source stringlengths 32 199 | text stringlengths 26 3k |
|---|---|
https://en.wikipedia.org/wiki/Georgia%20Electronic%20Insurance%20Compliance%20System | The Georgia Electronic Insurance Compliance System or GEICS is a database of all motor vehicles and the current liability insurance carried by their drivers in the U.S. state of Georgia.
It was created by the Georgia General Assembly (the state legislature) during the 2002 session, to cut down the rate of uninsured motorists. Scheduled to go into effect the following January 1, the enforcement of the statute was delayed in early 2003 to 2004 because of significant problems with the database, and the proper collection of the information which insurance companies must report for their Georgia policyholders.
When requested by police, GEICS is now the only valid proof of insurance for Georgia drivers stopped in Georgia. Other states do not have instant access to GEICS however, so paper cards must still be issued. Valid paper cards are also required of those from outside the state while driving in Georgia.
The system was run by the Georgia Department of Motor Vehicle Safety (DMVS), now the Department of Driver Services (DDS), and has over 6.7 million vehicles listed. Of those, over 470,000 (about 7%) were listed as uninsured as of November 2003, a decline from 15% in previous years. In March 2004, the DMVS announced that retroactive to the beginning of the year, it would begin issuing citations by mail, demanding a fine of 25$ from every person who showed as having a lapse in coverage, even for just one day.
References
External links
DDS GEICS regulations
Transportation in Georgia (U.S. state)
Law enforcement databases in the United States
Auto insurance in the United States |
https://en.wikipedia.org/wiki/Remote%20terminal%20unit | A remote terminal unit (RTU) is a microprocessor-controlled electronic device that interfaces objects in the physical world to a distributed control system or SCADA (supervisory control and data acquisition) system by transmitting telemetry data to a master system, and by using messages from the master supervisory system to control connected objects. Other terms that may be used for RTU are remote telemetry unit and remote telecontrol unit.
Architecture
An RTU monitors the field digital and analog parameters and transmits data to a SCADA Master Station. It runs setup software to connect data input streams to data output streams, define communication protocols, and troubleshoot installation problems in the field.
An RTU may consist of one complex circuit card consisting of various sections needed to do a custom-fitted function, or may consist of many circuit cards including a CPU or processing with communications interface(s), and one or more of the following: (AI) analog input, (DI) digital (status) input, (DO/CO) digital (or control relay) output, or (AO) analog output card(s).
An RTU might even be a small process control unit with a small database for PID, Alarming, Filtering, Trending and other functions complemented with some BASIC (programming language) tasks. Modern RTUs typically support the IEC 61131-3 programming standard for programmable logic controllers. Since RTUs may be routinely deployed in pipeline and grid guarding systems, or in other hard-to-reach or extreme environments (for example in the Biosphere 2 project), they are required to operate under harsh conditions, and implement energy-saving measures (such as switching off IO modules when not in use). For example, it communicates via RS485 or wireless communication links in a multi-drop configuration. In this type of configuration it is a remote unit that collects data and performs simple control tasks. It does not have moving parts and uses extremely low power and is often solar powered.
Power supply
A form of power supply will be included for operation from the AC mains for various CPU, status wetting voltages and other interface cards. This may consist of AC to DC converters where operated from a station battery system.
RTUs may include a battery and charger circuitry to continue operation in event of AC power failure for critical applications where a station battery is not available.
Digital (status) inputs
Most RTUs incorporate an input section or input status cards to acquire two state real-world information. This is usually accomplished by using an isolated voltage or current source to sense the position of a remote contact (open or closed) at the RTU site. This contact position may represent many different devices, including electrical breakers, liquid valve positions, alarm conditions, and mechanical positions of devices. Counter inputs are optional.
Analog inputs
An RTU can monitor analog inputs of different types including 0-1 mA, 4–20 mA current loop, 0–10 V. |
https://en.wikipedia.org/wiki/PowerBook%20Duo | The PowerBook Duo is a line of subnotebooks manufactured and sold by Apple Computer from 1992 until 1997 as a more compact companion to the PowerBook line. Improving upon the PowerBook 100's portability (its immediate predecessor and Apple's third-smallest laptop), the Duo came in seven different models. They were the Duo 210, 230, 250, 270c, 280, 280c, and 2300c, with the 210 and 230 being the earliest, and the 2300c being the final incarnation before the entire line was dropped in early 1997.
Weighing and slightly smaller than a sheet of paper at , and only thick, it was the lightest and smallest of all of Apple's PowerBooks at the time, and remains one of Apple's smallest notebooks ever produced. Only the MacBook Air, the Retina MacBook Pro and the Retina MacBook weigh less, though they are wider and deeper (but considerably thinner). The Duo had the most in common with the original MacBook Air which only included one USB 2.0 port, one video port (requiring an adapter) and one speaker port, but no ability for expansion.
The PowerBook Duo line was replaced by the PowerBook 2400, which was slightly larger in size than the Duos, but still only the fifth-smallest behind the 12-inch PowerBook G4 which succeeded it as fourth-smallest. Although both featured much more onboard functionality, they lacked docking ability.
Features
The Duo line offered an ultraportable design that was light and functional for travel and expandable via its unique docking connector. However certain compromises were made to achieve this level of portability. The Duo series used an 88% of standard desktop-sized keyboard which was criticized for being difficult to type on. Likewise, the trackball was reduced in size from even that used on the PowerBook 100. The only usable port which came standard on the Duo was a dual printer/modem EIA-422 serial port.
There was a slot for an expensive, optional, internal 14.4 Express Modem and no provision for built-in Ethernet. This somewhat limited configuration meant the only way to move data in or out of the laptop in a stock configuration, without purchasing additional accessories, was via a relatively slow AppleTalk connection, which was not practical in the event of hard drive problems. Compensating for these limitations, the initial Duo offering provided for a considerably higher RAM limit of 24 MB (as compared to the 100 series' 14 MB), and a standard 80 MB hard drive (versus the 100's 40 MB drive). The debut year for the Duo only offered a passive matrix display on both the mid-level and high-end models, in contrast to the high-end of the PowerBook 100 series - the PowerBook 170 and 180 (in which the Duos shared the same processors). With their crisp active matrix displays, both were already in great demand over the lower-powered models with passive matrix displays. The following year, Apple replaced the Duo models with both an active matrix display and a color active matrix display, the latter becoming the de facto stand |
https://en.wikipedia.org/wiki/Macintosh%20Color%20Classic | The Macintosh Color Classic (sold as the Macintosh Colour Classic in PAL regions) is a personal computer designed, manufactured and sold by Apple Computer, Inc. from February 1993 to May 1995 (up to January 1998 in PAL markets). It has an all-in-one design, with a small, integrated 10″ Sony Trinitron display at 512 × 384 pixel resolution. The display is capable of supporting up to thousands of colors with a video memory upgrade.
The Color Classic is the final model of the original "compact" family of Macintosh computers, and was replaced by the larger-display Macintosh LC 500 series and Power Macintosh 5200 LC.
Hardware
The Color Classic has a Motorola 68030 CPU running at 16 MHz and has a logic board similar to the Macintosh LC II.
Like the Macintosh SE and SE/30 before it, the Color Classic has a single expansion slot: an LC-type Processor Direct Slot (PDS), incompatible with the SE slots. This was primarily intended for the Apple IIe Card (the primary reason for the Color Classic's switchable 560 × 384 display, essentially quadruple the IIe's 280 × 192 High-Resolution graphics), which was offered with education models of the LCs. The card allowed the LCs to emulate an Apple IIe. The combination of the low-cost color Macintosh and Apple IIe compatibility was intended to encourage the education market's transition from Apple II models to Macintoshes. Other cards, such as CPU accelerators, Ethernet and video cards were also made available for the Color Classic's Processor Direct Slot.
The Color Classic shipped with the Apple Keyboard known as an Apple Keyboard II (M0487) which featured a soft power switch on the keyboard itself. The mouse supplied was the Apple Mouse known as the Apple Desktop Bus Mouse II (M2706).
A slightly updated model, the Color Classic II, featuring the Macintosh LC 550 logic board with a 33 MHz processor, was released in Japan, Canada and some international markets in 1993, sometimes as the Performa 275. Both versions of the Color Classic have 256 KB of onboard VRAM, expandable to 512 KB by plugging a 256 KB VRAM SIMM into the onboard 68-pin VRAM slot.
The name "Color Classic" was not printed directly on the front panel, but on a separate plastic insert. This enabled the alternative spelling "Colour Classic" and "Colour Classic II" to be used in appropriate markets.
Upgrades
Powered by a Motorola 68030 processor, the Color Classic can only go up to Mac OS 7.6.1. However, some Color Classic users upgraded their machines with motherboards from Performa/LC 575 units ("Mystic" upgrade), while others have put entire Performa/LC/Quadra 630 or successor innards into them ("Takky" upgrade). Another common modification to this unit was to change the display to allow 640 × 480 resolution, which was a common requirement for many programs (especially games) to run.
With the Mystic mod, the Color Classic uses the motherboard of the Macintosh LC 575 which has a Motorola 68LC040 CPU (at a speed of 33 MHz instead of 25 MHz) and |
https://en.wikipedia.org/wiki/Bradford%20%28computer%20program%29 | Bradford was a computer program written and sold in the 1980s by Aaron Contorer and his firm, Contorer Computing. It was one of the first programs sold using the shareware marketing model.
Available for both CP/M and MS-DOS operating systems, it greatly increased the quality of printing on a dot matrix printer and included a range of fonts.
Though popular for several years, Bradford, along with similar products, became obsolete as Windows 3.1 included much more powerful support for attractive printing.
References
External links
The open letter from Contorer describing the business model (text file)
Utilities for Windows |
https://en.wikipedia.org/wiki/Digital%20organism | A digital organism is a self-replicating computer program that mutates and evolves. Digital organisms are used as a tool to study the dynamics of Darwinian evolution, and to test or verify specific hypotheses or mathematical models of evolution. The study of digital organisms is closely related to the area of artificial life.
History
Digital organisms can be traced back to the game Darwin, developed in 1961 at Bell Labs, in which computer programs had to compete with each other by trying to stop others from executing . A similar implementation that followed this was the game Core War. In Core War, it turned out that one of the winning strategies was to replicate as fast as possible, which deprived the opponent of all computational resources. Programs in the Core War game were also able to mutate themselves and each other by overwriting instructions in the simulated "memory" in which the game took place. This allowed competing programs to embed damaging instructions in each other that caused errors (terminating the process that read it), "enslaved processes" (making an enemy program work for you), or even change strategies mid-game and heal themselves.
Steen Rasmussen at Los Alamos National Laboratory took the idea from Core War one step further in his core world system by introducing a genetic algorithm that automatically wrote programs. However, Rasmussen did not observe the evolution of complex and stable programs. It turned out that the programming language in which core world programs were written was very brittle, and more often than not mutations would completely destroy the functionality of a program.
The first to solve the issue of program brittleness was Thomas S. Ray with his Tierra system, which was similar to core world. Ray made some key changes to the programming language such that mutations were much less likely to destroy a program. With these modifications, he observed for the first time computer programs that did indeed evolve in a meaningful and complex way.
Later, Chris Adami, Titus Brown, and Charles Ofria started developing their Avida system, which was inspired by Tierra but again had some crucial differences. In Tierra, all programs lived in the same address space and could potentially execute or otherwise interfere with each other's code. In Avida, on the other hand, each program lives in its own address space. Because of this modification, experiments with Avida became much cleaner and easier to interpret than those with Tierra. With Avida, digital organism research has begun to be accepted as a valid contribution to evolutionary biology by a growing number of evolutionary biologists. Evolutionary biologist Richard Lenski of Michigan State University has used Avida extensively in his work. Lenski, Adami, and their colleagues have published in journals such as Nature and the Proceedings of the National Academy of Sciences (USA).
In 1996, Andy Pargellis created a Tierra-like system called Amoeba that evolved se |
https://en.wikipedia.org/wiki/Harvey%20Birdman%2C%20Attorney%20at%20Law | Harvey Birdman, Attorney at Law is an American adult animated television sitcom created by Michael Ouweleen and Erik Richter for Cartoon Network's late-night programming block, Adult Swim. The first season of Harvey Birdman, Attorney at Law is the first adult animated production to be produced by Cartoon Network Studios. A spin-off of Space Ghost Coast to Coast, the series revolves around the activity of the Sebben & Sebben law firm, which is staffed mainly by superheroes and other characters who had originally been featured in past Hanna-Barbera cartoons, most notably Birdman and the Galaxy Trio.
The pilot first aired as a sneak peek on Cartoon Network on December 30, 2000. The series officially premiered on Adult Swim on September 2, 2001, the night the block launched. It ended on July 22, 2007, with a total of 39 episodes, over the course of four seasons. The entire series has been made available on DVD, and other forms of home media, including on-demand streaming. A special, entitled Harvey Birdman: Attorney General, premiered on October 15, 2018, and a spin-off, Birdgirl, premiered on April 5, 2021.
Premise
Harvey Birdman, Attorney at Law features ex-superhero Harvey Birdman of Birdman and the Galaxy Trio as an attorney working for a law firm alongside other cartoon stars from the 1960s and 1970s Hanna-Barbera cartoon series. Harvey's clients are also primarily characters taken from the Hanna-Barbera cartoon series of the same era.
Many of Birdman's nemeses from his former cartoon series appear as attorneys, often representing the opposing side of a given case. Harvey usually fills the role of a criminal defense attorney, though he will act as a civil litigator or other similar roles when the plot calls for it.
The series uses a surrealist style of comedy, featuring characters, objects, and jokes that are briefly introduced and rarely (if ever) referenced thereafter. Because the series relies heavily on popular culture references to classic television animation, Harvey Birdman, Attorney at Law constantly delves into parody, featuring clips of these series or specially created scenes which mimic the distinctive style of the animation being referenced.
Harvey Birdman, Attorney at Law is the first Williams Street cartoon to maintain continuity through the entire series. Various episodes reference Harvey's (or another superhero's) former crime-fighting career. The episode "Turner Classic Birdman" serves to bridge the gap between Birdman and the Galaxy Trio and Harvey Birdman, Attorney at Law.
Much of the humor is derived from giving superheroes and supervillains more eccentric qualities, such as transforming mad scientist Dr. Myron Reducto into a paranoid prosecutor. Several of the plots revolve around popular myths about classic Hanna-Barbera characters, such as Shaggy and Scooby-Doo being recreational drug users.
Voice cast
Gary Cole as Harvey Birdman, Judge Hiram Mightor
Stephen Colbert as Phil Ken Sebben, Myron Reducto
Joe Alaskey |
https://en.wikipedia.org/wiki/The%20Brak%20Show | The Brak Show is an American adult animated sitcom created by Jim Fortier, Andy Merrill, and Pete Smith for Cartoon Network's late-night programming block, Adult Swim. The Brak Show serves as a spin-off of the animated television series, Space Ghost Coast to Coast, for which the show's creators originally wrote, and featured recurring characters from Space Ghost Coast to Coast and Cartoon Planet. Both programs used stock footage from the Hanna-Barbera cartoon Space Ghost, for which The Brak Show serves as a prequel. The protagonist is Brak, voiced by Merrill, who developed a quirky persona for the character.
"Leave it to Brak", a pilot episode that serves as an earlier version of the fifth episode "Mr. Bawk Ba Gawk", originally aired prior to the official launch of Adult Swim on Cartoon Network, on December 21, 2000. The series made its official premiere debut during the night Adult Swim officially launched on September 2, 2001, and ended on December 31, 2003, with a total of 28 episodes. On May 24, 2007, a webisode was released on Adult Swim Video, ending the series.
Premise
The Brak Show takes place in the fictional town of Spacetown, where Brak lives with his mom, dad, brother, his best pal Zorak, and Thundercleese, his giant robotic warrior neighbor.
History
The Brak Show was preceded by a two-part special titled Brak Presents the Brak Show Starring Brak. Despite the similarities in the titles, the two Brak Shows have very little in common. The specials parodied variety shows, while the series was a spoof of early sitcoms. Each of the specials aired in the United States only once in February and March 2000, respectively.
The series premiered with a sneak peek unannounced in the early hours of December 21, 2000, along with the "Radio Free Sealab" episode of Sealab 2021. This "stealth" pilot (titled "Leave it to Brak") featured hand-drawn backgrounds and different opening titles. The show's official showing was on Adult Swim's debut on September 2, 2001.
It originally started off as a parody of sitcoms which depicts the day-to-day lives of the dysfunctional Guerta family, including Brak, as well as Zorak, various other neighbors, and peers from Learnmore High School, but just like its sister show, Aqua Teen Hunger Force, the plot dissolved over time and became increasingly bizarre. The setting is Spacetown, which resembles American suburbia, but with an extra-planetary hint. A Saturn-like planet appears in the background on occasion, and many of the extras are aliens. Often, episodes parody stereotypical episodes of regular sitcoms (e.g., the son showing an interest in women, the dad being reconnected with an old passion, the mother temporarily leaving after a fight, etc).
The show was canceled in December 2003. However, on October 22, 2006, Adult Swim announced in a bumper that The Brak Show would return to production as an internet cartoon on the network's website. On May 24, 2007, a single webisode premiered online, but no further web |
https://en.wikipedia.org/wiki/Execution%20%28computing%29 | Execution in computer and software engineering is the process by which a computer or virtual machine reads and acts on the instructions of a computer program. Each instruction of a program is a description of a particular action which must be carried out, in order for a specific problem to be solved. Execution involves repeatedly following a 'fetch–decode–execute' cycle for each instruction done by control unit. As the executing machine follows the instructions, specific effects are produced in accordance with the semantics of those instructions.
Programs for a computer may be executed in a batch process without human interaction or a user may type commands in an interactive session of an interpreter. In this case, the "commands" are simply program instructions, whose execution is chained together.
The term run is used almost synonymously. A related meaning of both "to run" and "to execute" refers to the specific action of a user starting (or launching or invoking) a program, as in "Please run the application."
Process
Prior to execution, a program must first be written. This is generally done in source code, which is then compiled at compile time (and statically linked at link time) to produce an executable. This executable is then invoked, most often by an operating system, which loads the program into memory (load time), possibly performs dynamic linking, and then begins execution by moving control to the entry point of the program; all these steps depend on the Application Binary Interface of the operating system. At this point execution begins and the program enters run time. The program then runs until it ends, either normal termination or a crash.
Executable
Executable code, an executable file, or an executable program, sometimes simply referred to as an executable or
binary, is a list of instructions and data to cause a computer "to perform indicated tasks according to encoded instructions", as opposed to a data file that must be interpreted (parsed) by a program to be meaningful.
The exact interpretation depends upon the use. "Instructions" is traditionally taken to mean machine code instructions for a physical CPU. In some contexts, a file containing scripting instructions (such as bytecode) may also be considered executable.
Context of execution
The context in which execution takes place is crucial. Very few programs execute on a bare machine. Programs usually contain implicit and explicit assumptions about resources available at the time of execution. Most programs execute within multitasking operating system and run-time libraries specific to the source language that provide crucial services not supplied directly by the computer itself. This supportive environment, for instance, usually decouples a program from direct manipulation of the computer peripherals, providing more general, abstract services instead.
Context switching
In order for programs and interrupt handlers to work without interference and share the sa |
https://en.wikipedia.org/wiki/Mirchi | Mirchi may refer to:
Mirchi bada, spicy Indian doughnut
Mirchi ka salan, chilli curry
Mirchi (film), 2013 Indian film
Iqbal Mirchi (1950–2013), Indian drug kingpin
Radio Mirchi, Indian radio network
Mirchi Music Awards |
https://en.wikipedia.org/wiki/Dead%20key | A dead key is a special kind of modifier key on a mechanical typewriter, or computer keyboard, that is typically used to attach a specific diacritic to a base letter. The dead key does not generate a (complete) character by itself, but modifies the character generated by the key struck immediately after. Thus, a dedicated key is not needed for each possible combination of a diacritic and a letter, but rather only one dead key for each diacritic is needed, in addition to the normal base letter keys.
For example, if a keyboard has a dead key for the grave accent (`), the French character à can be generated by first pressing and then , whereas è can be generated by first pressing and then .
Usually, the diacritic itself can be generated as an isolated character by pressing the dead key followed by space; so a plain grave accent can be typed by pressing and then .
Mechanical typewriters
The dead key is mechanical in origin, and "dead" means without movement. On mechanical typebar typewriters, all characters are of equal width. As a key is pressed, a metal typebar strikes the character onto an inked ribbon, transferring ink to the paper, and a mechanism is triggered which causes the paper (inserted in a carriage) to move forward one space. To use a single diacritic, such as the acute accent, with multiple foundation characters (such as á, é, í, ó, ú) the decision was made to create a new character, the acute accent or diacritic , which did not exist in typesetting as of that date. Due to a change in the mechanism, striking the key containing the accent did not advance the paper (the key was "dead" or non-spacing), meaning it could be followed by any character that was to appear under the acute accent, producing an overstruck character. This second key moved the paper carriage forward.
Note that with mechanical keyboards, the acute accent could be followed by any character, to create new combinations such as q with acute accent.
Electronic keyboards
A dead key is different from a typical modifier key (such as or ), in that rather than being pressed and held while another key is struck, the dead key is pressed and released before striking the key to be modified. In some computer systems, there is no indication to the user that a dead key has been struck, so the key appears dead (nothing immediately happens), but in some text-entry systems, the diacritic is displayed, along with an indication that the system is waiting for another keystroke to complete the typing sequence.
Computers, however, work differently. The dead key temporarily changes the mapping of the keyboard for the next keystroke, which activates a special keyboard mode rather than actually generating a modifier character. Instead of the normal letter, a precomposed variant, with the appropriate diacritic, is generated. Each combination of a diacritic and a base letter must be specified in the character set and must be supported by the font in use.
There is no precomposed char |
https://en.wikipedia.org/wiki/Extensible%20Data%20Format | The Extensible Data Format (XDF) is an XML standard (specified as a DTD) developed by NASA, meant to be used throughout scientific disciplines. In many ways it is akin to XSIL, Extensible Scientific Interchange Language. NASA provides two XDF APIs, in Perl and in Java.
XDF is used to store high-dimensional data and information related to it in compact XML format. The purpose is to have interchangeable and high quality format that can be used as a main archive format for this kind of data.
The XDF project and related development have been halted (2002,2006). The existing information have been archived to the UMD Astronomy Information and Knowledge Group site as a reference.
References
XML-based standards
NASA spin-off technologies |
https://en.wikipedia.org/wiki/XDF | XDF may refer to:
Extensible Data Format
Hubble eXtreme Deep Field
IBM Extended Density Format
Xonotic DeFRaG |
https://en.wikipedia.org/wiki/Open%20Data-Link%20Interface | The Open Data-Link Interface (ODI), developed by Apple and Novell, serves the same function as Microsoft and 3COM's Network Driver Interface Specification (NDIS). Originally, ODI was written for NetWare and Macintosh environments. Like NDIS, ODI provides rules that establish a vendor-neutral interface between the protocol stack and the adapter driver. It resides in Layer 2, the Data Link layer, of the OSI model. This interface also enables one or more network drivers to support one or more protocol stacks.
See also
Network Driver Interface Specification (NDIS)
Uniform Driver Interface (UDI)
Universal Network Device Interface (UNDI)
PC/TCP Packet Driver
Virtual Loadable Module (VLM)
NetWare I/O Subsystem (NIOS)
Personal NetWare (PNW)
DR-WebSpyder
References
Computer networks |
https://en.wikipedia.org/wiki/Twentieth%20Anniversary%20Macintosh | The Twentieth Anniversary Macintosh (or "TAM") is a limited-edition personal computer released in 1997 to mark Apple's 20th birthday. The machine was a technological showcase of the day, boasting a number of features beyond simple computing, and with a price tag aimed at the "executive" market.
History
April 1, 1996, marked 20 years since the day that Steve Jobs, Steve Wozniak, and Ronald Wayne came together to form Apple Computer. As this milestone arrived and came to the attention of Apple's then-current executives, the decision was made to release a limited edition Macintosh computer to celebrate—and so the "Spartacus" (or "Pomona", or "Smoke & Mirrors") project was born.
The normal time-span to develop a new Macintosh computer was 18+ months, although available time was less. However, the design team had already been working on several "dream" concepts, and soon settled on the most feasible of those: the (almost) all-in-one LCD-based design. To reduce development time, many off-the-shelf components were used on the new computer's internals.
The TAM was announced almost 20 years to the day after Jobs and Wozniak incorporated the company, in January 1997 at MacWorld Expo, San Francisco. It was given a release date of March 20, 1997, with a retail price of £5,545 or €6,637. Originally intended as a mainstream product, the marketing group turned it into a pricey special edition.
Upon its unveiling, the TAM was predicted to cost , which would include a direct-to-door concierge delivery service. At release the price was reduced to . In the middle of the machine's sales lifespan Apple dropped the price further to around , and finally upon discontinuation in March 1998 the price was set to . Customers who paid full price for the TAM, and then complained to Apple when the price was so drastically cut, were offered a free high-end PowerBook as compensation.
