source stringlengths 32 199 | text stringlengths 26 3k |
|---|---|
https://en.wikipedia.org/wiki/Meso | Meso or mesos may refer to:
Apache Mesos, a computer clustering management platform
Meso, in-game currency for the massively multiplayer online role-playing game MapleStory
Meso compound, a stereochemical classification in chemistry
Mesolithic, archaeological period between the Upper Paleolithic and the Neolithic
Mesopotamia, the first major river civilization, known today as Iraq
Mesoamerica, Americas, or Native Americans
Mesothelioma, a form of cancer
Mesoscopic physics, subdiscipline of condensed matter physics that deals with materials of an intermediate size
Multiple Equivalent Simultaneous Offers, a strategy used in negotiation |
https://en.wikipedia.org/wiki/Lathe%20%28graphics%29 | In 3D computer graphics, a lathed object is a 3D model whose vertex geometry is produced by rotating the points of a spline or other point set around a fixed axis. The lathing may be partial; the amount of rotation is not necessarily a full 360 degrees. The point set providing the initial source data can be thought of as a cross section through the object along a plane containing its axis of radial symmetry.
The reason the lathe has this name is because it creates symmetrical objects around a rotational axis, just like a real lathe would.
Lathes are very similar to surfaces of revolution. However, lathes are constructed by rotating a curve defined by a set of points instead of a function. Note that this means that lathes can be constructed by rotating closed curves or curves that double back on themselves (such as the aforementioned torus), whereas a surface of revolution could not because such curves cannot be described by functions.
See also
Surface of revolution
Solid of revolution
Loft (3D)
Computer-aided design |
https://en.wikipedia.org/wiki/7%20Television%20Commercials | 7 Television Commercials is a collection of music videos by the English rock band Radiohead, covering the period from The Bends (1995) to OK Computer (1997).
Release
The VHS home video was released on 4 May 1998 in the United Kingdom, and on 30 June in the United States. The DVD was released on 4 August 2003 in the UK and 5 August in North America.
Music videos
"Paranoid Android"
"Street Spirit (Fade Out)"
"No Surprises"
"Just"
"High and Dry" (U.S. version)
"Karma Police"
"Fake Plastic Trees"
Critical reception
7 Television Commercials received mixed reviews from critics. Reviewer Ian Reed felt that "it could have been better". Reed also commented on the duration of the video, just over 30 minutes, only seven music videos.
Christian Hoard of Rolling Stone gave the re-release collection of videos 2 out of 4 stars, also mentioning the length of the release: "Why only seven? And no bonus material? You'd think that a band as wary of commercial exploitation as Radiohead wouldn't ask fans to shell out for so slight a souvenir."
Personnel
All videos commissioned by Dilly Gent.
Packaging art and design by Stanley Donwood and The White Chocolate Farm.
"Paranoid Android"Director: Magnus CarlssonProducer: Peter GustaffsonProduction company: Wegelius Animation AB
"Street Spirit (Fade Out)"Director: Jonathan GlazerProducer: Nick MorrisCinematography: Steve Keith-RoachProduction company: Academy Music Video Ltd
"No Surprises"Director: Grant GeeProducer: Phil BarnesCinematography: Dan LandinProduction company: Kudos (Music Video)
"Just"Director: Jamie ThravesProducer: Niki AmosCinematography: Alexander SeligmanProduction company: Oil Factory Inc
"High and Dry" (U.S. version)Director: Paul Cunningham Producer: Myke ZykoffCinematography: Adam BeckmanProduction company: Oil Factory Inc
"Karma Police"Director: Jonathan GlazerProducer: Nick MorrisCinematography: Steve Keith-RoachProduction company: Academy Music Video Ltd
"Fake Plastic Trees"Director: Jake ScottProducer: Ellen JacobsonCinematography: Salvatore TotinoProduction company: Black Dog Films (LA)
References
Radiohead video albums
1998 video albums
Music video compilation albums
1998 compilation albums
Radiohead compilation albums
Parlophone compilation albums
Parlophone video albums |
https://en.wikipedia.org/wiki/Bit%20bucket | In computing jargon, the bit bucket (or byte bucket) is where lost computerized data has gone, by any means; any data which does not end up where it is supposed to, being lost in transmission, a computer crash, or the like, is said to have gone to the bit bucket – that mysterious place on a computer where lost data goes, as in:
History
Originally, the bit bucket was the container on teletype machines or IBM key punch machines into which chad from the paper tape punch or card punch was deposited; the formal name is "chad box" or (at IBM) "chip box". The term was then generalized into any place where useless bits go, a useful computing concept known as the null device. The term bit bucket is also used in discussions of bit shift operations.
The bit bucket is related to the first in never out buffer and write-only memory, in a joke datasheet issued by Signetics in 1972.
In a 1988 April Fool's article in Compute! magazine, Atari BASIC author Bill Wilkinson presented a POKE that implemented what he called a "WORN" (Write Once, Read Never) device, "a close relative of the WORM".
In programming languages the term is used to denote a bitstream which does not consume any computer resources, such as CPU or memory, by discarding any data "written" to it. In .NET Framework-based languages, it is the System.IO.Stream.Null.
See also
Black hole (networking)
Waste container metaphors
References
External links
Bit Bucket entry from The Jargon File (version 4.4.7)
Computer jargon
Punched card |
https://en.wikipedia.org/wiki/Morbo | Morbo may refer to:
Morbo, morbid fascination and antagonism, descriptive of the attitudes relating to the network of identities and relationships between Spanish football clubs; see Spanish football rivalries
Morbo, an alien news anchor on the animated television series Futurama
Morbo (band), a Mexican band
Morbo (album)
Morbo (film), a 1972 Spanish film by Gonzalo Suárez |
https://en.wikipedia.org/wiki/RNC | RNC may refer to:
Technology and sciences
Radio Network Controller, a governing element of a mobile phone network
Ribosome-nascent chain complex, in biology
Romanian National R&D Computer Network, registry for the .ro top-level domain
file extension for Relax NG files in compact syntax
Raster Navigational Charts (NOAA), a raster file format for nautical charts
Organisations
Royal Newfoundland Constabulary, a police force in Newfoundland and Labrador, Canada
Russia-NATO Council for cooperation between Russia and NATO military alliance
Politics
Republican National Committee, the principal campaign and fund-raising organization affiliated with the United States Republican Party
Republican National Convention, the nominating convention for the United States Republican Party
Rwanda National Congress, a political movement created by prominent Rwandan dissidents
Other
Riverside National Cemetery, a cemetery in Riverside, California for the interment of United States military personnel
Royal National College for the Blind, a college in Hereford, UK
Royal Niger Company, a mercantile company chartered by the British government in the nineteenth century
Rear naked choke, a martial arts move
NC (complexity), or RNC, a randomized complexity class in computational complexity theory
Nishinippon Broadcasting, a Japanese commercial broadcaster |
https://en.wikipedia.org/wiki/Motion%20%28software%29 | Motion is a software application produced by Apple Inc. for their macOS operating system. It is used to create and edit motion graphics, titling for video production and film production, and 2D and 3D compositing for visual effects.
History
The original product, codenamed "Molokini," was previewed at a NAB event on April 19, 2004.
Version 1.0 was made available on August 11, 2004.
At a pre-NAB event in April 2005, Apple released Motion 2 along with new revisions of the other Pro applications, optimised for the Power Mac G5 and Mac OS X 10.4.
Features introduced in Motion 2:
32-bit Rendering
Replicators
New filters
MIDI behavior
After Effects integration
In January 2006 Apple stopped selling Motion as a stand-alone product. Introduced at NAB in Las Vegas on April 15, 2007, Motion 3 was included as part of the Final Cut Studio 2 suite.
Features introduced in Motion 3:
3D multiplane environment - 2.5D compositing
3D text behaviors
Vector-based paint strokes
Point tracking and match moving
Image stabilization and SmoothCam
Synchronized Audio behavior
Dynamic retiming behaviors
Advanced Keyframe Editor - keyframe pen tool, transform box
Final Cut Pro integration - Motion 3 master templates
Motion 4 was introduced on July 23, 2009.
New features included:
3D Shadows
3D Reflections
Depth of Field
Credit Rolls
Adjust Glyph tool
Parameter Link behavior
Camera framing
Improved Sequence Text behavior, plus new presets
New text generators
New graphics generators
New filters
Multi-touch gesture support
ProRes 4444 support
Background export
Motion 5 was introduced on June 21, 2011. Motion 5 was once again sold as a stand-alone product. It is available through the Mac App Store at a reduced price of $49.99.
New features:
Final Cut Pro X plugin generation
Parameter rigs
New keyer
64-bit architecture
Motion 5.2 was released on April 13, 2015.
New features:
3D text
New generators
Improved shapes
Improved keyframing
Motion 5.3 was released on October 27, 2016.
Wide colour
Improved Link parameter behavior
New Align To behavior
Improved 3D text
Motion 5.4 was released on December 14, 2017, with new features:
360 VR motion graphics support
The ability to switch a current Motion document to be a Motion project, Final Cut Pro generator, Final Cut Pro title, Final Cut Pro effect, or Final Cut Pro transition
New Overshoot animation behavior
New filters for different photographic looks
Import, playback, and editing of HEVC video clips and HEIF photos.
Faster optical flow analysis
Motion 5.4.1 was released on April 9, 2018.
New feature:
ProRes RAW
Bug fixes
Motion 5.4.2 was released on November 15, 2018.
New features:
Advanced color grading
Comic filter
Tiny Planet filter - for displaying 360° spherical video in non-360° projects
Bug fixes - including use of Core Text engine for improved display of non-roman text
Motion 5.4.3 was released on March 21, 2019.
New feature:
Post-macOS Mojave media compatibility c |
https://en.wikipedia.org/wiki/EECS | EECS may refer to:
Electrical engineering and computer science
European Energy Certificate System
See also
EEC (disambiguation) |
https://en.wikipedia.org/wiki/C99 | C99 (previously known as C9X) is an informal name for ISO/IEC 9899:1999, a past version of the C programming language standard. It extends the previous version (C90) with new features for the language and the standard library, and helps implementations make better use of available computer hardware, such as IEEE 754-1985 floating-point arithmetic, and compiler technology. The C11 version of the C programming language standard, published in 2011, replaces C99.
History
After ANSI produced the official standard for the C programming language in 1989, which became an international standard in 1990, the C language specification remained relatively static for some time, while C++ continued to evolve, largely during its own standardization effort. Normative Amendment 1 created a new standard for C in 1995, but only to correct some details of the 1989 standard and to add more extensive support for international character sets. The standard underwent further revision in the late 1990s, leading to the publication of ISO/IEC 9899:1999 in 1999, which was adopted as an ANSI standard in May 2000. The language defined by that version of the standard is commonly referred to as "C99". The international C standard is maintained by the working group ISO/IEC JTC1/SC22/WG14.
Design
C99 is, for the most part, backward compatible with C89, but it is stricter in some ways.
In particular, a declaration that lacks a type specifier no longer has int implicitly assumed. The C standards committee decided that it was of more value for compilers to diagnose inadvertent omission of the type specifier than to silently process legacy code that relied on implicit int. In practice, compilers are likely to display a warning, then assume int and continue translating the program.
C99 introduced several new features, many of which had already been implemented as extensions in several compilers:
inline functions
intermingled declarations and code: variable declaration is no longer restricted to file scope or the start of a compound statement (block)
several new data types, including long long int, optional extended integer types, an explicit boolean data type, and a complex type to represent complex numbers
variable-length arrays (although subsequently relegated in C11 to a conditional feature that implementations are not required to support)
flexible array members
support for one-line comments beginning with //, as in BCPL, C++ and Java
new library functions, such as snprintf
new headers, such as <stdbool.h>, <complex.h>, <tgmath.h>, and <inttypes.h>
type-generic math (macro) functions, in <tgmath.h>, which select a math library function based upon float, double, or long double arguments, etc.
improved support for IEEE floating point
designated initializers (for example, initializing a structure by field names: struct point p = { .x = 1, .y = 2 };)
compound literals (for instance, it is possible to construct structures in function calls: function((struct x) {1, 2}))
|
https://en.wikipedia.org/wiki/NTS | NTS may refer to:
Broadcasting
NTS Radio Online Radio Station, Hackney, Great Britain
National Traffic System, an organized network of amateur radio operators
National Television Service, television channel in Papua New Guinea
Nederlandse Televisie Stichting, now Nederlandse Omroep Stichting (Dutch Television Organization)
Education
National Technological University (United States), Fort Collins, Colorado
National Testing Service, an academic testing service in Pakistan
National Theatre School of Canada
National Training System (Australia), the Australian system for vocational education and training
National Treasury School, the French government's school for training civil servants
Nazarene Theological Seminary, a theological seminary in Kansas City
The Nelson Thomlinson School in Cumbria, Great Britain
New Testament Studies, an academic journal
Science
Nevada Test Site, nuclear testing
National Topographic System, used by Natural Resources Canada
Non-topological soliton, in quantum field theory
Neurotensin, a neuropeptide hormone
Neurotypical, a term for people not on the autistic or psychotic spectra
Nucleus tractus solitarii (literally "nucleus of the solitary tract")
NTS GmbH, Nature Technology Systems, Berlin, Germany
Transportation
Nashua Transit System, provides public transit services for the city of Nashua, New Hampshire
Nashville Terminal Subdivision, a railroad line owned by CSX Transportation
Nepal Transport Service, Nepalese public bus line
Other
NTS Motorsports, auto racing team, United States
National Alliance of Russian Solidarists, Narodno-Trudovoy Soyuz, a Russian anti-communist organization
National Tax Service (South Korea)
National Theatre of Scotland
National Ticketing Solution, a New Zealand public transport ticketing project
National Transmission System, distributes gas throughout Great Britain
National Trust for Scotland, a Scottish conservation organization
Network Time Security, a secure version of NTP
Norwegian Sign Language, the principal sign language of Norway
Null-terminated string, a data type in computer programming |
https://en.wikipedia.org/wiki/Symbolic%20execution | In computer science, symbolic execution (also symbolic evaluation or symbex) is a means of analyzing a program to determine what inputs cause each part of a program to execute. An interpreter follows the program, assuming symbolic values for inputs rather than obtaining actual inputs as normal execution of the program would. It thus arrives at expressions in terms of those symbols for expressions and variables in the program, and constraints in terms of those symbols for the possible outcomes of each conditional branch. Finally, the possible inputs that trigger a branch can be determined by solving the constraints.
The field of symbolic simulation applies the same concept to hardware. Symbolic computation applies the concept to the analysis of mathematical expressions.
Example
Consider the program below, which reads in a value and fails if the input is 6.
int f() {
...
y = read();
z = y * 2;
if (z == 12) {
fail();
} else {
printf("OK");
}
}
During a normal execution ("concrete" execution), the program would read a concrete input value (e.g., 5) and assign it to y. Execution would then proceed with the multiplication and the conditional branch, which would evaluate to false and print OK.
During symbolic execution, the program reads a symbolic value (e.g., λ) and assigns it to y. The program would then proceed with the multiplication and assign λ * 2 to z. When reaching the if statement, it would evaluate λ * 2 == 12. At this point of the program, λ could take any value, and symbolic execution can therefore proceed along both branches, by "forking" two paths. Each path gets assigned a copy of the program state at the branch instruction as well as a path constraint. In this example, the path constraint is λ * 2 == 12 for the if branch and λ * 2 != 12 for the else branch. Both paths can be symbolically executed independently. When paths terminate (e.g., as a result of executing fail() or simply exiting), symbolic execution computes a concrete value for λ by solving the accumulated path constraints on each path. These concrete values can be thought of as concrete test cases that can, e.g., help developers reproduce bugs. In this example, the constraint solver would determine that in order to reach the fail() statement, λ would need to equal 6.
Limitations
Path explosion
Symbolically executing all feasible program paths does not scale to large programs. The number of feasible paths in a program grows exponentially with an increase in program size and can even be infinite in the case of programs with unbounded loop iterations. Solutions to the path explosion problem generally use either heuristics for path-finding to increase code coverage, reduce execution time by parallelizing independent paths, or by merging similar paths. One example of merging is veritesting, which "employs static symbolic execution to amplify the effect of dynamic symbolic execution".
Program-dependent efficiency
Symbolic execution is used to reason |
https://en.wikipedia.org/wiki/Redirection%20%28computing%29 | In computing, redirection is a form of interprocess communication, and is a function common to most command-line interpreters, including the various Unix shells that can redirect standard streams to user-specified locations.
In Unix-like operating systems, programs do redirection with the system call, or its less-flexible but higher-level stdio analogues, and .
Redirecting standard input and standard output
Redirection is usually implemented by placing certain characters between commands.
Basic
Typically, the syntax of these characters is as follows, using < to redirect input, and > to redirect output. command > file1 executes , placing the output in , as opposed to displaying it at the terminal, which is the usual destination for standard output. This will clobber any existing data in .
Using command < file1 executes , with as the source of input, as opposed to the keyboard, which is the usual source for standard input.
command < infile > outfile combines the two capabilities: reads from and writes to
Variants
To append output to the end of the file, rather than clobbering it, the >> operator is used: command1 >> file1.
To read from a stream literal (an inline file, passed to the standard input), one can use a here document, using the << operator:
$ tr a-z A-Z << END_TEXT
> one two three
> uno dos tres
> END_TEXT
ONE TWO THREE
UNO DOS TRES
To read from a string, one can use a here string, using the <<< operator: tr a-z A-Z <<< "one two three", or:
$ NUMBERS="one two three"
$ tr a-z A-Z <<< "$NUMBERS"
ONE TWO THREE
Piping
Programs can be run together such that one program reads the output from another with no need for an explicit intermediate file. command1 | command2 executes , using its output as the input for (commonly called piping, with the "|" character being known as the "pipe").
The two programs performing the commands may run in parallel with the only storage space being working buffers (Linux allows up to 64K for each buffer) plus whatever work space each command's processing requires. For example, a "sort" command is unable to produce any output until all input records have been read, as the very last record received just might turn out to be first in sorted order. Dr. Alexia Massalin's experimental operating system, Synthesis, would adjust the priority of each task as they ran according to the fullness of their input and output buffers.
This produces the same end result as using two redirects and a temporary file, as in:
$ command1 > tempfile
$ command2 < tempfile
$ rm tempfile
But here, does not start executing until has finished, and a sufficiently large scratch file is required to hold the intermediate results as well as whatever work space each task required. As an example, although DOS allows the "pipe" syntax, it employs this second approach. Thus, suppose some long-running program "Worker" produces various messages as it works, and that a second program, TimeStamp copies each record from stdin to stdout, |
https://en.wikipedia.org/wiki/Code%20Complete | Code Complete is a software development book, written by Steve McConnell and published in 1993 by Microsoft Press, encouraging developers to continue past code-and-fix programming and the big design up front and waterfall models. It is also a compendium of software construction techniques, which include techniques from naming variables to deciding when to write a subroutine.
Summary
McConnell defines the main activities in construction as detailed design, construction planning, coding and debugging, unit testing, integration and integration testing. Although he does not dismiss the value of other aspects of software development such as requirements and documentation, McConnell emphasises the construction of software due to several reasons. Within the view of the book, construction is a large part of software development, as the central activity within software development and can significantly improve the productivity of a programmer when focus is directed towards it; in addition, the source code is seen as defining the operation of the software, with documentation implicated when code and documentation are opposed. Lastly, the book contends that construction is the exclusive activity which is guaranteed to remain completed.
The techniques of a good programmer are also given throughout the book. The whole part seven of the book is about software craftsmanship (layout, style, character, themes and self-documentation).
The other six parts of the book are: laying the foundation, creating high-quality code, variables, statements, code improvements and system considerations.
Reception
Code Complete has received outstanding reviews, being widely regarded as one of the leading must-reads for software developers. It won a Jolt Award in 1993.
There are also negative reviews about the length and style of the book, which runs to over 900 pages and goes into detail on many topics.
The first edition has been superseded by Code Complete 2. The first editions can be found used and are still relevant for programmers using C, Pascal and GW-BASIC
Editions
First edition (1993)
Second edition (June 2004)
References
External links
Steve McConnell's website
Code Complete Checklists
1993 non-fiction books
Software development books
Microsoft Press books |
https://en.wikipedia.org/wiki/Pilot%20ACE | The Pilot ACE (Automatic Computing Engine) was one of the first computers built in the United Kingdom. Built at the National Physical Laboratory (NPL) in the early 1950s, it was also one of the earliest general-purpose, stored-program computers – joining other UK designs like the Manchester Mark 1 and EDSAC of the same era. It was a preliminary version of the full ACE, which was designed by Alan Turing, who left NPL before the construction was completed.
History
Pilot ACE was built to a cut down version of Turing's full ACE design. After Turing left NPL (in part because he was disillusioned by the lack of progress on building the ACE), James H. Wilkinson took over the project. Donald Davies, Harry Huskey and Mike Woodger were involved with the design. The Pilot ACE ran its first program on 10 May 1950, and was demonstrated to the press in November 1950.
Although originally intended as a prototype, it became clear that the machine was a potentially useful resource, especially given the lack of other computing devices at the time. After some upgrades to make operational use practical, it went into service in late 1951 and saw considerable operational service over the next several years. One reason Pilot ACE was useful is that it was able to perform floating-point arithmetic necessary for scientific calculations. Wilkinson tells the story of how this came to be.
When first built, Pilot ACE did not have hardware for either multiplication or division, in contrast to other computers at that time. (Hardware multiplication was added later.) Pilot ACE started out using fixed-point multiplication and division implemented as software. It soon became apparent that fixed-point arithmetic was a bad idea because the numbers quickly went out of range. It only took a short time to write new software so that Pilot ACE could do floating-point arithmetic. After that, James Wilkinson became an expert and wrote a book on rounding errors in floating-point calculations, which eventually sold well.
Pilot ACE used approximately 800 vacuum tubes. Its main memory consisted of mercury delay lines with an original capacity of 128 words of 32 bits each, which was later expanded to 352 words. A 4096-word drum memory was added in 1954. Its basic clock rate, 1 megahertz, was the fastest of the early British computers. The time to execute instructions was highly dependent on where they were in memory (due to the use of delay-line memory). An addition could take anywhere from 64 to 1024 microseconds.
The machine was so successful that a commercial version of it, named the DEUCE, was constructed and sold by the English Electric Company.
Pilot ACE was shut down in May 1955, and was given to the Science Museum, where it remains today.
Software
Installing the magnetic drum in 1954 opened the way to develop a control program for running programs dealing with matrices. Following urging by J. M. Hahn of the British Aircraft Corporation, Brian W. Munday developed General Interpre |
https://en.wikipedia.org/wiki/Apriori%20algorithm | Apriori is an algorithm for frequent item set mining and association rule learning over relational databases. It proceeds by identifying the frequent individual items in the database and extending them to larger and larger item sets as long as those item sets appear sufficiently often in the database. The frequent item sets determined by Apriori can be used to determine association rules which highlight general trends in the database: this has applications in domains such as market basket analysis.
Overview
The Apriori algorithm was proposed by Agrawal and Srikant in 1994. Apriori is designed to operate on databases containing transactions (for example, collections of items bought by customers, or details of a website frequentation or IP addresses). Other algorithms are designed for finding association rules in data having no transactions (Winepi and Minepi), or having no timestamps (DNA sequencing). Each transaction is seen as a set of items (an itemset). Given a threshold , the Apriori algorithm identifies the item sets which are subsets of at least transactions in the database.
Apriori uses a "bottom up" approach, where frequent subsets are extended one item at a time (a step known as candidate generation), and groups of candidates are tested against the data. The algorithm terminates when no further successful extensions are found.
Apriori uses breadth-first search and a Hash tree structure to count candidate item sets efficiently. It generates candidate item sets of length from item sets of length . Then it prunes the candidates which have an infrequent sub pattern. According to the downward closure lemma, the candidate set contains all frequent -length item sets. After that, it scans the transaction database to determine frequent item sets among the candidates.
The pseudo code for the algorithm is given below for a transaction database , and a support threshold of . Usual set theoretic notation is employed, though note that is a multiset. is the candidate set for level . At each step, the algorithm is assumed to generate the candidate sets from the large item sets of the preceding level, heeding the downward closure lemma. accesses a field of the data structure that represents candidate set , which is initially assumed to be zero. Many details are omitted below, usually the most important part of the implementation is the data structure used for storing the candidate sets, and counting their frequencies.
Apriori(T, ε)
L1 ← {large 1 - itemsets}
k ← 2
while Lk−1 is not empty
Ck ← Apriori_gen(Lk−1, k)
for transactions t in T
Dt ← {c in Ck : c ⊆ t}
for candidates c in Dt
count[c] ← count[c] + 1
Lk ← {c in Ck : count[c] ≥ ε}
k ← k + 1
return Union(Lk)
Apriori_gen(L, k)
result ← list()
for all p ∈ L, q ∈ L where p1 = q1, p2 = q2, ..., pk-2 = qk-2 and pk-1 < qk-1
c = p ∪ {qk-1}
if u ∈ L for a |
https://en.wikipedia.org/wiki/Link%20TV | Link TV, originally WorldLink TV, is a non-commercial American satellite television network providing what it describes as "diverse perspectives on world and national issues." It was carried nationally on DirecTV (ch. 375) until January 2023 and is still on Dish Network (ch. 9410). Link TV was launched as a daily, 24-hour non-commercial network on December 15, 1999. It receives no money from the satellite providers, but relies instead on contributions from viewers and foundations.
Link TV broadcasts a mix of documentaries, global and national news, music of diverse cultures, and programs promoting citizen action. The network also airs English language news from Al Jazeera English, Deutsche Welle, NHK and France 24, as well as various documentaries and world music videos. Select Link TV programs are streamed on the Internet, via the channel's website.
The network also produced Mosaic: World News from the Middle East, a program of translated news reports from the Middle East.
History
Direct satellite broadcasters were mandated to set aside 4% of its channel space for noncommercial educational and informational programming. ITVS, Internews Network and Internews Interactive joined in forming Link Media Inc. to program a channel, WorldLink TV, for this mandate. WorldLink TV was one of the nine channels select to meet the mandate for DirecTV.
