source
stringlengths
32
199
text
stringlengths
26
3k
https://en.wikipedia.org/wiki/Valis%20II
is a 1989 action-platform video game originally developed by Laser Soft, published by Telenet Japan and NEC for the PC Engine CD-ROM²/TurboGrafx-CD. A home computer version was released for PC-8801, MSX2, PC-9801 and X68000. A super deformed-style remake was also released in 1992 for the Sega Mega Drive/Genesis. It is the second entry in the eponymous series. It stars Yuko Asou, a Japanese schoolgirl teenager chosen to become the Valis warrior by wielding the titular mystical sword, after defeating the demon lord Rogles. The dream world Vecanti fell under the rule of emperor Megas, whose hatred towards his brother Rogles and bloodthirsty tendencies seeks to wipe out traces of the former tyrant, including his supporters. Gameplay varies between each version but all share similar elements, as the player explores and search for items and power-ups, while fighting enemies and defeat bosses. Work on Valis II did not start for a period of two and a half years, as the team became understaffed when several members had left after Valis: The Fantasm Soldier. Telenet began shifting their focus in order to establish themselves in the LaserDisc market when the development moved toward. It was the first title created by Laser Soft, an internal gaming division of Telenet formed specifically to explore games for the CD-ROM format, and they also cooperated with Renovation Game (Reno), which handled the home computer version. The staff hired animators for the project, as people within the anime industry were becoming interested in the video game industry. Both the TurboGrafx-CD and computer versions were made simultaneously, but each under different development lines. The Genesis remake was slated for a European release by UbiSoft, as part of a multi-game licensing deal with Telenet's North American subsidiary Renovation Products, but it was never officially released in the region. Each version of the game have since been re-released through download services for other platforms and compilations. Valis II on the TurboGrafx-CD garnered generally favorable reception from critics since its initial launch, some of which reviewed it as an import title; praise was given to the audiovisual presentation for showcasing the potential of the CD-ROM format, but others felt mixed regarding various aspects. The home computer version carried sentiments similar to the original release, with some reviewers noting the overall dark tone of its plot. The Mega Drive/Genesis remake, however, received negative response from the gaming press. It was followed by Valis III (1990). Gameplay and premise As with its predecessor, Valis II is an action-platform game starring Yuko Asou, a Japanese schoolgirl teenager chosen to become the Valis warrior by wielding the titular mystical sword. It takes place after the defeat of demon lord Rogles at the hand of Yuko. Time passes, however, the dream world Vecanti fell under the rule of emperor Megas, whose hatred towards his brother Rogles seeks
https://en.wikipedia.org/wiki/Thames%20Valley%20Tonight
Thames Valley Tonight was a regional news programme broadcast to part of the ITV Network in the Thames Valley area of southern England. The Thames Valley news region was launched on Monday 4 December 2006 and ceased to exist on 8 February 2009. Like all regional news programmes on ITV1 in England and Wales and ITV Channel Television, it used the generic ITV font and idents. History The region was created by a merger between Meridian West and Central South's regional news services, and broadcast to the Meridian West sub-region from the Hannington transmitter, and the Central South sub-region from the Oxford transmitter. The Thames Valley operation covered Berkshire, Buckinghamshire (west including Aylesbury), Hampshire (north of and including Winchester), Oxfordshire, Surrey (west and including Camberley) and Wiltshire (east and including Swindon). In all the population of the patch was around 3 million people. The main presenters were Mary Green and Wesley Smith (with Hannah Shellswell co-presenting with Smith on Fridays). Chris Maughan, Victoria Bennett and David Reilly presented the Sports News, either in the studio or from the newsroom. While the newsgathering arm of the operation was based at the old Central South location at Abingdon in Oxfordshire, the presentation studio (formerly used for Meridian West) was based at Meridian's headquarters in Whiteley, Hampshire. Bureaux offices were located at Swindon, Reading and Westminster. The view projected on to the screen behind the newsreaders was of the Oracle Shopping Centre in Reading, chosen presumably as the town lay in the heart of the new region – previously it sat in an overlap of the now replaced Central South and Meridian West sub-regions – therefore avoiding accusations of favouritism towards one side or the other. In just over two years on air, Thames Valley Tonight won a number of awards, including the RTS Southern Centre 'Programme of the Year' Award in 2007 for coverage of the summer floods and the 2008 EDF News Programme of the Year Award for its coverage of the opening of Terminal 5 at Heathrow Airport. Merger On 12 September 2007, it was reported that ITV plc boss Michael Grade wanted to cut down its number of regional newsrooms from seventeen to nine by merging some services, which could save between £35m and £40m per year. This would involve combining the Meridian and Thames Valley regions. In the Thames Valley, the merger would signal the end of Thames Valley Tonight/Thames Valley Today and would be replaced by a pan-regional edition of Meridian Tonight. The current Thames Valley region would be merged with the Meridian South sub-region for opt-outs within the main weekday programme, a late night bulletin and localised weather forecasts. Robin Britton, previously Head of News for ITV Thames Valley and Regional Editor for Meridian West, was subsequently appointed Head of News for the new operation. The final main edition of Thames Valley Tonight was broadcast on Friday
https://en.wikipedia.org/wiki/Spectrum%20News%20in%20Kansas%20City
Spectrum News in Kansas City is an American regional sports and news cable and satellite television network owned by Charter Communications. The channel mainly serves the Kansas City metropolitan area; Lawrence, Kansas; and the state of Nebraska. In addition to being carried on Charter Spectrum systems in the Kansas City area, it is currently available on cable providers such as Comcast and MIDCO in metropolitan Kansas City, Lawrence, and areas of Nebraska. Background Metro Sports: 1996-2013 The channel was launched on December 12, 1996 as Metro Sports, and was founded by Time Warner Cable. It has produced live sporting events for collegiate athletic conferences such as the Big 12 Conference, Missouri Valley Conference, the Summit League, the National Association of Intercollegiate Athletics (NAIA) and their individual members. The channel's other hallmark programming is its coverage of local Kansas City high school athletics, including its "HyVee High School Game of The Week" featuring top local teams in football, basketball, wrestling, volleyball, baseball, soccer and other sports. Metro Sports also broadcast five games of the Missouri Mavericks of the Central Hockey League during the 2010-2011 Central Hockey League season. In March 2009, Metro Sports produced and televised live all 31 games of the 2009 NAIA Division I men's basketball tournament, which was held in Kansas City, Missouri. Metro Sports formerly produced live sporting events for professional sports teams such as Major League Soccer's Kansas City Wizards (including a Spanish language audio simulcast transmitted over a secondary audio program channel during its final two seasons of coverage, before the Wizards declined to renew their broadcasting contract), and the Kansas City Brigade of the Arena Football League, before the league was liquidated and reincarnated. Metro Sports also produced and televised Kansas City Royals games from 2003 to 2007, after which it lost the rights to FSN Midwest. Metro Sports has published a book, More Than The Score: Kansas City Sports Memories. On March 1, 2010, Metro Sports launched Metro Sports HD, a high definition simulcast feed of Metro Sports, and a secondary channel, Metro Sports 2. Time Warner Cable SportsChannel: 2013-2016 In September 2013, the channel was renamed as the Time Warner Cable SportsChannel, with its spin-off channel becoming known as Time Warner Cable SportsChannel 2; at that time, it adopted a logo similar to that implemented by Time Warner Cable SportsNet in Los Angeles when it launched the year prior. Spectrum Sports Kansas City: 2016-2023 Following the provider's acquisition of Time Warner Cable in May 2016, the Time Warner Cable SportsChannel services were rebranded under the Spectrum Sports banner in September 2016, as part of Charter's phaseout of the TWC brand. The channel's weekly fantasy football program Fantasy Huddle is also distributed to other Charter Spectrum systems formerly operated by Time Warner Ca
https://en.wikipedia.org/wiki/Everest%20Ascent
Everest Ascent is a text and graphics adventure game for the ZX Spectrum and Commodore 64 computers. It was published by Richard Shepherd Software in 1984. The goal is to reach the top of Mount Everest in 20 days. Players must allocate their limited funds to keep their sherpas well fed and supplied in order to reach the summit. References External links 1983 video games Adventure games Commodore 64 games Mount Everest in fiction Richard Shepherd Software games Single-player video games Video games developed in the United Kingdom ZX Spectrum games
https://en.wikipedia.org/wiki/KANG-LD
KANG-LD (channel 31) is a low-power television station in San Angelo, Texas, United States, affiliated with the Spanish-language UniMás network. It is owned by Entravision Communications alongside Univision affiliate KEUS-LD (channel 41). Through a channel sharing agreement, the two stations transmit using KEUS-LD's spectrum from an antenna on North Bryant Boulevard in San Angelo. Subchannel References External links UniMás network affiliates ANG-LP Television channels and stations established in 1992 1992 establishments in Texas Entravision Communications stations ANG
https://en.wikipedia.org/wiki/Purdue%20Research%20Park
The Purdue Research Parks are a network of four research parks located in Indiana, United States. The flagship West Lafayette park is located less than north of Purdue University's West Lafayette campus, and is the largest university-affiliated research park in the United States. The other facilities are located in Merrillville, Indianapolis, and New Albany. The parks were developed by the Purdue Research Foundation. Under development since the late 1990s, the Purdue Research Parks are now home to nearly 200 companies encompassing numerous industries and fields of study, including biology, materials science, and information science, among others. Purdue University and Purdue Research Foundation operate business incubation programs to assist organizations in the process of commercializing innovative technologies. It represents the largest cluster of "technology-based companies" in Indiana. Economic impact Purdue Research Park has been used as an example of the positive "impact of scientific research" on local economies, specifically through citation of a report which detailed a positive financial impact of per annum for the state of Indiana and a positive jobs impact through creation of 4000 jobs. Locations The network of four research park locations are referred to as Purdue Research Park of West Lafayette, Purdue Research Park of Indianapolis, Purdue Research Park of Northwest Indiana (Merrillville) and Purdue Research Park of Southeast Indiana (New Albany). West Lafayette The West Lafayette location was Indiana's "first designated certified technology park", a 725 acre (2.93 km2) site employing more than 3000 people . As the largest university-affiliated, high-tech park in the United States, the West Lafayette Purdue Research Park is made up more than 50 distinct buildings. Key buildings include: Incubation facilities Business and Technology Center Purdue Technology Center Herman and Heddy Kurz Purdue Technology Center Graduation facilities International Technology Center Lakeview Technology Center Pritsker Building Ross Enterprise Center Vistech 1 Other affiliated facilities The Chao Center for Industrial Pharmacy & Contract Manufacturing Broadband Antenna Tracking Systems Resident companies Arxan Technologies, Inc. Akina, Inc. Butler America Aerospace & Defense The Chao Center for Industrial Pharmacy & Contract Manufacturing Cook Biotech, Inc. CoVideo C-SPAN Archives Delphi E&S - Verification Lab Dow AgroSciences Endocyte Endocyte, a pharmaceutical company, is developing EC145 (Vintafolide), a candidate drug for use in chemotherapy-resistant patients with non-small-cell lung cancer. EC145 has undergone a Phase II clinical trial. FLIR Systems Inc. Imaginestics LLC Cook MED Institute Perfinity Biosciences Simulex Inc. Spensa Technologies (DTN) Northwest Indiana In 2013, the data management company Intercontinental Industries (operating as interLink) took up residence at the Northwest Indiana location. References
https://en.wikipedia.org/wiki/Igor%20%28film%29
Igor is a 2008 computer-animated horror comedy film directed by Tony Leondis from a screenplay by Chris McKenna. Igor, developed and produced by Max Howard with the California-based Exodus Film Group, was the first feature-length animated film to be financed with private equity. The animation was completed at France's Sparx Animation Studios and a facility in Vietnam. It was distributed in North America by MGM Distribution Co. and internationally by The Weinstein Company. It is MGM's first fully computer-animated film as well as the studio's first fully animated film in twelve years following 1996's All Dogs Go to Heaven 2. Igor features the voices of John Cusack, Steve Buscemi, Sean Hayes, Jay Leno, Eddie Izzard, Jennifer Coolidge, Arsenio Hall, John Cleese, Molly Shannon, and Christian Slater. Conceived by McKenna as a twisting of evil scientist film tropes, Igor features Cusack as the titular Igor, who lives in the kingdom of Malaria where others of his kind serve as assistants to evil scientists. In trying to achieve his dream to become an evil scientist, Igor accidentally creates a sweet female monster named Eva. Igor's first teaser trailer premiered at the 2008 New York Comic Con before being released online on May 7, 2008. Promoted with a video game, toys, books, comic books, and fast-food tie-ins, Igor premiered at the Grauman's Chinese Theatre on September 13, 2008, before starting its American nationwide theatrical run five days later. The film received mixed reviews from film critics and grossed $30.7 million worldwide on a $25 million budget. Igor garnered a cult following and received an Annie Award nomination for Valérie Hadida's character design. Plot The Kingdom of Malaria was once a peaceful land of farmers, until its environment was devastated by a mysterious storm that never ended and killed all of its crops, thus driving its inhabitants into poverty. In response, Malaria's ruler, King Malbert, initiates a plan to save the country by having the kingdom's best and most wicked scientists create various doomsday devices and blackmail the rest of the world into paying them by threatening to unleash these devices upon the world. As a result, Malaria becomes a dark country where evil reigns supreme. There is also an annual Evil Science Fair that takes place in an arena known as the Kiliseum, where the inventions fight one another while being broadcast to the rest of the planet. The scientists responsible for these inventions are treated as celebrities, while citizens with hunchbacks are treated as second-class, usually referred to by the derogatory name "Igor" and are often employed as lowly servants for these scientists. One Igor, however, is a talented inventor and aspires to be an evil scientist himself. Among his inventions are his friends Scamper, an immortal, nihilistic and suicidal rabbit, and Brain, an unintelligent robot with a human brain transplanted into a life support jar. Unfortunately, he must keep his talent a se
https://en.wikipedia.org/wiki/Mystery%20Diagnosis
Mystery Diagnosis is a television docudrama series that aired on Discovery Health Channel and OWN: Oprah Winfrey Network. Each episode focuses on two or more individuals who have struggled with obscure medical ailments, and their quest for a diagnosis. The program details the patients' and doctors' difficulty in pinpointing a diagnosis; often due to nonspecific symptoms, masquerading syndromes, the rarity of the condition or disease, or the patient's case being an unusual manifestation of said condition or disease. The series debuted on Discovery Health Channel in 2005, and was continued when the Oprah Winfrey Network replaced Discovery Health on January 1, 2011. The last season premiered January 5, 2011. Description Each episode tells the stories of two patients who experienced difficult to diagnose medical conditions. Each segment generally begins with a short description of the patient's life before they fell ill (or in the case of a young child, the parents' life before the child was born). The symptoms that the person experienced are described from their onset, usually becoming progressively worse; the progression is often re-enacted by actors while the original patient narrates. The show chronicles the patient's visits from doctor to doctor, where they may receive misdiagnoses or be told that the doctors have found nothing wrong. After continuing to experience symptoms for an extended period of time, the person discovers a doctor who is able to solve their case. The doctor reviews the patient's medical records, notices a symptom that his or her colleagues overlooked, performing tests, and finally reaching the correct diagnosis and giving the proper treatment. This is followed by a brief explanation of why the disorder was so difficult to diagnose, and a description of what the person's life is like today. Usually, the patient is still alive. Some have died after the episode was taped or aired, and only one has died before the diagnosis (though his afflicted brother survived). The series has no regular cast except for its narrator, David Guion (2005–2009) and David Scott (2009–2011), who describes the patients' lives and the destruction their illnesses bring. The patients along with their friends and family help to narrate their stories. While the majority of the conditions examined in the series are unusual or rare conditions (such as cryoglobulinemia) or genetic disorders, well-known conditions such as epilepsy, Myasthenia gravis, Alpha 1-antitrypsin deficiency, heart disease, Crohn's disease, pulmonary hypertension, Lyme disease, endocarditis and cancer have featured on the show. A significant number of episodes revolve around autoimmune disorders, ranging from Pyoderma gangrenosum to Paraneoplastic cerebellar degeneration. Episodes Other activities In 2009, Mystery Diagnosis was named the program partner in organizing Rare Disease Day, an observance intended to raise awareness of rare diseases among the general public and policy-ma
https://en.wikipedia.org/wiki/Sam%20Mac
Sam "Sam Mac" McMillan is an Australian television host, weather presenter, and entertainer. He was a 2019 Gold Logie Nominee and is currently the weather presenter on Seven Network's breakfast show Sunrise. Career TV In 2010, Sam became a regular contributor to Network 10's 7pm Project (now The Project). On the show McMillan has been a field reporter, segment host and fill-in co-host. In July 2019, he featured on The Project's 10-year anniversary special. In 2016, Mac began narrating the Seven Network series First Dates, and began hosting Best Bits. In January 2016, Sam was appointed the new weather presenter on Sunrise replacing Edwina Bartholomew - where he has remained ever since. Mac is known for his unique style of presentation. A combination of self-deprecating humour and unpredictable stunts have seen him successfully stamp his creativity on the position. Notable achievements in the role include re-releasing "Strawberry Kisses" with Nikki Webster, launching his cat Coco's modelling career with the release of "Pussweek" magazine, and in 2018 completing an Australia A-Z trip of towns around the nation. In June 2019, Sam was announced as a Gold Logie Nominee, an award for the most popular presenter on Australian Television. The eventual winner was comedian Tom Gleeson. Sam arrived at the ceremony on the Gold Coast wearing a green velvet suit riding a portable throne and accompanied by his mum Loretta and rescue cat Coco. In 2018, Mac was one of eight male celebrities to bare all for The Real Full Monty, a prime time special on the Seven Network. The message behind the show was to encourage men to visit a doctor and pay better attention to their health. Sam's personal connection to the show was focused on mental health. The celebrities including Shane Jacobson, Jett Kenny and Kris Smith performed a stripping routine at Sydney's Enmore Theatre in front of more than 1,000 fans. The show was a critical and ratings success. McMillan has also produced two seasons of Sam Mac's Single Bed, a low-budget comedy/variety television show hosted from Sam's actual apartment in front of a small audience in his kitchen, which aired on Channel 31 and Foxtel on Aurora Community Television. McMillan also has his own YouTube series titled 'Lights, Camera, Maction!'. A comedy series that contains guests such as Andy Lee, Charlie Pickering, Dave Hughes, Peter Helliar, Tom Ballard, Bondi Vet and others. In January 2023, Seven Network announced that Mac will replace Matt Shirvington as host of the show Sydney Weekender. Shirvington will concentrate on his growing Seven News and Seven Sport commitments. Radio After starting at local Adelaide radio station, Fresh 92.7, McMillan scored a job doing swing announcing on SAFM and Triple M Adelaide. In December 2002, Sam began hosting the evening shift on SAFM. In April 2003, McMillan was moved to hosting afternoons on SAFM. Triple M Adelaide changed from Classic Hits to a CHR/Pop radio format in November 2003.