Specifications and design
The TAM featured a 250 MHz PowerPC 603ev processor and 12.1" active matrix LCD from a PowerBook 3400c/G3 Kanga, powered by an ATI 3D Rage II video chipset with 2 MB of VRAM capable of displaying up to 16-bit color at either 800x600 or 640x480 pixels. It had a vertically mounted 4x SCSI CD-ROM and an Apple floppy SuperDrive, a 2 GB ATA hard drive, a TV/FM tuner, an S-Video input card, and a custom-made Bose sound system including two "Jewel" speakers and a subwoofer built into the externally located power supply "base unit".
A thick "umbilical" cable connects the base unit to the head unit, supplying both power, and communications for the subwoofer. The umbilical connects via a multi-pin connector, which is a possible cause of the TAM's one major fault: the "speaker buzz". Inspections of units that received a repair by Apple due to the speaker buzz found one or more extra resistors had been installed in the umbilical. Ensuring the connectors are free of dust/dirt has also been known to resolve the "buzz", though the buzz ultimately only affected a small percentage of |
https://en.wikipedia.org/wiki/XSIL | XSIL (Extensible Scientific Interchange Language) is an XML-based transport language for scientific data, supporting the inclusion of both in-file data and metadata. The language comes with an extensible Java object model. The language's elementary objects include Param (arbitrary association between a keyword and a value), Array, Table (a set of column headings followed by a set of records), and Stream, which enables one to either encapsulate data inside the XSIL file or point to an external data source.
BFD is an XML dialect based on XSIL.
External links
XSIL: Extensible Scientific Interchange Language
XML-based standards
Data modeling languages |
https://en.wikipedia.org/wiki/Screen%20magnifier | A screen magnifier is software that interfaces with a computer's graphical output to present enlarged screen content. By enlarging part (or all) of a screen, people with visual impairments can better see words and images. This type of assistive technology is useful for people with some functional vision; people with visual impairments and little or no functional vision usually use a screen reader.
Use
The simplest form of magnification presents an enlarged portion of the original screen content, the 'focus', so that it covers some or all of the full screen. This enlarged portion should include the content of interest to the user and the pointer or cursor, also suitably enlarged. As the user moves the pointer or cursor the screen magnifier should track with it and show the new enlarged portion. If this tracking is jerky or flickers it is likely to disturb the user. Also, the pointer or cursor may not be the content of interest: for example, if the user presses a keyboard shortcuts that opens a menu, the magnified portion should jump to that menu. Pop-up windows and changes in system status can also trigger this rapid shifting.
Screen magnifiers can be especially helpful for people with low vision, including elderly users. However, in a 2001 paper, Vicki Hanson noted that people with low vision often also have additional disabilities such as tremors.
Features
Ranges of 1- to 16-times magnification are common. The greater the magnification the smaller the proportion of the original screen content that can be viewed, so users will tend to use the lowest magnification they can manage.
Screen magnifiers commonly provide several other features for people with particular sight difficulties:
Color inversion. Many people with visual impairments prefer to invert the colors, typically turning text from black-on-white to white-on-black. This can reduce screen glare and is useful for elderly people with age-related macular degeneration.
Smoothing. Text can become blocky and harder to recognise when enlarged. Some screen magnifiers use interpolation to smooth the text to compensate.
Cursor customisation. The mouse and text cursors can often be modified in several ways, such as circling it to help the user locate it on the screen.
Different magnification modes. Screen magnifiers can alter how they present the enlarged portion: covering the full screen, providing a lens that is moved around the un-magnified screen, or using a fixed magnified portion.
Crosshairs. Even with magnification, some users can find the mouse pointer hard to see. Crosshairs – especially when their size, color and opacity are customizable – can make the use of a pointing device easier.
Screen reader. Some magnifiers come packaged with a basic screen reader, allowing whatever the user is pointing at to be read out.
Screen magnifiers bundled with an operating system
Haiku includes an application called Magnify
Linux-based operating systems:
Compiz-Fusion window manager has a hig |
https://en.wikipedia.org/wiki/Function%20overloading | In some programming languages, function overloading or method overloading is the ability to create multiple functions of the same name with different implementations. Calls to an overloaded function will run a specific implementation of that function appropriate to the context of the call, allowing one function call to perform different tasks depending on context.
For example, and are overloaded functions. To call the latter, an object must be passed as a parameter, whereas the former does not require a parameter, and is called with an empty parameter field. A common error would be to assign a default value to the object in the second function, which would result in an ambiguous call error, as the compiler wouldn't know which of the two methods to use.
Another example is a function that executes different actions based on whether it's printing text or photos. The two different functions may be overloaded as If we write the overloaded print functions for all objects our program will "print", we never have to worry about the type of the object, and the correct function call again, the call is always: .
Languages supporting overloading
Languages which support function overloading include, but are not necessarily limited to, the following:
Apex
C
C++
C#
Clojure
Swift
Fortran
Kotlin
Java
Julia
PostgreSQL and PL/SQL
Scala
TypeScript
Wolfram Language
Elixir
Nim
Crystal
Rules in function overloading
The same function name is used for more than one function definition
The functions must differ either by the arity or types of their parameters
It is a classification of static polymorphism in which a function call is resolved using some "best match" algorithm, where the particular function to call is resolved by finding the best match of the formal parameter types with the actual parameter types. The details of this algorithm vary from language to language.
Function overloading is usually associated with statically-typed programming languages that enforce type checking in function calls. An overloaded function is really just a set of different functions that happen to have the same name. For any particular call, the compiler determines which overloaded function to use, and resolves this at compile time. This is true for programming languages such as Java.
In Java, function overloading is also known as compile-time polymorphism and static polymorphism.
Function overloading should not be confused with forms of polymorphism where the choice is made at runtime, e.g. through virtual functions, instead of statically.
Example: Function overloading in C++
#include <iostream>
int Volume(int s) { // Volume of a cube.
return s * s * s;
}
double Volume(double r, int h) { // Volume of a cylinder.
return 3.1415926 * r * r * static_cast<double>(h);
}
long Volume(long l, int b, int h) { // Volume of a cuboid.
return l * b * h;
}
int main() {
std::cout << Volume(10);
std::cout << Volume(2.5, 8);
std::cout << Volume(100l, 7 |
https://en.wikipedia.org/wiki/World3 | The World3 model is a system dynamics model for computer simulation of interactions between population, industrial growth, food production and limits in the ecosystems of the earth. It was originally produced and used by a Club of Rome study that produced the model and the book The Limits to Growth (1972). The creators of the model were Dennis Meadows, project manager, and a team of 16 researchers.
The model was documented in the book Dynamics of Growth in a Finite World. It added new features to Jay Wright Forrester's World2 model. Since World3 was originally created, it has had minor tweaks to get to the World3/91 model used in the book Beyond the Limits, later improved to get the World3/2000 model distributed by the Institute for Policy and Social Science Research and finally the World3/2004 model used in the book Limits to Growth: the 30 year update.
World3 is one of several global models that have been generated throughout the world (Mesarovic/Pestel Model, Bariloche Model, MOIRA Model, SARU Model, FUGI Model) and is probably
the model that generated the spark for all later models .
Model
The model consisted of several interacting parts. Each of these dealt with a different system of the model. The main systems were
the food system, dealing with agriculture and food production
the industrial system
the population system
the non-renewable resources system
the pollution system
Agricultural system
The simplest useful view of this system is that land and fertilizer are used for farming, and more of either will produce more food. In the context of the model, since land is finite, and industrial output required to produce fertilizer and other agricultural inputs can not keep up with demand, there necessarily will be a food collapse at some point in the future.
Nonrenewable resources system
The nonrenewable resource system starts with the assumption that the total amount of resources available is finite (about 110 times the consumption at 1990s rates for the World3/91 model). These resources can be extracted and then used for various purposes in other systems in the model. An important assumption that was made is that as the nonrenewable resources are extracted, the remaining resources are increasingly difficult to extract, thus diverting more and more industrial output to resource extraction.
Reference run predictions
The Dynamics of Growth in a Finite World provides several different scenarios. The "reference run" is the one that "represent the most likely behavior mode of the system if the process of industrialization in the future proceeds in a way very similar to its progress in the past, and if technologies and value changes that have already been institutionalized continue to evolve." In this scenario, in 2000, the world population reaches six billion, and then goes on to peak at seven billion in 2030. After that population declines because of an increased death rate. In 2015, both industrial output per capita and food per capi |
https://en.wikipedia.org/wiki/Inference%20engine | In the field of artificial intelligence, an inference engine is a component of an intelligent system that applies logical rules to the knowledge base to deduce new information. The first inference engines were components of expert systems. The typical expert system consisted of a knowledge base and an inference engine. The knowledge base stored facts about the world. The inference engine applied logical rules to the knowledge base and deduced new knowledge. This process would iterate as each new fact in the knowledge base could trigger additional rules in the inference engine. Inference engines work primarily in one of two modes either special rule or facts: forward chaining and backward chaining. Forward chaining starts with the known facts and asserts new facts. Backward chaining starts with goals, and works backward to determine what facts must be asserted so that the goals can be achieved.
Additionally, the concept of 'inference' has expanded to include the process through which trained neural networks generate predictions or decisions. In this context, an 'inference engine' could refer to the specific part of the system, or even the hardware, that executes these operations. This type of inference plays a crucial role in various applications, including (but not limited to) image recognition, natural language processing, and autonomous vehicles. The inference phase in these applications is typically characterized by a high volume of data inputs and real-time processing requirements.
Architecture
The logic that an inference engine uses is typically represented as IF-THEN rules. The general format of such rules is IF <logical expression> THEN <logical expression>. Prior to the development of expert systems and inference engines, artificial intelligence researchers focused on more powerful theorem prover environments that offered much fuller implementations of first-order logic. For example, general statements that included universal quantification (for all X some statement is true) and existential quantification (there exists some X such that some statement is true). What researchers discovered is that the power of these theorem-proving environments was also their drawback. Back in 1965, it was far too easy to create logical expressions that could take an indeterminate or even infinite time to terminate. For example, it is common in universal quantification to make statements over an infinite set such as the set of all natural numbers. Such statements are perfectly reasonable and even required in mathematical proofs but when included in an automated theorem prover executing on a computer may cause the computer to fall into an infinite loop. Focusing on IF-THEN statements (what logicians call modus ponens) still gave developers a very powerful general mechanism to represent logic, but one that could be used efficiently with computational resources. What is more, there is some psychological research that indicates humans also tend to favor IF-TH |
https://en.wikipedia.org/wiki/GDF | GDF may refer to:
Civic Democratic Forum (Građanski demokratski forum), a political party in Serbia
Gaz de France, a defunct French energy company
General Data Format for Biomedical Signals
Geographic Data Files
Geological disposal facility
Glasnost Defense Foundation, a Russian human rights organization
Global Development Finance, an economic database
Growth differentiation factor
Guardia di Finanza, an Italian law enforcement agency
Guduf-Gava language
Guyana Defence Force |
https://en.wikipedia.org/wiki/LX | LX or Lx may refer to:
Arts and entertainment
LX (rapper), of 187 Strassenbande
LX (TV network), local news online and over-the-air network
LXTV, a lifestyle and entertainment TV programming production unit of NBCUniversal
Electronics and software
HP LX series, a palmtop computer series
OpenMandriva Lx, a Linux distribution
Pentax LX, a camera
SPARCstation LX, a workstation
T-Mobile Sidekick LX, a smartphone
Science and mathematics
60 (number) in Roman numerals
Lux (symbol: lx), the SI derived unit of illuminance
Linear Executable, the executable file format used by OS/2
Lipoxin, in medicine
Transportation
Air transport
Swiss International Air Lines, IATA airline code LX
Automobiles
Aion LX, a Chinese electric mid-size SUV
Chrysler LX platform, an American automobile platform
Exeed LX, a Chinese luxury compact SUV
Lexus LX, a Japanese luxury full-size SUV
Lotus LX, a one-off version of the Lotus Elite
Motorcycles
Vespa LX, a series of Italian scooters
Trucks
MAN LX and FX ranges of tactical trucks, a range of Dutch tactical trucks
Other uses
Lisbon, Portugal, commonly abbreviated as "LX" or "Lx"
LX Cycling Team, from South Korea
See also |
https://en.wikipedia.org/wiki/XC | XC may refer to:
Science and technology
XC (programming language), a concurrent programming language developed by XMOS
Capacitive reactance or XC, a property of a capacitor
Exact cover problem, in theoretical computer science
Xeno-canto, citizen science website for bird calls
Xerox copy, in correspondence
Xylene cyanol, a color marker used in gel electrophoresis
Sport
Cross-country running
Cross-country skiing
Cross-country cycling
Cross-country equestrianism
Cross-country gliding
Symbols
90 (number), in Roman numerals
Christogram, a mongram for Jesus Christ
Transport
Aviation
Corendon Airlines, Turkey (founded 2004; IATA designator: XC)
KD Air, Canada (1990–2019; obsolete IATA designator: XC)
Wills Wing XC, an American hang glider design
XC, a Mexican government aircraft registration prefix
Land transport
Ford Falcon (XC), an Australian series of car models
XC Trains (trading as: Cross Country), a British rail operator
Other uses
Xenoblade Chronicles, a series of video games developed by Monolith Soft
Xavier College, a school in Melbourne, Australia
See also
10C (disambiguation) |
https://en.wikipedia.org/wiki/EA%20Sports | EA Sports is a division of Electronic Arts that develops and publishes sports video games. Formerly a marketing gimmick of Electronic Arts, in which they tried to imitate real-life sports networks by calling themselves the "EA Sports Network" (EASN) with pictures or endorsements with real commentators such as John Madden, it soon grew up to become a sub-label on its own, releasing game series such as EA Sports FC, PGA Tour, NHL, NBA Live, and Madden NFL.
Most games under this brand are developed by EA Vancouver, the Electronic Arts studio in Burnaby, British Columbia as well as EA Tiburon in Maitland, Florida. The main rival to EA Sports is 2K Sports. Notably, both companies compete over the realm of NBA games, with 2K releasing the NBA 2K series. Konami is its rival in association football games with their own series, eFootball.
For several years after the brand was created, all EA Sports games began with a stylized five-second video introducing the brand with Andrew Anthony voicing its motto, "It's in the game", meaning that its games aimed at simulating the actual sports as authentically and completely as possible; Anthony was never compensated for his appearance and did it merely as a favour to a friend.
Unlike some other sports game companies, EA Sports has no special ties to a single platform, which means that all games are released for the best-selling active platforms, sometimes long after most of the other companies abandon them. For example, FIFA 98, Madden NFL 98, NBA Live 98, and NHL 98 were released for the Sega Genesis and the Super NES throughout 1997; Madden NFL 2005 and FIFA 2005 had PlayStation releases in 2004 (FIFA 2005 and Madden NFL 2005 were also the last two PlayStation titles to be released); and NCAA Football 08 had an Xbox release in 2007. Madden NFL 08 also had Xbox and GameCube releases in 2007, and was the final title released for the GameCube, with Madden NFL 09 following as the final Xbox title. Additionally, NASCAR Thunder 2003 and NASCAR Thunder 2004 were released not only for the PlayStation 2, but for the original PlayStation as well. EA Sports brand name is used to sponsor English Football League Two team Swindon Town F.C. from the 2009–10 season onward and the EA Sports Cup in the Republic of Ireland. In July 2021, hackers who breached Electronic Arts in June 2021, have released the entire cache of stolen data after failing to extort the company and later sell the stolen files to a third-party buyer. Prior to the start of the 2023–24 season, EA Sports signed with the Spanish football league association, Liga Nacional de Fútbol Profesional to sponsor both first and second tier competitions which were under the title name, "LaLiga EA Sports" and "LaLiga Hypermotion" for five seasons with the €30 million a year deal.
In June 2023, EA announced a restructuring of the company, having EA Entertainment and EA Sports as two separate divisions inside the business, with Cam Weber becoming the president of the divis |
https://en.wikipedia.org/wiki/Casio%20Cassiopeia | Casio Cassiopeia was the brand name of a PDA manufactured by Casio. It used Windows CE as the Operating system. Casio was one of the first manufacturers of PDAs, developing at the beginning small pocket-sized computers with keyboards and grayscale displays and subsequently moving to smaller units in response to customer demand.
Cassiopeia A-10, A-11 and A-11+
Operating system: Microsoft Windows CE 1.0 Handheld PC edition
Size: 175 mm x 92 mm x 26.5 mm :: 380 g
CPU: Hitachi SH-3 at 44 MHz
Memory: RAM 2 MB and ROM 4 MB
Display: FSTN LCD, 480 x 240 Pixel, 4 shades of gray
Interface: Serial and IrDA (ver. 1.0)
Expansion slot: PC card Type II
Battery: 2x AA, up to 20 hours of running time; CR2032 for memory protection
Input: Keyboard and Touch Screen
Extras: Speaker
1997 Feb
Cassiopeia A-20, A-21S, A-22T, A-23G
Operating system: Microsoft Windows CE 2.0 Handheld PC edition
Size: 185 mm x 94 mm x 24.5 mm :: 430 g
CPU: Hitachi SH3 at 80 MHz
Memory: RAM 8 MB and ROM 8 MB
Display: FSTN LCD, 640 x 240 Pixel, 4 shades of gray
Interface: Serial and IrDA (Infrared) (ver. 1.0)
Expansion slots: CompactFlash Type I and PC card Type II
Battery: 2x AA,(And rechargeable battery pack) up to 25 hours of running time; CR2032 for memory protection
Input: Keyboard and Touch Screen
Extras: Speaker, Microphone
1999 May
It was quickly discovered that most consumers wanted smaller devices, so the Palm-size PCs were developed. Japanese models of these units differ in both model number as well as appearance. The E-5x and/or E-5xx models are Japanese versions, colored blue instead of silver. The following versions were developed; A21-S for Student, A22-T for Teachers, A-23G for German with AZERTY keyboard, A-20F for French.
Cassiopeia A-50, A-51, A-55 and A-60
Operating system: Microsoft Windows CE 1.01 and 2.0 Handheld PC edition
Size: 185 mm x 94 mm x 24.5 mm
CPU: Hitachi SH3 at 80 MHz
Memory: RAM 4 or 8 MB and ROM 8 MB
Display: FSTN LCD, 480 x 240 Pixel, 4 shades of gray
Interface: Serial and IrDA (Infrared) (ver. 1.0)
Expansion slots: CompactFlash Type I and PC card Type II
Battery: 2x AA,(And rechargeable battery pack) up to 25 hours of running time; CR2032 for memory protection
Input: Keyboard and Touch Screen
Extras: Speaker, Microphone
Cassiopeia E-10
Operating system: Microsoft Windows CE 2.01 Palm-size PC edition
Size: 80 mm x 120 mm x 20 mm :: 184 g
CPU: NEC VR4111 MIPS at 69 MHz
Memory: RAM 4 MB and ROM 8 MB
Display: FSTN LCD, 240 x 320 Pixel, 4 shades of gray
Interface: Serial and IrDA (ver. 1.0)
Expansion slots: CompactFlash Type I and II
Battery 2x AAA, up to 25 hours of running time; CR2016 for memory protection
Input: Touch Screen, Microphone, 4 user-configurable buttons and a control pad
Extras: Speaker and Stereo 3.5 mm headphone jack
Cassiopeia E-11
Operating system: Microsoft Windows CE 2.01 Palm-size PC edition
Size: 80 mm x 120 mm x 20 mm :: 184 g
CPU: NEC VR4111 MIPS at 69 MHz
Memory: RAM 8 M |
https://en.wikipedia.org/wiki/Trio%20%28TV%20network%29 | Trio (stylized as TR!O) was an American cable and satellite television network.
Trio went on the air in 1994, then originally owned and operated jointly by the Canadian Broadcasting Corporation and Power Broadcasting Inc. (a subsidiary of Power Corporation of Canada) along with 24-hour international news channel Newsworld International. The channel served as a venue for airing the CBC's arts, culture and entertainment programming in the U.S. It was sold to USA Networks in 2000, and was subsequently transferred to Vivendi Universal and later NBC Universal.
With the slogan, "pop, culture, TV", Trio programming under Vivendi/NBC Universal ownership focused on television as a cultural tool and art form.
In January 2005, Trio was dropped from DirecTV, eliminating about two-thirds of the homes that could receive the network. On November 21, 2005, NBC Universal announced that the Trio brand would be transferred to a broadband Internet TV initiative under the Bravotv.com banner on January 1, 2006. Cable and satellite providers still carrying Trio were offered a new NBC Universal cable network instead, called Sleuth, which was renamed Cloo in 2011. On February 1, 2017, Cloo would shut down, thus the channel space once occupied by Trio ceased to exist.
Notable Trio programs
Original
The N-Word, Peabody Award–winning documentary starring Whoopi Goldberg, Samuel L. Jackson and many other African American celebrities discussing the origin and power of the word nigger.
Outlaw Comic: The Censoring of Bill Hicks, documentary hosted by Janeane Garofalo, focusing on his David Letterman appearances, especially his last one, where he was cut from the program.
The Award Show Awards Show, examination of America's obsession with awards
The Christmas Special Christmas Special
Film Fanatic, cinema, hosted by Amy Sedaris
Flops 101: Lessons from the Biz
TV's Most Censored Moments, a documentary about censorship in television.
The Blockbuster Imperative, a documentary about Hollywood's obsession with blockbuster movies.
Saturday Spin Theatre, feature films like Leon the Pig Farmer and The Legend of the North Wind.
Reruns
Adrenaline Junkies (a.k.a. Medivac) (1999–2002)
Airline (1999-2002)
All Saints (1999-2002)
Battle of the Network Stars (2003-04)
Black Harbour (1998-2004)
Blue Heelers (1996-2004)
Brides of Christ (1993-96)
Bugs (1999-2002)
Coming Home (1999-2001)
Coronation Street (1999-2004)
Counterstrike (1994-1999)
Cracker (1999-2002)
The Dame Edna Experience (2002-04)
The Damnation of Harvey McHugh (1999-02)
Deepwater Black (1998-2000)
Degrassi (1994-2004)
Dog House (1996-99)
The Dreamstone (1994-96)
Duggan (1999-2002)
EGG, the Arts Show (2003-04)
E.N.G. (1994-98)
The Fifth Estate (1994-99)
Flightpath (Canadian TV series) (1998-2004)
Good Guys, Bad Guys (1999-2002)
Hot Type (1999-2004)
Judy Garland Show Christmas Special (1994-96, 2003-04)
Kath & Kim (2002-04)
Late Night with David Letterman (1994-96, 2003-04)
The Little F |
https://en.wikipedia.org/wiki/List%20of%20ABC%20television%20affiliates%20%28by%20U.S.%20state%29 | The American Broadcasting Company (ABC) is an American broadcast television television network owned by the Disney Media Networks subsidiary of The Walt Disney Company, which originated in 1927 as the NBC Blue radio network, and five years after its 1942 divorce from NBC and purchase by Edward J. Noble (adopting its current name the following year), expanded into television in April 1948. The network currently has eight owned-and-operated stations, and current affiliation agreements with 242 other television stations.
This article is a listing of current ABC affiliates in the continental United States and U.S. possessions (including subchannel affiliates, satellite stations and select low-power translators), arranged alphabetically by state, and based on the station's city of license, and followed in parentheses by the Designated Market Area if it differs from the city of license. There are links to and articles on each of the stations, describing their histories, local programming and technical information, such as broadcast frequencies.
The station's advertised channel number follows the call letters. In most cases, this is their virtual channel (PSIP) number.
Stations listed in boldface are owned and operated by ABC through its subsidiary ABC Owned Television Stations.
United States
Alabama
Anniston – WGWW-DT2 40.2 (simulcast of WBMA-LD)
Birmingham – WBMA-LD 58 / WABM-DT2 68.2
Dothan – WDHN 18
Huntsville – WAAY-TV 31
Montgomery – WNCF 32
Tuscaloosa – WDBB-DT2 17.2 (satellite of WBMA-LD)
Alaska
Some ABC programming is broadcast on the Alaska Rural Communications Service (ARCS).
Anchorage – KYUR 13
Fairbanks – KATN 2
Juneau – KJUD 8
Arizona
Phoenix – KNXV-TV 15
Tucson – KGUN-TV 9
Arkansas
Fayetteville – KHOG-TV 29 (satellite of KHBS)
Fort Smith – KHBS 40
Jonesboro – KAIT 8
Little Rock – KATV 7
California
Arcata (Eureka) – KAEF-TV 23 (semi-satellite of KRCR-TV)
Bakersfield – KERO-TV 23
El Centro (Yuma, Arizona) – KECY-DT2 9.2
Fresno – KFSN-TV 30
Los Angeles – KABC-TV 7
Palm Springs – KESQ-TV 42
Redding (Chico) – KRCR-TV 7
Sacramento – KXTV 10
Salinas (Monterey) – KSBW-DT2 8.2
San Diego – KGTV 10
San Francisco – KGO-TV 7
Santa Barbara – KEYT-TV 3
Colorado
Colorado Springs – KRDO-TV 13
Denver – KMGH-TV 7
Grand Junction – KJCT-LP 8
Connecticut
New Haven (Hartford) – WTNH-TV 8
Delaware
None; served by WPVI-TV Philadelphia and WMDT Salisbury, MD
District of Columbia
Washington – WJLA-TV 7
Florida
Gainesville – WCJB-TV 20
Miami – WPLG 10
Naples (Fort Myers) – WZVN-TV 26
Orange Park (Jacksonville) – WJXX 25
Orlando – WFTV 9
Panama City – WMBB 13
Pensacola (Mobile, Alabama) – WEAR-TV 3
Sarasota – WWSB 40
Tallahassee – WTXL-TV 27
Tampa – WFTS-TV 28
Tequesta (West Palm Beach) – WPBF 25
Georgia
Albany – WALB-DT2 10.2
Atlanta – WSB-TV 2
Augusta – WJBF 6
Columbus – WTVM 9
Macon – WGXA-DT2 24.2
Savannah – WJCL 22
Hawaii
Hilo – KHVO-TV 4 (satellite of KITV)
Honolulu – KITV 4
Wailuku – KMAU-TV |
https://en.wikipedia.org/wiki/RTLinux | RTLinux is a hard realtime real-time operating system (RTOS) microkernel that runs the entire Linux operating system as a fully preemptive process. The hard real-time property makes it possible to control robots, data acquisition systems, manufacturing plants, and other time-sensitive instruments and machines from RTLinux applications. The design was patented. Despite the similar name, it is not related to the Real-Time Linux project of the Linux Foundation.