In October 2012, Link TV announced that it was merging with KCET, an independent public television station in Los Angeles, to form a new nonprofit entity, to be called KCETLink. The entity was headquartered at KCET's Burbank facilities. In 2018, KCETLink merged with the KOCE-TV Foundation to form the Public Media Group of Southern California.
The channel was removed from the DirecTV lineup on January 15, 2023, as Link TV has chosen not to renew its yearly public interest contract with the satellite provider.
Production and projects
In 2010, Link TV announced the launch of ViewChange.org, an online video platform funded by the Bill & Melinda Gates Foundation that aims to raise awareness of global development issues. It applies Semantic Web technology to video, in order to automatically create links to related content from other online sources.
In conjunction with the New York City Human Rights Watch International Film Festival, LinkTV broadcast a "Youth Producing Change" program which showcases the works of youth from all over the world. They also support efforts to fund groups such as imMEDIAte Justice Productions which help youth create their own film works.
Production facilities for Link TV are in San Francisco, Washington, D.C., and Burbank, California.
Programs
Original
Mosaic: World News from the Middle East
Mosaic Intelligence Report
Global Pulse
Latin Pulse
CINEMONDO
Global Spirit
Explore
Earth Focus
Who Speaks for Islam
Bridge to Iran
Real Conversations
Global Lens
Oceans 8
DOC-DEBUT
4REAL
Men of Words
Lunch with Bokara
Bokara's Conversations on Consciousness
U.S.-Muslim En |
https://en.wikipedia.org/wiki/LEO%20%28website%29 | LEO (meaning Link Everything Online) is an Internet-based electronic dictionary and translation dictionary initiated by the computer science department of the Technical University of Munich in Germany. After a spin-out, the dictionaries have been run since 3 April 2006 by the limited liability company Leo GmbH, formed by the members of the original Leo team, and are partially funded by commercial advertising on the website. Its dictionaries can be consulted free online from any web browser or from LEO's Lion downloadable user interface (GUI) which is free since version 3.0 (released 13 January 2009) to private users only and no longer sold as shareware. Corporate users and research institutions are however required to purchase a license.
Dictionaries
The website hosts eight free German language based bilingual dictionaries and forums for additional language queries. The dictionaries are characterized by providing translations in forms of hyperlinks to further dictionary queries, thereby facilitating back translations. The dictionaries are partly added to and corrected by large vocabulary donations of individuals or companies, partly through suggestions and discussions on the LEO language forums.
For any of the eight foreign languages, there's at least one (in the cases of English and French two) qualified employee in charge (whose mother tongue is either German and who has studied the respective other idiom or vice versa). These employees oversee the above-mentioned donations and suggestions before integrating them in the dictionary. Thus, an entry can never be simply made by a registered user. These registered users, on the other hand, have the possibility to communicate in the eight different forums where native German speakers and the other native speakers collaborate alike, providing help with finding idiomatic equivalents for phrases or texts etc.
English–German
The English-German dictionary run by Leo since 1995 contains around 800,000 entries and receives an average of 11 million queries per weekday.
French–German
In 2004, a French–German dictionary was added to the site's services and has about 257,000 entries. This one gets about 2.6 million queries each weekday.
Spanish–German
A Spanish–German dictionary with about 208,000 entries was introduced on 3 April 2006. It gets about 2 million queries each weekday.
Italian–German
An Italian-German was started on 3 April 2008. At the time of the public launch, the dictionary contained about 140,000 entries and received 77,000 queries on the first day.
Chinese–German
The Chinese–German dictionary was started on the same date as the Italian–German dictionary, 3 April 2008. Queries can be entered by using Pinyin, or traditional or simplified characters. The dictionary started with about 65,000 entries and received about 93,000 queries on the first day. Today it contains about 195,000 entries and receives an average of 240,000 queries each weekday. Due to text encoding limitations, the |
https://en.wikipedia.org/wiki/List%20of%20video%20game%20musicians | The following is a list of computer and video game musicians, those who have worked in the video game industry to produce video game soundtracks or otherwise contribute musically. A broader list of major figures in the video game industry is also available.
For a full article, see video game music. The list is sorted in alphabetical order by last name.
A
Rod Abernethy – The Hobbit, Star Trek: Legacy, King Arthur, Rise of the Kasai, Blazing Angels, Marvel Universe, The Gauntlet, The Sims Bustin' Out
Masamichi Amano – Quest 64
Yoshino Aoki – Mega Man X3 (Capcom Sound Team), Breath of Fire III (with Akari Kaida), Breath of Fire IV, Mega Man Battle & Chase
Noriyuki Asakura – Tenchu: Stealth Assassins, Tenchu 2: Birth of the Stealth Assassins, Tenchu: Wrath of Heaven, Way of the Samurai, Way of the Samurai 2, Kamiwaza
B
Michael Bacon – VS, Duke Nukem: Land of the Babes, EverQuest II: The Shadow Odyssey
Angelo Badalamenti – Indigo Prophecy
Kelly Bailey – Half-Life, Half-Life 2, Half-Life 2: Episode One, Half-Life 2: Episode Two, Portal
Clint Bajakian – Star Wars Jedi Knight II: Jedi Outcast, Star Wars Jedi Knight: Jedi Academy, Star Wars: Knights of the Old Republic
Lorne Balfe – Call of Duty: Modern Warfare 2, Skylanders: Spyro's Adventure, Assassin's Creed: Revelations, Skylanders: Giants, Assassin's Creed III, Beyond: Two Souls
Danny Baranowsky – Super Meat Boy, Canabalt, Crypt of the Necrodancer and The Binding of Isaac
Stephen Barton – Call of Duty 4: Modern Warfare, Titanfall series, Star Wars Jedi: Fallen Order
Joe Basquez – Ultima Online
Jean Baudlot – Bio Challenge, Bad Dudes, Future Wars, Castle Warrior, Beach Volley, Snow Brothers, Operation Stealth, Ivanhoe, Cruise for a Corpse, Flashback: The Quest for Identity
Stephen Baysted – Project Cars series, Fast and Furious Crossroads, Need for Speed: Shift 2 Unleashed
Robin Beanland – Killer Instinct series, Conker's Bad Fur Day, Sea of Thieves
David Bergeaud – Ratchet and Clank series, Resistance: Fall of Man
Daniel Bernstein – Blood, Claw
Teddy Blass – Chain Shooter, Fortune's Prime
Alexander Brandon – Unreal, Unreal Tournament, Deus Ex, Gauntlet: Seven Sorrows, Alpha Protocol, Unreal 2, Deus Ex: Invisible War, Battlestar Galactica, Neverwinter Nights 2: Mask of the Betrayer, Bejeweled 3 (with Peter Hajba)
Allister Brimble – Alien Breed, Superfrog, RollerCoaster Tycoon, Driver, Driver 2, RollerCoaster Tycoon 2
Russell Brower – World of Warcraft: The Burning Crusade, World of Warcraft: Wrath of the Lich King, World of Warcraft: Cataclysm, Diablo III, Starcraft 2
Bill Brown – Command and Conquer: Generals, Command & Conquer: Generals Zero Hour, Return to Castle Wolfenstein, Tom Clancy's Ghost Recon, Tom Clancy's Ghost Recon: Island Thunder, Tom Clancy's Ghost Recon: Jungle Storm, Tom Clancy's Rainbow Six, Tom Clancy's Rainbow Six: Rogue Spear, Tom Clancy's Rainbow Six: Black Thorn, Tom Clancy's Rainbow Six 3: Raven Shield, Tom Clancy's Rainbow Six: Lockdown, Wolfenstein: Enemy Territory
Davi |
https://en.wikipedia.org/wiki/Mmap | In computing, mmap(2) is a POSIX-compliant Unix system call that maps files or devices into memory. It is a method of memory-mapped file I/O. It implements demand paging because file contents are not immediately read from disk and initially use no physical RAM at all. The actual reads from disk are performed after a specific location is accessed, in a lazy manner. After the mapping is no longer needed, the pointers must be unmapped with munmap(2). Protection information—for example, marking mapped regions as executable—can be managed using mprotect(2), and special treatment can be enforced using madvise(2).
In Linux, macOS and the BSDs, mmap can create several types of mappings. Other operating systems may only support a subset of these; for example, shared mappings may not be practical in an operating system without a global VFS or I/O cache.
History
The original design of memory-mapped files came from the TOPS-20 operating system. mmap and associated systems calls were designed as part of the Berkeley Software Distribution (BSD) version of Unix. Their API was already described in the 4.2BSD System Manual, even though it was neither implemented in that release, nor in 4.3BSD. Sun Microsystems had implemented this very API, though, in their SunOS operating system. The BSD developers at University of California, Berkeley unsuccessfully requested Sun to donate its implementation; 4.3BSD-Reno was instead shipped with an implementation based on the virtual memory system of Mach.
File-backed and anonymous
File-backed mapping maps an area of the process's virtual memory to files; that is, reading those areas of memory causes the file to be read. It is the default mapping type.
Anonymous mapping maps an area of the process's virtual memory not backed by any file. The contents are initialized to zero. In this respect an anonymous mapping is similar to malloc, and is used in some malloc implementations for certain allocations, particularly large ones. Anonymous mappings are not part of the POSIX standard, but are implemented in almost all operating systems by the MAP_ANONYMOUS and MAP_ANON flags.
Memory visibility
If the mapping is shared (the MAP_SHARED flag is set), then it is preserved when a process is forked (using a fork(2) system call). Therefore, writes to a mapped area in one process are immediately visible in all related (parent, child or sibling) processes. If the mapping is shared and backed by a file (not MAP_ANONYMOUS) the underlying file medium is only guaranteed to be written after it is passed to the msync(2) system call. In contrast, if the mapping is private (the MAP_PRIVATE flag is set), the changes will neither be seen by other processes nor written to the file.
A process reading from, or writing to, the underlying file will not always see the same data as a different process that has mapped the file, since segments of the file are copied into RAM and only periodically flushed to disk. Synchronization can be forced with a call |
https://en.wikipedia.org/wiki/File%20descriptor | In Unix and Unix-like computer operating systems, a file descriptor (FD, less frequently fildes) is a process-unique identifier (handle) for a file or other input/output resource, such as a pipe or network socket.
File descriptors typically have non-negative integer values, with negative values being reserved to indicate "no value" or error conditions.
File descriptors are a part of the POSIX API. Each Unix process (except perhaps daemons) should have three standard POSIX file descriptors, corresponding to the three standard streams:
Overview
In the traditional implementation of Unix, file descriptors index into a per-process maintained by the kernel, that in turn indexes into a system-wide table of files opened by all processes, called the . This table records the mode with which the file (or other resource) has been opened: for reading, writing, appending, and possibly other modes. It also indexes into a third table called the inode table that describes the actual underlying files. To perform input or output, the process passes the file descriptor to the kernel through a system call, and the kernel will access the file on behalf of the process. The process does not have direct access to the file or inode tables.
On Linux, the set of file descriptors open in a process can be accessed under the path /proc/PID/fd/, where PID is the process identifier. File descriptor /proc/PID/fd/0 is stdin, /proc/PID/fd/1 is stdout, and /proc/PID/fd/2 is stderr. As a shortcut to these, any running process can also access its own file descriptors through the folders /proc/self/fd and /dev/fd.
In Unix-like systems, file descriptors can refer to any Unix file type named in a file system. As well as regular files, this includes directories, block and character devices (also called "special files"), Unix domain sockets, and named pipes. File descriptors can also refer to other objects that do not normally exist in the file system, such as anonymous pipes and network sockets.
The FILE data structure in the C standard I/O library usually includes a low level file descriptor for the object in question on Unix-like systems. The overall data structure provides additional abstraction and is instead known as a file handle.
Operations on file descriptors
The following lists typical operations on file descriptors on modern Unix-like systems. Most of these functions are declared in the <unistd.h> header, but some are in the <fcntl.h> header instead.
Creating file descriptors
(Linux)
(Linux)
(Linux)
(Linux)
(Linux)
(Linux)
(Linux)
(Linux)
(with flag CLONE_PIDFD, Linux)
(Linux)
(Linux)
(BSD)
(kFreeBSD)
Deriving file descriptors
Operations on a single file descriptor
,
,
,
,
, (also used for sending FDs to other processes over a Unix domain socket)
,
,
, (Linux)
, (Linux)
(Linux)
(Linux)
(Linux)
(Linux)
(kFreeBSD)
(with P_PIDFD ID type, Linux)
(stdio function:converts file descriptor to FILE*)
(stdio function: prints to file descri |
https://en.wikipedia.org/wiki/SES%20Sirius | SES Sirius, formerly called Nordic Satellite AB (NSAB) was the owner and operator of the two Sirius satellites, which provide the Nordic countries and the Baltic states, with TV, radio, data and communications solutions. The company is today entirely owned and controlled by SES and has no independent existence.
The 2004 SES Annual Report states that 16.4 million homes received broadcast and broadband services from the Sirius system, 1.5 million from the satellites directly and another 14.9 million from cable networks distributing content via Sirius.
History
In 1982 the governments of Sweden and Norway formed NSAB as part of a wide-ranging partnership for the purpose of "telecommunication satellite cooperation". In 1989 the two governments agreed to end their partnership, the Swedish government assumed full ownership with the acquisition of Norway's 15% share.
On April 2, 1989 NSAB's first satellite, the Aérospatiale built Tele-X, was launched on an Ariane 2 rocket from French Guiana. The Swedish Space Corporation (SSC) was contracted to operate the TELE-X system and in 1993 the company acquired the Swedish government's shares, becoming the sole owner.
In late 1993 NSAB acquired Marco Polo 1, a Hughes 376 geostationary communications satellite, from British Sky Broadcasting. Marco Polo 1 was built for and operated by British Satellite Broadcasting. However following that company's collapse it merged with Sky Television to form BSkyB. In this "merger" Sky was the dominant force and their system of transponder lease from SES' Astra satellites was maintained. Marco Polo 1 (and its sister satellite) were gradually withdrawn from service.
In February 1994 Teracom acquired a 50% share of NSAB. The same month Marco Polo 1 re-entered service as Sirius 1 at 5°E. In July 1994 NSAB agreed the purchase of Sirius 2 from Aérospatiale (later Alcatel Space). The satellite was successfully launched on November 12, 1997 by Ariane 4 rocket. Shortly after launch SES signed a lease agreement for all transponders on the satellite.
In 1996 Tele Danmark acquired a 25% share in NSAB from Teracom.
In May 1997 NSAB ordered a Hughes 376HP. The Sirius 3 satellite was successfully launched on October 5, 1998, again by Ariane 4 rocket.
In October 2000 SES acquired the shares of Tele Danmark and Teracom to become 50-50 joint owner with SSC. SES increased its shareholding to 75% in December 2003, and renamed the company to SES Sirius on December 1, 2005. In January 2008, SES further increased its shareholding in SES Sirius to 90%.
In March 2010 SES (as then subsidiary SES Astra) took full control and in June 2010 the company was renamed SES Astra and the only fully operational satellite, Sirius 4, renamed Astra 4A.
Sources
External links
SES - Official SES site
SES fleet information
SES S.A.
Communications satellite operators
Satellite television
Government-owned companies of Sweden
Science and technology in Sweden
Norway–Sweden relations |
https://en.wikipedia.org/wiki/Nick%20Jr. | Nick Jr. is an American morning programming block that airs on Nickelodeon every weekday. It was launched on January 4, 1988. Nick Jr. features a lineup of shows aimed at children under six.
In 2009, Nickelodeon launched a separate channel named after the Nick Jr. block. The channel is known on air as the "Nick Jr. Channel" to differentiate the two services.
History
Early years (1988–1993)
Since its launch on April 1, 1979, and throughout the 1980s, Nickelodeon aired programs for preschoolers (most prominently Pinwheel and Today's Special) on weekdays (from 8:00 am – 2:00 pm) and weekend mornings. After Nickelodeon's preschool block premiered a slew of new shows in 1987, it began using the Nick Junior branding on , coinciding with the premiere of the Spanish program The World of David the Gnome. A new rebrand for the block that abbreviated its name to Nick Jr. was gradually unveiled September 5, 1988. Nick Jr.'s new logo was orange for 'Nick' and blue for 'Jr.', and it varied in the shape or species (e.g.: two gears, trains, robots, planets, insects, comets, or elephants). Like with Nickelodeon, Nick Jr.'s network IDs featured the block's logo in different shapes and styles. At launch, the block aired from 8:30 am – 2:30 pm. On weekends, preschool programs went unbranded and aired at earlier hours of the day.
Until June 29, 1990, Pinwheel was featured, originally for three hours (two in the morning and one at noon), then for one hour starting in spring 1989. When Nick Jr.'s original series Eureeka's Castle premiered in September, Pinwheel was split into two separate half hours in the morning and afternoon, where it remained until June 29, 1990, after which the block was truncated to start at 9:30 am - 2:30 pm on June 15, 1992, another solidified timing at 9:30 am - 2:00 pm on July 6, 1992 and last solidified timing at 9:00 am - 2:00 pm on October 5, 1992. Much of Nick Jr.'s other programs at the time were of Japanese or foreign origin (including Fred Penner's Place, Sharon, Lois & Bram's Elephant Show, Adventures of the Little Koala, Noozles, Maya the Bee, and The Littl' Bits).
Grow, Learn, and Play (1993–1994)
On , Nick Jr. premiered a new series, Cappelli & Company, and received a new rebrand which prominently featured a new Nick Jr. logo consisting of an orange parent and a blue child, and the slogan Grow, Learn, and Play. Several Nick Jr. promos and bumpers featured kids playing near the Nick Jr. logo and a theme song with the slogan sung to the melody of London Bridge, and a few featured Cappelli & Company mascot Frank Cappelli. Nick Jr. also started using a female announcer (who was replaced by a different one in 1994, 1998 and 2003) in its promos and bumpers. Nick Jr. began to invest more into producing original interstitial series (including 1994's Muppet Time, forty two-minute shorts from The Jim Henson Company) in order to stay within a self-imposed limit of five minutes of commercials per hour.
On April 4, 1994, the "Jim Henso |
https://en.wikipedia.org/wiki/List%20of%20radio%20stations%20in%20Missouri | The following is a list of FCC-licensed radio stations in the U.S. state of Missouri, which can be sorted by their call signs, frequencies, cities of license, licensees, and programming formats.
List of radio stations
Defunct
KADI
KADY
KBMX
KBZI
KCHR
KCSW-LP
KDFN
KDKD
KDMC-LP
KDNA
KESM
KFMZ
KIRL
KITE
KLWT
KMTS
KQBD
KQPW-LP
KQXQ
KUKU
KWK
KXBR
KXOK
KZJF
KZQZ
References
Missouri |
https://en.wikipedia.org/wiki/EFF%20Pioneer%20Award | The EFF Pioneer Award is an annual prize by the Electronic Frontier Foundation (EFF) for people who have made significant contributions to the empowerment of individuals in using computers. Until 1998 it was presented at a ceremony in Washington, D.C., United States. Thereafter it was presented at the Computers, Freedom, and Privacy conference. In 2007 it was presented at the O'Reilly Emerging Technology Conference.
Winners
1992: Douglas Engelbart, Robert E. Kahn, Tom Jennings, Jim Warren, Andrzej Smereczynski
1993: Paul Baran, Vint Cerf, Ward Christensen, Dave Hughes, USENET developers (accepted by Tom Truscott and Jim Ellis)
1994: Ivan Sutherland, Bill Atkinson, Whitfield Diffie and Martin Hellman, Murray Turoff and Starr Roxanne Hiltz, Lee Felsenstein, and the WELL (the Whole Earth 'Lectronic Link)
1995: Philip Zimmermann, Anita Borg, Willis Ware
1996: Robert Metcalfe, Peter Neumann, Shabbir Safdar and Matt Blaze
1997: Hedy Lamarr and George Antheil (special award; posthumous with respect to Antheil), Johan Helsingius, Marc Rotenberg
1998: Linus Torvalds, Richard Stallman, Barbara Simons
1999: Jon Postel (posthumous award), Drazen Pantic, Simon Davies
2000: "Librarians Everywhere" (accepted by Karen G. Schneider), Tim Berners-Lee, Phil Agre
2001: Bruce Ennis (posthumous award), Seth Finkelstein, Stephanie Perrin
2002: Dan Gillmor, Beth Givens, Jon Johansen and Writers of DeCSS
2003: Amy Goodman, Eben Moglen, David Sobel
2004: Kim Alexander, David L. Dill, Avi Rubin (for security issues with electronic voting)
2005: Mitch Kapor, Edward Felten, Patrick Ball
2006: Craigslist, Gigi Sohn, Jimmy Wales
2007: Yochai Benkler, Cory Doctorow, Bruce Schneier
2008: Mozilla Foundation and its chair Mitchell Baker; Michael Geist; and AT&T whistleblower Mark Klein
2009: Limor "Ladyada" Fried, Harri Hursti and Carl Malamud
2010: Steven Aftergood, James Boyle, Pamela Jones of the Groklaw website and Hari Krishna Prasad Vemuru
2011: Ron Wyden, Ian Goldberg, and Nawaat.org
2012: Andrew (bunnie) Huang, Jérémie Zimmermann, The Tor Project
2013: Aaron Swartz (posthumous award), James Love, Glenn Greenwald and Laura Poitras
2014: Frank La Rue, Zoe Lofgren, Trevor Paglen
2015: Caspar Bowden (posthumous award), Citizen Lab, Anriette Esterhuysen and the Association for Progressive Communications and Kathy Sierra
2016: Malkia Cyril of the Center for Media Justice, data protection activist Max Schrems, the authors of the "Keys Under Doormats" report, and California State Senators Mark Leno and Joel Anderson.
2017: Chelsea Manning, Mike Masnick, Annie Game
2018: Stephanie Lenz, Joe McNamee (from EDRi), Sarah T. Roberts
2019: danah boyd, Oakland Privacy, William Gibson
2020: Joy Buolamwini, Dr. Timnit Gebru, Deborah Raji; Danielle Blunt; Open Technology Fund Community
2021: Kade Crockford, Pam Dixon, Matt Mitchell
Name change to EFF Awards:
2022: Alaa Abd El-Fattah, Digital Defense Fund, Kyle Wiens
2022: Alexandra Asanovna Elbakyan, Librar |
https://en.wikipedia.org/wiki/COM%20file | A COM file is a type of simple executable file. On the Digital Equipment Corporation (DEC) VAX operating systems of the 1970s, .COM was used as a filename extension for text files containing commands to be issued to the operating system (similar to a batch file). With the introduction of Digital Research's CP/M (a microcomputer operating system), the type of files commonly associated with COM extension changed to that of executable files. This convention was later carried over to DOS. Even when complemented by the more general EXE file format for executables, the compact COM files remained viable and frequently used under DOS.
The .COM file name extension has no relation to the .com (for "commercial") top-level Internet domain name. However, this similarity in name has been exploited by malware writers.
DOS binary format
The COM format is the original binary executable format used in CP/M (including SCP and MSX-DOS) as well as DOS. It is very simple; it has no header (with the exception of CP/M 3 files), and contains no standard metadata, only code and data. This simplicity exacts a price: the binary has a maximum size of 65,280 (FF00h) bytes (256 bytes short of 64 KB) and stores all its code and data in one segment.
Since it lacks relocation information, it is loaded by the operating system at a pre-set address, at offset 0100h immediately following the PSP, where it is executed (hence the limitation of the executable's size): the entry point is fixed at 0100h. This was not an issue on 8-bit machines since they can address 64k of memory max, but 16-bit machines have a much larger address space, which is why the format fell out of use.
In the Intel 8080 CPU architecture, only 65,536 bytes of memory could be addressed (address range 0000h to FFFFh). Under CP/M, the first 256 bytes of this memory, from 0000h to 00FFh were reserved for system use by the zero page, and any user program had to be loaded at exactly 0100h to be executed. COM files fit this model perfectly. Before the introduction of MP/M and Concurrent CP/M, there was no possibility of running more than one program or command at a time: the program loaded at 0100h was run, and no other.
Although the file format is the same in DOS and CP/M, .COM files for the two operating systems are not compatible; DOS COM files contain x86 instructions and possibly DOS system calls, while CP/M COM files contain 8080 instructions and CP/M system calls (programs restricted to certain machines could also contain additional instructions for 8085 or Z80).
.COM files in DOS set all x86 segment registers to the same value and the SP (stack pointer) register to the offset of the last word available in the first 64 KB segment (typically FFFEh) or the maximum size of memory available in the block the program is loaded into for both, the program plus at least 256 bytes stack, whatever is smaller, thus the stack begins at the very top of the corresponding memory segment and works down from there.
In the or |
https://en.wikipedia.org/wiki/Logie%20Awards%20of%202004 | The 46th Annual TV Week Logie Awards was held on Sunday 18 April 2004 at the Crown Palladium in Melbourne, and broadcast on the Nine Network. The ceremony was hosted by Eddie McGuire, and guests included Mel Brooks and Ronn Moss.
Winners and nominees
In the tables below, winners are listed first and highlighted in bold.
Gold Logie
Acting/Presenting
Most Popular Programs
Most Outstanding Programs
Performers
Anastacia
Michael Bublé – "Moondance"
Shannon Noll
Guy Sebastian
Jane Turner (Kath) and Gina Riley (Kim) – "Lady Bump"
Cirque du Soleil
Hall of Fame
After a lifetime in the television industry, Sam Chisholm became the 21st inductee into the TV Week Logies Hall of Fame.
