception
In a 1987 review, Your Sinclair described the game as "nice graphics, easy to play but impossible to complete!" and awarded it 7 out of 10.
Rescue was placed at number 44 in the Your Sinclair Official Top 100, compiled by videogame journalist Stuart Campbell in the early 1990s.
References
External links
1987 video games
Action games
Mastertronic games
Maze games
Science fiction video games
Video games developed in the United Kingdom
ZX Spectrum games
ZX Spectrum-only games |
https://en.wikipedia.org/wiki/Chuq | Chuq or CHUQ may refer to:
Çük, a holiday that was celebrated by Tatars, Chuvash, and Udmurt peoples
CHUQ, an acronym for Centre hospitalier universitaire de Québec, a local hospital network in Quebec City, Canada |
https://en.wikipedia.org/wiki/List%20of%20ESPNU%20personalities | This is a list of several past and present personalities on the ESPNU network.
Current
Announcers, reporters and hosts
Dave Armstrong: (play-by-play, 2005–present) ESPNU College Football
Rece Davis: (host, 2005–present) Honor Roll
Mike Gleason: (host and play-by-play, 2005––present) SportsCenterU and ESPNU College Football Primetime
Clay Matvick: (host, reporter and play-by-play, 2006–present) ESPNU College Football and ESPNU College Basketball
Chris Spielman: (host, 2006–present) Summer House
Lisa Salters: (reporter, 2008–present) ESPNU reporter
Ian Darke: (play-by-play, 2010–present) ESPNU play-by-play
Joe Davis: (play-by-play, 2012–present) ESPNU play-by-play
Jaymee Sire: (reporter, 2013–present) ESPNU reporter
Mark Jones: (host, 2006–present) ESPNU host
Anish Shroff: (host, 2005–present) ESPNU host SportsCenterU
Carter Blackburn: (reporter, 2006–present) ESPNU reporter
Mike Crispino: (reporter, 2005–present) ESPNU reporter
Craig Custance: (reporter, 2012–present) ESPNU reporter
Bob Wischusen: (play-by-play, 2006–present) ESPNU play-by-play
College hockey
Barry Melrose: (analyst, 1993–present) ESPNU College Hockey
Colby Cohen: (analyst, 2016–present) ESPNU College Hockey
College football
Lee Corso: (analyst, 2003–present) ESPNU College Football
Mike Tomczak: (analyst, 2005–present) ESPNU College Football
Jay Walker: (analyst, 2005–present) ESPNU College Football Primetime
Todd McShay: (analyst, 2005–present) ESPNU Inside the Polls
Charles Arbuckle: (analyst, 2005–present) ESPNU College Football Primetime
David Diaz-Infante: (analyst, 2005–present) ESPNU College Football Primetime
Chris Martin: (analyst, 2006–present) ESPNU College Football Primetime
Brian Kinchen: (analyst, 2006) ESPNU College Football
Mike Adamle: (play-by-play, 2005–present) ESPNU College Football Primetime
Desmond Howard: (analyst, 2005–present) ESPNU College Football
College baseball
Mark Mulder: (analyst, 2011–present) ESPNU College Baseball
Tom Luginbill: (analyst, 2006–present) SportsCenterU and ESPNU Recruiting Insider and ESPNU College Baseball
John Kruk: (analyst, 2003–present) ESPNU College Baseball
Doug Glanville: (analyst, 2011–present) ESPNU College Baseball
College basketball
Jay Bilas: (analyst, 2003–present) ESPNU College Basketball
Dick Vitale: (analyst, 1985–present) ESPNU College Basketball
Digger Phelps: (analyst, 2000–present) ESPNU College Basketball
Jalen Rose: (analyst, 2007–present) ESPNU College Basketball
Andy Katz: (analyst, 2005–present) ESPNU College Basketball
Tim Legler: (analyst, 2003–present) ESPNU College Basketball
Jon Barry: (analyst, 2003–present) ESPNU College Basketball
Mark Adams: (analyst, 2003–present) ESPNU College Basketball
Tim Welsh: (analyst, 2003–present) ESPNU College Basketball
Adrian Branch: (analyst, 2006–present) ESPNU College Basketball
Former
Colin Cowherd: (host, 2008–2015) ESPNU Host
Mike Gottfried: (analyst, 2005–) ESPNU Inside the Polls and ESPNU College Basketball
Mike Hall: (host, 2005–2007) SportsCen |
https://en.wikipedia.org/wiki/Rapid%20Fire%20Theatre | Rapid Fire Theatre (RFT) is an improvisational theatre company based in Edmonton, Alberta, Canada.
History
The origins of the company stretch to 1981, when Edmonton's Theatre Network became the third company in the world to regularly produce Keith Johnstone's Theatresports. The Artistic Director of Theatre Network at the time, Stephen Heatley, brought the high-energy format to Edmonton, and eventually, performers from the show formed Rapid Fire Theatre, which officially became its own theatre company in 1988. Rapid Fire Theatre performed originally at the Phoenix Theatre in Downtown Edmonton until 1990 when it moved to The Chinook Theatre in Old Strathcona, which became the Varscona Theatre in 1994. Rapid Fire Theatre performed there until 2012, and was part of the Varscona Theatre Alliance, along with Teatro la Quindicina and Shadow Theatre. In September 2012, Rapid Fire Theatre moved back north of the river to Zeidler Hall at the Citadel Theatre complex, as announced by Maria Bamford. In 2013 Rapid Fire Theatre launched a capital campaign with the goal of building their own theatre.
Artistic Directors
Stephen Heatley (Theatre Network)
Jack Smith 1988–1991
Patti Stiles 1991–1995
Jacob Banigan 1995–2004
Chris Craddock 2005–2009
Kevin Gillese 2009–2010
Amy Shostak 2010–2015
Matt Schuurman 2015–Present
Shows
RFT currently produces two weekly shows: Theatresports and the long form improv show Chimprov. Some members of Rapid Fire Theatre have produced or performed in sketch comedy shows. Other shows previously produced by RFT over the years have included Gorilla Theatre, Catch 23 and The 11:02 Show, as well as main stage productions like "On Being a Peon" and "The Critic", penned by RFT member Chris Craddock, as well as collaborative projects like “Fairytales Scratched” (Kevin Gillese & Arlen Konopaki), “A Watched Pot Never Boyles” (Amy Shostak & Arlen Konopaki), and “Kiss My Bus” (Amy Shostak, Kirsten Rasmussen, and Clarice Eckford). In 2011, Rapid Fire Theatre marked the 30th season of Theatresports in Edmonton with an Alumni Weekend.
Improvaganza
RFT also hosts an annual international improvisation festival, Improvaganza, which brings improv artists from across the world together every June. The festival is partially funded by the Government of Canada.
Guests
Past guest artists at Improvaganza have included The Sunday Service, CRUMBS, Picnicface, The Pajama Men, Maria Bamford, Convoy (Upright Citizens Brigade), Neil Hamburger, Standards and Practices, Showstopper! The Improvised Musical, Moshe Kasher, Doppelganger, La Gata, The School of Night, Det Andre Teatret, Et Compagnie, Mantown, Dad's Garage Theatre Company, Die Gorillas, Iron Cobra, Loose Moose Theatre, Teater Narobov and Unexpected Productions.
Musical Guests
Musical guests have included The Magnificent Sevens, Gift of Gab, Mass Choir, Christian Hansen & The Autistics, The Famines, Doug Hoyer, Rah Rah, The Joe, Mikey Maybe, and Mitchmatic.
Awards
Rapid Fire Theatre ha |
https://en.wikipedia.org/wiki/Object-based%20spatial%20database | An object-based spatial database is a spatial database that stores the location as objects. The object-based spatial model treats the world as surface littered with recognizable objects (e.g. cities, rivers), which exist independent of their locations.
Objects can be simple as polygons and lines, or be more complex to represent cities.
While a field-based data model sees the world as a continuous surface over which features (e.g. elevation) vary, using an object-based spatial database, it is easier to store additional attributes with the objects, such as direction, speed, etc. Using these attributes can make it easier to answer queries like "find all tanks whose speed is 10 km and oriented to north". Or "find all enemy tanks in a certain region".
Storing attributes with objects can provide better result presentation and improved manipulation capabilities in a more efficient way. In a field-based data model, this information is usually stored at different layers and it is harder to extract different information from various layers. This data model can be applied above the ER as in GERM model and GISER.
S.Shekhar introduces direction as a spatial object and presents a solution to object-direction-based queries.
Data model representation
The most common representations for the data model follow.
PostGIS
An open-source software program that adds support for geographic objects to the PostgreSQL object–relational database. PostGIS follows the Simple Features for SQL specification from the Open Geospatial Consortium.
OMT-G
Provides a UML representation for geographic applications, it can represent the concept of field, object and provides a way to differentiate between spatial relation and simple association.
Entity–Relationship
GraphDB
Represents a framework of objects as classes that are partitioned into three kinds of classes: simple classes, link classes, and path classes. Objects of a simple class are on the one hand just like objects in other models. They have an object type and an object identity and can have attributes whose values are either of a data type (e.g. integer, string) or of an object type (that is, an attribute may contain a reference to another object). So the structure of an object is basically that of a tuple or record. On the other hand, objects of a simple class are nodes of the database graph – the whole database can also be viewed as a single graph. Objects of a link class are like objects of a simple class but additionally contain two distinguished references to source and target objects (belonging to simple classes), which makes them edges of the database graph. Finally, an object of a path class is like an object of a simple class, but contains additionally a list of references to node and edge objects which form a path over the database graph.
GEIS
Represent a data model to store geographic information on top of EER model, GEIS define the input data model and provide the following for data model
Geometry. In the |
https://en.wikipedia.org/wiki/Watermarking%20attack | In cryptography, a watermarking attack is an attack on disk encryption methods where the presence of a specially crafted piece of data can be detected by an attacker without knowing the encryption key.
Problem description
Disk encryption suites generally operate on data in 512-byte sectors which are individually encrypted and decrypted. These 512-byte sectors alone can use any block cipher mode of operation (typically CBC), but since arbitrary sectors in the middle of the disk need to be accessible individually, they cannot depend on the contents of their preceding/succeeding sectors. Thus, with CBC, each sector has to have its own initialization vector (IV). If these IVs are predictable by an attacker (and the filesystem reliably starts file content at the same offset to the start of each sector, and files are likely to be largely contiguous), then there is a chosen plaintext attack which can reveal the existence of encrypted data.
The problem is analogous to that of using block ciphers in the electronic codebook (ECB) mode, but instead of whole blocks, only the first block in different sectors are identical. The problem can be relatively easily eliminated by making the IVs unpredictable with, for example, ESSIV.
Alternatively, one can use modes of operation specifically designed for disk encryption (see disk encryption theory). This weakness affected many disk encryption programs, including older versions of BestCrypt as well as the now-deprecated cryptoloop.
To carry out the attack, a specially crafted plaintext file is created for encryption in the system under attack, to "NOP-out" the IV
such that the first ciphertext block in two or more sectors is identical. This requires that the input to the cipher (plaintext, , XOR initialisation vector, ) for each block must be the same; i.e., . Thus, we must choose plaintexts, such that .
The ciphertext block patterns generated in this way give away the existence of the file, without any need for the disk to be decrypted first.
See also
Disk encryption theory
Initialization vector
Block cipher modes of operation
Watermark
References
Cryptographic attacks
Disk encryption |
https://en.wikipedia.org/wiki/Box%20Upfront | Box Upfront was a British music video television channel owned by The Box Plus Network. It launched on 3 July 2012 as Heat and was originally based on the magazine of the same name. The channel replaced Q.
The channel featured daily celebrity gossip show Heat's Huge News, as well as a 60-minute programme rounding up weeks stories, titled Heat's Huge Week of News, which was produced by ITN. In addition, ITN Productions co-produced celebrity documentary series Real Stories with Box Television. Heat also featured The Heat-Ometer, its pick of the 20 biggest music videos narrated by Heat editor, Lucie Cave.
Box Upfront broadcast current and future mainstream pop music videos 24/7.
On 2 April 2013, all Box Television channels went free-to-air on satellite, apart from 4Music which went free-to-view. As a result, the channels were removed from the Sky EPG in Ireland. However, Heat launched on Freesat on 29 April 2013, alongside Magic, following the addition of four other Box Television channels on 15 April.
On 25 May 2016, the channel was rebranded as Box Upfront.
On 1 November 2019, the channel temporarily rebranded as a Christmas music channel called BoXmas, a role also occupied by sister channel Magic (albeit not temporarily rebranded). As the impending shutdown was announced during the rebrand, the channel kept the BoXmas branding, but shifted to a playlist similar to Box Hits on 26 December. Box Upfront ceased to broadcast on 9 January 2020, signing off with a block of departure-themed songs; "Goodbyes" by Post Malone featuring Young Thug, "Bye Bye Bye" by NSYNC, and "Goodbye" by Spice Girls were the last videos played before it ended operations. The channel space then transitioned to a slide stating that BoXmas was "taking a break" and would be back for the next holiday season (though obviously on a different channel), and redirecting viewers to its sister channels. In October 2020, The Box temporarily rebranded as BoXmas, thus making that channel the new home of BoXmas.
See also
Heat (magazine)
Heat Radio
References
External links
2012 establishments in the United Kingdom
2020 disestablishments in the United Kingdom
Channel 4 television channels
Defunct television channels in the United Kingdom
Music video networks in the United Kingdom
Television channels and stations established in 2012
Television channels and stations disestablished in 2020 |
https://en.wikipedia.org/wiki/TVS%20%28Russia%29 | TVS Television () was a private Russian television network which was shut down by the Press Ministry of Russia on June 22, 2003.
Creation
On January 11, 2002, a separate Russian television channel, TV-6 lost a court battle over bankruptcy and was placed into liquidation by a unanimous decision of thirteen judges of the Russian Supreme Arbitration Court.
At midnight on January 22, 2002 the Press Ministry pulled TV-6 off the air. The frequency was temporarily filled with programming from the NTV Plus Sports satellite channel. The auction for TV-6's old frequency took place on March 27, 2002. The Media-Sotsium partnership won the frequency auction, becoming the licensee and broadcaster, with the employees of the former channel TV-6 forming much of the production staff.
On June 1, 2002 TVS began broadcasting. On July 22, 2002 the Moscow Arbitration Court ruled that MNVK was taken off the air unlawfully.
Editorial policy
Many Russians and foreigners consider TVS' editorial policy to be critical towards the government of Vladimir Putin and Mikhail Kasyanov. It was considered to be the last channel with completely independent editorial policy.
Closure
Suffering from low ratings (the main channel projects, Dengi series and reality show Za steklom 3: Teper ty v armii failed) and poor advertising revenue, TVS had many financial problems. TVS's debt to Vneshekonombank (the Bank for Foreign Economic Activity) came to about US$100 million. TVS also owed more than $6 million in back pay to employees, who had not been paid for some three months.
Mostelekom (the city-owned cable operator that carried TVS in Moscow) began switching TVS' signal off Moscow's cable television networks on June 2, 2003, which rendered more than 90% of Moscow residents unable to view it. Mostelekom demanded that the TV company's shareholders pay off arrears of RUB 245,672m ($8 million).
On June 17, 2003 TVS editor-in-chief Evgeny Kiselyov announced that lack of funding had made it impossible for the company to continue operating, and that after June 23 the channel suspended broadcasting.
Stating it was "for viewers' benefit" the Ministry of Press switched off all TVS broadcasts on June 22, 2003 – 24 hours before the shutdown planned by station management was to happen. Like the closure of TV-6 the year before, the regularly scheduled programming was suddenly interrupted by a brief announcement that the channel was "taken off the air" before switching to a testcard. It was widely speculated in the press that such a hurried closure was performed to prevent the final broadcast of Evgeny Kiselyov's "Itogi" show, the only remaining opposition political broadcast at the time. Later MNVK allowed the state all-sports channel to broadcast on the vacant channel 6.
At the same time, former TVS employees moved to work on other TV channels, both national and regional or international (Channel One, VGTRK - Russia, Kultura, Sport and Vesti, TV Center "," The third channel "," The fifth cha |
https://en.wikipedia.org/wiki/Semantic%20interoperability | Semantic interoperability is the ability of computer systems to exchange data with unambiguous, shared meaning. Semantic interoperability is a requirement to enable machine computable logic, inferencing, knowledge discovery, and data federation between information systems.
Semantic interoperability is therefore concerned not just with the packaging of data (syntax), but the simultaneous transmission of the meaning with the data (semantics). This is accomplished by adding data about the data (metadata), linking each data element to a controlled, shared vocabulary. The meaning of the data is transmitted with the data itself, in one self-describing "information package" that is independent of any information system. It is this shared vocabulary, and its associated links to an ontology, which provides the foundation and capability of machine interpretation, inference, and logic.
Syntactic interoperability (see below) is a prerequisite for semantic interoperability. Syntactic interoperability refers to the packaging and transmission mechanisms for data. In healthcare, HL7 has been in use for over thirty years (which predates the internet and web technology), and uses the pipe character (|) as a data delimiter. The current internet standard for document markup is XML, which uses "< >" as a data delimiter. The data delimiters convey no meaning to the data other than to structure the data. Without a data dictionary to translate the contents of the delimiters, the data remains meaningless. While there are many attempts at creating data dictionaries and information models to associate with these data packaging mechanisms, none have been practical to implement. This has only perpetuated the ongoing "babelization" of data and inability to exchange data with meaning.
Since the introduction of the Semantic Web concept by Tim Berners-Lee in 1999, there has been growing interest and application of the W3C (World Wide Web Consortium) standards to provide web-scale semantic data exchange, federation, and inferencing capabilities.
Semantic as a function of syntactic interoperability
Syntactic interoperability, provided by for instance XML or the SQL standards, is a pre-requisite to semantic. It involves a common data format and common protocol to structure any data so that the manner of processing the information will be interpretable from the structure. It also allows detection of syntactic errors, thus allowing receiving systems to request resending of any message that appears to be garbled or incomplete. No semantic communication is possible if the syntax is garbled or unable to represent the data. However, information represented in one syntax may in some cases be accurately translated into a different syntax. Where accurate translation of syntaxes is possible, systems using different syntaxes may also interoperate accurately. In some cases, the ability to accurately translate information among systems using different syntaxes may be limited to one direct |
https://en.wikipedia.org/wiki/WDMA | WDMA may refer to:
WDMA (computer), transfer mode between a harddisk and computer
Wavelength-division multiple access, used in optical communication links
WDMA-CD, a television station (channel 16, virtual channel 31) licensed to Macon, Georgia, United States |
https://en.wikipedia.org/wiki/Camp%20Midnite | Camp Midnite is a Friday late night, ninety-minute variety/talk show on the USA Network in 1989. Its twenty-six episodes were hosted by Dick Wilson, a radio personality from Kansas City, Missouri (not to be confused with Dick Wilson, the actor who played "Mr. Whipple" in commercials).