RTLinux was developed by Victor Yodaiken, Michael Barabanov, Cort Dougan and others at the New Mexico Institute of Mining and Technology and then as a commercial product at FSMLabs. Wind River Systems acquired FSMLabs embedded technology in February 2007 and made a version available as Wind River Real-Time Core for Wind River Linux. As of August 2011, Wind River has discontinued the Wind River Real-Time Core product line, effectively ending commercial support for the RTLinux product.
Background
The key RTLinux design objective was to add hard real-time capabilities to a commodity operating system to facilitate the development of complex control programs with both capabilities. For example, one might want to develop a real-time motor controller that used a commodity database and exported a web operator interface. Instead of attempting to build a single operating system that could support real-time and non-real-time capabilities, RTLinux was designed to share a computing device between a real-time and non-real-time operating system so that (1) the real-time operating system could never be blocked from execution by the non-real-time operating system and (2) components running in the two different environments could easily share data. As the name implies RTLinux was originally designed to use Linux as the non-real-time system but it eventually evolved so that the RTCore real-time kernel could run with either Linux or Berkeley Software Distribution (BSD) Unix.
Multi-Environment Real-Time (MERT) was the first example of a real-time operating system coexisting with a Unix system. MERT relied on traditional virtualization techniques: the real-time kernel was the host operating system (or hypervisor) and Bell Systems Unix was the guest. RTLinux was an attempt to update the MERT concept to the PC era and commodity hardware. It was also an attempt to also overcome the performance limits of MERT, particularly the overhead introduced by virtualization.
Instead of encapsulating the guest OS in a virtual machine, RTLinux virtualized only the guest interrupt control. This method allowed the real-time kernel to convert the guest operating system into a system that was completely preemptible but that could still directly control, for example, storage devices. In particular, standard drivers for the guest worked without source modification although they needed to be recompiled to use the virtualization "hooks". See also paravirtualization. The Unix pipe was adapted to permit real-time and non-real-time pro |
https://en.wikipedia.org/wiki/Mario%20Teaches%20Typing | Mario Teaches Typing is an educational video game developed and published by Interplay Productions for MS-DOS compatible operating systems, Microsoft Windows, and Macintosh. The game uses the Mario character, licensed from Nintendo, to teach keyboard skills. A sequel to the game, Mario Teaches Typing 2, was developed by Brainstorm and published by Interplay in 1997.
Gameplay
Mario Teaches Typing lets the player enter a name, select either Mario, Luigi, or Princess Peach as the player character, and set their target words per minute (WPM) rate. In the base mode, the player must type out a given text without additional decor. There are three difficulty levels of typing challenges based on Super Mario World: The chosen character continuously runs to the right until encountering an obstacle or enemy adorned with a letter (level 1), word (level 2), or sentence (level 3). Entering this string correctly allows the character to proceed. At the end of either mode, the game presents the player with statistics, including the reached WPM and error rate. Localized versions exists, such as a German release that supports QWERTZ keyboards and umlauts.
Development and release
Mario Teaches Typing was conceived and developed by Brian Fargo, at the time head of developer Interplay Entertainment and future founder of inXile Entertainment and Robot Cache. Fargo was acquaintances with Les Crane, a talk show host and radio announcer, who had also developed the educational typing game Mavis Beacon Teaches Typing. The game was successful and inspired Fargo to create a typing game of his own. Considering who could be the face and teacher of the game, he found Mario to be a good fit. Pitching the game to Nintendo, according to Fargo "they loved it and it was a huge success". The CD-ROM version of the game was produced by Thomas R. Decker, a producer for Interplay whose past titles included Mario's Game Gallery and Kingdom: the Far Reaches. Mario Teaches Typing reuses the title theme from Super Mario World. The game was released in the United States in 1992 and in the United Kingdom in 1993. Mario Teaches Typing was the first game by Nintendo that released for hardware outside of their own.
Fargo told IGN in an interview that when he attended Crane's talk show after the game's release, he saw that Crane was "giving me the stink eye". He called Crane afterward, who expressed disapproval of Mario Teaches Typing; the game was successful enough to become a direct competitor to Mavis Beacon Teaches Typing. According to Fargo, "somebody else came out with some other Mario product that was not high quality" for computers, resulting in Nintendo cutting ties with Interplay Entertainment.
In the CD version, Mario was voiced by Charles Martinet, which would be among his first times using the voice for a Mario video game. He also performed the motions and expressions for the character through virtual actor tracking sensors. Martinet considered Mario Teaches Typing to be one of h |
https://en.wikipedia.org/wiki/Adrian%20Monk | Adrian Monk, portrayed by Tony Shalhoub, is the title character and protagonist of the USA Network television series Monk. He is a renowned former homicide detective for the San Francisco Police Department. Monk has obsessive–compulsive disorder (OCD) and multiple phobias, all of which intensified after the murder of his wife Trudy, resulting in his suspension from the department. He works as a private police homicide consultant and undergoes therapy with the ultimate goal of overcoming his grief, taking control of his phobias and disorder, and being reinstated as a police detective.
Series co-creator David Hoberman says that he based Monk partly on himself, and also on other fictional detectives, such as Lt. Columbo, Hercule Poirot and Sherlock Holmes. Other actors considered for the role included Dave Foley, John Ritter, Henry Winkler, Stanley Tucci, Alfred Molina and Michael Richards. The network eventually chose Shalhoub because they felt he could "bring the humor and passion of Monk to life". Stanley Tucci and Alfred Molina had guest appearances on Monk, with Tucci appearing in season 5 episode "Mr. Monk and the Actor", and Molina appearing in season 6 episode "Mr. Monk and the Naked Man".
Both Monk and Shalhoub have garnered many accolades. Monk was included in Bravo's list of The 100 Greatest Television Characters of All Time, and Shalhoub has won various awards for his portrayal, including a Golden Globe Award, three Primetime Emmy Awards and two Screen Actors Guild Awards.
Character development
Creation
Monk was originally envisioned as a "more goofy and physical" Inspector Clouseau type of character. However, co-creator David Hoberman came up with the idea of a detective with obsessive–compulsive disorder. This was inspired by his own bout with self-diagnosed obsessive–compulsive disorder; in a Pittsburgh Post-Gazette interview, he stated that, "Like Monk, I couldn't walk on cracks and had to touch poles. I have no idea why—but if I didn't do these things, something terrible would happen."
Other fictional inspirations include Columbo and Sherlock Holmes, and his obsession with neatness and order may be an homage to Hercule Poirot. Like Holmes, and occasionally Poirot, Monk is accompanied by an earnest assistant with little or no detective ability, similar to Doctor Watson and Captain Hastings, respectively; Monk's two major allies from the police department, Captain Stottlemeyer and Lieutenant Disher (credited as "Deacon" in the pilot episode), are reminiscent of Inspector Lestrade and Chief Inspector Japp, Holmes's and Poirot's well-meaning but ineffectual respective police counterparts. In addition, Monk has a brother whose abilities of deduction are even more amazing than his, yet much more geographically limited due to his own personal problems, somewhat in the style of Mycroft Holmes (who is more adept than Sherlock but also notoriously lazy).
When trying to think of a possible name for the character, co-creator Andy Breckman |
https://en.wikipedia.org/wiki/Mindpixel | Mindpixel was a web-based collaborative artificial intelligence project which aimed to create a knowledgebase of millions of human validated true/false statements, or probabilistic propositions. It ran from 2000 to 2005.
Description
Participants in the project created one-line statements which aimed to be objectively true or false to 20 other anonymous participants. In order to submit their statement they had first to check the true/false validity of 20 such statements submitted by others. Participants whose replies were consistently out of step with the majority had their status downgraded and were eventually excluded. Likewise, participants who made contributions which others could not agree were objectively true or false had their status downgraded. A validated true/false statement is called a mindpixel.
The project enlisted the efforts of thousands of participants and claimed to be "the planet's largest artificial intelligence effort".
The project was conceived by Chris McKinstry, a computer scientist and former Very Large Telescope operator for the European Southern Observatory in Chile, as MISTIC (Minimum Intelligent Signal Test Item Corpus) in 1996. Mindpixel was developed out of this program, and started in 2000 and had 1.4 million mindpixels in January 2004. The database and its software is known as GAC, which stands for "Generic Artificial Consciousness" and is pronounced Jak.
McKinstry believed that the Mindpixel database could be used in conjunction with a neural net to produce a body of human "common sense" knowledge which would have market value. Participants in the project were promised shares in any future value according to the number of mindpixels they had successfully created.
On 20 September 2005 Mindpixel lost its free server and is no longer operational. It was being rewritten by Chris McKinstry as Mindpixel 2 and was intended to appear on a new server in France.
Chris McKinstry died of suicide on 23 January 2006 and the future of the project and the integrity of the data is uncertain. The mindpixel.com domain currently points to an IQ test web site.
Some Mindpixel data have been utilized by Michael Spivey of Cornell University and Rick Dale of The University of Memphis to study theories of high-level reasoning and continuous temporal dynamics of thought. McKinstry, along with Dale and Spivey, designed an experiment that has now been published in Psychological Science in its January, 2008 issue. In this paper, McKinstry (as posthumous first author), Dale, and Spivey use a very small and carefully selected set of Mindpixel statements to show that even high-level thought processes like decision making can be revealed in the nonlinear dynamics of bodily action.
Other similar AI-driven knowledge acquisition projects are Never-Ending Language Learning and Open Mind Common Sense (run by MIT), the latter being also hampered when its director died of suicide.
See also
Never-Ending Language Learning
Cyc
References
E |
https://en.wikipedia.org/wiki/Input%20method | An input method (or input method editor, commonly abbreviated IME) is an operating system component or program that enables users to generate characters not natively available on their input devices by using sequences of characters (or mouse operations) that are available to them. Using an input method is usually necessary for languages that have more graphemes than there are keys on the keyboard.
For instance, on the computer, this allows the user of Latin keyboards to input Chinese, Japanese, Korean and Indic characters. On hand-held devices, it enables the user to type on the numeric keypad to enter Latin alphabet characters (or any other alphabet characters) or touch a screen display to input text. On some operating systems, an input method is also used to define the behaviour of the dead keys.
Implementations
Although originally coined for CJK (Chinese, Japanese and Korean) computing, the term is now sometimes used generically to refer to a program to support the input of any language. To illustrate, in the X Window System, the facility to allow the input of Latin characters with diacritics is also called an input method.
On Windows XP or later Windows, Input method, or IME, are also called Text Input Processor, which are implemented by the Text Services Framework API.
Relationship between the methodology and implementation
While the term input method editor was originally used for Microsoft Windows, its use has now gained acceptance in other operating systems, especially when it is important to distinguish between the computer interface and implementation of input methods, or among the input methods themselves, the editing functionality of the program or operating system component providing the input method, and the general support of input methods in an operating system. This term has, for example, gained general acceptance on the Linux operating system; it is also used on the Mac OS.
The term input method generally refers to a particular way to use the keyboard to input a particular language, for example the Cangjie method, the pinyin method, or the use of dead keys.
On the other hand, the term input method editor on Microsoft products refers to the actual program that allows an input method to be used (for example MS New Pinyin). PRIME or SCIM prefer the term of Input Method Engine, Input Method platform or Input Method environment, or the actual editing area that allows the user to do the input. It can also refer to a character palette, which allows any Unicode character to be input individually. One might also interpret IME to refer to the editor used for creating or modifying the data files upon which an input method relies.
See also
Internationalization and localization
CJK characters
Related techniques
Alt codes
Keyboard layout, in particular dead keys
Input methods versus language
Chinese input methods for computers
Japanese language and computers and Japanese input methods
Korean language and computers
Vietnamese language |
https://en.wikipedia.org/wiki/Glenn%20Wichman | Glenn R. Wichman (born in 1960 in Bay City, Michigan) is a software developer and one of the original authors of the computer game Rogue, along with Michael Toy, Ken Arnold and Jon Lane. Wichman has also contributed to many other commercial software programs, including Microsoft Bookshelf, Mavis Beacon Teaches Typing and Quicken. He is the creator of the Macintosh shareware games Toxic Ravine and Mombasa.
References
External links
Video game programmers
1960 births
Living people |
https://en.wikipedia.org/wiki/Visual%20J%20Sharp | Visual J# (pronounced "jay-sharp") is a discontinued implementation of the J# programming language that was a transitional language for programmers of Java and Visual J++ languages, so they could use their existing knowledge and applications with the .NET Framework. It was introduced in 2002 and discontinued in 2007, with support for the final release of the product continuing until October 2017.
J# worked with Java bytecode as well as source so it could be used to transition applications that used third-party libraries, even if their original source code was unavailable. It was developed by the Hyderabad-based Microsoft India Development Center at HITEC City in India.
The implementation of Java in Visual J++, MSJVM, did not pass Sun's compliance tests leading to a lawsuit from Sun, Java's creator, and creation of J#. Microsoft ceased such support for the MSJVM on December 31, 2007 (later Oracle bought Sun, and with it Java and its trademarks). Microsoft however, officially started distributing Java again in 2021 (though not bundled with Windows or its web browsers as before with J++), i.e. their build of Oracle's OpenJDK, which Microsoft plans to support for at least 6 years, for LTS versions, i.e. to September 2027 for Java 17.
Fundamental differences between J# and Java
Java and J# use the same general syntax but there are non-Java conventions in J# to support the .NET environment. For example, to use .NET "properties" with a standard JavaBean class, it is necessary to prefix getter and setter methods with the Javadoc-like annotation:
/** @beanproperty */
…and change the corresponding private variable name to be different from the suffix of the getXxx/setXxx names.
J# does not compile Java-language source code to Java bytecode (.class files), and does not support Java applet development or the ability to host applets directly in a web browser, although it does provide a wrapper called Microsoft J# Browser Controls for hosting them as ActiveX objects. Finally, Java Native Interface (JNI) and raw native interface (RNI) are substituted with P/Invoke; J# does not support remote method invocation (RMI).
InfoWorld said: "J#'s interface to the .NET framework is solid, but not as seamless as C#. In particular, J# code cannot define new .NET attributes, events, value types, or delegates. J# can make use of these language constructs if they are defined in an assembly written in another language, but its inability to define new ones limits J#'s reach and interoperability compared to other .NET languages."
Contrariwise, Microsoft documentation for Visual Studio 2005 details the definition of .NET delegates, events, and value types directly in J#.
History of J#
In January 2007, Microsoft announced:
That Microsoft would produce an updated version of Visual J# 2.0, including a 64-bit redistributable version, called J# 2.0 Second Edition to meet customer demand for 64-bit runtime support. Microsoft released Visual J# 2.0 Second Edition in May 200 |
https://en.wikipedia.org/wiki/JS | JS or js may refer to:
Computing
JavaScript, a high-level, just-in-time compiled, object-oriented programming language
JScript, Microsoft's dialect of the ECMAScript standard used in Internet Explorer
Businesses and organizations
Jonge Socialisten, a Dutch political group
Air Koryo, North Korea's state-run airline, IATA code JS
Jahangir Siddiqui & Co., a Pakistani financial services company
JS Model, Chinese manufacturer of UAVs
Jaffna Stallions, a team participating in Lanka Premier League
United Serbia (Jedinstvena Srbija), a political party in Serbia
JS Global, a Chinese manufacturer of home appliances
Other uses
JS (band), an American female R&B duo
"JS" (song), by Mamoru Miyano, 2009
Japanese Ship, a ship prefix used by the Japanese military
Jiangsu, a province of China
Joule-second (J s, or J∙s), describing the amount of action, or the unit measure of angular momentum
Joule/second (J/s), or watt, a unit of power
IS tank family, an acronym for Joseph Stalin, sometimes anglicized as JS
, the official symbol for the Shōnan–Shinjuku Line in Japan
See also
Sainsbury's, trade name of J Sainsbury plc, the UK's third largest chain of supermarkets |
https://en.wikipedia.org/wiki/Exile%20%28Star%20Trek%3A%20Enterprise%29 | "Exile" is the fifty-eighth episode of the American science fiction television series Star Trek: Enterprise, the sixth episode of season three. It first aired on October 15, 2003 on the UPN network in the United States, and was the first time the show was broadcast in High Definition. The episode was written by Phyllis Strong and directed by former Star Trek: Voyager actress Roxann Dawson.
Set in the 22nd century, the series follows the adventures of the first Starfleet starship Enterprise, registration NX-01. In this episode, Ensign Hoshi Sato (Linda Park) is contacted telepathically by an alien named Tarquin (Maury Sterling), who offers assistance with the Xindi. Whilst she visits Tarquin at his home, the rest of the crew investigate another mysterious sphere within the expanse.
The episode was seen as a take on Beauty and the Beast, with Sterling required to wear a full head prosthetic when Tarquin was in his non-human form. Several sets were created in a gothic style to represent Tarquin's home, while the anomalies created by the Delphic Expanse sphere were added in post production. The episode was the lowest rated so far of season three, having aired at the same time as Major League Baseball playoffs. It received a rating of 2.3, which was 0.3 lower than a re-run of "The Xindi" a week later at the same time as the World Series. The critical response was generally positive.
Plot
Sub-Commander T'Pol, examining gravitational anomaly patterns, calculates the location of a second sphere within the Delphic Expanse , and Enterprise diverts course to investigate. Meanwhile, Ensign Sato is contacted telepathically by Tarquin, an alien that appears to her in human form.
Enterprise soon arrives at Tarquin's planet. He welcomes Archer and Hoshi and explains that he can telepathically read objects, and suggests that Enterprise bring him a Xindi object; they give him part of the weapon used to attack Earth . He adds a condition: he will only help them if Sato agrees to remain with him while he works. They reluctantly agree, and Enterprise departs to investigate the second sphere. Tarquin and Sato discuss many subjects and initially the alien seems trustworthy. She also discovers that he had been watching her telepathically for some time and that she is not the first person to be brought here to provide companionship for him; the graves of four earlier companions lie outside his home.
Meanwhile, Enterprise approaches the sphere, but has to halt its approach due to damage from the spatial anomalies generated by it. The ship sends down a shuttlepod insulated with Trellium-D , and is able to approach close enough to take readings. Archer and Trip return to Enterprise and set course to retrieve Sato. Meanwhile, Tarquin attempts to trick her into staying with him permanently, but she refuses and threatens to destroy a device which enhances his telepathic abilities. He reluctantly agrees to let her go, and later provides Enterprise with the co-ordinates for |
https://en.wikipedia.org/wiki/Administrator | Administrator or admin may refer to:
Job roles
Computing and internet
Database administrator, a person who is responsible for the environmental aspects of a database
Forum administrator, one who oversees discussions on an Internet forum
Network administrator, engineers involved in computer networks
Server administrator, a person who acts as the administrator for an Internet gaming or other type of server
Superuser, a type of computer user with administrative privileges
Sysop, a commonly used term for a system operator, an administrator of a multi-user website
Wikipedia administrators
System administrator, a person responsible for running technically advanced information systems
Government
Administrator of the Government, in various Commonwealth realms and territories
Administrator (Australia), for use of the title in Australia
In the independent agencies of the United States government, the administrator is the highest executive officer in an independent agency whose name ends with the word "administration"
Administrator, a practitioner of public administration
Religion
Administrator (of ecclesiastical property), anyone charged with the care of church property in the Roman Catholic Church
Diocesan administrator, a provisional ordinary of a Roman Catholic church
Apostolic Administrator, a prelate appointed by the Pope to serve as the ordinary for an apostolic administration
Administrator (medieval), the ruler of a prince-bishopric in medieval times who was not confirmed by the Pope
Other job roles
Business administration, a person responsible for the performance or management of administrative business operations
Administrator (law), a person appointed by a court to handle the administration of an estate for someone who has died without a will
Academic administration, administration of a school
Arts administrator, responsible for the business end of an arts organization
Health administration, leadership, management, and administration of health organizations
Other uses
Administrator (role), one of the roles in the Keirsey Temperament Sorter personality assessment scheme
Administration (law), a procedure under the insolvency laws of a number of common law jurisdictions
See also
Administration (disambiguation)
da share z0ne, a comedic social media account run by a fictitious skeleton character named "Admin" |
https://en.wikipedia.org/wiki/History%20of%20software%20configuration%20management | The history of software configuration management (SCM) in computing can be traced back as early as the 1950s, when CM (for Configuration Management), originally for hardware development and production control, was being applied to software development. The first software configuration management was most likely done manually. Eventually, software tools were written to manage software changes. History records tend to be based on tools and companies, and lend concepts to a secondary plane.
Timeline
Early 1960s or even late 1950s: CDC UPDATE and IBM IEB_UPDATE.
Late 1960s into 1970s: The Librarian is released by Applied Data Research and provides an alternative to keeping programs on punched card decks for the IBM mainframe market.
Late 1960s, early 1970s: Professor Leon Pressor at the University of California, Santa Barbara produced a thesis on change and configuration control. This concept was a response to a contract he was working on with a defense contractor who made aircraft engines for the US Navy.
Early 1970s: Unix make.
By 1970 CDC update was an advanced product.
Circa 1972: Bell Labs paper describing the original diff algorithm.
1972, with an IEEE paper in 1975: source code control system, SCCS, Marc Rochkind Bell Labs. Originally programmed in SNOBOL for OS/360; subsequently rewritten in C for Unix (used diff for comparing files).
1970s: Lisle, Illinois-based Pansophic Systems offered PANVALET, which was an early source code control system for the mainframe market.
1975: Professor Pressor's work eventually grew into a commercially available product called Change and Configuration Control (CCC) which was sold by the SoftTool corporation.
Revision Control System (RCS, Walter Tichy).
Early 1980s: patch (around 1985, Larry Wall).
1984: Aide-de-Camp
1986: Concurrent Version System (CVS).
2000: Subversion initiated by CollabNet.
Early 2000s (decade): distributed revision control systems like BitKeeper and GNU arch become viable.
Background
Until the 1980s, SCM could only be understood as CM applied to software development. Some basic concepts such as identification and baseline (well-defined point in the evolution of a project) were already clear, but what was at stake was a set of techniques oriented towards the control of the activity, and using formal processes, documents, request forms, control boards etc.
It is only after this date that the use of software tools applying directly to software artefacts representing the actual resources, has allowed SCM to grow as an autonomous entity (from traditional CM).
The use of different tools has actually led to very distinct emphases.
traditional CM for Software, typically around Change Management (examples: Continuus, CVS or ClearCase UCM)
line oriented management, based on patches or Change Sets
focused on Derived Objects and Build Management (example: Base ClearCase/clearmake)
Another view
First generation
SCCS (first released in 1973) and DSEE (considered a predeces |
https://en.wikipedia.org/wiki/DOS%20Protected%20Mode%20Interface | In computing, the DOS Protected Mode Interface (DPMI) is a specification introduced in 1989 which allows a DOS program to run in protected mode, giving access to many features of the new PC processors of the time not available in real mode. It was initially developed by Microsoft for Windows 3.0, although Microsoft later turned control of the specification over to an industry committee with open membership. Almost all modern DOS extenders are based on DPMI and allow DOS programs to address all memory available in the PC and to run in protected mode (mostly in ring 3, least privileged).
Overview
DPMI stands for DOS Protected Mode Interface.
It is an API that allows a program to run in protected mode on 80286 series and later processors, and do the
calls to real mode without having to set up these CPU modes manually. DPMI also provides the functions for managing
various resources, notably memory. This allows the DPMI-enabled programs to work in
multi-tasking OSes,
allowing an OS kernel to distribute such resources between multiple applications. DPMI provides only the functionality that
needs to be implemented in supervisor mode. It can be
thought of as a single-tasking microkernel. The rest of the functionality is available to DPMI-enabled programs
via the calls to real-mode DOS and BIOS services, allowing the DPMI API itself to remain mostly independent of DOS.
Things that make DPMI API DOS-specific, are just 3 functions for managing DOS memory, and the letter "D" in the "DPMI" acronym.
A DPMI service can be 16-bit, 32-bit, or "universal" and is called the DPMI kernel, DPMI host, or DPMI server. It is provided either by the host operating system (virtual DPMI host) or by a DOS extender (real DPMI host). The DPMI kernel can be a part of a DOS extender such as in DOS/4GW or DOS/32A, or separate, like CWSDPMI or HDPMI.