References
External links
2004 television awards
2004
2004 in Australian television
2004 awards in Australia |
https://en.wikipedia.org/wiki/WUWG | WUWG, FM 90.7, is the radio station that formerly broadcast at the University of West Georgia in Carrollton, Georgia, and is now a part of the Georgia Public Broadcasting radio state network. This station is one of several in the GPB system that also produces its own programming; however, the vast majority of the broadcast day is a simulcast of the statewide feed. That feed is also duplicated locally both by GPB's WJSP-FM in Warm Springs and WGPB-FM in Rome, with most NPR programming also carried by non-GPB station WABE from nearby Atlanta. Several programs are also duplicated on Atlanta's WRAS, most of whose broadcast day was involuntarily taken from Georgia State University students in June 2014, resulting in programs like Morning Edition and All Things Considered being aired in the Carrollton area on no fewer than five different frequencies at once for seven total hours every weekday. Originally licensed to the university and operated entirely by students, WUWG was transferred outright to GPB in 2004, though it is unclear under what circumstances. When GPB consolidated broadcasting operations in its Atlanta offices in 2008, Dr. Brad Yates, chair of the UWG Mass Communications department, made advances to start a new student-run radio station.
History
It has been on the air since 1973, originally with the call sign WWGC, when the school was named West Georgia College. The station previously broadcast a very diverse college radio format, but now carries mostly the GPB radio feed from Atlanta. With an omnidirectional antenna, it covers Carroll County and somewhat beyond with 500 watts ERP.
In August 1994, WWGC became an affiliate of Public Radio International. This allowed the school to terminate most of the student-created programs, and rely mainly on satellite feeds instead. The station ran a ratio of 70% satellite/network programming to 30% student programming, resulting in content probably more suited to WGC faculty, broadcasting that was not necessarily in the interest of the community at large or in accord with student preferences. WUWG airs local news and features, as well as a few student-produced programs in the evenings, but they are only a fraction of those provided previously before WGC obtained access to the public radio system.
In 2001, the station changed call letters from WWGC to WUWG, which reflected the school's name change. The University of West Georgia assumed its present name in 1995.
Personalities
Some notable former DJs at the station include Dale Hurlebaus (a/k/a ROKNDJ), Ryan Cameron, Rhubarb Jones, Rob Parker, Randall Davidson, Jonathan Dorsey, Lisa Lang, Kevin Sanders, Robert Ray, Audra Schwarz, Trevor Head, Drew Fountain, Bubba Petty, Jim Rosser, Mike Bland, Sean Gilbert, Lacey Smith, Brooks Robinson, Errol Crane, John Crosby, Tommy Butler, Jerry Edwards, Bryan Hubbard, Sam Mills, Teri Lamprey, Singin' Steve Sedberry, Emily Alexander, Joe Harris, Joshua Head, Michael Booth, Mark Veljkov, Dave Callaway, Dav |
https://en.wikipedia.org/wiki/David%20Koch%20%28television%20presenter%29 | David James Koch ( ; born 7 March 1956), nicknamed "Kochie" ( ), is an Australian television presenter who is best known as a host of the Seven Network's breakfast program, Sunrise from 2002 until 2023. From Adelaide, he began his media career as a financial journalist, writing for a number of different publications before eventually moving to television. Koch has been the chairman of the Port Adelaide Football Club, an Australian Football League (AFL) club, since October 2012.
Early life and financial journalism
Koch was born on 7 March 1956 in Adelaide, South Australia. He trained as an accountant and started as a cadet on the business pages of The Australian newspaper before joining BRW magazine soon after its launch in the early 1980s. He was one of the founders of consumer finance journalism in Australia and created Personal Investment magazine, which made him the youngest editor in the Fairfax Media group. He then launched Personal Investment magazines in New Zealand and the UK. He produced Britain's first "rich list" which started in Money Magazine which he had bought for Fairfax.
In 1988, he launched trade publishing group Australian Financial Press in a joint venture with Fairfax. AFP went on to create Business Magazine, New Accountant and Money Management magazines.
He provides business and financial commentary for several publications, including Pacific Magazines, Yahoo Finance and the "Your Money" section of News Ltd newspapers.
Koch was a director of the NSW Small Business Development Corporation Ltd for eight years after its inception in 1996. As a former business owner and operator and now director of Pinstripe Media Pty Ltd, he speaks regularly at corporate events about small business, finance and investment issues.
Koch has presented over 100 episodes of a weekly small business program on the Seven Network, Kochie's Business Builders, which helps private business owners improve their business. The program is produced by Koch's company Pinstripe Media.
In 2007, Koch launched Pinstripe Media, a video production and content marketing agency that manages a network of sites including Startup Daily, Flying Solo and Kochie's Business Builders.
In 2013, Koch launched KBB Digital, a digital marketing agency for small business which is an extension of the 'Kochie's Business Builders' brand.
In 2020, in partnership with Kylie Merritt, Koch launched ausbiz, an Australian business and finance streaming platform.
Television career
Sunrise
Koch was co-host of Seven Network's Sunrise breakfast program for 21 years, from 2002 until 2023. He was initially hired to replace Chris Reason who stepped down after a cancer diagnosis towards the end of 2002; however, his position later became permanent. He and his original co-host, Melissa Doyle, hosted the program over a period that saw viewer ratings grow until Sunrise became the leading breakfast television show in Australia.
In August 2022, the Seven Network released a statement declarin |
https://en.wikipedia.org/wiki/Banshee%20%28disambiguation%29 | In Irish and Scottish mythology, the banshee is a "fairy woman" whose mournful wail heralds an imminent death.
Banshee may also refer to:
Computing
Banshee (media player), a cross-platform open-source media player
Voodoo Banshee, a video card by 3Dfx
Fiction
Banshee (character), a superhero in Marvel Comics
"Banshee" (short story), a 1984 autobiographical short story by Ray Bradbury
Silver Banshee, a DC Comics character
Banshees, large flightless blind carnivorous birds in Marion Zimmer Bradley's Darkover series
Film and television
Banshee (film), a 2006 TV movie by Kari Skogland
Banshee (TV series), an American action television series
Mountain Banshee, a flying animal in the film Avatar
The Banshees of Inisherin, 2022 film sometimes informally called Banshees
Music
Banshee (band), a melodic power metal band from the 1980s American Midwest
The Banshee (band), an indie-new wave band from Genova
The Banshees (band), an American garage rock band
Banshee (album), a 2016 album by The Cave Singers
Siouxsie and the Banshees, a British rock band
The Banshee (composition), a musical piece by American composer Henry Cowell
"Banshee", an instrumental track by Irish band Thin Lizzy on their 1974 album Nightlife
"Banshee", a song by American electronic singer Santigold on her 2016 album 99¢
"The Banshee", a song by Serbian band Orthodox Celts on their 2017 album Many Mouths Shut!
"Banshee", the Irish entry by Anna Kearney to the Junior Eurovision Song Contest 2019
Vehicles
Banshee (dinghy), an American cat-rigged, one-design, sailing dinghy design
HMS Banshee (1894), a Banshee class destroyer
International Ultralite Banchee, ultralight aircraft
McDonnell F2H Banshee, a military fighter aircraft
Pontiac Banshee, a concept car
Yamaha Banshee 350, a high-performance all-terrain vehicle
Meggitt BTT-3 Banshee, a remotely piloted vehicle (aerial target system) developed by Meggitt Defence Systems
A-24 Banshee, USAAF equivalent of the SBD Dauntless dive bomber
Video games
Banshee (video game), a 1994 Amiga shoot 'em up video game
Other
Banshee (roller coaster), a steel roller coaster located at Kings Island amusement park in Mason, Ohio
See also |
https://en.wikipedia.org/wiki/Run%20%28magazine%29 | Run (stylized as RUN) was an American computer magazine published monthly by IDG Communications with its first issue debuting in January 1984. Bi-monthly publishing began in June/July 1990 (issue #78, volume 7 number 6), and went on until the magazine folded in November/December 1992 (issue #94, volume 9 number 6). In its heyday, Runs monthly circulation was in the 200,000–300,000 range. Folio, the trade journal of the magazine industry, rated it as the second fastest-growing U.S. magazine of 1985.
The magazine contained articles about Commodore 8-bit home computers and peripherals, as well as reviews on available software packages for the computers. In addition, every issue featured several type-in programs written in BASIC and/or machine language. The magazine's name came from the BASIC command "RUN", which started execution of the computer's program, presumably typed in from the magazine.
The front cover was originally accented by a logotype reading "RUN", with each letter placed on a key button resembling those used on the C-64. In June 1987 the keys were removed and the font became italicized with rounded letters.
Content
Run columns included the following:
Magic, perhaps the magazine's most distinctive feature, was a collection of short programs, programming tips, and tricks, mostly submitted by readers. Several dozen were published each month, and they were all numbered in hexadecimal, with each issue's numbering taking over where the last one had left off. Readers could write to Magic at P.O. Box 101011, a box number chosen for its binary appearance. Often, a "special issue" published at the end of the year would collect the year's Magic entries and augment them with many unpublished ones. This column, created and compiled by Louis F. Sander, debuted in the first issue and was run during the entire life of the magazine.
Mega-Magic was a monthly column that included type-in programming utilities larger and more powerful than those in the standard Magic columns.
Commodore Clinic, a letters column, allowed users to write in with questions about hardware and software issues, which would then be answered in the magazine.
Run Amok was an errata column that published corrections to previous type-in programs and articles.
Software Gallery reviewed various commercial software packages.
128 Mode, taken over from Commodore's own magazine when it was purchased by Run, included programming advice and short type-ins for the Commodore 128.
Gold Mine was another Louis F. Sander column taken over from Commodore's magazine. It featured tips and tricks for commercial games.
Contributors
Mike Konshak (aka Michael Vaughn Konshak), a BASIC software developer and mechanical engineer contributed the popular DataFile database management program and many other utilities for the Commodore 64 to Run. The code was first published in the back of the November 1984 issue. A small note, written by Mike at the end of the article, stated "If you don't want to type th |
https://en.wikipedia.org/wiki/Key%20schedule | In cryptography, the so-called product ciphers are a certain kind of cipher, where the (de-)ciphering of data is typically done as an iteration of rounds. The setup for each round is generally the same, except for round-specific fixed values called a round constant, and round-specific data derived from the cipher key called a round key. A key schedule is an algorithm that calculates all the round keys from the key.
Some types of key schedules
Some ciphers have simple key schedules. For example, the block cipher TEA splits the 128-bit key into four 32-bit pieces and uses them repeatedly in successive rounds.
DES has a key schedule in which the 56-bit key is divided into two 28-bit halves; each half is thereafter treated separately. In successive rounds, both halves are rotated left by one or two bits (specified for each round), and then 48 round key bits are selected by Permuted Choice 2 (PC-2) – 24 bits from the left half and 24 from the right. The rotations have the effect that a different set of bits is used in each round key; each bit is used in approximately 14 out of the 16 round keys.
To avoid simple relationships between the cipher key and the round keys, in order to resist such forms of cryptanalysis as related-key attacks and slide attacks, many modern ciphers use more elaborate key schedules to generate an "expanded key" from which round keys are drawn. Some ciphers, such as Rijndael (AES) and Blowfish, use the same operations as those used in the data path of the cipher algorithm for their key expansion, sometimes initialized with some "nothing-up-my-sleeve numbers". Other ciphers, such as RC5, expand keys with functions that are somewhat or completely different from the encryption functions.
Notes
Knudsen and Mathiassen (2004) give some experimental evidence that indicate that the key schedule plays a part in providing strength against linear and differential cryptanalysis. For toy Feistel ciphers, it was observed that those with complex and well-designed key schedules can reach a uniform distribution for the probabilities of differentials and linear hulls faster than those with poorly designed key schedules.
References
Lars R. Knudsen and John Erik Mathiassen, On the Role of Key Schedules in Attacks on Iterated Ciphers, ESORICS 2004, pp322–334.
Uri Blumenthal and Steven M. Bellovin, A Better Key Schedule for DES-like Ciphers, Proceedings of PRAGOCRYPT '96.
Cryptographic algorithms |
https://en.wikipedia.org/wiki/Reliance%20Communications | Reliance Communications Limited (RCOM) was an Indian mobile network provider headquartered in Navi Mumbai, Maharashtra that offered voice and 2G and 3G and 4G data services.
In February 2019, the company filed for bankruptcy as it was unable to sell assets to repay its debt. It has an estimated debt of against assets worth .
As of March 2020, the company reworked its strategy and continues to operate 4G data services, fixed-line communications, data center services, and enterprise solutions as well as subsea cable networks under the banner name, "Global Cloud Xchange".
History
Reliance Communications was founded in India on 15 July 2004 as Reliance Infocomm Limited with the introduction of its nationwide CDMA2000 service. It became Reliance Communications Limited in 2006. The company introduced its GSM service in 2008. It began using MIMO technology in 2011 to improve the quality of its 3G service, providing a data rate of up to 28 Mbit/s.
In the 2010 spectrum auction, Reliance obtained licenses for 3G spectrum in three cities at a total licensing fee of . The company reduced the price of its 3G service by 61 percent in May 2012.
Reliance and Lenovo introduced their co-branded Android smartphones in India in 2013.
The company ended its CDMA operations in 2016, and migrated its subscribers to its GSM and LTE networks by September the same year.
Acquisition of MTS India and Digicable
On 1 July 2010, the board of Reliance Communications confirmed the acquisition of Digicable India's largest cable network in all-stock deal. The new entity was named Reliance Digicom, which integrated RCOM's DTH TV, IPTV and retail broadband operations with Digicable.
On 14 January 2016, Reliance Communications announced that it had acquired Sistema Shyam TeleServices Limited (SSTL, operating as MTS India) in an all-stock deal. SSTL received a 10 per cent stake in Reliance Communications after repaying its existing debt. Reliance Communications would assume responsibility for instalments that MTS owed the government for spectrum purchases, amounting to every year for 10 years. As a result of the deal, Reliance acquired MTS India's subscribers and SSTL's spectrum in the 850 MHz band.
India's antitrust regulator, the Competition Commission of India (CCI) approved the merger in February 2016. The Securities and Exchange Board of India (SEBI) also cleared the deal. SSTL shareholders approved the merger on 18 March 2016. By mid-August, it was approved by tax authorities and the shareholders and creditors of Reliance and SSTL. The merger was approved by the Rajasthan High Court on 30 September 2016 and the Bombay High Court on 7 October 2016. In April 2017, Reliance laid off 600 employees in preparation for its mergers with MTS and Aircel.
The Department of Telecommunications gave the final approval for the merger on 20 October 2017. On 31 October 2017, Reliance Communications announced that the merger was complete.
Attempted merger with Aircel
In September 201 |
https://en.wikipedia.org/wiki/Consistency%20%28statistics%29 | In statistics, consistency of procedures, such as computing confidence intervals or conducting hypothesis tests, is a desired property of their behaviour as the number of items in the data set to which they are applied increases indefinitely. In particular, consistency requires that the outcome of the procedure with unlimited data should identify the underlying truth.
Use of the term in statistics derives from Sir Ronald Fisher in 1922.
Use of the terms consistency and consistent in statistics is restricted to cases where essentially the same procedure can be applied to any number of data items. In complicated applications of statistics, there may be several ways in which the number of data items may grow. For example, records for rainfall within an area might increase in three ways: records for additional time periods; records for additional sites with a fixed area; records for extra sites obtained by extending the size of the area. In such cases, the property of consistency may be limited to one or more of the possible ways a sample size can grow.
Estimators
A consistent estimator is one for which, when the estimate is considered as a random variable indexed by the number n of items in the data set, as n increases the estimates converge in probability to the value that the estimator is designed to estimate.
An estimator that has Fisher consistency is one for which, if the estimator were applied to the entire population rather than a sample, the true value of the estimated parameter would be obtained.
Tests
A consistent test is one for which the power of the test for a fixed untrue hypothesis increases to one as the number of data items increases.
Classification
In statistical classification, a consistent classifier is one for which the probability of correct classification, given a training set, approaches, as the size of the training set increases, the best probability theoretically possible if the population distributions were fully known.
Sparsistency
Let be a vector and define the support, , where is the th element of . Let be an estimator for . Then sparsistency is the property that the support of the estimator converges to the true support as the number of samples grows to infinity. More formally, as .
See also
Consistent estimator
Homogeneity (statistics)
Internal consistency
Reliability (statistics)
References
Asymptotic theory (statistics) |
https://en.wikipedia.org/wiki/VGC | VGC may refer to:
Valenzuela Gateway Complex
Video Graphics Controller
Video Games Chronicle, a website partnered with Gamer Network
Flemish Community Commission (Vlaamse Gemeenschapscommissie)
Volkswagen Group China
Pokemon Video Game Championships, see |
https://en.wikipedia.org/wiki/Kevin%20R.%20Kregel | Kevin Richard Kregel (born September 16, 1956) is an American former astronaut, and former member of the Space Launch Initiative Project at the Lyndon B. Johnson Space Center.
Personal data
Born on September 16, 1956, Kregel grew up in Amityville, New York. He was active in the Boy Scouts of America, where he achieved its second highest rank, Life Scout. Kregel is currently married to Jeanne F. Kammer of Farmingdale, New York, with whom he has four children. His parents, Alfred H. Kregel Jr., and Frances T. Kregel, are deceased.
Education
He graduated from Amityville Memorial High School, Amityville, New York. National Merit Scholar in 1974. He received a Bachelor of Science degree in Astronautical Engineering from the United States Air Force Academy in 1978 and received a Master of Science degree in public administration from Troy University in 1988.
Experience
Kregel graduated from the U.S. Air Force Academy in 1978, and earned his pilot wings in August 1979 at Williams Air Force Base, Arizona. From 1980 to 1983 he was assigned to F-111 aircraft at RAF Lakenheath. While serving as an exchange officer flying A-6E aircraft with the U.S. Navy at Naval Air Station Whidbey Island, Seattle, and aboard the USS Kitty Hawk, Kregel made 66 carrier landings during a cruise of the Western Pacific. His next assignment was an exchange tour at the U.S. Naval Test Pilot School at Patuxent River, Maryland. Upon graduation he was assigned to Eglin AFB, Florida, conducting weapons and electronic systems testing on the F-111, F-15, and the initial weapons certification test of the F-15E aircraft. Kregel resigned from active duty in 1990 in order to work for NASA. He has logged over 5,000 flight hours in 30 different aircraft.
NASA experience
In April 1990, Kregel was employed by NASA as an aerospace engineer and instructor pilot. Stationed at Ellington Field, Houston, Texas, his primary responsibilities included flying as an instructor pilot in the Shuttle Training Aircraft (STA) and conducting the initial flight test of the T-38 avionics upgrade aircraft.
Selected by NASA in March 1992, Kregel reported to the Johnson Space Center in August 1992. He completed one year of training and is qualified for assignment as a pilot on future Space Shuttle flight crews. Additional duties have included: Astronaut Support Personnel team at the Kennedy Space Center in Florida supporting Space Shuttle launches and landings; CAPCOM in Mission Control. A veteran of four space flights, Kregel has logged 52 days, 17 hours, 20 minutes and 5 seconds in space. He was the pilot on STS-70 (July 13–22, 1995) and STS-78 (June 20 to July 7, 1996), and was the spacecraft commander on STS-87 (November 19 to December 5, 1997) and STS-99 (February 11–22, 2000). Kregel was assigned to the Space Launch Initiative Project, Engineering Directorate, Johnson Space Center, until 2003, when he decided to retire from NASA. He went on to become a pilot for Southwest Airlines until retiring on Decem |
https://en.wikipedia.org/wiki/Computer%20Professionals%20for%20Social%20Responsibility | Computer Professionals for Social Responsibility (CPSR) was a global organization promoting the responsible use of computer technology. CPSR was incorporated in 1983 following discussions and organizing that began in 1981. It educated policymakers and the public on a wide range of issues. CPSR incubated numerous projects such as Privaterra, the Public Sphere Project, the Electronic Privacy Information Center, the 21st Century Project, the Civil Society Project, and the Computers, Freedom and Privacy Conference. Founded by U.S. computer scientists at Stanford University and Xerox PARC, CPSR had members in over 30 countries on six continents. CPSR was a non-profit 501.c.3 organization registered in California.
When CPSR was established, it was concerned solely about the use of computers in warfare. It was focused on the Strategic Computing Initiative, a US Defense project to use artificial intelligence in military systems, but added opposition to the Strategic Defense Initiative (SDI) shortly after the program was announced. The Boston chapter helped organize a debate related to the software reliability of SDI systems which drew national attention ("Software Seen as Obstacle in Developing 'Star Wars', Philip M. Boffey, (The New York Times, September 16, 1986) to these issues. Later, workplace issues, privacy, and community networks were added to CPSR's agenda.
CPSR began as a chapter-based organization and had chapters in Palo Alto, Boston, Seattle, Austin, Washington DC, Portland (Oregon) and other US locations as well as a variety of international chapters including Peru and Spain. The chapters often developed innovative projects including a slide show about the dangers of launch on warning (Boston chapter) and the Seattle Community Network (Seattle chapter).
CPSR sponsored two conferences: the Participatory Design Conferences which was held biennially and the Directions and Implications of Advanced Computing (DIAC) symposium series which was launched in 1987 in Seattle. The DIAC symposia have been convened roughly every other year since that time. Four books (Directions and Implications of Advanced Computing; Reinventing Technology, Rediscovering Community; Community Practice in the Network Society; Shaping the Network Society; "Liberating Voices: A Pattern Language for Communication Revolution") and two special sections in the Communications of the ACM ("Social Responsibility" and "Social Computing") resulted from the DIAC symposia.
CPSR awarded the Norbert Wiener Award for Social and Professional Responsibility. Some notable recipients include David Parnas, Joseph Weizenbaum, Kristen Nygaard, Barbara Simons, Antonia Stone, Peter G. Neumann, Marc Rotenberg, Mitch Kapor, and Douglas Engelbart. The final award in 2013 went posthumously to the organisation's first executive director, Gary Chapman. Since CPSR's dissolution, the IEEE Society on Social Implications of Technology (SSIT)is now making the Norbert Weiner awards |url=https://technolog |
https://en.wikipedia.org/wiki/CPSR | CPSR may refer to:
Centre for Postgraduate Studies and Research, at Tunku Abdul Rahman University College, Malaysia
Computer Professionals for Social Responsibility
Current Program Status Register, an ARM computer processor feature |
https://en.wikipedia.org/wiki/Norbert%20Wiener%20Award%20for%20Social%20and%20Professional%20Responsibility | The Norbert Wiener Award for Social and Professional Responsibility was established in 1987 in honor of Norbert Wiener to recognize contributions by computer professionals to socially responsible use of computers. It was awarded annually by CPSR, Computer Professionals for Social Responsibility, until that organization disbanded in 2013. The award is now managed by the IEEE Society for the Social Implications of Technology.
Winners
1987: David Parnas
1988: Joseph Weizenbaum
1989: Daniel McCracken
1990: Kristen Nygaard
1991: Severo Ornstein and Laura Gould
1992: Barbara Simons
1993: Institute for Global Communications
1994: Antonia Stone
1995: Tom Grundner
1996: Phil Zimmermann
1997: Peter Neumann
1998: Internet Engineering Task Force
1999: The Free Software & Open Source Movements
2000: Marc Rotenberg
2001: Nira Schwartz and Theodore Postol
2002: Karl Auerbach
2003: Mitch Kapor
2004: Barry Steinhardt
2005: Douglas Engelbart
2008: Bruce Schneier
2013: Gary Chapman
See also
Norbert Wiener Prize in Applied Mathematics
List of computer-related awards
Prizes named after people
External links
List of winners
Speech introducing the award
Documentary film about Norbert Wiener Award winner, Joseph Weizenbaum ( "Weizenbaum. Rebel at Work." )
IEEE Society for the Social Implications of Technology
Awards established in 1987
Computer-related awards
ja:社会的責任を考えるコンピュータ専門家の会#ノーバート・ウィーナー賞 |
https://en.wikipedia.org/wiki/ABC%20Network | ABC Network may refer to:
American Broadcasting Company, a commercial television network in the United States
Australian Broadcasting Corporation, Australia's public broadcaster
ABC Weekend TV, a former ITV company in the United Kingdom
Asahi Broadcasting Corporation, regional radio and television broadcaster in Japan
Associated Broadcasting Company
a former name of TV5 Network, a radio and television network in the Philippines
a former name of Associated Television (ATV), a former ITV company in the United Kingdom |
https://en.wikipedia.org/wiki/Yield | Yield may refer to:
Measures of output/function
Computer science
Yield (multithreading) is an action that occurs in a computer program during multithreading
See generator (computer programming)
Physics/chemistry
Yield (chemistry), the amount of product obtained in a chemical reaction
The arrow symbol in a chemical equation
Yield (engineering), yield strength of a material as defined in engineering and material science
Fission product yield
Nuclear weapon yield
Earth science
Crop yield, measurement of the amount of a crop harvested, or animal products such as wool, meat or milk produced, per unit area of land
Yield (wine), the amount of grapes or wine that is produced per unit surface of vineyard
Ecological yield, the harvestable population growth of an ecosystem, most commonly measured in forestry and fishery
Specific yield, a measure of aquifer capacity
Yield (hydrology), the volume of water escaping from a spring
Production/manufacturing
Yield (casting)
Throughput yield, a manufacturing evaluation method
A measure of functioning devices in semiconductor testing, see Semiconductor device fabrication#Device test
The number of servings provided by a recipe and hulk
Finance
Yield (finance), a rate of return for a security
Dividend yield and earnings yield, measures of dividends paid on stock
Other uses
Yield (college admissions), a statistic describing what percent of applicants choose to enroll
Yield (album), by Pearl Jam
Yield sign, a traffic sign
The Yield, a 2019 novel by Tara June Winch
Yield, a feature of a coroutine in computer programming
Yield, an element of the TV series The Amazing Race |
https://en.wikipedia.org/wiki/Autoregressive%20conditional%20heteroskedasticity | In econometrics, the autoregressive conditional heteroskedasticity (ARCH) model is a statistical model for time series data that describes the variance of the current error term or innovation as a function of the actual sizes of the previous time periods' error terms; often the variance is related to the squares of the previous innovations. The ARCH model is appropriate when the error variance in a time series follows an autoregressive (AR) model; if an autoregressive moving average (ARMA) model is assumed for the error variance, the model is a generalized autoregressive conditional heteroskedasticity (GARCH) model.