https://en.wikipedia.org/wiki/Robert%20Wilonsky
Robert Elliott Wilonsky (born October 24, 1968) is an American journalist, and the former host of Higher Definition, an interview program on the cable television network HDNet. Biography Early life Wilonsky was born in Dallas, Texas to Margaret and Herschel Wilonsky. Wilonsky graduated from Thomas Jefferson High School, where he was an avid swimmer and cheerleader and graduated from the University of Texas at Austin in 1990. During his senior year he was the managing editor of The Daily Texan. Career After graduation, Wilonsky was hired by the Dallas Times-Herald but moved to the Dallas Observer after the former ceased publication in 1991. He worked one year with the Los Angeles New Times. Wilonsky served as feature writer, music editor, film critic, sports columnist, and pop culture editor for the Observer. In March 2006, he supervised the launching of the paper's weblog, Unfair Park, which he edits. He has also been published in Salon and American Way, and has appeared as a guest critic on At the Movies with Ebert & Roeper. In 2003, Wilonsky was hired as the host of HDNet's new talk show, Higher Definition. The half-hour program initially had him engage in recreational activities with the guests while interviewing them about the impact of high-definition video on entertainment. However, the show has since adopted a conventional sit-down format. He is the former host of The Ultimate Trailer Show on HDNet. Wilonsky has been a frequent guest on The Hardline, an afternoon show on KTCK, contributing pop culture analysis and commentary. In March 2012, Wilonsky left the Dallas Observer to oversee the website for The Dallas Morning News. He served as city columnist until March 2020 when he left to become the Communications Director at Heritage Auctions. Wilonsky also hosts Intentional Grounding on KTCK Sports Radio 1310 AM and 96.7 FM The Ticket, as well as Big Bob's Christmas Spectacular each Christmas Eve on same said station. References External links The Dallas Observer Unfair Park 1968 births American film critics Jewish American journalists American male journalists Living people Journalists from Dallas University of Texas at Austin alumni The Dallas Morning News people Thomas Jefferson High School (Dallas) alumni 21st-century American Jews
https://en.wikipedia.org/wiki/Readable
Readable may refer to: Readability Human-readable Reading (computer)
https://en.wikipedia.org/wiki/Lawnmower%20Man%202%3A%20Beyond%20Cyberspace
Lawnmower Man 2: Beyond Cyberspace (also subtitled Jobe's War) is a 1996 American science fiction action film written and directed by Farhad Mann, and starring Matt Frewer, Patrick Bergin, Austin O'Brien, and Ely Pouget. It is a sequel to the 1992 film The Lawnmower Man. The film was negatively reviewed by both critics and fans of the original film. Plot The founder of virtual reality, Dr. Benjamin Trace, has lost a legal battle to secure a patent on the most powerful worldwide communications chip ever invented. Touted as the one operating system to control all others, in the wrong hands the "Chiron Chip" has the potential to dominate a society dependent on computers. When corporate tycoon and virtual reality entrepreneur Jonathan Walker takes over the development of the Chiron Chip, he and his team discover Jobe Smith barely alive after the destruction of Virtual Space Industries. After having his face reconstructed and his legs amputated, they hook him up to their database to have him help perfect the Chiron Chip. Six years later, a now 16-year-old Peter Parkette is a computer hacker living in the subways of a cyberpunk Los Angeles with a group of other runaway teens. While hooked into Cyberspace, Jobe reconnects with Peter and asks him to find Trace for him. Peter locates Trace living in a desert and brings him to his hideout to speak with Jobe. Jobe shows Trace his newly constructed cyber-world and asks about the Egypt link, a hidden Nano routine in the Chiron Chip's design. Trace refuses to tell him, noting that Jobe is insane and would not understand its power. Enraged, Jobe hacks into the subway system's computer to send another train crashing into the one Trace and the teenagers are in, but Trace causes the runaway train to crash into a construction site instead. Walker and his team at "Virtual Light Industries" plan on announcing the functions of the chip and its virtual city to the public and world leaders, though Walker wants to use them for spying and blackmail. He uses Jobe to deal with anything that could stop him, such as crashing a plane carrying a senator who is opposed to the launch and killing anyone who gets too close to the truth through virtual reality. Trace, Peter, and the others make an attempt to break into Virtual Light to steal the chip but are nearly killed by Jobe before they are rescued by Dr. Cori Platt, Trace's former partner and lover. After stealing the Chiron Chip, they find it is a decoy. Walker keeps the real chip in his office and the launch of the chip seems inevitable. Jobe begins causing havoc through the chip by accessing credit accounts, ATM machines, and water and power utilities in an attempt to destroy the world so that everyone may join and follow him as a virtual messiah. Walker attempts to stop Jobe but is gunned down by his own security. The group returns to Virtual Light Industries. Trace explains that the Egypt link is a dam function designed to prevent "ultimate power". Jobe has built aro
https://en.wikipedia.org/wiki/ABC%20Television%20%28Australian%20TV%20network%29
ABC Television is the general name for the national television services of the Australian Broadcasting Corporation (ABC). Until an organisational restructure in 2017/2018, ABC Television was also the name of a division of the ABC. The name was also used to refer to the first and for many years the only national ABC channel, before it was renamed ABC1 and then again to ABC TV. The Australian public broadcaster's television service was launched in November 1956 from its first television station in Australia, ABN Sydney. This was the second one in the country, with the commercial channel TCN having launched two months earlier. An ABC television network covering every state and territory was completed by 1971, and in 2000 the television operations joined the ABC radio and online divisions at the Corporation's Ultimo headquarters in Sydney in 2000. The ABC provides five non-commercial channels within Australia, headed by its flagship ABC TV channel, as well as ABC Australia, a satellite channel broadcast to South-East Asia, partially funded by the Department of Foreign Affairs and Trade and advertisers. Some radio channels are also broadcast via the television network. The ABC local stations in the capital cities carry opt-outs for local programming, used chiefly for nightly news broadcasts. ABC Television also broadcasts via its streaming and video-on-demand service, ABC iview, available via its website and a mobile app. ABC Television is one of five main free-to-air networks in Australia. History 1950s to 2000 The history of the ABC's television operations can be traced back to 1953, when the federal Television Act was passed, providing the initial regulatory framework for both the ABC and commercial television networks. Over the next three years, planning for the introduction of a national television service was put in place, land for studios and transmitters in Sydney and Melbourne was acquired, and overseas tutors were brought to Australia to assist with training. The ABC's 1956 Annual Report stated that it aimed to create a “television service as truly national in character as its resources will permit”. Commercial station TCN-9 Sydney was the first to broadcast in Australia, in September 1956. The ABC's Sydney station, ABN, started transmission on 5 November 1956. Its first television broadcast was inaugurated by Prime Minister Robert Menzies at the Gore Hill studios in Sydney, and a couple of weeks later, ABV transmission began in Melbourne on 19 November 1956, in time to cover the 1956 Summer Olympics in Melbourne. Outside broadcasting was also initiated on 5 November, from the ABC's first outside broadcast van. The van, now in the collection of the National Museum of Australia, was instrumental in the production of thousands of outside broadcasts. It was restored in time to be displayed at the 2000 Summer Olympics in Sydney and was used to film the visit of Queen Elizabeth II to the site of the National Museum in 2000. ABQ in Bris
https://en.wikipedia.org/wiki/Vajas
Vajas (meaning echo in North Sámi) was a Sámi-Norwegian band with Kristin Mellem on violin and vocals, Nils Johansen on guitars, computers and synthesizers and the famous Sami ethnic yoiker Ánde Somby on vocals and yoik (or joik, a type of traditional chanting or singing). The band debuted in 2003 and toured internationally. In October 2006 Vajas released its first album, Sacred Stone. The band is currently working on getting the release distributed in Germany and the UK with other countries to follow. In 2009, a minor YouTube fad involved remaking or lipsynching to the song "Sparrow of the Wind". Band members Kristin Mellem is a classically trained composer and violinist who has done a lot of musical projects. She has composed and performed music both in smaller settings and with full orchestras. Ánde Somby is both a traditional and non-traditional Sami yoiker (joiker) and has been performing since the late seventies. Somby also has a Ph.D. in Law and is a busy academic, employed at the University of Tromsø in Norway. Nils Johansen is a musician, composer, artist and multiinstrumentalist and is also a member of the Norwegian pop/indie duo Bel Canto. Johansen has been a part of the international music industry since the mid eighties and has composed music for film, television and for full orchestras. He wrote the opening number to the debut of the Norwegian radio channel P3 and has done a lot of musical work outside his two bands. Personal life Somby lived with Kristin Mellem from 2003 to 2007 and have one child together, born in 2005. From a former marriage Somby has two children, born in 1980 and 1988. Somby is the father of Lawra Somby, who yoiks in the duo Adjagas. References Discography 2006 Sacred stone, Vaj AS/Musikkoperatørene, Norway External links Vajas' English profile page on MySpace.com with songs and a video Ánde Somby's English profile page on MySpace.com Nils Johansen's English Bel Canto profile page on MySpace.com Norwegian musical groups
https://en.wikipedia.org/wiki/Koo
Koo or KOO may refer to: Kōō (1389–1390), a Japanese era KOO, a South African food brand Koo (social network), an Indian microblogging and social networking service Koo Koo, a 1981 Debbie Harry album People Koo Chen-fu (1917–2005), Taiwanese businessman and diplomat Koo Chung, Korean-American singer-songwriter Koo Dae-Sung (born 1969), South Korean baseball player Koo Hsien-jung (1866–1937), Taiwanese businessman and politician Koo Ki-Lan (born 1977), South Korean volleyball player Koo Kien Keat (born 1985), Malaysian badminton player Koo-Koo the Bird Girl, who suffered from Virchow-Seckel syndrome Koo Stark (born 1956), American film actress and photographer Koo Hye-sun, a South Korean actress and singer Chung Mong Koo, South Korean business magnate Dae-Sung Koo, Korean baseball pitcher Duk Koo Kim, South Korean boxer Jeffrey Koo Sr. (born 1933), Taiwanese banker Joseph Koo, MBE, SBS, (born 1933,), Hong Kong composer Josephine Koo (Chinese: 顧美華), Chinese actress Jung Koo Chang (born 1963), South Korean boxer Kaija Koo (born 1962), Finnish singer Linda Koo (born 1954), Hong Kong epidemiologist Louis Koo, Hong Kong actor Koo Sze-yiu, Hong Kong activists Nathan Koo-Boothe (born 1985), Jamaican international footballer Ngeh Koo Ham (born 1961), Malaysian politician Wellington Koo, Chinese diplomat Younghoe Koo, American football player Fictionals Hari Koo, a protagonist in the anime series Doori Koo, a protagonist in the anime series See also Koo-Vee, a Finnish ice hockey team based at Tampere Koo-Vee (ice hockey), a Finnish ice hockey team based at Tampere Tai Koo (disambiguation)
https://en.wikipedia.org/wiki/The%20Collingswood%20Story
The Collingswood Story is a 2002 American computer screen supernatural horror film written and directed by Michael Costanza, and starring Stephanie Dees, Johnny Burton, Grant Edmonds, and Diane Behrens. Its plot follows a college-aged couple who attempt to maintain their long-distance relationship via video chatting; however, a chance encounter with an online psychic plunges their lives into a world of nightmarish supernatural phenomena. The Collingswood Story began production in the year 2000, when video chatting was in its infancy and far from mainstream. It is known today as the first screenlife film for its innovative video chat concept. In an August 2022 editorial "The Evolution of Found Footage: A History of Screenlife Horror" The Collingswood Story is referred to as "the first true Screenlife horror flick." The film has been cited as a precursor to a number of horror films presented in the computer screen format, such as Host, and Unfriended. Plot Rebecca Miles relocates to Collingswood, New Jersey to attend Rutgers University, renting a room in a historic house. On Rebecca's twenty-first birthday, her boyfriend, Johnny, gifts her a webcam so the two can maintain a long-distance relationship. Johnny, communicating with his friend Billy—also via webcam—is introduced to Vera Madeline, an online psychic whom Billy claims contacted his deceased father. Rebecca is skeptical of Vera, and offers to have a virtual session with her first. During the video conference, Vera appears in a darkened room, backlit by two candelabras, and donning sunglasses. Rebecca gives Vera a false name, but shortly into her psychic reading, Vera calls Rebecca by her actual name. This piques Rebecca's interest, but she chalks it up to Vera having some method of caller identification. When Johnny has a session with Vera, she asks who referred him, and he mentions Rebecca. Vera comments that Collingswood is well-known to psychics and mediums due to grim historical events that occurred there involving a secret society founded by a French immigrant named Alan Tashi, who in the 1800s, murdered and mutilated nine girls, cutting out their eyes, before disposing of their bodies in a well. When the townspeople attempted to seek vengeance, they stormed Tashi's home, but found it empty; in the attic, they discovered a wooden shaker toy, but no sign of Tashi, Vera urges Johnny to have Rebecca contact her again for another session, imparting that Rebecca is a "sensitive," and that she has important information for her. Upon further investigation, Johnny discovers that the house Rebecca is living in was the site of a murder–suicide four years prior, in which a judge drowned his children in the bathtub before killing his wife, and then, himself. In crime scene photos published online, Johnny glimpses a wooden shaker toy. Armed with this knowledge, Johnny worries about Rebecca, who has been left alone in the house by the homeowners over the Halloween weekend. Rebecca begins to lo
https://en.wikipedia.org/wiki/KHB
KHB or khb may refer to: Higashinippon Broadcasting, a Japanese broadcast network affiliated with the ANN KHB, the station code for Khushab Junction railway station, Pakistan khb, the ISO 639-3 code for Tai Lue language
https://en.wikipedia.org/wiki/XMU
XMU may refer to: libxmu, a library for programming on the X Window System Moulins - Montbeugny Airport, an airport in France with IATA code XMU. Sirius XMU, a radio channel on Sirius XM Radio which plays unsigned artists. Xiamen University in China Xinjiang Medical University in China
https://en.wikipedia.org/wiki/XVG
XVG may refer to: The file format used by data visualization software Grace The code of Longville Municipal Airport XV Gymnasium, a high school in Zagreb, Croatia
https://en.wikipedia.org/wiki/Provider%20Backbone%20Bridge%20Traffic%20Engineering
Provider Backbone Bridge Traffic Engineering (PBB-TE) is a computer networking technology specified in IEEE 802.1Qay, an amendment to the IEEE 802.1Q standard. PBB-TE adapts Ethernet to carrier class transport networks. It is based on the layered VLAN tags and MAC-in-MAC encapsulation defined in IEEE 802.1ah (Provider Backbone Bridges (PBB)), but it differs from PBB in eliminating flooding, dynamically created forwarding tables, and spanning tree protocols. Compared to PBB and its predecessors, PBB-TE behaves more predictably and its behavior can be more easily controlled by the network operator, at the expense of requiring up-front connection configuration at each bridge along a forwarding path. PBB-TE Operations, Administration, and Management (OAM) is usually based on IEEE 802.1ag. It was initially based on Nortel's Provider Backbone Transport (PBT). PBB-TE's connection-oriented features and behaviors, as well as its OAM approach, are inspired by SDH/SONET. PBB-TE can also provide path protection levels similar to the UPSR (Unidirectional Path Switched Ring) protection in SDH/SONET networks. Principle of operation The IEEE 802.1Qay PBB-TE standard extends the functionality of IEEE 802.1ah Provider Backbone Bridges, adding a connection-oriented mode using point-to-point trunks that deliver resiliency and configurable performance levels. A service is identified by an I-SID (Backbone Service Instance Identifier) and each service is associated with a PBB-TE trunk. Each PBB-TE trunk is identified by a triplet of B-SA, B-DA and B-VID. The B-SA and B-DA identify the source and destination bridges, respectively, that are the endpoints of the trunk. The B-VID is a backbone VLAN identifier that is used to distinguish different trunks to the same destination. The management system configures the PBB-TE trunks on all the edge and core bridges by creating static forwarding database entries; the management system is responsible for ensuring that there are no forwarding loops. The backbone edge bridges map frames to and from an I-SID and perform the MAC header encapsulation and decapsulation functions. The core bridges act as transit nodes. The packets are forwarded based on outer VLAN ID (B-VID) and Destination MAC address (B-DA). Forwarding is based on the static forwarding database (FDB) entries; dynamic MAC learning is not used. Any incoming broadcast or multicast frames are either dropped or encapsulated as unicast within the trunk. All Destination Lookup Failure packets are dropped rather than flooded. By eliminating any broadcasting or flooding, and by using only the loop-free forwarding paths configured by management, there is no longer any need to use a spanning tree protocol. Path protection is provided by configuring one work and one protect B-VID for each backbone service instance. In case of work path failure (as indicated by loss of 802.1ag continuity check messages, CCMs) the source bridge swaps the B-VID value to redirect the traffi
https://en.wikipedia.org/wiki/IEEE%20802.1ah
IEEE 802.1ah is an amendment to the IEEE 802.1Q networking standard which adds support for Provider Backbone Bridges. It includes an architecture and a set of protocols for routing over a provider's network, allowing interconnection of multiple provider bridge networks without losing each customer's individually defined VLANs. It was initially created by Nortel before being submitted to the IEEE 802.1 committee for standardization. The final version was approved by the IEEE in June 2008 and has been integrated into IEEE 802.1Q-2011. History The now-ubiquitous Ethernet was initially defined as a local area network (LAN) technology to interconnect the computers within a small organization in which these host computers were very close in proximity to each other. Over the years, Ethernet has become such a popular technology that it became the default Data Link Layer (OSI Layer 2) mechanism for data transport. This created a need for extending the Ethernet from a customer LAN bridging domain to service provider MAN, also known as the Provider bridging domain. For this, a 4 byte S-Tag or Service Tag, a type of Virtual LAN tag, was added to the header of the Ethernet frame in IEEE 802.1ad standard. In the service provider domain, switching was based on S-Tag and destination MAC address, and C-tag was used to create virtual LAN within the customer domain. This technology is also known as QinQ or Q-tunneling. QinQ does not offer true separation of customer and provider domains but is merely a way to overcome the limitations on the VLAN identifier space. It can also help in separation of the customer and provider control domains when used with other features like control protocol tunneling or Per-VLAN Spanning Tree etc. There is still the problem of having too little control on the MAC addresses, since QinQ forwarding is still based on the customer destination addresses. Thus, better mechanisms are needed. Description The idea of PBB is to offer complete separation of customer and provider domains. For this purpose, a new Ethernet header has been defined. This header may take multiple different forms, but the main components of the header are: Backbone component, that has: Backbone destination address (B-DA) (six bytes) Backbone source address (B-SA) (six bytes) EtherType 0x88A8 (two bytes) B-TAG/B-VID (two bytes), this is the backbone VLAN indicator Service encapsulation, which has: EtherType 0x88E7 (two bytes) Flags that contain priority, Drop Eligible Indicator (DEI) and No Customer Address (NCA) indication (e.g. OAM frames). I-SID, the service identifier (three bytes) Original customer frame Customer destination address (six bytes) Customer source address (six bytes) EtherType 0x8100 (two bytes) Customer VLAN identifier (two bytes) EtherType (e.g. 0x0800) Customer payload PBB defines a 48-bit B-DA and 48-bit B-SA to indicate the backbone source and destination MAC addresses. It also defines a 12-bit B-VID (backbone VLAN ID) and
https://en.wikipedia.org/wiki/S-63%20%28encryption%20standard%29
S-63 is an International Hydrographic Organization (IHO) standard for encrypting, securing and compressing electronic navigational chart (ENC) data. The Data Protection Scheme was prepared by the IHO Data Protection Scheme Advisory Group, and was based on the protection scheme developed and operated by Primar as part of providing their protected ENC service. ECC (Electronic Chart Centre) and United Kingdom Hydrographic Office were the original contributing organizations. The UKHO has since left this arrangement and Primar is now operated exclusively by ECC. The standard was adopted as the official IHO standard by the IHO member states in December 2002. The S-63 standard secures data by encrypting the basic transfer database using the Blowfish algorithm, SHA-1-hashing the data based on a random key and adding a CRC32 check. The standard also defines the systems to develop permit files that are delivered to end-users of ENC data enabling them to decrypt the data and use it for navigation. It also defines the use of DSA format signatures to authenticate the data originator, however because of poor implementation of the standard by ECDIS hardware manufacturers, virtually all signing is performed centrally by the IHO which acts as the scheme administrator. Exceptions to this are a few smaller resellers such as AUSRenc operated by AHS. Compression is achieved by applying the standard ZIP (file format) algorithm to the base and update ENC files, before encryption. The other files are not compressed. References Digital rights management Electronic navigation
https://en.wikipedia.org/wiki/Lazy%20loading
Lazy loading (also known as asynchronous loading) is a technique commonly used in computer programming and mostly in web design and web development to defer initialization of an object until the point at which it is needed. It can contribute to efficiency in the program's operation if properly and appropriately used. This makes it ideal in use cases where network content is accessed and initialization times are to be kept at a minimum, such as in the case of web pages. For example, deferring loading of images on a web page until they are needed can make the initial display of the web page faster. The opposite of lazy loading is eager loading. Examples With web frameworks Prior to being established as a web standard, web frameworks were generally used to implement lazy loading. One of these is AngularJS. Since lazy loading decreases bandwidth and subsequently server resources, it is a strong contender to implement in a website, especially in order to improve user retention by having less delay when loading the page, which may also improve Search Engine Optimization. Below is an example of lazy loading being used in Angular, programmed in TypeScript from Farata Systems @NgModule({ imports: [ BrowserModule, RouterModule.forRoot([ {path: '', component: HomeComponent}, {path: 'product', component: ProductDetailComponent}, {path: 'luxury', loadChildren: () => import('./luxury.module').then(m => m.LuxuryModule), data: {preloadme:true} } ] // , {preloadingStrategy: CustomPreloadingStrategy} ) ], declarations: [ AppComponent, HomeComponent, ProductDetailComponent], providers:[{provide: LocationStrategy, useClass: HashLocationStrategy}, CustomPreloadingStrategy], bootstrap: [ AppComponent ] }) As a web standard Since 2020, major web browsers have enabled native handling of lazy loading by default. This allows lazy loading to be incorporated into a webpage by adding HTML attributes. The loading attribute support two values, lazy and eager. Setting the value to lazy will fetch the resource only when it is required (such as when an image scrolls into view when a user scrolls down), while setting it to eager, the default state, the resource will be immediately loaded. <!-- These resources will be loaded immediately --> <img src="header_image.jpg"> <img src="header_image2.jpg" loading="eager"> <!-- While these resources will be lazy loaded --> <img src="article_image.jpg" alt="..." loading="lazy"> <iframe src="video-player.html" title="..." loading="lazy"></iframe> Methods There are four common ways of implementing the lazy load design pattern: lazy initialization; a virtual proxy; a ghost, and a value holder. Each has its own advantages and disadvantages. Lazy initialization With lazy initialization, the object is first set to null. Whenever the object is requested, the object is checked, and if it is null, the object is then immediately created and returned. For example, lazy loading
https://en.wikipedia.org/wiki/Why%E2%80%93because%20analysis
Why–because analysis (WBA) is a method for accident analysis. It is independent of application domain and has been used to analyse, among others, aviation-, railway-, marine-, and computer-related accidents and incidents. It is mainly used as an after-the-fact (or a posteriori) analysis method. WBA strives to ensure objectivity, falsifiability and reproducibility of results. The result of a WBA is a why–because graph (WBG), a type of causal notation used to represent interdependencies within a system. The WBG depicts causal relations between factors of an accident. It is a directed acyclic graph where the nodes of the graph are factors. Directed edges denote cause–effect relations between the factors. WBA in detail WBA starts with the question "What is the accident or accidents in question?". In most cases this is easy to define. Next comes an iterative process to determine causes. When causes for the accident have been identified, formal tests are applied to all potential cause-effect relations. This process can be iterated for the newfound causes, and so on, until a satisfactory result has been achieved. At each node (factor), each contributing cause (related factor) must have been necessary to cause the accident, and the totality of causes must have been sufficient to do so. The formal tests The counterfactual test (CT) – The CT leads back to David Lewis' formal notion of causality and counterfactuals. The CT asks the following question: "If the cause had not been, could the effect have happened?". The CT proves or disproves that a cause is a necessary causal factor for an effect. Only if it is necessary for the cause in question then it is clearly contributing to the effect. The causal sufficiency test – The CST asks the question: "Will an effect always happen if all attributed causes happen?". The CST aims at deciding whether a set of causes are sufficient for an effect to happen. The missing of causes can thus be identified. Only if for all causal relations the CT is positive and for all sets of causes to their effects the CST is positive the WBG is correct: each cause must be necessary (CT), and the totality of causes must be sufficient (CST): nothing is omitted (CST: the listed causes are sufficient), and nothing is superfluous (CT: each cause is necessary). Example See also Accident Cause–effect graph Fault tree analysis Five whys Ishikawa diagram Issue map Issue tree Root cause analysis References External links Why-Because Analysis (WBA) Causal diagrams Debugging Accident analysis Directed graphs
https://en.wikipedia.org/wiki/Thameslink%20Programme
The Thameslink Programme, originally Thameslink 2000, was a £6billion project in south-east England to upgrade and expand the Thameslink rail network to provide new and longer trains between a wider range of stations to the north and to the south of London. The development facilitated new cross-London journeys, which means that passengers no longer have to change trains in London. Work included platform lengthening, station remodelling, new railway infrastructure, and new rolling stock. The project was originally proposed in 1991 following the successful introduction of the initial Thameslink service in 1988. After many delays, planning permission was granted in 2006 and funding was approved in October 2007. Work started in 2009 and was completed on 18 September 2020, although trains over the new routes began running in 2018. Planning Background The original Thameslink rail network was created by joining the electrified network south of the Thames with the then recently electrified line between Bedford and St Pancras to the north via the Snow Hill tunnel, allowing passengers to travel between stations to the north and south of London, including Bedford, Luton Airport, Gatwick Airport and Brighton, without changing trains or using the London Underground. New dual-voltage rolling stock was built for the service on account of differing electrification standards north and south of London; lines south of the river are electrified using a 750-voltDC third rail and those to the north by the more modern 25kVAC overhead system. Services began in 1988 and the route was fully inaugurated in May 1990. Passenger traffic between destinations in north and south London served by Thameslink services quadrupled after the first year of operation. The success of this initial project encouraged British Rail to develop proposals to extend the network, and increase the frequency of service. British Rail 'Thameslink 2000' plans British Rail proposed to expand and upgrade the original network in the early 1990s, with plans to increase the number of stations served from 50 to 169 and to increase passenger capacity by allowing 12-carriage trains and allowing more trains per hour. In 1994 responsibility for the project, intended to be complete by 2000, was transferred to Railtrack as detailed in the Railways Act 1993. This privatisation, combined with a recession in the UK economy, caused the first of many delays to the project. Railtrack plans Railtrack applied for Transport and Works Act 1992 powers on 21 November 1997, but two months later London and Continental Railways (LCR), a company created to build the High Speed 1 railway between London and the Channel tunnel, announced that it would require a further direct government grant of £1.2billion (1995 prices) to finance the rail link; and the Thameslink Programme relied on the construction of a 'concrete box' provided by this other project to house the new Thameslink sub-surface station underneath St Pancras st
https://en.wikipedia.org/wiki/DNEG
DNEG (formerly known as Double Negative and stylized as D N E G) is a British visual effects, computer animation and stereo conversion studio that was founded in 1998 in London, and rebranded as DNEG in 2014 after a merger with Indian VFX company Prime Focus; it was named after the letters "D" and "Neg" from their former name. The company has received seven Academy Awards for its work on the films Inception, Interstellar, Ex Machina, Blade Runner 2049, First Man, Tenet and Dune. In addition, DNEG has received BAFTA awards for Inception, Harry Potter and the Deathly Hallows – Part 2 , Interstellar, Blade Runner 2049, Tenet, Dune and Black Mirrors "Metalhead", and Visual Effects Society awards for its work on films such as The Dark Knight Rises, Sherlock Holmes, Inception, Interstellar, Dunkirk, Blade Runner 2049, Altered Carbon, First Man, Chernobyl, Last Night In Soho, Foundation and Dune. It has also received Primetime Emmy Awards for its work on Dreamkeeper, Chernobyl and season 3 of Star Trek: Discovery. DNEG is headquartered in Fitzrovia, London with additional locations in Vancouver, Mumbai, Los Angeles, Chennai, Montréal, Mohali, Bangalore, Toronto and Sydney (opening in 2023). History Double Negative first opened its doors in 1998 in London. Founded by a small group of industry professionals, including Peter Chiang (Senior VFX Supervisor), Matt Holben (Joint MD), Alex Hope (Joint MD) and Paul Franklin (Senior VFX Supervisor), it has grown from a small team to 8,000 members of staff worldwide. Over the years, DNEG has worked on over 200 movies and developed working relationships with a number of leading directors. Its first project was Pitch Black, released in 2000. Since then, DNEG's work can be seen in recurring franchises like Harry Potter, Fantastic Beasts, Marvel Cinematic Universe, James Bond, Jason Bourne, Fast and Furious, Mission: Impossible and the DC Extended Universe. DNEG has worked on award-winning projects such as Inception, Interstellar, Ex Machina, Dunkirk, Blade Runner 2049, Black Mirror – Metalhead, Altered Carbon, First Man, Chernobyl, Tenet, Star Trek: Discovery (Season 3), and Dune. DNEG's visual effects work has been honored with seven Academy Awards, seven BAFTAs, eighteen Visual Effects Society Awards and three Primetime Emmy Awards. International expansion In 2009, Double Negative opened its Singapore office, and closed it in March 2016. In July 2014, Prime Focus World merged with Double Negative; the merged company was rebranded as DNEG. The two companies announced the upcoming opening of a Mumbai branch following the merger. Since 2014, DNEG has opened new facilities in Vancouver, Mumbai, Los Angeles, Chennai, Montréal, Mohali, Bangalore and Toronto. In August 2021, UK-based firm Novator Capital Advisors invested $250 million in Prime Focus Limited, DNEG's parent company. On January 25, 2022, DNEG announced its entry into a definitive business combination agreement with Sports Ventures Acquisition Co
https://en.wikipedia.org/wiki/America%27s%20Game%3A%20The%20Super%20Bowl%20Champions
America's Game: The Super Bowl Champions is an American annual documentary series created by NFL Films (broadcast on NFL Network and CBS). Its 57 installments profile the 57 winning teams of the National Football League (NFL)'s annual Super Bowl championship game; each episode chronicles an individual team. A spin-off debuted on September 18, 2008, titled America's Game: The Missing Rings which chronicled five of the best teams to never win the Super Bowl. Format America's Game weaves together archival NFL Films footage, videotape, audio clips, and interviews into a new program with new talking head style interviews from three or more of the winning team (players, coaches, or administrators) and narration from a celebrity. In instances of teams winning multiple Super Bowls closely together different people are interviewed for each episode. For example, though Bill Belichick coached the New England Patriots to three Super Bowls in four years (2001, 2003, and 2004) he was only interviewed for the episode on the 2004 team. For the original run of 40 episodes, only two subjects were interviewed twice: Bill Curry (1966 Green Bay Packers and 1970 Baltimore Colts) and Joe Greene (1974 and 1978 Pittsburgh Steelers). Recurring interviewers would become more commonplace when the show resumed on an annual format: Eli Manning and Tom Coughlin (2007 and 2011 New York Giants), Ray Lewis (2000 and 2012 Baltimore Ravens), Peyton Manning (2006 Indianapolis Colts and 2015 Denver Broncos), Julian Edelman (2014, 2016 and 2018 New England Patriots), LeGarrette Blount (2016 New England Patriots and 2017 Philadelphia Eagles), Rob Gronkowski and Devin McCourty (2014 and 2018 New England Patriots), Travis Kelce and Patrick Mahomes (2019 and 2022 Kansas City Chiefs). Ernie Accorsi and Rich Dalrymple are the only non-players or coaches to be interviewed for the series—both were team administrators. Of the "Blue Ribbon" top 20 teams, the San Francisco 49ers and Dallas Cowboys are represented most often as a franchise with three championship teams each. The Green Bay Packers, Pittsburgh Steelers, and Oakland/Los Angeles Raiders are each represented twice. According to Steve Sabol, president of NFL Films, only 20 teams were ranked instead of 40 because they feared negative mail from fans of the franchise whose team was ranked the lowest. Sabol stated that, while the panel chose the 1972 Dolphins as the #1 team, several voters hedged and said Miami's unbeaten season was "the greatest team achievement." Of the voting methods, Sabol said, "That's what I think people were voting on, rather than, 'Could this team beat the '85 Bears?'" Airing For its initial airings the show was divided into two waves, with the first series being a weekly series counting down the top 20 winning teams, as selected by a 53-person panel of "Blue Ribbon" experts on the NFL. The first 18 episodes aired on NFL Network beginning in November 2006 and the final two programs on CBS the day before Super
https://en.wikipedia.org/wiki/CSLU%20Toolkit
The CSLU Toolkit is a software library comprising a comprehensive suite of tools that enable exploration, learning, and research into speech and human-computer interaction. It is developed by the Center for Spoken Language Understanding at the OGI School of Science and Engineering, a school of the Oregon Health & Science University. The tools include: Audio Display Speech recognition Speech generation Animated faces See also List of speech recognition software External links toolkit : about, CSLU Toolkit Computer libraries
https://en.wikipedia.org/wiki/ALSC
ALSC may refer to: Association for Library Service to Children Association of Literary Scholars and Critics Alert Life Sciences Computing, Inc.