The show featured skits that were done by cast members Tony Forkush and Caroline Schlitt. They did such take offs on television shows like "The Love Connection" and "Gilligan's Island," as well as celebrities Michael Jackson and Dustin Hoffman in "Singing in the Rainman".
The series was produced by Dick Clark Productions and its music provided by Scooter Pietsch.
Format
The show was set to look like it took place on the backstage side of another TV show, and generally had an intentionally "cheap" feel meant to distinguish it from equivalent programs. There was a coffee maker behind the host and members of the audience were encouraged to get up in the middle of the show and get themselves a cup of coffee. Guests on the show were encouraged to sign a styrofoam cup and bite the cup to leave a dental record for future identification if needed. The cups of all guests where displayed on the wall behind the host. Each show included calling a local L.A. restaurant and ordering food for the audience members. Dick Clark appeared on the first show and took a pie in the face from the host.
Production
The show's writers included Tim Conway Jr., Warren Bell, David Hirsch, Tim Maile, and Gary Basmajian. The production coordinator was Mark Walberg.
The producers were Dick Clark and Larry Klein.
Broadcast history
Camp Midnite premiered on January 6, 1989, and was one of two respective shows that replaced Night Flight on Fridays and Saturdays; USA Up All Night starring Gilbert Gottfried was the other. After Camp Midnite ended its run about half-way through 1989, cast member Caroline Schlitt was given her own Friday night edition of USA Up All Night, before she was ultimately replaced by Rhonda Shear a year and a half later in January 1991; Up All Night lasted until 1998.
References
External links
Archive.org
Caroline Schlitt
1989 American television series debuts
1989 American television series endings
1980s American television talk shows
1980s American sketch comedy television series
1980s American variety television series
USA Network original programming
Television series by Dick Clark Productions
Television series by Universal Television |
https://en.wikipedia.org/wiki/Family%20Challenge | Family Challenge is an American game show that aired on The Family Channel from October 2, 1995 to September 7, 1997, lasting for two seasons. Reruns aired on Game Show Network from April 3 to September 25, 1999.
The show was created by comedian Dave Thomas and veteran television producer Woody Fraser, and was originally produced as a pilot for ABC. Thomas and Fraser were executive producers on the show for its entire run.
Personnel
Ray Combs and Gene Wood
The first season of Family Challenge was hosted by former Family Feud host Ray Combs, with veteran game show announcer Gene Wood (who announced on Family Feud during both its original and first revival run, including during Combs' tenure in the latter) serving in that position here. Combs was in the midst of a series of physical and emotional injuries that resulted in a significantly large accumulation of debt, foreclosures, chronic pain, and a divorce at the time he hosted Family Challenge, and the new series had given Combs a renewed sense of optimism about his career prospects after his dismissal from Feud. After the first season was completed, Combs eventually made two attempts at suicide. The latter of the two attempts was successful, as Combs hanged himself in a closet at a Glendale, California hospital on June 2, 1996. This was Wood's final permanent game show role.
Michael Burger and Charlie Glaize
When the show returned for a second season, the name was changed to The New Family Challenge. Michael Burger, who had just joined The Family Channel as a co-host for Home & Family after Chuck Woolery left the show, took over for Combs as host. To replace Wood as announcer, the show chose voice actor Charlie Glaize to fill the role.
Premise
Two teams of six family members competed. Each team usually consisted of two adults and four children (commonly the parents' own children, plus nieces and/or nephews). Usually six stunts were played, and each stunt was worth a varying number of points. The stunts varied in each show; the following are a few stunts used on the show during the first season.
Stunts
Tug of war: All six members of the first team competed against American Gladiator Hawk, with a tank full of green "gunk" set up at the center point. The team won one point for each second they could stay up. They won 60 points if they stayed up for 30 seconds or pulled Hawk into the gunk. This process would be repeated for the second team.
Backwards relay race: Three members of each team competed. The first team started at a table with various items on it. The first teammate ran backwards to a board and read a short message written backwards on it, which corresponded to an item on the table. He then ran backwards to the starting position and do something with the item. (For example, "This Icy Sensation Causes A Gyration" means they must pour a pitcher of water down their pants, and "Simple Simon Met A Pie Man" means they must smosh a pie into their face.) This continued until all th |
https://en.wikipedia.org/wiki/Heuristic%20analysis | Heuristic analysis is a method employed by many computer antivirus programs designed to detect previously unknown computer viruses, as well as new variants of viruses already in the "wild".
Heuristic analysis is an expert based analysis that determines the susceptibility of a system towards particular threat/risk using various decision rules or weighing methods. MultiCriteria analysis (MCA) is one of the means of weighing. This method differs from statistical analysis, which bases itself on the available data/statistics.
Operation
Most antivirus programs that utilize heuristic analysis perform this function by executing the programming commands of a questionable program or script within a specialized virtual machine, thereby allowing the anti-virus program to internally simulate what would happen if the suspicious file were to be executed while keeping the suspicious code isolated from the real-world machine. It then analyzes the commands as they are performed, monitoring for common viral activities such as replication, file overwrites, and attempts to hide the existence of the suspicious file. If one or more virus-like actions are detected, the suspicious file is flagged as a potential virus, and the user alerted.
Another common method of heuristic analysis is for the anti-virus program to decompile the suspicious program, then analyze the machine code contained within. The source code of the suspicious file is compared to the source code of known viruses and virus-like activities. If a certain percentage of the source code matches with the code of known viruses or virus-like activities, the file is flagged, and the user alerted.
Effectiveness
Heuristic analysis is capable of detecting many previously unknown viruses and new variants of current viruses. However, heuristic analysis operates on the basis of experience (by comparing the suspicious file to the code and functions of known viruses). This means it is likely to miss new viruses that contain previously unknown methods of operation not found in any known viruses. Hence, the effectiveness is fairly low regarding accuracy and the number of false positives.
As new viruses are discovered by human researchers, information about them is added to the heuristic analysis engine, thereby providing the engine the means to detect new viruses.
References
External links
Retrospective/proActive antivirus test from AV-Comparatives.org
Antivirus software
de:Heuristik#Informatik |
https://en.wikipedia.org/wiki/SDS%20930 | The SDS 930 was a commercial 24-bit computer using bipolar junction transistors sold by Scientific Data Systems.
It was announced in December 1963, with first installations in June 1964.
Description
An SDS 930 system consists of at least three standard () cabinets, weighing about . It is composed of an arithmetic and logic unit, at least 8,192 words (24-bit + simple parity bit) magnetic-core memory, and the IO unit. Two's complement integer arithmetic is used. The machine has integer multiply and divide, but no floating-point hardware. An optional correlation and filtering unit (CFE) can be added, which is capable of very fast floating-point multiply-add operations (primarily intended for digital signal processing applications).
A free-standing console is also provided, which includes binary displays of the machine's registers and switches to boot and debug programs. User input is by a Teletype Model 35 ASR unit and a high-speed paper-tape reader (300 cps). Most systems include at least two magnetic-tape drives, operating at up to 75 in/s at 800 bpi. The normal variety of peripherals is also available, including magnetic-drum units, card readers and punches, and an extensive set of analog-digital/digital-analog conversion devices. A (vector mode) graphic display unit is also available, but it does not include a means of keyboard input.
The SDS 930 is a typical small- to medium-scale scientific computer of the 1960s. Speed is good for its cost, but with an integer add time of 3.5 microseconds, it is not in the same league as the scientific workhorses of the day (the CDC 6600, for example). A well equipped 930 can easily exceed 10 cabinets and require a climate-controlled room. The price of such a system in 1966 would be in the neighborhood of $500K.
Programming languages available include FORTRAN II, ALGOL 60, and the assembly language known as Meta-Symbol. The FORTRAN system is very compact, having been designed and implemented by Digitek for SDS to compile and run in 4,096 word SDS 900 series machines. To do anything useful in such small memory space, the compiler relies on an SDS architectural feature known as Programmed OPeratorS, or POPS. This feature consists of a single bit in the instruction word that causes the machine to "mark place and branch" to the memory address of the instruction code value plus 100 (octal). As a result, pseudo instructions can be defined and implemented yielding very compact special-purpose code. Both the FORTRAN compiler and runtime take advantage of this capability.
Towards the end of the SDS 930's market lifetime a real-time monitor system was introduced, which included a FORTRAN IV compiler. Neither the operating system nor the compiler were used heavily by customers. Many organizations modified and enhanced the 930's hardware. Project Genie at the University of California, Berkeley, added hardware to permit time-sharing with the Berkeley Timesharing System. These changes later formed the |
https://en.wikipedia.org/wiki/Senuti | Senuti (iTunes spelled backward) is a Mac OS X computer application written by Whitney Young. It was released on April 19, 2006, for copying songs from an iPod to a Macintosh computer running Mac OS X 10.5 or later. According to FadingRed, the company that sells and distributes Senuti, it has been downloaded over 2 million times.
Description
Senuti is an application for transferring files, such as songs and videos, from an iPod or iPhone back to a Macintosh computer. It is a Mac OS X-exclusive application; no version of Senuti has been released for Microsoft Windows. It can be downloaded as a free demo, which allows the user to transfer 1,000 songs from an iPod. The unlimited version is available for around US$20.
History
Senuti was developed by Whitney Young, who started as a high school senior searching for a way to transfer music from his iPod onto a Mac computer. Upon realizing that a good solution did not exist, Whitney wrote one. He leveraged the developers in the open-source community to help him write the code. Senuti is now sold by a software company called FadingRed, of which Young is co-founder and lead developer.
Senuti was originally released as GNU GPL software. The code following the 0.50.2 release was changed to payware in February 2009, although publications such as Wired still referred to the product as Open Source code as late as April 2009. The older, GPL version of this software is still available online.
See also
Comparison of iPod managers
References
Senuti 0.50.6 at VersionTracker
"Music Rescue" from Macworld, February 2005
"In Praise of Senuti" from Macworld, August 2006 archive copy
Information from Softpedia
Senuti: From iPod to iTunes from MacApper, Accessed 25 July 2007, published 17 July 2007
Winner of the 2005 Eddy Awards
External links
How to Use Senuti – a wiki how-to guide
2006 software
IPod software |
https://en.wikipedia.org/wiki/Spence%20Caldwell | Spencer Wood Caldwell (1909 – December 10, 1983) was a Canadian broadcasting pioneer and the founder of CTV.
Amongst his notable achievements are as manager of the Dominion Network, S.W. Caldwell Ltd. (a TV and radio programme and equipment distributor), an advertising agency created to air Canadian advertisements into the broadcasting of CBS TV show Westinghouse Playhouse. Caldwell was one of the first to apply for a television station licence to the Board of Broadcast Governors, but was turned down. After being turned down for a television station, Caldwell applied for a licence to create Canada's first private television network. With the licence approved, Caldwell created CTV, Canada's first commercial TV network. Caldwell was the first President of CTV and was inducted into the Canadian Association of Broadcasters Hall of Fame.
Caldwell was killed in a road accident with a transport truck near his home in Caledon, Ontario.
References
External links
BroadCasting History - Spence Caldwell
1909 births
1983 deaths
Canadian television executives
CTV Television Network people
People from Caledon, Ontario
Road incident deaths in Canada
Accidental deaths in Ontario
Businesspeople from Ontario
Businesspeople from Saskatchewan
Canadian television company founders
People from Regina, Saskatchewan |
https://en.wikipedia.org/wiki/MBN | MBN may refer to:
Radio and television networks
Maeil Broadcasting Network, cable TV network in South Korea
Mareco Broadcasting Network, radio network in the Philippines
Moody Radio (Moody Broadcasting Network), radio network in the United States aimed at a Christian audience
Mutual Black Network, radio network in the United States aimed at an African American audience
Other uses
Multi-bearer network, type of telecommunications network which can carry a data packet via one of several alternative bearers
Macaguán language (ISO 639-3: mbn), Guahiban language spoken in Colombia
Mount Barnett Airport (IATA: MBN), airport serving Mount Barnett Station, Western Australia
Zambian Airways (ICAO: MBN), former flag carrier of Zambia
See also
MBN Explorer (MesoBioNano Explorer), software package for molecular dynamics simulations, structure optimization and kinetic Monte Carlo simulations |
https://en.wikipedia.org/wiki/INF%20file | INF file (setup Information file) is INI plain-text file used by Microsoft Windows-based operating systems for the installation of software and drivers. INF files are most commonly used for installing device drivers for hardware components. Windows includes the IExpress tool for the creation of INF-based installations. INF files form part of the Windows Setup API and of its successor, Windows Installer.
The directory contains several such .inf files.
Precompiled setup Information file () is a binary representation of an INF file compiled by the operating system.
Structure
The structure of an INF file is very similar to that of an INI file; it contains various sections that specify the files to be copied, changes to the registry, etc. All INF files contain a [Version] section with a Signature key–value pair specifying the version of Windows that the INF file is meant for. The signature is commonly $CHICAGO$ (for Windows 9x) or $WINDOWS NT$ (for Windows NT/2K/XP). Most of the remaining sections are user-defined and contain information specific to the component being installed.
An example of an INF file might have something like this:
[autorun]
open=example.exe
What this would do is open the example.exe file automatically whenever the media containing the file (in its root directory) is connected to the computer. This can be dangerous, as there is no way to tell whether such a file exists before inserting the media. Since Windows XP, however, this feature has been replaced with a menu forcing the user to choose which action to take.
INF Files can sometimes be dangerous on Windows 2000 as they may allow viruses to autorun without prompting.
They are blocked on Windows 7, but can be worked around.
[autorun]
open=example.bat
icon=cd.ico
icon=*.ico command replaces any old or default drive icon with the specified one.
[autorun] can be replaced by [AutoRun] or [Autorun].
Registry values
The INF file may specify values for Windows Registry entries. Drivers providers and users may for instance use this feature to override display Extended Display Identification Data (EDID) metadata for displays that have corrupted ROM memory.
See also
Autorun.inf
Cabextract
References
External links
INF Files at MSDN
Internet Component Download with INF Files at MSDN
Standard Modem Command Sets and INFs.
Configuration files
Windows components |
https://en.wikipedia.org/wiki/Big%20Kids | Big Kids is a 13-episode children's comedy television series created by Lucy Daniel-Raby. The series was a British-American co-production of the BBC and the US network Noggin. It premiered on CBBC on BBC One on 27 September 2000 and on the Noggin channel on 29 January 2001. All 13 episodes were aired on Noggin's sister channel, Nickelodeon, from 9 to 30 March 2001.
History
According to the show's developer, Elaine Sperber, the writers "had to tread carefully" to make sure that the content was relevant to both UK and U.S. children. She said, "We had a great relationship with Noggin ... but when you co-produce with North Americans, you always run into problems over British accents and language. We couldn’t use terms like 'snogging' in Big Kids because no one in the U.S. would have understood it." The magazine Kidscreen wrote that "children start drinking far earlier in Britain than they do in North America, so a sequence showing booze being consumed at a school dance had to be watered down."
On Noggin, the show was aired as part of a primetime programming block called "The Hubbub," which allowed viewers to submit comments through Noggin's website and see them live on-air. Noggin grouped the final two episodes as an hour-long special, and they aired on 25 March 2001. Leading up to them, Noggin reran a marathon of the entire series, promoted as the Big Kids Big Marathon. From April 2002 to January 2004, Noggin aired reruns of Big Kids during its overnight programming block, The N.
Plot
The show follows the lives of the Spiller family: Simon, Kate, and their parents, Sarah, a piano teacher, and Geoff, a doctor. When the family attends a school charity event, a hypnotist and entertainer named Ming the Mind Master uses Sarah and Geoff in a performance. After the show is over, Kate and Simon realize that their parents have never been properly unhypnotized. At seemingly random moments, they black out and begin to act like children.
The two siblings have to deal with keeping their parents under control in their hypnotized state, trying to get their parents to believe what happens when they black out, and trying to discover what triggers the change. Simon tries to keep his parents' hypnosis a secret from his best friend, Jake, who lives across the street and often visits at inopportune times. During trances, Sarah and Geoff engage in behaviour for which they would otherwise scold their children, while Kate and Simon are forced to act like mature adults. According to Noggin, the show was meant to explore "the complex and sometimes chaotic relationship between parent and child."
Eventually, the children convince their parents by showing them filmed footage, and discover that the trigger is "ming", or any word with "ming" in it, just like the hypnotist's name. They finally track down Ming at a fête and convince him to 'unhypnotise' their parents, which appears to restore them to normal. However, their childish behaviour on a carousel leaves the children |
https://en.wikipedia.org/wiki/MISTIC | The MISTIC, or Michigan State Integral Computer, was the first computer system at Michigan State University and was built by its students, faculty and staff in 1957. Powered by vacuum tubes, its design was based on ILLIAC, the supercomputer built at University of Illinois at Urbana–Champaign, a descendant of the IAS architecture developed by John von Neumann.
History
The interest in developing a computer system at Michigan State University (MSU) began several years before MISTIC was conceived. In 1954 when MSU was known as Michigan State College (MSC), Professor J. Sutherland Frame of the Mathematics department sent a proposal for a computer donation from the United States Army Aberdeen Proving Ground. Unfortunately, a federal agency won that donation and the computing vision was not realized at that time.
However, all hope was not lost. In April 1955, Dr. Frame, Dr. Kenneth Arnold, Dr. John Hofman, Francis Martin, Dr. George Swenson Jr., Dr. Lloyd Turk, and Dr. Charles Wells traveled to the University of Illinois to examine the ILLIAC, one of the few university-operated digital computers of its time. When they returned to MSU they made a recommendation to the university to build its own computing facility. The Board of Trustees and MSU president John A. Hannah quickly approved it. John Ryder, MSC's Dean of Engineering, former head of Electrical Engineering at University of Illinois had assisted in the construction of the ILLIAC, estimated that MSC could build their ILLIAC equivalent (including hiring two engineers) for $150,000.
The MISTIC
Interests in designing MISTIC as the ILLIAC computer model at MSU was gaining attention from wide areas of academia within the United States, even as far as Iowa State University where electrical engineering Professor Dr. Lawrence Wayne Von Tersch originated. He came to MSU in March 1956 with the interest in the ILLIAC platform due to its large amount of statistical software available on paper tape. After a summer of study of the ILLIAC in Illinois, Dr. Von Tersch and three of his graduate students began building MISTIC in the fall of 1956.
Both ILLIAC and MISTIC were based on the Institute for Advanced Study's (IAS) computer, known for its revolutionary storage of data and instructions in the same memory. MISTIC and IAS consisted of five sections—input, memory, arithmetic processing, control, and output—setting the standard for at least twelve other computers later built.
MISTIC was built on the fifth floor, Room 500, of the Electrical Engineering Building, which today is the MSU Computer Center. Completed in the fall of 1957, the MISTIC weighed about one ton, filled the whole room, and was capable of storing 1,024 40-bit words (5 KB) in memory. Its anticipation sparked the establishment of the MSU Computer Laboratory in 1956 under the direction of Dr. Von Tersch. It was used in MSU's first computer course taught by computer coding professor Dr. Gerard Weeg. Departments from all over the MSU campus util |
https://en.wikipedia.org/wiki/Manchester%20Host | The Manchester Host was an early example of a municipal networking project. Its aim was to foster social and economic development in Manchester, England by encouraging the use of on-line communications and information services by businesses, public sector and voluntary organisations.