ARCH models are commonly employed in modeling financial time series that exhibit time-varying volatility and volatility clustering, i.e. periods of swings interspersed with periods of relative calm. ARCH-type models are sometimes considered to be in the family of stochastic volatility models, although this is strictly incorrect since at time t the volatility is completely pre-determined (deterministic) given previous values.
Model specification
To model a time series using an ARCH process, let denote the error terms (return residuals, with respect to a mean process), i.e. the series terms. These are split into a stochastic piece and a time-dependent standard deviation characterizing the typical size of the terms so that
The random variable is a strong white noise process. The series is modeled by
,
where and .
An ARCH(q) model can be estimated using ordinary least squares. A method for testing whether the residuals exhibit time-varying heteroskedasticity using the Lagrange multiplier test was proposed by Engle (1982). This procedure is as follows:
Estimate the best fitting autoregressive model AR(q) .
Obtain the squares of the error and regress them on a constant and q lagged values:
where q is the length of ARCH lags.
The null hypothesis is that, in the absence of ARCH components, we have for all . The alternative hypothesis is that, in the presence of ARCH components, at least one of the estimated coefficients must be significant. In a sample of T residuals under the null hypothesis of no ARCH errors, the test statistic T'R² follows distribution with q degrees of freedom, where is the number of equations in the model which fits the residuals vs the lags (i.e. ). If T'R² is greater than the Chi-square table value, we reject the null hypothesis and conclude there is an ARCH effect in the ARMA model. If T'R² is smaller than the Chi-square table value, we do not reject the null hypothesis.
GARCH
If an autoregressive moving average (ARMA) model is assumed for the error variance, the model is a generalized autoregressive conditional heteroskedasticity (GARCH) model.
In that case, the GARCH (p, q) model (where p is the order of the GARCH terms and q is the order of the ARCH terms ), following the notation of the original paper, is given by
Generally, when testing for heteroskedasticity in econometric models, t |
https://en.wikipedia.org/wiki/Knowledge%20level | In artificial intelligence, knowledge-based agents draw on a pool of logical sentences to infer conclusions about the world. At the knowledge level, we only need to specify what the agent knows and what its goals are; a logical abstraction separate from details of implementation.
This notion of knowledge level was first introduced by Allen Newell in the 1980s, to have a way to rationalize an agent's behavior. The agent takes actions based on knowledge it possesses, in an attempt to reach specific goals. It chooses actions according to the principle of rationality.
Beneath the knowledge level resides the symbol level. Whereas the knowledge level is world oriented, namely that it concerns the environment in which the agent operates, the symbol level is system oriented, in that it includes the mechanisms the agent has available to operate. The knowledge level rationalizes the agent's behavior, while the symbol level mechanizes the agent's behavior.
For example, in a computer program, the knowledge level consists of the information contained in its data structures that it uses to perform certain actions. The symbol level consists of the program's algorithms, the data structures themselves, and so on.
See also
Knowledge level modeling
knowledge relativity
References
T. Menzies. Applications of Abduction: Knowledge-Level Modeling. November 1996.
A. Newell. The Knowledge Level. Artificial Intelligence, 18(1):87-127, 1982.
Artificial intelligence |
https://en.wikipedia.org/wiki/DjVu | DjVu ( , like French "déjà vu") is a computer file format designed primarily to store scanned documents, especially those containing a combination of text, line drawings, indexed color images, and photographs. It uses technologies such as image layer separation of text and background/images, progressive loading, arithmetic coding, and lossy compression for bitonal (monochrome) images. This allows high-quality, readable images to be stored in a minimum of space, so that they can be made available on the web.
DjVu has been promoted as providing smaller files than PDF for most scanned documents. The DjVu developers report that color magazine pages compress to 40–70 kB, black-and-white technical papers compress to 15–40 kB, and ancient manuscripts compress to around 100 kB; a satisfactory JPEG image typically requires 500 kB. Like PDF, DjVu can contain an OCR text layer, making it easy to perform copy and paste and text search operations.
Free creators, manipulators, converters, web browser plug-ins, and desktop viewers are available. DjVu is supported by a number of multi-format document viewers and e-book reader software on Linux (Okular, Evince, Zathura), Windows (Okular, SumatraPDF), and Android (Document Viewer, FBReader, EBookDroid, PocketBook).
History
The DjVu technology was originally developed by Yann LeCun, Léon Bottou, Patrick Haffner, Paul G. Howard, Patrice Simard, and Yoshua Bengio at AT&T Labs from 1996 to 2001.
Prior to the standardization of PDF in 2008, DjVu had been considered superior due to it being an open file format in contrast to the proprietary nature of PDF at the time. The declared higher compression ratio (and thus smaller file size), and the claimed ease of converting large volumes of text into DjVu format, were other arguments for DjVu's superiority over PDF in the technology landscape of 2004. Independent technologist Brewster Kahle in a 2004 talk on IT Conversations discussed the benefits of allowing easier access to DjVu files.
The DjVu library distributed as part of the open-source package DjVuLibre has become the reference implementation for the DjVu format. DjVuLibre has been maintained and updated by the original developers of DjVu since 2002.
The DjVu file format specification has gone through a number of revisions, the most recent being from 2005.
Role in the software ecosystem
The primary usage of the DjVu format has been the electronic distribution of documents with a quality comparable to that of printed documents. As that niche is also the primary usage for PDF, it was inevitable that the two formats would become competitors. It should however be observed that the two formats approach the problem of delivering high resolution documents in very different ways: PDF primarily encodes graphics and text as vectorised data, whereas DjVu primarily encodes them as pixmap images. This means PDF places the burden of rendering the document on the reader, whereas DjVu places that burden on the creator.
During |
https://en.wikipedia.org/wiki/Emagic | Emagic was a music software and hardware company based in Rellingen, Germany and a satellite office in Grass Valley, California. On July 1, 2002 Emagic was bought by Apple Computer. Emagic's Windows-based product offerings were discontinued on September 30, 2002.
History
The company was best known for its music sequencer, Logic. Logic stemmed from Creator, then Notator, made by C-Lab (the company's forerunner) for the Atari ST platform. In 1992, Emagic Soft- und Hardware GmbH was founded and Notator Logic was launched for Atari and Macintosh, followed by a version for Windows. The "Notator" was dropped from the name and the product was redesigned from the ground up, and the product became known under the name "Emagic Logic". Original copies of Emagic's Logic software retailed for , and with plugins ranging from $99 to $299.
The other major software product that Emagic offered was SoundDiver, an editor/librarian for hardware synthesizers. It communicated via MIDI and offered easy patch and sound management. While there was a beta version for Mac OS X, production of SoundDiver was discontinued in 2005.
Emagic formerly offered a line of audio interface hardware, the Audiowerk PCI cards, as well as USB units. A potential post-acquisition successor to these products, the unreleased Asteroid FireWire interface, was the subject of the Apple v. Does trade secret litigation.
Acquisition by Apple
Emagic was acquired by Apple in July 2002. The announcement included the news that development of the Windows version would no longer continue, rendering Logic 5.5.1 as the final version available for Windows. This announcement caused controversy in the recording industry with an estimated 70,000 users having invested in the Windows route not wishing to reinvest in a complete new system. Despite much speculation in various Pro Audio forums however, exactly how many users may have abandoned Logic upon its acquisition by Apple, or abandoned the Windows platform for the Mac version, remains unknown, but Apple Pro Apps revenue has steadily increased since Apple's acquisition of Emagic, (roughly $2 billion a year as of Q1 2014).
Logic 6 was released in February 2003, serving as the first major release of Logic following Apple's acquisition of Emagic. The following year, it released Logic Pro 6, which replaced Logic Platinum and consolidated over 20 different Emagic products, including all instrument and effect plug-ins, Waveburner Pro (CD Authoring application), and Pro Tools TDM support, into a single product package. Apple also released a scaled down version of Logic called Logic Express, replacing Logic Silver and Logic Gold.
Logic Pro 7 was released on September 29, 2004, the first version of Logic to be released under the Apple brand, with technical support being provided through AppleCare+ instead of Emagic. As Emagic's products had been transferred to its parent company, it discontinued all of its older products, but continued to provide technical sup |
https://en.wikipedia.org/wiki/Shakuntala%20Devi | Shakuntala Devi (4 November 1929 – 21 April 2013) was an Indian mental calculator and writer, popularly known as the "Human Computer". Her talent earned her a place in the 1982 edition of The Guinness Book of World Records. However, the certificate for the record was given posthumously on 30 July 2020, despite Devi achieving her world record on 18 June 1980 at Imperial College, London. Devi was a precocious child and she demonstrated her arithmetic abilities at the University of Mysore without any formal education.
Devi strove to simplify numerical calculations for students. She wrote a number of books in her later years, including novels as well as texts about mathematics, puzzles, and astrology. She wrote the book The World of Homosexuals, which is considered the first study of homosexuality in India. She saw homosexuality in a positive light and is considered a pioneer in the field.
Early life
Shakuntala Devi was born on 4 November 1929 at Bangalore, Karnataka. to a Kannada Brahmin family. Her father, C V Sundararaja Rao, worked as a trapeze artist, lion tamer, tightrope walker and magician in a circus. He discovered his daughter's ability to memorise numbers while teaching her a card trick when she was about three years old. Her father left the circus and took her on road shows that displayed her ability at calculation. She did this without any formal education. At the age of six she demonstrated her arithmetic abilities at the University of Mysore.
In 1944, Devi moved to London, United Kingdom.
Mental calculator
Devi travelled to several countries around the world demonstrating her arithmetic talents. She was on a tour of Europe throughout 1950 and was in New York City in 1976. In 1988, she travelled to the US to have her abilities studied by Arthur Jensen, a professor of educational psychology at the University of California, Berkeley. Jensen tested her performance at several tasks, including the calculation of large numbers. Examples of the problems presented to Devi included calculating the cube root of 61,629,875 and the seventh root of 170,859,375. Jensen reported that Devi provided the solution to the above-mentioned problems (395 and 15, respectively) before Jensen could copy them down in his notebook. Jensen published his findings in the academic journal Intelligence in 1990.
In 1977, at Southern Methodist University, she gave the 23rd root of a 201-digit number in 50 seconds. Her answer, which was 546,372,891, was confirmed by calculations done at the US Bureau of Standards by the UNIVAC 1101 computer, for which a special program had to be written to perform such a large calculation, which took a longer time than for her to do the same.
On 18 June 1980, she demonstrated the multiplication of two 13-digit numbers – 7,686,369,774,870 × 2,465,099,745,779. These numbers were picked at random by the Department of Computing at Imperial College London. She correctly answered 18,947,668,177,995,426,462,773,730 in 28 seconds. This ev |
https://en.wikipedia.org/wiki/Daybreak%20Game%20Company | Daybreak Game Company LLC is an American video game developer based in San Diego. The company was founded in December 1997 as Sony Online Entertainment, a subsidiary of Sony Computer Entertainment, but was spun off to an independent investor in February 2015 and renamed Daybreak Game Company. On December 1, 2020, Daybreak Game Company entered into an agreement to be acquired by Enad Global 7.
They are known for owning, maintaining, and creating additional content for the games EverQuest, EverQuest II, The Matrix Online, PlanetSide, Star Wars Galaxies, Clone Wars Adventures, Free Realms, Vanguard: Saga of Heroes, DC Universe Online, PlanetSide 2, H1Z1: Just Survive, and H1Z1: King of the Kill, along with more recent acquisitions Dungeons and Dragons Online, Magic: The Gathering Online and Lord of the Rings Online.
History
Sony Online Entertainment Inc. (1997–2005)
Sony Online Entertainment began with Sony Interactive Studios America (SISA), an internal game development studio of Sony, formed by 1995. In 1996, John Smedley was put in charge of SISA's development of an online role-playing video game. The game would evolve into the MMORPG EverQuest. Smedley hired programmers Brad McQuaid and Steve Clover, who had come to Smedley's attention through their work on the single-player role-playing game Warwizard.
In April 1998, Sony Online Entertainment (SOE) was formed by merging parts of Sony Online Ventures with Sony Pictures Entertainment. Within a matter of months after this change, Sony Interactive Studios America was renamed 989 Studios. Towards the end of 1998, 989 Studios shifted its strategy to making PlayStation games. The company's video game and online development branch spun off; John Smedley, Brad McQuaid and Russell Shanks, as well as 55 other ex-989 employees, founded RedEye Interactive, later renamed Verant Interactive.
Verant Interactive launched EverQuest on March 16, 1999, through Sony with modest expectations. The game became successful. Sales continued rising at a steady rate until mid-2001 when growth slowed. Sony reported subscription numbers close to 450,000. In March 2000, Verant released EverQuest: The Ruins of Kunark, the first in a long list of expansion packs for EverQuest.
In April 2000, Verant hired former Ultima Online developers Raph Koster and Rich Vogel. They formed an office in Austin, Texas, to develop Star Wars Galaxies for LucasArts. SOE acquired Verant in June 2000, and eventually promoted Brad McQuaid to be its Chief Creative Officer. In October 2001, McQuaid resigned and founded Sigil Games Online, drawing many of the original developers of EverQuest from SOE.
Developed by Sony Online Entertainment, LucasArts released Star Wars Galaxies in 2003, which saw rapid growth, as expected. Bruce Woodcock estimates that Star Wars Galaxies reached nearly 300,000 subscribers within the year, before trailing off. LucasArts has released three expansions for Star Wars Galaxies, Jump to Lightspeed in October 2004, Rag |
https://en.wikipedia.org/wiki/Hostname | In computer networking, a hostname (archaically nodename) is a label that is assigned to a device connected to a computer network and that is used to identify the device in various forms of electronic communication, such as the World Wide Web. Hostnames may be simple names consisting of a single word or phrase, or they may be structured. Each hostname usually has at least one numeric network address associated with it for routing packets for performance and other reasons.
Internet hostnames may have appended the name of a Domain Name System (DNS) domain, separated from the host-specific label by a period ("dot"). In the latter form, a hostname is also called a domain name. If the domain name is completely specified, including a top-level domain of the Internet, then the hostname is said to be a fully qualified domain name (FQDN). Hostnames that include DNS domains are often stored in the Domain Name System together with the IP addresses of the host they represent for the purpose of mapping the hostname to an address, or the reverse process.
Internet hostnames
In the Internet, a hostname is a domain name assigned to a host computer. This is usually a combination of the host's local name with its parent domain's name. For example, en.wikipedia.org consists of a local hostname (en) and the domain name wikipedia.org. This kind of hostname is translated into an IP address via the local hosts file, or the Domain Name System (DNS) resolver. It is possible for a single host computer to have several hostnames; but generally the operating system of the host prefers to have one hostname that the host uses for itself.
Any domain name can also be a hostname, as long as the restrictions mentioned below are followed. So, for example, both en.wikipedia.org and wikipedia.org are hostnames because they both have IP addresses assigned to them. A hostname may be a domain name, if it is properly organized into the domain name system. A domain name may be a hostname if it has been assigned to an Internet host and associated with the host's IP address.
Syntax
Hostnames are composed of a sequence of labels concatenated with dots. For example, "en.wikipedia.org" is a hostname. Each label must be from 1 to 63 octets long. The entire hostname, including the delimiting dots, has a maximum of 253 ASCII characters.
The Internet standards (Request for Comments) for protocols specify that labels may contain only the ASCII letters a through z (in a case-insensitive manner), the digits 0 through 9, and the hyphen-minus character ('-'). The original specification of hostnames required that labels start with an alpha character, and not end with a hyphen. However, a subsequent specification permitted hostname labels to start with digits. Internationalized domain names are stored in the Domain Name System as ASCII strings using Punycode transcription.
While a hostname may not contain other characters, such as the underscore character (_), other DNS names may contain the under |
https://en.wikipedia.org/wiki/Stunt%20Island | Stunt Island is a flight simulation video game for MS-DOS PCs released in 1992. It was designed by Adrian Stephens and Ronald J. Fortier and published by Walt Disney Computer Software. The game, marketed as "The Stunt Flying and Filming Simulation", provides an island which contains a number of different film sets, such as a large city, various small towns, airports, oil rigs, a canyon, an aircraft carrier, and many others locations situated on a fictional island off southern California. There is a free flight mode, where the player can simply fly around in a variety of different aircraft which have unique flying characteristics and flight envelopes. Additionally, the player can position cameras and props around these sets, and create triggers to start actions including the camera panning and an object moving. The game also has an editing mode where the player can splice together taped footage and insert sound effects. The game world is small and it is impossible to leave the area of the island without returning to it. The game runs well under DosBox from ver. 0.65 to present. The game was heavily patched more than a year following its initial release. The last patch, V3 removed copyright protection and addressed many issues. GOG.com released an emulated version for Microsoft Windows, Mac OS X and Linux in 2016. This GOG version, and the one offered by Steam, appear to be the unpatched ver. 1.0 release of the game.
Game components
Game engine
The game engine for Stunt Island was co-developed by The Assembly Line. It is capable of simultaneously rendering several hundred simple 3D objects on a typical early 1990s PC with 386 processor at 33 MHz with two megabytes of RAM.
The graphics of the game are rendered in 256 colors at 320x200 resolution (VGA) and the airplanes are shaded using Gouraud shading.
Stunt coordinator
When a player does not wish to create a stunt from scratch, he or she may go to the Stunt Coordinator on Stunt Island. The Stunt Coordinator possesses a built-in list of 32 stunt scenes. If the player is participating in the optional Stunt Pilot of the Year competition, these stunts must be completed to improve ranking.
Set design
In set design, a player may place props, cameras, and collideable triggers. Conditional and timed events may also be created to perform particular actions.
Flight simulator
While actually filming a stunt, the player's controls are that of a flight simulator. There is an airfield in the game where the player can select a plane and fly around Stunt Island to scout different locations.
Editing room
In the editing room the player is able to take previously recorded footage and splice them together into a single movie. Sound effects and music may also be added.
Theater
Movies may be watched in this room. Such movies may come with the game, be created by the player, or be downloaded from the Internet. The game also comes with a tool called MAKEONE which may be used to generate a self-contained version of |
https://en.wikipedia.org/wiki/Loop%20unswitching | Loop unswitching is a compiler optimization. It moves a conditional inside a loop outside of it by duplicating the loop's body, and placing a version of it inside each of the if and else clauses of the conditional. This can improve the parallelization of the loop. Since modern processors can operate quickly on vectors, this improvement increases the speed of the program.
Here is a simple example. Suppose we want to add the two arrays x and y and also do something depending on the variable w. We have the following C code:
int i, w, x[1000], y[1000];
for (i = 0; i < 1000; i++) {
x[i] += y[i];
if (w)
y[i] = 0;
}
The conditional inside this loop makes it difficult to safely parallelize this loop. When we unswitch the loop, this becomes:
int i, w, x[1000], y[1000];
if (w) {
for (i = 0; i < 1000; i++) {
x[i] += y[i];
y[i] = 0;
}
} else {
for (i = 0; i < 1000; i++) {
x[i] += y[i];
}
}
While the loop unswitching may double the amount of code written, each of these new loops may now be separately optimized.
Loop unswitching was introduced in gcc in version 3.4.
References
Compiler optimizations |
https://en.wikipedia.org/wiki/Loop%20splitting | Loop splitting is a compiler optimization technique. It attempts to simplify a loop or eliminate dependencies by breaking it into multiple loops which have the same bodies but iterate over different contiguous portions of the index range.
Loop peeling
Loop peeling is a special case of loop splitting which splits any problematic first (or last) few iterations from the loop and performs them outside of the loop body.
Suppose a loop was written like this:
int p = 10;
for (int i=0; i<10; ++i)
{
y[i] = x[i] + x[p];
p = i;
}
Notice that p = 10 only for the first iteration, and for all other iterations, p = i - 1. A compiler can take advantage of this by unwinding (or "peeling") the first iteration from the loop.
After peeling the first iteration, the code would look like this:
y[0] = x[0] + x[10];
for (int i=1; i<10; ++i)
{
y[i] = x[i] + x[i-1];
}
This equivalent form eliminates the need for the variable p inside the loop body.
Loop peeling was introduced in gcc in version 3.4. More generalised loop splitting was added in GCC 7.
Brief history of the term
Apparently the term was for the first time used by Cannings, Thompson and Skolnick in their 1976 paper on computational models for (human) inheritance. There the term was used to denote a method for collapsing phenotypic information onto parents. From there the term was used again in their papers, including their seminal paper on probability functions on complex pedigrees.
In compiler technology, the term first turned up in late 1980s papers on VLIW and superscalar compilation, including and.
References
Further reading
Compiler optimizations |
https://en.wikipedia.org/wiki/Film4 | Film4 is a British free-to-air public broadcast television network owned by Channel Four Television Corporation launched on 1 November 1998, devoted to broadcasting films. While its standard-definition channel is available on Freeview and Freesat platforms, its high-definition variant is offered only as a pay television service.
The channel offered an online video on demand service, Film4oD until it was closed in July 2015.
History
The network has its origins in Channel Four Films, a production company opened by Channel Four Television Corporation in 1982 which has been responsible for backing a large number of films made in the United Kingdom and around the world. The company's first production was Stephen Frears' Walter, which was released in the same year.
On 1 November 1998, the production company was re-branded as FilmFour to coincide with the launch of a new digital television channel of the same name on both Sky and ONdigital platforms, becoming Channel 4's second network. At its launch, it was a subscription-only service costing £6 a month, eventually rising to £7. The launch night (which also broadcasts on Channel 4) was hosted by Johnny Vaughan and the first film to be shown was What's Eating Gilbert Grape, as well as the launch evening also featured its British network television premiere of The Usual Suspects. On 31 March 2000 at 6.00am, the analogue version of FilmFour shut down and later switched to digital. On 7 April 2001, the three additional channels were added: FilmFour World broadcast international cinema from 4.00pm to 10.00pm, as well as FilmFour Extreme, carrying "controversial and cutting-edge" movies from 10.00pm to 4.00am which operated on a timeshare, and the timeshift channel FilmFour +1.
In July 2002, Channel 4 reduced FilmFour's budget from £30 to £10 million and cut 50 staff to curb mounting losses, reintegrating FilmFour as a division of its television operation to continue to invest in new films. The cuts were a consequence of FilmFour's unsuccessful attempts to compete with Hollywood. David Thompson, head of BBC Films described it as:
Also in the same year, Tessa Ross became the head of both FilmFour and Channel 4 drama. FilmFour World and Extreme were discontinued on 5 May 2003 and replaced by FilmFour Weekly, which screened four movies across the week at the same time each day to make it easier to catch at least once.
Subscription access to FilmFour ended on 19 July 2006, as well as FilmFour Weekly ceased broadcasting to become a free channel, and the service relaunched under modified branding as Film4 a few days later on 23 July. With this relaunch, the channel also returned to digital terrestrial television as part of the Freeview service. At this time, it also became free-to-air on satellite television. As part of the rebrand, the production company was also rebranded to "Film4 Productions". Due to the change, the channel's availability increased from 300,000 (subscribers) to 18 million households. It |
https://en.wikipedia.org/wiki/MTV%20Base | MTV Base was a British pay television music channel from Paramount Networks UK & Australia that focused primarily on hip hop, R&B, grime, garage, reggae, funk, soul and dance music. It was launched as part of MTV's digital boutique of music channels on July 1, 1999 in both the United Kingdom and in Ireland.
MTV Base closed on 31 March 2022, and was replaced by MTV 90s. The last video on the channel was "Shutdown" by Skepta.
Regional channels
The channel was previously available in other European countries, but was replaced by the now-defunct MTV Dance (replaced by Club MTV) channel from March 2008.
Pan-European
A pan-European version was planned to launch in 2015.
Africa
MTV Base Africa launched in February 2005 throughout the African continent. On 3 July 2013, Viacom International Media Networks Africa launched a localised feed of MTV Base exclusively for South Africa, with local programming, advertising and VJs.
France
MTV Base was launched in France on 21 December 2007. The channel was replaced by French versions of MTV Hits and BET on 17 November 2015.
Programming
Following the closures of MTV OMG, MTV Rocks and Club MTV on 20 July 2020, MTV Base previously broadcast a weekly chart based on Club MTV programming on Fridays.
Former programming
Super Base Beats
Big Beats & Future Smashes!
Freshest Beats & Bangers
10 Biggest R&B & Rap Anthems RN!
Most Played Videos Of The Week
MTV Asks
#MTVHottest
Brand New Video!
Black Lives Matter
Happy Birthday (artist)
(artist): On Repeat
(artist): 2 On
(artist): Brand New Vid!
End Of The Road! Farewell From MTV Base!
Club MTV's Big 20 (weekly dance music chart)
re-rewind ultimate garage Anthems
Old Skool Night
Club MTV: Saturday Night Dance Anthems
Logos
References
External links
TV Guide
MTV Base UK - presentation, screenshots
SES guide to receiving Astra satellites
SES fleet information and map
Defunct television channels in the United Kingdom
MTV channels
Music video networks in the United Kingdom
Television channels and stations established in 1999
Television channels and stations disestablished in 2022
1999 establishments in the United Kingdom
2022 disestablishments in the United Kingdom |
https://en.wikipedia.org/wiki/NickMusic | NickMusic is an American pay television network and spin-off of Nickelodeon that mainly carries music video and music-related programming from younger pop artists that appeal to Nickelodeon's target audience, with some videos edited for content to meet a general TV-PG rating applied across the network's broadcast day, or replaced with a lyric video instead.
Like its sibling music video-only networks BET Jams, BET Soul, and CMT Music, NickMusic is based on an automated "wheel" schedule that was introduced during the early years of MTV2. A new loop starts at 6 a.m. Eastern Time, and is then repeated at 2 p.m. and 10 p.m.
History
As MTV Hits
The network launched on May 1, 2002, with its programming composed entirely of music videos. As with MTV Jams, the network was named for a daily program on MTV; in this case, MTV Hits, which was that network's main pop music video program. The network composed of current hit music videos, along with a few older videos from earlier in the year, as well as a few from the late 1990s. The network maintained a commercial-free format, other than internal promotions for MTV and MTV-branded properties.