https://en.wikipedia.org/wiki/Search%20engine%20indexing
Search engine indexing is the collecting, parsing, and storing of data to facilitate fast and accurate information retrieval. Index design incorporates interdisciplinary concepts from linguistics, cognitive psychology, mathematics, informatics, and computer science. An alternate name for the process, in the context of search engines designed to find web pages on the Internet, is web indexing. Popular search engines focus on the full-text indexing of online, natural language documents. Media types such as pictures, video, audio, and graphics are also searchable. Meta search engines reuse the indices of other services and do not store a local index whereas cache-based search engines permanently store the index along with the corpus. Unlike full-text indices, partial-text services restrict the depth indexed to reduce index size. Larger services typically perform indexing at a predetermined time interval due to the required time and processing costs, while agent-based search engines index in real time. Indexing The purpose of storing an index is to optimize speed and performance in finding relevant documents for a search query. Without an index, the search engine would scan every document in the corpus, which would require considerable time and computing power. For example, while an index of 10,000 documents can be queried within milliseconds, a sequential scan of every word in 10,000 large documents could take hours. The additional computer storage required to store the index, as well as the considerable increase in the time required for an update to take place, are traded off for the time saved during information retrieval. Index design factors Major factors in designing a search engine's architecture include: Merge factors How data enters the index, or how words or subject features are added to the index during text corpus traversal, and whether multiple indexers can work asynchronously. The indexer must first check whether it is updating old content or adding new content. Traversal typically correlates to the data collection policy. Search engine index merging is similar in concept to the SQL Merge command and other merge algorithms. Storage techniques How to store the index data, that is, whether information should be data compressed or filtered. Index size How much computer storage is required to support the index. Lookup speed How quickly a word can be found in the inverted index. The speed of finding an entry in a data structure, compared with how quickly it can be updated or removed, is a central focus of computer science. Maintenance How the index is maintained over time. Fault tolerance How important it is for the service to be reliable. Issues include dealing with index corruption, determining whether bad data can be treated in isolation, dealing with bad hardware, partitioning, and schemes such as hash-based or composite partitioning, as well as replication. Index data structures Search engine architectures vary in the way in
https://en.wikipedia.org/wiki/OhioLINK
The Ohio Library and Information Network (OhioLINK) is a consortium of Ohio's college and university libraries and the State Library of Ohio. Serving more than 800,000 students, faculty, and staff at 88 institutions with 117 libraries, OhioLINK's membership includes 16 public universities, 23 community/technical colleges, 48 private colleges and the State Library of Ohio. OhioLINK serves faculty, students, staff and other researchers via campus-based integrated library systems, the OhioLINK central site, and Internet resources. OhioLINK's mission is to create a competitive advantage for Ohio's higher education community by cooperatively and cost-effectively acquiring, providing access to, and preserving an expanding array of print and digital scholarly resources in order to advance teaching, learning, research, and the growth of Ohio's knowledge-based economy. OhioLINK offers these main digital collections and services, some of which are open access: The Central Catalog, a union catalog of the combined member library collections A collection of research databases The EJC or Electronic Journal Center, a multi-publisher article database The EBC or Electronic Book Center, a multi-publisher book collection The Finding Aid Repository (Open Access) The Digital Music Center The ETD or Electronic Theses and Dissertations Center (Open Access). eTutoring, a collaborative online tutoring platform for participating member institutions The OhioLINK Open Course Content Library for Open Educational Resources (Open Access) Through a peer-to-peer print sharing network with participating Ohio public libraries in the SearchOhio Network, OhioLINK students, faculty and staff can request public library materials and vice versa. Digital preservation of locally ingested and created items such as electronic theses and dissertations using the Rosetta product from Ex Libris. OhioLINK also supports the member libraries which administer the Regional Book Depository program. These five high-density remote storage facilities are each administered by a member library and the materials housed there circulate through the OhioLINK print lending program. History OhioLINK, a cooperative venture of university libraries and the Ohio Board of Regents, grew out of a 1987 recommendation by the board's library committee that "the state of Ohio implement, as expeditiously as possible, a statewide electronic catalog system." In response to this recommendation, the board established a steering committee representing librarians, faculty, administrators and computer systems managers from campuses throughout Ohio. After meetings, public hearings, and conferences, the committee prepared and distributed a planning paper (November 1988); a Request for Information (February 1989); and a Request for Proposal (August 1989) to initiate a statewide electronic system. In 1990, OhioLINK selected Innovative Interfaces, Inc to develop the unique software system to create the OhioLINK central
https://en.wikipedia.org/wiki/AecXML
aecXML (architecture, engineering and construction extensible markup language) is a specific XML markup language which uses Industry Foundation Classes to create a vendor-neutral means to access data generated by building information modeling, BIM. It is being developed for use in the architecture, engineering, construction and facility management industries, in conjunction with BIM software, and is trademarked by the buildingSMART (the former International Alliance for Interoperability), a council of the National Institute of Building Sciences. Specific subsets are being developed, namely: Common Object Schema Infrastructure Structural Facility management Procurement Project Management Plant Operations Building Environmental Performance See also Industry Foundation Classes BuildingSMART BIM Collaboration Format External links National Institute of Building Sciences (NIBS) buildingSMART Alliance (bSa) Model Support Group (MSG) of NIBS bSa Responsible for AEC Industry Foundation Class (IFC) Development since ~2006 Links Obsolete by July 2009 at the latest: North American Chapter of the International Alliance for Interoperability Proposed common objects - a PDF file XML markup languages Building information modeling
https://en.wikipedia.org/wiki/WAKN-LP
WAKN-LP (analog channel 11) was a low-power television station in Akron, Ohio, United States. It was an affiliate of Jewelry Television, and also carried local programming. Despite its ownership being under the name of Ohio Public Television Corporation (itself based out of the derelict studio facilities of KUMY-LD in Beaumont, Texas), it was a for-profit enterprise and not a public television station, nor a non-commercial operation. WAKN had been noted as silent in Federal Communications Commission records since November 20, 2005, though when it did go silent is unknown. The license had apparently been rolled over with supposed periods of activity mainly with a test pattern and station identification, and had been renewed until October 2021. Despite the FCC adding a rule in 2014 precluding 'one day a year' operation of a station merely to keep a license activated to block new licensees who would operate a station as a going concern, there was no explanation for why WAKN-LP's license remained active for over sixteen years after being taken silent. In 2011, Cleveland CBS affiliate WOIO (channel 19) launched a digital fill-in translator on channel 10 within Akron on the same tower as WAKN-LP, which easily overwhelmed its occasional analog signal on channel 11. The station applied for a digital flash cut in February 2014, its last known FCC communication, which was immediately dismissed due to interference and short-spacing concerns with WPCW in the Pittsburgh market; WPCW broadcasts its digital signal on channel 11. The FCC canceled WAKN-LP's license on January 20, 2022. References Defunct television stations in the United States AKN-LP Television channels and stations established in 2005 Television channels and stations disestablished in 2022 2022 disestablishments in Ohio AKN-LP
https://en.wikipedia.org/wiki/Yani%20Rosenthal
Yani Benjamin Rosenthal Hidalgo (born 14 July 1965 in San Pedro Sula, Honduras) is a businessman, politician and former convict. Personal data His parents are Jaime Rosenthal and Miriam Marina Hidalgo de Rosenthal. He has a sister, Patricia, and three brothers: Jaime (deceased), Carlos José and César Augusto. He is married to Claudia Madrid. They have four daughters: Isabella, Victoria, Elissa and Alexandra. In 1993 his house suffered damage from a bomb attack. Rosenthal was Director of Diario Tiempo (Honduras Times Newspaper) and published a series of articles about military abuses, and, as his home was the temporary shelter for a witness to a military-performed killing, it has been alleged that the military was involved in the bomb attack. Education Rosenthal studied high school at Bilingual School: Escuela Internacional Sampedrana in San Pedro Sula, he is a lawyer graduated from UNAH-Universidad Nacional Autónoma de Honduras (Honduras National Autonomous University) and has an MBA from INCAE. In 1998 the Honduras Supreme Court of Justice granted him the title of Notary public. Political career Rosenthal began his work as an activist for the Liberal Party at a young age. Rosenthal was an alternate member of the Liberal Party's Central Executive Committee from 2001 to 2005 and a full member as Secretary of International Relations from 2005 to 2009. When Mel Zelaya took office on 27 January 2006 as Honduras President, Rosenthal was appointed as Minister of the Presidency. Due to his lack of any public service experience, his appointment was criticized in the local media, since it was seen as a result of the political negotiations of his father. Jaime Rosenthal Sr. has backed Yani in the political arena in recent years. After the death of his younger brother Jaime in a gun accident, Yani was seen as the natural successor to his father. His previous experience was very limited. He was advisor of San Pedro Sula municipality when Jerónimo Sandoval Sorto was mayor of the city (1986–1990). Also he was the coordinator of the presidential campaign of his father Jaime Rosenthal and in 2005 after an internal election within the Liberal Party, he was regional coordinator of Mel Zelaya presidential campaign. In December 2006 Diario La Tribuna (La Tribuna newspaper) carried out a poll among a number of broadcasters. It showed that Rosenthal had the highest favorable opinion of all Ministers of the Mel Zelaya administration. The results have little statistical merit since the broadcaster's population polled was just over 100 and his family owns several broadcasting companies including television (Canal 11) and a newspaper (Diario Tiempo) which employ many of the polled broadcasters. On January 24, 2007 CID-Gallup published a public opinion poll. The results indicated that Rosenthal had a 24% favorable opinion. In December 2006 and January 2007 he suffered severe criticism from his own party members, after he announced the results of an evaluation p
https://en.wikipedia.org/wiki/Ntpdate
ntpdate is a computer program used to quickly synchronize and set computers' date and time by querying a Network Time Protocol (NTP) server. It is available for a wide variety of unix-like operating systems. The accuracy and reliability of ntpdate entirely depends on the accuracy and network link stability of the first server it connects with. As this inaccuracy can lead to a multitude of problems, the maintainers have decided to deprecate it in favor of only using the ntpd (network time protocol daemon) or a sntp (simple network time protocol) query. References External links NTP.org — Home page of the Network Time Protocol Network time-related software
https://en.wikipedia.org/wiki/Tankerton
Tankerton (formerly Tankerton-on-Sea) is a suburb of Whitstable in Kent in south-east England. It was designed in the late 19th century as the train network brought holidaymakers to the sea. It gives its name to a ward of Canterbury City Council. History The place-name 'Tankerton' is first attested in The Book of Fees for 1242, where it appears as Tangrenton. The name means 'the town or settlement of Tancred's people'. Tankerton-on-Sea was a commercial development by the Tankerton Estate Company in the late 19th century, and was designed with a grid of streets leading from the shoreline. In 1890 the Tankerton Estate, including Tankerton Tower (now known as Whitstable Castle) was purchased for development by Charles Newton-Robinson, a road was built, the land was divided into plots and sold at auctions. The Tankerton Estates still exist and are managed by County Estate Agents in Whitstable. Formerly Tankerton's coastline included a small pier, built in 1894, but this no longer exists, having been demolished in the 1910s. In 1926 John Adam Derham was shot in a bungalow called 'Stella Maris' in Tankerton in a quarrel with his former friend and fellow Old Etonian Francis Austin Smith. The quarrel was about Derham's relationship with Smith's wife Kathleen, who was present. Smith, who was defended by Sir Edward Marshall Hall, was tried for murder, but found not guilty, though he was sentenced to 12 months hard labour on a lesser charge. In July 2018, the wreck of a Tudor era merchant ship appeared in the sand. One timber of her hull was felled in 1531. She measures 12m x 5m, and had a capacity of 100 to 200 tons. She is thought to have been in the Copperas trade. The wreck was discovered by local history volunteers, who reported it to Historic England. They commissioned a report from Wessex Archaeology. The government has now listed the vessel as the only wreck of its kind in south-east England. Environment The slopes to the shore are a site of special scientific interest (SSSI) because they support a population of Fisher's estuarine moth, Gortyna borelii lunata, whose sole larval food-plant is the large umbellifer hog's fennel (Peucedanum officinale) which grows well there. Tankerton has a Blue Flag beach and a Seaside Award, certified for high environmental standards. Economy The economy is based around tourism. The little wooden beach huts at the base of the slopes are currently highly desirable, and notable owners have included Tracey Emin, who sold hers to Charles Saatchi for £75,000. Seaview Caravan Holiday Park adjoins Tankerton, and formerly also contained a large number of chalets, as well as static caravans and camping. It is one of the largest holiday parks on the North Kent coast Demography At the 2001 UK census, the Tankerton electoral ward had a population of 4583. The ethnicity was 98.7% white, 0.4% mixed race, 0.6% Asian, 0.2% black and 0.1% other. The place of birth of residents was 95.3% United Kingdom, 0.7% Republic of Irel
https://en.wikipedia.org/wiki/Tiffani%20Faison
Tiffani Faison is an American celebrity chef and restaurateur. She is based in Boston, has served as a judge on Food Network's television series Chopped, and is a four-time James Beard Award Finalist for Best Chef: Northeast (2018, 2019, 2020, 2022). She was the winner of Season 3 of Tournament of Champions and was named Boston's Best Chef by Boston Magazine in 2022. She was one of two finalists on the first season of Bravo's reality show Top Chef, where she finished second to Harold Dieterle. Her company, Big Heart Hospitality has owned the following restaurants: Sweet Cheeks Q, Orfano, Fool's Errand, Bubble Bath, Tenderoni's, Dive Bar, and Tiger Mama. Early career Faison attended the Cambridge School of Culinary Arts (2002 to 2003). Just prior to appearing on Top Chef, Faison was employed as chef de partie under Daniel Boulud at his signature, Michelin Star restaurant in the Wynn Las Vegas and also worked at the Tao restaurant at The Venetian in the same city. After the airing of the final episode of Top Chef in May 2006, Faison took a summer position cooking at the Straight Wharf restaurant in Nantucket, Massachusetts, working under chefs Amanda Lydon and Gabriel Frasca. In 2007, she was executive chef at Todd English’s brasserie, Riche, in New Orleans, Louisiana. In May 2007, Faison cohosted a Greek Isles culinary cruise for Olivia, a lesbian lifestyle and travel services company. Faison returned to Boston, and was Executive Chef at Michela Larson’s Rocca Kitchen & Bar, a popular neighborhood space on Friday nights, until it closed in December 2010. Television appearances Faison first rose to culinary fame when she placed runner-up in the first Season of Top Chef. She then took part in a single episode cooking competition called 4 Star All Stars which pitted four Top Chef season one contestants (Stephen Asprinio, Dieterle, Faison and David Martin) against four season two contestants (Elia Aboumrad, Ilan Hall, Sam Talbot and Marcel Vigneron). Faison's team scored the winning menu and received a $20,000 donation to the Susan G. Komen for the Cure charity. This episode aired on Bravo on June 6, 2007. Faison also participated in the Top Chef Holiday Special that aired on December 7, 2007, winning the $20,000 prize. Faison returned as a contestant on season 8 of Top Chef and was eliminated in the sixth episode. Faison finished runner-up in the Top Chef Duels 2014 competition. As of 2020, Faison is a judge on Chopped and participated as the judge to beat on one of the beat the judge episodes. She also made it to the finals of Chopped: Grudge Match, placing second to Marcus Samuelsson. In 2021, Faison competed in Food Network's Tournament of Champions, and in 2022, Faison returned to compete and win Tournament of Champions, Season 3, as well as serve as a judge on Chopped: Casino Royale. Tiffani Faison won Tournament of Champions 3, defeating Brooke Williamson in the finale. Faison has also been a culinary guest on such national televi
https://en.wikipedia.org/wiki/List%20of%20Survivorman%20episodes
Survivorman is a Canadian-produced television program, broadcast in Canada on the Outdoor Life Network (OLN), and internationally on Discovery Channel and Science Channel. The television series Survivorman consists of 8 seasons with a total of 51 episodes and 9 specials. The show originally aired on the Outdoor Life Network. It's unclear whether the dates of airing listed below are the Canadian or American dates or a mix depending on the season. The show debuted in Canada in 2004. Season 6, which premiered in the US on 1 April 2015, is a break from the traditional series scenarios. It's focused on finding the mythical creature known as Bigfoot, rather than on outdoor survival odysseys as the name would otherwise imply. Season 7 of Survivorman, which returned to the traditional format of lone survivor scenarios, premiered in the US on 7 November 2015, 10/9c PM. Series overview Episodes Season 1 (2005) Season 2 (2007) Season 3 (2008) Season 4 (2012) Part of Survivorman 10 Days. This season is officially considered to be the fourth season of the show in the United States, despite airing on the Science Channel. Season 5 (2014) A new eight episode season of Survivorman was ordered for Travel + Escape in Canada, and either Discovery Channel or Science Channel in the United States. Two episodes feature Les' son, Logan, and the season is accompanied by two specials, Survivorman & Son and Survivorman Stalking Sasquatch on the Science Channel. Season 6 (2015) A new seven episode season of Survivorman has been ordered for Discovery Channel or Science Channel in the United States, and OLN in Canada. Season 7 (2015) The newest season begins on 7 November 2015 and airs on Discovery Channel or Science Channel in the United States, and Outdoor Life Network in Canada. Season 8 (2016) Specials References External links Survivorman
https://en.wikipedia.org/wiki/Aliens%3A%20The%20Computer%20Game%20%28UK%20Version%29
Aliens: The Computer Game is a 1986 video game developed by Software Studios and published by Electric Dreams Software initially for Amstrad CPC, Commodore 64 and ZX Spectrum. It is based on the film of the same title. Ports for the Commodore 16 and MSX were developed by Mr. Micro and published in 1987. Gameplay Aliens: The Computer Game is played from a first-person perspective, and is set inside an atmosphere processing plant, a maze complex consisting of 255 rooms. The player encounters Alien enemies throughout the game. Upon killing an Alien, the body leaves a deadly pool of acid blood that must be avoided. The player also faces the threat of bio-mechanical growth, which, if left uncontained, results in new Alien eggs and facehugger enemies. The player's ultimate goal is to reach the room that houses the Queen Alien and her nests, both of which must be destroyed. The player can directly control a team of Marine soldiers, or can issue orders to the team from the Mobile Tactical Operations Bay (MTOB). When playing from the MTOB, the player has a view of the team's surroundings via video cameras attached to each soldier's helmet. Reception According to Retro Gamer, "the game was praised by the computing press - Zzap!, Amstrad Action, and Sinclair User awarded it 81%, 90% and 5/5 respectively." Crash gave it a score of 84%, with one reviewer declaring it "the best game-of-the-film to date," and the review by Zzap!64 also opined it was "the best tie-in game to date, and a good game to boot." Computer Gamer gave this "excellent game of a superb film" an overall score of 80%. Commodore User gave it 8 out of 10 and Your Sinclair gave it 9 out of 10. In 1993, Commodore Force ranked the game at number 59 on its list of the top 100 Commodore 64 games. In a Retro Gamer retrospective, Darren Jones opined that "despite being incredible basic to look at, Aliens dripped with atmosphere and was quite unlike any movie conversion of the time, and not just because it was so bloody good. A first-person view used in the game perfectly matched the moment in the film when the pumped-up marines start exploring the deserted base and, as the game progressed, it managed to capture all the terror and confusion of the movie in a way few other titles have managed." The magazine also declared it "the scariest 8-bit game ever made." Stephen Kleckner of GamesBeat wrote it "may lack the audio/visual punch of Activision’s Aliens game, but the gameplay is more tightly defined and is forward-thinking for its time." He also recommended a Windows fan remake of Aliens titled LV-426. Reviews Jeux & Stratégie #44 See also List of Alien, Predator and Alien vs. Predator games References External links Aliens: The Computer Game at MobyGames Aliens at Lemon 64 1986 video games 1980s horror video games Alien (franchise) games Amstrad CPC games Commodore 64 games MSX games Single-player video games Video games based on films Video games developed in the United Kingdom Video games f
https://en.wikipedia.org/wiki/Homeless%20Management%20Information%20Systems
Homeless Management Information System (HMIS) is a class of database applications used to confidentially aggregate data on homeless populations served in the United States. Such software applications record and store client-level information on the characteristics and service needs of homeless persons. An HMIS is typically a web-based software application that homeless assistance providers use to coordinate care, manage their operations, and better serve their clients. HMIS implementations can encompass geographic areas ranging from a single county to an entire state. An HMIS knits together homeless assistance providers within a community and creates a more coordinated and effective housing and service delivery system. The United States Department of Housing and Urban Development (HUD) and other planners and policymakers at the federal, state and local levels use aggregate HMIS data to obtain better information about the extent and nature of homelessness over time. Specifically, an HMIS can be used to produce an unduplicated count of homeless persons, understand patterns of service use, and measure the effectiveness of homeless programs. Homeless Management Information Systems were first developed in the late 1990s in response to a mandate by Congress requiring States to collect this data as a condition of receiving federal money from HUD to serve homeless populations. The impetus behind this mandate was to reduce and eventually solve homelessness, a problem which could never be solved if it was not understood and if progress toward that goal was not tracked. HUD mandated that each Continuum of Care (CoC) for the Homeless must implement an HMIS, but they did not require the use of a particular application, they do, however, provide specifications which all HMIS software must meet for collection and reporting of data. Some CoCs utilize locally developed or 'homegrown' software, but the majority adopted one of a number of commercially available HMIS applications. In July 2004, HUD published the HMIS Data and Technical Standards in the Federal Register, with the intent of standardizing collection of client and program-level data on homeless service usage among programs within a community and across all communities. In March 2010, HUD published a revision of the HMIS Data Standards, updated to incorporate data collection required for the Homelessness Prevention and Rapid Re-Housing Program (HPRP), which was funded under the American Recovery and Reinvestment Act of 2009; to align with intended changes to program-level reporting requirements; and to address feedback from CoCs requesting clarification and modification of some of the previous data elements. Most HMIS applications also serve as outcome-based systems that facilitate timely, efficient, and effective access to needed services and supports for persons who are homeless. For instance, percentage of individuals who are in permanent housing at the time they exit a program is a metric u