The project was launched in 1991 by a partnership of Manchester City Council, The Centre for Employment Research at Manchester Polytechnic (later Manchester Metropolitan University), and Poptel. At its core was an email and database service, accessible locally via dial-up and via the international X.25-network globally. The email service used equipment provided by German company GeoNet. A free-text database was accessed by what we'd now call a 'search engine' provided by a company called Memex.
The project involved a number of parallel activities including the establishment of "Electronic Village Halls": drop-in centres where users could learn about the new online communications and information ("telematics") technology; and the creation of the Manchester Community Information Network. These included the Bangladesh EVH, Chorlton EVH and the Women's EVH.
The Manchester Host has been cited as an important example of the use of technology for economic development.
References
External links
Manchester Community Information Network website
Manchester City Council website
Manchester Metropolitan University Website
Internet service providers of the United Kingdom
Organisations based in Manchester |
https://en.wikipedia.org/wiki/WKWP | WKWP (88.1 FM) is a Christian adult contemporary radio station licensed to Williamsport, Pennsylvania. It is owned by Educational Media Foundation and is an affiliate of its K-Love network.
History
The station was first licensed March 5, 1980, holding the call sign WWAS, and was owned by Williamsport Area Community College (now known as the Pennsylvania College of Technology). On September 3, 2013, the Federal Communications Commission approved transfer of the broadcast license for the then-WPTC to Todd Bartley's Williamsport Lycoming Broadcast Foundation, a local non-profit organization, at a purchase price of $125,000.
Effective December 15, 2017, the station was sold to Educational Media Foundation for $160,000. The station changed its call sign to WKWP on January 22, 2018.
References
External links
K-Love radio stations
Educational Media Foundation radio stations
Contemporary Christian radio stations in the United States
KWP
Radio stations established in 1980
1980 establishments in Pennsylvania |
https://en.wikipedia.org/wiki/Water%20sampling%20station | To enhance water quality monitoring in a drinking water network, water sampling stations are installed at various points along the network's route. These sampling stations are typically positioned at street level, where they connect to a local water main, and are designed as enclosed, secured boxes containing a small sink and spigot to aid in sample collection. Collected samples are analyzed for bacteria, chlorine levels, pH, inorganic and organic pollutants, turbidity, odor and many other water quality indicators.
Regulation
In the United States, water sampling stations aid in public infrastructural safety in regards to water quality monitoring and help municipalities comply with federal and state drinking water regulations. New York City has 965 sampling stations that are distributed based on population density, water pressure zones, proximity to water mains and accessibility. The stations rise about 4½ feet above the ground and are made of heavy cast iron. Using these stations, the New York City Department of Environmental Protection (DEP) collects more than 1,200 water samples per month from up to 546 locations.
Cultural references
In William Gibson's Pattern Recognition the protagonist Cayce Pollard mentions Water Sampling Stations. Her "favorite fantasy of alternative employment is to stroll Manhattan like an itinerant sommelier, addressing one's palate with various tap waters of the City". (Chapter 4, Page 26, Paperback Edition)
References
Water supply |
https://en.wikipedia.org/wiki/InStore%20Audio%20Network | InStore Audio Network (ISAN), formerly InStore Broadcasting Network (IBN), was an American broadcasting company which provided in-store music, video content and audio advertising for delivery within supermarkets and drugstores. At the time of its acquisition, the company was headquartered in Princeton, New Jersey.
History
Founded in 1983 as POP Radio, ISAN was acquired by Heritage Media in 1990. The company was merged into Heritage subsidiary ActRadio, before Heritage was acquired by News America Marketing, a division of News Corporation, in 1997. Then known as the InStore Broadcasting Network, the company was spun off from News America Marketing in 2003, sold to Gary Seem and Jeff Shapiro. Its headquarters relocated from Salt Lake City to Princeton, New Jersey in 2014.
ISAN was acquired by Stingray Group in January 2022. The ISAN brand was phased out later that year, with the service rebranded as Stingray Advertising.
System
InStore Audio Network's music programming is housed locally on a music server at each location, containing the music library, audio messages and ISAN's proprietary scheduling and delivery software. This software enables each server to receive new audio ads and music playlists as often as necessary, transferred over the Internet. The playlists dictate what will be played during the following week in that particular store so that every retail store can be customized with its own music and/or audio messages.
Clients
ISAN claims to provide music and/or audio messages to over 22,000 supermarkets and pharmacies in the United States. Its typically works with retailers who are national or regional in nature. Included are stores owned by Ahold (including Giant Food Stores, Stop & Shop, Tops and Martin's), Albertsons (including Safeway and others), Kroger, Supervalu, Meijer, and Southeastern Grocers.
Competitors
InStore Audio Network directly competes with the following companies:
Muzak Holdings / DMX Music / Mood Media
PlayNetwork
CUSTOMtronics Sound
MTI Digital
Startle
Streamit
References
External links
InStore Broadcasting Network
Mass media industry
Music companies of the United States
Industrial music services
Companies based in Salt Lake City |
https://en.wikipedia.org/wiki/MissionForce%3A%20CyberStorm | MissionForce: CyberStorm (commonly referred to as CyberStorm) is a turn-based strategy game developed by Dynamix and published in 1996 by Sierra On-Line. The game is set in the Metaltech universe created by Dynamix, and the player control units of HERCULANs (Humaniform-Emulation Roboticized Combat Unit with Leg-Articulated Navigation): bipedal warmachines of varying size and construct, more commonly known as HERCs. Although CyberStorm was a limited commercial success, it sold well enough to spawn a 1998 sequel called CyberStorm 2: Corporate Wars. It was digitally released by Activision on July 23, 2019 on GOG.com.
Plot
The player starts as an employee of the Unitech Corporation, serving as a commander of a private military taskforce to fight a race of mechanical beings mankind created long ago called Cybrids. The game's plot and atmosphere is filled in via messages and text between missions, and is rather dark. The corporate environment is cold and ruthless, with military decisions being controlled by a computer system called the Main Synthetic Intelligence (MSI). Early on in the game one of the corporate communiques implies that Unitech can and will execute any of its military officers if they fail. This is confirmed if the player ever loses the game by having his or her forces eliminated down to the last HERC without having enough credits to replace them.
The player's soldiers are "BioDerms", short-lived, artificially-created humanoids designed to pilot the HERC war machines. The BioDerms are supposedly used because of their genetically engineered reflexes, their ability to be directly "linked" to the HERCs, and their obedience. The instructions and early parts of the game indicate that these BioDerms are sub-human, more like trained dogs, but later communiques show that they are intelligent, can think independently (and even rebel), and even think of one model as a "messiah." Thus, the BioDerms are actually slaves: disposable humanoids to be used on the battlefield, and "recycled" for a few credits or blown up in kamikaze attacks by corporate officers when they are no longer useful. One early communique describes the horror of having one's genes taken to create BioDerms, and if the player wins the game, Unitech makes it clear that they will in fact do that with the player's avatar, it is an "honor," and there is no choice.
Gameplay
By completing missions and progressing, the player gains rank in order to get access to more advanced equipment and hardware, as well as being able to control more HERCs. Missions can be selected from a list of Cybrid-controlled planets within a specified system.
The game is played from a top-down isometric view-perspective typical for turn-based strategy games. The player gets credits for every enemy they destroy as well as a mission-bonus dependent on the difficulty of the mission. However, in the beginning of the game, the primary source of income is through mining ore, which can be found scattered across th |
https://en.wikipedia.org/wiki/Power%20cycling | Power cycling is the act of turning a piece of equipment, usually a computer, off and then on again. Reasons for power cycling include having an electronic device reinitialize its set of configuration parameters or recover from an unresponsive state of its mission critical functionality, such as in a crash or hang situation. Power cycling can also be used to reset network activity inside a modem. It can also be among the first steps for troubleshooting an issue.
Overview
Power cycling can be done manually, usually using a switch on the device to be cycled; automatically, through some type of device, system, or network management monitoring and control; or by remote control; through a communication channel.
In the data center environment, remote control power cycling can usually be done through a power distribution unit, over TCP/IP. In the home environment, this can be done through home automation powerline communications or IP protocols. Most Internet Service Providers publish a "how-to" on their website showing their customers the correct procedure to power cycle their devices.
Power cycling is a standard diagnostic procedure usually performed first when the computer freezes. However, frequently power cycling a computer can cause thermal stress. Reset has an equal effect on the software but may be less problematic for the hardware as power is not interrupted.
Historical uses
On all Apollo missions to the moon, the landing radar was required to acquire the surface before a landing could be attempted. But on Apollo 14, the landing radar was unable to lock on. Mission control told the astronauts to cycle the power. They did, the radar locked on just in time, and the landing was completed.
During the Rosetta mission to comet 67P/Churyumov–Gerasimenko, the Philae lander did not return the expected telemetry on awakening after arrival at the comet. The problem was diagnosed as "somehow a glitch in the electronics", engineers cycled the power, and the lander awoke correctly.
During the launch of the billion dollar AEHF-6 satellite on 26 March 2020 by an Atlas V rocket from Cape Canaveral Air Force Station, a hold was called at T-46 seconds due to hydraulic system not responding as expected. The launch crew turned it off and back on, and the launch proceeded normally.
In 2023 the Interstellar Boundary Explorer spacecraft stopped responding to commands after an anomaly. When gentler techniques failed, NASA resorted to rebooting the spacecraft with the remote equivalent of a power cycle.
See also
Energy conservation
Hard reboot
Power sequencing
References
Electric power distribution
Out-of-band management
Computer hardware |
https://en.wikipedia.org/wiki/Jaikoz | Jaikoz is a Java program used for editing and mass tagging music file tags.
Jaikoz generates acoustic fingerprints from music files using the AcoustId service, it can then look up the metadata from MusicBrainz using the AcoustId, additionally it can match based on metadata to MusicBrainz or Discogs. Matching is first applied at album level, falling back to track level where a match at album level could not be made. This allows Jaikoz to automatically fix most of a users song collection.
Jaikoz uses a relatively unusual spreadsheet metaphor for both viewing and editing data, and allows editing of over fifty fields using this spreadsheet interface, the underlying jaudiotagger tag library is released under LGPL and is used by various Java applications.
Jaikoz is commercially licensed software, written in Java 1.5 by Paul Taylor. A shareware version, in which changes can only be saved to 20 files during one use, is also available as a 30-day free trial. 10% of every sale is paid to the MetaBrainz Foundation to support MusicBrainz development.
History
Originally released in 2006 as a standalone music tagger without any MusicBrainz support, but support for MusicBrainz was soon added. Changes in Jaikoz have always reflected changes in MusicBrainz, for example Jaikoz was the first application to make use of the new web service released as part of the MusicBrainz NGS release in 2011, and the first application to use the MusicBrainz seeding mechanism for adding new releases.
Summary of features
Acoustic matching using MusicBrainz and AcoustId to match songs based on the actual music
MetaData matching using MusicBrainz and Discogs to match tracks from the metadata in your files either automatically or manually
Fixes artwork.
Supports Multiple Audio formats and different audio formats can be edited the same easy way
Export/Import metadata to/from a spreadsheet.
Delete Duplicates based on Musicbrainz Id and/or Acoustic Fingerprint
Find And Replace feature that can be used to find and replace values in all/any column
Intelligent FileName to Tagger can extract information from the filename into the tag without having to know the format of the field
Configure batch operations using AutoCorrect
Full Unicode support allow any character from any language to be used
Easy conversion of tags between ID3 versions
Adding releases to MusicBrainz
Reviews and awards
Jaikoz has been favorably received worldwide. Jaikoz was recommended in a LifeHacker article for automatically correcting your metadata.
Jaikoz version 1.1.3 was distributed by Macworld Italy magazine with its Spring, 2006 supplement "Everything iPod". Version 2.5 was favorably reviewed in 2008 by Thomas Weiss, senior editor of Macnews Germany. Macworld Germany editor Matthias Zehden concurred in his 2009 iPhoneWelt review of Jaikoz.
Academic notice
In 2006, Julien Chaveau of the University of Angers cited Jaikoz as an exemplar of an automated information extraction system, and in 2008 B |
https://en.wikipedia.org/wiki/Tektronix%204050 | The Tektronix 4050 is a series of three desktop computers produced by Tektronix in the late 1970s through the early 1980s. The display technology is similar to the Tektronix 4010 terminal, using a storage tube display to avoid the need for video RAM. They are all-in-one designs with the display, keyboard, CPU and DC300 tape drive in a single desktop case. They also include a GPIB parallel bus interface for controlling lab and test equipment as well as connecting to external peripherals. A simple operating system and BASIC interpreter are included in ROM.
A key concept of the systems is the use of a storage tube for the display. This allows the screen to retain images drawn to it, eliminating the need for a framebuffer, computer memory devoted to the display. Most systems of the era had limited resolution due to the expense of the buffer needed to hold higher resolution images, but this is eliminated in the 4050s and allows the resolution to be as high as the hardware can handle, which was ostensibly 1024 by 1024 but limited by the physical layout of the screen to 1024 by 780. It also allows the machine to dedicate all of its memory to the programs running on it, as opposed to partitioning off a section for the buffer.
Models
The first model, the 4051, was based on 8-bit Motorola 6800 running at a 1 MHz. It normally shipped with 8 KB of RAM and was expandable using 8 KB modules to 32 KB. The remaining 32 KB of address space was reserved for ROM, which could be expanded using two external ROM cartridge of 8 KB each. It included six character sets in ROM and an extended dialect of BASIC that included various vector drawing commands. The 4051 was released in 1975 for the base price of . Adding the optional RS-232 interface allowed it to emulate a Tektronix 4012 terminal.
The second model was the 4052, which in spite of the similar name was a very different system. This had a CPU based on four AMD 2901 4-bit bit-slice processors used together to make a single 16-bit processor. It could also be used in a 6800-compatible mode, allowing it to run software from the 4051, although it did so much faster than the original 4051. Released in 1978, it came with a full 32 KB of RAM for , and could be expanded to 64 KB for another .
The 4054 was a version of the 4052 built around the 19" screen from the 4014 terminal rather than the 11" screen from the 4012, increasing resolution to 4096 by 3072.
Peripherals
External storage units were available:
The 4924 was an external version of the internal DC300 tape drive.
The 4907 used single or dual Shugart 851R 8-inch floppy drives with 64 KB floppies.
The larger, 2-drawer-filing-cabinet-sized 4909 storage unit used a CDC 96 megabyte hard drive with the first 16 megabytes in the form of a removable disc-pack.
Two sizes of the 4956 graphics tablet (20"x20", 36"x48") offered a slow process for inputting from paper drawings. The 4952 joystick was used for graphics input.
Software
The graphic display software was |
https://en.wikipedia.org/wiki/Central%20Instrumentation%20Facility | The Central Instrumentation Facility (CIF) was a building in the Kennedy Space Center industrial area that functioned as the core of instrumentation and data processing operations during the Apollo program and the early years of the Space Shuttle program. It centralized the handling of the center's data including offices, laboratories and test stations; and housed general instrumentation activities serving more than one launch complex. The CIF also included the Central Timing Facility, where a precision clock drove countdown clocks and other timing devices at KSC that required a high degree of accuracy.
The CIF also housed computers and other electronic equipment for reduction of telemetry data, analysis, and transmission to other NASA centers. The three-story structure of approximately just west of the KSC Headquarters Building was one of the most distinctive buildings in the KSC Industrial Area with its rooftop array of various antennas.
The CIF was left dormant during the intermediate part of the space shuttle program (as other facilities such as the launch control center managed most of the instrumentation in the 2000s), and fell into disrepair. In September 2017, all the equipment inside was donated to the visitor complex and storage facilities, while the disused building was eventually demolished in October.
History
The CIF reflected the desire of Karl Sendler, KSC's first director of information systems, and his planners to centralize data handling. Although it was based on systems developed during Saturn I operations at Complexes 34 and 37, such experience was of limited value, because the distance from Launch Complex 39 to its Launch Control Center was more than 14 times as long. Planning and construction were coordinated with other NASA centers and with the Atlantic Missile Range. All metal in the building was grounded, and commercial power and the instrumentation power systems were grounded separately. Fluorescent lights, a source of electromagnetic interference, were not permitted. Its architect, Charles Luckman, also designed other nearby buildings.
CIF antenna site
A smaller building, later known as the CIF antenna site, was placed 1.5 miles (2.5 km) north of the Industrial Area, to be free of radio-frequency interference and have clear line-of-sight to the NASA launch complexes.
References
External links
Brevard County listings at National Register of Historic Places
Buildings and structures in Merritt Island, Florida
Kennedy Space Center
National Register of Historic Places in Brevard County, Florida
Demolished buildings and structures in Florida
Buildings and structures demolished in 2017 |
https://en.wikipedia.org/wiki/GR%2011%20%28France%29 | GR 11 is a long-distance footpath in the Île-de-France region of France. It is part of an extensive national network of rural hiking trails. It follows a circular route around Paris, going through the départements of Val d'Oise, Seine-et-Marne, Essonne and Yvelines. Towns passed through include Chantilly, Senlis, Fontainebleau, Provins, Mantes-la-Jolie and Chevreuse. The circle is much wider than that followed by the GR 1, which also rings Paris.
See also
GR footpath
European long-distance paths
External links
GR11 From Senlis (Oise) to Signy-Signets (Seine-et-Marne)
GR11 From Signy-Signets to Donnemarie-Dontilly (Seine-et-Marne)
GR11 From Donnemarie-Dontilly (Seine-et-Marne) to Mondeville (Essonne)
GR11 From Mondeville (Essonne) to Flexanville (Yvelines)
GR11 From Flexanville (Yvelines) to Senlis (Oise)
GR11 Tour of Paris in Ile de France region (Full itinerary)
GR11 on Jan's Wondere Wandelwereld
Hiking trails in France |
https://en.wikipedia.org/wiki/Ellen%20Ullman | Ellen Ullman is an American computer programmer and author. She has written books, articles, and essays that analyze the human side of the world of computer programming.
She has owned a consulting firm and worked as technology commentator for NPR's All Things Considered. Her breakthrough book was non-fiction: Close to the Machine: Technophilia and its Discontents.
Life
Ullman's adoptive father's family included computer scientists and mathematicians who had a major impact on her decision to pursue software engineering, a field for which she did "not have native talent." Ullman earned a B.A. in English at Cornell University in the early 1970s. She began working professionally in 1978 as a programmer of electronic data interchange applications and graphical user interfaces.
She eventually began writing about her experiences as a programmer. From 1994 until 1996, she published articles in Harper's Magazine and in the collections Resisting the Virtual Life and Wired Women. She lives in San Francisco.
Bibliography
Books
Close to the Machine: Technophilia and its Discontents San Francisco : City Lights Books, 1997.
Life in Code: A Personal History of Technology New York: MCD, Farrar, Straus and Giroux, 2017.