My Hitlist era (2005–2006)
In 2005, the network began airing a feature called "My Hitlist Month", which was based on viewer selected playlists, submitted to a newly launched network website. This, as well as artist-selected playlists, aired occasionally on the network through 2006.
Playlistism era (2006–2011)
On December 18, 2006, the "Hit List" theme returned to MTV Hits. At first, "Playlistism" composed of replays of the viewer hit lists from the past, as well as new playlists from sister networks MTV2 and MTVU, as well as artist and themed playlists. In 2009, the network began to accept traditional commercial advertising, which generally composes of direct response advertising and in the past, ads for ringtone providers.
March 2012 reimaging
Until March 26, 2012, the network's logo remained the same since its launch, with a minor readjustment in February 2010 of the iconic "M" to remove the Music Television tagline and a small quarter of the logo in line with the official rebranding of all MTV networks. A new logo and imaging was introduced on that date, featuring all text in bold Helvetica, including a minimal-style logo with the 2010 MTV logomark next to the word "Hits". MTV Jams followed with the same reimaging on April 13.
Final schedule
The network discontinued many of the playlist shows throughout 2009 and 2010, while keeping the Playlistism name until it faded out entirely by late January 2011, when the network restored its former 'illustration from a music box' imaging to identify the network between commercial blocks. The lower-left banner which formerly listed playlist dedications became dedicated to promotional messages and a rolling advertisement for the network's music video web portal before eventually being discontinued. MTV News segments (usually not pertaining to news but press junket seg |
https://en.wikipedia.org/wiki/T%C3%A9l%C3%A9vision%20Suisse%20Romande | Télévision Suisse Romande ("Swiss Television Romandy") was a TV network with two channels: TSR 1 and TSR 2 (the two channels became RTS Un and RTS Deux after 2012). They were the main French-language channels in Switzerland, part of SRG SSR (SRG SSR Idée Suisse before 2010). They provided content for TV5Monde. Radio Suisse Romande and Télévision Suisse Romande merged in 2010 to create Radio Télévision Suisse.
History
The first evening programme in colour of Télévision Suisse Romande was broadcast in 1968, which was also the first year in which more than one million Swiss households had a television.
Programmes
The station can be received throughout Switzerland, and also in some neighboring countries.
Some of the popular programmes on TSR are:
le 12:45, le 19:00 and le 19:30 – news broadcasts
À Bon Entendeur – a consumer magazine programme (French)
Temps Présent – a recent events programme (French)
Passe-moi les jumelles (French)
Nouvo – a news magazine about new technologies, media and communications (French)
Infrarouge – a debating programme (French)
TTC (http://www.tsr.ch/tsr/index.html?siteSect=390000 French)
Mise Au Point (French)
See also
Pierre-Alain Donnier
Sibylle Blanc
Television in Switzerland
References
External links
French-language television in Switzerland
French-language television networks
Swiss Broadcasting Corporation
Television networks in Switzerland |
https://en.wikipedia.org/wiki/TV5Monde | TV5Monde (), formerly known as TV5, is a French public television network, broadcasting several channels of French-language programming. It is an approved participant member of the European Broadcasting Union.
The network is available across Europe on satellite via Astra 19.2°E and Eutelsat Hot Bird (13°E) (both free-to-air), online and via TVPlayer.
Summary
TV5 started on 2 January 1984 and was under the management of Serge Adda until his death in November 2004. The next director since 6 April 2005 was Jean-Jacques Aillagon, a former French Minister for Culture and Communication. The director-general is now Marie-Christine Saragosse.
In January 2006, TV5 underwent a major overhaul, including rebranding as "TV5Monde" to stress its focus as a global network ("Monde" is French for "World"). Also, the changes included a new schedule and a new program line-up. Since 1993, "TV5 Monde" is part of the channel's corporate name. Its Canadian operations are branded "TV5 Québec Canada", but the shorter version TV5 is also used.
History
TV5 was formed on 2 January 1984, under the guidance of Claude Cheysson, the French Minister for Foreign Affairs, and TV5 President Serge Adda, by five public television channels: TF1, Antenne 2 and FR3 from France, the Swiss Télévision Suisse Romande and the Belgian RTBF. The "5" from the name TV5 comes from the five public broadcasters. On 18 December 1985, TV5 was amongst the first four channels carried by cable television in France, inaugurated in Cergy-Pontoise.
Following its privatisation in 1987, TF1 retired from the TV5 consortium but continued to supply its programmes to the channel until 1995. On 1 September 1988, TV5 Québec Canada was created, followed by TV5 Afrique in 1991. The following year, TV5 transmitted using digital compression towards Latin America and the Caribbean. Its coverage was expanded in 1996 with the launch of its Asian-Pacific signal with TV5 Asie-Pacifique and the subscription channel TV5 États-Unis in the United States. Two years later, the Middle East feed was launched with TV5 Moyen-Orient in 1998.
In early 1999, TV5 split its European signal into two, with the launch of TV5 France Belgique Suisse, a signal specific to Francophone Europe (France, Belgium, Switzerland, Monaco, Luxembourg etc.). TV5 Europe continued to serve the wider continental audience.
A consortium formed by public channels Arte and La Cinquième entered into the capital of the channel, which brought with it new sources of programming. A new schedule was constructed, centred on news programmes such as news flashes on the hour, two TV5 bulletins and rebroadcasts of its partners' main news programmes (20 Heures from France 2, Soir 3 from France 3, Le Journal from TSR/RTS and 13 Heures from RTBF).
A meeting with ministers from TV5 in Vevey, Switzerland, gave a mandate to the channel's council of co-operation to reform the structure of the channel in the view of creating a unique worldwide channel. The national governme |
https://en.wikipedia.org/wiki/Web%20development | Web development is the work involved in developing a website for the Internet (World Wide Web) or an intranet (a private network). Web development can range from developing a simple single static page of plain text to complex web applications, electronic businesses, and social network services. A more comprehensive list of tasks to which Web development commonly refers, may include Web engineering, Web design, Web content development, client liaison, client-side/server-side scripting, Web server and network security configuration, and e-commerce development.
Among Web professionals, "Web development" usually refers to the main non-design aspects of building Web sites: writing markup and coding. Web development may use content management systems (CMS) to make content changes easier and available with basic technical skills.
For larger organizations and businesses, Web development teams can consist of hundreds of people (Web developers) and follow standard methods like Agile methodologies while developing Web sites. Smaller organizations may only require a single permanent or contracting developer, or secondary assignment to related job positions such as a graphic designer or information systems technician. Web development may be a collaborative effort between departments rather than the domain of a designated department. There are three kinds of Web developer specialization: front-end developer, back-end developer, and full-stack developer. Front-end developers are responsible for behavior and visuals that run in the user browser, while back-end developers deal with the servers. Since the commercialization of the Web, the industry has boomed and has become one of the most used technologies ever.
See also
Outline of web design and web development
Web design
Web development tools
Web application development
Web developer
References |
https://en.wikipedia.org/wiki/KASUMI | KASUMI is a block cipher used in UMTS, GSM, and GPRS mobile communications systems.
In UMTS, KASUMI is used in the confidentiality (f8) and integrity algorithms (f9) with names UEA1 and UIA1, respectively.
In GSM, KASUMI is used in the A5/3 key stream generator and in GPRS in the GEA3 key stream generator.
KASUMI was designed for 3GPP to be used in UMTS security system by the Security Algorithms Group of Experts
(SAGE), a part of the European standards body ETSI.
Because of schedule pressures in 3GPP standardization, instead of developing a new cipher, SAGE agreed with
3GPP technical specification group (TSG) for system aspects of 3G security (SA3) to base the development
on an existing algorithm that had already undergone some evaluation.
They chose the cipher algorithm MISTY1 developed
and patented
by Mitsubishi Electric Corporation.
The original algorithm was slightly modified for easier hardware implementation and to
meet other requirements set for 3G mobile communications security.
KASUMI is named after the original algorithm MISTY1 — 霞み (hiragana かすみ, romaji kasumi) is the Japanese word for "mist".
In January 2010, Orr Dunkelman, Nathan Keller and Adi Shamir released a paper showing that they could break Kasumi with a related-key attack and very modest computational resources; this attack is ineffective against MISTY1.
Description
KASUMI algorithm is specified in a 3GPP technical specification.
KASUMI is a block cipher with 128-bit key and 64-bit input and output.
The core of KASUMI is an eight-round Feistel network. The round functions
in the main Feistel network are irreversible Feistel-like network
transformations. In each round the round function uses a round key
which consists of eight 16-bit sub keys
derived from the original 128-bit key using a fixed key schedule.
Key schedule
The 128-bit key K is divided into eight 16-bit sub keys Ki:
Additionally a modified key K''', similarly divided into 16-bit
sub keys K'i, is used. The modified key is derived from
the original key by XORing with 0x123456789ABCDEFFEDCBA9876543210 (chosen as a "nothing up my sleeve" number).
Round keys are either derived from the sub keys by bitwise rotation to left
by a given amount and from the modified sub keys (unchanged).
The round keys are as follows:
Sub key index additions are cyclic so that if i+j is greater than 8
one has to subtract 8 from the result to get the actual sub key index.
The algorithm
KASUMI algorithm processes the 64-bit word in two 32-bit halves, left ()
and right ().
The input word is concatenation of the left and right halves of the first round:
.
In each round the right half is XOR'ed with the output of the round function
after which the halves are swapped:
where KLi, KOi, KIi are round keys
for the ith round.
The round functions for even and odd rounds are slightly different. In each case
the round function is a composition of two functions FLi and FOi.
For an odd round
and for an even round
.
The output is the co |
https://en.wikipedia.org/wiki/Enterprise%20%28computer%29 | The Enterprise is a Zilog Z80-based home computer announced in 1983, but through a series of delays, not commercially available until 1985. It was developed by British company Intelligent Software and marketed by Enterprise Computers.
The specification as released was powerful and one of the higher end in its class (though not by the margin envisaged in 1983). This was due to the use of custom ASICs for graphics and sound which took workload away from the CPU, an extensive implementation of ANSI BASIC and a bank switching system to allow for larger amounts of RAM than the Z80 natively supported. It also featured a distinctive and colourful case design, and promise of multiple expansion options. Its two variants are the Enterprise 64, with 64 KB of RAM, and the Enterprise 128, with 128 KB of RAM.
The machine was renamed several times during development, being known variously by names including Samurai, Oscar and Elan. Versions can sometimes been found in magazine articles referred to by the preceding monikers. Ultimately, not assisted by release delays and a changing market place, the Enterprise was not commercially successful. The manufacturer called in the receivers in 1986 with significant debt, although old stock continued to be sold through a German partner until the 1990s.
Hardware
CPU, memory and ASIC chips
The Enterprise has a 4 megahertz (MHz) Z80 Central processing unit (CPU), 64 KB (65,536 bytes) or 128 KB of RAM, and 32 KB (32,768 bytes) of internal read-only memory (ROM) that contains the EXOS operating system and a screen editor / word processor. The BASIC programming language was supplied on a 16 KB ROM module.
Two application-specific integrated circuit (ASIC) chips take some of the workload off of the central processor. They are named "Nick" and "Dave" after their designers, Nick Toop, who had previously worked on the Acorn Atom, and Dave Woodfield. "Nick" manages graphics, while "Dave" handles sound and memory paging (bank switching).
A bank switching scheme allows the memory to be expanded to a maximum of 4 megabytes (4,194,304 bytes). The highest 2 address lines from the Z80 are used to select one of the four 8-bit Page Registers in the Dave chip. The output from the selected register is used as the highest 8 bits of the 22-bit address bus, while the lowest 14 bits come directly from the Z80 address bus. Effectively, the 64 KB address space of the Z80 processor is divided into four 16k sections. Any 16k page from the 4 MB address space can be mapped to any of these sections. The lowest two pages (pages 0 and 1) of the 4 MB address space contain system ROM. The next four pages (2 to 5) are reserved for a ROM cartridge (max 64 KB). The top four pages (pages 252 to 255, totaling 64 KB) are used as video RAM, but can be used for storage of program code and data as well. On the 128k model, the additional 64 KB of ram is mapped on pages 248 to 251. The remaining memory space can be used by external devices and memory modules |
https://en.wikipedia.org/wiki/GNU%20Parted | GNU Parted (from GNU partition editor) is a free partition editor, used for creating and deleting partitions. This is useful for creating space for new operating systems, reorganising hard disk usage, copying data between hard disks, and disk imaging. It was written by Andrew Clausen and Lennert Buytenhek.
It consists of a library, libparted, and a command-line front-end, parted, that also serves as a reference implementation.
, GNU Parted runs only under Linux and GNU/Hurd.
Other front-ends
nparted is the newt-based frontend to GNU Parted.
Projects have started for an ncurses frontend, that also could be used in Windows (with GNUWin32 Ncurses).
fatresize offers a command-line interface for FAT16/FAT32 non-destructive resize and uses the GNU Parted library.
Graphical front-ends
GParted and KDE Partition Manager are graphical programs using the parted libraries. They are adapted for GNOME and KDE respectively; two major desktop environments for Unix-like installations. They are often included as utilities on many live CD distributions to make partitioning easier. QtParted was another graphical front-end based on Qt that is no longer being actively maintained.
Pyparted (also called python-parted) is the Python front-end for GNU Parted.
Linux distributions that come with this application by default include Slackware, Knoppix, sidux, SystemRescueCD, and Parted Magic.
Limitations
Parted previously had support for operating on filesystems within partitions (creating, moving, resizing, copying). This support was removed in version 3.0.
See also
List of disk partitioning software
util-linux:
fdisk
cfdisk
sfdisk
gpart
gparted
FIPS
Master Boot Record manager
References
External links
Free partitioning software
Parted
Software using the GPL license
Free software that uses ncurses |
https://en.wikipedia.org/wiki/Boss%20Radio | Boss Radio was the name of two radio programming formats, both launched in the early 1960s: One in the United States, and one in the United Kingdom. Although the names were the same, the formats were quite different.
The word "boss" was early 1960s American slang for something fashionably attractive or impressive.
Boss Radio in the United States
Although developed earlier at other stations, the U.S. "Boss Radio" format is most closely associated with KHJ in Los Angeles, at 930 kHz AM.
KHJ, one of the first radio stations in Los Angeles, had gone on the air in 1922 and in later years was owned by RKO, a major U.S. corporation which produced movies, television and radio programming over its own stations. In the 1940s and 1950s, KHJ broadcast a mix of drama, mystery, soap operas, news, and music, both live and recorded. In the early 1960s the format was adult contemporary music. The audience ratings were dominated by KFWB, KRLA, KABC and KMPC, and KHJ lagged far behind the other stations.
Block programming gave way to Top 40 radio during the 1950s. Stations played from 40 to 75 current records each week. Disc jockeys were talkative and the jingles were often a full minute in length. Two California radio programming pioneers, Bill Drake and Gene Chenault, modified the Top 40 formula to include a smaller number of records, heavier rotation of the biggest hits, very short jingles and less talk. The new sound would come to be known as "Boss Radio". KHJ General Manager Ken DeVaney originated the phrase. The word "boss" had come to mean something hip, new, exciting and the top of its class. Drake had tested some of the format elements in 1961 and 1962 while he served as program director and morning man at San Francisco's KYA, a station that promoted itself at the time as "The Boss of the Bay". At about the same time, competitor station KEWB promoted itself via its station ID jingles as "Boss Radio".
Drake and Chenault introduced and further developed this format at KYNO in Fresno, KSTN in Stockton, and KGB AM in San Diego. In April 1965 they brought it to KHJ.
Within a few months the "Boss Radio" format had brought KHJ to the top of the ratings in the Los Angeles market. It also firmly established the careers of several "boss jocks" such as The Real Don Steele and Robert W. Morgan who helped to put "Boss Radio" on the air in Los Angeles, under the guidance of program director Ron Jacobs. (The other original Boss Jocks in the spring of 1965 included Roger Christian, Gary Mack, Dave Diamond, Sam Riddle, and Johnny Williams.)
As a result of the station's success, several other stations adopted the format, notably KFRC in San Francisco, WFIL in Philadelphia, WRKO in Boston, and eventually reaching as far north as Canadian border blaster CKLW in Windsor, Ontario (targeting metro Detroit area). As a result of its massive clear channel signal and overnight signal propagation, CKLW was able to garner an international audience—even as far as Soviet Russia |
https://en.wikipedia.org/wiki/MISTY1 | In cryptography, MISTY1 (or MISTY-1) is a block cipher designed in 1995 by Mitsuru Matsui and others for Mitsubishi Electric.
MISTY1 is one of the selected algorithms in the European NESSIE project, and has been among the cryptographic techniques recommended for Japanese government use by CRYPTREC in 2003; however, it was dropped to "candidate" by CRYPTREC revision in 2013. However, it was successfully broken in 2015 by Yosuke Todo using integral cryptanalysis; this attack was improved in the same year by Achiya Bar-On.
"MISTY" can stand for "Mitsubishi Improved Security Technology"; it is also the initials of the researchers involved in its development: Matsui Mitsuru, Ichikawa Tetsuya, Sorimachi Toru, Tokita Toshio, and Yamagishi Atsuhiro.
MISTY1 is covered by patents, although the algorithm is freely available for academic (non-profit) use in RFC 2994, and there's a GPLed implementation by Hironobu Suzuki (used by, e.g. Scramdisk).
Security
MISTY1 is a Feistel network with a variable number of rounds (any multiple of 4), though 8 are recommended. The cipher operates on 64-bit blocks and has a key size of 128 bits. MISTY1 has an innovative recursive structure; the round function itself uses a 3-round Feistel network. MISTY1 claims to be provably secure against linear and differential cryptanalysis.
KASUMI
KASUMI is a successor of the MISTY1 cipher which was supposed to be stronger than MISTY1 and has been adopted as the standard encryption algorithm for European mobile phones. In 2005, KASUMI was broken, and in 2010 a new paper was published (explained below) detailing a practical attack on the cipher; see the article for more details.
In the paper "Block Ciphers and Stream Ciphers" by Alex Biryukov, it is noted that KASUMI, also termed A5/3, is a strengthened version of block cipher MISTY1 running in a Counter mode.
However, in 2010 Dunkelman, Keller, and Shamir showed that KASUMI is not as strong as MISTY1; the KASUMI attack will not work against MISTY1.
References
External links
Mitsubishi - About MISTY
MISTY1 patent statement from Mitsubishi
John Savard's description of MISTY
SCAN's entry on MISTY1
Feistel ciphers
Mitsubishi Electric products, services and standards |
https://en.wikipedia.org/wiki/ETB | ETB may refer to:
Technology
ETB (company), a Colombian telecommunications company
Electric trolley bus
Electronic throttle body, in vehicles
End-of-Transmission-Block character, in computing
Engineering and Technology Board, now EngineeringUK, a UK organisation that promotes engineering
Ethernet Train Backbone, a train communication network
Other uses
Education and Training Board, a public body in Ireland
Endothelin B receptor, a protein
Equitorial Trust Bank, a Nigerian commercial bank
Etebi language of Nigeria
Ethiopian birr, the currency of Ethiopia
Euskal Telebista, a television network in the Basque Autonomous Community |
https://en.wikipedia.org/wiki/AMule | aMule is a free peer-to-peer file sharing utility that works with the eDonkey network and the Kad network, offering similar features to eMule and adding others such as GeoIP (country flags). On August 18, 2003 it was forked from the xMule source code, which itself is a fork of the lMule project, which was the first attempt to bring the eMule client to Linux. These projects were discontinued and aMule is the resulting project, though aMule has less and less resemblance to the client that sired it.
aMule shares code with the eMule project. The credit and partials downloads of eMule can be used by aMule and vice versa, making program substitution simple.
aMule aims to be portable over multiple platforms and is doing this with the help of the wxWidgets library. Currently supported systems include Linux, macOS, various BSD-derived systems, Windows, Irix and Solaris. Beside the stable releases the project also offers SVN versions as an unstable release.
TCP and UDP ports
According to the aMule official FAQ, these are the default ports. Server ports 4661 TCP and 4665 UDP are only used by the EDonkey network. Therefore, the Kad Network will only use 4662 TCP and 4672 UDP. The traffic direction is from client perspective:
4661 TCP (outgoing): Port on which an eDonkey server listens for connection (port number may vary depending on eDonkey server used).
4662 TCP (outgoing and incoming): Client to client transfers.
4665 UDP (outgoing and incoming): Used for global eDonkey server searches and global source queries. This is always Client TCP port + 3.
4672 UDP (outgoing and incoming): Extended aMule protocol, Queue Rating, File Reask Ping
4711 TCP: WebServer listening port. Used if aMule is accessed through the web.
4712 TCP: internal Connection port. Used to communicate aMule with other applications such as aMule WebServer or aMuleCMD.
Most of these ports are customizable.
Monolithic and modular build
aMule can be compiled using -disable-monolithic parameter: this allows aMule to be run in a modular way. This means that the core functionalities of the program can be started using amuled, the aMule daemon while the software behavior can be controlled through three different interfaces:
aMuleCMD The command-line aMule client.
aMuleGUI The regular GUI of the software. Experimental, a lot of features missing in comparison with the monolithic version and is unstable. There are Linux and Windows version for this tool: users can connect an aMule instance running on Linux from a workstation running Windows and the Win32 version of aMuleGUI.
aMuleWEB The web interface provided by the aMule core built-in Webserver. It can be retrieved via the LAN or from the Internet, provided any Internet router is properly configured using port forwarding.
See also
eDonkey network
Kad network
eMule
iMule – an anonymous (and slower) mule exclusively for the I2P network. Based on aMule.
Comparison of eDonkey software
References
External links
aMule home page
|
https://en.wikipedia.org/wiki/ETX | ETX may refer to:
ETX (form factor), Embedded Technology eXtended computer-on-module specification
Meade ETX telescope, popular line of compact Maksutov-Cassegrain telescopes made by Meade Instruments Corporation
End-of-text character, character code within the C0 and C1 control codes range
Expected Transmission Count, network routing metric |
https://en.wikipedia.org/wiki/Open%20Artwork%20System%20Interchange%20Standard | Open Artwork System Interchange Standard (OASIS) is a binary file format used for specification of data structures for photomask production. It's used to represent a pattern an interchange and encapsulation format for hierarchical integrated circuit mask layout information produced during integrated circuit design that is further used for manufacturing of a photomask. The standard is developed by SEMI. The language defines the code required for geometric shapes such as rectangles, trapezoids, and polygons. It defines the type of properties each can have, how they can be organized into cells containing patterns made by these shapes and defines how each can be placed relative to each other. It is similar to GDSII.
As of 2023 the cost of the standard for members of SEMI was set to $252 and non-members: US$335.
Introduction
OASIS is the purported commercial successor to the integrated circuit design and manufacturing electronic pattern layout language, GDSII.
GDSII was created in the 1970s when integrated circuit designs had a few hundred thousand geometric shapes, properties and placements to manage. Today, there can be billions of shapes, properties, and placements to manage. File sizes of GDSII format often takes tens gigabytes of storage and are difficult to store and process. OASIS creators and users claimed that the growth of workstations' data storage and handling capabilities was far outpaced by the growth of Integrated Circuit layout complexity. Therefore, OASIS tries to solve the purported problem of the large size of the GDSII files by introducing complicated types of the geometric shapes (25 types of trapezoids only) to reduce the data size. Also, variable-length numeric format (similar to Run-length encoding) for coordinates was implemented. Finally, each cell in the OASIS file can be independently compressed by the gzip-like algorithm.
The effort to create the OASIS format started in June 2001. The release of version 1.0 took place in March 2004. Its use required the development of new OASIS readers and writers that could be coupled to design and manufacturing equipment already equipped with GDSII readers and writers. Its adoption was born of a concerted effort by integrated circuit design, equipment, photomask, fabless, 3rd party Intellectual Property (IP) and manufacturing companies from the United States, Japan, Taiwan, Korea and Europe.
A constrained version of OASIS, called OASIS.MASK, addresses the unique needs of semiconductor photomask manufacturing equipment such as pattern generators and inspection systems. Both OASIS and OASIS.MASK are industry standards.
Example datafile
Below is a human-readable text representation of the OASIS binary file that allowed the expression of the above "top" cell view called "Placed_shapes_and_cells_within_an_IC_cell". The top cell is defined by a file-level standard PROPERTY record named S_TOP_CELL. The PROPERTY record below references a PROPNAME record (refNum=0) that has a propname-str |
https://en.wikipedia.org/wiki/PuTTY | PuTTY () is a free and open-source terminal emulator, serial console and network file transfer application. It supports several network protocols, including SCP, SSH, Telnet, rlogin, and raw socket connection. It can also connect to a serial port. The name "PuTTY" has no official meaning.
PuTTY was originally written for Microsoft Windows, but it has been ported to various other operating systems. Official ports are available for some Unix-like platforms, with work-in-progress ports to and , and unofficial ports have been contributed to platforms such as Symbian, Windows Mobile and Windows Phone.
PuTTY was written and is maintained primarily by Simon Tatham, a British programmer.
Features
PuTTY supports many variations on the secure remote terminal, and provides user control over the SSH encryption key and protocol version, alternate ciphers such as AES, 3DES, RC4, Blowfish, DES, and Public-key authentication. PuTTY uses its own format of key files – PPK (protected by Message Authentication Code). PuTTY supports SSO through GSSAPI, including user provided GSSAPI DLLs. It also can emulate control sequences from xterm, VT220, VT102 or ECMA-48 terminal emulation, and allows local, remote, or dynamic port forwarding with SSH (including X11 forwarding). The network communication layer supports IPv6, and the SSH protocol supports the zlib@openssh.com delayed compression scheme. It can also be used with local serial port connections.
PuTTY comes bundled with command-line SCP and SFTP clients, called "pscp" and "psftp" respectively, and plink, a command-line connection tool, used for non-interactive sessions.
PuTTY does not support session tabs directly, but many wrappers are available that do.