https://en.wikipedia.org/wiki/Air%20Cargo%20Inc
Aircargo Communities Inc, also known as Air Cargo Inc, is a network of air freight cartage agents and trucking companies providing services to airlines and freight forwarders in North America. This network was established in 1941 during World War II by major US carriers including United, American, TWA, and Eastern to accommodate their ground transportation needs. Air Cargo Inc publishes the Air Freight Directory, also known as the "ACI Guide". References Logistics companies of the United States Companies based in San Francisco Transportation companies based in California
https://en.wikipedia.org/wiki/Aliens%3A%20The%20Computer%20Game%20%28US%20Version%29
Aliens: The Computer Game is a 1986 video game developed and published by Activision for the Commodore 64, Apple II based on the film of the same title. As Activision's UK subsidiary Electric Dreams Software had independently released their own version of the game with the same title, the game was renamed for European release. Initially planned to be released as Aliens: The Second Part., it was finally published under the title Aliens: US Version with ports for the Amstrad CPC and ZX Spectrum produced by Mr Micro. Gameplay Aliens is a series of six minigames strung together via graphical interactive sequences, akin to an adventure game, though the only interaction possible is advancing the dialog, displayed in speech balloons. The minigames are mostly action sequences that involve piloting a ship from Sulaco to the planet's surface, recognizing equipment, and fighting aliens. Reception At the time of its release, the game received mixed reviews, including the scores of 85% from Commodore Format, 8/10 (averaged) from Computer and Video Games, 45% from Crash, 5/10 from Sinclair User, 9/10 from Your Sinclair, and 60% from Zzap!64. Info gave the Commodore 64 version four stars out of five: "The aliens are appropriately creepy, and each sequence is well done & plays quite differently from the others". Retrospective VentureBeats Stephen Kleckner commented in a 2014 feature that "as with a lot of compilation-designed titles, Aliens falls into that trap of being a collection of mediocre experiences instead of a game with a singular focus. […] Hardcore fans who own a Commodore 64 should load this one up. Everyone else isn’t missing much that a Let's Play video won't provide." On the other hand, Chris Cummins from Topless Robot wrote in 2010 that "the now-crude graphics aside, it's still arguably the best game based on any of the films in the Alien saga." Reviews Isaac Asimov's Science Fiction Magazine v11 n8 (1987 08) See also List of Alien, Predator and Alien vs. Predator games References External links Aliens at Lemon 64 1986 video games 1980s horror video games Alien (franchise) games Apple II games Commodore 64 games MSX games Single-player video games Video games based on films Video games featuring female protagonists Video games scored by Russell Lieblich Video games developed in the United States Video games set in outer space Video games set on fictional planets ZX Spectrum games Electric Dreams Software games
https://en.wikipedia.org/wiki/Md5deep
md5deep is a software package used in the computer security, system administration and computer forensics communities to run large numbers of files through any of several different cryptographic digests. It was originally authored by Jesse Kornblum, at the time a special agent of the Air Force Office of Special Investigations. , he still maintains it. The name md5deep is misleading. Since version 2.0, the md5deep package contains several different programs able to perform MD5, SHA-1, SHA-256, Tiger192 and Whirlpool digests, each of them named by the digest type followed by the word "deep". Thus, the name may confuse some people into thinking it only provides the MD5 algorithm when the package supports many more. md5deep can be invoked in several different ways. Typically users operate it recursively, where md5deep walks through one directory at a time giving digests of each file found, and recursing into any subdirectories within. Its recursive behavior is approximately a depth-first search, which has the benefit of presenting files in lexicographical order. On Unix-like systems, similar functionality can be often obtained by combining find with hashing utilities such as md5sum, sha256sum or tthsum. md5deep exists for Windows and most Unix-based systems, including OS X. It is present in OS X's Fink, Homebrew and MacPorts projects. Binary packages exist for most free Unix systems. Many vendors initially resist including md5deep as they mistakenly believe its functions can be reproduced with one line of shell scripting. The matching function of the program, however, cannot be done easily in shell. Because md5deep was written by an employee of the U.S. government, on government time, it is in the public domain. Other software surrounding it, such as graphical front-ends, may be copyrighted. See also Hash functions MD5, SHA-1, and SHA-2 (which includes SHA-224, SHA-256, SHA-384, SHA-512) References External links at GitHub Computer security software Public-domain software with source code Free software programmed in C
https://en.wikipedia.org/wiki/SDEP
The SDEP (Street events Data Exchange Protocol) comprises an XML data schema and web service WSDL for exchanging information about streetworks, roadworks, and street events between systems. Elgin was funded by the UK NeSDS Government e-Standards Programme to conduct a consultation and convene meetings to define the requirements of a common data exchange protocol for streetworks registers and other systems handling street events' data. SDEP was developed to allow the open exchange of such data between back office systems used by local authorities to manage their highway networks, in order to enable e-Government and streetworks co-ordination. The SDEP consultation group comprised ELGIN (Chair), Mayrise Ltd., Symology Ltd., Pitney Bowes Inc., Exor Corporation (Bentley Systems), Office of the Deputy Prime Minister and Transport for London, with the National Traffic Control Centre in an observing capacity. See also Office of the Deputy Prime Minister Transport for London National Traffic Control Centre External links SDEP technical documentation including an XML schema and WSDL XML markup languages Web service specifications World Wide Web Consortium standards Technical communication Computer file formats Open formats Data modeling languages Data serialization formats Application layer protocols Presentation layer protocols
https://en.wikipedia.org/wiki/SUSE%20Linux
SUSE Linux ( , ) is a computer operating system developed by SUSE. It is built on top of the free and open source Linux kernel and is distributed with system and application software from other open source projects. SUSE Linux is of German origin, its name being an acronym of "Software und System-Entwicklung" (software and systems development), and it was mainly developed in Europe. The first version appeared in early 1994, making SUSE one of the oldest existing commercial distributions. It is known for its YaST configuration tool. Novell bought the SUSE (then "SuSE") brands and trademarks in 2003. Novell, one of the founding members of the Open Invention Network, decided to make the community an important part of their development process by opening widely the distribution development to outside contributors in 2005, creating the openSUSE distribution and the openSUSE Project. Novell employed more than 500 developers working on SUSE in 2004. On 27 April 2011, Novell (and SUSE) were acquired by The Attachmate Group, which made SUSE an independent business unit. Later, in October 2014, the entire Attachmate Group, including SUSE, was acquired by the British firm Micro Focus International. SUSE continues to operate as an independent business unit. On 2 July 2018, it was announced that Micro Focus would sell SUSE to Blitz 18-679 GmbH, a subsidiary of EQT Partners, for $2.535 billion. The acquisition was completed on March 18, 2019. History The developer The developing Gesellschaft für Software und System Entwicklung mbH (Lit. Company for Software and System Development) was founded on 2 September 1992 in Nuremberg, Germany, by Roland Dyroff, Thomas Fehr, Burchard Steinbild, and Hubert Mantel. Three of the founders were still mathematics students at a university; Fehr had already graduated and was working as a software engineer. The original idea was that the company would develop software and function as an advisory UNIX group. According to Mantel, the group decided to distribute Linux, offering support. Their name at founding was "S.u.S.E." (Software und System-Entwicklung "Software and systems development"); however, the full name has never been used. "S.u.S.E." was shortened to "SuSE" in October 1998 and restylized to "SUSE" in 2003. The official logo and current mascot of the distribution is a veiled chameleon officially named GEEKO (a portmanteau of "gecko" and "geek"). As with the company's name, the GEEKO logo has evolved to reflect company name changes. Origins The company started as a service provider, regularly releasing software packages that included Softlanding Linux System (SLS, now defunct) and Slackware and printing UNIX and Linux manuals, and offering technical assistance. These third-party products SUSE initially used had those characteristics and were managed by SUSE in different fashions: In mid-1992, Peter MacDonald created the comprehensive Linux distribution known as SLS, which offered elements such as X and TCP/IP. T
https://en.wikipedia.org/wiki/Forest%20green
Forest green is a green color said to resemble the color of the trees and other plants in a forest. This web color, when written as computer code in HTML for website color display, is written in the form forestgreen (no space). The first recorded use of forest green as a color name in English was in 1810. Forest green is a representation of the average color of the leaves of the trees of a temperate zone deciduous forest. In culture Cartography Forest green is used to represent deciduous forest on maps depicting natural vegetation. Environmentalism Forest green may be used to represent the Green movement, especially in graphic design for environmental literature regarding issues having to do with forest conservation. A forest green environmentalist (also called a dark green environmentalist) is an environmentalist who is seriously committed to environmentalism. School colors Forest green is one of the school colors of The Evergreen State College, Agincourt Collegiate Institute, Wagner College, Cass Technical High School, The Westminster Schools, Newark Arts High School (Newark, New Jersey), Canyon Lake High School, St Robert Catholic High School, Westlake High School, Mesa Verde High School (Citrus Heights, California), and Elk Grove High School (Elk Grove Village, Illinois). Scouting Forest green is used in the uniforms of the Boy Scouts of America, Venture Scouts, and other Scouting organizations. Military Forest green is a frequent color used in woodland camouflage. Beyond camo uniforms, soldiers will spray their weapons using a multitude of colors including forest green to what would otherwise be black or wooden material. Sports Forest green is one of the team colors of the Nottingham Hoods, an English basketball team. It is also found on the team colors of the Saskatchewan Roughriders, as related to the flag of Saskatchewan. The Minnesota Wild of the NHL has forest green as one of their team colors. See also Pine green References Shades of green
https://en.wikipedia.org/wiki/SBS%20%28Australian%20TV%20channel%29
SBS is a national public television network in Australia. Launched on 24 October 1980, it is the responsibility of SBS's television division, and is available nationally. In 2018, SBS had a 7.7% audience share. History Origins SBS began test transmissions in April 1979 as SBS Ethnic Television when it showed various foreign language programs on ABV-2 Melbourne and ABN-2 Sydney on Sunday mornings. Full-time transmission began at on 24 October 1980 (United Nations Day) as Channel 0/28. At the time, SBS was broadcasting on UHF Channel 28 and VHF Channel 0. Bruce Gyngell, who introduced television to Australia back in 1956, was given the task of introducing the first batch of programs on the new station. The first program shown was a documentary on multiculturalism entitled Who Are We? which was hosted, produced and directed by well-known Australian journalist Peter Luck. When transmission began for the night, the opening announcement would be as follows with "Fanfare for the Common Man" by Aaron Copland playing in the background:"Welcome to Channel 0/28 Multicultural Television, Sydney and Melbourne. A section of the Special Broadcasting Service, transmitting on VHF Channel 0 with a vision carrier frequency of 46.25MHz and on UHF Channel 28 with a vision carrier frequency of 527.25MHz. As well as from the Hyatt Kingsgate Tower in Kings Cross, Sydney, on UHF Channel 54 with a vision carrier frequency of 737.25MHz." 1980s to the 1990s On 14 October 1983, the service expanded into Canberra on UHF28, Cooma and Goulburn on UHF58 and at the same time changed its name to Network 0–28. Its new slogan was the long-running "Bringing the World Back Home". On 18 February 1985, the station changed its name to SBS and began daytime transmissions. In June, SBS expanded to Brisbane, Adelaide, Newcastle, Wollongong and the Gold Coast. On 5 January 1986 SBS ceased broadcasting on the VHF0 frequency. Although many Australians at the time did not have UHF antennas, SBS's VHF license had already been extended by a year at this stage and not all antennas had worked well with the low-frequency Channel 0 either. Following this, on 16 March 1986, SBS commenced transmission in Perth, Mount Gambier, Loxton-Renmark, Port Pirie, Broken Hill, Toowoomba, Townsville, Bendigo, Ballarat, Traralgon and Hobart. Darwin was the last capital city to receive the channel, with a local signal launched on 20 May 1994. Other cities that have launched the channel on, between and beyond those days included Maryborough/Wide Bay–Burnett, Rockhampton, Mackay, Katherine, Cairns, Bunbury, Albany, Kalgoorlie, Esperance, Geraldton, Alice Springs, Tennant Creek, Mount Isa, Orange, Griffith, Mildura, Swan Hill, Wagga Wagga, Albury-Wodonga, Coffs Harbour, Lismore, Tamworth and Taree. Shepparton was the last city to launch SBS in the late 1990s. Although SBS Television commenced transmissions as a non-commercial television network, in 1991 it began accepting and broadcasting television advertisem
https://en.wikipedia.org/wiki/Faron%20Moller
Faron George Moller (born February 25, 1962 in Trail, British Columbia) is a Canadian-born British computer scientist and expert on theoretical computer science, particularly infinite-state automata theory and temporal logic. His work has focussed on structural decomposition techniques for analysing abstract models of computing systems. He is founding Director of the Swansea Railway Verification Group; Director of Technocamps; and Head of the Institute of Coding in Wales. In 2023, he as elected General Secretary of the Learned Society of Wales. Biography Moller studied mathematics and computer science as an undergraduate at the University of British Columbia, and then as a Masters student at the University of Waterloo, before going on to do a PhD supervised by Robin Milner in the Laboratory for Foundations of Computer Science at the University of Edinburgh. He has held posts at the universities of Strathclyde and Edinburgh, The Swedish Institute for Computer Science, The Royal Institute of Technology in Stockholm, and Uppsala University before moving to Wales as Professor of Computer Science at Swansea University in 2000. Appointments and honours Moller is a Fellow of the Learned Society of Wales, a Fellow of the British Computer Society and Fellow of the Institute of Mathematics and its Applications, and served as President of the British Colloquium for Theoretical Computer Science for 15 years (2004-2019). He is a Chartered Mathematician, a Chartered Scientist, and a Chartered IT Professional. His full nomenclature with post-nominal letters is Professor Faron Moller BSc, MMath, PhD, CITP, CMath, CSci, FLSW, FBCS, FIMA. He is also Director of Technocamps, a pan-Wales schools outreach programme aimed at introducing and reinforcing Computer Science and Digital Competency within all Welsh schools and inspiring young people to study computing-based topics; and Head of the Institute of Coding in Wales. See also List of University of Waterloo people References F Moller, Infinite Results, in U Montanari and V Sassone (eds.), Lecture Notes in Computer Science, Volume 1119, Springer Verlag (1996), pp195–216. O Burkart, D Caucal, F Moller and B Steffen, Verification over Infinite States, in J Bergstra, A Ponse and S A Smolka (eds.), Handbook of Process Algebra, Elsevier (2001), pp545–623. F Moller, S A Smolka and J Srba, On the Computational Complexity of Bisimulation, Redux, Information and Computation , Volume 194(2), Elsevier (2004), pp129–143. F Moller and G Struth, Modelling Computing Systems, Springer-Verlag 2013. . External links Home page Swansea Railway Verification Group Technocamps Institute of Coding in Wales British Colloquium for Theoretical Computer Science 1962 births Living people Fellows of the Learned Society of Wales Fellows of the British Computer Society Fellows of the Institute of Mathematics and its Applications British computer scientists Welsh computer scientists Canadian expatriate academics in the United
https://en.wikipedia.org/wiki/Narrowing
Narrowing may refer to: Narrowing (computer science), a type of algorithm for solving equations between symbolic expressions Narrowing of algebraic value sets, a method for the elimination of values from a solution set which are inconsistent with the equations being solved Narrowing (historical linguistics), a type of semantic change Collisional narrowing of a spectral line due to collisions of the emitting species Motional narrowing of a resonant frequency due to the inhomogeneity of the system averaging out over time Perceptual narrowing, a process in brain development Q-based narrowing, a concept in pragmatics Stenosis, the narrowing of a blood vessel or other tubular organ See also Narrow (disambiguation)
https://en.wikipedia.org/wiki/RTL%20Nederland
RTL Nederland is a Dutch media network, a subsidiary of the RTL Group. The media company is located in Hilversum, although the licences of its TV stations are issued in Luxembourg. History The history of the network dates back to 1989 when dutch minded RTL-Véronique started airing from Luxembourg. At the time commercial television was prohibited in The Netherlands, but by airing from Luxembourg the law could be bypassed. In the beginning the channel only focused on youth, this changed in 1990 when an agreement was made with Joop van den Ende whose own commercial channel TV10 failed due to the same law and the name of the channel was changed into RTL 4. In 1993 a second channel was created named RTL 5. In 1995 the two channels were merged in a new joint-venture with Veronica Association, until then part of the Dutch public broadcasting system. The new joint-venture was named Holland Media Group (HMG) and consisted of RTL 4, RTL 5, Veronica and the radio station HitRadio Veronica. From 1997 till 1998 HMG participated in TV10, together with Saban, but sold its share to Fox. The joint-venture existed until 2001 when the Veronica Association left, leaving their channel and radio station behind, but because they took the trademark the channel and radio station were renamed Yorin. The company changed its name from Holland Media Group to RTL Nederland in 2004, a year later Yorin was renamed again this time to RTL 7. In 2006 the Yorin radio station was sold to SBS Broadcasting. As of August 2007 the group entered into a new joint-venture with John de Mol, whose own commercial channel was failing at the time. RTL Nederland acquired the channel and Radio 538, John de Mol's Talpa Media Holding would acquire 26,3% of the shares in RTL Nederland. The acquired channel was renamed RTL 8 that same month. In 2011 John de Mol was forced by the Netherlands Authority for Consumers and Markets to sell his share in RTL Nederland when he and Sanoma acquired competitor SBS Broadcasting, taking with him the radio stations Radio 538, Radio 10 Gold and SLAM!FM. Acquisitions Over the years the group acquired several other companies, including Wentik Events (2010, renamed to RTL Live Entertainment), Bright (2015), Buienradar (2011), Videoland (2013), Adfactor (2017), BrandDeli (2018), Triade Media (2015). Proposed merger After John de Mol raised his stake in SBS Broadcasting in 2017 to full ownership he sought a partnership with RTL Nederland. In his opinion there wasn't enough space for two major Dutch commercial television networks in the changed media landscape, RTL shut down his offer. However in June 2021 RTL Nederland and Talpa Network announced plans for a merger, pending approval by the European Commission and the Netherlands Authority for Consumers and Markets. In the new conglomerate, RTL Nederland is to hold 70% of the shares and Talpa 30%. Talpa Entertainment Productions and Talpa Concepts won't be a part of the merger. Both parties reasoned that a merg
https://en.wikipedia.org/wiki/Career%20assessment
Career assessments are tools that are designed to help individuals understand how a variety of personal attributes (i.e., data values, preferences, motivations, aptitudes and skills), impact their potential success and satisfaction with different career options and work environments. Career assessments have played a critical role in career development and the economy in the 20th century (Whiston and Rahardja, 2005). Individuals or organizations often use assessment of some or all of these attributes, such as university career service centers, career counselors, outplacement companies, corporate human resources staff, executive coaches, vocational rehabilitation counselors, and guidance counselors to help individuals make more informed career decisions. In part, the popularity of this tool is due to the National Defense Education Act of 1958, which funded career guidance in schools. Focus was put onto tools that would help high school students determine which subjects they may want to focus on to reach a chosen career path. Since 1958, career assessment tool options have exploded. Types of career assessments Career assessments come in many forms and vary along several dimensions. The assessments selected by individuals or administrators vary depending on their personal beliefs regarding the most important criteria when considering career choices, as well as the unique needs of the individual considering a career decision. Some common points of variance are: Methodology - some assessments are quantitative in nature and precisely measure key attributes believed to influence an individual's potential success and satisfaction with a career. Others are qualitative exercises designed to help individuals clarify their goals and preferences, which can then be used to make more informed career decisions. Measured attributes - assessments vary with regard to the specific personality attributes measured. Some assessments focus on an individual's interests, and perhaps aptitude, while others focus on skills or values. More robust assessments use key development indicators (KDIs) that define measurements for specific types of careers and match individual career aspirations with the needs of companies. Validity - many assessments, particularly those offered on the internet, lack evidence for "validity," which is the degree to which interpretation of the results of the assessment or decisions made from the results are useful. Typical evidence of validity is verified empirically. Users should evaluate any tests psychometric properties when assessing whether to use it for a particular purpose, and how much weight to give to the results. When the validity of the assessment for its intended purpose cannot be evaluated, results should be interpreted with appropriate caution. Target customer profile - some assessments, such as the Strong Interest Inventory, the Myers Briggs Type Indicator, Careerscope and Traitify are designed to serve broad markets (i.