Novels
The Bug New York, N.Y. : Talese, 2003.
By Blood: A Novel New York, N.Y. : Farrar, Straus and Giroux, 2012.
Selected articles and essays
Out of Time: Reflections on the Programming Life (included in the 1995 collection Resisting the Virtual Life, )
The Myth of Order. The real lesson of Y2K is that software operates just like any natural system: out of control
The dumbing-down of programming
How to Be a 'Woman Programmer'''
Twilight of the crypto-geeks: Lone-wolf digital libertarians are beginning to abandon their faith in technology uber alles and espouse suspiciously socialist-sounding ideas.
Geeks Win: A survey of the oddballs who write the codes that make the 21st-century world go round
The Orphans of Invention
The Boss in the Machine
Identity Stolen? Take a Number
Dennis Ritchie''
References
External links
Interview with Salon magazine (October 9, 1997)
Interview with Stay Free magazine (Fall 1998)
Interview with frontwheeldrive.com (May 21, 1999)
Interview with SF Gate (May 8, 2002)
Interview and discussion of The Bug on The WELL (January, 2004)
Audio interview with Jon Udell (October 6, 2006)
Year of birth missing (living people)
Living people
Writers from California
Cornell University alumni
American women computer scientists
American computer scientists
21st-century American women |
https://en.wikipedia.org/wiki/Dave%20Ryan%20%28sportscaster%29 | Dave Ryan (born June 20, 1967) is a play-by-play announcer and reporter for CBS, who has worked a wide variety of sports programming including NFL, college basketball, lacrosse, bowling, baseball and hockey.
Education
Ryan graduated from Syracuse University's S. I. Newhouse School of Public Communications with a B.S. in Broadcast Journalism in 1989. He got his start in broadcasting at UUTV, now called CitrusTV, the student-run TV studio at Syracuse University. He is also Co-Director of Syracuse's Sportscaster U. program that instructs NBA players in broadcasting.
Career
He previously worked for ESPN. He previously called Rochester Rattlers games on ESPN3 with Evan Washburn. He is mostly known for calling PBA bowling events on the network alongside color commentator Randy Pedersen from 2002–2007.
He called other non-marquee sporting events on ESPN and its sister networks, such as lacrosse and the semifinals of the Little League World Series. In addition, he occasionally serves as a college football sideline reporter and a college basketball announcer and served as a play-by-play man for ESPN/ESPN2 for 8 years. His signature phrases on bowling telecasts were "60 feet to success!" and "He's got all ten down." Some bowling fans criticized him for calling pins by a number, such as "number seven" instead of saying "the seven pin." Ryan was replaced by Rob Stone for PBA telecasts in 2007, but he has continued to call other bowling events on occasion, such as women's tournaments and college tournaments.
Ryan's name is on a fairly short list of national bowling play-by-play announcers, with Chris Schenkel being the most well known after he spent 36 years calling PBA events for ABC. Denny Schreiner (ESPN), Jay Randolph (NBC/ESPN2), Mike Durbin (ESPN), Dick Stockton (HBO) and Rob Stone (ESPN/ FOX) have also served as play-by-play announcers for bowling telecasts.
Ryan joined the NFL on CBS commentary team in 2009 as a play by play man, substituting for Gus Johnson in week 16.
On February 2, 2012, Ryan agreed to call Major League Lacrosse games on the CBS Sports Network with Evan Washburn. Ryan also returned to PBA bowling broadcasts in June–July 2013, when CBS Sports Network covered five events in the PBA Tour's "Summer Swing."
Personal life
Ryan, along with his wife Tess and their four children, live in Baldwinsville, New York.
References
External links
CBS Sports Bio
1967 births
Living people
American television sports announcers
Army Black Knights announcers
Baseball announcers
Bowling broadcasters
Curling broadcasters
College football announcers
College basketball announcers in the United States
Lacrosse announcers
Major League Lacrosse announcers
National Football League announcers
National Hockey League broadcasters
S.I. Newhouse School of Public Communications alumni
Television personalities from Syracuse, New York
Women's college basketball announcers in the United States |
https://en.wikipedia.org/wiki/SLIC | SLIC may refer to:
Software licensing description table, in a computer BIOS
Sri Lanka Insurance Corporation, an insurance provider
State Life Insurance Corporation of Pakistan
Subaxial Injury Classification, a severity score for cervical spine trauma
Subscriber line interface card, an electronic circuit |
https://en.wikipedia.org/wiki/Firing%20squad%20synchronization%20problem | The firing squad synchronization problem is a problem in computer science and cellular automata in which the goal is to design a cellular automaton that, starting with a single active cell, eventually reaches a state in which all cells are simultaneously active. It was first proposed by John Myhill in 1957 and published (with a solution by John McCarthy and Marvin Minsky) in 1962 by Edward F. Moore.
Problem statement
The name of the problem comes from an analogy with real-world firing squads: the goal is to design a system of rules according to which an officer can command an execution detail to fire so that its members fire their rifles simultaneously.
More formally, the problem concerns cellular automata, arrays of finite state machines called "cells" arranged in a line, such that at each time step each machine transitions to a new state as a function of its previous state and the states of its two neighbors in the line. For the firing squad problem, the line consists of a finite number of cells, and the rule according to which each machine transitions to the next state should be the same for all of the cells interior to the line, but the transition functions of the two endpoints of the line are allowed to differ, as these two cells are each missing a neighbor on one of their two sides.
The states of each cell include three distinct states: "active", "quiescent", and "firing", and the transition function must be such that a cell that is quiescent and whose neighbors are quiescent remains quiescent. Initially, at time , all states are quiescent except for the cell at the far left (the general), which is active. The goal is to design a set of states and a transition function such that, no matter how long the line of cells is, there exists a time such that every cell transitions to the firing state at time , and such that no cell belongs to the firing state prior to time .
Solutions
The first solution to the FSSP was found by John McCarthy and Marvin Minsky and was published in Sequential Machines by Moore. Their solution involves propagating two waves down the line of soldiers: a fast wave and a slow wave moving three times as slow. The fast wave bounces off the other end of the line and meets the slow wave in the centre. The two waves then split into four waves, a fast and slow wave moving in either direction from the centre, effectively splitting the line into two equal parts. This process continues, subdividing the line until each division is of length 1. At this moment, every soldier fires. This solution requires 3n units of time for n soldiers.
A solution using a minimal amount of time (which is units of time for soldiers), was first found by , but his solution used thousands of states. improved this to 16 states, and further improved it to eight states, while claiming to prove that no four-state solution exists. Peter Sanders later found that Balzer's search procedure was incomplete, but managed to reaffirm the four-state non-exis |
https://en.wikipedia.org/wiki/Security%20and%20safety%20features%20new%20to%20Windows%20Vista | There are a number of security and safety features new to Windows Vista, most of which are not available in any prior Microsoft Windows operating system release.
Beginning in early 2002 with Microsoft's announcement of its Trustworthy Computing initiative, a great deal of work has gone into making Windows Vista a more secure operating system than its predecessors. Internally, Microsoft adopted a "Security Development Lifecycle" with the underlying ethos of "Secure by design, secure by default, secure in deployment". New code for Windows Vista was developed with the SDL methodology, and all existing code was reviewed and refactored to improve security.
Some specific areas where Windows Vista introduces new security and safety mechanisms include User Account Control, parental controls, Network Access Protection, a built-in anti-malware tool, and new digital content protection mechanisms.
User Account Control
User Account Control is a new infrastructure that requires user consent before allowing any action that requires administrative privileges. With this feature, all users, including users with administrative privileges, run in a standard user mode by default, since most applications do not require higher privileges. When some action is attempted that needs administrative privileges, such as installing new software or changing system or security settings, Windows will prompt the user whether to allow the action or not. If the user chooses to allow, the process initiating the action is elevated to a higher privilege context to continue. While standard users need to enter a username and password of an administrative account to get a process elevated (Over-the-shoulder Credentials), an administrator can choose to be prompted just for consent or ask for credentials. If the user doesn't click Yes, after 30 seconds the prompt is denied.
UAC asks for credentials in a Secure Desktop mode, where the entire screen is faded out and temporarily disabled, to present only the elevation UI. This is to prevent spoofing of the UI or the mouse by the application requesting elevation. If the application requesting elevation does not have focus before the switch to Secure Desktop occurs, then its taskbar icon blinks, and when focussed, the elevation UI is presented (however, it is not possible to prevent a malicious application from silently obtaining the focus).
Since the Secure Desktop allows only highest privilege System applications to run, no user mode application can present its dialog boxes on that desktop, so any prompt for elevation consent can be safely assumed to be genuine. Additionally, this can also help protect against shatter attacks, which intercept Windows inter-process messages to run malicious code or spoof the user interface, by preventing unauthorized processes from sending messages to high privilege processes. Any process that wants to send a message to a high privilege process must get itself elevated to the higher privilege context, via |
https://en.wikipedia.org/wiki/Blondie24 | Blondie24 is an artificial intelligence checkers-playing computer program named after the screen name used by a team led by David B. Fogel. The purpose was to determine the effectiveness of an artificial intelligence checkers-playing computer program.
The screen name was used on The Zone, an internet boardgaming site in 1999. During this time, Blondie24 played against some 165 human opponents and was shown to achieve a rating of 2048, or better than 99.61% of the playing population of that web site.
The design of Blondie24 is based on a minimax algorithm of the checkers game tree in which the evaluation function is a deep learning convolutional artificial neural network. The neural net receives as input a vector representation of the checkerboard positions and returns a single value which is passed on to the minimax algorithm.
The weights of the neural network were obtained by an evolutionary algorithm (an approach now called neuroevolution). In this case, a population of Blondie24-like programs played each other in checkers, and those were eliminated that performed relatively poorly. Performance was measured by a points system: Each program earned one point for a win, none for a draw, and two points were subtracted for a loss. Points were earned for each neural network after a multiple of games; the neural networks did not know which individual games were won, lost, or drawn. After the poor programs were eliminated, the process was repeated with a new population derived from the winners. In this way, the result was an evolutionary process that selected programs that played better checkers games.
The significance of the Blondie24 program is that its ability to play checkers did not rely on any human expertise of the game. Rather, it came solely from the total points earned by each player and the evolutionary process itself.
David Fogel, along with his colleague Kumar Chellapilla, documented their experiment in several publications. Fogel also authored a book on the development of Blondie24, and the experiences he and his team had while running Blondie24 in on-line checkers games, and eventually in obtaining a victory against a dumbed-down version of Chinook.
References
Further reading
See also
Genetic Programming
Game artificial intelligence
Computer draughts players |
https://en.wikipedia.org/wiki/Atomic%20Runner%20Chelnov | Atomic Runner Chelnov is a Japanese runner arcade video game developed and published by Data East in 1988.
Gameplay
The player controls Chelnov's movements with the eight-way joystick, and the three buttons to attack, jump, or turn around. Six types of weapons can be obtained during the game: laser, fire rings, boomerangs, spike bola balls, spike ball whip, missiles. By collecting power-ups you can improve Chelnov's attack power, rapid-firing capability, attack range or jumping height.
The game is a forced side-scrolling game where the screen continually scrolls to the left at a constant speed unless the player is fighting a boss, in which the screen will stop scrolling. Chelnov will continue to run with the screen even if the player lets go of the joystick. Though the player can move to the left or right of the scrolling screen by entering the corresponding direction on the joystick, it is impossible to stop or move backwards except when fighting a boss (Chelnov can turn backwards while jumping). The main character's sprite animation is highly detailed and smooth for its time, comparable to the level of Karateka and the early Prince of Persia games. The ending screen appears when the player finishes all seven levels of the game.
Plot
The player takes the role of Chelnov (Челнов), a coal miner who miraculously survives the malfunction and explosion of a nuclear power plant. Chelnov's body gains superhuman abilities due to the massive amount of radiation given off by the explosion, and a secret organization seeks to harness those abilities for its own evil purposes. Chelnov must battle and defeat the secret organization using his newfound abilities.
Development
Atomic Runner Chelnov was controversial at the time of release. The setting, where a coal miner is caught in a nuclear accident, a hammer and sickle visible on the game's opening screen, and the game's title (Chernobyl is written チェルノブイリ in Japanese) led many to interpret the game as a parody of the Chernobyl disaster. Data East responded in a television program that the name "Chelnov" was merely a relative of Karnov, the title character of one of the company's games, and was not at all influenced by the events at Chernobyl. Other development staff members later explained that the game had been planned under a different name, but the events at Chernobyl led to the name "Chelnov", which became the game's title. Under this explanation, the parodic elements resulted purely out of coincidence, but over a year and a half passed from the accident to the first release of the game, which was ample time for the developers to reassess the suitability of the game's plot and content. The game's storyline was changed considerably to remove connotations with Chernobyl when the game was ported to the Sega Mega Drive/Genesis.
After Data East became defunct due to bankruptcy in 2003, Paon bought the rights to Atomic Runner Chelnov.
Ports
The game was first ported to the Sega Genesis in 1992, but many |
https://en.wikipedia.org/wiki/Sukumar%20Nandi | Professor Sukumar Nandi is senior member of IEEE and is in Department of Computer Science and Engineering at the Indian Institute of Technology Guwahati. He did his Ph.D. from IIT Kharagpur under Professor P. Pal Chaudhri. He joined IIT Guwahati, and has been teaching there since 1995. He is also a member of the Board of Governors of IIT Guwahati.
He was appointed the "Dean of Academic Affairs" in IIT Guwahati in 2008, and held the post until 2012. He is now the Deputy Director of IIT Guwahati.
References
External links
Sukumar Nandi's Homepage
Publications
Nandi,Sukumar
Indian computer scientists
Senior Members of the IEEE
Year of birth missing (living people)
IIT Kharagpur alumni
Academic staff of the Indian Institute of Technology Guwahati |
https://en.wikipedia.org/wiki/Gary%20Biasillo | Gary Biasillo ( Gari Biasillo) is the composer of the theme tune to the C64 computer game Target: Renegade, and the programmer of Basket Master C64 port, among others.
Games credited
FIFA 07 (2006), Electronic Arts, Inc.
NHL 2005 (2004), Electronic Arts, Inc.
NHL 2003 (2002), Electronic Arts, Inc.
NHL 2001 (2000), Electronic Arts, Inc.
Re-Volt (1999), Acclaim Entertainment, Inc.
NFL Quarterback Club '96 (1995), Acclaim Entertainment, Inc.
Onslaught (1991), Ballistic
Future Basketball (1990), Hewson Consultants Ltd.
Arkanoid: Revenge of Doh (1988), Imagine Software
Slayer (1988), Hewson Consultants Ltd.
Target: Renegade (1988), Imagine Software
Fernando Martín: Basket Master (1987), Dinamic Software
Joe Blade (1987), Players Software
Sources
Living people
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/The%20Family%20Genius | The Family Genius is a TV series aired in the United States from September 9 to September 30, 1949. The series was broadcast on the DuMont Television Network, and is most notable for lasting less than a month before cancellation.
Plot
The series was a sitcom centered around the Howard family, in which young son Tommy was a child prodigy.
Cast
Jack Diamond as Tommy Howard
Phyllis Lowe as Mrs. Howard
Arthur Edwards as Mr. Howard
Episode status
As with most DuMont series, no episodes are known to exist.
Bibliography
David Weinstein, The Forgotten Network: DuMont and the Birth of American Television (Philadelphia: Temple University Press, 2004)
Alex McNeil, Total Television, Fourth edition (New York: Penguin Books, 1980)
Tim Brooks and Earle Marsh, The Complete Directory to Prime Time Network TV Shows, Third edition (New York: Ballantine Books, 1964)
See also
List of programs broadcast by the DuMont Television Network
List of surviving DuMont Television Network broadcasts
External links
The Family Genius at IMDB
DuMont historical website
DuMont Television Network original programming
1940s American sitcoms
1949 American television series debuts
Black-and-white American television shows
Lost television shows |
https://en.wikipedia.org/wiki/Alliance%20College-Ready%20Public%20Schools | Alliance College-Ready Public Schools (LA Alliance) is one of the largest nonprofit public charter school networks in the nation, operating 26 high-performing, public charter middle and high schools that educate nearly 13,000 scholars from Los Angeles’ most underserved communities. The mission of the organization is for 75% or more of the scholars to graduate from a four-year college or university.
Schools
As of 2023, Alliance College-Ready Public Schools operates 17 high schools and 9 middle schools.
High Schools
Alliance Cindy & Bill Simon Technology Academy HS, South Los Angeles/Watts, East Los Angeles
Alliance Ted K. Tajima High School, Downtown Los Angeles
Alliance Collins Family College-Ready High School, Huntington Park
Alliance Dr Olga Mohan High School, Downtown Los Angeles
Alliance Gertz-Ressler High School, Downtown Los Angeles
Alliance Health Services Academy High School, South Los Angeles/Watts, East Los Angeles
Alliance Judy Ivie Burton Technology Academy High School, South Los Angeles/Watts, East Los Angeles
Alliance Leichtman-Levine Family Foundation Environmental Science High School, Glassell Park/Lincoln Heights
Alliance Marc & Eva Stern Math and Science High School, East Los Angeles
Alliance Margaret M. Bloomfield High School, Walnut Park, California
Alliance Marine High School, Sun Valley
Alliance Morgan McKinzie High School, East Los Angeles
Alliance Patti & Peter Neuwirth Leadership Academy, South Los Angeles/Watts, East Los Angeles
Alliance Renee & Meyer Luskin Academy High School, South Los Angeles/Watts, East Los Angeles
Alliance Susan & Eric Smidt Technology High School, Glassell Park/Lincoln Heights
Alliance Tennenbaum Family Technology High School, Glassell Park/Lincoln Heights
Alliance William & Carol Ouchi High School, Hyde Park/Watts, South Los Angeles/East Los Angeles
Middle Schools
Alliance Christine O’Donovan Middle Academy, South Los Angeles/Watts
Alliance College-Ready Middle Academy 4, South Los Angeles/Watts
Alliance College-Ready Middle Academy 8, East Los Angeles
Alliance College-Ready Middle Academy 12, South Los Angeles/Watts
Alliance Milt and Debbie Valera Middle Academy, Sun Valley
Alliance Jack H. Skirball Middle School, South Los Angeles/Watts
Alliance Kory Hunter Middle School (formerly Alliance College-Ready Middle Academy 9), Huntington Park
Alliance Richard Merkin Middle School, Downtown Los Angeles
Alliance Valera Middle School, Sun Valley
History
LA Alliance was created in 2004 by business and community leaders involved in the Los Angeles Educational Alliance For Restructuring Now (LEARN) reform effort of the early 1990s in the Los Angeles Unified School District.