History
PuTTY development began late in 1998, and was a usable SSH-2 client by October 2000.
Components
PuTTY consists of several components:
PuTTY the Telnet, rlogin, and SSH client itself, which can also connect to a serial port
PSCP an SCP client, i.e. command-line secure file copy. Can also use SFTP to perform transfers
PSFTP an SFTP client, i.e. general file transfer sessions much like FTP
PuTTYtel a Telnet-only client
Plink a command-line interface to the PuTTY back ends. Usually used for SSH Tunneling
Pageant an SSH authentication agent for PuTTY, PSCP and Plink
PuTTYgen an RSA, DSA, ECDSA and EdDSA key generation utility
pterm (Unix version only) an X11 client which supports the same terminal emulation as PuTTY
See also
Comparison of SSH clients
Tera Term
mintty
WinSCP
minicom
References
External links
1998 software
Cross-platform free software
Cryptographic software
Free communication software
Free software programmed in C
Free terminal emulators
Portable software
Secure Shell
SSH File Transfer Protocol clients
Software using the MIT license
Symbian software
Telnet |
https://en.wikipedia.org/wiki/Robotics%20Institute | The Robotics Institute (RI) is a division of the School of Computer Science at Carnegie Mellon University in Pittsburgh, Pennsylvania, United States. A June 2014, the article in Robotics Business Review magazine calls it "the world's best robotics research facility" and a "pacesetter in robotics research and education."
The Robotics Institute focuses on bringing robotics into everyday activities. Its faculty members and graduate students examine a variety of fields, including space robotics, medical robotics, industrial systems, computer vision and artificial intelligence, and they develop a broad array of robotics systems and capabilities.
Established in 1979 by Raj Reddy, the RI was the first robotics department at any U.S. university. In 1988, CMU became the first university in the world offering a Ph.D. in Robotics.
In 2012, the faculty, staff, students and postdocs numbered over 500, and the RI annual budget exceeded $65M, making the RI one of the largest robotics research organizations in the world.
The RI occupies facilities on the Carnegie Mellon main campus as well as in the Lawrenceville and Hazelwood neighborhoods of Pittsburgh, totaling almost 200,000 sq. ft of indoor space and 40 acres of outdoor test facilities.
Major centers
The National Robotics Engineering Center (NREC) was established in 1996 as the commercial arm of the RI, with the intention of applying robotic technology to commercial and defense applications. It has partnered with more than 300 companies such as General Motors, GE Ventures, Google and Apple, as well as with the U.S. military.
In September 2015, the NREC secured a $5.5 million gift from the car transport company, Uber, to support three robotics fellowships and research directed at developing safe, self-driving cars. This donation was made roughly seven months after Uber poached 40 NREC scientists, including its director, Tony Stenz, and other key program leaders, while the two organizations closely collaborated on driverless technologies.
The Field Robotics Center (FRC) has developed a number of significant robots, including Sandstorm and H1ghlander, which finished second and third in the 2005 DARPA Grand Challenge, and Boss, which won the 2007 DARPA Grand Challenge.
Media coverage and awards
In his book Almost Human: Making Robots Think, Lee Gutkind describes the development of robots at the Robotics Institute, particularly focusing on the developers and describing field testing in remote locations.
The robot HERB was featured in the "Oreo Separator" video series.
RI robots and researchers have been featured in the Scientific American Frontiers episode "Natural Born Robots" and in multiple NPR radio segments.
The Advanced Robotic Laser Coating Removal System (ARLCRS) won a 2013 Edison Award gold award in the category of materials science processes.
Notable faculty (current and past)
Chris Atkeson
Howie Choset
Takeo Kanade
Pradeep Khosla
Matt Mason
Hans Moravec
Raj Reddy
Katia Sycara
Sebastian T |
https://en.wikipedia.org/wiki/Hold%20time | Hold time may refer to:
In digital electronics, the minimum amount of time the data input should be held steady after the clock event for reliable sampling; see Flip-flop (electronics)#Timing considerations
The amount of time spent in a phone queue on hold (telephone)
Hold Time (album), by M. Ward
See also
Holding time (disambiguation) |
https://en.wikipedia.org/wiki/List%20of%20computing%20people | This is a list of people who are important or notable in the field of computing, but who are not primarily computer scientists or programmers.
A
Alfred Aho, co-developer of the AWK
Leonard Adleman, encryption (RSA)
Marc Andreessen, co-founder of Netscape Communications Corporation
B
Tim Berners-Lee, inventor of the World Wide Web
Stephen Bourne, developer of the Bourne shell
C
John Carmack, realtime computer game graphics, id Software
Noam Chomsky, linguist, language theorist (Chomsky hierarchy) and social critic
D
Theo de Raadt, founder of the OpenBSD and OpenSSH projects
E
J. Presper Eckert, ENIAC
Larry Ellison, co-founder of Oracle Corporation
Marc Ewing, creator of Red Hat Linux
F
G
Bill Gates, co-founder and Chairman of Microsoft
James Gosling, "father" of the Java programming language
H
Grace Hopper, she was a pioneer of computer programming who invented one of the first linkers.
I
Jonathan Ive, Senior Vice President of Industrial Design at Apple
J
Steve Jobs, co-founder and CEO of Apple
Bill Joy, co-founder of Sun Microsystems, BSD
K
Brian Kernighan, Dennis Ritchie, C programming language
Donald Knuth, The Art of Computer Programming, TeX
L
Rasmus Lerdorf, creator of the PHP Scripting Language
Lawrence Lessig, professor of law and founder of the Creative Commons
Ada Lovelace
M
John William Mauchly, ENIAC
John McCarthy, LISP programming language
Bob Miner, co-founder of Oracle Corporation
Marvin Minsky, AI luminary
Gordon E. Moore, co-founder of Intel, Moore's Law
Elon Musk, co-founder of PayPal, Tesla, Inc, SpaceX,
N
Roger Needham
John von Neumann, theoretical computer science
Robert Noyce, co-founder of Intel and the founder of integrated circuit
P
Sir John Anthony Pople, pioneer in computational chemistry
Jon Postel, Internet pioneer, founder of IANA
Q
R
Eric Raymond, Open Source movement luminary
Dennis Ritchie, Unix operating system and C programming language
Ron Rivest, encryption (RSA)
Guido van Rossum, Python (programming language) Benevolent Dictator For Life
S
Adi Shamir, encryption (RSA)
Mark Shuttleworth, founder of Canonical
Richard Stallman, founder of GNU
Olaf Storaasli, NASA Finite element machine
Bjarne Stroustrup, founder of C++
T
Ken Thompson, Unix and Plan 9 operating systems
Linus Torvalds, Linux
Alan Turing, British mathematician and cryptographer
U
V
W
Prof. Joseph Weizenbaum, computer critic
Kevin Warwick, cyborg scientist, implant self-experimenter
Niklaus Wirth, developed Pascal
Peter J. Weinberger, co-developer of the AWK language
Sophie Wilson, designer of the ARM instruction set
Stephen Wolfram, founder of Wolfram Research, physicist, software developer, mathematician
Steve Wozniak, co-founder of Apple; creator of the Apple I and Apple II computers
X
Y
Z
Jill Zimmerman, James M. Beall Professor of Mathematics and Computer Science at Goucher College
Konrad Zuse, built one of the first computers
Mark Zuckerberg, co-founder of Facebook
Se |
https://en.wikipedia.org/wiki/The%20Last%20Book%20in%20the%20Universe | The Last Book in the Universe is a 2000 post-apocalyptic science fiction novel by Rodman Philbrick. Set in a cyberpunk dystopia, its protagonist and narrator is a teenage boy named Spaz who suffers from epilepsy.
Plot summary
The story is set in a dystopian future city somewhere in the United States, called the Urb, which has been disturbed by an earthquake known as "The Big Shake." The Urb is plagued by poverty, thieves, gang warfare, and the use of mind probes. Mind probes are analogous to hard drugs and enable users to temporarily escape reality through images projected in the head. Genetically improved people, called proovs, (a play on improved) live in a city called Eden, with a beautiful society, food, and water. Eden is separated from the Urb by the "Forbidden Zone," a deadly and dangerous minefield. The Urb is split up into sections called "latches." Each latch is controlled by a gang. Spaz is a teenage boy who cannot use mind probes because of his epilepsy, causing his family to abandon him. Spaz runs errands for Billy Bizmo, the latch-boss (leader) of his gang, the "Bully Bangers," in a section of the Urb. On one of his errands, Spaz is sent to "rip-off" (steal from) Ryter, a very old man who possesses the lost arts of literacy and literature.
Spaz soon meets Little Face, a five-year-old orphan who only says the word chox, because he didn't learn how to speak and Spaz first gave him to eat. Spaz also meets Lanaya, a , who charitably gives out "edibles" (food) to Spaz. Ryter understands Spaz's situation and does his best to help him, offering no resistance when Spaz attempts to steal his belongings. Eventually, Spaz learns that Bean, his beloved adoptive sister, is dying of leukemia. Ryter and Little Face accompany Spaz on a journey to find Bean. The trio starts by traveling through "the Pipe," a large, rusted-out water pipe that leads to other latches. In the next latch, the group sees everything burning and finds Lanaya being attacked by very hungry people. Lanaya is rescued by Spaz and Ryter, and she joins them on their journey. The group starts traveling towards the latch where Bean lives and eventually find her as well. Lanaya and Ryter decide to take Bean to Eden, along with Spaz and Little Face. They ride along in Lanaya's to her "contributors" (parents), Jin and Bree's home, which is a castle in Eden.
At this point in the novel, it is brought to attention that Lanaya is a special who has been bred to eventually become a Master of Eden. To assume this title, she has rights and privileges that other do not, which are called "learning opportunities". They take Bean to a hospital called the Primary and she is cured of her sickness using gene therapy. Ryter, Spaz, and Little Face enjoy the paradise of Eden. Ryter, Spaz and Bean are then thrown out of Eden because the elders who rule over Eden decide they are unacceptable. Little Face is secretly adopted by Lanaya's contributors. The elders disregard Bean's high intelligence an |
https://en.wikipedia.org/wiki/Calculus%20of%20constructions | In mathematical logic and computer science, the calculus of constructions (CoC) is a type theory created by Thierry Coquand. It can serve as both a typed programming language and as constructive foundation for mathematics. For this second reason, the CoC and its variants have been the basis for Coq and other proof assistants.
Some of its variants include the calculus of inductive constructions (which adds inductive types), the calculus of (co)inductive constructions (which adds coinduction), and the predicative calculus of inductive constructions (which removes some impredicativity).
General traits
The CoC is a higher-order typed lambda calculus, initially developed by Thierry Coquand. It is well known for being at the top of Barendregt's lambda cube. It is possible within CoC to define functions from terms to terms, as well as terms to types, types to types, and types to terms.
The CoC is strongly normalizing, and hence consistent.
Usage
The CoC has been developed alongside the Coq proof assistant. As features were added (or possible liabilities removed) to the theory, they became available in Coq.
Variants of the CoC are used in other proof assistants, such as Matita and Lean.
The basics of the calculus of constructions
The calculus of constructions can be considered an extension of the Curry–Howard isomorphism. The Curry–Howard isomorphism associates a term in the simply typed lambda calculus with each natural-deduction proof in intuitionistic propositional logic. The calculus of constructions extends this isomorphism to proofs in the full intuitionistic predicate calculus, which includes proofs of quantified statements (which we will also call "propositions").
Terms
A term in the calculus of constructions is constructed using the following rules:
is a term (also called type);
is a term (also called prop, the type of all propositions);
Variables () are terms;
If and are terms, then so is ;
If and are terms and is a variable, then the following are also terms:
,
.
In other words, the term syntax, in BNF, is then:
The calculus of constructions has five kinds of objects:
proofs, which are terms whose types are propositions;
propositions, which are also known as small types;
predicates, which are functions that return propositions;
large types, which are the types of predicates ( is an example of a large type);
itself, which is the type of large types.
Judgments
The calculus of constructions allows proving typing judgments:
Which can be read as the implication
If variables have, respectively, types , then term has type .
The valid judgments for the calculus of constructions are derivable from a set of inference rules. In the following, we use to mean a sequence of type assignments
; to mean terms; and to mean either or . We shall write to mean the result of substituting the term for the free variable in the term .
An inference rule is written in the form
which means
If is a valid judgment, the |
https://en.wikipedia.org/wiki/Broadcast%20Operations%20Group | Broadcast Operations Group is an Australian media company, operating radio stations across various centres across regional New South Wales and Queensland, Australia. Branded as the Super Radio Network, stations carry one of two formats – a news talk and classic hits format based at 2SM Sydney; and a hot adult contemporary format based at New FM Newcastle.
In June 2019, the Group acquired 2BS and B-Rock FM in Bathurst from local proprietors Ron and Stephanie Camplin. 2BS immediately replaced its broadcast of The Ray Hadley Morning Show with The John Laws Show, syndicated from 2SM.
Radio stations
As of , Broadcast Operations Group operates 42 radio stations. 22 of these stations form their AM network, mostly broadcast on AM radio and featuring local news, music and syndicated talkback programming.
2AD 1134 Armidale
2BH 567 Broken Hill
2BS 95.1 Bathurst
2DU 1251 Dubbo
2EL 1089 Orange
2GF 89.5 Grafton
2HC 639 Coffs Harbour (also on 100.5 FM)
2HD 1143 Newcastle (also 97.5 FM Port Stephens and 90.5 FM Lake Macquarie)
2LF 1350 Young
2LM 900 Lismore
2MG 1449 Mudgee
2MO 1080 Gunnedah
2NZ 1188 Inverell
2PK 1404 Parkes
2RE 88.9 Taree
2SM 1269 Sydney
2TM 1287 Tamworth
2VM 1530 Moree
4GY 558 Gympie
4WK 963 Warwick
Radio 531/FM 93.5 Kempsey
Radio 97/FM 104.1 Murwillumbah
A further 16 stations form the FM network, broadcast mainly on FM radio with adult contemporary music and syndicated programming:
4AK 1242 Oakey
B-Rock 99.3 Bathurst
FM92.9 Tamworth
FM100.3 Armidale
FM104.7 Grafton
Gem FM 95.1 Inverell
Hill FM 96.5 Broken Hill
Max FM 107.3 Taree
New FM 105.3 Newcastle
Now FM 98.3 Moree
Real FM 93.1 Mudgee
Roccy FM 93.9 Young
The Rok 95.5 Parkes
Triple G 97.5 Gunnedah
Zoo FM 92.7 Dubbo
ZZZ FM 100.9 Lismore
In addition, the Group broadcasts four stations on DAB+ digital radio in Sydney, alongside simulcasting 2SM:
Fun Super Digi, playing classic hits music
Dance Super Digi, playing 1990s and 2000s dance music
Gorilla Radio, playing electronic dance music
Zoo Super Digi, playing adult contemporary music
Controversy
Senate Inquiry
The BOG was cited in several instances during a Senate Inquiry into Regional Radio. There had been concerns raised as to loss of localism due to networking of radio stations. Bill Caralis was asked to appear several times at various hearings around the country, but never attended.
Local Content
In October 2009, Broadcast Operations Group was named by the ABC's Media Watch program for failing to provide sufficient local content as stipulated by ACMA licence conditions. Media Watch identified three stations; 2HC Coffs Harbour, 2EL Orange and Radio 531 Port Macquarie, which all took the Grant Goldman breakfast show feed out of 2SM in Sydney and failed to meet local content conditions. In response to enquiries by Media Watch, Caralis stated that he believed local news, weather and community announcements played during the Grant Goldman program was sufficient to meet ACMA's licence conditions. |
https://en.wikipedia.org/wiki/IBM%20Monochrome%20Display%20Adapter | The Monochrome Display Adapter (MDA, also MDA card, Monochrome Display and Printer Adapter, MDPA) is IBM's standard video display card and computer display standard for the IBM PC introduced in 1981. The MDA does not have any pixel-addressable graphics modes, only a single monochrome text mode which can display 80 columns by 25 lines of high resolution text characters or symbols useful for drawing forms.
Hardware design
The original IBM MDA was an 8-bit ISA card with a Motorola 6845 display controller, 4 KB of RAM, a DE-9 output port intended for use with an IBM monochrome monitor, and a parallel port for attachment of a printer, avoiding the need to purchase a separate card.
Capabilities
The MDA was based on the IBM System/23 Datamaster's display system, and was intended to support business and word processing use with its sharp, high-resolution characters. Each character is rendered in a box of 9 × 14 pixels, of which 7 × 11 depicts the character itself and the other pixels provide space between character columns and lines. Some characters, such as the lowercase "m", are rendered eight pixels across.
The theoretical total screen display resolution of the MDA is 720 × 350 pixels, if the dimensions of all character cells are added up, but the MDA cannot address individual pixels to take full advantage of this resolution. Each character cell can be set to one of 256 bitmap characters stored in ROM on the card, and this character set cannot be altered from the built-in hardware code page 437. The only way to simulate "graphics" is through ASCII art, obtaining a low resolution 80 × 25 "pixels" screen, based on character positions.
Code page 437 has 256 characters (0-255), including the standard 95 printable ASCII characters from (32-126), and the 33 ASCII control codes (0-31 and 127) are replaced with printable graphic symbols. It also includes another 128 characters (128-255) like the aforementioned characters for drawing forms. Some of these shapes appear in Unicode as box-drawing characters.
There are several attribute values - bit flags that can be set on each character on the screen. These are invisible, underline, normal, bright (bold), reverse video, and blinking. Reverse video swaps the foreground and background colors, while blinking causes text to flash periodically. Some of these attributes can be combined, so that e.g. bright, underlined text can be rendered.
Early versions of the MDA board have hardware capable of outputting red, green and blue TTL signals on the normally unconnected DE-9 video connector pins, theoretically allowing an 8-color display with a suitable monitor. The registers also allow the monochrome mode to be set on and off. No (widely) published software exists to actually control the feature.
It is also possible to combine the values of output pins 6 (Video) and 7 (Intensity), to generate four brightness levels. Video corresponds to 2/3 luminance and Intensity to 1/3 luminance), but the actual display of th |
https://en.wikipedia.org/wiki/Highways%20in%20New%20South%20Wales | The present highway network in New South Wales, Australia was established in August 1928 when the Country Roads Board (the predecessor of the Department of Main Roads, Roads & Traffic Authority and Roads & Maritime Services) superseded the 1924 main road classifications and established the basis of the existing New South Wales main road system. (the full list of main roads gazetted appears in the Government Gazette of the State of New South Wales of 17 August 1928). The number of a road for administrative purposes is not the same as the route number it carries e.g. the Great Western Highway is Highway 5 for administrative purposes but is signposted as part of route A32.)
Many major routes in New South Wales, including Sydney motorways and even some routes named as "highways" are not officially gazetted as highways. For a list of all numbered routes in New South Wales, see List of road routes in New South Wales.
While highways in many other countries are typically identified by number, highways in Australia, including New South Wales, are known mostly by names. These names typically come from 19th-century explorers, important politicians or geographic regions.
List of gazetted highways
See also
Highways in Australia for highways in other states and territories
List of highways in Australia for roads named as highways, but not necessarily classified as highways
List of road routes in New South Wales for all major routes in New South Wales
References
New
Lists of buildings and structures in New South Wales |
https://en.wikipedia.org/wiki/WiseNut | WISEnut is an artificial intelligence-based chatbot and big data collection, analysis, and search solution company founded in 2000 and May.
Representative solutions include artificial intelligence chatbot solution WISE i Chat, artificial intelligence content curating solution WISE i Desk, artificial intelligence integrated search solution Search Formula-1, artificial intelligence-based cloud service chatbot WISE Answerny, big data analysis solution, external information collection solution, and automatic classification solution.
``'WISEnut' is the vice chairman of the Intelligence Information Industry Association (227 companies), which is a business association representing the artificial intelligence industry ecosystem, He is the vice chairman of the Korea Software Industry Association (10,437 companies), a business association for sound development and promotion of the SW industry, He is the senior vice chairman of the Korea Data Industry Association (90 companies), a business association for securing competitiveness in the data industry and innovative growth.
It is the first artificial intelligence company to surpass 20 billion won in sales in 2016, as well as breaking its own record in 2020 to achieve 30 billion won in sales, leading the industry as the No. 1 artificial intelligence chatbot and search company.
Companies that have developed natural language processing original technology and have big data and artificial intelligence technologies for more than 20 years
For the past 23 years, 'WISEnut' has been providing artificial intelligence SW to more than 4,400 domestic customers and 10 global countries through continuous technology innovation and securing original technologies, from language processing technology-based search SW to artificial intelligence chatbot.
Since its establishment in 2000, it has continuously developed language processing technology, semantic analysis technology, text mining, and artificial intelligence conversation processing technology, which are artificial intelligence SW-based technologies, through its own R&D research institute. Based on these original technologies, it is operating in fields such as artificial intelligence chatbots, big data, search, and analysis.
In addition, 'WISEnut' continued to develop multilingual morpheme analysis technologies such as Korean, English, Japanese, and Chinese, Starting with supplying search solutions to Mexico's e-government for the first time in the same industry in 2004, it has supplied artificial intelligence solutions on the global market by supplying NBC.COM news feeding systems in the U.S.
In 2015, it signed an agreement with Luminoso, an artificial intelligence-based global big data analysis company, on technology convergence between the two companies for artificial intelligence-based unstructured big data analysis systems It is taking the lead in strengthening not only domestic but also global competitiveness in language processing technology.
SF-1 V7, the |
https://en.wikipedia.org/wiki/List%20of%20radio%20stations%20in%20Kansas | The following is a list of FCC-licensed radio stations in the U.S. state of Kansas, which can be sorted by their call signs, frequencies, cities of license, licensees, and programming formats.
List of radio stations
Defunct
KNJT
References
Kansas
Radio |
https://en.wikipedia.org/wiki/Replay%20attack | A replay attack (also known as a repeat attack or playback attack) is a form of network attack in which valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and re-transmits it, possibly as part of a spoofing attack by IP packet substitution. This is one of the lower-tier versions of a man-in-the-middle attack. Replay attacks are usually passive in nature.
Another way of describing such an attack is:
"an attack on a security protocol using a replay of messages from a different context into the intended (or original and expected) context, thereby fooling the honest participant(s) into thinking they have successfully completed the protocol run."
Example
Suppose Alice wants to prove her identity to Bob. Bob requests her password as proof of identity, which Alice dutifully provides (possibly after some transformation like hashing, or even salting, the password); meanwhile, Eve is eavesdropping on the conversation and keeps the password (or the hash). After the interchange is over, Eve (acting as Alice) connects to Bob; when asked for proof of identity, Eve sends Alice's password (or hash) read from the last session which Bob accepts, thus granting Eve access.
Prevention and countermeasures
Replay attacks can be prevented by tagging each encrypted component with a session ID and a component number. This combination of solutions does not use anything that is interdependent on one another. Due to the fact that there is no interdependency, there are fewer vulnerabilities. This works because a unique, random session ID is created for each run of the program; thus, a previous run becomes more difficult to replicate. In this case, an attacker would be unable to perform the replay because on a new run the session ID would have changed.
Session IDs, also known as session tokens, are one mechanism that can be used to help avoid replay attacks. The way of generating a session ID works as follows.
Bob sends a one-time token to Alice, which Alice uses to transform the password and send the result to Bob. For example, she would use the token to compute a hash function of the session token and append it to the password to be used.
On his side Bob performs the same computation with the session token.
If and only if both Alice’s and Bob’s values match, the login is successful.
Now suppose an attacker Eve has captured this value and tries to use it on another session. Bob would send a different session token, and when Eve replies with her captured value it will be different from Bob's computation so he will know it is not Alice.
Session tokens should be chosen by a random process (usually, pseudorandom processes are used). Otherwise, Eve may be able to pose as Bob, presenting some predicted future token, and convince Alice to use that token in her transformation. Eve can then replay her reply at a later time (when the previously predicted token is |
https://en.wikipedia.org/wiki/The%20Darling%20Buds%20of%20May%20%28TV%20series%29 | The Darling Buds of May is a British comedy drama television series, produced by Yorkshire Television for the ITV network, first broadcast between 7 April 1991 and 4 April 1993. The first six episodes of Series 1 and the first two of Series 2 are adaptations of the 1958 novel of the same name, and three of its four sequels, by H. E. Bates. The remaining episodes are original storylines based on the same format.
Set in rural 1950s Kent, it follows the life of the Larkin family. It starred David Jason as "Pop" Larkin alongside Pam Ferris as "Ma" Larkin, with Catherine Zeta-Jones playing their eldest daughter Mariette, who marries tax inspector Cedric "Charley" Charlton, played by Philip Franks. A ratings success, it was Zeta-Jones's breakout role.
Featuring a total of 20 episodes, it was broadcast as three series of six double-episode story lines in the spring of 1991, 1992 and 1993, plus two single-episode Christmas specials aired in 1991 and 1992.
The title is from the third line of Shakespeare's sonnet 18.
Synopsis
The Larkin family lives on a farm in rural England, in the county of Kent. Sidney ("Pop") and his common law wife Florence ("Ma") have six children, eldest daughter Mariette, followed by their only son Montgomery, and other daughters Primrose, twins Zinnia and Petunia, and Victoria. Ma is a housewife while Pop supplements his farm income with various other not entirely legitimate enterprises. Tax collector Cedric ("Charley") visits to audit Pop, but falls in love with Mariette and quits his job to live the rural life. As Ma and Pop raise their other children, Charley attempts to provide for his now wife Mariette. Ma and Pop soon have a seventh child, Oscar, followed around a year later by Charley and Mariette's first baby, John Blenheim.
Pop and Ma's relationship is depicted as loving and affectionate throughout, although Pop is flirtatious and subject to numerous advances, most of which Ma is aware of and evidently unconcerned by. Proud of all his children, Pop's schemes evidently provide well for the family, enough to fund boarding school for the twins, naval boarding school for Monty, a swimming pool, a fairground, and a holiday to France, although he is just as motivated by doing good and helping others as making a profit. Ma occasionally becomes involved in Pop's schemes, or creates a scheme of her own. Possessing some very close friends, their lifestyle, in particular the fact they have never been married, nonetheless raises eyebrows in the stuffy environs of the local village.