https://en.wikipedia.org/wiki/Master%20data
Master data represents "data about the business entities that provide context for business transactions". The most commonly found categories of master data are parties (individuals and organisations, and their roles, such as customers, suppliers, employees), products, financial structures (such as ledgers and cost centres) and locational concepts. Master data should be distinguished from reference data. While both provide context for business transactions, reference data is concerned with classification and categorisation, while master data is concerned with business entities. Master data is, by its nature, almost always non-transactional in nature. There exist edge cases where an organization may need to treat certain transactional processes and operations as "master data". This arises, for example, where information about master data entities, such as customers or products, is only contained within transactional data such as orders and receipts and is not housed separately. Alternative definition An alternative definition of the term master data is that it represents the business objects that contain the most valuable, agreed upon information shared across an organization. In this sense, it gives context to business activities and transactions, answering questions like who, what, when and how as well as expanding the ability to make sense of these activities through categorizations, groupings and hierarchies. It can cover relatively static reference data, transactional, unstructured, analytical, hierarchical and metadata. What constitutes master data under this definition is therefore not about an essential quality of the data (e.g. it is a business entity that provides context for business transactions), but rather about the context in which the organisation has decided to treat the data. Externally-defined master data For most organisations, most or all master data is defined and managed within that organisation. Some master data, however, may be externally defined and managed. This represents the single source of basic business data used across a marketplace, regardless of organisation or location. Thus, it can be used by multiple enterprises within a value chain, facilitating "integration of multiple data sources and literally [putting] everyone in the market on the same page." An example of market master data is the Universal Product Code (UPC) found on consumer products. Master data management Curating and managing master data is key to ensuring its quality and thus fitness for purpose. All aspects of an organisation, operational and analytical, are greatly dependent on the quality of an organization's master data. Master Data is therefore the focus of the information technology (IT) discipline of master data management (MDM). Without this discipline in place, organisations commonly encounter difficulties with having multiple versions of "the truth" about a business entity, both within individual applications, and di
https://en.wikipedia.org/wiki/Channel%2021%20%28German%20TV%20network%29
Channel 21, formerly known as RTL Shop, is a German cable and satellite shopping network based in Hanover. The network was part of Europe's largest media company RTL Group and supplies programming to more than 20 German-language stations. RTL Group is a unit of the German media company Bertelsmann. Channel 21 was launched as RTL Shop on 1 March 2001. The main competitors are HSE24 (Home Shopping Europe) and QVC. History Up until September 2006, RTL Shop was produced at the Coloneum in Cologne. In the summer of 2006, a new broadcasting center with administration and studios was set up in Hanover, which was ready for broadcast on October 1, 2006. A new edition of the product range should lead to the acquisition of female customers as well as the male target group. Cologne Broadcasting Center (CBC), a RTL Group subsidiary, was responsible for setting up and operating the broadcasting center. RTL Shop was part of the diversification strategy of the RTL Group, which had the goal of opening up additional sources of income in addition to the traditional advertising customers. On 19 February 2008 it was announced that RTL would sell RTL Shop in the first half of 2008. Since broadcasting in 2001, the station had only made losses every year despite relocating from Cologne to Hanover and restructuring. In the course of this, Walter Freiwald left the teleshopping channel in April 2008. The new owner was the investor group Aurelius AG from Munich. The goal was to be achieved profitability in the coming years. On January 1, 2009, RTL Shop gradually switched to Channel 21, and became its official name on March 1, 2009. At the same time the names of special offers were changed to recommendation of the day (Empfehlung des Tages), bonus recommendation (Bonusempfehlung), this hour only (Nur in dieser Stunde) and highlight of the week (Highlight der Woche). The logo has also been changed in stages. First, the RTL was replaced by Channel 21, later dyed in orange and gray, then proportionally larger than the shop centered under Channel 21, meanwhile without box, in the middle. Since the second half of 2009 until September 30, 2012, there has also been the branch Channel 21 Express. As of January 1, 2010, Michael Oplesch, the former managing director of the TV channel VIVA Germany, bought the first shares of Channel 21 from Aurelius AG with his Centuere AG. On February 16, 2010, the full sale of all shares in Channel 21 to Centuere AG was announced. The sale took place in full legal force on 1 March 2010. Michael Oplesch took over the management of the company. As announced on May 30, 2010, the EM.TV founder and former managing director of EM.TV Thomas Haffa already took over all shares of Centuere AG at the end of April and transferred them to the newly founded Channel 21 Holding, which has operated the channels Channel 21 and Channel 21 Express since then. On December 10, 2010, it became public that Channel 21 is threatened with bankruptcy. A large proportion
https://en.wikipedia.org/wiki/Crowdcasting
Crowdcasting is the combination of broadcasting and crowdsourcing. The process of crowdcasting uses a combination of push and pull strategies first to engage an audience and build a network of participants and then harness the network for new insights. Those insights are then used to shape broadcast programming. These insights and concepts can include new product ideas, new service ideas, new branding messages, or even scientific breakthroughs. These insights are extracted from participants' submissions. Push The 'push' aspects of crowdcasting involve a public announcement of a prize for a particular innovation, invention, achievement, or accomplishment (such as the announcement of the Ansari X-Prize in 1996). This stage of crowdcasting serves to engage a specific target audience using compelling offerings or incentives as a call to action. Pull The 'pull' aspects of crowdcasting involve building and harnessing a community of passionate participants. Crowdcasting competitions have a viral effect, as interested participants refer others to the event. Once the community is built, it can be harnessed to provide fresh perspectives, ideas, insights, prototypes, or radical breakthrough innovations. InnoCentive is an example; its challenges tap into a community of over 100,000 scientists who might provide that unexpected innovation. Openpitch.com an upstart, has embraced the concept of crowdcasting to form a virtual advertising agency. The fundamental concept of crowdcasting—harnessing a specific, often expert, community of participants—separates OpenPitch from user-generated content (UGC) sites. Much like Innocentive, OpenPitch does not share or post submissions to the overall community during development. Instead, the sites keep user submissions confidential, protecting the intellectual property rights of both the posting company and the solutions provider. What is lost by not following a more open crowdsourcing model is gained by a policy that, arguably, attracts a more professional, dedicated user base. Crowdcasting in action Aside from the advertising space, the merger of crowdsourcing with broadcast programming has been largely unexplored. One of the first to launch a "crowdcasting" application allowing listeners to take control of a radio station is LDR / "Listener Driven Radio". "Listener Driven Radio" is a software application that allows listeners to go online, or to their mobile phone, and offer their input into what plays next on the radio station. The program constantly absorbs listener input, song votes, and comments on music and automatically adapts radio station programming in real-time. Clear Channel Communications, Cox Media Group, CBS, Cumulus, Harvard Broadcasting, and many major broadcasters in the USA, Canada, and Europe are using Listener Driven Radio's technology to give audiences the ability to influence on-air programming. Internet-based crowdcasting Crowdcasting is also no longer confined to traditional broadcasti
https://en.wikipedia.org/wiki/PKCS%2011
In cryptography, PKCS #11 is one of the Public-Key Cryptography Standards, and also refers to the programming interface to create and manipulate cryptographic tokens (a token where the secret is a cryptographic key). Detail The PKCS #11 standard defines a platform-independent API to cryptographic tokens, such as hardware security modules (HSM) and smart cards, and names the API itself "Cryptoki" (from "cryptographic token interface" and pronounced as "crypto-key", although "PKCS #11" is often used to refer to the API as well as the standard that defines it). The API defines most commonly used cryptographic object types (RSA keys, X.509 certificates, DES/Triple DES keys, etc.) and all the functions needed to use, create/generate, modify and delete those objects. Usage Most commercial certificate authority (CA) software uses PKCS #11 to access the CA signing key or to enroll user certificates. Cross-platform software that needs to use smart cards uses PKCS #11, such as Mozilla Firefox and OpenSSL (using an extension). It is also used to access smart cards and HSMs. Software written for Microsoft Windows may use the platform specific MS-CAPI API instead. Both Oracle Solaris and Red Hat Enterprise Linux contain implementations for use by applications, as well. Relationship to KMIP The Key Management Interoperability Protocol (KMIP) defines a wire protocol that has similar functionality to the PKCS#11 API. The two standards were originally developed independently but are now both governed by an OASIS technical committee. It is the stated objective of both the PKCS#11 and KMIP committees to align the standards where practicable. For example, the PKCS#11 Sensitive and Extractable attributes are being added to KMIP version 1.4. There is considerable overlap between members of the two technical committees. History The PKCS#11 standard originated from RSA Security along with its other PKCS standards in 1994. In 2013, RSA contributed the latest draft revision of the standard (PKCS#11 2.30) to OASIS to continue the work on the standard within the newly created OASIS PKCS11 Technical Committee. The following list contains significant revision information: 01/1994: project launched 04/1995: v1.0 published 12/1997: v2.01 published 12/1999: v2.10 published 01/2001: v2.11 published 06/2004: v2.20 published 12/2005: amendments 1 & 2 (one-time password tokens, CT-KIP ) 01/2007: amendment 3 (additional mechanisms) 09/2009: v2.30 draft published for review, but final version never published 12/2012: RSA announce that PKCS #11 management is being transitioned to OASIS 03/2013: OASIS PKCS #11 Technical Committee Inaugural meetings, works starts on v2.40 04/2015: OASIS PKCS #11 v2.40 specifications become approved OASIS standards 05/2016: OASIS PKCS #11 v2.40 Errata 01 specifications become approved OASIS errata 07/2020: OASIS PKCS #11 v3.0 specifications become approved OASIS standards See also List of applications using PKCS #11 Micros
https://en.wikipedia.org/wiki/Kelly%20Wright
Kelly Wright is an American reporter for the New Tang Dynasty Television. Formally with Fox News, he was the co-anchor of America's News Headquarters on Saturday, and was based in the network’s Washington, D.C., bureau. He was a co-host of Fox and Friends Weekend from July 2006 to January 2008. Most recently, Wright reported from Tampa, Florida, on the Terri Schiavo story. In 2004 Wright spent nearly three months reporting on the developments in Iraq. He was among the first reporters to cover the Abu Ghraib prison scandal and the subsequent court martial cases held in Baghdad. Wright also spent time embedded with U.S. and British troops, reporting on the military’s humanitarian efforts in Baghdad, Basrah, and Mosul. Wright also provided coverage on U.S. forces training Iraqi security forces. Additionally, he reported on the historic U.S. handover of sovereignty to Iraq. Beyond Iraq, Wright extensively covered the 2004 presidential election, including the Democratic presidential race, the New Hampshire primary, and the South Carolina primary. In October 2003, Wright reported live from the Congressional Black Caucus/FNC Democratic presidential candidate debate in Detroit. Before joining Fox News Channel, Wright worked as an anchor/reporter at WAVY-TV/WVBT-TV in Norfolk, VA, co-anchoring the Fox affiliate's first primetime newscast (produced by WAVY) from 1998 until 2003. During his tenure there, he covered a wide range of stories, including a historical event in Benin, West Africa, where African presidents Mathieu Kérékou of Benin, Jerry Rawlings of Ghana, and representatives from the United States, England, France and the Dominican Republic apologized for their role in slavery. Previously, Wright served as a weekend news anchor and reporter for WRAL-TV in Raleigh, N.C. Wright secured numerous rare interviews, including a 1996 exclusive interview with O. J. Simpson following the criminal court trial. Wright has also served as a general assignment reporter for WWOR-TV in New York. He reported on numerous high-profile newsmakers and events for the station, including John Gotti, Amy Fisher, the Howard Beach and Bensonhurst murder trials, and the 1989 Central Park jogger rape case. Wright began his journalism career in 1977 while serving in the United States Army. Wright has received numerous awards for his reporting, including two local Emmy Awards for his developing, reporting and co-producing a documentary and news series on the transatlantic slave trade. In 2017, Wright joined a lawsuit against Fox News for racial discrimination. Documents submitted to the court showed that Wright's annual salary while working at Fox was $400,000 Wright also worked for the Black News Channel. References External links Wright's bio on FOXNews.com Year of birth missing (living people) Living people American television journalists Oral Roberts University alumni Fox News people American expatriates in Iraq American expatriates in Benin
https://en.wikipedia.org/wiki/Computation%20history
In computer science, a computation history is a sequence of steps taken by an abstract machine in the process of computing its result. Computation histories are frequently used in proofs about the capabilities of certain machines, and particularly about the undecidability of various formal languages. Formally, a computation history is a (normally finite) sequence of configurations of a formal automaton. Each configuration fully describes the status of the machine at a particular point. To be valid, certain conditions must hold: the first configuration must be a valid initial configuration of the automaton and each transition between adjacent configurations must be valid according to the transition rules of the automaton. In addition, to be complete, a computation history must be finite and the final configuration must be a valid terminal configuration of the automaton. The definitions of "valid initial configuration", "valid transition", and "valid terminal configuration" vary for different kinds of formal machines. A deterministic automaton has exactly one computation history for a given initial configuration, though the history may be infinite and therefore incomplete. Finite State Machines For a finite state machine , a configuration is simply the current state of the machine, together with the remaining input. The first configuration must be the initial state of and the complete input. A transition from a configuration to a configuration is allowed if for some input symbol and if has a transition from to on input . The final configuration must have the empty string as its remaining input; whether has accepted or rejected the input depends on whether the final state is an accepting state. Turing Machines Computation histories are more commonly used in reference to Turing machines. The configuration of a single-tape Turing machine consists of the contents of the tape, the position of the read/write head on the tape, and the current state of the associated state machine; this is usually written where is the current state of the machine, represented in some way that's distinguishable from the tape language, and where is positioned immediately before the position of the read/write head. Consider a Turing machine on input . The first configuration must be , where is the initial state of the Turing machine. The machine's state in the final configuration must be either (the accept state) or (the reject state). A configuration is a valid successor to configuration if there's a transition from the state in to the state in which manipulates the tape and moves the read/write head in a way that produces the result in . Decidability results Computation histories can be used to show that certain problems for pushdown automata are undecidable. This is because the language of non-accepting computation histories of a Turing machine on input is a context-free language recognizable by a non-deterministic pushdown
https://en.wikipedia.org/wiki/ParticleIllusion
particleIllusion (pIllusion for short) is a stand-alone computer graphics application based on the particle system technique which allows users to create graphical animations, e.g. fire, explosions, smoke, fireworks, and various abstract visual effects. The predecessor of pIllusion is Illusion 2 (1999~2001) which is licensed to Impulse Inc. The chief programmer, Alan Lorence, was in disagreement with Impulse Inc and formed another company by the name of Wondertouch. The upgraded version of Illusion has been rebranded and released as particleIllusion 3.0, which features new functions such as super emitter and force field. Overview The program works solely in two-dimensional space, but the random motion of particles may provide a virtually three-dimensional animation. pIllusion can be supported by OpenGL to accelerate the rendering speed which allows an accurate real-time preview with a proper video display card. Recently, pillusion has implemented a three-dimensional simulation function as of its recent free-to-download update. References External links 2D animation software
https://en.wikipedia.org/wiki/Yasuko%20Tajima
(born 8 May 1981 in Kanagawa) is a former medley swimmer from Japan. She won the silver medal in the 400m Individual Medley at the 2000 Summer Olympics in Sydney, Australia. References databaseOlympics Profile on FINA-site 1981 births Living people Olympic swimmers for Japan Swimmers at the 2000 Summer Olympics Olympic silver medalists for Japan Sportspeople from Kanagawa Prefecture Japanese female medley swimmers World Aquatics Championships medalists in swimming Asian Games medalists in swimming Medalists at the 2000 Summer Olympics Olympic silver medalists in swimming Asian Games gold medalists for Japan Asian Games silver medalists for Japan Swimmers at the 1998 Asian Games Medalists at the 1998 Asian Games
https://en.wikipedia.org/wiki/Ellen%20Harvelle
Ellen Harvelle is a fictional character on The CW Television Network's Supernatural, portrayed by Samantha Ferris. Introduced in the second season in order to explore a mother-daughter relationship in the hunting world, the "gun-toting, beer-slinging" Ellen brought a "maternal energy" to the male-dominated series. The mother of Jo Harvelle and the proprietor of Harvelle's Roadhouse—a bar frequented by hunters of supernatural creatures—Ellen provides advice and assistance to Sam and Dean Winchester throughout the second season. Although the character's appearances in the third season were dropped due to the 2007–2008 Writers Guild of America strike and failed negotiations, she returns in the fifth and sixth seasons. Critical reception to the character has been positive, with many critics happy to see her return. Plot An old friend of John Winchester, Ellen Harvelle is the wife of hunter William Anthony Harvelle and the mother of Jo Harvelle. She runs Harvelle's Roadhouse, a saloon and pub frequented by hunters of supernatural creatures. When Sam and Dean Winchester arrive there in the second-season episode "Everybody Loves a Clown", a wary Ellen holds them at gunpoint until she learns that they are John's sons. She gives them information regarding a dangerous hunter named Gordon Walker in "Bloodlust", while Sam and Dean later explain to her in "Simon Said" about the demon Azazel's planned war against humanity. Her relationship with the brothers is strained in the episode "No Exit", where she reveals that she believes her husband's death was the result of a mistake made by John Winchester while they were working together on a hunt. However, she admits to Sam in "Hunted" that her husband's death was not John's fault and that she had forgiven him a long time ago. She also does not blame the brothers for Jo's decision to go off hunting by herself. The Roadhouse is destroyed by demons in "All Hell Breaks Loose, Part One", and her whereabouts are unknown throughout the episode. It is revealed in "Part Two" that she had left the Roadhouse to run a few errands. She, the Winchesters, and fellow hunter Bobby Singer track Azazel's activities to a cemetery surrounded by a giant devil's trap made of railroad tracks. Unable to step inside the giant symbol without becoming trapped and powerless, Azazel forces the human Jake Talley to do his bidding. The hunters are unable to stop Jake from opening a gateway to Hell in a mausoleum there, and the devil's trap is broken as hundreds of demons are released into the world. As the brothers then kill Azazel, Ellen and Bobby close the gateway. In the fifth-season episode "Good God, Y'all!", Ellen reappears with Jo to help fellow hunter Rufus kill demons that have laid siege to a small town. By the time the Winchesters arrive, it appears that Jo, Rufus, and some other townspeople have become demonically possessed. However, Ellen and Dean eventually realize that War, one of the Four Horsemen of the Apocalypse, is making
https://en.wikipedia.org/wiki/PowerCADD
PowerCADD is a computer-aided design and drafting (CADD) software program for the Apple Macintosh platform developed from out of the PowerDraw platform of the mid-1980s by Greensboro, North Carolina-based Engineered Software. History The development of PowerCADD began with PowerDraw, a true CADD alternative to MacDraw that was released in the mid-1980s. The online user group from GEnie that participated in outlining the capabilities of the new CADD program were invited to initiate a graphics forum on Applelink Personal Edition in 1987. Description PowerCADD is a two-dimensional, WYSIWYG drawing program developed mainly to reproduce the familiarity of manual technical drawing with the advantages of a full geometry tool set (including bezier) and computer graphics, allowing the full mix of line art and raster images. PowerCADD is a full metaphor for the design board, providing an elegant easy to learn and easy to use interface, with the integration of both Imperial and Metric dimensioning in familiar "real world" scales. An add-on tool set, called WildTools, was developed by an independent programmer, bringing a number of new capabilities to the program, including isometric and perspective-drawing tools. Both are available in "demo" form to allow hands-on trial use. The current shipping version is PowerCADD 9, which was released August 2010. PowerCADD 9 is an Apple Intel Only application. Versions PowerDraw 1 for the 680x0 Mac, released September 1987 PowerDraw 2 for the 680x0 Mac PowerDraw 3 for the 680x0 Mac PowerDraw 4 for the 680x0 Mac PowerDraw 5 for the 680x0 Mac PowerDraw 6 for the 680x0 Mac and PowerCADD 1 for the PPC Mac OS 7 (then known as Macintosh System 7) PowerCADD 2 released October 1995 PowerCADD 3 released in late 1996 PowerCADD 4 PowerCADD 2000 (PowerCADD 5), released May 2000. Major enhancements to text handling and symbol data. PowerCADD 6, released May 2003, the first Mac OS X native version with Aqua interface. PowerCADD 7, released January 2006. Featuring transparent objects and layers, improved DWG/DXF translation, and global management of drawing attributes. PowerPC hardware and related Mac OS X Software required. PowerCADD 8 for Intel-based Apple hardware released March 2008 PDF Brochure Link PowerCADD 9 for Intel-based Apple hardware released August 2010 PDF Brochure Link See also Comparison of CAD editors for CAE References Dornell, Lisa (2007) "Under one roof." Apple.com/smallbusiness. Martinez, Carlos Domingo (January 1997) "PowerCADD 3.0." MacWorld. Seiter, Charles (December 2000) "PowerCADD 2000: Drawing-Friendly Program Makes CAD Fun and Easy." MacWorld. "Special Report: PowerCADD, Macs, FormZ and VectorWorks, dominate tools used for Record House Award winners" Architosh News. External links PowerCADD Product Page at engsw.com 2D Computer-aided design software Classic Mac OS software Vector graphics editors
https://en.wikipedia.org/wiki/Jo%20Harvelle
Joanna Beth Harvelle is a fictional character on The CW Television Network's drama/horror television series Supernatural portrayed by Alona Tal. Aspiring to be a hunter of supernatural creatures like her parents, she was introduced in the second season in order to explore a mother-daughter relationship in the hunting world. She was ultimately removed from the series by the end of the second season—Kripke admitted the conception of the character was flawed from the beginning—but returned in the fifth and seventh seasons. Plot Jo first meets Sam and Dean Winchester in the second season episode "Everybody Loves a Clown". The brothers look for her mother Ellen at Harvelle's Roadhouse—a saloon frequented by hunters of supernatural creatures—after she leaves a voice mail message on the phone of their deceased father, John Winchester. Throughout the second season, Jo appears to have romantic feelings for Dean, but Dean does not have feelings for her, it seems to him that she is like a sister to him. Wanting to be a hunter like her late father, Bill, to feel connected to him, Jo slips away from the Roadhouse against her mother's wishes to help the brothers on a hunt in "No Exit", but they ultimately have to rescue her from a vengeful spirit. An angry Ellen reveals to her that John's recklessness caused Bill's death, which strains Jo's friendship with Sam and Dean. Jo soon leaves the Roadhouse to live the life of a hunter. When the demon that once possessed Meg Masters possesses Sam in "Born Under a Bad Sign", it finds and captures Jo, planning to threaten her life to force Dean to kill his brother. While holding Jo hostage, the demon plays cruel mind games with her by first telling her that Dean doesn't return her feelings for him and then by telling her that John actually killed Bill to "put him out of his misery" after he incurred fatal wounds, despite Bill's pleas to see his wife and daughter one more time. Dean rescues Jo without harming Sam, but when Jo attempts to join him in capturing the demon, he refuses to allow her to come; he tells Jo he will call her, but as he leaves, she mutters, "No, you won't." In the fifth season episode "Good God, Y'All!", Jo reappears with her mother Ellen in a small Colorado town called River Pass. They plan to help Rufus, a demon hunter and one of Bobby's friends, kill the demons that have laid siege to the town. However, Jo and Ellen are separated in the chaos. Jo later finds and joins up with Rufus and other townspeople. Eventually, they attack Sam and Ellen, both of them appearing to be possessed by demons. Jo joins in with Rufus to torture the supposed "demon" out of a captured Sam with holy water and salt, but becomes doubtful when no demonic effects are present on Sam. Dean and Ellen arrive and, after a brief struggle, convince Jo and Rufus that War, one of the Four Horsemen of the Apocalypse, is responsible for making all the townspeople turn against each other by thinking that both sides are demons. Jo