Following massive budget issues at Inner City Education Foundation (ICEF) Public Schools, another charter school organization in Los Angeles, there were rumors that LA Alliance would take over the ICEF schools in March 2011. Former LA Mayor Richard Riordan was negotiating the merger as a member of bo |
https://en.wikipedia.org/wiki/Sports%20Action%20Team | Sports Action Team was a half-hour comedy television series that ran for two seasons in 2006–2007. It was aired by some affiliates of the NBC network and the high definition channel HDNet. It was a semi-improvisational mockumentary depicting the production of a fictional sports news show of the same name. Originally intended as a sport-related program to fill air time after Sunday football games on the west coast, the first season eventually expanded to most major NBC markets around the country (including all NBC Owned and Operated stations). The show's second season is shot in high definition, and is distributed by MGM Television. It is produced by Chicago-based Towers Productions, Inc.
The regular cast was Al Samuels, Kevin Fleming, Steven Fleming, Antoine McKay, Katie Nahnsen, and Niki Lindgren, who have a background in Chicago area improvisational theater and play characters with the same first names. It also regularly features appearances by professional athletes. Athletes that made appearances on the show include Dwyane Wade of the Miami Heat, Rudi Johnson of the Cincinnati Bengals, former Chicago Bears coach Mike Ditka, Randy Moss of the New England Patriots, Patrick Willis of the San Francisco 49ers, and IndyCar racer Danica Patrick. Several non-athletes have made appearances, such as The Tonight Show host Conan O'Brien and former Access Hollywood host Nancy O'Dell. Each show includes several appearances by athletes who are included in the shows plot lines.
References
External links
2006 American television series debuts
2007 American television series endings
2000s American mockumentary television series
American sports television series
HDNet original programming
Television series by MGM Television |
https://en.wikipedia.org/wiki/Symposium%20on%20Principles%20of%20Programming%20Languages | The annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL) is an academic conference in the field of computer science, with focus on fundamental principles in the design, definition, analysis, and implementation of programming languages, programming systems, and programming interfaces. The venue is jointly sponsored by two Special Interest Groups of the Association for Computing Machinery: SIGPLAN and SIGACT.
POPL ranks as A* (top 4%) in the CORE conference ranking.
The proceedings of the conference are hosted at the ACM Digital Library. They were initially under a paywall, but since 2017 they are published in open access as part of the journal Proceedings of the ACM on Programming Languages (PACMPL).
Affiliated events
Declarative Aspects of Multicore Programming (DAMP)
Foundations and Developments of Object-Oriented Languages (FOOL/WOOD)
Partial Evaluation and Semantics-Based Program Manipulation (PEPM)
Practical Applications of Declarative Languages (PADL)
Programming Language Technologies for XML (PLAN-X)
Types in Language Design and Implementation (TLDI)
Verification, Model Checking and Abstract Interpretation (VMCAI)
Languages for Inference (LAFI)
See also
International Conference on Functional Programming (ICFP)
Programming Language Design and Implementation (PLDI)
POPLmark challenge
References
External links
Acceptance Rates of Compiler Conferences
Association for Computing Machinery conferences
Programming languages conferences |
https://en.wikipedia.org/wiki/Constant%20false%20alarm%20rate | Constant false alarm rate (CFAR) detection refers to a common form of adaptive algorithm used in radar systems to detect target returns against a background of noise, clutter and interference.
Principle
In the radar receiver, the returning echoes are typically received by the antenna, amplified, down-converted to an intermediate frequency, and then passed through detector circuitry that extracts the envelope of the signal, known as the video signal. This video signal is proportional to the power of the received echo. It comprises the desired echo signal as well as the unwanted signals from internal receiver noise and external clutter and interference. The term video refers to the resulting signal being appropriate for display on a cathode ray tube, or "video screen".
The role of the constant false alarm rate circuitry is to determine the power threshold above which any return can be considered to probably originate from a target as opposed to one of the spurious sources. If this threshold is too low, more real targets will be detected, but at the expense of increased numbers of false alarms. Conversely, fewer targets will be detected if the threshold is too high, but the number of false alarms will also be low. In most radar detectors, the threshold is set to achieve a required probability of false alarm (equivalently, false alarm rate or time between false alarms).
Suppose the background against which targets are to be detected is constant with time and space. In that case, a fixed threshold level can be chosen that provides a specified probability of false alarm, governed by the probability density function of the noise, which is usually assumed to be Gaussian. The probability of detection is then a function of the signal-to-noise ratio of the target return. However, in most fielded systems, unwanted clutter and interference sources mean that the noise level changes both spatially and temporally. In this case, a changing threshold can be used, where the threshold level is raised and lowered to maintain a constant probability of false alarm. This is known as constant false alarm rate (CFAR) detection.
Cell-averaging CFAR
Detection occurs when the cell under test exceeds the threshold. In most simple CFAR detection schemes, the threshold level is calculated by estimating the noise floor level around the cell under test (CUT). This can be found by taking a block of cells around the CUT and calculating the average power level. Cells immediately adjacent to the CUT are normally ignored to avoid corrupting this estimate with power from the CUT itself (and referred to as "guard cells"). A target is declared present in the CUT if it is greater than all its adjacent cells and greater than the local average power level. The estimate of the local power level may sometimes be increased slightly to allow for the limited sample size. This simple approach is called a cell-averaging CFAR (CA-CFAR).
Other related approaches calculate separate averages for |
https://en.wikipedia.org/wiki/Global%20Peace%20and%20Justice%20Auckland | Global Peace and Justice Auckland (GPJA) describes itself as "a network of people who provide a platform for individuals and groups to discuss and organise co-operatively on peace and justice issues." They are well known for organising the Auckland component of the global February 15, 2003 anti-war protest that attracted 10, 000 people to protest the impending United States attack on Iraq.
GPJA also became notable when on March 19, 2005 a GPJA organised march of around 300 people who marched up Auckland's Queen Street and into the ANZ Bank on the corner of Victoria and Queen Streets.
As a result of the bank occupation a standoff between GPJA organisers and police began. After about an hour of occupying the bank and the road outside five people were arrested for allegedly blocking the road. Police tried to arrest GPJA organiser Simon Oosterman and protestors attempted to stop them resulting in violence between protestors and police.
See also
List of anti-war organizations
References
External links
GPJA official website
Anti-imperialism in Oceania
Anti–Iraq War groups
Peace organisations based in New Zealand
Organisations based in Auckland
2000s in Auckland |
https://en.wikipedia.org/wiki/PLSI | PLSI may refer to:
Probabilistic latent semantic indexing, statistical technique for the analysis of two-mode and co-occurrence data
People's Linguistic Survey of India, linguistic survey to update existing knowledge about the languages spoken in India |
https://en.wikipedia.org/wiki/Edam | Edam may refer to:
Edam cheese
Edam, Netherlands, a town in Edam-Volendam, after which the cheese is named
Edam, Saskatchewan, a village in Canada
Evernote Data Access and Management (EDAM), a protocol for exchanging Evernote data with the Evernote service
, the name of several Holland America Line vessels |
https://en.wikipedia.org/wiki/Computer%20network%20operations | Computer network operations (CNO) is a broad term that has both military and civilian application. Conventional wisdom is that information is power, and more and more of the information necessary to make decisions is digitized and conveyed over an ever-expanding network of computers and other electronic devices. Computer network operations are deliberate actions taken to leverage and optimize these networks to improve human endeavor and enterprise or, in warfare, to gain information superiority and deny the enemy this enabling capability.
In the military domain
Within the United States military domain, CNO is considered one of five core capabilities under Information Operations (IO) Information Warfare. The other capabilities are Psychological Operations (PSYOP), Military Deception (MILDEC), Operations Security (OPSEC) and Electronic Warfare (EW). Other national military organizations may use different designations.
Computer Network Operations, in concert with electronic warfare (EW), is used primarily to disrupt, disable, degrade or deceive an enemy's command and control, thereby crippling the enemy's ability to make effective and timely decisions, while simultaneously protecting and preserving friendly command and control.
Types of military CNO
According to Joint Pub 3-13, CNO consists of computer network attack (CNA), computer network defense (CND) and computer network exploitation (CNE).
Computer network attack (CNA): Includes actions taken via computer networks to disrupt, deny, degrade, or destroy the information within computers and computer networks and/or the computers/networks themselves.
Computer network defense (CND): Includes actions taken via computer networks to protect, monitor, analyze, detect and respond to network attacks, intrusions, disruptions or other unauthorized actions that would compromise or cripple defense information systems and networks. Joint Pub 6.0 further outlines Computer Network Defense as an aspect of NetOps:
(CNE): Includes enabling actions and intelligence collection via computer networks that exploit data gathered from target or enemy information systems or networks.
See also
Cyberwarfare in the United States
Chinese information operations and information warfare
Cyberwarfare by Russia
References
External links
Cyber, War and Law
United States Army Combined Arms Center
Information operations and warfare
United States Department of Defense doctrine |
https://en.wikipedia.org/wiki/Sandstorm%20Enterprises | Sandstorm Enterprises was an American computer security software vendor founded in 1998 by Simson Garfinkel, James van Bokkelen, Gene Spafford, Dan Geer. In January 2010, it was purchased by NIKSUN, Inc.
Sandstorm was located in the greater Boston area. Sandstorm's major products were PhoneSweep, the first commercial multi-line telephone scanner (a war dialer), introduced in 1998, and NetIntercept, a commercial network forensics tool, introduced in 2001. Designed as a second-generation network analysis tool, NetIntercept operated primarily at the level of TCP and UDP data streams and application-layer objects they transport.
In 2002 Sandstorm purchased LanWatch, a commercial packet-oriented LAN monitor originally developed by FTP Software. LanWatch was sold a separate product, but much of its functionality was used by NetIntercept to display individual packets.
As of 2019, the PhoneSweep product is still sold and supported by NIKSUN. Core parts of the NetIntercept product also still exist, as incorporated into NIKSUN's own NetDetector network forensics product line.
References
External links
PhoneSweep at NIKSUN, Inc.
Computer security software companies
Defunct software companies of the United States
Software companies based in Massachusetts
Companies based in Middlesex County, Massachusetts
Software companies established in 1998
Software companies disestablished in 2010
1998 establishments in Massachusetts
2010 disestablishments in Massachusetts |
https://en.wikipedia.org/wiki/Alan%20Quartermaine%20%28General%20Hospital%29 | Alan Quartermaine is a fictional character from General Hospital, an American soap opera on the ABC network. Created by head writer Douglas Marland, Stuart Damon first appeared in the role on May 13, 1977.
Casting
Damon first appeared in the role of Alan Quartermaine on May 13, 1977. After several nominations, in 1999, Damon won his first Daytime Emmy Award in the Outstanding Supporting Actor category for his portrayal of Alan during his addiction to the drug Hydrocodone. After 30 years with the series, Damon was reportedly fired from the series and would exit in early 2007. Though Alan dies on-screen in February 2007, Damon continued appearing as Alan's ghost until December 23, 2008. Damon once again returned to the role for a dream sequence episode on August 29, 2011. In October 2012, TV Guide's Nelson Branco revealed that Damon had started taping scenes once again and Soap Opera Digest later verified that Damon would bring Alan's ghost back to the canvas in November. Stuart reprised the role of Alan on April 1 and 2, 2013, in celebration of the soap's 50th anniversary. An uncredited actor portrayed the role briefly on April 1, 2014, when the character appeared as a ghost to help bring A. J. Quartermaine to heaven.
Storylines
Backstory
Alan James Quartermaine is born on July 4, 1945 in Southampton, New York to the wealthy and influential, Lila and Edward Quartermaine. He and little sister, Tracy are raised with every advantage money can buy and they are spoiled rotten. During his early years as a medical student, Alan has an affair with Rae Cummings who would give birth to a daughter, Skye. The controlling Edward steals the infant and sells the child on the black market, and tells Rae the child is dead. Alan knew all along that Rae was pregnant but he wasn't sure he was ready to be a father. As of 2012, Alan's date of birth has been revised to February 23, 1948.
1970s–1980s
Dr. Alan Quartermaine is contacted by General Hospital's chief of staff, Steve Hardy to help with funding the new cardiac wing. He catches the eye of Dr. Monica Webber and the two clash in their work. Their relationship develops into a romance and Alan chooses to stay in Port Charles; his wealthy, and colorful family soon follows. Alan and Monica marry on March 7, 1978 but their happiness is threatened due to Monica's growing closeness to her former love, Dr. Rick Webber. In 1979, Alan and Monica welcome their son, Alan Jr; however, Tracy leads her brother to believe Rick is the boy's father. A furious Alan plots to kill the lovers in 1980; at the last minute, Alan rescues them realizing he'd be the only suspect. Alan and Monica's marriage is tested again when Alan begins having an affair with Susan Moore which leads to the birth of his son, Jason in 1981. During this time, Alan and Monica's only civil encounters were their shared suspicion that Alan's cousin, Alexandria, was up to something shady, which Alan feared might prevent him from being able to continue to suppor |
https://en.wikipedia.org/wiki/Timex%20FDD3000 | The Timex FDD 3000 in 1982 was a nearly complete computer by Timex of Portugal. It began its development at Timex Computer Corporation in the U.S., but it was at Timex of Portugal that the work was finished.
The Timex FDD 3000 is an upgraded Timex FDD (sometimes known as the FDD3 because it consisted of three separate boxes: the disk drive, the controller and the power supply). The Timex FDD3 was intended as a floppy disk peripheral for the Timex TC 2048 or TC 2068 microcomputers. It usually had 16K RAM and only one 3″ disk drive, but it could be upgraded to 64K RAM and a second disk drive, making it capable of running CP/M. Since the controller is electrically compatible with today's disk drives, it is possible to connect a 3.5″/5.25″ disk drive to the Timex FDD3 Controller (it's also possible to connect a Hitachi 3″ disk drive to an IBM PC Compatible computer).
Later, Timex combined the three boxes of the FDD into one big box called the Timex FDD 3000. Timex also added 64K RAM, a second 3″ floppy disk drive and a line in the controller cable to pass the video signal generated by the Timex Terminal 3000 to the back of FDD 3000 box.
Timex FDD/FDD 3000 usage
The FDD/FDD 3000 can be used as a disk drive peripheral or as a CP/M computer.
As a disk drive system running TOS (Timex Operating System) connected to a ZX Spectrum, TC 2048/2068 or T/S 2068 in Spectrum mode with a twister board for the rear bus connection.
As a CP/M computer using a TC 2048/2068 running Timex Terminal Emulator or using a Timex Terminal 3000 and a composite video monitor as a console.
The Timex FDD/FDD 3000 does not have a built-in operating system so a disk with the TOS is needed to boot it. Timex released TOS A.2 and CP/M. In Poland the TOS was modified and released as TOS A.4 and Jarek Adamski developed a new OS called ZXVGS. To use CP/M on the FDD 3000 without the TT 3000, a terminal emulator must be loaded on the computer (ZX Spectrum/TC 2048/TC 2068/TS 2068 in Spectrum mode) before CP/M will boot.
To use the FDD or FDD 3000 with a computer, an interface module is needed. It's called Timex Interface (TI) and contains the FDD/FDD 3000 initialization code in a ROM.Because of the differences between the TC 2048 and the TC 2068 ROMs, there are two TI versions: an all-black version for ZX Spectrum & TC 2048 and a black with silver reset button for T/S & TC 2068. The TI TC 2048 version can be used with T/S & TC 2068 plus emulator cartridge (it has to be a "bootable" cartridge as you cannot type OUT 244,3 because the computer will crash).
Zebra Systems Inc. sold an all-silver TI. There is a TI ROM version that will work with ZX Spectrum 128.
Clones
Zebra Systems sold the Timex FDD as the "Zebra" FDD, in silver boxes to match the TS2068 (Timex FDD was sold in black boxes in Europe).
Zebra Systems sold the Timex FDD 3000 as Zebra FDD 3000 in the US with the same box.
Unipolbrit made some changes in the design of FDD, putting everything in only one box, but not the same a |
https://en.wikipedia.org/wiki/Alexandrescu | Alexandrescu is a Romanian surname. Notable people with the surname include:
Andrei Alexandrescu (born 1969), Romanian-American computer programmer
Grigore Alexandrescu, poet
Vasile Alexandrescu Urechia, historian and politician
See also
Alexe (name)
Alexandreni (disambiguation)
Romanian-language surnames
Patronymic surnames
Surnames from given names |
https://en.wikipedia.org/wiki/Navara | Navara may refer to:
David Navara, Czech chess grandmaster
Nissan Navara, pickup truck
Navara, a division of RAM Mobile Data, mobile device software company
See also
Navarra
Anna Navarre, of the Major Deus Ex characters
Novara (disambiguation) |
https://en.wikipedia.org/wiki/CITV%20%28disambiguation%29 | CITV is a British free-to-air children's television programming block and former children's channel owned by ITV plc.
CITV may also refer to one of the following:
CITV-DT, Global Television Network owned-and-operated station in Edmonton, Alberta
CITV (Bermuda), local government-run channel in Bermuda
CiTV (Estonia), former television channel in Estonia
Commander's Independent Thermal Viewer, as on M1A2 and later variants of the M1 Abrams tank and many other modern tanks.
Co-operative Institute of Technology, Vatakara, Engineering college in Kerala, India |
https://en.wikipedia.org/wiki/Butv10 | BUTV10 (stylized butv10) is Boston University’s student-operated media production and distribution network. Live-streamed and on-demand programming is available online at butv10.com and on campus television channel 10. The network's production facilities and administrative departments are based at the Boston University College of Communication (COM).
Established in 1984 as BUTV by then COM freshman Staffan Sandberg and rebranded BUTV10 in 2005, the organization produces an array of news, information, sports, drama, comedy, and variety programming. Content has received multiple Associated Press, NATAS, Telly, and Webby Award recognitions.
Origins
BUTV was established in 1984 by COM freshman Staffan Sandberg. Though students produced content under the BUTV umbrella for two decades, Boston University had no formal distribution platform. According to butv10 faculty advisor Christophor Cavalieri, once the campus was wired for cable, the plan for a student-run television station was initiated in September 2005. The name BUTV10 was announced in November 2005, and the channel premiered on February 22, 2006. The student production group was also renamed Growling Dog Productions, as BU's mascot is Rhett the Boston Terrier. The network's production facilities and administrative departments are based at the College of Communication. Membership is open to any BU student.
Programs
Awards and nominations
butv10 has received various awards and nominations. In 2007, Inside Boston executive producers Ted Fioraliso and Brittany Oat won the Fox News Channel College Challenge for a news package on an eminent domain case, receiving cash prizes for themselves and butv10.
References
External links
Boston University College of Communication
Student television stations in the United States
Boston University |
https://en.wikipedia.org/wiki/Chatcord | A Chatcord is a compact device that connects the duplex audio stream between a sound card of a computer, and the telephone-set. It enables the use of a Plain Old Telephone System (POTS) to talk via the Internet away from the computer, after a connection is established from the desktop using your specific softphone (such as MSN or Skype).
A number of compact devices exist, as well as many Do It Yourself web pages where instructions for assembling one are given.