The primary use of DPMI API is to allow DOS extenders to provide the host-OS-agnostic environment.
DOS extender checks the presence of a DPMI kernel, and installs its own only if the one was not installed already. This allows
DOS-extended programs to run either in a multitasking OS that provides its own DPMI kernel, or directly
under bare-metal DOS, in which case DOS extender uses its own DPMI kernel. Windows 3.x and 9x's user-mode
kernels are built with a DOS extender, so they fully rely on a DPMI API that is provided by Windows's ring-0 kernel.
History
The first DPMI specification drafts were published in 1989 by Microsoft's Ralph Lipe. While based on a prototypical version of DPMI for Windows 3.0 in 386 enhanced mode, several features of this implementation were removed from the official specification, including a feature named MS-DOS Extensions or DOS API translation that had been proposed by Ralph Lipe in the original drafts. Most of it was implementing DOS and BIOS interfaces (due to this history some INT 21h APIs like 4Ch have to be implemented by all DPMI implementations). DPMI version 0.9 was published in 1990 by the new |
https://en.wikipedia.org/wiki/High%20memory%20area | In DOS memory management, the high memory area (HMA) is the RAM area consisting of the first 65520 bytes above the one megabyte in an IBM AT or compatible computer.
In real mode, the segmentation architecture of the Intel 8086 and subsequent processors identifies memory locations with a 16-bit segment and a 16-bit offset, which is resolved into a physical address via (segment) × 16 + (offset). Although intended to address only 1 Megabyte (MB) (220 bytes) of memory, segment:offset addresses at FFFF:0010 and beyond reference memory beyond 1 MB (FFFF0 + 0010 = 100000). So, on an 80286 and subsequent processors, this mode can actually address the first 65520 bytes of extended memory as part of the 64 KB range starting 16 bytes before the 1 MB mark—FFFF:0000 (0xFFFF0) to FFFF:FFFF (0x10FFEF). The Intel 8086 and 8088 processors, with only 1 MB of memory and only 20 address lines, wrapped around at the 20th bit, so that address FFFF:0010 was equivalent to 0000:0000.
To allow running existing DOS programs which relied on this feature to access low memory on their newer IBM PC AT computers, IBM added special circuitry on the motherboard to simulate the wrapping around. This circuit was a simple logic gate which could disconnect the microprocessor's 21st addressing line, A20, from the rest of the motherboard. This gate could be controlled, initially through the keyboard controller, to allow running programs which wanted to access the entire RAM.
So-called A20 handlers could control the addressing mode dynamically, thereby allowing programs to load themselves into the 1024–1088 KB region and run in real mode.
Code suitable to be executed in the HMA must either be coded to be position-independent (using only relative references), be compiled to work at the specific addresses in the HMA (typically allowing only one or at most two pieces of code to share the HMA), or it must be designed to be paragraph boundary or even offset relocatable (with all addresses being fixed up during load).
Before code (or data) in the HMA can be addressed by the CPU, the corresponding driver must ensure that the HMA is mapped in. This requires that any such requests are tunneled through a stub remaining in memory outside the HMA, which would invoke the A20 handler in order to (temporarily) enable the A20 gate. If the driver does not exhibit any public data structures and only uses interrupts or calls already controlled by the underlying operating system, it might be possible to register the driver with the system in a way so that the system will take care of A20 itself thereby eliminating the need for a separate stub.
The first user of the HMA among Microsoft products was Windows/286 2.1 in 1988, which introduced the HIMEM.SYS device driver. Starting in 1990 with Digital Research's DR DOS 5.0 (via HIDOS.SYS /BDOS=FFFF and CONFIG.SYS HIDOS=ON) and since 1991 with MS-DOS 5.0 (via DOS=HIGH), parts of the operating system's BIOS and kernel could be loaded into the HMA as well, f |
https://en.wikipedia.org/wiki/%CE%A0-calculus | In theoretical computer science, the -calculus (or pi-calculus) is a process calculus. The -calculus allows channel names to be communicated along the channels themselves, and in this way it is able to describe concurrent computations whose network configuration may change during the computation.
The -calculus has few terms and is a small, yet expressive language (see ). Functional programs can be encoded into the -calculus, and the encoding emphasises the dialogue nature of computation, drawing connections with game semantics. Extensions of the -calculus, such as the spi calculus and applied , have been successful in reasoning about cryptographic protocols. Beside the original use in describing concurrent systems, the -calculus has also been used to reason about business processes and molecular biology.
Informal definition
The -calculus belongs to the family of process calculi, mathematical formalisms for describing and analyzing properties of concurrent computation. In fact, the -calculus, like the λ-calculus, is so minimal that it does not contain primitives such as numbers, booleans, data structures, variables, functions, or even the usual control flow statements (such as if-then-else, while).
Process constructs
Central to the -calculus is the notion of name. The simplicity of the calculus lies in the dual role that names play as communication channels and variables.
The process constructs available in the calculus are the following (a precise definition is given in the following section):
concurrency, written , where and are two processes or threads executed concurrently.
communication, where
input prefixing is a process waiting for a message that was sent on a communication channel named before proceeding as binding the name received to the name Typically, this models either a process expecting a communication from the network or a label c usable only once by a goto c operation.
output prefixing describes that the name is emitted on channel before proceeding as Typically, this models either sending a message on the network or a goto c operation.
replication, written , which may be seen as a process which can always create a new copy of Typically, this models either a network service or a label c waiting for any number of goto c operations.
creation of a new name, written , which may be seen as a process allocating a new constant within The constants of are defined by their names only and are always communication channels. Creation of a new name in a process is also called restriction.
the nil process, written , is a process whose execution is complete and has stopped.
Although the minimalism of the -calculus prevents us from writing programs in the normal sense, it is easy to extend the calculus. In particular, it is easy to define both control structures such as recursion, loops and sequential composition and datatypes such as first-order functions, truth values, lists and integers. Moreover, extensions of th |
https://en.wikipedia.org/wiki/JCSP | JCSP is an implementation of communicating sequential processes (CSP) for the programming language Java.
Although CSP is a mathematical system, JCSP does not require in-depth mathematical skill, allowing instead that programmers can achieve well-behaved software by following simple rules.
Overview
There are four ways in which multi-threaded programs can fail untestably:
Race conditions – shared variables may have indeterminate state because several threads access them concurrently without sufficient locking
Deadlock – two or more threads reach a stalemate when they try to acquire locks or other resources in a conflicting way
Livelock – similar to deadlock but resulting in endless waste of CPU time
Starvation – one or more threads do no work, compromising the intended outcome of the software algorithms
Generally, it is not possible to prove the absence of these four hazards merely by rigorous testing. Although rigorous testing is necessary, it is not sufficient. Instead it is necessary to have a design that can demonstrate these four hazards don't exist. CSP allows this to be done using mathematics and JCSP allows it to be done pragmatically in Java programs.
The benefit of the basis in mathematics is that stronger guarantees of correct behaviour can be produced than would be possible with conventional ad hoc development. Fortunately, JCSP does not force its users to adopt a mathematical approach themselves, but allows them to benefit from the mathematics that underpins the library.
Note that the CSP term process is used essentially as a synonym for thread in Java parlance; a process in CSP is a lightweight unit of execution that interacts with the outside world via events and is an active component that encapsulates the data structures on which it operates.
Because the encapsulation of data is per-thread (per process in CSP parlance), there is typically no reliance on sharing data between threads. Instead, the coupling between threads happens via well-defined communication points and rendezvous. The benefit is that each thread can broadly be considered to be a "single-threaded" entity during its design, sparing the developer from the uncertainties of whether and where to use Java's synchronized keyword, and at the same time guaranteeing freedom from race conditions. JCSP provides for clear principles for designing the inter-thread communication in a way that is provably free from deadlock.
There is a clear similarity between some classes in the standard Java API () and some in JCSP. JCSP's channel classes are similar to the BlockingQueue. There is one important difference: JCSP also provides an class to allow selection between inputs; this capability is absent from the standard Java API. Alternation is one of the core concepts that CSP uses to model events in the real world.
was proven to operate correctly by exhaustive mathematical analysis of its state space, guaranteeing it can never in itself cause a deadlock. As such, it epitomises |
https://en.wikipedia.org/wiki/Discrete%20optimization | Discrete optimization is a branch of optimization in applied mathematics and computer science.
Scope
As opposed to continuous optimization, some or all of the variables used in a discrete optimization problem are restricted to be discrete variables—that is, to assume only a discrete set of values, such as the integers.
Branches
Three notable branches of discrete optimization are:
combinatorial optimization, which refers to problems on graphs, matroids and other discrete structures
integer programming
constraint programming
These branches are all closely intertwined however, since many combinatorial optimization problems
can be modeled as integer programs (e.g. shortest path) or constraint programs,
any constraint program can be formulated as an integer program and vice versa,
and constraint and integer programs can often be given a combinatorial interpretation.
See also
Diophantine equation
References
Mathematical optimization |
https://en.wikipedia.org/wiki/The%20Book%20of%20Mozilla | The Book of Mozilla is a computer Easter egg found in the Netscape, Mozilla, SeaMonkey, Waterfox and Firefox series of web browsers.
It is viewed by directing the browser to .
There is no real book titled The Book of Mozilla. However, apparent quotations hidden in Netscape and Mozilla give this impression by revealing passages in the style of apocalyptic literature, such as the Book of Revelation in the Bible. When is typed into the location bar, various versions of these browsers display a cryptic message in white text on a maroon background in the browser window.
There are eight official verses of The Book of Mozilla which have been included in shipping releases, although various unofficial verses can be found on the Internet. All eight official verses have scriptural chapter and verse references, although these are actually references to important dates in the history of Netscape and Mozilla.
The eight verses all refer to the activities of a fearsome-sounding "beast". In its early days, Netscape Communications had a green fire-breathing dragon-like lizard mascot, known as Mozilla (after the code name for Netscape Navigator 1.0). From this, it can be conjectured that the "beast" referred to in The Book of Mozilla is a type of fire-breathing lizard, which can be viewed as a metaphor for, or personification of Netscape.
While part of the appeal of The Book of Mozilla comes from the mysterious nature, a knowledge of the history of Netscape and Mozilla can be used to extract some meaning from the verses. Furthermore, the Book of Mozilla page has annotations for each of the first, second, third and fifth verses hidden as comments in its HTML source code. These comments were written by Valerio Capello in May 2004 and were added to the Mozilla Foundation site by Nicholas Bebout in October that year. Neither Capello nor Bebout are 'core' Mozilla decision-makers; and there is no evidence that Capello's interpretations received any high-level approval from the senior management of the Mozilla Foundation.
The Book of Mozilla, 12:10
The Book of Mozilla first appeared in Netscape 1.1 (released in 1995) and can be found in every subsequent 1.x, 2.x, 3.x and 4.x version. The following "prophecy" was displayed:
The chapter and verse number 12:10 refers to December 10, 1994, the date that Netscape Navigator 1.0 was released.
The Book of Mozilla page, which includes seven verses from The Book of Mozilla, contains the following explanation in its HTML source code:
<!-- 10th December 1994: Netscape Navigator 1.0 was released -->
<!-- This verse announces the birth of the beast (Netscape) and warns bad coders (up to Netscape 3, when you watched the HTML source code with the internal viewer, bad tags blinked). -->
The "beast" is a metaphor for Netscape. The punishments threatened towards the "unbelievers" (most likely users who didn't conform to standards) are traditionally biblical but with the strange threat that their "tags shall blink until the end of |
https://en.wikipedia.org/wiki/TBS%20Holdings | formerly is a Japanese media and licensed broadcasting holding company. It is the parent company of the television network TBS Television and radio network TBS Radio. It has a 28-affiliate television network called Japan News Network, as well as a 34-affiliate radio network called Japan Radio Network.
TBS produced the game show Takeshi's Castle and has also broadcast the Ultra Series programs and Sasuke (Ninja Warrior), whose format would inspire similar programs outside Japan.
TBS is a member of the Mitsui keiretsu and has substantial relations with The Mainichi Newspapers Co. despite the Mainichi's lack of shareholding.
History
May 1951 - was founded in Kasumigaseki, Chiyoda, Tokyo, Japan.
December 25, 1951 - KRT started radio broadcasting (1130 kHz, 50 kW, until July 1953) from Yurakucho, Chiyoda, Tokyo, and the frequency changed to 950 kHz.
April 1955 - KRT started TV broadcasting (JOKR-TV, Channel 6) from Akasaka-Hitotsukicho, Minato, Tokyo.
August 1, 1959 - Japan News Network (JNN) is formed.
November 29, 1960 - KRT was renamed , and the headquarters and radio studio were moved to the main building in Akasaka.
August 1961 - TBS unveils the cursive logo, after the renaming of Tokyo Broadcasting System from KRT.
1971 - TBS Radio's transmitter power was increased to 100 kW.
March 31, 1975 - Asahi Broadcasting Corporation (ABC) dropped out JNN and Mainichi Broadcasting System (MBS) joined the news network due to ownership issues with ABC. Since then, MBS has been an affiliated TV station of JNN in Osaka and Kansai region.
November 23, 1978 - The frequency for TBS Radio was moved to 954 kHz.
May 2, 1986 - TBS starts broadcasting the game show Takeshi's Castle.
1989 - TBS became culpable in the Sakamoto family murder by Aum Shinrikyo, resulting in complaints against the network after the case was solved several years later.
October 19, 1990 - The last-ever episode of Takeshi's Castle was broadcast on TBS.
September 20, 1991 - TBS enters into an agreement with CBS News in the U.S. for newscasts and satellite relays. Following a short-lived logo for 30 years.
October 3, 1994 - The present headquarters, TBS Broadcasting Center, were completed next to the old headquarters (later renamed as Akasaka Media Building until its demolition in 2003). They are called "Big Hat (ビッグハット)". Nine months after the third logo was unveiled.
April 1, 1998 - JNN News Bird starts broadcasting. In 2006, the channel was renamed TBS News Bird.
February 2000 - TBS adopts a symbol based on the Kanji symbol for "person".
March 21, 2000 - TBS founded TBS Radio & Communications Inc. (株式会社ティ・ビー・エス・ラジオ・アンド・コミュニケーションズ→株式会社TBSラジオ&コミュニケーションズ), TBS Entertainment Inc. (株式会社ティ・ビー・エス・エンタテインメント), and TBS Sports Inc. (株式会社ティ・ビー・エス・スポーツ), and founded TBS Live Inc. (株式会社ティ・ビー・エス・ライブ) the next day. On October 1, 2001, TBS succeeded the radio station to TBS Radio & Communications, and changed callsign of TV station (JOKR-TV → JORX-TV).
July 1, 2002 - TBS ch. starts bro |
https://en.wikipedia.org/wiki/Advanced%20multi-mission%20operations%20system | The advanced multi-mission operations system (AMMOS) is a common set of services and tools created by the Interplanetary Network Directorate, a division of the Jet Propulsion Laboratory, for use in JPL's operation of spacecraft. These tools include a means by which mission planning and analysis can be undertaken, as well as developing pre-planned command sequences for the spacecraft. AMMOS also provides a means by which downlinked data can be displayed and manipulated, including key mission telemetry such as readings of temperature, pressure, power, and other critical indicators. This common toolset allows space missions to minimize the cost of developing operations infrastructure, which is very important in light of recent restricted spending by space agencies.
References
External Links
Official website
Aerospace engineering |
https://en.wikipedia.org/wiki/Electronic%20stability%20control | Electronic stability control (ESC), also referred to as electronic stability program (ESP) or dynamic stability control (DSC), is a computerized technology that improves a vehicle's stability by detecting and reducing loss of traction (skidding). When ESC detects loss of steering control, it automatically applies the brakes to help steer the vehicle where the driver intends to go. Braking is automatically applied to wheels individually, such as the outer front wheel to counter oversteer, or the inner rear wheel to counter understeer. Some ESC systems also reduce engine power until control is regained. ESC does not improve a vehicle's cornering performance; instead, it helps reduce the chance of the driver losing control of the vehicle.
According to the U.S. National Highway Traffic Safety Administration and the Insurance Institute for Highway Safety in 2004 and 2006 respectively, one-third of fatal accidents could be prevented by the use of the technology. In Europe the electronic stability program has saved an estimated 15,000 lives. ESC has been mandatory in new cars in Canada, the US, and the European Union since 2011, 2012, and 2014, respectively. Worldwide, 82 percent of all new passenger cars feature the anti-skid system.
History
In 1983, a four-wheel electronic "Anti-Skid Control" system was introduced on the Toyota Crown. In 1987, Mercedes-Benz, BMW and Toyota introduced their first traction control systems. Traction control works by applying individual wheel braking and throttle to maintain traction under acceleration, but unlike ESC, it is not designed to aid in steering.
In 1990, Mitsubishi released the Diamante in Japan. It featured a new electronically controlled active trace & traction control system. Named TCL when it first entered the market, the system evolved into Mitsubishi's modern Active Skid and Traction Control (ASTC) system. Developed to help the driver maintain the intended line through a corner; an onboard computer monitored several vehicle operating parameters through various sensors. When too much throttle had been used when taking a curve, engine output and braking were automatically regulated to ensure the proper line through a curve and to provide the proper amount of traction under various road surface conditions. While conventional traction control systems at the time featured only a slip control function, Mitsubishi's TCL system had an active safety function, which improved course tracing performance by automatically adjusting the traction force (called "trace control"), thereby restraining the development of excessive lateral acceleration while turning. Although not a ‘proper’ modern stability control system, trace control monitors steering angle, throttle position and individual wheel speeds, although there is no yaw input. The TCL system's standard wheel slip control function enabled better traction on slippery surfaces or during cornering. In addition to the system's individual effect, it also worked to |
https://en.wikipedia.org/wiki/Damage%20Inc | Damage Inc may refer to:
Damage Incorporated, a 1997 computer game
Damage Inc. Pacific Squadron WWII, a 2012 combat flight sim
"Damage, Inc.", a song from Metallica's third album, Master of Puppets
Damage, Inc. Tour, the name of a Metallica concert tour |
https://en.wikipedia.org/wiki/IPX/SPX | IPX/SPX stands for Internetwork Packet Exchange/Sequenced Packet Exchange. IPX and SPX are networking protocols used initially on networks using the (since discontinued) Novell NetWare operating systems. They also became widely used on networks deploying Microsoft Windows LANS, as they replaced NetWare LANS, but are no longer widely used. IPX/SPX was also widely used prior to and up to Windows XP, which supported the protocols, while later Windows versions do not, and TCP/IP took over for networking.
Protocol layers
IPX and SPX are derived from Xerox Network Systems' IDP and SPP protocols respectively. IPX is a network-layer protocol (layer 3 of the OSI model), while SPX is a transport-layer protocol (layer 4 of the OSI model). The SPX layer sits on top of the IPX layer and provides connection-oriented services between two nodes on the network. SPX is used primarily by client–server applications.
IPX and SPX both provide connection services similar to TCP/IP, with the IPX protocol having similarities to Internet Protocol, and SPX having similarities to TCP. IPX/SPX was primarily designed for local area networks (LANs) and is a very efficient protocol for this purpose (typically SPX's performance exceeds that of TCP on a small LAN, as in place of congestion windows and confirmatory acknowledgements, SPX uses simple NAKs). TCP/IP has, however, become the de facto standard protocol. This is in part due to its superior performance over wide area networks and the Internet (which uses IP exclusively), and also because TCP/IP is a more mature protocol, designed specifically with this purpose in mind.
Despite the protocols' association with NetWare, they are neither required for NetWare communication (as of NetWare 5.x), nor exclusively used on NetWare networks. NetWare communication requires an NCP implementation, which can use IPX/SPX, TCP/IP, or both, as a transport.
Implementations
Novell was largely responsible for the use of IPX as a popular computer networking protocol due to their dominance in the network operating system software market (with Novell Netware) from the late 1980s through the mid-1990s.
DOS
Novell's original NetWare client was written for DOS. Initial versions required a hard-linked protocol stack, where a separate executable would be created by the network administrator for each network card configuration on the network. This executable would be loaded at boot time and remain resident in memory until the system was shut down. Later implementations allowed the network stack to be loaded and unloaded dynamically, using pre-existing modules. This greatly simplified maintenance of client workstations on the network.
IPX/SPX was the de facto standard for DOS-era multi-user network games. Many games' longevity were extended through tunneling programs like Kali and Kahn which allowed them to be played over the internet instead of LAN-only. DOSBox emulates IPX over UDP.
Windows
Because of IPX/SPX's prevalence in LANs in the 1990s, |
https://en.wikipedia.org/wiki/Line%20doubler | A line doubler is a device or algorithm used to deinterlace video signals prior to display on a progressive scan display.
The main function of a deinterlacer is to take an interlaced video frame which consists of 60 two-field interlaced fields of an NTSC analogue video signal or 50 fields of a PAL signal, and create a progressive scan output.
Cathode ray tube (CRT) based displays (both direct-view and projection) are capable of directly displaying both interlaced and progressive video, and therefore the line-doubling process is an optional step to enhance picture quality. Other types of displays are fixed pixel displays, including LCD displays, plasma displays, DLP projectors, and OLED displays, which are not scanned from top left to bottom right corners and generally cannot accept an interlaced signal directly, and so require some kind of deinterlacing. Often, this is built in to the display and transparent to the user. Progressive scan DVD players also feature a deinterlacer.
Line doubling is a literal way to deinterlace an interlaced signal, although the method used may differ. Typically the use of the term "line doubler" refers to a simple repeat of a scanline so that the lines in a field match the lines of a frame. However, this produces a "bobbing" effect and has led to this method of deinterlacing being referred to as "bob deinterlacing". An iteration on bob deinterlacing is to average adjacent scanlines of two frames which can produce a smoother, although blurrier, image. This technique is referred to as "blend deinterlacing".
Some line doublers are capable of using the former technique in moving areas and the latter in static areas (to avoid the "bob" effect), which improves overall sharpness.
It is worth noting that even if a line doubler employs the merging method it cannot be considered an inverse telecine device if a frame rate of 60p other than the original 24p is obtained. From this aspect of view some hyped progressive scan technologies (including Pioneer's PureCinema Progressive Scan) bearing an inverse telecine insignia are thus overstated.
Line doublers have been replaced recently by video scalers which incorporate 3:2 pulldown removal and the ability to scale the image to the various screen resolutions used on modern projectors and displays. However, line doublers such as the Open Source Scan Converter have been developed to convert signals from older video game consoles and have found popularity among retro gaming enthusiasts due to their minimal contribution to input lag.
See also
3:2 Pulldown
Deinterlacing
References
Film and video technology |
https://en.wikipedia.org/wiki/Apple%20Public%20Source%20License | The Apple Public Source License (APSL) is the open-source and free software license under which Apple's Darwin operating system was released in 2000. A free and open-source software license was voluntarily adopted to further involve the community from which much of Darwin originated.
The first version of the Apple Public Source License was approved by the Open Source Initiative (OSI). Version 2.0, released July 29, 2003, is also approved as a free software license by the Free Software Foundation (FSF) which finds it acceptable for developers to work on projects that are already covered by this license. However, the FSF recommends that developers should not release new projects under this license, because the partial copyleft is not compatible with the GNU General Public License and allows linking with files released entirely as proprietary software. The license does require that if any derivatives of the original source are released externally, their source should be made available; the Free Software Foundation compares this requirement to a similar one in its own GNU Affero General Public License.
Many software releases from Apple have now been relicensed under the more liberal Apache License, such as the Bonjour Zeroconf stack. However, most OS component source code remains under APSL.
See also
Software using the Apple Public Source License (category)
References
External links
Text of the Apple Public Source License
Free Software Foundation's opinion on the license
Free and open-source software licenses
Permissive software licenses
Public Source License |
https://en.wikipedia.org/wiki/The%20Roundup%20%28radio%20program%29 | The Roundup was a weekday afternoon program on the Radio One network of the Canadian Broadcasting Corporation from 1997 to 2005. Heard weekdays from 2:00 to 4:00 p.m. (2:30 to 4:30 in Newfoundland), the show mixed music with calls and letters from listeners which were often comic in nature, feature interviews, and content previously produced and aired by other radio programs, initially other CBC programs but later including content from other radio networks around the world.
The show was originally hosted by Bill Richardson and called Richardson's Roundup. It was created in 1997 to replace Vicki Gabereau's afternoon show after she left to do a television show with CTV, and premiered on September 1, 1997 from the studios of CBU in Vancouver.
The show also occasionally aired scripted radio dramas. Test Drive, a six-episode drama aired in 2001, starred Gordon Pinsent as Earl Hughes, the owner of an independent AMC dealership whose test drives of vehicles with potential customers inevitably devolved into comedic chaos, while a 2002 drama, Paul Ciufo's On Convoy, centred on servicemen in the Canadian Merchant Navy and aired as part of a special slate of Remembrance Day programming.
Richardson left in 2004 to launch the new weekend series Bunny Watson, and Tetsuro Shigematsu, an occasional guest host, became the new permanent host of The Roundup.
In 2005, the show was cancelled and replaced with Freestyle.