https://en.wikipedia.org/wiki/Anti%E2%80%93computer%20forensics
Anti–computer forensics or counter-forensics are techniques used to obstruct forensic analysis. Definition Anti-forensics has only recently been recognized as a legitimate field of study. One of the more widely known and accepted definitions comes from Marc Rogers. One of the earliest detailed presentations of anti-forensics, in Phrack Magazine in 2002, defines anti-forensics as "the removal, or hiding, of evidence in an attempt to mitigate the effectiveness of a forensics investigation". A more abbreviated definition is given by Scott Berinato in his article entitled, The Rise of Anti-Forensics. "Anti-forensics is more than technology. It is an approach to criminal hacking that can be summed up like this: Make it hard for them to find you and impossible for them to prove they found you." Neither author takes into account using anti-forensics methods to ensure the privacy of one's personal data. Sub-categories Anti-forensics methods are often broken down into several sub-categories to make classification of the various tools and techniques simpler. One of the more widely accepted subcategory breakdowns was developed by Dr. Marcus Rogers. He has proposed the following sub-categories: data hiding, artifact wiping, trail obfuscation and attacks against the CF (computer forensics) processes and tools. Attacks against forensics tools directly has also been called counter-forensics. Purpose and goals Within the field of digital forensics, there is much debate over the purpose and goals of anti-forensic methods. The conventional wisdom is that anti-forensic tools are purely malicious in intent and design. Others believe that these tools should be used to illustrate deficiencies in digital forensic procedures, digital forensic tools, and forensic examiner education. This sentiment was echoed at the 2005 Blackhat Conference by anti-forensic tool authors, James Foster and Vinnie Liu. They stated that by exposing these issues, forensic investigators will have to work harder to prove that collected evidence is both accurate and dependable. They believe that this will result in better tools and education for the forensic examiner. Also, counter-forensics has significance for defence against espionage, as recovering information by forensic tools serves the goals of spies equally as well as investigators. Data hiding Data hiding is the process of making data difficult to find while also keeping it accessible for future use. "Obfuscation and encryption of data give an adversary the ability to limit identification and collection of evidence by investigators while allowing access and use to themselves." Some of the more common forms of data hiding include encryption, steganography and other various forms of hardware/software based data concealment. Each of the different data hiding methods makes digital forensic examinations difficult. When the different data hiding methods are combined, they can make a successful forensic investigation nearly impossibl
https://en.wikipedia.org/wiki/Rail%20transport%20in%20Botswana
Rail services in Botswana are provided by Botswana Railways in Botswana. Most routes in the country radiate from Gaborone. The railway network consists of 888 km, its gauge is 1,067 mm (3 ft 6 in) cape gauge. Botswana is an associate member of the International Union of Railways (UIC). Botswana has the 93rd longest railway network in the world, it is one of the busiest railways in Africa. History The first section of railway track in Botswana was laid in 1896. Mafeking (now Mafikeng) was then the rail-head and the administrative capital of the British Protectorate of Bechuanaland, now Botswana, even though the town was not within that Protectorate, but was then in the Cape Province of South Africa. The town was the base for the construction of the railway through Botswana to Rhodesia (now Zimbabwe, part of the ambition of Cecil Rhodes for a "Cape to Cairo" railway. The section through Botswana was built to connect to Bulawayo in Zimbabwe, a route previously covered by horse-drawn stage-coaches. The first train arrived in Bulawayo on 19th October 1897. The current owner, Botswana Railways (BR), was created in 1987 when the government of Botswana bought out the Botswana-based sections of the National Railways of Zimbabwe (NRZ).[1] NRZ had been initially operating the rail system after Botswana had gained independence. Management of the BR is supported by RITES Ltd. of India. The opening of the Beitbridge Bulawayo Railway in Zimbabwe in 1999 resulted in a major drop in the volume of freight transit and income. As a response the BR has been considering the construction of a direct line to Zambia (Zambia Railways), bypassing Zimbabwe, to regain income from transit. Freight trains Over half of BR's freight traffic is in coal, grain and intermodal freight, and the vast majority of its profits are made in South Africa. It also ships automotive parts and assembled automobiles, sulphur, fertilizers, other chemicals, forest products and other types of commodities. Since 1987, coal has become a major commodity hauled by BR. Coal is shipped in unit trains from coal mines to nearby countries. Passenger trains The train was the primary mode of long-distance transport in Botswana until 2009. It also custom-built many of its passenger cars to be able to meet the demands of the lower class. All passenger services were discontinued in 2009, with the only remaining service being an international link to Zimbabwe from Francistown. Freight trains still operate. Passenger service was expected to resume in late 2015.[1] Passenger services were later re-introduced in March 2016. Botswana Railways run two nightly passenger trains, one from Lobatse to Francistown, and the other from Francistown to Lobatse, with stops in Gaborone, Mahalapye, Palapye, and Serule. The passenger train is termed the "BR Express" (Botswana Railways Express). Sleeping and Dining Department Sleeping cars were operated by BR itself. The BR decided from the very beginning that it
https://en.wikipedia.org/wiki/Nishi-Akashi%20Station
is a passenger railway station located in the city of Akashi, Hyōgo, Japan, operated by West Japan Railway Company (JR West). As part of the Urban Network, the ICOCA, Suica, PiTaPa, TOICA and SUGOCA can all be used on the San'yō Main Line (they can not be used for Shinkansen service). Lines Nishi-Akashi Station is served by the JR San'yō Main Line, and is located 22.8 kilometers from the terminus of the line at and 55.9 kilometers from . On the San'yō Shinkansen, the station is 59.7 kilometers from and 612.3 kilometers from . Station layout The Shinkansen and regular train platforms are located some distance from each other, and are connected by a pedestrian overpass located above a public road. As the overpass to the regular platform is inaccessible from the south entrance to the station, passengers are allowed to access it via the Shinkansen side of the station. The station has a Midori no Madoguchi staffed ticket office. Barrier-free access In order to better serve passengers with different needs, escalators and elevators are located in the following areas: Escalator Within the west concourse area, one ascending and one descending Elevators East entrance: On the north and south sides, accessible without need of a ticket West entrance: One each on the concourse, Shinkansen platform, and regular train platform Platforms The San'yō Shinkansen has two elevated opposed side platforms. There are two pass-through lines between the two platforms as well, allowing trains to go through the station without stopping. The San'yō Main Line (JR Kōbe Line) has three island platforms which can handle six trains simultaneously. Adjacent stations History Nishi-Akashi station opened on 1 April 1944. With the privatization of the Japan National Railways (JNR) on 1 April 1987, the station came under the aegis of the West Japan Railway Company. Station numbering was introduced to the Kobe Line platforms in March 2018 with Nishi-Akashi being assigned station number JR-A74. Passenger statistics In fiscal 2019, the station was used by an average of 32,049 passengers daily Surrounding area Kōbe Nishi-ku Branch Municipal Offices Kawasaki Heavy Industries Akashi Plant Highway access National Route 2 National Route 250 Hyōgo Prefectural Route 21 (Kōbe-Akashi Route) See also List of railway stations in Japan References External links JR West station information JR Kobe Line Sanyō Main Line Sanyō Shinkansen Railway stations in Hyōgo Prefecture Railway stations in Japan opened in 1944 Akashi, Hyōgo
https://en.wikipedia.org/wiki/KGJT-CD
KGJT-CD, virtual and UHF digital channel 27, is a low-powered, Class A MyNetworkTV-affiliated television station licensed to Grand Junction, Colorado, United States and serving Colorado's Western Slope region. Owned by Nexstar Media Group, it is a sister station to CBS affiliate KREX-TV (channel 5); Nexstar also operates Fox affiliate KFQX (channel 4) under a shared services agreement (SSA) with owner Mission Broadcasting. The three stations share studios on Hillcrest Avenue in downtown Grand Junction; KGJT-CD's transmitter is located at Land's End, east of the city. History The station signed on for the first time on January 5, 1995, originally affiliated with Fox, until that network moved to the newly established KFQX in June 2000, in which the station would affiliate with UPN, and stayed with that network until that network folded in September 2006. After KGJT's subsequent affiliation with the new MyNetworkTV programming service, its programming became available on KREX-TV's digital signal. On January 20, 2008 at approximately 8:45 a.m., a fire knocked KREX, KFQX and KGJT off the air. The station's building and 50 years worth of archives were a total loss. Following the fire, KGJT began to simulcast KREX-TV's signal, except for Colorado Rockies baseball games on Sundays. KGJT resumed a separate schedule with MyNetworkTV programming towards the end of 2008. KGJT airs newscasts from its sister station, KREX-TV. The simulcasts only include the weekday morning newscast (5–7 a.m.) Digital channels The station's digital signal is multiplexed: References External links KREX-TV Official website MyNetworkTV affiliates GJT-CD Low-power television stations in Colorado Television channels and stations established in 1995 1995 establishments in Colorado Nexstar Media Group
https://en.wikipedia.org/wiki/Intel%20iPSC
The Intel Personal SuperComputer (Intel iPSC) was a product line of parallel computers in the 1980s and 1990s. The iPSC/1 was superseded by the Intel iPSC/2, and then the Intel iPSC/860. iPSC/1 In 1984, Justin Rattner became manager of the Intel Scientific Computers group in Beaverton, Oregon. He hired a team that included mathematician Cleve Moler. The iPSC used a hypercube of connections between the processors internally inspired by the Caltech Cosmic Cube research project. For that reason, it was configured with nodes numbering with power of two, which correspond to the corners of hypercubes of increasing dimension. Intel announced the iPSC/1 in 1985, with 32 to 128 nodes connected with Ethernet into a hypercube. The system was managed by a personal computer of the PC/AT era running Xenix, the "cube manager". Each node had a 80286 CPU with 80287 math coprocessor, 512K of RAM, and eight Ethernet ports (seven for the hypercube interconnect, and one to talk to the cube manager). A message passing interface called NX that was developed by Paul Pierce evolved throughout the life of the iPSC line. Because only the cube manager had connections to the outside world, developing and debugging applications was difficult. The basic models were the iPSC/d5 (five-dimension hypercube with 32 nodes), iPSC/d6 (six dimensions with 64 nodes), and iPSC/d7 (seven dimensions with 128 nodes). Each cabinet had 32 nodes, and prices ranged up to about half a million dollars for the four-cabinet iPSC/d7 model. Extra memory (iPSC-MX) and vector processor (iPSC-VX) models were also available, in the three sizes. A four-dimensional hypercube was also available (iPSC/d4), with 16 nodes. iPSC/1 was called the first parallel computer built from commercial off-the-shelf parts. This allowed it to reach the market about the same time as its competitor from nCUBE, even though the nCUBE project had started earlier. Each iPSC cabinet was (overall) 127 cm x 41 cm x 43 cm. Total computer performance was estimated at 2 MFLOPS. Memory width was 16-bit. Serial #1 iPSC/1 with 32 nodes was delivered to Oak Ridge National Laboratory in 1985. iPSC/2 The Intel iPSC/2 was announced in 1987. It was available in several configurations, the base setup being one cabinet with 16 Intel 80386 processors at 16 MHz, each with 4 MB of memory and a 80387 coprocessor on the same module. The operating system and user programs were loaded from a management PC. This PC was typically an Intel 301 with a special interface card. Instead of Ethernet, a custom Direct-Connect Module with eight channels of about 2.8 Mbyte/s data rate each was used for hypercube interconnection. The custom interconnect hardware resulting in higher cost, but reduced communication delays. The software in the management processor was called the System Resource Manager instead of "cube manager". The system allows for expansion up to 128 nodes, each with processor and coprocessor. The base modules could be upgraded to the S
https://en.wikipedia.org/wiki/Fred%20Moore%20%28activist%29
Fred Moore (1941–1997) was an American political activist who was central to the early history of the personal computer. Moore was an active member of the People's Computer Company and one of the founders of the Homebrew Computer Club, urging its members to "bring back more than you take." Fred Moore was also active in disarmament and social justice activism, as well as nonviolent civil disobedience and direct actions. As a UC Berkeley freshman in 1959, he held a two-day hunger strike on campus against the compulsory Reserve Officers' Training Corps (ROTC) program, attracting media attention and influencing later activists of the student movement of the 1960s. After the 1980 reinstitution of draft registration in the United States, Moore became a leader in the draft resistance movement, for a time editing the newspaper, Resistance News. Moore was a single father, raising his daughter Irene Moore, born 1968. He married Julie Kiser in 1992, and they had a daughter Mira Moore, born 1993. Moore died in an automobile accident in 1997. Skool Resistance Moore applied the politics of draft resistance to what he saw as an oppressive educational system summarised in the institution of school. In 1971 he published Skool Resistance where he said "Learning is living. If you try to separate learning from living, you end up with some artificial environment that can be defined as skool." Homebrew Computer Club Fred was co-founder with Gordon French of the Homebrew Computer Club which first met on March 5, 1975. This club was subsequently called "the crucible for an entire industry." In popular culture Moore is prominently featured in the books What the Dormouse Said by John Markoff and Hackers: Heroes of the Computer Revolution by Steven Levy. Both highlight Moore's contribution to the democratization of the Internet and access to computer technology. Markoff wrote in 2000 that Moore's "original communitarian vision of the power of personal computers has re-emerged to challenge the computer industry's status quo, in the form of the free software movement." See also Walking Rainbow: Fred Moore Remembered, a film by Markley Morris References External links Life Outside the Mainframe, Peacework, August 2005 People in information technology 1942 births 1997 deaths American anti-war activists Place of birth missing Place of death missing
https://en.wikipedia.org/wiki/Tree%20rearrangement
Tree rearrangements are deterministic algorithms devoted to search for optimal phylogenetic tree structure. They can be applied to any set of data that are naturally arranged into a tree, but have most applications in computational phylogenetics, especially in maximum parsimony and maximum likelihood searches of phylogenetic trees, which seek to identify one among many possible trees that best explains the evolutionary history of a particular gene or species. Basic tree rearrangements The simplest tree-rearrangement, known as nearest-neighbor interchange, exchanges the connectivity of four subtrees within the main tree. Because there are three possible ways of connecting four subtrees, and one is the original connectivity, each interchange creates two new trees. Exhaustively searching the possible nearest-neighbors for each possible set of subtrees is the slowest but most optimizing way of performing this search. An alternative, more wide-ranging search, subtree pruning and regrafting (SPR), selects and removes a subtree from the main tree and reinserts it elsewhere on the main tree to create a new node. Finally, tree bisection and reconnection (TBR) detaches a subtree from the main tree at an interior node and then attempts all possible connections between edges of the two trees thus created. The increasing complexity of the tree rearrangement technique correlates with increasing computational time required for the search, although not necessarily with their performance. SPR can be further divided into uSPR: Unrooted SPR, rSPR: Rooted SPR. uSPR is applied to unrooted trees, and goes like this: break any edge. Join one end of the edge (selected arbitrarily) to any other edge in the tree. rSPR is applied to rooted trees*, and goes: break any edge except the edge leading to the root node. Join one end of the edge (specifically: the end of the edge that is FURTHEST from the root) and attach it to any other edge of the tree. * In this example the root of the tree is marked by a node of degree one, meaning that all nodes in the tree have either degree 1 or degree 3. An alternative approach, used in Bordewich and Semple, is to consider the root node to have degree 2, and to have a special rule for rSPR. The number of SPR or TBR moves needed to get from one tree to another can be calculated by producing a Maximum Agreement Forest comprising (respectively) rooted or unrooted trees. This problem is NP hard but Fixed Parameter Tractable. Tree fusion The simplest type of tree fusion begins with two trees already identified as near-optimal; thus, they most likely have the majority of their nodes correct but may fail to resolve individual tree "leaves" properly; for example, the separation ((A,B),(C,D)) at a branch tip versus ((A,C),(B,D)) may be unresolved. Tree fusion swaps these two solutions between two otherwise near-optimal trees. Variants of the method use standard genetic algorithms with a defined objective function to swap high-scoring subtree
https://en.wikipedia.org/wiki/On%20the%20Spot
On the Spot may refer to: On the Spot (2003 TV series), an American sketch comedy television series which aired during 2003 on the WB Television Network On the Spot (2011 TV series), an American reality/trivia television series that debuted in syndication in 2011 On the Spot (Australian TV program), an Australian religious panel discussion television program that aired on Melbourne TV station GTV-9 from 1959 to 1960 On the Spot (Canadian TV series), a Canadian television series produced by the National Film Board of Canada from 1953 to 1954 On the Spot (Hungarian TV series), a Hungarian documentary television series On the Spot (UK game show), a game show in the United Kingdom, which is also in conjunction with the National Lottery On the Spot (U.S. game show), a locally produced game show which aired from 1984 to 1988 on KGW-TV in Portland, OR On the Spot (webcast), a weekly webcast hosted by GameSpot On the Spot (Rooster Teeth), a weekly online game show "On the Spot", a retired pricing game from The Price Is Right On the Spot, a New Zealand convenience store chain run by Foodstuffs On the Spot!, 1967 album by Jaki Byard On the Spot (play), a 1930 play by Edgar Wallace On the Spot (film), a 1940 American comedy film
https://en.wikipedia.org/wiki/Metrologic%20Instruments
Metrologic Instruments is an automated identification and data capture (AIDC) company headquartered in Blackwood, New Jersey. It designs, manufactures, and markets bar code decoding hardware, adaptive optical solutions, and high-speed image processing software. Metrologic Instruments is a division of Honeywell with more than 20 sales and manufacturing sites in North and South America, Europe, Asia, Australia, and Russia. It was founded in 1968 by C. Harry Knowles and initially concentrated on the manufacture of helium–neon laser kits for academic instruction. These kits were sold to physics teachers throughout the United States. In 1975 after breakthroughs in bar coding technology, it developed the world's first hand-held helium–neon laser bar code scanner. These bar code scanners utilize a broad array of technologies including laser, holographic, vision-based, and radio-frequency identification (RFID). The scanners help merchants process bar-coded merchandise. Today, Metrologic Instruments manufactures over 40 different types of bar code scanners used by retailers, healthcare professionals, postal services, and distribution companies around the world. , Metrologic Instruments had over 350 registered patents with approximately another 130 patents pending. Honeywell acquired Metrologic in July 2008. Metrologic world-firsts 1969 Metrologic introduces helium–neon laser hobby kits 1975 Metrologic introduces hand-held retail laser scanner 1976 Metrologic introduces programmable bar code verifier 1982 Metrologic introduces hand-held laser scanner with built-in decoder 1990 Metrologic introduces triggerless hand-held laser scanner 1993 Metrologic introduces triggerless wearable laser scanner 1996 Metrologic uses holographic technology in industrial applications 2000 Metrologic introduces CodeGate data transmission technology 2002 Metrologic introduces laser-illuminated imaging Metrologic milestones 1968 Metrologic founded by laser technology pioneer C. Harry Knowles 1970 Metrologic begins selling helium neon instructional laser kits to high school and college science teachers. 1986 Metrologic opens first overseas office in Garching, Germany 1992 Metrologic hires Kevin DiPlacido to the Engineering dept. 1994 Metrologic's initial public offering 1998 Metrologic opens regional office in Singapore 1998 R&D and manufacturing center established in Suzhou, China 2001 Surpassed $100 million in annual sales 2003 Metrologic Japan established 2004 Metrologic Russia established 2004 Metrologic surpasses $150 million in annual sales 2004 Metrologic acquires Omniplanar, Inc. for $13 million and names Garrett Russell the General Manager of the division. 2004 Metrologic registered patents surpass 250s 2005 Metrologic surpasses $200 million in annual sales 2008 Metrologic Acquired by Honeywell References Manufacturing companies based in New Jersey Companies based in Camden County, New Jersey
https://en.wikipedia.org/wiki/Transparent%20LAN%20Service
Transparent LAN Service (TLS) is a service from a carrier linking together remote Ethernet networks. It is called "transparent" because the connected networks are viewed as one contiguous network by the customer, regardless of the deployed technology by the carrier in between. Its primary real world deployment is usually limited to corporations who 1) require remote office or back-end data center connectivity at close to LAN speed, and 2) do not have in-house expertise in WAN management, as TLS is usually purchased as a fully managed service (meaning the carrier chosen owns, configures, monitors, and maintains the equipment needed for the service to function). The availability of TLS service depends on the carrier's underlying network architecture. In most cases, it is only available in large metropolitan areas and office buildings, campuses, or data centers large enough to warrant the proper equipment. Transparent LAN service between two sites has been successful, but multipoint transparent LANs have been problematic due to the difference in architecture between the broadcast-based Ethernet and the carrier's point-to-point network. The VPLS (a type of VPN) standard was developed to resolve the problem using IP and MPLS routers. References Ethernet Data transmission
https://en.wikipedia.org/wiki/Junior%20Magazine
Junior Magazine was a TV programme for teenagers, which ran for 7 years on CBC Television's coast to coast network, seen Sundays from 2-3 p.m. Fred Rainsberry was largely responsible for running the Children's Television Department for the Canadian Broadcasting Corporation, out of their Jarvis Street studios in Toronto during the 1950s and '60s. The host was a recent arrival from England, John Clark, leaving behind his Just William image. The series began in 1955, with Clark introducing short documentary films, and the format was expanded when co-hosts were brought in, Hank Hedges presenting nature subjects, and Doug Maxwell covering sports. Producer Bruce Attridge introduced a little culture to the program with music and dance sequences, and young Roberta Maxwell joined the team in 1957 for 2 years, before exiting to pursue an acting career. Disney selected the show to be their Canadian outlet for their children's films, and the program's objectives were expanded in 1958, when Clark would take off on weekly jaunts with a camera crew to explore the surrounding countryside and uncover points of historic interest. However, Clark never lost the acting bug, and left for New York in 1960. The program continued for two more years, under several new hosts, among them Toby Tarnow, Patrick Watson, Garrick Hagon, and Norman Welch. In 1963, Rainsberry persuaded Fred Rogers to take to the airwaves. In 1957, 1958 and 1962, the series was continued from July to September with Summer Magazine. John Clark was again host for this 1957 variation of the regular Junior Magazine series, but by 1962 various other hosts were seen in this mid-year replacement. References External links Queen's University Directory of CBC Television Series (Junior Magazine archived listing link via archive.org) CBC Television original programming 1956 Canadian television series debuts 1962 Canadian television series endings 1950s Canadian children's television series 1960s Canadian children's television series Black-and-white Canadian television shows
https://en.wikipedia.org/wiki/British%20Colloquium%20for%20Theoretical%20Computer%20Science