External links
Search for 'chatcord' on Google.
https://web.archive.org/web/20061127044532/http://walle.nerdhero.org/chatcord/: Chatcord DIY (not tested, use at your own risk).
https://web.archive.org/web/20160330064718/http://www.chat-cord.com/: Chatcord website.
http://www.grynx.com: Another DIY Chatcord, uses a couple of accessible electrical components and uses either a 9v battery or USB cable for power
Computer peripherals |
https://en.wikipedia.org/wiki/Zeroday%20Emergency%20Response%20Team | In computer security, the Zeroday Emergency Response Team (ZERT) was a group of volunteer security researchers who produced emergency patches for zero day attack vulnerabilities in proprietary software. They came to public notice in late September 2006 with a patch for that month's Vector Markup Language vulnerability before Microsoft, later producing a patch for older versions of Microsoft Windows which are no longer supported by Microsoft.
The team included several members prominent in antivirus and network security work.
Their manifesto states: "ZERT members work together as a team to release a non-vendor patch when a so-called "0day" (zero-day) exploit appears in the open which poses a serious risk to the public, to the infrastructure of the Internet or both. The purpose of ZERT is not to "crack" products, but rather to "uncrack" them by averting security vulnerabilities in them before they can be widely exploited."
The ZERT website has not been updated since April 2007 and the group is presumed to be inactive.
References
Zero-Day Response Team Launches with Emergency IE Patch (Ryan Naraine, eWeek, 22 September 2006)
ZERT Patches Out-of-Support Windows OS (Ryan Naraine, eWeek, 29 September 2006)
External links
Home page
Computer security organizations
Computer security exploits
Volunteer organizations
Emergency organizations |
https://en.wikipedia.org/wiki/Anna%20Botting | Anna Elizabeth Botting (born 4 November 1967) is an English news presenter with Sky News, a broadcasting network based in the United Kingdom. She currently presents Sky News from 21:00 until midnight from Monday to Thursday. Prior to the channel's rescheduling in July 2006, Botting presented The Sky Report, and from then until February 2007, she presented Sky News from 18:00 to 20:00 alongside Jeremy Thompson.
Background
Botting, born in Cranleigh, Surrey, is the daughter of Douglas Botting, explorer and author, and Louise Botting, a company director and former broadcaster. She studied Geography at St Edmund Hall, Oxford University, before deciding to pursue a career in journalism. She took a postgraduate course in journalism at Cardiff University, before beginning work in Manchester as a researcher for a social action show for Granada Television. In 1991, Botting took a job with BBC North as a reporter for radio and TV. From here she became a presenter for the local news programme, Look North.
Botting joined Sky News in 1995, meaning that she is now one of the network's longest-serving presenters. She has presented a wide range of programmes on Sky, including: Sky News Today, Sky News at Ten, Live at Five, Sky News Tonight and The Sky Report.
Career at Sky
Anna Botting joined Sky News in 1995 as a reporter, before moving into the studio to anchor the news. During the 1997 election Botting shadowed Liberal Democrat leader Paddy Ashdown, day-in day-out, for the whole six weeks of the campaign. She was also the first journalist to arrive at Kensington Palace on the day Diana, Princess of Wales died.
Botting also covered the death of Pope John Paul II and anchored coverage of the wars in Afghanistan and Iraq from the studio. She was presenting on air when Serbian leader Slobodan Milosevic was ousted from office.
In Summer 2006, whilst anchoring from Israel, Botting interviewed the British politician George Galloway about the Israel-Lebanon war. Galloway criticised Sky News, News Corporation and Botting in person for being biased towards Israel.
Anna Botting notably won the Royal Television Society's news presenter of the year award in May 2012 and became the second woman to do so; this followed her return from Japan and location anchoring work for Sky News following the tsunami of March 2011. She reported from Fukushima Nuclear Power Station and northwest Honshu Island in the aftermath of the disaster. Botting also anchored on location during the fall of Tripoli in 2011.
Botting had notably worked alongside the former Sky presenter Bob Friend before her popular partnership with Jeremy Thompson on Live at Five took off.
Botting appeared as herself in the 2014 science fiction action film Edge of Tomorrow, which stars Tom Cruise and Emily Blunt.
Botting led Sky News' coverage of the Funeral of Elizabeth II with Alastair Bruce on 19 September 2022.
Personal life
A keen rower during her time at university, Botting took part in BBC Three's The O |
https://en.wikipedia.org/wiki/Patrick%20Manning%20%28historian%29 | Patrick Manning (born June 10, 1941) is the Andrew W. Mellon Professor of World History, Emeritus, at the University of Pittsburgh. He is also president of the World History Network, Inc., a nonprofit corporation fostering research in world history. A specialist in world history and African history, his current research addresses global historiography, early human history, migration in world history, the African diaspora, and the demography of African slavery.
He was educated at the California Institute of Technology (BS in Chemistry, 1963) and the University of Wisconsin–Madison (MS in History and Economics, PhD in History 1969). He was trained as a specialist in the economic history of Africa, and went on to explore demographic, social, and cultural patterns in Africa and the African diaspora. Manning taught at Northeastern University, 1984–2006, where he directed the World History Center.
He served as Vice President of the Teaching Division of the American Historical Association, 2004–2006, and as President of the American Historical Association in 2016.
Publications
A History of Humanity: The Evolution of the Human System (Cambridge: Cambridge University Press, 2020). Theory and narrative of human social evolution.
Methods for Human History: Studying Social, Cultural, and Biological Evolution (New York: Palgrave Macmillan, 2020).
Migration in World History (London: Routledge; 3rd edition, 2020; 2nd edition, 2012; 1st edition, 2004). A concise survey of processes of migration in human history from early hominids until today. With Tiffany Trimmer.
Knowledge in Translation: Global Patterns of Scientific Exchange, 1000 - 1800 CE(Pittsburgh: University of Pittsburgh Press, 2018). Co-editor, with Abigail E. Owen.
Global Transformation in the Life Sciences, 1945-1980 (Pittsburgh: University of Pittsburgh Press, 2018). Co-editor, with Mat Savelli.
Global Scientific Practice in an Age of Revolution. (Pittsburgh: University of Pittsburgh Press, 2016). Co-editor, with Daniel Rood.
Big Data in History (Basingstoke, UK: Palgrave Macmillan, 2013).
The African Diaspora: A History Through Culture (New York: Columbia University Press, 2009).
World History: Global and Local Interactions (Princeton: Markus Wiener Publishers, 2005). Editor, with twelve contributions by new scholars in world history.
Navigating World History: Historians Create a Global Past (New York: Palgrave Macmillan, 2003). A critical overview of the field of world history.
Slave Trades, 1500–1800: Globalization of Forced Labour (Variorium: Aldershot, Great Britain, 1996). Volume 15 of An Expanding World, edited by A. J. Russell-Wood. (ed. and introduction).
History from South Africa: Alternative Visions and Practices (Philadelphia: Temple University Press, 1991). Co-editor, along with Joshua Brown, Karin Shapiro, Jon Wiener, Belinda Bozzoli and Peter Delius, of this collection of articles, mostly written by South African authors.
Slavery and African Life: Occidental, Oriental, an |
https://en.wikipedia.org/wiki/Taiga%20Rescue%20Network | Taiga Rescue Network (TRN) was an international network of more than 200 non-governmental organizations, indigenous peoples and individuals working to defend the world's boreal forests, also known as Taiga. TRN was established in 1992 to give a voice to support, link and publicize local struggles fighting for the boreal forests and its peoples. TRN no longer exists. In 2010, TRN held its last conference in Sweden. The website remained online until April 2013.
Mission and Goals
TRN's mission was support local struggle and strengthen the cooperation between individuals, NGOs and indigenous peoples and nations concerned with the protection, restoration and sustainable use of the world's boreal forests by means that ensure the integrity of natural processes and dynamics.
The goals of the network were 1) Promoting socially beneficial, economically viable and ecologically sound management of the boreal forests; 2) Ensuring Indigenous Peoples rights are respected and local control of resources is guaranteed; 3) Protecting old-growth Northern forests; and 4) Halting destructive extraction and wasteful consumption of products from boreal forests.
Methods
Education and Advocacy
The network worked to disseminate information among governments, industry, and the general public about boreal forest issues by publishing Taiga News, a quarterly publication covering social and environmental issues relating to the entire boreal region; producing fact sheets on sensitive areas under particular threat; compiling profiles of key industry players; publishing reports and studies that critically analyze the trends and challenges facing the boreal region; participating in an ongoing dialogue with public administrations and the private sector on local, national and international levels to strengthen environmental regulations related to forest protection and sustainable forest management in the boreal region; organizing a biennial international conference bringing together various stakeholders (scientists, environmental organizations, indigenous peoples support groups, industry, media).
Campaign Coordination
TRN promoted cooperation through joint projects among NGOs and indigenous peoples by uniting and informing the NGO and indigenous communities through meetings, conferences and seminars; publishing a monthly internal newsletter The Boreal Bulletin with concise and up to date strategic information; managing several topical email lists to improve project coordination and information exchange; supporting environmentalists and indigenous peoples in the boreal region with small grants.
Research and Policy Analysis
The network coordinated NGO input into various national and international processes and facilitate joint position papers outlining the NGO vision for sustainable forestry in the boreal region; monitored the various national and international certification and ecolabelling processes and supported independent, performance based certification, such as the a |
https://en.wikipedia.org/wiki/David%20S.%20Wall | David S. Wall FRSA FAcSS is Professor of Criminology at the Centre for Criminal Justice Studies, School of Law, University of Leeds, England, where he researches and teaches cybercrime, policing, organised and transnational crime and intellectual property crime. He rejoined the University of Leeds in August 2015 from Durham University, where he was Professor of Criminology. Between 2011 and 2014 he was Head of the School of Applied Social Sciences (SASS). Before moving to Durham in 2010 he was Professor of Criminal Justice and Information Society at the University of Leeds, where he also held the position of Head of the School of Law (2005–2007) and Director of the Centre for Criminal Justice Studies (2000–2005). He is a Fellow of the Alan Turing Institute.
Research
Wall's specialist area of research is crime and information technology, particularly with regard to policing and cybercrime, organised crime and intellectual property crime (counterfeiting). He has a sustained track record of conducting sole and collaborative research projects for the EU, AHRC, ESRC, EPSRC, Nuffield, Home Office, Law Society and many others. He is currently conducting various interdisciplinary research projects into Cybercrime and Cybersecurity (RIUK (formerly RCUK) with various partners). The first is 'Cybercrime in the Cloud' – Critical (EPSRC/ESRC – EP/M020576/1) (with Newcastle and Durham Universities) – for further information see the Northern Cloud Crime Centre website. The second is 'Ransomware and Crimes of Extortion' (Emphasis – Economical, Psychological and Societal Impact of Ransomware) (ESPRC/ESRC – EP/P011772/1) with Kent, De Montfort, City and Coventry universities. The third is 'Organized crime and terror networks Takedown' – (Horizon 2020 – Grant 700688)(with 19 European universities and agencies). He has finished projects on Organised Crime (FP7) with Transcrime (Università Cattolica del Sacro Cuore of Milan and the University of Trento)); Policing Cybercrime; and Counterfeit pharmaceuticals. He recently completed a partnership with Transcrime and the CNRS, (Sorbonne, Paris) looking at "Public and Private Partnerships for Reducing Counterfeiting of Fashion Apparels and Accessories" as part of the EU Aegis Programme Framework 6.
He is currently working on projects regarding celebrity and law and on policing cybercrime. His recent publications have been on the organization of cybercrime, policing cybercrime, copyright trolling, and 'online micro-frauds', which include, amongst other offences, scareware, click fraud and phishing.
A selection of pre-print versions of his articles and working papers can be found on the SSRN site and in The Conversation. Further information can be found on his University of Leeds website.
Publications
His publications include 12 books on his various research topics and 55 or more articles, chapters and reports.
His books are as follows:
Wall, D.S. and Williams, M.L. (2014) (eds) Policing Cybercrime: Networked and Soc |
https://en.wikipedia.org/wiki/Cut%20%28logic%20programming%29 | The cut, in Prolog, is a goal, written as !, which always succeeds but cannot be backtracked. Cuts can prevent unwanted backtracking, which could add unwanted solutions and/or space/time overhead to a query.
The cut should be used sparingly. While cuts can be inserted into code containing errors, if a test is unnecessary because a cut has guaranteed that it is true, it is good practice to say so in a comment at the appropriate place.
Some programmers call the cut a controversial control facility because it was added for efficiency reasons only and is not a logical formula.
Types
Green cut
The use of a cut that only improves efficiency is referred to as a green cut. Green cuts are used to make programs more efficient without changing program output. For example:
gamble(X) :- gotmoney(X),!.
gamble(X) :- gotcredit(X), \+ gotmoney(X).
This is called a cut operator. The ! tells the interpreter to stop looking for alternatives; however, if fails it will check the second rule. Although checking for in the second rule may appear redundant since Prolog's appearance is dependent on failing before, otherwise the second rule would not be evaluated in the first place. Adding guarantees that the second rule will always work, even if the first rule is removed by accident, changed, or moved after the second one.
Red cut
A cut that is not a green cut is referred to as a cut, for example:
gamble(X) :- gotmoney(X),!.
gamble(X) :- gotcredit(X).
Proper placement of the cut operator and the order of the rules are required to determine their logical meaning. If for any reason the first rule is removed (e.g. by a cut-and-paste accident) or moved after the second one, the second rule will be broken, i.e., it will not guarantee the rule .
References
Logic programming |
https://en.wikipedia.org/wiki/Margo%20Seltzer | Margo Ilene Seltzer is a professor and researcher in computer systems. She is currently the Canada 150 Research Chair in Computer Systems and the Cheriton Family Chair in Computer Science at the University of British Columbia. Previously, Seltzer was the Herchel Smith Professor of Computer Science at Harvard University's John A. Paulson School of Engineering and Applied Sciences and director at the Center for Research on Computation and Society.
Education
Seltzer received her A.B. in Applied Mathematics at Harvard/Radcliffe College in 1983, where she was teaching assistant under Harry R. Lewis at Harvard University. In 1992, she received her Ph.D. in computer science from the University of California, Berkeley where her dissertation, "File System Performance and Transaction Support", was supervised by Michael Stonebraker. Her work in log-structured file systems, databases, and wide-scale caching is especially well-known, and she was lead author of the BSD-LFS paper.
Career
Academia
Seltzer became an Assistant Professor of Computer Science at Harvard University in 1992, and an Associate Professor in 1997. She held endowed chairs as a Gordon McKay Professor of Computer Science in 2000, and as the Herchel Smith Professor of Computer Science in 2004. From 2005 to 2010, Seltzer was designated a Harvard College Professor in recognition of "particularly distinguished contributions to undergraduate teaching." Seltzer was the Associate Dean of the School of Engineering and Applied Sciences from 2002 to 2006, and an advisor to the Harvard Undergraduate Women in Computer Science.
In September 2018, Seltzer joined the faculty at the University of British Columbia Department of Computer Science as the Canada 150 Research Chair in Computer Systems and the Cheriton Family Chair in Computer Science. In February 2019, she was elected a member of the National Academy of Engineering.
Business
Seltzer was Chief Technical Officer of Sleepycat Software (developers of the Berkeley DB embedded database) from 1996 to 2006, when the company was acquired by Oracle Corporation. She served as an architect on the Oracle Berkeley DB team for several years before transferring to Oracle Labs where she continues to act as an architect.
Seltzer was a director of USENIX from 2005 to 2014, serving as vice president for one year and president for two. In 2019, she received the USENIX Lifetime Achievement Award for her seminal work on BerkeleyDB and provenance systems and her dedication to the USENIX community at large.
In 2011, Seltzer was made a Fellow of the Association for Computing Machinery (the Association's highest member grade) in recognition of "outstanding accomplishments in computing and information technology and/or outstanding service to ACM and the larger computing community." In July 2020, Seltzer accepted the SIGMOD Software Systems award on behalf of the Sleepycat Software team.
Personal life
She is married to software developer Keith Bostic.
References
|
https://en.wikipedia.org/wiki/Richard%20Gabriel | Richard Gabriel may refer to:
Richard P. Gabriel (born 1949), expert on the Lisp programming language
Richard S. Gabriel (born 1952), West Indian cricketer
Richard A. Gabriel, historian and author
Richard L. Gabriel (born 1962), a Justice of the Colorado Supreme Court
See also
Gabriel Richard (1767–1832), French Roman Catholic priest and founder of the University of Michigan |
https://en.wikipedia.org/wiki/DWLL | DWLL (94.7 FM), broadcasting as Mellow 94.7, is a radio station owned and operated by FBS Radio Network. The station's studio and transmitter are located at Unit 908, Paragon Plaza Building, EDSA, Mandaluyong. It broadcasts daily from 6:00 AM to 10:00 PM on terrestrial radio and 24/7 online.
History
1973–2006: Mellow Touch 94.7
The station began its broadcast in 1973 as WLL 94.7 or Mellow Touch 94.7. It is the Philippines' pioneering soft adult contemporary station that only relied on spinners and a newscaster in its programming. While most FM radio stations' format at the time was predominantly strident, Mellow Touch capitalized on a "more music, less talk" programming strategy. This formula proved to be successful as other radio stations followed suit after the fact. It has, since, established itself as the station for relaxing and feel-good music.
At that time, their studios were located at the now-demolished Philippine Communications Center building (PHILCOMCEN) in Pasig City.
Former DWBL disc jockey Butch Gonzales provided pre-recorded voiceovers to bridge segues between songs and to serve the purpose of occasional time-checks, usually at the "Top" and "Bottom" of certain hours of each day. Gonzales' voice also became the Mellow Touch's signature voice, as he softly reminded the loyal listeners of tunes for "a walk in the park" or "a bike ride along the boulevard", every hour as the station ID and jingle played. The sound of his voice would gradually transition to “natural,” soft and sentimental music that was clearly associated with this FM station at the time. The station's top of the hour ID became one of the most recognizable radio anthems on Philippine FM radio. The jingle, with the lyrics, "You are the minstrel... and I your guitar…", was produced by Dallas-based TM Studios (formerly TM Productions). The lyrics from this radio branding image were specifically customized and altered to meet Mellow Touch’s programming philosophy, called "The Mellow Sound.” The jingle eventually became the station's most iconic trademark.
In November 1996, in a groundbreaking move, the station instituted a major reformat by accommodating on-air jocks. Scott Free (Drew Domingo in real life, who is currently the Station Manager), Harry Maze (Harry Corro), Ted Bear (Renan Baluyut), and Riz Taylor (Ariz Peter Fuentez), were the first deejays to go on board. Ruth Cabal (formerly of GMA News, now on CNN Philippines) became one of its first lady newscasters, replacing long-time newscaster Ernie Fresnido. Despite the emergence of deejays in its programs, the station maintained its programming objective of “more music, less talk” to this day.
Among its most notable programs were Mellow Midweek, a Thursday special that featured the station's greatest love songs from the 70s, 80s, and 90s; and Straight From The Heart, a Sunday special that highlighted its classic easy listening staples from the 70s and 80s. These two specials, considered as benchmark class |
https://en.wikipedia.org/wiki/Applied%20Technology | Applied Technology was founded by Owen Hill in 1975 in Australia. He was a pioneer producer of home computers that ran CP/M on Zilog Z80 microprocessors. Their MicroBee computer (1982) was the first commercial personal computer manufactured in Australia. The computers were used by schools in Australia and Sweden and by BMW car dealers in Australia.