Mariette and Charley's relationship is more torrid, in part due to his insecurity over Mariette being so attractive, and Charley's varying success in providing financially, with their newly acquired hop garden struggling. Mariette's business skills eventually come to bear as they purchase a local brewery. Primrose is depicted as a frustrated romantic, moving to France to live with a boy her own age and attempting to seduce both Charley and the vil |
https://en.wikipedia.org/wiki/PTS-DOS | PTS-DOS (aka PTS/DOS) is a disk operating system, a DOS clone, developed in Russia by PhysTechSoft and Paragon Technology Systems.
History and versions
PhysTechSoft was formed in 1991 in Moscow, Russia by graduates and members of MIPT, informally known as PhysTech. At the end of 1993, PhysTechSoft released the first commercially available PTS-DOS as PTS-DOS v6.4. The version numbering followed MS-DOS version numbers, as Microsoft released MS-DOS 6.2 in November 1993.
In 1995, some programmers left PhysTechSoft and founded Paragon Technology Systems. They took source code with them and released their own version named PTS/DOS 6.51CD as well as S/DOS 1.0 ("Source DOS"), a stripped down open-source version. According to official PhysTechSoft announcements, these programmers violated both copyright laws and Russian military laws, as PTS-DOS was developed in close relationship with Russia's military and thus may be subject to military secrets law.
PhysTechSoft continued development on their own and released PTS-DOS v6.6 somewhere between and presented PTS-DOS v6.65 at the CeBIT exhibition in 1997. The next version from PhysTechSoft, formally PTS/DOS Extended Version 6.70 was labeled PTS-DOS 2000 and is still being distributed as a last 16-bit PTS-DOS system, .
Paragon continued their PTS-DOS line and released Paragon DOS Pro 2000 (also known and labeled in some places as PTS/DOS Pro 2000). According to Paragon, this was the last version and all development since then ceased. Moreover, this release contained bundled source code of older PTS-DOS v6.51.
Later, PhysTechSoft continued developing PTS-DOS and finally released PTS-DOS 32, formally known as PTS-DOS v7.0, which added support for the FAT32 file system.
PTS-DOS is certified by the Russian Ministry of Defense.
Commands
The following list of commands are supported by PTS-DOS 2000 Pro.
APPEND
ASK
ASSIGN
ATTR
BEEP
BREAK
CALL
CD
CHDIR
CHKDSK
CHOICE
CLS
COMMAND
COPY
CTTY
DATE
DEBUG
DEL
DIR
DISKCOPY
DISP
ECHO
ECHONLF
ERASE
EXE2BIN
EXIT
FDISK
FIND
FOR
FORMAT
GOTO
HISTORY
IF
JOIN
KEYB
LABEL
LOADFIX
MD
MEM
MKDIR
MKZOMBIE
MODE
MORE
NLSFUNC
PATH
PAUSE
PRINT
PROMPT
RD
RDZOMBIE
REM
REN
RENAME
REPLACE
RMDIR
SET
SETDRV
SETVER
SHARE
SHIFT
SORT
SUBST
SYS
TIME
TREE
TYPE
UNINSTALL
VER
VERIFY
VOL
Exclusive commands
UNINSTALL
This command is specific to PTS/DOS 2000. Paragon's description is (quote)
Purpose: Restores the booting of a system installed before PTS-DOS on the disk and restores its the boot sector.
Syntax: UNINSTALL filename [drive:]
Hardware requirements
Intel 80286 CPU or better
512 KB RAM or more
See also
Comparison of DOS operating systems
АДОС, unrelated to Russian MS-DOS
Russian MS-DOS
References
External links
Unofficial PTS-DOS FAQ
Paragon GmbH homepage
DOS variants
Assembly language software
Disk operating systems
1993 software |
https://en.wikipedia.org/wiki/Knuth%E2%80%93Bendix%20completion%20algorithm | The Knuth–Bendix completion algorithm (named after Donald Knuth and Peter Bendix) is a semi-decision algorithm for transforming a set of equations (over terms) into a confluent term rewriting system. When the algorithm succeeds, it effectively solves the word problem for the specified algebra.
Buchberger's algorithm for computing Gröbner bases is a very similar algorithm. Although developed independently, it may also be seen as the instantiation of Knuth–Bendix algorithm in the theory of polynomial rings.
Introduction
For a set E of equations, its deductive closure () is the set of all equations that can be derived by applying equations from E in any order.
Formally, E is considered a binary relation, () is its rewrite closure, and () is the equivalence closure of ().
For a set R of rewrite rules, its deductive closure ( ∘ ) is the set of all equations that can be confirmed by applying rules from R left-to-right to both sides until they are literally equal.
Formally, R is again viewed as a binary relation, () is its rewrite closure, () is its converse, and ( ∘ ) is the relation composition of their reflexive transitive closures ( and ).
For example, if are the group axioms, the derivation chain
demonstrates that a−1⋅(a⋅b) b is a member of E'''s deductive closure.
If is a "rewrite rule" version of E, the derivation chains
demonstrate that (a−1⋅a)⋅b ∘ b is a member of Rs deductive closure.
However, there is no way to derive a−1⋅(a⋅b) ∘ b similar to above, since a right-to-left application of the rule is not allowed.
The Knuth–Bendix algorithm takes a set E of equations between terms, and a reduction ordering (>) on the set of all terms, and attempts to construct a confluent and terminating term rewriting system R that has the same deductive closure as E.
While proving consequences from E often requires human intuition, proving consequences from R does not.
For more details, see Confluence (abstract rewriting)#Motivating examples, which gives an example proof from group theory, performed both using E and using R.
Rules
Given a set E of equations between terms, the following inference rules can be used to transform it into an equivalent convergent term rewrite system (if possible): Here: sect.8.1, p.293
They are based on a user-given reduction ordering (>) on the set of all terms; it is lifted to a well-founded ordering (▻) on the set of rewrite rules by defining if
in the encompassment ordering, or
and are literally similar and .
Example
The following example run, obtained from the E theorem prover, computes a completion of the (additive) group axioms as in Knuth, Bendix (1970).
It starts with the three initial equations for the group (neutral element 0, inverse elements, associativity), using f(X,Y) for X+Y, and i(X) for −X.
The 10 starred equations turn out to constitute the resulting convergent rewrite system.
"pm" is short for "paramodulation", implementing deduce. Critical pair computation is an instance of paramodulat |
https://en.wikipedia.org/wiki/List%20of%20programs%20broadcast%20by%20CTV%20and%20CTV%202 | This is a list of programs broadcast by the CTV Television Network and the CTV 2 television system in Canada. The list consists of television programs currently broadcast, programs formerly aired, and programs that are soon to be broadcast by the two Bell Media-owned networks. Former listings for CTV 2 include programs aired by the system under its former brands CTV Two, A, A-Channel, and NewNet.
Current programming
Original programming
Comedy series
Jann (2019)
Children Ruin Everything (2022)
Shelved (2023)
Drama series
Transplant (2020)
The Spencer Sisters (2023)
Sullivan's Crossing (2023)
Reality/documentary series
The Amazing Race Canada (2013)
Cross Country Cake Off (2022)
Farming for Love (2023)
Talk shows
The Social (2013)
News programming
CTV Morning Live (2011)
CTV National News (1961)
etalk (1998)
Question Period (1967)
W5 (1966)
Your Morning (2016)
Canadian content reruns
Canada's Worst Driver (CTV 2)
Cash Cab (CTV)
Corner Gas (CTV 2)
Fear Thy Neighbor (CTV 2)
Flashpoint (CTV 2)
Heavy Rescue: 401 (CTV 2)
Hellfire Heroes (CTV 2)
Highway Thru Hell (CTV 2)
Jade Fever (CTV 2)
The Littlest Hobo (mid-1960s, 1979–1992, 1997–2000, 2005–2011, 2023) (both)
Mary Makes It Easy (CTV)
Mighty Cruise Ships (CTV 2)
American series
CTV 2
Upcoming programming
Previously broadcast
CTV
Canadian TV series
5-4-3-2-Run (1988–1990)
19-2 (2017)
21c (news) (2001-2004)
Acorn the Nature Nut (1996–2007)
Act Fast
The Alan Thicke Show (1980-1983)
Alice, I Think (reran on A-Channel)
At Home
The Amazing World of Kreskin
Anne of Green Gables: The Animated Series (2008–2011)
Anything You Can Do
The Associates (2001-2002)
Audubon Wildlife Theatre
Balance: Television for Living Well
The Barbara McNair Show
Bigshots (1995–1996)
Birdz (1999–2000)
Bizarre (1980-1985)
The Bobby Vinton Show (variety show)
The Bobroom (comedy)
Bonacini's Italy
Bordertown
Buddies (1967–1968)
A Bunch of Munsch (1991-1992)
The Camilla Scott Show (1995–1998 (BBS); 1998–2001)
The Campbells (1986–1991)
Canada AM (news/morning show) (1972-2016)
Canada's Worst Driver
Canada's Worst Handyman
Canadian Idol (game show/singing competition) (2003-2008)
The Capers
Cardinal (2017–21)
Carter (reruns)
Check it Out! (comedy) (1985-1988)
Circus
Circle Ranch
The City (drama) (1999-2000)
Cold Squad (1998-2005)
Committed (2001)
Corner Gas (2004-2009)
Counterstrike (1990–1993)
Dancing with the Stars
Dan for Mayor (sitcom) (2009-2010)
Definition (1974-1989)
Degrassi: The Next Generation (2001-2009)
The Detail (2018)
D'Myna Leagues (2000–2004)
DNA Dinners
Doctor's Diary
Don't Stop Now (1986–1988)
Double Exposure (comedy)
Due South
E.N.G. (1989–1994)
The Eleventh Hour (2002-2005)
Excuse My French (1974-1976)
Extra, Extra (1987–1990)
Fantastica (1973–1975)
FashionTelevision (2008-2012)
Flying Rhino Junior High (1999–2002)
Funny Farm (comedy) (1974-1975)
Funtown
F/X: The Series (1996–1998)
George (1972-1973)
Good Morning Canada (2000-2009)
Grand Old Country (variety show) (1975-1981)
Guess What |
https://en.wikipedia.org/wiki/Ichannel | ichannel was a Canadian English-language Category A specialty channel owned by Stornoway Communications. Its programs focused on public, social, and current affairs. Its programming included films, documentaries, and talk shows.
History
In November 2000, a partnership between Stornoway Communications and Cogeco was granted a category 1 television broadcasting licence by the Canadian Radio-television and Telecommunications Commission (CRTC) called The Issues Channel, described as "a national English-language specialty television service dedicated to public affairs programming, that will examine matters of public interest and concern in an engaging format."
The channel was launched on September 7, 2001 as ichannel.
In January 2004, the CRTC approved an application for Stornoway to acquire Cogeco's interest in the service.
On August 15, 2016, iChannel ceased broadcasting, after Stornoway requested that the CRTC revoke its license “due to the inability to secure sustainable packaging by Canadian BDUs [Beoadcasting Distribution Undertakings].” The station's ad revenues had fallen from $405,966 in 2012 to $78,798 in 2015.
See also
CPAC
References
Digital cable television networks in Canada
Defunct television networks in Canada
Television channels and stations established in 2001
Television channels and stations disestablished in 2016
English-language television stations in Canada
2001 establishments in Canada
2016 disestablishments in Canada |
https://en.wikipedia.org/wiki/Bpm%3Atv | bpm:tv (beats per minute television) was a Canadian English language specialty channel owned by Stornoway Communications. bpm:tv's programming was devoted to dance music, club lifestyle, and the EDM genre - electronica, house, techno, eurodance, trance.
History
In November 2000, a partnership between Stornoway Communications and Cogeco called Stornoway Communications Limited Partnership, was granted approval by the Canadian Radio-television and Telecommunications Commission (CRTC) to launch a television channel called The Dance Channel, described as "a national English-language Category 2 specialty television service devoted to all aspects of dance."
The channel was launched on September 7, 2001 as bpm:tv with a schedule largely focused on electronic dance music video programming but steered away from the European-based underground EDM and redirected its interest towards a more mainstream radio sound.
In January 2004, the CRTC approved an application by Stornoway to acquire Cogeco's interest in the service.
On April 30, 2015, Cogeco announced on their Facebook page that bpm:tv will be "shutting down operations" effective June 1, 2015. The shutdown was subsequently confirmed by bpm:tv via an official announcement posted on their website.
Programming
The majority of bpm:tv's schedule consisted of music video-based programs. Other programs featured artist profiles, concerts, dance programming, and club lifestyle programs.
VJs & hosts
References
2001 establishments in Canada
2015 disestablishments in Canada
Dance music television channels
Defunct television networks in Canada
English-language television stations in Canada
Music video networks in Canada
Television channels and stations established in 2001
Television channels and stations disestablished in 2015 |
https://en.wikipedia.org/wiki/Southam%20Inc. | Postmedia News is a national news agency with correspondents in Canada, Europe, and the United States and is part of the Canadian newspaper chain owned by Postmedia Network Inc.
History
The newspaper service "Southam Inc" was created in 1904 by William Southam. He had been a delivery boy for The London Free Press, and by 1867 he had become part owner. He bought and transformed the failing Hamilton Spectator in 1877. In 1897 he bought up many other papers including the Calgary Herald, the Ottawa Citizen, Vancouver's The Province and many more. The Winnipeg Tribune was also a Southam owned newspaper until it closed on August 27, 1980.
Southam Newspapers was sold to Hollinger Inc. in 1996. Under Hollinger control, Southam made many acquisitions, including many of the Canadian print media holdings of Thomson Newspapers. On November 15, 2000, the Southam Newspapers company was broken up with the print media holdings and the Southam Newspapers name being sold to Canwest.
Canwest examined ways to integrate many of its smaller market papers into its Global television news division; however, it wasn't to be. On August 9, 2002, Canwest sold many of its smaller market newspapers to a variety of new owners, including Torstar, Transcontinental Media and Osprey Media. In 2003, Southam Newspapers was fully absorbed into Canwest and became Canwest News Service. Canwest News Service began operating in Winnipeg on February 12, 2003, and moved its expanded operations to Ottawa in April 2007.
In July 2010, Canwest's publishing division was spun off into a new company, Postmedia Network (the latter broadcasting division was sold to Shaw Media), led by National Post CEO, Paul Godfrey as a result of bankruptcy, the service subsequently became known as Postmedia News.
In late November 2017, the company announced the planned closure of a series of newspapers and the sale of some to Torstar which will subsequently close many of those since they competed with Torstar newspapers. The Exeter Times-Advocate and the Exeter Weekender will continue to be operated by Post Media, however. The sales to Torstar must first be approved by the Competition Bureau. A few will survive: the St. Catharines Standard, Niagara Falls Review, Welland Tribune and Peterborough Examiner. In total, 36 publications were expected to close, including 34 in Ontario.
Declining ad revenues for print publications was the primary reason for closing the many publications. Postmedia's Paul Godfrey told the Financial Post, "We were once considered the whale in the water. Now we’re the minnow, and the whale is Google and Facebook. ... This is a crisis situation". In a press release he stated that "the continuing costs of producing dozens of small community newspapers in these regions in the face of significantly declining advertising revenues means that most of these operations no longer have viable business models."
Operations
The operations include the Postmedia News wire service as well as an online n |
https://en.wikipedia.org/wiki/ESPY%20Award | An ESPY Award (short for Excellence in Sports Performance Yearly Award) is an accolade currently presented by the American broadcast television network ABC except 2020, and previously ESPN (as of the 2022 ESPY Awards the latter still airs them in the form of replays, except for 2020 which aired the ceremony live), to recognize individual and team athletic achievement and other sports-related performance during the calendar year preceding a given annual ceremony. The first ESPYs were awarded in 1993. Because of the ceremony's rescheduling prior to the 2002 iteration thereof, awards presented in 2002 were for achievement and performances during the seventeen-plus previous months. As the similarly styled Grammy (for music), Emmy (for television), Academy Award (for film), and Tony (for theater), the ESPYs are hosted by a contemporary celebrity; the style, though, is lighter, more relaxed and self-referential than many other awards shows, with comedic sketches usually included.
From the show's inception to 2004, ESPY Award winners were chosen only through voting by fans. Since 2004, sportswriters, broadcasters, sports executives, and sportspersons, collectively experts; or ESPN personalities also vote. Award winners have been selected thereafter exclusively through global online fan balloting conducted from amongst candidates selected by the ESPY Select Nominating Committee.
Charitable role
A portion of the proceeds from sales of tickets to the event devolves on the V Foundation, a charity established by collegiate basketball coach and television commentator Jim Valvano to promote cancer research. Valvano announced the creation of the charitable foundation during his acceptance of the Arthur Ashe Courage Award during the inaugural ESPY telecast on March 3, 1993, fifty-five days before Valvano's death from metastatic adenocarcinoma.
Design
The ESPY Award statuette was designed and created by sculptor Lawrence Nowlan.
Ceremonies
Timing
Between 1993 and 2001, the ceremony was held each year in either February or March and was broadcast recorded on ESPN.
Between 2002 and 2019 and since 2022, the ceremony was conducted on the Wednesday in July following the Major League Baseball (MLB) All-Star Game; as it marks the only day of the year that none of the major North American professional leagues or college sports programs have games scheduled for that day—the National Basketball Association, National Football League, and National Hockey League are not in-season (though the NBA does have its post-draft training camp NBA Summer League going on and NFL teams are getting ready for training camp), colleges are in recess for the summer, and MLB does not contest games on the day following its all-star game—major sports figures (except for cycling, which has the Tour de France, minor league baseball, and golf, where The Open Championship usually starts that evening)- are available to attend. The show aired on the subsequent Sunday four days later, although |
https://en.wikipedia.org/wiki/Macintosh%20XL | Macintosh XL is a modified version of the Apple Lisa personal computer made by Apple Computer. In the Macintosh XL configuration, the computer shipped with MacWorks XL, a Lisa program that allowed 64 K Macintosh ROM emulation. An identical machine was previously sold as Lisa 2/10 with the Lisa OS only.
Hardware
Macintosh XL has a 400K 3.5" floppy drive and an internal 10 MB proprietary "Widget" hard drive with provision for an optional 5 or 10 MB external ProFile hard drive with the addition of a parallel interface card. The machine uses a Motorola 68000 CPU, clocked at 5 MHz together with 512 KB RAM. Macintosh XL was discontinued in April 1985.
Upgrades
Because of its roots as a Lisa — unlike all other Macintosh computers — the stock Macintosh XL used rectangular pixels. The resolution of Macintosh XL's 12-inch (30.5 cm) display was 720×364 pixels. Square pixels were available through the Macintosh XL Screen Kit upgrade that changed the resolution to 608×432 pixels. The CPU could be replaced with a new CPU board containing up to 8 MB RAM, called XLerator 18. The maximum upgraded RAM with conventional add-in RAM cards was up to 2 MB – quadruple the maximum capacity of earlier Macintosh computers. (With modifications to the CPU board, the XL could accommodate up to 4 MB of RAM).
MacWorks
MacWorks Plus was developed by Sun Remarketing as a successor to MacWorks XL in order to provide application compatibility with the Macintosh Plus computer. MacWorks Plus added support for an 800 KB 3.5" floppy disk and System software up through version 6.0.3. MacWorks Plus II extended that to the same System 7.5.5 limit imposed on all 68000 processors.
History
After two years of lackluster sales, Apple attempted to salvage Lisa by redesigning some hardware components and renaming it as Macintosh XL. Basing on the previous sale figures of Lisa, Apple ordered the limited number of parts as to last through 1985 before ending the production. The redesign spurred a record number of orders for this addition to the Macintosh line, which caught Apple off-guard.
Discontinuation
Due to the limited number of parts ordered, Apple had sold its entire allocations of Macintosh XL for 1985 much earlier than anticipated. Had Apple continued to manufacture Macintosh XL as to meet the demand at lower price, the company would have lost even more money on each unit. Additionally, the cancellation was also due to the necessary consolidation of expenses and projects. In 1986, Apple offered the exchange program for the owners of Lisa and Macintosh XL. The owners could exchange their Lisa and Macintosh XL along with $1,495 US for the new Macintosh Plus and Hard Disk 20 (list price of $4,098 US).
Sun Remarketing
After Apple dropped the XL from their price list in September 1985, Sun Remarketing of Logan, Utah, bought a number of Apple's remaining inventory and continued to sell them under license with their updated version of MacWorks Plus, re-branding it as Macintosh Professiona |
https://en.wikipedia.org/wiki/Adobe%20Atmosphere | Adobe Atmosphere (informally abbreviated Atmo) was a software platform for interacting with 3D computer graphics. 3D models created with the commercial program could be explored socially using a browser plugin available free of charge. Atmosphere was originally developed by Attitude Software as 3D Anarchy and was later bought by Adobe Systems. The product spent the majority of its lifetime in beta testing. Adobe released the last version of Atmosphere, version 1.0 build 216, in February 2004, then discontinued the software in December that year.
Features
Atmosphere focused on explorable "worlds" (later officially called "environments"), which were linked together by "portals", analogous to the World Wide Web's hyperlinks. These portals were represented as spinning squares of red, green, and blue that revolved around each other and floated above the ground. Portals were indicative of the Atmosphere team's desire to mirror the functionality of Web pages. Although the world itself was described in the .aer (or .atmo) file, images and sounds were kept separately, usually in the GIF, WAV or MP3 format. Objects in worlds were scriptable using a specialized dialect of JavaScript, allowing a more immersive environment, and worlds could be generated dynamically using PHP. Using JavaScript, a world author could link an object to a Web page, so that a user could, for example, launch a Web page by clicking on a billboard advertisement (Ctrl+Shift+Click in earlier versions). By version 1.0, Atmosphere also boasted support for using Macromedia Flash animations and Windows Media Video as textures.
Atmosphere-based worlds consisted mainly of parametric primitives, such as floors, walls, and cones. These primitives could be painted a solid color, given an image-based texture, or made "subtractive". Invisible, "subtractive" primitives could be used to cut "holes" in other primitives, to build more complex shapes. Many worlds also contained animated polygon meshes made possible by Atmosphere's implementation as a subcomponent of Viewpoint Corporation's Viewpoint Media Player. However, Viewpoint stopped supporting the Atmosphere subcomponent some time before Atmosphere was discontinued.
Unlike the more centralized structure of Active Worlds, in which environments are primarily built within AlphaWorld, Atmosphere worlds were spread throughout the Internet, usually hosted on the author's own Web site as .aer files. There were binary and ASCII versions of the .aer file format, though the ASCII format was phased out in later releases. .aer files could be generated dynamically using server-side content management systems, as demonstrated by the AtmoWorlds.com Worlds Directory.
Users were represented in worlds by avatars. In later builds, an option allowed the user to see his or her own avatar. An early quirk of Atmosphere displayed users whose avatars had not yet loaded as colorful, slanted cylinders, and announced the arrival of users with a "bug zapper" sound.
Wh |
https://en.wikipedia.org/wiki/Satellite%20Data%20System | The Satellite Data System (SDS) is a system of United States military communications satellites. At least three generations have been used: SDS-1 from 1976 to 1987; SDS-2 from 1989 to 1996; SDS-3 from 1998 to the present. It is believed that these satellites were known by the code name Quasar. The first generation was named simply 'SDS', the second generation was named 'Quasar' and the third generation each had their own designations.
Orbital characteristics
SDS satellites have a highly elliptical orbit, going from about 300 kilometers at perigee to roughly 39,000 km at apogee in order to allow communications with polar stations that cannot contact geosynchronous satellites. The high apogee meant that the polar regions were visible for long amounts of time, and only two satellites were required in order to achieve constant communications ability. In addition, two geostationary satellites appear to be part of the system. The SDS satellites were constructed by Hughes Aircraft Company.
Mission
The primary purpose of the SDS satellites is to relay imagery from low-flying reconnaissance satellites, notably the Keyhole optical reconnaissance and Lacrosse/Onyx radar reconnaissance satellites to ground stations in the United States.
SDS-1
Each SDS-1 satellite had 12 channels available for Ultra high frequency (UHF) communication. They were cylindrical in shape, roughly long. 980 watts of electrical power were available from solar panels and batteries. The SDS-1 had a mass of and was launched on Titan-3B rockets. The SDS-1 satellites had similar orbits to the Air Force's Jumpseat ELINT satellites.
It has been speculated that the early satellites served as data relays for the first KH-11 Kennen reconnaissance satellites.
SDS-2
The SDS-2 is significantly more massive at , with three separate communication dishes, including one for a K-band downlink. Two dishes are in diameter, while the third is in diameter. The solar arrays generate 1238 watts of power. It is believed that the Space Shuttle has been used to launch several satellites, possibly on missions STS-28, STS-38, and STS-53. Other launches have used the Titan IV launch vehicle.
SDS-3
Satellites
References
Vick, Berman, Lindborg, Fellow (March 19, 1997) SDS-1 Military Communications Satellite Federation of American Scientists Accessed April 24, 2004
Vick, Berman, Lindborg, Fellow, Pike, Aftergood (March 19, 1997) SDS-2 Military Communications Satellite Federation of American Scientists Accessed April 24, 2004
Communications satellites
Hughes Aircraft Company
Military satellites |
https://en.wikipedia.org/wiki/California%20Dreams | California Dreams is an American teen sitcom that aired on NBC. It was part of the network's Saturday morning block, TNBC, premiering on September 12, 1992. Created by writers Brett Dewey and Ronald B. Solomon, and executive produced by Peter Engel, all known for their work on Saved by the Bell, the series centers on the friendships of a group of teenagers (shifting toward a multi-ethnic makeup beginning with the show's second season) who form the fictional titular band. The series ran five seasons, airing its final episode on December 14, 1996. The series featured 40 original songs performed by the band throughout the show's run, primarily written by Steve Tyrell.