The British Colloquium for Theoretical Computer Science (BCTCS) is an organisation, founded in 1985, that represents the interests of Theoretical Computer Science in the UK, e.g. through representation on academic boards and providing commentary and evidence in response to consultations from public bodies. The BCTCS operates under the direction of an Organising Committee, with an Executive consisting of a President, Secretary and Treasurer. The current President is Barnaby Martin. The purpose of BCTCS is: to provide a platform from which the interests and future well-being of British theoretical computer science may be advanced; to offer a forum in which UK-based researchers in all aspects of theoretical computer science can meet, present research findings, and discuss recent developments in the field; and to foster an environment within which PhD students undertaking research in theoretical computer science may gain experience in presenting their work in a formal arena, broaden their outlook on the subject, and benefit from contact with established researchers in the community. In pursuit of these aims, the BCTCS organises an annual Conference for UK-based researchers in theoretical computer science. A central aspect of the annual BCTCS Conference is the training of PhD students. The scope of the annual BCTCS Conference includes all aspects of theoretical computer science, including algorithms, complexity, semantics, formal methods, concurrency, types, languages and logics. An emphasis on breadth, together with the inherently mathematical nature of theoretical computer science, means that BCTCS always actively solicits both computer scientists and mathematicians as participants at its annual Conference, and offers an environment within which the two communities can meet and exchange ideas. The Annual BCTCS Conference is primarily for the benefit of UK-based researchers. However, to promote British theoretical computer science in the wider community, participants from outside of the UK are welcome to attend, and the programme of invited talks every year includes high-profile researchers from abroad. Past officers of the BCTCS Presidents John V. Tucker (1985–1992) Alan Gibbons (1992–1998) Iain Stewart (1998–1999) Paul Dunne (1999–2001) Chris Tofts (2001–2004) Faron Moller (2004–2019) Barnaby Martin (2019-) Secretaries Mark Jerrum (1989–1992) Paul Dunne (1992–1999) Julian Bradfield (1999–2005) Graham Hutton (2005–2011) David Manlove (2011-2020) Michele Zito (2020-2023) Oana Andrei (2023-) Treasurers David Rydeheard (1989–1996) Chris Tofts (1996–2001) Faron Moller (2001–2004) Stephan Reiff-Marganiec (2004–2018) Matthew Hague (2018-2021) Olga Petrovska (2021-) Postgraduate representatives Savita Chauhan (1995-1997) Billy Duckworth (1997-1998) Richard Gault (1998-1999) Mei Lin Hui (1999-2000) Paul Sant (2000-2003) Corinna Elsenbroich (2003-2004) Vladimir Aleksic (2004-2005) Joel Wright (2005-2006) Joachim Bar
https://en.wikipedia.org/wiki/John%20V.%20Tucker
John Vivian Tucker (born 4 February 1952) is a British computer scientist and expert on computability theory, also known as recursion theory. Computability theory is about what can and cannot be computed by people and machines. His work has focused on generalising the classical theory to deal with all forms of discrete/digital and continuous/analogue data; and on using the generalisations as formal methods for system design; based on abstract data types and on the interface between algorithms and physical equipment. Biography Born in Cardiff, Wales, he was educated at Bridgend Boys' Grammar School, where he was taught mathematics, logic and computing. He read mathematics at University of Warwick (BA in 1973), and studied mathematical logic and the foundations of computing at University of Bristol (MSc in 1974, PhD in 1977). He has held posts at Oslo University, the CWI Amsterdam, and at Bristol and Leeds Universities, before returning to Wales as Professor of Computer Science at Swansea University in 1989. In addition to theoretical computer science, Tucker also lectures on the history of computing and on the history of science and technology and Wales. Tucker founded the British Colloquium for Theoretical Computer Science in 1985 and served as its president from its inception until 1992. He is a Fellow of the British Computer Society and editor of several international scientific journals and monograph series. At Swansea, he has been Head of Computer Science (1994–2008), Head of Physical Sciences (2007–11) and Deputy Pro Vice Chancellor (2011–2019). He is Member of Academia Europaea. Outside of Computer Science, Tucker has been a Trustee of the Welsh think-tank, the Institute of Welsh Affairs and the chair of the Swansea Bay branch. He is also a Trustee of the South Wales Institute of Engineers Educational Trust, and the Gower Society. Professor Tucker is married to Dr. T.E. Rihll, formerly a Reader in Ancient History at Swansea University. In the early 1990s, he began to lobby for a national academy for Wales. In 2008 a process to create such an academy began sponsored by the then University of Wales. Professor Tucker is a Founding Fellow of the Learned Society of Wales and in July 2010 he was appointed as its inaugural General Secretary, a post he held until May 2017. Work on computability and data types Classical computability theory is based on the data types of strings or natural numbers. In general, data types, both discrete and continuous, are modelled by universal algebras, which are sets of data equipped with operations and tests. Tucker's theoretical work tackles the problems of: how to define or specify properties of the operations and tests of data types; how to program and reason with them; and how to implement them. In a series of theorems and examples, starting in 1979, Jan Bergstra and Tucker established the expressive power of different types of equations and other algebraic formulae on any discrete data type, guided by
https://en.wikipedia.org/wiki/Big%20Questions
Big Questions is an Australian television show which is produced and broadcast on the Nine Network, with Jules Lund as host. It commenced broadcasting on 19 October 2006. It should not be confused with the Sydney Morning Herald column of the same name in the Saturday edition that poses sometimes serious, sometimes whimsical questions answered by readers. Prolific contributors are John Moir, Jim Dewar and David Buley. Premise The show features 2 panels each with two people debating on a popular question which divides people's opinions. Examples include Seinfeld or Friends, The Beatles or the Rolling Stones and Speedos or Boardshorts. A live audience casts their vote on which is the better of the two. Many celebrities have been chosen to debate the issues: Red Symons Tom Gleeson Kate Kendall Andy Lee Hamish Blake Tottie Goldsmith Leo Sayer Sami Lukis Akmal Saleh Human Nature Livinia Nixon Trevor Marmalade So far the audience has voted on There is no news whether Big Questions will return on Channel 9 after a seven-year hiatus. Background Upon the program's commencement, there had been an increasing trend of pop culture panel programs on Australian television. The success of the ABC's Spicks and Specks began the popular trend and has been replicated, often unsuccessfully on other networks. External links Nine Network original programming 2006 Australian television series debuts 2006 Australian television series endings
https://en.wikipedia.org/wiki/Dalton%20International
Dalton International is a worldwide network of Dalton Plan schools and Dalton specialists. The alumni of Dalton school are called Daltonians. The Daltonian is also the official newspaper name of Dalton International. See also Dalton Plan The Dalton School References External links The Dalton School website Alternative education organizations International educational organizations
https://en.wikipedia.org/wiki/Spouge%27s%20approximation
In mathematics, Spouge's approximation is a formula for computing an approximation of the gamma function. It was named after John L. Spouge, who defined the formula in a 1994 paper. The formula is a modification of Stirling's approximation, and has the form where a is an arbitrary positive integer and the coefficients are given by Spouge has proved that, if Re(z) > 0 and a > 2, the relative error in discarding εa(z) is bounded by The formula is similar to the Lanczos approximation, but has some distinct features. Whereas the Lanczos formula exhibits faster convergence, Spouge's coefficients are much easier to calculate and the error can be set arbitrarily low. The formula is therefore feasible for arbitrary-precision evaluation of the gamma function. However, special care must be taken to use sufficient precision when computing the sum due to the large size of the coefficients ck, as well as their alternating sign. For example, for a = 49, one must compute the sum using about 65 decimal digits of precision in order to obtain the promised 40 decimal digits of accuracy. See also Stirling's approximation Lanczos approximation References Gamma and related functions Computer arithmetic algorithms
https://en.wikipedia.org/wiki/Computational%20RAM
Computational RAM (C-RAM) is random-access memory with processing elements integrated on the same chip. This enables C-RAM to be used as a SIMD computer. It also can be used to more efficiently use memory bandwidth within a memory chip. The general technique of doing computations in memory is called Processing-In-Memory (PIM). Overview The most influential implementations of computational RAM came from The Berkeley IRAM Project. Vector IRAM (V-IRAM) combines DRAM with a vector processor integrated on the same chip. Reconfigurable Architecture DRAM (RADram) is DRAM with reconfigurable computing FPGA logic elements integrated on the same chip. SimpleScalar simulations show that RADram (in a system with a conventional processor) can give orders of magnitude better performance on some problems than traditional DRAM (in a system with the same processor). Some embarrassingly parallel computational problems are already limited by the von Neumann bottleneck between the CPU and the DRAM. Some researchers expect that, for the same total cost, a machine built from computational RAM will run orders of magnitude faster than a traditional general-purpose computer on these kinds of problems. As of 2011, the "DRAM process" (few layers; optimized for high capacitance) and the "CPU process" (optimized for high frequency; typically twice as many BEOL layers as DRAM; since each additional layer reduces yield and increases manufacturing cost, such chips are relatively expensive per square millimeter compared to DRAM) is distinct enough that there are three approaches to computational RAM: starting with a CPU-optimized process and a device that uses much embedded SRAM, add an additional process step (making it even more expensive per square millimeter) to allow replacing the embedded SRAM with embedded DRAM (eDRAM), giving ≈3x area savings on the SRAM areas (and so lowering net cost per chip). starting with a system with a separate CPU chip and DRAM chip(s), add small amounts of "coprocessor" computational ability to the DRAM, working within the limits of the DRAM process and adding only small amounts of area to the DRAM, to do things that would otherwise be slowed down by the narrow bottleneck between CPU and DRAM: zero-fill selected areas of memory, copy large blocks of data from one location to another, find where (if anywhere) a given byte occurs in some block of data, etc. The resulting system—the unchanged CPU chip, and "smart DRAM" chip(s)—is at least as fast as the original system, and potentially slightly lower in cost. The cost of the small amount of extra area is expected to be more than paid back in savings in expensive test time, since there is now enough computational capability on a "smart DRAM" for a wafer full of DRAM to do most testing internally in parallel, rather than the traditional approach of fully testing one DRAM chip at a time with an expensive external automatic test equipment. starting with a DRAM-optimized process, tweak the proc
https://en.wikipedia.org/wiki/Square%20One%20%28game%20show%29
Square One was a quiz programme that was produced by Granada Television and aired on the ITV network from 1980 until 1984, the original host was Nick Turnbull who hosted the first series then comedian Joe Brown became the host until it ended in 1984. Transmission guide References UK Game Shows - Square One 1980 British television series debuts 1984 British television series endings 1980s British game shows ITV game shows Television shows produced by Granada Television
https://en.wikipedia.org/wiki/Seoul%20Grand%20Park%20station
Seoul Grand Park Station is a station on Line 4 of the Seoul Subway network. A shuttle bus from the station runs to the Seoul Museum of Modern Art and the upper entrance to Seoul Grand Park. Station layout References Seoul Metropolitan Subway stations Railway stations opened in 1994 Metro stations in Gwacheon Railway stations in South Korea opened in the 1990s
https://en.wikipedia.org/wiki/List%20of%20things%20named%20after%20Albert%20Einstein
This is a list of things named after Albert Einstein. Scientific and mathematical concepts Technology Einstein refrigerator Tatung Einstein, an eight-bit home/personal computer Einstein Observatory, the first fully imaging X-ray telescope Einstein Telescope, a future third generation gravitational wave detector Albert Einstein ATV, a European unmanned cargo resupply spacecraft Schools Streets Einsteinova ulica, a major road in Bratislava, Slovakia Einsteinova, a street in Prague, Czech Republic Einsteinova, a street in Olomouc, Czech Republic Einsteinova, a street in Karviná, Czech Republic Einsteinstraße, Munich, Germany Albert Einstein Straße, Göttingen, Germany Albert-Einstein-Allee, Ulm, Germany Albert Einstein Street in Coimbra, Portugal Einstein Street, Tel Aviv, Israel Einstein Street, Haifa, Israel Albert Einstein Square, Jerusalem Israel Einstein St. in Norman, Oklahoma is named in his honor. Albert-Einstein Boulevard, city of Châteauguay, Quebec, Canada Albert-Einstein Street, city of Gatineau, Québec, Canada Avenida Einstein, Santiago de Chile Buildings Albert Einstein Hospital in São Paulo, Brazil Albert Einstein Medical Center, Philadelphia, Pennsylvania Einstein metro station, on the Santiago Metro, in Santiago, Chile Einstein Tower, astrophysical observatory in the Albert Einstein Science Park in Potsdam, Germany Albert Einstein House, a National Historic Landmark in Princeton, New Jersey Arts and entertainment Awards Albert Einstein World Award of Science, a yearly award given by the World Cultural Council Albert Einstein Award, an award in theoretical physics endowed by the Lewis and Rosa Strauss Memorial Fund Albert Einstein Medal, presented by the Albert Einstein Society in Bern, Switzerland, to people who have "rendered outstanding services" in connection with Albert Einstein, since 1979 Einstein Prize for Laser Science, international physics award Einstein Prize (APS), a biennial prize, awarded by the American Physical Society since 2003 Other See also Albert Einstein in popular culture Named after Society-related lists Lists of things named after physicists
https://en.wikipedia.org/wiki/Robert%20Felt
Robert Felt (1953–2002) was a computer programmer, USCF-rated chess Expert, Tennessee Junior chess champion, and champion Scrabble player. Born in Memphis, he entered the University of Chicago in 1971 and tested out of so many requirements that he was awarded Junior status. At the University of Chicago, he was a member of the chess team, at one point being first board on the university's second team for two Pan-American Intercollegiate national tournaments. He also competed for the university at the NCAA national contract bridge tournament. In 1978, he left university without a degree and joined Banker's Life and Casualty as a computer programmer. At the TDM division of Rand McNally he enjoyed a reputation as one of the best CICS programmers in the world. In the late 1980s and early 1990s, he established 911 systems for police and fire dispatchers. Much of the technology at most 911 call centers is derived from his early work. In 1990, Felt won the US National Scrabble Championship. He achieved a peak rating of 2155, which in February 2011 would easily be the number one rating again. References External links American Scrabble players 1953 births 2002 deaths
https://en.wikipedia.org/wiki/Bobby%20Singer
Robert Steven Singer is a fictional character in The CW Television Network's horror-drama television series Supernatural portrayed by Jim Beaver. Named after the show's executive producer, Bobby first appears in the first season finale "Devil's Trap." Although Beaver believed his role would merely be a "one-shot deal," Bobby has become a recurring character on the series, and is one of three characters who has appeared in every season of the show. The character, a "rough but warmhearted" working-class man who hunts supernatural creatures, has evolved over time into a father figure for series protagonists Sam and Dean Winchester. Critics have responded favorably to the character. Starting in the season 12 finale "All Along the Watchtower" and carrying over into season 13, an alternate reality version of Bobby is introduced. This Bobby is portrayed as the leader of some of the surviving human population in a post-Apocalyptic world though sharing many of the same traits as his counterpart. This Bobby continues to appear throughout seasons 14 and 15. In the series finale, the original Bobby returns for a brief cameo appearance after having been missing from the show since the eleventh season. In The Winchesters, Bobby makes a cameo appearance in the first season finale alongside Dean and Jack. Fictional biography Salvager and proprietor of Singer Salvage Yard, Bobby Singer was first introduced to the supernatural world when his wife, Karen, became possessed by a demon. As detailed in the third-season episode "Dream a Little Dream of Me", he was uncertain of how to save her, and instead ended up being forced to kill her. Her death prompted him to dedicate his life to hunting supernatural creatures. The later episode "Death's Door" expanded on this by revealing that Bobby's last conversation with his wife was an argument about his reluctance to have children, also revealing that his father was an abusive man whom Bobby shot when he was a child (his mother subsequently telling him that God would punish him for this). Bobby reflected that his father's example left him afraid of becoming an abusive man himself in case he became a parent as bad as his father. After the death of Mary Winchester, her husband John became a hunter, eventually allying and learning from Bobby. Mistrustful of most hunters, Bobby is one of the few with whom he allows the boys regular contact, allowing Bobby to teach them how to shoot and track while he is off on 'hunting trips'. At times, Bobby defied John's wishes to teach the boys more mundane, normal activities, such as playing catch, so that they could have a break from the intensive training regimen. While John eventually distanced himself from other hunters or fell out of contact with them, notably Ellen Harvelle and Daniel Elkins, he maintained a professional relationship with Bobby. Bobby makes his debut in the first season finale "Devil's Trap", and is revealed to be an old friend of the Winchester family. Sam and
https://en.wikipedia.org/wiki/Modula-2%2B
Modula-2+ is a programming language descended from the Modula-2 language. It was developed at DEC Systems Research Center (SRC) and Acorn Computers Ltd Research Centre in Palo Alto, California. Modula-2+ is Modula-2 with exceptions and threads. The group which developed the language was led by P. Rovner in 1984. Main differences with Modula-2: Concurrency; different than the concept of coroutine, which was already part of Modula-2 Exception handling Garbage collection Implementations Modula-2+ was used to develop Topaz, an operating system for the SRC DEC Firefly shared memory asymmetric multiprocessing workstation. Most Topaz applications were written in Modula-2+, which grew along with the development of the system. Also to build a programming integrated development environment for it in the Acorn Research Center (ARC). Modula-2+ strongly influenced other languages such as Modula-3, but as of 2005, it had disappeared. The original developers of Modula-2+ were both acquired: Acorn by Olivetti and Digital Equipment Corporation by Compaq. Compaq was bought by Hewlett-Packard. Olivetti sold the Olivetti Research Center and Olivetti Software Technology Laboratory (after bought Acorn ARC) to Oracle Corporation and was later absorbed by AT&T. DEC have made the SRC-reports available to the public. See also Modula References Modula programming language family Procedural programming languages Systems programming languages Programming languages created in 1984
https://en.wikipedia.org/wiki/Trans-Proteomic%20Pipeline
The Trans-Proteomic Pipeline (TPP) is an open-source data analysis software for proteomics developed at the Institute for Systems Biology (ISB) by the Ruedi Aebersold group under the Seattle Proteome Center. The TPP includes PeptideProphet, ProteinProphet, ASAPRatio, XPRESS and Libra. Software Components Probability Assignment and Validation PeptideProphet performs statistical validation of peptide-spectra-matches (PSM) using the results of search engines by estimating a false discovery rate (FDR) on PSM level. The initial PeptideProphet used a fit of a Gaussian distribution for the correct identifications and a fit of a gamma distribution for the incorrect identification. A later modification of the program allowed the usage of a target-decoy approach, using either a variable component mixture model or a semi-parametric mixture model. In the PeptideProphet, specifying a decoy tag will use the variable component mixture model while selecting a non-parametric model will use the semi-parametric mixture model. ProteinProphet identifies proteins based on the results of PeptideProphet. Mayu performs statistical validation of protein identification by estimating a False Discovery Rate (FDR) on protein level. Spectral library handling The SpectraST tool is able to generate spectral libraries and search datasets using these libraries. See also OpenMS ProteoWizard Mass spectrometry software References Free science software Bioinformatics software Mass spectrometry software Proteomics
https://en.wikipedia.org/wiki/Crescendo%20Networks
Crescendo Networks, Ltd. was a privately held computer networking company headquartered in Sunnyvale, California with regional offices in EMEA and APAC. Crescendo Networks is not to be confused with Crescendo Communications, Inc. a CDDI/FDDI network equipment manufacturer that Cisco Systems Inc. acquired in 1993. Founded in 2002, Crescendo Networks manufactured and sold application delivery controllers which accelerate and optimize website and web application performance. On August 2011, company assets have been acquired by F5 Networks through liquidation proceedings in Israel. A number of key Crescendo employees joined F5's office in Tel Aviv. Products AppBeat DC is a web-facing application delivery controller that helps web applications serve more users and traffic, faster, with fewer resources. It accelerates web applications by offloading and consolidating common CPU intensive tasks. The product's purpose-built platform uses separate and dedicated hardware engines for each feature with multiple network processors and Field Programmable Gate Arrays (FPGAs) to deliver features such as TCP multiplexing and connection management, load balancing, data compression, caching, SSL acceleration, and more. AppBeat SC is an application service controller designed to monitor multiple AppBeat DC application delivery controllers and provide insight into application behavior. It monitors and analyzes web applications and the state of the servers running them. The product gives users the option to be alerted via Twitter, as well as email or SNMP, if any degradation to their network is detected. References External links Crescendo Networks Home Page Network World article about Crescendo Networks Networking companies of the United States Electronics companies established in 2002 Companies based in Sunnyvale, California 2002 establishments in California
https://en.wikipedia.org/wiki/Jim%20Warren%20%28computer%20specialist%29
Jim Warren (July 20, 1936 – November 24, 2021) was an American mathematics and computing educator, computer professional, entrepreneur, editor, publisher and continuing sometime activist. Early career From 1957 to 1967, Warren was a mathematics teacher at secondary-school level, and professor at college and university levels, with his last full-time academic position being Chair of the Mathematics Department at the College of Notre Dame, Belmont, a small liberal arts college in Belmont, California. He later taught computer courses at Stanford University, San Jose State University and San Francisco State University. He had his first full-time teaching contract, for an annual salary of , when he was 20 years old and had completed only three years of college. In the ensuing decade, he was also a National Science Foundation Guest Lecturer, was the founder and Director of Summer Mathematics Institutes at Our Lady of the Lake University in San Antonio, Texas, and earned national recognition for innovative weekly enrichment programs he created for secondary school students, and for in-service programs for elementary and secondary school teachers, all without cost, as Chair of the Alamo District [South Texas] Council of Teachers of Mathematics (1960–1962). In the late 1960s, Warren was involved in the radical, utopian, alternative, hippie Midpeninsula Free University, including serving pro-bono as its elected General Secretary for three terms. In that time, he created and edited its irregular magazine, which he titled The Free You. Computing From 1968 through the mid-1970s Warren worked as a freelance minicomputer programmer and computer consultant, operating under the name, Frelan Associates (for "free land"), creating assembler-level real-time data-acquisition and process-control programs for biomedical research at Stanford Medical Center, and control programs for various high-tech companies around Silicon Valley. In those years, he also chaired the Association for Computing Machinery's regional chapters of SIGPLAN, SIGMICRO and the San Francisco Peninsula ACM. In 1977, Warren co-founded the West Coast Computer Faire which, for a half-dozen years, was the largest public microcomputer convention in the world. He was its self-titled "Faire Chaircreature," organizing eight conventions. In 1983, he sold the Faire to Prentice-Hall, "for 100% down; nothin' to pay". To promote the Computer Faires and circulate news and gossip about the then-infant microcomputer industry, he founded and edited the first free tabloid newspaper about microcomputing, the irregular Silicon Gulch Gazette (SGG), published from issue #0 in February 1977, through issue #43, in January 1986, with one issue named Business Systems Journal. Beginning in 1978, Warren created and published the Intelligent Machines Journal (IMJ, which is also Pig Latin for "Jim"), the first subscription news periodical about microcomputing, published as a tabloid newspaper, with Tom Williams as its
https://en.wikipedia.org/wiki/TI%20Invaders
TI Invaders is a fixed shooter video game published by Texas Instruments in 1981 for the TI-99/4A home computer. The game is a Space Invaders clone where the goal is to shoot all of the aliens before they reach the bottom of the screen. TI Invaders is part of the TI Arcade Game Series which includes Tombstone City: 21st Century and Car Wars. Gameplay TI Invaders is a single-player fixed shooter. At the start of the game, the player is face with an enemy fleet eleven creatures wide and five creatures deep. With the joystick or keyboard, the player moves a laser base (called a missile in the manual) left and right, pressing the fire button to shoot lasers at an 11×5 grid of invaders. Shooting different invaders scores different amounts (see below). As the number of invaders dwindles, they increasingly move faster. Upon shooting the last invader, the player moves on to a bonus round before the next level. As in Space Invaders, which TI Invaders is a video game clone of, a UFO will appear once or twice a round and travel from one end of the screen to the other. The player has the opportunity to hit it to score bonus points, the amount depending on where the UFO is hit. There are two difficulty levels to choose from: Merely Aggressive: invaders fire semi-randomly, targeting the player only sporadically Downright Nasty: invaders fire rapidly and deliberately at the player and their point values are doubled Bonus round After each level is cleared, there is a bonus round consisting only of one UFO. The UFO travels slowly from one end of the screen to the other until it is hit for the first time, then it returns other way at twice its original speed. The player must track it to the other side of the screen and shoot it again, making the UFO return in the other direction again. The UFO's score value increases gradually with each hit, and the UFO gets smaller and smaller. This continues until either the player eliminates the UFO completely, or it escapes off the screen. Bonus missiles After earning 3,000 points the player receives an additional missile. Thereafter, at every multiple of 10,000 points, one damaged missile is repaired and again usable. (When a missile is damaged, it rolls off onto a small elevator and off to the right of the screen, and one of the extra missiles rolls onto the elevator from the left hand side and takes its place. When one is repaired, it moves from the damaged end to the extras end fully repaired.) End of game When the last missile is destroyed, the closest invader to the bottom then goes down, clears away the area the extra missiles and damaged missiles were, writing "GAME OVER" in the middle of it all, then it and the rest of the remaining invaders on the screen jump up and down, as if laughing or cheering. If both the last invader on the screen and the last missile are killed at the same time (which is not an uncommon occurrence at any time in the game), the next set of invaders will immediately appear on the screen