It was later known as Microbee Systems, Microworld and Honeysoft.
Some models of mid-1980s are Applied Technology S100, Micro Bee 32IC, Micro Bee 128K, "Computer in a Book" and the 256TC.
References
External links
Discussion Forum for all things Microbee & extensive File Repository
Focus On MicroBee, Electronics Today International, August 1985
1980s Applied Technology Advertisements
Defunct computer companies of Australia
Home computer hardware companies
Defunct technology companies of Australia
Computer companies established in 1975 |
https://en.wikipedia.org/wiki/Microworlds | Microworld is the world as it exists at a microscopic scale. Besides, it may also refer to:
Microworld (video game), a 1981 text adventure game
MicroWorlds, a computer program using the Logo programming language
MicroWorlds JR
Microworlds: Writings on Science Fiction and Fantasy, a 1984 book by Stanisław Lem
Nature's Microworlds, a 2012 British nature documentary series
Applied Technology, a company also known as Microworld |
https://en.wikipedia.org/wiki/List%20of%20programmes%20broadcast%20by%20Sky%20Sci-Fi | This list represents television programmes that have aired on the Sky Sci-Fi channel in the United Kingdom.
First-run programming
Day Of The Dead
SurrealEstate
From
Chucky
Train
Monstrous
Reginald The Vampire
Repeat programming
Alphas
A Discovery of Witches
Firefly
Dark Matter
Fringe
Futurama
Fortitude
Human Target
Intergalactic
Grimm
Merlin
Project Blue Book
Wynonna Earp
The Leftovers
Manifest
Westworld (season 1 and 2)
Watchmen
Killjoys
The Outpost
Pandora
Penny Dreadful: City of Angels
Siren
Star Trek: Deep Space Nine
Star Trek: The Next Generation
Star Trek: Enterprise
Stargate SG-1
Spides
Stargate Atlantis
Stan Lee's Lucky Man
The Twilight Zone
Trickster
The Librarians
Star Trek: Voyager
True Blood
V
Stephen King's It
No longer aired
3rd Rock from the Sun
Andromeda
The Bionic Woman
Blake's 7
Century City
Continuum
The Day of the Triffids
Doctor Who
Eastwick
Eli Stone
Farscape
La Femme Nikita
Flash Gordon
Guyver
Heroes
The Incredible Hulk
John Doe
Knight Rider
Knightmare
The Last Train
Lois & Clark: The New Adventures of Superman
The Lost World
Medium
Mysterious Ways
Mystery Science Theater 3000
Neon Genesis Evangelion
Poltergeist: The Legacy
The Pretender
Profiler
Push, Nevada
Quantum Leap
Ripley's Believe It or Not!
Roswell
SeaQuest DSV
The Sentinel
She Spies
The Six Million Dollar Man
Sliders
Star Trek: The Animated Series
Swamp Thing
Tales of the Unexpected
Thunderbirds
A Town Called Eureka
Tru Calling
The Exorcist
The Twilight Zone
Wonder Woman
See also
List of Syfy programs
External links
Syfy UK: Shows
Syfy (British and Irish TV channel)
Syfy
Syfy (UK and Ireland) |
https://en.wikipedia.org/wiki/Common%20Lisp%20the%20Language | Common Lisp the Language is a reference book by Guy L. Steele about a set of technical standards and programming languages named Common Lisp.
History
Before standardizing
The first edition (Digital Press, 1984; ; 465 pages) was written by Guy L. Steele Jr., Scott E. Fahlman, Richard P. Gabriel, David A. Moon, and Daniel L. Weinreb. It served as the basis for the Common Lisp technical standard by the American National Standards Institute (ANSI), and is thus termed ANSI Common Lisp.
During standardizing
The second edition (Digital Press, 1990; ; 1029 pages) was written by Guy L. Steele Jr. It reflected the then-current status of the standardizing process and documented important new features such as Common Lisp Object System (CLOS), the loop macro, and conditions. It also has a chapter on series and generators.
After standardizing
The ANSI Common Lisp standard was published in 1994 and differs from the language dialects described in Common Lisp the Language (1984) and Common Lisp the Language, Second Edition (1990). Substantive additions and deletions were made between the time of the Second Edition and the final version of ANSI Common Lisp. Also, series and generators were discussed in appendix matter of the Second Edition but were not a part of any working draft nor the final version of ANSI Common Lisp.
Although ANSI Common Lisp and the language dialects described by the two editions of Common Lisp the Language differ, the ANSI Common Lisp specification indirectly acknowledges the practical importance of Common Lisp the Language (first and second edition) by explicitly suggesting the reserved words (keywords) :cltl1 and :cltl2 for potential inclusion on the *features* list, allowing conditionals to be added to code that must interoperate between ANSI Common Lisp and those other dialects.
See also
Common Lisp HyperSpec (hypertext version of the ANSI Common Lisp standard)
External links
Common Lisp the Language, 2nd Edition Online HTML version. (Also provides several downloadable formats, including LaTeX sources.)
Mirror sites (in case of standard site being offline)
Mirror provided by lisp.se
Mirror provided by supelec.fr
Common Lisp publications
1984 non-fiction books
1990 non-fiction books
Books by Guy L. Steele Jr. |
https://en.wikipedia.org/wiki/Christian%20Cyclopedia | Christian Cyclopedia (originally Lutheran Cyclopedia) is a one-volume compendium of theological data, ranging from ancient figures to contemporary events. It is published by Concordia Publishing House as an update to the Concordia Cyclopedia of 1927, authored by Ludwig Fuerbringer. The 1927 version was an update to The Lutheran Cyclopedia (New York: Charles Scribner's Sons, 1898), edited by Henry Eyster Jacobs and Charles A. W. Haas, of the General Council and its Lutheran Theological Seminary at Philadelphia. Because the shift from the 1898 to 1927 versions occurred between different denominations of Lutherans, the point of view for certain articles shifted accordingly. However, other articles have barely changed at all between even the 1898 and 2000 Cyclopedias.
See also
External links
Christian Cyclopedia Online internet version, 2000
Concordia Cyclopedia by L. Fuerbringer, 1927
Concordia Cyclopedia by L. Fuerbringer, 1927 (better quality scan)
1898 Lutheran Cyclopedia (Google Books)
American online encyclopedias
Christian encyclopedias
History of Lutheranism |
https://en.wikipedia.org/wiki/Jos%C3%A9%20Manuel%20Marroqu%C3%ADn | Jose Manuel Cayetano Marroquín Ricaurte (August 6, 1827 – September 19, 1908) was a Colombian political figure and the 27th President of Colombia.
Biographic data
José Manuel Marroquín was born in Bogotá, on August 6, 1827. He died in the same city on September 19, 1908.
Early life
Marroquín studied literature and philosophy at the Seminary of Bogotá. He went on to study jurisprudence at the Colegio Mayor de San Bartolomé.
Professional career
Marroquín became a professor of literature and philosophy at the Colegio Mayor del Rosario, where he eventually was appointed as rector. Later, he was also co-founder of the Academia Colombiana de la Lengua along with Miguel Antonio Caro and José María Vergara. He was elected as the first rector of the academy. As writer, philosopher, poet and scholar he wrote several novels, poems, stories, essays and text books in grammar, philology and orthography.
Political career
Marroquín joined the Colombian Conservative Party and was elected to the House of Representatives and the Senate. He was also appointed as Minister of Education. He was elected as vice-president of the Republic of Colombia in 1898 and later elected as president in 1900 and served until 1904.
The Presidency
Marroquín was president twice. The first time, as acting president on August 7, 1898, when president elect Manuel Antonio Sanclemente was unable to attend his inauguration due to his poor health. The second time, on July 31, 1900, by default, when President Sanclemente was deposed by a civil-military coup d’état. The nationalist conservative army echelon, in light of the demanding responsibilities of the civil war known as the Thousand Days War, had approved and supported the coup d’état.
In an effort to end the civil war, President Marroquín offered the liberals a truce and armistice on June 12, 1902. The liberals rejected his offer, and the war intensified. After three years of bloody battles the war came to an end. Three peace treaties were signed. The first one was the Treaty of "Nerlandia", on October 24, 1902, which brought to an end the fighting in the provinces of Bolívar and Magdalena, signed by General Juan B. Tovar for the government and General Rafael Uribe Uribe as Commander in Chief of the insurrectionists.
The second treaty was the one of “Wisconsin”, signed on November 12, 1902, by the government's Generals Alfredo Vásquez Cobo and Victor Manuel Salazar and insurgent Generals Lucas Caballero and Eusebio Morales. The terms of this treaty called for congressional elections, amnesty for all political and prisoner of war and rebel sympathizers, restoration of all confiscated properties and assets, conversion of rebel's money into government's official currency and assuming the rebel's war indebtedness.
The third treaty was the one of “Chinácota”, signed on December 3, 1902, by Marroquín's administration General Ramón González Valencia and revolutionary General Ricardo Tirado Macías. Thus, the civil war came to |
https://en.wikipedia.org/wiki/Jon%20Drummond%20%28composer%29 | Jon Drummond (born 1969) is an Australian composer.
Drummond's computer music and installation work has been presented at various Australian and international festivals and galleries including the Adelaide Festival of Arts 2006 and the International Computer Music Conference (Denmark 1994, Canada 1995, Greece 1997, China 1999, Singapore 2003). Recent collaborations with Nigel Helyer, Norie Neumark, Sarah Waterson and Kate Richards have been shown at ISEA Festival 2004 and Australian Centre for the Moving Image Exhibitions 2005.
References
R. Bandt 2002, "Sound Sculpture: Intersections in Sound and Sculpture in Australian Artworks". Sydney: Fine Art Publishing.
R. Vella, 2000, "Musical Environments" Sydney: Currency Press.
External links
Jon Drummond personal web-site
Represented Composer Biography, Australian Music Centre
Move Records: Hearing Place - sound art exploring place from around the world
World Forum for Acoustic Ecology: Soundwalks Online
1969 births
20th-century classical composers
21st-century classical composers
Australian classical composers
Australian male classical composers
Living people
Musicians from Sydney
20th-century Australian male musicians
20th-century Australian musicians
21st-century Australian male musicians
21st-century Australian musicians |
https://en.wikipedia.org/wiki/KPN%20%28disambiguation%29 | KPN is a Dutch telecommunications company.
KPN may also refer to:
KPN Travels, an Indian private travel company
KP Namboodiris, Indian Ayurvedic company
Kahn process networks, a model of computation for concurrent processes
Korean People's Navy, the navy of North Korea
Confederation of Independent Poland, a political party
Kepkiriwát language, an extinct language of Brazil (by ISO 639 code)
Kipnuk Airport, Alaska, United States (by IATA airport code)
Kommando Peste Noire, an alternative name of Peste Noire, a French black metal band |
https://en.wikipedia.org/wiki/International%20Food%20Safety%20Network | The International Food Safety Network (iFSN) at Kansas State University imparts the opportunity of improving the overall safety of the food supply by connecting all those in the agriculture and food industry.
iFSN offers a resource of evidence-based information through its website, listserves, research projects, on-farm food safety programs, publications, educational initiatives, graduate courses and policy analysis.
iFSN used to operate under the direction of Doug Powell.
History
International Food Safety Network began as a communications experiment, collecting and rapidly redistributing information about food safety using the then just-burgeoning Internet.
Created in January 1993, as a combination of Powell's interests in science, media and the public following an outbreak of E. coli O157:H7 associated with Jack in the Box restaurants, in which over 600 were sickened and four died from undercooked hamburgers.
International Food Safety Network's emphasis is on the integration of public perceptions of food safety risks into traditional food safety risk analysis, and engaging the public on the nature of food-related risks and benefits.
Powell and the International Food Safety Network are a primary source for food safety information during outbreaks and are often quoted in mainstream media reports.
The International Food Safety Network was replaced with the bites mailing list and website according to a notice on the former's home page.
References
External links
International Food Safety Network
USDA resources for risk assessment
US FDA library of sources of food information
Food Safety Network thehealthline.ca
CSPI Integrity in Science
Food Safety News, Iowa State University
Food safety organizations
Kansas State University
1993 establishments in Kansas |
https://en.wikipedia.org/wiki/Milo%20%28video%20game%29 | MILO is a first-person adventure-puzzle computer game that challenges the player to solve 14 puzzles based in the world of MILO, an artificially intelligent computer. The game was developed by Crystalvision Software and released in 1996. Released in the wake of such titles as Myst and Pandora's Box, MILO was billed as a multimedia game and as an early example of 3D gaming. The 16-track ambient soundtrack is composed by noted progressive rock musician, Warren Dale.
Development
According to Four Fat Chicks, this game is an example of "minute titles, released to less than no fanfare, inexplicably floating around on Ebay, unrecognized and forgotten".
Plot
The player is placed in the abandoned planet of an ancient and highly advanced civilization. This civilization had discovered the Keys to the Gateway of the Universe and as a consequence they had abruptly left their planet in a state of enlightenment to travel and search the far corners of the universe for even greater mysteries. The one thing this civilization left behind was MILO - the sentient artificial intelligence designed to act as caretaker for their planet while they were gone and guard for the Keys to the Gateway.
MILO has existed now for centuries, patiently awaiting the return of his creators. The lack of interaction with life during the intervening centuries, however, has been difficult for MILO on a mental level. By the time of the player's arrival on the planet, MILO has unfortunately lost much of its normal function and is now quite mad. Your task as the player is to unlock the Library which holds the Keys to the Gateway. To do this, you must solve a series of 14 puzzles often taking the form of a 2-person logic game with MILO (acting remotely through the electronic world) as your opponent. Upon completion of the all 14 puzzles, the player meets MILO face to face, and escapes the planet.
Gameplay
Gameplay sees the player access seven different worlds from a central hub, with puzzle completion leading to progression through the game. The backgrounds are static slideshows.
Reception
The game was well received by critics, earning praise especially for its graphics, sound, and replay value. The reliance on luck rather than logic in some of the puzzles, as well as the near-total lack of documentation accompanying the game, however, was criticized. The sound effects were also criticized (apart from the musical score) as lacking in quality and substance. Four Fat Chicks likened the game's look and feel to Gord@k and L-Zone, and recommended the game to fans of puzzle adventure games such as Jewels of the Oracle, Cassandra Galleries, or Pandora's Box. Michael J. Bertrand of World Village praised the New Age background music as one of the very few enjoyable aspects of the game. The Adrenaline Vault's Hermann K. Peterscheck felt the game ripped off puzzles from Myst and The 7th Guest.
References
External links
1995 video games
1996 video games
First-person adventure games
Video games d |
https://en.wikipedia.org/wiki/HTC%20Blue%20Angel | The HTC Blue Angel (also known as "Qtek 9090" in some European markets) is a GSM Windows Mobile 2003 Second Edition PDA-phone, manufactured by High Tech Computer Corporation introduced in 2004. It has a CDMA EVDO variant called the HTC Harrier, which does not have Wi-Fi like the Blue Angel does. Both have the same housing. It is sold by many different vendors under the names of O2 XDA IIs, Orange SPV M2000, Dopod 700, Qtek 9090, T-Mobile MDA III, Siemens SX66, i-mate PDA2k, Vodafone VPx, Verizon XV6600 (Harrier), Sprint PPC-6601 (Harrier) among others, which all have similar hardware specifications.
Specifications
Dimensions: 125 x 72 x 19 (L x W x T mm)
Weight: Approx. 205 g
Operating systems:
Windows Mobile 2003 Second Edition. Unofficial cooked roms for Windows Mobile 5, 6 and 6.1 are available, Recently, Windows Mobile 6.5 beta has been leaked for blue angel and is in developing phase at the xda-developers community.
Processor: Intel(R) XScale PXA263 400 MHz CPU (possible overclock to 600 MHz)
Memory: Flash ROM:96 MB, RAM:128 MB SDRAM
Memory expansion: SDIO/MMC card slot
Camera: VGA camera (except on the Siemens version, which lacks a camera)
Standard battery capacity: 1490mAh
Display: QVGA Transflective 65k Colour LCD, 3.5 inch, 240 x 320 pixels
Wireless connectivity: GSM/GPRS and Wi-Fi 802.11b (Blue Angel), or CDMA EVDO (Harrier); plus IrDA and Bluetooth on both models
Popularity
In 2010, a UK-based developer created an emulator image of the Android Operating System ported to the HTC Blue Angel, it lacked features and there was no integration with the user. It was an image of Android 1.6 Doughnut but the only things which were usable were the volume control buttons. This development sparked interest on xda-developers where many users were willing to help port a usable Android version to the Blue Angel.
Later in 2011, developer 'zainuintel' created an Angry Birds build for the device, showing how capable the 7 year old device was. He later created an Angry Birds RIO build, but this did not get as much popularity, Support was dropped by the developer in 2012. Starting from June 2012 it was made open source.
A well known developer named 'd-two' on XDA started developing Android builds for the Blue Angel, most people thought a working build would be impossible. However, in May 2012, d-two released a working Android build- called 'PXADroid' at first not many things worked, only baseline things were working, but later on he decided to switch to modding Cyanogen Mod 7.2, this gave him greater compatibility with the Blue Angel, now nearly everything is sufficiently working, he compiles builds which are not virtual machines, the builds he compiles are special Linux kernels, compiled for the Blue Angel, and above the kernel it runs Android. D-two made great history when he got higher capacity (SD-HC) SD cards working on the Blue Angel, he showed a 16GB card on Android, he said this is possible via a boot-loader modification. Development is stil |
https://en.wikipedia.org/wiki/Rangekeeper | Rangekeepers were electromechanical fire control computers used primarily during the early part of the 20th century. They were sophisticated analog computers whose development reached its zenith following World War II, specifically the Computer Mk 47 in the Mk 68 Gun Fire Control system. During World War II, rangekeepers directed gunfire on land, sea, and in the air. While rangekeepers were widely deployed, the most sophisticated rangekeepers were mounted on warships to direct the fire of long-range guns.
These warship-based computing devices needed to be sophisticated because the problem of calculating gun angles in a naval engagement is very complex. In a naval engagement, both the ship firing the gun and the target are moving with respect to each other. In addition, the ship firing its gun is not a stable platform because it will roll, pitch, and yaw due to wave action, ship change of direction, and board firing. The rangekeeper also performed the required ballistics calculations associated with firing a gun. This article focuses on US Navy shipboard rangekeepers, but the basic principles of operation are applicable to all rangekeepers regardless of where they were deployed.
Function
A rangekeeper is defined as an analog fire control system that performed three functions:
Target tracking
The rangekeeper continuously computed the current target bearing. This is a difficult task because both the target and the ship firing (generally referred to as "own ship") are moving. This requires knowing the target's range, course, and speed accurately. It also requires accurately knowing the own ship's course and speed.
Target position prediction
When a gun is fired, it takes time for the projectile to arrive at the target. The rangekeeper must predict where the target will be at the time of projectile arrival. This is the point at which the guns are aimed.