Episodes
Cast
Main
The Garrison family
Brent Gore as Matt Garrison (1992–1994)
Heidi Noelle Lenhart as Jenny Garrison (1992–1993)
Michael Cutt as Richard Garrison (1992–1993, regular; 1993–1994, recurring)
Gail Ramsey as Melody Garrison (1992–1993, regular; 1993, guest star)
Ryan O'Neill as Dennis Garrison (1992–1993)
The band
Kelly Packard as Tiffani Anne Smith
William James Jones as Antoine Bethesda "Tony" Wicks
Michael Cade as Sylvester Leslie "Sly" Winkle
Jay Anthony Franke as Jacob Samuel "Jake" Sommers (1993–1996; singing voice performed by Barry Coffing)
Jennie Kwan as Samantha Woo Deswanchoo (1993–1996)
Aaron Jackson as Mark Winkle (1994–96; singing voice performed by Zachary Throne)
Diana Uribe as Lorena Costa (1994–1996)
Recurring
Brittney Powell as Randi Jo (1992–1993)
Denise Dowse as Vice Principal McBride (1993–1994)
Burke Bryant as Keith Del (1996)
Earl Boen as Principal Wolfman Blumford (1994-1996)
Syndication
Reruns of California Dreams briefly aired on TBS in the late 1990s.
The show aired on The Children's Channel and later Trouble in the UK in the 1990s.
Home media
Shout! Factory released the first four seasons of California Dreams on DVD in Region 1 between 2009 and 2011. Seasons 3 and 4 were released as Shout! Factory Exclusives titles, available exclusively through their online store. As of 2016, Seasons 1-4 and The Best of... DVDs can be purchased on Amazon. It is unknown if season 5 will be released.
On July 19, 2011, Mill Creek Entertainment released a ten-episode best-of set, The Best of California Dreams, a single-disc set that features episodes from the first three seasons.
♦ - Shout! Factory Exclusives title, sold exclusively through Shout's online store
Reception
Critical response
California Dreams was not well received critically. Rebecca Ascher-Walsh of Entertainment Weekly gave the series a grade of "F", and stated that "California Dreams can be accused of a lot of things, but originality isn’t one of them", and added that "California Dreams producer Franco E. Bario (who is also behind Saved by the Bell) may have good intentions, but it’s hard to imagine what they were." Los Angeles Times reviewer Lynne Heffley considered the show nothing more than "a Saved by the Bell clone set in an upscale beach town".
Awards and nomina |
https://en.wikipedia.org/wiki/Computer%20forensics | Computer forensics (also known as computer forensic science) is a branch of digital forensic science pertaining to evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the digital information.
Although it is most often associated with the investigation of a wide variety of computer crime, computer forensics may also be used in civil proceedings. The discipline involves similar techniques and principles to data recovery, but with additional guidelines and practices designed to create a legal audit trail.
Evidence from computer forensics investigations is usually subjected to the same guidelines and practices of other digital evidence. It has been used in a number of high-profile cases and is accepted as reliable within U.S. and European court systems.
Overview
In the early 1980s, personal computers became more accessible to consumers, leading to their increased use in criminal activity (for example, to help commit fraud). At the same time, several new "computer crimes" were recognized (such as cracking). The discipline of computer forensics emerged during this time as a method to recover and investigate digital evidence for use in court. Since then, computer crime and computer-related crime has grown, with the FBI reporting a suspected 791,790 internet crimes alone in 2020, a 69% increase over the amount reported in 2019. Today, computer forensics is used to investigate a wide variety of crime, including child pornography, fraud, espionage, cyberstalking, murder, and rape. The discipline also features in civil proceedings as a form of information gathering (for example, Electronic discovery)
Forensic techniques and expert knowledge are used to explain the current state of a digital artifact, such as a computer system, storage medium (e.g., hard disk or CD-ROM), or an electronic document (e.g., an email message or JPEG image). The scope of a forensic analysis can vary from simple information retrieval to reconstructing a series of events. In a 2002 book, Computer Forensics, authors Kruse and Heiser define computer forensics as involving "the preservation, identification, extraction, documentation and interpretation of computer data". They go on to describe the discipline as "more of an art than a science", indicating that forensic methodology is backed by flexibility and extensive domain knowledge. However, while several methods can be used to extract evidence from a given computer, the strategies used by law enforcement are fairly rigid and lack the flexibility found in the civilian world.
Cybersecurity
Computer forensics is often confused with cybersecurity. Cybersecurity is about prevention and protection, while computer forensics is more reactionary and active, involving activities such as tracking and exposing. System security usually encompass |
https://en.wikipedia.org/wiki/Windows%20XP%20Professional%20x64%20Edition | Microsoft Windows XP Professional x64 Edition, released on April 25, 2005, is an edition of Windows XP for x86-64 personal computers. It is designed to use the expanded 64-bit memory address space provided by the x86-64 architecture.
The primary benefit of moving to 64-bit is the increase in the maximum allocatable random-access memory (RAM). 32-bit editions of Windows XP are limited to a total of 4 gigabytes. Although the theoretical memory limit of a 64-bit computer is about 16 exabytes (17.1 billion gigabytes), Windows XP x64 is limited to 128GB of physical memory and 16 terabytes of virtual memory.
Windows XP Professional x64 Edition uses the same kernel and code tree as Windows Server 2003 and is serviced by the same service packs. However, it includes client features of Windows XP such as System Restore, Windows Messenger, Fast User Switching, Welcome Screen, Security Center and games, which Windows Server 2003 does not have.
Windows XP Professional x64 Edition is not to be confused with Windows XP 64-Bit Edition as the latter was designed for Itanium architecture. During the initial development phases, Windows XP Professional x64 Edition was named Windows XP 64-Bit Edition for 64-Bit Extended Systems.
Advantages
Supports up to 128GB of RAM.
Supports up to two physical CPUs (in separate physical sockets) and up to 64 logical processors (i.e. cores or threads on a single CPU).
Uses the Windows Server 2003 kernel which is newer than 32-bit Windows XP and has improvements to enhance scalability. Windows XP Professional x64 Edition also introduces Kernel Patch Protection (also known as PatchGuard) which can help improve security by helping to eliminate rootkits.
Supports GPT-partitioned disks for data volumes (but not bootable volumes) after SP1, which allows disks greater than 2TB to be used as a single GPT partition for storing data.
Allows faster encoding of audio or video, higher performance video gaming and faster 3D rendering in software optimized for 64-bit hardware.
Ships with Internet Information Services (IIS) version 6.0. All other 32-bit editions of Windows XP have IIS v5.1.
Ships with Windows Media Player (WMP) version 10. Windows XP Professional shipped with WMP 8 (with WMP 9 shipping with Service Pack 2 and later), although WMP 11 is available for Windows XP Service Pack 2 or later.
Benefits from IPsec features and improvements made in Windows Server 2003.
Benefits from Shadow Copy features introduced in Windows Server 2003.
Remote Desktop Services supports Unicode keyboard input, client-side time-zone redirection, GDI+ rendering primitives for improved performance, FIPS encryption, fallback printer driver, auto-reconnect and new Group Policy settings.
Files and Settings Transfer Wizard supports migrating settings from both 32-bit and 64-bit Windows XP PCs.
Software compatibility
Windows XP Professional x64 Edition uses a technology named Windows-on-Windows 64-bit (WoW64), which permits the execution of 32-bit |
https://en.wikipedia.org/wiki/The%20Bat%21 | The Bat! is an email client for the Microsoft Windows operating system, developed by Moldovan software company Ritlabs. It is sold as shareware and offered in three editions: Home Edition, Professional Edition, and Voyager which is a portable version and is included with Professional Edition.
Developers
Ritlabs, SRL is based in Chişinău, Moldova. It was founded as RIT Research Labs in 1992 by Sergey Demchenko and Slava Filimonov, and were the creators of the DOS Navigator file manager.
Alongside The Bat!, Ritlabs also offer a mail server software called BatPost.
Features
Protocols and data security
The Bat! supports POP3 and IMAP alongside their SSL variants, and SMTP including secure STARTTLS connections. Microsoft Exchange Server is also supported via MAPI.
The internal PGP implementation based on OpenSSL lets users encrypt messages and sign them with digital signatures. Digital keys manager is included. PGP up to version 10.0.2 is supported. The Bat! supports S/MIME via Internal Implementation or Microsoft CryptoAPI, Secure Socket Layer (SSL) v3.0 / Transport Layer Security (TLS) v1.0, v1.1, and 1.2 (as of version 8.5) with AES algorithm.
The Bat! v9.1 supports TLS AEAD AES-GCM cipher suites for secure connections with mail servers. The Bat! v9.2.3 is in compliance with the Google's security standards related to the OAuth 2.0 protocol.
The Bat! checks attached file extensions and blocks their launching if they are suspicious. The Bat! warns users of double extension attachments and allows users to see the real extension. The Bat!'s internal viewer was replaced in version 9.2.1 with the Chromium web browser rendering engine to ensure HTML formatting is properly rendered, prevent script execution, and provide anti-phishing information.
Database encryption
The Bat! Professional has the option to encrypt the message database, address books and configuration files stored on the computer. During the first program start, encryption can be activated and the master password can be set. The AES algorithm is used for encryption in the CBC process (Cipher Block Chaining) with a 128-bit key.
Message Management
The Bat! provides virtual folders, advanced filtering, extensive search, a macro language, templates, tags, and color groups to assist in managing email.
Email templates contents may be dynamically changed through the use of macros, which can also be used to automatically execute other user-defined functions such as cursor positioning, addressing changes, identity changes, active account changes and other.
Filtering
A filtering system that sorts incoming, outgoing, read, and replied messages to folders; auto-responds; replies with custom templates; forwards, redirects, prints, or exports messages; sends read confirmations; runs external programs and more.
Language
Originally available in English, Russian, German, Polish and Dutch, the software interface has since been expanded to a total of 18 languages.
Support for IDNs that contain |
https://en.wikipedia.org/wiki/ABC-TV | ABC-TV may refer to:
American Broadcasting Company, a radio and television network in the United States
ABC Television (Australian TV network)
ABC Canberra (TV station), the ABC television station in Canberra
ABC TV (Australian TV channel), the Australian television channel, formerly known as ABC1
ABC TV Plus, the Australian digital television channel
ABC Australia (Southeast Asian TV channel), the former Australia Network / Australia Plus
ABC Weekend TV, a former ITV company in the United Kingdom
Asahi Broadcasting Corporation, a radio and television broadcaster in Osaka, Japan
Associated Broadcasting Company
a former name of TV5 Network, a radio and television network in the Philippines
a former name of Associated Television (ATV), a former ITV company in the United Kingdom
ABC Television (Nepal), a television channel in Nepal
ABC-TV (Paraguayan TV channel), a television channel in Paraguay
See also
ABC Television (disambiguation) |
https://en.wikipedia.org/wiki/Key%20server%20%28cryptographic%29 | In computer security, a key server is a computer that receives and then serves existing cryptographic keys to users or other programs. The users' programs can be running on the same network as the key server or on another networked computer.
The keys distributed by the key server are almost always provided as part of a cryptographically protected public key certificates containing not only the key but also 'entity' information about the owner of the key. The certificate is usually in a standard format, such as the OpenPGP public key format, the X.509 certificate format, or the PKCS format. Further, the key is almost always a public key for use with an asymmetric key encryption algorithm.
History
Key servers play an important role in public key cryptography.
In public key cryptography an individual is able to generate a key pair, where one of the keys is kept private
while the other is distributed publicly. Knowledge of the public key does not compromise the security of public key cryptography. An
individual holding the public key of a key pair can use that key to carry out cryptographic operations that allow secret communications with strong authentication of the holder of the matching private key. The
need to have the public key of a key pair in order to start
communication or verify signatures is a bootstrapping problem. Locating keys
on the web or writing to the individual asking them to transmit their public
keys can be time consuming and unsecure. Key servers act as central repositories to
alleviate the need to individually transmit public keys and can act as the root of a chain of trust.
The first web-based PGP keyserver was written for a thesis by Marc Horowitz, while he was studying at MIT. Horowitz's keyserver was called the HKP Keyserver
after a web-based OpenPGP HTTP Keyserver Protocol (HKP), used to allow people to interact with the
keyserver. Users were able to upload, download, and search keys either through
HKP on TCP port 11371, or through web pages which ran CGI
scripts. Before the creation of the HKP Keyserver, keyservers relied on email
processing scripts for interaction.
A separate key server, known as the PGP Certificate Server, was developed by PGP, Inc. and was used as the software (through version 2.5.x for the server) for the default key server in PGP through version 8.x (for the client software), keyserver.pgp.com. Network Associates was granted a patent co-authored by Jon Callas (United States Patent 6336186) on the key server concept.
To replace the aging Certificate Server, an LDAP-based key server was redesigned at Network Associates in part by Randy Harmon and Len Sassaman, called PGP Keyserver 7. With the release of PGP 6.0, LDAP was the preferred key server interface for Network Associates’ PGP versions. This LDAP and LDAPS key server (which also spoke HKP for backwards compatibility, though the protocol was (arguably correctly) referred to as “HTTP” or “HTTPS”) also formed the basis for the PGP Admini |
https://en.wikipedia.org/wiki/Quanta%20Computer | Quanta Computer Incorporated () () is a Taiwan-based manufacturer of notebook computers and other electronic hardware. Its customers include Apple Inc., Dell, Hewlett-Packard Inc., Acer Inc., Alienware, Amazon.com, Cisco, Fujitsu, Gericom, Lenovo, LG, Maxdata, Microsoft, MPC, BlackBerry Ltd, Sharp Corporation, Siemens AG, Sony, Sun Microsystems, Toshiba, Valve, Verizon Wireless, and Vizio.
Quanta has extended its businesses into enterprise network systems, home entertainment, mobile communication, automotive electronics, and digital home markets. The company also designs, manufactures and markets GPS systems, including handheld GPS, in-car GPS, Bluetooth GPS and GPS with other positioning technologies.
Quanta Computer was announced as the original design manufacturer (ODM) for the XO-1 by the One Laptop per Child project on December 13, 2005, and took an order for one million laptops as of February 16, 2007. In October 2008, it was announced that Acer would phase out Quanta from the production chain, and instead outsource manufacturing of 15 million Aspire One netbooks to Compal Electronics.
In 2011, Quanta designed servers in conjunction with Facebook as part of the Open Compute Project.
It was estimated that Quanta had a 31% worldwide market share of notebook computers in the first quarter of 2008.
History
The firm was founded in 1988 by Barry Lam, a Shanghai-born businessman who grew up in Hong Kong and received his education in Taiwan, with a starting capital of less than $900,000. A first notebook prototype was completed in November 1988, with factory production beginning in 1990.
Throughout the 1990s, Quanta established contracts with Apple Computers and Gateway, among others, opening an after-sales office in California in 1991 and another one in Augsburg, Germany in 1994. In 1996, Quanta signed a contract with Dell, making the firm Quanta's largest customer at the time.
In 2014, Quanta ranked 409th on Fortune's Global 500 list. 2016 is the strongest period with it being in 326. In 2020, Quanta dropped to rank 377.
Products
Apple Watch
Apple Macbook Air
Apple Macbook Pro
ThinkPad Z60m
Subsidiaries
Subsidiaries of Quanta Computer include:
Quanta Cloud Technology Inc - provider of data center hardware.
FaceVsion Technology Inc - telecommunications, webcam, and electronic products.
CloudCast Technology Inc - information software and data processing - liquidated in February 2017.
TWDT Precision Co., Ltd. (TWDT) - 55% ownership, which was sold in June 2016.
RoyalTek International - In January 2006, RoyalTek became a member of Quanta Inc. This allows Quanta to create a top-down integration of technology and manufacturing, and we now have manufacturing factories in Taiwan and Shanghai.
Techman Robot Inc.
Techman Robot Inc. is a cobot manufacturer founded by Quanta in 2016. It is based in Taoyuan's Hwa Ya Technology Park. It is the world's second-largest manufacturer of robots after Universal Robots.
Major facilities
Shanghai, |
https://en.wikipedia.org/wiki/Connectix | Connectix Corporation was a software and hardware company, noted for having released innovative products that were either made obsolete as Apple Computer incorporated the ideas into system software, or were sold to other companies once they became popular. It was formed in October 1988 by Jon Garber; dominant board members and co-founders were Garber, Bonnie Fought (the two were later married), and close friend Roy McDonald. McDonald was still Chief Executive Officer and president when Connectix finally closed in August 2003.
Products
Primary products included these:
Virtual: Its original flagship product, which introduced virtual memory to the Macintosh operating system, Mac OS, years before Apple's implementation in System 7. Virtual also runs on a motley assortment of accelerator cards for the original Mac, Mac Plus, and Mac SE, which were not supported by Apple.
HandOff II: The file launcher developed by Fred Hollander of Utilitron, Inc. This INIT for Macintosh solved the "Application Not Found" problem by launching a substitute application for the one that created the file the user was trying to open. Apple would later build a similar functionality into System 7.
SuperMenu: The first commercial hierarchical Apple menu, developed by Fred Hollander of Utilitron, Inc. Again, Apple would make a hierarchal Apple menu standard in System 7, by buying one of the many shareware versions of the same concept.
MODE32: Software which allows 32-bit memory management on "32-bit dirty" Macintosh systems. Later bought by Apple and distributed for free, at least in part to settle a class-action lawsuit brought by customers who demanded to know why their 32-bit 68020 microprocessors could not access more than 8 megabytes of RAM.
Optima: Makes System 6 32-bit clean and puts a Macintosh IIsi into 32-bit mode. This makes all of the physical RAM addressable by System 6. It can have one application open at a time.
MAXIMA: A RAM disk utility, better than the one that later came with Mac OS as it saved its contents before and after reboots, while also allowing booting from the RAM disk.
Connectix Desktop Utilities (CDU): A collection of utilities for desktop systems, including utilities for power management (screen dimming and automatic power down), synchronizing files when multiple disks are used, and custom desktop background images. A version of the CDU software received an Energy Star Compliant Controlling Device status from the US Environmental Protection Agency (EPA) on the basis of the software's power management functionality.
Connectix Powerbook Utilities (CPU): A collection of utilities designed to simplify common tasks for laptop users.
RAM Doubler: The first product to combine compression with virtual memory. A top selling Mac utility for many years which eventually was made obsolete as Apple improved their own virtual memory. There is also a RAM Doubler for Windows 3.1 which uses compression to increase system resources, allowing more applic |
https://en.wikipedia.org/wiki/Office%20de%20Radiodiffusion%20T%C3%A9l%C3%A9vision%20Fran%C3%A7aise | The (ORTF; , or French Radio and Television Broadcasting Office) was the national agency charged, between 1964 and 1975, with providing public radio and television in France. All programming, especially news broadcasts, were under strict control of the national government.
History
Background
In 1945, the provisional French government established a public monopoly on broadcasting with the formation of Radiodiffusion Française (RDF). This nationalisation of all private radio stations marked the beginning of a new era of state-controlled broadcasting in France. As part of its mandate, the RDF also established a 441-line television station known as Télévision française. This station made use of the frequencies previously utilized by the Nazi-operated Fernsehsender Paris.
In 1949, the RDF underwent a name change to Radiodiffusion-Télévision Française (RTF) in order to reflect the organisation's growing focus on television broadcasting. By the end of the year, the RTF had begun transmitting television signals using the new 819-line system, which represented a significant advancement in the technical capabilities of the medium. This development allowed for the transmission of high-quality television signals and paved the way for the widespread adoption of television in France.
ORTF era
In 1964, the RTF was reformed and renamed into the ORTF. The ORTF aimed to modernise the public broadcasting service in order to better satisfy the needs of the French public in terms of information, culture, education, and entertainment. Despite this goal of modernisation and an expressed commitment to meeting the diverse needs of the public, the ORTF continued to operate under a monopoly.
From the beginning, the public broadcaster experienced fierce competition from the "peripheral stations": French-speaking stations aimed at the French public but transmitting on longwave from neighbouring countries, such as Radio Monte Carlo (RMC) from Monaco, Radio Luxembourg (later RTL) from Luxembourg, and Europe 1 from Germany (exceptionally, in 1974, RMC was allowed to set up a transmitter on French territory).
In October 1967, colour television was introduced on the 625-line second channel. In 1968, advertising was introduced on both television channels, although the 'redevance audiovisuelle' (Broadcasting licence fee) remained in place.
ORTF employees participated in the May 1968 strikes.
In 1970, during a press conference, Georges Pompidou initiated a will to modernise, affirming that information provided to the ORTF must be free from any outside influence, independent in nature, and impartial in its presentation while stressing that it remains "the voice of France whether we like it or not. "
A third television channel started broadcasting in December 1972.
Dissolution
The election of Valéry Giscard d'Estaing in 1974 prompted yet another reform. The new liberal administration considered the ORTF to be a relic of Gaullist rule. Furthermore, the ORTF's annua |
https://en.wikipedia.org/wiki/Net%20Yaroze | The is a development kit for the PlayStation video game console. It was a promotion by Sony Computer Entertainment to computer programming hobbyists which launched in June 1996 in Japan and in 1997 in other countries. It was originally called "Net Yarouze", but was changed to "Net Yaroze" in late 1996. Yarōze means "Let's do it together".
Conceived by PlayStation creator Ken Kutaragi and priced at around $750 US, the Net Yaroze (DTL-H300x) package contained a special black-colored debugging PlayStation unit, a serial cable for connecting the console to a personal computer, and a CD containing PlayStation development tools. The user has to provide a personal computer (an IBM PC compatible or Macintosh; NEC PC-9801 was also supported in Japan) to write the computer code, compile it, and send the program to the PlayStation.
The Net Yaroze was neither the first nor only official consumer console development kit. The PC-Engine Develo predates it, and the WonderWitch followed it. The GP32 can run user programs out of the box. Finally, many earlier consoles (Astrocade, Famicom) offered limited programming capabilities with BASIC dialects. Net Yaroze had no direct successors on subsequent PlayStation platforms, but Sony's Linux for PlayStation 2 and YA-BASIC offered a similar feature to hobbyists and amateur developers on the PlayStation 2 console.
Contents
The Net Yaroze kit contains the following items:
The Net Yaroze PlayStation console, which is identical to a standard PlayStation console except that it has different boot ROMs, lacks a regional lockout, uses a different encryption scheme, and is black.
2 PlayStation controllers (black matte texture)
The Net Yaroze key disc, required to boot programs which were loaded from a PC.
The Access Card, a dongle which must be placed in memory card port 1 in order to boot programs which were loaded from a PC.
A CD-ROM containing development tools. The tools included vary according to version, but invariably include a C compiler, a compiler assembler, a linker, a debugger, tools for converting graphic and sound files to PlayStation format, and programming libraries.
The Communications Cable, a special serial cable used to link the console and the computer.
"Start Up Guide", "Library Reference", and "User's Guide" manuals. These document the programming libraries and PlayStation-specific development, but do not give instructions on how to program; the Net Yaroze kit assumes the user has basic programming knowledge.
Versions
Though it lacked regional lockout, the Net Yaroze console exists in three variations: one for Japan, one for North America and one for Europe and Australia. The Europe/Australia version boots in PAL mode, while the others boot in NTSC mode. There are further differences between the Japanese kit and the others; the manuals are in Japanese, the software for Japanese PCs is included, and the discs and access card sticker have different printing. The Japanese version is sometimes unofficial |
https://en.wikipedia.org/wiki/AFDB | AFDB may refer to:
Adult Film Database
African Development Bank
Aluminum Foil Deflector Beanie (Tin foil hat)
Large Auxiliary Floating Dry Docks, Big |
https://en.wikipedia.org/wiki/Food%20Network | Food Network is an American basic cable channel owned by Television Food Network, G.P., a joint venture and general partnership between Warner Bros. Discovery Networks (which holds a 69% ownership stake of the network) and Nexstar Media Group (which owns the remaining 31%). Despite this ownership structure, Warner Bros. Discovery has operating control of the channel, and manages and operates it as a division of the Warner Bros. Discovery U.S. Networks Group. The channel airs both special and regular episodic programs about food and cooking.
In addition to its headquarters in New York City, Food Network has offices in Atlanta, Los Angeles, San Francisco, Chicago, Detroit, Jersey City, Cincinnati, and Knoxville.
Food Network was established on November 23, 1993, 6:00 am as TV Food Network and in 1997, it adopted its current name. It was acquired by Scripps Networks Interactive; Scripps Networks Interactive later merged with Discovery, Inc. in 2018, and WarnerMedia was merged with Discovery, Inc. to form a single company, Warner Bros. Discovery. As of September 2018, 91 million households receive Food Network (98.6% of households with cable) in the United States.
History
In 1990, Providence Journal company president Trygve Myhren was attempting to grow the company and decided that basic cable programming at the time was a high growth area with cable companies beginning to expand their overall channel capacities. With many basic cable channels at the time, Myhren was looking for something different. With food selected as the channel's genre, the working title for the channel was The Cooking Channel up until the channel's launch. Myhren hired Jack Clifford, Joe Langhan and Reese Schonfeld, co-founder of CNN, to help found the channel. Schonfeld, Landghan and Clifford were CEO, vice president of production and president. Both The Cooking Channel and the Food Network trademarks were taken by other entities, with the Food Network being a newsletter. Myrhen originally wanted the network to be operated from Providence, Rhode Island as he argued that a cable network's costs were much more scalable from a lower-profile location, while Schonfeld preferred it be originated from New York, considered the American nucleus of culinary arts; Schonfeld's preference eventually won out, though at the peril of the network's launch budget, which was lower than it would have been from Providence.
Food Network was formed on April 19, 1993, as "TV Food Network"; its legal name remains Television Food Network, G. P. After acquiring the Food Network trademark after several years, it shortened the name to that. The network initially launched on November 22, 1993, with two initial shows featuring David Rosengarten, Donna Hanover, and Robin Leach. On November 23, 1993, Food Network began live broadcasting. Its original partners included the Journal itself, Adelphia, Scripps-Howard, Continental Cablevision, Cablevision, and most importantly, the Tribune Company, which provi |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.