https://en.wikipedia.org/wiki/Tombstone%20City%3A%2021st%20Century
Tombstone City: 21st Century is a single-player multidirectional shooter written by John C. Plaster for TI-99/4A home computer and published by Texas Instruments in 1981. Gameplay The player controls a schooner, shooting aliens (called Morgs) and tumbleweeds in order to woo people back to live in an abandoned city somewhere in the Southwestern United States. The score is labeled as "Population". The game ends when all schooners are gone. The player's schooner starts out in the middle of sixteen blocks. These are used as shelter, as the Morgs cannot enter this area. The player must venture out to shoot either tumbleweeds (100 points each) or, more importantly, the Morgs (150 points each). Tumbleweeds replenish when the last one has been eliminated. Morgs are produced via one of the cacti out in the field. They can only appear from a cactus that touches another cactus. Whenever a Morg is shot, it turns into another cactus. If a Morg is shot next to two adjacent cacti, the cacti and Morg disappear and a new Morg is immediately spawned. The goal is to leave only cacti standing individually, so that no more Morgs can appear. When all cacti stand alone, one game day ends, the player is awarded a bonus schooner, and a new day begins with cacti repositioned. If a Morg is killed adjacent to one of the exits, the cactus placed there blocks off the exit for the remainder of the game day. When all exits are blocked, the schooner is automatically moved to somewhere outside the sixteen blocks. If the schooner is killed at this point, the new schooner appears somewhere else on the screen. Development In a 1985 interview, programmer John Plaster called the creation of the game "spontaneous": "I started putting it on the screen as fast as I thought of it. So, from the conception of the idea, to the completion of the basics, we're talking about a four-week period." The name of the game was originally Saguaro City. Legacy In 2019, Collectorvision released a clone for the ColecoVision called Saguaro City. References 1981 video games Multidirectional shooters Texas Instruments games TI-99/4A games Video games about extraterrestrial life Video games developed in the United States
https://en.wikipedia.org/wiki/Microsoft%20Cordless%20Phone%20System
The Microsoft Cordless Phone System (also known as PC Phone System MP-900) is a discontinued cordless telephone introduced by Microsoft in 1998 that featured personal computer integration. It was Microsoft's first telephone of any kind, and the only phone product made by the company until the Windows Mobile series of smartphones. Features The MCPS consists of three main hardware components: a cordless handset, a base station, and a charging cradle. The MCPS could, like traditional cordless phones, make and receive telephone calls independently from a PC; however, the base station could also be connected to a computer via a serial port to provide additional functionality including enhanced caller ID features and PC voice message integration. Microsoft released a supplementary Call Manager application, compatible with the Windows 95 and Windows 98 operating systems, that allowed users to make and receive calls, and to listen to or delete voice messages, contacts, and call history. The software automatically logged the date, time, and duration of all incoming and outgoing calls on a connected PC. MCPS also featured speech recognition and speech synthesis capabilities; for example, an owner could command the cordless handset to call a desired contact (e.g., by stating "Call John Smith"), and a caller ID feature would announce the name of an incoming caller (e.g., "Smith, John, calling"), with voice messages being stored on the recipient's computer. The system required that the computer remain turned on and the call manager active for this functionality. The system was not compatible with Windows NT or Macintosh. See also Cortana Microsoft Exchange Server Microsoft Mobile Microsoft Outlook Nokia Skype Windows Phone Windows Speech Recognition References Discontinued Microsoft products Microsoft hardware
https://en.wikipedia.org/wiki/EM%20Data%20Bank
The EM Data Bank or Electron Microscopy Data Bank (EMDB) collects 3D EM maps and associated experimental data determined using electron microscopy of biological specimens. It was established in 2002 at the MSD/PDBe group of the European Bioinformatics Institute (EBI), where the European site of the EMDataBank.org consortium is located. , the resource contained over 2,600 entries with a mean resolution of 15Å. Deposition of data was originally via the EMdep deposition interface, but since 2016 deposition of data has been incorporated into the wwPDB OneDep interface. Under the NIH Unified Data Resource for CryoEM, the Research Collaboration for Structural Biology (RCSB) also acts as a deposition, data processing and distribution center for EMDB data, while the National Center for Macromolecular Imaging (NCMI) is a collaborative partner in providing services and tools concerning the EMDB. EM Data Bank also provides the EMsearch search tool and data can also be queried at RCSB, EMBL-EBI and PDBj. EMDB is an archive for three-dimensional density maps of all types of biological assemblies, including ribosomes, chaperones, polymerases, multifunctional enzymes and viruses. Viper EMDB at Scripps is a separate database for three-dimensional EM maps of viruses. To compare and assess methods for the new generation of higher resolution (better than 5Å) structures, the EMDB has hosted the first CryoEM Map Challenge and CryoEM Model Challenge, reported in a special issue of the Journal of Structural Biology. See also Cryo-Electron Microscopy Colocalization Benchmark Source References External links Software tools for molecular microscopy EM Data Bank US and UK Search pages Japan Search page (EM Navigator in PDBj) Biological databases Electron microscopy Science and technology in Cambridgeshire South Cambridgeshire District
https://en.wikipedia.org/wiki/Generic%20Model%20Organism%20Database
The Generic Model Organism Database (GMOD) project provides biological research communities with a toolkit of open-source software components for visualizing, annotating, managing, and storing biological data. The GMOD project is funded by the United States National Institutes of Health, National Science Foundation and the USDA Agricultural Research Service. History The GMOD project was started in the early 2000s as a collaboration between several model organism databases (MODs) who shared a need to create similar software tools for processing data from sequencing projects. MODs, or organism-specific databases, describe genome and other information about important experimental organisms in the life sciences and capture the large volumes of data and information being generated by modern biology. Rather than each group designing their own software, four major MODs--FlyBase, Saccharomyces Genome Database, Mouse Genome Database, and WormBase—worked together to create applications that provide functionality needed by all MODs, such as software to help manage the data within the MOD, and to help users access and query the data. The GMOD project works to keep software components interoperable. To this end, many of the tools use a common input/output file format or run off a Chado schema database. Chado database schema The Chado schema aims to cover many of the classes of data frequently used by modern biologists, from genetic data to phylogenetic trees to publications to organisms to microarray data to IDs to RNA/protein expression. Chado makes extensive use of controlled vocabularies to type all entities in the database; for example: genes, transcripts, exons, transposable elements, etc., are stored in a feature table, with the type provided by Sequence Ontology. When a new type is added to the Sequence Ontology, the feature table requires no modification, only an update of the data in the database. The same is largely true of analysis data that can be stored in Chado as well. The existing core modules of Chado are: sequence - for sequences/features cv - for controlled-vocabs/ontologies general - currently just dbxrefs organism - taxonomic data pub - publication and references companalysis - augments sequence module with computational analysis data map - non-sequence maps genetic - genetic and phenotypic data expression - gene expression natural diversity - population data Software The full list of GMOD software components is found on the GMOD Components page. These components include: Participating databases The following organism databases are contributing to and/or adopting GMOD components for model organism databases. Related projects Bioperl, BioJava, Biopython, BioRuby, etc. Ensembl Gene Ontology DAS Genomics Unified Schema Manatee: Manual Annotation Tool Biocurator.org Open Biomedical Ontologies Sequence Ontology Project See also Biological database Genome project Genomics Genome References External links GMOD website Model organ
https://en.wikipedia.org/wiki/Convention%20for%20the%20Protection%20of%20Individuals%20with%20Regard%20to%20Automatic%20Processing%20of%20Personal%20Data
The Convention for the Protection of Individuals with Regard to Automatic Processing of Personal Data is a 1981 Council of Europe treaty that protects the right to privacy of individuals, taking account of the increasing flow across frontiers of personal data undergoing automatic processing. All members of the Council of Europe have ratified the treaty. Being non–Council of Europe states, Argentina, Cabo Verde, Mauritius, Mexico, Morocco, Senegal, Tunisia, and Uruguay have acceded to the treaty. Since 1985, this data protection convention has been updated, and a new instrument on artificial intelligence has been added. The Council of Europe approved a proposed modernization of the agreement in 2018. The modernization included an obligation to report when data breaches occur, additional accountability for data storers, and new rights for the algorithmic decision making. See also General Data Protection Regulation Directive 95/46/EC on the protection of personal data Data privacy Data Privacy Day Information privacy List of Council of Europe treaties References External links Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data (Council of Europe) Ratifications Information privacy Privacy legislation Treaties entered into force in 1985 Treaties concluded in 1981 Council of Europe treaties Treaties of Albania Treaties of Andorra Treaties of Armenia Treaties of Austria Treaties of Azerbaijan Treaties of Argentina Treaties of Belgium Treaties of Bosnia and Herzegovina Treaties of Bulgaria Treaties of Croatia Treaties of Cyprus Treaties of the Czech Republic Treaties of Denmark Treaties of Estonia Treaties of Finland Treaties of France Treaties of Georgia (country) Treaties of West Germany Treaties of Greece Treaties of Hungary Treaties of Iceland Treaties of Ireland Treaties of Italy Treaties of Latvia Treaties of Liechtenstein Treaties of Lithuania Treaties of Luxembourg Treaties of Malta Treaties of Mauritius Treaties of Moldova Treaties of Monaco Treaties of Montenegro Treaties of Morocco Treaties of the Netherlands Treaties of Norway Treaties of Poland Treaties of Portugal Treaties of Romania Treaties of Russia Treaties of San Marino Treaties of Serbia and Montenegro Treaties of Slovakia Treaties of Slovenia Treaties of Spain Treaties of Sweden Treaties of Switzerland Treaties of North Macedonia Treaties of Tunisia Treaties of Turkey Treaties of Ukraine Treaties of Uruguay Treaties of the United Kingdom 1981 in France Treaties extended to Jersey Treaties extended to Guernsey Treaties extended to the Isle of Man
https://en.wikipedia.org/wiki/Lung%20allocation%20score
The lung allocation score (LAS) is a numerical value used by the United Network for Organ Sharing (UNOS) to assign relative priority for distributing donated lungs for transplantation within the United States. The lung allocation score takes into account various measures of a patient's health in order to direct donated organs towards the patients who would best benefit from a lung transplant. The LAS system replaces the older method within the United States of allocating donated lungs strictly on a first-come, first-served basis, according to blood type compatibility and distance from the donor hospital. The older method is still used for patients under the age of 12. The LAS system is still being evaluated and revised. The reason for this continuing analysis is the need to balance on one hand the desire to help those patients in direct need, versus the statistical likelihood of the patient to survive the procedure, as well as the post-operative risks of infection and transplant rejection. Lung allocation scoring method The lung allocation score is calculated from a series of formulas that take into account the statistical probability of a patient's survival in the next year without a transplant, and the projected length of survival post-transplant. A raw allocation score, summarizing all of the above values, is calculated, and finally this score is normalized to obtain the actual LAS, which has a range from 0 to 100. Higher lung allocation scores indicate the patient is more likely to benefit from a lung transplant. The post-transplant survival measure is one-year survival after transplantation of the lungs. Factors used to predict it include FVC, ventilator use, age, creatinine, NYHA class and diagnosis. It is used for calculation of transplant benefit by subtracting another variable called waitlist urgency measure from it. The final lung allocation score, which is meant to reflect the overall transplant benefit, incorporates this element as well. Factors in calculating the LAS There are many factors that are used to calculate the lung allocation score: diagnosis of the patient (e.g. emphysema, cystic fibrosis Pulmonary Fibrosis, etc.); age of the patient; body mass index; presence or absence of diabetes mellitus; ability to function according to the NYHA scale; percentage of predicted forced vital capacity (FVC); systolic pressure of the pulmonary artery; mean pressure of the pulmonary artery (only required of sarcoidosis patients); pulmonary capillary wedge pressure (PCW pressure); flow rate of supplemental oxygen required at rest; distance walked in six minutes; need or lack of need for continuous mechanical ventilation; levels of creatinine in the blood. UNOS requires that the various medical results must be current, i.e. obtained within the last six months, or the relevant factor is assigned a zero value. Exceptions can be made if a patient is deemed unable to complete a test due to his or her current condition. In suc
https://en.wikipedia.org/wiki/Velocity%20Micro
Velocity Micro is a privately held boutique computer manufacturer located in Richmond, Virginia (USA), specializing in custom high-performance gaming computers, professional workstations, and high-performance computer solutions. Its extended product line includes gaming PCs, notebooks, CAD workstations, digital media creation workstations, home and home office PCs, home entertainment media centers, Tesla-based supercomputers, and business solutions. All products are custom assembled by hand and supported at the company's headquarters. History Velocity Micro traces its origins to 1992 when founder Randy Copeland began designing and producing high-performance computer systems to run CAD software and other demanding applications. These computer systems were custom-built to facilitate the design process and tailored to the extreme needs of each client. Velocity Micro was officially founded in 1997 as an extension of this highly individualized, high-performance computing philosophy. In 2001, Copeland accepted the opportunity to appear in Maximum PC'''s boutique roundup article entitled "Minor League, Major Performance". The quote which appeared in that February 2002 issue – "put together with the kind of care and craftsmanship the behemoth manufacturers can't offer" – propelled Velocity Micro forward and is still used by the company today. In May 2007, Velocity Micro acquired former competing boutique builder, Overdrive PC, known for their extreme overclocking capabilities they term "HyperClocking." Since the acquisition, Velocity Micro has incorporated HyperClocking into many of its extreme gaming systems. Overdrive PC remains a separate brand under Velocity Micro ownership. In 2010, Velocity Micro entered the eReader and tablet computer markets with the release of the first Cruz products: the Cruz Reader and the Cruz Tablet (T100). These Android-based devices featured 7" full-color screens. The Cruz Reader utilized a Resistive touchscreen, whereas the Cruz Tablet made use of the more advanced and responsive capacitive touch screen. Five product generations of Cruz tablets were produced and sold in 7", 8", and 10" screen models with close to a million units in the market by 2012. As of 2013, Velocity Micro no longer supports or offers these or any other Android-based devices for sale. In 2011, Copeland was named a "Tech Icon" by the PC Magazine staff in an article celebrating 30 years of the PC for his contributions to the industry. He continues to have an active role at Velocity Micro as president and CEO. In October 2019, Velocity Micro announced a partnership with Ansys that would provide access to resources, licenses, and benchmarks allowing Velocity Micro to build custom computers that are tailored to be integrated with Ansys applications. Velocity Micro has also partnered with Nvidia, AMD, and Intel to provide retail-grade hardware in custom computer builds. Retail In August 2005, Velocity Micro began offering pre-configured, high-perfo
https://en.wikipedia.org/wiki/Deathgate
Deathgate or Death Gate can refer to The Death Gate Cycle series of fantasy novels by Margaret Weis and Tracy Hickman. Death Gate, a computer adventure game loosely based on the above.
https://en.wikipedia.org/wiki/Apple%20Dylan
Apple Dylan is the original implementation of the programming language Dylan. It was developed by Apple Computer from 1992 to 1995. Dylan was developed at Apple Cambridge, formerly Coral Software, developers of Macintosh Common Lisp. The original language had much in common with Lisp, including its parenthetical S-expression syntax. For a time, it was developed with the intent of being the primary language of the Apple Newton. When that project was ordered into production earlier than expected, Dylan was not ready for release. A new operating system for the Newton was written in C++. Dylan was then repositioned as a desktop programming system for the classic Mac OS. This led to a major change in syntax to a more C-like infix notation syntax, apparently at the prompting of a group at Carnegie Mellon University, to make it more appealing to programmers familiar with other languages. The resulting system was making progress when development was canceled in April 1995. Work continued for another six months to produce the Apple Dylan Technology Release. It was released at the 1996 WWDC show as the first and only official Apple version of the system. Development environment Apple Dylan includes a dynamic, integrated development environment inspired by Smalltalk, Macintosh Common Lisp (MCL), and Think C, and originally codenamed Hula. Like Think C, but unlike Smalltalk and Lisp, it draws a clear distinction between the development environment and the program being developed. It does this by linking code, called a stub, into the target program, allowing the integrated development environment (IDE) to communicate with it (to inject code, perform introspection, etc.), without sharing a runtime system environment with the IDE. The IDE includes Binder (a tool for configuring browsers), a source database, a definition database, incremental compiling, a cross-platform source debugger, profiling tools, and an interface builder. The basic browser window in the Apple Dylan environment is Binder. A Binder window consists of one or more linked panes. Each pane has an input, an output, an aspect, and a presentation style. A pane's input is the output of another pane: a pane displays information about the selected object(s) in its input pane. Aspects are properties of the input, such as source code, contents, callers, readers, writers, references or compiling warnings. This information can be presented in an outline or a graph. Inputs, aspects and styles can be used to construct replicas of the Smalltalk source browser, or static call graphs, or ad hoc displays such as the callers of readers of variables that the selected function writes. All views are live: recompiling a function updates any displays that include its who-calls information, for example. The outline view includes visual indicators that display whether a source record has unsaved changes, has changed since it was last compiled, or has compiler-generated messages (warnings and errors). User int
https://en.wikipedia.org/wiki/BIT%20predicate
In mathematics and computer science, the BIT predicate, sometimes is a predicate that tests whether the bit of the (starting from the least significant digit) when is written as a binary number. Its mathematical applications include modeling the membership relation of hereditarily finite sets, and defining the adjacency relation of the Rado graph. In computer science, it is used for efficient representations of set data structures using bit vectors, in defining the private information retrieval problem from communication complexity, and in descriptive complexity theory to formulate logical descriptions of complexity classes. History The BIT predicate was first introduced in 1937 by Wilhelm Ackermann to define the Ackermann coding, which encodes hereditarily finite sets as The BIT predicate can be used to perform membership tests for the encoded sets: is true if and only if the set encoded is a member of the set encoded Ackermann denoted the predicate using a Fraktur font to distinguish it from the notation that he used for set membership (short for an element in German). The notation and the name "the BIT predicate", come from the work of Ronald Fagin and Neil Immerman, who applied this predicate in computational complexity theory as a way to encode and decode information in the late 1980s and early Description and implementation The binary representation of a number is an expression for as a sum of distinct powers of two, where each bit in this expression is either 0 or 1. It is commonly written in binary notation as just the sequence of these bits, . Given this expansion for , the BIT predicate is defined to equal . It can be calculated from the formula where is the floor function and mod is the modulo function. The BIT predicate is a primitive recursive function. As a binary relation (producing true and false values rather than 1 and 0 respectively), the BIT predicate is asymmetric: there do not exist two numbers and for which both and are true. In programming languages such as C, C++, Java, or Python that provide a and a the BIT predicate can be implemented by the expression (i>>j)&1. The subexpression i>>j shifts the bits in the binary representation of so that is shifted to and the masks off the remaining bits, leaving only the bit in As with the modular arithmetic formula above, the value of the expression is respectively as the value of is true or false. Applications Set data structures For a set represented as a bit array, the BIT predicate can be used to test set membership. For instance, subsets of the non-negative integers may be represented by a bit array with a one in when is a member of the subset, and a zero in that position when it is not a member. When such a bit array is interpreted as a binary number, the set for distinct is represented as the binary number . If is a set, represented in this way, and is a number that may or may not be an element of , then returns a nonzero valu
https://en.wikipedia.org/wiki/Green%20thread
In computer programming, a green thread (virtual thread) is a thread that is scheduled by a runtime library or virtual machine (VM) instead of natively by the underlying operating system (OS). Green threads emulate multithreaded environments without relying on any native OS abilities, and they are managed in user space instead of kernel space, enabling them to work in environments that do not have native thread support. Etymology Green threads refers to the name of the original thread library for the programming language Java (that was released in version 1.1 and then Green threads were abandoned in version 1.3 to native threads). It was designed by The Green Team at Sun Microsystems. History Green threads were briefly available in Java between 1997 and 2000. Green threads share a single operating system thread through co-operative concurrency and can therefore not achieve parallelism performance gains like operating system threads. The main benefit of coroutines and green threads is ease of implementation. Performance On a multi-core processor, native thread implementations can automatically assign work to multiple processors, whereas green thread implementations normally cannot. Green threads can be started much faster on some VMs. On uniprocessor computers, however, the most efficient model has not yet been clearly determined. Benchmarks on computers running the Linux kernel version 2.2 (released in 1999) have shown that: Green threads significantly outperform Linux native threads on thread activation and synchronization. Linux native threads have slightly better performance on input/output (I/O) and context switching operations. When a green thread executes a blocking system call, not only is that thread blocked, but all of the threads within the process are blocked. To avoid that problem, green threads must use asynchronous I/O operations, although the increased complexity on the user side can be reduced if the virtual machine implementing the green threads spawns specific I/O processes (hidden to the user) for each I/O operation. There are also mechanisms which allow use of native threads and reduce the overhead of thread activation and synchronization: Thread pools reduce the cost of spawning a new thread by reusing a limited number of threads. Languages which use virtual machines and native threads can use escape analysis to avoid synchronizing blocks of code when unneeded. Green threads in the Java virtual machine Original implementation: Green Threads In Java 1.1, green threads were the only threading model used by the Java virtual machine (JVM), at least on Solaris. As green threads have some limitations compared to native threads, subsequent Java versions dropped them in favor of native threads. An exception to this is the Squawk virtual machine, which is a mixture between an operating system for low-power devices and a Java virtual machine. It uses green threads to minimize the use of native code, and to support migra