Sad Goat
The show's phone number for song requests and listener commentaries (723 4628) was to be 1 888 RADIO2U, but when they realised how cumbersome that would be to explain, they looked for alternative spellings. Richardson discovered that the number spelled out the phrase "sad goat", and 1-888-SAD-GOAT was born. A goat named Sadie became the symbol for the show and the concept was elaborated on from then on.
In 2003 Richardson published the book Dear Sad Goat, a compilation of listener stories submitted to the program.
Critical response
In 1999, columnist Paula Simons wrote that "Bill Richardson deserves every credit for patching together a program to replace [Gabereau], armed with little but chewing gum, bailing wire, and his own ingenuity. Richardson's Roundup is a pastiche of reruns and previews, woven together by the gossamer strands of Richardson's considerable charm. It's a clever conjuring trick, a recycled remix of snippets, sound bites and segues that fills two hours so pleasantly, you hardly realize how empty it all is. Gabereau's provocative, irreverent interviews made us laugh and think and argue. The Roundup's low-budget fluff is as irrelevant and ephemeral as dandelion down."
References
CBC Radio One programs
1990s Canadian radio programs
2000s Canadian radio programs
1997 radio programme debuts
2005 radio programme endings |
https://en.wikipedia.org/wiki/Linksruck | Left Shift () was a Trotskyist group in Germany, which was the German affiliate of the International Socialist Tendency (the network founded by the British Socialist Workers Party). In September 2007, Linksruck formally dissolved, and its members regrouped into the Left Party as Marx21 – Network for International Socialism.
History
Linksruck's origins lie in the Socialist Workers' Group (, SAG), which was founded in the 1970s by West German supporters of the British "International Socialists" (IS), precursor to the Socialist Workers Party (SWP). One of the founders of the SAG was Volkhard Mosler, who had been in contact with Tony Cliff since 1966. Initially based in Frankfurt, the SAG gradually developed a national structure but remained a relatively small organization. Like their British counterparts, the SAG sought to build a radical rank-and-file workers' movement to oppose moderate trade-union leaders.
After German reunification in 1990, the SAG participated in the emerging Antifa movement against the far right. In the early 1990s young members of the SAG joined Jusos, the Social Democratic Party's youth group, hoping to push its members to the left. After a short time began publishing the paper Linksruck, and by the end of 1993 the organization referred to itself by this name.
Dissidents in the group led by Norbert Nelte, critical of Linksruck's entryist tactics and the "lack of theoretical training for new members", broke off and formed the International Socialists () in Cologne in 1992.
In the 1990s, Linksruck shifted away from the SPD youth and became involved with the growing antiglobalization movement, and later the anti-Iraq War movement. Through participation in these decentralized movements, Linksruck gained many new members. As the group made a transition from the antiglobalization movement to the anti-war movement, its most strident antiglobalization activists split off to form the (commonly referred to as the ).
When left-wing dissidents split from the Social Democrats in 2005 to form the WASG, Linksruck members entered the new organization. Linksruck member Christine Buchholz served on the WASG's National Committee. Other members also took stood as WASG candidates in local and federal elections.
Over the course of 2007, Linksruck leaders sought to relaunch their group (in preparation for the merger of the WASG with the Party of Democratic Socialism, which would form the Left Party). In April 2007, an organizational meeting voted to dissolve the organization. In May 2007, the magazine Linksruck was replaced by a new publication, marx21. In early September 2007 (three months after the formation of the Left Party), a founding congress ended Linksruck and launched the new "Marx21: Network for International Socialism". Marx21 aims at being "a network for Marxists within the new Left Party" and is a component of the party's Socialist Left caucus.
In the 2008 state elections in Hesse, Linksruck/Marx21 activist Janine Wissler w |
https://en.wikipedia.org/wiki/Optical%20disc%20authoring | Optical disc authoring, including CD, DVD, and Blu-ray Disc authoring, is the process of assembling source material—video, audio or other data—into the proper logical volume format to then be recorded ("burned") onto an optical disc (typically a compact disc or DVD). This act is sometimes done illegally, by pirating copyrighted material without permission from the original artists.
Process
To burn an optical disc, one usually first creates an optical disc image with a full file system, of a type designed for the optical disc, in temporary storage such as a file in another file system on a disk drive. One may test the image on target devices using rewriteable media such as CD-RW, DVD±RW and BD-RE. Then, one copies the image to the disc (usually write-once media for hard distribution).
Most optical disc authoring utilities create a disc image and copy it to the disc in one bundled operation, so that end-users often do not know the distinction between creating and burning. However, it is useful to know because creating the disc image is a time-consuming process, while copying the image is much faster. Most disc burning applications silently delete the image from the Temporary folder after making one copy. If users override this default, telling the application to preserve the image, they can reuse the image to create more copies. Otherwise, they must rebuild the image each time they want a copy.
Some packet-writing applications do not require writing the entire disc at once, but allow writing of different parts at different times. This allows a user to construct a disc incrementally, as it could be on a rewritable medium like a floppy disk or rewritable CD. However, if the disc is non-rewritable, a given bit can be written only once. Due to this limitation, a non-rewritable disc whose burn failed for any reason cannot be repaired. (Such a disc is colloquially termed a "coaster", a reference to a beverage coaster.)
There are many optical disc authoring technologies for optimizing the authoring process and preventing errors. Some programs can mount a disc image as a file system type, so these images appear as mounted discs. The disc image can then be tested after it is assembled but before writing to a physical disc.
Sessions
DVD and Blu-ray (sequential) discs also allow the use of multiple sessions.
Tracks
Tracks contain the information to be stored on the disc. A track is a consecutive set of sectors on the disc containing a block of data. One session may contain one or more tracks of the same or different types. Tracks can be audio information or data, which use the same format, or video information. Data can include album information and low-resolution graphics such as karaoke lyrics; however, these tracks are not compliant with the Red Book of CD audio standards.
Hardware
Authoring is commonly done in software on computers with optical disc recorders. There are, however, stand-alone devices like personal video recorders which can |
https://en.wikipedia.org/wiki/Wired%20Equivalent%20Privacy | Wired Equivalent Privacy (WEP) was a severely flawed security algorithm for 802.11 wireless networks. Introduced as part of the original IEEE 802.11 standard ratified in 1997, its intention was to provide data confidentiality comparable to that of a traditional wired network. WEP, recognizable by its key of 10 or 26 hexadecimal digits (40 or 104 bits), was at one time widely used, and was often the first security choice presented to users by router configuration tools.
Subsequent to a 2001 disclosure of a severe design flaw in the algorithm, WEP was never again secure in practice. In the vast majority of cases, Wi-Fi hardware devices relying on WEP security could not be upgraded to secure operation. Some of the design flaws were addressed in WEP2, but WEP2 also proved insecure, and another generation of hardware could not be upgraded to secure operation.
In 2003, the Wi-Fi Alliance announced that WEP and WEP2 had been superseded by Wi-Fi Protected Access (WPA). In 2004, with the ratification of the full 802.11i standard (i.e. WPA2), the IEEE declared that both WEP-40 and WEP-104 have been deprecated. WPA retained some design characteristics of WEP that remained problematic.
WEP was the only encryption protocol available to 802.11a and 802.11b devices built before the WPA standard, which was available for 802.11g devices. However, some 802.11b devices were later provided with firmware or software updates to enable WPA, and newer devices had it built in.
History
WEP was ratified as a Wi-Fi security standard in 1999. The first versions of WEP were not particularly strong, even for the time they were released, due to U.S. restrictions on the export of various cryptographic technologies. These restrictions led to manufacturers restricting their devices to only 64-bit encryption. When the restrictions were lifted, the encryption was increased to 128 bits. Despite the introduction of 256-bit WEP, 128-bit remains one of the most common implementations.
Encryption details
WEP was included as the privacy component of the original IEEE 802.11 standard ratified in 1997. WEP uses the stream cipher RC4 for confidentiality, and the CRC-32 checksum for integrity. It was deprecated in 2004 and is documented in the current standard.
Standard 64-bit WEP uses a 40-bit key (also known as WEP-40), which is concatenated with a 24-bit initialization vector (IV) to form the RC4 key. At the time that the original WEP standard was drafted, the U.S. Government's export restrictions on cryptographic technology limited the key size. Once the restrictions were lifted, manufacturers of access points implemented an extended 128-bit WEP protocol using a 104-bit key size (WEP-104).
A 64-bit WEP key is usually entered as a string of 10 hexadecimal (base 16) characters (0–9 and A–F). Each character represents 4 bits, 10 digits of 4 bits each gives 40 bits; adding the 24-bit IV produces the complete 64-bit WEP key (4 bits × 10 + 24-bit IV = 64-bit WEP key). Most devices also |
https://en.wikipedia.org/wiki/Blood%20%26%20Honour | Blood & Honour is a neo-Nazi music promotion network and right-wing extremist political group founded in the United Kingdom by Ian Stuart Donaldson and Nicky Crane in 1987. It is composed of White Nationalists and has links to Combat 18.
Sometimes the code 28 is used to represent Blood & Honour, derived from the second and eighth letters of the Latin alphabet, B and H, and the group uses Nazi symbolism. Its official website self-describes as a "musical based resistance network" and dubs its "global confederacy of freedom fighters" Brotherhood 28.
In the UK, the group used to organise White power concerts by Rock Against Communism (RAC) bands. It publishes a magazine called Blood and Honour. There are official divisions in several countries, including two rival groups in the United States. It is banned in several countries, including Germany, Spain, Russia, and Canada.
History
Blood & Honour was established in 1987 by Skrewdriver frontman Ian Stuart Donaldson, supported by Nicky Crane and the bands No Remorse, Brutal Attack, Sudden Impact, and Squadron. These bands were previously affiliated with the White Noise Club, a subsidiary organisation of the National Front responsible for organising Rock Against Communism concerts, operating the White Noise Records label, and publishing a zine called White Noise.
Tensions between Donaldson and the leadership of the White Noise Club developed in 1987, as Donaldson felt that the White Noise Club was siphoning money out of the Rock Against Communism scene to use for the National Front's political campaigns. Donaldson's Skrewdriver officially split from the White Noise Club in May of 1987, and several other bands within the scene followed.
Blood & Honour was launched as an alternative to the White Noise Club in July of 1987, with the appearance of the first edition of Blood & Honour magazine. Copies were sent free of charge to members of the White Noise Club (Donaldson used contacts within the National Front to obtain their mailing list), together with a note by Donaldson denouncing the White Noise Club as a "corrupt rip-off". A concert to "launch" Blood & Honour was held at the St Helier Arms on the 5th of September, 1987, featuring performances from Skrewdriver, No Remorse, Brutal Attack, and Sudden Impact.
By the end of 1988, Blood & Honour magazine was a quarterly that had grown from eight to 16 pages after a few issues. The magazine included concert reports, band interviews, readers' letters, RAC record charts and a column called "White Whispers". A mail-order service called Skrewdriver Services soon formed within its pages, selling items such as white power albums, T-shirts and flags; Loyalist music tapes; and Swastika pendants.
The back page of Blood & Honour Issue Number 13 advertised a Skrewdriver concert in London on 12 September 1992. Posters and fliers were posted around the country, advertising the concert and listing a redirection point as Waterloo Rail Station. The night before the conce |
https://en.wikipedia.org/wiki/List%20of%20CBS%20television%20affiliates%20%28by%20U.S.%20state%29 | CBS is an American broadcast television network owned and operated by Paramount Global, which originated as a radio network in September 1927, and expanded into television in July 1941. The network currently has 15 owned-and-operated stations, and current affiliation agreements with 236 other television stations.
This article is a listing of current CBS affiliates in the continental United States and United States possessions (including subchannel affiliates, satellite stations and select low-power stations translators), arranged alphabetically by state, and based on the stations city of license and followed in parentheses by the Designated Market Area if it differs from the city of license. There are links to and articles on each of the stations, describing their histories, local programming and technical information, such as broadcast frequencies.
The station's advertised channel number follows the call letters. In most cases, this is their virtual channel (PSIP) number.
Stations listed in boldface are owned and operated by CBS through its subsidiary CBS News and Stations (excluding owned-and-operated stations of The CW or independent stations owned by the group, unless the station simulcasts a co-owned CBS O&O station via a digital subchannel).
United States
Alabama
Birmingham – WIAT 42
Dothan – WTVY 4
Huntsville – WHNT-TV 19
Mobile – WKRG-TV 5
Selma (Montgomery) – WAKA 8
Alaska
Some CBS programming is broadcast on the Alaska Rural Communications Service (ARCS).
Anchorage – KAUU 5
Fairbanks – KXDF-CD 13
Ketchikan – KYES 5 (simulcast of KAUU)
Sitka – KTNL-TV 7
Arizona
Phoenix – KPHO-TV 5
Tucson – KOLD-TV 13
Yuma – KYMA-DT 13
Arkansas
Fort Smith – KFSM-TV 5
Jonesboro – KJNB-LD2 39.2/KJNE-LD2 42.2
Little Rock – KTHV 11
California
Bakersfield – KBAK-TV 29
Chico – KHSL-TV 12
Eureka – KVIQ-LD 14
Fresno – KGPE 47
Los Angeles – KCBS-TV 2
Monterey – KION-TV 46
Palm Springs – KESQ-DT2 42.2/KPSP-CD 38
San Diego – KFMB-TV 8
San Francisco – KPIX-TV 5
Santa Barbara – KEYT-DT2 3.2
Stockton (Sacramento) – KOVR 13
Colorado
Colorado Springs – KKTV 11
Denver – KCNC-TV 4
Durango – KREZ-TV 6 (satellite of KRQE-TV, Albuquerque, New Mexico)
Grand Junction – KREX-TV 5
Montrose – KREY-TV 10 (satellite of KREX-TV)
Connecticut
Hartford – WFSB 3
Delaware
None; served by KYW-TV Philadelphia and WBOC-TV Salisbury, MD
District of Columbia
Washington, D.C. – WUSA 9
Florida
Fort Myers – WINK-TV 11
High Springs (Gainesville) – WGFL 28
Jacksonville – WJAX-TV 47
Miami – WFOR-TV 4
Orlando – WKMG-TV 6
Panama City – WECP-LD 21/WJHG-DT3 7.3
St. Petersburg (Tampa) – WTSP 10
Tallahassee – WCTV 6
West Palm Beach – WPEC 12
Georgia
Atlanta – WANF 46
Augusta – WRDW-TV 12
Columbus – WRBL 3
Macon – WMAZ-TV 13
Savannah – WTOC-TV 11
Thomasville (Tallahassee, Florida) – WCTV 6
Valdosta (Albany) – WSWG 44
Hawaii
Hilo - KSIX-DT3 13.3 (satellite of KGMB)
Honolulu – KGMB 5
Wailuku – KOGG-DT2 13.2 (satellite of KGMB)
Idaho
Boi |
https://en.wikipedia.org/wiki/List%20of%20British%20Rail%20classes | This article lists the wide variety of locomotives and multiple units that have operated on Great Britain's railway network, since Nationalisation in 1948.
British Rail used several numbering schemes for classifying its steam locomotive types and other rolling stock, before settling on the TOPS computer system in the late 1960s. TOPS has remained in use ever since.
Steam locomotives
Steam locomotives in use after 1968: Class 98
Diesel and electric locomotives
Diesel locomotives: Classes 01–70
DC electric and electro-diesel locomotives: Classes 70–79
AC electric locomotives: Classes 80–96
Departmental locos (those not in revenue-earning use): Class 97
Miscellaneous locomotives, including builders' demonstrators.
Shipping fleet
British Rail's shipping fleet:
Diesel multiple units
Units with mechanical or hydraulic transmission: Classes 100-199
Units with electric transmission: Classes 200–299
Electric multiple units
Overhead AC and Dual-voltage EMUs: Classes 300–399 and 700-799
Southern Region DC third rail EMUs: Classes 400–499
Other DC EMUs: Classes 500–599
High-speed EMUs: Classes 800-899
Alternative Fuel multiple units
British Rail Class 600
British Rail Class 614
Departmental multiple units
Classes 900-999
See also
British Rail coach type codes
List of British Railways steam locomotives as of 31 December 1967
List of British Railways shed codes
British Rail
British Rail classes
British Rail rolling stock |
https://en.wikipedia.org/wiki/XScreenSaver | XScreenSaver is a free and open-source collection of 240+
screensavers for Unix, macOS, iOS and Android operating systems. It was created by Jamie Zawinski in 1992 and is still maintained by him, with new releases coming out several times a year.
Platforms
The free software and open-source Unix-like operating systems running the X Window System (such as Linux and FreeBSD) use XScreenSaver almost exclusively. On those systems, there are several packages: one for the screen-saving and locking framework, and two or more for the display modes, divided somewhat arbitrarily.
On Macintosh systems, XScreenSaver works with the built-in macOS screen saver.
On iOS systems, XScreenSaver is a stand-alone app that can run any of the hacks full-screen.
On Android systems, the XScreenSaver display modes work either as normal screen savers (which Android sometimes refers to as "Daydreams") or as live wallpapers.
There is no official version for Microsoft Windows, and the developer discourages anyone from porting it. The author considers Microsoft to be "a company with vicious, predatory, anti-competitive business practices"
and says that, as one of the original authors of Netscape Navigator, he holds a "personal grudge" against Microsoft because of its behavior during the First Browser War.
Software Architecture
The XScreenSaver daemon is responsible for detecting idle-ness, blanking and locking the screen, and launching the display modes. The display modes (termed "hacks" from the historical usage "display hack") are each stand-alone programs.
This is an important security feature, in that the display modes are sandboxed into a separate process from the screen locking framework. This means that a programming error in one of the graphical display modes cannot compromise the screen locker itself (e.g., a crash in a display mode will not unlock the screen).
It also means that a third-party screen saver can be written in any language or with any graphics library, so long as it is capable of rendering onto an externally provided window.
For historical and portability reasons, the included hacks are all written in ANSI C. About half of them use the X11 API, and about half use the OpenGL 1.3 API.
Rather than forking the code-base and re-writing the hacks to target different platforms, XScreenSaver contains a number of compatibility layers.
To allow the X11-based hacks to run natively on macOS and iOS, XScreenSaver contains a complete implementation of the X11 API built on top of Cocoa ("jwxyz").
To allow the OpenGL 1.3-based hacks to run natively on iOS and Android systems, which only support OpenGL ES, XScreenSaver contains an implementation of the OpenGL 1.3 API built in top of OpenGL ES 1.0 ("jwzgles").
And to allow the X11-based hacks to run natively on iOS and Android, XScreenSaver also contains an implementation of the X11 API in terms of OpenGL ES 1.0.
Security
In addition to sandboxing the display modes, the XScreenSaver daemon links with as |
https://en.wikipedia.org/wiki/CA%20Technologies | CA Technologies, Inc., formerly Computer Associates International, Inc., and CA, Inc., was an American multinational enterprise software developer and publisher that existed from 1976 to 2018. CA grew to rank as one of the largest independent software corporations in the world, and at one point was the second largest. The company created systems software (and for a while applications software) that ran in IBM mainframe, distributed computing, virtual machine, and cloud computing environments.
The company reflected the personality of its primary founder, Charles Wang. The main key to Computer Associates' fast growth was the acquisition of many lesser-sized software companies in the IBM mainframe industry segment. CA was known for large-scale dismissals of employees in the acquired firms, and for sometimes extracting cash flow from acquired products rather than enhancing them. Customers of CA often criticized the company for its poor technical support and somewhat hostile attitude. CA underwent a major accounting scandal in the early 2000s that led to several past executives being sent to prison. However by the 2010s, CA was ranked high by several corporate responsibility and recognition metrics.
Computer Associates had its origins in both Switzerland (Zurich and Geneva) and in the United States (New York City). It was headquartered on Long Island for most of its history, at first Jericho and Garden City in Nassau County, then Suffolk County for two decades in Islandia before moving back to Manhattan in 2014. In 2018, the company was acquired by Broadcom Inc., a semiconductor manufacturer, for nearly $19 billion.
History
Origins
The origins of Computer Associates International lie in a Swiss software products company and a New York data services company.
Samuel W. Goodner was a Texan who was working for the American businessman Sam Wyly's company, University Computing Company (UCC). UCC had acquired the Swiss computer services company Automation Center A.G., founded by the Swiss businessman Walter Haefner, and Wyly despatched Goodner to Europe to watch over it. By 1970, UCC was experiencing financial difficulties, and Goodner, who admired some of Haefner's management practices, decided to leave and start his own firm that would engage in software product development. A company by the name of Computer Associates A.G. was founded in 1970 by Goodner and was located in Zurich, Switzerland.
Meanwhile, under regulatory pressure in 1969, IBM had announced its decision to unbundle the sale of computer hardware from its software and support services;i.e., mainframe computers from computer programs, etc. The decision opened new markets to competition and provided an opportunity for entrepreneurs to enter the nascent software industry — an opportunity that Goodner sought to exploit by developing and selling software products for the IBM mainframe market.
The new firm Computer Associates was underfinanced, but it did have a customer in the Swiss p |
https://en.wikipedia.org/wiki/Interlink%20Electronics | Interlink Electronics, Inc. is a technology company that specializes in manufacturing sensors that are used in electronic portable devices, such as smartphones, GPS systems, and in industrial computers and systems controls.
History
Interlink was founded on April 30, 1996, and released the first force-sensing resistor for commercial use in 1977.
In 2001, Interlink helped Microsoft design the controller for the Xbox.
Legal
Interlink Electronics filed a patent-infringement lawsuit against Nintendo in December 2006 over the pointing functionality of the Wii Remote, claiming "loss of reasonable royalties, reduced sales and/or lost profits as a result of the infringing activities" of Nintendo. The lawsuit was dismissed by Interlink in March 2007.
References
External links
Interlink Electronics website
FSR(tm)
Computer companies of the United States
1984 establishments in California
Electronics companies established in 1984
Electronics companies of the United States |
https://en.wikipedia.org/wiki/Client-side | Client-side refers to operations that are performed by the client in a client–server relationship in a computer network.
General concepts
Typically, a client is a computer application, such as a web browser, that runs on a user's local computer, smartphone, or other device, and connects to a server as necessary. Operations may be performed client-side because they require access to information or functionality that is available on the client but not on the server, because the user needs to observe the operations or provide input, or because the server lacks the processing power to perform the operations in a timely manner for all of the clients it serves. Additionally, if operations can be performed by the client, without sending data over the network, they may take less time, use less bandwidth, and incur a lesser security risk.
When the server serves data in a commonly used manner, for example according to standard protocols such as HTTP or FTP, users may have their choice of a number of client programs (e.g. most modern web browsers can request and receive data using both HTTP and FTP). In the case of more specialized applications, programmers may write their own server, client, and communications protocol which can only be used with one another.
Programs that run on a user's local computer without ever sending or receiving data over a network are not considered clients, and so the operations of such programs would not be termed client-side operations.
Computer security
In a computer security context, client-side vulnerabilities or attacks refer to those that occur on the client / user's computer system, rather than on the server side, or in between the two. As an example, if a server contained an encrypted file or message which could only be decrypted using a key housed on the user's computer system, a client-side attack would normally be an attacker's only opportunity to gain access to the decrypted contents. For instance, the attacker might cause malware to be installed on the client system, allowing the attacker to view the user's screen, record the user's keystrokes, and steal copies of the user's encryption keys, etc. Alternatively, an attacker might employ cross-site scripting vulnerabilities to execute malicious code on the client's system without needing to install any permanently resident malware.
Examples
Distributed computing projects such as SETI@home and the Great Internet Mersenne Prime Search, as well as Internet-dependent applications like Google Earth, rely primarily on client-side operations. They initiate a connection with the server (either in response to a user query, as with Google Earth, or in an automated fashion, as with SETI@home), and request some data. The server selects a data set (a server-side operation) and sends it back to the client. The client then analyzes the data (a client-side operation), and, when the analysis is complete, displays it to the user (as with Google Earth) and/or transmits the |
https://en.wikipedia.org/wiki/Toronto%20Sun | The Toronto Sun is an English-language tabloid newspaper published daily in Toronto, Ontario, Canada. The newspaper is one of several Sun tabloids published by Postmedia Network. The newspaper's offices are located at Postmedia Place in downtown Toronto.
The newspaper published its first edition in November 1971, after it had acquired the assets of the defunct Toronto Telegram, and hired portions of the Telegrams staff. In 1978, Toronto Sun Holdings and Toronto Sun Publishing were consolidated to form Sun Publishing (later renamed Sun Media Corporation). Sun Publishing went on to form similar tabloids to the Toronto Sun in other Canadian cities during the late 1970s and 1980s. The Sun was acquired by Postmedia Network in 2015, as a part of the sale of the Suns parent company, Sun Media.
History
In 1971, the Toronto Sun Publishing was created and purchased the syndication operations and newspaper vending boxes from the Toronto Telegram, which ceased operations in the same year. The Toronto Sun also recruited staff from the former Telegram conservative broadsheet newspaper, and published its first edition on 1 November 1971.
Publisher Doug Creighton was originally going to name the new newspaper the Toronto News but Andy Donato, who was asked to design the paper's first front page and decided to call the paper the Toronto Sun instead. Creighton decided it was too late to change it and renamed the paper.