Gunfire correction
Directing the fire of a long-range weapon to deliver a projectile to a specific location requires many calculations. The projectile point of impact is a function of many variables, including: gun azimuth, gun elevation, wind speed and direction, air resistance, gravity, latitude, gun/sight parallax, barrel wear, powder load, and projectile type.
History
Manual fire control
The early history of naval fire control was dominated by the engagement of targets within visual range (also referred to as direct fire). In fact, most naval engagements before 1800 were conducted at ranges of .
Even during the American Civil War, the famous engagement between the and the was often conducted at less than range.
With time, naval guns became larger and had greater range. At first, the guns were aimed using the technique of artillery spotting. Artillery spotting involved firing a gun at the target, observing the projectile's point of impact (fall of shot), and correcting the aim based on where the shell was observed to land, which became more and more difficult as the range of the gun |
https://en.wikipedia.org/wiki/Sports%20Fan%20Radio%20Network | The Sports Fan Radio Network was a national sports talk radio network that existed from 1993 through 2001, when it abruptly folded.
History
Launch
SportsFan Radio Network officially debuted in 1993 with 80 hours of programming per month. Based in Las Vegas, the network broadcast its flagship show SportsFan Tonight from the Sports Theatre in the Las Vegas Hilton. Original hosts of the show were Geoff Nathanson and long time NFL scribe Howard Balzer.
1994-2000
By 1994, SportsFan expanded to a 24/7 format, seven days a week. The signature show, SportsFan Tonight moved its broadcast location from the MGM Grand Las Vegas in 1994. Later it moved to the sportsbook at the Mandalay Bay. The daily line up included baseball's all-time hit leader Pete Rose, as well as a stable of young talent. Others hosting shows over the years included former NFL QB Sean Salisbury, former NFL All-Pro Tim Ryan, Fox and CBS host James Brown, longtime broadcaster Pat O'Brien, former NBA coach Matt Goukas, NHL great Phil Esposito, former NFL All-Pro Bob Golic and former NCAA basketball coaches Bill Frieder and Fran Fraschilla. Other hosts included Bruce Schein, Chris Russo (now Russell), J. T. the Brick, Steve Cofield, Rob Tepper, Chuck Powell, Ryan Williams,Marty Tirrell, Ken Miller, Soren Petro, Rob Fischer, Mike "The Sports Pig" Responts, John Phillips, John Rabe, Brandon Tierney, Jim Brinson, Chad Andrus. Scott Ferrall, Dave Cokin, Eric Pollero, Tim Neverett and others. By the late '90s, SportsFan partnered with CBS Sportsline to broadcast two shows daily. One program was hosted by Craig Carton, the other "The Drive" with Scott Kaplan and Sid Rosenberg. Later they landed a handful of other significant names, including Nanci Donellan (a.k.a. "The Fabulous Sports Babe") from ESPN Radio. Keith Olbermann also hosted a few shows.
Closure
In 2001, however, the network began facing intense pressure from upstart network Fox Sports Radio, which had the major backing of industry giant Clear Channel Communications. Additionally, SFRN's parent company, Winstar Communications, a NASDAQ-traded telecommunications firm, began experiencing severe financial trouble (which eventually ended in bankruptcy). Determining that the network could not compete with ESPN, Fox, and One on One Sports, Sports Fan Radio Network began dismantling. Eventually, Donnellan was fired one week before the Super Bowl, leaving J. T. the Brick and Scott Ferrall as some of the remaining hosts, hosting two live shifts plus replays throughout the day. The network folded in May 2001, ceding most of its affiliates to Fox.
Former hosts
After being released by Sports Fan, The Fabulous Sports Babe took an approximately 6-year break from radio broadcasting, during which she underwent treatment for cancer. She returned in sporadic guest hosting gigs in 2007, and in April 2008, returned full-time as the co-host of "Brantley and the Babe" on WHBO in Tampa Bay. After various stops on Tampa Bay area radio stations, she l |
https://en.wikipedia.org/wiki/US%20Human%20Rights%20Network | The US Human Rights Network (USHRN) was a national network composed of over 200 self-identified grassroots human rights organizations and over 700 individuals working to strengthen what they regard as the protection of human rights in the United States. The organization sought "to challenge the pernicious belief that the United States is inherently superior to other countries of the world, and that neither the U.S. government nor the U.S. rights movements have anything to gain from the domestic application of human rights." Members included organizers, lawyers, policy groups, educators, researchers, and scholars. The US Human Rights Network was headquartered in Atlanta, Georgia.
History
The network was founded in 2003 by over 50 organizations and individuals as a consequence of the US Human Rights Leadership Summit "Ending Exceptionalism: Strengthening Human Rights in the United States," held in July 2002 at Howard University's Law School. Summit participants discussed six issue areas (Poverty, discrimination, immigration, incarceration, death penalty, and sovereignty), and six sectors of work (education, documentation, organizing, legal, policy, and scholarship). The Network was officially launched on Human Rights Day (December 10) 2003.
On October 20, 2021, the USHRN board officially suspended the network's activities for an indefinite period of time.
Issues
The US Human Rights Network and its member organizations focus on the following issues:
Affordable Housing
Criminal Punishment
Death penalty
Discrimination
Right to Healthcare
Immigration
Economic and Social Rights
Workers' Rights
References
External links
US Human Rights Network website
Non-profit organizations based in the United States
Human rights organizations based in the United States
2003 establishments in Georgia (U.S. state)
Organizations based in Atlanta |
https://en.wikipedia.org/wiki/VA3 | VA3, VA-3, or VA 3 may refer to:
Jetta VA3, a German-Chinese compact sedan
NEC PC-88 VA3, an 8-bit home computer
Virginia State Route 3
Virginia's 3rd congressional district |
https://en.wikipedia.org/wiki/XHNT-FM | XHNT-FM is the callsign of a radio station in La Paz, Baja California Sur, Mexico. XHNT broadcasts on 97.5 MHz and carries Radio Fórmula programming.
The station is also on AM as XENT-AM 790 kHz.
History of the XENT call sign
XENT-AM were the call letters of a border-blaster radio station licensed to Nuevo Laredo, Tamaulipas. It operated nightly from 1933 to 1940 on 1140 kc/s with a power reported from 50 kW to 150 kW. In 1944–1945, XENT's transmitter was acquired by Alamo Broadcasting for use at KABC in San Antonio, in a contested action.
XENT was the continuation of KTNT ("Know The Naked Truth"), Norman G. Baker's station in Muscatine, Iowa, United States, as was forced off the air in 1931 for excessive self-promotion and want of candor. Baker was a notorious cancer quack, operating clinics in Muscatine and Eureka Springs, Arkansas, that were heavily promoted over KTNT and then XENT.
In La Paz
The XENT callsign returned, this time to Baja California Sur, with the awarding to Radio La Paz, S.A., of a concession for XENT-AM on July 19, 1956. The station was operated by the King family, which would later start XHK-TV channel 10, and was the first radio station in Baja California Sur.
The station was sold to Radio Fórmula in the mid-2000s.
References
External links
Border Radio by Fowler, Gene and Crawford, Bill. Texas Monthly Press, Austin. 1987
Mass Media Moments in the United Kingdom, the USSR and the USA, by Gilder, Eric. - "Lucian Blaga" University of Sibiu Press, Romania. 2003
Dedication of the Wolfman Jack Memorial in Del Rio, Texas
Radio stations in La Paz, Baja California Sur
Radio Fórmula
Radio stations in Mexico with continuity obligations |
https://en.wikipedia.org/wiki/Europlanet | Europlanet is a network linking planetary scientists from across Europe. The aim of Europlanet is to promote collaboration and communication between partner institutions and to support missions to explore the Solar System.
EuroPlaNet co-ordinates activities in Planetary Sciences in order to achieve a long-term integration of this discipline in Europe.
In 2021, they produced a pocket atlas to Mars.
Objectives
The objectives are to:
increase the productivity of planetary projects with European investment, with emphasis on major planetary exploration missions;
initiate a long-term integration of the European planetary science community;
improve European scientific competitiveness, develop and spread expertise in this research area,
improve public understanding of planetary environments.
These objectives will be achieved by:
maximizing synergies between different fields contributing to planetary sciences: space observations, earth-based observations, laboratory studies, numerical simulations, data base development;
co-ordinating the design and development of an Integrated and Distributed Information Service (IDIS) providing access to the full set of data sources produced by these complementary fields. EuroPlaNet integrates most of the European planetary exploration work, with initial focus on the Cassini–Huygens mission to Saturn and Titan, operative between 2004 and 2008. The considerable involvement of the European science community in this mission, the broad diversity of its research objectives and the urgent need to achieve a balanced share of data analysis and its results with American colleagues make Cassini–Huygens an ideal test-bed for the development of activities and tools which will contribute to the optimal exploitation of subsequent planetary missions.
In addition to overall co-ordination, 6 further activities will be carried out over a 4-year period:
discipline working groups;
co-ordinate earth-based observations to support and complement space missions;
develop an outreach strategy;
exchange of personnel;
EuroPlaNet-specific meetings and conferences;
definition of the basic requirements for future implementation of IDIS for planetary sciences.
See also
List of astronomical societies
References
External links
Europlanet Outreach Webpage
Europlanet Project Webpage
Astronomy organizations
Planetary science |
https://en.wikipedia.org/wiki/Interpersonal%20ties | In social network analysis and mathematical sociology, interpersonal ties are defined as information-carrying connections between people. Interpersonal ties, generally, come in three varieties: strong, weak or absent. Weak social ties, it is argued, are responsible for the majority of the embeddedness and structure of social networks in society as well as the transmission of information through these networks. Specifically, more novel information flows to individuals through weak rather than strong ties. Because our close friends tend to move in the same circles that we do, the information they receive overlaps considerably with what we already know. Acquaintances, by contrast, know people that we do not, and thus receive more novel information.
Included in the definition of absent ties, according to the American sociologist Mark Granovetter, are those relationships (or ties) without substantial significance, such as "nodding" relationships between people living on the same street, or the "tie", for example, to a frequent vendor one would buy from. Such relations with familiar strangers have also been called invisible ties since they are hardly observable, and are often overlooked as a relevant type of ties. They nevertheless support people's sense of familiarity and belonging. Furthermore, the fact that two people may know each other by name does not necessarily qualify the existence of a weak tie. If their interaction is negligible the tie may be absent or invisible. The "strength" of an interpersonal tie is a linear combination of the amount of time, the emotional intensity, the intimacy (or mutual confiding), and the reciprocal services which characterize each tie.
History
One of the earliest writers to describe the nature of the ties between people was German scientist and philosopher, Johann Wolfgang von Goethe. In his classic 1809 novella, Elective Affinities, Goethe discussed the "marriage tie". The analogy shows how strong marriage unions are similar in character to particles of quicksilver, which find unity through the process of chemical affinity.
In 1954, the Russian mathematical psychologist Anatol Rapoport commented on the "well-known fact that the likely contacts of two individuals who are closely acquainted tend to be more overlapping than those of two arbitrarily selected individuals". This argument became one of the cornerstones of social network theory.
In 1973, stimulated by the work of Rapoport and Harvard theorist Harrison White, Mark Granovetter published The Strength of Weak Ties. This paper is now recognized as one of the most influential sociology papers ever written.
To obtain data for his doctoral thesis, Granovetter interviewed dozens of people to find out how social networks are used to land new jobs. Granovetter found that most jobs were found through "weak" acquaintances. This pattern reminded Granovetter of his freshman chemistry lesson that demonstrated how "weak" hydrogen bonds hold together many water m |
https://en.wikipedia.org/wiki/STAR%20model | In statistics, Smooth Transition Autoregressive (STAR) models are typically applied to time series data as an extension of autoregressive models, in order to allow for higher degree of flexibility in model parameters through a smooth transition.
Given a time series of data xt, the STAR model is a tool for understanding and, perhaps, predicting future values in this series, assuming that the behaviour of the series changes depending on the value of the transition variable. The transition might depend on the past values of the x series (similar to the SETAR models), or exogenous variables.
The model consists of 2 autoregressive (AR) parts linked by the transition function. The model is usually referred to as the STAR(p) models proceeded by the letter describing the transition function (see below) and p is the order of the autoregressive part. Most popular transition function include exponential function and first and second-order logistic functions. They give rise to Logistic STAR (LSTAR) and Exponential STAR (ESTAR) models.
Definition
AutoRegressive Models
Consider a simple AR(p) model for a time series yt
where:
for i=1,2,...,p are autoregressive coefficients, assumed to be constant over time;
stands for white-noise error term with constant variance.
written in a following vector form:
where:
is a column vector of variables;
is the vector of parameters :;
stands for white-noise error term with constant variance.
STAR as an Extension of the AutoRegressive Model
STAR models were introduced and comprehensively developed by Kung-sik Chan and Howell Tong in 1986 (esp. p. 187), in which the same acronym was used. It originally stands for Smooth Threshold AutoRegressive. For some background history, see Tong (2011, 2012). The models can be thought of in terms of extension of autoregressive models discussed above, allowing for changes in the model parameters according to the value of a transition variable zt. Chan and Tong (1986) rigorously proved that the family of STAR models includes the SETAR model as a limiting case by showing the uniform boundedness and equicontinuity with respect to the switching parameter. Without this proof, to say that STAR models nest the SETAR model lacks justification. Unfortunately, whether one should use a SETAR model or a STAR model for one's data has been a matter of subjective judgement, taste and inclination in much of the literature. Fortunately, the test procedure, based on David Cox's test of separate family of hypotheses and developed by Gao, Ling and Tong (2018, Statistica Sinica, volume 28, 2857-2883) is now available to address this issue. Such a test is important before adopting a STAR model because, among other issues, the parameter controlling its rate of switching is notoriously data-hungry.
Defined in this way, STAR model can be presented as follows:
where:
is a column vector of variables;
is the transition function bounded between 0 and 1.
Basic Structure
They can be understood as |
https://en.wikipedia.org/wiki/Fabric%20Application%20Interface%20Standard | ANSI INCITS 432-2007: Information technology - Fabric Application Interface Standard or FAIS is an application programming interface framework for implementing storage applications in a storage area network. FAIS is defined by Technical Committee T11 of the International Committee for Information Technology Standards.
It provides a high-speed, highly reliable device for performing fabric-based services throughout heterogeneous data center environments. Furthermore, it describes extensions to the Fibre Channel specification, specifically regarding Fibre Channel over 4-pair twisted pair cabling as described in ISO/IEC 11801.
References
Storage area networks
Storage software |
https://en.wikipedia.org/wiki/Retrospect%20%28software%29 | Retrospect is a family of software applications that back up computers running the macOS, Microsoft Windows, and Linux (and until 2019 classic Mac OS) operating systems. It uses the client–server backup model.
The product is focused on the small and medium enterprise (SME) market. It performs three types of backup: "A Recycle backup deletes a backup set and adds all files, and a New Media backup creates a new backup set, copying all the files not included. Again this represents all files. Once installed, scripts can also be introduced to enable Scheduled backup using predetermined information supplied by the administrator. This information contains source, destination and other criteria, which enables a backup session to scan and back up one volume at a time, requiring less memory than an immediate backup."
The product is used for GUI-scripted backup.
History
The software was first developed by Dantz Development Corporation in 1989, initially for the Macintosh platform and continuing later for Windows. With sales split evenly between the two variants and the Macintosh variant claiming 90% of its market, Dantz Development Corporation was acquired by EMC Corporation in 2004. In 2006 version 7.5, the refined first release of the Windows variant under EMC, added performance features needed by SMEs.
Acquisition by EMC, under its Insignia brand, led to the product being briefly mothballed when Insignia was shut down in 2007. It was revived in 2008 and transferred to EMC's new acquisition Iomega. A "premature" release of Retrospect 8 in 2009 undermined its market after Apple introduced its competing Time Machine in late 2007. In 2010, Retrospect was sold to Roxio, owned by Sonic Solutions, which was then in turn acquired by Rovi. Rovi decided that it was not a core business, but a team who had worked on the product approached Rovi with the idea of spinning out as a separate company. Retrospect, Inc. was formed by a core team most of whom had worked on the product for ten years or more. Retrospect 9 was introduced in 2012, to positive reviews.
In June 2019 the holding company StorCentric—which also owns Drobo—announced that it had acquired Retrospect Inc., which it will operate as an wholly owned independent subsidiary.
After the 2023 bankruptcy of StorCentric, Retrospect was spun off into a separate company owned by Serene Investment Management, a private equity company which had a financial link to StorCentric.
See also
Apple Tape Backup 40SC
References
External links
Dell EMC
Classic Mac OS software
Roxio software
Backup software for macOS
Backup software for Windows |
https://en.wikipedia.org/wiki/DSOS | DSOS (Deep Six Operating System) was a real-time operating system (sometimes termed an operating system kernel) developed by Texas Instruments' division Geophysical Services Incorporated (GSI) in the mid-1970s.
Background
The Geophysical Services division of Texas Instruments' main business was to search for petroleum (oil). They would collect data in likely spots around the world, process that data using high performance computers, and produce analyses that guided oil companies toward promising sites for drilling.
Much of the oil being sought was to be found beneath the ocean, hence GSI maintained a fleet of ships to collect seismic data from remote regions of the world. To do this properly, it was essential that the ships be navigated precisely. If evidence of oil is found, one cannot just mark an X on a tree. The oil is thousands of feet below the ocean and typically hundreds of miles from land. But this was a decade or more before GPS existed, thus the processing load to keep an accurate picture of where a finding is, was considerable.
The GEONAV systems, which used DSOS (Frailey, 1975) as their operating system, performed the required navigation, and collected, processed, and stored the seismic data being received in real-time.
Naming
The name Deep Six Operating System was the brainchild of Phil Ward (subsequently a world-renowned GPS expert) who, at the time, was manager of the project and slightly skeptical of the computer science professor, Dennis Frailey, who insisted that an operating system was the solution to the problem at hand. In a sense the system lived up to its name, according to legend. Supposedly one of the ships hit an old World War II naval mine off the coast of Egypt and sank while being navigated by GEONAV and DSOS.
Why an operating system?
In the 1970s, most real-time applications did not use operating systems because the latter were perceived as adding too much overhead. Typical computers of the time had barely enough computing power to handle the tasks at hand. Moreover, most software of this type was written in assembly language. As a consequence, real-time systems were classic examples of spaghetti code: complex masses of assembly language software using all sorts of machine-dependent tricks to achieve maximum performance.
DSOS ran on a Texas Instruments 980 minicomputer being used for marine navigation on GSI's fleet. DSOS was created to bring some order to the chaos that was typical of real-time system design at that time. The 980 was, for its time, a relatively powerful small computer that offered memory protection and multiple-priority interrupt abilities. DSOS was designed to exploit these features.
Significance
DSOS (Frailey, 1975) was one of the pioneering efforts in real-time operating systems. Incorporating many of the principles being introduced at the time in mainframe computer systems, such as semaphores, memory management, task management, and software interrupts, it used a clever scheme to ass |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.