The Toronto Sun was originally published out of leased space at the Eclipse White Wear Company Building at 322 King Street West. In 1975, the newspaper moved into the Toronto Sun Building at 333 King Street East which was eventually expanded to six storeys to house all of the newspaper's operations. In 2010, the building was sold to property development company First Gulf, and the Sun consolidated its operations onto the second floor. It remained in the building until it relocated offices in 2016.
In 1978, Toronto Sun Holdings and Toronto Sun Publishing were consolidated to form Sun Publishing. The corporation expanded its tabloid footprint, having established its second tabloid, the Edmonton Sun through a partnership agreement with Edmonton Sun Publishing in 1978. The Albertan was acquired in 1980 and made into the company's third tabloid, the Calgary Sun in 1980.
In 1988, The Washington Post described the Sun as an example of tabloid journalism.
21st century
In 2004, the Sun began its annual George Gross/Toronto Sun Sportsperson of the Year award. By the mid-2000s, the word "The" was dropped from the paper's name and the newspaper adopted its current logo.
The paper acquired a television station from Craig Media in 2005, which was renamed SUN TV. It was later transformed into the Sun News Network until its demise in 2015.
As of the end of 2007, the Sun had a Monday through Saturday circulation of approximately 180,000 papers and Sunday circulation of 310,000.
The Sun was acquired by Postmedia in 2015, with its purchase of Sun Media f |
https://en.wikipedia.org/wiki/Sun%20Media | Sun Media Corporation was the owner of several tabloid and broadsheet newspapers in Canada and the 49 percent owner of the now defunct Sun News Network. It was a subsidiary of Quebecor Media.
On October 6, 2014, Quebecor Media announced the sale of the remaining English-language print assets of Sun Media to rival Postmedia. The sale included neither the Sun News Network, which subsequently closed when a buyer was not found, nor Quebecor's French-language papers Le Journal de Montréal and Le Journal de Québec. The sale was approved by the federal Competition Bureau on March 25, 2015, and closed on April 13. Canoe Sun Media merged with Postmedia rather than being maintained as a separate division.
Quebecor had previously sold its community newspapers in Quebec to TC Transcontinental in June 2014, under a deal first announced in December 2013.
History
Sun Publishing was formed on February 4, 1978 through the amalgamation of Toronto Sun Holdings Ltd and Toronto Sun Publishing Ltd. The two companies had been formed in 1971 with the launch of the Toronto Sun by former staffers of the defunct Toronto Telegram. On February 14, 1978, the Edmonton Sun, the second member of what would become the Sun chain, was announced through a partnership of Sun Media and Edmonton Sun Publishing Ltd. The paper was launched on April 2, 1978. In 1981, the outstanding shares of Edmonton Sun Publishing Ltd were acquired by Sun Media. The company purchased the Calgary Albertan on July 31, 1980 for $1.3 million and relaunched it days later as the Calgary Sun, with the same format and appearance as its sister papers.
In 1983, 50% of Sun Media was acquired by Maclean-Hunter for $55 million. That same year, Sun Media, with Maclean-Hunter's backing, acquired the Houston Post for $100 million in an attempt to expand into the United States. It was sold for $150 million four years later. In 1987, Maclean-Hunter's Financial Post weekly was sold to Sun Media for $46 million and was relaunched as a daily tabloid financial newspaper the following year. In 1988, Sun Media acquired the Ottawa Sunday Herald which it would relaunch as the daily Ottawa Sun.
In 1994, Maclean-Hunter was purchased by Rogers Communications. Two years later, on October 4, 1996, the management of the Sun chain under the leadership of Paul Godfrey purchased Rogers' share of the Sun Publishing and renamed the company Sun Media. In 1998, the Financial Post was sold to Southam Inc. in exchange for the Hamilton Spectator, the Kitchener-Waterloo Record, the Guelph Mercury, and the Cambridge Reporter. Also in 1998, Sun Media was purchased by Quebecor and maintained as a wholly owned subsidiary of it. Godfrey had sought out Quebecor as a "white knight" in order to frustrate an attempted hostile takeover by the Sun's longtime rival, the Toronto Star. In 1999, Quebcor sold the four recently acquired southern Ontario newspapers to the owners of the Toronto Star and became part of its Metroland Media Group. Southam, owne |
https://en.wikipedia.org/wiki/IBM%20RAD6000 | The RAD6000 radiation-hardened single-board computer, based on the IBM RISC Single Chip CPU, was manufactured by IBM Federal Systems. IBM Federal Systems was sold to Loral, and by way of acquisition, ended up with Lockheed Martin and is currently a part of BAE Systems Electronic Systems. RAD6000 is mainly known as the onboard computer of numerous NASA spacecraft.
History
The radiation-hardening of the original RSC 1.1 million-transistor processor to make the RAD6000's CPU was done by IBM Federal Systems Division working with the Air Force Research Laboratory.
, there are 200 RAD6000 processors in space on a variety of NASA, United States Department of Defense and commercial spacecraft, including:
Mars Exploration Rovers (Spirit and Opportunity)
Deep Space 1 probe
Mars Polar Lander and Mars Climate Orbiter
Mars Odyssey orbiter
Spitzer Infrared Telescope Facility
MESSENGER probe to Mercury
STEREO Spacecraft
IMAGE/Explorer 78 MIDEX spacecraft
Genesis and Stardust sample return missions
Phoenix Mars Polar Lander
Dawn Mission to the asteroid belt using ion propulsion
Solar Dynamics Observatory, Launched Feb 11, 2010 (flying both RAD6000 and RAD750)
Burst Alert Telescope Image Processor on board the Swift Gamma-Ray Burst Mission
DSCOVR Deep Space Climate Observatory spacecraft
The computer has a maximum clock rate of 33 MHz and a processing speed of about 35 MIPS. In addition to the CPU itself, the RAD6000 has 128 MB of ECC RAM. A typical real-time operating system running on NASA's RAD6000 installations is VxWorks. The Flight boards in the above systems have switchable clock rates of 2.5, 5, 10, or 20 MHz.
Reported to have a unit cost somewhere between US$200,000 and US$300,000, RAD6000 computers were released for sale in the general commercial market in 1996.
The RAD6000's successor is the RAD750 processor, based on IBM's PowerPC 750.
See also
IBM RS/6000
PowerPC 601, a consumer chip with similar computing capabilities to the RAD6000
References
External links
Software on Mars rovers 'space qualified' – By Matthew Fordahl/AP, 23 January 2004
AFRL Rad6000 fact sheet
Software Behind the Mars Phoenix Lander (Audio Interview)
The CPUs of Spacecraft Computers in Space
Avionics computers
RAD6000
Radiation-hardened microprocessors
American inventions
Computer-related introductions in 1996 |
https://en.wikipedia.org/wiki/Content%20package | A content package is a file containing content in a database metadata.
A content package is used in e-learning to define some learning content or an assessment that can be delivered, for example by a Learning Management System. It's a standard way of describing learning content that can be read by many programs.
The most widely used content packaging format is that defined by IMS Global, which uses an XML manifest file called imsmanifest.xml wrapped up inside a zip file. The learning content itself is either included in the zip file if it is HTML or other media that can run on its own, or else is referenced as a URL from within the manifest.
The IMS format was used by SCORM to define their packaging format, and typically every sharable content object (SCO) is defined by a content package.
The AICC also define a content package format for material that can be called by the widely used AICC HACP standard. Their format consists of four comma separated ASCII files that define details about the learning content including a URL.
External links
AICC website
IMS Content Packaging
Educational technology |
https://en.wikipedia.org/wiki/IDEF | IDEF, initially an abbreviation of ICAM Definition and renamed in 1999 as Integration Definition, is a family of modeling languages in the field of systems and software engineering. They cover a wide range of uses from functional modeling to data, simulation, object-oriented analysis and design, and knowledge acquisition. These definition languages were developed under funding from U.S. Air Force and, although still most commonly used by them and other military and United States Department of Defense (DoD) agencies, are in the public domain.
The most-widely recognized and used components of the IDEF family are IDEF0, a functional modeling language building on SADT, and IDEF1X, which addresses information models and database design issues.
Overview of IDEF methods
IDEF refers to a family of modeling language, which cover a wide range of uses, from functional modeling to data, simulation, object-oriented analysis/design and knowledge acquisition. Eventually the IDEF methods have been defined up to IDEF14:
IDEF0: Function modeling
IDEF1: Information modeling
IDEF1X: Data modeling
IDEF2: Simulation model design
IDEF3: Process description capture
IDEF4: Object-oriented design
IDEF5: Ontology description capture
IDEF6: Design rationale capture
IDEF7: Information system auditing
IDEF8: User interface modeling
IDEF9: Business constraint discovery
IDEF10: Implementation architecture modeling
IDEF11: Information artifact modeling
IDEF12: Organization modeling
IDEF13: Three-schema mapping design
IDEF14: Network design
In 1995 only the IDEF0, IDEF1X, IDEF2, IDEF3 and IDEF4 had been developed in full. Some of the other IDEF concepts had some preliminary design. Some of the last efforts were new IDEF developments in 1995 toward establishing reliable methods for business constraint discovery IDEF9, design rationale capture IDEF6, human system, interaction design IDEF8, and network design IDEF14.
The methods IDEF7, IDEF10, IDEF11, IDEF 12 and IDEF13 haven't been developed any further than their initial definition.
History
IDEF originally stood for ICAM Definition, initiated in the 1970s at the US Air Force Materials Laboratory, Wright-Patterson Air Force Base in Ohio by Dennis E. Wisnosky, Dan L. Shunk, and others. and completed in the 1980s. IDEF was a product of the ICAM initiative of the United States Air Force. The IEEE recast the IDEF abbreviation as Integration Definition."
The specific projects that produced IDEF were ICAM project priorities 111 and 112 (later renumbered 1102). The subsequent Integrated Information Support System (IISS) project priorities 6201, 6202, and 6203 attempted to create an information processing environment that could be run in heterogeneous physical computing environments. Further development of IDEF occurred under those projects as a result of the experience gained from applications of the new modeling techniques. The intent of the IISS efforts was to create 'generic subsystems' that could be used by a |
https://en.wikipedia.org/wiki/CJOH-DT | CJOH-DT (channel 13) is a television station in Ottawa, Ontario, Canada, serving the National Capital Region as part of the CTV Television Network. It is owned and operated by network parent Bell Media alongside Pembroke-licensed CTV 2 outlet CHRO-TV (channel 5). Both stations share studios with Bell's Ottawa radio properties at the Market Media Mall building on George Street in downtown Ottawa's ByWard Market, while CJOH-DT's transmitter is located on the Ryan Tower at Camp Fortune in Chelsea, Quebec, north of Gatineau.
History
Founded by Ernie Bushnell, CJOH signed on for the first time on March 12, 1961. Initially, studio facilities were located at 29 Bayswater Avenue () until that September when operations were shifted over several weeks to a $2 million () complex at 1500 Merivale.
It acquired former Cornwall-based CBC affiliate CJSS-TV as a rebroadcaster in 1963, making CJSS the first television station in Canada to cease operations. The channel 6 transmitter in Deseronto became operational in 1972 to serve the Kingston and Belleville markets. Standard Broadcasting owned the station from 1975 to 1987; that year, after a CRTC decision authorized Baton Broadcasting to launch a new independent station in Ottawa, Standard responded to the potential new competition by selling CJOH to Baton, who then surrendered the new independent licence. Baton was renamed CTV Inc. in 1998 after gaining control of the CTV network the preceding year. CTV in turn would be purchased by Bell Canada and folded into Bell Globemedia, now Bell Media, in 2001.
On August 1, 1995, the station's longtime sports anchor Brian Smith was shot in the station's parking lot by Jeffrey Arenburg, a released mental patient with a history of threatening media personalities, who claimed the station was broadcasting messages inside his head. Smith died in hospital the following day. The incident led to renewed calls across Canada for strengthening of the Canadian government's gun control legislation and provided the impetus for Brian's Law (Ontario Bill 68) – an amendment of the Mental Health Act and Health Care Consent Act which introduced community treatment orders and new criteria for involuntary commitment to psychiatric facilities. Arenburg was released from a mental hospital in Penetanguishene in 2006, then imprisoned for two years for assaulting a U.S. border guard in 2008.
On August 28, 1996, BBS Ontario Incorporated received CRTC approval to add a new analog transmitter on UHF channel 47 at Pembroke, Ontario, to rebroadcast programming of CJOH-TV. CHRO-TV was also approved to disaffiliate from the CTV Television Network that same day.
The newsroom was destroyed by a four-alarm fire during the early morning hours of February 7, 2010, destroying equipment and the news archives. The building itself remained intact until it was demolished by the end of December 2011. An adjacent office building housing former sister station CKQB-FM was not affected by the fire.
CJOH's news |
https://en.wikipedia.org/wiki/CKWS-DT | CKWS-DT (channel 11) is a television station in Kingston, Ontario, Canada, part of the Global Television Network. Owned and operated by network parent Corus Entertainment, the station maintains studios on Queen Street in downtown Kingston, and its transmitter is located near Highway 95 on Wolfe Island, south of the city.
History
CKWS signed-on December 18, 1954, as an affiliate of the CBC network. It was originally a joint venture between Roy Thomson and the Davies family, owners of The Kingston Whig-Standard (the source of its callsign). The station has been sold three times: to the Kanatec Corporation, bought by Power Corporation in 1977 and to Corus in 1999.
Children across the country were exposed to CKWS programming in the late 1970s and 1980s by the Harrigan series – a particularly innocent and low budget show about a leprechaun, starring Barry Dale. Shelagh Rogers of CBC Radio fame started out presenting the weather for the station's newscasts.
During its days as a private CBC affiliate, it aired the minimum amount of CBC programming (40 hours per week).
On May 20, 2015, Corus and Bell Media announced an agreement whereby Corus' CBC affiliates, including CKWS, would leave the public network and instead "affiliate" with CTV. The switch took effect on August 31, 2015. Most TV service providers serving the region also carry CBC owned-and-operated station CBOT Ottawa, and any that do not will have to add a CBC affiliate such as CBOT to their basic services to comply with CRTC regulations. Legally, the affiliation was described as a "program supply agreement", and not as an "affiliation" (a term with specific legal implications under CRTC rules), as Corus maintained editorial control over the stations' programming and the ability to sell local advertising, and did not delegate responsibility for CTV programs aired by the station to Bell Media. Affiliations also require the consent of the CRTC.
The switch was approved by the Canadian Radio-television Telecommunications Commission on August 27, 2015, when it dismissed objections by Rogers Media (who argued that the change was an "affiliation" and thus required CRTC consent to implement, and was not in the public interest because it created duplicate sources of CTV programming), and by a resident who complained that as he only received television over the air, he would lose his ability to receive CBC Television as a result of the disaffiliation.
On August 14, 2018, it was announced that CKWS' affiliation agreement with CTV would expire on August 27; the station subsequently became a Global owned-and-operated station, rebranding itself as Global Kingston.
News programming
CKWS produces 28 hours per week of local news programming, with 5½ hours each weekday, and a half–hour on Saturday. The station does not air any news programs on Sunday.
In September 2016, CKWS began to align its news programming with Global News rather than CTV News; it added airings of Global National in September 2016 |
https://en.wikipedia.org/wiki/Highways%20in%20Poland | Controlled-access highways in Poland are part of the national roads network and they are divided into motorways and expressways. Both types of highways feature grade-separated interchanges with all other roads, emergency lanes, feeder lanes, wildlife crossings and dedicated roadside rest areas. Motorways differ from expressways in their technical parameters like designated speed, permitted road curvature, lane widths or minimal distances between interchanges. Moreover, expressways might have single-carriageway sections in case of low traffic densities (as of 2023, such sections constitute 3.5% of the highway network).
The development of modern highways began in the 1970s, but proceeded very slowly under the communist rule and for the first years afterwards – between 1970 and 2000 only the total of 434 km of highways were constructed (5% of the planned network). Further 1050 km (13% of the network) were opened from 2001 to 2010, followed by 2773 km (34% of the network) constructed between 2011 and 2020. It is planned to open about 3000 km (about 37%) in the 2020s, while the last 10% would be completed after 2030.
, there are 5115,6 km of motorways and expressways in operation (62% of the intended network), while contracts for construction of further 1030 km (13% of the network) are ongoing.
Except for the single-carriageway expressways, both types of highways fulfill the definition of a motorway as characterized by OECD, WRA or Vienna Convention. Speed limits in Poland are 140 km/h on motorways and 120 km/h on expressways (100 km/h in case of single-carriageway expressway sections). Some motorway stretches are tolled.
Technical parameters
Motorways are public roads with controlled access which are designated for motor vehicles only, and feature two carriageways with at least two continuous lanes each, divided by a median. They have no one-level intersections with any roads or other forms of land and water transport and have wildlife crossings constructed above the road. They feature emergency lanes and feeder lanes, and are equipped with dedicated roadside rest areas. Motorways are the only roads in Poland which use blue background on road signs - others use green road signs.
Expressways share most of the characteristics of motorways, differing mainly in that:
Expressways are designated for lower speed than motorways. For example, the road curvature can be higher and the lanes are usually narrower (3.5m vs 3.75m). Emergency lanes can also be narrower (2.5m vs 3m) and in exceptional situations expressways might not have them at all.
Expressways can have a single carriageway on sections with low traffic density.
Motorways can have interchanges only with main roads and the distance between interchanges is typically not less than 15 km (or 5 km near major cities), while expressways typically have more frequent interchanges. In exceptional situations, expressways might not have dedicated feeder lanes on interchanges.
Formally, expressways |
https://en.wikipedia.org/wiki/Keyboard%20shortcut | In computing, a keyboard shortcut also known as hotkey is a series of one or several keys to quickly invoke a software program or perform a preprogrammed action. This action may be part of the standard functionality of the operating system or application program, or it may have been written by the user in a scripting language. Some integrated keyboards also include pointing devices; the definition of exactly what counts as a "key" sometimes differs.
The meaning of term "keyboard shortcut" can vary depending on software manufacturer. In Windows, hotkeys consists of a specific key combination used to trigger an action (these are usually system-wide shortcuts that are available in all contexts so long as receiving program is active); mnemonics represent a designated letter in a menu command or toolbar button that when pressed together with the Alt key, activates such command.
The term is generally associated with computer keyboards, but many electronic musical instruments now contain keyboards with advanced configuration options.
Description
Keyboard shortcuts are typically a means for invoking one or more commands using the keyboard that would otherwise be accessible only through a menu, a pointing device, different levels of a user interface, or via a command-line interface. Keyboard shortcuts are generally used to expedite common operations by reducing input sequences to a few keystrokes, hence the term "shortcut".
To differentiate from general keyboard input, most keyboard shortcuts require the user to press and hold several keys simultaneously or a sequence of keys one after the other. Unmodified key presses are sometimes accepted when the keyboard is not used for general input - such as with graphics packages e.g. Adobe Photoshop or IBM Lotus Freelance Graphics. Other keyboard shortcuts use function keys that are dedicated for use in shortcuts and may only require a single keypress. For simultaneous keyboard shortcuts, one usually first holds down the modifier key(s), then quickly presses and releases the regular (non-modifier) key, and finally releases the modifier key(s). This distinction is important, as trying to press all the keys simultaneously will frequently either miss some of the modifier keys, or cause unwanted auto-repeat. Sequential shortcuts usually involve pressing and releasing a dedicated prefix key, such as the Esc key, followed by one or more keystrokes.
Mnemonics are distinguishable from keyboard shortcuts. One difference between them is that the keyboard shortcuts are not localized on multi-language software but the mnemonics are generally localized to reflect the symbols and letters used in the specific locale. In most GUIs, a program's keyboard shortcuts are discoverable by browsing the program's menus – the shortcut is indicated next to the menu choice. There are keyboards that have the shortcuts for a particular application already marked on them. These keyboards are often used for editing video, audio, or gra |
https://en.wikipedia.org/wiki/Query%20flooding | Query flooding is a method to search for a resource on a peer-to-peer network. It is simple and scales very poorly and thus is rarely used. Early versions of the Gnutella protocol operated by query flooding; newer versions use more efficient search algorithms.
Operation
A peer-to-peer network generally consists of a large number of nodes each connected to a small subset of the nodes and not all nodes in the network. If a node wants to find a resource on the network, which may be on a node it does not know about, it could simply broadcast its search query to its immediate neighbours. If the neighbours do not have the resource, it then asks its neighbours to forward the query to their neighbours in turn. This is repeated until the resource is found or all the nodes have been contacted, or perhaps a network-imposed hop limit is reached.
Query flooding is simple to implement and is practical for small networks with few requests. It contacts all reachable nodes in the network and so can precisely determine whether a resource can be found in the network (Freenet, for example, only returns a probabilistic result).
On the other hand, every request may cause every node to be contacted. Each node might generate a small number of queries; however, each such query floods the network. Thus, a larger network would generate far more traffic per node than a smaller one, making it inherently unscalable. Additionally, because a node can flood the network simply by issuing a request for a nonexistent resource, it could be possible to launch a denial-of-service attack on the network.
Alternatives
Version 0.6 of the Gnutella protocol mandates query routing.
The query routing specification explains how the ideas of the original research are implemented. Other file-sharing networks, such as the Kad network, use distributed hash tables to index files and for keyword searches. BitTorrent creates individual overlay networks for sharing individual files (or archives). Searches are performed by other mechanisms, such as locating torrent files indexed on a website. A similar mechanism can be used on the Gnutella network with magnet links. For instance Bitzi provides a web interface to search for magnet links.
Earlier P2P networks, such as Napster, used a centralized database to locate files. This does not have a scaling problem, but the central server is a single point of failure.
See also
Flooding algorithm
Internet protocols |
https://en.wikipedia.org/wiki/Document%20file%20format | A document file format is a text or binary file format for storing documents on a storage media, especially for use by computers.
There currently exist a multitude of incompatible document file formats.
Examples of XML-based open standards are DocBook, XHTML, and, more recently, the ISO/IEC standards OpenDocument (ISO 26300:2006) and Office Open XML (ISO 29500:2008).
In 1993, the ITU-T tried to establish a standard for document file formats, known as the Open Document Architecture (ODA) which was supposed to replace all competing document file formats. It is described in ITU-T documents T.411 through T.421, which are equivalent to ISO 8613. It did not succeed.
Page description languages such as PostScript and PDF have become the de facto standard for documents that a typical user should only be able to create and read, not edit. In 2001, a series of ISO/IEC standards for PDF began to be published, including the specification for PDF itself, ISO-32000.
HTML is the most used and open international standard and it is also used as document file format. It has also become ISO/IEC standard (ISO 15445:2000).
The default binary file format used by Microsoft Word (.doc) has become widespread de facto standard for office documents, but it is a proprietary format and is not always fully supported by other word processors.
Common document file formats
ASCII, UTF-8 — plain text formats
Amigaguide
.doc for Microsoft Word — Structural binary format developed by Microsoft (specifications available since 2008 under the Open Specification Promise)
DjVu — file format designed primarily to store scanned documents
DocBook — an XML format for technical documentation
HTML (.html, .htm), (open standard, ISO from 2000), in combination with possible image files referred to.
FictionBook (.fb2) — open XML-based e-book format
Markdown (.md) — markup language for creating formatted text using plain text
Office Open XML — .docx (XML-based standard for office documents)
OpenDocument — .odt (XML-based standard for office documents)
OpenOffice.org XML — .sxw (open, XML-based format for office documents)
OXPS — Open XML Paper Specification (Windows 8.1 and above, older version is XPS used in Windows 7)
PalmDoc — handheld document format
.pages for Pages
PDF — Open standard for document exchange. ISO standards include PDF/X (eXchange), PDF/A (Archive), PDF/E (Engineering), ISO 32000 (PDF), PDF/UA (Accessibility) and PDF/VT (Variable data and transactional printing). PDF is readable on almost every platform with free or open source readers. Open source PDF creators are also available.
PostScript — .ps
Rich Text Format (RTF) — meta data format being developed by Microsoft since 1987 for Microsoft products and cross-platform document interchange
SYmbolic LinK (SYLK)
Scalable Vector Graphics (SVG) - Graphics format primarily for vector-based images.
TeX — Open-source typesetting program and format. First successful mathematical notation language.
TEI — XML f |
https://en.wikipedia.org/wiki/Curses%20%28programming%20library%29 | curses is a terminal control library for Unix-like systems, enabling the construction of text user interface (TUI) applications.
The name is a pun on the term "cursor optimization". It is a library of functions that manage an application's display on character-cell terminals (e.g., VT100).
Overview
Using curses, programmers are able to write text-based applications without writing directly for any specific terminal type. The curses library on the executing system sends the correct control characters based on the terminal type. It provides an abstraction of one or more windows that maps onto the terminal screen. Each window is represented by a character matrix. The programmer sets up the desired appearance of each window, then tells the curses package to update the screen. The library determines a minimal set of changes that are needed to update the display and then executes these using the terminal's specific capabilities and control sequences.
In short, this means that the programmer simply creates a character matrix of how the screen should look and lets curses handle the work.
The curses API is described in several places. Most implementations of curses use a database that can describe the capabilities of thousands of different terminals. There are a few implementations, such as PDCurses, which use specialized device drivers rather than a terminal database. Most implementations use terminfo; some use termcap. Curses has the advantage of back-portability to character-cell terminals and simplicity. For an application that does not require bit-mapped graphics or multiple fonts, an interface implementation using curses will usually be much simpler and faster than one using an X toolkit.
History
The first curses library was written by Ken Arnold and originally released with BSD UNIX, where it was used for several games, most notably Rogue. Some improvements were made to the BSD library in the 1990s as "4.4BSD" curses, e.g., to provide more than one type of video highlighting. However, those are not widely used.
The name "curses" is a pun on cursor optimization. Sometimes it is incorrectly stated that curses was used by the vi editor. In fact the code in curses that optimizes moving the cursor from one place on the screen to another was borrowed from vi, which predated curses.
According to Goodheart, Ken Arnold's original implementation of curses started by reusing functions from the termcap library, and adding to that. A few years later, Mary Ann Horton, who had maintained the vi and termcap sources at Berkeley, went to AT&T Corporation and made a different version using terminfo, which became part of UNIX System III and UNIX System V. Due to licensing restrictions on the latter, the BSD and AT&T versions of the library were developed independently. In addition to the termcap/terminfo improvement, other improvements were made in the AT&T version:
video highlighting (bold, underline) The BSD version supported only standout.
line-drawing T |
https://en.wikipedia.org/wiki/The%20Tomorrow%20People | The Tomorrow People is a British children's science fiction television series created by Roger Price. Produced by Thames Television for the ITV Network, the series first ran from 30 April 1973 to 19 February 1979.
The theme music was composed by Australian music composer, Dudley Simpson, who composed music for two BBC science fiction dramas, Doctor Who (1963) and Blake’s 7 (1978).
In 1992, after having much success with running episodes of the original series in America, Nickelodeon requested Price and Thames Television for a new version to be piloted and filmed at Nickelodeon Studios Florida in April 1992, with Price acting as executive producer. This version used the same basic premise as the original series with some changes, and ran until 8 March 1995. A series of audio plays using the original concept and characters (and many of the original series' actors) was produced by Big Finish Productions between 2001 and 2007. In 2013, an American remake of the show premiered on The CW.
Premise
All incarnations of the show concerned the emergence of the next stage of human evolution (Homo novis) known colloquially as Tomorrow People. Born to human parents, an apparently normal child might at some point between childhood and late adolescence experience a process called 'breaking out' and develop special paranormal abilities. These abilities include psionic powers such as telepathy, telekinesis, and teleportation. However, their psychological make-up prevents them from intentionally killing others.
Original series (1970s)
The original series was produced by Thames Television for ITV. The Tomorrow People operate from a secret base, The Lab, built in an abandoned London Underground station. The team constantly watches for new Tomorrow People "breaking out" (usually around the age of puberty) to help them through the process as the youngsters endure mental agonies as their minds suddenly change. They sometimes deal with attention from extraterrestrial species as well as facing more earthbound dangers with military forces across the globe keen to recruit or capture them for their own ends. One thing they lack is the capability to intentionally take another life. This pacifistic element of their make up is referred to as the "prime barrier" and any Tomorrow Person who causes the loss of a human life would be driven insane by the confusion in their brain. They also have connections with the "Galactic Federation" which oversees the welfare of telepathic species throughout the galaxy. In addition to their psychic powers (the so-called 3T's of telepathy, telekinesis and teleportation), they use advanced technology such as the biological (called in the series "biotronic") computer TIM, which is capable of original thought, telepathy, and can augment their psychic powers. TIM also helps the Tomorrow People to teleport long distances, although they must be wearing a device installed into a belt or bracelet for this to work. Teleportation is referred to as jau |
https://en.wikipedia.org/wiki/Onion%20routing | Onion routing is a technique for anonymous communication over a computer network. In an onion network, messages are encapsulated in layers of encryption, analogous to the layers of an onion. The encrypted data is transmitted through a series of network nodes called "onion routers," each of which "peels" away a single layer, revealing the data's next destination. When the final layer is decrypted, the message arrives at its destination. The sender remains anonymous because each intermediary knows only the location of the immediately preceding and following nodes. While onion routing provides a high level of security and anonymity, there are methods to break the anonymity of this technique, such as timing analysis.
History
Onion routing was developed in the mid-1990s at the U.S. Naval Research Laboratory by employees Paul Syverson, Michael G. Reed, and David Goldschlag to protect U.S. intelligence communications online. It was then refined by the Defense Advanced Research Projects Agency (DARPA) and patented by the Navy in 1998.
This method was publicly released by the same employees through publishing an article in the IEEE Journal on Selected Areas in Communications the same year. It depicted the use of the method to protect the user from the network and outside observers who eavesdrop and conduct traffic analysis attacks. The most important part of this research is the configurations and applications of onion routing on the existing e-services, such as Virtual private network, Web-browsing, Email, Remote login, and Electronic cash.
Based on the existing onion routing technology, computer scientists Roger Dingledine and Nick Mathewson joined Paul Syverson in 2002 to develop what has become the largest and best-known implementation of onion routing, then called The Onion Routing project (Tor project).
After the Naval Research Laboratory released the code for Tor under a free license, Dingledine, Mathewson and five others founded The Tor Project as a non-profit organization in 2006, with the financial support of the Electronic Frontier Foundation and several other organizations.
Data structure
Metaphorically, an onion is the data structure formed by "wrapping" a message with successive layers of encryption to be decrypted ("peeled" or "unwrapped") by as many intermediary computers as there are layers before arriving at its destination. The original message remains hidden as it is transferred from one node to the next, and no intermediary knows both the origin and final destination of the data, allowing the sender to remain anonymous.
Onion creation and transmission
To create and transmit an onion, the originator selects a set of nodes from a list provided by a "directory node". The chosen nodes are arranged into a path, called a "chain" or "circuit", through which the message will be transmitted. To preserve the anonymity of the sender, no node in the circuit is able to tell whether the node before it is the originator or another interme |
https://en.wikipedia.org/wiki/List%20of%20French%20departments%20by%20population | This table lists the 101 French departments in descending order of population, area and population density.
Data description
The figures include:
population without double counting for 1999;
municipal population (legal population in 2008, with effect from 1 January 2011) published in decree No. 2010-1723 of 30 December 2010 as amended by Decree No. 2011-343 of 28 March 2011 which corresponds to data compiled as at 1 January 2008.
municipal population (legal population in 2019 with effect from 1 January 2022)
The total population takes into account double counting.
Evolution
Between 1999 and 2006 all French departments have grown in population with the exception of the following seven departments: Allier and Cantal in Auvergne, Creuse in Limousin, Ardennes and Haute-Marne in Champagne-Ardenne, Nièvre in Burgundy, and Vosges in Lorraine. See population decline for more information.
In contrast the seven departments that have gained the most population in absolute value are Haute-Garonne, Gironde, Bouches-du-Rhône, Seine-Saint-Denis, Loire-Atlantique, Hauts-de Seine, and Hérault.
Guadeloupe has seemingly lost population between 1999 and 2008. However, this diminution of the legal population is due to the creation of the overseas communities of Saint Barthélemy and Saint Martin. In the 1999 census, the population of Guadeloupe without the arrondissement of Saint-Martin-Saint-Barthélemy was 386,566 inhabitants. The department's population has actually increased by more than 15,000 people over the period based on a constant territory.
List of departments by descending population
References
French departments
Ranked lists of country subdivisions |
https://en.wikipedia.org/wiki/VMI | VMI may refer to:
Science and technology
Virtual mobile infrastructure, hosting a nominally mobile operating system in a data center or cloud
Velocity Map Imaging, a technique in photofragment-ion imaging in chemical physics
Virtual machine image, an exact snapshot of a computer disk in a virtual machine
Organizations
State Tax Inspectorate, a Lithuanian tax authority
Virginia Military Institute, America's oldest state-supported and only all-military college, located in Lexington, Virginia
United States v. Virginia ("the VMI decision"), a 1996 US Supreme Court case which struck down VMI's male-only admission policy
Virginia Mason Institute, part of the Virginia Mason Medical Center hospital system
Other uses
Vendor-managed inventory, where a product supplier maintains an inventory of material, typically at the buyer's location |
https://en.wikipedia.org/wiki/Magic%20cookie | In computing, a magic cookie, or just cookie for short, is a token or short packet of data passed between communicating programs. The cookie is often used to identify a particular event or as "handle, transaction ID, or other token of agreement between cooperating programs".
Usage
Cookie data is typically not meaningful to the recipient program. The contents are opaque and not usually interpreted until the recipient passes the cookie data back to the sender or perhaps another program at a later time.
In some cases, recipient programs are able to meaningfully compare two cookies for equality.
The cookie can be used like a ticket.
Early use
The term magic cookie appears in the man page for the fseek routine in the C standard library, dating back at least to 1979, where it was stated:
"ftell returns the current value of the offset relative to the beginning of the file associated with the named stream. It is measured in bytes on UNIX; on some other systems it is a magic cookie, and the only foolproof way to obtain an offset for fseek."
Cookie as token
An analogy is the token supplied at a coat check (cloakroom) counter in real life. The token has no intrinsic meaning, but its uniqueness allows it to be exchanged for the correct coat when returned to the coat check counter. The coat check token is opaque because the way in which the counter staff are able to find the correct coat when the token is presented is immaterial to the person who wishes their coat returned. In other cases (as is possible with HTTP cookies), the actual data of interest can be stored as name–value pairs directly on the cookie.
Cookies are used as identifying tokens in many computer applications. When one visits a website, the remote server may leave an HTTP cookie on one's computer, where they are often used to authenticate identity upon returning to the website.
Cookies are a component of the most common authentication method used by the X Window System.
References
Data transmission
pl:Cookie |
https://en.wikipedia.org/wiki/Media%20gateway | A media gateway is a translation device or service that converts media streams between disparate telecommunications technologies such as POTS, SS7, Next Generation Networks (2G, 2.5G and 3G radio access networks) or private branch exchange (PBX) systems. Media gateways enable multimedia communications across packet networks using transport protocols such as Asynchronous Transfer Mode (ATM) and Internet Protocol (IP).
Because the media gateway connects different types of networks, one of its main functions is to convert between different transmission and coding techniques. Media streaming functions such as echo cancellation, DTMF, and tone sender are also located in the media gateway.
Media gateways are often controlled by a separate Media Gateway Controller which provides the call control and signaling functionality. Communication between media gateways and Call Agents is achieved by means of protocols such as MGCP or Megaco (H.248) or Session Initiation Protocol (SIP). Modern media gateways used with SIP are often stand-alone units with their own call and signaling control integrated and can function as independent, intelligent SIP end-points.
Voice over Internet Protocol (VoIP) media gateways perform the conversion between Time-division multiplexing (TDM) voice to a media streaming protocol, such as the Real-time Transport Protocol, (RTP), as well as a signaling protocol used in the VoIP system.
Mobile access media gateways connect the radio access networks of a public land mobile network PLMN to a next-generation core network. 3GPP standards define the functionality of CS-MGW and IMS-MGW for UTRAN and GERAN based PLMNs.
See also
Signaling gateway
References
Telecommunications equipment |
https://en.wikipedia.org/wiki/LCD%20projector | An LCD projector is a type of video projector for displaying video, images or computer data on a screen or other flat surface. It is a modern equivalent of the slide projector or overhead projector. To display images, LCD (liquid-crystal display) projectors typically send light from a metal-halide lamp through a prism or series of dichroic filters that separates light to three polysilicon panelsone each for the red, green and blue components of the video signal. As polarized light passes through the panels (combination of polarizer, LCD panel and analyzer), individual pixels can be opened to allow light to pass or closed to block the light. The combination of open and closed pixels can produce a wide range of colors and shades in the projected image.
Metal-halide lamps are used because they output an ideal color temperature and a broad spectrum of color. These lamps also have the ability to produce an extremely large amount of light within a small area; current projectors average about 2,000 to 15,000 American National Standards Institute (ANSI) lumens.
Other technologies, such as Digital Light Processing (DLP) and liquid crystal on silicon (LCOS) are also becoming more popular in modestly priced video projection.
Projection surfaces
Because they use small lamps and the ability to project an image on any flat surface, LCD projectors tend to be smaller and more portable than some other types of projection systems. Even so, the best image quality is found using a blank white, grey, or black (which blocks reflected ambient light) surface, so dedicated projection screens are often used.
Perceived color in a projected image is a factor of both projection surface and projector quality. Since white is more of a neutral color, white surfaces are best suited for natural color tones; as such, white projection surfaces are more common in most business and school presentation environments.
However, darkest black in a projected image is dependent on how dark the screen is. Because of this, some presenters and presentation-space planners prefer gray screens, which create higher-perceived contrast. The trade-off is that darker backgrounds can throw off color tones. Color problems can sometimes be adjusted through the projector settings, but may not be as accurate as they would on a white background.
Throw ratio
A projector's throw ratio is used when installing projectors to control the size of the projected display. For example, if the throw ratio is 2:1 and the projector is fourteen feet away from the screen, then the display width will be seven feet.
History
Early experiments with liquid crystals to generate a video image were done by John A. van Raalte at the RCA-Laboratories in 1968. His concept was based on e-beam-addressing to generate an electronic charge pattern corresponding to a video image, which in turn controlled the LC layer of a reflective LC cell. E-beam-addressing requires a CRT with a modified faceplate to generate a charge pattern on |
https://en.wikipedia.org/wiki/David%20P.%20Reed | David Patrick Reed (born January 31, 1952) is an American computer scientist, educated at the Massachusetts Institute of Technology, known for a number of significant contributions to computer networking and wireless communications networks.
He was involved in the early development of TCP/IP, and was the designer of the User Datagram Protocol (UDP), though he finds this title "a little embarrassing". He was also one of the authors of the original paper about the end-to-end principle, End-to-end arguments in system design, published in 1984.
He is also known for Reed's law, his assertion that the utility of large networks, particularly social networks, can scale exponentially with the size of the network.
From 2003–2010, Reed was an adjunct professor at the MIT Media Lab, where he co-led the Viral Communications group and the Communication Futures program. He currently serves as a senior vice president of the Chief Scientist Group at SAP Labs.
He is one of six principal architects of the Croquet project (along with Alan Kay, Julian Lombardi, Andreas Raab, David A. Smith, and Mark McCahill). He is also on the advisory board of TTI/Vanguard.
His 1978 dissertation introduced multiversion concurrency control (MVCC). MVCC is a concurrency control method commonly used by database management systems to provide concurrent access to the database and in programming languages to implement transactional memory.
References
External links
Reed's Locus
Biography
Naming and synchronization in a decentralized computer system (Reed's thesis, 1978)
Living people
American computer scientists
MIT School of Architecture and Planning faculty
Massachusetts Institute of Technology alumni
1952 births
MIT Media Lab people |
https://en.wikipedia.org/wiki/ArtePiazza | is a video game development and computer graphics studio based in Japan. Their name derives from the Italian words for "art" and "a public square".
History
The company is best known for its involvement in the development of the Dragon Quest series by Enix and later Square Enix. While ArtePiazza was mostly responsible for the CG design and illustrations of some of the early titles, they produced enhanced remakes of others. This includes Dragon Quest V: Hand of the Heavenly Bride for the PlayStation 2, as well as Nintendo DS remakes of Dragon Quest IV: Chapters of the Chosen, Dragon Quest V: Hand of the Heavenly Bride, and Dragon Quest VI: Realms of Revelation.
Other projects besides those based on Square Enix properties include the development of the PlayStation Portable and PlayStation 2 game Innocent Life: A Futuristic Harvest Moon and the co-production of Koei's Wii title Opoona.
Games
Dragon Quest series
1996: Dragon Quest III (Super Famicom version - CG design/scenario)
2000: Dragon Quest VII (PlayStation - CG design/scenario)
2001: Dragon Quest IV (PlayStation - CG design)
2002: Dragon Quest Characters: Torneko no Daibōken 3 (PlayStation 2 - scenario)
2004: Dragon Quest V: Hand of the Heavenly Bride (PlayStation 2 version)
2007: Dragon Quest IV: Chapters of the Chosen (Nintendo DS version)
2008: Dragon Quest V: Hand of the Heavenly Bride (Nintendo DS version)
2010: Dragon Quest VI: Realms of Revelation (Nintendo DS version)
2013: Dragon Quest VII: Fragments of the Forgotten Past (Nintendo 3DS version)
2017: Dragon Quest Rivals (iOS/Android), Dragon Quest XI: Echoes of an Elusive Age (Nintendo 3DS version (2D mode))
2019: Dragon Quest XI S: Echoes of an Elusive Age - Definitive Edition (2D mode)
Other games
2006: Innocent Life: A Futuristic Harvest Moon (PlayStation Portable/PlayStation 2)
2007: Opoona (Wii)
2010: GO Series: Pinball Attack! (DSiWare)
2010: Accel Knights: Imashi ga Tame Ware wa Tsurugi o Toru (DSiWare)
2010: Arrow of Laputa (DSiWare)
2011: Rikishi (DSiWare)
2016: Romancing SaGa 2 (iOS/Android/PC/Nintendo Switch/PS4/PS Vita/Xbox One versions)
2019: Romancing SaGa 3 (iOS/Android/PC/Nintendo Switch/PS4/PS Vita/Xbox One versions)
References
External links
Official Artepiazza Website (Japanese)
Video game companies of Japan
Video game companies established in 1989
Video game development companies
Japanese companies established in 1989
Software companies based in Tokyo |
https://en.wikipedia.org/wiki/Software%20standard | A software standard is a standard, protocol, or other common format of a document, file, or data transfer accepted and used by one or more software developers while working on one or more than one computer programs. Software standards enable interoperability between different programs created by different developers.
How it is used and applied
Software standards consist of certain terms, concepts, data formats, document styles and techniques agreed upon by software creators so that their software can understand the files and data created by a different computer program. To be considered a standard, a certain protocol needs to be accepted and incorporated by a group of developers who contribute to the definition and maintenance of the standard.
Some developers prefer using standards for software development because of the efficiencies it provides for code development and wider user acceptance and use of the resulting application.
For example, the protocols HTML, TCP/IP, SMTP, POP and FTP are software standards that application designers must understand and follow if their software expects to interface with these standards. For instance, in order for an email sent from Microsoft Outlook can be read from within the Yahoo! Mail application, the email will be sent using SMTP, which the different receiving program understands and can parse properly to display the email. Without a standardized technique to send an email, the two different programs would be unable to accurately share and display the delivered information.
Some other widely used data formats, while understood and used by a variety of computer programs, are not considered a software standard. Microsoft Office file formats, such as .doc and .xls, are commonly converted by other computer programs to use, but are still owned and controlled by Microsoft, unlike text files (TXT or RTF.)
Creation
In order for all parties to agree to a certain software standard that they all should use to make their software connect with each other, there are software standards organizations like W3C and ISOC that consist of groups of larger software companies like Microsoft and Apple Inc. Representatives of these companies contribute their ideas about how to make a single, unified software standard to address the data problem they are trying to handle.
Complexity of a standard can vary depending on what kind of problem that they are trying to solve. For instance FTP (file transfer protocol) tries to solve a different problem than SMTP, which is concerned with sending and receiving email. Standards also need to be simple, maintainable and understandable. The software standard document that they create needs to detail every possible condition, types, elements, etc. in order to retain utility and serve the role for which it was created.
Open versus closed standards
A standard can be a closed standard or an open standard. The documentation for an open standard is open to the public and anyone can create a so |
https://en.wikipedia.org/wiki/A%2B%2B | A++ stands for abstraction plus reference plus synthesis which is used as a name for the minimalistic programming language that is built on ARS-based programming. ARS-based programming is used as a name for programming which consists mainly of applying patterns derived from ARS to programming in any language. ARS is an abstraction from the Lambda Calculus, taking its three basic operations, and giving them a more general meaning, thus providing a foundation for the three major programming paradigms functional programming, object-oriented programming and imperative programming.
The technical texts in this article are taken from the online version of the 1st edition of the A++-book published in 2004. The 2nd edition of the book A++ The Smallest Programming Language in the World (292 pages) was published in 2018.
History
A++ was developed by Georg P. Loczewski and Britain Hamm in the years from 1996 - 2002 working as a software developer for Bull's Software-Haus in Langen, Germany and as a freelance programmer with the purpose to serve as a learning instrument rather than as a programming language used to solve practical problems.
The development of A++ is based on the 'Lambda Calculus' by Alonzo Church and is influenced by Guy L. Steele's Programming Language Scheme.
A++ is intended to be an effective tool to become familiar with the core of programming and with programming patterns that can be applied in other languages needed to face the real world.
Publications
The first published documentation appeared in German in January 2003 with the title 'Programmierung pur --- Programmieren fundamental und ohne Grenzen' ('Undiluted Programming') (919 pages) .
In the year 2005 followed an introduction to A++ in English with the title: 'A++ The Smallest Programming Language in the World --- An Educational Language (242 pages) .
Purpose
A++ is a language similar to C++, with its interpreter available in Scheme, Java, C, C++ and Python, and offers an ideal environment for basic training in programming, enforcing rigorous confrontation with the essentials of programming languages.
Constitutive principles
ARS (basic operations)
Abstraction
+ Reference
+ Synthesis
Lexical scope
Closure
Programming paradigms supported
Functional programming, (directly supported)
(writing expressions to be evaluated),
Object-oriented programming (directly supported)
(sending messages to objects),
Imperative programming (directly supported)
(writing statements to be executed), including structured programming.
Logic programming (indirectly supported)
(rule based programming)
Core features
Logical abstractions
(true, false, if, not, and, or),
Numerical abstractions
(natural numbers, zerop, succ, pred, add, sub, mult),
Relational abstractions,
(equalp, gtp, ltp, gep)
Recursion,
Creation and processing of lists
(cons, car, cdr, nil, nullp, llength, remove, nth, assoc),
Higher order functions
(compose, curry, map, mapc, map2, filter, locate, for |
https://en.wikipedia.org/wiki/Commodore%20Datasette | The Commodore 1530 (C2N) Datasette, later also Datassette (a portmanteau of data and cassette), is Commodore's dedicated magnetic-tape data storage device. Using compact cassettes as the storage medium, it provides inexpensive storage to Commodore's 8-bit computers, including the PET, VIC-20, and Commodore 64. A physically similar model, Commodore 1531, was made for the Commodore 16 and Plus/4 series computers.
Features
Typical compact cassette interfaces of the late 1970s use a small controller in the computer to convert digital data to and from analog tones. The interface is then connected to the cassette deck using normal audio cables like RCA jacks or 3.5mm phone jacks. This sort of system was used on the Apple II and TRS-80 Color Computer, as well as many S-100 bus systems, and allow them to be used with any cassette player with suitable connections.
In the Datasette, instead of writing two tones to tape to indicate bits, patterns of square waves are used, including a parity bit. Programs are written twice to tape for error correction; if an error is detected when reading the first recording, the computer corrects it with data from the second. The Datasette has built-in analog-to-digital converters and audio filters to convert the computer's digital data into analog audio and vice versa. Connection to the computer is done via a proprietary edge connector (Commodore 1530) or mini-DIN connector (1531). The absence of recordable audio signals on this interface makes the Datasette and clones the only cassette recorders usable with Commodore computers, until aftermarket converters made the use of ordinary recorders possible.
Because of its digital format the Datasette is both more reliable than other data cassette systems and very slow, transferring data at around per second. After the Datasette's launch, however, special turbo tape software appeared, providing much faster tape operation (loading and saving). Such software was integrated into most commercial prerecorded applications (mostly games), as well as being available separately for loading and saving the users' homemade programs and data. These programs were only widely used in Europe, as the US market had long since moved onto disks.
Datasettes can typically store about per side. The use of turbo tape and other fast loaders increased this number to roughly .
The Datasette has only one connection cable, with a –spacing PCB edge connector at the computer end. All input/output signals to the Datasette are all digital, and so all digital-to-analog conversion, and vice versa, is handled within the unit. Power is also included in this cable. The pinout is ground, , motor, read, write, key-sense. The sense signal monitors the play, rewind, and fast-forward buttons but cannot differentiate between them. A mechanical interlock prevents any two of them from being pressed at the same time. The motor power is derived from the computer's unregulated supply via a transistor circuit.
Encodi |
https://en.wikipedia.org/wiki/Anabaptist%20Association%20of%20Australia%20and%20New%20Zealand | The Anabaptist Association of Australia and New Zealand (AAANZ) is a network of individuals from a variety of Christian denominations in Australia and New Zealand who share a common interest in the Anabaptist tradition.
In 1998 the body was incorporated with about 80 members. The association believes that the enduring legacy of the Anabaptists includes:
baptism upon profession of faith
church membership is voluntary and members are accountable to the Bible (read through the revelation of Jesus) and to each other
commitment to the way of peace and other teachings of Jesus as a rule for life
separation of church and state
worshipping congregations which create authentic community and reach out through vision and service
Annual meetings
1998
1999, Wollongong, New South Wales, Australia
2000
2001, Melbourne, Australia
2003, Sydney, Australia
2005, Canberra, Australia
2007, Perth, Australia
2009, Melbourne, Australia
2011, New Zealand
Notes
External links
Official website
Protestantism in Australia
Protestantism in New Zealand
Christian organizations established in 1998
Anabaptist denominations established in the 20th century |
https://en.wikipedia.org/wiki/FB | FB, Fb, or fb may refer to:
Arts and media
F♭ (musical note)
FB (band), an electronic music collaboration of Benny Benassi and Ferry Corsten
Facebook, a social networking website, also known as FB.com
Meta Platforms, formerly Facebook Inc (Nasdaq: FB), parent company of Facebook
Friendship book, a booklet swapped amongst pen pals
Frostbite (game engine), a video game engine
FB, known as Trucksy in the US, an old green pickup truck from Roary the Racing Car
Science and technology
Computing
Framebuffer, in computer technology
FreeBASIC, a 32-bit compiler using BASIC syntax for DOS, Windows, and Linux
FictionBook, an open XML-based e-book format hailing from Russia
Other uses in science and technology
F B swamp vehicle, a Japanese military vehicle used for crossing difficult swampy terrain
Fast busy, or reorder tone, a type of telephone signal
Feedback, in signaling systems
Femtobarn, a small unit of area used in high energy physics
Fluidized bed, a special technology used in energy, reactor, chemical engineering etc.
Hyundai FB, a series of buses manufactured by Hyundai Motor Company
Foreign body, any object originating outside the body
Sport
Fenerbahçe, a Turkish sports club
Fly ball, a type of batted ball or a pitching stat in baseball
Football
Fullback (American football), a position in American football
Full-back (association football), a position in association football
Other uses
Bulgaria Air (Bulgarian: България еър, IATA code FB), the flag carrier airline of Bulgaria
Firebase or Fire support base, an artillery encampment
Footbridge (fb on some maps), a bridge designed for pedestrians
Fremont Bank, a US based retail and commercial bank
FB "Łucznik" Radom, a Polish defence industry enterprise from Radom that produces firearms
See also
BF (disambiguation) |
https://en.wikipedia.org/wiki/Talk%20Soup | Talk Soup is a television show produced for cable network E! that debuted on January 7, 1991, and aired until August 2002. Talk Soup aired selected clips of the previous day's daily talk shows—ranging from daytime entries like The Jerry Springer Show and to celebrity interview shows like The Tonight Show—surrounded by humorous commentary delivered by the host. Although Talk Soup poked fun at the talk shows, it also advertised the topics and guests of upcoming broadcasts. Despite this, several talk shows, including The Oprah Winfrey Show, refused to allow clips of their shows to be shown on the series. During its run, Talk Soup was nominated for five Daytime Emmy Awards, winning once in 1995 for Outstanding Special Class Program. A show based on it, The Soup, aired from 2004 to 2015.
The show frequently poked fun at actors Randolph Mantooth and Mario Van Peebles. Also featured was a womanizing Argentine sock puppet named Señor Sock that had bought several ThighMasters because he was madly in love with Suzanne Somers.
Hosts
Greg Kinnear (1991–1995)
John Henson (1995–1999)
Hal Sparks (1999–2000)
Aisha Tyler (2001–2002)
The show had number of guest hosts over the years including Roseanne Barr, Brad Garrett, Juliette Lewis, Patrick Warburton, Sarah Silverman, Suzanne Somers, Jon Hamm, Julia Sweeney, Kevin Nealon, Robert McRay, David Brenner, Crow T. Robot, Jennifer Love Hewitt, Jerry Springer, Adam Carolla, Dr. Drew Pinsky, Jimmy Kimmel, Tom Arnold, Roger Lodge, Catherine O'Hara, Teri Garr, David Spade, Donna D'Errico, Richard Lewis, George Hamilton, Wayne Brady, Rolonda Watts, French Stewart, Sally Jessy Raphael, and Kato Kaelin.
Episodes
In 1993, the show was part of an episode of the CBS show 48 Hours with Dan Rather. The program was about the proliferation of talk shows on the TV landscape and featured a behind-the-scenes segment with the Talk Soup staff and host Kinnear.
Later that same year, the show taped a series of shows at the Disney/MGM Studios at Walt Disney World in Orlando, Florida. It was the first time the show was done in front of a live studio audience. During its run at Disney, the show premiered Talk Soup: The Motion Picture. Technically not a feature film but rather a grand trailer, it included Kinnear running in the middle of a crowded Wilshire Boulevard, throwing a staffer off the top of the E! building and being run over by a car in front of E! personality Arthel Neville.
Talk show guests were not the only ones the show skewered. Footage of Sylvester Stallone's mother, Jackie Stallone, eating shrimp at an event covered by E! News was comic fodder for the show.
Celebrities who appeared in sketches and walk-on appearances include Eric Idle, David Duchovny, Danny Aiello, Montel Williams, Adam West, Jonathan Harris, Neil Norman and his Cosmic Orchestra, Florence Henderson, Danny Bonaduce, Phil Hartman, Joan Collins, Billy Barty, George Foreman, Sugar Ray Leonard, Kristi Yamaguchi, Scott Hamilton, Ed Asner, Sherman |
https://en.wikipedia.org/wiki/FreeTTS | FreeTTS is an open source speech synthesis system written entirely in the Java programming language. It is based upon Flite. FreeTTS is an implementation of Sun's Java Speech API.
FreeTTS supports end-of-speech markers. Gnopernicus uses these in a number of places: to know when text should and should not be interrupted, to better concatenate speech, and to sequence speech in different voices. Benchmarks conducted by Sun in 2002 on Solaris showed that FreeTTS ran two to three times faster than Flite at the time.
History
As of June 2019, the newest version of that project originates from April 2017. Intensive development finished in March 2009 with release 1.2.2.
See also
Speech synthesis
Festival
References
Further reading
External links
Free software programmed in Java (programming language)
Free speech synthesis software |
https://en.wikipedia.org/wiki/Super%20VGA | Super VGA (SVGA) is a broad term that covers a wide range of computer display standards that extended IBM's VGA specification.
When used as shorthand for a resolution, as VGA and XGA often are, SVGA refers to a resolution of 800 × 600.
History
In the late 1980s, after the release of IBM's VGA, third-party manufacturers began making graphics cards based on its specifications with extended capabilities. As these cards grew in popularity they began to be referred to as "Super VGA."
This term was not an official standard, but a shorthand for enhanced VGA cards which had become common by 1988. The first cards that explicitly used the term were Genoa Systems's SuperVGA and SuperVGA HiRes in 1987.
Super VGA cards broke compatibility with the IBM VGA standard, requiring software developers to provide specific display drivers and implementations for each card their software could operate on. Initially, the heavy restrictions this placed on software developers slowed the uptake of Super VGA cards, which motivated VESA to produce a unifying standard, the VESA BIOS Extensions (VBE), first introduced in 1989, to provide a common software interface to all cards implementing the VBE specification.
Eventually, Super VGA graphics adapters supported innumerable modes.
Specifications
The Super VGA standardized the following resolutions:
640 × 400 or 640 × 480 with 256 colors
800 × 600 with 24-bit color depth
1024 × 768 with 24-bit color depth
1280 × 1024 with 24-bit color depth
SVGA uses the same DE-15 VGA connector as the original standard, and otherwise operates over the same cabling and interfaces as VGA.
Early manufacturers
Some early Super VGA manufacturers and some of their models, where available:
Ahead Technologies (Not related to Nero AG, formerly Ahead Software)
Amdek: VGA ADAPTER/132 (Tseng Labs chipset)
AST Research, Inc.: VGA Plus (rebranded Paradise)
ATI Technologies: VIP (82C451), VGA Wonder
Chips and Technologies: 82C451
Cirrus Logic: CL-GD410/420
Compaq: VGC Board (Paradise chipset)
Everex
Genoa Systems: Genoa VGA 5100-5400 (ET3000)
Orchid Technology: Designer VGA (ET3000), Pro Designer Plus
Western Digital's Paradise Inc.: VGA Plus (PVGA1), VGA Plus 16, VGA Pro
Sigma Designs: SigmaVGA (ET3000)
STB Systems: VGA Extra/EM (ET3000), V-RAM VGA
Willow Peripherals: VGA-TV/Publisher's, VGA-TV + Genlock
Trident Microsystems: TVGA8800, TVGA8900, and TVGA9000 series
Gallery
References
Computer display standards
VESA |
https://en.wikipedia.org/wiki/List%20of%20educational%20programming%20languages | An educational programming language is a programming language that is designed mostly as an instrument for learning, and less as a tool for writing programs to perform work.
Types of educational programming languages
Assembly languages
Originally, machine code was the first and only way to program computers. Assembly language was the next type of language used; thus, is one of the oldest families of computer languages in use today. Many dialects and implementations are available, usually some for each computer processor architecture. It is very basic and termed a low-level programming language. It is one of the more difficult languages to work with being untyped and rigid. Several simplified dialects exist for education.
Low-level languages must be written for a specific processor architecture and cannot be written or taught in isolation without referencing the processor for which it was written. Unlike higher-level languages, using an educational assembly language needs a representation of a processor, whether virtualized or physical. Assembly is the most helpful language to use for learning about fundamental computer processor operation.
Little Man Computer (LMC) is an instructional model of a simple von Neumann architecture computer with all the basic features of modern computers. It can be programmed in machine code (usually decimal) or assembly. It is based on the concept of having a little man locked in a small room. At one end of the room are 100 mailboxes as memory; each can hold a three-digit instruction or data. At the other end of the room are two mailboxes labeled INBOX and OUTBOX which receive and emit data. In the middle of the room is a work area with a simple two-function (add and subtract) calculator called the Accumulator and a resettable counter called the Program Counter. The counter is similar to what a doorperson uses to count how many people have entered a facility; it can count up 1 or can be reset to 0. As specified by the von Neumann architecture, memory holds both instructions and data. The user loads data into the mailboxes and then signals the little man to begin executing.
Next Byte Codes (NBC) is a simple language with assembly language syntax that is used to program Lego Mindstorms NXT programmable bricks. The command line compiler emits NXT-compatible machine code and supports Windows, Mac OS X and Linux.
Little Computer 3 (LC-3), is an assembly language with a simplified instruction set, but can be used to write moderately complex assembly programs and is a theoretically viable target for C compilers. It is simpler than x86 assembly but has many features similar to those in more complex languages. These features make it useful for teaching basic programming and computer architecture to beginning college computer science, and computer engineering students, which is its most common use.
DLX is a reduced instruction set computer (RISC) processor architecture by the main designers of the MIPS and the Berkeley |
https://en.wikipedia.org/wiki/Alliant%20Computer%20Systems | Alliant Computer Systems Corporation was a computer company that designed and manufactured parallel computing systems. Together with Pyramid Technology and Sequent Computer Systems, Alliant's machines pioneered the symmetric multiprocessing market. One of the more successful companies in the group, over 650 Alliant systems were produced over their lifetime. The company was hit by a series of financial problems and went bankrupt in 1992.
History
1980s
Alliant was founded, as Dataflow Systems, in May 1982 by Ron Gruner, Craig Mundie and Rich McAndrew to produce machines for scientific and engineering users who needed smaller, less costly machines than offerings from Cray Computer and similar high-end vendors. Machines that addressed this market segment later became known as minisupercomputers. At the time there was a huge gap on the price/performance curve as a highly configured VAX 11/780 had a performance of about a MIP and MegaFLOP for around $1M USD and a Cray-1S or Cray 1M over $10M USD.
Alliant's first machines were announced in 1985, starting with the FX series. The FX series consisted of four types of 18" x 18" boards: Computational Elements, or CEs, System Cache, Interactive Processor (IP) Cache, and Memory Modules. Each board plugged into a backplane using a special high density connector. The caches and memory modules all communicated with each other over a 2 x 64 bit bus called the DMB (Dataflow Memory Bus). The backplane was an active backplane and it contained an 8 x 4 crossbar switch (FX/8) that allowed any CE to connect to one of four cache ports, two on each System Cache. Total cache bandwidth was 376 MB/s.
The CEs included a set of Weitek 1064/1065 FPU's and several custom designed support chips to implement a custom vector processor. The scalar instruction set was based upon the popular Motorola 68000 architecture. The floating point instruction set, vector instruction set, and concurrency instruction set were all custom co-processor instruction sets designed by Alliant. The shared system cache and a special concurrency bus implemented low latency concurrency control that could be exploited automatically by high level language compilers to provide data-parallel processing among the CEs. The scalar instruction cycle time for the original CE was 170 ns, the vector processor was twice as fast as the scalar processor with a cycle time of 85 ns.
Each IP Cache had three ports that connected via ribbon cables to Interactive Processors, IPs, which used Motorola 68012's and, subsequently Motorola 68020's and then Motorola 68030's with 4 MB of local RAM in a Multibus form factor plugged into a 13 slot Multibus chassis.
Memory modules were 8 MB each and four way interleaved with ECC. Read bandwidth was 188 MB/s.
Like many early multiprocessing systems, the FX series ran a version of 4.2 BSD Unix on the IPs and CEs, known as Concentrix which initially added multiprocessor support and new VM and IO sub-systems. Subsequent releases adde |
https://en.wikipedia.org/wiki/Gab | Gab or GAB may refer to:
Gáb, a cuneiform sign
Gab (social network), an American social networking platform
"Gab" (song), an Occitan boasting song of the Middle Ages
Gab, Iran, a village in Hormozgan Province
Games and Amusements Board, a Philippine sports and gambling regulatory government agency
Georgia Academy for the Blind
German American Bund, a German-American pro-Nazi organization (1936–1941)
Government Accountability Board, a defunct (since 2016) Wisconsin political regulatory institution
The Great American Bash, a professional wrestling event
Great Artesian Basin, in Australia
Great Australian Bight, an open bay
Greater Atlantic Bank, a defunct American community bank
See also
Gabb (disambiguation)
Gabs (disambiguation) |
https://en.wikipedia.org/wiki/Adder%20%28electronics%29 | An adder, or summer, is a digital circuit that performs addition of numbers. In many computers and other kinds of processors adders are used in the arithmetic logic units (ALUs). They are also used in other parts of the processor, where they are used to calculate addresses, table indices, increment and decrement operators and similar operations.
Although adders can be constructed for many number representations, such as binary-coded decimal or excess-3, the most common adders operate on binary numbers.
In cases where two's complement or ones' complement is being used to represent negative numbers, it is trivial to modify an adder into an adder–subtractor.
Other signed number representations require more logic around the basic adder.
History
In 1937, Claude Shannon demonstrated binary addition in his graduate thesis at MIT.
Binary adders
Half adder
The half adder adds two single binary digits and . It has two outputs, sum () and carry (). The carry signal represents an overflow into the next digit of a multi-digit addition. The value of the sum is . The simplest half-adder design, pictured on the right, incorporates an XOR gate for and an AND gate for . The Boolean logic for the sum (in this case ) will be whereas for the carry () will be . With the addition of an OR gate to combine their carry outputs, two half adders can be combined to make a full adder. The half adder adds two input bits and generates a carry and sum, which are the two outputs of a half adder. The input variables of a half adder are called the augend and addend bits. The output variables are the sum and carry.
The truth table for the half adder is:
{| class="wikitable" style="text-align:center"
|-
! colspan="2"| Inputs || colspan="2"| Outputs
|- style="background:#def; text-align:center;"
| A || B || Cout || S
|- style="background:#dfd; text-align:center;"
| 0 || 0 || 0 || 0
|- style="background:#dfd; text-align:center;"
| 0 || 1 || 0 || 1
|- style="background:#dfd; text-align:center;"
| 1 || 0 || 0 || 1
|- style="background:#dfd; text-align:center;"
| 1 || 1 || 1 || 0
|-
|}
Various half adder digital logic circuits:
Full adder
A full adder adds binary numbers and accounts for values carried in as well as out. A one-bit full-adder adds three one-bit numbers, often written as , , and ; and are the operands, and is a bit carried in from the previous less-significant stage. The full adder is usually a component in a cascade of adders, which add 8, 16, 32, etc. bit binary numbers. The circuit produces a two-bit output. Output carry and sum are typically represented by the signals and , where the sum equals .
A full adder can be implemented in many different ways such as with a custom transistor-level circuit or composed of other gates. The most common implementation is with:
The above expressions for and can be derived from using a Karnaugh map to simplify the truth table.
In this implementation, the final OR gate before the carry-out output may be replaced |
https://en.wikipedia.org/wiki/Global%20Ecovillage%20Network | The Global Ecovillage Network (GEN) is a global association of people and communities (ecovillages) dedicated to living "sustainable plus" lives by restoring the land and adding more to the environment than is taken. Network members share ideas and information, transfer technologies and develop cultural and educational exchanges.
History
Hildur and Ross Jackson from Denmark established the Gaia Trust, a charitable foundation, in 1991. Gaia funded a study by Robert Gilman and Diane Gilman of sustainable communities around the world. The report, Ecovillages and Sustainable Communities, was released in 1991. The report found that although there were many interesting ecovillage projects, the full-scale ideal ecovillage did not yet exist. Collectively, however, the various projects described a vision of a different culture and lifestyle that could be further developed.
In 1991 the Gaia Trust convened a meeting in Denmark of representatives of eco-communities to discuss strategies for further developing the ecovillage concept. That led to the formation of the Global Ecovillage Network. In 1994 the Ecovillage Information Service was launched. In 1995, the first international conference of ecovillage members, entitled Ecovillages and Sustainable Communities for the 21st Century was held at Findhorn, Scotland. The movement grew rapidly following this conference.
By 2001, GEN had obtained consultative status at the United Nations Economic and Social Council (ECOSOC). In October 2005, at the conference to celebrate the tenth anniversary of GEN, a group of young adults joined to found NextGEN (the Next Generation of the Global Ecovillage Network). GEN does not have a verification procedure to select ecovillages or member subscriptions on its website. A Community Sustainability Assessment Tool has been developed that provides a means to assess how successful a particular ecovillage is at improving its sustainability.
Members
The network includes a variety of types of sustainable settlements and ecovillages:
Eco towns, such as Auroville in South India and the Federation of Damanhur in Italy;
rural ecovillages, such as Gaia Asociación in Argentina and Huehuecoyotl, in Mexico;
permaculture sites, including Crystal Waters, Queensland, Australia, Cochabamba, Bolivia and Barus, Brazil;
urban rejuvenation projects, such as Los Angeles EcoVillage and Christiania in Copenhagen, and
educational centers, such as Findhorn Foundation in Scotland, the Centre for Alternative Technology in Wales, and the Ecovillage Training Center in Tennessee.
Aim
The Global Ecovillage Network's aim is "to support and encourage the evolution of sustainable settlements across the world." The network does this through:
Internal and external communications services; facilitating the flow and exchange of information about ecovillages and demonstration sites;
Networking and project coordination in fields related to sustainable settlements, and
Global cooperation/partnerships (UN Best Pra |
https://en.wikipedia.org/wiki/TV4 | TV4 or TV 4 may refer to:
TV4 (Poland), a private Polish television station
TV4 (Sweden), a Swedish television network
TV4 Group, owners of the Swedish television station
South African Broadcasting Corporation TV4, a channel operated by the state-owned broadcaster
Four (New Zealand TV channel), a defunct New Zealand television channel formerly named TV4
Television 4, a digital advertorial datacasting service
Vision Four, a cable television channel in Malaysia
TV 4 (Estonia)
TV-4, former name of Turkmenistan (TV channel)
TV4 (Guanajuato), the state network of the Mexican state of Guanajuato
See also
Channel 4 (disambiguation)
C4 (disambiguation) |
https://en.wikipedia.org/wiki/ZTV%20%28Sweden%29 | ZTV was a Swedish television channel owned by Viasat. Launched in February 1991, as a daily afternoon show on TV3 and TV4, it became a channel of its own on Swedish cable networks in May 1992. The intention was to create a Swedish version of MTV and thus the focus was primarily on music, but also had their own comedy-oriented shows, skate and prank related shows and aired various tv shows and movies. Since May 2006, most of its programming composed of music videos. ZTV's last day was August 1, 2010 for all customers except for Boxer and Com Hem, who continued to distribute the channel indefinitely in a limited version. MTG's new sports channel TV10 took over the transmissions of other operators.
History
ZTV was initially also a combined radio station called Z-Radio. The sound from the television programme went out also in radio through a number of community radio frequencies around the country. ZTV began broadcasting on their own channel position in 1992 and was owned by MTG, who also owned TV3 (Sweden) and TV6 (Sweden). Aside from music videos the channel featured many shows produced in Sweden. Although they were low budget they also featured new ideas and many of them received cult status. Most of the presenters went on to become stars on the major networks with ZTV being viewed as a breeding ground for new talent.
For a few years, there was a Danish ZTV, but it eventually merged with Danish TV6 to form TV3+ and was closed down in 1996. There were also plans to merge the Swedish ZTV with the Swedish TV6, but this never materialised.
As the years went on, ZTV moved from Stockholm to London and started broadcasting US imports such as The Late Show with David Letterman and The Simpsons. ZTV started broadcasting 24 hours a day in 2000. In 2002, a Norwegian version of ZTV launched, ZTV Norway.
September 2004 marked a significant change in style for the channel. Instead of being a youth channel, ZTV would now target men. As a result, most of the in-house ZTV shows were cancelled and replaced by Champions League football and wrestling.
In May 2006, MTG started a new channel called TV6. This channel took over most of the programming from ZTV, as well as its frequencies in the cable networks. This meant that ZTV would only broadcast music videos and lost all of its distribution.
In late 2007, ZTV started to broadcast various anime series such as Berserk, Black Lagoon, Ergo Proxy, Fullmetal Alchemist, Gungrave, Naruto, Ninja Scroll, Paranoia Agent, and Samurai Champloo.
There was also a Z magazine available for some time.
Productions
See also
TV3
TV8
TV1000
Modern Times Group
List of Swedish television channels
References
External links
ZTV Sweden
Defunct television channels in Sweden
Television channels and stations established in 1992
ZTV Sweden
1992 establishments in Sweden
2010 disestablishments in Sweden
Television channels and stations disestablished in 2010 |
https://en.wikipedia.org/wiki/ARS-based%20programming | ARS-based programming is built on three principles: abstraction, reference and synthesis. These principles can be seen as a generalized form of the basic operations of the Lambda calculus. All essential features of a programming language can be derived from ARS, even the three major programming paradigms: functional programming, object-oriented programming and imperative programming.
The programming language A++ is a demonstration that, based on ARS, programming patterns can be developed that are very powerful, providing a solid base for solving common programming problems.
ARS-based programming as covered in the book Programmierung pur (Undiluted Programming or Barebones Programming) published in German under the (the English rights are available now) is facilitated by three tools: A++, ARS++, and ARSAPI.
A++, a minimal programming language with interpreter for basic training enforcing rigorous confrontation with the essentials of programming;
ARS++, a full blown programming language including a virtual machine and compiler, extending A++ into a language that is fully ars-compatible with a functionality going beyond that of Scheme with the power of coping with the challenges of real world programming;
ARSAPI, a bridge between ARS and popular programming languages like Java, C and C++, consisting of definitions and patterns recommended to express ARS in the target language.
See also
Educational programming language
External links
ARS Based Programming: Fundamental And Without Limits, further information on ARS.
Programming paradigms |
https://en.wikipedia.org/wiki/Service%20Location%20Protocol | The Service Location Protocol (SLP, srvloc) is a service discovery protocol that allows computers and other devices to find services in a local area network without prior configuration. SLP has been designed to scale from small, unmanaged networks to large enterprise networks. It has been defined in RFC 2608 and RFC 3224 as standards track document.
Overview
SLP is used by devices to announce services on a local network. Each service must have a URL that is used to locate the service. Additionally it may have an unlimited number of name/value pairs, called attributes. Each device must always be in one or more scopes. Scopes are simple strings and are used to group services, comparable to the network neighborhood in other systems. A device cannot see services that are in different scopes.
The URL of a printer could look like:
service:printer:lpr://myprinter/myqueue
This URL describes a queue called "myqueue" on a printer with the host name "myprinter". The protocol used by the printer is LPR. Note that a special URL scheme "service:" is used by the printer. "service:" URLs are not required: any URL scheme can be used, but they allow you to search for all services of the same type (e.g. all printers) regardless of the protocol that they use. The first three components of the "service:" URL type ("service:printer:lpr") are also called service type. The first two components ("service:printer") are called abstract service type. In a non-"service:" URL the schema name is the service type (for instance "http" in "http://www.wikipedia.org").
The attributes of the printer could look like:
(printer-name=Hugo),
(printer-natural-language-configured=en-us),
(printer-location=In my home office),
(printer-document-format-supported=application/postscript),
(printer-color-supported=false),
(printer-compression-supported=deflate, gzip)
The example uses the standard syntax for attributes in SLP, only newlines have been added to improve readability.
The definition of a "service:" URL and the allowed attributes for the URL are specified by a service template, a formalized description of the URL syntax and the attributes. Service templates are defined in RFC 2609.
SLP allows several query types to locate services and obtain information about them:
It can search for all services with the same service type or abstract service type
The query can be combined with a query for attributes, using LDAP's query language.
Given its URL, the attributes of a service can be requested. In standard SLP the attributes are not returned in the query result and must be fetched separately. The Attribute List Extension (RFC 3059) fixes this problem.
A list of all service types can be obtained
A list of all existing scopes can be requested.
Roles
SLP has three different roles for devices. A device can also have two or all three roles at the same time.
User Agents (UA) are devices that search for services
Service Agents (SA) are devices that announce one or more serv |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.